diff -r c39e182aa37c -r bae7f55f6ef7 foundation_system/sf_config/CI_external/customisation/CustomisationInterface/confml/CI_commsdatcreator.confml --- a/foundation_system/sf_config/CI_external/customisation/CustomisationInterface/confml/CI_commsdatcreator.confml Tue Aug 31 16:25:42 2010 +0300 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,831 +0,0 @@ - - - - Global network related settings not tied to individual connection methods. - - Defines the packet data connection mode. Select When Available to register the device to the packet data network (GPRS) when users switch it on in a supported network. Select When Needed to establish a packet data connection only when applications or actions require it. - - - The default access point to use the device as a packet data modem for a computer. - - - - - This setting controls the behavior of the device regarding known (saved) and new WLAN networks. - When a known WLAN network is discovered, the device can automatically switch to it. - When one or more new unknown WLAN networks are discovered in connection request phase, those can be proposed and taken into use. - - - - - This setting controls the cellular packet data usage in home network. - Automatic means that cellular data connection is utilized automatically in case needed. - Confirm means that there is a confirmation query to confirm the usage. - WLAN Only means that cellular data is not tried to use. Instead, WLAN is utilized whenever possible. - - - - - This setting controls the cellular packet data usage in foreign network. - Automatic means that cellular data connection is utilized automatically in case needed. - Confirm means that there is a confirmation query to confirm the usage. - WLAN Only means that cellular data is not tried to use. Instead, WLAN is utilized whenever possible. - - - - - For GPRS the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. - Leave empty to use the product default value. - - - - - For GPRS the time (in seconds) to stay online when session has closed. -1 for unlimited time. - Leave empty to use the product default value. - - - - - For GPRS the time (in seconds) to stay online when socket has closed. -1 for unlimited time. - Leave empty to use the product default value. - - - - - For WLAN the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. - Leave empty to use the product default value. - - - - - For WLAN the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. - Leave empty to use the product default value. - - - - - For WLAN the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. - Leave empty to use the product default value. - - - - - How often WLAN networks are scanned when idle. - - - - - Settings for packet data connections (GPRS). - - Access point to a packet data network. - - The connection name that is visible to the user. - - - - Specifies the connection ID. Either specify the connection ID manually or leave empty to have it allocated automatically. If you specify the ID manaually, verify that the IDs are globally unique. - - - Defines whether the access point is protected or not. Users cannot edit protected access points. - - - Defines whether the access point is hidden or not. - - - Defines whether or not to hide the access point for MMS connections. - - - Defines whether the access point is highlighted or not. - - - Defines whether devices can roam to an access point. - - - Defines the addressing that the network uses. - - - The access point name for this packet data connection. - - - - Authenticates the user to the access point. - - - - Prompts the user to enter a password when a connection is created. - - - Authenticates the user to the access point. - - - - The password authentication method. Select Secure to always send the password encrypted and Normal to send it encryped when possible. - - - Wireless application protocol (WAP) gateway IP address. - - - The Web address (in URL format) of the page to display as the home page when users use this access point. - - - - - Attempts a secure wireless transport layer security (WTLS) connection to the WAP gateway. - - - Defines whether to use a continuous or a temporary connection. - - - IP address of the interface. Typically allocated automatically. - - - Address of the primary DNS server that resolves host names. Typically allocated automatically. - - - Address of the secondary DNS server to connect if the primary DNS server is not available. Typically allocated automatically. - - - Address of the primary DNS server that resolves host names. Typically allocated automatically. - - - Address of the secondary DNS server to connect if the primary DNS server is not available. Typically allocated automatically. - - - Address of the HTTP/HTTPS proxy server. - - - - Port number of the HTTP/HTTPS proxy server. - - - - Protocol name for the proxy settings. Typically HTTP or HTTPS. - - - Defines whether EDGE usage is allowed or not. - - - Specifies the service provider type. Used when filtering connection methods for certain purpose. - - - Defines the time to stay online after all activity on a network link has stopped. Choose 0 or a negative value for unlimited time. Leave empty to disable. - - - - - Settings for WLAN connections. - - Specifies the settings for WLAN access point. - - The connection name that is visible to the user. - - - Specifies the connection ID. Either specify the connection ID manually or leave empty to have it allocated automatically. If you specify the ID manaually, verify that the IDs are globally unique. - - - Defines whether the access point is protected or not. Users cannot edit protected access points. - - - Defines whether the access point is hidden or not. - - - Defines whether or not to hide the access point for MMS connections. - - - Defines whether the access point is highlighted or not. - - - Defines whether devices can roam to an access point. - - - Service set identifier (SSID) of the primary WLAN network. - - - The Web address (in URL format) of the page to display as the home page when users use this access point. - - - Determines how devices communicate with each other. Select Infrastructure if there is a WLAN access point in the network. Select Ad Hoc if devices can send and receive data directly with each other. - - - Security mode of the WLAN network. - - - Address of the primary DNS server that resolves host names. Typically allocated automatically. - - - Address of the secondary DNS server to connect if the primary DNS server is not available. Typically allocated automatically. - - - Address of the primary DNS server that resolves host names. Typically allocated automatically. - - - Address of the secondary DNS server to connect if the primary DNS server is not available. Typically allocated automatically. - - - The gateway IP address. Typically allocated automatically. - - - Network mask. Typically allocated automatically. - - - Address of the HTTP/HTTPS proxy server. - - - Port number of the HTTP/HTTPS proxy server. - - - Protocol name for the proxy settings. Typically HTTP or HTTPS. - - - Defines whether the SSID should be actively scanned. This is needed if the SSID is hidden (not broadcasted by the AP). - - - 802.11 Channel ID (1-14). Used only when connecting/setting up adhoc network. - - - IP address of the interface. Typically allocated automatically. - - - Index of default WEP key. Used only when security mode is WEP. - - - WEP authentication mode. Select Open to allow any device that knows the SSID of the access point to gain access to the network. Select Shared to allow access only to devices that have a static WEP key and pass a challenge based authentication. Only used when security mode is WEP. - - - WEP key length in bits. - - - WEP key format. - - - WEP key data in either ASCII or hexadecimal format. Devices use the RC4 algorithm with a key length of 64, 128, or 256 bits to define a set of WEP keys. Access to the WLAN is allowed only to mobile devices that have the required keys. If the key length is 64, enter 5 bytes in ASCII or 10 bytes in hexadecimal format. If the key length is 128, enter 13 bytes in ASCII or 26 bytes in hexadecimal format. - - - WEP key length in bits. - - - WEP key format. - - - WEP key data in either ASCII or hexadecimal format. Devices use the RC4 algorithm with a key length of 64, 128, or 256 bits to define a set of WEP keys. Access to the WLAN is allowed only to mobile devices that have the required keys. If the key length is 64, enter 5 bytes in ASCII or 10 bytes in hexadecimal format. If the key length is 128, enter 13 bytes in ASCII or 26 bytes in hexadecimal format. - - - WEP key length in bits. - - - WEP key format. - - - WEP key data in either ASCII or hexadecimal format. Devices use the RC4 algorithm with a key length of 64, 128, or 256 bits to define a set of WEP keys. Access to the WLAN is allowed only to mobile devices that have the required keys. If the key length is 64, enter 5 bytes in ASCII or 10 bytes in hexadecimal format. If the key length is 128, enter 13 bytes in ASCII or 26 bytes in hexadecimal format. - - - WEP key length in bits. - - - WEP key format. - - - WEP key data in either ASCII or hexadecimal format. Devices use the RC4 algorithm with a key length of 64, 128, or 256 bits to define a set of WEP keys. Access to the WLAN is allowed only to mobile devices that have the required keys. If the key length is 64, enter 5 bytes in ASCII or 10 bytes in hexadecimal format. If the key length is 128, enter 13 bytes in ASCII or 26 bytes in hexadecimal format. - - - WPA/WPA2 pre-shared key in plain text. ASCII character set values between 32-126 must be used. Minimum length is 8 characters and maximum 63. Define the WPA pre-shared key length field accordingly. - - - Enables the Pre-shared key mode when the security mode is WPA or WPA2. If the setting is off, EAP mode is used and the list of EAPs needs to be defined. - - - The length of the specified pre-shared key in WPA Pre-shared Key. - - - - Extensible Authentication Protocol (EAP) method in use for this connection in case security mode is WPA or 802.1x with EAP. Please fill also the relevant EAP method specific settings. - - - - The username used with EAP-GTC. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - Defines which EAP tunneling method is used with EAP-GTC. - - - The username used with EAP-TLS. - - - The realm used for device identification to the server. - - - Compares the server realm with the device realm. This provides extra security but it depends on the network infrastructure and set-up whether this will work. - - - Specifies whether TLS requires that the server authenticates the client. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA, 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA. For example, +004 enables only RSA with RC4 and MD5. - - - The subject key ID value of the user certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the user certificate. Currently not used. - - - The serial number of the user certificate. Currently not used. - - - The subject key ID value of the CA certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the CA certificate. Currently not used. - - - The serial number of the CA certificate. Currently not used. - - - Defines which EAP tunneling method is used with EAP-TLS. - - - The username used with EAP-LEAP. - - - The password used with EAP-LEAP. - - - Specifies how long single session is kept in memory (for example, o new password queries). - - - The username used with EAP-SIM. - - - The realm used for device identification to the server. - - - Specifies whether IMSI is always sent when authenticating or is pseudonym usage allowed. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - Defines which EAP tunneling method is used with EAP-SIM. - - - The username used with EAP-TTLS. - - - The realm used for device identification to the server. - - - Compares the server realm with the device realm. This provides extra security but it depends on the network infrastructure and set-up whether this will work. - - - Specifies whether TTLS requires that the server authenticates the client. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA, 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA. For example, +004 enables only RSA with RC4 and MD5. - - - A list of Extensible Authentication Protocols (EAPs) in tunneled by EAP-TTLS. The format is +xxx,+xxx,+xxx where xxx indicates the enabled EAP method ID as specified in the IANA registry: http://www.iana.org/assignments/eap-numbers. For example, to enable EAP-SIM encapsulation the string needs to be "+018". The list is in priority order, highest priority first. Note that the encapsulate type's encapsulation parameter needs to be configured accordingly. - - - The subject key ID value of the user certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the user certificate. Currently not used. - - - The serial number of the user certificate. Currently not used. - - - The subject key id value of the CA certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the CA certificate. Currently not used. - - - The serial number of the CA certificate. Currently not used. - - - The username used with EAP-AKA. - - - The realm used for device identification to the server. - - - Specifies whether IMSI is always sent when authenticating or is pseudonym usage allowed. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - Defines which EAP tunneling method is used with EAP-AKA. - - - The username used with EAP-PEAP. - - - The realm used for device identification to the server. - - - Compares the server realm with the device realm. This provides extra security but it depends on the network infrastructure and set-up whether this will work. - - - Specifies whether PEAP requires that the server authenticates the client. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA, 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA. For example, +004 enables only RSA with RC4 and MD5. - - - Defines whether PEAP version 0 is allowed. If in doubt enable only this one. - - - Defines whether PEAP version 1 is allowed. - - - Defines whether PEAP version 2 is allowed. - - - A list of Extensible Authentication Protocols (EAPs) in tunneled by EAP-PEAP. The format is +xxx,+xxx,+xxx where xxx indicates the enabled EAP method ID as specified in the IANA registry: http://www.iana.org/assignments/eap-numbers. For example to enable EAP-SIM encapsulation the string needs to be "+018". The list is in priority order, highest priority first. Note that the encapsulate type's encapsulation parameter needs to be configured accordingly. - - - The subject key ID value of the user certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the user certificate. Currently not used. - - - The serial number of the user certificate. Currently not used. - - - The subject key id value of the CA certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the CA certificate. Currently not used. - - - The serial number of the CA certificate. Currently not used. - - - The username used with EAP-MSCHAPv2. - - - The password used with EAP-MSCHAPv2. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - Defines which EAP tunneling method is used with EAP-MSCHAPv2. - - - The username used with EAP-FAST. - - - The realm used for device identification to the server. - - - Specifies whether the server's realm is compared with own realm. This provides extra security but it depends on the network infrastructure and set-up whether this will work. - - - Specifies whether TTLS requires that the server authenticates the client. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA, 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA. For example, +004 enables only RSA with RC4 and MD5. - - - A list of Extensible Authentication Protocols (EAPs) in tunneled by EAP-FAST. The format is +xxx,+xxx,+xxx where xxx indicates the enabled EAP method ID as specified in the IANA registry: http://www.iana.org/assignments/eap-numbers. For example to enable EAP-SIM encapsulation the string needs to be "+018". The list is in priority order, highest priority first. Note that the encapsulate type's encapsulation parameter needs to be configured accordingly. - - - Allows the dynamic provisioning of a PAC key in signed mode, where the server is authenticated during a signed Diffie-Hellman (DH) exchange. The device must have the server public key. - - - Allows the dynamic provisioning of a PAC key in anonymous mode, without authenticating the server. - - - Defines whether the server issues a warning if the device does not send a PAC, the server cannot decrypt the PAC, or the PAC has expired. - - - Defines whether the server issues a warning the server and the device cannot match a PAC. - - - Defines whether the server issues a warning if the server is not the default server. - - - The subject key ID value of the user certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the user certificate. Ignored by the implementation currently! - - - The serial number of the user certificate. Currently not used. - - - The subject key ID value of the CA certificate. Currently this field is the only one that can be used to identify the certificate. - - - The issuer of the CA certificate. Currently not used. - - - The serial number of the CA certificate. Currently not used. - - - The username used with MSCHAPv2. - - - The password used with MSCHAPv2. - - - Specifies how long single session is kept in memory (for example, no new password queries). - - - Defines which EAP tunneling method is used with MSCHAPv2. Needs to be EAP-TTLS. - - - - - Settings for Destination Networks (SNAP) that applications can use. - - Settings for Destination Network. - - Destination Network name that is visible to the user. - - - Specifies the connection ID. Either specify the connection ID manually or leave empty to have it allocated automatically. If you specify the ID manaually, verify that the IDs are globally unique. - - - Metadata that specifies a few default destination networks that applications can use. - - - Defines the protection level. Select Destination And Contents to protect the connection methods inside the destination and their priorities. - - - Defines whether the Destination Network is hidden or not. - - - Defines whether or not to hide the Destination Network for MMS connections. - - - Defines whether the Destination Network is highlighted or not. - - - Defines the icon to be assigned to Destination Network. - - - Name of an embedded Destination Network that is bound to the Destination Network. - - - Name of the first connection method that is bound to the Destination Network. - - - Name of the second connection method that is bound to the Destination Network. - - - Name of the third connection method that is bound to the Destination Network. - - - Name of the fourth connection method that is bound to the Destination Network. - - - Name of the fifth connection method that is bound to the Destination Network. - - - Name of the sixth connection method that is bound to the Destination Network. - - - Name of the seventh connection method that is bound to the Destination Network. - - - Name of the eight connection method that is bound to the Destination Network. - - - Name of the ninth connection method that is bound to the Destination Network. - - - Name of the tenth connection method that is bound to the Destination Network. - - - - \ No newline at end of file