Apple Manuel VoiceOver
Getting Started
Includes instructions and complete
command lists for using VoiceOver with
Mac OS X version 10.4 Tiger
Apple Manuel VoiceOver
Getting Started
Includes instructions and complete
command lists for using VoiceOver with
Mac OS X version 10.4 Tiger
Apple sur Fnac.com
- Pour voir la liste complète des manuels APPLE, cliquez ici
ou juste avant la balise de fermeture
-->
ou juste avant la balise de fermeture -->
TELECHARGER LE PDF sur :
http://images.apple.com/accessibility/voiceover/pdf/VO_GettingStarted.pdf
Commander un produit Apple sur Fnac.com
Voir également d'autres Guides APPLE :
Apple-Server_Administration_v10.5.pdf-Manuel
Apple-ipod_classic_features_guide.pdf-Manuel
Apple-Lecteur-Optique-Manuel
Apple-Carte-AirPort-Manuel
Apple-iPhone_Finger_Tips_Guide.pdf-Anglais-Manuel
Apple-Couvercle-Manuel
Apple-battery.cube.pdf-Manuel
Apple-Boitier-de-l-ordinateur-Manuel
Apple-Pile-Interne-Manuel
Apple-atacable.pdf-Manuel
Apple-videocard.pdf-Manuel
Apple-Guide_de_configuration_de_l_Airport_Express_5.1.pdf-Manuel
Apple-iMac_Mid2010_UG_F.pdf-Manuel
Apple-MacBook_13inch_Mid2009_F.pdf-Manuel
Apple-MacBook_Mid2007_UserGuide.F.pdf-Manuel
Apple-Designing_AirPort_Networks_10.5-Windows_F.pdf-Manuel
Apple-Administration_de_QuickTime_Streaming_et_Broadcasting_10.5.pdf-Manuel
Apple-Opstillingsvejledning_til_TimeCapsule.pdf-Danemark-Manuel
Apple-iPod_nano_5th_gen_Benutzerhandbuch.pdf-Manuel
Apple-iOS_Business.pdf-Manuel
Apple-AirPort_Extreme_Installationshandbuch.pdf-Manuel
Apple-Final_Cut_Express_4_Installation_de_votre_logiciel.pdf-Manuel
Apple-MacBook_Pro_15inch_2.53GHz_Mid2009.pdf-Manuel
Apple-Network_Services.pdf-Manuel
Apple-Aperture_Performing_Adjustments_f.pdf-Manuel
Apple-Supplement_au_guide_Premiers_contacts.pdf-Manuel
Apple-Administration_des_images_systeme_et_de_la_mise_a_jour_de_logiciels_10.5.pdf-Manuel
Apple-Mac_OSX_Server_v10.6_Premiers_contacts.pdf-Francais-Manuel
Apple-Designing_AirPort_Networks_10.5-Windows_F.pdf-Manuel
Apple-Mise_a_niveau_et_migration_v10.5.pdf-Manue
Apple-MacBookPro_Late_2007_2.4_2.2GHz_F.pdf-Manuel
Apple-Mac_mini_Late2009_SL_Server_F.pdf-Manuel
Apple-Mac_OS_X_Server_10.5_Premiers_contacts.pdf-Manuel
Apple-iPod_touch_2.0_Guide_de_l_utilisateur_CA.pdf-Manuel
Apple-MacBook_Pro_17inch_Mid2010_F.pdf-Manuel
Apple-Comment_demarrer_Leopard.pdf-Manuel
Apple-iPod_2ndGen_USB_Power_Adapter-FR.pdf-Manuel
Apple-Feuille_de_operations_10.4.pdf-Manuel
Apple-Time_Capsule_Installationshandbuch.pdf-Allemand-Manuel
Apple-F034-2262AXerve-grappe.pdf-Manuel
Apple-Mac_Pro_Early2009_4707_UG_F
Apple-imacg5_17inch_Power_Supply
Apple-Logic_Studio_Installieren_Ihrer_Software_Retail
Apple-IntroductionXserve1.0.1
Apple-Aperture_Getting_Started_d.pdf-Allemand
Apple-getting_started_with_passbook
Apple-iPod_mini_2nd_Gen_UserGuide.pdf-Anglais
Apple-Deploiement-d-iPhone-et-d-iPad-Reseaux-prives-virtuels
Apple-F034-2262AXerve-grappe
Apple-Mac_OS_X_Server_Glossaire_10.5
Apple-FRLogic_Pro_7_Guide_TDM
Apple-iphone_bluetooth_headset_userguide
Apple-Administration_des_services_reseau_10.5
Apple-imacg5_17inch_harddrive
Apple-iPod_nano_4th_gen_Manuale_utente
Apple-iBook-G4-Getting-Started
Apple-XsanGettingStarted
Apple-Mac_mini_UG-Early2006
Apple-Guide_des_fonctionnalites_de_l_iPod_classic
Apple-Guide_de_configuration_d_Xsan_2
Apple-MacBook_Late2006_UsersGuide
Apple-sur-Fnac.com
Apple-Mac_mini_Mid2010_User_Guide_F.pdf-Francais
Apple-PowerBookG3UserManual.PDF.Anglais
Apple-Installation_de_votre_logiciel_Logic_Studio_Retail
Apple-Pages-Guide-de-l-utilisateur
Apple-MacBook_Pro_13inch_Mid2009.pdf.Anglais
Apple-MacBook_Pro_15inch_Mid2009
Apple-Installation_de_votre_logiciel_Logic_Studio_Upgrade
Apple-FRLogic_Pro_7_Guide_TDM
Apple-airportextreme_802.11n_userguide
Apple-iPod_shuffle_3rdGen_UG
Apple-iPod_classic_160GB_User_Guide
Apple-iPod_nano_5th_gen_UserGuide
Apple-ipod_touch_features_guide
Apple-Wireless_Mighty_Mouse_UG
Apple-Advanced-Memory-Management-Programming-Guide
Apple-iOS-App-Programming-Guide
Apple-Concurrency-Programming-Guide
Apple-MainStage-2-User-Manual-Anglais
Apple-iMacG3_2002MultilingualUserGuide
Apple-iBookG3_DualUSBUserGuideMultilingual.PDF.Anglais
Apple-imacG5_20inch_AirPort
Apple-Guide_de_l_utilisateur_de_Mac_Pro_Early_2008
Apple-Installation_de_votre_logiciel_Logic_Express_8
Apple-iMac_Guide_de_l_utilisateur_Mid2007
Apple-imacg5_20inch_OpticalDrive
Apple-FCP6_Formats_de_diffusion_et_formats_HD
Apple-prise_en_charge_des_surfaces_de_controle_logic_pro_8
Apple-Aperture_Quick_Reference_f
Apple-Shake_4_User_Manual
Apple-aluminumAppleKeyboard_wireless2007_UserGuide
Apple-ipod_shuffle_features_guide
Apple-Color-User-Manual
Apple-XsanGettingStarted
Apple-Migration_10.4_2e_Ed
Apple-MacBook_Air_SuperDrive
Apple-MacBook_Late2007-f
ApplePowerMacG5_(Early_2005)_UserGuide
Apple-iSightUserGuide
Apple-MacBook_Pro_Early_2008_Guide_de_l_utilisateur
Apple-Nouvelles-fonctionnalites-aperture-1.5
Apple-premiers_contacts_2e_ed_10.4.pdf-Mac-OS-X-Server
Apple-premiers_contacts_2e_ed_10.4
Apple-eMac_2005UserGuide
Apple-imacg5_20inch_Inverter
Apple-Keynote2_UserGuide.pdf-Japon
Apple-Welcome_to_Tiger.pdf-Japon
Apple-XsanAdminGuide_j.pdf-Japon
Apple-PowerBookG4_UG_15GE.PDF-Japon
Apple-Xsan_Migration.pdf-Japon
Apple-Xserve_Intel_DIY_TopCover_JA.pdf-Japon
Apple-iPod_nano_6thgen_User_Guide_J.pdf-Japon
Apple-Aperture_Photography_Fundamentals.pdf-Japon
Apple-nikeipod_users_guide.pdf-Japon
Apple-QuickTime71_UsersGuide.pdf-Japon
Apple-iMacG5_iSight_UG.pdf-Japon
Apple-Aperture_Performing_Adjustments_j.pdf-Japon
Apple-iMacG5_17inch_HardDrive.pdf-Japon
Apple-iPod_shuffle_Features_Guide_J.pdf-Japon
Apple-MacBook_Air_User_Guide.pdf-Japon
Apple-MacBook_UsersGuide.pdf-Japon
Apple-iPad_iOS4_Brukerhandbok.pdf-Norge-Norvege
Apple-Apple_AirPort_Networks_Early2009_H.pd-Norge-Norvege
Apple-iPod_classic_120GB_no.pdf-Norge-Norvege
Apple-StoreKitGuide.pdf-Japon
Apple-Xserve_Intel_DIY_ExpansionCardRiser_JA.pdf-Japon
Apple-iMacG5_Battery.pdf-Japon
Apple-Logic_Pro_8_Getting_Started.pdf-Japon
Apple-PowerBook-handbok-Norge-Norveg
Apple-iWork09_formler_og_funksjoner.pdf-Norge-Norvege
Apple-MacBook_Pro_15inch_Mid2010_H.pdf-Norge-Norvege
Apple-MacPro_HardDrive_DIY.pdf-Japon
Apple-iPod_Fifth_Gen_Funksjonsoversikt.pdf-Norge-Norvege
Apple-MacBook_13inch_white_Early2009_H.pdf-Norge-Norvege
Apple-GarageBand_09_Komme_i_gang.pdf-Norge-Norvege
Apple-MacBook_Pro_15inch_Mid2009_H.pdf-Norge-Norvege
Apple-imac_mid2011_ug_h.pdf-Norge-Norvege
Apple-iDVD_08_Komme_i_gang.pdf-Norge-Norvege
Apple-MacBook_Air_11inch_Late2010_UG_H.pdf-Norge-Norvege
Apple-iMac_Mid2010_UG_H.pdf-Norge-Norvege
Apple-MacBook_13inch_Mid2009_H.pdf-Norge-Norvege
/Apple-iPhone_3G_Viktig_produktinformasjon_H-Norge-Norvege
Apple-MacBook_13inch_Mid2010_UG_H.pdf-Norge-Norvege
Apple-macbook_air_13inch_mid2011_ug_no.pdf-Norge-Norvege
Apple-Mac_mini_Early2009_UG_H.pdf-Norge-Norvege
Apple-ipad2_brukerhandbok.pdf-Norge-Norvege
Apple-iPhoto_08_Komme_i_gang.pdf-Norge-Norvege
Apple-MacBook_Air_Brukerhandbok_Late2008.pdf-Norge-Norvege
Apple-Pages09_Brukerhandbok.pdf-Norge-Norvege
Apple-MacBook_13inch_Late2009_UG_H.pdf-Norge-Norvege
Apple-iPhone_3GS_Viktig_produktinformasjon.pdf-Norge-Norvege
Apple-MacBook_13inch_Aluminum_Late2008_H.pdf-Norge-Norvege
Apple-Wireless_Keyboard_Aluminum_2007_H-Norge-Norvege
Apple-NiPod_photo_Brukerhandbok_N0190269.pdf-Norge-Norvege
Apple-MacBook_Pro_13inch_Mid2010_H.pdf-Norge-Norvege
Apple-MacBook_Pro_17inch_Mid2010_H.pdf-Norge-Norvege
Apple-Velkommen_til_Snow_Leopard.pdf-Norge-Norvege.htm
Apple-TimeCapsule_Klargjoringsoversikt.pdf-Norge-Norvege
Apple-iPhone_3GS_Hurtigstart.pdf-Norge-Norvege
Apple-Snow_Leopard_Installeringsinstruksjoner.pdf-Norge-Norvege
Apple-iMacG5_iSight_UG.pdf-Norge-Norvege
Apple-iPod_Handbok_S0342141.pdf-Norge-Norvege
Apple-ipad_brukerhandbok.pdf-Norge-Norvege
Apple-GE_Money_Bank_Handlekonto.pdf-Norge-Norvege
Apple-MacBook_Air_11inch_Late2010_UG_H.pdf-Norge-Norvege
Apple-iPod_nano_6thgen_Brukerhandbok.pdf-Norge-Norvege
Apple-iPod_touch_iOS4_Brukerhandbok.pdf-Norge-Norvege
Apple-MacBook_Air_13inch_Late2010_UG_H.pdf-Norge-Norvege
Apple-MacBook_Pro_15inch_Early2011_H.pdf-Norge-Norvege
Apple-Numbers09_Brukerhandbok.pdf-Norge-Norvege
Apple-Welcome_to_Leopard.pdf-Japon
Apple-PowerMacG5_UserGuide.pdf-Norge-Norvege
Apple-iPod_touch_2.1_Brukerhandbok.pdf-Norge-Norvege
Apple-Boot_Camp_Installering-klargjoring.pdf-Norge-Norvege
Apple-MacOSX10.3_Welcome.pdf-Norge-Norvege
Apple-iPod_shuffle_3rdGen_UG_H.pdf-Norge-Norvege
Apple-iPhone_4_Viktig_produktinformasjon.pdf-Norge-Norvege
Apple_TV_Klargjoringsoversikt.pdf-Norge-Norvege
Apple-iMovie_08_Komme_i_gang.pdf-Norge-Norvege
Apple-iPod_classic_160GB_Brukerhandbok.pdf-Norge-Norvege
Apple-Boot_Camp_Installering_10.6.pdf-Norge-Norvege
Apple-Network-Services-Location-Manager-Veiledning-for-nettverksadministratorer-Norge-Norvege
Apple-iOS_Business_Mar12_FR.pdf
Apple-PCIDualAttachedFDDICard.pdf
Apple-Aperture_Installing_Your_Software_f.pdf
Apple-User_Management_Admin_v10.4.pdf
Apple-Compressor-4-ユーザーズマニュアル Japon
Apple-Network_Services_v10.4.pdf
Apple-iPod_2ndGen_USB_Power_Adapter-DE
Apple-Mail_Service_v10.4.pdf
Apple-AirPort_Express_Opstillingsvejledning_5.1.pdf
Apple-MagSafe_Airline_Adapter.pdf
Apple-L-Apple-Multiple-Scan-20-Display
Apple-Administration_du_service_de_messagerie_10.5.pdf
Apple-System_Image_Admin.pdf
Apple-iMac_Intel-based_Late2006.pdf-Japon
Apple-iPhone_3GS_Finger_Tips_J.pdf-Japon
Apple-Power-Mac-G4-Mirrored-Drive-Doors-Japon
Apple-AirMac-カード取り付け手順-Japon
Apple-iPhone開発ガイド-Japon
Apple-atadrive_pmg4mdd.j.pdf-Japon
Apple-iPod_touch_2.2_User_Guide_J.pdf-Japon
Apple-Mac_OS_X_Server_v10.2.pdf
Apple-AppleCare_Protection_Plan_for_Apple_TV.pdf
Apple_Component_AV_Cable.pdf
Apple-DVD_Studio_Pro_4_Installation_de_votre_logiciel
Apple-Windows_Services
Apple-Motion_3_New_Features_F
Apple-g4mdd-fw800-lowerfan
Apple-MacOSX10.3_Welcome
Apple-Print_Service
Apple-Xserve_Setup_Guide_F
Apple-PowerBookG4_17inch1.67GHzUG
Apple-iMac_Intel-based_Late2006
Apple-Installation_de_votre_logiciel
Apple-guide_des_fonctions_de_l_iPod_nano
Apple-Administration_de_serveur_v10.5
Apple-Mac-OS-X-Server-Premiers-contacts-Pour-la-version-10.3-ou-ulterieure
Apple-boot_camp_install-setup
Apple-iBookG3_14inchUserGuideMultilingual
Apple-mac_pro_server_mid2010_ug_f
Apple-Motion_Supplemental_Documentation
Apple-imac_mid2011_ug_f
Apple-iphone_guide_de_l_utilisateur
Apple-macbook_air_11inch_mid2011_ug_fr
Apple-NouvellesfonctionnalitesdeLogicExpress7.2
Apple-QT_Streaming_Server
Apple-Web_Technologies_Admin
Apple-Mac_Pro_Early2009_4707_UG
Apple-guide_de_l_utilisateur_de_Numbers08
Apple-Decouverte_d_Aperture_2
Apple-Guide_de_configuration_et_d'administration
Apple-mac_integration_basics_fr_106.
Apple-iPod_shuffle_4thgen_Guide_de_l_utilisateur
Apple-ARA_Japan
Apple-081811_APP_iPhone_Japanese_v5.4.pdf-Japan
Apple-Recycle_Contract120919.pdf-Japan
Apple-World_Travel_Adapter_Kit_UG
Apple-iPod_nano_6thgen_User_Guide
Apple-RemoteSupportJP
Apple-Mac_mini_Early2009_UG_F.pdf-Manuel-de-l-utilisateur
Apple-Compressor_3_Batch_Monitor_User_Manual_F.pdf-Manuel-de-l-utilisateur
Apple-Premiers__contacts_avec_iDVD_08
Apple-Mac_mini_Intel_User_Guide.pdf
Apple-Prise_en_charge_des_surfaces_de_controle_Logic_Express_8
Apple-mac_integration_basics_fr_107.pdf
Apple-Final-Cut-Pro-7-Niveau-1-Guide-de-preparation-a-l-examen
Apple-Logic9-examen-prep-fr.pdf-Logic-Pro-9-Niveau-1-Guide-de-preparation-a-l-examen
Apple-aperture_photography_fundamentals.pdf-Manuel-de-l-utilisateu
Apple-emac-memory.pdf-Manuel-de-l-utilisateur
Apple-Apple-Installation-et-configuration-de-votre-Power-Mac-G4
Apple-Guide_de_l_administrateur_d_Xsan_2.pdf
Apple-premiers_contacts_avec_imovie6.pdf
Apple-Tiger_Guide_Installation_et_de_configuration.pdf
Apple-Final-Cut-Pro-7-Level-One-Exam-Preparation-Guide-and-Practice-Exam
Apple-Open_Directory.pdf
Apple-Nike_+_iPod_User_guide
Apple-ard_admin_guide_2.2_fr.pdf
Apple-systemoverviewj.pdf-Japon
Apple-Xserve_TO_J070411.pdf-Japon
Apple-Mac_Pro_User_Guide.pdf
Apple-iMacG5_iSight_UG.pdf
Apple-premiers_contacts_avec_iwork_08.pdf
Apple-services_de_collaboration_2e_ed_10.4.pdf
Apple-iPhone_Bluetooth_Headset_Benutzerhandbuch.pdf
Apple-Guide_de_l_utilisateur_de_Keynote08.pdf
APPLE/Apple-Logic-Pro-9-Effectsrfr.pdf
Apple-Logic-Pro-9-Effectsrfr.pdf
Apple-iPod_shuffle_3rdGen_UG_F.pdf
Apple-iPod_classic_160Go_Guide_de_l_utilisateur.pdf
Apple-iBookG4GettingStarted.pdf
Apple-Administration_de_technologies_web_10.5.pdf
Apple-Compressor-4-User-Manual-fr
Apple-MainStage-User-Manual-fr.pdf
Apple-Logic_Pro_8.0_lbn_j.pdf
Apple-PowerBookG4_15inch1.67-1.5GHzUserGuide.pdf
Apple-MacBook_Pro_15inch_Mid2010_CH.pdf
Apple-LED_Cinema_Display_27-inch_UG.pdf
Apple-MacBook_Pro_15inch_Mid2009_RS.pdf
Apple-macbook_pro_13inch_early2011_f.pdf
Apple-iMac_Mid2010_UG_BR.pdf
Apple-iMac_Late2009_UG_J.pdf
Apple-iphone_user_guide-For-iOS-6-Software
Apple-iDVD5_Getting_Started.pdf
Apple-guide_des_fonctionnalites_de_l_ipod_touch.pdf
Apple_iPod_touch_User_Guide
Apple_macbook_pro_13inch_early2011_f
Apple_Guide_de_l_utilisateur_d_Utilitaire_RAID
Apple_Time_Capsule_Early2009_Setup_F
Apple_iphone_4s_finger_tips_guide_rs
Apple_iphone_upute_za_uporabu
Apple_ipad_user_guide_ta
Apple_iPod_touch_User_Guide
apple_earpods_user_guide
apple_iphone_gebruikershandleiding
apple_iphone_5_info
apple_iphone_brukerhandbok
apple_apple_tv_3rd_gen_setup_tw
apple_macbook_pro-retina-mid-2012-important_product_info_ch
apple_Macintosh-User-s-Guide-for-Macintosh-PowerBook-145
Apple_ipod_touch_user_guide_ta
Apple_TV_2nd_gen_Setup_Guide_h
Apple_ipod_touch_manual_del_usuario
Apple_iphone_4s_finger_tips_guide_tu
Apple_macbook_pro_retina_qs_th
Apple-Manuel_de_l'utilisateur_de_Final_Cut_Server
Apple-iMac_G5_de_lutilisateur
Apple-Cinema_Tools_4.0_User_Manual_F
Apple-Personal-LaserWriter300-User-s-Guide
Apple-QuickTake-100-User-s-Guide-for-Macintosh
Apple-User-s-Guide-Macintosh-LC-630-DOS-Compatible
Apple-iPhone_iOS3.1_User_Guide
Apple-iphone_4s_important_product_information_guide
Apple-iPod_shuffle_Features_Guide_F
Liste-documentation-apple
Apple-Premiers_contacts_avec_iMovie_08
Apple-macbook_pro-retina-mid-2012-important_product_info_br
Apple-macbook_pro-13-inch-mid-2012-important_product_info
Apple-macbook_air-11-inch_mid-2012-qs_br
Apple-Manuel_de_l_utilisateur_de_MainStage
Apple-Compressor_3_User_Manual_F
Apple-Color_1.0_User_Manual_F
Apple-guide_de_configuration_airport_express_4.2
Apple-TimeCapsule_SetupGuide
Apple-Instruments_et_effets_Logic_Express_8
Apple-Manuel_de_l_utilisateur_de_WaveBurner
Apple-Macmini_Guide_de_l'utilisateur
Apple-PowerMacG5_UserGuide
Disque dur, ATA parallèle Instructions de remplacement
Apple-final_cut_pro_x_logic_effects_ref_f
Apple-Leopard_Installationshandbok
Manuale Utente PowerBookG4
Apple-thunderbolt_display_getting_started_1e
Apple-Compressor-4-Benutzerhandbuch
Apple-macbook_air_11inch_mid2011_ug
Apple-macbook_air-mid-2012-important_product_info_j
Apple-iPod-nano-Guide-des-fonctionnalites
Apple-iPod-nano-Guide-des-fonctionnalites
Apple-iPod-nano-Guide-de-l-utilisateur-4eme-generation
Apple-iPod-nano-Guide-de-l-utilisateur-4eme-generation
Apple-Manuel_de_l_utilisateur_d_Utilitaire_de_reponse_d_impulsion
Apple-Aperture_2_Raccourcis_clavier
AppleTV_Setup-Guide
Apple-livetype_2_user_manual_f
Apple-imacG5_17inch_harddrive
Apple-macbook_air_guide_de_l_utilisateur
Apple-MacBook_Early_2008_Guide_de_l_utilisateur
Apple-Keynote-2-Guide-de-l-utilisateur
Apple-PowerBook-User-s-Guide-for-PowerBook-computers
Apple-Macintosh-Performa-User-s-Guide-5200CD-and-5300CD
Apple-Macintosh-Performa-User-s-Guide
Apple-Workgroup-Server-Guide
Apple-iPod-nano-Guide-des-fonctionnalites
Apple-iPad-User-Guide-For-iOS-5-1-Software
Apple-Boot-Camp-Guide-d-installation-et-de-configuration
Apple-iPod-nano-Guide-de-l-utilisateur-4eme-generation
Power Mac G5 Guide de l’utilisateur APPLE
Guide de l'utilisateur PAGE '08 APPLE
Guide de l'utilisateur KEYNOTE '09 APPLE
Guide de l'Utilisateur KEYNOTE '3 APPLE
Guide de l'Utilisateur UTILITAIRE RAID
Guide de l'Utilisateur Logic Studio
Power Mac G5 Guide de l’utilisateur APPLE
Guide de l'utilisateur PAGE '08 APPLE
Guide de l'utilisateur KEYNOTE '09 APPLE
Guide de l'Utilisateur KEYNOTE '3 APPLE
Guide de l'Utilisateur UTILITAIRE RAID
Guide de l'Utilisateur Logic Studio
Guide de l’utilisateur ipad Pour le logiciel iOS 5.1
PowerBook G4 Premiers Contacts APPLE
Guide de l'Utilisateur iphone pour le logiciel ios 5.1 APPLE
Guide de l’utilisateur ipad Pour le logiciel iOS 4,3
Guide de l’utilisateur iPod nano 5ème génération
Guide de l'utilisateur iPod Touch 2.2 APPLE
Guide de l’utilisateur QuickTime 7 Mac OS X 10.3.9 et ultérieur Windows XP et Windows 2000
Guide de l'utilisateur MacBook 13 pouces Mi 2010
Guide de l’utilisateur iPhone (Pour les logiciels iOS 4.2 et 4.3)
Guide-de-l-utilisateur-iPod-touch-pour-le-logiciel-ios-4-3-APPLE
Guide-de-l-utilisateur-iPad-2-pour-le-logiciel-ios-4-3-APPLE
Guide de déploiement en entreprise iPhone OS
Guide-de-l-administrateur-Apple-Remote-Desktop-3-1
Guide-de-l-utilisateur-Apple-Xserve-Diagnostics-Version-3X103
Guide-de-configuration-AirPort-Extreme-802.11n-5e-Generation
Guide-de-configuration-AirPort-Extreme-802-11n-5e-Generation
Guide-de-l-utilisateur-Capteur-Nike-iPod
Guide-de-l-utilisateur-iMac-21-5-pouces-et-27-pouces-mi-2011-APPLE
Guide-de-l-utilisateur-Apple-Qadministrator-4
Guide-d-installation-Apple-TV-3-eme-generation
User-Guide-iPad-For-ios-5-1-Software
VoiceOver
Getting Started
Includes instructions and complete
command lists for using VoiceOver with
Mac OS X version 10.4 Tiger.2
1 Contents
Chapter 1 6 Introduction
6 About VoiceOver
7 What You Need to Get Started
7 Using This Document
8 Where to Find More Information
8 VoiceOver Quick Start
8 VoiceOver Help
8 VoiceOver Menu
8 Mac OS X Keyboard Shortcuts
9 Resources on the Internet
9 Teaching and Learning Tools
9 Darkening the Screen
9 VoiceOver Quick Start Application
9 VoiceOver Keyboard Commands Diagrams
10 About VoiceOver Accessibility
Chapter 2 11 Introduction to Mac OS X
11 The Desktop
12 The Finder
12 Toolbar Buttons
12 Sidebar and View Browser
13 The Dock
13 The Menu Bar
14 Files and Folders
14 System Preferences
15 Spotlight
Chapter 3 16 Keyboard Basics
16 Important Keys to Know
17 About Function Keys
18 Using Function Keys on Portable Computers
18 Using Home, End, Page Up, and Page Down on Portable Computers
18 Keyboard AccessibilityContents 3
18 Sticky Keys
19 Slow Keys
19 Key Repeat Rate
20 Keyboard Settings in VoiceOver Utility
Chapter 4 22 VoiceOver Basics
22 Following Instructions
22 Turning On VoiceOver
23 Using VoiceOver in the Login Window
23 Pausing VoiceOver Speech
23 Controlling VoiceOver
24 Reading Window Contents
25 Reading Text
25 Changing Rate, Pitch, and Volume Temporarily
26 Interacting With Content Areas
27 Using Buttons and Controls
28 Learning More About an Item
28 Navigating Menus
29 Navigating Quickly in a Menu
29 Using Pop-up Menus
29 Using Contextual Menus
30 Understanding Duplicate Menu Items
30 Working With the VoiceOver Menu
31 Using the Commands Menu
32 Chapter 4 Exercises
32 Exercise 4.1: Moving the VoiceOver Cursor
32 Exercise 4.2: Interacting With a Content Area
32 Exercise 4.3: Navigating the Menu Bar
33 Exercise 4.4: Navigating in a Menu and Submenu
33 Exercise 4.5: Using the VoiceOver Menu
Chapter 5 34 Using VoiceOver With Mac OS X
34 Using the Dock
35 Setting Dock Preferences
35 Working With Contextual Menus for Dock Items
35 Switching Between Applications and Windows
37 Navigating Finder Windows
38 Using Icon View
38 Using List View
39 Using Column View
40 Accessing Finder Window Buttons
40 Selecting Files and Folders
41 Copying and Moving Files4 Contents
42 The Item Chooser Menu
43 Interacting With Windows
43 Moving and Resizing Windows
43 Moving a Scroll Bar
44 Using Spotlight
44 Using the Spotlight Menu
45 Using the Spotlight Window
46 Changing the Sort Criteria
46 Chapter 5 Exercises
46 Exercise 5.1: Using the Dock
47 Exercise 5.2: Using the Item Chooser Menu
47 Exercise 5.3: Copying and Pasting a File
Chapter 6 50 VoiceOver Utility and Preferences
50 Saving VoiceOver Settings
51 Setting the Amount of Spoken Detail
51 Adjusting Punctuation Settings
52 Adjusting Text Attribute Settings
52 Setting Navigation Options
53 Setting Website Navigation Options
53 Setting VoiceOver Cursor Options
54 Customizing Voices
54 Using Different Voices
55 Changing Rate, Pitch, and Volume
55 Setting Visual Options
56 Magnifying the VoiceOver Cursor
57 Using the Caption Panel
57 Moving and Resizing the Caption Panel
57 Changing the Caption Panel Font Size
58 Tiling Visuals
58 Hiding Visuals
59 Setting Text Pronunciation
59 Chapter 6 Exercises
59 Exercise 6.1: Using VoiceOver to Change Voice Settings
60 Exercise 6.2: Using VoiceOver to Change Rate, Pitch, and Volume
61 Exercise 6.3: Adjusting the Caption Panel
62 Exercise 6.4: Magnifying the VoiceOver Cursor and Tiling VoiceOver Visuals
62 Exercise 6.5: Adding Pronunciation to the VoiceOver Dictionary
Chapter 7 64 Web Browsing and Email
64 Connecting to the Internet
66 Using Mac OS X Mail
66 The Mail ToolbarContents 5
66 Opening Collapsed Folders in the Mailboxes Outline
67 Reading Email
68 Addressing a Message
68 Using the Safari Web Browser
68 Navigating Websites With VoiceOver
69 Using the Link Chooser Menu
70 Navigating Website Images
70 Chapter 7 Exercises
70 Exercise 7.1: Opening and Reading an Email Message
71 Exercise 7.2: Using the Link Chooser Menu
Chapter 8 72 Reading and Editing Text
72 Reading a Document
73 Working With Text
73 Locating the Insertion Point
73 Navigating in a Document
74 Bookmarking a Document
74 Cursor Tracking in Text Areas
74 Selecting Text
75 Hearing Text Attributes
75 Using TextEdit With VoiceOver
75 Checking Spelling in TextEdit
76 Changing Tab Stops in TextEdit
77 Chapter 8 Exercises
77 Exercise 8.1: Following the Insertion Point
77 Exercise 8.2: Cutting and Pasting Text
78 Exercise 8.3: Saving a Document
Chapter 9 79 Advanced Navigation Skills
79 Full Keyboard Navigation and VoiceOver
79 Advanced Cursor Tracking
80 Using the Cursor Control Keys
81 Using the Mouse With VoiceOver
81 Mouse Settings in VoiceOver Utility
82 Making the Mouse Pointer More Visible
82 Using the Numeric Keypad to Control the Mouse
83 Quickly Navigating to Content Areas
83 Chapter 9 Exercises
83 Exercise 9.1: Using Command-Tab to Switch Applications
84 Exercise 9.2: Moving Cursors Independently
Appendix 85 VoiceOver Commands1
6
1 Introduction
Welcome to VoiceOver Getting Started. This document
introduces you to VoiceOver and gets you started using your
Mac in a new way.
VoiceOver is an alternative way for users with visual or learning disabilities to use
Mac OS X. It provides magnification options, keyboard control, and spoken English
descriptions of what’s happening on the computer screen. VoiceOver reads aloud the
contents of documents (and webpages) and provides a comprehensive audible
description of the user’s workspace and activities taking place on the computer. It also
includes a rich set of keyboard commands for navigating the Mac OS X interface and
interacting with application and system controls.
About VoiceOver
VoiceOver is an integrated part of the Mac OS X operating system. If your computer has
Mac OS X version 10.4 or later installed, VoiceOver is already installed and ready to use.
Just turn on VoiceOver to begin using it.
VoiceOver works in conjunction with full keyboard access, the standard Mac OS X
keyboard navigation method. With full keyboard access, you can use the Tab key and
arrow keys to move to controls and text fields in windows, and the Space bar to select
or activate them. But when you use VoiceOver, you can do so much more.
VoiceOver uses keyboard commands to navigate your computer screen, windows,
documents, and websites. It reads aloud everything it encounters and lets you know
when events occur on your screen, such as when dialogs, alert messages, and progress
bars appear.Chapter 1 Introduction 7
What You Need to Get Started
To use VoiceOver, you need:
 A Macintosh computer with Mac OS X version 10.4 or later installed
 An English language Apple keyboard
 Built-in or external speakers or headphones
A mouse and display are optional. If you don’t need a display or mouse, you can use
VoiceOver without them.
An Internet connection is highly recommended.
Using This Document
This document is a comprehensive guide to using VoiceOver. It is organized into 11
chapters with a VoiceOver commands appendix. You can read the chapters in any order
you choose, but if you are new to Mac OS X and to VoiceOver, you will find that reading
them in the order presented lets you build upon knowledge gained in previous
chapters.
 Chapter 1, “Introduction”: In this chapter, you learn what VoiceOver is, what you
need to get started using it, and where to find more information about VoiceOver.
 Chapter 2, “Introduction to Mac OS X”: In this chapter, you learn Mac OS X basics
that will help you use VoiceOver effectively. It includes a description of the screen
layout, windows, Finder, and System Preferences.
 Chapter 3, “Keyboard Basics”: In this chapter, you learn which keys control
VoiceOver. You also learn about keyboard practice and how to set preferences in
Mac OS X and VoiceOver if you have difficulty using a keyboard.
 Chapter 4, “VoiceOver Basics”: In this chapter, you learn the basics of controlling
VoiceOver. Users who have never used VoiceOver will find out how to navigate, read
text in windows and dialogs, and select controls and objects.
 Chapter 5, “Using VoiceOver With Mac OS X”: In this chapter, you learn how to use
VoiceOver to navigate windows and perform everyday tasks on your computer using
VoiceOver.
 Chapter 6, “VoiceOver Utility and Preferences”: In this chapter, you learn how to
use VoiceOver Utility to customize VoiceOver for your needs.
 Chapter 7, “Web Browsing and Email”: In this chapter, you learn how to set up your
Internet connection and use Mail and Safari to get email and browse the Internet.
 Chapter 8, “Reading and Editing Text”: In this chapter, you learn how to use
VoiceOver to read and edit text and check spelling.8 Chapter 1 Introduction
 Chapter 9, “Advanced Navigation Skills”: In this chapter, you learn how to use the
keyboard, mouse, and VoiceOver cursor independently. You also learn how to use the
mouse with VoiceOver, and about alternate ways to control the mouse.
 Appendix , “VoiceOver Commands”: In this appendix, you learn all the commands
you can use to control VoiceOver.
Where to Find More Information
You can use the resources and VoiceOver features described below to learn more about
using VoiceOver.
VoiceOver Quick Start
When you turn on a new Macintosh computer for the first time, you hear music play as
Setup Assistant starts up. If you wait a moment, you hear a spoken invitation to learn
how to use VoiceOver to set up your computer. If you are new to VoiceOver, follow the
prompts to start the VoiceOver Quick Start. You will learn how to navigate with
VoiceOver and interact with buttons and controls.
VoiceOver Help
Your computer comes with a built-in help system for Mac OS X and all its applications.
You can access these in the Help menu in the menu bar. VoiceOver Help contains pages
to help you with specific tasks, complete lists of all the keyboard commands for
VoiceOver, and an orientation to VoiceOver. When you open VoiceOver Help, you can
look for pages by typing keywords or phrases in the text field or by looking in the
index of help topics.
You can open a complete list of all the VoiceOver commands from the VoiceOver Utility
Help menu.
VoiceOver Menu
The VoiceOver menu contains all the VoiceOver commands you can apply to the item
in the VoiceOver cursor. It acts as a quick reference guide as you work. When you use
the VoiceOver command Control-Option-F7, the VoiceOver menu appears in the middle
of the screen for sighted users. Non-sighted users can use VoiceOver navigation to read
the menu and make selections.
Mac OS X Keyboard Shortcuts
You can find lists of keyboard shortcuts for Mac OS X and most applications in the
built-in help system. Search for “shortcuts” or “keyboard shortcuts” or check the index if
there is one. You can change or create keyboard shortcuts in the Keyboard & Mouse
preference pane of System Preferences.Chapter 1 Introduction 9
Resources on the Internet
The Apple website has several sections devoted to VoiceOver and accessibility. You can
find additional learning materials and support information at these addresses:
 www.apple.com/accessibility
 www.apple.com/accessibility/voiceover
 www.apple.com/support/tiger/voiceover
 www.apple.com/education/accessibility/technology/voiceover.html
In addition, you can find discussion groups on Apple’s website and other websites to
help you connect with other VoiceOver users.
Teaching and Learning Tools
If you are teaching or collaborating with a VoiceOver user, you can turn on a caption
panel that displays the text that VoiceOver is speaking. For more information about the
caption panel and how to customize it, see “Setting Visual Options” on page 55.
Darkening the Screen
If you are a sighted user, you can use the screen curtain to simulate a non-sighted user’s
experience. The screen curtain turns off all the visuals of the display, leaving a blank
screen. This is a great way to learn how to use VoiceOver.
To turn the screen curtain on and off:
m Press Control-Option-Shift-F11.
VoiceOver Quick Start Application
The VoiceOver Quick Start is available as a separate application that you can use any
time. Although it was designed to help users learn the basic commands necessary to
set up a computer using VoiceOver, the VoiceOver Quick Start can also be used as a
basic teaching tool. You can download the VoiceOver Quick Start from this Apple
accessibility website: www.apple.com/accessibility/voiceover.
VoiceOver Keyboard Commands Diagrams
You can download and print keyboard diagrams that show the VoiceOver commands
assigned to keys on a standard Apple English language keyboard. These diagrams are
intended for use by sighted users who want a more visual way to learn the VoiceOver
commands. You can download these diagrams from this Apple accessibility website:
www.apple.com/accessibility/voiceover.10 Chapter 1 Introduction
About VoiceOver Accessibility
VoiceOver is a new technology in Mac OS X version 10.4 Tiger. You can use VoiceOver
with TextEdit, Mail, and Safari to do word processing, send and receive email, and
browse websites on the Internet. You can also use VoiceOver with some other
applications. As developers begin to support the underlying accessibility frameworks
provided in Mac OS X, more applications will become accessible with VoiceOver.
Contact the manufacturers of your favorite applications to inquire about the
accessibility of their products.
Visit the Apple website to learn about new developments and resources, and check the
Internet for discussion groups and user groups.2
11
2 Introduction to Mac OS X
This chapter introduces you to basic information about
Mac OS X.
When you understand how your computer is organized and how to use the Finder and
application windows, learning to use VoiceOver is much easier. In Chapter 5, “Using
VoiceOver With Mac OS X,” you will learn how to use VoiceOver with Mac OS X to
complete everyday tasks on your computer.
You can find much more information about Mac OS X in Mac Help on your computer
and on the Apple website.
The Desktop
The desktop is the working area of your computer that contains folders, files, and other
items. When you connect to a server or connect an external hard disk or an iPod, an
icon that represents it appears on the desktop. When you insert a CD or DVD into your
computer’s optical drive, it also appears on the desktop.
You can store files and folders directly on your desktop for quick access.12 Chapter 2 Introduction to Mac OS X
The Finder
The Finder keeps track of files and folders and manages the desktop. When you open a
folder or other item on the desktop, a new Finder window like the one shown below
automatically opens.
Finder windows have a toolbar at the top and two sections below the toolbar called
the sidebar and the view browser. Three colored buttons above the toolbar are used to
close the window, send the window to the Dock, or change the window to its previous
size. See “Accessing Finder Window Buttons” on page 40 to learn the standard
Mac OS X keyboard shortcuts or menu commands to use these buttons.
Toolbar Buttons
You use the buttons in the toolbar to navigate, change the view, find items, and
perform some actions.
 Use the Back and Forward buttons on the left side of the toolbar to move back and
forth between locations on your computer, just as you would in a web browser.
 Use the three view buttons to choose the way you want to view the contents of your
hard disk and folders. You can choose icon, list, or column view.
 Use the Action pop-up menu to choose commands you can perform for the item
selected. For example, in the Finder window, some choices in the Action menu are
New Folder, Get Info, or Open. In other applications, you see different choices in the
Action menu.
 Use the search text field to type a word or phrase to locate an item. You can use the
buttons below the search text field to focus the search to a particular location. You
can choose Servers, Computer, Home, the current folder, or another location you
specify.
Sidebar and View Browser
Below the toolbar, the Finder window is split into two sections. The left side is called
the sidebar. At the top of the sidebar are icons that represent your hard disk, hard disk
partitions if you have them, any mounted servers or volumes, and the network. Chapter 2 Introduction to Mac OS X 13
Below a separator are icons that represent often used folders on your hard disk.
Mac OS X has folders already set up for you to store your music, pictures, movies, and
documents. In the sidebar, you also see folders for the desktop contents, your home
folder, and applications.
When a folder is selected in the sidebar, its contents are displayed on the right side of
the Finder window in the view browser. Finder windows can display items in the view
browser in icon, list, or column view.
The Dock
The Dock is a customizable list of items that provides quick access to applications and
documents you use often. It appears as a row or column of icons on the screen. You
can position the Dock along the bottom, left, or right edge of the screen.
When an application is open, its icon appears temporarily in the Dock. When you
minimize a window, it disappears from the desktop and appears as an icon on the right
side of the Dock.
Each item in the Dock has a contextual menu that gives you quick access to commands
for that item. The contextual menu also contains the commands “Remove from Dock”
for icons that have been placed there permanently, and “Keep in Dock” for applications
that are open but whose icons are only there temporarily.
The Menu Bar
Mac OS X has a menu bar permanently located at the top of the screen. The menu bar
contains a collection of menus for the application that is currently active. When you
switch applications, the menus in the menu bar change to reflect the active
application. Most applications include File, Edit, Format, Window, and Help menus.
The Apple menu, located at the far left of the menu bar, is the same in every
application. It contains system commands and preferences.
The right side of the menu bar contains status menus. Status menus display information
and provide shortcuts to system and application settings that you may frequently
change. Common status menus include the volume slider, clock, and battery level
indicator. You can show or hide individual status menus in System Preferences and
other applications.
At the far right side of the menu bar is the Spotlight menu. You can use Spotlight, the
advanced search technology built in to Mac OS X, to search your entire system for
information contained in files, emails, contacts, images, calendars, and applications. For
more information about Spotlight, see “Spotlight” on page 15.14 Chapter 2 Introduction to Mac OS X
Files and Folders
Most of the information in your computer is stored in files. Files include documents,
images, applications, and so on. Folders are simply a collection of files. Each file or
folder is represented by an icon with its name below or to the right of the icon. You can
select the text in the file’s name to change it, and you can copy, move, and delete files
on your computer.
Your computer comes with some folders already set up, but you can create and delete
your own folders to organize your information. Most folders and files you create are
stored in a home folder with your user account name. If you have multiple user
accounts on your computer, each user account has its own home folder.
You click once on a file or folder icon to select it and twice to open it. Clicking twice
quickly is called a “double-click.” If you double-click an application icon, you start the
application and a window for the application opens. If you double-click a file created
by an application, you automatically open the application (if it wasn’t open already)
and open the file. For example, if you double-click a TextEdit file on the desktop,
TextEdit starts up and its icon appears in the Dock. At the same time, the document
opens on the desktop.
If you can’t use a mouse to select and click, you can use VoiceOver commands instead.
System Preferences
System Preferences is a Mac OS X utility that you use to customize your computer and
choose essential settings such as your network configuration and Internet access.
System Preferences is located in the Apple menu and has an icon in the Dock.
You can find settings to improve accessibility in these preferences:
 Displays preferences
 Keyboard & Mouse preferences
 Speech preferences
 Universal Access preferences
The easiest way to learn about the many options in System Preferences is to explore
the different preference panes. Some preferences have multiple panes you access by
clicking the tab buttons. Network preferences even has an Assistant button to help you
troubleshoot connection problems.Chapter 2 Introduction to Mac OS X 15
Spotlight
Spotlight is extraordinarily useful for VoiceOver users. In many cases, it may be easier to
use than the Finder for opening files, folders, and applications. When you type text in
the Spotlight search text field, search results appear immediately in a menu below the
search text field.
The more complete the word or phrase, the more refined your list of results will be.
Search results are grouped by category, such as Applications, System Preferences,
Documents, and Folders. You click an item in the list to open it.
If you don’t find the item you want, you can search again or click Show All at the top of
the results list. Clicking Show All displays a more complete list of results in a new
window called the Spotlight window.
Spotlight search results include all the metadata inside files, including the kind of
content, the author, edit history, format, size, and many more details. Depending on the
search word you type, you may find thousands of results. Spotlight narrows its results
to show you the best matches, but you can also browse the entire list if you want.
You can use Spotlight to find just about anything, anywhere, on your computer with
lightning speed. You don’t have to remember folder hierarchies or carefully store
project files in meaningful folders.
You can find more information about Spotlight in Mac Help on your computer or on
the Apple website at www.apple.com/macosx. See “Using Spotlight” on page 44 for
information about using Spotlight with VoiceOver.3
16
3 Keyboard Basics
This chapter provides basic information about using
VoiceOver with the Apple keyboard. You use your keyboard
to control VoiceOver, so you need to be very familiar with
your keyboard before you can use VoiceOver effectively.
If you are new to the Mac or have trouble using a keyboard, you’ll find important
information in this chapter. If you use a portable computer, make sure you review the
section in this chapter about function keys.
Important Keys to Know
You should be very familiar with the location of all the keys on your keyboard before
you begin using VoiceOver. In addition to the letters and punctuation characters, you
should know the location of these keys:
 Control
 Option
 Command
 Return
 Escape
 Home
 End
 Page Up
 Page Down
 Up, Down, Right, and Left arrows
 Function keys (F1 through F11)Chapter 3 Keyboard Basics 17
If you’re not familiar with the layout of keys on your keyboard, you can use the
keyboard practice built in to VoiceOver to help you learn the name and location of the
keys. In the keyboard practice, you press keys to hear their names.
Using keyboard practice:
1 Press Command-F5 to turn on VoiceOver.
The Command keys are located directly to the left and right of the Space bar. You can
press either one.
The F5 key is in the top row of keys, sixth from the left.
2 Press Control-Option-K to begin keyboard practice
The Control and Option keys are the first two keys on the left of the bottom row. On a
portable keyboard, the Fn key comes first, then Control and Option.
3 Press keys to hear their names. Press the Shift key to hear the shifted characters on
punctuation keys.
4 Press the Escape key to end keyboard practice
The Escape key is on the top-left corner of the keyboard.
While you’re using keyboard practice, you can’t use your computer or keyboard for any
other tasks. You must press the Escape key to return your keyboard to its regular use.
About Function Keys
In VoiceOver, you use the function keys at the top of the keyboard to perform many
important actions. The function keys are labeled F1–F12 on some keyboards, and some
keyboards have function keys up to F16.
You also use the function keys to perform actions and commands in many other
software applications. To use a function key or other VoiceOver command keys for
another software application when VoiceOver is on, press Control-Option-Tab and then
press the function key. This command lets VoiceOver know that the next key
combination is for another application.
e s c F 1 F 2 F 3 F 4 F 5 F 6 F 7 F 8 F 9 F 1 0 F 1 1 F 1 2 F 1 318 Chapter 3 Keyboard Basics
Using Function Keys on Portable Computers
On a portable computer, many of the function keys are programmed to perform
hardware-related functions such as adjusting brightness and volume. When you want
to perform an alternate action for the key, you press the Fn key and the function key
together. For example, in VoiceOver you press the following key combination to open
VoiceOver Utility:
Control-Option-F8
If you use a portable computer, you must press the function key with the command
Fn-Control-Option-F8
If you use VoiceOver all the time or very frequently, you can change the default
behavior of the function keys so that they perform software actions. Then the portable
keyboard behaves like a standard keyboard, and you press the Fn key only to change
the volume or change any of the other hardware settings.
To change the default behavior of the function keys:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Keyboard & Mouse button.
3 Click the Keyboard tab.
4 Select the checkbox labeled “Use the F1-F12 keys to control software features.”
When this checkbox is selected, you press the Fn key when you want to use the
hardware function of the key, such as adjusting volume. When you use the keys for
VoiceOver commands, you don’t need to press the Fn key with the VoiceOver
commands that use function keys.
Using Home, End, Page Up, and Page Down on Portable Computers
A standard keyboard has dedicated keys for Home, End, Page Up, and Page Down.
These are important VoiceOver navigation keys. On a portable computer, you use the
arrow keys with the Fn key for these functions.
Keyboard Accessibility
If you are able to use a keyboard but find it difficult, some other features included in
Mac OS X may help you use your keyboard more effectively with VoiceOver.
Sticky Keys
The Sticky Keys feature treats a series of modifier key presses as a single key
combination. For example, you can press Control, and then Option, and your keyboard
interprets that combination as Control-Option held down together.Chapter 3 Keyboard Basics 19
To turn on Sticky Keys:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Universal Access button.
3 Click the Keyboard tab.
4 Select the On radio button for Sticky Keys.
When you turn on Sticky Keys, you can also set options to hear a sound when a
modifier key you press is accepted, and display an icon of the symbol for the modifier
keys you pressed. Checkboxes for these options are below the Sticky Keys On and Off
radio buttons.
Slow Keys
With the Slow Keys feature you can control the amount of time between when a key is
pressed and when it is accepted by the keyboard. If you frequently press keys
accidentally, you may want a longer delay.
To turn on Slow Keys:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Universal Access button.
3 Click the Keyboard tab.
4 Select the On radio button for Slow Keys.
5 Move the Acceptance Delay slider to the left for a longer delay and to the right for a
shorter delay.
You can also hear audible feedback when you press keys. You hear one sound when a
key is pressed and a different sound when the key is accepted. This is a very good way
to monitor what’s happening if you can’t see the screen. Select the checkbox labeled
“Use click key sounds” under the Slow Keys On and Off buttons to turn this on.
Key Repeat Rate
If you find that keys register more than once when you press them, you can adjust the
key repeat rate. The key repeat rate and key repeat delay let you control how fast keys
repeat and adjust how much time the keyboard will wait before it begins to repeat a
key press. If you have trouble releasing keys fast enough, you can set the delay very
long or turn off the repeat.
To adjust the key repeat rate:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Keyboard & Mouse button.20 Chapter 3 Keyboard Basics
3 Click the Keyboard tab.
4 Move the Key Repeat Rate slider to the left if you want repeated keys to repeat slowly
(if you tend to make mistakes when pressing keys, moving this slider to a slow setting
will help minimize the number of repeated keystrokes). Move the slider to the right if
you want the keys to repeat at a faster pace.
5 Move the Delay Until Repeat slider to the left to cause a longer delay between when
you hold down the key and when the key begins to repeat.
You can move the Delay Until Repeat slider all the way to the left to turn off key
repeating completely.
Keyboard Settings in VoiceOver Utility
You use the VoiceOver Utility application to customize VoiceOver settings. The
Verbosity pane of VoiceOver Utility shown below includes some settings to help you
use your keyboard.
Typing Echo
As you type, VoiceOver can speak what you typed. If you are not a confident typist, or if
you just want to hear confirmation, you may want to use the typing echo. VoiceOver is
set to echo each character as you type it. You can change the setting in the “While
typing speak” pop-up menu to one of these:
 None: VoiceOver doesn’t speak what you type.
 Every Character: VoiceOver speaks each character as you type it. This is the default
setting for VoiceOver.
 Every Word: VoiceOver speaks the word you type as soon as you press the Space bar,
a punctuation key, or the Return key. This tells VoiceOver that the word is complete.Chapter 3 Keyboard Basics 21
Key Press Notification
The “Announce when a modifier key is pressed” checkbox sets VoiceOver to say the
name of the modifier key when you press it. VoiceOver speaks these keys:
 Shift
 Control
 Option
 Command
 Fn
Turning on this option may help you become accustomed to the location of modifier
keys on your keyboard, and it may help prevent you from making mistakes.
Caps Lock Key Notification
If the Caps Lock key is pressed, you’ll be unable to use many VoiceOver commands.
Select the “Announce when the caps lock key is pressed” checkbox to hear VoiceOver
announce when this key is pressed.
To open VoiceOver Utility when VoiceOver is turned off:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Universal Access button.
3 Click the Seeing tab.
4 Click the Open VoiceOver Utility button.
When VoiceOver is turned on, you can open VoiceOver Utility with the VoiceOver
command Control-Option-F8. You will find more information about other VoiceOver
Utility settings in later chapters.4
22
4 VoiceOver Basics
This chapter provides basic information about using
VoiceOver to navigate your computer, click buttons, make
selections in menus, and perform other basic tasks.
After reading this chapter, you will have enough information to begin using VoiceOver.
You will have practiced moving the VoiceOver cursor, interacting with scroll bars, and
navigating menus.
Following Instructions
When you use VoiceOver, you use the keyboard to activate controls. For example, when
you read “click,” use the VoiceOver command Control-Option-Space bar instead of the
mouse.
Menu commands are written using the greater than or right angle bracket symbol to
show a sequence of menu commands. For example:
Choose Finder > Services > Summarize.
In this example, Finder is the name of a menu in the menu bar. Services is a submenu in
the Finder menu, and Summarize is a command in the Services submenu. VoiceOver
speaks the sequence as “Choose Finder greater than Services greater than Summarize.”
Turning On VoiceOver
You can turn VoiceOver on and off at any time; you don’t have to restart your computer
or log in again. This makes it easier for users with different needs to share the same
computer.
You can turn on VoiceOver in System Preferences, and also with a quick VoiceOver
command.Chapter 4 VoiceOver Basics 23
To turn on VoiceOver in System Preferences:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Universal Access button.
3 Click the Seeing tab.
4 Select the On radio button for VoiceOver.
To turn VoiceOver on or off quickly:
m Press Command-F5. If you are using a portable computer, press Fn-Command-F5.
If VoiceOver is on, Command-F5 turns it off. If VoiceOver is off, the command turns it
on. The change takes effect immediately and remains in effect even after you log out of
your user account or restart your computer.
Using VoiceOver in the Login Window
If your computer requires you to log in and you want to use VoiceOver to navigate and
read the contents of the Mac OS X login window, you must first set a preference in
Accounts preferences.
To turn on VoiceOver for the login window:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Accounts button.
3 Click the Login Options button below the accounts list.
If the Login Options button is dimmed, click the lock icon at the bottom of the
Accounts window and type an administrator’s name and password to unlock the
window.
4 Select the checkbox labeled “Use VoiceOver at login window.”
Pausing VoiceOver Speech
When you’re using VoiceOver, you may want to silence the speech when you don’t
want to hear something. Just press and release the Control key to stop VoiceOver from
speaking. If VoiceOver is reading text and you don’t use any other commands after you
press the Control key, you can press and release Control again to hear VoiceOver
resume speaking where it left off.
Controlling VoiceOver
To control VoiceOver, you press and hold the Control and Option keys while you press
other keys to get information and perform actions.24 Chapter 4 VoiceOver Basics
When VoiceOver is on, a box is drawn around an object on the screen to show where
VoiceOver is focused. This box is called the VoiceOver cursor. The visual representation of
the VoiceOver cursor helps sighted users track VoiceOver’s location. Objects in the
VoiceOver cursor can be buttons and other controls, text, images, files, documents, and
anything else that is displayed on your computer screen.
To move the VoiceOver cursor, you hold down the Control and Option keys as you
press the arrow keys. This moves the VoiceOver cursor vertically or horizontally. In
general, you should navigate windows horizontally, using the Left and Right arrow
keys. The VoiceOver cursor moves from left to right, wrapping to the next row as it
moves forward or back.
Use the Up and Down arrow keys to navigate vertically in lists and tables, or in
windows where you are familiar with the layout. The VoiceOver cursor moves up and
down, wrapping to the next column as it moves up or down.
For convenience, you can lock the Control and Option keys so that you don’t have to
press them while you are controlling VoiceOver. Locking the Control and Option keys is
useful if you are doing a lot of navigation and exploration with VoiceOver. It reduces
the number of keys you need to press to accomplish these goals. With Control and
Option locked, all you need to press are the remaining keys for the command, usually
one or two others.
To lock or unlock the Control and Option keys:
m Press Control-Option-semicolon (;).
You can practice navigating with the VoiceOver cursor using the exercises at the end of
this chapter.
Reading Window Contents
When you open a new window, the VoiceOver cursor goes to the first item in the
upper-left corner of the window and stops there. As you navigate the window, you
hear descriptions of the items in the VoiceOver cursor. If the VoiceOver cursor reaches
text, it reads the text that’s visible on the screen.
A good way to get a sense of how a window is laid out or to find out what information
the window contains is to have VoiceOver read all the contents of the window.
To read the window contents:
m Press Control-Option-Shift-W.Chapter 4 VoiceOver Basics 25
When you use the Control-Option-Shift-W command to read the contents of the
window, VoiceOver reads only what’s visible. If there are more contents than can fit in
the window, scroll bars appear at the bottom or right side of the window so that you
can scroll to the rest of the content. For example, a large document may have many
pages, but only part of one page is visible on the screen. You use scroll bars to make
more of the document visible so that you can read it.
You can use other VoiceOver commands to read all the contents of scroll areas and
other content areas without having to scroll. The next section describes these
techniques.
Reading Text
Reading the contents of a window is very useful, but sometimes it isn’t enough. You’ll
need to be able to read individual words, sentences, and characters as well. You can use
the following VoiceOver commands for more control when you read text:
 Control-Option-C to read the last character in the VoiceOver cursor.
 Control-Option-W to read the last word in the VoiceOver cursor.
 Control-Option-S to read the sentence where the VoiceOver cursor is located.
 Control-Option-L to read the line where the VoiceOver cursor is located.
 Control-Option-P to read the paragraph where the VoiceOver cursor is located.
In addition, you can hear words or characters spelled phonetically to help you figure
out something that is difficult to hear. To do this, you use the same commands for
reading by character or reading by word, but you press the commands two or three
times to hear progressively more detail.
For example, if you hear the word “tab” but aren’t sure you heard it right, you can press
Control-Option-W to hear the word spoken. Press Control-Option-W again to hear the
word spelled. If you’re still not sure what was read, press Control-Option-W a third time
to hear each letter’s phonetic name (“tango alpha bravo”).
Changing Rate, Pitch, and Volume Temporarily
While you’re working, you may want to change the rate, pitch, or volume temporarily
without changing your permanent settings. You can use a VoiceOver command to do
this quickly.
To change settings temporarily:
1 Press Control-Option-Command-Right Arrow. Each time you press this command, you
hear VoiceOver cycle through rate, pitch, and volume. If you stopped at “rate” the last
time you used the command, the next time you press the command you hear “pitch.”26 Chapter 4 VoiceOver Basics
2 After you hear the setting you want to change, press Control-Option-Command-Up
Arrow or Down Arrow. The Up Arrow increases the setting and the Down Arrow
decreases the setting.
3 Release the keys to return to navigation.
These settings remain in effect until you change them, log out of your user account,
turn off your computer, or turn off VoiceOver. To set your preferences for these, see
“Customizing Voices” on page 54.
Interacting With Content Areas
To be successful using VoiceOver, you must understand the VoiceOver concept of
interaction. When navigating the contents of windows, menus, and the desktop,
VoiceOver groups related items in order to present a cleaner overall picture of the
contents of the screen. So for example, moving once to the right will move the
VoiceOver cursor from one button to another, not just from one word or character to
the next. This allows you to quickly survey all that is available to you by navigating
through the major elements of a window or application. When you find an item of
interest, you then interact with it to read, add, control, or modify its contents.
Windows, documents, and webpages often have areas that contain text, files, or other
content. When the VoiceOver cursor reaches one of these areas, it identifies the content
area. Depending on the application or window, VoiceOver may identify these areas as:
 A scroll area
 HTML content
 A list
 A text area
 An outline
 A group
 A table
When you reach a content area, you can navigate past it to something else, or you can
interact with the content area to investigate, read, or modify something it contains. For
example, a Finder window has a sidebar that contains folders. You can skip over the
sidebar to the view browser, or interact with the sidebar to select one of its folders.Chapter 4 VoiceOver Basics 27
First you use a command to let VoiceOver know that you want to interact with the
items it contains. Then you use the VoiceOver navigation commands to navigate within
the content area. The VoiceOver cursor stays within the boundaries of the object you're
interacting with, so when you navigate left, right, up, and down, you'll navigate only to
the objects within that area. If you find another object of interest, and it contains
objects, you can interact with it as well. Interaction allows you to navigate the larger
elements of an application quickly to locate what interests you, and also provides the
control you need to investigate the smallest details.
When you’re done, a VoiceOver command stops the interaction, returning the
VoiceOver cursor to the previous object or area. You can repeat the VoiceOver
command to interact or stop interacting as many times as necessary. When there's
nothing more to interact with, or stop interacting with, you'll hear a “beep” sound.
To interact with a content area:
 Press Control-Option-Shift-Down Arrow to begin interacting.
 Press Control-Option-Shift-Up Arrow to stop interacting with the content area.
To practice interacting with content areas, see the exercises at the end of this chapter.
You can use a VoiceOver command to read everything in the VoiceOver cursor,
including content not visible on the screen. This is a quick way to find out what’s in a
content area. When you use this command on an area that has scroll bars, the contents
become visible as VoiceOver reads them.
To read everything in the VoiceOver cursor:
m Press Control-Option-A when the VoiceOver cursor is on a content area.
If you want to navigate or interact with the items in a content area, you have to first let
VoiceOver know that you want to interact with the items it contains. Then you can use
all the regular VoiceOver commands inside the content area.
Using Buttons and Controls
You can use VoiceOver commands to press a button, select checkboxes, choose an item
in a list or menu, and move sliders.
For example, when instructions ask you to “click Save” or “click Cancel,” move the
VoiceOver cursor to the button and use a VoiceOver command to perform the button’s
action. You can use the same VoiceOver command to select a checkbox or radio
button.
To click a button or select a checkbox or radio button:
m Press Control-Option-Space bar.
You use this same powerful command to select just about anything on the screen,
from items in menus and lists to folders and files that you want to move or copy.28 Chapter 4 VoiceOver Basics
A slider control, such as the control for your computer’s volume, is usually identified as
an incrementor or simply a slider. To move it, you have to first let VoiceOver know that
you want to interact with the slider, just as you do for content areas. Then you use the
arrow keys to change the value.
To interact with a slider or incrementor:
1 Press Control-Option-Shift-Down Arrow to start interacting.
2 Press Control and Option with an appropriate arrow key (Up, Down, Left, or Right,
depending on whether the control is horizontal or vertical).
3 When you reach the value you want, press Control-Option-Shift-Up Arrow to stop
interacting with the control.
Learning More About an Item
VoiceOver provides several ways to find out about an item that is in the VoiceOver
cursor. If you aren’t sure what it is or how to use it, try any of the following discovery
techniques:
 To hear a description of the item, press Control-Option-F3.
 To hear how to use the item, press Control-Option-H to hear the help tag. Help tags
are often provided for controls so that you know what the control is used for.
 To hear a list of VoiceOver commands that can be used for the item, press ControlOption-H a second time to open the Commands menu. The Commands menu gives
you every command you can use for the item.
Navigating Menus
Menus are vertical lists of commands and options that perform actions when you
choose them. Some menu items have submenus that contain additional choices. You
can think of menus and submenus as a hierarchical outline.
The menu bar at the top of the screen is separated into three main areas: the Apple
and application menus, status menus, and the Spotlight menu. You can use the same
VoiceOver command to access each of these areas.
To navigate the menu bar:
1 Press Control-Option-M to go to the first menu in the menu bar.
2 Press Control-Option-Right Arrow to move along the menu bar. You hear a “bonk”
sound when you reach the last menu.
3 Press Control-Option-M again to move to the first status menu in the menu bar and
Control-Option-Right Arrow to move to the last status menu.
4 Press Control-Option-M again to go to the Spotlight menu.Chapter 4 VoiceOver Basics 29
The Control-Option-M command cycles through the three areas. If you leave the menu
bar, the next time you press the command, you start at the Apple menu.
Whether you’re in a Finder menu, application menu, pop-up menu, or VoiceOver menu,
you use the same navigation techniques.
To navigate in a menu:
 Press Control-Option-Down Arrow to move down a menu.
 Press Control-Option-Up Arrow to move up a menu.
 Press Control-Option-Space bar to choose a menu item.
 Press Escape to leave a menu without making a selection.
 Press Control-Option-Right Arrow to move to the submenu and Control-Option-Left
Arrow to move out of the submenu and back to the main menu.
You can use the exercises at the end of this chapter to practice navigating the menu
bar and menus.
Navigating Quickly in a Menu
In Mac OS X, you can type the first letters of a word or phrase to move quickly to the
item in the menu that most closely resembles what you typed. For example, if you
know the menu contains a submenu for font selection, type “f” or “fo” to go to the first
item in the menu that starts with these letters. The more letters you type, the greater
the chance that the item you want will be found first.
In VoiceOver menus, the menu contracts to show only the items that contain the word,
letters, or phrase you typed. If more than one item contains the letters you typed, you
can use the arrow keys to locate the one you want. You can try this out in the Item
Chooser menu exercise later in this chapter.
Using Pop-up Menus
Many windows and webpages use pop-up menus, described by VoiceOver as pop-up
menu buttons, to present options and choices. Press Control-Option-Space bar to show
the menu, then navigate the menu the same way you would any other menu.
Using Contextual Menus
Contextual menus give you quick access to often-used commands for the selected
item. Contextual menus are convenient because you don’t have to navigate to the
menu bar to perform an action. In Mac OS X, you press the Control key while you click
the item with your mouse to see a contextual menu. You can perform the same action
with a VoiceOver command.
To open a contextual menu for an item:
m Press Control-Option-Shift-M.
Contextual menus are also available for items in the Dock.30 Chapter 4 VoiceOver Basics
Understanding Duplicate Menu Items
Some menu items have an ellipsis (three dots) after the name. An ellipsis after an item
in a menu lets you know that a dialog will appear when you choose that menu item.
You’ll need to take some type of action to dismiss the dialog and continue, such as
typing a password or making a choice.
When VoiceOver is turned on, you will see or hear menu items that appear to be
duplicates. The first menu item includes an ellipsis in the name and the second one
doesn’t. When VoiceOver is off, only the menu item with the ellipsis appears in the
menu, and you would have to press Control when you choose the menu item to
bypass the dialog and take action directly. When VoiceOver is on, you can choose either
menu item.
For example, when VoiceOver is off, “Restart...” appears in the Apple menu, indicating
that a dialog will appear when you choose this command. You can hold down the
Option key when you choose this command and your computer restarts without
displaying a dialog. When VoiceOver is on, you hear both “restart ellipsis” and “restart”
in the menu.
Working With the VoiceOver Menu
The VoiceOver menu, shown below, appears as a shaded rectangle on the screen for
sighted users.
The VoiceOver menu contains all the VoiceOver commands you can use for the item in
the VoiceOver cursor followed by their command key equivalent. VoiceOver menus do
not show the Control and Option keys for the commands, but you still must press
Control and Option with the keys shown.
Sometimes VoiceOver commands require multiple key presses. For example, in the
VoiceOver menu shown above, you press Control-Option-H two times to go directly to
the Commands menu. In the VoiceOver menu, this is indicated by “H H.”Chapter 4 VoiceOver Basics 31
To open the VoiceOver menu:
m Press Control-Option-F7.
Sighted users can change the size of the font in the VoiceOver menu to make it easier
to read. The font will stay the same size until you log out or restart your computer.
To change the size of the font:
m Press Control-Option-Right brace ( } ) to increase the font size and Control-Option-Left
brace ( { ) to decrease it.
Note: The right and left brace keys are the shifted keys to the right of the P on your
keyboard.
You can use the exercises at the end of this chapter to practice using the VoiceOver
menu.
Using the Commands Menu
The Commands menu, shown below, is invaluable when you are learning VoiceOver.
The Commands menu shows a list of all the VoiceOver commands you can use for the
item in the VoiceOver cursor.
To open the Commands menu:
m Press Control-Option-H twice.
The first time you press the command, you hear the contents of the item’s help tag, if
there is one. The second time, the Commands menu opens.32 Chapter 4 VoiceOver Basics
Chapter 4 Exercises
The exercises that follow will help you practice moving the VoiceOver cursor,
interacting with scroll areas, and navigating menus.
Exercise 4.1: Moving the VoiceOver Cursor
In this exercise, you will practice moving the VoiceOver cursor and listening to the
audible cues and descriptions.
1 Press Command-F5 to turn on VoiceOver.
2 Press and hold the Control and Option keys while you press the Up, Down, Left, and
Right arrow keys.
3 Listen to the descriptions of items and practice moving around the screen.
4 Listen to the sound effects that indicate wrapping to the next or previous line or
column.
Exercise 4.2: Interacting With a Content Area
In this exercise, you’ll move the VoiceOver cursor to a content area and interact with it.
1 Press Command-F5 to turn on VoiceOver.
2 Press Command-N to open a new Finder window. (Make sure the Finder is the active
application.)
3 Press and hold the Control and Option keys while you press the Right Arrow keys.
Listen to the descriptions of items and stop when you hear “sidebar list.”
4 Press Control-Option-Shift-Down Arrow and listen to VoiceOver say “Interact with
sidebar list Network folder.” If you have something other than a Network folder at the
top of the list, or if an item is selected, you’ll hear that instead.
5 Press Control-Option-Down Arrow to move down the list. Notice the tone that indicates
you’ve reached the end of the list.
6 Press Control-Option-Shift-Up Arrow to stop interacting with the list. Listen to
VoiceOver say “Stop interacting with sidebar list.”
Exercise 4.3: Navigating the Menu Bar
In this exercise, you will use VoiceOver commands to access the different parts of the
menu bar. The VoiceOver command Control-Option-M moves the VoiceOver cursor to
the next section of the menu bar each time you press it.
1 Make sure the Finder is the active application by either clicking the desktop or pressing
Control-Option-Shift-D to move the VoiceOver cursor to the desktop.
2 Press Control-Option-M to go to the menu bar, then press Control-Option-Right Arrow
to move along the menu bar. Listen to the names of the different menus. When you get
to the last menu, you hear a sound effect.
3 Press Control-Option-M again. You hear the first status menu, which may be “volume” if
you haven’t turned on any applications that have status menus.Chapter 4 VoiceOver Basics 33
4 Press Control-Option-Right Arrow to move to all the status menus. You hear a sound to
indicate the end of the status menus.
5 Press Control-Option-M again to access the Spotlight menu. You can type a search
word or term here to find items on your computer.
6 Press Escape to close the menu without making a selection.
Exercise 4.4: Navigating in a Menu and Submenu
In this exercise, you will go to the menu bar and use a submenu to find any
applications, documents, and servers you used recently.
1 Press Control-Option-M to go to the Apple menu, which is the first menu in the menu
bar.
2 Press Control-Option-Down Arrow to open the Apple menu.
3 Press Control-Option-Down Arrow until you hear “Recent Items submenu.”
4 Press Control-Option-Right Arrow to go to the submenu.
5 Press Control-Option-Down Arrow and Control-Option-Up Arrow to move up and down
the menu to hear the applications, documents, and servers you used recently.
6 Press Control-Option-Left Arrow to return to Recent Items in the Apple menu.
7 Press Escape to leave the menu without making a selection.
Exercise 4.5: Using the VoiceOver Menu
In this exercise, you will open the VoiceOver menu and use VoiceOver commands to
increase the font size, navigate the menu, and select an item in the menu.
1 Press Control-Option-F7.
2 Press Control-Option-right brace ( } ) several times to make the font bigger.
3 Press Control-Option-left brace ( { ) until the font size is back to its original size or any
size you wish.
4 Press Control-Option-Down Arrow until you hear “Commands menu H H,” then press
Control-Option-Right Arrow.
5 Press Control-Option-Right Arrow to enter the Commands menu, then use the Up and
Down arrow keys to read the items in the menu.
6 Press Control-Option-Left Arrow to return to the VoiceOver menu.
7 Press Control-Option-Up Arrow until you hear “Help question mark,” then press ControlOption-Space bar to select it.
The VoiceOver menu closes and the command you chose is performed. In this case, the
VoiceOver menu closes and VoiceOver Help opens.5
34
5 Using VoiceOver With Mac OS X
You can use VoiceOver to read text, navigate your computer,
and perform your daily tasks.
When you know the basics of Mac OS X and VoiceOver navigation (covered in earlier
chapters), you can begin to use VoiceOver to access files, read documents, and manage
your computer. This chapter teaches you how to apply what you know about VoiceOver
to these everyday tasks.
Using the Dock
As you learned in Chapter 2, “Introduction to Mac OS X,” the Dock contains icons for
applications and documents that you access frequently, or that you are currently
working with. When you hear the name of the application or document you want to
use, click it to open it on the desktop.
To open an item from the Dock:
1 Press Control-Option-D to move the VoiceOver cursor to the Dock.
2 Press Control-Option-Right Arrow to move across the Dock if it is on the bottom of the
screen and Control-Option-Down Arrow if it is located on one side.
3 Press Control-Option-Space bar to open an item in the Dock.
The Dock can be positioned on the bottom, left, or right side of the screen. You don’t
need to know where the Dock is located to navigate it. The Down and Right arrow keys
move toward the bottom or right of the Dock, and the Up and Left arrow keys move up
or to the left. The arrow keys work the same, regardless of the location of the Dock.
If it will help you to know the location of the Dock, you can find out by checking the
Dock menu.
To find out where the Dock is positioned on the screen:
1 Press Control-Option-M to go to the Apple menu.
2 Press Control-Option-Down Arrow to move down the menu until you hear “Dock
menu,” then press Control-Option-Right Arrow.Chapter 5 Using VoiceOver With Mac OS X 35
3 Press Control-Option-Down Arrow to move down the Dock menu until you hear the
location of the Dock. For example, “Position on bottom checked.”
Setting Dock Preferences
You can also use the Dock submenu to set some preferences for the Dock and quickly
access the Dock preferences pane of System Preferences.
When hiding is turned on in the Dock submenu, the Dock disappears from the desktop.
Dragging the mouse pointer to where the Dock appears when it’s visible causes it to
pop up and remain visible as you move the mouse along it. With VoiceOver, you just
have to press the VoiceOver command for the Dock to make the Dock visible.
Working With Contextual Menus for Dock Items
Every item in the Dock has a contextual menu. For example, you can remove an icon
from the Dock or permanently add one for an application whose icon would normally
appear in the Dock only when that application was open. The items in the contextual
menu vary, depending on the type of item.
To open a contextual menu for an item in the Dock:
m Press Control-Option-Shift-M when the VoiceOver cursor is on the item.
Use the standard menu navigation techniques to navigate and select items from a
contextual menu. If you want to close the menu without making a selection, press the
Escape key.
You can practice using the Dock in the exercise at the end of this chapter.
Switching Between Applications and Windows
Most people have more than one application open at a time and often one or more
windows open for each application. You can use a standard Mac OS X keyboard to
quickly switch between open applications.
To switch between open applications:
1 Press and hold down the Command and Tab keys.
2 Continue to hold down the Command key while you press and release the Tab key.
Each time you press the Tab key, you hear the next application.
3 When you hear the application you want to switch to, release both keys.
You can use the Application Chooser menu and the Window Chooser menu in
VoiceOver to switch quickly to the application and window you want to use.36 Chapter 5 Using VoiceOver With Mac OS X
The Application Chooser menu, shown below, lets you choose both an application and
an open window for the selected application.
To use the Application Chooser menu:
1 Press Control-Option-F1. You hear the name of the active application and the number
of open applications.
2 Press Control-Option-F1 a second time to open the Application Chooser menu.
3 Press Control-Option-Down Arrow to move down the list of open applications.
4 When you hear the application you want to switch to, press Control-Option-Right
Arrow to go to the submenu for that application.
5 Press Control-Option-Down Arrow until you reach the window you want. If any
applications have a dialog open, they also appear in the menu.
6 Press Control-Option-Space bar to move the VoiceOver cursor to the window or dialog
that you want. If you just want to switch to the application without going to a specific
window, choose the first item in the submenu. If no windows are open for the
application, this will be the only choice in the menu.
The Window Chooser menu, shown below, works the same way as the Application
Chooser menu. However, the Window Chooser menu identifies only the open windows
for the active application.Chapter 5 Using VoiceOver With Mac OS X 37
To use the Window Chooser menu:
1 Press Control-Option-F2. You hear the name of the window that is active.
2 Press Control-Option-F2 a second time to open the menu.
3 Press Control-Option-Down Arrow to move down the list of open windows for the
active application. If the application has a dialog open, it also appears in the menu.
4 When you hear the window or dialog you want, press Control-Option-Space bar to
move the VoiceOver cursor there.
Navigating Finder Windows
When you open a Finder window, the VoiceOver cursor is in the toolbar, focused on the
Back button. You can find a detailed description of the Finder window in “The Finder”
on page 12. When you use the Finder window to locate and open a file or folder, you
first find the top level folder in the sidebar. When a folder is selected in the sidebar, its
contents are displayed on the right side of the Finder window in the view browser.
Finder windows can display items in the view browser in icon, list, or column view.
Use the navigation method described here to navigate to the view browser. Then use
the method under the view descriptions to navigate a particular view.
To navigate the Finder window:
1 Press Control-Option-Right Arrow to move the VoiceOver cursor across the toolbar.
When you pass over the view buttons, listen to see which view button is selected. If
you know which view you want to use, press Control-Option-Space bar to select it.
2 Press Control-Option-Right Arrow until you hear “sidebar.”
3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar.
4 Press control-Option-Down Arrow to move down the list of items in the sidebar. When
you find the folder you want, press Control-Option-Shift-Up Arrow to stop interacting.
5 Press Control-Option-Right Arrow to move to the right column, the view browser.
When you reach the view browser, you use different techniques to navigate its
contents, depending on which view is being used. Below are the descriptions of each
view and the navigation techniques for each. You will quickly discover the ones that
work best for you.38 Chapter 5 Using VoiceOver With Mac OS X
Using Icon View
In icon view, shown below, each item in the view browser is represented by an icon.
Icons are usually organized alphabetically in rows.
You can use the arrow keys to navigate along the rows, or type the beginning letters of
a file to jump to an item quickly.
To open a file in icon view:
1 If the view browser is not in icon view, you can press the Finder keyboard shortcut
Command-1 to change it now.
2 Press Control-Option-Shift-Down Arrow to interact with the browser contents.
3 Type the first few letters of the name of the item you want to locate. The VoiceOver
cursor moves to the first file that starts with the letters you typed. You may have to use
the arrow keys to move from there to the exact file you want to open.
4 Press Command-O to open the file.
Using List View
In list view, shown below, items are listed alphabetically and information about each
item appears next to it on the same row.Chapter 5 Using VoiceOver With Mac OS X 39
A disclosure triangle appears to the left of folders. When you click a disclosure triangle,
you see the contents of the folder below it, indented as they would appear in an
outline.
To open a file in list view:
1 If the view browser is not in list view, you can press the Finder keyboard shortcut
Command-2 to change it.
2 Press Control-Option-Shift-Down Arrow to interact with the browser contents.
3 Press Control-Option-Down Arrow to move down the line of contents. You hear the
name of the item and all the information in the row.
4 Press Command-O to open the item selected.
Sorting Items in List View
Because list view is also a table, you can press Control-Option-Right Arrow or Left
Arrow to navigate to individual cells in the table. Then you can sort the information by
column. For example, you can arrange the items by the date they were modified.
To sort items by column in list view:
1 Move the VoiceOver cursor to the first row of information and press Control-OptionRight Arrow to move to the column you want to sort by.
2 Press Control-Option-Vertical line (|) to sort the column. The vertical line is the shifted
character on the right edge of the keyboard above the Return key.
3 To change the order of the sort, press Control-Option-Vertical line (|) again. For
example, you could sort the Date Modified column to show the most recent changes at
the top or at the bottom of the column.
Using Column View
In column view, shown below, items are shown in a series of columns like a horizontal
outline.40 Chapter 5 Using VoiceOver With Mac OS X
Column view is very useful for browsing nested folders. When you select a folder, its
contents are shown in the column on the right. You keep moving right until you reach
the file you want to open. Your browsing is confined to one window so that you can
easily retrace your path if you need to.
To open a file in column view:
1 If the view browser is not in column view, you can press the Finder keyboard shortcut
Command-3 to change it.
2 Press Control-Option-Shift-Down Arrow to interact with the browser contents.
3 Press Control-Option-Down Arrow to move to the item you want to open. If it’s a single
file, press Command-O to open it. If it’s a folder, continue with the next step.
4 Press Control-Option-Right Arrow to move to the contents of the next folder.
Accessing Finder Window Buttons
You use the three round buttons in the upper-left corner of a Finder window to close
the window, put the window in the Dock, or resize the window to its former size. You
can press these buttons with a mouse, or use these Finder shortcuts:
 Command-W to close the window
 Command-M to minimize the window, placing it in the Dock for convenient access
later
To resize the window, you can either press Control-Option-M to access the menu bar
and then choose Window > Zoom, or use the VoiceOver commands for window
resizing described in “Moving and Resizing Windows” on page 43.
Selecting Files and Folders
In the Finder and in other applications, you must first select a file or folder that you
want to use before you can open it or copy it. There are different ways to select files
and folders, depending on whether cursor tracking is turned on or off. Cursor tracking is
described in more detail in Chapter 9.
When cursor tracking is on, moving the VoiceOver cursor to a file or folder
automatically selects it. If you haven’t changed cursor tracking settings in VoiceOver
Utility, cursor tracking is already turned on.
If you’re not sure what is selected, you can use a VoiceOver command to find out. This
is important information to know before you perform an action such as copying or
deleting a file.
To hear what is selected:
m Press Control-Option-F6.Chapter 5 Using VoiceOver With Mac OS X 41
If nothing is selected, you hear “no selection available.” If text is selected, you hear the
text as it is read.
If you have cursor tracking turned off, the keyboard focus and VoiceOver cursor will
probably be in different locations. This means that the item in the VoiceOver cursor is
not selected automatically. You must use a VoiceOver command to select it.
To select an item when cursor tracking is turned off:
m Press Control-Option-Command-F4.
You can select more than one item at a time. This is useful when you want to perform
the same action for all of the selected items. For example, you may want to delete
several documents with one command. Selecting multiple items works only when
cursor tracking is turned off.
To select multiple items:
1 Press Control-Option-Shift-F3 to turn off cursor tracking.
Note: You can press this command again to turn cursor tracking back on when you’re
finished selecting.
2 Press the Escape key to deselect anything that is already selected.
3 Move the VoiceOver cursor to the first item you want to select and press ControlOption-Command-Space bar.
4 Move to the next item and press Control-Option-Command-Space bar. Continue until
all the items you want are selected.
If you want to deselect an item you selected, return to it and press Control-OptionCommand Space bar.
You use different techniques to select text. For more information about selecting text,
see “Selecting Text” on page 74.
Copying and Moving Files
If you can use a mouse, you can drag files to move them, and even hold down the
Option key while you drag to create a copy of the original file in another location. If
you cannot use a mouse, you can still use VoiceOver to copy a file and paste it in a new
location. You can delete the original if you want to.
To copy and move files using VoiceOver:
1 Navigate to the file you want to copy.
2 Press Command-C to copy the file.
3 Navigate to the location where you want to place the copy.
4 Press Command-V to paste it in the new location.42 Chapter 5 Using VoiceOver With Mac OS X
Note: If you have cursor tracking turned off, press Control-Option-Command-F4 to
select the item so you can copy it.
The Item Chooser Menu
Using the arrow keys to move across every item in a window can be very tedious,
especially if you have an idea of what you are looking for and want to get to it quickly.
A convenient alternative is to use the Item Chooser menu, shown below.
The Item Chooser menu displays these types of items and more:
 Controls
 Text in table cells
 Static text
 Buttons
In a Mail window, for example, you see all the buttons in the Mail window, names of
message senders, column headers, message subjects, and more.
To open the Item Chooser menu:
m Press Control-Option-I.
You can type some letters to quickly reduce the number of items in the menu and use
all the other menu navigation and selection techniques you’ve learned.Chapter 5 Using VoiceOver With Mac OS X 43
Interacting With Windows
As you work, you will probably have multiple application windows open on the
desktop. You can drag these windows to different locations or resize them by dragging
the bottom-right corner of the window. VoiceOver users who can’t see the screen or
use a mouse can do this too.
Moving and Resizing Windows
You can use the accent and tilde keys to move or resize a window with VoiceOver. The
accent key is directly above the Tab key, and the tilde is the accent key shifted.
To move a window:
1 Press Control-Option-accent (‘) to begin moving a window.
2 Use the arrow keys to move the window up, down, left, and right.
3 Press Escape to stop interacting with the window.
You hear a “bonk” sound when you can’t move a window any farther in one direction.
You can use the Shift key to move a window in smaller increments.
To resize a window:
1 Press Control-Option-tilde (~) to begin resizing a window.
2 Use the arrow keys to make the window taller, shorter, wider, or narrower.
3 Press Escape to stop interacting with the window.
While you’re moving or resizing a window, you can’t use VoiceOver to perform any
other actions. Pressing Escape lets VoiceOver know you’re done.
Moving a Scroll Bar
Previous chapters discussed how to read the content in scroll areas so that all the
contents are read and the window scrolls automatically. There may be times when you
want to scroll manually as well.
To move a scroll bar:
1 Press Control-Option-Shift-Down Arrow to begin interacting with the scroll area.
2 Press Control-Option-Shift-S to begin scrolling.
3 Press Control and Option with the arrow keys to scroll up and down, or left and right.
When the window can’t be scrolled any farther in a particular direction, you hear a
“bonk” sound.
4 Press the Escape key to leave the scrolling mode.44 Chapter 5 Using VoiceOver With Mac OS X
Using Spotlight
The fastest and easiest way to find something on your computer is to type a search
term in the Spotlight menu and then click the item you want in the search results. It
takes just seconds and will save you a lot of time.
There is almost no limit to the type of information you can find with Spotlight. In
Spotlight preferences, you can specify categories of information you want Spotlight to
search. For example, you can limit searches to just applications, documents, folders, and
Mail messages. Or you can expand your search options to include bookmarks in Safari,
image files, and more.
You can use Mac OS X keyboard shortcuts or the VoiceOver menu command to start a
Spotlight search.
Using the Spotlight Menu
To find an item on your computer, open the Spotlight search field, and type your
search term. You can open the Spotlight menu in two ways:
 Press Command-Space bar.
 Press Control-Option-M three times.
As soon as you type the first letters, the search results appear below the search field
and begins to display the results. When the search is finished, you hear VoiceOver
announce the number of items found.Chapter 5 Using VoiceOver With Mac OS X 45
To navigate the Spotlight menu:
1 Press Command-Space bar or Control-Option-M three times to open the Spotlight
menu.
2 Type the word or term you want to use for your search.
3 Press Control-Option-Down Arrow to move down the list of search results. Results are
categorized by type.
4 Press Control-Option-Space bar when you hear the item you want to open.
The item you selected opens immediately and the VoiceOver cursor leaves the
Spotlight menu and goes to the item you opened.
If you don’t see the item you want, you can go back to the top of the list and select
Show All to open the Spotlight window.
Using the Spotlight Window
The Spotlight window, shown below, provides additional information about each item
and contains a sidebar on the right where you can sort items in each group.
You can open the Spotlight window in two ways:
 Press Command-Option-Space bar.
 Click Show All at the top of the Spotlight search results window.46 Chapter 5 Using VoiceOver With Mac OS X
When you interact with the scroll area that contains the search results, the VoiceOver
cursor starts on the first column, which contains the disclosure triangles for each group.
The way you interact with disclosure triangles in the Spotlight window is different than
how you interact with disclosure triangles in some other windows.
To open or close disclosure triangles in the Spotlight window:
m Press Control-Option-Space bar.
As you navigate the search results, press Control-Option-Down Arrow to move down a
column. Spotlight displays the first five results in each group. If there are more than five
results, you can click the link at the bottom of the group that tells you how many more
items it found.
Changing the Sort Criteria
The body of the Spotlight window contains a sidebar: a scroll area within a scroll area,
which you use to sort results. You can sort groups by kind, date, or people, or you can
show a flat list. Within groups, you can sort by name, date, kind, or people. You can also
choose different ways to sort by date and location.
To change the sorting criteria:
1 Press Control-Option-Right Arrow until you hear “scroll area.” This is the area that
contains the search results.
2 Press Control-Option-Shift-Down Arrow to interact with the contents.
3 Press Control-Option-Right Arrow to move across the first row in the table until you
hear “scroll area” again. This is the sorting sidebar. Press Control-Option-Shift-Down
Arrow to interact with it.
4 Press Control-Option-Down Arrow until you hear the criteria you want to use. For
example, you can sort groups by kind, date, people, or flat list.
5 Press Control-Option-Command-F5 to move the mouse pointer to the VoiceOver cursor.
6 Press Control-Option-Shift-Space bar to click the mouse. The search results on the left
immediately change to reflect your choice.
Chapter 5 Exercises
The exercises that follow will help you practice using the Dock and the Item Chooser
menu, and copying and pasting a folder in different Finder views.
Exercise 5.1: Using the Dock
In this exercise, you will open a contextual menu for an item in the Dock and move an
icon to a different location in the Dock. Rearranging icons in the Dock lets you place
frequently used applications where it’s easiest for you to access them.
1 Press Control-Option-D to open the Dock.Chapter 5 Using VoiceOver With Mac OS X 47
2 Press Control-Option-Right Arrow and then Control-Option-Left Arrow to move along
the Dock in either direction. Try using the Up and Down arrows too. Stop when you
reach an icon you would like to use for this exercise.
Notice that VoiceOver identifies open applications by announcing the name of the
application and then “running.”
3 Press Control-Option-Shift-M to open the contextual menu for the icon.
4 Press Control-Option-Up Arrow or Down Arrow to navigate the menu. Notice the types
of commands you can access from the contextual menu.
5 Press Escape to close the menu without making a selection.
6 Press Control-Option-D again to move the VoiceOver cursor to the Dock, then move the
VoiceOver cursor to an icon you want to move.
7 Press Option with an arrow key to move the icon. Each time you press the arrow key,
the icon moves in the direction of the arrow.
8 Press Control and Option with the arrow keys to hear the new location of the icon.
Try this exercise again and listen to the contextual menu for an application that is
running. If you have windows or documents open for the application, you can access
them from the contextual menu.
Exercise 5.2: Using the Item Chooser Menu
In this exercise, you will open a window, use the Item Chooser menu, and find an item
in the menu.
1 Click the desktop to make the Finder active, or press Control-Option-Shift-D to go to
the desktop.
2 Press Command-N to open a new Finder window.
3 Press Control-Option-I to open the Item Chooser menu.
4 Press Control-Option-Down Arrow to move down the menu and hear the type of items
it contains.
5 Type documents or just doc to go to the Documents Folder. The Item Chooser menu is
filtered to show only those items that contain the letters or word you typed.
6 Press Control-Option-Down Arrow until you hear Documents Folder, then press
Control-Option-Space bar to select it.
The Item Chooser menu closes and the VoiceOver cursor moves to the Documents
Folder in the Finder window.
Exercise 5.3: Copying and Pasting a File
In this exercise, you will navigate the Finder window to locate a file, then copy and
paste it to a new location. After you copy a file or folder, you can move the copy to any
location on your computer and paste it there.48 Chapter 5 Using VoiceOver With Mac OS X
This exercise is presented three times, one for each of the different Finder views. All of
the Finder exercises begin with a new Finder window. To open a Finder window, you
can do one of the following:
 Go to the Dock and navigate to the Finder icon. Then press Control-Option-Space bar
to go to a Finder window.
 Press Command-N when the Finder is the active application.
 Press Control-Option-F1 twice to open the Application Chooser menu. Choose
“Finder menu” and then “Go to Finder.”
The view browser changes automatically to icon view, list view, and column view,
depending on the item you select in the sidebar. You can use the Finder keyboard
shortcuts provided in each exercise to switch to the view you want to use.
Exercise 5.3.a: Copying and Pasting in Icon View
1 Open a Finder window.
2 Press Control-Option-Right Arrow until you hear “sidebar list.”
3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar.
4 Press Control-Option-Down Arrow until you hear your home folder. The title of your
home folder includes your user name.
5 Press Control-Option-Shift-Up Arrow to stop interacting with the sidebar.
6 Press control-Option-Right Arrow until you hear “icon view scroll area.”
The contents of the right frame may be in a different view, depending on what you
select in the sidebar. You can press Command-1 to switch to icon view.
7 Press Control-Option-Shift-Down Arrow to interact with the contents.
8 Press Control-Option-Right Arrow until you hear “Sites selected folder.”
9 Press Command-C, the Finder keyboard shortcut for copying.
10 Press Command-V, the Finder keyboard shortcut for pasting.
11 Press Control-Option-Right Arrow until you hear “Sites copy selected folder.” This is the
copy you just made and pasted to the same folder.
12 Press Command-Delete, the Finder keyboard shortcut for deleting, to delete the copy
you just made. If you want to verify that the correct folder is selected before you delete
it, press Control-Option-F6 to hear the selected item.
Exercise 5.3.b: Copying and Pasting in List View
1 Open a Finder window.
2 Press Control-Option-Right Arrow until you hear “sidebar list.”
3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar.
4 Press Control-Option-Down Arrow until you hear your home folder. The title of your
home folder includes your user name.Chapter 5 Using VoiceOver With Mac OS X 49
5 Press Control-Option-Shift-Up Arrow to stop interacting with the sidebar.
6 Press control-Option-Right Arrow until you hear “outline.”
The contents of the right frame may be in a different view, depending on what you
select in the sidebar. You can press Command-2 to switch to list view.
7 Press Control-Option-Shift-Down Arrow to interact with the contents.
8 Press Control-Option-Down Arrow until you hear “Sites selected folder.”
9 Press Command-C, the Finder keyboard shortcut for copying.
10 Press Control-Option-Down Arrow, then press Command-V, the Finder keyboard
shortcut for pasting. In list view, you need to move away from the folder you just
copied or you will suddenly find yourself using Spotlight to search your computer for
documents.
11 Press Control-Option-Right Arrow or Left Arrow until you hear “Sites copy selected
folder.” This is the copy you just made and pasted to the same folder.
12 Press Command-Delete, the Finder keyboard shortcut for deleting, to delete the copy
you just made. If you want to verify that the correct folder is selected before you delete
it, press Control-Option-F6 to hear the selected item.
Exercise 5.3.c: Copying and Pasting in Column View
1 Open a Finder window.
2 Press Control-Option-Right Arrow until you hear “sidebar list.”
3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar.
4 Press Control-Option-Down Arrow until you hear the name of your home folder. The
title of your home folder includes your user name.
5 Press Control-Option-Shift-Up Arrow to stop interacting with the sidebar.
6 Press Control-Option-Right Arrow until you hear “column view browser.”
The contents of the right frame may be in a different view, depending on what you
select in the sidebar. You can press Command-3 to switch to column view.
7 Press Control-Option-Shift-Down Arrow to interact with the contents of the scroll area.
8 Press Control-Option-Shift-Right Arrow until you hear “Sites selected folder.”
9 Press Command-C, the Finder keyboard shortcut for copying.
10 Press Command-V, the Finder keyboard shortcut for pasting.
11 Press Control-Option-Right Arrow until you hear “Sites copy selected folder.” This is the
copy you just made and pasted to the same folder.
12 Press Command-Delete, the Finder keyboard shortcut for deleting, to delete the copy
you just made. If you want to verify that the correct folder is selected before you delete
it, press Control-Option-F6 to hear the selected item.6
50
6 VoiceOver Utility and Preferences
This chapter provides information about the many ways you
can customize VoiceOver for your needs. It also introduces
VoiceOver Utility, the application you use to customize your
VoiceOver settings.
VoiceOver Utility is located in Applications/Utilities. You can open it by clicking the
VoiceOver Utility button in Universal Access preferences, or by using the VoiceOver
command Control-Option-F8.
Important: When you press the Reset button in VoiceOver Utility, all the settings on all
the panes except Pronunciation are restored to the way they were the first time you
turned on VoiceOver. You can’t reset only the settings on a single pane.
Saving VoiceOver Settings
When you have your VoiceOver settings just the way you want them in VoiceOver
Utility, you might want to save them so that you can use those same settings when you
use another computer or so that you can share them with a friend. If you have a
removable storage device or a server where you can store your settings file, sharing
your settings is easy to do.
To save your VoiceOver settings to a file:
1 Press Control-Option-F8 to open VoiceOver Utility.
2 Choose File > Export Configuration or press Shift-Command-E.
3 In the Save dialog that opens, type a name for the file and choose where you want to
save it, then click Save.
You can use the same process to import the saved file. Choose File > Import
Configuration or press Shift-Command-I. Then choose your saved configuration file and
click Save. You don’t have to restart VoiceOver or your computer, the changes take
effect immediately.Chapter 6 VoiceOver Utility and Preferences 51
Setting the Amount of Spoken Detail
When you start using VoiceOver, you may want to hear as much detail as possible to
help you learn about your computer and applications. As you become more familiar
with these, you may not need to hear as much detail. You can choose these and other
settings on the Verbosity pane of VoiceOver Utility, shown below.
Adjusting Punctuation Settings
Punctuation includes the common punctuation marks as well as symbols. You can
adjust what you want to hear when punctuation occurs in documents. VoiceOver
includes these levels:
 None speaks text as you would normally read it, pausing for commas and periods.
 Some speaks keyboard symbols and many math symbols, such as the plus sign (+).
 Most speaks all special symbols but doesn’t speak common punctuation, such as the
comma and period.
 All speaks all special symbols and punctuation except for spaces. So, you might hear
a sentence spoken like this: “She stopped and turned comma before speaking
period.”
Some documents, websites, and email messages may have repeated punctuation
characters used as emphasis or design elements. You can decide whether or not you
hear such punctuation. Of course, if you set your punctuation to None, you won’t hear
any. The Repeated Punctuation options are:
 Always Spoken means that you hear all punctuation exactly as it occurs unless you’ve
set a punctuation level that skips certain punctuation or symbols.
 First Three Times means that you hear only the first three instances of a punctuation
symbol.52 Chapter 6 VoiceOver Utility and Preferences
 Spoken With Count means that you hear the number of instances of the punctuation
and then the name of the symbol. For example, the sentence “I am overjoyed!!!!!!!!!”
might be read as “I am overjoyed eight exclamation mark” when Punctuation is set to
All.
Adjusting Text Attribute Settings
Writers and designers of documentation and websites use punctuation size and style to
convey meaning or to separate elements. VoiceOver can let you know when text
changes occur, which can greatly improve your comprehension of the material. You can
set whether and how you want VoiceOver to alert you to text changes by choosing one
of these settings for the “When text attributes change” pop-up menu:
 Do Nothing sets VoiceOver to ignore changes in text attributes when reading text.
 Play Tone sounds a light tone when you encounter text in a different font or style
than what VoiceOver was just reading.
 Speak Attributes speaks the text attributes at the beginning of the text with different
attributes. For example, “bold 15 point” or “12 point Helvetica.” You hear only the
differences from the previous text, so if both sentences use the same font, you hear
only the size or style difference.
Setting Navigation Options
The Navigation pane of VoiceOver Utility, shown below, provides settings for how the
VoiceOver cursor navigates websites and for using the VoiceOver cursor in conjunction
with the keyboard and mouse, together or separately.Chapter 6 VoiceOver Utility and Preferences 53
Setting Website Navigation Options
The VoiceOver cursor typically moves linearly across webpages, from upper left to
lower right. Depending on how a webpage was designed, the VoiceOver cursor may
seem to move randomly when you navigate in this way. VoiceOver provides some
options for improving the navigation experience.
“Group items in web pages” organizes a webpage into related groups of information.
For example, all the song titles in a list of hot tunes, or an image with an excerpt of a
news article. When you choose this option, VoiceOver identifies these as a group. You
can skim quickly through groups until you hear one that interests you. Each group of
information is treated as a content area, so you use the VoiceOver command ControlOption-Shift-Down Arrow to interact with the contents.
When you click a link on a webpage, a new webpage opens and the VoiceOver cursor
goes to the top of the HTML content area. You don’t have to interact with it to read the
contents. However, when you type an address in the address field and press Return, the
VoiceOver cursor stays in the address field of the newly loaded page. If you want it to
start in the HTML content area on a new webpage, select the “VoiceOver cursor moves
to newly loaded web page” checkbox.
Images with no descriptions can slow down navigation and aren’t helpful if you can’t
see them. You can choose options in VoiceOver to skip images, or to skip images
without a description. You should be aware, though, that sometimes images are
actually links, so if you avoid them completely, you could be missing something
important on a webpage.
For more information about using VoiceOver with Safari to surf the Internet, see “Using
the Safari Web Browser” on page 68.
Setting VoiceOver Cursor Options
When you use the mouse, you click an item to select it. You can also use the Tab key to
move keyboard focus to some items to select them, including items in the view
browser of the Finder window. VoiceOver links the keyboard focus and the VoiceOver
cursor together to simplify navigation for VoiceOver users. This is called cursor tracking.
You can customize how you use the VoiceOver cursor in conjunction with the keyboard
and the mouse. You might find it convenient to keep them together as a single unit, or
use them separately. Either way, VoiceOver Utility provides options you can set to fit
with your specific working style.54 Chapter 6 VoiceOver Utility and Preferences
You can choose any combination of tracking options shown on the Navigation pane of
VoiceOver Utility. The text selection tracking settings apply when you are interacting
with text in a document. When you edit or create documents or enter text in a text box,
you are interacting with text. Experiment to see which combination works best for you.
For more information about using the VoiceOver cursor, mouse, and keyboard
independently, see “Advanced Cursor Tracking” on page 79.
Customizing Voices
VoiceOver includes a variety of voices so that you can choose the ones that work best
for you. Several companies also offer additional voices, available separately, that work
with VoiceOver. You can use the Voices pane of VoiceOver Utility, shown below, to set
your preferences for voices, rate of speech, pitch, and volume.
Using Different Voices
VoiceOver automatically uses a single default voice to speak what it reads. However,
you can choose different voices to speak different types of information. If only the
Default Voice appears in the Voices pane, click the disclosure triangle to reveal
additional options. The triangle is called the “Show Additional Voices” or “Hide
Additional Voices button” depending on its state. Whenever you see a collapsed
disclosure triangle, you can click it to reveal more information.
You can set different voices for these types of information:
 Default Voice: This voice is used for everything spoken in VoiceOver except any of the
options you set.
 Content: This voice speaks text in content areas. These can include scroll areas, lists,
HTML content areas, and documents.Chapter 6 VoiceOver Utility and Preferences 55
 Status: This voice lets you know the current state of buttons and other controls. For
example, the status of a checkbox is either “checked” or “unchecked.”
 Type: This voice identifies the type of item. Some examples are button, slider, scroll
area, and HTML content area.
 Attributes: This voice speaks the text attributes at the beginning of text with
different attributes than the preceding text. For example, “bold 15 point” or “12 point
Helvetica.”
 VoiceOver Menu: This voice reads the commands in the VoiceOver menu.
Click the pop-up menu next to each type of information and select the voice you want
to use. If you don’t make a choice, the default voice you chose will speak the
information.
You can practice using your VoiceOver skills to change voice settings in the exercise at
the end of this chapter.
Changing Rate, Pitch, and Volume
Next to each voice pop-up menu are controls to adjust the rate, pitch, and volume of
each voice. Type a new value in the text field or use the incrementors to change the
value.
Adjust the volume to a level that suits you. You can also use the volume controls to add
emphasis or tune out information. For example, you may find it useful to set the
volume higher for content and lower for other information. If there’s information you’d
rather not hear, set the volume to 1, which is the lowest value.
If you want to return all the settings to their default state, click the Reset button. But
remember, this changes almost all of the settings in VoiceOver Utility, not just the pane
you’re in. The only settings that won’t change are entries in the Pronunciation pane.
You can practice using VoiceOver to change the rate, pitch, and volume in the exercise
at the end of this chapter. For information about changing these values temporarily as
you work, see “Changing Rate, Pitch, and Volume Temporarily” on page 25.
Setting Visual Options
It can be difficult for a person not accustomed to using VoiceOver to follow along when
someone else is using it. To help them, VoiceOver provides visual feedback on the
screen. 56 Chapter 6 VoiceOver Utility and Preferences
The VoiceOver cursor and the caption panel are two visual aids for sighted users. You
can turn these visuals off or on and set preferences for them in the Display pane of
VoiceOver Utility, shown below.
Magnifying the VoiceOver Cursor
You can magnify the item in the VoiceOver cursor to enhance visibility, or to help you
isolate it from the rest of the screen contents. The image below shows the Documents
folder magnified in the VoiceOver cursor.
You can use the VoiceOver cursor slider in VoiceOver Utility to adjust the magnification
setting. This setting is retained when you restart your computer or log in again to your
user account. You can also use a VoiceOver command to temporarily increase or
decrease the magnification as you’re working. These temporary settings are in effect
until you log out or restart your computer.Chapter 6 VoiceOver Utility and Preferences 57
VoiceOver uses the brace keys for this command. The left and right braces are the
shifted keys to the right of the P key.
To increase or decrease the VoiceOver cursor magnification:
m Press control-Option-Right brace ( } ) to increase and Left brace ( { ) to decrease the
magnification.
Using the Caption Panel
The caption panel displays what VoiceOver is speaking so that a sighted person can
read what VoiceOver is saying, and more easily follow along. The caption panel is
shown below.
You can use the options in the Display pane of VoiceOver Utility to change how many
lines of text to display and how big the caption panel is. The larger the caption panel,
the more space it takes up on the screen. If your caption panel is very large, you may
want to increase its transparency so that you can see what is on the screen behind it.
Moving and Resizing the Caption Panel
If you can use a mouse, you can drag the caption panel to a part of the screen that
works best for you. You can also use VoiceOver commands to resize and move the
caption panel. The same command works for both actions, similar to the verbosity
settings described previously in “Setting Visual Options” on page 55.
To move or resize the caption panel:
1 Press Control-Option-Shift-F10. You hear either “resizing caption panel” or “moving
caption panel.” Each time you press the command, you switch to the other setting.
2 Press Control and Option with the arrow keys to make the changes you want.
If you are resizing the caption panel, the Up Arrow makes the window larger and the
Down Arrow makes it smaller.
If you are moving the caption panel, the arrow keys move the window in the direction
of the arrow. You can press the Shift key with the arrow keys to move in smaller
increments.
3 Press Escape to stop interacting with the caption panel.
Changing the Caption Panel Font Size
You used the brace keys to increase or decrease the magnification of items in the
VoiceOver cursor. You use the brace keys to increase or decrease the font size in the
caption panel. The left and right brackets are the unshifted keys to the right of the P
key.58 Chapter 6 VoiceOver Utility and Preferences
To increase the font size of the caption panel:
m Press Control-Option-Command-Right bracket ( ] ).
To decrease the font size of the caption panel:
m Press Control-Option-Command-Left bracket ( [ ).
The exercises at the end of this chapter will help you practice working with the caption
panel and magnifying the VoiceOver cursor.
Tiling Visuals
For maximum visual impact, you can dim the screen so that the contents of the
VoiceOver cursor stand out brightly. This is called tiling visuals. You can see the results in
the image below. The screen is dim except for the magnified item in the VoiceOver
cursor, which is centered on the screen.
To dim the screen behind the VoiceOver cursor:
m Press Control-Option-F10.
When you want to return the screen to normal, press Control-Option-F10 again.
If the caption panel is turned on, it is centered at the top or bottom of the screen and
displayed brightly with the VoiceOver cursor while the rest of the screen is dimmed.
Hiding Visuals
Even when the VoiceOver cursor or caption panel are visible, there may be times when
you want to temporarily hide them. You can use a VoiceOver command to hide them
and then make them visible again.Chapter 6 VoiceOver Utility and Preferences 59
To turn the VoiceOver cursor and caption panel on or off:
m Press Control-Option-F11. On a portable computer you may need to press Fn-ControlOption-F11.
Setting Text Pronunciation
You can create word substitutions so that when certain text or symbols appear, you
hear a preferred word or pronunciation spoken for the text or symbol. You make these
adjustments in the Pronunciation pane of VoiceOver Utility, shown below.
VoiceOver comes with some standard pronunciations. You can click the Add button at
the bottom of the table to add your own. The Reset button does not change the
entries in the pronunciation list, but it does restore all other VoiceOver Utility settings
to their original settings. If you want to remove items from the pronunciation list, use
the Delete button at the bottom of the Pronunciation pane.
The exercises at the end of this chapter will help you practice adding pronunciations to
the list.
Chapter 6 Exercises
The following exercises will help you practice changing voice settings, magnifying the
VoiceOver cursor and tiling visuals; moving and resizing the caption panel; and adding
a pronunciation to the pronunciation list.
Exercise 6.1: Using VoiceOver to Change Voice Settings
In this exercise, you will use VoiceOver to navigate the Voices pane of VoiceOver Utility
and change voice settings. Make sure cursor tracking is turned on before you begin.60 Chapter 6 VoiceOver Utility and Preferences
1 Press Control-Option-F8 to open VoiceOver Utility. If you’re using a portable computer
and have not changed the default behavior of the function keys, press Fn-ControlOption-F8.
2 Press Control-Option-Right Arrow until you hear “Voices tab three of five.”
3 Press Control-Option-Space bar to press the Tab button.
4 Press Control-Option-Right Arrow to hear the remaining tab buttons and the headers
for the columns (Voices, Rate, Pitch, and Volume). Stop when you hear “Show
Additional Voice Options button.”
5 Press Control-Option-Space bar to press the button and reveal the other information
types. You won’t hear them until you navigate to them.
6 Press Control-Option-Right Arrow to move across the Default Voice row. Stop when you
hear “Fred. Default Voice pop-up button.”
7 Press Control-Option-Space bar to open the pop-up menu, then use the arrow keys to
move up and down the list of voices.
8 Press the Return key to hear the voice you selected read a line of text. Keep sampling
voices in this way until you find one you like.
9 Press Control-Option-Right Arrow to navigate to the remaining information types and
make selections for these.
Exercise 6.2: Using VoiceOver to Change Rate, Pitch, and Volume
In this exercise, you will use VoiceOver to change the rate, pitch, and volume of the
voices. Make sure cursor tracking is turned on before you begin. If you did the
preceding exercise to choose voices, you can skip to step 5.
1 Press Control-Option-F8 to open VoiceOver Utility. If you’re using a portable computer
and have not changed the default behavior of the function keys, press Control-OptionFn-F8.
2 Press Control-Option-Right Arrow until you hear “Voices tab three of five.”
3 Press Control-Option-Space bar to press the tab button.
4 Press Control-Option-Right Arrow to hear the remaining tab buttons and the headers
for the columns (Voices, Rate, Pitch, and Volume). Stop when you hear “Show
Additional Voice Options button.”
5 Press Control-Option-Space bar to press the button and reveal the other information
types. You won’t hear them until you navigate to them.
6 Press Control-Option-Right Arrow to move across the Default Voice row. Stop when you
hear “thirty-five rate edit text.” If this setting has been changed, you may hear a
number other than 35.
7 Type a new value. Since the cursors are tracking each other, the value is already
selected. When you start typing, the numbers you type replace what was there.Chapter 6 VoiceOver Utility and Preferences 61
8 Press Control-Option-Right Arrow until you hear “pitch fifty incrementor.” Again, you
may hear a different value if this setting was changed.
9 Press Control-Option-Shift-Down Arrow to begin interacting with the incrementor.
10 Press Control-Option-Up Arrow or Control-Option-Down Arrow to change the value.
When you stop, you hear the voice speak at the selected pitch.
11 Press Control-Option-Shift-Up Arrow to stop interacting with the incrementor.
12 Press Control-Option-Shift-Right Arrow to move to the Volume column. Use either
method to change the value.
Exercise 6.3: Adjusting the Caption Panel
In this exercise, you will turn on the caption panel and then change its transparency,
font size, and location.
1 Press Control-Option-F8 to open VoiceOver Utility.
2 Press Control-Option-Right Arrow until you reach the Display tab, then press ControlOption-Space bar to open the Display pane.
3 Press Control-Option-Right Arrow until you reach the Show Caption Panel checkbox. If
it’s unchecked, press Control-Option-Space bar to check it. The caption panel
immediately appears at the bottom of the screen.
4 Press Control-Option-Shift-Right Arrow until you reach the Caption Panel Transparency
slider.
5 Press Control-Option-Shift-Down Arrow to begin interacting with the slider.
6 Press Control-Option-Right Arrow to make the caption panel more transparent, so you
can see the window behind it.
7 When the transparency is at a level you like, press Control-Option-Shift-Up Arrow to
stop interacting with the slider. Notice the caption panel doesn’t block as much of the
screen.
8 To position the caption panel somewhere other than the center of the desktop, press
Control-Option-Shift-F10 until you hear “moving caption panel.” Then press ControlOption-Down Arrow to move the caption panel toward the bottom of the screen.62 Chapter 6 VoiceOver Utility and Preferences
9 When you’re finished moving the caption panel, press the Escape key.
Note: You can also use this exercise to practice resizing the caption panel. Press
Control-Option-Shift-F10 until you hear “resizing caption panel.” The Up and Down
arrows add height and the Left and Right arrows add width to the caption panel.
Exercise 6.4: Magnifying the VoiceOver Cursor and Tiling VoiceOver
Visuals
In this exercise, you will practice using VoiceOver commands to magnify the VoiceOver
cursor and isolate the VoiceOver cursor in the center of the screen. The brace keys you
use for this command are the shifted keys to the right of the P key.
Note: You can use the VoiceOver Menu Magnification slider in the Display pane of
VoiceOver Utility to set this level permanently. Using VoiceOver commands as you work
maintains the setting only until you log out of your user account or shut down your
computer.
1 With VoiceOver turned on, press Control-Option-Shift-Right brace ( } ) to increase the
magnification. Each time you press the command, the magnification increases.
2 Press Control-Option-Shift-Left brace ( { ) to decrease the magnification. Stop when the
magnification is at a comfortable level.
3 Press Control-Option-F10 to dim the screen and show the contents of the VoiceOver
cursor in the center of the screen.
4 Press Control-Option-Right Arrow to navigate around the screen. Notice that the
contents of the VoiceOver cursor are always in the center of the screen, regardless of
where the VoiceOver cursor is actually located.
5 Press Control-Option-F10 again to return the screen to normal.
6 Press Control-Option-Shift-Left brace ( { ) until the magnification returns to one, the
normal setting.
Exercise 6.5: Adding Pronunciation to the VoiceOver Dictionary
In this exercise, you will add a word to the VoiceOver pronunciation dictionary so that it
is spoken the way you prefer. Think of a word or term that you would like to use as an
example. If your name has a unique pronunciation, you may want to use it instead of
the word provided in the exercise.
1 Press Control-Option-F8 to open VoiceOver Utility.
2 Press Control-Option-Right Arrow until you hear “Pronunciation tab five of five.”
3 Press Control-Option-Space bar to click the tab button and open the Pronunciation
pane.
4 Press Control-Option-Right Arrow until you reach the Add button, then press ControlOption-Space bar to click the button. A new dialog opens for you to enter the new
pronunciation.Chapter 6 VoiceOver Utility and Preferences 63
5 The first line of the dialog has a text field. Press Control-Option-Right Arrow once to
reach the text field, then type the word you chose. If you don’t have a word to add,
type ASCII with all capital letters.
6 Press Control-Option-Right Arrow until you reach the Pronunciation text box, then type
a phonetic spelling for your word. For example, if you are using ASCII, you could type
askee.
7 Press Control-Option-Right Arrow to go to the next line, where you choose applications
in which you want to use this pronunciation. The default setting is to use the new
pronunciation for all applications. If this is what you want, you don’t need to do
anything else here.
If you want to use the new pronunciation only for a specific application, click the
Applications pop-up menu and choose it from the menu. Only open applications are
listed in the menu.
8 Press Control-Option-Right Arrow to go to the Ignore Case checkbox. This checkbox is
selected. If you want to use the new pronunciation only for case-specific instances, click
the checkbox to deselect it.
9 Press Control-Option-Right Arrow until you reach the Save button, then click it.
Your pronunciation is now included in the list of terms in the Pronunciation pane of
VoiceOver Utility. You can interact with the contents of the list to hear the items it
contains.7
64
7 Web Browsing and Email
Mac OS X comes with an email application and web browser
that you can use with VoiceOver.
You can use the Mail and Safari applications to send and receive your email and surf
the Internet. This chapter gives you information to help you connect to the Internet
and to help you use VoiceOver with Mail and Safari.
Connecting to the Internet
When you set up your new computer, Setup Assistant asks you questions about your
Internet Service Provider. If you already have Internet access set up, you can start using
Mail and Safari right away. If you skipped the Setup Assistant process or didn’t start
with a new computer, you can enter the necessary information in Network preferences.
To open Network preferences:
1 Press Control-Option-D to go to the Dock.
2 Press Control-Option-Right Arrow until you hear “System Preferences,” then press
Control-Option-Space bar.
3 Press Control-Option-Right Arrow until you hear “Network” or press Control-Option-I to
open the Item menu and locate it.
4 Press Control-Option-Space bar to open Network preferences.Chapter 7 Web Browsing and Email 65
The Network preferences window, shown below, has two pop-up menus at the top. In
the Location pop-up menu, you choose the configuration you’re setting up. If you
always use your computer in the same location and connect the same way, you can
just leave the location set to Automatic. If you want to create different connection
settings for different locations, choose New Location or Edit Locations and use the
dialog that opens to make the necessary changes.
In the Show pop-up menu, you can choose the type of information you want to view in
the table below it. Network Status is on by default, and the table shows the status of
your network connection if you have one, your modem if you have one, and any other
connection information. Choose your connection method from the pop-up menu to
set up your connection.
Before you close the window or quit System Preferences, click the Apply Now button at
the bottom of the window. If you don’t, a dialog appears, asking if you want to save
your changes.
If you need more help getting set up, go to the bottom of the Network preferences
window, below the table, and click the “Assist me” button for guided setup assistance.66 Chapter 7 Web Browsing and Email
Using Mac OS X Mail
With the Mail application in Mac OS X, you can conveniently organize, read, and send
email. The toolbar at the top of the Mail window includes a search field so that you can
quickly locate email messages by subject, words in the text, sender or recipient, and
date sent or received.
The Mail window is organized like a Finder window, with your inbox and any other
mailboxes you create in the left column. VoiceOver calls this the “mailboxes outline.”
The contents of the folder selected in the mailboxes outline appear in a messages table
in the top half of the right column. When you select one of these messages, its
contents are displayed in the lower part of the right frame, called a “message content
scroll area.”
The first time you open Mail, the Mail Setup Assistant appears to help you set up your
email account. You should know the name of the incoming and outgoing mail servers
that your Internet Service Provider uses, whether your email account is POP or IMAP,
and your email user name and password.
If you need help learning how to set up or use Mail, choose Help > Mail Help from the
menu bar.
The Mail Toolbar
The toolbar at the top of the Mail window contains buttons to help you manage your
email. You can use these buttons to delete selected messages, label a message as junk,
start a new message, reply to a message, get mail, and search.
Opening Collapsed Folders in the Mailboxes Outline
The mailboxes outline on the left side of the Mail window is a lot like the sidebar in the
Finder. It contains an Inbox folder that lists your email accounts, separate folders for
mail you sent, and any folders you set up to help you manage your email. Just like in
the Finder, you select a mailbox in the mailboxes outline, its contents are displayed in
the messages column on the right.
Some folders in the mailboxes outline have a triangle next to them so that you can
collapse or expand them. You can also use a VoiceOver command to expand a folder
and access its contents. The folder contents are shown indented below the folder, just
like the Finder’s list view.
To expand or contract a disclosure triangle:
m Press Control-Option-Backslash (\).Chapter 7 Web Browsing and Email 67
Reading Email
Because the Mail window is similar to a Finder window, you can use the same skills
discussed in “Navigating Finder Windows” on page 37. You interact with the contents of
the mailboxes outline, select a mailbox, and stop interacting. Then you do the same in
the messages table to select the message you want to read. To speed up the process,
VoiceOver provides a command to jump the VoiceOver cursor from the messages list to
the message contents and back again.
If you need more explicit instructions, review “Using List View” on page 38.
To open an email message:
1 Open the Mail application by clicking the Mail icon in the Dock.
2 Navigate to the mailboxes outline and select a mailbox or folder. Use Control-OptionShift-Down Arrow and Control-Option-Shift-Up Arrow to begin interacting and stop
interacting with the contents.
3 Press Control-Option-Right Arrow to move to the messages table. Remember you need
to interact with the contents to read the messages in the table.
4 Press Control and Option with the arrow keys to move across or up and down each row
of messages. For example, if you want to view messages by sender, move to the From
column and press Control-Option-Down Arrow to move down the column.
Note: You can also press Control-Option-R to read the entire row.
5 When you locate an email message you want to read, press Control-Option-J. The
VoiceOver cursor jumps to the message content scroll area and begins to read the
message.
6 When you’re finished reading, press Control-Option-J to jump back to the message list.
Note: You can also use regular VoiceOver window navigation to move to the contents
of the email message in the message content scroll area, and you can double-click an
email in the message list with the mouse to open the message in a separate window.
Controlling Speech
As VoiceOver reads the text of the message, you can pause the speaking or repeat what
was spoken.
To pause VoiceOver speaking:
m Press the Control key.
Press the Control key again to resume. If you haven’t moved the VoiceOver cursor, or
used another VoiceOver command, VoiceOver will continue reading where it left off.
To hear what was last spoken repeated:
m Press Control-Option-Z.
After VoiceOver repeats the previous spoken text, it continues reading where it left off.68 Chapter 7 Web Browsing and Email
Addressing a Message
Names in your address book appear in the To, CC, and Bcc fields as menu buttons in
the Mac OS X Mail application. The address menu buttons function like pop-up menus
or contextual menus. In addition to listing all the addresses for an individual or
organization, they also list actions you can perform for the address, such as editing it,
removing it from the list, opening it in Address Book, creating a Smart Mailbox, and
more.
To address a Mail message:
1 Open the Mail application and press Control-Option-Right Arrow until you hear “New
button.”
2 Press Control-Option-Space bar. A new mail message opens in a separate window.
3 Press Control-Option-Right Arrow until you hear “blank To edit text.”
4 Type the first few letters of the recipient’s name. You hear the name and email address
of the first name that matches what you typed.
If more than one address is available for the recipient, you hear “Mail has new window”
and a list of addresses for that person appears. Press Control-Option-Down Arrow to
find the one you want.
5 Press the comma (,) key to enter the address and add another address. You can add as
many addresses in the field as you want.
If you need to delete an address you just entered, press the Delete key once to
highlight the address and a second time to delete it.
6 Press Return to move to the next text field.
Note: If you start typing an email address that is already in your address book, pressing
Return adds the entire address to the To field. Press Return again to move to the next
text field.
Using the Safari Web Browser
Mac OS X includes Safari, a web browser. The Safari window has navigation buttons
across the toolbar at the top, a text field where you can type an Internet address, and a
Google search field. Below the toolbar are buttons you click to see all your bookmarks
and those you use often.
Navigating Websites With VoiceOver
VoiceOver provides three ways to navigate websites:
 You can move the VoiceOver cursor in a linear way, progressing across or down the
website by moving from item to item on the page. This method provides excellent
control but may slow down navigation if the page contains many items.Chapter 7 Web Browsing and Email 69
 You can select a preference in the Navigation pane of VoiceOver Utility to navigate
by group. The VoiceOver cursor moves from one group of information to the next,
and you interact with the group if you want to read its contents. This method speeds
up navigation and allows you to quickly survey the contents of a page.
 You can use the Link Chooser menu. The Link Chooser menu lists all the links on a
page, which lets you quickly jump to the link you want.
You can choose website navigation options in the Navigation pane of VoiceOver Utility,
shown below.
For more information about these options, see “Setting Website Navigation Options” on
page 53.
Websites often contain a mix of links, graphics, and sometimes moving images. Every
website is different, so you’ll need to explore each website to learn how it’s arranged.
Very often, websites are laid out in a table to help with alignment of text and graphics.
Depending on the way content was created or designed, all elements on a website
might not be accessible.
Some webpages organize information in frames. Frames are often used to separate
different sections of the page. Sometimes one frame has links in it that update the
contents of other frames. For example, you might click a link in one frame to display
information in another frame. VoiceOver provides commands to let you move between
frames so that you can access this type of webpage.
To navigate from one frame to another:
m Press Control-Option-Command-M to move to the next frame, and Control-OptionCommand-Shift-M to move back to the previous frame.
Using the Link Chooser Menu
The Link Chooser menu does for webpages what the Item Chooser menu does for
windows. By listing all the links on a webpage, you can quickly find the one you’re
looking for and select it. If you don’t know the exact name of the link, just type a
keyword to find links that contain the word. For example, if you suspect there’s a link
on the page for customer support or technical support, type support to find likely links.
To open the Link Chooser menu:
m Press Control-Option-U.70 Chapter 7 Web Browsing and Email
When you select a link in the Link Chooser menu, the VoiceOver cursor goes to the link
on the webpage but doesn’t activate the link. This gives you a chance to determine
whether you really want to go there before you actually switch to a new webpage.
You can use the Link Chooser menu in any document or file that contains HTML links,
including Mac Help and VoiceOver Help.
To practice using the Link Chooser menu, see the exercise at the end of this chapter.
Navigating Website Images
Websites may contain many images. If a website contains “alt tags,” or text that
describes each image on the page, you may find it useful to navigate to these images.
If a website has unidentified images, you may want to ignore them. You can set your
preferences for navigating images in the Navigation pane of VoiceOver Utility.
Note: Some images contain links, so you may miss some links on a page if you choose
not to navigate images.
Chapter 7 Exercises
The exercises that follow will help you practice reading email and navigating websites
with Mail and Safari.
Exercise 7.1: Opening and Reading an Email Message
In this exercise, you will open the Mail application in the Dock, navigate the Mail
window to the message list, and go to the message text to read it. You must already
have Mail set up with an email account before you begin this exercise.
1 Press Control-Option-D to open the Dock, then press Control-Option-Right Arrow until
you reach the Mail icon.
2 Press Control-Option-Space bar to open the Mail window.
3 Press Control-Option-Right Arrow until you hear “mailboxes outline.” This area is similar
to the sidebar in a Finder window. Press Control-Option-Shift-Down Arrow to interact
with the contents of the mailboxes area.
4 Press Control-Option-Down Arrow to move through the folders and mailboxes in this
area. The contents vary depending on how many email accounts you have and any
special folders you set up to manage your email messages.
5 When you reach your email account in the Inbox, press Control-Option-Shift-Up Arrow
to stop interacting with the mailboxes outline.
6 Press Control-Option-Right Arrow to reach the messages table and press ControlOption-Shift-Down Arrow to interact with it.Chapter 7 Web Browsing and Email 71
7 Press Control-Option-Right Arrow to move across the first row in the message table.
Depending on the preferences you set for Mail, you may have columns for the status of
the menu, who the sender is, the subject, and date and time information.
You can also move down a column, so if you want to read mail from a particular sender,
navigate to the From column and then use the Up and Down arrows instead of the Left
and Right arrows.
8 After you locate a message to read, press Control-Option-J to move to the message
contents below the message table. Notice that VoiceOver begins reading the text
automatically.
9 Press Control to pause the speech and Control again to resume.
10 Press Control-Option-Right Arrow and notice that VoiceOver stops reading the text
automatically, and you are now interacting with the text.
You can use the text commands described in “Reading Text” on page 25 or in “Reading
a Document” on page 72 to read a line or sentence at a time. For this exercise, you will
return to reading the message contents as a whole.
11 Press Control-Option-Up Arrow to stop interacting with the text, then press ControlOption-A to start reading the message contents from the start again.
12 When you’re finished reading the email message, press Control-Option-J to return to
the messages table.
Exercise 7.2: Using the Link Chooser Menu
In this exercise, you will open a page in Safari or VoiceOver Help, open the Link Chooser
menu, and find a link.
1 Press Control-Option-D to open the Dock, or press Control-Option-Question mark (?) to
open VoiceOver Help.
2 If you are using Safari, press Control-Option-Right Arrow until you hear “Safari,” then
press Control-Option-Space bar to open a webpage in Safari.
3 Press Control-Option-Left Arrow to move to the HTML content area.
Note: This is a shortcut to bypass all the toolbars and tabs that may be at the top of a
browser window. Technically, the VoiceOver cursor is actually navigating backward.
4 Press Control-Option-Shift-Down Arrow to interact with the HTML content area.
5 Press Control-Option-U to open the Link Chooser menu.
6 Type a word that you’re likely to find in a link on the webpage. In Safari, if your start
page is set to an Apple website, try Mac. If you’re in VoiceOver Help, type commands.
7 Press Control-Option-Down Arrow to find the link you want, then press Control-OptionSpace bar. The Link Chooser menu closes and the VoiceOver cursor moves to the link
on the page that you selected.
8 Press Control-Option-Space bar to activate the link and open the linked page.8
72
8 Reading and Editing Text
This chapter provides information about reading, typing, and
editing text.
Text is found in many places on your computer: in windows and dialogs, in content
areas like webpages and help files, and in documents. You can use the navigation skills
covered earlier to navigate to text areas and interact with them. This chapter teaches
you how to use the VoiceOver text commands effectively.
Reading a Document
When you open a document, it opens in the application that created it or in another
compatible application. When the document opens, you often have to navigate
through the application’s toolbar and text rulers that appear. A tip for quickly accessing
the content is to press Control-Option-Left Arrow to navigate backward to the last item
on the page, which is typically the text area.
Note: If while navigating, you find yourself stuck in a text ruler full of tab markers, it’s
easy to get out. Press Control-Option-End (or Control-Option-Fn-Right Arrow on a
portable computer) to go to the last visible item on the page, which is usually the text
area.
When you reach the text area in a document, press Control-Option-A to begin reading
the text. You don’t have to interact with the text to read it. Press Control to pause the
reading, and press it again to continue where VoiceOver left off. If you need to hear the
last phrase repeated, press Control-Option-Z. VoiceOver repeats the last sentence or
phrase and continues reading the rest of the text.
When you press Control-Option-Shift-Down Arrow to interact with the text area,
Control-Option-A reads from where the VoiceOver cursor is located to the bottom of
the text area. Use the VoiceOver commands in “Working With Text” below for even
greater control of the VoiceOver cursor.Chapter 8 Reading and Editing Text 73
Working With Text
When you’re writing and editing in the text area, you are most likely working word-byword or in small chunks of text. You can use the following commands to read the next
or previous character, word, line, sentence, or paragraph:
 Word: Control-Option-Right Arrow or Left Arrow
 Character: Control-Option-Shift-Right Arrow or Left Arrow
 Line: Control-Option-Down Arrow or Up Arrow
 Sentence: Control-Option-Page Down or Page Up
 Paragraph: Control-Option-Shift-Page Down or Page Up
Locating the Insertion Point
When you work with text, the keyboard focus is represented by a blinking vertical line,
also known as an insertion point. This shows you where the next character you type is
going to appear. As you type, the insertion point is always to the right of the character
you just typed. VoiceOver extends this experience to how VoiceOver speaks characters
and words. VoiceOver speaks the character or word as it passes over it. If you’ve used
another screen reader, you may be accustomed to a different experience. With a little
practice, it doesn’t take long to get familiar with this new orientation.
To figure out where the insertion point is in relation to a word or character, remember
that it always rests on the other side of what VoiceOver just spoke. This is important to
remember, because if you move backward over a character or word, the VoiceOver
cursor and the insertion point are focused before the character or word. Try the
exercise at the end of this chapter to practice working with text.
Navigating in a Document
In addition to navigating within the text itself, you can use VoiceOver commands to
navigate to the beginning or end of the document. Remember that if there is more
content than can be shown in the window, the window will have scroll bars. If you use
the first two commands below, the VoiceOver cursor moves only to the top or bottom
of what’s visible in the scroll area. Use the second two commands to reach the top or
bottom of all the contents of the scroll area.
To move the VoiceOver cursor to the first visible word:
m Press Control-Option-Home on a desktop computer or Fn-Control-Option-Left Arrow on
a portable computer.
To move the VoiceOver cursor to the last visible word:
m Press Control-Option-End on a desktop computer or Fn-Control-Option-Right Arrow on
a portable computer.
To move the VoiceOver cursor to the first word, scrolling if necessary:
m Press Control-Option-Shift-Home on a desktop computer and Fn-Control-Option-ShiftLeft Arrow on a portable computer.74 Chapter 8 Reading and Editing Text
To move the VoiceOver cursor to the last word, scrolling if necessary:
m Press Control-Option-Shift-End on a desktop computer and Fn-Control-Option-ShiftRight Arrow on a portable computer.
Bookmarking a Document
You can place a bookmark in a text document so that you can quickly return to a
particular place. You can place only one bookmark, so the second time you set a
bookmark, it replaces the first one. Bookmarks are useful for quickly returning to a
particular location in a long document.
To use bookmarks:
m Position the VoiceOver cursor where you want to place a bookmark, then press ControlOption-Shift-1.
m Press Control-Option-1 to move the VoiceOver cursor to a bookmark.
Bookmarks are only temporary. If you close the document where you’ve placed a
bookmark, or if you quit the application, the bookmark is not saved.
Cursor Tracking in Text Areas
VoiceOver Utility has unique cursor tracking options for working with text. If you want
the VoiceOver cursor and insertion point to track each other while you’re working with
text, select both of the text selection tracking options in the Navigation pane of
VoiceOver Utility, shown below.
With these options selected, anything you select with the keyboard will also be in the
VoiceOver cursor.
Selecting Text
To copy, paste, or delete text, you need to select the text first. You use standard
Mac OS X keyboard shortcuts to select text.
To select one character at a time:
m Press Shift-Right Arrow or Shift-Left Arrow to select the character to the right or left of
the insertion point.
To select one word at a time:
m Press Shift-Option-Right or Left Arrow.Chapter 8 Reading and Editing Text 75
To select the text from the keyboard cursor to the end or beginning of the line:
m Press Shift-Command-Right or Left Arrow.
You can use the VoiceOver command Control-Option-F6 to verify exactly what is
selected.
Important: When text is selected, you can easily delete it by pressing any key on the
keyboard. This is useful if you want to replace the selected text with the words you
type. If you accidentally delete the text, use the keyboard shortcut Command-Z to
undo your mistake. This correction works only if it occurs immediately after the
mistake. This shortcut works in many applications and in many situations. It’s always
worth trying it to see if it can correct a mistake.
Hearing Text Attributes
The font, size, and style of text adds meaning to a formatted document. “Adjusting Text
Attribute Settings” on page 52 discussed how to set the way VoiceOver announces
changes in text attributes as text is being read. When you’re working with text, you can
use a VoiceOver command to hear text attributes for selected text.
To hear the attributes of selected text:
m Press Control-Option-T.
You won’t hear the attributes if the text is not selected. Use one of the previously
discussed text selection commands in “Selecting Text” above.
Using TextEdit With VoiceOver
TextEdit is the powerful word processing application built in to Mac OS X. TextEdit is
fully accessible with VoiceOver, and you can use it to open, read, and edit many
documents created by other word processing applications, including Microsoft Word.
You use all the standard VoiceOver commands to navigate the TextEdit window and
interact with toolbars, menus, and text. You can also use TextEdit Help to learn how to
use the many powerful features and keyboard shortcuts in TextEdit. A few tips are
provided here to get you started.
Checking Spelling in TextEdit
TextEdit has a preference you can set that underlines misspelled words. If you can’t see
the underlining, you can still use TextEdit’s spell check feature to check spelling at any
time. A combination of TextEdit keyboard shortcuts and VoiceOver commands makes
this a simple task.
To check spelling in a document:
1 Move the VoiceOver cursor to an edit text area.76 Chapter 8 Reading and Editing Text
2 Press Command-semicolon (;) to hear the first misspelled word. Sometimes words are
underlined that the computer doesn’t recognize, but they’re not actually misspelled.
Continue pressing this command until you hear a word that needs to be corrected.
3 Press Control-Option-Shift-M to open a contextual menu for the misspelled word.
At the top of the menu are suggested spellings or alternate words. Below those are
other options, including a dictionary so you can find the definition of the word.
4 Navigate to the menu choice that you want and press Control-Option-W-W to hear its
spelling, or Control-Option-W-W-W to hear it spelled phonetically.
5 Press Control-Option-Space bar to select it. If you choose a corrected spelling from the
menu, the new spelling replaces the old one.
If you don’t hear an acceptable correction, press Escape to close the menu. Then press
Control-Option-Shift-F4 to move the VoiceOver cursor to the misspelled word and edit
the word manually.
Changing Tab Stops in TextEdit
At the far right end of the toolbar are tab stop buttons you can press to add a new tab
stop. You can click these buttons or you can add a tab stop at any point when the
VoiceOver cursor is in the ruler. If you deselected the Show Ruler checkbox in TextEdit
Preferences, you won’t find these buttons or the ruler.
To add or change a tab stop:
1 Press Control-Option-Space bar when the VoiceOver cursor is on a tab stop button or in
the ruler. In either case, a dialog appears.
2 Press Control-Option-Right Arrow to go to the pop-up menu labeled Right Tab Stop.
3 Press Control-Option-Space bar to open the pop-up menu list and choose the type of
tab stop you want to add.
4 Press Control-Option-Right Arrow until you reach the edit text field for the ruler marker
value.
5 Type the measurement for where you want to place the tab stop. For example, 6.25
indicates six and one quarter inches on the ruler.
6 Press Control-Option-Right Arrow until you reach the Ok button and click it.
You can also drag existing tab stop markers along the ruler.
To drag an existing tab stop marker to another location:
1 Navigate to the ruler and locate the tab stop marker you want to move.
2 Press Control-Option-Shift-Down Arrow to interact with the marker.
3 Press Control-Option-Left Arrow or Right Arrow until the marker is where you want it.
4 Press Control-Option-Shift-Up Arrow to stop interacting with the marker.Chapter 8 Reading and Editing Text 77
Chapter 8 Exercises
The exercises that follow will help you practice locating the insertion point, selecting
text, and saving a document. The first exercise tells you how to open a new document
in TextEdit. You can use the same document for all the exercises.
Exercise 8.1: Following the Insertion Point
In this exercise, you will use Spotlight to find the TextEdit application, create a new
document in TextEdit, and practice locating the insertion point.
1 Press Control-Option-M three times to open the Spotlight menu.
2 Type text.
3 Press Control-Option-Down Arrow until you hear “TextEdit top hit.”
4 Press Control-Option-Space bar to open the TextEdit application. A new TextEdit
window opens.
5 Press Control-Option-Left Arrow to go backward to the text area and skip all the items
in the toolbar and text ruler.
6 Press Control-Option-Shift-Down Arrow so you can type in the text area.
7 Type leaf. The VoiceOver cursor and insertion point are focused to the right of the f.
8 Press Control-Option-Shift-Left Arrow to move back one character and you hear “f”
again because now the VoiceOver cursor moved over the f, reading as it went. The
insertion point is now blinking on the left of the f.
9 Press Control-Option-Shift-Left Arrow again to move back one character and you hear
“a” and the insertion point is now to the left of the a.
10 Continue moving forward and back using Control-Option-Shift-Left Arrow and ControlOption-Shift-Right Arrow to move a character at a time.
As you move back and forth, you will understand how VoiceOver communicates the
location of the insertion point.
Exercise 8.2: Cutting and Pasting Text
In this exercise, you will use a Text Edit document to select text and place a bookmark
in the text. You can use the same document you created in the previous exercise.
1 Type some text in the document. Make sure you include this sentence: The sun shone
hot on the pavement.
2 Press Control-Option-Page Down or Page Up to navigate the text by sentence until you
hear “the sun shone hot on the pavement.” If you have a portable computer, remember
to press Fn-Control-Option-Up Arrow or Down Arrow.
3 The insertion point is at the beginning of the sentence, so press Shift-Option-Right
Arrow until every word in the sentence is selected.78 Chapter 8 Reading and Editing Text
If you make a mistake, press Control-Option-Right Arrow to deselect the text, then try
again.
4 With the sentence selected, press Command-X to cut the text. The text disappears from
the document and is stored on the computer’s clipboard, which is not visible on the
screen.
5 Navigate to the end of the text using any of the navigation methods you learned in this
chapter. For example, pressing Control-Option-Shift-End on a desktop computer or FnControl-Option-Shift-Right Arrow on a portable computer takes the VoiceOver cursor to
the last word in the text area.
6 Press Command-V to paste the sentence you cut.
7 Press Control-Option-S to hear the sentence to verify that it was pasted correctly.
Exercise 8.3: Saving a Document
In this exercise, you will save the document you created in the previous exercises.
Mac OS X uses the same Save dialog for all of its applications, so learning how to
navigate this dialog is important.
1 Press Command-S to use the keyboard shortcut for saving a document. The Save
command is in the File menu in the menu bar.
The first time you save a document, the Save dialog appears. If you are saving changes
to a document that has already been saved, the changes are saved, but a dialog doesn’t
appear.
2 Create a name for the document. Press Control-Option-Right Arrow to go to the edit
text field and type the name you want to use. A suggested name is in the text field and
is highlighted. When you start typing, you erase the suggested name and replace it
with your own.
3 Press Control-Option-Right Arrow until you reach the pop-up menu next to Where.
4 Press Control-Option-Space bar to open the pop-up menu so you can choose where
you want to save the document. Choose a folder from the list.
This pop-up menu shows folders that you use frequently. If you don’t find the location
you want, you can press the disclosure button again to open a navigation window. For
this exercise, any folder in the pop-up menu will do.
5 Press Control-Option-Right Arrow until you reach the Save button and press ControlOption-Space bar to click it.9
79
9 Advanced Navigation Skills
This chapter explains how to navigate using the VoiceOver
cursor, keyboard cursor, and mouse pointer—separately and
together.
Using the keyboard, mouse pointer, and VoiceOver cursor independently can give you
more flexibility as you work. You’ve already been introduced to cursor tracking, but this
chapter provides detailed information. This chapter also provides information about
making the mouse more accessible.
Full Keyboard Navigation and VoiceOver
Mac OS X has built-in keyboard navigation separate from VoiceOver. Users who don’t
use VoiceOver can still use their keyboards to navigate menus, select checkboxes and
radio buttons, press buttons, and enter text in text fields. Full keyboard access and
VoiceOver work together seamlessly, so you can take advantage of all the built-in
keyboard shortcuts along with the powerful commands in VoiceOver.
Try the exercise at the end of this chapter to practice using full keyboard navigation to
switch between applications.
You can find more information about using full keyboard access in Mac Help and in the
Keyboard & Mouse preferences pane in System Preferences.
Advanced Cursor Tracking
When you use the keyboard to move to a control, the keyboard is “focused” there. The
item is highlighted, or a blinking i-beam cursor appears in a text document to show
where the next keyboard action will occur. The mouse pointer and the keyboard focus
are closely linked; for example, when you use the mouse to select a file, the keyboard
focus also moves to the file.80 Chapter 9 Advanced Navigation Skills
VoiceOver preferences are set so that the keyboard focus and the VoiceOver cursor
track each other. This is called cursor tracking. Wherever you move the keyboard focus
with the Tab or Arrow keys using full keyboard navigation, the VoiceOver cursor follows.
When you move the VoiceOver cursor, the keyboard focus follows if it can. The
keyboard can’t move to every item on the screen the way VoiceOver can.
You can also work with cursor tracking turned off. When you turn off cursor tracking,
you can leave your keyboard focus in one place and move the VoiceOver cursor around
to read a dialog that just appeared, check email, or perform other tasks while your
keyboard focus stays where you left it. With a simple command, you quickly bring them
back together.
You can do the same for the mouse. For example, you could use the mouse or Mouse
Keys to locate something on the screen, and then use a command to move the
VoiceOver cursor to where the mouse pointer is located.
Using the Cursor Control Keys
You can use the mouse, keyboard, and VoiceOver cursor to navigate to text and objects
that appear on your screen. VoiceOver uses three function keys to describe the
keyboard, VoiceOver cursor, and mouse pointer.
Note: If you use a portable computer and have not changed the default settings for
the function keys in Keyboard & Mouse preferences, you must press the Fn key to use
these keys for VoiceOver commands. See “Using Function Keys on Portable Computers”
on page 18.
F3—The VoiceOver Cursor Key
 Press Control-Option-F3 to hear a description of the item in the VoiceOver cursor. This
could be a control, text in a document, an HTML content area, and more. The
description includes the current state of the item. For example, you might hear that
the checkbox is selected, or hear the value settings of a slider.
F4—The Keyboard Key
 Press Control-Option-F4 to hear a description of the item on which the keyboard is
focused. The description includes the current state of the item, and, if it applies,
whether it is enabled or disabled.
 Press Control-Option-Shift-F4 to move the VoiceOver cursor to where the keyboard is
focused. When you move the keyboard focus, the VoiceOver cursor remains where
you moved it. Use this command when cursor tracking is turned off.
 Press Control-Option-Command-F4 to move the keyboard focus to the VoiceOver
cursor. When you move the keyboard focus again, the VoiceOver cursor does not
move with it. Use this command when cursor tracking is turned off.Chapter 9 Advanced Navigation Skills 81
F5—The Mouse Key
 Press Control-Option-F5 to hear a description of what is under the mouse pointer.
 Press Control-Option-F5 a second time to hear the location of the mouse pointer as x
and y coordinates. The origin point is the top-left corner of the main display, where
the Apple menu is located.
 Press Control-Option-Shift-F5 to move the VoiceOver cursor to where the mouse
pointer is located. When you move the mouse, the VoiceOver cursor remains where
you moved it. Use this command when cursor tracking is turned off, or if you don’t
have mouse tracking options turned on in VoiceOver Utility.
 Press Control-Option-Command-F5 to move the mouse pointer to the VoiceOver
cursor. When you move the mouse again, the VoiceOver cursor does not move with
it. Use this command when cursor tracking is turned off, or if you don’t have mouse
tracking options turned on in VoiceOver Utility.
Try the exercise at the end of this chapter to practice moving the cursors
independently.
Using the Mouse With VoiceOver
VoiceOver and Mac OS X provide several options to help you use the mouse.
Mouse Settings in VoiceOver Utility
The Verbosity pane of VoiceOver Utility includes two very useful settings for using your
mouse with VoiceOver:
Select the “Speak text under mouse after delay” checkbox so that you can hear the text
under the mouse pointer. If you have some vision but have trouble reading text, this is
one way to use the mouse selectively to read.
VoiceOver follows your punctuation settings when it reads text under the mouse. So, if
you want to hear text attributes, you also hear them for the text under the mouse
pointer.
You can move the slider next to the checkbox to set the amount of time you want
VoiceOver to wait before speaking. Move the slider left to shorten the delay and to the
right for a longer delay.
The “Announce when mouse cursor enters a window” checkbox sets VoiceOver to
announce the name of the window the mouse enters. This can be useful if you have
little or no vision but want to use the mouse to locate items on the screen. When you
move the mouse to a new window, VoiceOver says “entering” and the name of the
window.82 Chapter 9 Advanced Navigation Skills
Making the Mouse Pointer More Visible
In Mac OS X, you can increase the size of the mouse pointer so that you can locate it
more easily on the screen. When the pointer changes to an insertion point, crosshair, or
any other shape, these shapes are also magnified.
To increase the size of the mouse pointer:
1 Click the System Preferences icon in the Dock or choose Apple menu > System
Preferences to open System Preferences.
2 Click the Mouse button. On a portable computer, click Mouse & Trackpad.
3 Move the Cursor Size slider to the right to make it larger.
If you need to make the mouse pointer very large, you might need to practice placing
the pointer correctly to activate controls.
Using the Numeric Keypad to Control the Mouse
If you are able to see the mouse pointer but have difficulty using the mouse, you can
turn on Mouse Keys in Universal Access preferences. Mouse Keys lets you use the
numeric keypad to move the pointer and click items on the screen. When Mouse Keys
is turned on, you use the numeric keypad keys to move the mouse pointer. If you are
using the built-in keyboard on a portable computer, press the Fn key to use the U, I, O,
J, K, L, and M keys as a numeric keypad. If you have difficulty finding these keys, use the
VoiceOver Keyboard Practice feature described in Chapter 3.
To turn on Mouse Keys:
1 Open System Preferences and click Universal Access.
2 Click the Mouse button. On a portable computer, click the Trackpad & Mouse button
instead.
3 Select the On button for Mouse Keys.
The table below shows you the keys to press for a standard keyboard and a portable
computer keyboard.
To use the numeric keypad to control the mouse:
Action Shortcuts Portable Computer Shortcuts
Move up 8 8
Move down 2 K
Move left 4 U
Move right 6 O
Move diagonally 1, 3, 7, 9 J, L, 7, 9
Click the mouse button 5 IChapter 9 Advanced Navigation Skills 83
For more information about this and other accessibility features, see Mac Help.
Quickly Navigating to Content Areas
VoiceOver treats the items in a window as a continuous loop, so if you are at the top of
a window and press Control-Option-Left Arrow, you go to the last item in the window.
You hear audible cues when you wrap to the next line, or wrap from top to bottom or
bottom to top.
If the VoiceOver cursor is in a webpage or a text document, the application may have a
lot of controls at the top of the window, such as buttons, links, tab markers, or
bookmarks. If you just want to get to the main body of the content quickly without
having to key through all these items, you can avoid them by moving backward one or
two places. For websites and other windows, this often places the VoiceOver cursor on
the HTML content area or the text area.
To move to the bottom quickly:
m Press Control-Option-Left Arrow.
You can also use a VoiceOver command to move to the last item on the page, which is
often an HTML content area or a text area.
To move to the last item on the page:
m Press Control-Option-Shift-End, or Fn-Control-Option-Right Arrow on a portable
computer.
Chapter 9 Exercises
The following exercises will help you practice using cursor navigation and full keyboard
navigation.
Exercise 9.1: Using Command-Tab to Switch Applications
In this exercise, you’ll use a keyboard command to hear which applications are open
and switch to one of them. For a better experience, you should have several
applications open.
1 Press and hold the Command key.
2 Press the Tab key to hear the open applications. Each time you press Tab, you hear the
next open application.
Hold down the mouse button 0 M
Release the mouse button Period (.) Period (.)
Action Shortcuts Portable Computer Shortcuts84 Chapter 9 Advanced Navigation Skills
3 Release the keys when you hear the application you want to switch to. If the
application has an open window, the window becomes active and the VoiceOver cursor
moves there. If no window is open, the application becomes active and you can begin
using its menu to perform actions.
Exercise 9.2: Moving Cursors Independently
In this exercise, you’ll move the VoiceOver cursor to a text field and start typing. Next,
you’ll turn off cursor tracking and try the same thing. Notice the different experience.
1 Press Command-F5 to turn on VoiceOver.
2 Make sure the Finder is the active application. Then press Command-N to open a new
Finder window.
3 Press and hold the Control and Option keys while you press the Right Arrow keys.
Listen to the descriptions of items and stop when you hear “search text field.”
4 Type some text in the field.
5 Notice that you could type in the field because the keyboard and VoiceOver cursor
were in the same location. Now see what happens when you turn off cursor tracking.
6 Press Control-Option-Left Arrow until you hear “list view switcher radio button.”
7 Press Control-Option-Shift-F3. You hear “disable cursor tracking.”
8 Press Control-Option-Right Arrow until you hear “search text field.” Notice that the List
View Switcher button is highlighted and the search field is in the VoiceOver cursor.
9 Press the Return key. The keyboard presses the List View Switcher button and the
Finder window view changes.
10 Type some text and notice that no keys register. This is because the keyboard is still on
the List View Switcher button.
11 Press Control-Option-Command-F4 and start typing. Notice that the keyboard focus
moves to the search text field so that you can type. 85
Appendix
VoiceOver Commands
You use the Control and Option keys with other keys to
control VoiceOver. If you have an iBook or PowerBook
computer, you may need to press the Fn key when you press
a function key.
Action Commands
General
Lock and unlock the Control and Option keys Control-Option-Semicolon (;)
Turn VoiceOver on and off Command-F5
Open the VoiceOver menu Control-Option-F7
Open VoiceOver Help Control-Option-Question mark (?)
Get help for an item Control-Option-H
Open the Commands menu for an item Control-Option-H two times
Open VoiceOver Utility Control-Option-F8
Start keyboard practice Control-Option-K
Close a menu, stop an action, or exit a mode Control-Option-Escape (Esc)
Tell VoiceOver to ignore the next key
combination you press
Control-Option-Tab
Change the speech, rate, pitch, and volume Control-Option-Command-Right Arrow or
Control-Option-Command-Left Arrow to move
to the next or previous setting (rate, then pitch,
then volume). Then press Control-OptionCommand-Up Arrow to increase and ControlOption-Command-Down Arrow to decrease.
Change the amount of detail (verbosity) you
hear for typing echo, punctuation, and text
attributes
Control-Option-V
Then press the Left or Right Arrow key to
choose the setting: typing echo, punctuation,
or text attributes. Use the Up and Down Arrow
keys to change the level for the setting. Press
the Escape key to leave this mode.
Magnify the item in the VoiceOver cursor Control-Option-Right brace ( } )86 Appendix VoiceOver Commands
Shrink the item in the VoiceOver cursor Control-Option-Left brace ( { )
Temporarily hide or show the VoiceOver cursor
and caption panel
Control-Option-F11
Dim the screen, highlight the caption panel,
and show the item in the VoiceOver cursor in
the center of the screen (tile visuals)
Control-Option-F10
Press again to return to the normal view.
Resize or move the caption panel Control-Option-Shift-F10
Press again to cycle through these actions.
Then use the arrow keys to resize the caption
panel or move it. Press the Shift key with the
arrow keys to move in smaller increments.
Increase the font size in the caption panel Control-Option-Command-right bracket (])
Decrease the font size in the caption panel Control-Option-Command-left bracket ([)
Turn the screen black (screen curtain) Control-Option-Shift-F11
Orientation
Application summary Control-Option-F1
Application Chooser menu Control-Option-F1 two times
Window summary Control-Option-F2
Window Chooser menu for the active
application
Control-Option-F2 two times
Describe the item in the VoiceOver cursor Control-Option-F3
Describe the item that has keyboard focus Control-Option-F4
Describe the item under the mouse pointer Control-Option-F5
Describe the location of the mouse in x, y
coordinates (from top-left corner of screen)
Control-Option-F5 two times
Click the item under the mouse pointer Control-Option-Shift-Space bar
Press once for a single mouse click and two
times to double-click.
Describe the selected item Control-Option-F6
Read everything in the VoiceOver cursor Control-Option-A
Read everything visible in the window Control-Option-Shift-W
Repeat the last spoken phrase Control-Option-Z
Save the last spoken phrase and the crash log
to a file on the desktop for troubleshooting
Control-Option-Shift-Z
Navigation
Move up Control-Option-Up Arrow
Move down Control-Option-Down Arrow
Move to previous Control-Option-Left Arrow
Move to next Control-Option-Right Arrow
Action CommandsAppendix VoiceOver Commands 87
Move to the top of the visible area, such as the
window or text area, where the VoiceOver
cursor is located
Control-Option-Home
On a portable computer, press Fn-ControlOption-Left Arrow.
Move to the bottom of the visible area, such as
the window or text area, where the VoiceOver
cursor is located
Control-Option-End
On a portable computer, press Fn-ControlOption-Left Arrow.
Move to the top of the area, such as the
window or text area, where the VoiceOver
cursor is located, scrolling if necessary
Control-Option-Shift-Home
On a portable computer, press Fn-ControlOption-Shift-Left Arrow.
Move to the bottom of the area, such as the
window or text area, where the VoiceOver
cursor is located, scrolling if necessary
Control-Option-Shift-End
On a portable computer, press Fn-ControlOption-Shift-Right Arrow.
Move to the top of the window Control-Option-Command-Home
On a portable computer, press Fn-ControlOption-Command-Left Arrow.
Move to the bottom-right corner of the
window
Control-Option-Command-End
On a portable computer, press Fn-ControlOption-Command-Right Arrow.
Move to the front the window where the
VoiceOver cursor is located and make it active
Control-Option-Shift-F2
Close the window where the VoiceOver cursor
is located
Control-Option-Command-F2
List the links on a page Control-Option-U
List the items in a window Control-Option-I
Move to the Dock Control-Option-D
Move to the Desktop Control-Option-Shift-D
Move to the menu bar Control-Option-M
Move to the first status menu in the menu bar Control-Option-M two times
Open the Spotlight menu Control-Option-M three times
Open a contextual menu Control-Option-Shift-M
Jump to a linked item (for example, from a Mail
message in the Inbox to its message text)
Control-Option-J
Move to the next frame in an HTML content
area (such as a webpage)
Control-Option-Command-M
Move to the previous frame in an HTML
content area (such as a webpage)
Control-Option-Command-Shift-M
Move back, retracing the movements of the
VoiceOver cursor
Control-Option-Left bracket ([)
Move forward, retracing the movements of the
VoiceOver cursor
Control-Option-Right bracket (])
Turn cursor tracking on or off temporarily Control-Option-Shift-F3
Action Commands88 Appendix VoiceOver Commands
Move VoiceOver cursor to keyboard focus Control-Option-Shift-F4
Move keyboard focus to VoiceOver cursor Control-Option-Command-F4
Move VoiceOver cursor to mouse Control-Option-Shift-F5
Move mouse to VoiceOver cursor Control-Option-Command-F5
Text
Read all text
If you are interacting with the text, this
command reads from the VoiceOver cursor to
the end of the text.
Control-Option-A
Get text attributes Control-Option-T
Add a bookmark in text Control-Option-Shift-1
Jump to a bookmark in text Control-Option-1
Read paragraph in VoiceOver cursor Control-Option-P
Read next paragraph Control-Option-Shift-Page Down
Read previous paragraph Control-Option-Shift-Page Up
Read sentence in VoiceOver cursor Control-Option-S
Read next sentence Control-Option-Page Down
Read previous sentence Control-Option-Page Up
Read line in VoiceOver cursor Control-Option-L
Read next line Control-Option-Down Arrow
Read previous line Control-Option-Up Arrow
Read word in VoiceOver cursor Control-Option-W
Press twice to hear the word spelled; press a
third time to hear the word spelled
phonetically.
Read next word Control-Option-Right Arrow
Read previous word Control-Option-Left Arrow
Read character in VoiceOver cursor Control-Option-C
Press twice to hear the phonetic character.
Read next character Control-Option-Shift-Right Arrow
Read previous character Control-Option-Shift-Left Arrow
Move to first visible word Control-Option-Home
On a portable computer, press Fn-ControlOption-Left Arrow.
Move to last visible word Control-Option-End
On a portable computer, press Fn-ControlOption-Right Arrow.
Action CommandsAppendix VoiceOver Commands 89
Move to beginning of text, scrolling if
necessary
Control-Option-Shift-Home
On a portable computer, press Fn-ControlOption-Shift-Left Arrow.
Move to end of text, scrolling if necessary Control-Option-Shift-End
On a portable computer, press Fn-ControlOption-Shift-Left Arrow.
Add new tab stop (in TextEdit) Control-Option-Space bar
Delete the current tab stop (in TextEdit) Control-Option-Delete
Interact with tab stop (in TextEdit) Control-Option-Shift-Down Arrow
Then use the Left and Right arrow keys to
move the stop.
Interaction
Interact with an item Control-Option-Shift-Down Arrow
Stop interacting with an item Control-Option-Shift-Up Arrow
Perform the default action for a selected item Control-Option-Space bar
Select a menu or list item Control-Option-Return
Select multiple items Control-Option-Command-Space bar
Turn off cursor tracking to use this command.
Click the item under the mouse pointer Control-Option-Shift-Space bar
Press once for a single mouse click and two
times to double-click.
Open or close a disclosure triangle Control-Option-Backslash (\)
Read a row in a table or outline Control-Option-R
Read the column header in a table or outline Control-Option-Shift-C
Sort a column Control-Option-Vertical line (|)
Interact with scroll bars Control-Option-Shift-S
Then use the arrow keys to scroll up or down or
side to side. Use Page Up and Page Down to
scroll vertically one page at a time. Use ShiftPage Up and Shift-Page Down to scroll
horizontally one page at a time.
Resize a window Control-Option-Tilde (~)
Then use the arrow keys to make the window
taller, shorter, wider, or narrower. Use Shift with
the arrow keys to resize in smaller increments.
Move or drag a window Control-Option-Accent (`)
Then use the arrow keys to move the window.
Use Shift with the arrow keys to move in
smaller increments.
Stop scrolling, resizing, or dragging Control-Option-Escape (Esc)
Action Commandswww.apple.com/accessibility/voiceover
© 2005 Apple Computer, Inc. All rights reserved.
Apple, the Apple logo, iPod, Mac, Macintosh, and Mac OS are trademarks of Apple
Computer, Inc., registered in the U.S. and other countries. Finder, Safari, and Spotlight
are trademarks of Apple Computer, Inc. Other product and company names
mentioned herein may be trademarks of their respective companies. 019-0517
Velkommen. Du ser Apple TV.
Denne håndbog indeholder alle de oplysninger, du
skal bruge, så du kan gå direkte fra indstilling til sofa.Indholdsfortegnelse
1. Tilslut
2. Konfigurer
7 Hvad er der i kassen?
8 Hvad du behøver
10 Kast et blik på Apple TV
12 Indstille Apple TV
18 Netværkskonfiguration
19 Oprette forbindelse til iTunes3. Klar, parat, se
4. Problemer? Ingen problemer
22 Bruge Apple Remote
23 Fjernbetjeningens funktioner i grundtræk
23 Parre Apple TV med en fjernbetjening
24 Ophæve pardannelsen mellem Apple TV
og en fjernbetjening
25 Udskifte batteriet i fjernbetjeningen
26 Leje film
28 Fejlfinding
33 Indikatorlampe
34 Service og support
34 Serienummer
35 Vedligeholdelse og
rengøring1
1 Tilslut
www.apple.com/dk/support/appletv6 Kapitel 1 Tilslut
Med Apple TV kan du leje film i høj opløsning eller købe tv-udsendelser, musik og
musikvideoer fra iTunes Store samt se podcasts og YouTube-videoer – alt sammen
uden at forlade sofaen. Du kan nyde digitale fotografier i høj opløsning fra dit .Macwebgalleri, Flickr, din Mac eller pc. Og du kan altid nyde yndlingsindholdet fra din
Mac eller pc.
Læs oplysningerne i dette kapitel for at komme i gang.
Hvis du vil have oplysninger om Se
Hvad du har brug for “Hvad du behøver” på side 8
Opstilling “Indstille Apple TV” på side 12
Indstilling af netværksforbindelsen “Konfigurer” på side 17
Brug af Apple Remote “Klar, parat, se” på side 21
Fejlfinding til Apple TV “Problemer? Ingen problemer” på side 27
Sikkerhed og garanti til Apple TV Vejledning med vigtige produktoplysninger til
Apple TVKapitel 1 Tilslut 7
Hvad er der i kassen?
Bemærk: Netledningen ser måske anderledes ud end den, der vises på billedet.
Netledning Apple Remote
MENU8 Kapitel 1 Tilslut
Hvad du behøver
Før du kan begynde at bruge Apple TV, skal du have følgende:
Et fjernsyn med bred skærm
Et fjernsyn med bred skærm og forbedret opløsning eller HD (high-definition),
som kan arbejde med mindst en af følgende opløsninger:
 1080p
 1080i
 720p
 576p
 480p
Kabler
 Et HDMI-kabel eller
 Component videokabler med analoge lydkabler eller et optisk lydkabelKapitel 1 Tilslut 9
Netværk
 Et kabelbaseret eller trådløst netværk
 En bredbåndsforbindelse til Internet (DSL, kabel, LAN)
 En adgangskode til det trådløse netværk (hvis du bruger en)
Computer og software
Computeren skal opfylde følgende systemkrav, før du kan afspille indhold fra en Mac
eller pc på Apple TV:
 En Mac med Mac OS X v10.3.9 eller v10.4.7 eller en nyere version
 En pc med Windows XP Home eller Professional (SP2) eller en 32 bit version af
Windows Vista
 iTunes 7.6 eller en nyere version
 En iTunes Store-konto10 Kapitel 1 Tilslut
Kast et blik på Apple TV
optical
audio
£ d G audio video R L
IR-modtager
Indikatorlampe
£
d
Port til
strømforsyning
HDMIport
Component
videoporte
Analoge
lydporte
USBport
Optisk digital
lydport
G EthernetportKapitel 1 Tilslut 11
IR-modtager
Bruges sammen med den medfølgende Apple Remote til betjening af Apple TV.
Indikatorlampe
Indikatorlampen blinker orange, når Apple TV starter. Når Apple TV er tændt,
lyser statusindikatoren hvidt. Der findes flere oplysninger om indikatorlampen
i “Indikatorlampe” på side 33.
d USB-port
Til service og diagnosticering.
≤ Netstik
Sæt den medfølgende netledning i Apple TV.
G Ethernet-port
Hvis du opretter forbindelse til netværket vha. Ethernet, skal du tilslutte et
Ethernet-kabel.
£ HDMI-port
Slut Apple TV til et fjernsyn med bred skærm via en HDMI-port vha. et HDMIkabel eller via en DVI-port vha. et HDMI-til-DVI-kabel.
Component videoporte
Slut Apple TV til et fjernsyn med bred skærm via component videoporte
(Y, Pb og Pr) vha. et component videokabel med et grønt, blåt og rødt stik.
Analoge lydporte
Slut Apple TV til et fjernsyn med bred skærm eller en hjemmebiografmodtager
via analoge lydporte (rød og hvid) vha. et analogt lydkabel.
Optisk digital lydport
Slut Apple TV til en hjemmebiografmodtager med en optisk digital lydport vha.
et optisk digitalt lydkabel (kaldes også et S/PDIF- eller TOSLINK-kabel).
Z Indbygget trådløst Wi-Fi-/AirPort-netværk
Slut Apple TV til det trådløse netværk.12 Kapitel 1 Tilslut
Indstille Apple TV
Apple TV tilsluttes fjernsynet via en HDMI-port, som både leverer lyd og video til
fjernsynet, eller via component video- og lydporte. Før du tilslutter udstyret, skal
du kontrollere, om du har de korrekte kabler til portene på bagsiden af fjernsynet.
Du kommer i gang på følgende måde:
 Sæt lyd- og videokablerne i Apple TV og dit fjernsyn med bred skærm
 Slut Apple TV til det trådløse netværk eller Ethernet-netværket
 Installer den nyeste version af iTunes på computeren, hvis du vil afspille indhold fra
computeren via Apple TV
Du kan slutte Apple TV til et bredt fjernsyn, der har:
 En HDMI-port – brug et HDMI-kabel til både video og lyd
 Component videoporte (Y, Pb og Pr) – brug et component videokabel med et grønt,
blåt og rødt stik og et lydkabel
Du kan også slutte Apple TV til en hjemmebiografmodtager eller et fjernsyn, som har
en DVI-port, vha. et HDMI-til-DVI-kabel til video og et lydkabel.
Vigtigt: Før du slutter Apple TV til en stikkontakt, skal du læse alle instruktionerne til
installering nedenfor og sikkerhedsoplysningerne i den medfølgende Vejledning med
vigtige produktoplysninger.Kapitel 1 Tilslut 13
Trin 1: Tilslutte kablerne
Vælg den opstilling, der passer til portene på fjernsynet eller modtageren.
Du tilslutter et fjernsyn med bred skærm via en HDMI-port på følgende måde:
1 Sæt den ene ende af et HDMI-kabel i porten på bagsiden af fjernsynet.
2 Sæt den anden ende i porten på bagsiden af Apple TV.
Hvis fjernsynets HDMI-port bruges af en anden enhed, eller hvis fjernsynet ikke har en
HDMI-port, kan du tilslutte Apple TV vha. component video- og lydkabler.
optical
audio
G £ d audio video R L
Apple TV
Fjernsyn
HDMI-port
HDMI-port
HDMI-kabel14 Kapitel 1 Tilslut
Du tilslutter et fjernsyn med bred skærm via en component video- og analog
lydport på følgende måde:
1 Sæt det grønne, blå og røde stik i den ene ende af et component videokabel i Y-, Pb-
og Pr-portene på fjernsynet, og sæt stikkene i den anden ende af kablet i portene på
Apple TV.
2 Sæt den ene ende af et analogt lydkabel med røde og hvide stik i Apple TV, og sæt den
anden ende i fjernsynet.
Bemærk: Den indbyggede 802.11 Wi-Fi-funktion forbinder Apple TV med det trådløse
netværk. Hvis dit netværk er Ethernet-baseret, skal du slutte Apple TV til netværket via
et Ethernet-kabel (sælges separat).
optical
audio
G £ d audio video R L
Component
videokabel
Analogt
lydkabel
Apple TV
Fjernsyn
Lyd, venstre (hvid) Videoindgang (Y, Pb, Pr)
Lyd, højre (rød)Kapitel 1 Tilslut 15
Trin 2: Tilslut netledningen
Sæt den ene ende af netledningen i stikket på bagsiden af Apple TV, og den anden
ende i en stikkontakt.
Vigtigt: Anbring ingen genstande oven på Apple TV. Genstande, der anbringes oven på
enheden, kan forårsage forstyrrelse af det trådløse signal.
Trin 3: Tænd fjernsynet, og vælg indgang
Første gang du bruger Apple TV, bliver du ført gennem en række trin, inklusive valg af
sprog, valg af netværk, konfiguration af Apple TV til netværket og oprettelse af
forbindelse til iTunes. Se Kapitel 2, “Konfigurer,” på side 17.
Bemærk: Hvis du kun ser en sort skærm, første gang du bruger Apple TV, skal du
kontrollere, at kablerne er tilsluttet den indgang, der er valgt på fjernsynet eller
modtageren. Hvis det er den rigtige indgang, skal du måske vælge en skærmopløsning,
som fjernsynet understøtter. Der findes oplysninger om fjernsynets indgang
i “Problemer? Ingen problemer” på side 27 og i den dokumentation, der fulgte
med fjernsynet.
Port til
strømforsyning
optical
audio
£ d G audio video R L2
2 Konfigurer
www.apple.com/dk/support/appletv18 Kapitel 2 Konfigurer
Apple TV hjælper dig med at vælge og konfigurere din trådløse netværksforbindelse
og med at oprette forbindelse til iTunes på computeren, hvis du vil se eller høre
indholdet i dit iTunes-bibliotek.
Netværkskonfiguration
Du skal have adgangskoden til netværket (hvis du bruger en) og Apple Remote ved
hånden for at konfigurere Apple TV. Sørg for, at der ikke er nogen forhindringer mellem
fjernbetjeningen og Apple TV. Der findes oplysninger om brug af fjernbetjeningen
i “Klar, parat, se” på side 21. Hvis du:
 Bruger et Ethernet-netværk, finder Apple TV automatisk netværket.
 Bruger et trådløst netværk, hjælper Apple TV dig med at vælge og konfigurere
netværksforbindelsen.
Oprette forbindelse til det trådløse netværk
Apple TV hjælper dig med at oprette forbindelse til det trådløse netværk. Hvis du bruger
en adgangskode til netværket, skal du have den parat. Brug Apple Remote til at:
 Vælge netværket på listen, eller skriv navnet på netværket, hvis netværket er skjult
 Indtaste din adgangskode (hvis du har en)
 Indtaste din IP-adresse, subnetmaske, router- og DNS-adresse (hvis du konfigurerer
netværket manuelt)
Hvis du opretter forbindelse vha. DHCP, skal du måske skrive IP-adressen, subnetmasken
samt router- og DNS-adressen.
Du færdiggør indstilling af netværksforbindelsen ved at følge instruktionerne
på skærmen.Kapitel 2 Konfigurer 19
Oprette forbindelse til iTunes
Før du kan få adgang til indholdet i dit iTunes-bibliotek med Apple TV, skal iTunes 7.6
eller en nyere version være installeret på computeren. Der findes en komplet liste over
systemkrav i “Computer og software” på side 9.
Opdatere iTunes-software
Du kan hente den nyeste version af iTunes fra www.apple.com/dk/itunes/download.
På en Mac kan du også bruge Softwareopdatering til at opdatere til den nyeste version
af iTunes. For at bruge Softwareopdatering skal du vælge Apple () > Softwareopdatering.
Før du kan bruge iTunes 7.6 på en Mac, skal du opdatere System-software til
Mac OS v10.3.9 eller v10.4.7 eller en nyere version og opdatere til QuickTime 7.4
eller en nyere version.
På en Windows-computer kan du også hente den nyeste version af iTunes via iTuneshjælp. Åbn iTunes, og vælg Hjælp > Søg efter opdateringer.
Før du kan bruge iTunes 7.6 på en Windows-computer, skal du have Windows XP eller
en nyere version.20 Kapitel 2 Konfigurer
Oprette par med iTunes
Når du har indstillet netværksforbindelsen, vises der på fjernsynet en adgangskode
på fem tegn, som du skal skrive i iTunes for at synkronisere eller streame indhold fra
computeren til Apple TV.
Du indstiller Apple TV til dit iTunes-bibliotek på følgende måde:
1 Åbn iTunes på computeren.
2 Vælg på listen Enheder symbolet for Apple TV, hvor der ved siden af står “Klik for
at indstille”.
3 Skriv adgangskoden på 5 tegn fra fjernsynet.
Når du skriver adgangskoden, kan du give Apple TV et navn og indstille iTunes til at
administrere indholdet.
Du kan få flere oplysninger om iTunes, hvis du åbner iTunes og vælger Hjælp >
iTunes-hjælp.3
3 Klar, parat, se
www.apple.com/dk/support/appletv22 Kapitel 3 Klar, parat, se
Læs videre, hvis du vil vide, hvordan du parrer og bruger fjernbetjeningen med Apple TV.
Bruge Apple Remote
Brug Apple Remote til at justere Apple TV-indstillinger og navigere gennem dit indhold.
Sørg for, at der ikke er nogen forhindringer mellem fjernbetjeningen og Apple TV.
Næste/spol frem
Vælg/afspil/pause
Batterirum
Flyt op på menu/
rul
IR-vindue
Flyt ned på menu/
rul
Forrige/spol tilbage
Menu
MENUKapitel 3 Klar, parat, se 23
Fjernbetjeningens funktioner i grundtræk
Apple Remote har de grundlæggende funktioner, som beskrives nedenfor.
Bemærk: ∂ og D på Apple Remote justerer ikke lydstyrken på fjernsynet eller
modtageren. Brug den fjernbetjening, der fulgte med fjernsynet eller modtageren,
til at ændre lydstyrken.
Parre Apple TV med en fjernbetjening
Apple Remote arbejder vha. den indbyggede IR-modtager på Apple TV. Du kan indstille
Apple TV til kun at arbejde med den medfølgende fjernbetjening ved at parre Apple TV
og fjernbetjeningen.
Du parrer Apple TV med den medfølgende fjernbetjening på følgende måde:
1 Vælg Indstillinger på hovedmenuen på Apple TV.
Hvis du vil... Skal du gøre følgende:
Blade gennem kommandoer på menuer Tryk på ∂ eller D
Vælge en kommando på en menu Tryk på ’
Tilbage til forrige menu Tryk på »
Tilbage til hovedmenuen Tryk på og hold » nede
Sætte Apple TV på standby Tryk på og hold ’ nede i omkring 6 sekunder
Nulstille Apple TV Tryk på og hold » og D nede i omkring
6 sekunder
Parre Apple TV og en fjernbetjening Tryk på og hold » og ‘ nede i omkring
6 sekunder24 Kapitel 3 Klar, parat, se
2 Vælg Par med fjernbetjening.
Du kan også trykke på og holde » og ‘ nede i 6 sekunder for at parre Apple TV og
fjernbetjeningen.
Når du har dannet et par med Apple Remote, viser Apple TV et kædesymbol ( ) over
et billede af en fjernbetjening. Apple TV kan nu kun arbejde med den fjernbetjening,
du har oprettet et par med.
Ophæve pardannelsen mellem Apple TV og en fjernbetjening
Hvis du mister den Apple Remote, som er parret med Apple TV, kan du vha. en hvilken
som helst Apple Remote annullere pardannelsen mellem Apple TV og den mistede
fjernbetjening ved at trykke på og holde » og ] nede i 6 sekunder. Du kan også
følge disse trin.
Du ophæver pardannelsen mellem Apple TV og en fjernbetjening på følgende måde:
1 Vælg Indstillinger på hovedmenuen på Apple TV.
2 Vælg Annuller pardannelse.
Når du har ophævet pardannelsen med den fjernbetjening, du har mistet, viser
Apple TV et brudt kædesymbol ( ) over et billede af en fjernbetjening. Nu kan
du parre Apple TV med en ny Apple Remote.Kapitel 3 Klar, parat, se 25
Udskifte batteriet i fjernbetjeningen
Når spændingen på batteriet i Apple Remote bliver lav, viser Apple TV et billede af en
fjernbetjening og et advarselssymbol (·). Udskift batteriet med et CR2032-batteri.
Du indsætter batteriet igen på følgende måde:
1 Åbn batterirummet ved at trykke på knappen med en lille genstand, indtil
batterirummet skubbes delvist ud.
2 Træk batterirummet ud, og fjern batteriet.
3 Sæt det nye batteri i med den positive side (∂) opad.
4 Sæt batterirummet i fjernbetjeningen igen.
5 Sørg for, at det brugte batteri bliver genbrugt eller destrueret i henhold til
gældende regler.
Tryk på denne knap med en lille genstand.
Positiv (+) side opad.
Træk batterirummet helt ud.
MENU26 Kapitel 3 Klar, parat, se
Leje film
Du kan leje film i SD-format (Standard Definition) med stereolyd og HD-film (High
Definition) med Dolby Digital 5.1 surround sound direkte fra Apple TV. Når du lejer
en film, kan du vente 30 dage, før du begynder at se den. Men når du har trykket
på Afspil, har du 24 timer til at se den, før lejeperioden udløber.
Menuen Lejede film viser, hvornår lejeperioden for filmen udløber. Når lejeperioden
udløber, slettes filmen, så der spares lagringsplads på Apple TV.
Bemærk: Det er ikke i alle områder, at man kan leje film. 4
4 Problemer?
Ingen problemer
www.apple.com/dk/support/appletv28 Kapitel 4 Problemer? Ingen problemer
De fleste problemer med Apple TV kan hurtigt løses ved at følge instruktionerne i dette
kapitel. Der findes flere gode råd og oplysninger om fejlfinding på siden om support til
Apple TV på www.apple.com/dk/support/appletv.
Fejlfinding
Når der opstår et problem med Apple TV, er der som regel en hurtig og nem løsning.
Først skal du sikre dig, at:
 Lyd- og videokablerne mellem Apple TV og fjernsynet er tilsluttet korrekt.
 Netledningen til Apple TV og fjernsynet er sluttet korrekt til en stikkontakt.
 Fjernsynet er tændt og indstillet til den korrekte indgang.
 Apple TV er tilsluttet netværket. Gå til menuen Indstillinger på Apple TV, vælg
Netværk, og se efter, om Apple TV har en IP-adresse.
 Netværks- og Internetforbindelsen er slået til og fungerer korrekt.
Hvis der stadig er problemer, kan du prøve at nulstille udstyret ved at afmontere
netledningen til Apple TV, fjernsynet, det trådløse netværksudstyr eller AirPort-basen
og routeren. Vent 30 sekunder, og tilslut derefter alle enhederne igen.Kapitel 4 Problemer? Ingen problemer 29
Hvis fjernbetjeningen ikke virker:
 Hvis du har parret Apple TV med en Apple Remote, skal du huske at bruge den
rigtige fjernbetjening.
 Hvis du bruger den rigtige fjernbetjening, og statusindikatoren på Apple TV blinker
hvidt, når du trykker på knapperne på fjernbetjeningen, skyldes problemet ikke
fjernbetjeningen. Se “Hvis du kan se et billede, men Apple TV ikke svarer” på
side 30.
 Hvis du bruger en forkert fjernbetjening, blinker indikatorlampen på Apple TV
orange.
 Hvis du har parret Apple TV og en Apple Remote og ikke kan finde den rigtige
fjernbetjening, kan du indstille Apple TV til at arbejde med alle Apple Remotefjernbetjeninger ved at trykke på og holde » og ] nede i 6 sekunder.
 Peg direkte på Apple TV med fjernbetjeningen.
 Sørg for, at IR-modtageren på forsiden af Apple TV ikke er dækket.
 Hvis Apple TV viser et billede af en fjernbetjening og et advarselssymbol (·), skal
du udskifte batteriet i fjernbetjeningen. Se “Udskifte batteriet i fjernbetjeningen” på
side 25.
Hvis Apple TV ikke kan få adgang til netværket
 Se, hvilken IP-adresse Apple TV bruger. Hvis den begynder med 169.x.x.x, er routeren
eller basen måske ikke konfigureret korrekt. Se efter, om det er muligt at bruge
DHCP-adgang, eller konfigurer Apple TV med en manuel IP-adresse.
 Se efter evt. forhindringer, og flyt basen eller Apple TV.
 Hvis netværkssikkerhed er slået til, kan du prøve at slå den midlertidigt fra på basen
og derefter prøve at oprette forbindelse igen.30 Kapitel 4 Problemer? Ingen problemer
 Apple TV kan ikke oprette forbindelse til et trådløst netværk, hvis netværkets navn
eller adgangskode indeholder udvidede ASCII-tegn eller tegn med to byte (Unicode),
f.eks. japansk, koreansk eller kinesisk.
 Hvis sikkerhed er slået til på netværket, skal du sikre dig, at du har indtastet den
korrekte adgangskode.
Hvis billedet på fjernsynsskærmen er uskarpt eller sort
 Kontroller, at du bruger de korrekte videokabler, og at de sidder korrekt i Apple TV
og fjernsynet.
 Sørg for, at videokablerne er sluttet til den indgang, der er valgt på fjernsynet.
Der findes flere oplysninger i den dokumentation, der fulgte med fjernsynet.
Hvis billedet på fjernsynsskærmen stadig er uskarpt eller sort, skal du måske vælge en
videofunktion, som fjernsynet understøtter.
Du vælger en videofunktion på følgende måde:
1 Tryk på og hold » og ∂ på Apple Remote nede i omkring 6 sekunder.
2 Tryk på ∂ eller D på Apple Remote for at blade gennem skærmopløsningerne.
3 Når Apple TV viser en acceptabel skærmopløsning, og meddelelsen “Klik på OK, hvis du
kan se Apple-logoet” vises på fjernsynet, skal du trykke på ’ .
Hvis du kan se et billede, men Apple TV ikke svarer
 Prøv at holde » nede på Apple Remote for at vende tilbage til hovedmenuen på
Apple TV.
 Sørg for, at fjernsynet er tilsluttet og virker korrekt. Der findes flere oplysninger i den
dokumentation, der fulgte med fjernsynet.Kapitel 4 Problemer? Ingen problemer 31
 Hvis du har parret en Apple Remote med Apple TV, skal du huske at bruge den
rigtige fjernbetjening. Se “Parre Apple TV med en fjernbetjening” på side 23.
 Nulstil Apple TV ved at afmontere netledningen, og vent omkring 5 sekunder, før du
tilslutter den igen. Du kan også trykke på og holde » og D på Apple Remote nede
i omkring 6 sekunder for at nulstille Apple TV. Film og andet indhold bevares på
Apple TV.
Hvis Apple TV stadig ikke svarer, kan du prøve at gendanne de originale
fabriksindstillinger ved at nulstille enheden
 Tryk på og hold » og D på Apple Remote nede i 6 sekunder, eller indtil
indikatorlampen blinker orange.
 Vælg sprog.
 Vælg Nulstil enhed.
Under gendannelse af fabriksindstillingerne roterer statusindikatoren (et tandhjul) et
stykke tid. Hav tålmodighed.
 Hvis netværket ikke bruger DHCP, skal du vælge Konfigurer TCP/IP og anføre
TCP/IP-konfigurationen.
 Hvis Apple TV stadig ikke vises på kildelisten i iTunes, kan du finde flere oplysninger
på siden om support til Apple TV: www.apple.com/dk/support/appletv
Hvis du ikke kan høre lyden
 Hvis Apple TV er sluttet til en A/V-modtager, skal du sørge for, at modtageren
er tændt.
 Sørg for, at lydkablerne er sluttet til den indgang, der er valgt på modtageren.
Der findes flere oplysninger i den dokumentation, der fulgte med modtageren.32 Kapitel 4 Problemer? Ingen problemer
 Sørg for, at der er skruet op for lyden på fjernsynet eller modtageren, og at lyden ikke
er slået fra.
 Sørg for, at du bruger det korrekte lydkabel (se side 13), og at det sidder korrekt i
Apple TV og fjernsynet.
 Hvis du bruger HDMI-porten på fjernsynet og Apple TV, skal du sikre dig, at fjernsynet
understøtter lyd via HDMI-porten. HDMI-portene på nogle ældre fjernsyn
understøtter kun video.
Hvis Apple TV ikke vises i iTunes
 Sørg for, at Apple TV er tændt og sluttet til netværket. Gå til menuen Indstillinger på
Apple TV, vælg Netværk, og se efter, om Apple TV har en IP-adresse.
 Vælg Indstillinger i iTunes, klik på Apple TV, og sørg for, at “Søg efter Apple TVenheder” er valgt.
 Hvis Firewall er slået til (i vinduet Deling i Systemindstillinger), skal du sørge for, at
“Apple TV-deling” er valgt, så indholdet kan passere firewallen.
Hvis andre Apple TV-enheder af og til vises på listen Enheder i iTunes
 Det betyder, at iTunes har fundet andre Apple TV-enheder på netværket. Du kan
forhindre dette ved at vælge Indstillinger i iTunes, klikke på Apple TV og sørge for,
at “Søg efter Apple TV-enheder” ikke er valgt.
Hvis Apple TV ikke afspiller fotoalbum eller lysbilledshow
 Sørg for, at fotografierne ligger i fotobiblioteket eller i en mappe på computeren.Kapitel 4 Problemer? Ingen problemer 33
Indikatorlampe
Apple TV har en indikatorlampe på forsiden, så du kan se, hvad der sker.
Apple TV Indikatorlampen
Tændt Lyser hvidt
Slukket eller på standby Slukket
Starter Blinker orange
Modtager en kommando fra fjernbetjeningen Blinker hvidt en gang
Afviser en kommando fra fjernbetjeningen
(du har parret en fjernbetjening med Apple TV,
men bruger ikke den rigtige fjernbetjening)
Blinker orange en gang
Har problemer Skifter mellem hvid og orange34 Kapitel 4 Problemer? Ingen problemer
Service og support
Der findes flere oplysninger om brug af Apple TV i hjælpen på skærmen og på Internet.
Den følgende tabel beskriver, hvor du kan få software og serviceoplysninger.
Serienummer
Serienummeret er trykt i bunden af Apple TV. Du kan også se serienummeret på
menuen Indstillinger på Apple TV. Vælg Indstillinger > Om på Apple TV.
Hvis du vil læse om Skal du gøre følgende:
Service og support, diskussioner, øvelser og
Apple-softwareoverførsler
Gå til: www.apple.com/dk/support/appletv
Brug af iTunes Åbn iTunes, og vælg Hjælp > iTunes-hjælp. Du
kan finde en iTunes-øvelse på Internet (findes
kun i nogle lande) på adressen:
www.apple.com/dk/support/itunes
Brug af iPhoto (med Mac OS X) Åbn iPhoto, og vælg Hjælp > iPhoto-hjælp.
Sidste nyt om Apple TV Gå til: www.apple.com/dk/support/appletv
Oplysninger om sikkerhed og overholdelse
af regler
Se Vejledning med vigtige produktoplysninger,
der følger med Apple TV.
Service i henhold til garanti Følg først rådene i hæftet Vejledning med vigtige
produktoplysninger, hjælpen på skærmen og
ressourcerne på Internet. Hvis enheden ikke
fungerer, kan du på www.apple.com/dk/
support/appletv få oplysninger om, hvordan du
får service i henhold til garantien.
Registrering af Apple TV Gå til: www.apple.com/dk/registerKapitel 4 Problemer? Ingen problemer 35
Vedligeholdelse og rengøring
Bruge stik og porte
Tving aldrig et stik ind i en port. Se efter evt. forhindringer i porten. Hvis stikket ikke
kan sættes i porten uden besvær, passer de sandsynligvis ikke sammen. Sørg for, at du
bruger det rigtige stik, og hold stikket korrekt i forhold til porten.
Holde Apple TV inden for acceptable temperaturer
Brug kun Apple TV på steder, hvor temperaturen er mellem 0º og 40º C.
BEMÆRK: Hvis du ikke følger disse instruktioner til vedligeholdelse og rengøring,
risikerer du at beskadige Apple TV eller andre genstande.36 Kapitel 4 Problemer? Ingen problemer
Rengøre det ydre af Apple TV
Når du vil rengøre Apple TV , skal du afmontere netledningen og alle kabler. Brug
derefter en blød, fnugfri klud. Sørg for, at der ikke kommer fugt i nogen åbninger.
Brug ikke vinduesrens, rengøringsmidler, aerosolspraydåser, opløsningsmidler, alkohol,
ammoniak eller slibemidler til rengøring af Apple TV.
Bortskaffe Apple TV
Der findes oplysninger om korrekt bortskaffelse af Apple TV og andre vigtige
oplysninger om godkendelser i Vejledning med vigtige produktoplysninger.K Apple Inc.
© 2008 Apple Inc. Alle rettigheder forbeholdes.
I henhold til loven om ophavsret må dele af eller hele
dette materiale ikke kopieres uden skriftlig tilladelse
fra Apple.
Apple-logoet er et varemærke tilhørende Apple Inc. og
registreret i USA og andre lande. Brugen af Apple-logoet
på tastaturet til kommercielle formål uden skriftlig
tilladelse fra Apple Computer kan krænke varemærkerettighederne samt være konkurrenceforvridende og
i strid med dansk lovgivning.
Alle oplysningerne i denne håndbog var korrekte på
udgivelsestidspunktet. Apple påtager sig intet ansvar
for evt. oversættelses- eller trykfejl.
Apple
1 Infinite Loop
Cupertino, CA 95014-2084
408-996-1010
www.apple.com
Apple, Apple-logoet, AirPort, Apple TV, iLife, iPhoto,
iTunes, Mac, Macintosh, Mac OS og QuickTime er
varemærker tilhørende Apple Inc. og registreret
i USA og andre lande.
Apple Store og .Mac er servicemærker tilhørende
Apple Inc. og registreret i USA og andre lande.
iTunes Store er et servicemærke tilhørende Apple Inc.
Fremstillet iht. licens fra Dolby Laboratories. “Dolby”,
“Pro Logic” og det dobbelte D-symbol er varemærker
tilhørende Dolby Laboratories. Fortroligt, ikke publiceret
materiale, © 1992-1997 Dolby Laboratories, Inc.
Alle rettigheder forbeholdes.
Det produkt, der beskrives i denne håndbog, indeholder
teknologi til beskyttelse af ophavsret, og denne
teknologi er beskyttet af metodekrav i visse
amerikanske patenter og immaterielle rettigheder ejet
af Macrovision Corporation og andre
rettighedsindehavere. Brug af denne teknologi til
beskyttelse af ophavsret skal godkendes af Macrovision
Corporation og er kun beregnet til hjemmebrug og
andre begrænsede formål, medmindre andet er
godkendt af Macrovision Corporation. Det er forbudt at
foretage strukturelle ændringer og dekompilering.
Apparaturkrav i henhold til de amerikanske
patentnumre 4.631.603, 4.577.216, 4.819.098 og 4.907.093
gives kun i licens til begrænset fremvisning.
Andre firma- og produktnavne kan være varemærker
tilhørende deres respektive ejere. Omtale af
tredjeparters produkter har kun oplysende karakter og
skal ikke opfattes som en anbefaling. Apple påtager sig
ikke noget ansvar for produkternes funktionsdygtighed.
DK034-4570-B
iPod classic
Features Guide2
2 Contents
Chapter 1 4 iPod classic Basics
5 iPod classic at a Glance
5 Using iPod classic Controls
8 Disabling iPod classic Controls
9 Using iPod classic Menus
10 Connecting and Disconnecting iPod classic
14 About the iPod classic Battery
Chapter 2 17 Music Features
17 About iTunes
18 Importing Music into Your iTunes Library
22 Organizing Your Music
22 Adding Music and Podcasts to iPod classic
26 Playing Music
31 Watching and Listening to Podcasts
32 Listening to Audiobooks
32 Listening to FM Radio
Chapter 3 33 Video Features
33 Purchasing or Renting Videos and Downloading
Video Podcasts
34 Converting Your Own Videos to Work with iPod classic
35 Adding Videos to iPod classic
37 Viewing and Listening to Videos
Chapter 4 40 Photo Features
40 Importing Photos
43 Viewing Photos
Chapter 5 46 Extra Features and Accessories
46 Using iPod classic as an External Disk
47 Using Extra Settings
51 Syncing Contacts, Calendars, and To-Do Lists
53 Storing and Reading NotesContents 3
54 Recording Voice Memos
54 Learning About iPod classic Accessories
Chapter 6 56 Tips and Troubleshooting
56 General Suggestions
61 Updating and Restoring iPod Software
Chapter 7 62 Safety and Cleaning
62 Important Safety Information
64 Important Handling Information
Chapter 8 65 Learning More, Service, and Support
Index 681
4
1 iPod classic Basics
Congratulations on purchasing iPod classic. Read this chapter
to learn about the features of iPod classic, how to use its
controls, and more.
To use iPod classic, you put music, videos, photos, and other files on your computer
and then add them to iPod classic.
iPod classic is a music player and much more. Use iPod classic to:
 Sync songs, videos, and digital photos for listening and viewing on the go
 Listen to podcasts, downloadable audio and video shows delivered over the Internet
 View video on iPod classic, or on a TV using an optional cable
 View photos as a slideshow with music on iPod classic, or on a TV using an optional
cable
 Listen to audiobooks purchased from the iTunes Store or audible.com
 Store or back up files and other data, using iPod classic as an external disk
 Sync contact, calendar, and to-do list information from your computer
 Play games, store text notes, set an alarm, and moreChapter 1 iPod classic Basics 5
iPod classic at a Glance
Get to know the controls on iPod classic:
Using iPod classic Controls
The controls on iPod classic are easy to find and use. Press any button to turn on
iPod classic. The main menu appears.
Use the Click Wheel and Center button to navigate through onscreen menus,
play songs, change settings, and view information. Move your thumb lightly around
the Click Wheel to select a menu item. To choose the item, press the Center button.
To go back to the previous menu, press Menu on the Click Wheel.
Hold switch
Menu
Previous/Rewind
Play/Pause
Dock connector
Headphones port
Click Wheel
Next/Fast-forward
Center button6 Chapter 1 iPod classic Basics
Here’s what else you can do with iPod classic controls.
To Do this
Turn on iPod classic Press any button.
Turn off iPod classic Press and hold Play/Pause (’).
Turn on the backlight Press any button or use the Click Wheel.
Disable the iPod classic
controls
(so nothing happens if you press
them accidentally)
Slide the Hold switch to HOLD (an orange bar appears).
Reset iPod classic
(if it isn’t responding)
Slide the Hold switch to HOLD and back again. Press the Menu and
Center buttons at the same time for about 6 seconds, until the
Apple logo appears.
Choose a menu item Scroll to the item and press the Center button.
Go back to the previous menu Press Menu.
Go directly to the main menu Press and hold Menu.
Browse for a song From the main menu, choose Music.
Browse for a video From the main menu, choose Videos.
Play a song or video Select the song or video and press the Center or Play/Pause (’)
button. iPod classic has to be ejected from your computer to play
songs and videos.
Pause a song or video Press Play/Pause (’) or unplug your headphones.
Change the volume From the Now Playing screen, use the Click Wheel.
Play all the songs in a playlist
or album
Select the playlist or album and press Play/Pause (’).
Play all songs in random order From the main menu, choose Shuffle Songs. You can also shuffle
songs from the Now Playing screen.
Skip to any point in a song or
video
From the Now Playing screen, press the Center button to show the
scrubber bar (a diamond icon on the bar shows the current
location), and then scroll to any point in the song or video.
Skip to the next song or
chapter in an audiobook or
podcast
Press Next/Fast-forward (‘).
Start a song or video over Press Previous/Rewind (]).
Play the previous song or
chapter in an audiobook or
podcast
Press Previous/Rewind (]) twice.
Fast-forward or rewind a song Press and hold Next/Fast-forward (‘) or Previous/Rewind (]).
Add a song to the On-The-Go
playlist
Select a song in a playlist, and then press and hold the Center
button until the song title flashes.
Find the iPod classic serial
number
From the main menu, choose Settings > About and press the
Center button until you get to the serial number, or look on the
back of iPod classic.Chapter 1 iPod classic Basics 7
Browsing Music Using Cover Flow
You can browse your music collection using Cover Flow, a visual way to flip through
your library.
To use Cover Flow:
1 From the Music menu, choose Cover Flow.
2 Use the Click Wheel to move through your album art or press the Next/Fast-forward
and Previous/Rewind buttons.
3 Select an album and press the Center button.
4 Use the Click Wheel to select a song and press the Center button to play it.
Scrolling Quickly Through Long Lists
If you have more than 100 songs, videos, or other items, you can scroll quickly through
a long list by moving your thumb quickly on the Click Wheel.
Note: Not all languages are supported.
To scroll quickly:
1 Move your thumb quickly on the Click Wheel, to display a letter of the alphabet on the
screen.
2 Use the Click Wheel to navigate the alphabet until you find the first letter of the item
you’re looking for. This takes you to the first item in the list beginning with that letter.
Items beginning with a symbol or number appear before the letter “A.”
3 Lift your thumb momentarily to return to normal scrolling.
4 Use the Click Wheel to finish navigating to the item you want.
Searching Music
You can search iPod classic for songs, playlists, album titles, artist names, audio
podcasts, and audiobooks. The search feature doesn’t search videos, notes, calendar
items, contacts, or lyrics.
Note: Not all languages are supported.
To search iPod classic:
1 From the Music menu, choose Search.
2 Enter a search string by using the Click Wheel to navigate the alphabet and pressing
the Center button to enter each character.
iPod classic starts searching as soon as you enter the first character, displaying the
results on the search screen. For example, if you enter “b,” then iPod classic displays all
music items containing the letter “b.” If you enter “ab,” iPod classic displays all items
containing that sequence of letters.
To enter a space, press the Next/Fast-forward button.8 Chapter 1 iPod classic Basics
To delete the previous character, press the Previous/Rewind button.
3 Press Menu to display the results list, which you can now navigate.
Items appear in the results list with icons identifying their type: song, video, artist,
album, audiobook, or podcast.
To return to Search (if Search is highlighted in the menu), press the Center button.
Turning off the Click Wheel Sound
When you scroll through menu items, you can hear a clicking sound through the
iPod classic internal speaker. If you like, you can turn the Click Wheel sound off.
To turn off the Click Wheel sound:
m Choose Settings and set Clicker to Off.
To turn the Click Wheel sound on again, set Clicker to On.
Disabling iPod classic Controls
If you don’t want to turn iPod classic on or activate controls accidentally, you can make
them inactive using the Hold switch.
m Slide the Hold switch to HOLD (so you can see the orange bar).Chapter 1 iPod classic Basics 9
Using iPod classic Menus
When you turn on iPod classic, you see the main menu. Choose menu items to perform
functions or go to other menus. Icons along the top of the screen show iPod classic
status.
Adding or Removing Items from the Main Menu
You might want to add often-used items to the iPod classic main menu. For example,
you can add a Songs item to the main menu, so you don’t have to choose Music before
you choose Songs.
To add or remove items from the main menu:
1 Choose Settings > Main Menu.
2 Choose each item you want to appear in the main menu. A checkmark indicates which
items have been added.
Setting the Backlight Timer
You can set the backlight to turn on and illuminate the screen for a certain amount of
time when you press a button or use the Click Wheel. The default is 10 seconds.
m Choose Settings > Backlight Timer, and then choose the time you want. Choose “Always
On” to prevent the backlight from turning off.
Display item Function
Menu title Displays the title of the current menu.
Lock icon The Lock icon appears when the Hold switch (on top of
iPod classic) is set to HOLD. This indicates that the iPod classic
controls are disabled.
Play status The Play (“) icon appears when a song, video, or other item is
playing. The Pause (1) icon appears when the item is paused.
Battery status The Battery icon shows the approximate remaining battery charge.
Menu items Use the Click Wheel to scroll through menu items. Press the Center
button to choose an item. An arrow next to a menu item indicates
that choosing it leads to another menu or screen.
Menu title
Menu items
Battery status
Play status
Lock icon10 Chapter 1 iPod classic Basics
Setting the Screen Brightness
You can adjust the brightness of the iPod classic screen by moving a slider.
m Choose Settings > Brightness, and then use the Click Wheel to move the slider. Moving
it to the left dims the screen; moving it to the right increases the screen brightness.
You can also set the brightness during a slideshow or video. Press the Center button to
bring up or dismiss the brightness slider.
Setting the Language
iPod classic can be set to use different languages.
m Choose Settings > Language, and then choose a language from the list.
Getting Information About iPod classic
You can get details about your iPod classic, such as how much space is available, how
many songs, videos, photos, and other items you have, and the serial number, model,
and software version.
To get information about iPod classic:
m Choose Settings > About, and press the Center button to cycle through the screens of
information.
Resetting All Settings
You can reset all the items on the Settings menu to their default setting.
m Choose Settings > Reset Settings, and then choose Reset.
Connecting and Disconnecting iPod classic
You connect iPod classic to your computer to add music, videos, photos, and files, and
to charge the battery. Disconnect iPod classic when you’re done.
Connecting iPod classic
To connect iPod classic to your computer:
m Plug the included iPod Dock Connector to USB 2.0 cable into a high-powered USB 2.0
port on your computer, and then connect the other end to iPod classic.
If you have an iPod Dock, you can connect the cable to a USB 2.0 port on your
computer, connect the other end to the Dock, and then put iPod classic in the Dock.Chapter 1 iPod classic Basics 11
Note: The USB port on most keyboards doesn’t provide enough power. You must
connect iPod classic to a USB 2.0 port on your computer, unless your keyboard has a
high-powered USB 2.0 port.
By default, iTunes syncs songs on iPod classic automatically when you connect it to
your computer. When iTunes is finished, you can disconnect iPod classic.
Note: You can sync songs while your battery is charging.
If you connect iPod classic to a different computer and it’s set to sync music
automatically, iTunes prompts you before syncing any music. If you click Yes, the songs
and other audio files already on iPod classic will be erased and replaced with songs and
other audio files on the computer iPod classic is connected to. For more information
about adding music to iPod classic and using iPod classic with more than one
computer, see Chapter 2, “Music Features,” on page 17.12 Chapter 1 iPod classic Basics
Disconnecting iPod classic
It’s important not to disconnect iPod classic from your computer while music is being
synced. You can easily see if it’s OK to disconnect iPod classic by looking at the
iPod classic screen.
Important: Don’t disconnect iPod classic if you see the “Connected” or “Sync in
Progress” messages. You could damage files on iPod classic. If you see one of these
messages, you must eject iPod classic before disconnecting it.
If you set iPod classic to manage songs manually (see “Managing iPod classic Manually”
on page 24) or enable iPod classic for disk use (see “Using iPod classic as an External
Disk” on page 46), you must always eject iPod classic before disconnecting it.
If you see the main menu or a large battery icon, you can disconnect iPod classic.
Important: If you see one of these messages, you must eject
iPod classic before disconnecting it.Chapter 1 iPod classic Basics 13
To eject iPod classic:
m Click the Eject (C) button next to iPod classic in the list of devices in the iTunes source
list.
If you’re using a Mac, you can also eject iPod classic by dragging the iPod classic icon on
the desktop to the Trash.
If you’re using a Windows PC, you can also eject iPod classic in My Computer or by
clicking the Safely Remove Hardware icon in the Windows system tray and selecting
iPod classic.
To disconnect iPod classic:
m Disconnect the cable from iPod classic. If iPod classic is in the Dock, simply remove it.
If your Dock connector is larger than the one shown, squeeze both sides of the
connector while removing.
You can safely disconnect iPod classic while either of these messages is displayed.14 Chapter 1 iPod classic Basics
About the iPod classic Battery
iPod classic has an internal, non-user-replaceable battery. For best results, the first time
you use iPod classic, let it charge for about four hours or until the battery icon in the
status area of the display shows that the battery is fully charged. If iPod classic isn’t
used for a while, the battery might need to be charged.
The iPod classic battery is 80-percent charged in about two hours and fully charged in
about four hours. If you charge iPod classic while adding files, playing music, viewing
videos, or viewing a slideshow, it might take longer.
Charging the iPod classic Battery
You can charge the iPod classic battery in two ways:
 Connect iPod classic to your computer.
 Use the Apple USB Power Adapter, available separately.
To charge the battery using your computer:
m Connect iPod classic to a USB 2.0 port on your computer. The computer must be turned
on and not in sleep mode (some Mac models can charge iPod classic while in sleep
mode).
If the battery icon on the iPod classic screen shows the Charging screen, the battery is
charging. If it shows the Charged screen, the battery is fully charged.
If you don’t see the charging screen, iPod classic might not be connected to a
high-power USB port. Try another USB port on your computer. Chapter 1 iPod classic Basics 15
Important: If a “Charging, Please Wait” or “Connect to Power” message appears on the
iPod classic screen, the battery needs to be charged before iPod classic can
communicate with your computer. See “If iPod classic displays a “Connect to Power”
message” on page 58.
If you want to charge iPod classic when you’re away from your computer, you can
purchase the Apple USB Power Adapter.
To charge the battery using the Apple USB Power Adapter:
1 Connect the AC plug adapter to the power adapter (they might already be connected).
2 Connect the iPod Dock Connector to USB 2.0 cable to the power adapter, and plug the
other end of the cable into iPod classic.
3 Plug the power adapter into a working electrical outlet.
WARNING: Make sure the power adapter is fully assembled before plugging it into an
electrical outlet.
AC plug adapter
(The plug on your Power Adapter may look different.)
USB Power Adapter
iPod Dock Connector to USB 2.0 Cable16 Chapter 1 iPod classic Basics
Understanding Battery States
When iPod classic isn’t connected to a power source, a battery icon in the top-right
corner of the iPod classic screen shows approximately how much charge is left.
If iPod classic is connected to a power source, the battery icon changes to show that
the battery is charging or fully charged.
You can disconnect and use iPod classic before it’s fully charged.
Note: Rechargeable batteries have a limited number of charge cycles and might
eventually need to be replaced. Battery life and number of charge cycles vary by use
and settings. For more information, go to www.apple.com/batteries.
Battery less than 20% charged
Battery about halfway charged
Battery fully charged
Battery charging (lightning bolt)
Battery fully charged (plug)2
17
2 Music Features
With iPod classic, you can take your music and audio
collection with you wherever you go. Read this chapter to
learn about adding music and listening to iPod classic.
You use iPod classic by importing songs, audiobooks, movies, TV shows, music videos,
and podcasts into your computer and then adding them to iPod classic. Read on to
learn more about the steps in this process, including:
 Getting music from your CD collection, hard disk, or the iTunes Store (part of iTunes
and available in some countries only) into the iTunes application on your computer
 Organizing your music and other audio into playlists, if you want
 Adding playlists, songs, audiobooks, videos, and podcasts to iPod classic
 Listening to music or other audio on the go
About iTunes
iTunes is the software application you use with iPod classic. iTunes can sync music,
audiobooks, podcasts, and more with iPod classic. When you connect iPod classic to
your computer, iTunes opens automatically.
This guide explains how to use iTunes to download songs and other audio and video to
your computer, create personal compilations of your favorite songs (called playlists),
add them to iPod classic, and adjust iPod classic settings.
iTunes also has many other features. You can make your own CDs that play in standard
CD players (if your computer has a CD-recordable drive); listen to streaming Internet
radio; watch videos and TV shows; rate songs according to preference; and much more.
For information about using these iTunes features, open iTunes and choose
Help > iTunes Help.18 Chapter 2 Music Features
Importing Music into Your iTunes Library
To listen to music on iPod classic, you first need to get that music into iTunes on your
computer.
There are three ways of getting music and other audio into iTunes:
 Purchase music, audiobooks, and videos, or download podcasts online from the
iTunes Store.
 Import music and other audio from audio CDs.
 Add music and other audio that’s already on your computer to your iTunes library.
Purchasing Songs and Downloading Podcasts Using the iTunes Store
If you have an Internet connection, you can easily purchase and download songs,
albums, audiobooks, and videos online using the iTunes Store. You can also subscribe
to and download podcasts.
To purchase music online using the iTunes Store, you set up an Apple account in
iTunes, find the songs you want, and then buy them. If you already have an Apple
account, or if you have an America Online (AOL) account (available in some countries
only), you can use that account to sign in to the iTunes Store and buy songs.
Note: You don’t need an iTunes Store account to download or subscribe to podcasts.
To sign in to the iTunes Store:
m Open iTunes and then:
 If you already have an iTunes account, choose Store > Sign In.
 If you don’t already have an iTunes account, choose Store > Create Account and follow
the onscreen instructions to set up an Apple account or enter your existing Apple
account or AOL account information.Chapter 2 Music Features 19
To find songs, audiobooks, videos, and podcasts:
You can browse or search the iTunes Store to find the album, song, or artist you’re
looking for. Open iTunes and select iTunes Store in the source list.
 To browse the iTunes Store, choose a category (for example, Music) on the left side of
the main page in the iTunes Store. You can choose a genre, look at new releases, click
one of the featured songs, look at Top Songs and more, or click Browse under Quick
Links in the main iTunes Store window.
 To browse for podcasts, click the Podcasts link on the left side of the main page in the
iTunes Store.
 To browse for videos, click the Movies, TV Shows, or Music Videos link on the left side
of the main page in the iTunes Store.
 To search the iTunes Store, type the name of an album, song, artist, or composer in the
search field.
 To narrow your search, type something in the search field, press Return or Enter on
your keyboard, and then click links in the Search Bar at the top of the results page.
For example, to narrow your search to songs and albums, click the Music link.
 To search for a combination of items, click Power Search in the Search Results window.
 To return to the main page of the iTunes Store, click the Home button in the status line
at the top of the window.
To buy a song, album, movie, TV show, music video, or audiobook:
1 Select iTunes Store in the source list, and then find the item you want to buy.
You can double-click a song or other item to listen to a portion of it and make sure it’s
what you want. You can view movie trailers or TV show previews. (If your network
connection is slower than 128 kbps, choose iTunes > Preferences, and in the Store pane,
select the “Load complete preview before playing” checkbox.)
2 Click Buy Song, Buy Album, Buy Movie, Buy Episode, Buy Video, or Buy Book.
Some items have other options, such as TV shows that let you buy a season pass for all
episodes.
The song or other item is downloaded to your computer and charged to the credit card
listed on your Apple or AOL account.
To download or subscribe to a podcast:
1 Select iTunes Store in the source list.
2 Click the Podcasts link on the left side of the main page in the iTunes Store.
3 Browse for the podcast you want to download.
 To download a single podcast episode, click the Get Episode button next to the
episode.20 Chapter 2 Music Features
 To subscribe to a podcast, click the Subscribe button next to the podcast graphic.
iTunes downloads the most recent episode. As new episodes become available, they
are automatically downloaded to iTunes when you connect to the Internet.
For more information, see “Adding Podcasts to iPod classic” on page 25 and “Watching
and Listening to Podcasts” on page 31.
Adding Songs Already on Your Computer to Your iTunes Library
If you have songs on your computer encoded in file formats that iTunes supports, you
can easily add the songs to iTunes.
To add songs on your computer to your iTunes library:
m Drag the folder or disk containing the audio files to Library in the iTunes source list (or
choose File > Add to Library and select the folder or disk). If iTunes supports the song
file format, the songs are automatically added to your iTunes library.
You can also drag individual song files to iTunes.
Note: Using iTunes for Windows, you can convert nonprotected WMA files to AAC or
MP3 format. This can be useful if you have a library of music encoded in WMA format.
For more information, open iTunes and choose Help > iTunes Help.
Importing Music From Your Audio CDs Into iTunes
Follow these instructions to get music from your CDs into iTunes.
To import music from an audio CD into iTunes:
1 Insert a CD into your computer and open iTunes.
If you have an Internet connection, iTunes gets the names of the songs on the CD from
the Internet (if available) and lists them in the window.
If you don’t have an Internet connection, you can import your CDs and, later, when you’re
connected to the Internet, choose Advanced > Get CD Track Names. iTunes will bring in
the track names for the imported CDs.
If the CD track names aren’t available online, you can enter the names of the songs
manually. For more information, see “Entering Song Names and Other Details” on
page 21.
With song information entered, you can browse for songs in iTunes or on iPod by title,
artist, album, and more.
2 Click to remove the checkmark next to any song you don’t want to import.
3 Click the Import button. The display area at the top of the iTunes window shows how
much time it will take to import each song.
Note: By default, iTunes plays songs as they are imported. If you’re importing a lot of
songs, you might want to stop the songs from playing to improve performance.Chapter 2 Music Features 21
4 To eject the CD, click the Eject (C) button.
You cannot eject a CD until the import is done.
5 Repeat these steps for any other CDs with songs you want to import.
Entering Song Names and Other Details
To enter CD song names and other information manually:
1 Select the first song on the CD and choose File > Get Info.
2 Click Info.
3 Enter the song information.
4 Click Next to enter information for the next song.
5 Click OK when you finish.
Adding Lyrics
You can enter song lyrics in plain text format into iTunes so that you can view the song
lyrics on iPod classic while the song is playing.
To enter lyrics into iTunes:
1 Select a song and choose File > Get Info.
2 Click Lyrics.
3 Enter song lyrics in the text box.
4 Click Next to enter lyrics for the next song.
5 Click OK when you finish.
For more information, see “Viewing Lyrics on iPod classic” on page 30.
Adding Album Artwork
Music you purchase from the iTunes Store includes album artwork, which your
iPod classic can display. You can add album artwork for music you’ve imported from
CDs, if you have the album art on your computer.
To add album artwork to iTunes:
1 Select a song and choose File > Get Info.
2 Click Artwork.
3 Click Add, navigate to the artwork file, and click Choose.
4 Use the slider to adjust the size of the artwork.
5 Click Next to add artwork for the next song or album.
6 Click OK when you finish.
For more information, see “Viewing Album Artwork on iPod classic” on page 31.22 Chapter 2 Music Features
Organizing Your Music
Using iTunes, you can organize songs and other items into lists, called playlists, in any
way you want. For example, you can make playlists with songs to listen to while
exercising, or playlists with songs for a particular mood.
You can also make Smart Playlists that update automatically based on rules you define.
When you add songs to iTunes that match the rules, they automatically get added to
the Smart Playlist.
You can make as many playlists as you like using any of the songs in your iTunes library.
Adding a song to a playlist or later removing it doesn’t remove it from your library.
To make a playlist in iTunes:
1 Click the Add (+) button or choose File > New Playlist.
2 Type a name for the playlist.
3 Click Music in the Library list, and then drag a song or other item to the playlist.
To select multiple songs, hold down the Shift key or the Command (x) key on a Mac,
or the Shift key or the Control key on a Windows PC, as you click each song.
To make a Smart Playlist:
m Choose File > New Smart Playlist and define the rules for your playlist.
Note: To make playlists on iPod classicwhen iPod classic isn’t connected to your
computer, see “Making On-The-Go Playlists on iPod classic” on page 27.
Adding Music and Podcasts to iPod classic
After your music is imported and organized in iTunes, you can easily add it to
iPod classic.
To set how music is added from your computer to iPod classic, you connect iPod classic
to your computer, and then use iTunes preferences to choose iPod classic settings.Chapter 2 Music Features 23
You can set iTunes to add music to iPod classic in three ways:
 Sync all songs and playlists: When you connect iPod classic, it’s automatically updated
to match the songs and other items in your iTunes library. Any other songs on
iPod classic are deleted.
 Sync selected playlists: When you connect iPod classic, it’s automatically updated to
match the songs in playlists you select in iTunes.
 Manually add music to iPod classic: When you connect iPod classic, you can drag
songs and playlists individually to iPod classic, and delete songs and playlists
individually from iPod classic. Using this option, you can add songs from more than
one computer without erasing songs from iPod classic. When you manage music
yourself, you must always eject iPod classic from iTunes before you can disconnect it.
Syncing Music Automatically
By default, iPod classic is set to sync all songs and playlists when you connect it to your
computer. This is the simplest way to add music to iPod classic. You just connect
iPod classic to your computer, let it add songs, audiobooks, videos, and other items
automatically, and then disconnect it and go. If you added any songs to iTunes since
the last time you connected iPod classic, they are synced with iPod classic. If you
deleted songs from iTunes, they are removed from iPod classic.
To sync music with iPod classic:
m Simply connect iPod classic to your computer. If iPod classic is set to sync automatically,
the update begins.
Important: The first time you connect iPod classic to a computer, a message asks if you
want to sync songs automatically. If you accept, all songs, audiobooks, and videos are
erased from iPod classic and replaced with the songs and other items from that
computer. If you don’t accept, you can still add songs to iPod classic manually without
erasing any of the songs already on iPod classic.
While music is being synced from your computer onto iPod classic, the iTunes status
window shows progress, and you see a sync icon next to the iPod classic icon in the
source list.
When the update is done, a message in iTunes says “iPod update is complete.”
Syncing Music From Selected Playlists onto iPod classic
Setting iTunes to sync selected playlists to iPod classic is useful if the music in your
iTunes library doesn’t all fit on iPod classic. Only the music in the playlists you select is
synced to iPod classic.
To set iTunes to sync music from selected playlists onto iPod classic:
1 In iTunes, select iPod classic in the source list and click the Music tab.
2 Select “Sync music” and then choose “Selected playlists.”24 Chapter 2 Music Features
3 Select the playlists you want.
4 To include music videos and display album artwork, select those options.
5 Click Apply.
Note: If “Sync only checked songs and videos” is selected in the Summary pane, iTunes
syncs only items that are checked.
Managing iPod classic Manually
Setting iTunes to let you manage iPod classic manually gives you the most flexibility for
managing music and video on iPod classic. You can add and remove individual songs
(including music videos) and videos (movies and TV shows). Also, you can add music
and videos from multiple computers to iPod classic without erasing items already on
iPod classic.
Note: Setting iPod classic to manually manage music and video turns off the automatic
sync options in the Music, Movies, and TV Shows panes. You cannot manually manage
one and automatically sync another at the same time.
To set iTunes to let you manage music and video on iPod classic manually:
1 In iTunes, select iPod classic in the source list and click the Summary tab.
2 In the Options section, select “Manually manage music and video.”
3 Click Apply.
Note: When you manage songs and video yourself, you must always eject iPod classic
from iTunes before you disconnect it.
To add a song, video, or other item to iPod classic:
1 Click Music or another Library item in the iTunes source list.
2 Drag a song or other item to the iPod classic icon in the source list.
To remove a song, video, or other item from iPod classic:
1 In iTunes, select iPod classic in the source list.
2 Select a song or other item on iPod classic and press the Delete or Backspace key on
your keyboard.
If you manually remove a song or other item from iPod classic, it isn’t deleted from your
iTunes library.
To make a new playlist on iPod classic:
1 In iTunes, select iPod classic in the source list, and then click the Add (+) button or
choose File > New Playlist.
2 Type a name for the playlist.
3 Click an item, such as Music, in the Library list, and then drag songs or other items to
the playlist.Chapter 2 Music Features 25
To add songs to or remove songs from a playlist on iPod classic:
m Drag a song to a playlist on iPod classic to add the song. Select a song in a playlist and
press the Delete key on your keyboard to delete the song.
If you set iTunes to manage music manually, you can reset it later to sync automatically.
To reset iTunes to sync all music automatically on iPod classic:
1 In iTunes, select iPod classic in the source list and click the Music tab.
2 Select “Sync music” and then choose “All songs and playlists.”
3 Click Apply.
The update begins automatically.
Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only
items that are checked in your Music and other libraries.
Adding Podcasts to iPod classic
The settings for adding podcasts to iPod classic are unrelated to the settings for adding
songs. Podcast update settings don’t affect song update settings, and vice versa. You
can set iTunes to automatically sync all or selected podcasts, or you can add podcasts
to iPod classic manually.
To set iTunes to update the podcasts on iPod classic automatically:
1 In iTunes, select iPod classic in the source list and click the Podcasts tab.
2 In the Podcasts pane, select “Sync … episodes” and choose the number of episodes
you want in the pop-up menu.
3 Click “All podcasts” or “Selected podcasts.” If you click “Selected podcasts,” also select
the podcasts in the list that you want to sync.
4 Click Apply.
When you set iTunes to sync iPod classic podcasts automatically, iPod classic is updated
each time you connect it to your computer.
Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only
items that are checked in your Podcasts and other libraries.
To manually manage podcasts:
1 In iTunes, select iPod classic in the source list and click the Summary tab.
2 Select “Manually manage music and videos” and click Apply.
3 Select the Podcasts library in the source list and drag the podcasts you want to
iPod classic.26 Chapter 2 Music Features
Playing Music
After you add music and other audio to iPod classic, you can listen to it. Use the Click
Wheel and Center button to browse for a song, audiobook, video, or podcast.
To browse for and play a song:
m Choose Music, browse for a song, and press the Play/Pause button.
Note: When you browse for music videos in the Music menu, you only hear the music.
When you browse for them in the Videos menu, you also see the video.
When a song is playing, the Now Playing screen appears. The following table describes
the elements on the Now Playing screen of iPod classic.
When you see the Now Playing screen, you can use the Click Wheel to change the
volume. You can press the Center button multiple times from the Now Playing screen
to get to other information and options, such as the scrubber bar, rating bullets, shuffle
settings, lyrics, podcast information, and more. The scrubber bar displays a diamond to
show where you are in the track, along with elapsed and remaining times. Press the
Menu button to return to the previous screen.
Now Playing screen item Function
Shuffle (¡) icon Appears if iPod classic is set to shuffle songs or albums.
Repeat (⁄) icon Appears if iPod classic is set to repeat all songs. The Repeat Once
(!) icon appears if iPod classic is set to repeat one song.
Album art Shows the album art, if it’s available.
Song information Displays the song title, artist, and album title.
Rating Displays stars if you rate the song.
Song number Shows the number of the song that’s playing within the current
sequence of songs.
Song time progress bar Shows the elapsed and remaining times for the song that’s playing.
Shuffle icon
Repeat icon
Song time
Song information,
rating, and sequence
number
Album artChapter 2 Music Features 27
Setting iPod classic to Shuffle Songs
You can set iPod classic to play songs, albums, or your entire library in random order.
To set iPod classic to shuffle and play all your songs:
m Choose Shuffle Songs from the iPod classic main menu.
iPod classic begins playing songs from your entire music library in random order,
skipping audiobooks and podcasts.
To set iPod classic to always shuffle songs or albums:
1 Choose Settings from the iPod classic main menu.
2 Set Shuffle to either Songs or Albums.
When you set iPod classic to shuffle songs by choosing Settings > Shuffle, iPod classic
shuffles songs within the list (for example, album or playlist) you choose to play.
When you set iPod classic to shuffle albums, it plays all the songs on an album in order,
and then randomly selects another album in the list and plays through it in order.
To set shuffle options from the Now Playing screen:
m Press the Center button until you see the shuffle icon. Choose Songs, Albums, or Off.
Setting iPod classic to Repeat Songs
You can set iPod classic to repeat a song over and over, or repeat songs within the list
you choose to play.
To set iPod classic to repeat songs:
m Choose Settings from the iPod classic main menu.
 To repeat all songs in the list, set Repeat to All.
 To repeat one song over and over, set Repeat to One.
Customizing the Music Menu
You can add items to or remove them from the Music menu, just as you do with the
main menu. For example, you can add a Compilations item to the Music menu, so you
can easily choose compilations that are put together from various sources.
To add or remove items from the Music menu:
1 Choose Settings > Music Menu.
2 Choose each item you want to appear in the main menu. A checkmark indicates which
items have been added. To revert to the original Music menu settings, choose Reset
Menu.
Making On-The-Go Playlists on iPod classic
You can make playlists on iPod classic, called On-The-Go Playlists, when iPod classic
isn’t connected to your computer.28 Chapter 2 Music Features
To make an On-The-Go playlist:
1 Select a song, and then press and hold the Center button until the song title flashes.
2 Choose other songs you want to add.
3 Choose Music > Playlists > On-The-Go to view and play your list of songs.
You can also add a list of songs. For example, to add an album, highlight the album
title and press and hold the Center button until the album title flashes.
To play songs in the On-The-Go playlist:
m Choose Music > Playlists > On-The-Go and choose a song.
To remove a song from the On-The-Go playlist:
m Select a song in the playlist, and hold down the Center button until the song title
flashes.
To clear the entire On-The-Go playlist:
m Choose Music > Playlists > On-The-Go > Clear Playlist and then click Clear.
To save the On-The-Go playlists on iPod classic:
m Choose Music > Playlists > On-The-Go > Save Playlist.
The first playlist is saved as “New Playlist 1” in the Playlists menu. The On-The-Go
playlist is cleared. You can save as many playlists as you like. After you save a playlist,
you can no longer remove songs from it.
To copy the On-The-Go playlists to your computer:
m If iPod classic is set to update songs automatically (see “Syncing Music Automatically”
on page 23), and you make an On-The-Go playlist, the playlist is automatically copied
to iTunes when you connect iPod classic. You see the new On-The-Go playlist in the list
of playlists in iTunes. You can rename, edit, or delete the new playlist, just as you would
any playlist in iTunes.
Rating Songs
You can assign a rating to a song (from 1 to 5 stars) to indicate how much you like it.
You can use song ratings to help you create Smart Playlists automatically in iTunes.
To rate a song:
1 Start playing the song.
2 From the Now Playing screen, press the Center button until the five Rating bullets
appear.
3 Use the Click Wheel to choose a rating (represented by stars).
Note: You cannot assign ratings to video podcasts.Chapter 2 Music Features 29
Setting the Maximum Volume Limit
You can choose to set a limit for the maximum volume on iPod classic and assign a
combination to prevent the setting from being changed.
To set the maximum volume limit for iPod classic:
1 Choose Settings > Volume Limit.
The volume control shows the current volume.
2 Use the Click Wheel to select the maximum volume limit.
You can press Play to hear the currently selected song play while you select the
maximum volume limit.
3 Press Play/Pause to set the maximum volume limit.
A triangle on the volume bar indicates the maximum volume limit.
4 Press the Menu button to accept the maximum volume limit without requiring a
combination to change it. Or, on the Enter Combination screen, set a combination to
require that the combination be entered to change the maximum volume limit.
5 To enter a combination:
 Use the Click Wheel to select a number for the first position. Press the Center button
to confirm your choice and move to the next position.
 Use the same method to set the remaining numbers of the combination. You can use
the Next/Fast-forward button to move to the next position and the Previous/Rewind
button to move to the previous position. Press the Center button in the final position
to confirm the entire combination.
Note: The volume of songs and other audio may vary depending on how the audio
was recorded or encoded. See “Setting Songs to Play at the Same Volume Level” on
page 30 for information about how to set a relative volume level in iTunes and on
iPod classic. Volume level may also vary if you use different earphones or headphones.
With the exception of the iPod Radio Remote, accessories that connect through the
iPod Dock Connector don’t support volume limits.
If you set a combination, you must enter it before you can change or remove the
maximum volume limit.
To change the maximum volume limit:
1 Choose Settings > Volume Limit.
2 If you set a combination, enter it by using the Click Wheel to select the numbers and
pressing the Center button to confirm them.
3 Use the Click Wheel to change the maximum volume limit.
4 Press the Play/Pause button to accept the change.30 Chapter 2 Music Features
To remove the maximum volume limit:
1 If you’re currently listening to iPod classic, press Pause.
2 Choose Settings > Volume Limit.
3 If you set a combination, enter it by using the Click Wheel to select the numbers and
pressing the Center button to confirm them.
4 Use the Click Wheel to move the volume limit to the maximum level on the volume bar.
This removes any restriction on volume.
5 Press the Play/Pause button to accept the change.
Note: If you forget the combination, you can restore iPod classic. See “Updating and
Restoring iPod Software” on page 61 for more information.
Setting Songs to Play at the Same Volume Level
iTunes can automatically adjust the volume of songs, so they play at the same relative
volume level. You can set iPod classic to use the iTunes volume settings.
To set iTunes to play songs at the same sound level:
1 In iTunes, choose iTunes > Preferences if you’re using a Mac, or choose
Edit > Preferences if you’re using a Windows PC.
2 Click Playback and select Sound Check, and then click OK.
To set iPod classic to use the iTunes volume settings:
m Choose Settings and set Sound Check to On.
If you haven’t activated Sound Check in iTunes, setting it on iPod classic has no effect.
Using the Equalizer
You can use equalizer presets to change the sound on iPod classic to suit a particular
music genre or style. For example, to make rock music sound better, set the equalizer
to Rock.
To use the equalizer to change the sound on iPod classic:
m Choose Settings > EQ and choose an equalizer preset.
If you assigned an equalizer preset to a song in iTunes and the iPod classic equalizer is
set to Off, the song plays using the iTunes setting. See iTunes Help for more
information.
Viewing Lyrics on iPod classic
If you enter lyrics for a song in iTunes (see “Adding Lyrics” on page 21) and then add
the song to iPod classic, you can view the lyrics on iPod classic.
To view lyrics on iPod classic while a song is playing:
m On the Now Playing screen, press the Center button until you see the lyrics. The screen
displays the lyrics, which you can scroll through as the song plays.Chapter 2 Music Features 31
Viewing Album Artwork on iPod classic
By default, iTunes is set to allow you to view album artwork on iPod classic. If the
artwork is available, you’ll see it on iPod classic in the album list and when you play
music from the album.
To set iTunes to display album artwork on iPod classic:
1 In iTunes, select iPod classic in the source list and click the Music tab.
2 Choose “Display album artwork on your iPod.”
To see album artwork on iPod classic:
m Play a song that has album artwork.
For more information about album artwork, open iTunes and choose Help > iTunes
Help.
Watching and Listening to Podcasts
Podcasts are downloadable audio or video shows you get at the iTunes Store. You can
listen to audio podcasts and watch video podcasts. Podcasts are organized by shows,
episodes within shows, and chapters within episodes. If you stop watching or listening
to a podcast and go back to it later, the podcast begins playing from where you left off.
To watch or listen to a podcast:
1 From the main menu, choose Podcasts, and then choose a show.
Shows appear in reverse chronological order so that you can watch or listen to the
most recent one first. You see a blue dot next to shows and episodes you haven’t
watched or listened to yet.
2 Choose an episode to play it.
The Now Playing screen displays the show, episode, and date information, along with
elapsed and remaining time. Press the Center button to see more information about
the podcast. If the podcast includes artwork, you also see a picture. Podcast artwork
can change during an episode, so you might see several pictures during the podcast.
If the podcast you’re watching or listening to has chapters, you can press the
Next/Fast-forward or Previous/Rewind button to skip to the next chapter or the
beginning of the current chapter in the podcast.
For more information about podcasts, open iTunes and choose Help > iTunes Help.
Then search for “podcasts.”32 Chapter 2 Music Features
Listening to Audiobooks
You can purchase and download audiobooks from the iTunes Store or from
audible.com and listen to them on iPod classic.
You can use iTunes to add audiobooks to iPod classic the same way you add songs. If
you stop listening to an audiobook on iPod classic and go back to it later, the
audiobook begins playing from where you left off. iPod classic skips audiobooks when
set to shuffle.
If the audiobook you’re listening to has chapters, you can press the Next/Fast-forward
or Previous/Rewind button to skip to the next chapter or the beginning of the current
chapter in the audiobook.
You can play audiobooks at speeds faster or slower than normal.
To set audiobook play speed:
m Choose Settings > Audiobooks and choose a speed.
Setting the play speed only affects audiobooks purchased from the iTunes Store or
audible.com.
Listening to FM Radio
You can listen to radio using the optional iPod Radio Remote accessory for iPod classic.
iPod Radio Remote attaches to iPod classic using the Dock connector cable. When
you’re using iPod Radio Remote, you see a Radio menu item on the iPod classic main
menu. For more information, see the iPod Radio Remote documentation.3
33
3 Video Features
You can purchase movies, TV shows, and music videos, rent
movies, and download video podcasts at the iTunes Store,
and then add them to your iPod classic. You can watch videos
on iPod classic or on a TV connected to iPod classic. Read this
chapter to learn about downloading and viewing videos.
Purchasing or Renting Videos and Downloading
Video Podcasts
To purchase videos—movies, TV shows, and music videos—or rent movies online from
the iTunes Store (part of iTunes and available in some countries only), you set up an
Apple account in iTunes, find the videos you want, and then buy or rent them. If you
already have an Apple account, or if you have an America Online (AOL) account
(available in some countries only), you can use that account to sign in to the iTunes
Store and buy videos or rent movies.
To sign in to the iTunes Store:
m Open iTunes and then:
 If you already have an iTunes account, choose Store > Sign In.
 If you don’t already have an iTunes account, choose Store > Create Account and follow
the onscreen instructions to set up an Apple account or enter your existing Apple
account or AOL account information.34 Chapter 3 Video Features
To browse videos in the iTunes Store:
1 In iTunes, select iTunes Store in the source list.
2 Click an item (Movies, TV Shows, or Music Videos) in the iTunes Store list on the left.
You can also find some music videos as part of an album or other offer.
Videos in iTunes and in the iTunes Store have a display ( ) icon next to them.
To buy or rent a video:
1 Select iTunes Store in the source list, and then find the item you want to buy or rent.
2 Click Buy Video, Buy Episode, Buy Season, Buy Movie, or Rent Movie.
Purchased videos appear when you select Movies (under Library) or Purchased (under
Store) in the source list. Rented videos appear when you select Rented Movies (under
Library).
To download a video podcast:
Video podcasts appear alongside other podcasts in the iTunes Store. You can subscribe
to them and download them just as you would other podcasts. You don’t need an
iTunes Store account to download podcasts. See “Purchasing Songs and Downloading
Podcasts Using the iTunes Store” on page 18 for instructions.
Converting Your Own Videos to Work with iPod classic
You can view other video files on iPod classic, such as videos you create in iMovie on a
Mac or videos you download from the Internet. Import the video into iTunes, convert it
for use with iPod classic, if necessary, and then add it to iPod classic.
iTunes supports all the video formats that QuickTime supports. For more information,
choose Help > QuickTime Player Help from the QuickTime Player menu bar.
To import a video into iTunes:
m Drag the video file to your iTunes library.
Some videos may be ready for use with iPod classic after you import them to iTunes. If
you try to add a video to iPod classic (see “Syncing Videos Automatically” on page 35
for instructions), and a message says the video can’t play on iPod classic, then you must
convert the video for use with iPod classic.
To convert a video for use with iPod classic:
1 Select the video in your iTunes library.
2 Choose Advanced > “Convert Selection to iPod.”
Depending on the length and content of a video, converting it for use with iPod classic
can take several minutes to several hours.
Note: When you convert a video for use with iPod classic, the original video remains in
your iTunes library. Chapter 3 Video Features 35
For more information about converting video for iPod classic, go to
www.info.apple.com/kbnum/n302758.
Adding Videos to iPod classic
You add movies and TV shows to iPod classic much the same way you add songs. You
can set iTunes to sync all movies and TV shows to iPod classic automatically when you
connect iPod classic, or you can set iTunes to sync only selected playlists. Alternatively,
you can manage movies and TV shows manually. Using this option, you can add videos
from more than one computer without erasing videos already on iPod classic.
Note: Music videos are managed with songs, under the Music tab in iTunes.
See “Adding Music and Podcasts to iPod classic” on page 22.
Important: If you rent a movie from the iTunes Store and add it to iPod classic, you will
only be able to view it on iPod classic. Once you add a rented movie to iPod classic, it
can’t be transferred again.
Syncing Videos Automatically
By default, iPod classic is set to sync all videos when you connect it to your computer.
This is the simplest way to add videos to iPod classic. You just connect iPod classic to
your computer, let it add videos and other items automatically, and then disconnect it
and go. If you added any videos to iTunes since the last time you connected
iPod classic, they are added to iPod classic. If you deleted videos from iTunes, they are
removed from iPod classic.
You can set iPod classic to sync videos automatically when you connect it to your
computer.
To sync videos to iPod classic:
m Simply connect iPod classic to your computer. If iPod classic is set to sync automatically,
the syncing begins.36 Chapter 3 Video Features
Important: The first time you connect iPod classic to a different computer and have the
automatic sync option set, a message asks if you want to sync songs and videos
automatically. If you accept, all songs, videos, and other items are deleted from
iPod classic and replaced with the songs, videos, and other items in the iTunes library
on that computer. If you don’t accept, you can still add videos to iPod classic manually
without deleting any of the videos already on iPod classic.
iTunes includes a feature to sync purchased items from iPod classic to another
computer. For more information, see iTunes Help.
While videos are being synced from your computer to iPod classic, the iTunes status
window shows progress and the iPod classic icon in the source list flashes red.
When the update is done, a message in iTunes says “iPod update is complete.”
Syncing Selected Videos to iPod classic
Setting iTunes to sync selected videos to iPod classic is useful if you have more videos
in your iTunes library than will fit on iPod classic. Only the videos you specify are
synced with iPod classic. You can sync selected videos or selected playlists that contain
videos.
To set iTunes to sync unwatched or selected movies to iPod classic:
1 In iTunes, select iPod classic in the source list and click the Movies tab.
2 Select “Sync movies.”
3 Select the movies or playlists you want.
Unwatched movies: Select “… unwatched movies” and choose the number you want
from the pop-up menu.
Selected movies or playlists: Click “Selected …,” choose “movies” or “playlists” from the
pop-up menu, and then select the movies or playlists you want.
4 Click Apply.
Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only
items that are checked in your Movies and other libraries.
To set iTunes to sync most recent episodes or selected TV shows to iPod classic:
1 In iTunes, select iPod classic in the source list and click the TV Shows tab.
2 Select “Sync … episodes” and choose the number of episodes you want from the popup menu.
3 Click “Selected …” and choose “TV shows” or “playlists” from the pop-up menu.
4 Select the movies or playlists you want to sync.
5 Click Apply.Chapter 3 Video Features 37
Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only
items that are checked in your TV Shows and other libraries.
Managing Videos Manually
Setting iTunes to let you manage iPod classic manually gives you the most flexibility for
managing videos on iPod classic. You can add and remove movies, TV shows, and other
items individually. You can also add videos from multiple computers to iPod classic
without removing videos already on iPod classic. See “Managing iPod classic Manually”
on page 24.
Adding Video Podcasts to iPod classic
You add video podcasts to iPod classic the same way you add other podcasts (see
page 25). If a podcast has a video component, the video plays when you choose it from
Podcasts.
If you set iTunes to manage movies and TV shows manually, you can reset iTunes later
to sync them automatically. If you set iTunes to sync automatically after you’ve been
manually managing iPod classic, you lose any items on iPod classic that aren’t part of
your iTunes library.
To reset iTunes to sync all movies automatically on iPod classic:
1 In iTunes, select iPod classic in the source list and click the Movies tab.
2 Select “Sync movies” and then select “All movies.”
3 Click Apply.
Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only
items that are checked in your Movies and other libraries.
To reset iTunes to sync all TV shows automatically on iPod classic:
1 In iTunes, select iPod classic in the source list and click the TV Shows tab.
2 Select “Sync … episodes” and choose “all” from the pop-up menu.
3 Select “All TV shows.”
4 Click Apply.
Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only
items that are checked in your TV Shows and other libraries.
Viewing and Listening to Videos
You can view and listen to videos on iPod classic. If you have an AV cable from Apple
(available separately at www.apple.com/ipodstore), you can watch videos from
iPod classic on TV.38 Chapter 3 Video Features
Viewing and Listening to Videos on iPod classic
Videos you add to iPod classic appear in the Videos menus. Music videos also appear in
Music menus.
To view a video on iPod classic:
m Choose Videos and browse for a video.
When you play the video, you see and hear it.
To listen to a music video’s sound or a video podcast’s sound without playing the
video:
m Choose Music and browse for a music video or a video podcast.
When you play the video, you hear it but don’t see the video.
Watching Videos on a TV Connected to iPod classic
If you have an AV cable from Apple, you can watch videos on a TV connected to your
iPod classic. First you set iPod classic to display videos on a TV, then connect
iPod classic to your TV, and then play a video.
Note: Use the Apple Component AV Cable, the Apple Composite AV Cable, or the
Apple AV Connection Kit. Other similar RCA-type cables might not work. You can
purchase the cables at www.apple.com/ipodstore.
To set iPod classic to display videos on a TV:
m Choose Videos > Settings, and then set TV Out to Ask or On.
If you set TV Out to Ask, iPod classic gives you the option of displaying videos on TV or
on iPod classic every time you play a video.
You can also set video to display full screen or widescreen, and set video to display on
PAL or NTSC devices.
To set TV settings:
m Choose Videos > Settings, and then follow the instructions below.
To set Do this
Video to display on PAL or
NTSC TVs
Set TV Signal to PAL or NTSC.
PAL and NTSC refer to TV broadcast standards. Your TV might use
either of these, depending on the region where it was purchased.
If you aren’t sure which your TV uses, check the documentation
that came with your TV.
The format of your external TV Set TV Screen to Widescreen for 16:9 format or Standard for 4:3
format.
Video to fit to your screen Set “Fit to Screen” to On.
If you set “Fit to Screen” to Off, widescreen videos display in
letterbox format on iPod classic or a standard (4:3) TV screen.
Captions to display Set Captions to On.Chapter 3 Video Features 39
To use the Apple Component AV Cable to connect iPod classic to your TV:
1 Plug the red, green, and blue video connectors into the component video input
(Y, Pb, and Pr) ports on your TV.
You can also use the Apple Composite AV cable. If you do, plug in the yellow video
connector into the video input port on your TV. Your TV must have RCA video and
audio ports.
2 Plug the white and red audio connectors into the left and right analog audio input
ports, respectively, on your TV.
3 Plug the iPod Dock Connector into your iPod classic or Universal Dock.
4 Plug the USB connector into your USB Power Adapter or your computer to keep your
iPod classic charged.
5 Turn on iPod classic and your TV or receiver to start playing.
Make sure you set TV Out on your iPod classic to On.
Note: The ports on your TV or receiver may differ from the ports in the illustration.
To view a video on your TV:
1 Connect iPod classic to your TV (see above).
2 Turn on your TV and set it to display from the input ports connected to iPod classic. See
the documentation that came with your TV for more information.
3 On iPod classic, choose Videos and browse for a video.
USB Power
Adapter
iPod Left audio (white)
Dock Connector
USB
connector
Television
Video in (Y, Pb, Pr)
Right audio (red)4
40
4 Photo Features
You can import digital photos to your computer and add
them to iPod classic. You can view your photos on iPod classic
or as a slideshow on your TV. Read this chapter to learn about
importing and viewing photos.
Importing Photos
You can import digital photos from a digital camera to your computer, and then add
them to iPod classic for viewing. You can connect iPod classic to a TV and view photos
as a slideshow with music.
Importing Photos from a Camera to Your Computer
You can import photos from a digital camera or a photo card reader.
To import photos to a Mac using iPhoto:
1 Connect the camera or photo card reader to your computer. Open iPhoto (located in
the Applications folder) if it doesn’t open automatically.
2 Click Import.
Images from the camera are imported into iPhoto.
You can import other digital images into iPhoto, such as images you download from
the web. For more information about importing and working with photos and other
images, open iPhoto and choose Help > iPhoto Help.Chapter 4 Photo Features 41
iPhoto is available for purchase as part of the iLife suite of applications at
www.apple.com/ilife. iPhoto might already be installed on your Mac, in the
Applications folder.
If you don’t have iPhoto, you can import photos using Image Capture.
To import photos to a Mac using Image Capture:
1 Connect the camera or photo card reader to your computer.
2 Open Image Capture (located in the Applications folder) if it doesn’t open
automatically.
3 To choose specific items to import, click Download Some. Or to download all items,
click Download All.
To import photos to a Windows PC:
m Follow the instructions that came with your digital camera or photo application.
Adding Photos From Your Computer to iPod classic
You can add photos to iPod classic from a folder on your hard disk. If you have a Mac
and iPhoto 4.0.3 or later, you can sync iPhoto albums automatically. If you have a
Windows PC and Adobe Photoshop Album 2.0 or later, or Adobe Photoshop Elements
3.0 or later, you can sync photo collections automatically.
Adding photos to iPod classic the first time might take some time, depending on how
many photos are in your photo library.
To sync photos from a Mac or Windows PC to iPod classic using a photo application:
1 In iTunes, select iPod classic in the source list and click the Photos tab.
2 Select “Sync photos from: …”
 On a Mac, choose iPhoto from the pop-up menu.
 On a Windows PC, choose Photoshop Album or Photoshop Elements from the
pop-up menu.
Note: Some versions of Photoshop Album and Photoshop Elements don’t support
collections. You can still use them to add all your photos.42 Chapter 4 Photo Features
3 If you want to add all your photos, select “All photos and albums.” If you want to keep
your photos organized by event, select “… events” and choose an option from the popup menu. If you want to add photos from only certain albums, select “Selected albums”
and select the albums you want.
4 Click Apply.
Each time you connect iPod classic to your computer, photos are synced automatically.
To add photos from a folder on your hard disk to iPod classic:
1 Drag the images you want into a folder on your computer.
If you want images to appear in separate photo albums on iPod classic, create folders
inside the main image folder, and drag images into the new folders.
2 In iTunes, select iPod classic in the source list and click the Photos tab.
3 Select “Sync photos from:…”
4 Choose “Choose Folder” from the pop-up menu and select your image folder.
5 Click Apply.
When you add photos to iPod classic, iTunes optimizes the photos for viewing.
Full-resolution image files aren’t transferred by default. Adding full-resolution image
files is useful, for example if you want to move them from one computer to another,
but isn’t necessary for viewing the images at full quality on iPod classic.
To add full-resolution image files to iPod classic:
1 In iTunes, select iPod classic in the source list and click the Photos tab.
2 Select “Include full-resolution photos.”
3 Click Apply.
iTunes copies the full-resolution versions of the photos to the Photos folder on
iPod classic.
To delete photos from iPod classic:
1 In iTunes, select iPod classic in the source list and click the Photos tab.
2 Select “Sync photos from: …”
 On a Mac, choose iPhoto from the pop-up menu.
 On a Windows PC, choose Photoshop Album or Photoshop Elements from the pop-up
menu.
3 Choose “Selected albums” and deselect the albums you no longer want on iPod classic.
4 Click Apply.Chapter 4 Photo Features 43
Adding Photos from iPod classic to a Computer
If you add full-resolution photos from your computer to iPod classic using the previous
steps, they’re stored in a Photos folder on iPod classic. You can connect iPod classic to a
computer and put these photos onto the computer. iPod classic must be enabled for
disk use (see “Using iPod classic as an External Disk” on page 46).
To add photos from iPod classic to a computer:
1 Connect iPod classic to the computer.
2 Drag image files from the Photos folder or DCIM folder on iPod classic to the desktop or
to a photo editing application on the computer.
Note: You can also use a photo editing application, such as iPhoto, to add photos
stored in the Photos folder. See the documentation that came with the application for
more information.
To delete photos from the Photos folder on iPod classic:
1 Connect iPod classic to the computer.
2 Navigate to the Photos folder on iPod classic and delete the photos you no longer
want.
Viewing Photos
You can view photos on iPod classic manually or as a slideshow. If you have an optional
AV cable from Apple (for example, Apple Component AV Cable), you can connect
iPod classic to a TV and view photos as a slideshow with music.
Viewing Photos on iPod classic
To view photos on iPod classic:
1 On iPod classic, choose Photos > All Photos. Or choose Photos and a photo album to
see only the photos in the album. Thumbnail views of the photos might take a
moment to appear.
2 Select the photo you want and press the Center button to view a full-screen version.44 Chapter 4 Photo Features
From any photo-viewing screen, use the Click Wheel to scroll through photos. Press the
Next/Fast-forward or Previous/Rewind button to skip to the next or previous screen of
photos. Press and hold the Next/Fast-forward or Previous/Rewind button to skip to the
last or first photo in the library or album.
Viewing Slideshows
You can view a slideshow, with music and transitions if you choose, on iPod classic. If
you have an optional AV cable from Apple, you can view the slideshow on a TV.
To set slideshow settings:
m Choose Photos > Settings, and then follow these instructions:
To set Do this
Slideshows to display on
iPod classic
Set TV Out to Ask or Off.
Slideshows to display on TV Set TV Out to Ask or On.
If you set TV Out to Ask, iPod classic gives you the option of
showing slideshows on TV or on iPod classic every time you start a
slideshow.
How long each slide is shown Choose Time Per Slide and pick a time.
The music that plays during
slideshows
Choose Music and choose a playlist. If you’re using iPhoto, you can
choose From iPhoto to copy the iPhoto music setting. Only the
songs that you’ve added to iPod classic play.
Slides to repeat Set Repeat to On.
Slides to display in random
order
Set Shuffle Photos to On.
Slides to display with
transitions
Choose Transitions and choose a transition type.
Slides to show on PAL
or NTSC TVs
Set TV Signal to PAL or NTSC.
PAL and NTSC refer to TV broadcast standards. Your TV might use
either of these, depending on the region where it was purchased.
If you aren’t sure which your TV uses, check the documentation
that came with your TV.Chapter 4 Photo Features 45
To view a slideshow on iPod classic:
m Select any photo, album, or roll, and press the Play/Pause button. Or select any
full-screen photo and press the Center button. To pause, press the Play/Pause button.
To skip to the next or previous photo, press the Next/Fast-forward or Previous/Rewind
button.
To connect iPod classic to a TV:
1 Connect the optional Apple Component or Composite AV cable to iPod classic.
Note: Use the Apple Component AV Cable, Apple Composite AV Cable, or Apple AV
Connection Kit. Other similar RCA-type cables won’t work. You can purchase the cables
at www.apple.com/ipodstore.
2 Connect the video and audio connectors to the ports on your TV (for an illustration,
see page 39).
Your TV must have RCA video and audio ports.
To view a slideshow on a TV:
1 Connect iPod classic to a TV (see above).
2 Turn on your TV and set it to display from the input ports connected to iPod classic. See
the documentation that came with your TV for more information.
3 On iPod classic, select any photo or album and press the Play/Pause button. Or select
any full-screen photo and press the Center button. To pause, press the Play/Pause
button. To skip to the next or previous photo, press the Next/Fast-forward or Previous/
Rewind button.
If you selected a playlist in Photos > Settings > Music, the playlist plays automatically
when you start the slideshow. The photos display on your TV and advance
automatically according to settings in the Slideshow > Settings menu.5
46
5 Extra Features and Accessories
iPod classic can do a lot more than play songs. And you can
do a lot more with it than listen to music.
Read this chapter to find out more about the extra features of iPod classic, including
how to use it as an external disk, alarm, or sleep timer; show the time of day in other
parts of the world; display notes; and sync contacts, calendars, and to-do lists. Learn
about how to use iPod classic as a stopwatch and to lock the screen, and about the
accessories available for iPod classic.
Using iPod classic as an External Disk
You can use iPod classic as an external disk to store data files.
Note: To add music and other audio or video files to iPod classic, you must use iTunes.
For example, you won’t see songs you add using iTunes in the Mac Finder or in
Windows Explorer. Likewise, if you copy music files to iPod classic in the Mac Finder or
Windows Explorer, you won’t be able to play them on iPod classic.
To enable iPod classic as an external disk:
1 In iTunes, select iPod classic in the source list and click the Summary tab.
2 In the Options section, select “Enable disk use.”
3 Click Apply.
When you use iPod classic as an external disk, the iPod classic disk icon appears on the
desktop on Mac, or as the next available drive letter in Windows Explorer on a Windows
PC.
Note: Clicking Summary and selecting “Manually manage music and videos” in the
Options section also enables iPod classic to be used as an external disk. Drag files to
and from iPod classic to copy them.
If you use iPod classic primarily as a disk, you might want to keep iTunes from opening
automatically when you connect iPod classic to your computer.Chapter 5 Extra Features and Accessories 47
To prevent iTunes from opening automatically when you connect iPod classic to
your computer:
1 In iTunes, select iPod classic in the source list and click the Summary tab.
2 In the Options section, deselect “Open iTunes when this iPod is connected.”
3 Click Apply.
Using Extra Settings
You can set the date and time, clocks in different time zones, and alarm and sleep
features on iPod classic. You can use iPod classic as a stopwatch or to play games, and
you can lock the iPod classic screen.
Setting and Viewing the Date and Time
The date and time are set automatically from your computer’s clock when you connect
iPod classic, but you can change the settings.
To set date and time options:
1 Choose Settings > Date & Time.
2 Choose one or more of the following options:
Adding Clocks for Other Time Zones
To add clocks for other time zones:
1 Choose Extras > Clocks.
2 On the Clocks screen, click the Center button and choose Add.
3 Choose a region and then choose a city.
The clocks you add appear in a list. The last clock you added appears last.
To Do this
Set the date Choose Date. Use the Click Wheel to change the selected value.
Press the Center button to move to the next value.
Set the time Choose Time. Use the Click Wheel to change the selected value.
Press the Center button to move to the next value.
Specify the time zone Choose Time Zone and use the Click Wheel to select a city in
another time zone.
Specify the status of Daylight
Savings Time (DST)
Choose DST and press the Center button to turn DST on or off.
Display the time in 24-hour
format
Choose 24 Hour Clock and press the Center button to turn the
24-hour format on or off.
Display the time in the title bar Choose Time in Title and press the Center button to turn the option
on or off. 48 Chapter 5 Extra Features and Accessories
To delete a clock:
1 Choose Extras > Clocks.
1 Choose the clock.
2 Choose Delete.
Setting the Alarm
You can set an alarm for any clock on iPod classic.
To use iPod classic as an alarm clock:
1 Choose Extras > Alarms.
2 Choose Create Alarm and set one or more of the following options:
To delete an alarm:
1 Choose Extras > Alarms.
2 Choose the alarm and then choose Delete.
Setting the Sleep Timer
You can set iPod classic to turn off automatically after playing or other content for a
specific period of time.
To set the sleep timer:
1 Choose Extras > Alarms.
2 Choose Sleep Timer and choose how long you want iPod classic to play.
Using the Stopwatch
You can use the stopwatch as you exercise to track your overall time and, if you’re
running on a track, your lap times. You can play music while you use the stopwatch.
To Do this
Turn the alarm on Choose Alarm and choose On.
Set the time Choose Time. Use the Click Wheel to change the selected value.
Press the Center button to move to the next value.
Set the date Choose Date. Use the Click Wheel to change the selected value.
Press the Center button to move to the next value.
Choose a sound Choose Tones or a playlist. If you choose Tones, select Beep to hear
the alarm through the internal speaker. If you choose a playlist,
you’ll need to connect iPod classic to speakers or headphones to
hear the alarm.
Set a repeat option Choose Repeat and choose an option (for example, “weekdays”).
Name the alarm Choose Label and choose an option (for example, “Wake up”).Chapter 5 Extra Features and Accessories 49
To use the stopwatch:
1 Choose Extras > Stopwatch.
2 Press the Play/Pause button to start the timer.
3 Press the Center button to record lap times. Up to three lap times show beneath the
overall time.
4 Press the Play/Pause button to stop the overall timer, or choose Resume to start the
timer again.
5 Choose New Timer to start a new stopwatch session.
Note: After you start the stopwatch, iPod classic stays on as long as you display the
Timer screen and the timer continues to run. If you start the stopwatch and then go to
another menu, and iPod classic isn’t playing music or a video, the stopwatch timer
stops and iPod classic turns off automatically after a few minutes.
To review or delete a logged stopwatch session:
1 Choose Extras > Stopwatch.
The current log and a list of saved sessions appear.
2 Choose a log to view session information.
iPod classic stores stopwatch sessions with dates, times, and lap statistics. You see the
date and time the session started; the total time of the session; the shortest, longest,
and average lap times; and the last several lap times.
3 Press the Center button and choose Delete Log to delete the chosen log, or Clear Logs
to delete all current logs.
Playing Games
iPod classic comes with three games: iQuiz, Klondike, and Vortex.
To play a game:
m Choose Extras > Games and choose a game.
You can purchase additional games from the iTunes Store (in some countries) to play
on iPod classic. After purchasing games in iTunes, you can add them to iPod classic by
syncing them automatically or by managing them manually.
To buy a game:
1 In iTunes, select iTunes Store in the source list.
2 Choose iPod Games from the iTunes Store list.
3 Select the game you want and click Buy Game.50 Chapter 5 Extra Features and Accessories
To sync games automatically to iPod classic:
1 In iTunes, select iPod classic in the source list and click the Games tab.
2 Select “Sync games.”
3 Click “All games” or “Selected games.” If you click “Selected games,” also select the
games you want to sync.
4 Click Apply.
Locking the iPod classic Screen
You can set a combination to prevent iPod classic from being used by someone
without your permission. When you lock an iPod classic that isn’t connected to a
computer, you must enter a combination to unlock and use it.
Note: This is different from the Hold button in that the Hold button prevents
iPod classic buttons from being pressed accidentally. The combination prevents
another person from using iPod classic.
To set a combination for iPod classic:
1 Choose Extras > Screen Lock.
2 On the New Combination screen, enter a combination:
 Use the Click Wheel to select a number for the first position. Press the Center button
to confirm your choice and move to the next position.
 Use the same method to set the remaining numbers of the combination. You can use
the Next/Fast-forward button to move to the next position and the Previous/Rewind
button to move to the previous position. Press the Center button in the final
position.
3 On the Confirm Combination screen, enter the combination to confirm it, or press
Menu to exit without locking the screen.
When you finish, you return to the Screen Lock screen, where you can lock the screen
or reset the combination. Press the Menu button to exit without locking the screen.
To lock the iPod classic screen:
m Choose Extras > Screen Lock > Lock.
If you just finished setting your combination, Lock will already be selected on the
screen. Just press the Center button to lock iPod.
When the screen is locked, you see a picture of a lock.
Note: You might want to add the Screen Lock menu item to the main menu so that
you can quickly lock the iPod classic screen. See “Adding or Removing Items from the
Main Menu” on page 9.Chapter 5 Extra Features and Accessories 51
When you see the lock on the screen, you can unlock the iPod classic screen in two
ways:
 Press the Center button to enter the combination on iPod classic. Use the Click Wheel
to select the numbers and press the Center button to confirm them. If you enter the
wrong combination, the lock remains. Try again.
 Connect iPod classic to the primary computer you use it with, and iPod classic
automatically unlocks.
Note: If you try these methods and you still can’t unlock iPod classic, you can restore
iPod classic. See “Updating and Restoring iPod Software” on page 61.
To change a combination you’ve already set:
1 Choose Extras > Screen Lock > Reset.
2 On the Enter Combination screen, enter the current combination.
3 On the New Combination screen, enter and confirm a new combination.
Note: If you can’t remember the current combination, the only way to clear it and enter
a new one is to restore the iPod classic software. See “Updating and Restoring iPod
Software” on page 61.
Syncing Contacts, Calendars, and To-Do Lists
iPod classic can store contacts, calendar events, and to-do lists for viewing on the go.
If you’re using Mac OS X v10.4 or later, you can use iTunes to sync the contact and
calendar information on iPod classic with Address Book and iCal. If you’re using any
version of Mac OS X earlier than 10.4, you can use iSync to sync your information.
Syncing information using iSync requires iSync 1.1 or later, and iCal 1.0.1 or later.
If you’re using Windows 2000 or Windows XP, and you use Windows Address Book or
Microsoft Outlook 2003 or later to store your contact information, you can use iTunes
to sync the address book information on iPod classic. If you use Microsoft Outlook 2003
or later to keep a calendar, you can also sync calendar information.
To sync contacts or calendar information using Mac OS X v10.4 or later:
1 Connect iPod classic to your computer.
2 In iTunes, select iPod classic in the source list and click the Contacts tab.
3 Do one of the following:
 To sync contacts, in the Contacts section, select “Sync Address Book contacts,” and
select an option:
 To sync all contacts automatically, select “All contacts.”
 To sync selected groups of contacts automatically, select “Selected groups” and
select the groups you want to sync.52 Chapter 5 Extra Features and Accessories
 To copy contacts’ photos to iPod classic, when available, select “Include contacts’
photos.”
When you click Apply, iTunes updates iPod classic with the Address Book contact
information you specified.
 To sync calendars, in the Calendars section, select “Sync iCal calendars,” and choose
an option:
 To sync all calendars automatically, choose “All calendars.”
 To sync selected calendars automatically, choose “Selected calendars” and select
the calendars you want to sync.
When you click Apply, iTunes updates iPod classic with the calendar information you
specified.
To sync contacts and calendars with a Mac and iSync using a version of Mac OS X
earlier than v10.4:
1 Connect iPod classic to your computer.
2 Open iSync and choose Devices > Add Device. You need to do this step only the first
time you use iSync with iPod classic.
3 Select iPod classic and click Sync Now. iSync puts information from iCal and Mac
Address Book onto iPod classic.
The next time you want to sync iPod classic, you can simply open iSync and click Sync
Now. You can also choose to have iPod classic sync automatically when you connect it.
Note: iSync syncs information from your computer with iPod classic. You can’t use iSync
to sync information from iPod classic to your computer.
To sync contacts or calendars using Windows Address Book or Microsoft Outlook for
Windows:
1 Connect iPod classic to your computer.
2 In iTunes, select iPod classic in the source list and click the Contacts tab.
3 Do one of the following:
 To sync contacts, in the Contacts section, select “Sync contacts from” and choose
Windows Address Book or Microsoft Outlook from the pop-up menu. Then select
which contact information you want to sync.
 To sync calendars from Microsoft Outlook, in the Calendars section, select “Sync
calendars from Microsoft Outlook.”
4 Click Apply.
You can also add contact and calendar information to iPod classic manually. iPod classic
must be enabled as an external disk (see “Using iPod classic as an External Disk” on
page 46).Chapter 5 Extra Features and Accessories 53
To add contact information manually:
1 Connect iPod classic and open your favorite email or contacts application. You can add
contacts using Palm Desktop, Microsoft Outlook, Microsoft Entourage, and Eudora,
among others.
2 Drag contacts from the application’s address book to the Contacts folder on
iPod classic.
In some cases, you might need to export contacts and then drag the exported file or
files to the Contacts folder. See the documentation for your email or contacts
application.
To add appointments and other calendar events manually:
1 Export calendar events from any calendar application that uses the standard iCal
format (filenames end in .ics) or vCal format (filenames end in .vcs).
2 Drag the files to the Calendars folder on iPod classic.
Note: To add to-do lists to iPod classic manually, save them in a calendar file with a .ics
or .vcs extension.
To view contacts on iPod classic:
m Choose Extras > Contacts.
To sort contacts by first or last name:
m Choose Settings > Sort By, and press the Center button to choose First or Last.
To view calendar events:
m Choose Extras > Calendars.
To view to-do lists:
m Choose Extras > Calendars > To Do’s.
Storing and Reading Notes
You can store and read text notes on iPod classic if it’s enabled as an external disk (see
page 46).
1 Save a document in any word-processing application as a text (.txt) file.
2 Place the file in the Notes folder on iPod classic.
To view notes:
m Choose Extras > Notes.54 Chapter 5 Extra Features and Accessories
Recording Voice Memos
You can record voice memos using an optional iPod classic-compatible microphone
(available for purchase at www.apple.com/ipodstore). You can store voice memos on
iPod classic and sync them with your computer. You can set iPod classic to record at
low-quality mono (22.05 kHz) to save space, or high-quality stereo (44.1 kHz) for better
sound.
Note: Voice memos cannot be longer than two hours. If you record for more than two
hours, iPod classic automatically starts a new voice memo to continue your recording.
To record a voice memo:
1 Connect a microphone to the Dock connector port on iPod classic.
2 Set Quality to Low or High.
3 To begin recording, choose Record.
4 Hold the microphone a few inches from your mouth and speak. To pause recording,
choose Pause.
5 When you finish, choose Stop and Save. Your saved recording is listed by date and time.
To play a recording:
m Choose Extras > Voice Memos and select the recording.
Note: You won’t see a Voice Memos menu item if you’ve never connected a
microphone to iPod classic.
To sync voice memos with your computer:
Voice memos are saved in a Recordings folder on iPod in the WAV file format. If you
enable iPod classic for disk use, you can drag voice memos from the folder to copy
them.
If iPod classic is set to sync songs automatically (see “Syncing Music Automatically” on
page 23) and you record voice memos, the voice memos are automatically synced to a
playlist in iTunes (and removed from iPod classic) when you connect iPod classic. You
see the new Voice Memos playlist in the source list.
Learning About iPod classic Accessories
iPod classic comes with some accessories, and many other accessories are available at
www.apple.com/ipodstore.
To purchase iPod classic accessories, go to www.apple.com/ipodstore. Chapter 5 Extra Features and Accessories 55
Available accessories include:
 iPod Radio Remote
 Apple Universal Dock
 Apple Component AV Cable
 Apple Composite AV Cable
 Apple AV Connection Kit
 Apple USB Power Adapter
 iPod In-Ear Headphones
 World Travel Adapter Kit
 Leather Case for iPod classic
 iPod Socks
 iPod Earphones
 Third-party accessories—such as speakers, headsets, cases, car stereo adapters,
power adapters, and more
To use the earphones:
m Plug the earphones into the Headphones port. Then place the earbuds in your ears as
shown.
WARNING: Permanent hearing loss may occur if earbuds or headphones are used at
high volume. You can adapt over time to a higher volume of sound that may sound
normal but can be damaging to your hearing. If you experience ringing in your ears or
muffled speech, stop listening and have your hearing checked. The louder the volume,
the less time is required before your hearing could be affected. Hearing experts
suggest that to protect your hearing:
 Limit the amount of time you use earbuds or headphones at high volume.
 Avoid turning up the volume to block out noisy surroundings.
 Turn the volume down if you can’t hear people speaking near you.
For information about setting a maximum volume limit on iPod, see “Setting the
Maximum Volume Limit” on page 29.
The earphones
cord is adjustable.6
56
6 Tips and Troubleshooting
Most problems with iPod classic can be solved quickly by
following the advice in this chapter.
General Suggestions
Most problems with iPod classic can be solved by resetting it. First, make sure
iPod classic is charged.
To reset iPod classic:
1 Toggle the Hold switch on and off (slide it to HOLD and then back again).
2 Press and hold the Menu and Center buttons for at least 6 seconds, until the
Apple logo appears.
If iPod classic won’t turn on or respond
 Make sure the Hold switch isn’t set to HOLD.
 The iPod classic battery might need to be recharged. Connect iPod classic to your
computer or to an Apple USB Power Adapter and let the battery recharge. Look for
the lightning bolt icon on the iPod classic screen to verify that iPod classic is
receiving a charge.
The 5 Rs: Reset, Retry, Restart, Reinstall, Restore
Remember these five basic suggestions if you have a problem with iPod classic. Try
these steps one at a time until your issue is resolved. If one of the following doesn’t
help, read on for solutions to specific problems.
 Reset iPod classic. See “General Suggestions,” below.
 Retry with a different USB port if you cannot see iPod classic in iTunes.
 Restart your computer, and make sure you have the latest software updates
installed.
 Reinstall iTunes software from the latest version on the web.
 Restore iPod classic. See “Updating and Restoring iPod Software” on page 61.Chapter 6 Tips and Troubleshooting 57
To charge the battery, connect iPod classic to a USB 2.0 on your computer.
Connecting iPod classic to a USB port on your keyboard won’t charge the battery,
unless your keyboard has a high-powered USB 2.0 port.
 Try the 5 Rs, one by one, until iPod classic responds.
If you want to disconnect iPod classic, but you see the message “Connected” or
“Sync in Progress”
 If iPod classic is syncing music, wait for it to complete.
 Select iPod classic in the iTunes source list and click the Eject (C) button.
 If iPod classic disappears from the list of devices in the iTunes source list, but you still
see the “Connected” or “Sync in Progress” message on the iPod classic screen,
disconnect iPod classic.
 If iPod classic doesn’t disappear from the list of devices in the iTunes source list, drag
the iPod classic icon from the desktop to the Trash (if you’re using a Mac) or, if you’re
using a Windows PC, eject the device in My Computer or click the Safely Remove
Hardware icon in the system tray and select iPod classic. If you still see the
“Connected” or “Sync in Progress” message, restart your computer and eject
iPod classic again.
If iPod classic isn’t playing music
 Make sure the Hold switch isn’t set to HOLD.
 Make sure the headphone connector is pushed in all the way.
 Make sure the volume is adjusted properly. A maximum volume limit might have
been set. You can change or remove it by using Settings > Volume Limit. See “Setting
the Maximum Volume Limit” on page 29.
 iPod classic might be paused. Try pressing the Play/Pause button.
 Make sure you’re using iTunes 7.4 or later (go to www.apple.com/ipod/start). Songs
purchased from the iTunes Store using earlier versions of iTunes won’t play on
iPod classic until you upgrade iTunes.
 If you’re using the iPod Universal Dock, make sure the iPod classic is seated firmly in
the Dock and make sure all cables are connected properly.
If you connect iPod classic to your computer and nothing happens
 Make sure you have installed the latest iTunes software from
www.apple.com/ipod/start.
 Try connecting to a different USB port on your computer.
Note: A USB 2.0 port is recommended to connect iPod classic. USB 1.1 is significantly
slower than USB 2.0. If you have a Windows PC that doesn’t have a USB 2.0 port, in
some cases you can purchase and install a USB 2.0 card. For more information, go to
www.apple.com/ipod.
 iPod classic might need to be reset (see page 56). 58 Chapter 6 Tips and Troubleshooting
 If you’re connecting iPod classic to a portable or laptop computer using the iPod
Dock Connector to USB 2.0 Cable, connect the computer to a power outlet before
connecting iPod classic.
 Make sure you have the required computer and software. See “If you want to doublecheck the system requirements” on page 60.
 Check the cable connections. Unplug the cable at both ends and make sure no
foreign objects are in the USB ports. Then plug the cable back in securely. Make sure
the connectors on the cables are oriented correctly. They can be inserted only one
way.
 Try restarting your computer.
 If none of the previous suggestions solves your problems, you might need to restore
iPod classic software. See “Updating and Restoring iPod Software” on page 61.
If iPod classic displays a “Connect to Power” message
This message may appear if iPod classic is exceptionally low on power and the battery
needs to be charged before iPod classic can communicate with your computer. To
charge the battery, connect iPod classic to a USB 2.0 port on your computer.
Leave iPod classic connected to your computer until the message disappears and
iPod classic appears in iTunes or the Finder. Depending on how depleted the battery is,
you may need to charge iPod classic for up to 30 minutes before it will start up.
To charge iPod classic more quickly, use the optional Apple USB Power Adapter.
Note: Connecting iPod classic to a USB port on your keyboard won’t charge the
battery, unless your keyboard has a high-powered USB 2.0 port.
If iPod classic displays a “Use iTunes to restore” message
 Make sure you have the latest version of iTunes on your computer (download it from
www.apple.com/ipod/start).
 Connect iPod classic to your computer. When iTunes opens, follow the onscreen
prompts to restore iPod classic.
 If restoring iPod classic doesn’t solve the problem, iPod classic may need to be
repaired. You can arrange for service at the iPod Service & Support website:
www.apple.com/support/ipod
If songs or data sync more slowly over USB 2.0
 If you sync a large number of songs or amount of data using USB 2.0 and the
iPod classic battery is low, iPod classic syncs the information at a reduced speed in
order to conserve battery power.
 If you want to sync at higher speeds, you can stop syncing and keep the iPod classic
connected so that it can recharge, or connect it to the optional iPod USB 2.0 Power
Adapter. Let iPod classic charge for about an hour, and then resume syncing your
music or data.Chapter 6 Tips and Troubleshooting 59
If you can’t add a song or other item to iPod classic
The song may have been encoded in a format that iPod classic doesn’t support. The
following audio file formats are supported by iPod classic. These include formats for
audiobooks and podcasting:
 AAC (M4A, M4B, M4P, up to 320 Kbps)
 Apple Lossless (a high-quality compressed format)
 MP3 (up to 320 Kbps)
 MP3 Variable Bit Rate (VBR)
 WAV
 AA (audible.com spoken word, formats 2, 3, and 4)
 AIFF
A song encoded using Apple Lossless format has full CD-quality sound, but takes up
only about half as much space as a song encoded using AIFF or WAV format. The same
song encoded in AAC or MP3 format takes up even less space. When you import music
from a CD using iTunes, it’s converted to AAC format by default.
Using iTunes for Windows, you can convert nonprotected WMA files to AAC or MP3
format. This can be useful if you have a library of music encoded in WMA format.
iPod classic doesn’t support WMA, MPEG Layer 1, MPEG Layer 2 audio files, or
audible.com format 1.
If you have a song in iTunes that isn’t supported by iPod classic, you can convert it to a
format iPod classic supports. For more information, see iTunes Help.
If you accidentally set iPod classic to use a language you don’t understand
You can reset the language.
1 Press and hold Menu until the main menu appears.
2 Choose the sixth menu item (Settings).
3 Choose the last menu item (Reset Settings).
4 Choose the left item (Reset) and select a language.
Other iPod classic settings, such as song repeat, are also reset.
Note: If you added or removed items from the iPod classic main menu (see “Adding or
Removing Items from the Main Menu” on page 9) the Settings menu item may be in a
different place. If you can’t find the Reset Settings menu item, you can restore
iPod classic to its original state and choose a language you understand. See “Updating
and Restoring iPod Software” on page 61.
If you can’t see videos or photos on your TV
 You must use RCA-type cables made specifically for iPod classic, such as the Apple
Component or Apple Composite AV cables, to connect iPod classic to your TV. Other
similar RCA-type cables won’t work.60 Chapter 6 Tips and Troubleshooting
 Make sure your TV is set to display images from the correct input source (see the
documentation that came with your TV for more information).
 Make sure all cables are connected correctly (see “Watching Videos on a TV
Connected to iPod classic” on page 38).
 Make sure the yellow end of the Apple Composite AV Cable is connected to the
video port on your TV.
 If you’re trying to watch a video, go to Videos > Settings and set TV Out to On, and
then try again. If you’re trying to view a slideshow, go to Photos > Slideshow Settings
and set TV Out to On, and then try again.
 If that doesn’t work, go to Videos > Settings (for video) or Photos > Settings (for a
slideshow) and set TV Signal to PAL or NTSC, depending on which type of TV you
have. Try both settings.
If you want to double-check the system requirements
To use iPod classic, you must have:
 One of the following computer configurations:
 A Mac with a USB 2.0 port
 A Windows PC with a USB 2.0 or a USB 2.0 card installed
 One of the following operating systems:
 Mac OS X v10.4.9 or later
 Windows Vista
 Windows XP Home or Professional with Service Pack 2 or later
 iTunes 7.6 or later (iTunes can be downloaded from www.apple.com/ipod/start)
If your Windows PC doesn’t have a USB 2.0 port, you can purchase and install a USB 2.0
card. For more information on cables and compatible USB cards, go to
www.apple.com/ipod.
On the Mac, iPhoto 4.0.3 or later is recommended for adding photos and albums to
iPod classic. This software is optional. iPhoto might already be installed on your Mac.
Check the Applications folder. If you have iPhoto 4 you can update it by choosing
Apple () > Software Update.
On a Windows PC, iPod classic can sync photo collections automatically from Adobe
Photoshop Album 2.0 or later, and Adobe Photoshop Elements 3.0 or later, available at
www.adobe.com. This software is optional.
On both Mac and Windows PC, iPod classic can sync digital photos from folders on
your computer’s hard disk.Chapter 6 Tips and Troubleshooting 61
If you want to use iPod classic with a Mac and a Windows PC
If you’re using iPod classic with a Mac and you want to use it with a Windows PC, you
must restore the iPod software for use with the PC (see “Updating and Restoring iPod
Software” on page 61). Restoring the iPod software erases all data from iPod classic,
including all songs.
You cannot switch from using iPod classic with a Mac to using it with a Windows PC
without erasing all data on iPod classic.
If you lock the iPod classic screen and can’t unlock it
Normally, if you can connect iPod classic to the computer it’s authorized to work with,
iPod classic automatically unlocks. If the computer authorized to work with iPod classic
is unavailable, you can connect iPod classic to another computer and use iTunes to
restore iPod software. See the next section for more information.
If you want to change the screen lock combination and you can’t remember the
current combination, you must restore the iPod software and then set a new
combination.
Updating and Restoring iPod Software
You can use iTunes to update or restore iPod software. It’s recommended that you
update iPod classic to use the latest software. You can also restore the software, which
puts iPod classic back to its original state.
 If you choose to update, the software is updated, but your settings and songs aren’t
affected.
 If you choose to restore, all data is erased from iPod classic, including songs, videos,
files, contacts, photos, calendar information, and any other data. All iPod classic
settings are restored to their original state.
To update or restore iPod classic:
1 Make sure you have an Internet connection and have installed the latest version of
iTunes from www.apple.com/ipod/start.
2 Connect iPod classic to your computer.
3 In iTunes, select iPod classic in the source list and click the Summary tab.
The Version section tells you whether iPod classic is up to date or needs a newer
version of the software.
4 Click Update to install the latest version of the software.
5 If necessary, click Restore to restore iPod classic to its original settings (this erases all
data from iPod classic). Follow the onscreen instructions to complete the restore
process.7
62
7 Safety and Cleaning
Read the following important safety and handling
information for Apple iPods.
Keep the iPod Safety Guide and the features guide for your iPod handy for future
reference.
Important Safety Information
Handling iPod Do not bend, drop, crush, puncture, incinerate, or open iPod.
Avoiding water and wet locations Do not use iPod in rain, or near washbasins or other
wet locations. Take care not to spill any food or liquid into iPod. In case iPod gets wet,
unplug all cables, turn iPod off, and slide the Hold switch (if available) to HOLD before
cleaning, and allow it to dry thoroughly before turning it on again.
Repairing iPod Never attempt to repair iPod yourself. iPod does not contain any userserviceable parts. For service information, choose iPod Help from the Help menu in
iTunes or go to www.apple.com/support/ipod. The rechargeable battery in iPod should
be replaced only by an Apple Authorized Service Provider. For more information about
batteries, go to www.apple.com/batteries.
± Read all safety information below and operating instructions before using
iPod to avoid injury.
WARNING: Failure to follow these safety instructions could result in fire, electric shock,
or other injury or damage.Chapter 7 Safety and Cleaning 63
Using the Apple USB Power Adapter (available separately) If you use the Apple USB
Power Adapter (sold separately at www.apple.com/ipodstore) to charge iPod, make
sure that the power adapter is fully assembled before you plug it into a power outlet.
Then insert the Apple USB Power Adapter firmly into the power outlet. Do not connect
or disconnect the Apple USB Power Adapter with wet hands. Do not use any power
adapter other than an Apple iPod power adapter to charge your iPod.
The iPod USB Power Adapter may become warm during normal use. Always allow
adequate ventilation around the iPod USB Power Adapter and use care when handling.
Unplug the iPod USB Power Adapter if any of the following conditions exist:
 The power cord or plug has become frayed or damaged.
 The adapter is exposed to rain, liquids, or excessive moisture.
 The adapter case has become damaged.
 You suspect the adapter needs service or repair.
 You want to clean the adapter.
Avoiding hearing damage Permanent hearing loss may occur if earbuds or
headphones are used at high volume. Set the volume to a safe level. You can adapt
over time to a higher volume of sound that may sound normal but can be damaging to
your hearing. If you experience ringing in your ears or muffled speech, stop listening
and have your hearing checked. The louder the volume, the less time is required before
your hearing could be affected. Hearing experts suggest that to protect your hearing:
 Limit the amount of time you use earbuds or headphones at high volume.
 Avoid turning up the volume to block out noisy surroundings.
 Turn the volume down if you can’t hear people speaking near you.
For information about how to set a maximum volume limit on iPod, see “Setting the
Maximum Volume Limit” on page 29.
Using headphones safely Use of headphones while operating a vehicle is not
recommended and is illegal in some areas. Be careful and attentive while driving. Stop
using iPod if you find it disruptive or distracting while operating any type of vehicle or
performing any other activity that requires your full attention.
Avoiding seizures, blackouts, and eye strain If you have experienced seizures or
blackouts, or if you have a family history of such occurrences, please consult a
physician before playing video games on iPod (if available). Discontinue use and
consult a physician if you experience: convulsion, eye or muscle twitching, loss of
awareness, involuntary movements, or disorientation. When watching videos or playing
games on iPod (if available), avoid prolonged use and take breaks to prevent eye strain.64 Chapter 7 Safety and Cleaning
Important Handling Information
Carrying iPod iPod contains sensitive components, including, in some cases, a hard
drive. Do not bend, drop, or crush iPod. If you are concerned about scratching iPod,
you can use one of the many cases sold separately.
Using connectors and ports Never force a connector into a port. Check for
obstructions on the port. If the connector and port don’t join with reasonable ease,
they probably don’t match. Make sure that the connector matches the port and that
you have positioned the connector correctly in relation to the port.
Keeping iPod within acceptable temperatures Operate iPod in a place where the
temperature is always between 0º and 35º C (32º to 95º F). iPod play time might
temporarily shorten in low-temperature conditions.
Store iPod in a place where the temperature is always between -20º and 45º C
(-4º to 113º F). Don’t leave iPod in your car, because temperatures in parked cars can
exceed this range.
When you’re using iPod or charging the battery, it is normal for iPod to get warm. The
exterior of iPod functions as a cooling surface that transfers heat from inside the unit to
the cooler air outside.
Keeping the outside of iPod clean To clean iPod, unplug all cables, turn iPod off, and
slide the Hold switch (if available) to HOLD. Then use a soft, slightly damp, lint-free
cloth. Avoid getting moisture in openings. Don’t use window cleaners, household
cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean iPod.
Disposing of iPod properly For information about the proper disposal of iPod,
including other important regulatory compliance information, see “Regulatory
Compliance Information” on page 66.
NOTICE: Failure to follow these handling instructions could result in damage to iPod
or other property.8
65
8 Learning More, Service,
and Support
You can find more information about using iPod classic in
onscreen help and on the web.
The following table describes where to get more iPod-related software and service
information.
To learn about Do this
Service and support,
discussions, tutorials, and
Apple software downloads
Go to: www.apple.com/support/ipod
Using iTunes Open iTunes and choose Help > iTunes Help.
For an online iTunes tutorial (available in some areas only), go to:
www.apple.com/support/itunes
Using iPhoto (on Mac OS X) Open iPhoto and choose Help > iPhoto Help.
Using iSync (on Mac OS X) Open iSync and choose Help > iSync Help.
Using iCal (on Mac OS X) Open iCal and choose Help > iCal Help.
The latest information on
iPod classic
Go to: www.apple.com/ipod
Registering iPod classic To register iPod classic, install iTunes on your computer and
connect iPod classic.
Finding the iPod classic serial
number
Look at the back of iPod classic or choose Settings > About and
press the Center button. In iTunes (with iPod classic connected to
your computer), select iPod classic in the source list and click the
Settings tab.
Obtaining warranty service First follow the advice in this booklet, the onscreen help, and
online resources. Then go to: www.apple.com/support/ipod/
service66
Regulatory Compliance Information
FCC Compliance Statement
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference,
and (2) this device must accept any interference
received, including interference that may cause
undesired operation. See instructions if interference
to radio or TV reception is suspected.
Radio and TV Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed
and used properly—that is, in strict accordance with
Apple’s instructions—it may cause interference with
radio and TV reception.
This equipment has been tested and found to
comply with the limits for a Class B digital device in
accordance with the specifications in Part 15 of FCC
rules. These specifications are designed to provide
reasonable protection against such interference in a
residential installation. However, there is no
guarantee that interference will not occur in a
particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the
interference stops, it was probably caused by the
computer or one of the peripheral devices.
If your computer system does cause interference to
radio or TV reception, try to correct the interference
by using one or more of the following measures:
 Turn the TV or radio antenna until the interference
stops.
 Move the computer to one side or the other of the
TV or radio.
 Move the computer farther away from the TV or
radio.
 Plug the computer in to an outlet that is on a
different circuit from the TV or radio. (That is, make
certain the computer and the TV or radio are on
circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product. Or,
consult an experienced radio/TV technician for
additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc. could void the EMC
compliance and negate your authority to operate
the product.
This product was tested for EMC compliance under
conditions that included the use of Apple peripheral
devices and Apple shielded cables and connectors
between system components.
It is important that you use Apple peripheral devices
and shielded cables and connectors between system
components to reduce the possibility of causing
interference to radios, TV sets, and other electronic
devices. You can obtain Apple peripheral devices and
the proper shielded cables and connectors through
an Apple Authorized Reseller. For non-Apple
peripheral devices, contact the manufacturer or
dealer for assistance.
Responsible party (contact for FCC matters only):
Apple Inc. Product Compliance, 1 Infinite Loop
M/S 26-A, Cupertino, CA 95014-2084, 408-974-2000.
Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment
regulations.
Cet appareil numérique de la classe B respecte
toutes les exigences du Règlement sur le matériel
brouilleur du Canada.
VCCI Class B Statement
Korea Class B Statement
( ૺૺဧ ઠધබ 67
Russia
European Community
Disposal and Recycling Information
Your iPod must be disposed of properly according to
local laws and regulations. Because this product
contains a battery, the product must be disposed of
separately from household waste. When your iPod
reaches its end of life, contact Apple or your local
authorities to learn about recycling options.
For information about Apple’s recycling program,
go to: www.apple.com/environment/recycling
Deutschland: Dieses Gerät enthält Batterien. Bitte
nicht in den Hausmüll werfen. Entsorgen Sie dieses
Gerätes am Ende seines Lebenszyklus entsprechend
der maßgeblichen gesetzlichen Regelungen.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca)
worden gedeponeerd.
China:
Taiwan:
European Union—Disposal Information:
This symbol means that according to local laws and
regulations your product should be disposed of
separately from household waste. When this product
reaches its end of life, take it to a collection point
designated by local authorities. Some collection
points accept products for free. The separate
collection and recycling of your product at the time
of disposal will help conserve natural resources and
ensure that it is recycled in a manner that protects
human health and the environment.
Apple and the Environment
At Apple, we recognize our responsibility to
minimize the environmental impacts of our
operations and products.
For more information, go to:
www.apple.com/environment
© 2008 Apple Inc. All rights reserved. Apple, the Apple logo, FireWire,
iCal, iLife, iPhoto, iPod, iPod Socks, iTunes, Mac, Macintosh, and Mac OS
are trademarks of Apple Inc., registered in the U.S. and other countries.
Finder, the FireWire logo, and Shuffle are trademarks of Apple Inc.
iTunes Store is a service mark of Apple Inc. Other company and
product names mentioned herein may be trademarks of their
respective companies.
Mention of third-party products is for informational purposes only and
constitutes neither an endorsement nor a recommendation. Apple
assumes no responsibility with regard to the performance or use of
these products. All understandings, agreements, or warranties, if any,
take place directly between the vendors and the prospective users.
Every effort has been made to ensure that the information in this
manual is accurate. Apple is not responsible for printing or clerical
errors.
The product described in this manual incorporates copyright
protection technology that is protected by method claims of certain
U.S. patents and other intellectual property rights owned by
Macrovision Corporation and other rights owners. Use of this
copyright protection technology must be authorized by Macrovision
Corporation and is intended for home and other limited viewing uses
only unless otherwise authorized by Macrovision Corporation. Reverse
engineering or disassembly is prohibited.
Apparatus Claims of U.S. Patent Nos. 4,631,603, 4,577,216, 4,819,098 and
4,907,093 licensed for limited viewing uses only.
019-1148/01-2008Index
68
Index
A
accessories for iPod 54
adding album artwork 21
adding menu items 9, 27
adding music
disconnecting iPod 12
from more than one computer 23, 35
manually 24
methods 22
On-The-Go playlists 28
tutorial 65
adding photos
about 40
all or selected photos 41, 42
automatically 41
from computer to iPod 41
from iPod to computer 43
full-resolution image 42
address book, syncing 51
Adobe Photoshop Album 60
Adobe Photoshop Elements 60
alarms
deleting 48
setting 48
album artwork
adding 21
viewing 31
albums, purchasing 19
audiobooks
purchasing 19
setting play speed 32
AV cables 38, 39, 45
B
backlight
setting timer 9
turning on 6, 9
battery
charge states when disconnected 16
charging 14
rechargeable 16
replacing 16
very low 15, 58
viewing charge status 14
brightness setting 10
browsing
iTunes Store 19
podcasts 19
quickly 7
songs 6, 26
videos 6, 19
with Cover Flow 7
buttons
Center 5
disabling with Hold switch 6
Eject 13
buying. See purchasing
C
calendar events, syncing 51
Center button, using 5, 26
Charging, Please Wait message 15, 58
charging the battery
about 14
using the iPod USB Power Adapter 15
using your computer 14
when battery very low 15, 58
cleaning iPod 64
Click Wheel
browsing songs 26
turning off the Click Wheel sound 8
using 5
clocks
adding for other time zones 47
settings 47
close captions 38
compilations 27
component AV cable 38, 39, 45
composite AV cable 38, 39, 45
computer
adding photos to iPod 41
charging the battery 14
connecting iPod 10
getting photos from iPod 43
importing photos from camera 40Index 69
problems connecting iPod 57
requirements 60
connecting iPod
about 10
charging the battery 14
to a TV 39, 45
Connect to Power message 15
contacts
sorting 53
syncing 51
controls
disabling with Hold switch 8
using 5
converting unprotected WMA files 59
converting videos for use with iPod 34
Cover Flow 7
customizing the Music menu 27
D
data files, storing on iPod 46
date and time
setting 47
viewing 47
determining battery charge 16
diamond icon on scrubber bar 6
digital photos. See photos
disconnecting iPod
about 10
during music update 12
ejecting first 12
instructions 13
troubleshooting 57
disk, using iPod as 46
displaying time in title bar 47
downloading
podcasts 19
video podcasts 34
See also adding; syncing
E
Eject button 13
ejecting before disconnecting 12
external disk, using iPod as 46
F
fast-forwarding a song or video 6
features of iPod 4
file formats, supported 59
finding your iPod serial number 6
fit video to screen 38
full-resolution images 42
G
games 49
getting help 65
getting information about your iPod 10
getting started with iPod 60
H
handling information 62
hearing loss warning 55
help, getting 65
Hold switch 6, 8
I
iCal, getting help 65
Image Capture, importing photos to a Mac 41
images. See photos
importing contacts, calendars, and to-do lists. See
syncing
importing photos
from camera to computer 40
See also adding photos
importing videos 34
iPhoto
getting help 40, 65
importing photos from camera 40
recommended version 60
iPod Dock 10
iPod Dock Connector 10
iPod Updater application 61
iPod USB power adapter 14
iSync, getting help 65
iTunes
ejecting iPod 13
getting help 65
setting not to open automatically 46
Sound Check 30
Store 19
iTunes Library, adding songs 20
iTunes Store
browsing 19
browsing videos 34
searching 19
signing in 18, 33
L
language
resetting 59
specifying 10
letterbox 38
library, adding songs 20
lightning bolt on battery icon 14
locating your iPod serial number 6
locking iPod screen 50
lyrics
adding 21
viewing on iPod 3070 Index
M
Mac OS X operating system 60
main menu
adding or removing items 9
opening 5
settings 9, 27
main menu, returning to 6
managing iPod manually 24
manually adding 24
maximum volume limit, setting 29
memos, recording 54
menu items
adding or removing 9, 27
choosing 6
returning to main menu 6
returning to previous menu 6
modifying playlists 24
movies
syncing 37
syncing selected 36
See also videos
music
iPod not playing 57
purchasing 19
rating 28
setting for slideshows 44
tutorial 65
See also adding music; songs
Music menu, customizing 27
music videos
syncing 24
See also videos
N
navigating quickly 7
notes, storing and reading 53
Now Playing screen
moving to any point in a song or video 6
scrubber bar 6
shuffling songs or albums 27
NTSC TV 38, 44
O
On-The-Go playlists
copying to computer 28
making 27
rating songs 28
saving 28
operating system requirements 60
overview of iPod features 4
P
PAL TV 38, 44
pausing
a song 6
a video 6
phone numbers, syncing 51
photo collections, adding automatically 41
photo library 41
photos
adding and viewing 40
deleting 42, 43
full-resolution 42
importing to Windows PC 41
importing using Image Capture 41
syncing 41, 42
viewing on iPod 43
playing
games 49
songs 6
videos 6
playlists
adding songs 6, 24
making on iPod 27
modifying 24
On-The-Go 27
setting for slideshows 45
plug on battery icon 14
podcasting 31
podcasts
browsing 19
downloading 19
downloading video podcasts 34
listening 31
subscribing 19
updating 25
ports
RCA video and audio 39, 45
USB 60
power adapter safety 63
Power Search in iTunes Store 19
previous menu, returning to 6
problems. See troubleshooting
purchasing songs, albums, audiobooks 19
purchasing videos 34
Q
quick navigation 7
R
radio accessory 32
random play 6
rating songs 28
RCA video and audio ports 39, 45
rechargeable batteries 16
recording voice memos 54
registering iPod 65
relative volume, playing songs at 30
removing menu items 9, 27
repairing iPod 62Index 71
replacing battery 16
replaying a song or video 6
requirements
computer 60
operating system 60
reset all settings 10
resetting iPod 6, 56
resetting the language 59
restore message 58
restoring iPod software 61
rewinding a song or video 6
S
Safely Remove Hardware icon 13
safety considerations
setting up iPod 62
safety information 62
saving On-The-Go playlists 28
screen lock 50
scrolling quickly 7
scrubber bar 6
searching
iPod 7
iTunes Store 19
Select button. See Center button
serial number 6, 10
serial number, locating 65
service and support 65
sets of songs. See playlists
setting combination for iPod 50
settings
about your iPod 10
alarm 48
audiobook play speed 32
backlight timer 9
brightness 10
Click Wheel sound 8
date and time 47
language 10
main menu 9, 27
PAL or NTSC TV 38, 44
playing songs at relative volume 30
repeating songs 27
reset all 10
shuffle songs 27
sleep timer 48
slideshow 44
TV 38
volume limit 29
shuffling songs on iPod 6, 27
sleep mode and charging the battery 14
sleep timer, setting 48
slideshows
background music 44
random order 44
setting playlist 45
settings 44
viewing on iPod 45
software
getting help 65
iPhoto 60
iPod Updater 61
support versions 60
updating 61
songs
adding to On-The-Go playlists 6
browsing 6
browsing and playing 26
entering names 21
fast-forwarding 6
pausing 6
playing 6
playing at relative volume 30
purchasing 19
rating 28
repeating 27
replaying 6
rewinding 6
shuffling 6, 27
skipping ahead 6
viewing lyrics 21
See also music
sorting contacts 53
Sound Check 30
standard TV 38
stopwatch 48, 49
storing
data files on iPod 46
notes on iPod 53
subscribing to podcasts 19
supported operating systems 60
suppressing iTunes from opening 46
syncing
address book 51
movies 37
music 22
music videos 24
photos 41, 42
selected movies 36
selected videos 36
to-do lists 51
TV shows 37
videos 35
See also adding
T
third-party accessories 55
time, displaying in title bar 47
timer, setting for backlight 9
time zones, clocks for 4772 Index
title bar, displaying time 47
to-do lists, syncing 51
transitions for slides 44
troubleshooting
connecting iPod to computer 57
cross-platform use 61
disconnecting iPod 57
iPod not playing music 57
iPod won’t respond 56
resetting iPod 56
restore message 58
safety considerations 62
setting incorrect language 59
slow syncing of music or data 58
software update and restore 61
TV slideshows 59
unlocking iPod screen 61
turning iPod on and off 6
tutorial 65
TV
connecting to iPod 39, 45
PAL or NTSC 38, 44
settings 38
viewing slideshows 39, 45
TV shows
syncing 37
See also videos
U
unlocking iPod screen 51, 61
unresponsive iPod 56
unsupported audio file formats 59
updating and restoring software 61
USB 2.0 port
recommendation 60
slow syncing of music or data 58
USB port on keyboard 11, 57
Use iTunes to restore message in display 58
V
video captions 38
video podcasts
downloading 33, 34
viewing on a TV 38
videos
adding to iPod 35
browsing 6
browsing in iTunes Store 19, 34
converting 34
fast-forwarding 6
importing into iTunes 34
pausing 6
playing 6
purchasing 33, 34
replaying 6
rewinding 6
skipping ahead 6
syncing 35
viewing on a TV 38
viewing on iPod 38
viewing album artwork 31
viewing lyrics 30
viewing music videos 38
viewing photos 43
viewing slideshows
on a TV 39, 45
on iPod 45
settings 44
troubleshooting 59
voice memos
recording 54
syncing with your computer 54
volume
changing 6
setting maximum limit 29
W
warranty service 65
widescreen TV 38
Windows
importing photos 41
supported operating systems 60
troubleshooting 61
WMA files, converting 59
Mac OS X Server
Server Administration
For Version 10.5 LeopardK Apple Inc.
© 2007 Apple Inc. All rights reserved.
Under the copyright laws, this manual may not be
copied, in whole or in part, without the written consent
of Apple.
The Apple logo is a trademark of Apple Inc., registered
in the U.S. and other countries. Use of the “keyboard”
Apple logo (Option-Shift-K) for commercial purposes
without the prior written consent of Apple may
constitute trademark infringement and unfair
competition in violation of federal and state laws.
Every effort has been made to ensure that the
information in this manual is accurate. Apple is not
responsible for printing or clerical errors.
Apple
1 Infinite Loop
Cupertino, CA 95014-2084
408-996-1010
www.apple.com
Apple, the Apple logo, AirPort, AppleTalk, Final Cut Pro,
FireWire, iCal, iDVD, iMovie, iPhoto, iPod, iTunes, Mac,
Macintosh, the Mac logo, Mac OS, PowerBook,
QuickTime and SuperDrive are trademarks of Apple Inc.,
registered in the U.S. and other countries.
Finder, the FireWire logo and Safari are trademarks of
Apple Inc.
AppleCare and Apple Store are service marks of
Apple Inc., registered in the U.S. and other countries.
.Mac is a service mark of Apple Inc.
PowerPC is a trademark of International Business
Machines Corporation, used under license therefrom.
Other company and product names mentioned herein
are trademarks of their respective companies. Mention
of third-party products is for informational purposes
only and constitutes neither an endorsement nor a
recommendation. Apple assumes no responsibility with
regard to the performance or use of these products.
The product described in this manual incorporates
copyright protection technology that is protected by
method claims of certain U.S. patents and other
intellectual property rights owned by Macrovision
Corporation and other rights owners. Use of this
copyright protection technology must be authorized by
Macrovision Corporation and is intended for home and
other limited viewing uses only unless otherwise
authorized by Macrovision Corporation. Reverse
engineering or disassembly is prohibited.
Apparatus Claims of U.S. Patent Nos. 4,631,603, 4,577,216,
4,819,098 and 4,907,093 licensed for limited viewing
uses only.
Simultaneously published in the United States and
Canada.
019-0932/2007-09-01 3
1 Contents
Preface 11 About This Guide
11 What’s New in Server Admin
12 What’s in This Guide
12 Using Onscreen Help
13 Mac OS X Server Administration Guides
14 Viewing PDF Guides Onscreen
14 Printing PDF Guides
15 Getting Documentation Updates
15 Getting Additional Information
Chapter 1 17 System Overview and Supported Standards
17 System Requirements for Installing Mac OS X Server
18 Understanding Server Configurations
19 Advanced Configuration in Action
20 Mac OS X Server Leopard Enhancements
21 Supported Standards
23 Mac OS X Server’s UNIX Heritage
Chapter 2 25 Planning
25 Planning
26 Planning for Upgrading or Migrating to Mac OS X Server v10.5
26 Setting Up a Planning Team
27 Identifying the Servers You’ll Need to Set Up
27 Determining Services to Host on Each Server
28 Defining a Migration Strategy
28 Upgrading and Migrating from an Earlier Version of Mac OS X Server
29 Migrating from Windows NT
29 Defining an Integration Strategy
30 Defining Physical Infrastructure Requirements
30 Defining Server Setup Infrastructure Requirements
31 Making Sure Required Server Hardware Is Available
31 Minimizing the Need to Relocate Servers After Setup
32 Defining Backup and Restore Policies4 Contents
32 Understanding Backup and Restore Policies
34 Understanding Backup Types
34 Understanding Backup Scheduling
35 Understanding Restores
36 Other Backup Policy Considerations
37 Command-Line Backup and Restoration Tools
Chapter 3 39 Administration Tools
39 Server Admin
40 Opening and Authenticating in Server Admin
40 Server Admin Interface
41 Customizing the Server Admin Environment
42 Server Assistant
42 Workgroup Manager
43 Workgroup Manager Interface
44 Customizing the Workgroup Manager Environment
44 Directory
45 Directory Interface
46 Directory Utility
46 Server Monitor
48 System Image Management
49 Media Streaming Management
49 Command-Line Tools
50 Xgrid Admin
51 Apple Remote Desktop
Chapter 4 53 Security
53 About Physical Security
54 About Network Security
54 Firewalls and Packet Filters
54 Network DMZ
55 VLANs
55 MAC Filtering
56 Transport Encryption
56 Payload Encryption
57 About File Security
57 File and Folder Permissions
57 About File Encryption
58 Secure Delete
58 About Authentication and Authorization
60 Single Sign-On
60 About Certificates, SSL, and Public Key Infrastructure
61 Public and Private KeysContents 5
61 Certificates
62 Certificate Authorities (CAs)
62 Identities
62 Self-Signed Certificates
62 Certificate Manager in Server Admin
64 Readying Certificates
64 Requesting a Certificate From a Certificate Authority
65 Creating a Self-Signed Certificate
65 Creating a Certificate Authority
67 Using a CA to Create a Certificate for Someone Else
68 Importing a Certificate
68 Managing Certificates
68 Editing a Certificate
69 Distributing a CA Public Certificate to Clients
69 Deleting a Certificate
70 Renewing an Expired Certificate
70 Using Certificates
70 SSH and SSH Keys
71 Key-Based SSH Login
71 Generating a Key Pair for SSH
73 Administration Level Security
73 Setting Administration Level Privileges
73 Service Level Security
74 Setting SACL Permissions
74 Security Best Practices
76 Password Guidelines
76 Creating Complex Passwords
Chapter 5 77 Installation and Deployment
77 Installation Overview
79 System Requirements for Installing Mac OS X Server
79 Hardware-Specific Instructions for Installing Mac OS X Server
79 Gathering the Information You Need
80 Preparing an Administrator Computer
80 About The Server Installation Disc
81 Setting Up Network Services
81 Connecting to the Directory During Installation
81 Installing Server Software on a Networked Computer
81 About Starting Up for Installation
82 Before Starting Up
82 Remotely Accessing the Install DVD
84 Starting Up from the Install DVD
84 Starting Up from an Alternate Partition6 Contents
88 Starting Up from a NetBoot Environment
89 Preparing Disks for Installing Mac OS X Server
96 Identifying Remote Servers When Installing Mac OS X Server
97 Installing Server Software Interactively
97 Installing Locally from the Installation Disc
99 Installing Remotely with Server Assistant
100 Installing Remotely with VNC
101 Using the installer Command-Line Tool to Install Server Software
103 Installing Multiple Servers
104 Upgrading a Computer from Mac OS X to Mac OS X Server
104 How to Keep Current
Chapter 6 105 Initial Server Setup
105 Information You Need
105 Postponing Server Setup Following Installation
106 Connecting to the Network During Initial Server Setup
106 Configuring Servers with Multiple Ethernet Ports
107 About Settings Established During Initial Server Setup
107 Specifying Initial Open Directory Usage
109 Not Changing Directory Usage When Upgrading
109 Setting Up a Server as a Standalone Server
109 Setting Up a Server to Connect to a Directory System
110 Using Interactive Server Setup
111 Setting Up a Local Server Interactively
112 Setting Up a Remote Server Interactively
113 Setting Up Multiple Remote Servers Interactively in a Batch
115 Using Automatic Server Setup
116 Creating and Saving Setup Data
117 Setup Data Saved in a File
118 Setup Data Saved in a Directory
119 Keeping Backup Copies of Saved Setup Data
120 Providing Setup Data Files to Servers
121 How a Server Searches for Saved Setup Data
122 Setting Up Servers Automatically Using Data Saved in a File
125 Setting Up Servers Automatically Using Data Saved in a Directory
128 Determining the Status of Setups
128 Using the Destination Pane for Setup Status Information
128 Handling Setup Failures
128 Handling Setup Warnings
129 Getting Upgrade Installation Status Information
129 Setting Up Services
129 Adding Services to the Server View
130 Setting Up Open DirectoryContents 7
130 Setting Up User Management
130 Setting Up File Services
131 Setting Up Print Service
132 Setting Up Web Service
132 Setting Up Mail Service
133 Setting Up Network Services
133 Setting Up System Image and Software Update Services
133 Setting Up Media Streaming and Broadcasting
133 Setting Up Podcast Producer
134 Setting Up WebObjects Service
134 Setting Up iChat Service
134 Setting Up iCal Service
Chapter 7 135 Management
136 Ports Used for Administration
136 Ports Open By Default
136 Computers You Can Use to Administer a Server
137 Setting Up an Administrator Computer
137 Using a Non-Mac OS X Computer for Administration
138 Using the Administration Tools
138 Opening and Authenticating in Server Admin
139 Adding and Removing Servers in Server Admin
140 Grouping Servers Manually
140 Grouping Servers Using Smart Groups
141 Working With Settings for a Specific Server
143 Changing the IP Address of a Server
144 Changing the Server’s Host Name After Setup
144 Changing Server Configuration Type
145 Administering Services
145 Adding and Removing Services in Server Admin
146 Importing and Exporting Service Settings
146 Controlling Access to Services
147 Using SSL for Remote Server Administration
148 Managing Sharing
149 Tiered Administration Permissions
149 Defining Administrative Permissions
150 Workgroup Manager Basics
151 Opening and Authenticating in Workgroup Manager
151 Administering Accounts
151 Working with Users and Groups
152 Defining Managed Preferences
154 Working with Directory Data
154 Customizing the Workgroup Manager Environment8 Contents
155 Working With Pre-Version 10.5 Computers From Version 10.5 Servers
155 Service Configuration Assistants
155 Critical Configuration and Data Files
159 Improving Service Availability
159 Eliminating Single Points of Failure
160 Using Xserve for High Availability
160 Using Backup Power
161 Setting Up Your Server for Automatic Reboot
162 Ensuring Proper Operational Conditions
162 Providing Open Directory Replication
163 Link Aggregation
164 The Link Aggregation Control Protocol (LACP)
164 Link Aggregation Scenarios
166 Setting Up Link Aggregation in Mac OS X Server
167 Monitoring Link Aggregation Status
168 Load Balancing
169 Daemon Overview
169 Viewing Running Daemons
169 Daemon Control
Chapter 8 171 Monitoring
171 Planning a Monitoring Policy
172 Planning Monitoring Response
172 Server Status Widget
172 Server Monitor
173 RAID Admin
173 Console
173 Disk Monitoring Tools
174 Network Monitoring Tools
175 Notification in Server Admin
176 Monitoring Server Status Overviews Using Server Admin
177 Simple Network Management Protocol (SNMP)
178 Enabling SNMP reporting
178 Configuring snmpd
180 Notification and Event Monitoring Daemons
182 Logging
182 Syslog
183 Directory Service Debug Logging
183 Open Directory Logging
184 AFP Logging
184 Additional Monitoring AidsContents 9
Chapter 9 185 Sample Setup
185 A Single Mac OS X Server in a Small Business
186 How to Set Up the Server
Appendix 195 Mac OS X Server Advanced Worksheet
Glossary 207
Index 22510 Contents 11
Preface
About This Guide
This guide provides a starting point for administering
Mac OS X Leopard Server in advanced configuration mode.
It contains information about planning, practices, tools,
installation, deployment, and more by using Server Admin.
Server Administration is not the only guide you need when administering advanced
mode server, but it gives you a basic overview of planning, installing, and maintaining
Mac OS X Server using Server Admin.
What’s New in Server Admin
Included with Mac OS X Server v10.5 is Server Admin, Apple’s powerful, flexible, fullfeatured server administration tool. Server Admin is reinforced with improvements in
standards support and reliability. Server Admin also delivers a number of
enhancements:
 Newly refined and streamlined interface
 Share Point management (functionality moved from Workgroup Manager)
 Event notification
 Tiered administration (delegated administrative permissions)
 Ability to hide and show services as needed
 Easy and detailed server status overviews for one or many servers
 Groups of servers
 Smart Groups of servers
 Ability to save and restore service configurations easily
 Ability to save and restore Server Admin preferences easily12 Preface About This Guide
What’s in This Guide
This guide includes the following chapters:
 Chapter 1, “System Overview and Supported Standards,” provides a brief overview of
Mac OS X Server systems and standards.
 Chapter 2, “Planning,” helps you plan for using Mac OS X Server.
 Chapter 3, “Administration Tools,” is a reference to the tools used to administer
servers.
 Chapter 4, “Security,” is a brief guide to security policies and practices.
 Chapter 5, “Installation and Deployment,” is an installation guide for Mac OS X Server.
 Chapter 6, “Initial Server Setup,” provides a guide to setting up your server after
installation.
 Chapter 7, “Management,” explains how to work with Mac OS X Server and services.
 Chapter 8, “Monitoring,” shows you how to monitor and log into Mac OS X Server.
Note: Because Apple periodically releases new versions and updates to its software,
images shown in this book may be different from what you see on your screen.
Using Onscreen Help
You can get task instructions onscreen in Help Viewer while you’re managing Leopard
Server. You can view help on a server or an administrator computer. (An administrator
computer is a Mac OS X computer with Leopard Server administration software
installed on it.)
To get help for an advanced configuration of Mac OS X Leopard Server:
m Open Server Admin or Workgroup Manager and then:
 Use the Help menu to search for a task you want to perform.
 Choose Help > Server Admin Help or Help > Workgroup Manager Help to browse
and search the help topics.
The onscreen help contains instructions taken from Server Administration and other
advanced administration guides described in “Mac OS X Server Administration Guides,”
next.
To see the most recent server help topics:
m Make sure the server or administrator computer is connected to the Internet while
you’re getting help.
Help Viewer automatically retrieves and caches the most recent server help topics
from the Internet. When not connected to the Internet, Help Viewer displays cached
help topics.Preface About This Guide 13
Mac OS X Server Administration Guides
Getting Started covers installation and setup for standard and workgroup configurations
of Mac OS X Server. For advanced configurations, Server Administration covers planning,
installation, setup, and general server administration. A suite of additional guides, listed
below, covers advanced planning, setup, and management of individual services. You
can get these guides in PDF format from the Mac OS X Server documentation website:
www.apple.com/server/documentation
This guide... tells you how to:
Getting Started and
Installation & Setup Worksheet
Install Mac OS X Server and set it up for the first time.
Command-Line Administration Install, set up, and manage Mac OS X Server using UNIX commandline tools and configuration files.
File Services Administration Share selected server volumes or folders among server clients
using the AFP, NFS, FTP, and SMB protocols.
iCal Service Administration Set up and manage iCal shared calendar service.
iChat Service Administration Set up and manage iChat instant messaging service.
Mac OS X Security Configuration Make Mac OS X computers (clients) more secure, as required by
enterprise and government customers.
Mac OS X Server Security
Configuration
Make Mac OS X Server and the computer it’s installed on more
secure, as required by enterprise and government customers.
Mail Service Administration Set up and manage IMAP, POP, and SMTP mail services on the
server.
Network Services Administration Set up, configure, and administer DHCP, DNS, VPN, NTP, IP firewall,
NAT, and RADIUS services on the server.
Open Directory Administration Set up and manage directory and authentication services,
and configure clients to access directory services.
Podcast Producer Administration Set up and manage Podcast Producer service to record, process,
and distribute podcasts.
Print Service Administration Host shared printers and manage their associated queues and print
jobs.
QuickTime Streaming and
Broadcasting Administration
Capture and encode QuickTime content. Set up and manage
QuickTime streaming service to deliver media streams live or on
demand.
Server Administration Perform advanced installation and setup of server software, and
manage options that apply to multiple services or to the server as a
whole.
System Imaging and Software
Update Administration
Use NetBoot, NetInstall, and Software Update to automate the
management of operating system and other software used by
client computers.
Upgrading and Migrating Use data and service settings from an earlier version of Mac OS X
Server or Windows NT.14 Preface About This Guide
Viewing PDF Guides Onscreen
While reading the PDF version of a guide onscreen:
 Show bookmarks to see the guide’s outline, and click a bookmark to jump to the
corresponding section.
 Search for a word or phrase to see a list of places where it appears in the document.
Click a listed place to see the page where it occurs.
 Click a cross-reference to jump to the referenced section. Click a web link to visit the
website in your browser.
Printing PDF Guides
If you want to print a guide, you can take these steps to save paper and ink:
 Save ink or toner by not printing the cover page.
 Save color ink on a color printer by looking in the panes of the Print dialog for an
option to print in grays or black and white.
 Reduce the bulk of the printed document and save paper by printing more than one
page per sheet of paper. In the Print dialog, change Scale to 115% (155% for Getting
Started). Then choose Layout from the untitled pop-up menu. If your printer supports
two-sided (duplex) printing, select one of the Two-Sided options. Otherwise, choose
2 from the Pages per Sheet pop-up menu, and optionally choose Single Hairline from
the Border menu. (If you’re using Mac OS X v10.4 or earlier, the Scale setting is in the
Page Setup dialog and the Layout settings are in the Print dialog.)
You may want to enlarge the printed pages even if you don’t print double sided,
because the PDF page size is smaller than standard printer paper. In the Print dialog
or Page Setup dialog, try changing Scale to 115% (155% for Getting Started, which has
CD-size pages).
User Management Create and manage user accounts, groups, and computers. Set up
managed preferences for Mac OS X clients.
Web Technologies Administration Set up and manage web technologies, including web, blog,
webmail, wiki, MySQL, PHP, Ruby on Rails, and WebDAV.
Xgrid Administration and High
Performance Computing
Set up and manage computational clusters of Xserve systems and
Mac computers.
Mac OS X Server Glossary Learn about terms used for server and storage products.
This guide... tells you how to:Preface About This Guide 15
Getting Documentation Updates
Periodically, Apple posts revised help pages and new editions of guides. Some revised
help pages update the latest editions of the guides.
 To view new onscreen help topics for a server application, make sure your server or
administrator computer is connected to the Internet and click “Latest help topics” or
“Staying current” in the main help page for the application.
 To download the latest guides in PDF format, go to the Mac OS X Server
documentation website:
www.apple.com/server/documentation
Getting Additional Information
For more information, consult these resources:
 Read Me documents—important updates and special information. Look for them on
the server discs.
 Mac OS X Server website (www.apple.com/server/macosx)—gateway to extensive
product and technology information.
 Mac OS X Server Support website (www.apple.com/support/macosxserver)—access to
hundreds of articles from Apple’s support organization.
 Apple Discussions website (discussions.apple.com)—a way to share questions,
knowledge, and advice with other administrators.
 Apple Mailing Lists website (www.lists.apple.com)—subscribe to mailing lists so you
can communicate with other administrators using email.16 Preface About This Guide 1
17
1 System Overview and
Supported Standards
Mac OS X Server gives you everything you need to provide
standards-based workgroup and Internet services —
delivering a world-class UNIX-based server solution that’s
easy to deploy and easy to manage.
This chapter contains information you need to make decisions about where and how
you deploy Mac OS X Server. It contains general information about configuration
options, standard protocols used, it’s UNIX roots, and network and firewall
configurations necessary for Mac OS X Server administration.
System Requirements for Installing Mac OS X Server
The Macintosh desktop computer or server onto which you install Mac OS X Server
v10.5 Leopard must have:
 An Intel or PowerPC G4 or G5 processor, 867 MHz or faster
 Built-in FireWire
 At least 1 gigabyte (GB) of random access memory (RAM)
 At least 10 gigabytes (GB) of available disk space
 A new serial number for Mac OS X Server10.5
The serial number used with any previous version of Mac OS X Server will not allow
registration in v10.5.
A built-in DVD drive is convenient but not required.
A display and keyboard are optional. You can install server software on a computer that
has no display and keyboard by using an administrator computer. For more
information, see “Setting Up an Administrator Computer” on page 137. 18 Chapter 1 System Overview and Supported Standards
Understanding Server Configurations
Mac OS X Server can operate in three different configurations: advanced, workgroup,
and standard. Servers in advanced configurations are the most flexible, and require the
most skill to administer. They can be customized for a variety of purposes and needs.
An advanced configuration of Mac OS X Server gives the experienced system
administrator complete control of service configuration to accommodate a wide variety
of business needs. After performing initial setup with Setup Assistant, you use powerful
administration applications such as Server Admin and Workgroup Manager, or
command-line tools, to configure advanced settings for services the server must
provide.
The other two configurations are subsets of the possible services and capabilities of an
advanced configuration. They have a simplified administration application, named
Server Preferences, and are targeted at more specific roles in an organization.
The workgroup configuration of Mac OS X Server is used for a workgroup in an
organization with an existing directory server. A workgroup configuration connects to
an existing directory server in your organization and uses the users and groups from
the organization’s directory in a workgroup server directory.
The standard configuration of Mac OS X Server features automated setup and
simplified administration for an independent server in a small organization.
The following table highlights the features and capabilities of each configuration.
Feature Advanced Workgroup Standard
Service settings
changed with...
Server Admin Server Preferences Server Preferences
Service settings are... Unconfigured Preset to a few
common defaults
Preset to common
defaults
Users and groups
managed with...
Workgroup Manager Server Preferences Server Preferences
User service settings
automatically
provisioned
No Yes Yes
Usable as a standalone
server
Yes No Yes
Usable as an Open
Directory Master
Yes No Yes
Usable as an Open
Directory Replica
Yes Yes No
Usable as a dedicated
network Gateway
Yes No YesChapter 1 System Overview and Supported Standards 19
For more information about the Standard and Workgroup configurations and what
services are enabled by default for them, see Getting Started.
Advanced Configuration in Action
The following illustration depicts several advanced configurations of Mac OS X Server
that serve a large organization.
Each server is set up to provide some of the services. For example, one server provides
iCal, iChat, and mail service for the organization. Another provides QuickTime media
streaming and Podcast Producer.
To ensure high availability of home folders and share points, a master file server and a
backup file server have IP failover configured so that if the master fails, the backup
transparently takes over. The master and backup file servers use an Xsan storage area
network to access the same RAID storage without corrupting it.
Usable as an Active
Directory Replica
Yes No No
Monitored and backed
up using...
Whatever method
implemented by the
system administrator
Server Preferences Server Preferences
Dependant on an
existing service
infrastructure
No Yes No
Dependant on an
existing well-formed
DNS system
Yes Yes No
Feature Advanced Workgroup Standard
The Internet
AirPort
Extreme
DCHP, DNS,
RADIUS, VPN
Open Directory replica
File sharing
Home folders
System imaging
and software update
QuickTime streaming
iCal, iChat, and mail
Open Directory master
Web with wiki and blog20 Chapter 1 System Overview and Supported Standards
For high availability of directory services, Open Directory replicas provide directory
service if the Open Directory master goes offline.
The Open Directory domain has user, group, individual computer, and computer group
accounts. This allows Mac OS X user preferences to be managed at the group and
computer group level.
The web service hosts a website on the Internet for the organization. It also provides
wiki websites on the intranet for groups in the organization.
Mac OS X Server Leopard Enhancements
Mac OS X Server includes more than 250 new features, making it the biggest
improvement to the server operating system since Mac OS X Server was launched.
Here are a few enhancements:
 Xgrid 2 service: Xgrid 2 service lets you achieve supercomputer performance levels
by distributing computations over collections of dedicated or shared Mac OS X
computers. Xgrid 2 features GridAnywhere, allowing Xgrid-enabled software to run
where you choose, even if you haven’t set up a controller or agents; and Scoreboard
for prioritizing which agents are used for each job. Cluster controller provides
centralized access to the distributed computing pool, referred to as a computational
cluster.
 File services: Improved file services includes improved performance and security for
each network file service, notably enhanced SMB support and secure NFS v3 using
Kerberos authentication and AutoFS.
 iChat Server 2: iChat Server 2 can federate its community of users with communities
of other Extensible Messaging and Presence Protocol (XMPP) messaging systems,
such as Google Talk, allowing members of the iChat server community to chat with
members of the federated communities.
 Mail service: Mail service has added support for mail store clustering when used
with Xsan. It also has integrated vacation message functionality. It features improved
performance with 64-bit mail services with SMTP, IMAP, and POP.
 Open Directory 4: This new version of Open Directory includes new LDAP proxy
capability, cross-domain authorization, cascading replication, and replica sets.
 RADIUS authentication: RADIUS allows authentication for clients connecting to the
network via AirPort Base Stations.
 QuickTime Streaming Server 6: Enhanced QuickTime Streaming Server supports
3GPP Release 6 bit-rate adaptation for smooth streaming to mobile phones
regardless of network congestion. It integrates with Open Directory on your server
when authenticating content delivery, and features improved performance with
64-bit service.Chapter 1 System Overview and Supported Standards 21
 Web services: Web server administrators now have Apache 2.2 (for clean and service
upgrade installations) or 1.3 (for system upgraded servers). MySQL 5, PHP, and
Apache are integrated. Ruby on Rails with Mongrel has been included for simplified
development of web-based applications.
Supported Standards
Mac OS X Server provides standards-based workgroup and Internet services. Instead of
developing proprietary server technologies, Apple has built on the best open source
projects: Samba 3, OpenLDAP, Kerberos, Postfix, Apache, Jabber, SpamAssassin, and
more. Mac OS X Server integrates these robust technologies and enhances them with a
unified, consistent management interface.
Because it is built on open standards, Mac OS X Server is compatible with existing
network and computing infrastructures. It uses native protocols to deliver directory
services, file, printer sharing, and secure network access to Mac, Windows, and Linux
clients. A standards-based directory services architecture offers centralized
management of network resources using any LDAP server—even proprietary servers
such as Microsoft Active Directory. The open source UNIX-based foundation makes it
easy to port and deploy existing tools to Mac OS X Server.
The following are some of the standards-based technologies that power Mac OS X
Server:
 Kerberos: Mac OS X Server integrates an authentication authority based on MIT’s
Kerberos technology (RFC 1964) to provide users with single sign-on access to secure
network resources.
Using strong Kerberos authentication, single sign-on maximizes the security of
network resources while providing users with easier access to a broad range of
Kerberos-enabled network services.
For services that have not yet been Kerberized, the integrated SASL service negotiates
the strongest possible authentication protocol.
 OpenLDAP: Mac OS X Server includes a robust LDAP directory server and a secure
Kerberos password server to provide directory and authentication services to Mac,
Windows, and Linux clients. Apple has built the Open Directory server around
OpenLDAP, the most widely deployed open source LDAP server, so it can deliver
directory services for both Mac-only and mixed-platform environments. LDAP
provides a common language for directory access, enabling administrators to
consolidate information from different platforms and define one namespace for all
network resources. This means a single directory for all Mac, Windows, and Linux
systems on the network.22 Chapter 1 System Overview and Supported Standards
 RADIUS: Remote Authentication Dial-In User Service (RADIUS) is an authentication,
authorization and accounting protocol used by the 802.1x security standard for
controlling network access by clients in mobile or fixed configurations. Mac OS X
Server uses RADIUS to integrate with AirPort Base Stations serving as a central MAC
address filter database. By configuring RADIUS and Open Directory you can control
who has access to your wireless network.
Mac OS X Server uses the FreeRADIUS Server Project. FreeRADIUS supports the
requirements of a RADIUS server, shipping with support for LDAP, MySQL,
PostgreSQL, Oracle databases, EAP, EAP-MD5, EAP-SIM, EAP-TLS, EAP-TTLS, EAP-PEAP,
and Cisco LEAP subtypes. Mac OS X Server supports proxying, with failover and load
balancing.
 Mail Service: Mac OS X Server uses robust technologies from the open source
community to deliver comprehensive, easy-to-use mail server solutions. Full support
for Internet mail protocols—Internet Message Access Protocol (IMAP), Post Office
Protocol (POP), and Simple Mail Transfer Protocol (SMTP)—ensures compatibility with
standards-based mail clients on Mac, Windows, and Linux systems.
 Web Technologies: Mac OS X Server web technologies are based on the open
source Apache web server, the most widely used HTTP servers on the Internet. With
performance optimized for Mac OS X Server, Apache provides fast, reliable web
hosting and an extensible architecture for delivering dynamic content and
sophisticated web services. Because web service in Mac OS X Server is based on
Apache, you can add advanced features with plug-in modules.
Mac OS X Server includes everything professional web masters need to deploy
sophisticated web services: integrated tools for collaborative publishing, inline
scripting, Apache modules, custom CGIs, and JavaServer Pages and Java Servlets.
Database-driven sites can be linked to the included MySQL database. ODBC and
JDBC connectivity to other database solutions is also supported.
Web service also includes support for Web-based Distributed Authoring and
Versioning, known as WebDAV.
 File Services: You can configure Mac OS X Server file services to allow clients to
access shared files, applications, and other resources over a network. Mac OS X Server
supports most major service protocols for maximum compatibility including:
 Apple Filing Protocol (AFP), to share resources with clients who use Macintosh
computers.
 Server Message Block (SMB), protocol to share resources with clients who use
Windows computers. This protocol is provided by the Samba open source project.
 Network File System (NFS), to share files and folders with UNIX clients.
 File Transfer Protocol (FTP), to share files with anyone using FTP client software.Chapter 1 System Overview and Supported Standards 23
 IPv6: IPv6 is short for “Internet Protocol Version 6 (RFC 2460). IPv6 is the Internet’s
next-generation protocol designed to replace the current Internet Protocol, IP
Version 4 (IPv4, or just IP). IPv6 improves routing and network autoconfiguration. It
increases the number of network addresses to over 3 x1038
, and eliminates the need
for NAT. IPv6 is expected to gradually replace IPv4 over a number of years, with the
two coexisting during the transition. Mac OS X Server’s network services are fully IPv6
capable and ready to transition to the next generation addressing as well as being
fully able to operate with IPv4.
 SNMP: The Simple Network Management Protocol (SNMP) is used to monitor
network–attached devices’ operational status. It is a set of Internet Engineering Task
Force (IETF)–designed standards for network management, including an Application
Layer protocol, a database schema, and a set of data objects. Mac OS X Server uses
the open source net-snmp suite to provide SNMPv3 (i.e. RFCs 3411-3418) service.
Mac OS X Server’s UNIX Heritage
Mac OS X Server has a UNIX-based foundation built around the Mach microkernel and
the latest advances from the Berkeley Software Distribution (BSD) open source
community. This foundation provides Mac OS X Server with a stable, high-performance,
64-bit computing platform for deploying server-based applications and services.
Mac OS X Server is built on an open source operating system called Darwin, which is
part of the BSD family of UNIX-like systems. BSD is a family of UNIX variants descended
from Berkeley’s version of UNIX. Also, Mac OS X Server incorporates more than 100
open source projects in addition to proprietary enhancements and extended
functionality created by Apple.
The BSD portion of the Mac OS X kernel is derived primarily from FreeBSD, a version of
4.4BSD that offers advanced networking, performance, security, and compatibility
features. In general, BSD variants are derived (sometimes indirectly) from 4.4BSD-Lite
Release 2 from the Computer Systems Research Group (CSRG) at the University of
California at Berkeley. Although the BSD portion of Mac OS X is primarily derived from
FreeBSD, some changes have been made. To find out more about the low-level
changes made see Apple’s Developer documentation for Darwin.24 Chapter 1 System Overview and Supported Standards 2
25
2 Planning
Before installing and setting up Mac OS X Server do a little
planning and become familiar with your options.
The major goals of the planning phase are to make sure that:
 Server user and administrator needs are addressed by the servers you deploy
 Server and service prerequisites that affect installation and initial setup are identified
Installation planning is especially important if you’re integrating Mac OS X Server into
an existing network, migrating from earlier versions of Mac OS X Server, or preparing to
set up multiple servers. But even single-server environments can benefit from a brief
assessment of the needs you want a server to address.
Use this chapter to stimulate your thinking. It doesn’t present a rigorous planning
guide, nor does it provide the details you need to determine whether to implement a
particular service and assess its resource requirements. Instead, view this chapter as an
opportunity to think about how to maximize the benefits of Mac OS X Server in your
environment.
Planning, like design, isn’t necessarily a linear process. The sections in this chapter don’t
require you to follow a mandatory sequence. Different sections in this chapter present
suggestions that could be implemented simultaneously or iteratively.
Planning
During the planning stage, determine how you want to use Mac OS X Server and
identify whether there’s anything you need to accomplish before setting it up.
For example, you might want to convert an existing server to v10.5 and continue
hosting directory, file, and mail services for clients on your network.
Before you install server software, you might need to prepare data to migrate to your
new server, and perhaps consider whether it’s a good time to implement a different
directory services solution. 26 Chapter 2 Planning
During the planning stage, you’ll also decide which installation and server setup
options best suit your needs. For example, Getting Started contains an example that
illustrates server installation and initial setup in a small business scenario with the
server in standard configuration mode.
Planning for Upgrading or Migrating to Mac OS X Server v10.5
If you’re using a previous version of Mac OS X Server and you want to reuse data and
settings, you can upgrade or migrate to v10.5.
You can upgrade to Leopard Server if you’re using Mac OS X Server v10.4 Tiger or v10.3
Panther and you don’t need to replace server hardware. Upgrading is simple because it
preserves existing settings and data. You can perform an upgrade using any of the
installation methods described in this chapter or the advanced methods described in
this guide.
If you can’t perform an upgrade, for example when you need to reformat the startup
disk or replace your server hardware, you can migrate data and settings to a computer
that you’ve installed Leopard Server on.
Migration is supported from the latest version of Mac OS X Server v10.4 Tiger, Mac OS X
Server v10.3.9 Panther, Mac OS X Server v10.2.8 Jaguar, and Windows NT 4 or later. For
complete information about migrating data and settings to a different Mac or Xserve,
see Upgrading and Migrating. The upgrading and migrating guide provides complete
instructions for reusing data and settings in both these scenarios.
Setting Up a Planning Team
Involve individuals in the installation planning process who represent various points of
view, and who can help answer the following questions:
 What day-to-day user requirements must be met by a server? What activities will
server users and workgroups depend on the server for?
If the server is used in a classroom, make sure the instructor who manages its
services and administers it daily provides input.
 What user management requirements must be met? Will user computers be diskless
and therefore need to be started up using NetBoot? Will Macintosh client
management and network home folders be required?
Individuals with server administration experience should work with server users who
might not have a technical background, so they’ll understand how certain services
might benefit them.Chapter 2 Planning 27
 What existing non-Apple services, such as Active Directory, will the server need to
integrate with?
If you’ve been planning to replace a Windows NT computer, consider using Mac OS X
Server with its extensive built-in support for Windows clients. Make sure that
administrators familiar with these other systems are part of the planning process.
 What are the characteristics of the network into which the server will be installed?
Do you need to upgrade power supplies, switches, or other network components? Is
it time to streamline the layout of facilities that house your servers?
An individual with systems and networking knowledge can help with these details as
well as completing the Mac OS X Server Advanced Worksheet in the appendix.
Identifying the Servers You’ll Need to Set Up
Conduct a server inventory:
 How many servers do you have?
 How are they used?
 How can you streamline the use of servers you want to keep?
 Are there existing servers that need to be retired? Which ones can Mac OS X Server
replace?
 Which non-Apple servers will Mac OS X Server need to be integrated with? Why?
 Do you have Mac OS X Server computers that need to be upgraded to version 10.5?
 How many new Mac OS X Server computers will you need to set up?
Determining Services to Host on Each Server
Identify which services you want to host on each Mac OS X Server and non-Apple
server you decide to use.
Distributing services among servers requires an understanding of both users and
services. Here are a few examples of how service options and hardware and software
requirements can influence what you put on individual servers:
 Directory services implementations can range from using directories and Kerberos
authentication hosted by non-Apple servers to setting up Open Directory directories
on servers distributed throughout the world. Directory services require thoughtful
analysis and planning. Open Directory Administration can help you understand the
options and opportunities.
 Home folders for network users can be consolidated onto one server or distributed
among various servers. Although you can move home folders, you might need to
change a large number of user and share point records, so devise a strategy that will
persist for a reasonable amount of time. For information about home folders, see
User Management.28 Chapter 2 Planning
 Some services offer ways to control the amount of disk space used by individual
users. For example, you can set up home folder and mail quotas for users. Consider
whether using quotas will offer a way to maximize the disk usage on a server that
stores home folders and mail databases. User Management describes home folder
and user mail quotas, and Mail Service Administration describes service-wide mail
quotas.
 Disk space requirements are also affected by the type of files a server hosts. Creative
environments need high-capacity storage to accommodate large media files, but
elementary school classrooms have more modest file storage needs. File Services
Administration describes file sharing.
 If you’re setting up a streaming media server, allocate enough disk space to
accommodate a certain number of hours of streamed video or audio. For hardware
and software requirements and for a setup example, see QuickTime Streaming and
Broadcasting Administration.
 The number of NetBoot client computers you can connect to a server depends on
the server’s Ethernet connections, the number of users, the amount of available RAM
and disk space, and other factors. DHCP service needs to be available. For NetBoot
capacity planning guidelines, see System Imaging and Software Update Administration.
 Mac OS X Server offers extensive support for Windows users. You can consolidate
Windows user support on servers that provide PDC services, or you can distribute
services for Windows users among different servers. The Open Directory
Administration and File Services Administration describe the options available to you.
 If you want to use software RAID to stripe or mirror disks, you’ll need two or more
drives (they can’t be FireWire drives) on a server. For more information, see online
Disk Utility Help.
Before finalizing decisions about which servers will host particular services, familiarize
yourself with information in the administration guides for services you want to deploy.
Defining a Migration Strategy
If you’re using Mac OS X Server v10.2–10.4 or a Windows NT server, examine the
opportunities for moving data and settings to Mac OS X Server v10.5.
Upgrading and Migrating from an Earlier Version of Mac OS X Server
If you’re using computers with Mac OS X Server versions 10.2, 10.3, or 10.4, consider
upgrading or migrating them to an advanced configuration of Mac OS X Server v10.5
Leopard.
If you’re using Mac OS X Server v10.4 or v10.3 and you don’t need to move to different
computer hardware, you can perform an upgrade installation. Upgrading is simple
because it preserves your existing settings and data.Chapter 2 Planning 29
When you can’t use the upgrade approach, you can migrate data and settings. You’ll
need to migrate, not upgrade, when:
 A version 10.3 or 10.4 server’s hard disk needs reformatting or the server doesn’t
meet the minimum Leopard Server system requirements. For more information, see
“Understanding System Requirements for Installing Mac OS X Server” on page 66.
 You want to move data and settings you’ve been using on a v10.3 or 10.4 server to
different server hardware.
 You want to move data and settings you’ve been using on a v10.2 server.
Migration is supported from the latest versions of Mac OS X Server v10.4, v10.3, and
v10.2. When you migrate, you install and set up an advanced configuration of Leopard
Server, restore files onto it from the earlier server, and make manual adjustments as
required.
For complete information, read Upgrading and Migrating.
Migrating from Windows NT
An advanced configuration of Leopard Server can provide a variety of services to users
of Microsoft Windows 95, 98, ME, XP, NT 4, and 2000 computers. By providing these
services, Leopard Server can replace Windows NT servers in small workgroups.
For information about migrating users, groups, files, and more from a Windows NT
server to Mac OS X Server, see Upgrading and Migrating.
Defining an Integration Strategy
Integrating Mac OS X Server into a heterogeneous environment has two aspects:
 Configuring Mac OS X Server to take advantage of existing services
 Configuring non-Apple computers to use Mac OS X Server
The first aspect primarily involves directory services integration. Identify which
Mac OS X Server computers will use existing directories (such as Active Directory,
LDAPv3, and NIS directories) and existing authentication setups (such as Kerberos). For
options and instructions, see Open Directory Administration. Integration can be as easy
as enabling a Directory Utility option, or it might involve adjusting existing services and
Mac OS X Server settings.
The second aspect is largely a matter of determining the support you want Mac OS X
Server to provide to Windows computer users. File Services Administration and Open
Directory Administration tell you what’s available. 30 Chapter 2 Planning
Defining Physical Infrastructure Requirements
Determine whether you need to make site or network topology adjustments before
installing and setting up servers.
 Who will administer the server, and what kind of server access will administrators
need?
Classroom servers might need to be conveniently accessible for instructors, while
servers that host network-wide directory information should be secured with
restricted access in a district office building or centralized computer facility.
Because Mac OS X Server administration tools offer complete remote server
administration support, there are few times when an administrator should need
physical access to a server.
 Are there air conditioning or power requirements that must be met? For this kind of
information, see the documentation that comes with server hardware.
 Are you considering upgrading elements such as cables, switches, and power
supplies? Now may be a good time to do it.
 Is your TCP/IP network and its subnets configured to support the services and servers
you want to deploy?
Defining Server Setup Infrastructure Requirements
The server setup infrastructure consists of the services and servers you must set up in
advance because other services or servers depend on them.
For example, If you’ll use Mac OS X Server to provide DHCP, network time, or BootP
services to other servers, you should set up the server or servers that provide these
services and initiate the services before you set up servers that depend on those
services. Or if you want to automate server setup by using setup data stored in a
directory, you should set DHCP and directory servers.
The amount of setup infrastructure you require depends on the complexity of your site
and what you want to accomplish. In general, DHCP, DNS, and directory services are
desirable or required for medium-sized and larger server networks:
 The most fundamental infrastructure layer comprises network services like DHCP and
DNS.
All services run better if DNS is on the network, and many services require DNS to
work properly. If you’re not hosting DNS, work with the administrator responsible for
the DNS server you’ll use when you set up your own servers. DNS requirements for
individual services are published in the service-specific administration guides.
Setting up DHCP will reflect the physical network topology you’ll be using.Chapter 2 Planning 31
 Another crucial infrastructure component is directory services, required for sharing
data among services, servers, and user computers. The most common data you need
to share is for users and groups, but configuration information such as mount
records and other directory data is also shared.
A directory services infrastructure is necessary when you want to host cross-platform
authentication and when you want different services to share the same names and
passwords.
Here’s an example of the sequence in which you might set up a server infrastructure
that includes DNS, DHCP, and directory services. The services can be set up on the same
server or on different servers:
1 Set up the DNS server.
2 Set up DHCP.
3 Configure DHCP to specify the DNS server address so it can be served to DHCP clients.
4 Set up a directory server, including Windows PDC service if required.
5 Populate the directory with data, such as users, groups, and home folder data.
This process can involve importing users and groups, setting up share points, setting
up managed preferences, and so forth.
6 Configure DHCP to specify the address of the directory server so it can be served to
DHCP clients.
Your particular needs may affect this sequence. For example, if you want to use VPN,
NAT, or IP firewall services, you would factor their setup into the DNS and DHCP setups.
Making Sure Required Server Hardware Is Available
You might want to postpone setting up a server until all its hardware is in place.
For example, you might not want to set up a server whose data you want to mirror
until all the disk drives that you need to set up for mirroring are available. You might
also want to wait until a RAID subsystem is set up before setting up a home folder
server or other server that will use it.
Minimizing the Need to Relocate Servers After Setup
Try to place a server in its final network location (IP subnet) before setting it up for the
first time. If you’re concerned about preventing unauthorized or premature access
during setup, you can set up a firewall to protect the server while finalizing its
configuration.32 Chapter 2 Planning
If you can’t avoid moving a server after initial setup, you must change settings that are
sensitive to network location before it can be used. For example, the server’s IP address
and host name, stored in both directories and configuration files on the server, must be
updated.
When you move a server, follow these guidelines:
 Minimize the time the server is in its temporary location so the amount of
information you need to change is limited.
 Postpone configuring services that depend on network settings until the server is in
its final location. Such services include Open Directory replication, Apache settings
(such as virtual domains), DHCP, and other network infrastructure settings that other
computers depend on.
 Wait to import final user accounts. Limit accounts to test accounts so you minimize
the user-specific network information (such as home folder location) that must
change after the move.
 After you move the server, you can change its IP address in the Network pane of
System Preferences (or use the networksetup tool).
Within a few minutes after you change the server’s IP address or name, Mac OS X
Server automatically uses the changeip command-line tool to update the name,
address, other data stored in the Open Directory domain, local directory domain, and
service configuration files on the server.
You may need to manually adjust network configurations such as the server’s DNS
entries its DHCP static mapping. For information about the changeip tool, see its man
page and Command-Line Administration.
 Reconfigure the search policy of computers (such as user computers and DHCP
servers) that have been configured to use the server in its original location.
Defining Backup and Restore Policies
All storage systems will fail eventually. Either through equipment wear and tear,
accident, or disaster, your data and configuration settings are vulnerable to loss. Before
installing any data system, you should have a plan in place to prevent or minimize your
data loss.
Understanding Backup and Restore Policies
There are many reasons to have a backup and restore policy. Your data is subject to
material failure through wear, natural or man-made disasters, or just data corruption.
Some data loss is beyond your control to prevent, but with a backup and restore plan,
you’ll have your data again.Chapter 2 Planning 33
These backup and restore policies must be customized to your situation, your needs,
and your own determination of what data needs to be saved, how often, and how
much time and effort is used to restore it.
Backups are an investment of time, money, administration effort, and often
performance. However, there is a clear return on investment in the form of data
integrity. You can avoid substantial financial, legal, and organizational costs with a wellplanned and executed backup and restore policy. These policies specify the procedures
and practices that fulfill your restoration needs.
There are essentially three kinds of restoration needs:
 Restoring a deleted or corrupt file
 Recovering from disk failure (or catastrophic file deletion)
 Archiving data for some organization need (financial, legal, and so forth)
Each restoration need determines what type, frequency, and method you use to back
up your data.
You may want to keep daily backups of all files. This allows for quick restoration of
individual overwritten or deleted files. In such a case you have file-level granularity
every day: any single file can be restored the following day.
There are other levels of granularity as well. For example, you may need to restore and
entire day’s data at once. This is a daily snapshot-level granularity: you could restore
the entire set of your organization’s data as it was on a given day. These daily snapshots
may not be practical to maintain for every day for the life of the organization, so you
might choose to keep a set of rolling snapshots that give you daily snapshot-level
granularity for only the preceding month. Other levels of restoration you might want or
need could be quarter-yearly, semi-annually, or so forth.
You may also need archival storage, which is data stored only to be accessed in
uncommon circumstances. Archival storage can be in a permanent state, meaning the
data is kept for the foreseeable future.
Your organization must determine:
 What needs to be backed up?
 How granular are the restoration needs?
 How often is the data backed up?
 How accessible is the data (how much time will it take to restore it?
 What processes are in place to recover from a disaster during a backup or restore
procedure?
The answers to these questions are an integral part of your backup and restore policy.34 Chapter 2 Planning
Understanding Backup Types
There are many different types of backup files (explained below), and within each type
there are many different formats and methods. Each backup type serves a different
purpose and has different considerations.
 Full Images: Full images are byte-level copies of data. They capture the entire state
of the hard disk down to the most basic storage unit. These backups also keep copies
of the disk filesystem and the unused or erased portion of the disk in question.They
can be used for forensic study of the source disk medium. Such fidelity often makes
individual file restoration more unwieldy. They are often compressed and are only
decompressed to restore the entire file set.
 Full File-level Copies: Full file-level copies are backup files that are kept as
duplicates. They do not capture the finest detail of unused portions of the source
disk, but they do provide a full record of the files as they existed at the time of
backup. If a single file changes, the next full file-level backup will make a copy of the
whole data set in addition to the file that changed.
 Incremental Backups: Incremental backups start with file-level copies, but they only
copy changed files since the last backup. This has the benefit of saving storage space,
and capturing all applicable changes as they happen.
 Snapshots: Snapshots are a copy of data as it was in the past. Snapshots can be
made from collections of files, or more often made from links to other files within a
backup file set. Snapshots are useful for making backups of volatile data (data that
changes quickly, like databases in use or mail servers sending and receiving mail).
These backup types are not mutually exclusive; they only exemplify different
approaches to copying data for backup purposes. For example, Mac OS X’s Time
Machine uses a full file-level copy as a base backup; then it uses incremental backups
to create snapshots of a computer’s data on any given day.
Understanding Backup Scheduling
Backing up files requires time and resources. Before deciding on a backup plan,
consider some of the following questions:
 How much data will be backed up?
 How much time will the backup take?
 When does the backup need to happen?
 What else is the computer doing during that time?
 What sort of resource allocation will be necessary?
For example, how much network bandwidth will be necessary to accommodate the
load? How much space on backup drives, or how many backup tapes will be
required? What sort of drain on computing resources will occur during backup? What
personnel will be necessary for the backup?Chapter 2 Planning 35
You will find that different kinds of backup require different answers to these questions.
For example, an incremental file copy might take less time and copy less data than a
full file copy (because only a fraction of any given data set will have changed since the
last backup).
Therefore an incremental backup might be scheduled during a normal use period
because the impact to users and systems may be very low. However, a full image
backup might have a very strong impact for users and systems, if done during the
normal use period.
Choosing a Backup Rotation Scheme
A backup rotation scheme determines the most efficient way to back up data over a
specific period of time. An example of a rotation scheme is the grandfather-father-son
rotation scheme. In this scheme, you perform incremental daily backups (son), and full
weekly (father) and monthly (grandfather) backups.
In the grandfather-father-son rotation scheme, the number of media sets you use for
backup determines how much backup history you have. For example, if you use eight
backup sets for daily backups, you have eight days of daily backup history because
you’ll recycle media sets every eight days.
Understanding Restores
No backup policy or solution is complete without having accompanying plans for data
restoration. Depending on what is being restored, you may have different practices and
procedures. For example, your organization may have specific tolerances for how long
critical systems can be out of use while the data is restored.
You may want to consider the following questions:
 How long will it take to restore data at each level of granularity?
For example, how long will a deleted file or email take to restore? How long will a full
hard disk image take to restore? How long would it take to return the whole network
to its state three days ago?
 What process is most effective for each type of restore?
For example, why would we roll back the entire server for a single lost file?
 How much administrator action is necessary for each type of restore? How much
automation must be developed to best use administrators’ time?
 Under what circumstances are the restores initiated? Who and what can start a
restore and for what reasons?
Restore practices and procedures must be tested regularly. A backup data set that has
not been proven to restore correctly cannot be considered a trustworthy backup.
Backup integrity is measured by restore fidelity.36 Chapter 2 Planning
Defining a Backup Verification Mechanism
A backup is no good if you can’t use it to restore lost data. You should have a strategy
for regularly conducting test restorations. Some third-party software providers support
this functionality. However, if you’re using your own backup solutions, you need to
develop the necessary test procedures.
Other Backup Policy Considerations
Consider the following additional items for your backup policy:
 Should file compression be used? If so, what kind?
 Are there onsite and offsite backups and archives?
 Are there any special considerations for the type of data being stored? For example,
for Mac OS X files, can the backup utility preserve file metadata, resource forks, and
Access Control List (ACL) privileges?
Choosing Backup Media Type
Several factors help you determine what type of media to choose:
 Cost. Use cost per GB to determine what media to choose. For example, if your
storage needs are limited, you can justify higher cost per GB, but if you need a large
amount of storage, cost becomes a big factor in your decision.
One of the most cost-effective storage solutions is a hard drive RAID. Not only does it
provide you with a low cost per GB, but it doesn’t require the special handling
needed by other cost-effective storage types, such as tape drives.
 Capacity. If you back up only a small amount of data, low-capacity storage media
can do the job. But if you need to back up large amounts of data, use high-capacity
devices, such as a RAID.
 Speed. When your goal is to keep your server available most of the time, restoration
speed becomes a big factor in deciding which type of media to choose. Tape backup
systems can be very cost-effective, but they are much slower than a RAID.
 Reliability. Successful restoration is the goal of a good backup strategy. If you can’t
restore lost data, all the effort and cost you spent in backing up data is wasted and
the availability of your services compromised.
Therefore, it’s important that you choose highly reliable media to prevent data loss.
For example, tapes are more reliable than hard disks because they don’t contain
moving parts.
 Archive life. You never know when you’ll need your backed up data. Therefore,
choose media that is designed to last for a long time. Dust, humidity, and other
factors can damage storage media and result in data loss.Chapter 2 Planning 37
Command-Line Backup and Restoration Tools
Mac OS X Server provides several command-line tools for data backup and restoration:
 rsync. Use this command to keep a backup copy of your data in sync with the
original. The tool rsync only copies the files that have changed.
 ditto. Use this command to perform full backups.
 asr. Use this command to back up and restore an entire volume.
For more information about these commands, see Command-Line Administration.
Leopard’s Time Machine feature is not recommended for server file and system backup
of advanced configuration servers.
Note: You can use the launchdctl command to automate data backup using
the aforementioned commands. For more information about using launchd,
see Command-Line Administration.38 Chapter 2 Planning 3
39
3 Administration Tools
Manage Mac OS X Server using graphical applications or
command-line tools.
Mac OS X Server tools offer diverse approaches to server administration:
 You can administer servers locally (directly on the server you’re using) or remotely,
from another server, a Mac OS X computer, or a UNIX workstation.
 Graphical applications, such as Server Admin and Workgroup Manager, offer easy-touse server administration and secure communications for remote server
management.
You can use these applications on Mac OS X Server (they’re in
/Applications/Server/) or on a Mac OS X computer where you’ve installed them, as
described in “Setting Up an Administrator Computer” on page 137.
 Command-line tools are available for administrators who prefer to use commanddriven server administration.
For remote server management, you can submit commands in a Secure Shell (SSH)
session. You can type commands on Mac OS X Server computers and Mac OS X
computers using the Terminal application, located in /Applications/Utilities/. You can
also submit commands from a non-Macintosh computer that’s been set up as
described in “Using a Non-Mac OS X Computer for Administration” on page 137.
Server Admin
You use Server Admin to administer services on one or more Mac OS X Server
computers. Server Admin also lets you specify settings that support multiple services,
such as creating and managing SSL certificates, manage file sharing, and specifying
which users and groups can access services.
Information about using Server Admin to manage services appears in the individual
administration guides and in onscreen information accessible by using the Help menu
in Server Admin.40 Chapter 3 Administration Tools
Information about using Server Admin to manage services appears in the individual
administration guides and in the following sections.
Opening and Authenticating in Server Admin
Server Admin is installed in /Applications/Server/, from which you can open it in the
Finder. Or you can open Server Admin by clicking the Server Admin icon in the Dock or
clicking the Server Admin button on the Workgroup Manager toolbar.
To select a server to work with, enter its IP address or DNS name in the login dialog
box, or click Available Servers to choose from a list of servers. Specify the user name
and password for a server administrator, then click Connect.
Server Admin Interface
The Server Admin interface is shown here, with each element explained in the
following table.
A B
C
D
O
K L M N
E
G
F
H
I
JChapter 3 Administration Tools 41
Customizing the Server Admin Environment
To control the Server Admin environment, you have the following options.
 To control the list of services to administer, see “Adding and Removing Services in
Server Admin” on page 145.
 To control the appearance of Server Admin lists, refresh rates, and other behaviors,
choose Server Admin > Preferences.
A Server List: Shows servers, groups, smart groups, and if desired, the administered services for
each server
You select a group to view a status summary for all grouped computers.
You select a computer for its overview and server settings.
You select a server’s service to control and configure the service.
B Context Buttons: Shows available information and configuration panes.
C Tool Bar: Shows available context buttons. If a button is greyed out or can’t be clicked, you do
not have the administrative permissions to access it.
D Main Work Area: Shows status and configuration options. This looks different for each service
and for each context button selected.
E Available servers: Lists the local-network scanner, which you can use to discover servers to add
to your server list.
F All Servers: Shows all computers that have been added to Server Admin, regardless of status.
G Server: Shows the hostname of the managed server. Select to show a hardware, operating
system, active service, and system status summary.
H Service: Shows an administered service for a given server. Select to get service status, logs, and
configuration options.
I Group: Shows an administrator created group of servers. Select to view a status summary for all
grouped computers
For more information, see “Grouping Servers Manually” on page 140.
J Smart Group: Shows an automatic group, populated with servers that meet a predetermined
criteria.
For more information, see “Grouping Servers Using Smart Groups” on page 140.
K Add button: Shows a pop-up menu of items to add to the Server list: servers, groups, and
smart groups.
L Action button: Shows a pop-up menu of actions possible for a selected service, or server,
including disconnect server, share the server’s screen, and so forth.
M Refresh button: Allows you to send a status request to all computers visible in the Server list.
N Service Start/Stop button: When a service is selected, this button allows you to start or stop the
service, as appropriate.
O Action bar: Shows buttons and pop-up menus with commands to act on selected servers or
services in the Server list. Click this to save or revert setting changes you’ve made. this contains
the Add button, Action button, service start and stop buttons, and save and revert buttons.42 Chapter 3 Administration Tools
Server Assistant
Server Assistant is used for:
 Remote server installations
 Initial setup of a local server
 Initial setup of remote servers
 Preparing data for automated setup of an advanced configuration
The Server Assistant initla page is shown here.
Server Assistant is located in /Applications/Server/.
For information about using Server Assistant, use its Help buttons, or see Chapter 6,
“Initial Server Setup,” on page 105.
Workgroup Manager
Mac OS X Server includes Workgroup Manager, a user management tool you can use to
create and manage user, group, computer, and computer group accounts. You also use
it to access the Inspector, an advanced feature that lets you do raw editing of Open
Directory entries.
Workgroup Manager is installed in /Applications/Server/, from which you can open it in
the Finder. Or you can open Workgroup Manager by clicking View > Workgroup
Manager in the Server Admin menu bar.Chapter 3 Administration Tools 43
Workgroup Manager works closely with a directory domain. Directory domains are like
databases, and are geared towards storing account information and handling
authentication.
Information about using Workgroup Manager appears in several documents:
 User Management explains how to use Workgroup Manager for account and
preference management. This guide also explains how to how to import and export
accounts.
 Open Directory Administration describes how to use the Inspector.
After opening Workgroup Manager, you can open a Workgroup Manager window by
choosing Server > New Workgroup Manager Window.
Important: When connecting to a server or authenticating in Workgroup Manager,
make sure the capitalization of the name you enter matches the name of a server
administrator or domain administrator account.
Workgroup Manager Interface
The Workgroup Manager interface is shown here, with each element explained in the
following table.
A B C
E
D
F
G
H
I
J44 Chapter 3 Administration Tools
Customizing the Workgroup Manager Environment
There are several ways to tailor the Workgroup Manager environment:
 To open Workgroup Manager Preferences, choose Workgroup Manager >
Preferences.
You can configure options such as if DNS names are resolved, if the Inspector is
enabled, if you need to enter a search query to list records, and what the maximum
number of displayed records is.
 To customize the toolbar, choose View > Customize Toolbar.
 To include predefined users and groups in the user and group lists, choose View >
Show System Users and Groups.
 To open Server Admin, click the Server Admin toolbar button.
Directory
Directory gives users access to shared information about people, groups, locations, and
resources within the organization. They can use Directory to share contacts, set up
group services, and manage their own contact information.
When users look up information for other people, they’ll see more than just contact
information. If the person provides a picture, the user will see what he or she looks like.
The user can view the person’s supervisor and direct reports. The user can see the
public groups the person belongs to. The user can also print a map with the person’s
location pinpointed on it.
A Server Admin: Click to launch the Server Admin application.
B Settings Buttons: Click Accounts to view or edit account settings, or click Preferences to view or
edit preference settings.
C Tool Bar: Click the icons to accomplish the various commands. The toolbar is customizable.
D Directory path: Use to view the directory you are editing. Click the globe icon to select a
directory domain. Click the lock to authenticate.
E Record Type tabs: Use to view records for users, groups, computers, and all records. If the
Inspector is enabled, this also contains the Inspector tab.
F Text filters: Use to enter text to filter record names.
G Record list display: Use to view all record names for a selected record type.
H Selection bar: Use to view the number of records found and selected.
I Main Work Area: Use to work with account, preference, and configuration options. This looks
different for each user, group, or preference type.
J Action zone: Use to save and revert changes, and to make and apply preset configurations to
selected records.Chapter 3 Administration Tools 45
Directory takes advantage of several Mac OS X applications. Users can create shared
contacts from Address Book entries, click mail addresses to send mail using Mail, or
load group web services in Safari.
Directory Interface
The Directory interface is shown here, with each element explained in the following
table.
A Search field: Use to search record types. Numbers appear to the left of the Record Type buttons
to indicate the number of matching records.
B Record Type buttons: Click to show the type of directory records desired.
C Results list: Use to view the results of the record search.
D Record view: USe to view the record selected in the Results list.
E Add button: Use to add a person, group, location, or resource record.
F Edit button: Click to edit the selected record.
A B
C
E
D
F46 Chapter 3 Administration Tools
Directory Utility
Directory Utility is the primary application for setting up a Mac OS X computer’s
connections to Open Directory, Active Directory, and other directory domains, and for
defining the computer’s search policy and service discovery protocols.
The Directory Utility interface is below here with advanced configuration options.
Directory Utility is installed on both Mac OS X Server computers and Mac OS X
computers in /Applications/Utilities/.
For information about how to use Directory Utility, see Open Directory Administration or
Directory Utility Help.
Server Monitor
You use Server Monitor to monitor local or remote Xserve hardware and trigger mail
notifications when circumstances warrant attention. Server Monitor provides
information about the installed operating system, drives, power supply, enclosure and
processor temperature, cooling blowers, security, and network.Chapter 3 Administration Tools 47
The Server Monitor interface is shown below.
Server Monitor is installed in /Applications/Server/ when you install your server or set
up an administrator computer. To open Server Monitor, click the Server Monitor icon in
the Dock or double-click the Server Monitor icon in /Applications/Server/. From within
Server Admin, choose View > Server Monitor.
To identify the Xserve server to monitor, click Add Server, identify the server, and enter
user name and password information for an administrator of the server.
To specify how often you want to refresh data, use the “Update every” pop-up menu in
the Info pane.
To manage different lists of Xserve servers you want to monitor, choose File > Export or
File > Import. To consolidate lists into one, choose File > Merge.
The system identifier lights on the front and back of an Xserve server light when
service is required. Use Server Monitor to understand why the lights are on. You can
also turn the lights on to identify a particular Xserve server in a rack of servers by
selecting the server and clicking “System identifier light” in the Info pane.
To set up Server Monitor to notify you by mail when an Xserve server’s status changes,
click Edit Notifications. For each server, you set up the conditions for which you want
notification. The mail message can come from Server Monitor or from the server.
Server Monitor keeps logs of Server Monitor activity for each Xserve server. To view a
log, click Show Log. The log shows, for example, Server Monitor attempts to contact the
server and whether a connection was successful. The log also shows server status
changes. (The logs don’t include system activity on the server.)48 Chapter 3 Administration Tools
For additional information, see Server Monitor Help.
System Image Management
You can use the following Mac OS X Server applications to set up and manage NetBoot
and NetInstall images:
 System Image Utility creates Mac OS X disk images. It’s installed with Mac OS X Server
software in the /Applications/Server/ folder.
 Server Admin enables and configures NetBoot service and supporting services. It’s
installed with Mac OS X Server software in the /Applications/Server/ folder.
 PackageMaker creates package files that you use to add software to disk images.
Access PackageMaker from Xcode Tools. An installer for Xcode Tools is on the server
Install DVD in the Other Installs folder.
 Property List Editor edits property lists such as NBImageInfo.plist. Access Property List
Editor from Xcode Tools.
The System Image Utility interface is shown below.
System Imaging and Software Update Administration provides instructions for using all
these applications.Chapter 3 Administration Tools 49
Media Streaming Management
QuickTime Streaming and Broadcasting Administration provides instructions for
administering QuickTime Streaming Server (QTSS) using Server Admin.
QuickTime Streaming and Broadcasting Administration also describes QTSS Publisher, an
easy-to-use application for managing media and preparing it for streaming or
progressive download.
Command-Line Tools
If you’re an administrator who prefers to work in a command-line environment, you can
do so with Mac OS X Server.
From the Terminal application in Mac OS X, you can use the built-in UNIX shells (sh, csh,
tsh, zsh, bash) to use tools for installing and setting up server software and for
configuring and monitoring services. You can also submit commands from a nonMac OS X computer.
When managing remote servers, you conduct secure administration by working in a
Secure Shell (SSH) session.
Command-Line Administration describes Terminal, SSH, server administration
commands, and configuration files.50 Chapter 3 Administration Tools
Xgrid Admin
You can use Xgrid Admin to monitor local or remote Xgrid controllers, grids, and jobs.
You can add controllers and agents to monitor and specify agents that have not yet
joined a grid. You also use Xgrid Admin to pause, stop, or restart jobs.
The System Image Utility interface is shown here.
Xgrid Admin is installed in /Applications/Server/ when you install your server or set up
an administrator computer. To open Xgrid Admin, double-click the Xgrid Admin icon in
/Applications/Server/.
For additional information, see Xgrid Admin help.Chapter 3 Administration Tools 51
Apple Remote Desktop
Apple Remote Desktop (ARD), which you can optionally purchase, is an easy-to-use
network-computer management application. It simplifies the setup, monitoring, and
maintenance of remote computers and lets you interact with users.
The Apple Remote Desktop interface is shown here.
You can use ARD to control and observe computer screens. You can configure
computers and install software. You can conduct one-to-one or one-to-many user
interactions to provide help or tutoring. You can perform basic network
troubleshooting. And you can generate reports that audit computer hardware
characteristics and installed software.
You can also use ARD to control installation on a computer that you start up from an
installation disc for Mac OS X Server v10.5 or later, because ARD includes VNC viewer
capability.
For more information about Apple Remote Desktop, go to
www.apple.com/remotedesktop/.52 Chapter 3 Administration Tools 4
53
4 Security
Vigilant security policies and practices can minimize the
threat to system integrity and data privacy.
Mac OS X Server is built on a robust UNIX foundation that contains many security
features in its core architecture. State-of-the-art, standards-based technologies protect
your server, network, and data. These technologies include a built-in firewall with
stateful packet analysis, strong encryption and authentication services, data security
architectures, and support for access control lists (ACLs).
Use this chapter to stimulate your thinking. It doesn’t present a rigorous planning
outline, nor does it provide the details you need to determine whether to implement a
particular security policy and assess its resource requirements. Instead, view this
chapter as an opportunity to plan and institute the security policies necessary for your
environment.
More information can be found in Mac OS X Server Security Configuration and Mac OS X
Security Configuration.
About Physical Security
The physical security of a server is an often overlooked aspect of computer security.
Remember that anyone with physical access to a computer (for example, to open the
case, or plug in a keyboard, and so forth) has almost full control over the computer and
the data on it. For example, someone with physical access to a computer can:
 Restart the computer from another external disc, bypassing any existing login
mechanism.
 Remove hard disks and use forensic data recovery techniques to retrieve data.
 Install hardware-based key-loggers on the local administration keyboard.54 Chapter 4 Security
In your own organization and environment, you must decide which precautions are
necessary, effective, and cost-effective to protect the value of your data and network.
For example, in an organization where floor-to-ceiling barriers might be appropriate to
protect a server room, securing the air ducts leading to the room might also need to
be considered. Other organizations may merely choose a locked server rack or an Open
Firmware password.
About Network Security
Network security is as important to data integrity as physical security. Although
someone might immediately see the need to lock down an expensive server, he or she
might not immediately see the need to restrict access to the data on that same server.
The following sections provide considerations, techniques, and technologies to assist
you in securing your network.
Firewalls and Packet Filters
Much like a physical firewall that acts as a physical barrier to provide heat and heat
damage protection in a building or for a vehicle, a network firewall acts as a barrier for
your network assets, preventing data tampering from external sources.
Mac OS X Server’s Firewall service is software that protects the network applications
running on your Mac OS X Server.
Turning on firewall service is similar to erecting a wall to limit access. Firewall service
scans incoming IP packets and rejects or accepts these packets based on the set of
rules you create.
You can restrict access to any IP service running on the server, and you can customize
rules for all incoming clients or for a range of client IP addresses. Services such as Web
and FTP are identified on your server by a Transmission Control Protocol (TCP) or User
Datagram Protocol (UDP) port number. When a computer tries to connect to a service,
firewall service scans the rule list for a matching port number. When a rule matches the
packet transmission in the connection, the action specified in the rule (such as allow or
deny) is taken. Then, depending on the action, additional rules may be checked.
Network DMZ
In computer network security, a demilitarized zone (DMZ) is a network area (a
subnetwork) that is between an organization’s internal network and an external
network like the Internet.Chapter 4 Security 55
Connections from the internal and the external network to the DMZ are permitted, but
connections from the DMZ are not permitted to the internal network—they are limited
to the external network. This allows an organization to provide services to the external
network while protecting the internal network from case compromise by a host in the
DMZ. If someone compromises a DMZ host, he or she cannot connect to the internal
network.
The DMZ is often used to connect servers that need to be accessible from the external
network or Internet, such as mail, web, and DNS servers.
Connections from the external network to the DMZ are often controlled using firewalls
and address translation. A DMZ can be created through firewall configuration: each
network is connected to a different port on the firewall, called a three-legged firewall
setup. This has the benefit of simplicity but the weakness of a single point of failure.
Another approach is to use two firewalls, with DMZ in the middle and connected to
both firewalls, and with one firewall connected to the internal network and the other
to the external network. This has the added benefit of preventing accidental
misconfiguration, allowing access from the external network to the internal network.
This type of setup is called a screened-subnet firewall.
VLANs
Mac OS X Server provides 802.1q Virtual Local Area Network (VLAN) support on the
Ethernet ports and secondary PCI gigabit Ethernet cards available or included with
Xserves.
VLAN allows multiple computers on different physical LANs to communicate with each
other as if they were on the same LAN. Benefits include more efficient network
bandwidth utilization and greater security, because broadcast or multicast traffic is only
sent to computers on the common network segment. Xserve G5 VLAN support
conforms to the IEEE standard 802.1q.
MAC Filtering
MAC Filtering (or layer 2 address filtering) refers to a security access control where a
network interface’s MAC address, or Ethernet Address (the 42-bit address assigned to
each network interface), is used to determine access to the network.
MAC addresses are unique to each card, so using MAC filtering on a network permits
and denies network access to specific devices, rather than to specific users or network
traffic types. Individual users are not identified by a MAC address, only a device, so an
authorized person must have an allowed list of devices that he or she would use to
access the network.56 Chapter 4 Security
In theory, MAC filtering allows a network administrator to permit or deny network
access to hosts and devices associated with the MAC address, though in practice there
are methods to avoid this form of access control through address modification
(spoofing) or the physical exchange of network cards between hosts.
Transport Encryption
Transferring data securely across a network involves encrypting the packet contents
sent between two computers. Mac OS X Server can provide Transport Layer Security
(TLS) and its predecessor, Secure Sockets Layer (SSL) as the cryptographic protocols
that provide secure communications on the Internet for such things as web browsing,
mail, and other data transfers.
These encryption protocols allow client and server applications to communicate in a
way designed to prevent eavesdropping, tampering, and message forgery. TLS provides
endpoint authentication and communications privacy over the Internet using
cryptography. These encrypted connections authenticate the server (that its identity is
ensured) but the client remains unauthenticated. To have mutual authentication (where
each side of the connection is assured of the identity of the other), you must use a
public key infrastructure (PKI) on the connecting clients.
Mac OS X Server makes use of OpenSSL and has integrated transport encryption into
the following tools and services:
 SSH
 VPN
 Web Service
 Mail Service
 Directory Services
 iChat Server
Payload Encryption
Rather than encrypting the transfer of a file across the network, you can encrypt the
contents of the file instead. Files with strong encryption might be captured in transit,
but would still be unreadable. Most transport encryption requires the participation of
both parties in the transaction. Some services (such as SMTP mail service) can’t reliably
use such techniques, so encrypting the file itself is the only method of reliably securing
the file content.
To learn more about file encryption, see “About File Encryption” on page 57.Chapter 4 Security 57
About File Security
By default, files and folders are owned by the user who creates them. After they’re
created, items keep their privileges (a combination of ownership and permissions) even
when moved, unless the privileges are explicitly changed by their owners or an
administrator. Therefore, new files and folders you create are not accessible by client
users if they are created in a folder that the users don’t have privileges for.
When setting up share points, make sure that items allow appropriate access privileges
for the users you want to share them with.
File and Folder Permissions
Mac OS X Server supports two kinds of file and folder permissions:
 Standard Portable Operating System Interface (POSIX) permissions
 Access Control Lists (ACLs)
POSIX permissions let you control access to files and folders based on three categories
of users: Owner, Group, and Everyone. Although these permissions give you adequate
control over who can access a file or a folder, they lack the flexibility and granularity
that many organizations require to deal with elaborate user environments.
ACL permissions provide an extended set of permissions for a file or folder and allow
you to set multiple users and groups as owners. In addition, ACLs are compatible with
Windows Server 2003 and Windows XP, giving you added flexibility in a multiplatform
environment.
For more information about file permissions, see File Services Administration and
Mac OS X Server Security Configuration.
About File Encryption
Mac OS X has a number of technologies that can perform file encryption, including:
 FileVault: FileVault performs on-the-fly encryption on each user’s home folder. This
encrypts the entire directory in one virtual volume, which is mounted and the data is
unencrypted as needed.
 Secure VM: Secure VM performs encryption of system virtual memory (memory data
temporarily written to the hard disk for storage). As such it isn’t used for encrypting
user’s files, but it does give your system more security by keeping virtual memory
files from being read and exploited.
 Disk Utility: Disk Utility can create disk images whose contents are encrypted and
password protected. Disk images act like removable media such as external hard
drives or USB memory sticks, but they exist only as a file on the computer. After you
create the encrypted disk image, you double-click it to mount it on your system. All
files you drag onto the mounted image are encrypted and stored on the disk image.
You can send this disk image to other Mac OS X users. With the unlocking password,
they can retrieve the files you locked in the disk image.58 Chapter 4 Security
For additional information, the following methods of encrypting files can be found in
the Mac OS X Server Security Configuration Guide:
 Creating a New Encrypted Disk Image
 Creating an Encrypted Disk Image from Existing Data
Secure Delete
When a file is put in the Trash and the Trash is emptied, or when a file is removed using
the UNIX tool “rm,” the files themselves are not removed from the hard disk. Instead,
they are removed from the list of files the operating system (OS) tracks of and does not
write over.
Any space on your hard disk that is free space (places the OS can put a file) most likely
contains previously deleted files. Such files can be retrieved using undelete utilities and
forensic analysis.
To truly remove the data from disk, you must use a more secure delete method.
Security experts advise writing over deleted files and free space multiple times with
random data.
Mac OS X Server provides the following tools to allow you to securely delete files:
 Secure Empty Trash (a command in the Finder menu to use instead of “Empty Trash”
 srm (a UNIX utility that securely deletes files, used in place of “rm”)
About Authentication and Authorization
Authentication is verifying a person’s identity, but authorization is verifying that an
authenticated person has the authority to perform a certain action. Authentication is
necessary for authorization.
In a computing context, when you provide a login name and password, you are
authenticated to the computer because it assumes only one person (you) knows both
the login name and the password. After you are authenticated, the operating system
checks lists of people who are permitted to access certain files, and if you are
authorized to access them, you are permitted to. Because authorization can’t occur
without authentication, authorization is sometimes used to mean the combination of
authentication and authorization.
In Mac OS X Server, users trying to use various services (like logging in to a directoryaware workstation, or trying to mount a remote volume) must authenticate by
providing a login name and password before any privileges for the users can be
determined.Chapter 4 Security 59
You have several options for authenticating users:
 Open Directory authentication. Based on the standard Simple Authentication and
Security Layer (SASL) protocol, Open Directory authentication supports many
authentication methods, including CRAM-MD5, APOP, WebDAV, SHA-1, LAN Manager,
NTLMv1, and NTLMv2. It’s the preferred way to authenticate Windows users.
Authentication methods can be selectively disabled to make password storage on
the server more secure. For example, if no clients will use Windows services, you can
disable the NTLMv1 and LAN Manager authentication methods to prevent storing
passwords on the server using these methods. Then someone who somehow gains
access to your password database can’t exploit weaknesses in these authentication
methods to crack passwords.
Open Directory authentication lets you set up password policies for individual users
or for all users whose records are stored in a particular directory, with exceptions if
required. Open Directory authentication also lets you specify password policies for
individual directory replicas.
For example, you can specify a minimum password length or require a user to
change the password the next time he or she logs in. You can also disable login for
inactive accounts or after a specified number of failed login attempts.
 Kerberos v5 authentication. Using Kerberos authentication allows integration into
existing Kerberos environments. The Key Distribution Center (KDC) on Mac OS X
Server offers full support for password policies you set up on the server. Using
Kerberos also provides a feature known as single sign-on, described in the next
section.
The following services on Mac OS X Server support Kerberos authentication: Apple
Filing Protocol (AFP), mail, File Transfer Protocol (FTP), Secure Shell (SSH), login
window, LDAPv3, Virtual Private Network (VPN), iChat Server, screen saver, and
Apache (via the SPNEGO Simple and Protected GSS-API Negotiation Mechanism
protocol).
 Storing passwords in user accounts. This approach might be useful when migrating
user accounts from earlier server versions. However, this approach may not support
clients that require certain network-secure authentication protocols, such as APOP.
 Non-Apple LDAPv3 authentication. This approach is available for environments that
have an LDAPv3 server set up to authenticate users.
 RADIUS (an authentication protocol for controlling network access by clients in
mobile or fixed configurations). For more information about RADIUS in Mac OS X
Server, see Network Services Administration.60 Chapter 4 Security
Single Sign-On
Mac OS X Server uses Kerberos for single sign-on authentication, which relieves users
from entering a user name and password separately for every service. With single sign-
on, a user always enters a user name and password in the login window. Thereafter, the
user does not have to enter a name and password for Apple file service, mail service, or
other services that use Kerberos authentication.
To use the single sign-on feature, users and services must be Kerberized—configured
for Kerberos authentication—and must use the same Kerberos Key Distribution Center
(KDC) server.
User accounts that reside in an LDAP directory of Mac OS X Server and have a
password type of Open Directory use the server’s built-in KDC. These user accounts are
automatically configured for Kerberos and single sign-on.
This server’s Kerberized services also use the server’s built-in KDC and are automatically
configured for single sign-on. This Mac OS X Server KDC can also authenticate users for
services provided by other servers. Having additional servers with Mac OS X Server use
the Mac OS X Server KDC requires only minimal configuration.
Kerberos was developed at MIT to provide secure authentication and communication
over open networks like the Internet. Kerberos provides proof of identity for two
parties. It enables you to prove who you are to network services you want to use. It also
proves to your applications that network services are genuine, not spoofed. Like other
authentication systems, Kerberos does not provide authorization. Each network service
determines for itself what it will allow you to do based on your proven identity.
Kerberos allows a client and a server to unambiguously identify each other much more
securely than the typical challenge-response password authentication methods
traditionally deployed. Kerberos also provides a single sign-on environment where
users must authenticate only once a day, week, or other period of time, easing
authentication loads for users. Mac OS X Server and Mac OS X versions 10.3
through10.5 support Kerberos version 5.
About Certificates, SSL, and Public Key Infrastructure
Mac OS X Server supports many services that use SSL (Secure Socket Layer) to ensure
encrypted data transfer. It uses a Public Key Infrastructure (PKI) system to generate and
maintain certificates of identity for use with SSL-enabled services.
PKI systems allow the two parties in a data transaction to be authenticated to each
other, and to use encryption keys and other information in identity certificates to
encrypt and decrypt messages traveling between them.Chapter 4 Security 61
PKI enables multiple communicating parties to establish confidentiality, message
integrity and message source authentication without exchanging secret information in
advance.
SSL technology relies on a PKI system for secure data transmission and user
authentication. It creates an initial secure communication channel to negotiate a faster,
secret key transmission. Mac OS X Server uses SSL to provide data encrypted data
transmission for mail, web, and directory services.
The following sections contain more background information about key aspects of PKI:
 “Public and Private Keys” on page 61
 “Certificates” on page 61
 “Certificate Authorities (CAs)” on page 62
 “Identities” on page 62
Public and Private Keys
Within a PKI, two digital keys are created: the public key and the private key. The
private key isn’t distributed to anyone and is often encrypted by a passphrase. The
public key is distributed to other communicating parties.
Basic key capabilities can be summed up as:
Web, mail, and directory services use the public key with SSL to negotiate a shared key
for the duration of the connection. For example, a mail server will send its public key to
a connecting client and initiate negotiation for a secure connection. The connecting
client uses the public key to encrypt a response to the negotiation. The mail server,
because it has the private key, can decrypt the response. The negotiation continues
until both the mail server and the client have a shared secret to encrypt traffic between
the two computers.
Certificates
Public keys are often contained in certificates. A user can digitally sign messages using
his or her private key, and another user can verify the signature using the public key
contained in signer’s certificate that was issued by a Certificate Authority (CA) within
the PKI.
Key type Capabilities
Public  Can encrypt messages that can only by decrypted by the holder of the corresponding
Private key.
 Can verify the signature on a message originating as coming from a Private key.
Private  Can digitally sign a message or certificate, claiming authenticity.
 Can decrypt messages that were encrypted with the Public key.
 Can encrypt messages that can only be decrypted by the Private key itself.62 Chapter 4 Security
A public key certificate (sometimes called an identity certificate) is a file in a specified
format (Mac OS X Server uses the x.509 format) that contains:
 The public key half of a public-private key pair
 The key user’s identity information, such as a person’s name and contact information
 A validity period (how long the certificate can be trusted to be accurate)
 The URL of someone with the power to revoke the certificate (its revocation center)
 The digital signature of a CA, or the key user
Certificate Authorities (CAs)
A Certificate Authority (CA) is an entity and its accompanying certificate that signs and
issues digital identity certificates claiming trust of the identified party. In this sense, it’s
a trusted third party between two transactions.
In x.509 systems, CAs are hierarchical in nature, with CAs being certified by CAs, until
you reach a root authority. A root authority is a CA that’s trusted by enough or all of the
interested parties, so it doesn’t need to be authenticated by yet another trusted third
party. The hierarchy of certificates is always a top-down, with a root authority’s
certificate at the top.
A CA can be a company that, for a fee, signs and issues a public key certificate which
states that the CA attests that the public key in the certificate belongs to its owner, as
recorded in the certificate. In a sense, CA is a digital notary public. One applies to the
CA for a certificate by providing identity and contact information, as well as the public
key. A CA must check an applicant’s identity so that users can trust certificates issued
by that CA to belong to the identified applicant.
Identities
Identities, in the context of the Mac OS X Server Certificate Manager, are the
combination of a signed certificate for both keys of a PKI key pair. The identities are
used by the system keychain, and are available for use by various services that support
SSL.
Self-Signed Certificates
Self-signed certificates are certificates that are digitally signed by the private key of the
keypair included in the certificate. This is done in place of a CA signing the certificate.
By self-signing a certificate, you’re attesting that you are who you say you are. No
trusted third party is involved.
Certificate Manager in Server Admin
Mac OS X Server’s Certificate Manager is integrated into Server Admin to help you
create, use, and maintain identities for SSL-enabled services.Chapter 4 Security 63
The Server Admin interface is shown below, with the Certificate Manager selected.
Certificate Manager provides integrated management of SSL certificates in Mac OS X
Server for all services that allow the use of SSL certificates.
Certificate Manager allows the creation of self-signed certificates, and certificatesigning requests (CSRs) to obtain a certificate signed by a CA. The certificates, either
self-signed or signed by a CA, are accessible by the services that support SSL.
Identities that were previously created and stored in OpenSSL files can also be
imported into Certificate Manager, and are then accessible to all services that support
SSL.
Certificate Manager in Server Admin doesn’t allow you to sign and issue certificates as a
CA, nor does it allow you to sign and issue certificates as a root authority. If you need
these functions, you can use Apple’s CA Assistant in /Applications/Utilities/. It allows
these functions, and others.
Self-signed and CA-issued certificates created in Apple’s CA Assistant can be used in
Certificate Manager by importing the certificate.
Certificate Manager displays the following for each certificate:
 The domain name that the certificate was issued for
 The dates of validity
 The signing authority (such as the CA entity, or if the certificate is self-signed, it reads
“Self-Signed”)64 Chapter 4 Security
Readying Certificates
Before you can use SSL in Mac OS X Server’s services, the certificates must be created or
imported. You can create your own self-signed certificate, generate a Certificate Signing
Request (CSR) to send to a CA, or import a certificate previously created with OpenSSL.
Select a CA to sign your certificate request. If you don’t have a CA to sign your request,
consider becoming your own CA, and then import your CA certificates into the root
trust database of all your managed machines.
If you’re using a self-signed certificate, consider using a self-signed CA to sign a CSR for
your service usage, then import the public certificate of your CA into the System
keychain on all client computers. These two options assume you have control of the
client computers.
Requesting a Certificate From a Certificate Authority
Certificate Manager helps you create a certificate signing request (CSR) to send to your
designated CA.
To request a signed certificate:
1 In Server Admin, select the server that has services that support SSL.
2 Click Certificates.
3 Click the Add (+) button below the Certificates list.
4 Fill out identity information.
The common name is the fully qualified domain name of the server that will use SSLenabled services.
5 Enter starting and ending validity dates.
6 Select a private key size (the default is1024 bits).
7 Enter a passphrase for the private key.
This passphrase should be more secure than a normal password.
It is recommended you use at least 20 characters, include mixed case, numbers and/or
punctuation, have no characters repeat, and having no dictionary terms.
8 Click the Gear button and choose “Generate Certificate Signing Request”
9 Follow the onscreen directions for requesting a signed certificate from your chosen CA.
For example, you may need to do it online or enter the email address.
10 Click Send Request.
11 Click Done to save the identity information.
When the CA replies to the email, it will include it in the text of an email.
12 Make sure the Certificate is selected in the Certificates field again.Chapter 4 Security 65
13 Click the Gear button, then choose Add Signed or Renewal Certificate from Certificate
Authority.
14 Copy the characters from “==Begin CSR==” to “==End CSR==” into the text box.
15 Click OK.
16 Click Save.
Creating a Self-Signed Certificate
When you create an identity in Certificate Manager, you’re creating a self-signed
certificate. Certificate Manager creates a private–public key pair in the system keychain
with the key size specified (512 - 2048 bits). It then creates the corresponding selfsigned certificate in the system keychain.
A Certificate Signing Request (CSR) is also generated at the same time that the selfsigned certificate is created. This isn’t stored in the keychain but is written to disk at
/etc/certificates/cert.common.name.tld.csr, where “common.name.tld” is the Common
Name of the certificate that was issued.
To create a self-signed certificate:
1 In Server Admin, select the server that has services that support SSL.
2 Click Certificates.
3 Click the Add (+) button.
4 Fill out identity information.
The common name is the fully qualified domain name of the server that will use SSLenabled services.
5 Enter starting and ending validity dates.
6 Select a private key size (1024 bits is the default).
7 Enter a passphrase for the private key.
This passphrase should be more secure than a normal password.
It is recommended you use at least 20 characters, include mixed case, numbers and
punctuation, have no characters repeat, and having no dictionary terms.
8 Click Done to save the identity information.
9 Click Save.
Creating a Certificate Authority
If you want to be able to sign another’s certificate, you must create a Certificate
Authority (CA). Sometimes this is referred to as a root certificate. By using the root
certificate, you will then become the trusted third party in that certificate’s transactions,
vouching for the identity of the certificate holder.66 Chapter 4 Security
If you are a large organization, you may decide to issue or sign certificates for people in
your organization in order to use the security benefits of certificates with your own
computing services. However, external organizations may not trust or recognize your
signing authority.
To create a CA:
1 Start Keychain Access.
Keychain Access is a utility found in the /Applications/Utilities/ directory.
2 In the Keychain Access menu, select Certificate Assistant > Create a Certificate
Authority.
The Certificate Assistant will start. It will guide you through the process of making the
CA.
3 Choose to create a Self Signed Root CA.
4 Provide the Certificate Assistant with the requested information and click Continue.
You will need the following information to create a CA:
 An email address
 The name of the issuing authority (you or your organization)
You also need to decide if you want to override the defaults, and you will decide
whether to make this CA the organization’s default CA. If you do not have a default CA
for the organization, allow the Certificate Assistant to make this one the default for you.
In most circumstances, you do not want to override the defaults. If you do not override
the defaults, skip to step 16.
5 If you chose to override the defaults, provide the following information in the next few
screens:
 A unique serial number for the root certificate
 The number of days that the certificate authority will function before expiring
 The type of user certificate that this CA is signing
 Whether you want to create a CA website for users to access for CA certificate
distribution
6 Click Continue.
7 Provide the Certificate Assistant with the requested information and click Continue.
You need the following information to create a CA:
 An email address of the responsible party for certificates
 The name of the issuing authority (you or your organization)
 The organization name
 The organization unit name
 The location of the issuing authorityChapter 4 Security 67
8 Select a key size and an encryption algorithm for the CA certificate and then click
Continue.
A larger key size is more computationally intensive to use, but much more secure. The
algorithm chosen depends more on your organizational needs than any technical
consideration. Both DSA and RSA are strong encryption algorithms. DSA is a United
States Federal Government standard for digital signatures. RSA is a more recent
advance in algorithms.
9 Select a key size and an encryption algorithm for the certificates to be signed and then
click Continue.
10 Select the Key Usage Extensions you need for the CA certificate and then click
Continue.
At a minimum, you must select Signature and Certificate Signing.
11 Select the Key Usage Extensions you need for the certificates to be signed and then
click Continue.
Default key use selections are based on the type of key selected earlier in the Assistant.
12 Specify other extensions to add the CA certificate and click Continue.
You must select “Include Basic Constraints” and “Use this certificate as a certificate
authority”
13 Specify other extensions to add the CA certificate as desired and then click Continue.
None are required.
14 Select the keychain “System” to store the CA certificate.
15 Choose to trust certificates on this computer signed by the created CA.
16 Click continue and authenticate as an administrator to create the certificate and key
pair.
17 Read and follow the instructions on the last page of the Certificate Assistant.
You can now issue certificates to trusted parties and sign certificate signing requests.
Using a CA to Create a Certificate for Someone Else
You can use your CA certificate to issue a certificate to someone else. This is sometimes
referred to as signing a Certificate Signing Request (CSR). By doing so you are stating
you are a trusted party and can verify the identity of the certificate holder.
Before you can create a certificate for someone, that person must first generate a CSR.
The user can use the Certificate Assistant to generate the CSR and email the request to
you. You then use the CSR’s text to make the certificate.
To create a certificate for someone else:
1 Start Keychain Access.
Keychain Access is a utility found in the /Applications/Utilities/ directory.68 Chapter 4 Security
2 In the Keychain Access menu, select Certificate Assistant > Create a Certificate for
Someone Else as a Certificate Signing Authority.
The Certificate Assistant starts, and guides you through the process of making the CA.
3 Drag and drop the CSRt on the target area.
4 Choose the CA that is the issuer and sign the request.
Also, you can also choose to override the reqest defaults.
5 Click Continue.
If youoverride the request defaults, provide the Certificate Assistant with the requested
information and click Continue.
The Certificate is now signed. The default mail application launches with the signed
certificate as an attachment.
Importing a Certificate
You can import a previously generated OpenSSL certificate and private key into
Certificate Manager. The items are stored as available in the list of identities and are
available to SSL-enabled services.
To import an existing OpenSSL style certificate:
1 In Server Admin, select the server that has services that support SSL.
2 Click Certificates.
3 Click the Import button.
4 Enter the existing certificate’s file name and path.
Alternately, browse for its location.
5 Enter the existing private key file’s name and path.
Alternately, browse for its location.
6 Enter the private key passphrase.
7 Click Import.
Managing Certificates
After a certificate is created and signed, you shouldn’t have to do much more with it.
Certificates are editable only in Server Admin, and cannot be changed after a CA signs
them. Self-signed certificates can be changed. You should delete certificates if the
information they possess (contact information and so forth) is no longer accurate or if
you believe the keypair has been compromised.
Editing a Certificate
After a certificate signature of a CA is added, it can’t be edited. Chapter 4 Security 69
However, a self-signed certificate can be edited. All fields of the certificate (including
domain name and private key passphrase, private key size, and so forth) can be
modified. If the identity was exported to disk from the system keychain, it must be reexported.
To edit a certificate:
1 In Server Admin, select the server that has services that support SSL.
2 Click Certificates.
3 Select the Certificate Identity to edit.
It must be a self-signed certificate.
4 Click the Edit (/) button.
5 Click Edit.
Distributing a CA Public Certificate to Clients
If you’re using self-signed certificates, a warning pops up in most user applications
saying that the certificate authority is not recognized. Other software, such as the LDAP
client, simply refuses to use SSL if the server’s CA is unknown.
Mac OS X Server ships only with certificates from well-known commercial CAs. To
prevent this warning, your CA certificate must be exported to every client computer
that connects to the secure server.
To distribute the self-signed CA certificate:
1 Copy the self-signed CA certificate (the file named ca.crt) onto each client computer.
This is preferably distributed using nonrewritable media, such as a CD-R. Using
nonrewritable media prevents the certificate from being corrupted.
2 Open the Keychain Access tool, by double-clicking the ca.crt icon where the certificate
was copied onto the client computer.
3 Add the certificate to the Systems keychain using Keychain Access.
Alternatively, use the certtool command in Terminal:
sudo certtool i ca.crt k=/System/Library/Keychains/Systems
Now, any client application that checks against the System keychain (such as Safari and
Mail) recognizes any certificate signed by your CA.
Deleting a Certificate
When a certificate has expired or been compromised, you must delete it.
To delete a certificate:
1 In Server Admin, select the server that has services that support SSL.
2 Click Certificates.70 Chapter 4 Security
3 Select the Certificate Identity to delete.
4 Click the Remove (-) button, and select Delete.
5 Click Save.
Renewing an Expired Certificate
All certificates have an expiration date, so you must update certificates when they
expire.
To renew an expired certificate:
1 Request a new certificate from the CA.
If you are your own CA, create a new one using your own root certificate.
2 In Server Admin in the Server list, select the server that has the expiring certificate.
3 Click Certificates.
4 Select the Certificate Identity to edit.
5 Click the action button and select “Add signed or renewed certificate from certificate
authority.”
6 Paste the renewed certificate into the text field and click OK.
7 Click the Edit button to make the certificate editable.
8 Adjust the dates for the certificate.
9 Click Save.
Using Certificates
In Server Admin, the various services like Web, Mail, VPN, and so on will display a popup list of certificates that the administrator can choose from. The services vary in
appearance and therefore the pop-up list location varies. Consult the administration
guide for the service you’re trying to use with a certificate.
SSH and SSH Keys
SSH is a network protocol that establishes a secure channel between your computer
and a remote computer. It uses public-key cryptography to authenticate the remote
computer. It also provides traffic encryption and data integrity exchanged between the
two computers.
SSH is frequently used to log in to a remote machine to execute commands but it can
also create a secure data tunnel, forwarding through an arbitrary TCP port. Additionally,
it can transfer files using the associated SFTP and SCP protocols. By default, an SSH
server listens on the standard TCP port 22.
Mac OS X Server uses OpenSSH as the basis for its SSH tools.Chapter 4 Security 71
Key-Based SSH Login
Key-based authentication is helpful for tasks such as automating file transfers and
backups and for creating failover scripts because it allows computers to communicate
without a user needing to enter a password. It is not secure to copy the private key of
one computer to another computer.
Important: Key-based authentication has risks. If the private key you generate becomes
compromised, unauthorized users can access your computers. You must determine
whether the advantages of key-based authentication are worth the risk.
Generating a Key Pair for SSH
This section outlines the process of setting up key-based SSH login on Mac OS X and
Mac OS X Server. To set up key-based SSH, you must generate the keys the two
computers will use to establish and validate the identity of each other.
To do this, run the following commands in Terminal:
1 Check to see whether a .ssh folder exists in your home folder by entering the
command:
ls -ld ~/.ssh.
If .ssh is listed in the output, move to step 2. If .ssh is not listed in the output, run
mkdir ~/.ssh and continue to step 2.
2 Change directories in the shell to the hidden ssh by entering the following command:
cd ~/.ssh
3 Generate the public and private keys by entering the following command:
ssh-keygen -b 1024 -t dsa -f id_dsa -P ''
The -b flag sets the length of the keys to 1,024-bits, -t indicates to use the DSA hashing
algorithm, -f sets the file name as id_dsa, and -P followed by two single-quote marks
sets the private key password to be null. The null private key password allows for
automated SSH connections.
4 Create an empty authorized key file by entering the following command:
touch authorized_keys2
5 Copy the public key into the authorized key file by entering the following command:
cat id_dsa.pub >> authorized_keys2
6 Change the psermissions of the private key by entering the following command:
chmod 400 id_dsa
The permissions on the private key must be set so the file is not world-readable.
7 Copy the public key and the authorized key lists to the specified user’s home folder on
the remote computer by entering the following command:
scp authorized_keys2 username@remotemachine:~/.ssh/72 Chapter 4 Security
If you need to establish two-way communication between servers, repeat the above
process on the second computer.
This process must be repeated for each user that needs to be able to open a key-based
SSH session. The root user is not excluded from this requirement. The home folder for
the root user on Mac OS X Server is located at /var/root/.
Key-Based SSH with Scripting Sample
A cluster of servers is an ideal environment for using key-based SSH. The following Perl
script is a trivial scripting example that should not be implemented. It demonstrates
connecting over an SSH tunnel to all servers defined in the variable serverList, running
softwareupdate, installing available updates, and restarting the computer if necessary.
The script assumes that key-based SSH has been properly set up for the root user on all
servers to be updated.
#!/usr/bin/perl
# \@ is the escape sequence for the "@" symbol.
my @serverList = ('root\@exampleserver1.example.com',
'root\@exampleserver2.example.com');
foreach $server (@serverList) {
open SBUFF, "ssh $server -x -o batchmode=yes 'softwareupdate -i -a' |";
while() {
my $flag = 0;
chop($_);
#check for restart text in $_
my $match = "Please restart immediately";
$count = @{[$_ =~ /$match/g]};
if($count > 0) {
$flag = 1;
}
}
close SBUFF;
if($flag == 1) {
`ssh $server -x -o batchmode=yes shutdown -r now`
}
}Chapter 4 Security 73
Administration Level Security
Mac OS X Server can use another level of access control for added security.
Administrators can be assigned to services they can configure. These limitations are
enacted on a server-by-server basis. This method can be used by an administrator with
no restrictions to assign administrative duties to other admin group users. This results
in a tiered administration model, where some administrators have more privileges than
others for assigned services. This results in a method of access control for individual
server features and services.
For example, Alice (the lead administrator) has control over all services on a given
server and can limit the ability of other admin group users (like Bob and Cathy) to
change settings on the server. She can assign DNS and firewall service administration
to Bob, while leaving mail service administration to Cathy. In this scenario, Cathy can’t
change the firewall or any service other than mail. Likewise, Bob can’t change any
services outside of his assigned services.
Tiered administration controls are effective in Server Admin and the serveradmin
command-line tool. They are not effective against modifying the various UNIX
configuration files throughout the system. The UNIX configuration files must be
protected with POSIX-type permissions or ACLs.
Setting Administration Level Privileges
You can determine which services other admin group users can modify. To do this, the
administrator making the determination must have full, unmodified access.
The process for setting administration level privileges is found in “Tiered Administration
Permissions” on page 149.
Service Level Security
You use a Service Access Control List (SACL) to enforce who can use a given service. It is
not a means authentication; it is a list of who has the appropriate access rights to use a
given service. SACLs allow you to add another layer of access control on top of
standard and ACL permissions. Only users and groups listed in a SACL have access to its
corresponding service. For example, to prevent users from accessing AFP share points
on a server, including home folders, remove the users from the AFP service’s SACL.
Server Admin in Mac OS X Server allows you to configure SACLs. Open Directory
authenticates user accounts and SACLs authorize use of services. If Open Directory
authenticates you, the SACL for login window determines whether you can log in, the
SACL for AFP service determines whether you can connect for Apple file service, and so
on.74 Chapter 4 Security
Setting SACL Permissions
SACLs (Service access control lists) allow you to specify which users and groups have
access to Mac OS X Server services, including AFP, FTP, and Windows file services.
To set SACL permissions for a service:
1 Open Server Admin.
2 Select the server from the Servers list.
3 Click Settings.
4 Click Access.
5 To restrict access to all services or deselect this option to set access permissions per
service, select “For all services”.
6 If you have deselected “For all services,” select a service from the Service list.
7 To provide unrestricted access to services, click “Allow all users and groups” .
If you want to restrict access to certain users and groups:
a Select “Allow only users and groups below.”
b Click the Add (+) button to open the Users & Groups drawer.
c Drag users and groups from the Users & Groups drawer to the list.
8 Click Save.
Security Best Practices
Server administrators are responsible for making sure that reasonable security
measures are taken to protect a server from an attack. A compromised server risks the
resources and data on the server and also risks the resources and data on other
connected systems. A compromised system can be used as a base to launch an attack
on other systems within or outside your network.
Maintaining the security of servers requires a balance of the cost of implementing
security measures versus the likelihood of a successful attack and the impact of the
attack. It is not be possible to eliminate all security risks to a server on a network, but it
is possible to reduce the chances of a breach and more efficiently deal with realized
attacks.
Best Practices for server system administration include, but are not limited to:
 Updating your systems with critical security patches and updates.
 Checking for updates regularly.
 Installing appropriate antivirus tools and use them regularly and updating virus
definition files and software regularly.
Although viruses are far less prevalent on the Mac platform than on Windows, viruses
still pose a risk.Chapter 4 Security 75
 Restricting physical access to the server.
Because local access generally allows an intruder to bypass most system security,
secure the server room, server racks, and network junctures. Use security locks.
Locking your systems is a prudent thing to do.
 Making sure there is adequate protection against physical damage to servers and
ensuring the functioning of the climate control of the server room.
 Taking all additional precautions to secure servers.
For example, enable Open firmware passwords, encrypt passwords where possible,
and secure backup media.
 Securing logical access to the server.
For example, remove or disable unnecessary accounts. Accounts for outside parties
should be disabled when not in use.
 Configuring SACLS as needed.
Use SACLS to specify who can access services.
 Configuring ACLs as needed.
Use ACLs to control who can access share points and their contents.
 Protecting any account with root or system administrator privileges by following
recommended password practices using strong passwords.
For more specific information about passwords, see “Password Guidelines” on
page 76 .
 Not using administrator (UNIX “admin” group) accounts for daily use.
Restrict the use of administration privileges by keeping the admin login and
password separate from daily use.
 Backing up critical data on the system regularly, with a copy stored at a secure offsite location.
Backup media is of little use in recovery if it is destroyed along with the computer
during a machine room fire. Backup/Recovery contingency plans should be tested to
ensure that recovery actually works.
 Reviewing system audit logs regularly and questioning any unusual traffic patterns.
 Disabling services that are not required on your system.
A vulnerability that occurs in any service on your system can compromise the entire
system. In some cases, the default configuration (out of the box) of a system leads to
exploitable vulnerabilities in services that were enabled implicitly and with poor
default options.
Turning on a service opens up a port from which users can access your system.
Although enabling firewall service helps fend off unauthorized access, an inactive
service port remains a vulnerability that an attacker might be able to exploit.
 Enabling firewall service on servers, especially at the network frontier.76 Chapter 4 Security
Your server’s firewall is the first line of defense against unauthorized access. For more
information, see the chapter on setting up firewall service in Network Services
Administration. Consider also a third-party hardware firewall as an additional line of
defense if your server is highly prone to attack.
 If needed, installing a local firewall on critical or sensitive servers.
Implementing a local firewall protects the system from an attack that might originate
from within the organization’s network or from the Internet.
 For additional protection, implementing a local Virtual Private Network (VPN) that
provides a secure encrypted tunnel for all communication between a client
computer and your server application. Some network devices provide a combination
of functions: firewall, intrusion detection, and VPN.
 Administering servers remotely.
Manage your servers remotely using applications like Server Admin, Server Monitor,
RAID Admin, and Apple Remote Desktop. Minimizing physical access to the systems
reduces the possibility of mischief.
Password Guidelines
Many applications and services require that you create passwords to authenticate.
Mac OS X includes applications that help create complex passwords (using Password
Assistant), and securely store your passwords (using Keychain Access).
Creating Complex Passwords
Use the following tips to create complex passwords:
 Use a mix of alphabetic (upper and lower case), numeric, and special characters (such
as ! and @).
 Don’t use words or combinations of words found in a dictionary of any language.
 Don’t append a number to an alphabetic word (for example, “wacky2”) to fulfill the
constraint of having a number.
 Don’t substitute “look alike” numbers or symbols for letters (for example, “GR33N”
instead of “GREEN”).
 Don’t use proper names.
 Don’t use dates.
 Create a password of at least 12 characters. Longer passwords are generally more
secure than shorter passwords.
 Use passwords that can’t be guessed even by someone who knows you and your
interests well.
 Create as random a password as possible.
You can use Password Assistant (located in /System/Library/CoreServices/ to verify the
complexity of your password.5
77
5 Installation and Deployment
Whether you install Mac OS X Server on a single server or a
cluster of servers, there are tools and processes to help the
installation and deployment succeed.
Some computers come with Mac OS X Server software already installed. Other
computers need to have the server software installed. For example, installing Leopard
Server on a computer with Mac OS X makes the computer a server with Mac OS X
Server.
Installing Leopard Server on an existing server with an Mac OS X Server v10.2–10.4
upgrades the server software to v10.5. If Leopard Server is already installed, installing it
again refreshes the server environment.
This chapter includes instructions for a fresh installation of Leopard Server using a
variety of methods.
Installation Overview
You’ve already planned and decided how many and what kind of servers you are going
to install.
Step 1: Confirm you meet the requirements
Make sure your target server meets the minimum system requirements. For more
information see:
 “System Requirements for Installing Mac OS X Server” on page 79
 “Hardware-Specific Instructions for Installing Mac OS X Server” on page 79
Step 2: Gather your information
Gather all the information you need before you begin. This not only helps to make sure
the installation goes smoothly, but it can help you make certain planning decisions. For
further information, see:
 Chapter 2, “Planning,” on page 25
 Appendix , “Mac OS X Server Advanced Worksheet,” on page 19578 Chapter 5 Installation and Deployment
 “About The Server Installation Disc” on page 80
Step 3: Set up the environment
If you are not in complete control of the network environment (DNS servers, DHCP
server, firewall, and so forth) you need to coordinate with your network administrator
before installing. A functioning DNS system, with full reverse lookups, and a firewall to
allow configuration constitute a bare minimum for the setup environment. If you are
planning on connecting the server to an existing directory system, you also need to
coordinate efforts with the directory administrator. See the following:
 “Connecting to the Directory During Installation” on page 81
 “Installing Server Software on a Networked Computer” on page 81
If you are administering the server from another computer, you must create an
administration computer. For more information, see “Preparing an Administrator
Computer” on page 80.
Step 4: Start up the computer from an installation disk
You can’t install onto the disk the computer is booted from, but you can upgrade. For
clean installations and upgrades, you must start up the server from an installation disk,
not from the target disk. See the following:
 “About Starting Up for Installation” on page 81
 “Remotely Accessing the Install DVD” on page 82
 “Starting Up from the Install DVD” on page 84
 “Starting Up from an Alternate Partition” on page 84
 “Starting Up from a NetBoot Environment” on page 88
Step 5: Prepare the target disk
If you are doing a clean installation, you must prepare the target disk by making sure it
has the right format and partition scheme. See the following:
 “Preparing Disks for Installing Mac OS X Server” on page 89
 “Choosing a File System” on page 89
 “Partitioning a Hard Disk” on page 91
 “Creating a RAID Set” on page 92
 “Erasing a Disk or Partition” on page 95
Step 6: Start the installer
The installer application takes software from the startup disk and server software
packages and installs them on the target disk. See the following:
 “Identifying Remote Servers When Installing Mac OS X Server” on page 96
 “Installing Server Software Interactively” on page 97
 “Installing Locally from the Installation Disc” on page 97
 “Installing Remotely with Server Assistant” on page 99 Chapter 5 Installation and Deployment 79
 “Installing Remotely with VNC” on page 100
 “Using the installer Command-Line Tool to Install Server Software” on page 101
Step 7: Set Up Services
Restart from the target disk to proceed to setup. For more information about server
setup, see “Initial Server Setup” on page 105.
System Requirements for Installing Mac OS X Server
The Macintosh desktop computer or server where you install Mac OS X Server v10.5
Leopard must have:
 An Intel or PowerPC G4 or G5 processor, 867 MHz or faster
 Built-in FireWire
 At least 1 gigabyte (GB) of random access memory (RAM)
 At least 10 gigabytes (GB) of disk space available
 A new serial number for Mac OS X Server 10.5.
The serial number used with any previous version of Mac OS X Server will not allow
registration in v10.5.
A built-in DVD drive is convenient but not required.
A display and keyboard are optional. You can install server software on a computer that
has no display and keyboard by using an administrator computer. For more
information, see “Preparing an Administrator Computer” on page 80.
If you’re using an installation disc for Mac OS X Server v10.5 or later, you can control
installation from another computer using VNC viewer software. Open source VNC
viewer software is available. Apple Remote Desktop, described on page 51, includes
VNC viewer capability.
Hardware-Specific Instructions for Installing Mac OS X Server
When you install server software on Xserve systems, the procedure you use when
starting the computer for installation is specific to the kind of Xserve hardware you
have. You may need to refer to the Xserve User’s Guide or Quick Start that came with
your Xserve, where these procedures are documented.
Gathering the Information You Need
Use the Mac OS X Server Advanced Worksheet to record information for each server you
want to install. The information below provides supplemental explanations for items on
the Mac OS X Server Advanced Worksheet. The Mac OS X Server Advanced Worksheet is
located in the appendix on page 195.80 Chapter 5 Installation and Deployment
Preparing an Administrator Computer
You can use an administrator computer to install, set up, and administer Mac OS X
Server on another computer. An administrator computer is a computer with Mac OS X
v10.5 Leopard or Mac OS X Server Leopard that you use to manage remote servers.
When you install and set up Mac OS X Server on a computer that has a display and
keyboard, it’s already an administrator computer. To make a computer with Mac OS X
into an administrator computer, you must install additional software.
Important: If you have administrative applications and tools from Mac OS X Server
v10.4 Tiger or earlier, do not use them with Leopard Server.
To enable remote administration of Mac OS X Server from a Mac OS X computer:
1 Make sure the Mac OS X computer has Mac OS X v10.5 Leopard installed.
2 Make sure the computer has at least 1 GB of RAM and 1 GB of unused disk space.
3 Insert the Administration Tools CD.
4 Open the Installers folder.
5 Open ServerAdministrationSoftware.mpkg to start the Installer, and then follow the
onscreen instructions.
About The Server Installation Disc
You can install the server software using the Mac OS X Server Install Disc. This
installation disc contains everything you must install Mac OS X Server. It also contains
an Other Installs folder, which has installers for upgrading a Mac OS X computer to
Mac OS X Server and for separately installing server administration software, the
Directory application, the Podcast Capture application, X11 software, and Xcode
developer tools.
In addition to the installation disc, Mac OS X Server includes the Administration Tools
CD. You use this disc to set up an administrator computer. This disc also contains
installers for the Directory application, the Podcast Capture application, and the QTSS
Publisher application. For advanced administrators, this disc contains installers for
PackageMaker and Property List Editor.Chapter 5 Installation and Deployment 81
Setting Up Network Services
Before you can install, you must set up or have the following settings for your network
service:
 DNS: You must have a fully qualified domain name for each server’s IP addess in the
DNS system. The DNS zone must have the reverse-lookup lookup record for the
name and address pair. Not having a stable, functioning DNS system with reverse
lookup leads to service failures and unexpected behaviors.
 DHCP: It is not recommended to assign dynamic IP addresses to servers. If your
server gets its IP address through DHCP, set up a static mapping in the DHCP server,
so your server gets (via its Ethernet address) the same IP address every time.
 Firewall or routing: In addition to any firewall running on your server, the subnet
router may have certain network traffic restrictions in place. Make sure you server’s IP
address is available for the traffic you are planning to handle and the services you are
planning to run.
Connecting to the Directory During Installation
If you want to use a server as an Open Directory master, make sure it has an active
Ethernet connection to a secure network before installation and initial setup.
Installing Server Software on a Networked Computer
When you start up a computer from a server installation disc, SSH starts so that remote
installations can be performed.
Important: Before you install or reinstall Mac OS X Server, make sure the network is
secure because SSH gives others access to the computer over the network. For
example, design the network topology so you can make the server computer’s subnet
accessible only to trusted users.
About Starting Up for Installation
The computer can’t install to its own startup volume, so you must start up in some
other way, such as:
 Optical Media, DVDs
 Alternate volumes (second partitions on the hard disk, or external FireWire disks)
 Netboot
The computer must install from the same disk or image that started up the computer.
Mounting another share point with an installer won’t work. The installer uses some of
the files currently active in the booted system partition for the new installation.82 Chapter 5 Installation and Deployment
Before Starting Up
If you’re performing a clean installation rather than upgrading an existing server, back
up any user data that’s on the disk or partition where you’ll install the server software.
If you’re upgrading an existing server, make sure that saved setup data won’t be
inadvertently detected and used to automatically set up an advanced configuration.
Server Assistant looks for saved setup data on all mounted disks and in all directories
the server is configured to access. The saved setup data will overwrite the server’s
existing settings.
For more information about automatic server setup, see “Using Automatic Server
Setup” on page 115.
Remotely Accessing the Install DVD
When used as the startup disc, the Install DVD provides some services for remote
access. After you start up from the DVD, both SSH and VNC are available for use. VNC
enables you to use a VNC viewer (like Apple Remote Desktop) to view the user
interface as if you were using the remote computer’s keyboard, mouse, and monitor. All
the things you could do at the computer using the keyboard and mouse are available
remotely, as well as locally. This excludes hard resets, other hardware manipulation, or
holding down keys during startup.
SSH enables you to have command-line access to the computer with administrator
privileges.
To access the computer with VNC:
1 Start the target computer from the Install DVD for Mac OS X Server v10.5 or later. The
procedure you use depends on the target server hardware.
To learn more about startup disk options, see “About Starting Up for Installation” on
page 81.
2 Use your VNC viewer software to open a connection to the target server.
3 Identify the target server.
If the VNC viewer includes the target server in a list of available servers, select it in the
list. Otherwise, enter an IP address in IPv4 format (000.000.000.000).
If you don’t know the IP address and the remote server is on the local subnet, you can
use the sa_srchr command to identify computers on the local subnetwhere you can
install server software. Enter the following from an existing computer with Mac OS X
Server Tools installed:
/System/Library/Serversetup/sa_srchr 224.0.0.1Chapter 5 Installation and Deployment 83
This command returns the IP address and the EthernetID (in addition to other
information) of servers on the local subnet that started up from the installation disk.
4 When prompted for a password, enter the first eight digits of the server’s built-in
hardware serial number.
To find a server’s serial number, look for a label on the server.
If you’re installing on an older computer that has no built-in hardware serial number,
use 12345678 for the password.
If you’re using Apple Remote Desktop as a VNC viewer, enter the password but don’t
specify a user name.
To access the computer with SSH:
1 Start the target computer from the Install DVD for Mac OS X Server v10.5 or later.
The procedure you use depends on the target server hardware.
To learn more about startup disk options, see “About Starting Up for Installation” on
page 81.
2 Use the Terminal to open a secure shell connection to the target server.
The user name is root and the password is the first eight digits of the server’s built-in
hardware serial number.
To find a server’s serial number, look for a label on the server. If you’re installing on an
older computer that has no built-in hardware serial number, use 12345678 for the
password.
If you don’t know the IP address and the remote server is on the local subnet, you can
use the sa_srchr command to identify computers on the local subnet where you can
install server software. Enter the following from an existing computer with Mac OS X
Server Tools installed:
/System/Library/Serversetup/sa_srchr 224.0.0.1
This command will return the IP address, and the EthernetID (in addition to other
information) of servers on the local subnet which have started up from the installation
disk.84 Chapter 5 Installation and Deployment
Starting Up from the Install DVD
This is the simplest method of starting the computer, if you have physical access the
server, and it has an optical drive.
If the target server is an Xserve with a built-in DVD drive, start the server using the
Install DVD by following the instructions in the Xserve User’s Guide for starting from a
system disc.
If the target server has no built-in DVD drive, you can use an external FireWire DVD
drive. You can also install server software on an Xserve system that lacks a DVD drive by
moving its drive module to another Xserve system that has a DVD drive.
To start up the computer with the installation disc.
1 Turn on the computer and insert the Mac OS X Server installation disc into the DVD
drive.
2 If you’re using a built-in DVD drive, restart the computer while holding down the C key.
You can release the C key when you see the Apple logo.
Alternatively, you can restart the computer by holding down the Option key, selecting
the icon representing the installation disc, and then clicking the right arrow.
You must use this method if you are starting up from an external DVD drive.
3 If you’re installing on an Xserve, the procedure for starting up from a DVD may be
different. For more information, see the User’s Guide or Quick Start that came with your
Xserve.
4 After the computer restarts, choose the language you want to use during installation
and then click the arrow button.
The Installer is now running.
Starting Up from an Alternate Partition
For a single server installation, preparing to start up from an alternate partition can be
more time-consuming than simply using the Install DVD. The time required to image,
scan, and restore the image to a startup partition may exceed the time taken to install
once from the DVD. However, if you are reinstalling regularly, or if you are creating an
external Firewire drive-based installation to take to various computers, or if you need
some other kind mass distribution (such as clustered Xserves without DVD drives
installed), this method can be very efficient.
Installer application
or
installer tool in
Terminal applicationChapter 5 Installation and Deployment 85
This method is well suited to installing on computers that you may not have easy
physical access to. With sufficient preparation, this method can be modified for easy
mass deployment of appropriately licensed copies of Mac OS X Server.
To use this method, you must have an existing installation of some kind on the
computer in order to use this method. It is intended for environments where a certain
level of existing infrastructure of Mac OS X Server is present, and may be unsuitable for
a first server installation. To start from an alternate partition, there are four basic steps.
Step 1: Prepare the disks and partitions on the target computer
Before you proceed, you must have at least two partitions on the target computer. The
first is going to be the initial and the final startup partition; the second is the
temporary installer partition. You can use a single disk with multiple partitions, or you
can use multiple disks. You use Disk Utility to prepare the disks.
For more information about preparing and partitioning a hard disk, see the Disk Utility
help.
Step 2: Create a restorable image of the Install DVD
This step doesn’t need to be done on the target computer. It can be done on an
administrator computer, but there must be enough free space to image the entire
Install DVD.
To create an image of the Install DVD:
1 Insert the Install DVD.
2 Launch Disk Utility.
3 Select the first session icon under the optical drive icon.
This is in the list of devices on the left side of the window.
4 Select File > New > Disk Image from .
5 Give the image a name, select Read-only, Read/Write, or Compressed as the image
type, and then click Save.
6 After the image is complete, select the image from list on the left.
7 In the menu, select Images > Scan Images for Restore.
8 Provide an administrator login and password as needed.
The installer disk image can now be restored to your extra partition.
∏ Tip: If you prefer to use the command-line, you can use hdiutil to create the disk
image, and asr to scan the image for restore. All commands must be done with superuser or root privileges.86 Chapter 5 Installation and Deployment
For example, this command creates a disk image “Installer.dmg” from the device at
disk1s1:
hdiutil create -srcdevice disk1s1 Installer.dmg
This command scans the image “Installer.dmg” and readies it for restore:
asr imagescan --source Installer.dmg
Step 3: Restore the image to the alternate partition
You can restore the disk image to a partition within the computer or to an external
hard disk. When complete, the newly restored partition functions like the Install DVD.
Make sure the alternate partition is at least the size of the disk image.
Restoring the disk image to the partition will erase all existing data on the partition.
To restore the image:
1 Start up the target computer.
2 Make sure the image does not reside on the partition that is to be erased.
3 Launch Disk Utility.
4 In the list of devices on the left side of the window, select the installer DVD image.
5 Click Restore.
6 Drag the installer image from the left side of the window to the Source field.
7 Drag the alternate partition from the list of devices on the left side of the window to
the Destination field.
8 Select Erase Destination.
9 Click Restore.
If you prefer to use the command-line, you use the asr tool to restore the image to the
partition. Using asr requires the use of superuser or root privileges. The basic syntax is:
sudo asr restore -s -t --erase
For example, restoring an image called “Installer.dmg” to the partition “ExtraHD” would
be:
asr restore -s Installer.dmg -t ExtraHD --erase
For more information about asr and its capabilities, see the tool’s man page.
∏ Tip: You can use asr to restore a disk over a network, multicasting the blocks to client
computers. Using the multicast server feature of asr, you could put a copy of the
installer image on a partition of all computers that can receive the multicast packets. To
successfully configure this, you’ll need the information in the tool’s man page.Chapter 5 Installation and Deployment 87
The asr tool can also fetch the target image from an HTTP server using http or https
URLs as its source, so the image doesn’t need to reside on the target computer
computer.
Step 4: Select the alternate partition as the startup disk.
After the partition is restored, it’s a startup and installer disk for your server. You now
need to start up the computer from that partition. After the computer is up and
running, it is a Mac OS X Server installer, exactly as if you had started the computer
from the DVD.
To start up the computer with the installation disc:
1 Turn on the computer and hold down the Option key.
2 Select the icon representing the installation partition and then click the right arrow.
You must use this method if you are starting up from an external DVD drive.
If you’re installing on an Xserve, the procedure for starting up from a DVD may be
different. For more information, see the Xserve User’s Guide or Quick Start that came with
your Xserve.
3 After the computer restarts, choose the language you want to use during installation,
and click the arrow button.
The Installer is now running.
If you prefer to do this with the command-line, you can set the startup volume using
the systemsetup tool. In version of Mac OS X Server since v10.4 or later, the
systemsetup tool is at /usr/sbin/systemsetup.
If you are currently using the Mac OS X client during this process, the tool is at /System/
Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Support/
systemsetup.
You’ll need to use the -liststartupdisks, and -setstartupdisk command options to find
the newly restored installer volume, and select it as the startup disk. All commands
issued with systemsetup must be run with superuser or root privileges.
The following is an example command to select the startup disk:
systemsetup -setstartupdisk “/Volumes/Mac OS X Server Install Disk”
Then issue the shutdown -r command to restart.
For more information about systemsetup, see Command-Line Administration and the
tool’s man page.88 Chapter 5 Installation and Deployment
Starting Up from a NetBoot Environment
If you have an existing NetBoot infrastructure, this is the easiest way to perform mass
installation and deployment. This method can be used for clusters that have no optical
drive or existing system software, as shown in the following illustration:
It can also be used in environments where carrying large numbers of servers must be
deployed in an efficient manner.
This section won’t tell you how to create the necessary NetBoot infrastructure. If you
want to set up NetBoot and NetInstall options for your network, servers, and client
computers, see System Imaging and Software Update Administration.
This section has instructions to create a NetInstall image from the Mac OS X Server
Install Disk, and start a server from it. There is no need to make preparations to the
hard disk.
Step 1: Create a NetInstall image from the Install DVD
This step doesn’t need to be done on the target computer. It can be done on an
administrator computer that has enough free space to image the entire Install DVD.
1 Launch System Image Utility, in /Applications/Server/.
2 Select the Install DVD on the left, and choose NetInstall image on the right.
3 Click Continue.
4 Enter a name for the image, and a description.
This information is seen by clients selecting it a startup disk.
5 Click Create and then choose a save location for the disk image.
Upon completion, this image can be used with an existing NetBoot server to start up a
server for installation.
Target servers
NetBoot target
servers
Mac OS X
Server
Initiate server
installation
Administrator
computer
DestinationChapter 5 Installation and Deployment 89
For more information about NetInstall images and System Image Utility, including
customization options, see System Imaging and Software Update Administration.
Step 2: Start up the computer from the NetBoot server
There are four ways of doing this, depending on your environment.
 In the target computer GUI, select the NetInstall disk from the Startup Disk pane of
the System Preferences.
 Restart the computer, holding down the “n” key.
The first NetBoot server to respond to the computer will start up the computer with
its default image.
 Restart the computer, holding down the Option key.
The computer will show you the available startup disks, locally on the computer and
remotely from NetBoot and NetInstall servers. Select a disk and continue the startup.
 Use the command-line locally or remotely to specify the NetBoot server that the
computer will start up from:
sudo bless --netboot --server bsdp://server.example.com
Preparing Disks for Installing Mac OS X Server
Before performing a clean installation of Mac OS X Server, you can partition the server
computer’s hard disk into multiple volumes, create a RAID set, or erase the target disk
or partition.
If you’re using an installation disc for Mac OS X Server v10.5 or later, you can perform
these tasks from another networked computer using VNC viewer software, such as
Apple Remote Desktop, before beginning a clean installation.
Choosing a File System
A file system is a method for storing and organizing computer files and the data they
contain on a storage device such as a hard disk. Mac OS X Server supports several kinds
of file systems to be used for hard disk storage. Each file system has its own strengths.
You must decide which system fits your organization’s needs.
For more information, see the following:
developer.apple.com/technotes/tn/tn1150.html
The following systems are available for use:
WARNING: Before partitioning a disk, creating a RAID set, or erasing a disk or partition
on an existing server, preserve any user data you want to save by copying it to
another disk or partition.90 Chapter 5 Installation and Deployment
Mac OS Extended (Journaled) aka HFS+J
An HFS+J volume is the default file system for Mac OS X Server.
An HFS+J volume has an optional journal to speed recovery when mounting a volume
that was not unmounted safely (for example, as the result of a power outage or crash).
The journal makes it quick and easy to restore the volume structures to a consistent
state, without having to scan all of the structures.
The journal is used only for the volume structures and metadata; it does not protect
the contents of a fork. In other words, this journal protects the integrity of the
underlying disk structures, but not any data that is corrupted due to a write failure or
catastrophic power loss.
More information about HFS+J can be found in Apple’s Developer Documentation at:
developer.apple.com/documentation/MacOSX/Conceptual/BPFileSystem/Articles/
Comparisons.html
Mac OS Extended (Journaled, Case-Sensitive) aka HFSX
HFSX is an extension to HFS Plus and allows volumes to have case-sensitive file and
directory names. Case-sensitive names means that you can have two objects whose
names differ only by the case of the letters, in the same directory at the same time. For
example, you could have Bob, BOB, and bob in the same directory as uniquely named
files.
A case-sensitive volume is supported as a boot volume format. An HFSX file system for
Mac OS X Server must be specifically selected when erasing a volume and preparing
for initial installation. HFSX is an available format for the “erase and install” option for
local installs. HFSX is not an available format for remotely controlled installations. If you
are planning to use NFS, you should use case-sensitive HFSX.
An HFSX volume can be either case-sensitive or case-insensitive. Case sensitivity (or
lack thereof) is global to the volume; the setting applies to all file and directory names
on the volume. To determine whether an HFSX volume is case-sensitive, use the
keyCompareType field of the B-tree header of the catalog file. A value of
kHFSBinaryCompare means the volume is case-sensitive. A value of kHFSCaseFolding
means the volume is case-insensitive.
Note: Do not assume that an HFSX volume is case-sensitive. Always use the
keyCompareType to determine case sensitivity or case insensitivity. Additionally, don’t
assume your third-party software solutions work correctly with case sensitivity.
Important: Case-sensitive names do not ignore Unicode ignorable characters. This
means that a single directory can have several names that would be considered
equivalent using Unicode comparison rules, but they are considered distinct on a casesensitive HFSX volume.Chapter 5 Installation and Deployment 91
Partitioning a Hard Disk
Partitioning the hard disk creates a volume for server system software and one or more
additional volumes for data and other software. Partitioning erases previous contents
of the disk.
The minimum recommended size for an installation partition is 20 GB. A larger volume
is recommended for a standard or workgroup configuration because they keep shared
folders and group websites on the startup volume together with the server software.
Erasing a disk is another way of saying that you have given a disk a single volume
partition and erased that volume.
Consider dedicating a hard disk or a volume of a partitioned hard disk to the server
software. Put additional software, share points, websites, and so forth on other disks or
volumes. With this approach, you can upgrade or reinstall the server software without
affecting your other software or user data. If you must store additional software or data
on the system volume, consider mirroring it to another drive.
∏ Tip: Having an extra, empty partition or two on the target installation disk can give
you additional flexibility in installation and deployment. For example, additional space
can give you a place to temporarily mirror your current installation before performing
an in-place update, or it can give you a fast installer disk.
Partitioning a Disk Using Disk Utility
You can use the Installer to open the Disk Utility application and then use Disk Utility to
erase the installation target volume or another volume. You can erase the target
volume using the Mac OS Extended format, Mac OS Extended (Journaled) format, Mac
OS Extended format (Case-Sensitive) format, and Mac OS Extended (Journaled, CaseSensitive) format. You cannot partition the active startup disk or erase the active
startup volume.
1 Launch Disk Utility.
If you are in the Installer, Disk Utility is available from the Utilities menu.
Otherwise, launch the application from /Applications/Utilities/Disk Utility.
2 Select the disk to be partitioned.
You can’t select your current startup disk. Selecting a volume on the disk will allow you
to erase the volume but will not create a different partition scheme.
3 Click Partition.
4 Choose your partition scheme and follow the instructions in the window to set all
necessary parameters.
5 Click Apply.92 Chapter 5 Installation and Deployment
You can find instructions for partitioning the hard disk into multiple volumes, creating a
RAID set, and erasing the target disk or partition by viewing Disk Utility Help. To view
Disk Utility Help, open Disk Utility on another Macintosh computer with Mac OS X v10.5
and choose Help > Disk Utility Help.
Partitioning a Disk Using the Command-line
You can use the diskutil command-line tool to partition and erase a hard disk. Normally,
you would use a remote shell (SSH) to log in to the newly-started computer to use this
method. The tool to partition disks is diskutil.
Just like using Disk Utility, you can erase the target volume using the Mac OS Extended
format, Mac OS Extended (Journaled) format, Mac OS Extended format (Case-Sensitive)
format, and Mac OS Extended (Journaled, Case-Sensitive) format.
 You cannot partition the active startup disk or erase the active startup volume.
 All potentially destructive diskutil operations must be done with superuser or root
privileges.
Additional information about diskutil and other uses can be found in Command-Line
Administration. For complete command syntax for diskutil, consult the tool’s man
page.
The specific command issued depends on your disk format needs and the hardware in
use. Take care to use command-line arguments that apply to your specific needs.
The following command is a sample, which partitions a computer’s only 120 GB hard
disk into two equal 60 GB journaled HFS+ volumes (“BootDisk” and “DataStore”), which
can start up a PowerPC-based Macintosh computer.
The basic syntax is:
diskutil partitionDisk device numberOfPartitions APMFormat
So the command is:
diskutil partitionDisk disk0 2 APMFormat JournaledHFS+ BootDisk 50%
JournaledHFS+ DataStore 50%
Creating a RAID Set
If you’re installing Mac OS X Server on a computer with multiple internal hard disk
drives, you can create a Redundant Array of Independent Disks (RAID) set to optimize
storage capacity, improve performance, and increase reliability in case of a disk failure.
For example, a mirrored RAID set increases reliability by writing your data to two or
more disks at once. If one disk fails, your server automatically starts using one of the
other disks in the RAID set. Chapter 5 Installation and Deployment 93
You can use Disk Utility to set up a RAID set. There are two types of RAID sets and one
additional disk option available in Disk Utility:
 A striped RAID set (RAID 0) splits files across the disks in the set. A striped RAID set
improves the performance of your software because it can read and write on all disks
in the set at the same time. You might use a striped RAID set if you are working with
large files, such as digital video.
 A mirrored RAID set (RAID 1) duplicates files across the disks in the set. Because this
scheme maintains two or more copies of the files, it provides a continuous backup of
them. In addition, it can help keep data available if a disk in the set fails. Mirroring is
recommended if you have shared files or applications that must be accessed
frequently.
You can set up RAID mirroring after installing Mac OS X Server if you install on a disk
that isn’t partitioned. To prevent data loss, you should set up RAID mirroring as soon
as possible.
 A concatenated disk set lets you use several disks as a single volume. This is not a
true RAID set and offers no redundancy or performance increase.
You can combine different RAID sets to combine their benefits. For example, you can
create a RAID set that combines the fast disk access of a striped RAID set and the data
protection of a mirrored RAID set. To do this, create two RAID sets of one type and then
create a RAID set of another type, using the first two RAID sets as the disks.
The RAID sets you combine must all be created with Disk Utility or diskutil in
Mac OS X v10.4 or later.
The method of partitioning used on the disks cannot be mixed (PPC platform is
APMFormat, Intel platform is GPTFormat) in a RAID set.
Mac Pro desktop computers and Intel-based Xserves can boot from a software RAID
volume. Some Intel-based Macs do not support booting from software RAID volumes. If
you try to start these Intel-based Macs from a software RAID volume, the computer
may start up to a flashing question mark.
The following computers do not support booting from software RAID volumes:
 iMac (Early 2006)
 Mac mini (Early 2006)
No PPC-based Macs support booting from software RAID volumes.
If you need more sophisticated RAID support, consider a hardware RAID. It has specially
dedicated RAID hardware and can contain over 5 terabytes of storage.94 Chapter 5 Installation and Deployment
Creating a RAID Set Using Disk Utility
You can use the Installer to open the Disk Utility application and then use Disk Utility to
create the RAID set from available disks. It isn’t necessary to erase the disks before
creating the set. Creating a RAID set erases the previous contents of the disks involved.
The RAID set volumes can be Mac OS Extended format, Mac OS Extended (Journaled)
format, Mac OS Extended format (Case-Sensitive) format, Mac OS Extended (Journaled,
Case-Sensitive) format, and MS-DOS FAT format. For more information about volume
formats, see “Preparing Disks for Installing Mac OS X Server” on page 89.
You cannot create a RAID set from the active startup disk.
1 Launch Disk Utility.
If you are in the Installer, Disk Utility is Available from the Utilities menu; otherwise,
launch the application from /Applications/Utilities/Disk Utility.
2 Select the disk to be part of the RAID set.
You can’t select your current startup disk.
When creating RAID sets or adding disks, it is recommended to specify the entire disk
instead of a partition on that disk.
3 Click RAID.
4 Choose your RAID set type.
5 Drag the disks to the window.
6 Follow the instructions in the window to set all necessary parameters.
7 Click Create.
You can find instructions for partitioning the hard disk into multiple volumes, creating a
RAID set, and erasing the target disk or partition by viewing Disk Utility Help. To view
Disk Utility Help, open Disk Utility on another Macintosh computer with Mac OS X v10.5
and choose Help > Disk Utility Help.
Creating a RAID Set Using the Command-line
You can use the diskutil command-line tool to create a RAID set. Normally, you would
use a remote shell (SSH) to log in to the newly-started computer to use this method.
The tool to create a RAID set is diskutil.
Just like using Disk Utility, with diskutil you can create a RAID volume that is Mac OS
Extended format, Mac OS Extended (Journaled) format, Mac OS Extended format (CaseSensitive) format, Mac OS Extended (Journaled, Case-Sensitive) format, or MS-DOS FAT
format. However keep in mind the following:
 You cannot create a RAID from the active startup disk.
 When creating RAID sets or adding disks, specify the entire disk instead of a partition
on that disk.Chapter 5 Installation and Deployment 95
 All potentially destructive diskutil operations must be done with superuser or root
privileges.
Additional information about diskutil and other uses can be found in Command-Line
Administration. For complete command syntax for diskutil, consult the tool’s man page.
The specific command issued depends on your RAID needs. Use command-line
arguments that apply to your specific needs. The following command is a sample,
which creates a single mirrored RAID set (RAID 1) from the first two disks installed in
the computer (disk0 and disk1), with the resulting RAID volume called MirrorData.
The basic syntax is:
diskutil createRAID mirror setName format device device ...
So the command is:
diskutil createRAID mirror MirrorData JournaledHFS+ disk0 disk1
Erasing a Disk or Partition
You have several options for erasing as disk, depending on your preferred tools and
your computing environment:
 Erasing a Disk Using the Installer: You can erase a disk or partition while using the
Mac OS X Server Installer. When you select the target volume in the Installer, you can
also select an option to have the target disk or partition erased during installation
using the Mac OS Extended (Journaled) format. This is the most recommended
format for a Mac OS X Server startup volume.
 Erasing a Disk Using Disk Utility: You can use the Installer to open the Disk Utility
application and then use it to erase the target volume or another volume. You can
erase the target volume using the Mac OS Extended format or Mac OS Extended
(Journaled) format. You can erase other volumes using either of those formats,
Mac OS Extended format (Case-Sensitive) format, or Mac OS Extended (Journaled,
Case-Sensitive) format.
You can erase but not partition a disk or partition while using the Mac OS X Server
Installer. When you select the target volume in the Installer, you can also select an
option to have the target disk or partition erased during installation using the Mac
OS Extended (Journaled) format. This is the recommended format for a Mac OS X
Server startup volume.
You can find instructions for partitioning the hard disk into multiple volumes,
creating a RAID set, and erasing the target disk or partition by viewing Disk Utility
Help. To view Disk Utility Help, open Disk Utility on another Macintosh computer
with Mac OS X v10.5 and choose Help > Disk Utility Help.
 Erasing a Disk Using the Command-line: Finally you can use the command-line to
erase disks using the tool diskutil. Erasing a disk using diskutil results in losing all of
the volume partitions. The command to erase a complete disk is:96 Chapter 5 Installation and Deployment
diskutil eraseDisk format name [OS9Drivers | APMFormat | MBRFormat |
GPTFormat] device
For example:
diskutil eraseDisk JournaledHFS+ MacProHD GPTFormat disk0
There is also an option to securely delete data by overwriting the disk with random
data multiple times. For more details, see diskutil’s man page.
To erase a single volume on a disk, a slightly different command is used:
diskutil eraseVolume format name device
For example:
diskutil eraseVolume JournaledHFS+ UntitledPartition /Volumes/
OriginalPartition
Additional information about diskutil and other uses can be found in Command-Line
Administration. For complete command syntax for diskutil, consult the tool’s man page.
Identifying Remote Servers When Installing Mac OS X Server
For remote server installations, you need to know this information about the target
server:
 The identity of the target server: When using Server Assistant, you must be able to
recognize the target server in a list of servers on your local subnet or you must enter
the IP address of the server (in IPv4 format: 000.000.000.000) if it resides on a
different subnet. Information provided for servers in the list includes IP address, host
name, and Media Access Control (MAC) address (also called hardware or Ethernet
address).
If you use VNC viewer software to remotely control installation of Mac OS X Server
v10.5 or later, it may let you select the target server from a list of available VNC
servers. If not, you must enter the IP address of the server (in IPv4
format: 000.000.000.000).
The target server’s IP address is assigned by a DHCP server on the network. If no
DHCP server exists, the target server uses a 169.xxx.xxx.xxx address unique among
servers on the local subnet. Later, when you set up the server, you can change the IP
address.
If you don’t know the IP address and the remote server is on the local subnet, you
can use the sa_srchr command to identify computers on the local subnet where you
can install server software. Enter the following from an existing computer with
Mac OS X Server Tools installed:
/System/Library/Serversetup/sa_srchr 224.0.0.1
This command will return the IP address, and the EthernetID (in addition to other
information) of servers on the local subnet which have started up from the
installation disk.Chapter 5 Installation and Deployment 97
 The preset password for the target server: The password consists of the first eight
digits of the server’s built-in hardware serial number. To find a server’s serial number,
look for a label on the server. Older computers have no built-in hardware serial
numbers; for these systems, use 12345678.
Installing Server Software Interactively
You can use the installation disc to install server software interactively on a local server,
on a remote server, or on a computer with Mac OS X pre-installed.
Installing Locally from the Installation Disc
You can install Mac OS X Server directly onto a computer with a display, a keyboard,
and an optical drive attached, as shown in the following illustration:
If you have an Install DVD, the optical drive must be able to read DVD discs.
You can also install directly onto a computer that lacks a display, keyboard, and optical
drive capable of reading your installation disc. In this case, you start the target
computer in target disk mode and connect it to an administrator computer using a
FireWire cable.
You use the administrator computer to install the server software on the target
computer’s disk or partition, which appears as a disk icon on the administrator
computer.
These instructions assume you have started up the computer using the Install DVD,
installer partition, or NetInstall disk. If you have not, see the relevant instructions
beginning at “About Starting Up for Installation” on page 81.
To install server software locally:
1 After the computer starts, choose the language you want the server to use and click
Continue.
2 When the Installer opens, if you want to perform a clean installation, optionally use the
Utilities menu to open Disk Utility to prepare the target disk or partition before
proceeding.
If you have not previously prepared your disk for installation, you can do so now with
DIsk Utility. For more instructions on preparing your disk for installation, see “Preparing
Disks for Installing Mac OS X Server” on page 89.
Installer application
or
installer tool in
Terminal application98 Chapter 5 Installation and Deployment
3 Proceed through the Installer’s panes by following the onscreen instructions.
4 When the Select a Destination pane appears, select a target disk or volume (partition)
and make sure it’s in the expected state.
If you’re doing a clean installation, you can click Options to format the destination disk
or volume in Mac OS Extended (Journaled) format. Select Erase to format the disk in
Mac OS Extended (Journaled) format; then click OK.
If the volume you selected contains Mac OS X Server v10.3.9 or 10.2.8 and you want to
upgrade, click Options, select “Don’t erase,” and then click OK.
Important: When you perform an upgrade, make sure that saved setup data won’t be
inadvertently detected and used by the server. If saved setup data is used, the server
settings are not compatible with the saved settings and can cause unintended
consequences. For more information, see “How a Server Searches for Saved Setup Data”
on page 121.
5 Proceed through the Installer’s panes by following the onscreen instructions.
After installation is complete, the computer restarts and you can perform initial server
setup.
6 If you’re using an administrator computer to install onto a server that’s in target disk
mode and connected using a FireWire cable:
a Quit Server Assistant when it starts automatically on the administrator computer.
b Shut down the administrator computer and the server.
c Start up the administrator computer and the server normally (not in target disk
mode).
Now you can use Server Assistant from the administrator computer to remotely set up
the server.
Chapter 6, “Initial Server Setup,” on page 105 describes how to set up a server locally or
remotely. Chapter 5 Installation and Deployment 99
Installing Remotely with Server Assistant
To install Mac OS X Server on a remote server from the server Install DVD, installation
partition, or NetInstall disk, you need an administrator computer from which to use
Server Assistant to manage the installation, as shown in the following illustration:
After the computer has started up, you can control and manage any number of servers
from an administration computer.
Important: If you have administrative applications and tools from Mac OS X Server
v10.4 Tiger or earlier, do not use them with Leopard Server.
If you want to use the Installer user interface, you can use VNC to view and interact
with the remote installer. For more information, see “Installing Remotely with VNC” on
page 100.
These instructions assume you have successfully started up the computer using the
Install DVD, installer partition, or NetInstall disk. If you have not, see the relevant
instructions beginning at “About Starting Up for Installation” on page 81.
To install on a remote server by using Server Assistant:
1 After the target computer has started from the server Install DVD, installation partition,
or NetInstall disk, launch Server Assistant in the /Applications/Server/ folder on the
administrator computer.
You don’t need to be an administrator on the local computer to use Server Assistant.
2 Select “Install software on a remote server.”
Administrator computer
Subnet 1
Subnet 2
Welcome
>installer
>installer100 Chapter 5 Installation and Deployment
3 For every intended target server, identify the target server and add it to the list.
If it’s on the local subnet, select it in the list; otherwise, click the Add (+) button and
enter an IP address in IPv4 format (000.000.000.000).
If you already have a saved server list, load it now by selecting File > Load Server List.
4 When prompted for a password, enter the first eight digits of the server’s built-in
hardware serial number.
To find a server’s serial number, look for a label on the server.
If you’re installing on an older computer that has no built-in hardware serial number,
use 12345678 for the password.
5 After you finish adding all servers to the list, save this list for future use by selecting File
> Save Server List.
6 Proceed by following the onscreen instructions.
7 When the Volumes pane appears, select a target disk or volume (partition), make sure
it’s in the expected state, and click Continue.
If the volume you selected contains Mac OS X Server v10.4.10 or 10.3.9 and you want to
upgrade, select “Don’t erase.” Otherwise, you can select Erase to format the disk in
Mac OS Extended (Journaled) format. Click OK.
8 Proceed by following the onscreen instructions.
While installation proceeds, you can open another Server Assistant window to install
server software on other computers. Choose File > New Window to do so.
After installation is complete, the target server restarts and you can perform initial
server setup. Chapter 6, “Initial Server Setup,” on page 105 describes how.
Installing Remotely with VNC
If you’re using an installation disc for Mac OS X Server v10.5 or later, you can control
installation from another computer using open source VNC viewer software or Apple
Remote Desktop. This allows you to remotely control preparation of the target disk or
partition before beginning installation.
You can partition the hard disk into multiple volumes, create a RAID set, or erase the
target disk or partition.
WARNING: When you perform an upgrade, make sure that saved setup data won’t be
inadvertently detected and used by the server. If saved setup data is used, the server
settings are not compatible with the saved settings and can cause unintended
consequences. For more information, see “How a Server Searches for Saved Setup
Data” on page 121.Chapter 5 Installation and Deployment 101
The process for remotely installing with VNC is the same as installing locally at the
keyboard and monitor, except that you must first connect to the VNC server on the
target computer with a VNC client, like Apple Remote Desktop.
For information about connecting to a computer running from an Install DVD, see
“Remotely Accessing the Install DVD” on page 82.
For information about running the installer locally, see “Installing Locally from the
Installation Disc” on page 97.
Using the installer Command-Line Tool to Install Server
Software
You use the installer tool to install server software on a local or remote computer
from the command-line. For information about installer:
 See Command-Line Administration.
 Open the Terminal application and type installer, installer -help, or man
installer.
These instructions assume you have started up the computer using the Install DVD,
installer partition, or NetInstall disk. If you have not, see the relevant instructions
beginning at “About Starting Up for Installation” on page 81.
To use installer to install server software:
1 Start a command-line session with the target server by choosing from the following:
 Installing a local server: When the Installer opens choose Utilities > Open Terminal to
open the Terminal application.
 Installing a remote server: From Terminal on an administrator computer or from a
UNIX workstation, establish an SSH session as the root user with the target server,
substituting the target server’s actual IP address for :
ssh root@
∏ If you don’t know the IP address and the remote server is on the local subnet, you can
use the sa_srchr command to identify computers on the local subnet where you can
install server software:
/System/Library/Serversetup/sa_srchr 224.0.0.1
mycomputer.example.com#PowerMac4,4###Mac OS X
Server 10.5#RDY4PkgInstall#2.0#512
You can also use Server Assistant to generate information for computers on the local
subnet. Open Server Assistant, select “Install software on a remote computer,” and click
Continue to access the Destination pane and generate a list of servers awaiting
installation.102 Chapter 5 Installation and Deployment
2 When prompted for a password, enter the first eight digits of the server’s built-in
hardware serial number.
To find a server’s serial number, look for a label on the server. If the target computer
had been set up as a server, you’ll also find the hardware serial number in /System/
Library/Serversetup/SerialNumber.
If you’re installing on an older computer that has no built-in hardware serial number,
use 12345678 for the password.
3 Identify the target-server volume where you want to install the server software.
To list the volumes available for server software installation from the installation disc,
type this command:
/usr/sbin/installer -volinfo -pkg /System/Installation/Packages/
OSInstall.mpkg
You can also identify a NetInstall image you’ve created and mounted:
/usr/sbin/installer -volinfo -pkg /Volumes/ServerNetworkImage10.5/
System/Installation/Packages/OSInstall.mpkg
The list displayed reflects your particular environment, but here’s an example showing
three available volumes:
/Volumes/Mount 01
/Volumes/Mount1
/Volumes/Mount02
4 If you haven’t already done so, prepare the disks for installation.
For more information about preparing the disks for installation, see “Preparing Disks for
Installing Mac OS X Server” on page 89.
If the target volume has Mac OS X Server v10.4.10 or 10.3.9 installed, when you run
installer it will upgrade the server to v10.5 and preserve user files.
If you’re not upgrading but performing a clean installation, back up the user files you
want to preserve, then use diskutil to erase the volume and format it to enable
journaling:
/usr/sbin/diskutil eraseVolume HFS+ "Mount 01" "/Volumes/Mount 01"
/usr/sbin/diskutil enableJournal "/Volumes/Mount 01"
You can also use diskutil to partition the volume and to set up mirroring. For more
information about the command, see the diskutil man page.
Important: Don’t store data on the hard disk or hard disk partition where the operating
system is installed. With this approach, you won’t risk losing data if you need to reinstall
or upgrade system software. If you must store additional software or data on the
system partition, consider mirroring the drive.Chapter 5 Installation and Deployment 103
5 Install the operating system on a volume from the list generated in step 3.
For example, to use Mount 01 in the example in step 4 to install from a server
installation disc, enter:
/usr/sbin/installer -verboseR -lang en -pkg /System/Installation/
Packages/OSInstall.mpkg -target "/Volumes/Mount 01"
If you’re using a NetInstall image, the command identifies them as step 3 shows.
When you enter the -lang parameter, use one of the following values: en (for English),
de (for German), fr (for French), or ja (for Japanese).
During installation, progress information is displayed. While installation proceeds, you
can open another Terminal window to install server software on another computer.
6 When installation from the disc is complete, restart the server by entering:
/sbin/reboot
or
/sbin/shutdown -r
Server Assistant opens when installation is complete. You can now proceed to set up
the server. For more information, see “Initial Server Setup” on page 105.
Installing Multiple Servers
You can use Server Assistant, VNC viewer software, or the installer tool to initiate
multiple server software installations. After using Server Assistant to initiate server
software installation on more than one remote computer, you can choose File > New
Window to install the software on another batch of computers.
When running Server Assistant from an administration computer to install on multiple
machines, group the same hardware configurations together. For example, choose all
Intel Xserve machines or all G4 Mac minis.
After using a VNC viewer to control installation of Mac OS X Server v10.5 or later on one
remote computer, you can use the VNC viewer to open a connection to another remote
computer and control installation on it. Because this involves interacting with each
server individually, it is a less efficient method of installing on multiple servers.
The most efficient method of installation would be completely automated. Opening
the Terminal application and using the installer tool to initiate each server software
installation doesn’t accomplish this efficiently. However, scripting the command-line
tool (using known values for server IP addresses, for example) to automate multiple
simultaneous installations can be very efficient. To completely automate server
installation, you must script the installer tool and have a high measure of control
over the network infrastructure.104 Chapter 5 Installation and Deployment
For example, to have known IP addresses and the appropriate hardware serial numbers
included in your script, you cannot rely on the randomly assigned IP addresses. You can
use DHCP assigned static addresses to remove that uncertainty and ease your scripting
considerations.
The methods, scripting languages, and possibilities are too many to list in this guide.
Upgrading a Computer from Mac OS X to Mac OS X Server
You can use the Install DVD for Mac OS X Server v10.5 to upgrade a desktop computer
that has the following characteristics:
 Has Mac OS X v10.5 or later installed
 Has an Intel processor
 Was introduced in summer 2006 or later
 Meets the system requirements in “System Requirements for Installing
Mac OS X Server” on page 79
To upgrade a computer from Mac OS X to Mac OS X Server:
1 Start up the computer from the hard disk, as you would for normal use.
Do not use an installation disc.
2 Insert the Install DVD, open the Other Installs folder, and double-click
MacOSXServerInstall.mpkg to run the Installer.
When the Installer finishes, your computer restarts automatic[ally and Server Assistant
opens to let you set up the server.
3 After the server restarts, use Software Update to install server software updates.
How to Keep Current
After you’ve set up your server, you’ll want to update it when Apple releases server
software updates.
There are several ways to access update releases of Mac OS X Server:
 In Server Admin, select a server in the Servers list, then click the Server Updates
button.
 Use the Software Update pane of System Preferences.
 Use the softwareupdate command-line tool.
 Use the server’s software update service.
 Download a disk image of the software update from:
www.apple.com/support/downloads6
105
6 Initial Server Setup
Basic characteristics of your Mac OS X Server are established
during server setup. The server can operate in three different
configurations: advanced, standard, and workgroup. These
instructions assume you have chosen the advanced
configuration.
After installing server software, the next task is to set up the server. There are several
ways to set up a server:
 Set up one or more servers interactively.
 Automate the setup by using setup data you’ve saved in a file or in a directory the
servers are configured to access.
Information You Need
To understand and record information for each server you want to set up, see the
Mac OS X Server Advanced Worksheet in the appendix on page 195. The following
information provides supplemental explanations for some items on the worksheet.
When you’re upgrading from Mac OS X Server v10.4.10 or v10.3.9, Server Assistant
displays the existing server settings, but you can change them. Use the Mac OS X Server
Advanced Worksheet to record settings you want the v10.5 server to use.
Postponing Server Setup Following Installation
Server Assistant opens automatically on a server that hasn’t been set up, and waits for
you to begin the setup process. To set up the server later, you can postpone the setup
process by using the server’s keyboard, mouse, and display. 106 Chapter 6 Initial Server Setup
To postpone setting up Mac OS X Server:
m In Server Assistant, press Command-Q on the server’s keyboard, and then click Shut
Down.
When you restart the server, Server Assistant opens again.
If you’re setting up a server without a keyboard or display, you can enter commands in
the Terminal application to shut down the server remotely. For information about using
the command-line to connect to a remote computer and shut it down, see CommandLine Administration.
Connecting to the Network During Initial Server Setup
Try to place a server in its final network location (subnet) before setting it up for the
first time. If you’re concerned about preventing unauthorized or premature access
during setup, you can set up a firewall to protect the server while you’re finalizing its
configuration.
If you can’t avoid moving a server after initial setup, you must change settings that are
sensitive to network location before it can be used. For example, the server’s IP address
and host name, stored in directories and configuration files on the server, must be
updated. For more information, see “Changing the Server’s Host Name After Setup” on
page 144.
Configuring Servers with Multiple Ethernet Ports
Your server has a built-in Ethernet port and may have additional Ethernet ports built in
or added on.
When you’re using Server Assistant to interactively set up one or more servers, all of a
server’s available Ethernet ports are listed and you select one or more to activate and
configure. When you work in Server Assistant’s offline mode, you click an Add button to
manually create a list of ports to configure.
If you enable more than one port, you specify the order in which the ports should be
used by the server when routing traffic to the network. Although the server receives
network traffic on any active port, network traffic initiated by the server is routed
through the first active port.
For a description of port configuration attributes, see the Mac OS X Server Advanced
Worksheet located in the appendix. Chapter 6 Initial Server Setup 107
About Settings Established During Initial Server Setup
During server setup, the following basic server settings are established:
 The language to use for server administration and the computer keyboard layout is
defined.
 The server software serial number is set.
 A server administrator user is defined and the user’s home folder is created.
 Default AFP and FTP share points, such as Shared Items, Users, and Groups, are
defined.
 Basic Open Directory information is set up. At a minimum, a local directory domain is
created. You can also set up an LDAP directory for other computers to use or
configure the server to obtain directory information from other servers.
 The server’s host name, computer name, and local hostname are set. You can specify
the computer name and local hostname, but Server Assistant sets the host name to
AUTOMATIC in /etc/hostconfig. This setting causes the server’s host name to be the
first name that’s true in this list:
 The name provided by the DHCP or BootP server for the primary IP address
 The first name returned by a reverse DNS (address-to-name) query for the primary
IP address
 The local hostname
 The name “localhost”
 Network interfaces (ports) are configured. TCP/IP and Ethernet settings are defined
for each port you want to activate.
 Network time service can be set up.
If you’re upgrading, the current basic settings are displayed during the setup process,
but you can change them. Other settings, such as share points you’ve defined and
services you’ve configured, are preserved. For a complete description of what’s
upgraded and actions, see Upgrading and Migrating.
You can perform initial server setup only once without reinstalling a server. To change
settings established during setup, you have alternative means to do so. For example,
you can use Server Admin or Directory Utility to manage Open Directory settings.
Specifying Initial Open Directory Usage
During setup of an advanced configuration, you specify how the server initially stores
and accesses user accounts and other directory information. You choose whether the
server connects to a directory system or works as a standalone server. 108 Chapter 6 Initial Server Setup
After setup, you can create or change a connection to a directory system by using
Directory Utility, or you can make the server an Open Directory master or replica by
using Server Admin to change the server’s Open Directory service settings. For
information about changing directory services, see Open Directory Administration.
When you set up a server initially, you specify its directory services configuration.
Choices are:
 No change, available only when upgrading from Mac OS X Server v10.4.10 or 10.3.9.
 Standalone Server, used to set up only a local directory domain on the server.
 Connected to a Directory System, used to set up the server to obtain directory
information from a shared directory domain that’s already been set up on another
server.
In all these cases, Open Directory authentication is set up on the server and used by
default for any new users added to domains that reside on the server.
If you’re setting up multiple servers and one or more of them will host a shared
directory, set up those servers before setting up servers that will use those shared
directories.
Note: If you connect Mac OS X Server v10.5 to a directory domain of Mac OS X Server
v10.2 or earlier, users defined in the older directory domain cannot be authenticated
with the MS-CHAPv2 method.
This method may be required to securely authenticate users for the VPN service of
Mac OS X Server v10.5. Open Directory in Mac OS X Server v10.5 supports MSCHAPv2
authentication, but Password Server in Mac OS X Server v10.2 doesn’t support MSCHAPv2.
After setup, use the Directory Utility or Server Admin applications to refine the server’s
directory configuration, if necessary. Directory Utility lets you set up connections to
multiple directories, including Active Directory and other non-Apple directory systems,
and specify a search policy (the order in which the server should search through the
domains). Server Admin lets you set up replicas of an Open Directory master and
manage other aspects of a server’s directory service configuration.
Open Directory Administration can help you decide which directory usage setup option
is right for you. If you’re upgrading, the best choice is usually “No change.” If you’re
setting up a new server, the simplest choice is “Standalone Server.” After initial server
setup, you can use Directory Utility or Server Admin to adjust and finalize the directory
setup.Chapter 6 Initial Server Setup 109
Not Changing Directory Usage When Upgrading
When setting up a server that you’re upgrading to v10.5 from v10.3.9 or 10.2.8, and you
want the server to use the same directory setup it’s been using, choose “No change” in
the Directory Usage pane in Server Assistant.
Even when you want to change the server’s directory setup, selecting “No change” is
the safest option, especially if you’re considering changing a server’s shared directory
configuration. Changing from hosting a directory to using another server’s shared
directory or vice versa, or migrating a shared NetInfo domain to LDAP are examples of
directory usage changes you should make after server setup in order to preserve access
to directory information about your network.
For information about all the directory usage options available to you and how to use
Directory Utility and Server Admin to make directory changes, see Open Directory
Administration. For information about how to continue using existing directory data
when you change directory service settings, see Upgrading and Migrating.
If you choose the “No change” option and the server wasn’t using a Password Server,
Open Directory authentication is set up. When you add users to any Apple directory
domain residing on the server, their passwords are validated by default using Open
Directory authentication.
Setting Up a Server as a Standalone Server
A standalone server stores and accesses account information in its local directory
domain. The standalone server uses its local directory domain to authenticate clients
for its file, mail, and other services. Other servers and client computers can’t access the
standalone server’s local directory domain.
Open Directory authentication is also set up on the server. By default, Open Directory
authentication is used when a user is added to the local domain.
When a user attempts to log in to the server or use one of its services that require
authentication, the server authenticates the user by consulting the local database. If
the user has an account on the system and supplies the appropriate password,
authentication succeeds.
Setting Up a Server to Connect to a Directory System
If it’s connected to another directory system, your server stores and accesses account
information in another server’s shared directory and can use the other directory system
to authenticate clients for file, mail, and other services. Your server can also use its local
directory domain for accounts and authentication.110 Chapter 6 Initial Server Setup
You can integrate your server with a variety of directory systems by choosing one of
the following options during setup:
 Open Directory Server: Your server can store and access directory information
about an Open Directory server using LDAP. With this option, you need to know the
DNS name or IP address of the Open Directory server.
 As Specified by DHCP Server: Your server will obtain information for connecting to
a directory system from a DHCP server. The DHCP server must be set up to provide
the address and search base of an LDAP server (DHCP option 95). The directory
service and DHCP service are independent. They don’t need to be provided by the
same server.
 Other Directory Server: If you need to integrate the server with another kind of
directory system or with multiple directory systems, choose this option and set up
the connections later using the Directory Utility application.
This option lets you integrate your server into almost any existing directory service,
including Microsoft Active Directory, Novell eDirectory, another non-Apple directory,
or an NIS domain. For information about using Directory Utility, see Open Directory
Administration or open Directory Utility and then use the Help menu.
If you set up your server to connect to an Open Directory server that has Mac OS X
Server v10.3 or earlier, you may not be able to take advantage of some features:
 VPN service requires MS-CHAP2 authentication, which isn’t available in v10.2 or
earlier.
 Replication isn’t supported by v10.2 or earlier.
 Kerberos configuration is much more complex in v10.2. In addition, automatic
synchronization of Kerberos and Password Server requires v10.3 or later.
 In v10.3 and earlier, trusted directory binding, support for LDAP subdomains, and
Directory Utility controls aren’t available.
Using Interactive Server Setup
The simplest way to set up a small number of servers is to use Server Assistant’s guided
interview process after establishing a connection with each server in turn. You provide
server setup data interactively, then initiate setup immediately. If you have only a few
servers to set up, the interactive approach is useful. You can use the interactive
approach to set up a local server, a remote server, or several remote servers.
To use this approach, open Server Assistant, connect to one or more target servers,
supply setup data, and then initiate the setup immediately.
This is the technique you use to set up a local server, as “Setting Up a Local Server
Interactively” on page 111 describes. You can also use this interactive approach to set
up a remote server from an administrator computer. For instructions, see “Setting Up a
Remote Server Interactively” on page 112.Chapter 6 Initial Server Setup 111
When multiple remote servers can use the same setup data, you can supply the data
and then initiate setup of all the servers at once, using a batch approach. When
running Server Assistant from an administration computer to set up multiple servers,
group the same hardware configurations together. For example, choose all Intel Xserve
machines or all G4 Mac minis.
This technique, shown on the left side of the following illustration, requires that
network identifiers for all target servers be set using DHCP or BootP. For instructions,
see “Setting Up Multiple Remote Servers Interactively in a Batch” on page 113.
To customize the setup of individual servers, you can manage each setup individually
from a different Server Assistant window. This approach is shown on the right side of
the illustration above. For instructions, see “Setting Up a Remote Server Interactively”
on page 112.
Although the previous illustration shows target servers on the same subnet as the
administrator computer in one scenario and target servers on a different subnet in the
other scenario, both setup scenarios can be used to set up servers on the same and
different subnets.
If a target server is on a different subnet, you must supply its IP address. Servers on the
same subnet are listed by Server Assistant, so you select one or more servers in the list.
Setting Up a Local Server Interactively
After server software is installed on a server, you can use the interactive approach to
set it up locally if you have physical access to the computer.
This setup assumes you are using the Advanced server configuration mode. Don’t try to
use these instructions with Standard or Workgroup modes.
Subnet 1
Subnet 2
Welcome Welcome
Welcome112 Chapter 6 Initial Server Setup
To set up a local server interactively:
1 Fill out the Mac OS X Server Advanced Worksheet located in the appendix.
Supplemental information appears in “Information You Need” on page 105.
When the server restarts, Server Assistant opens.
2 Enter the setup data you’ve recorded on the Mac OS X Server Advanced Worksheet as
you move through the Assistant’s panes, following the onscreen instructions.
Make sure that any DHCP or DNS servers you specify for the server you’re setting up to
use are running.
After all setup data is entered, Server Assistant displays a summary of the data.
3 Review the setup data you entered and if necessary click Go Back to change it.
4 To save the setup data as a text file or in a form you can use for automatic server setup
(a saved setup file or saved directory record), click Save As.
To encrypt a configuration file or directory record, select “Save in Encrypted Format”
and then enter and verify a passphrase. You must supply the passphrase before an
encrypted setup file can be used by a target server.
5 To initiate setup of the local server, click Apply.
6 When server setup is complete, click Restart Now.
Now you can log in as the server administrator user created during setup to configure
services.
Setting Up a Remote Server Interactively
After server software is installed on a server, you can use the interactive approach to
set it up remotely from an administrator computer that can connect to the target
server.
To set up a remote server interactively:
1 Fill out the Mac OS X Server Advanced Worksheet located in the appendix.
Supplemental information appears in “Information You Need” on page 105.
2 Make sure the target server is running.
3 On an administrator computer, open Server Assistant in /Applications/Server/.
You don’t need to be an administrator on the administrator computer to use Server
Assistant.
4 In the Welcome pane, select “Set up a remote server” and click Continue.
5 In the Destination pane, put a check in the Apply column for the remote server you
want to set up, enter its preset password in the Password field, and click Continue to
connect to the server.
If you don’t see the target server on the list, click Add to add it or Refresh to determine
whether it’s available. Chapter 6 Initial Server Setup 113
6 Select the server configuration type “Advanced.”
7 In the Language pane, specify the language you want to use to administer the target
server.
8 If you are using saved setup data, do the following:
In the Language pane, choose File > Open Configuration File or File > Open Directory
Record to load the saved setup data you want to use. If the saved setup data is
encrypted, enter the passphrase when prompted.
Optionally choose View > Jump to Review to review the setup data, then use Go Back
as necessary to change it.
9 If you are entering setup data, do the following:
Click Continue and enter the setup data as you move through the Assistant’s panes,
following the onscreen instructions, and click Continue.
Make sure that any DHCP or DNS servers you specify for the server you’re setting up to
use are running.
10 After all setup data is specified, review the summary displayed by Server Assistant and
optionally click Go Back to change data.
11 To save the setup data as a text file or in a form you can use for automatic server setup
(as a saved setup file or saved directory record), click Save As.
To encrypt a configuration file or directory record, select “Save in Encrypted Format”
and then enter and verify a passphrase.
You must supply the passphrase before an encrypted setup file can be used by a target
server.
12 To initiate setup of the remote target server, click Apply.
13 When server setup is complete, click Continue Now.
The target server restarts and you can log in as the server administrator user created
during setup to configure services.
Setting Up Multiple Remote Servers Interactively in a Batch
You can use the interactive approach to set up multiple servers as a batch if:
 All the servers are accessible from an administrator computer
 All the servers use the same chip platform (for example, Intel-based or PowerPCbased)
 All the servers use the same setup data except for server software serial numbers and
network identities (host name, computer name, and local hostname)
 Network identities are provided by a DHCP or BootP server114 Chapter 6 Initial Server Setup
When running Server Assistant from an administration computer to set up multiple
servers, group the same hardware configurations together. For example, choose all Intel
Xserve machines or all G4 Mac minis.
If you have several servers with different configuration files, you can open a new Server
Assistant window for each batch of servers. This way you can group servers by
platform, settings, subnet, or any other criteria you choose.
To set up multiple remote servers interactively in a batch:
1 Fill out the Mac OS X Server Advanced Worksheet with settings you want to use for all
servers you want to set up.
The Mac OS X Server Advanced Worksheet is located on the Mac OS X Server installation
disc in the Documentation folder. Supplemental information appears in “Information
You Need” on page 105. The Preface tells you where else you can find the Mac OS X
Server Advanced Worksheet.
2 Make sure the target servers and any DHCP or DNS servers you want them to use are
running.
3 On an administrator computer that can connect to all the target servers, open Server
Assistant. It’s located in /Applications/Server/. You don’t have to be an administrator on
the administrator computer to use Server Assistant.
4 In the Welcome pane, select “Set up a remote server” and click Continue.
5 In the Destination pane, put a check in the Apply column for each remote server you
want to set up. Then enter the preset password in the Password field for each server,
and click Continue to connect to the servers.
If you don’t see a target server you want to set up on the list, click Add to add it.
6 In the Language pane, specify the language you want to use to administer the target
servers.
7 If you are using saved setup data, do the following:
In the Language pane, choose File > Open Configuration File or File > Open Directory
Record to load the saved setup data you want to use. If the saved setup data is
encrypted, enter the passphrase when prompted.
Optionally choose View > Jump to Review to review the setup data, then use Go Back
as necessary to change it.
8 If you are entering setup data, do the following:
Click Continue and enter the setup data as you move through the Assistant’s panes,
following the onscreen instructions, and click Continue.
Make sure that any DHCP or DNS servers you specify for the server you’re setting up to
use are running.Chapter 6 Initial Server Setup 115
9 After all setup data is specified, review the summary displayed by Server Assistant and
optionally click Go Back to change data.
10 To save the setup data as a text file or in a form you can use for automatic server setup
(as a saved setup file or saved directory record), click Save As.
To encrypt a configuration file or directory record, select “Save in Encrypted Format”
and then enter and verify a passphrase.
You must supply the passphrase before an encrypted setup file can be used by a target
server.
11 To initiate server setup, click Apply.
12 To initiate setup of the remote target server, click Apply.
13 When server setup is complete, click Continue Now.
The target servers restart and you can log in as the server administrator user created
during setup to configure their services.
Using Automatic Server Setup
When you have more than a few servers to set up, consider using automatic server
setup. This approach also provides a way to preserve setup data so it can be reused if
you need to reinstall server software.
The automatic approach is useful when you:
 Have more than a few servers to set up
 Want to prepare for setting up servers that aren’t yet available
 Want to save setup data for backup purposes
 Need to reinstall servers frequently
To use automatic server setup, you use Server Assistant to specify setup data for each
computer or batch of computers; then you save the data in a file or in a directory to
create setup data, as shown in the following illustration:
Finally, you provide that setup data to the target servers. You can provide the data
using a variety of methods, like storing files on the hard disk, removable storage, or
saving it in directory entries. By default, saved setup data is encrypted for extra security.
Administrator computer
Setup data in a directory
Setup data in a file116 Chapter 6 Initial Server Setup
When a server starts up for the first time, it searches for automatic setup data to
configure itself before it starts the interactive Setup Assistant.
Automatic server setup requires two main steps:
Step 1: Create the setup data files
The following sections can help you create setup data files.
 “Setup Data Saved in a File” on page 117
 “Setup Data Saved in a Directory” on page 118
 “Creating and Saving Setup Data” on page 116
 “Keeping Backup Copies of Saved Setup Data” on page 119
Step 2: Make the setup data files available to a freshly installed server
The following sections can help you make the data available to the servers:
 “How a Server Searches for Saved Setup Data” on page 121
 “Setting Up Servers Automatically Using Data Saved in a File” on page 122
 “Setting Up Servers Automatically Using Data Saved in a Directory” on page 125
Creating and Saving Setup Data
When you want to work with saved setup data, determine a strategy for naming,
encrypting, storing, and serving the data.
One way to create setup data is to use Server Assistant’s offline mode, which lets you
work with setup data without connecting to specific servers. You specify setup data,
then save it in a file or directory accessible from target servers, as the next two sections
describe. Target servers where Mac OS X Server v10.5 software has been installed
automatically detect the presence of the saved setup information and use it to set
themselves up.
You can define generic setup data that can be used to set up any server. For example,
you might want to define generic setup data for a server that’s on order, or to configure
50 Xserve computers you want to be identically configured. Alternatively, you can save
setup data that’s specifically tailored for a particular server.
Important: When you perform an upgrade installation, make sure that saved setup
data won’t be inadvertently detected and used by the server. If saved setup data is
used, existing server settings will be overwritten by the saved settings. For more
information, see “How a Server Searches for Saved Setup Data” on page 121.Chapter 6 Initial Server Setup 117
Setup Data Saved in a File
When you save setup data in a file, a target server detects and uses the file if:
 Setup data the target server recognizes isn’t found in a directory the server is
configured to use. For information about how a server detects and uses directory
data to set itself up, see “Setup Data Saved in a Directory” on page 118.
 The setup file is on a volume mounted locally in /Volumes/*/Auto Server Setup/,
where * is any device mounted under /Volumes. A target server searches through
volumes alphabetically by device name.
The device that is mounted as a file system can be the server’s hard disk or an iPod,
DVD, CD, FireWire drive, USB drive, or other device plugged in to the server (for
example, /Volumes/AdminiPod/Auto Server Setup/myserver.example.com.plist).
 The setup file name is one of the following, when searching for setup files, target
servers search for names in the order listed.
.plist (include leading zeros but omit colons. for example,
0030654dbcef.plist).
.plist (for example, 10.0.0.4.plist).
.plist (for example, myserver.plist).
.plist (first 8 characters only, for example,
ABCD1234.plist).
.plist (for example, myserver.example.com.plist).
.plist (for example, 10.0.plist matches 10.0.0.4 and
10.0.1.2).
generic.plist (a file that any server will recognize, used to set up servers that need the
same setup values). If the serial number specified in the file isn’t site licensed, after
setup you need to manually set it. Use Server Admin or the following command in
the Terminal application: serversetup -setServerSerialNumber.
 The correct passphrase is provided to the server when setup data is encrypted.
You can use Server Assistant to supply a passphrase interactively, or you can supply
the passphrase in a text file. Place the passphrase file on a volume mounted locally
on the target server in /Volumes/*/Auto Server Setup/.
The passphrase file can have one of these names. Target servers search for names in
the order listed.
.pass (include leading zeros but omit colons, for example,
0030654dbcef.pass).
.pass (for example, 10.0.0.4.pass).
.pass (for example, myserver.pass).
.pass (first 8 characters only, for example,
ABCD1234.pass.118 Chapter 6 Initial Server Setup
.pass (for example,
myserver.example.com.pass).
.pass (for example, 10.0.pass matches 10.0.0.4 and
10.0.1.2).
generic.pass (a file that any server will recognize). If the server software serial number
isn’t site licensed, after setup you need to manually set it. Use Server Admin or the
following command in Terminal: serversetup -setServerSerialNumber.
If you want to reuse saved setup data after reinstalling a server, you can store the
server’s setup files in a small local partition that isn’t erased when you reinstall the
server. The setup files are detected and reused after each reinstallation.
Setup Data Saved in a Directory
Using this approach offers the most unattended way to set up multiple servers but it
requires that you have a DHCP and directory infrastructure in place.
Using Server Assistant, you save setup data to an existing directory that the computer
you’re using is configured to access and that you want newly installed servers to
retrieve setup data from. The schema of the directory must support stored setup data.
Open Directory has built-in support for stored setup data. If you want to store setup
data in a non-Apple directory, you first must extend its schema as Open Directory
Administration describes.
When you save setup data in a directory, a target server detects and uses the setup
data if:
 The target server receives its network names (host name, computer name, and local
hostname) and its port configuration from a DHCP server.
 The DHCP server is configured to identify the IP address of the directory server where
the setup data resides. For DHCP server configuration instructions, see Network
Services Administration.
 The directory and DHCP servers are running.
 The setup data is stored in the directory in a path named /AutoServerSetup/ and a
record having one of the following names. Target servers search for names in the
order listed.
(include leading zeros but omit colons, for example,
0030654dbcef).
(for example, 10.0.0.4).
(for example, myserver).
(first 8 characters only, for example,
ABCD1234).
(for example, myserver.example.com).Chapter 6 Initial Server Setup 119
(for example, 10.0 matches 10.0.0.4 and 10.0.1.2).
generic (a record that any server will recognize, used to set up servers that need the
same setup values). If the serial number specified in the file isn’t site licensed, after
setup you need to manually set it. Use Server Admin or the following command in
the Terminal application: serversetup -setServerSerialNumber.
 The correct passphrase is provided to the server (setup data stored in a directory
should always be encrypted).
You can use Server Assistant to supply a passphrase interactively or you can supply
the passphrase in a text file. Place the passphrase file on a volume mounted locally
on the target server in /Volumes/*/Auto Server Setup/, where * is
any device mounted under /Volumes. A target server searches through volumes
alphabetically by device name.
The passphrase file can have one of the following names. Target servers search for
names in the order listed.
.pass (include leading zeros but omit colons, for example,
0030654dbcef.pass).
.pass (for example, 10.0.0.4.pass).
.pass. (for example, myserver.pass).
.pass (first 8 characters only, for example,
ABCD1234.pass).
.pass (for example,
myserver.example.com.pass).
.pass (for example, 10.0.pass matches 10.0.0.4 and
10.0.1.2).
generic.pass (a file that any server will recognize). If the server software serial number
isn’t site licensed, after setup you need to manually set it. Use Server Admin or the
following command in Terminal: serversetup -setServerSerialNumber.
Keeping Backup Copies of Saved Setup Data
Saved setup data isn’t only useful for automating the setup of multiple servers. It also
provides a way to set up servers again if you need to reinstall server software on them.
You can keep backup copies of setup data files on a network file server. Alternatively,
you can store setup data files in a local partition that won’t be erased when you
reinstall server software.
Using Encryption with Setup Data Files
By default, saved setup data is encrypted for extra security. Before server sets itself up
using encrypted data, it must have access to the passphrase used when the data was
encrypted. 120 Chapter 6 Initial Server Setup
The passphrase can be provided either interactively (using Server Assistant) or in a file
on a local volume of the target server. For example, you can store the file with the
passphrase on an iPod, then plug the iPod into each server that needs the passphrase.
A server with the IP address 10.0.0.4 would use /Volumes/MyIPod/Auto Server Setup/
10.0.0.4.pass.
Providing Setup Data Files to Servers
Using Files in the File System
When you place a setup file on a volume (CD, DVD, iPod, USB solid-state drive, disk
partition) mounted locally on a server you’ve installed but not set up, the server
detects the file and uses it to set itself up.
For example, you could store multiple setup files on an iPod and then plug the iPod
into the first server that a setup file exists for, as shown in the following illustration:
Then you could plug the iPod into the next server:
Each target server recognizes its own file, because it’s been named using one of its
identifiers and resides in a known location. For example, a server with WXYZ1234 as the
first eight characters of its built-in serial number would use this setup file to set itself
up: /Volumes/MyIPod/Auto Server Setup/ WXYZ1234.plist. A server’s IP address can also
be used as an identifier. A server with the IP address of 10.0.0.4 would use the following
file: /Volumes/MyIPod/Auto Server Setup/10.0.0.4.plist.
iPod
iPodChapter 6 Initial Server Setup 121
You could also use a single file, which you’d name “generic.plist”, to set up multiple
servers if the setup data does not need to be unique and the servers’ network identities
are provided using DHCP.
For more information about setup file naming and use, see “How a Server Searches for
Saved Setup Data” on page 121.
Using Settings in the Directory
A target server can set itself up using setup data you’ve stored in a directory the server
is configured to access.
Although storing setup data in a directory is the most automated way to set up
multiple servers, this approach requires that you set up an infrastructure first so that
target servers can locate the setup data stored in the directory.
The most critical components of the infrastructure are DHCP and Open Directory, as
the following picture illustrates:
The Open Directory server in this example hosts an LDAP directory in which setup data
has been saved. The address of the Open Directory server is registered with DHCP
service, running on another server in this example. The DHCP service provides the
Open Directory server address to the target servers when it assigns IP addresses to
those servers. The target servers detect setup data that has been stored for them in the
LDAP directory and use it to set themselves up.
You can save setup data in an Apple OpenLDAP directory or in another directory that
supports Apple’s schema extensions for saved setup data, documented in Open
Directory Administration.
For more information about setup file naming and use, see “How a Server Searches for
Saved Setup Data” on page 121.
How a Server Searches for Saved Setup Data
A freshly installed server sets itself up using saved setup data it finds while using the
following search sequence. When the server finds saved setup data that matches the
criteria described, it stops searching and uses the data to set itself up.
Open Directory server DHCP server122 Chapter 6 Initial Server Setup
1 The server searches through locally mounted volumes for setup files in /Volumes/*/
Auto Server Setup/, where * is a file system (device) name.
It searches through volumes alphabetically by device name, looking for a file with the
extension “.plist” that’s named using its MAC address, its IP address, its partial DNS
name, its built-in hardware serial number, its fully qualified DNS name, its partial IP
address, or generic.plist, in that order.
2 Next, the server looks in a directory it’s configured to use for a setup record in a path
named “AutoServerSetup”.
It searches for records named using its MAC address, its IP address, its partial DNS name
(myserver), its built-in hardware serial number, its fully qualified DNS name
(myserver.example.com), its partial IP address, or “generic,” in that order.
If the setup data is encrypted, the server needs the correct passphrase before setting
itself up. You can use Server Assistant to supply the passphrase interactively, or you can
supply the passphrase in a text file in /Volumes/*/Auto Server Setup/.
The target server searches through volumes alphabetically by file system name, looking
for a file with the extension “.pass” that’s named using its MAC address, its IP address,
its partial DNS name, its built-in hardware serial number, its fully qualified DNS name,
its partial IP address, or generic, in that order.
Important: When you perform an upgrade, make sure that saved setup data won’t be
inadvertently detected and used by the server you’re upgrading. If saved setup data is
used, existing server settings are overwritten by the saved settings.
The next two sections provide more details about how to use saved setup data.
Setting Up Servers Automatically Using Data Saved in a File
After server software has been installed on a server, you can set it up automatically
using data saved in a file.
To save and apply setup data from a file:
1 Fill out the Mac OS X Server Advanced Worksheet for each server you want to set up.
The Mac OS X Server Advanced Worksheet is located in the appendix.
2 On an administrator computer, open Server Assistant in /Applications/Server/.
You don’t need to be an administrator on the administrator computer to use Server
Assistant.
3 In the Welcome pane, select “Save advanced setup information in a file or directory
record” to work in offline mode, which doesn’t require a server connection.
4 In the Language pane, specify the language you want to use to administer the target
servers.Chapter 6 Initial Server Setup 123
5 If you want to create a setup file, go to step 6; if you want to work with an existing
setup file, go to 7.
If you intend to create a generic setup file because you want to use the file to set up
more than one server, don’t specify network names (computer name and local
hostname) and make sure that each network interface (port) is set to be configured
Using DHCP or Using BootP.
6 Click Continue and enter the setup data as you move through the Assistant’s panes,
following the onscreen instructions.
7 In the Language pane, choose File > Open Configuration File or File > Open Directory
Record to load the saved setup data you want to work with. If the saved setup data is
encrypted, enter the passphrase when prompted.
Optionally choose View > Jump to Review to review the setup data, then use Go Back
as necessary to change it.
8 In the Network Interfaces pane, click Add to specify network interfaces.
9 After the setup data is specified, review the summary displayed by Server Assistant and
optionally click Go Back to change data.
10 Click Save As, then select Configuration File.
11 To encrypt the file, select Save in Encrypted Format, and then enter and verify a
passphrase.
You must supply the passphrase before an encrypted setup file can be used by a target
server.
12 Click OK, navigate to the location where you want to save the file, name the file using
one of the following options, and click Save.
When searching for setup files, target servers search for names in the order listed.
.plist (include leading zeros but omit colons. for example,
0030654dbcef.plist).
.plist (for example, 10.0.0.4.plist).
.plist (for example, myserver.plist).
.plist (first 8 characters only, for example,
ABCD1234.plist).
.plist (for example, myserver.example.com.plist).
.plist (for example, 10.0.plist matches 10.0.0.4 and 10.0.1.2).
generic.plist (a file that any server will recognize, used to set up servers that need the
same setup values). 124 Chapter 6 Initial Server Setup
13 Place the file in a location where target servers can detect it.
A server can detect a setup file if it resides on a volume mounted locally in /Volumes/*/
Auto Server Setup/, where * is any device mounted under /Volumes. The device can be
the server’s hard disk or an iPod, DVD, CD, FireWire drive, USB drive, or other device
plugged into the server.
For example, if you have an iPod named AdminiPod, the path used would be /Volumes/
AdminiPod/Auto Server Setup/.
14 If the setup data is encrypted, make the passphrase available to the target servers.
You can supply the passphrase interactively using Server Assistant, or you can provide
it in a text file.
To provide the passphrase in a file, use step 15. To provide it interactively, use step 16.
15 To provide a passphrase in a file, create a text file and enter the passphrase for the
saved setup file on the first line, and then save the file using one of the following
names; target servers search for names in the order listed.
.pass (include leading zeros but omit colons, for example,
0030654dbcef.pass).
.pass (for example, 10.0.0.4.pass).
.pass. (for example, myserver.pass).
.pass (first 8 characters only, for example,
ABCD1234.pass).
.pass (for example, myserver.example.com.pass).
.pass (for example, 10.0.pass matches 10.0.0.4 and
10.0.1.2).
generic.pass (a file that any server will recognize).
Save the passphrase file on a volume mounted locally on the target server in /Volumes/
*/Auto Server Setup/, where * is any device mounted under /
Volumes.
16 To provide a passphrase interactively, use Server Assistant on an administrator
computer that can connect with the target server.
a In the Welcome or Destination pane, choose File > Supply Passphrase.
b In the dialog box, enter the target server’s IP address, password, and the passphrase.
c Click Send.
17 If you’re using a generic setup file, and the serial number isn’t site licensed, after setup
you must specify the server’s serial number by using Server Admin or the commandline.Chapter 6 Initial Server Setup 125
In Server Admin, select the server, click Settings, and click General. Alternatively, in the
Terminal application, use ssh to connect with the server and enter the serversetup -
setServerSerialNumber command.
For a description of the layout of a saved setup file and more information about the
serversetup command, see Command-Line Administration.
Setting Up Servers Automatically Using Data Saved in a Directory
After server software is installed on a server, you can set it up automatically using data
saved in a directory. This method requires a preexisting directory and DHCP
infrastructure, as the procedure below describes.
To save and apply setup data in a directory record:
1 Make sure the directory where you want to save setup data exists, that its schema
supports stored setup data, and that it’s accessible from the administrator computer
you’re using.
Open Directory Administration describes how to set up and access directories. It also
describes the schema for stored setup data. Stored setup data support is built into
Apple OpenLDAP directories, but the schema of other directories needs to be extended
to support stored setup data.
2 Fill out the Mac OS X Server Advanced Worksheet for each server you want to set up.
The Mac OS X Server Advanced Worksheet is located in the appendix.
3 On an administrator computer, open Server Assistant in /Applications/Server/.
You don’t need to be an administrator on the administrator computer to use Server
Assistant.
4 In the Welcome pane, select “Save advanced setup information in a file or directory
record” to work in offline mode, which doesn’t require a server connection.
5 In the Language pane, specify the language you want to use to administer the target
servers.
6 If you want to create a new setup, use step 7. If you want to work with a setup that
exists, use step 8.
If you’re creating generic setup data, don’t specify network names (computer name and
local hostname) and make sure that each network interface (port) is set to be
configured Using DHCP or Using BootP.
7 Click Continue and enter the setup data as you move through the Assistant’s panes,
following the onscreen instructions.126 Chapter 6 Initial Server Setup
8 In the Language pane, choose File > Open Configuration File or File > Open Directory
Record to load the saved setup data you want to work with.
If the saved setup data is encrypted, enter the passphrase when prompted.
Optionally choose View > Jump to Review to review the setup data, then use Go Back
as necessary to change it.
9 In the Network Interfaces pane, click Add to specify network interfaces.
10 After all setup data is specified, review the summary displayed by Server Assistant and
optionally click Go Back to change data.
11 Click Save As, then select Directory Record.
12 To encrypt the file, select Save in Encrypted Format, and then enter and verify a
passphrase.
You must supply the passphrase before an encrypted directory record can be used by a
target server.
13 Specify the directory where you want to save the setup, name the setup record, and
click OK; when prompted, enter information required to authenticate yourself as a
directory domain administrator.
Settings are saved in the directory in AutoServerSetup.
Target servers search for record names in the following order:
(include leading zeros but omit colons. for example,
0030654dbcef).
(for example, 10.0.0.4).
(for example, myserver).
(first 8 characters only, for example,
ABCD1234).
(for example, myserver.example.com).
(for example, 10.0 matches 10.0.0.4 and 10.0.1.2).
generic (a record that any server will recognize, used to set up servers that need the
same setup values).
14 Make sure the proper infrastructure is in place so servers that you want to use the
stored setup record for can find it.
The directory server storing the setup record must be running. DHCP must be
configured to identify the directory server to the target servers using Option 95. In
addition, you may need to have DNS configured if your directory data includes DNS
names.
For some additional infrastructure information, see “Defining Server Setup
Infrastructure Requirements” on page 30. Open Directory Administration and Network
Services Administration provide instructions for setting up directories and DHCP.Chapter 6 Initial Server Setup 127
15 If the setup data is encrypted, make the passphrase available to the target serverrs.
You can supply the passphrase interactively, using Server Assistant, or you provide it in
a text file.
To provide the passphrase in a file, use step 16. To provide it interactively, use step 17.
16 To provide a passphrase in a file, create a text file and enter the passphrase for the
saved setup file on the first line, and then save the file using one of the following
names:
Target servers search for names in the order listed.
.pass (include leading zeros but omit colons, for example,
0030654dbcef.pass).
.pass (for example, 10.0.0.4.pass).
.pass. (for example, myserver.pass).
.pass (first 8 characters only, for example,
ABCD1234.pass).
.pass (for example, myserver.example.com.pass).
.pass (for example, 10.0.pass matches 10.0.0.4 and
10.0.1.2).
generic.pass (a file that any server will recognize).
Put the passphrase file on a volume mounted locally on the target server in /Volumes/
*/Auto Server Setup/, where * is any device that is mounted under
the directory /Volumes.
17 To provide a passphrase interactively, use Server Assistant on an administrator
computer that can connect with the target server.
a In the Welcome or Destination pane, choose File > Supply Passphrase.
b In the dialog box, enter the target server’s IP address, password, and the passphrase.
c Click Send.
18 If you’re using a generic setup record and the server serial number isn’t site licensed,
you must specify the server’s serial number by using Server Admin or the commandline after setup.
In Server Admin, select the server, click Settings, and click General. To use the
command-line, in the Terminal application use ssh to connect with the server and enter
the serversetup -setServerSerialNumber command.
For a description of the schema of setup data saved in a directory, see Open Directory
Administration. For information about serversetup, see Command-Line Administration.128 Chapter 6 Initial Server Setup
Determining the Status of Setups
Normally, when setup is complete, the server restarts, and it starts up to the login
window. If setup isn’t successful, there are several methods by which you’re notified.
Using the Destination Pane for Setup Status Information
Server Assistant displays error information in its Destination pane. To access this pane,
on the Welcome pane select “Set up a remote server” and click Continue.
If the server isn’t listed, click Add to list it. Select the server and review the information
displayed.
You can save a list of servers you’re interested in monitoring in the Destination pane
using File > Save Server List. When you want to monitor the status of those servers,
choose File > Load Server List.
Handling Setup Failures
When a server’s setup fails, an error log is created as /System/Library/ServerSetup/
Configured/POR.err on the target server. The contents of this log can be displayed and
the log file deleted on a remote administrator computer.
Double-click the error icon for a server on Server Assistant’s Destination pane. If
prompted, supply the preset password and click Send.
The log contents are displayed, and you can click Delete to delete the log file. Setup
can’t be reinitiated until this file has been deleted.
If setup fails because a passphrase file can’t be found when using setup data saved in a
file or directory record, you can:
 Use Server Assistant to supply a passphrase interactively. On the Destination pane,
choose File > Supply Passphrase.
 Supply the passphrase in a text file. Place the passphrase file on a volume mounted
locally on the target server in /Volumes/*/Auto Server Setup/,
where * is any device mounted under /Volumes/. A target server searches through
volumes alphabetically by device name.
If a remote server setup fails for any other reason, reinstall the server software and
repeat initial setup.
If a local server setup fails, restart the computer, rerun Server Assistant, and reinitiate
setup, or reinstall the server software.
Handling Setup Warnings
When setup completes but a condition that warrants your attention exists, a warning
log is created as /Library/Logs/ServerAssistant.POR.status on the target server. Click the
target server’s desktop link named ServerAssistant.status to open this file.Chapter 6 Initial Server Setup 129
Here are some messages you may encounter in the log:
 The server software serial number is invalid. Open Server Admin, select the server in
the Servers list, click Settings, and click General. Enter the correct serial number, and
click Save.
 Because this server was set up using a generic file or directory record and the serial
number isn’t site licensed, you must enter the server software serial number using
Server Admin. Open Server Admin, select the server in the Servers list, click Settings,
and click General. Enter the correct serial number, and click Save.
 The server administrator user defined in the setup data already exists on the server
you’ve upgraded.
Getting Upgrade Installation Status Information
When you perform an upgrade, log files may be placed on the target server. For
information about upgrade logs, see the information about upgrading in Upgrading
and Migrating.
Setting Up Services
After setting up an advanced configuration, you must configure services using Server
Admin and add users and groups using Workgroup Manager.
The following sections survey initial setup of individual services and tell you where to
find instructions for tailoring services to support your needs.
Adding Services to the Server View
Before you can set up services, you must add the service to the server view in Server
Admin. For example, by default, no services can be seen for your server. As you select
services to administer, the appropriate configuration panes become accessible in a list
underneath your computer name.
The first time you launch Server Admin and connect to a newly installed server, you are
prompted to select the services you want to set up and configure on that server. When
you select the desired services in the list, those services appear underneath the server
hostname in the server list.
Before you can enable or configure and service, it must be added to the administered
service list.
To change services to administer:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for each service you want to turn on. 130 Chapter 6 Initial Server Setup
Setting Up Open Directory
Unless your server must be integrated with another vendor’s directory system or the
directory architecture of a server you’re upgrading needs changing immediately, you
can begin using the directories you configured during server setup.
Open Directory Administration provides instructions for all aspects of Open Directory
domain and authentication setup, including:
 Setting up client computer access to shared directory data
 Replicating LDAP directories and authentication information of Open Directory
masters
 Integrating with Active Directory and other non-Apple directories
 Configuring single sign-on
 Using Kerberos and other authentication techniques
Setting Up User Management
Unless you’re using a server exclusively to host Internet content (such as web pages) or
perform computational clustering, you probably want to set up user accounts in
addition to the administrator accounts created during server setup.
User Management tells you how to use Workgroup Manager to connect to the directory,
define user settings, set up group accounts and computer lists, define managed
preferences, and import accounts.
To set up a user account:
1 Open Workgroup Manager.
2 Authenticate to the directory as the directory administrator.
3 At the top of the application window, click the Accounts button to select the directory
you want to add users to.
4 Click the New User button.
5 Specify user settings in the panes that appear.
You can set up user accounts by using Workgroup Manager to import settings from
a file.
Setting Up File Services
When you turn on file sharing services, users can share items in selected folders. You
enable and configure File Services and share points using Server Admin. In versions of
Mac OS X Server before to Leopard server, share points were created using Workgroup
Manager. This functionality has now migrated to Server Admin.
File Services Administration provides instructions for creating, configuring, and
managing share points for file sharing using all the protocols.Chapter 6 Initial Server Setup 131
To set up file sharing:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the appropriate checkbox for each file service you want to turn on.
To share with Macintosh computers, turn on Apple file service (AFP service).
To share with Windows computers, turn on SMB service.
To provide File Transfer Protocol (FTP) access, turn on FTP service.
To share with UNIX computers, turn on NFS service.
4 Select File Sharing in the toolbar.
5 Select a volume or folder you want to share.
6 Select “Share this item” for each folder or volume you want to share.
7 Click the other tabs to specify attributes for the share point.
Setting Up Print Service
When you turn on print service, server users can share network PostScript printers or
Postscript and non-Postscript printers connected directly to the server.
A queue is set up automatically for any USB printer connected to the server. No printer
queues are set up automatically for network printers, but they’re easy to add.
To set up a shared printer queue:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for Print service.
4 In the list beneath the server, select Print service.
If it isn’t running, click the Start Print button.
5 Click Queues.
6 Click the Add (+) button.
7 Choose a connection protocol, identify a printer, then click OK.
Users of Mac OS X computers can now add the printer using Printer Setup Utility.
For more information about setting up print services, see Print Service Administration.132 Chapter 6 Initial Server Setup
Setting Up Web Service
You can use the Apache HTTP Server that comes with Mac OS X Server to host server
and user websites.
If you turned on web service in Server Assistant, your server can begin serving HTML
pages from server and user folders.
 To view the main server site, open a web browser on any computer with access to
the server and enter the server’s IP address or domain name.
 To view a user site, add a slash (/), a tilde (~), and the user’s short name after the
server address. For example, enter
http://192.268.2.1/~someuser
To turn on web service if it’s not running:
1 If you have the HTML files for your main site, copy them into the Documents folder in
the /Library/WebServer/ directory.
If the files that make up your site are organized in folders, copy the entire folder
structure to the Documents folder.
For a user site, the files go into the Sites folder in the user’s home folder.
Make sure the web content files and folders have the required permissions and
ownership. For normal web access, and for WebDAV Read-Only access, the files must be
readable by user www, and the folders (including all ancestral folders) must be
readable and searchable by user www. In addition, for WebDAV Read/Write access, the
files must be writable by user named “www,” and the immediately enclosing folder
must be writable by user named “www.”
If you don’t have your own HTML files yet, you can still turn on web service to see how
it works using the default start pages provided with Mac OS X Server.
2 Open Server Admin.
3 Select a server, click the Settings button in the toolbar, and then click the Services tab.
4 Select the checkbox for Web service.
5 In the list beneath the server, click the button for web service.
6 If it isn’t running, click the Start Service button in the toolbar.
Web Technologies Administration describes the many features of web service, including
how to set up SSL for a site, enable WebMail, and use WebDAV for file sharing.
Setting Up Mail Service
Providing full mail service for your users requires additional configuration beyond what
can be described here. Mail Service Administration provides instructions for setting up
and managing a mail server.Chapter 6 Initial Server Setup 133
Setting Up Network Services
If you want a server to host any of the following network services, see Network Services
Administration for setup instructions:
 DHCP service
 DNS
 Firewall service
 Network Address Translation (NAT)
 RADIUS
 VPN
 Network time service
Setting Up System Image and Software Update Services
For details on using NetBoot and NetInstall to simplify the management and
installation of client operating systems and other software, see System Imaging and
Software Update Administration.
It tells you how to create disk images and set up Mac OS X Server so other Macintosh
computers can start up from, or install, those images over the network.
The same guide describes how to set up software update service, which lets you
customize updates of Apple software on client computers.
To enable NetBoot and NetInstall service for administration:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for NetBoot service.
Setting Up Media Streaming and Broadcasting
For information about how to manage a streaming server that delivers media streams
live or on demand to client computers, see QuickTime Streaming and Broadcasting
Administration.
To enable QuickTime Streaming Service for administration:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for QuickTime Streaming service.
Setting Up Podcast Producer
For information about how to manage a a podcast production server that delivers
syndicated media to client computers, see Podcast Producer Administration.134 Chapter 6 Initial Server Setup
To enable Podcast Producer service for administration:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for Podcast Producer service.
Setting Up WebObjects Service
If you want to develop WebObjects applications, see the WebObjects Reference Library,
available at developer.apple.com/referencelibrary/WebObjects/. If you want to set up a
WebObjects application server, see the Deployment section of the WebObjects
Reference Library. More information about WebObject service can be found in Web
Technologies Administration.
To enable WebObject service for administration:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for WebObject service
Setting Up iChat Service
In addition to services already discussed that help users stay in touch (for example, mail
and file services and group accounts and preferences), you can set up an iChat server.
How you use Server Admin to set up iChat service is described in iChat Service
Administration.
To enable iChat service for administration:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for iChat service.
Setting Up iCal Service
When you turn on iCal Service, you can share and edit calendars for individuals and
groups. Using a CalDAV enabled calendar application, you can share, view, and edit
calendars with others.
To use Server Admin to set up iCal service, see iCal Service Administration.
To enable iCal service for administration:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Services tab.
3 Select the checkbox for iCal service.7
135
7 Management
This chapter shows you how to complete ongoing
management for your systems, including setting up
administrator computers, designating administrators,
and maintaining service uptime.
Sections include:
 “Ports Used for Administration” on page 136
 “Ports Open By Default” on page 136
 “Computers You Can Use to Administer a Server” on page 136
 “Using the Administration Tools” on page 138
 “Opening and Authenticating in Server Admin” on page 138
 “Adding and Removing Servers in Server Admin” on page 139
 “Grouping Servers Manually” on page 140
 “Grouping Servers Using Smart Groups” on page 140
 “Working With Settings for a Specific Server” on page 141
 “Administering Services” on page 145
 “Tiered Administration Permissions” on page 149
 “Workgroup Manager Basics” on page 150
 “Administering Accounts” on page 151
 “Working With Pre-Version 10.5 Computers From Version 10.5 Servers” on page 155
 “Service Configuration Assistants” on page 155
 “Critical Configuration and Data Files” on page 155
 “Improving Service Availability” on page 159
 “Setting Up Your Server for Automatic Reboot” on page 161
 “Load Balancing” on page 168
 “Daemon Overview” on page 169136 Chapter 7 Management
Ports Used for Administration
For Apple’s administration applications to function, the following ports must be
enabled.
In addition, other ports must be enabled for each service you want to run on your
server. For a port reference guide, see Network Services Administration and the manual
for the appropriate service.
Ports Open By Default
After Setup, the firewall is off by default in Advanced Server mode, and therefore all
ports are open. When the firewall is turned on, all ports are blocked except the
following for all originating IP addresses:
Computers You Can Use to Administer a Server
To administer a server locally using the graphical administration applications (in /
Applications/Server/) log in to the server as a server administrator and open them.
To administer a remote server, open the applications on an administrator computer. An
administrator computer is any Mac OS X Server or Mac OS X v10.5 or later computer
where the administration tools have been installed from the Mac OS X Server Admin
Tools CD. See “Setting Up an Administrator Computer” on page 137.
Port number and type Tool used
22 TCP SSH command-line shell
311 TCP Server Admin (with SSL)
625 TCP Workgroup Manager
389, 686 TCP Directory
80 TCP QuickTime Streaming Management
4111 TCP Xgrid Admin
Port number and type Service
22 TCP SSH command-line shell
311 TCP Server Admin (with SSL)
626 UDP Serial number support
625 TCP Remote Directory Access
ICMP incoming and outgoing standard ping
53 UDP DNS name resolutionChapter 7 Management 137
You can run command-line tools from the Terminal Application (in /Applications/
Utilities/) on any Mac OS X Server or Mac OS X computer. You can also run commandline tools from a UNIX workstation.
Setting Up an Administrator Computer
An administrator computer is a computer with Mac OS X or Mac OS X Server v10.5 or
later that you use to manage remote servers.
In the following illustration, the arrows originate from administrator computers and
point to servers the administrator computers might be used to manage.
When you’ve installed and set up a Mac OS X Server that has a display, keyboard, and
optical drive, it’s already an administrator computer. To make a computer with
Mac OS X into an administrator computer, you must install additional software.
To enable remote administration of Mac OS X Server from a Mac OS X computer:
1 Make sure the Mac OS X computer has Mac OS X v10.5 or later installed., and in
addition, make sure the computer has at least 512 MB of RAM and 1 GB of unused disk
space.
2 Insert the Mac OS X Server Admin Tools CD.
3 Open the Installer folder.
4 Start the installer (ServerAdministrationSoftware.mpkg) and follow the onscreen
instructions.
Using a Non-Mac OS X Computer for Administration
You can use a non-Mac OS X computer that offers SSH support, such as a UNIX
workstation, to administer Mac OS X Server using command-line tools. For more
information, see Command-Line Administration.
You can also use any computer which can run a VNC viewer to administer Mac OS X
Server. Administering the server via VNC is the same as using the server’s keyboard,
mouse, and monitor locally.
Mac OS X Servers
Mac OS X
administrator computer138 Chapter 7 Management
You enable a VNC server on the Mac OS X Server by enabling Screen Sharing in the
Sharing pane of System Preferences.
Using the Administration Tools
Information about administration tools can be found on the pages indicated in the
following table.
You use Server Admin to administer services on one or more Mac OS X Server
computers. Server Admin also lets you specify settings that support multiple services,
such as creating and managing SSL certificates and specifying which users and groups
can access services.
Opening and Authenticating in Server Admin
Server Admin is installed in /Applications/Server/. You can open it in the Finder, or you
can open it by clicking the Server Admin icon in the Dock, or by clicking the Admin
button on the Workgroup Manager toolbar.
Use this application or tool To See
Installer Install server software or upgrade it
from v10.2 or 10.3.
page 77
Server Assistant Set up a v10.5 server. page 110
Workgroup Manager Administer accounts and their
managed preferences..
page 150
Server Admin Configure and monitor services and
administrator access, and configure
share points.
Set up and manage QuickTime media
streaming.
page 141
page 39
System image tools Manage NetBoot and NetInstall disk
images.
page 48
Server Monitor Monitor Xserve hardware. page 172
QTSS Publisher Manage media and prepare it for
streaming or progressive download.
page 49
Apple Remote Desktop
(optional)
Monitor and control other Macintosh
computers.
page 49
Command-line tools Administer a server using a UNIX
command shell.
page 49
Xgrid Admin Monitor local or remote Xgrid
controllers, grids, and jobs.
page 50Chapter 7 Management 139
To select a server to work with, enter its IP address or DNS name in the login dialog
box, or click Browse to choose from a list of servers. Specify the user name and
password for a server administrator, then click Connect.
Adding and Removing Servers in Server Admin
The servers you can administer using Server Admin appear in the Servers list on the left
side of the application window.
You can add a server to the Servers list and log in to it in two ways:
 Click the Add (+) button in the bottom action bar and choose Add Server.
 Choose Server > Add Server from the menu bar.
The next time you open Server Admin, any server you’ve added is displayed in the list.
To change the order of servers in the list, drag a server to the new location in the list.
You can remove a server from the Servers list in a similar fashion. First you select the
server to remove, then you do one of the following:
 Click the Perform Action button in the bottom action bar and choose Disconnect
then Remove Server.
 Choose Server > Disconnect, and then choose Server > Remove Server from the
menu bar.140 Chapter 7 Management
If a server in the Servers list appears gray, double-click the server or click the Connect
button in the toolbar to log in again. Select the “Remember this password in my
keychain” option while you log in to enable auto-reconnect the next time you open
Server Admin.
Grouping Servers Manually
Server Admin displays computers in groups in the Server List section of the
application’s window. The default server list is called the All Servers list. This is a list of
all possible administered computers that you have added and authenticated to. You
can create other groups to organize the computers on your network in any way you
wish.
Server groups have the following capabilities:
 You can create as many lists as you want.
 Servers can appear in more than one list.
 Groups can be made in any organization scheme you can imagine: geographic,
functional, hardware configuration, even color.
 You can click a group name to see a status overview of all servers in the group.
You can make more specific, targeted groups of servers from your All Servers list. First,
you can create blank lists and then add servers to them later from the All Servers list.
To create a server group:
1 Click the Add (+) button under the Server list at the bottom of the Server Admin
window.
2 Select Add Group, and name the group.
You can rename groups by clicking the group and letting the mouse hover over the
name for a few seconds. the name should become editable.
3 Drag the servers from the All Servers group to the newly created group.
Grouping Servers Using Smart Groups
Server Admin displays computers in groups in the Server List section of the
application’s window. The default server list is called the All Servers list. This is a list of
all possible administered computers that you have added and authenticated to.You can
create a server list that automatically populates based on custom criteria. After you
create a smart group, any server added to the All Server list (or other specified list) that
matches the criteria is dynamically added to the smart group.
You can match any or all of the following criteria:
 Visible services
 Running servicesChapter 7 Management 141
 Network throughput
 CPU utilization
 IP address
 OS version
To create a server smart group:
1 Click the Add (+) button under the Server list at the bottom of the Server Admin
window.
2 Select Add Smart Group.
3 Name the smart group.
4 Define the criteria by which servers will appear in the list, and click OK.
The group will appear in the Server list.
Working With Settings for a Specific Server
To work with general server settings, select a server in the Servers list. You then have a
number of buttons in the toolbar that show configuration options or tabs of
configuration options.
The following shows the Settings pane for a server:142 Chapter 7 Management
The following table contains a summary of what you find for each button:
When you click Settings, you have access to the following panes:
 General pane: Click General to work with the server serial number or to enable
SNMP, NTP, SSH, Remote Management, and server side mobile home sync feature
support.
SNMP is the abbreviation for Simple Network Management Protocol, a standard that
facilitates computer monitoring and management. The server uses the open source
net-snmp project for its SNMP implementation. Although none of the server
administration tools use or require SNMP, enabling it lets the server be monitored
and managed from third-party SNMP software such as HP OpenView.
Use the NTP (Network Time Protocol) checkbox to enable NTP service. For
information about NTP, see Network Services Administration.
SSH is the abbreviation for Secure Shell. The server uses the open source OpenSSH
project for its SSH implementation. When you enable SSH, you can use commandline tools to remotely administer the server. SSH is also used for other remote server
administration tasks, such as initial server setup, Sharing management, and
displaying file system paths and the contents of folders in the server administration
tools. SSH must be enabled while creating an Open Directory replica, but it can be
disabled afterwards.
Remote Management allows the server to be administered by Apple Remote
Desktop. You enable and disable Apple Remote Desktop administration in this pane
instead of the Sharing pane of System Preferences.
Server side file tracking for mobile home sync is a feature of mobile home folders.
See User Management for information about when to enable this feature.
 Network pane: Click Network to view or change the server’s computer name or local
hostname, or see a list of network interfaces for this server and their addressing
information.
The computer name is what a user sees when browsing the network (/Network). The
local hostname is usually derived from the computer name, but can be changed.
Toolbar button Shows
Overview Information about the server’s hardware, software, services, and status
Logs The system log and security systems log
Graphs A pictorial history of server activity
Sharing Configuration options for defining file sharing folders, share points, and
automounts
Server Updates Software updates available from Apple to update the server’s software
Certificates The server’s security certificates
Settings The server’s network settings, server software serial number, service access
controls, and other information.Chapter 7 Management 143
The network interfaces table shows the name of the interface, the type of addressing
(IPv4, or IPv6), the IP address, and the DNS name found by reverse lookup for the
address.
 Date & Time pane: Click Date & Time to set the server’s date and time, NTP source
preference, and time zone. More information about NTP can be found in Network
Services Administration.
 Notifications pane: Click Notifications to configure Mac OS X Server’s automatic
event notifications.
You set the email address and notification trigger in this pane. More detailed
information about notifications, see “Notification in Server Admin” on page 175.
 Access pane: Click Access to control user access to some services and to designate
administration privileges for users.
When you select the Services tab, you set up access to services to users and groups
(service ACLs). You can set up the same access to all services, or you can select a
service and customize its access settings. Access controls are simple. Choose
between letting all users and groups use services or letting only selected users and
groups use services.
When you select the Administrators tab, you designate users to have administration
or monitoring privileges for the services on the server. For more detailed information
about these settings, see “Defining Administrative Permissions” on page 149.
 Services pane: Click Services to show or hide services in Server Admin for this server.
Changing the IP Address of a Server
You can change the IP address of a server using the Network pane of System
Preferences or the networksetup tool.
When a network address change is detected, no matter how the change happened,
changeip is invoked. The tool changeip goes through all configuration files and places
where the Server’s IP address is stored, and changes the address to conform to the new
address. The server’s IP address can be changed without changeip being invoked from
the command-line.144 Chapter 7 Management
Changing the Server’s Host Name After Setup
When you perform an initial server setup for new installations, Server Assistant sets the
host name value by assigning AUTOMATIC to the hostname parameter in /etc/
hostname. This setting causes the server’s host name to be the first name that’s true in
this list:
 The name provided by the DHCP or BootP server for the primary IP address
 The first name returned by a reverse DNS (address-to-name) query for the primary IP
address
 The local hostname
 The name “localhost”
After initial setup, if you want to change the host name, don’t use the System
Preferences Sharing pane to modify the server’s computer name; use the changeip
command-line tool.
For details, see Command-Line Administration or the man page for changeip.
Changing Server Configuration Type
If you have previously installed a standard or workgroup configuration server, you can
change the server type to an advanced configuration server. All of the settings
previously set with System Preferences are retained in the new configuration. No
automatic provisioning of user’s services will occur again.
The Server Preferences firewall is separate from the Server Admin firewall, and
converting to advanced configuration server will disable the Server Preferences firewall.
You will need to enable and configure the firewall accessed through Server Admin.
From the time of the conversion, you use Server Admin and the other related tools to
administer your server. System Preferences cannot be used; this is a one-way, one-time
conversion.
To change your server configuration:
1 Set up an administration computer, which has Server Admin, Workgroup Manager, and
other administrative tools installed.
For specific instructions, see “Setting Up an Administrator Computer” on page 137.
2 Launch Server Admin and log in to the switching server.
For detailed instructions on logging in, see “Opening and Authenticating in Server
Admin” on page 138.
A dialog sheet will appear, asking if you intend to convert the server configuration
mode to Advanced.
3 Click “Convert to Advanced.”
The server is now no longer in standard or workgroup configuration mode.Chapter 7 Management 145
Administering Services
To work with a particular service on a server selected in the Servers list of Server
Admin, click the service in the list under the server. You can view information about a
service (logs, graphs, and so forth) and manage its settings.
The following is a sample service configuration pane in Server Admin.
To start or stop a service, select it and then click Start or Stop in the bottom action bar.
Adding and Removing Services in Server Admin
Server Admin can only show you the services you are administering, hiding all other
service configuration panes until needed. Before you can administer a service, it must
be enabled for the specific server; then that service appears under the server name in
the main Server list.
To add or remove a service in Server Admin:
1 Select the server that will host the desired service.
2 Click the Settings button in the toolbar.
3 Click Services.
4 Select the desired service, and click Save.
The service now appears in the list, ready for configuration.146 Chapter 7 Management
Importing and Exporting Service Settings
To copy service settings from one server to another or to save service settings in a
property-list file for reuse later, use the Export Service Settings command in Server
Admin.
To export settings:
1 Select the desired server.
2 Choose Server > Export > Service Settings from the menu bar.
3 Select the services whose settings you want to copy.
4 Click Save.
The file that was created contains all service configuration information as a plist XML
document.
To import settings:
1 Select the target server to receive the settings.
2 Choose Server > Import > Service Settings from the menu bar.
3 Find and select the saved service file.
The only file you can use with this function is a properly formatted XML-based plist file,
like the one generated from the settings export.
4 Click Open.
Controlling Access to Services
You can use Server Admin to configure which users and groups can use services hosted
by a server. You set up access to services to users and groups (SACLs). You can set up
the same access to all services, or you can select a service and customize its access
settings.
Access controls are simple. Choose between allowing all users and groups use services
or allowing only selected users and groups use services.Chapter 7 Management 147
The following shows the Service Access Control List pane in Server Admin:
Select a server in the Servers list, click Settings, click Access, then click Services.
You can separately specify access controls for individual services, or you can define one
set of controls that applies for all services that the server hosts.
Using SSL for Remote Server Administration
You can control the level of security of communications between Server Admin and
remote servers by choosing Server Admin > Preferences.
By default, Server Admin treats all communications with remote servers as encrypted
using SSL. This uses a self-signed 128-bit certificate installed in /etc/servermgrd/ssl.crt
when you install the server. Communications use HTTPS (port 311). If this option isn’t
possible, HTTP (port 687) is used and clear text is sent between Server Admin and the
remote server.
If you want a greater level of security, also select “Require valid digital signature (SSL).”
By default, “Require valid digital signature (SSL)” is disabled. This option uses an SSL
certificate installed on a remote server to ensure that the remote server is a valid server. 148 Chapter 7 Management
Before enabling this option, use the instructions in “Requesting a Certificate From a
Certificate Authority” for generating a Certificate Signing Request (CSR), obtaining an
SSL certificate from an issuing authority, and installing the certificate on each remote
server. Instead of placing files in /etc/httpd/, place them in /etc/servermgrd/. You can
also generate a self-signed certificate and install it on the remote server.
You can use Server Admin to set up and manage self-signed or -issued SSL certificates
used by mail, web, Open Directory, and other services that support them.
“Certificate Manager in Server Admin” on page 62 provides instructions for using Server
Admin to create, organize, and use security certificates for SSL-enabled services.
Individual service administration guides describe how to configure specific services to
use SSL.
If you’re interested in higher levels of SSL authentication, see the information at
www.modssl.org.
Managing Sharing
To work with share points and access control lists, click the File Sharing icon in the
Server Admin toolbar. Learn more in File Services Administration.
The following is the File Sharing configuration pane in Server Admin.Chapter 7 Management 149
Tiered Administration Permissions
In previous releases of Mac OS X Server, there were two classes of users: admin and
everyone else. Admin users could make any change to the settings of any service or
change any directory data as well as passwords and password policies.
In Mac OS X Server v10.5, you can now grant individuals and groups certain
administrative permissions, without adding them to the UNIX “admin” group (in other
words, you can make them administrator users). There are two levels of permissions:
 Administer: This level of permission is analogous to being in the UNIX admin group.
You can change any setting on the server for the designated server and service only.
 Monitor: This level of permission allows you to view Overview panes, Log panes, and
other information panes in Server Admin, as well as general server status data in
server status lists. You do not have access to any saved service settings.
Any user or group can be given these permissions for either all services or for only
selected services. The permissions are stored on a per-server basis.
The only users that can change the tiered administration access list are users that are
truly in the UNIX admin group.
The Server Admin application will update to reflect what operations are possible for a
user’s permissions. For example, some services are hidden or the Settings pane is
dimmed when you can only monitor that service.
Because the feature is enforced on the server side, the permissions also impact the
usage of serveradmin, dscl, dsimport, and pwpolicy command-line tools because all of
these tools are limited to the permissions configured for the administrator in use.
Defining Administrative Permissions
You can decide if a user or group can monitor or administer a server or service without
giving them the full power of a UNIX administrative user. Assigning effective
permissions to users creates a tiered administration, where some but not all
administrative duties can be carried out by designated individuals.
To assign permissions:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Access tab.
3 Click the Administrators tab.
4 Select whether to define administrative permissions for all services on the server or for
select services.150 Chapter 7 Management
5 If you choose to define permissions by service, select the appropriate checkbox for
each service you want to turn on.
If you define permissions by service, be sure to assign administrators to all the active
services on the server.
6 Click the Add (+) button to add a user or group from the users and group window.
To remove administrative permissions, select a user or group and click the Remove (-)
button.
7 For each user or group, select the permissions level next to the user or group name.
You can choose Monitor or Administer.
The capabilities of Server Admin to administer the server are limited by this setting,
when the server is added to the Server list.
Workgroup Manager Basics
You use Workgroup Manager to administer the following accounts: user accounts,
group accounts, and computer lists. You also use it to set preferences for Mac OS X user
accounts, group accounts, computers, and access the Inspector, an advanced feature
that lets you do raw editing of Open Directory entries.
The following topics describe general Workgroup Manager usage. Instructions for
conducting specific administration tasks are available in Workgroup Manager help and
in several guides:
 User Management tells you how to use Workgroup Manager for managing user
accounts, group accounts, computer lists, preferences, and how to import and export
accounts.
 File Services Administration explains how to use Sharing in Workgroup Manager to
manage share points.
 Open Directory Administration provides information about using the Inspector.Chapter 7 Management 151
Opening and Authenticating in Workgroup Manager
Workgroup Manager is installed in /Applications/Server/, you can open it in the Finder,
the Dock, or you can open Workgroup Manager by selcting View > Workgroup
Manager in the menu bar of Server Admin:
 When you open Workgroup Manager on the server you’re using without
authenticating, you have read-only access to information displayed in the local
domain. To make changes, click the lock icon to authenticate as a server
administrator.
This approach is most useful when you’re administering various servers and working
with several directory domains.
 To authenticate as an administrator for a server, local or remote, enter the server’s IP
address or DNS name in the login dialog box, or click the directory path area of the
Workgroup Manager window to choose another directory server. Specify the user
name and password for an administrator of the server, then click Connect.
Use this approach when you’ll be working most of the time with a particular server.
After opening Workgroup Manager, you can open a Workgroup Manager window for a
different computer by clicking New Window in the toolbar or choosing Server >
Connect.
Important: When you connect to a server in Workgroup Manager, make sure the long
or short user name you specify matches the capitalization in the user account.
Administering Accounts
User accounts and group memberships are not administered in Server Admin. You
need to use Workgroup Manager to add and remove users and groups. For information
about account administration, see User Management. What follows is a brief synopsis of
account administration using Workgroup Manager. Do not use this section as your only
source of information about accounts.
Working with Users and Groups
After you log in to Workgroup Manager, the account window appears, showing a list of
user accounts. Initially, accounts listed are those stored in the last directory node of the
server’s search path. When you use other Workgroup Manager windows, such as
Preferences, click Accounts in the toolbar to return to the account window.152 Chapter 7 Management
The following is a sample user record configuration pane in Workgroup Manager:
To specify the directories that store accounts you want to work with, click the small
globe icon. To work with different accounts in different Workgroup Manager windows,
click New Window in the toolbar.
To administer the accounts listed, click the Users, Groups, or Computers, or Computer
Groups button on the left side of the window. You can filter the accounts listed by
using the pop-up search list above the accounts list. To refresh the accounts list, click
the Refresh button in the toolbar.
To simplify defining an account’s initial attributes when you create the account, use
presets. A preset is an account template.
To create a preset, select an account, set up all the values the way you want them, then
choose Save Preset from the Presets pop-up menu at the bottom of the window.
To work with only accounts that meet specific criteria, click Search in the toolbar. The
Search features include the option for batch editing selected accounts.
To import or export accounts, select the accounts, then choose Server > Import or
Server > Export, respectively.
Defining Managed Preferences
To work with managed preferences for user accounts, group accounts, or computer
lists, click the Preferences icon in the Workgroup Manager toolbar.Chapter 7 Management 153
The following is the User Preference Management Overview pane in Workgroup
Manager:
Click Details to use the preference editor to work with preference manifests. The
following is a sample of the preference editor sheet in Workgroup Manager:154 Chapter 7 Management
Working with Directory Data
To work with raw directory data, use Workgroup Manager’s Inspector.
The following is the record Inspector pane in Workgroup Manager:
To display the inspector:
1 Choose Workgroup Manager > Preferences.
2 Enable “Show “All Records” tab and inspector” and click OK.
3 Select the “All records” button (which looks like a bull’s-eye) to access the Inspector.
4 Use the pop-up menu above the Name list to select the records of interest.
For example, you can work with users, groups, computers, share points, and many
other directory objects.
Customizing the Workgroup Manager Environment
There are several ways to tailor the Workgroup Manager environment:
 You can control the way Workgroup Manager lists accounts and other behaviors by
choosing Workgroup Manager > Preferences.
 To customize the toolbar, choose View > Customize Toolbar.
 To include predefined users and groups in the user and group lists, choose View >
Show System Users and Groups.
 To open Server Admin so you can monitor and work with services on particular
servers, click the Server Admin icon in the toolbar. Chapter 7 Management 155
Working With Pre-Version 10.5 Computers From Version 10.5
Servers
Mac OS X Server v10.4 servers can be administered using v10.5 server administration
tools. Workgroup Manager on a v10.5 server can be used to manage Mac OS X clients
running Mac OS X v10.3 or later.
After you edit a user record using Workgroup Manager on v10.5, it can be accessed only
by using Workgroup Manager on v10.5.
Preferences of Mac OS 9 clients can be managed from a v10.5 server using Macintosh
Manager only when you perform an upgrade of v10.5. You can use an upgrade to
install v10.5 on a v10.3.9 or 10.2.8 server.
Service Configuration Assistants
Server Admin has configuration assistants to guide you through setting up services
that require more setup than a single configuration pane. The assistants present you
with all configuration panes necessary to fully enable a service.
Assistants are available for the following services:
 Gateway Setup: This assistant helps you set up your server as a network gateway.
Launch the assistant using a button in the lower right side of NAT service’s Overview
page.
 Mail: This assistant helps you set up both incoming and outgoing email service.
Launch the assistant using a button in the lower right side of Mail service’s Overview
page.
 RADIUS: This assistant helps you set up RADIUS authentication for Apple Airport
wireless access points. Launch the assistant using a button in the lower right side of
RADIUS service’s Overview page.
 Xgrid: This assistant helps you set up Xgrid controllers. Launch the assistant using a
button in the lower right side of Xgrid service’s Overview page.
Critical Configuration and Data Files
When backing up system settings and data, take special care to make sure all your
critical configuration files are backed up. The nature and frequency of your backups
depend on your organization’s backup, archive and restore policies. For more
information about creating a backup and restore policy, see “Defining Backup and
Restore Policies” on page 32.
The following is a list of configuration and data files for services available on Mac OS X
Server.156 Chapter 7 Management
General
iCal Service
iChat Server
Notifications
QuickTime Streaming Server
Firewall Service
File type Location
Service states /System/Library/LaunchDaemons/*
SSH configuration files and
host’s public / private keys
/etc/ssh/*
System keychain /Library/Keychains/System.keychain
File type Location
Configuration files /etc/caldavd/caldavd.plist
Data /Library/CalendarServer/Documents/
File type Location
Configuration files /etc/jabberd/*
Data mysqldump jabberd2 > jabberd2.backup.sql
File type Location
Configuration files /etc/emond.d/
/etc/emond.d/rules/
/Library/Keychains/System.keychain
File type Location
Configuration files /Library/QuickTimeStreamingServer/Config/*
/Library/QuickTimeStreamingServer/Playlists/*
/Library/Application Support/Apple/QTSS Publisher/*
Data: (default locations) /Library/QuickTimeStreamingServer/Movies/*
~user/Sites/Streaming/*
File type Location
Configuration files /etc/ipfilter/*Chapter 7 Management 157
NAT Service
Mail Services
The following are the configuration files and data stores for mail services.
Mail—SMTP Server Postfix
Mail—POP/IMAP Server Cyrus
Custom locations are defined in /etc/impad.conf using the following keys with default
values:
Mail—Amavisd
Mail—Clam AV
File type Location
Configuration files /etc/nat/*
File type Location
Configuration files /etc/postfix/
Data: (default locations) /var/spool/postfix/
File type Location
Configuration files /etc/imapd.conf
/etc/cyrus.conf
Data: (mail database default
location)
/var/imap
(mail data store) /var/spool/imap
Custom locations Key: Value pair
Mail database location configdirectory: /var/imap
Mail data store location partition-default: /var/spool/imap
Additional data store partitions
(no default value)
partition-xxx: /var/spool/mail_xxx
There can be multiple additional data store partitions
File type Location
Configuration files /etc/amavisd.conf
Data: (default locations) /var/amavis/
File type Location
Configuration files /etc/clamav.conf
/etc/freshclam.conf158 Chapter 7 Management
Mail—Mailman
Mail—SpamAssassin
MySQL Service
PHP
Web Service
Data: (default locations) /var/clamav/
/var/virusmails/
File type Location
File type Location
Configuration files /var/mailman/
Data: (default locations) /var/mailman/
File type Location
Configuration files /etc/mail/spamassassin/local.cf
Data: (default locations) /etc/mail/spamassassin/
File type Location
Configuration files There is no config file for MySQL, but the administrator can create
one, which should be backed up if present:
/etc/my.cnf
Data: (default locations) /var/mysql/
mysqldump --all-databases > all.sql
File type Location
Configuration files There is no config file for PHP, but the administrator can create one
(copying /etc/php.ini.default to /etc/php.ini and modifying it),
which should be backed up if present:
/etc/php.ini
Data: (default locations) as designated by administrator
File type Location
Configuration files /etc/httpd/* (for Apache 1.3)
/etc/apache2/* (for Apache 2.2)
/etc/webperfcache/*
/Library/Keychains/System.keychain
Data: (default locations) /Library/WebServer/Documents/Chapter 7 Management 159
The default location for web content is configurable and is most likely modified and
extended to include multiple virtual host content and WebDAV directories.
Note: Log files for web service are a critical source of revenue for some sites and should
be considered for backup. The location is configurable and can be determined using
Server Admin.
Wiki and Blog Server
Improving Service Availability
Eliminating single points of failure and using Xserve and hardware RAID are some of
the things that can boost your server availability. Other things you can do range from
simple solutions like using power backup, automatic reboot, and ensuring proper
operational conditions (for example, adequate temperature and humidity levels) to
more advanced solutions involving link aggregation, load balancing, Open Directory
replication, and data backup.
Eliminating Single Points of Failure
To improve the availability of your server, reduce or eliminate single points of failure.
A single point of failure is any component in your server environment that, if it fails,
causes your server to fail.
Some single points of failure include:
 Computer system
 Hard disk
 Power supply
/Library/Logs/WebServer/*
/Library/Logs/Migration/webconfigmigrator.log (Apache config
migration log)
File type Location
File type Location
Configuration files /etc/wikid/*
/Library/Application Support/Apple/WikiServer
(wiki themes and template files)
Data: (default locations) /Library/Collaboration/
Log files: (default location) /Library/Logs/wikid/*160 Chapter 7 Management
Although it is almost impossible to eliminate all single points of failure, you should
minimize them as much as possible. For example, using a backup system and the IP
failover in Mac OS X Server eliminates the computer as a single point of failure.
Although both the master and backup computers can fail at once or one after the
other, the possibility of such an event happening is negligible.
Another way to prevent a computer from failing is to use a backup power source and
take advantage of hardware RAID to mirror the hard disk. With hardware RAID, if the
main disk fails, the system can still access the same data on the mirror drive, as is the
case with Xserve.
Using Xserve for High Availability
Xserve is designed for extra reliability and hence, high availability.
Although you can use desktop systems like the Power Mac G5 or Mac Pro to provide
Mac OS X Server services very reliably, Xserve has the following additional features that
make it ideal for high availability situations.
 Xserve has eight fans. In the case of a single fan failure, the other fans speed up to
compensate, allowing your server to keep running.
 An independent drive architecture isolates the drives electrically, preventing a single
drive failure from causing unavailability or performance degradation of the surviving
drives—a common problem with multidrive SCSI implementations.
 Xserve uses Error Correction Code (ECC) logic to protect the system from corrupt
data and transmission errors.
Each DIMM has an extra memory module that stores checksum data for every
transaction. The system controller uses this ECC data to identify single-bit errors and
corrects them on the fly, preventing unplanned system shutdowns.
In the rare event of multiple-bit errors, the system controller detects the error and
triggers a system notification to prevent bad data from corrupting further operations.
You can set the Server Monitor software to alert you if error rates exceed the defined
threshold.
 Xserve has built-in hardware RAID mirroring, which protects your server from failing
if the main drive fails.
For more information about Xserve, visit www.apple.com/xserve/.
Using Backup Power
In the architecture of a server solution, power is a single point of failure. If power goes
out, your servers go down without warning. To prevent a sudden disruption in services,
consider adding a backup source of power.Chapter 7 Management 161
Depending on your application, you might choose to use a standby electrical generator
or Uninterruptible Power Supply (UPS) devices to gain enough time to notify users of
an impending shutdown of services.
Using UPS with Xserve
Xserve does not provide serial port connectivity to UPS, but it can monitor UPS power
through the network if the UPS unit has a management network card. For more
information, check with UPS vendors.
The following illustration is an example of an Xserve connected to a UPS via a network:
Setting Up Your Server for Automatic Reboot
You can set up Energy Saver options on your Mac OS X Server computer to
automatically restart if it goes down due to a power failure or system freeze.
The following is the Energy Saver panel of System Preferences:
Xserve
UPS device
Power
source
Backup power
connection
Local
network162 Chapter 7 Management
The automatic reboot options are:
 Restart automatically after a power failure. The power management unit
automatically starts up the server after a power failure.
 Restart automatically if the computer freezes. The power management unit
automatically starts up the server after the server stops responding, has a kernel
panic, or freezes.
When you select the option to restart after a freeze, Mac OS X Server spawns the
wdticklerd daemon, which every 30 seconds commands your computer to reboot
after 5 minutes. Each time the command is sent, the restart timer is reset. Thus, the
timer won’t reach 5 minutes as long as the server is running. If the computer does
freeze, the power management unit will restart it after 5 minutes.
To enable automatic reboot:
1 Log in to the server as an administrator.
2 Open System Preferences and click Energy Saver.
3 Click Options.
4 Under Other Options, select restart options.
5 Close System Preferences.
Ensuring Proper Operational Conditions
One factor that can cause your servers to malfunction is overheating. This is especially a
problem when you cluster computers in a small space. Other factors such as humidity
and power surges can also adversely impact your server.
To protect your servers, make sure you house them in a place where you can control
these factors and provide ideal operating conditions. Check the electrical and
environmental requirements for your systems to find what these conditions are.
In addition, make sure the facility you deploy your server has a fire alarm, and prepare a
contingency plan to deal with this risk.
Providing Open Directory Replication
If you plan to provide Open Directory services, consider creating replicas of your Open
Directory master. If the master server fails, client computers can access the replica.
For more information, see the section on setting up Open Directory replicas in Open
Directory Administration.Chapter 7 Management 163
Link Aggregation
Although not common, the failure of a switch, cable, or network interface card can
cause your server to become unavailable. To eliminate these single points of failure, you
can use link aggregation or trunking. This technology, also known as IEEE 802.3ad, is
built into Mac OS X and Mac OS X Server.
Link aggregation allows you to aggregate or combine multiple physical links
connecting your Mac to a link aggregation device (a switch or another Mac) into a
single logical link. The result is a fault-tolerant link with a bandwidth equal to the sum
of the bandwidths of the physical links.
For example, you can set up an Xserve with four 1-Gbit/s ports (en1, en2, en3, and en4)
and use the Network pane of System Preferences to create a link aggregate port
configuration (bond0) that combines en1, en2, en3, and en4 into one logical link.
The resulting logical link will have a bandwidth of 4 Gbit/s. This link will also provide
fault tolerance. If one or more physical links fail, your Xserve’s bandwidth will shrink,
but the Xserve can still service requests as long as not all physical links fail at once.
The following illustration shows four Ethernet ports aggregated as a single interface:
Link aggregation also allows you to take advantage of existing or inexpensive hardware
to increase the bandwidth of your server. For example, you can form a link aggregate
from a combination of multiple 100-Mbit/s links or 1-Gbit/s links.
server1.example.com
400 Mbit/s
4 x 100 Mbit/s
bond0
en1 en2 en3 en4
Switch164 Chapter 7 Management
The Link Aggregation Control Protocol (LACP)
IEEE 802.3ad Link Aggregation defines a protocol called Link Aggregation Control
Protocol (LACP) that is used by Mac OS X Server to aggregate (combine) multiple ports
into a link aggregate (a virtual port) that can be used for TCP and UDP connections.
When your define a link aggregate, the nodes on each side of the aggregate (for
example, a computer and a switch) use LACP over each physical link to:
 Determine whether the link can be aggregated
 Maintain and monitor the aggregation
If a node doesn’t receive LACP packets from its peer (the other node in the aggregate)
regularly, it assumes that the peer is no longer active and removes the port from the
aggregate.
In addition to LACP, Mac OS X Server uses a frame distribution algorithm to map a
conversation to a particular port. This algorithm sends packets to the system on the
other end of the aggregate only if it has packet reception enabled. In other words, the
algorithm won’t send packets if the other system isn’t listening.
Mapping a conversation to a particular port guarantees that packet reordering will not
occur.
Link Aggregation Scenarios
Following are three common aggregation scenarios that you can set up:
 Computer-to-computer
 Computer-to-switch
 Computer-to-switch-pair
These scenarios are described in the following sections.
Computer-to-Computer
In this scenario, you connect the two servers directly (as shown in the following
illustration) using the physical links of the link aggregate.
This allows the two servers to communicate at a higher speed without the need for a
switch. This configuration is ideal for ensuring back-end redundancy.
4 x 100 Mbit/sChapter 7 Management 165
Computer-to-Switch
In this scenario shown in the following illustration, you connect your server to a switch
configured for 802.3ad link aggregation.
The switch should have a bandwidth for handling incoming traffic equal to or greater
than that of the link aggregate (logical link) you define on your server.
For example, if you create an aggregate of four 1-Gbit/s links, you should use a switch
that can handle incoming traffic (from clients) at 4 Gbit/s or more. Otherwise, the
increased bandwidth advantage in the link aggregate won’t be fully realized.
Note: For information about how to configure your switch for 802.3ad link aggregation,
see the documentation provided by the switch manufacturer.
Computer-to-Switch-Pair
In this scenario shown in the following illustration, you improve on the computer-toswitch scenario by using two switches to eliminate the switch as a single point to
failure:
server1.example.com
Clients
4 x 1 Gbit/s
10 Gbit/s
server1.example.com
3 x 1 Gbit/s 2 x 1 Gbit/s166 Chapter 7 Management
For example, you can connect two links of the link aggregate to the master switch and
the remaining links to the backup switch. As long as the master switch is active, the
backup switch remains inactive. If the master switch fails, the backup switch takes over
transparently to the user.
Although this scenario adds redundancy that protects the server from becoming
unavailable if the switch fails, it results in decreased bandwidth.
Setting Up Link Aggregation in Mac OS X Server
To set up your Mac OS X Server for link aggregation, you need a Mac with two or more
IEEE 802.3ad-compliant Ethernet ports. In addition, you need at least one IEEE 802.3adcompliant switch or another Mac OS X Server computer with the same number of
ports.
You create a link aggregate on your computer in the Network pane of System
Preferences (as shown in the following example):
To create a link aggregate:
1 Log in to the server as an administrative user.
2 Open System Preferences.
3 Click Network.
4 Click the Gear button and choose Manage Virtual Interfaces in the pop-up menu.
5 Click the Add (+) button, and select New Link Aggregate in the pop-up menu.
Note: You’ll only see this option if you have two or more Ethernet interfaces on your
system.
6 Enter the name of the link aggregate in the Name field.Chapter 7 Management 167
7 Select the ports to aggregate from the list.
8 Click Create.
9 Click Done.
By default the system gives the link aggregate the interface name bond, where
is a number indicating precedence. For example, the first link aggregate is
named bond0, the second bond1, and the third bond2.
The interface name bond assigned by the system is different from the name
you give to the link aggregate port configuration. The interface name is for use in the
command-line, but the port configuration name is for use in the Network pane of
System Preferences.
For example, if you enter the command ifconfig -a, the output refers to the link
aggregate using the interface name and not the port configuration name:
…
bond0: flags=8843 mtu 1500
inet6 fe80::2e0:edff:fe08:3ea6 prefixlen 64 scopeid 0xc
inet 10.0.0.12 netmask 0xffffff00 broadcast 10.0.0.255
ether 00:e0:ed:08:3e:a6
media: autoselect (100baseTX ) status: active
supported media: autoselect
bond interfaces: en1 en2 en3 en4
You do not delete or remove a link bond from the Network Pane of System Preferences.
You remove the bond through the Manage Viritual Interfaces sheet used to create the
bond.
Monitoring Link Aggregation Status
You can monitor the status of a link aggregate in Mac OS X and Mac OS X Server using
the Status pane of the Network pane of System Preferences.
To monitor the status of a link aggregate:
1 Open System Preferences.
2 Click Network.
3 From the list of network interfaces on the left, choose the link aggregate port virtual
interface.
4 Click Advanced in the lower right side of thre window.
5 Select the Bond Status tab.
The Status pane displays a list containing a row for each physical link in the link
aggregate. For each link, you can view the name of the network interface, its speed, its
duplex setting, the status indicators for incoming and outgoing traffic, and an overall
assessment of the status.168 Chapter 7 Management
Note: The Sending and Receiving status indicators are color-coded. Green means the
link is active (turned on) and connected. Yellow means the link is active but not
connected. Red means the link can’t send or receive traffic.
6 To view more information about a link, click the corresponding entry in the list.
Load Balancing
One factor that can cause services to become unavailable is server overload. A server
has limited resources and can service a limited number of requests simultaneously.
If the server gets overloaded, it slows down and can eventually crash.
One way to overcome this problem is to distribute the load among a group of servers
(a server farm) using a third-party load-balancing device. Clients send requests to the
device, which then forwards the request to the first available server based on a
predefined algorithm. The clients see only a single virtual address, that of the loadbalancing device.
Many load-balancing devices also function as switches (as shown in the following
illustration), providing two functions in one, which reduces the amount of hardware
you need to use.
Note: A load-balancing device must be able to handle the aggregate (combined) traffic
of the servers connected to it. Otherwise, the device becomes a bottleneck, which
reduces the availability of your servers.
Server farm
Clients
Server loadbalancing switchChapter 7 Management 169
Load balancing provides several advantages:
 High availability. Distributing the load among multiple servers helps you reduce the
chances that a server will fail due to server overload.
 Fault tolerance. If a server fails, traffic is transparently redirected to other servers.
There might be a brief disruption of service if, for example, a server fails while a user
is downloading a file from shared storage, but the user can reconnect and restart the
file download process.
 Scalability. If demand for your services increases, you can transparently add more
servers to your farm to keep up with the demand.
 Better performance. By sending requests to the least-busy servers, you can respond
faster to user requests.
Daemon Overview
By the time a user logs in to a Mac OS X system, a number of processes are already
running. Many of these processes are known as daemons. A daemon is a background
process that provides a service to users of the system. For example, the cupsd daemon
coordinates printing requests, and the httpd daemon responds to requests for web
pages.
Viewing Running Daemons
If you want to see the daemons running on your system, use the Activity Monitor
application (in /Applications/Utilities/). This application lets you view information about
all processes, including their resource usage.
You will see the following daemons, regardless of what services are enabled:
 launchd (timed job and watchdog process)
 servermgrd (administration tool interface process)
 serialnumberd (license compliance process)
 mDNSresponder (local network service discovery process)
Daemon Control
Although some UNIX-like systems use other tools, Mac OS X Server uses a daemon
called launchd to control process initialization and timed jobs.
launchd
The launchd daemon is an alternative to the following common UNIX tools: init, rc, the
init.d and rc.d scripts, SystemStarter, inetd and xinetd, atd, crond and watchdogd. All of
these services should be considered deprecated and administrators are strongly
encouraged to move process management duties to launchd.
There are two utilities in the launchd system: launchd daemon and launchctl utility.170 Chapter 7 Management
The launchd daemon also has replaced init as the first process spawned in Mac OS X
and is therefore responsible for starting the system at startup. The launchd daemon
manages the daemons at both a system and user level. It can:
 Start daemons on demand
 Monitor daemons to make sure they keep running
Configuration files are used by launchd to define the parameters of services and
daemons run. The configuration files are property list files stored in the LaunchAgents
and LaunchDaemons subdirectories of the Library folders.
For more information about creating the launchd configuration files, see the following
Developer Documentation page:
developer.apple.com/documentation/MacOSX/Conceptual/BPSystemStartup/Articles/
LaunchOnDemandDaemons.html
The launchctl utility is the command-line tool used to:
 Load and unload daemons
 Start and stop launchd controlled jobs
 Get system utilization statistics for launchd and its child processes
 Set environment settings8
171
8 Monitoring
Effective monitoring allows you to detect potential
problems before they occur and gives you early warning
when they occur.
Detecting potential problems allows you to take steps to resolve them before they
impact the availability of your servers. In addition, getting early warning when a
problem occurs allows you to take corrective action quickly and minimize disruption to
your services.
This chapter briefly describes planning a monitoring policy, how to use monitoring
tools, and how to find more information.
Planning a Monitoring Policy
Gathering data about your systems is a basic function of good administration. Different
types of data gathering are used for different purposes.
 Historical data collection: Historical data is gathered for analysis. This could be used
for IT planning, budgeting, and getting a baseline for normal server conditions and
operations. What kinds of data do you need for these purposes? How long does it
need to be kept? How often does it need to be updated? How far in the past does it
need to be collected?
 Real-time monitoring: Real-time monitoring is for alerts and detecting problems as
they happen. What are you monitoring? How often? Does that data tell you what you
need to know? Are some of these real-time collections actually for historical
purposes?172 Chapter 8 Monitoring
Planning Monitoring Response
The response to your monitoring is as important as the data collection. In the same
way a backup policy is pointless without a restore strategy, a monitoring policy makes
little sense without a response policy.
Several factors can be considered for a monitoring response:
 What are appropriate response methods? In other words, how will the response take
place?
 What is the time to response? What is an acceptable interval between failure and
response?
 What are the scaling considerations? Can the response plan work with all expected
(and even unexpected) frequencies of failure?
 Are there testing monitoring systems in place? How do you know the monitoring
policy is catching the data you need, and how do you know the responses are timely
and appropriate? Have you tested the monitoring system recently?
Server Status Widget
The Server Status Dashboard widget is provided for quick access and information
about a single system. The Server Status widget lets you monitor Mac OS X Server v10.5
activity from any computer with Leopard or Leopard Server. Server Status shows you
graphs of processor activity, network load, disk usage, polled hourly, daily, or weekly.
You can also see up to six running services and their status reports. By clicking on the
service, you can open Server Admin to the appropriate service overview panel.
To configure the Server Status widget:
1 Add the widget to the Dashboard like any other widget.
2 Enter the server IP address or domain name.
3 Supply an administrative or monitoring login name and password.
4 Click Done.
To change the server address, login name, or password, click the information button (i)
at the top of the widget and change the settings.
Server Monitor
The Server Monitor application can issue alerts via mail, cell phone, or pager
notification as soon as it detects critical problems. Built-in sensors detect and report
essential operating factors like power, temperature, and the condition of several key
components. Chapter 8 Monitoring 173
The Server Monitor interface allows you to quickly detect problems. In the main
window, Server Monitor lists each server on a separate line, with temperature
information and the status of each of its components, including fans, disk drives,
memory modules, power supplies, and Ethernet connections.
A green status indicator shows the component is OK, a yellow status indicator notes a
warning, and a red status indicator notes an error.
Server Monitor works for Xserves only. For more information about Server Monitor,
choose Server Monitor Help from Server Monitor’s Help menu.
RAID Admin
Like Server Monitor, you can configure RAID Admin to send an email or page when a
component is in trouble. For every unit, RAID Admin displays the status of the unit and
each of its components, including disk drives, fibre channel, and network connections.
RAID Admin uses green, yellow, or red status indicators. You can also configure it to
send you an email or page when a component is in trouble.
In addition, RAID Admin provides you with an overview of the status of the Xserve
RAID units that appear in the main window.
For more information about RAID Admin, choose RAID Admin Help from RAID Admin’s
Help menu.
Console
Use Console to monitor relevant log files for potential problems that might cause your
server to fail.
For example, you can monitor your web server’s /var/log/httpd/access_log file for signs
of denial of service attacks. If you detect these signs, you can immediately implement a
planned response to prevent your web server from becoming unavailable.
To improve your log monitoring efficiency, consider automating the monitoring
process using AppleScript or Terminal commands like grep and cron. For more
information about using grep and cron, see Command-Line Administration
Disk Monitoring Tools
Running out of disk space can cause your server to become unreliable and probably
fail. To prevent this from happening, you must constantly monitor disk space usage on
your servers and delete or back up files to clear disk space.174 Chapter 8 Monitoring
Mac OS X Server ships with a number of command-line tools that you can use to
monitor disk space on your computer:
 df. This command tells you how much space is used and how much is available on
every mounted volume.
For example, the following command lists local volumes and displays disk usage:
df -Hl
Filesystem Size Used Avail Capacity Mounted on
/dev/disk0s9 40G 38G 2.1G 95% /
In this example, the hard disk is almost full with only 2.1 GB left. This tells you that
you should act immediately to free space on your hard disk before it fills up and
causes problems for your users.
 du. This command tells you how much space is used by specific folders or files.
For example, the following command tells you how much space is used by each
user’s home folder:
sudo du -sh /Users/*
3.2M /Users/Shared
9.3M /Users/omar
8.8M /Users/jay
1.6M /Users/lili
…
Knowing who’s using most of the space on the hard disk lets you contact users and
have them delete unused files.
Note: With Workgroup Manager, you can set disk quotas for users and generate disk
usage reports. For more information, see User Management.
 diskspacemonitor. This command lets you automate the process of monitoring disk
space usage. When the amount of free disk space drops below the level you specify,
diskspacemonitor executes shell scripts that send you a notification. This command
defines two action levels:
 Alert—Sends you a warning message when disk space usage reaches 75%.
 Recover—Archives rarely used files and deletes unneeded files when disk space
usage reaches 85%.
For more information about these commands, see the corresponding man page or
Command-Line Administration.
Network Monitoring Tools
Degradation in network performance or other network problems can adversely affect
the availability of your services. The following network monitoring tools can alert you
to possible problems early, so you can take corrective action to avoid or minimize
down time.Chapter 8 Monitoring 175
 To monitor network activity, use the tcpdump utility in Mac OS X Server. This utility
prints out the headers of incoming and outgoing packets on a network interface that
match the specified parameters.
Using tcpdump to monitor network traffic is especially useful when trying to detect
denial of service attacks. For example, the following command monitors all incoming
traffic on port 80 on your computer:
sudo tcpdump -i en0 dst port 80
If you detect an unusual number of requests coming from the same source, you can
use the firewall service to block traffic from that source.
For more information about tcpdump, see the corresponding man page or CommandLine Administration.
 Consider using Ruby, Perl, shell scripts, or AppleScripts to automate the monitoring
process. For example, using tcpdump to monitor traffic can be time-consuming, so
automation is necessary.
 Consider using Ethereal, an X11 open source packet sniffing tool that you can run in
the X11 environment on Mac OS X Server. This tool, unlike tcpdump, has a graphical
user interface and a set of powerful network analysis tools.
For more information about Ethereal, visit www.ethereal.com/.
 You can use other third-party tools that automatically analyze network traffic and
alert you to problems.
Notification in Server Admin
Server Admin has an easy to use notification system that can keep you informed of
your server’s hard disk or software status. Server Admin will send an email to any
address (local or not) when:
 There is less than a certain percentage of free space left on any system hard disk.
 There are Software Update packages are available from Apple.
To use the email functionality, the server will start the SMTP (outgoing mail) process on
the server. Make sure the firewall allows SMTP traffic from the server.
To set a notification:
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the Notifications
tab.
3 Click the Add (+) button below the “Addresses to notify” field and add an address.
4 Repeat as needed, then click Save.176 Chapter 8 Monitoring
Monitoring Server Status Overviews Using Server Admin
Server Admin has several ways to see a status overview, from detailed information for a
single server to a simplified overview for many servers at once.
To see a status overview for one server:
m Select a server in the Server list.
The following shows a sample Overview pane for a single server.
This overview shows basic hardware, operating system versions, active services, and
graphs of CPU history, network throughput history, and disk space.
To see status overview of many servers at once:
m Select a server group, smartgroup, All Servers group, or Available Servers group.Chapter 8 Monitoring 177
The following shows a sample Overview pane for a group of servers.
This overview shows the:
 Hostname
 OS version
 Current CPU usage graph (a mouseover reveals more specific numbers)
 Current network throughput
 Disk space used (a mouseover reveals more specific numbers)
 Uptime
 Number of connected file services users
You can sort the list by column.
Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP) is a common protocol for monitoring
the status of network equipment (for example, routers and smart switches), computers,
and other networkable devices like Uninterruptable Power Supplies. Mac OS X Server
uses Net-SNMP to implement SNMP v1, SNMP v2c, and SNMP v3 using both IPv4 and
IPv6.
SNMPv2 is the default access protocol and the default read-only community string
is “public.”178 Chapter 8 Monitoring
Enabling SNMP reporting
SNMP access isn’t enabled by default on Mac OS X Server. To use SNMP tools to poll
your Mac OS X Server for data you must configure and then enable the service.
To enable SNMP
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the General tab.
3 Select Network Management Server (SNMP).
4 Click Save.
When SNMP is active, anyone with a route to the SNMP host can collect SNMP data
from it.
5 Configure the basic SNMP parameters from the command-line.
The SNMP process will not start unless /etc/snmpd.conf has been configured for the
current site. To configure, see “Configuring snmpd” on page 178.
Note: The default configuration of snmpd uses privileged port 161. For this reason and
others, it must be executed by root or using setuid. You should only use setuid as root
if you understand the ramifications. If you do not, seek assistance or additional
information. Flags available for snmpd will change the uid and gid of the process after
it starts. For more information, see the snmpd man page.
Configuring snmpd
The configuration (.conf) file for snmpd is typically at /etc/snmpd.conf. If you have an
environment variable SNMPCONF, snmpd will read any files named snmpd.conf and
snmpd.local.conf in these directories. The snmpd process can be started with a -c flag
to indicate other conf files. For more information about which conf files can be used,
see the snmpd man page.
Configuration files can be created and installed more elegantly using the included
script /usr/bin/snmpconf. As root, use this script with the -i flag to install the file at
/usr/share/snmp/. Otherwise the default location for the file to be written is the user’s
home folder (~/). Only root has write permission for /usr/share/snmp/.
Because snmpd reads its configuration files at startup, changes to configuration files
require that the process be stopped and restarted. You can stop snmpd with
ProcessViewer or at the command-line (kill -HUP ).
To enable and configure SNMP:
m Use the /usr/bin/snmpconf command, which takes you through a basic text-based
setup assistant for configuring the community name and saves the info in the
configuration file.
The snmp config file is located in /usr/share/snmp/snmpd.conf.Chapter 8 Monitoring 179
SNMP Configuration Example
Step 1: Customize data
1 To customize the data provided by snmpd, add an snmpd.conf file using /usr/bin/
snmpconf as root or using sudo, by executing this command:
/usr/bin/snmpconf -i
If there are existing configuration files, you can reading them into the asistant and
incorporate their contents with the output of the assistant.
2 Choose to read in the file by indicating the file at /etc/snmp/snmpd.conf.
You will then see a series of text menus.
3 Make these choices in this order:
a Select File: 1 (snmpd.conf)
b Select section: 5 (System Information Setup)
c Select section: 1 (The [typically physical] location of the system.)
d The location of the system: type text string here — such as “server_room”
e Select section: f (finish)
f Select section: f (finish)
g Select File: q (quit)
You have created an snmpd.conf file with a creation date of today.
Verify its creation by entering ls -l /usr/share/snmpd.conf.
Step 2: Restart snmpd to take changes
1 Open Server Admin.
2 Select a server, click the Settings button in the toolbar, and then click the General tab.
3 Deselect Network Management Server (SNMP).
4 Click Save.
You can also do this via the command-line by killing and restarting the smnpd process
as root:
/usr/sbin/snmpd180 Chapter 8 Monitoring
Step 3: Collect SNMP information from the host
m To get the SNMP-available information you just added, execute this command from a
host that has SNMP tools installed:
/usr/bin/snmpget -c public system.sysLocation.0
Replace “” with the actual name of the target host.
You should see location you provided. In this example, you would see:
SNMPv2_MIB::system.sysLocation.0 = STRING:\”server_room\”
The other options in the menu you were working in are:
/usr/bin/snmpget -c public system.sysContact.0
/usr/bin/snmpget -c public system.sysServices.0
The final .0 indicates you are looking for the index object. The word public is the name
of the snmp community that you did not alter.
If you need information about either of these or if you need explanations of snmp
syntax, tutorials are available at net-snmp.sourceforge.net.
Tools to Use with SNMP
Other than snmpget, there are other snmp based tools installed, and third-party suites
(both free and commercial) are available with varying complexity and reporting.
Additional Information
Additional information about SNMP can be had from the following sources.
Man pages
Entering man -k snmp in the Terminal will provide a list of the known man pages.
Web sites
The Net SNMP-Project:
 www.net-snmp.org
 net-snmp.sourceforge.net
Books
Essential SNMP by Douglas Mauro, Kevin Schmidt
Publisher: O’Reilly (Second Edition Sept 2005)
ISBN: 0-596-00840-6, 460 pages
Notification and Event Monitoring Daemons
To monitor and log system events, the operating system runs several daemons that
intercept application messages and log them or act on them. Chapter 8 Monitoring 181
There are two main notification daemons: syslogd and emond.
 syslogd: The syslogd daemon is a standard UNIX method of monitoring systems. It
logs messages in accordance with the settings found in /etc/syslog.conf. You can
examine the output files specified in that configuration by using a file printing or
editing utility because they are plain text files. Administrators can edit these settings
to fine-tune what is being monitored.
Many administrators will tail or scrape the log file, meaning they will have scripts
parse the log files and perform some action if a designated bit of information is
present in the log. These home-grown notifications vary in quality and usefulness
and are tailored to the script-writer’s specific needs.
The syslogd deamon can be configured to send and recieve log file information to or
from a remote server (by editing the /System/Library/LaunchDaemons/
com.apple.syslogd.plist). This is not recommended because syslogd does not use
secure means to send log messages across the net.
 emond: The daemon emond is the event monitoring system for Mac OS X Server
v10.5. It is a unified process that handles events passed from other processes, acts on
the events as designiated in defined rule set, and then notifies the administrator.
Currently, emond is the engine used for Server Admin’s email notification system. It is
not used for Server Monitor’s notifications.
The high-level service receives events from the registered client, analyzes whether
the event requires handing based on rules provided by the service at the time it
registered and, if handling is required, the action related to that event is performed.
To accomplish this the daemon emond has three main parts: the rules engine, the
events it can respond to, and the actions it can take.
The emond rules engine works in the following manner. It:
 Reads the config info from /etc/emond.d/emond.conf.
 Reads in the rules from plist files in the /etc/emond.d/rules/ directory.
 Processes the startup event.
 Accepts events until terminated.
 Processes the rules associated with the event, triggering as needed.
 Performs actions specified by the rules that were triggered.
 Runs as the least privileged possible (nobody).
WARNING: The file formats and settings in emond.conf and rules plists are not
documented for customer use. Tampering could result in an unusable notification
system and is unsupported.182 Chapter 8 Monitoring
Logging
Mac OS X Server maintains standard UNIX log files and Apple-specific process logs.
Logs for the OS can be found in:
 /var/log
 /Library/Logs
 ~/Library/Logs
Each process is responsible for its own logs, the log level, and verbosity. Each process or
application can write its own log file or use a system standard log, like syslog. You can
use the Console application (in /Applications/Utilities) to read these and other plaintext log files regardless of location.
Most services in Mac OS X Server have a logging pane in Server Admin. You can use
these panes to set logging levels and view the logs for any particular service.
Syslog
The system log, syslog, is a consolidated catch-all location for process log messages.
syslog has serveral levels of available log detail. If low detail logging is selected,
detailed messages are not saved, but high detail logging results in large and possibly
unhelpfully large log files.
The level of logging you use for syslog can be tuned by process and should be
appropriate to the level necessary for successful notification and debugging.
Syslog log levels (in ascending order from least to most detail)
Syslog Configuration File
The configuration file can be found at /etc/syslog.conf. Each line has the following
format:
.
Level name Level indicator in syslog.conf Amount of detail
None .none None
Emergency .emerg Least
Alert .alert
Error .err
Warning .warn
Notice .notice
Info .info
Debug .debug MostChapter 8 Monitoring 183
Facility is the process name writing to the log, and the path is the standard POSIX path
to the log file. Asterisks (*) can be used as wildcards. For example, the setting for the
kernel is:
kern.* /var/log/system.log
This shows that all messages to the log of all levels from the kernel are to be written in
the file /var/log/system.log.
Likewise, the following setting is an example of all emergency messages from all
processes being sent to a custom emergencies log file:
*.emerg /var/log/emergencies.log
Directory Service Debug Logging
If you are using Open Directory and you want debugging information from Directory
Services processes, you must use a different logging method than systemlog. You must
enable debug logging on the process manually. When enabled, this debug logging
writes messages to the log file at:
/Library/Logs/DirectoryService/DirectoryService.debug.log
The following commands must be performed with superuser permissions (sudo or
root):
To manually turn on/off debug logging for Directory Services:
killall -USR1 DirectoryService
To start debugging at startup:
touch /Library/Preferences/DirectoryService/.DSLogAPIAtStart
Note: The debug log is not self-documented and is not intended for normal logging. It
is very verbose and very opaque. It shows API calls, plugin queries, and responses.
Open Directory Logging
The configuration file can be found at /etc/openldap and the logs are found in
/var/log/slapd.log. Each directory transaction generates a separate transaction log in
the OpenLDAP databse. The database and transaction logs can be found at
/var/db/openldap/openldap-data.
The slapd process, which governs Open Directory usage, has an additional parameter
for extra logging. The following command enables the additional logging:
slapconfig -enablesslapdlog184 Chapter 8 Monitoring
To run slapd in debugging mode:
1 Stop and remove slapd from launchd’s watch list:
launchctl unload /System/Library/LaunchDaemons/org.openldap.plist
2 Restart slapd in debug mode:
sudo /usr/libexec/slapd -d 99
AFP Logging
The server side of Apple File Service Protocol (AFP) keeps track of access and errors, but
it does not have much debugging information. However, you can add client-side
logging to AFP clients to help monitor and troubleshoot AFP connections.
To enable client-side logging:
Perform all these actions on the AFP client computer.
1 Set the client debug level (levels 0-8):
defaults write com.apple.AppleShareClientCore -dict-add afp_debug_level 4
2 Set the client log message recipient (in this case, syslog):
defaults write com.apple.AppleShareClientCore -dict-add afp_debug_syslog 1
3 Enable syslog to catch the debugging messages from the client:
You do this by adding *.debug /var/log/debug.log to the syslogd.conf file.
4 Restart the syslog process.
Additional Monitoring Aids
You can use additional aids for monitoring Mac OS X Server. There are a number of
third-party server monitoring packages, as well as an additional Apple monitoring tool.
The inclusion of third-party tools in the following list does not constitute an
endorsement of or support for these products. They are listed for informational
purposes only.
 Apple Remote Desktop: This software package contains many features that allow
you to to interact with, get reports on, and track computers running Mac OS X and
Mac OS X Server. It has several powerful administration features and excellent
reporting capabilities.
 Nagios (third-party): This tool is an open source computer system and network
monitoring application.
 Growl (third-party): This tool is a centralized, extensible notification service that
supports local and remote notification.9
185
9 Sample Setup
The setup example in this chapter illustrates one way to set up the directory and
network infrastructure of Mac OS X Server in a small business scenario.
A Single Mac OS X Server in a Small Business
In this example, Mac OS X Server provides directory, network, and productivity services
to employees in a small business:
The small business has been using an office LAN to share files and a printer. Acquiring
Mac OS X Server made it possible to implement an intranet that uses an ISP’s DNS and
digital subscriber line (DSL) services.
Mac OS X Server
(example.com)
DSL
The Internet
Shared
printer
Windows clients Mac OS X clients
Switch
ISP’s DNS
server
Mac OS X
client
192.168.0.1
VPN 186 Chapter 9 Sample Setup
Here’s a summary of the scenario’s characteristics:
 An Open Directory master LDAP directory on the server centralizes user
management, including authentication of Mac OS X and Windows users.
 The ISP’s DNS service provides a DNS domain name for the company (example.com).
 A DNS server running on Mac OS X Server provides name services for the server, the
printer, and any other intranet device that has a static IP address.
 A firewall between the server and the Internet protects the intranet from
unauthorized access.
 NAT service lets intranet users share the ISP’s IP address for Internet access, while VPN
lets employees access the intranet securely over the Internet when employees work
away from the office.
 DHCP service on Mac OS X Server provides dynamic IP addresses to intranet client
computers. The server and printer have static addresses, but client computers have
dynamic addresses.
How to Set Up the Server
The following steps summarize how to set up Mac OS X Server in this hypothetical
small business. For complete information about setting up directory services, see
Open Directory Administration. For details about network service setup (IP firewall,
DHCP, and so forth), see Network Services Administration.
Step 1: Set up the network
1 Make sure the server has two Ethernet interfaces (ports): one for the intranet (LAN)
connection and one for the DSL modem connection.
Use the faster interface for the server connection. A 10-Mbit connection is more than
sufficient for the DSL connection.
2 Connect the server to the LAN using the faster interface.
In this example, the server is plugged in to a switch used to connect client computers
and shared printer. We’ll refer to this interface as the internal interface.
Intranet devices should be connected to a hub or switch using good-quality CAT-5
Ethernet cables. A high-speed 10/100/1000 megabit switch can support advanced
server features such as NetBoot that work best over a fast connection.
3 Connect the server to the DSL modem using the other Ethernet interface.
We’ll refer to this interface as the external interface.Chapter 9 Sample Setup 187
Step 2: Contact the ISP to set up external DNS
The ISP’s Name Servers should be serving the company zone example.com containing
all public IPs of all servers and services available to the Internet (for example, the
company web server and the VPN gateway).
This means that the zone handled by the ISP contains only the public IP addresses and
the ISP’s name server provides the necessary redundancy. The ISP should also provide
Forward and Reverse DNS lookup for the zone’s domain for any external IP Address
being used.
Step 3: Set up an administration computer
1 Install the server administration tools from the Server Tools DVD.
Choose a computer running Mac OS X Leopard to install the tools on. Make sure the
network communication between the administrator computer and the target server is
functioning. For more instructions, see “Preparing an Administrator Computer” on
page 80.
2 Fill out the Mac OS X Server Advanced Worksheet in the appendix on page 195.
You’ll need the information as you move through the Assistant’s panes.
Step 4: Set up the server and the master directory
1 Start the server from the Install DVD.
The procedure you use depends on the server hardware.
In this example, assume the computer has a keyboard and a DVD drive. Turn on the
computer, insert the Install DVD into the optical drive, and restart the computer while
holding down the C key on the keyboard.
Chapter 5, “Installation and Deployment,” on page 77 has instructions for other
installation methods, such as installing on a server without an optical drive and
installing from a NetInstall environment.
2 Start up Setup Assistant on the administrator computer.
3 When the Setup Assistant opens, choose “Install Mac OS X Server on a remote
computer.”
WARNING: This example assumes that the ISP is providing Forward and Reverse DNS
resolution for the public IP address and machine name of the server. If this is not the
case (for example, if your ISP’s setup is not done yet or you plan to run your own
name server on the server itself), choose Standalone Server in Step 4 and promote it
to an Open Directory Master or Replica only after there is a working DNS setup.188 Chapter 9 Sample Setup
4 Proceed by following the onscreen instructions.
If you need to format the target disk, see “Preparing Disks for Installing Mac OS X
Server” on page 89 for instructions on preparing disks for installing Mac OS X Server.
When installation is complete, the server restarts.
5 After restarting, use Server Assistant again and choose “Set up a remote computer.”
6 Use the Language and Keyboard panes to reflect the server’s administration language.
7 In the Administrator Account pane, enter the server administrator’s names and
password, and then click Continue.
8 In the Network Names pane, if you don’t see the newly installed server, click the Add
(+) button, enter the IP address, and enter the default administrator name and
password, and click Continue.
For more information, see “Connecting to the Network During Initial Server Setup” on
page 106.
9 Proceed by following the onscreen instructions.
10 Make sure the Network Interfaces pane lists external and internal Ethernet interfaces.
11 Make sure the external interface is the first one listed in the Network Interfaces pane.
The first interface listed is the primary, or default, interface. Network traffic initiated by
the server is routed through the primary interface. VPN uses it as the Public network,
treating all others listed as Private.
12 Click Continue.
The TCP/IP Connection pane appears for each Ethernet interface.
13 For the external interface, choose Manually from the Configure IPv4 pop-up list, then
enter the IP address, subnet mask, and DNS server IP address or addresses provided to
you by the ISP.
With a dual interface setup like the one in this example, all DNS requests are routed to
the primary interface. So when running DNS on your server, enter the gateway’s public
IP in the Name Servers field as well. In a manual configuration, make it appear first in
the list so it is consulted before your ISP’s servers, then click Continue.
14 If you’ll be using Gateway Setup Assistant (from the NAT service section of Server
Admin) to configure network settings, you don’t need to set up an internal interface.
Otherwise, enter these values for the internal interface then click Continue:
 Configure IPv4: Manually
 IP Address: 192.168.0.1 (192.168 values are reserved for internal LANs)
 Subnet Mask: 255.255.0.0
 Router: 192.168.0.1
 DNS servers: 192.168.0.1Chapter 9 Sample Setup 189
15 In the Directory Usage Pane, choose Open Directory Master to set up a shared LDAP
directory on the server; then Select Enable Windows Primary Domain Controller and
enter a Domain/Workgroup name.
These settings will set up a Windows PDC so that employees who use Windows NT,
Windows 2000, and Windows XP workstations can log in to the PDC, change passwords
during login, and have roaming user profiles and network home folders on the server.
With one user account, a user can log in from a Windows workstation or a Mac OS X
computer and access the same network home folder.
16 Click Continue.
17 Proceed through the remaining Assistant panes, then click Apply to initiate server
setup.
When setup is complete, the server restarts.
18 Log in to the server as the administrator you defined when using Server Assistant.
19 Configure the server’s network settings.
The simplest way to do this is to use the Gateway Setup Assistant, as Step 4 describes.
Alternatively, you can individually configure each network service using Server Admin,
as Steps 5 through 8 describe.
Step 5: Use Gateway Setup Assistant to automate the server’s network
configuration
1 Open Server Admin on the administrator computer.
2 If you have not already done so, connect and authenticate to the server as the
administrator you defined when using Server Assistant.
3 Select the server and add the services you are going to use.
For this step, select NAT service and Firewall service.
4 In the Overview pane of the server you’re setting up, click on the NAT service.
5 Open Gateway Setup Assistant by clicking the button on the NAT overview pane.
6 Proceed through the panes, specifying information when prompted.
On the WAN Port pane, select the port you configured during initial setup as the
external interface.
On the VPN settings pane, enable VPN and specify a shared secret for client
connections to use.
On the LAN Ports pane, select the port you want to use as the internal interface.
7 When Gateway Setup Assistant has completed network setup and you’ve quit the
application, go to Step 9.190 Chapter 9 Sample Setup
Step 6: Set up the firewall
1 Open Server Admin on the administrator computer.
2 If you have not already done so, connect and authenticate to the server as the
administrator you defined when using Server Assistant.
3 In the service list, click Firewall.
4 Click Start Firewall in the bottom action bar.
5 Click Settings and select Services.
6 Choose Edit Services for the address group named “192.168-net.”
7 Select “Allow” for services you want employees working at the office to be able to
access.
At a minimum, select Domain Name Service, DHCP, and NetBoot.
8 Choose to Edit Services for the address group named “any.”
9 Click Services and select Allow for services you want external clients to be able to
access behind the firewall. At a minimum, select L2TP VPN, IKE, and DHCP.
10 Click Save.
Step 7: Set up DNS service
The DNS of Leopard Server handles zone information (for example, all fully qualified
host names for the local site like “site1.example.com”), mapping this private zone to
private, local IPs. This avoids the need to add public servers to the local DNS.
Additionally, a DNS forwarder zone is set up to query the ISP’s DNS records for anything
not found in the local DNS zone (for example, the IP addresses of other organization’s
web servers like www.apple.com).
Note: As noted in Step 2 this example assumes that your ISP is providing Forward and
Reverse DNS for your company’s zone , including resolution of the
server’s public IP.
As a result, the inhouse name server uses an internal zone like ,
which holds the private IP addresses of the server and all other devices on the LAN.
1 In Server Admin, select DNS in the service list.
2 Click Zones, click the Add button (+) under the Zones list, and select Add Primary Zone.
3 Select the default zone, and customize it to fit your organization.
In this case, settings are:
 Primary Zone Name: example.com
 Nameservers Address: 192.168.0.1
 Administrator email: admin@example.comChapter 9 Sample Setup 191
4 Add a machine record to the zone, by selecting the zone, clicking “Add Record,” and
selecting “Add Machine (A)” from the pop-up button.
5 Using the following settings, select the machine record which is under the zone name
to edit the record, and clicking Save when finished.
 Machine name: myserver
 IP Address: 192.168.0.1
6 Using the following settings, continue to add machines to the zone.
For example, to add a printer, click the Add button, specify values for the printer, then
click OK:
 IP address: 192.168.100.2
 Name: laserprinter_2000
7 Set the server to look outside the server for any domain name it doesn’t control, by
clicking Settings.
8 In the Forwarder IP Addresses list, click the Add (+) button to add the DNS addresses
provided by the ISP.
9 Click Save, then click Start DNS.
Step 8: Set up DHCP service
This step sets up a DHCP server that provides employee computers with dynamic IP
addresses as well as the identity of the DNS, LDAP, and WINS servers they should use.
When a client computer’s search policy is set to Automatic (using the Directory Utility
application on the client computer), the identity of the DNS, LDAP, and WINS servers is
supplied when an IP address is supplied.
1 In Server Admin, make sure DNS is running.
2 Select DHCP in the service list.
3 Click Subnets.
4 Click the Add (+) button to define the range of addresses to dynamically assign.
The range should be large enough to accommodate current and future client
computers. Make sure you exclude some addresses (at the start or end of the range) so
they’re reserved for devices that need static IP addresses or for VPN users.
Here are some sample values:
 Subnet Mask: 255.255.0.0
 Starting IP Address: 192.168.0.2
 Ending IP Address: 192.168.0.102
 Network Interface: en1
 Router: 192.168.0.1192 Chapter 9 Sample Setup
5 Make sure the DNS pane contains the following values:
 Default Domain: example.com
 Name Servers: 192.168.0.1
6 Click LDAP to configure DHCP to identify the server you’re configuring as the source of
directory information for clients who are served dynamic IP addresses.
The server you’re setting up should be identified in the Server Name field because you
set up the server as an Open Directory master when you used Server Assistant. Other
settings are optional for this example.
7 Click WINS to configure DHCP to serve Windows-specific settings to clients who are
served dynamic IP addresses; then supply these values:
 WINS/NBNS Primary Server: 192.168.0.1
 NBT Node Type: Broadcast (b-node)
8 Click Save, enable the internal Ethernet interface, then click Start DHCP.
Step 9: Set up NAT service
1 In Server Admin, select NAT in the service list.
2 Click Settings.
3 Select the external interface from the “External network interface” pop-up menu.
4 Click Save, then click Start NAT.
Step 10: Set up VPN service
1 In Server Admin, select VPN in the service list.
2 Click Settings.
3 Enable L2TP over IPSec (Layer Two Tunneling Protocol, Secure Internet Protocol) for
Mac OS X v10.5 computer users, Linux or UNIX workstation users, and Windows XP
users.
Although PPTP can also be used, L2TP provides the greatest security because it runs
over IPSec.
4 Enter a starting and ending IP address to indicate the addresses the VPN server can
assign to clients.
Avoid addresses the DHCP server is set up to serve. Also avoid addresses you specify if
you enable PPTP.
5 Specify the shared secret by entering a string in “Shared secret” that isn’t intuitive.
For example, specify digits, symbols, and uppercase and lowercase characters in
unusual combinations. The recommended length is 8 to 12 characters.Chapter 9 Sample Setup 193
6 Enable Point to Point Tunneling Protocol (PPTP) if employees will need to access the
intranet from Windows workstations other than Windows XP computers or from
Mac OS X v10.2 computers when they’re away from the office.
If you need to support older Windows clients that don’t have 128-bit PPTP support,
select “Allow 40-bit encryption keys in addition to 128-bit.”
7 Enter a starting and ending IP address to indicate the addresses the VPN server can
assign to clients.
Avoid addresses the DHCP server is set up to serve. Also avoid addresses you specified
when you enabled L2TP over IPSec.
8 Click Save, then click Start VPN.
Step 11: Set up productivity services
The infrastructure you need to set up file, print, and other productivity services is now
available. Follow the instructions in the relevant administration guides, listed on
page 13, to configure the services of interest.
Many services, such as Apple File service, require minimal setup. Simply start them
using Server Admin.
Step 12: Create user accounts and home folders
1 Open Workgroup Manager.
2 If you have not already done so, connect and authenticate to the server as the
administrator you defined when using Server Assistant.
The Open Directory master LDAP directory is available for editing. You’ll add an account
for each employee to this master directory.
3 Click the New User button.
4 Specify user settings in the panes that appear.
User Management tells you how to set up all user account attributes, including home
folders. It also describes how to manage users by setting up group accounts and
computer lists and how to set up preference settings that customize the work
environments of Macintosh clients.
User Management and Open Directory Administration show how to implement support
specifically for Windows workstation users.194 Chapter 9 Sample Setup
Step 13: Configure client computers
The information that follows applies to Mac OS X v10.5 computers.
1 If necessary, configure Mac OS X clients to retrieve information from the DHCP server.
Mac OS X v10.5 computers are configured to use DHCP to obtain IP addresses and
retrieve information about an LDAP directory from the DHCP server. After you
configure DHCP service with information about an LDAP directory, that information is
delivered to Mac OS X clients when they receive IP addresses from the DHCP server.
These settings are preconfigured:
 Network preferences are set to use DHCP. To access the setting, select System
Preferences, open Network preferences, select the internal Ethernet interface, and
select “Using DHCP with manual address” or “Using DHCP” from the Configure IPv4
pop-up menu.
 The computer’s search policy is set to be defined automatically. To access this setting,
open Directory Utility (in /Applications/Utilities/) and click Authentication. If the lock
icon is locked, click it and authenticate as an administrator. Choose Automatic from
the Search pop-up menu, then click Apply.
 The use of DHCP-supplied LDAP information is enabled. To access this setting, open
Directory Utility and click Services. If the lock icon is locked, click it and authenticate
as an administrator. Select LDAPv3 in the list of services, then click Configure. Click
“Use DHCP-supplied LDAP Server,” then click OK.
2 Configure Mac OS X clients so they can use the VPN server.
3 Open the Internet Connect application (in /Applications/) and click VPN in the toolbar.
4 Select L2TP over IPSec or PPP and click Continue.
5 From the Configurations pop-up menu., choose Edit Configurations
6 Enter the external IP address from the ISP, the user name and password for the
computer user and, for L2TP over IPSec, the shared secret.
7 Click OK. 195
Appendix
Mac OS X Server Advanced
Worksheet
Enter settings for the server in the tables below:
Server name:
Item Description Your information
Identity of remote
server for installation
and setup
For interactive installation and setup of a remote
server on the local subnet, one of these values for
the server:
- IP address in IPv4 format (000.000.000.000)
- host name (someserver.example.com)
- MAC address (00:03:93:71:26:52).
For command-line or remote-subnet installations
and setups, the target server’s IP address, in IPv4
format.
Preset password
(for remote
installation and
setup)
The first eight digits of the target server’s built-in
hardware serial number, printed on a label on the
computer.
For older computers with no such number, use
12345678 for the password.
Type of installation Upgrade from the latest 10.4 version or from
v10.3.9, complete installation without disk
formatting, or clean installation.
The target volume (partition) is erased when you
do a clean installation.
Target disk or
partition
Name of the target disk or partition (volume).
Disk format
(when erasing the
disk is OK)
A format for the target disk.
In most cases, use Mac OS Extended (Journaled).
You can also use Mac OS Extended or casesensitive HFS+.
Disk partitioning
(when erasing the
disk is OK)
Indicate whether you want to partition the target
disk.
The minimum recommended size of a target disk
partition is 4 GB.196 Appendix Mac OS X Server Advanced Worksheet
RAID mirroring
(when erasing the
disk is OK and you
have a second
physical drive on the
target server)
Indicate whether you want to set up RAID
mirroring. The second disk is used automatically if
the primary disk isn’t available.
If the target disk has a single partition and the
second physical drive has a single partition and
no data, you can set up RAID mirroring after
installation. However, to prevent data loss, set up
RAID mirroring as soon as possible.
Using saved setup
data
If you want to use saved setup data to set up this
server, identify the file or directory storing the
data you want to use. If the data is encrypted,
also identify the passphrase.
If you want to save settings in a file or directory,
use one of the next two rows.
Saving setup data in
a file
Name the file using one of these options:
 .plist (include leading
zeros but omit colons, for example,
0030654dbcef.plist).
 .plist (for example,
10.0.0.4.plist).
 .plist (for
example, myserver.plist).
 .plist (first eight characters, for example,
ABCD1234.plist).
 .plist (for
example, myserver.example.com.plist).
 .plist (for example,
10.0.plist matches 10.0.0.4 and 10.0.1.2).
 generic.plist (a file that any server will
recognize, used to set up servers that need the
same setup values)
If you encrypt the file, you can save the
passphrase in a file named using the above
conventions, except use the extension .pass, not
.plist.
Place the files in a location where the target
server or servers can detect it. A server can detect
files that reside on a volume mounted locally in
/Volumes/*/Auto Server Setup/, where * is any
device mounted under /Volumes.
Item Description Your informationAppendix Mac OS X Server Advanced Worksheet 197
Saving setup data in
a directory
Navigate to the directory where you want to save
the setup, and name the setup record using one
of these options:
 (include leading zeros
but omit colons, for example, 0030654dbcef).
 (for example, 10.0.0.4).
 (for example,
myserver).
Â
(first eight characters, for example, ABCD1234).
 (for
example, myserver.example.com).
 (for example, 10.0
matches 10.0.0.4 and 10.0.1.2).
 generic (a record that any server will recognize,
used to set up servers that need the same setup
values)
If you encrypt the file, you can save the
passphrase in a file named using the above
conventions, except add the extension .pass.
Place the passphrase file in a location where the
target server or servers can detect it. A server can
detect the file if it resides on a volume mounted
locally in /Volumes/*/Auto Server Setup/, where *
is any device mounted under /Volumes.
Language The language to use for server administration
(English, Japanese, French, or German). The
language affects the server’s time and date
formats, displayed text, and the default encoding
used by the AFP server.
Keyboard layout The keyboard for server administration.
Item Description Your information198 Appendix Mac OS X Server Advanced Worksheet
Serial number The serial number for your copy of Mac OS X
Server. You need a new serial number for
Mac OS X Server v10.5.
The format is xsvr-999-999-x-xxx-xxx-xxx-xxx-xxxxxx-x, where x is a letter and 9 is a digit. The first
element (xsvr) and the fourth one (x) must be
lower case.
Unless you have a site license, you need a unique
serial number for each server. You’ll find the
server software serial number printed on the
materials provided with the server software
package.
If you have a site license, you must enter the
registered owner name and organization as
specified by your Apple representative.
If you set up a server using a generic setup file or
directory record and the serial number isn’t sitelicensed, you must enter the server’s serial
number using Server Admin.
Administrator’s long
name (sometimes
called full name or
real name)
A long name can contain no more than 255 bytes.
The number of characters ranges from 255.
Roman characters to as few as 85 3-byte
characters.
It can include spaces.
It can’t be the same as any predefined user name,
such as System Administrator. This name is case
sensitive in the login window, but not when
accessing file servers.
Administrator’s short
name
A short name can contain as many as 255 Roman
characters, typically eight or fewer.
Use only a through z, A through Z, 0 through 9,
_ (underscore), or - (hyphen).
Avoid short names that Apple assigns to
predefined users, such as “root.”
Administrator’s
password
This value is case sensitive and must contain at
least 4 characters. It is also the password for the
root user.
If you record this value, be sure to keep this
worksheet in a safe place.
After setup, use Workgroup Manager to change
the password for this account.
Item Description Your informationAppendix Mac OS X Server Advanced Worksheet 199
Host name You can’t specify this name during server setup.
Server Assistant sets the host name to
AUTOMATIC in /etc/hostconfig.
This setting causes the server’s host name to be
the first name that’s true in this list:
- The name provided by the DHCP or BootP
server for the primary IP address
- The first name returned by a reverse DNS
(address-to-name) query for the primary IP
address
- The local hostname
- The name “localhost”
Computer name The AppleTalk name and the default name used
for SLP/DA. Specify a name 63 characters or fewer
but avoid using =, :, or @.
The Network browser in the Finder uses SMB to
find computers that provide Windows file sharing.
Spaces are removed from a computer name for
use with SMB, and the name can contain no more
than 15 characters, no special characters, and no
punctuation.
Local hostname The name that designates a computer on a local
subnet.
It can contain lowercase letters, numbers, and/or
hyphens (but not at the ends). The name ends
with “.local” and must be unique on a local
subnet.
Network interface
data
Your server has a built-in Ethernet port and can
have an additional Ethernet port built in or added
on. Record information for each port you want to
activate.
Use the table provided
later in this worksheet to
record data for each port.
Directory usage Select one:
- Standalone Server (use only the local directory).
- Connected to a Directory System (get
information from another server’s shared
directory). If you choose this option, use one of
the next four rows in this table to indicate how
the server will connect with the directory.
- Open Directory Master (provide directory
information to other computers). If you choose
this option, use the row for “Using Open Directory
Master.”
- No change (for upgrades only).
Using “As Specified
by DHCP Server”
The directory to use is identified by a DHCP
server set up to provide the address and search
base of an LDAP server (DHCP option 95).
Item Description Your information200 Appendix Mac OS X Server Advanced Worksheet
Configuration settings for the following port appear in the table below:
Using “Open
Directory Server”
The directory to use is an LDAP directory
identified by a DHCP server or identified by
specifying an IP address or domain name for the
LDAP server.
Using “Other
Directory Server”
The directories to use is configured using the
Directory Utility application after you finish
setting up the server.
Using “Open
Directory Master”
Optionally indicate if you want to enable a
Windows Primary Domain Controller on the
server. Provide a Windows computer name and
domain for the server. The computer name and
domain can contain a-z, A-Z, 0-9, -, but no . or
space and can’t contain only numbers.
Finish setting up the directory you want to host
by using Server Admin after completing server
setup.
Time zone Choose the time zone you want the server to use.
Network time Optionally indicate a Network Time Server for the
server.
Apple recommends that you keep your server’s
clock accurate by synchronizing it with a network
time server.
Item Description Your information
Port Name: Built-in Ethernet
Item Description Your information
Device name A UNIX name for the port in the format enx, where x
starts with 0. For the value of x for the port you’re
describing, see your hardware manual. The value en0
always designates a built-in Ethernet port.
en0
Ethernet address The Media Access Control (MAC) address of the port
(00:00:00:00:00:00). This value is usually on a sticker on
the server hardware, but you can run Apple System
Profiler or a command-line tool such as networksetup to
discover the value.
TCP/IP and
AppleTalk
Indicate whether you want to enable the port for TCIP/IP
and/or AppleTalk.
You can connect a port to the Internet by enabling
TCP/IP and use the same or a different port for AppleTalk.
Enable no more than one port for AppleTalk.
Order of ports If you enable more than one port, indicate the order in
which the ports should be accessed when trying to
connect to a network. All nonlocal network traffic uses
the first active port.Appendix Mac OS X Server Advanced Worksheet 201
TCP/IP settings Use one of the next four rows in this table.
“Manually” Specify these settings to manually specify TCP/IP
settings:
- IP address (000.000.000.000). A unique static address.
- Subnet mask (000.000.000.000). Used to locate the
subnet on the local area network where the server
resides. This mask is used to derive the network part of
the server’s address. What remains identifies the server
computer on that network.
- Router (000.000.000.000) that supports the subnet the
server’s on. The router is the machine on the local subnet
that messages are sent to the target IP address isn’t on
the local subnet.
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified DNS names and vice versa for
the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.
“Using DHCP
with Manual IP
address”
Specify these settings to use a DHCP server to assign a
static IP address and optionally other settings for the
port.
Make sure the DHCP server is set up and DHCP service
running when you initiate server setup:
- IP address (000.000.000.000). A unique static address.
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified DNS names and vice versa for
the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.
Item Description Your information202 Appendix Mac OS X Server Advanced Worksheet
“Using DHCP” Specify these settings if you want to use a DHCP server
to assign a dynamic IP address and optionally other
settings for the port. Make sure the DHCP server is set up
and DHCP service running when you initiate server
setup:
- DHCP client ID (optional). A string that’s useful for
recognizing a port when its IP address changes. Don’t
specify a DHCP client ID when using Server Assistant to
set up the server remotely. Instead, after setup, use the
server’s Network preferences to define a DHCP client ID.
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified DNS names and vice versa for
the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.
“Using BootP” Specify these settings if you want to use a Bootstrap
Protocol server to assign an IP address for the identified
port.
With BootP, the same IP address is always assigned to a
particular network interface. It’s used primarily for
computers that start up from a NetBoot image:
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified domain names and vice versa
for the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.
Item Description Your informationAppendix Mac OS X Server Advanced Worksheet 203
IPv6 To configure IPv6 addressing for the port, select
Automatically or Manually.
Choose Automatically if you want the server to
automatically generate an IPv6 address for the port.
Choose Manually to specify IPv6 settings:
- IPv6 address. Generally written in the form
0000:0000:0000:0000:0000:0000:0000:0000.
- Router. The IPv6 address of the router on the local
subnet.
- Prefix length. The number of significant bits in the
subnet mask that are used to identify the network.
Ethernet
settings
To automatically configure Ethernet settings for the port,
choose Automatically.
Choose Manually (Advanced) to specify settings if you
have specific requirements for the network the server’s
connected to. Incorrect Ethernet settings can affect
network performance or render a port unusable:
- Speed. The maximum Ethernet speed, in number of bits
per second, that can be transmitted using the port.
Select one of these options: autoselect, 10baseT/UTP,
100baseTX, and 1000baseTX.
- Duplex. Determine whether input and output packets
are transmitted at the same time (full-duplex) or
alternately (half-duplex).
- Maximum Packet Transfer Unit Size (MTU). The largest
packet the port will send or receive.s, expressed in bytes.
Increasing the packet size improves throughput, but the
devices that receive the packet (switches, routers, and so
forth) must support the packet size. Select one of these
options: Standard (1500), Jumbo (9000), or Custom
(enter a value from 72 to 1500).
Item Description Your information204 Appendix Mac OS X Server Advanced Worksheet
Configuration settings for the following port appear in the table below:
Port Name:
Item Description Your information
Device name A UNIX name for the port in the format enx, where x
starts with 0. For the value of x for the port you’re
describing, see your hardware manual. The value en0
always designates a built-in Ethernet port.
Ethernet address The Media Access Control (MAC) address of the port
(00:00:00:00:00:00). This value is usually on a sticker on
the server hardware, but you can run Apple System
Profiler or a command-line tool such as networksetup to
discover the value.
TCP/IP and
AppleTalk
Indicate whether you want to enable the port for TCIP/IP
and/or AppleTalk.
You can connect a port to the Internet by enabling
TCP/IP and use the same or a different port for AppleTalk.
Enable no more than one port for AppleTalk.
Order of ports If you enable more than one port, indicate the order in
which the ports should be accessed when trying to
connect to a network. All nonlocal network traffic uses
the first active port.
TCP/IP settings Use one of the next four rows in this table.
“Manually” Specify these settings to manually specify TCP/IP
settings:
- IP address (000.000.000.000). A unique static address.
- Subnet mask (000.000.000.000). Used to locate the
subnet on the local area network where the server
resides. This mask is used to derive the network part of
the server’s address. What remains identifies the server
computer on that network.
- Router (000.000.000.000) that supports the subnet the
server’s on. The router is the machine on the local subnet
that messages are sent to the target IP address isn’t on
the local subnet.
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified DNS names and vice versa for
the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.Appendix Mac OS X Server Advanced Worksheet 205
“Using DHCP
with Manual IP
address”
Specify these settings to use a DHCP server to assign a
static IP address and optionally other settings for the
port.
Make sure the DHCP server is set up and DHCP service
running when you initiate server setup:
- IP address (000.000.000.000). A unique static address.
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified DNS names and vice versa for
the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.
“Using DHCP” Specify these settings if you want to use a DHCP server
to assign a dynamic IP address and optionally other
settings for the port. Make sure the DHCP server is set up
and DHCP service running when you initiate server
setup:
- DHCP client ID (optional). A string that’s useful for
recognizing a port when its IP address changes. Don’t
specify a DHCP client ID when using Server Assistant to
set up the server remotely. Instead, after setup, use the
server’s Network preferences to define a DHCP client ID.
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified DNS names and vice versa for
the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.
Item Description Your information206 Appendix Mac OS X Server Advanced Worksheet
“Using BootP” Specify these settings if you want to use a Bootstrap
Protocol server to assign an IP address for the identified
port.
With BootP, the same IP address is always assigned to a
particular network interface. It’s used primarily for
computers that start up from a NetBoot image:
- DNS servers (000.000.000.000) used to convert IP
addresses to fully qualified domain names and vice versa
for the port.
- Search domains (optional). Names to automatically
append to Internet addresses when you don’t fully
qualify them. For example, if you specify
campus.univ.edu as a search domain, you can enter
server1 in the Finder’s Connect To Server dialog box to
connect to server1.campus.univ.edu.
IPv6 To configure IPv6 addressing for the port, select
Automatically or Manually.
Choose Automatically if you want the server to
automatically generate an IPv6 address for the port.
Choose Manually to specify IPv6 settings:
- IPv6 address. Generally written in the form
0000:0000:0000:0000:0000:0000:0000:0000.
- Router. The IPv6 address of the router on the local
subnet.
- Prefix length. The number of significant bits in the
subnet mask that are used to identify the network.
Ethernet
settings
To automatically configure Ethernet settings for the port,
choose Automatically.
Choose Manually (Advanced) to specify settings if you
have specific requirements for the network the server’s
connected to. Incorrect Ethernet settings can affect
network performance or render a port unusable:
- Speed. The maximum Ethernet speed, in number of bits
per second, that can be transmitted using the port.
Select one of these options: autoselect, 10baseT/UTP,
100baseTX, and 1000baseTX.
- Duplex. Determine whether input and output packets
are transmitted at the same time (full-duplex) or
alternately (half-duplex).
- Maximum Packet Transfer Unit Size (MTU). The largest
packet the port will send or receive.s, expressed in bytes.
Increasing the packet size improves throughput, but the
devices that receive the packet (switches, routers, and so
forth) must support the packet size. Select one of these
options: Standard (1500), Jumbo (9000), or Custom
(enter a value from 72 to 1500).
Item Description Your information 207
Glossary
Glossary
administrator A user with server or directory domain administration privileges.
Administrators are always members of the predefined “admin” group.
administrator computer A Mac OS X computer onto which you’ve installed the server
administration applications from the Mac OS X Server Admin CD.
AFP Apple Filing Protocol. A client/server protocol used by Apple file service to share
files and network services. AFP uses TCP/IP and other protocols to support
communication between computers on a network.
alphanumeric Containing characters that include letters, numbers, and punctuation
characters (such as _ and ?).
Apache An open source HTTP server integrated into Mac OS X Server. You can find
detailed information about Apache at www.apache.org.
application server Software that runs and manages other applications, usually web
applications, that are accessed using a web browser. The managed applications reside
on the same computer where the application server runs.
authentication The process of proving a user’s identity, typically by validating a user
name and password. Usually authentication occurs before an authorization process
determines the user’s level of access to a resource. For example, file service authorizes
full access to folders and files that an authenticated user owns.
authorization The process by which a service determines whether it should grant a
user access to a resource and how much access the service should allow the user to
have. Usually authorization occurs after an authentication process proves the user’s
identity. For example, file service authorizes full access to folders and files that an
authenticated user owns.
back up (verb) The act of creating a backup.
backup (noun) A collection of data that’s stored for the purpose of recovery in case
the original copy of data is lost or becomes inaccessible.208 Glossary
bandwidth The capacity of a network connection, measured in bits or bytes per
second, for carrying data.
BIND Berkeley Internet Name Domain. The program included with Mac OS X Server
that implements DNS. The program is also called the name daemon, or named, when
the program is running.
blog A webpage that presents chronologically ordered entries. Often used as an
electronic journal or newsletter.
boot ROM Low-level instructions used by a computer in the first stages of starting up.
BSD Berkeley Software Distribution. A version of UNIX on which Mac OS X software is
based.
cache A portion of memory or an area on a hard disk that stores frequently accessed
data in order to speed up processing times. Read cache holds data in case it’s
requested by a client; write cache holds data written by a client until it can be stored
on disk. See also buffer caching, controller cache, disk cache.
certificate Sometimes called an “identity certificate” or “public key certificate.” A file in
a specific format (Mac OS X Server uses the X.509 format) that contains the public key
half of a public-private keypair, the user’s identity information such as name and
contact information, and the digital signature of either a Certificate Authority (CA) or
the key user.
Certificate Authority An authority that issues and manages digital certificates in order
to ensure secure transmission of data on a public network. See also certificate, public
key infrastructure.
certification authority See Certificate Authority.
cleartext Data that hasn’t been encrypted.
client A computer (or a user of the computer) that requests data or services from
another computer, or server.
command line The text you type at a shell prompt when using a command-line
interface.
command-line interface A way of interacting with the computer (for example, to run
programs or modify file system permissions) by entering text commands at a shell
prompt. See also shell; shell prompt.
computer list A set of computers that all receive the managed preference settings
defined for the list, and that are all available to a particular set of users and groups.
A computer can be a member of only one computer list. Computer lists are created in
Mac OS X Server version 10.4 or earlier. See also computer group.Glossary 209
computer name The default name used for SLP and SMB service registrations.
The Network Browser in the Finder uses SLP to find computers advertising Personal File
Sharing and Windows File Sharing. It can be set to bridge subnets depending on the
network router settings. When you turn on Personal File Sharing, users see the
computer name in the Connect to Server dialog in the Finder. Initially it is “’s Computer” (for example, “John’s Computer”) but can be changed to
anything. The computer name is used for browsing for network file servers, print
queues, Bluetooth® discovery, Apple Remote Desktop clients, and any other network
resource that identifies computers by computer name rather than network address.
The computer name is also the basis for the default local host name.
CUPS Common UNIX Printing System. A cross-platform printing facility based on the
Internet Printing Protocol (IPP). The Mac OS X Print Center, its underlying print system,
and the Mac OS X Server print service are based on CUPS. For more information, visit
www.cups.org.
daemon A program that runs in the background and provides important system
services, such as processing incoming email or handling requests from the network.
decryption The process of retrieving encrypted data using some sort of special
knowledge. See also encryption.
default The automatic action performed by a program unless the user chooses
otherwise.
DHCP Dynamic Host Configuration Protocol. A protocol used to dynamically distribute
IP addresses to client computers. Each time a client computer starts up, the protocol
looks for a DHCP server and then requests an IP address from the DHCP server it finds.
The DHCP server checks for an available IP address and sends it to the client computer
along with a lease period—the length of time the client computer may use the
address.
DHCP lease time See lease period.
digital signature An electronic signature that can be used to verify the identity of the
sender of a message.
directory See folder.
directory domain A specialized database that stores authoritative information about
users and network resources; the information is needed by system software and
applications. The database is optimized to handle many requests for information and to
find and retrieve information quickly. Also called a directory node or simply a directory.
directory node See directory domain.210 Glossary
directory services Services that provide system software and applications with
uniform access to directory domains and other sources of information about users and
resources.
disc Optical storage media, such as a CD or DVD.
disk A rewritable data storage device. See also disk drive, logical disk.
disk drive A device that contains a disk and reads and writes data to the disk.
disk image A file that, when opened, creates an icon on a Mac OS X desktop that looks
and acts like an actual disk or volume. Using NetBoot, client computers can start up
over the network from a server-based disk image that contains system software. Disk
image files have a filename extension of either .img or .dmg. The two image formats
are similar and are represented with the same icon in the Finder. The .dmg format
cannot be used on computers running Mac OS 9.
DNS Domain Name System. A distributed database that maps IP addresses to domain
names. A DNS server, also known as a name server, keeps a list of names and the IP
addresses associated with each name.
DNS domain A unique name of a computer used in the Domain Name System to
translate IP addresses and names. Also called a domain name.
DNS name A unique name of a computer used in the Domain Name System to
translate IP addresses and names. Also called a domain name.
domain Part of the domain name of a computer on the Internet. It does not include
the top-level domain designator (for example, .com, .net, .us, .uk). Domain name
“www.example.com” consists of the subdomain or host name “www,” the domain
“example,” and the top-level domain “com.”
domain name See DNS name.
Domain Name System See DNS.
DSL Digital subscriber line. A broadband data transmission technology that operates
over telephone lines.
Dynamic Host Configuration Protocol See DHCP.
dynamic IP address An IP address that’s assigned for a limited period of time or until
the client computer no longer needs it.
EFI Extensible Firmware Interface. Software that runs automatically when an Intelbased Macintosh first starts up. It determines the computers hardware configuration
and starts the system software.Glossary 211
encryption The process of obscuring data, making it unreadable without special
knowledge. Usually done for secrecy and confidential communications. See also
decryption.
Ethernet A common local area networking technology in which data is transmitted in
units called packets using protocols such as TCP/IP.
Ethernet ID See MAC address.
everyone Any user who can log in to a file server: a registered user or guest, an
anonymous FTP user, or a website visitor.
export In the Network File System (NFS), a way of sharing a folder with clients on a
network.
failover In Xsan, the automatic process by which a standby metadata controller
becomes the active metadata controller if the primary controller fails.
Fast Ethernet A group of Ethernet standards in which data is transmitted at 100
megabits per second (Mbit/s).
file server A computer that serves files to clients. A file server may be a generalpurpose computer that’s capable of hosting additional applications or a computer
capable only of serving files.
file system A scheme for storing data on storage devices that allows applications to
read and write files without having to deal with lower-level details.
filter A screening method to control access to a server. A filter is made up of an IP
address and a subnet mask, and sometimes a port number and access type. The IP
address and the subnet mask determine the range of IP addresses that the filter applies
to.
firewall Software that protects the network applications running on your server. IP
firewall service, which is part of Mac OS X Server software, scans incoming IP packets
and rejects or accepts these packets based on a set of filters you create.
FireWire A hardware technology for exchanging data with peripheral devices, defined
by IEEE Standard 1394.
format (verb) In general, to prepare a disk for use by a particular file system.
forward zone The DNS zone that holds no records of its own, but forwards DNS
queries to another zone.212 Glossary
FTP File Transfer Protocol. A protocol that allows computers to transfer files over a
network. FTP clients using any operating system that supports FTP can connect to a file
server and download files, depending on their access privileges. Most Internet browsers
and a number of freeware applications can be used to access an FTP server.
gateway A network node that interfaces one network to another. Often, it refers to a
computer that links a private LAN to a public WAN, with or without Network Address
Translation (NAT). A router is a special kind of gateway that links related network
segments.
GB Gigabyte. 1,073,741,824 (2
30
) bytes.
Gigabit Ethernet A group of Ethernet standards in which data is transmitted at
1 gigabit per second (Gbit/s). Abbreviated GbE.
gigabyte See GB.
group A collection of users who have similar needs. Groups simplify the administration
of shared resources.
group folder A folder that organizes documents and applications of special interest to
group members and allows group members to pass information among themselves.
guest computer A computer that doesn’t have a computer account.
guest user A user who can log in to your server without a user name or password.
high availability The ability of a system to perform its function continuously, without
interruption.
home directory See home folder.
home folder A folder for a user’s personal use. Mac OS X also uses the home folder to
store system preferences and managed user settings for Mac OS X users. Also known as
a home directory.
host Another name for a server.
host name A unique name for a computer, historically referred to as the UNIX
hostname.
HTML Hypertext Markup Language. The set of symbols or codes inserted in a file to be
displayed on a web browser page. The markup tells the web browser how to display a
webpage’s words and images for the user.
HTTP Hypertext Transfer Protocol. The client/server protocol for the World Wide Web.
HTTP provides a way for a web browser to access a web server and request hypermedia
documents created using HTML.Glossary 213
Hypertext Markup Language See HTML.
Hypertext Transfer Protocol See HTTP.
IANA Internet Assigned Numbers Authority. An organization responsible for allocating
IP addresses, assigning protocol parameters, and managing domain names.
ICMP Internet Control Message Protocol. A message control and error-reporting
protocol used between host servers and gateways. For example, some Internet
software applications use ICMP to send a packet on a round trip between two hosts to
determine round-trip times and discover problems on the network.
identity certificate See certificate.
IGMP Internet Group Management Protocol. An Internet protocol used by hosts and
routers to send packets to lists of hosts that want to participate in a process known as
multicasting. QuickTime Streaming Server (QTSS) uses multicast addressing, as does
Service Location Protocol (SLP).
image See disk image.
installer package A file package with the filename extension .pkg. An installer package
contains resources for installing an application, including the file archive, Read Me and
licensing documents, and installer scripts.
Internet A set of interconnected computer networks communicating through a
common protocol (TCP/IP). The Internet is the most extensive publicly accessible
system of interconnected computer networks in the world.
Internet service provicer See ISP.
intranet A network of computers operated by and for the benefit of an organization’s
internal users. Access is commonly restricted to members of the organization. Many
times, it refers to a website for the organization which is accessible only from within
the organization. Intranets use the same networking technologies as the Internet
(TCP/IP), and sometimes bridge legacy information systems with modern networking
technologies.
IP Internet Protocol. Also known as IPv4. A method used with Transmission Control
Protocol (TCP) to send data between computers over a local network or the Internet.
IP delivers data packets and TCP keeps track of data packets.
IP address A unique numeric address that identifies a computer on the Internet.
IP subnet A portion of an IP network, which may be a physically independent network
segment, that shares a network address with other portions of the network and is
identified by a subnet number.214 Glossary
IPP Internet Printing Protocol. A client-server protocol for printing over the Internet.
The Mac OS X printing infrastructure and the Mac OS X Server print service that’s built
on it support IPP.
IPSec A security addition to IP. A protocol that provides data transmission security for
L2TP VPN connections. IPSec acts at the network layer, protecting and authenticating IP
packets between participating IPSec nodes.
IPv4 See IP.
IPv6 Internet Protocol version 6. The next-generation communication protocol to
replace IP (also known as IPv4). IPv6 allows a greater number of network addresses and
can reduce routing loads across the Internet.
journal data In Xsan, data about file system transactions that occur on an Xsan
volume.
KB Kilobyte. 1,024 (2
10
) bytes.
KDC Kerberos Key Distribution Center. A trusted server that issues Kerberos tickets.
Kerberos A secure network authentication system. Kerberos uses tickets, which are
issued for a specific user, service, and period of time. After a user is authenticated, it’s
possible to access additional services without retyping a password (called single signon) for services that have been configured to take Kerberos tickets. Mac OS X Server
uses Kerberos v5.
Kerberos Key Distribution Center See KDC.
Kerberos realm The authentication domain comprising the users and services that are
registered with the same Kerberos server. The registered users and services trust the
Kerberos server to verify each other’s identities.
kilobyte See KB.
L2TP Layer Two Tunnelling Protocol. A network transport protocol used for VPN
connections. It’s essentially a combination of Cisco’s L2F and PPTP. L2TP itself isn’t an
encryption protocol, so it uses IPSec for packet encryption.
LAN Local area network. A network maintained within a facility, as opposed to a WAN
(wide area network) that links geographically separated facilities.
layer A mechanism for prioritizing the tracks in a movie or the overlapping of sprites.
When QuickTime plays a movie, it displays the movie’s images according to their layer.
Images with lower layer numbers are displayed on top; images with higher layer
numbers may be obscured by images with lower layer numbers.Glossary 215
LDAP Lightweight Directory Access Protocol. A standard client-server protocol for
accessing a directory domain.
lease period A limited period of time during which IP addresses are assigned. By using
short leases, DHCP can reassign IP addresses on networks that have more computers
than available IP addresses.
Lightweight Directory Access Protocol See LDAP.
link An active physical connection (electrical or optical) between two nodes on a
network.
link aggregation Configuring several physical network links as a single logical link to
improve the capacity and availablility of network connections. With link aggregation,
all ports are assigned the same ID. Compare to multipathing, in which each port keeps
its own address.
load balancing The process of distributing client computers’ requests for network
services across multiple servers to optimize performance.
local area network See LAN.
local directory domain A directory of identification, authentication, authorization,
and other administrative data that’s accessible only on the computer where it resides.
The local directory domain isn’t accessible from other computers on the network.
local domain A directory domain that can be accessed only by the computer it resides
on.
local home directory See local home folder.
local home folder A home folder that resides on disk on the computer a user is logged
in to. It’s accessible only by logging directly in to the computer where it resides, unless
you log in to the computer using SSH.
local hostname A name that designates a computer on a local subnet. It can be used
without a global DNS system to resolve names to IP addresses. It consists of lowercase
letters, numbers, or hyphens (except as the last characters), and ends with “.local” (For
example, bills-computer.local). Although the default name is derived from the
computer name, a user can specify this name in the Sharing pane of System
Preferences. It can be changed easily, and can be used anywhere a DNS name or fully
qualified domain name is used. It can only resolve on the same subnet as the computer
using it.216 Glossary
log in (verb) To start a session with a computer (often by authenticating as a user with
an account on the computer) in order to obtain services or access files. Note that
logging in is separate from connecting, which merely entails establishing a physical link
with the computer.
long name The long form of a user or group name. See also user name.
LPR Line Printer Remote. A standard protocol for printing over TCP/IP.
MAC Media access control. See MAC address.
MAC address Media access control address. A hardware address that uniquely
identifies each node on a network. For AirPort devices, the MAC address is called the
AirPort ID.
Mac OS X The latest version of the Apple operating system. Mac OS X combines the
reliability of UNIX with the ease of use of Macintosh.
Mac OS X Server An industrial-strength server platform that supports Mac, Windows,
UNIX, and Linux clients out of the box and provides a suite of scalable workgroup and
network services plus advanced remote management tools.
managed network The items managed clients are allowed to see when they click the
Network icon in a Finder window. Administrators control this setting using Workgroup
Manager. Also called a network view.
managed preferences System or application preferences that are under administrative
control. Workgroup Manager allows administrators to control settings for certain
system preferences for Mac OS X managed clients.
master zone The DNS zone records held by a primary DNS server. A master zone is
replicated by zone transfers to slave zones on secondary DNS servers.
MB Megabyte. 1,048,576 (2
20
) bytes.
media access control See MAC address.
megabyte See MB.
migrate To transfer existing information, such as user and group accounts and user
data, from one server or network to another server or network that’s managed using
different software.
mirrored Refers to a disk array that uses RAID 1, or mirroring.
mirroring Writing identical copies of data to two physical drives. Mirroring protects
data against loss due to disk failure, and is the simplest method of achieving data
redundancy.Glossary 217
mount (verb) To make a remote directory or volume available for access on a local
system. In Xsan, to cause an Xsan volume to appear on a client’s desktop, just like a
local disk.
mount point In streaming, a string used to identify a live stream, which can be a
relayed movie stream, a nonrelayed movie stream, or an MP3 stream. Mount points
that describe live movie streams always end with a .sdp extension.
MS-CHAP Microsoft Challenge Handshake Authentication Protocol. The standard
Windows authentication method for VPN. This authentication method encodes
passwords when they are sent over the network and stores them in a scrambled form
on the server. It offers good security during network transmission. MS-CHAP is a
proprietary version of CHAP.
multicast DNS A protocol developed by Apple for automatic discovery of computers,
devices, and services on IP networks. Called Bonjour (previously Rendezvous) by Apple,
this proposed Internet standard protocol is sometimes referred to as ZeroConf or
multicast DNS. For more information, visit www.apple.com or www.zeroconf.org. To see
how this protocol is used in Mac OS X Server, see local hostname.
MySQL An open source relational database management tool frequently used by web
servers.
name server A server on a network that keeps a list of names and the IP addresses
associated with each name. See also DNS, WINS.
NAT Network address translation. A method of connecting multiple computers to the
Internet (or any other IP network) using one IP address. NAT converts the IP addresses
you assign to computers on your private, internal network into one legitimate IP
address for Internet communications.
network address translation See NAT.
Network File System See NFS.
Network Image Utility A utility provided with Mac OS X Server software that allows
you to create disk images for NetBoot and Network Install services. Disk images can
contain the Mac OS X operating system, applications, or both.
network installation The process of installing systems and software on Mac OS X client
computers over the network. Software installation can occur with an administrator
attending the installations or completely unattended.
network interface Your computer’s hardware connection to a network. This includes
(but isn’t limited to) Ethernet connections, AirPort cards, and FireWire connections.
network interface card See NIC.218 Glossary
Network Time Protocol See NTP.
NFS Network File System. A client/server protocol that uses Internet Protocol (IP) to
allow remote users to access files as though they were local. NFS exports shared
volumes to computers based on IP address, rather than user name and password.
NTP Network Time Protocol. A network protocol used to synchronize the clocks of
computers across a network to some time reference clock. NTP is used to ensure that
all the computers on a network are reporting the same time.
offline Refers to data that isn’t immediately available, or to a device that is physically
connected but not available for use.
online Refers to data, devices, or network connections that are available for immediate
use.
Open Directory The Apple directory services architecture, which can access
authoritative information about users and network resources from directory domains
that use LDAP, Active Directory protocols, or BSD configuration files, and network
services.
Open Directory master A server that provides LDAP directory service, Kerberos
authentication service, and Open Directory Password Server.
open source A term for the cooperative development of software by the Internet
community. The basic principle is to involve as many people as possible in writing and
debugging code by publishing the source code and encouraging the formation of a
large community of developers who will submit modifications and enhancements.
package install image A file that you can use to install packages. Using NetBoot, client
computers can start up over the network using this image to install software. Unlike
block copy disk images, you can use same package install image for different hardware
configurations.
partition A subdivision of the capacity of a physical or logical disk. Partitions are made
up of contiguous blocks on the disk.
password An alphanumeric string used to authenticate the identity of a user or to
authorize access to files or services.
password policy A set of rules that regulate the composition and validity of a user’s
password.
Password Server See Open Directory Password Server.
permissions Settings that define the kind of access users have to shared items in a file
system. You can assign four types of permissions to a share point, folder, or file: Read &
Write, Read Only, Write Only, and No Access. See also privileges.Glossary 219
PHP PHP Hypertext Preprocessor (originally Personal Home Page). A scripting
language embedded in HTML that’s used to create dynamic webpages.
physical disk An actual, mechanical disk. Compare with logical disk.
plaintext Text that hasn’t been encrypted.
Point to Point Tunneling Protocol See PPTP.
point-to-point One of three physical topologies that Fibre Channel uses to
interconnect nodes. The point-to-point topology consists of a single connection
between two nodes. See also arbitrated loop, fabric.
port A sort of virtual mail slot. A server uses port numbers to determine which
application should receive data packets. Firewalls use port numbers to determine
whether data packets are allowed to traverse a local network. “Port” usually refers to
either a TCP or UDP port.
port name A unique identifier assigned to a Fibre Channel port.
POSIX Portable Operating System Interface for UNIX. A family of open system
standards based on UNIX, which allows applications to be written to a single target
environment in which they can run unchanged on a variety of systems.
PPTP Point to Point Tunneling Protocol. A network transport protocol used for VPN
connections. It’s the Windows standard VPN protocol and uses the user-provided
password to produce an encryption key.
private key One of two asymmetric keys used in a PKI security system. The private key
is not distributed and is usually encrypted with a passphrase by the owner. It can
digitally sign a message or certificate, claiming authenticity. It can decrypt messages
encrypted with the corresponding public key and it can encrypt messages that can
only be decrypted by the private key.
privileges The right to access restricted areas of a system or perform certain tasks
(such as management tasks) in the system.
process A program that has started executing and has a portion of memory allocated
to it.
process ID See PID.
protocol A set of rules that determines how data is sent back and forth between two
applications.220 Glossary
public key One of two asymmetric keys used in a PKI security system. The public key is
distributed to other communicating parties. It can encrypt messages that can be
decrypted only by the holder of the corresponding private key, and it can verify the
signature on a message originating from a corresponding private key.
public key certificate See certificate.
public key cryptography A method of encrypting data that uses a pair of keys, one
public and one private, that are obtained from a certification authority. One key is used
to encrypt messages, and the other is used to decrypt them.
public key infrastructure A secure method of exchanging data over an unsecure
public network, such as the Internet, by using public key cryptography.
QTSS Publisher An Apple application (included with Mac OS X Server) for managing
QuickTime media and playlists, and preparing media for streaming and downloading.
QuickTime Streaming Server See QTSS.
RADIUS Remote Authentication Dial-In User Service.
RADIUS server A computer on the network that provides a centralized database of
authentication information for computers on the network.
RAID Redundant Array of Independent (or Inexpensive) Disks. A grouping of multiple
physical hard disks into a disk array, which either provides high-speed access to stored
data, mirrors the data so that it can be rebuilt in case of disk failure, or both. The RAID
array is presented to the storage system as a single logical storage unit. See also RAID
array, RAID level.
RAID 0 A RAID scheme in which data is distributed evenly in stripes across an array of
drives. RAID 0 increases the speed of data transfer, but provides no data protection.
RAID 0+1 A combination of RAID 0 and RAID 1. This RAID scheme is created by striping
data across multiple pairs of mirrored drives.
RAID 1 A RAID scheme that creates a pair of mirrored drives with identical copies of
the same data. It provides a high level of data availability.
RAID 5 A RAID scheme that distributes both data and parity information across an
array of drives one block at a time, with each drive operating independently. This
enables maximum read performance when accessing large files.
RAID array A group of physical disks organized and protected by a RAID scheme and
presented by RAID hardware or software as a single logical disk. In Xsan, RAID arrays
appear as LUNs, which are combined to form storage pools.
RAID set See RAID array.Glossary 221
realm General term with multiple applications. See WebDAV realm, Kerberos realm.
record type A specific category of records, such as users, computers, and mounts. For
each record type, a directory domain may contain any number of records.
recursion The process of fully resolving domain names into IP addresses. A
nonrecursive DNS query allows referrals to other DNS servers to resolve the address.
In general, user applications depend on the DNS server to perform this function,
but other DNS servers do not have to perform a recursive query.
root An account on a system that has no protections or restrictions. System
administrators use this account to make changes to the system’s configuration.
SACL Service Access Control List. Lets you specify which users and groups have access
to specific services. See ACL.
Samba Open source software that provides file, print, authentication, authorization,
name resolution, and network service browsing to Windows clients using the SMB
protocol.
schema The collection of attributes and record types or classes that provide a
blueprint for the information in a directory domain.
search base A distinguished name that identifies where to start searching for
information in an LDAP directory’s hierarchy of entries.
search path See search policy.
search policy A list of directory domains searched by a Mac OS X computer when it
needs configuration information; also, the order in which domains are searched.
Sometimes called a search path.
Secure Sockets Layer See SSL.
server A computer that provides services (such as file service, mail service, or web
service) to other computers or network devices.
Server Message Block See SMB.
shared secret A value defined at each node of an L2TP VPN connection that serves as
the encryption key seed to negotiate authentication and data transport connections.
shell A program that runs other programs. You can use a shell to interact with the
computer by typing commands at a shell prompt. See also command-line interface.
short name An abbreviated name for a user. The short name is used by Mac OS X for
home folders, authentication, and email addresses.222 Glossary
slave zone The DNS zone records held by a secondary DNS server. A slave zone
receives its data by zone transfers from the master zone on the primary DNS server.
SLP DA Service Location Protocol Directory Agent. A protocol that registers services
available on a network and gives users easy access to them. When a service is added to
the network, the service uses SLP to register itself on the network. SLP DA uses a
centralized repository for registered network services.
SMB Server Message Block. A protocol that allows client computers to access files and
network services. It can be used over TCP/IP, the Internet, and other network protocols.
SMB services use SMB to provide access to servers, printers, and other network
resources.
SMTP Simple Mail Transfer Protocol. A protocol used to send and transfer mail. Its
ability to queue incoming messages is limited, so SMTP is usually used only to send
mail, and POP or IMAP is used to receive mail.
SNMP Simple Network Management Protocol. A set of standard protocols used to
manage and monitor multiplatform computer network devices.
Spotlight A comprehensive search engine that searches across your documents,
images, movies, PDF, email, calendar events, and system preferences. It can find
something by its text content, filename, or information associated with it.
SSL Secure Sockets Layer. An Internet protocol that allows you to send encrypted,
authenticated information across the Internet. More recent versions of SSL are known
as TLS (Transport Level Security).
standalone server A server that provides services on a network but doesn’t get
directory services from another server or provide directory services to other computers.
static IP address An IP address that’s assigned to a computer or device once and is
never changed.
stripe (noun) A partition of a drive in a RAID array.
stripe (verb) To write data to successive stripes in a RAID array or LUN.
subdirectory A directory within a directory.
subdomain Sometimes called the host name. Part of the domain name of a computer
on the Internet. It does not include the domain or the top-level domain (TLD)
designator (for example, .com, .net, .us, .uk). The domain name “www.example.com”
consists of the subdomain “www,” the domain “example,” and the top-level domain
“com.”Glossary 223
subnet A grouping on the same network of client computers that are organized by
location (for example, different floors of a building) or by usage (for example, all eighthgrade students). The use of subnets simplifies administration. See also IP subnet.
subnet mask A number used in IP networking to specify which portion of an IP
address is the network number.
TB Terabyte. 1,099,511,627,776 (2
40
) bytes.
TCP Transmission Control Protocol. A method used with the Internet Protocol (IP) to
send data in the form of message units between computers over the Internet. IP
handles the actual delivery of the data, and TCP keeps track of the units of data (called
packets) into which a message is divided for efficient routing through the Internet.
terabyte See TB.
throughput The rate at which a computer can process data.
tunneling A technology that allows one network protocol to send its data using the
format of another protocol.
two-factor authentication A process that authenticates through a combination of two
independent factors: something you know (such as a password), something you have
(such as a smart card), or something you are (such as a biometric factor). This is more
secure than authentication that uses only one factor, typically a password.
URL Uniform Resource Locator. The address of a computer, file, or resource that can be
accessed on a local network or the Internet. The URL is made up of the name of the
protocol needed to access the resource, a domain name that identifies a specific
computer on the Internet, and a hierarchical description of a file location on the
computer.
user ID See UID.
user name The long name for a user, sometimes referred to as the user’s real name.
See also short name.
Virtual Private Network See VPN.
volume A mountable allocation of storage that behaves, from the client’s perspective,
like a local hard disk, hard disk partition, or network volume. In Xsan, a volume consists
of one or more storage pools. See also logical disk.
VPN Virtual Private Network. A network that uses encryption and other technologies
to provide secure communications over a public network, typically the Internet. VPNs
are generally cheaper than real private networks using private lines, but they rely on
having the same encryption system at both ends. The encryption may be performed by
firewall software or by routers.224 Glossary
WAN Wide area network. A network maintained across geographically separated
facilities, as opposed to a LAN (local area network) within a facility. Your WAN interface
is usually the one connected to the Internet.
WebDAV Web-based Distributed Authoring and Versioning. A live authoring
environment that allows client users to check out webpages, make changes, and then
check the pages back in to the site while the site is running.
WebDAV realm A region of a website, usually a folder or directory, that’s defined to
provide access for WebDAV users and groups.
weblog See blog.
Weblog service The Mac OS X Server service that lets users and groups securely create
and use blogs. Weblog service uses Open Directory authentication to verify the identity
of blog authors and readers. If accessed using a website that’s SSL enabled, Weblog
service uses SSL encryption to further safeguard access to blogs.
wide area network See WAN.
wiki A website that allows users to collaboratively edit pages and easily access
previous pages using a web browser.
Windows Internet Naming Service See WINS.
WINS Windows Internet Naming Service. A name resolution service used by Windows
computers to match client names with IP addresses. A WINS server can be located on
the local network or externally on the Internet.
workgroup A set of users for whom you define preferences and privileges as a group.
Any preferences you define for a group are stored in the group account.
zone transfer The method by which zone data is replicated among authoritative DNS
servers. Slave DNS servers request zone transfers from their master servers to acquire
their data. 225
Index
Index
A
access
ACLs 57, 73
IP address restrictions 54
Keychain Access Utility 66
LDAP 21
remote installation 82
SACLs 73, 74
user 143, 146
See also permissions
accounts. See user accounts; Workgroup Manager
ACLs (access control lists) 57, 73
addresses. See IP addresses
Administer permission level 149
administrator 73, 74, 149
administrator computer 80, 136, 137
AFP (Apple Filing Protocol) service 22, 184
Apple Remote Desktop (ARD) 51, 142, 184
archiving server data 33, 36
ARD. See Apple Remote Desktop
asr tool 37, 85
authentication
Kerberos 21, 59, 60, 110
key-based SSH 71, 72
keychain services 156
MS-CHAPv2 108
Open Directory 59
overview 58
passwords 59, 76, 97
RADIUS 20, 22, 59, 155
SASL 59
Server Admin 40, 63, 138
single sign-on 60
standalone server 109
and TLS 56
users 58, 60, 72, 108
Workgroup Manager 151
See also certificates
authorization 58
See also authentication
B
backups
advanced configuration 19
command-line tools 37
critical files 155
media types 36
policy considerations 32, 36
rotation scheme 35
scheduling 34
server setup data 119
types 34
validation of 36
Berkeley Software Distribution. See BSD
broadcasting setup 133
BSD (Berkeley Software Distribution) 23
C
calendar service. See iCal service
Certificate Authority (CA)
creating 65
creating certificates from 67
distributing to clients 69
introduction 61
overview 62
requesting certificates from 63, 64, 65, 67
See also PKI
Certificate Manager 62, 68
certificates
creating 65, 67
deleting 69
editing 68
identities 62
importing 68
managing 68
overview 60, 61
preparing 64
private keys 61
public keys 61
renewing 70
requesting 64
root 65
self-signed 62, 65, 69226 Index
and Server Admin 62, 147
and services 70
Certificate Signing Request. See CSR
changeip tool 32
chat service. See iChat
client computers and NetBoot 28
clients
certificates 69
client-side logging 184
group accounts 152
and NetBoot 28
See also users
command-line tools
backup tools 37
daemon control 169
disk space monitoring 174
erasing disks 95
installing server software 101
partitioning disks 92
and permissions 149
restoration tools 37
server administration 49
computer lists 151, 152
computer name 107, 142
computers, administrator 80, 136, 137
computer-to-computer network 164
computer-to-switch network 165
computer-to-switch-pair network 165
concatenated RAID set 93
configuration
advanced 19, 20, 110
authentication 59
automatic 115, 121, 122, 125
batch setup for multiple servers 113
connecting to network 106, 164, 165
DHCP 81, 110
directory connection 109, 110
Ethernet 106
interactive 110, 111, 112, 113
introduction 18, 105
link aggregation 166
logs 129
Open Directory 107, 108, 109, 110, 121, 125, 130
postponing 105
providing files to servers 120, 121
remote server 111, 112, 113
sample setup 185
saving setup data 116, 117, 118, 119, 122, 125
server infrastructure 30
server types 18
services 129, 130, 131, 132, 133, 134, 155
settings overview 107
SSL 147
standalone server 108
status checking 128, 129
troubleshooting 128, 129
types of 105, 144
worksheet for 195
Console 173
CSR (Certificate Signing Request) 63, 64, 65, 67
D
daemons, overview 169
Darwin (core operating system) 23
Date & Time preferences 143
df tool 174
DHCP (Dynamic Host Configuration Protocol)
service 30, 81, 110
digital signature 147
directories. See directory services; domains, directory;
folders
Directory, overview 44, 45
directory services
advanced configuration 110
and automatic setup 118, 121, 125
directory domains 21, 81, 108, 110, 154
logs 183
planning of 27
See also Open Directory
Directory Utility 46
disk images
encrypting 57
installing with 28, 48, 85, 88
disks
command-line management of 92, 95, 174
erasing free space 95
installation preparation 89, 91, 92, 94, 95
mirroring 93
monitoring tools 173
partitions 84, 91, 92, 94, 95
quotas 28
See also RAID
diskspacemonitor tool 174
Disk Utility 57, 91, 94, 95
diskutil tool 92, 94, 95
ditto tool 37
DMZ, network 54
DNS (Domain Name System) service 30, 81
documentation 13, 14, 15
Domain Name System. See DNS
domains, directory 21, 81, 108, 110, 154
See also Open Directory
drives. See disks
du tool 174
DVDs, installation 84
Dynamic Host Configuration Protocol. See DHCP
E
email. See mail service
emond daemon 181
encryption 56, 57, 61, 119Index 227
See also SSL
Ethereal packet sniffing tool 175
Ethernet 55, 106, 166
exporting service settings 146
F
files
backup 32, 36, 155
configuration 182
full file-level copies 34
security 57, 58
setup data 116, 117, 118, 122
shared secret 61
storage considerations 28
file services 20, 22, 130, 131, 184
file sharing 131, 148
file systems
backing up 37
choosing 89
setup data 120
See also volumes
File Transfer Protocol. See FTP
FileVault 57
firewall service 54, 55, 81, 156
folders 27, 57, 142
FTP (File Transfer Protocol) service 22
full file-level copies 34
full image backup type 34
G
Gateway Setup Assistant 155
group accounts 152
groups 140, 146, 149, 151
Growl application 184
H
hardware requirements 17, 31, 79, 93
help, using 12
HFS+J volume 90
HFSX volume 90
historical data collection 171
home folders 27, 142
host name
changing 144
local 107, 142
I
iCal service 134, 156
iChat service 20, 134, 156
identity certificates. See certificates
images. See disk images; NetBoot; NetInstall
importing
certificates 68
service settings 146
incremental backups 34
infrastructure requirements 30
Inspector 154
installation
administrator computer 80
collecting information 79
command-line method 101
directory connections 81
with disk images 28, 48, 85, 88
disk preparation 89, 91, 92, 94, 95
from earlier OS versions 26, 28, 77, 80
host name changing 144
identifying servers 96
infrastructure requirements 30
integration strategy 29
interactive 97, 99, 100
multiple server 103
network services setup 81
overview 77
planning for 25, 26, 27, 28, 29
postponing setup after 105
remote access 80, 82, 96, 99
server installation disc 80
server software 81, 101
starting up for 81, 82, 84, 88
system requirements 79
updating 104
upgrading 104
installer tool 101, 103
IP addresses
access restriction 54
changing server 32, 143
and firewalls 81
overview 23
remote server installation 82, 96
servers on different subnets 111
IPv6 addressing 23
J
journaling, file system 90
K
KDC (Kerberos Key Distribution Center). See Kerberos
Kerberos 21, 59, 60, 110
key-based authentication 71, 72
Keychain Access Utility 66
keychain services 156
L
LACP (Link Aggregation Control Protocol) 164
launchctl tool 170
launchd daemon 37, 169
LDAP (Lightweight Directory Access Protocol)
service 21
LDAPv3 servers 59
link aggregation 163, 164, 165, 166, 167228 Index
Link Aggregation Control Protocol. See LACP
load balancing 168
local directory domain, standalone server 109
login, authenticating 70, 72
logs
monitoring 173, 181, 182, 183, 184
troubleshooting setup 129
web services 159
M
MAC (media access control) addresses 55, 96
Mac OS X
administration from 137, 155
installation considerations 80
upgrading from 104
Mac OS X Server
administrative tools 39
configuration 108
integration strategy 29
introduction 17, 18
supported standards 21
system requirements 17
and UNIX 23
See also configuration; installation
mail service 20, 22, 132, 155, 157
managed preferences, defining 152
media, streaming. See streaming media
migration 26, 28, 29
mirroring, disk 93
mobile accounts 142
Monitor permission level 149
MS-CHAPv2 authentication 108
MySQL service 158
N
Nagios application 184
NAT (Network Address Translation) 157
NetBoot service 28, 48, 88
NetInstall 48, 88
Network Address Translation. See NAT
Network File System. See NFS
network interfaces 142
networks
connection configurations 106, 164, 165
environment for installation 78
Ethernet 55, 106, 166
initial server setup connection 106
monitoring tools 174, 177, 178, 179, 180
security 54, 55, 56
network services
DHCP 30, 81, 110
DNS 30, 81
installation 81
NAT 157
NTP 142, 143
planning for 30
setup 133
VLAN 55
VPN 110
See also IP addresses
network time protocol. See NTP
NFS (Network File System) 22
notification system 46, 143, 156, 175, 180
See also logs
NTP (network time protocol) 142, 143
O
Open Directory
authentication 59
logs 183
overview 20
and SACLs 73
setup 107, 108, 109, 110, 121, 125, 130
Open Directory master 81
Open Directory replica 59, 110, 162
OpenLDAP 21
open source modules
Kerberos 21, 59, 60, 110
OpenLDAP 21
OpenSSL 56
PHP 158
See also Open Directory
OpenSSL 56
operating environment requirements 162
P
PackageMaker 48
packets, data, filtering of 54
partitions, disk 84, 91, 92, 94, 95
passwords 59, 76, 97
permissions
administrator 73, 149
files 57
folder 57
SACL 74
types 57
php configuration files 158
physical infrastructure requirements 30
PKI (public key infrastructure) 56, 60, 61
Podcast Producer 133
portable computers 142
Portable Operating System Interface. See POSIX
ports
Ethernet 106
list of 136
status of 136
TCP 70
POSIX (Portable Operating System Interface) 57
preferences 152
presets 152Index 229
print service 131
private key 61, 62
privileges, administrator 73, 149
See also permissions
PropertyListEditor 48
protocols
file service 22, 184
network service 30, 81, 110, 142, 143
overview 22
See also specific protocols
public key certificates. See certificates
public key cryptography 70
public key infrastructure. See PKI
Q
QuickTime Streaming Server (QTSS) 20, 49, 156
quotas, disk space 28
R
RADIUS (Remote Authentication Dial-In User
Service) 20, 22, 59, 155
RAID (Redundant Array of Independent Disks) 28,
92, 94
RAID Admin 173
real-time monitoring 171
Remote Authentication Dial-In User Service. See
RADIUS
remote servers
accessing 82
Apple Remote Desktop 51, 142, 184
configuration 111, 112, 113
identifying 96
installing from or to 80, 82, 96, 99
replication 59, 110, 162
requirements
hardware 17, 31, 79, 93
infrastructure 30
operating environment 162
software 79, 80
restart, automatic 161
restoration, data 32, 35
root certificate 65
rsync tool 37
S
SACLs (service access control lists) 73, 74
SASL (Simple Authentication and Security Layer) 59
Secure Empty Trash 58
secure SHell. See SSH
Secure Sockets Layer. See SSL
Secure VM 57
security
administrator 73
authorization 58
best practices 74
file 57, 58
firewall service 54, 55, 81, 156
installation 81
network 54, 55, 56
overview 53
physical 53
SASL 59
service level 73, 74
settings 147
SSH 70, 71, 72, 82, 83, 142, 156
SSL 56, 60, 61, 62, 147
TLS 56
See also access; authentication; certificates; SSL
self-signed certificates 62, 65, 69
serial number, server 83
Server Admin
access control 146
as administration tool 138, 139
authentication 40, 63, 138
certificates 62, 147
customizing 41
notification system 175
opening 40, 63, 138
overview 11, 39, 40, 63
server status 176
service management 145
and system imaging 48
Server Assistant 42, 99, 105, 110
Server Message Block protocol. See SMB
Server Monitor 46, 172
servers
adding 139
administration tools 39, 49, 50, 135, 138
basic settings 107, 141
groups of 140
infrastructure requirements 30
load balancing 168
reliability tools 159, 160, 161, 162, 163, 164, 166,
167
relocation considerations 31
removing 139
sample setup 185
serial numbers for 83
setup worksheet 195
standalone 107, 108, 109
startup 81, 88
status monitoring 171, 172, 173, 174, 175, 176
time 142, 143
troubleshooting 128, 129
See also configuration; installation; remote servers
Server Status Dashboard widget 172
service access control lists. See SACLs
services
access control 143, 146
exporting settings 146
importing settings 146230 Index
management of 155
planning for distribution of 27
security 70, 73, 74
setup 129, 130, 131, 132, 133, 134, 155
viewing 143, 145
See also specific services
setup procedures. See configuration; installation
shared directory domain 21, 108
shared secret files 61
share points 57, 148
Simple Network Management Protocol. See SNMP
single points of failure 159
single sign-on authentication 60
slapd daemon 184
SMB (Server Message Block) protocol 22
snapshots, data 34
SNMP (Simple Network Management Protocol)
definition 23
as monitoring tool 177, 178, 179, 180
settings 142
snmpd daemon 178
Software Update service 104, 133
srm UNIX utility 58
SSH (secure SHell host) 70, 71, 72, 82, 83, 142, 156
SSL (Secure Sockets Layer) 56, 60, 61, 62, 147
standalone server 107, 108, 109
standard configuration type 18
streaming media 20, 28, 49, 133, 156
striping 93
subnets 106, 111
syslog configuration file 182
syslogd daemon 181
System Image Utility 48
system imaging service 133
T
TCP (Transmission Control Protocol) 54, 70
tcpdump tool 175
Time Machine 37
time server 142, 143
TLS (Transport Layer Security) protocol 56
Transmission Control Protocol. See TCP
Transport Layer Security protocol. See TLS
troubleshooting server operation 128, 129
U
UDP (User Datagram Protocol) 54
UNIX 23
upgrading
from Mac OS X 104
from previous server versions 26, 28
vs. migration 26, 29
and saved setup data 116
UPS (uninterruptible power supply) 160, 161
user accounts
authentication 60
group 152
managed preferences 152
management of 151
mobile 142
passwords 59
setup 130
See also users
User Datagram Protocol. See UDP
users
access control 143, 146
administrative access for 73
authentication 58, 60, 72, 108
certificates 62
and Directory 44
disk space quotas 28
groups 146, 149, 151
home folders 27, 142
management of 151
permissions 149
Windows 28, 59
See also clients; user accounts; Workgroup
Manager
V
Virtual Private Network. See VPN
VLAN (virtual local area network) 55
VNC (virtual network computing) 79, 82, 100, 103
volumes
backing up 37
erasing 95
and partitioning 91, 92
RAID 93, 94
setup data 120
startup 82, 88
supported 90
VPN (Virtual Private Network) 110
W
weblog service 159
WebObjects Application Server 134
web services 20, 21, 132, 158
web technologies 22
wikis 159
Windows NT 29
Windows users 28, 59
workgroup configuration type 18
Workgroup Manager
administering accounts 151
administration overview 150
authentication 151
customizing 44, 154
opening 42, 151
overview 42, 43Index 231
X
Xgrid 2 service 20, 155
Xgrid Admin 50
Xsan 19
Xserve
hardware installation instructions 79
and Server Monitor 46
and server reliability 160, 161
VLAN support 55
Instructions de remplacement
Respectez scrupuleusement les instructions de ce document. À défaut, vous risquez de détériorer votre matériel et d’invalider
sa garantie.
Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/.
Avertissement : Durant cette procédure, mettez les petites pièces hors de portée des enfants.
Avertissement : Il existe des bords tranchants à l’intérieur de l’ordinateur. Soyez vigilant.
Outils requis
Le seul outil requis pour cette procédure est un tournevis cruciforme.
Ouverture de l’ordinateur
Avertissement : Éteignez systématiquement l’ordinateur avant de l’ouvrir afin d’éviter d’endommager ses composants internes et de vous blesser. Après extinction, les composants internes risquent d’être très chauds.
Attendez qu’ils refroidissent avant de poursuivre.
1. Placez l’ordinateur sur une surface propre et plane.
2. Si vous pensez que le mode Suspension d’activité est déclenché, appuyez sur le bouton d’alimentation en façade pour réactiver l’ordinateur.
3. Éteignez l’ordinateur et patientez cinq minutes avant de poursuivre.
4. Si vous avez installé un câble antivol, retirez-le.
5. Débranchez tous les autres câbles connectés à l’ordinateur, à l’exception du cordon d’alimentation.
1 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D
Lecteur Optique
AppleCare6. Touchez les caches métalliques des connecteurs PCI, à l’arrière de l’ordinateur. (Figure 1)
Important : Agissez toujours de même avant de toucher un élément ou d’installer un composant à l’intérieur de l’ordinateur. Pour éviter d’accumuler de l’électricité statique, ne vous déplacez pas dans la pièce avant d’avoir achevé l’installation et
refermé l’ordinateur.
7. Débranchez le cordon d’alimentation.
Avertissement : Ne branchez jamais le cordon d’alimentation et ne mettez jamais l’ordinateur sous tension
tant que les composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser. Assurez-vous que le cordon d’alimentation reste débranché jusqu’à la fin de la procédure, tant que l’ordinateur n’est pas refermé.
Avertissement : Le bloc d’alimentation de votre ordinateur est un composant haute tension à n’ouvrir sous
aucun prétexte, même lorsque l’ordinateur est éteint. S’il nécessite une intervention, contactez votre revendeur Apple ou votre Société de maintenance agréée Apple.
8. Soulevez le loquet situé sur le panneau latéral droit.
9. Abaissez délicatement le panneau latéral jusqu’à ce qu’il repose à plat. Afin de ne pas érafler le boîtier, prévoyez un linge
doux et propre.
Avertissement : Si des voyants sont allumés sur la carte mère, cela signifie que l’ordinateur n’est pas éteint.
Refermez le panneau d’accès latéral et éteignez l’ordinateur avant de poursuivre.
F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 2
Figure 1
Power Mac G4 (QuickSilver 2002) Power Mac G4 (Mirrored Drive Doors_FW 800)Dépose du Lecteur Optique sur les modèles QuickSilver
Avertissement : Manipulez le lecteur optique installé avec précaution. Tenez-le par ses deux côtés métalliques et
n’exercez aucune pression sur son centre. Il ne faut jamais lever ou tenir le lecteur par le panneau avant.
1. A l’aide d’un tournevis cruciforme, enlevez les quatre vis qui fixent le berceau du lecteur au châssis. (Figure 2)
2. Tout en tenant la base du berceau, faites-le coulisser vers l’arrière et tourner de façon à pouvoir accéder aux câbles du
lecteur. (Figure 3)
3 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D
Figure 2
Figure 33. Décollez soigneusement le ruban adhésif de la nappe de la partie supérieure du berceau. (Figure 4)
4. Déconnectez les câbles suivants, situés derrière les lecteurs CD/DVD/Zip :
• câble en nappe des lecteurs CD/DVD et Zip
• câble d’alimentation (P6) du lecteur CD/DVD
• câble d’alimentation (P7) du lecteur Zip
5. Sortez le berceau et les lecteurs de l’ordinateur.
6. Enlevez les quatre vis de fixation du berceau du lecteur CD/DVD. (Figure 5)
7. Sortez le lecteur du berceau en le faisant glisser.
F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 4
Figure 4
Figure 5Installation du Lecteur Optique dans les modèles QuickSilver
Avertissement : Manipulez le lecteur optique de remplacement avec précaution. Tenez-le par ses deux côtés
métallique et n’exercez aucune pression sur son centre. Il ne faut jamais lever ou tenir lecteur par le panneau
avant.
1. Placez le lecteur dans la baie supérieure du berceau, insérez les vis de l’ancien lecteur dans les trous du berceau, et vissez-les
afin de fixer le lecteur au berceau.
2. Connectez les câbles au lecteur Zip et au lecteur CD/DVD :
• le connecteur du milieu du faisceau d’alimentation au lecteur Zip.
• le connecteur du milieu de la nappe au lecteur Zip.
• l’extrémité du faisceau d’alimentation au lecteur CD/DVD.
• l’extrémité de la nappe au lecteur CD/DVD.
3. Recollez le ruban adhésif de la nappe sur la partie supérieure du berceau.
4. Insérez le berceau du lecteur dans l’ordinateur en vous assurant que les taquets de fixation situés sur le fond du berceau
s’encastrent dans les deux encoches de l’étagère du lecteur. (Figure 6)
5. Reinsérez les quatre vis de fixation que vous avez enlevées auparavant, puis vissez-les afin de fixer le berceau du lecteur au
châssis.
5 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D
Figure 6Dépose du Lecteur Optique sur les modèles Mirrored Drive Doors/FW 800
1. Retirez le cache arrière du berceau de lecteurs optiques en le faisant coulisser. (Figure 7)
2. Ôtez les deux vis fixant ce berceau au châssis. (Figure 8)
F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 6
Figure 8
Figure 73. Faites-le coulisser vers l’arrière et tourner de façon à pouvoir accéder aux câbles du ou des lecteurs de disques optiques.
4. Débranchez les câbles données et alimentation (P6 et P7) à l’arrière du ou des lecteurs optiques et extrayez le berceau de
l’ordinateur. (Figure 9)
5. Enlevez les quatre vis de fixation situées sur les côtés du berceau du lecteur.
6. Sortez le lecteur du berceau en le faisant coulisser vers l’avant. (Figure 10)
7 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D
Figure 9
Figure 10Installation du Lecteur Optique dans les modèles Mirrored Drive Doors/FW 800
1. Installez le lecteur optique de remplacement dans le berceau du lecteur optique.
Remarque : Avant de réinstaller ce berceau sur son support, assurez-vous que le faisceau de câbles d’alimentation passe
dans la goulotte prévue à cet effet sur le panneau latéral. (Figure 11)
Remarque : Tout en faisant coulisser le berceau sur son support, assurez-vous que le loquet situé sous le berceau s’enclenche dans l’encoche du support. (Figure 12)
F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 8
Figure 11
Figure 122. Connectez les câbles au lecteur optique. (Figure 13)
Remarque : Avant de réinstaller le cache arrière, assurez-vous que le bord supérieur de celui-ci s’adapte sur le bord
supérieur du berceau de lecteurs optiques. (Figure 14)
Attention : Veillez à ne pas écraser le câble d’alimentation entre le panneau et le berceau.
9 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D
Figure 13
Figure 14
Figure 14Fermeture de l’ordinateur
1. Vérifiez que vous avez réinstallé toutes les vis et que tous les câbles internes sont connectés.
2. Relevez le panneau d’accès latéral, soulevez le loquet et pressez le panneau contre le boîtier jusqu’à ce qu’il s’enclenche.
3. Rebranchez tous les câbles et faites démarrer l’ordinateur.
Avertissement : Ne mettez jamais l’ordinateur sous tension tant que ses composants internes et externes ne
sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager
l’ordinateur ou de vous blesser.
! Apple Computer, Inc.
© 2003 Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales
applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option - I) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, Mac, Macintosh et le logo Mac sont des marques d’Apple Computer Inc., déposées aux États-Unis et dans d’autres pays.
Power Mac est une marque d’Apple Computer, Inc.
F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 10
Instructions de Remplacement
Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le
bénéfice de sa garantie.
Le remplacement de la Carte AirPort nécessite sept étapes simples :
• Extinction de l'ordinateur.
• Ouverture de l'ordinateur.
• Extraction du radiateur.
• Enlèvement de la Carte AirPort installée, le cas échéant.
• Installation de la Carte AirPort de remplacement.
• Remise en place du radiateur.
• Fermeture de l'ordinateur.
Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/.
Outils Requis
• Tournevis plat de bijoutier
• Tournevis Phillips
Décharge d'Electricité Statique (DES)
L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge
d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager
les composants internes de votre ordinateur. Pour les éviter, ne vous déplacez pas dans la pièce pendant cette procédure et
suivez attentivement ces instructions.
Installation d'une Carte AirPort
Pour installer une Carte AirPort dans votre PowerBook, suivez ces étapes :
1. Placez votre ordinateur sur une surface propre et lisse.
2. Eteignez l'ordinateur, enlevez la batterie de sa baie d'extension et déconnectez l'adaptateur secteur, le modem et tout autre
câble connecté à l'ordinateur.
Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants
internes. Les composants internes de votre PowerBook peuvent être chauds.Si vous avez utilisé votre PowerBook, attendez
30 minutes après son extinction pour laisser les composants internes refroidir avant de poursuivre.
PowerBook FireWire - AirPort Card 1
Carte AirPort
¤
AppleCare3. Assurez-vous que les vis de blocage du clavier ne soient pas en position bloquée. Un nouveau PowerBook est livré clavier
débloqué. Par conséquent, à moins que vous ou quelqu'un d'autre n'ait bloqué le clavier, vous pouvez passer cette étape.
4. Libérez le clavier en le tirant vers le bas pour dégager ses attaches (situées à gauche des touches F1 et F9) jusqu'à ce que sa
partie haute se libère.
5. Soulevez la partie haute du clavier du PowerBook en direction de la rangée supérieure de touches et tirez-le en arrière suffisament loin pour libérer les petites attaches retenant l'arrière du clavier en place.
2 PowerBook FireWire - AirPort Card
¤6. Retournez le clavier et déposez-le sur le repose-mains.
7. Si votre Carte AirPort était livrée avec un adaptateur AirPort, enlevez le clip en métal et glissez la Carte AirPort hors de l'adaptateur. (L'adaptateur et le clip en métal ne sont d'aucune utilité dans votre PowerBook.)
8. Afin d'éviter les décharges d'électricité statique, touchez une surface métallique à l'intérieur de l'ordinateur.
Important : Pour éviter les décharges d'électricité statique, raccordez-vous toujours à la terre en touchant une surface
métallique avant de toucher un composant interne de votre ordinateur ou d'y installer un nouveau composant. Afin d'éviter
de vous recharger en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé
l'ordinateur.
9. A l'aide d'un tournevis Phillips, enlevez les vis de fixation du radiateur interne.
PowerBook FireWire - AirPort Card 3
AirPort Card
AirPort Adapter
Metal Clip
Screws
Heat Shield
AirPort Card : Carte AirPort
AirPort Adapter : Adaptateur AirPort
Metal Clip : Clip en Métal
Screws : Vis
Heat Shield : Radiateur10. Enlevez le radiateur interne.
11. Positionnez la Carte AirPort Card (numéro ID AirPort et code barre face à vous) et branchez la Carte AirPort à l'extrémité du
câble d'antenne. Assurez-vous que le connecteur à l'extrémité du câble d'antenne est droit avant de l'insérer dans la carte.
12. Glissez la carte dans le connecteur situé juste au dessus du connecteur pour PC Card. Assurez-vous de glisser la carte sur
toute sa longueur jusqu'à ce que vous sentiez qu'elle est correctement fixée au connecteur.
Remarque : Quand vous insérerez la Carte AirPort, vous devrez peut-être la plier sous l'ouverture du réceptacle en plastique (à l'endroit où est fixée la partie supérieure du clavier). Cette procédure simplifie l'alignement de la carte dans le connecteur et empêche l'extrémité de la carte de bouger après son insertion.
4 PowerBook FireWire - AirPort Card
AirPort Card
AirPort Antenna Cable
AirPort Card Connector
AirPort Card
AirPort Card
Connector
AirPort Card
AirPort Card Connector : Connecteur Carte AirPort
AirPort Card : Carte AirPort
AirPort Antenna Cable : Câble d’Antenne Carte AirPort
AirPort Card : Carte AirPort
AirPort Card Connector : Connecteur Carte AirPort13. Remmetez le radiateur en place et fixez les vis.
Note : Lorsque vous remmetez le radiateur en place, assurez-vous qu'il ne recouvre pas les attaches en plastique du disque
dur et de la Carte AirPort. L'attache en plastique du module processeur doit pas être placée dessous du radiateur.
14. Remettez le clavier à l'endroit et insérez les petites attaches de l'arrière du clavier dans les ouvertures du boîtier du
PowerBook.
15. Tirez vers le bas les attaches de dégagement du clavier (situées à gauches des touches F1 et F9) et poussez vers le bas la
partie supérieure du clavier.
PowerBook FireWire - AirPort Card 5
Screws
Hard Disk Tab
AirPort Card Tab
Heat Shield
Processor
Module Tab
Heat Shield : Radiateur
Screws : Vis
AirPort Card Tab : Attache Carte AirPort
Hard Disk Tab : Attache Disque Dur
Processor Module Tab : Attache Module Processeur16. Laissez s'enclencher les attaches de libération du clavier pour qu'il se mette bien en place. Réinstallez la batterie du
PowerBook ou branchez l'adaptateur secteur.
Attention : N'allumez jamais l'ordinateur avant que tous ses composants internes et externes soient en place
et que l'ordinateur soit correctement refermé. L'utilisation d'un ordinateur ouvert ou incomplet peut l'endommager et occasionner des blessures.
17. Redémarrez l'ordinateur.
Apple Computer, Inc.
© 2002 Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales
applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, FireWire et PowerBook sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays.
6 PowerBook FireWire - AirPort Card
File Name:
Job Number:
Description:
034-4989-A_N82REV_inbox_sm_v5.indd
PKG-09-0194
N82REV In-box
Trim: Version:
Live:
Bleed:
Scale:
Fonts:
630mm x 116mm flat
n/a
n/a
1:1 (output at 100%)
Myriad Set
NOTES: •keylines/fold marks do NOT print
•built at 100%
•cyan type: 100% Cyan
•red rings: 100% Magenta and 100% Yellow
•black type: 100K
•art: 4/c; fpo 5
Inks: 4/0 CMYK
Studio Designer:
Buddy Check (QC):
Graphic Designer:
GD Editor:
Writer:
Dan Talbert
Leslie Brugal
Yoo Lee
Teri Thomas
Project Manager:
Traffic Manager:
Production Manager:
Creative Director:
Caelan Stack
Dan Cohen
Kay Maston
Jamie Roberts
Project Manager:
Product Manager:
Marcom Editor:
Legal:
Evelyn Seto
Teri Thomas
Printout Scale: 100%
Apple Computer 1 Infinite Loop Cupertino, CA 95014 phone: 408 974-1361 Date: 4/8/9
Marcom
Date Initials OK ’s Date Initials OK ’s Date Initials OK ’s
Apple Confidential
Finger Tips
Start Here
Welcome to iPhone. This Quick Start guide
tells you how to set up your iPhone and
use its key features. Once you’re up and
calling, you can learn even more about
iPhone at www.apple.com/iphone.
Ready, set up, go.
1. Download iTunes.
Go to www.itunes.com/download and
download the latest version of iTunes to
install on your Mac or PC.
2. Connect to your computer.
Connect your iPhone to the USB port on
your computer.
3. Sync.
When iPhone is connected, iTunes opens and
guides you through setup. Select the contacts,
calendars, music, videos, and photos you’d
like to sync, then click Apply in the lower-right
corner. If you’re new to iTunes or syncing, you
can watch a quick tutorial at www.apple.com/
itunes/tutorials.
Make a call.
Tap a phone number in Contacts, Favorites,
an email, a text message, or almost anywhere
in iPhone to make a call. Or tap the Keypad
button to dial manually. To answer a call while
using the iPhone headset, press the center
button once. Press it again to end your call.
Magnify to edit text.
Tap the text you want to edit. To reposition the
insertion point, touch and hold to bring up the
magnifying glass. Slide your finger to move the
insertion point, then edit using the keyboard.
Send messages.
Tap the Messages icon. Type a name or phone
number in the To field or select someone
from your contacts. Write your message, then
tap Send. To send photos, tap the Camera
button. To delete or forward all or part of
a message, tap Edit. To remove an entire
conversation from your Messages list, swipe
your finger across it, then tap Delete.
Setting up email.
To set up an email account directly on your
iPhone, tap Add Account in Mail Settings.
Then tap the account type you have, or tap
Other to configure most any POP3 or IMAP
account. Email account settings can also be
synced from your Mac or PC using iTunes.
Button basics.
To turn iPhone on, firmly press the On/Off
button. To turn off or restart iPhone, hold
down the On/Off button, then slide to confirm.
To put iPhone in sleep mode, press the On/Off
button once. This turns off the screen but
still allows iPhone to receive calls. To silence
an incoming call, press once. To send a call
directly to voicemail, press twice.
Go Home.
When using an application, press the Home
button to close it and return to the Home
screen. Press the Home button again to jump
to your main Home screen. While on a call,
you can access your email, calendar, or other
applications, and even surf the web when
you’re connected via Wi-Fi or 3G. Double-click
the Home button anytime to go to Favorites.
Double-click in sleep mode to bring up
iPod controls.
Intelligent keyboard.
iPhone automatically corrects and suggests
words as you type. So if you tap a wrong letter,
just keep typing. To accept the suggested
word, tap the space bar. Tap the “x” to dismiss
the suggested word. The keyboard learns the
words you type. It also inserts apostrophes
into contractions for you. To switch to the
number and symbol keyboard, tap the “.?123”
key. Tap the space bar twice to add a period.
Cut, copy, and paste.
When typing, double-tap a word to select it.
Drag the grab points to select more or less
text, then tap to cut, copy, or paste. To copy
text from web pages, email, or text messages,
touch and hold to select the text. To undo an
edit, shake iPhone, then tap the Undo button.
Ring/Silent
Volume
Up/Down
On/Off
Sleep/Wake
Status bar
HomeThe Duchess is available on iTunes. © 2008 Paramount Vantage, a division of
Paramount Pictures. All rights reserved.
Google, the Google logo, and Google Maps are trademarks of Google Inc.
Tele Atlas® Map data © 2009. All rights reserved.
Google, the Google logo, and Google Maps are trademarks of Google Inc.
Tele Atlas® Map data © 2009. All rights reserved.
© 2009 Apple Inc. All rights reserved. Apple, Cover Flow, iPod,
iTunes, Mac, and Safari are trademarks of Apple Inc., registered
in the U.S. and other countries. iPhone and Spotlight are
trademarks of Apple Inc. App Store is a service mark of
Apple Inc. Other product and company names mentioned
herein may be trademarks of their respective companies.
Designed by Apple in California. Printed in China. 034-4989-A
See the web up close.
Double-tap any element on a web page—
picture or text—to zoom in. Double-tap again
to zoom back out. Tap the Multi-page button
to flick between multiple web pages or open
a new one. Rotate iPhone to see the web
in widescreen.
Find location. Search surroundings.
To see where you are on a map, tap the
Location button. A blue circle or dot appears
at your current position. Find places around
you by typing words like “Starbucks” or “pizza”
in the search field. Double-tap to zoom in.
Tap once with two fingers to zoom out.
Video and song controls.
Tap the screen to bring up onscreen controls.
Tap again to hide them. Double-tapping
a movie switches between widescreen and
full screen. When listening to music with the
wired headset, press the center button once
to pause or play, and press it twice quickly
to skip to the next song.
Learn more.
You can watch demos and learn even more
about iPhone features at www.apple.com/
iphone.
To read the iPhone User Guide on your
iPhone, go to help.apple.com/iphone or
the Safari bookmarks. For downloadable
versions of the iPhone User Guide and
Important Product Information Guide,
visit www.apple.com/support/iphone.
Get support.
Visit www.att.com/WirelessHelp for
technical support on network-related
services, including Visual Voicemail and
billing. Visit www.apple.com/support/
iphone for technical support on iPhone
and iTunes.
Browse your music in Cover Flow.
Rotate iPhone to flick through your album art
in Cover Flow. Tap any album to see its track
list, then tap any track to play it. Tap outside
the track list to flip back to the album artwork.
Search with Spotlight.
To use Spotlight search, go to the main Home
screen and press the Home button or swipe
the screen from left to right. Type in what you’d
like to find—a name, keywords, song, artist,
or movie title. iPhone offers suggestions as you
type to make searching even faster. To search
within an application like Mail, Contacts,
or iPod, tap the status bar.
Get directions.
In Maps, tap Directions, then enter start and
end points. You can use your current location,
type in an address, or select an address from
your contacts or bookmarked locations. Tap
Route to display driving directions. Tap the
Walk button for walking directions or the
Bus button to view transit routes and times.
iPhone can track and show your progress
along whichever route you take.
View photos.
Load your favorite photos onto iPhone from
your computer using iTunes or use the built-in
camera to take pictures. Flick right or left to
move between images. Double-tap or pinch
to zoom. Tap once to bring up the onscreen
controls. Tap the Action button to send a
photo in an MMS or email, use it as wallpaper,
or assign it to a contact.
Access the App Store.
Tap the App Store icon to wirelessly browse
tens of thousands of applications in categories
like games, business, travel, social networking,
and more. Browse by Featured, Categories,
or Top 25 or search by name. To purchase and
download an application directly to your iPhone,
tap Buy Now. Many applications are even free.
F
Instructions de Remplacement
Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le
bénéfice de sa garantie.
Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/.
Attention : Durant cette opération, veillez à laisser les petites pièces hors de portée des enfants.
Outils Requis
• Tournevis Torx T10
• Chiffon doux ou serviette
Décharge d'Electricité Statique (DES)
L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge
d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager
les composants internes de votre ordinateur. Pour les éviter, suivez attentivement ces instructions.
Enlèvement de la Partie Centrale de l'Ordinateur du Boîtier
Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants
internes ou de vous blesser. Après avoir éteint votre ordinateur, ses composants internes peuvent être chauds.
Laissez l’ordinateur refroidir avant de poursuivre.
1. Placez votre ordinateur sur une surface propre et lisse.
2. Eteignez votre ordinateur en déroulant le menu Spécial et en choisissant Eteindre. Attendez ensuite cinq minutes afin que
les composants internes refroidissent.
3. Débranchez tous les câbles reliés à votre ordinateur à l'exception du cordon d'alimentation.
Remarque : Si vous n'avez jamais branché votre ordinateur, branchez-le sur secteur à l'aide du cordon d'alimentation.
4. Déposez l'ordinateur sur le côté sur un chiffon propre et doux et raccordez-vous à la terre en touchant la barre métallique se
situant entre les ports vidéo. (Figure 1)
Important : Afin d'éviter toute décharge d'électricité statique, raccordez-vous toujours à la terre en touchant la barre
métallique avant d'accéder à tout composant interne de votre ordinateur ou d'y installer un composant externe. Pour ne pas
recharger votre corps en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé l'ordinateur.
F073-0842 Rev. A G4 Cube - Top Plate Assembly 1
Couvercle
AppleCare5. Débranchez le cordon d'alimentation.
6. Retournez l'ordinateur à l'envers et poussez le loquet vers le bas pour le libérer. Déployez complètement le loquet. (Figure
2)
7. Enlevez doucement la partie centrale de l'ordinateur de son boîtier et placez-la sur un chiffon doux. (Figure 3)
2 G4 Cube - Top Plate Assembly F073-0842 Rev. A
Touch
Bare
Metal
Latch Extended Latch
Core
Enclosure
Touch Bare Metal : Touchez Barre Métallique
Latch : Loquet
Extended Latch : Loquet Déployé
Core : Partie Centrale
Enclosure : Boîtier
Figure 1
Figure 2
Figure 3Dépose du couvercle
1. Appuyez sur le loquet et renversez le bloc central de sorte que le bouton d'alimentation se trouve en haut.
2. Enlevez les quatre vis d'angle qui permettent de fixer le couvercle sur les quatre montants verticaux.
3. Enlevez les quatre vis situées sur les deux côtés. (Les deux vis alignées avec les plaques verticales sont bien plus longues que
les autres.) (Figure 4)
4. Soulevez le couvercle de la diode qui se trouve sur le témoin lumineux d'alimentation. Conservez-le en vue de le réinsérer
ultérieurement sur le couvercle de rechange. (Figure 5)
F073-0842 Rev. A G4 Cube - Top Plate Assembly 3
Figure 4
Figure 5
Long Screws : Vis longues
LED Cover : Couvercle de la diode5. Soulevez le couvercle avec précaution et débranchez le connecteur à détrompage ( J1 sur la carte logique). (Figure 6)
Installation du couvercle de rechange
1. Avec le couvercle dans une main, connectez le câble branché dessus au connecteur J1 sur la carte logique. (Figure 7)
Avertissement : Pour éviter d'endommager la carte d'alimentation, assurez-vous que le connecteur à détrompage rentre
parfaitement dans le connecteur J1, comme illustré.
2. Replacez le couvercle de diode sur le témoin lumineux d'alimentation qui se trouve sur le couvercle de rechange.
4 G4 Cube - Top Plate Assembly F073-0842 Rev. A
Figure 6
Figure 7
Top Plate Assembly : Couvercle
J1 at Logic Board : J1 sur la carte logique
Keyed Side of Connector : Phase du connecteur comportant le détrompeur 3. Placez le couvercle sur le bloc central de l'ordinateur. Assurez-vous que les quatre languettes métalliques sont alignées avec
les quatre trous du couvercle, et que le panneau du DVD-ROM est parfaitement inséré sous le bord. (Figure 8)
4. En commençant par les quatre vis d'angle, fixez le couvercle sur le bloc central à l'aide des huit vis.
Réinsertion du bloc central de l'ordinateur dans le nouveau boîtier
1. Assurez-vous que le joint plat du bouton d'alimentation est correctement inséré dans l'encastrement du boîtier prévu à cet
effet. (Figure 9)
F073-0842 Rev. A G4 Cube - Top Plate Assembly 5
Figure 8
Figure 9
Top Plate : Couvercle
Slots : Logements
Panel : Panneau
Gasket : Joint plat 2. Tenez la partie centrale par le loquet et insérez-la dans le boîtier. (Figure 10)
Remarque : La partie centrale ne peut se placer dans le boîtier que d'une seule façon. Positionnez la partie centrale de
façon à ce que les ports soient en regard de l'arrière du boîtier.
3. Tenez votre main à plat et poussez le loquet vers le bas jusqu'à ce qu'il se bloque en position. Appuyez ferment sur la partie
centrale pour vous assurer qu'elle est parfaitement en place dans le boîtier. (Figure 11)
Important : Il est déconseillé de soulever ou de déplacer votre ordinateur en le tenant par le loquet. Le boîtier pourrait se
séparer de la partie centrale et s'endommager.
4. Remettez votre ordinateur à l'endroit et reconnectez tous les câbles.
5. Redémarrez votre ordinateur.
Attention : N'allumez jamais votre ordinateur avant que tous ses composants internes et externes ne soient en
place et qu'il soit fermé. Le fait d'utiliser un ordinateur qui est ouvert ou ne comprenant pas l'ensemble de
ses composants peut l'endommager et occasionner des blessures.
6 G4 Cube - Top Plate Assembly F073-0842 Rev. A
Core
Enclosure
Core : Partie Centrale
Enclosure : Boîtier
Figure 10
Latch
Latch : Loquet
Figure 11 Apple Computer, Inc.
© 2001Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales
applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, AirPort et Power Mac sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays.
F073-0842 Rev. A G4 Cube - Top Plate Assembly 7
F
Instructions de Remplacement
Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le
bénéfice de sa garantie.
Le remplacement de la pile nécessite cinq étapes simples :
• Extinction de l'ordinateur.
• Extraction de la partie centrale du boîtier.
• Enlevez la pile installée.
• Installez la pile de remplacement.
• Réinsertion de la partie centrale de l'ordinateur dans le boîtier.
Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/.
Outils Requis
Aucun outil n'est requis pour cette procédure.
Décharge d'Electricité Statique (DES)
L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une
décharge d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent
endommager les composants internes de votre ordinateur. Pour les éviter, suivez attentivement ces instructions.
Enlèvement de la Partie Centrale de l'Ordinateur du Boîtier
Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants internes.
1. Placez votre ordinateur sur une surface propre et lisse.
2. Eteignez votre ordinateur en déroulant le menu Spécial et en choisissant Eteindre. Attendez ensuite cinq minutes afin que
les composants internes refroidissent.
3. Débranchez tous les câbles reliés à votre ordinateur à l'exception du cordon d'alimentation.
Remarque : Si vous n'avez jamais branché votre ordinateur, branchez-le sur secteur à l'aide du cordon d'alimentation.
4. Déposez l'ordinateur sur le côté sur un chiffon propre et doux et raccordez-vous à la terre en touchant la barre métallique
se situant entre les ports vidéo.
Important : Afin d'éviter toute décharge d'électricité statique, raccordez-vous toujours à la terre en touchant la barre
métallique avant d'accéder à tout composant interne de votre ordinateur ou d'y installer un composant externe. Pour ne pas
recharger votre corps en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé l'ordinateur.
F073-0542 G4 Cube - Battery 1
Pile
AppleCare5. Débranchez le cordon d'alimentation.
6. Retournez l'ordinateur à l'envers et poussez le loquet vers le bas pour le libérer. Déployez complètement le loquet.
7. Enlevez doucement la partie centrale de l'ordinateur de son boîtier et placez-la sur un chiffon doux.
2 G4 Cube - Battery F073-0542
Touch
Bare
Metal
Latch Extended Latch
Core
Enclosure
Touch Bare Metal : Touchez Barre Métallique
Latch : Loquet
Extended Latch : Loquet Déployé
Core : Partie Centrale
Enclosure : BoîtierRemplacement de la Pile
1. Notez l'orientation de la borne positive (+) de la pile installée. (Les signes positif et négatif peuvent également être marqués sur le réceptacle de la pile.)
2. Placez votre doigt entre la borne positive de la pile et son réceptacle. Tirez doucement la pile hors de son réceptacle puis
de l'ordinateur.
Attention : Les piles contiennent des produits chimiques pouvant porter préjudice à l'environnement. Merci de vou débarrasser des piles usagées selon la législation locale en vigueur.
3. Insérez la nouvelle pile dans le réceptacle, en vous assurant que ses bornes positive et négative soient en phase par rapport à celles du réceptacle.
Attention : Une installation inappropriée de la pile peut causer une explosion. Assurez-vous que les bornes
positive et négative soient correctement orientées dans le réceptacle. Utilisez uniquement la pile fournie dans
ce kit.
Replacer la Partie Centrale dans le Boîtier
1. Tenez la partie centrale par le loquet et insérez-la dans le boîtier.
Remarque : La partie centrale ne peut se placer dans le boîtier que d'une seule façon. Positionnez la partie centrale de
façon à ce que les ports soient en regard de l'arrière du boîtier.
F073-0542 G4 Cube - Battery 3
Battery
Positive End
Core
Enclosure
Core : Partie Centrale
Enclosure : Boîtier
Positive End : Borne Positive
Battery : Batterie2. Tenez votre main à plat et poussez le loquet vers le bas jusqu'à ce qu'il se bloque en position. Appuyez ferment sur la partie centrale pour vous assurer qu'elle est parfaitement en place dans le boîtier.
Important : Il est déconseillé de soulever ou de déplacer votre ordinateur en le tenant par le loquet. Le boîtier pourrait se
séparer de la partie centrale et s'endommager.
3. Remettez votre ordinateur à l'endroit et reconnectez tous les câbles.
4. Redémarrez votre ordinateur.
Attention : N'allumez jamais votre ordinateur avant que tous ses composants internes et externes ne soient en
place et qu'il soit fermé. Le fait d'utiliser un ordinateur qui est ouvert ou ne comprenant pas l'ensemble de
ses composants peut l'endommager et occasionner des blessures.
Réinitialisation de la Date et de l'Heure
Le remplacement de la pile modifie les réglages de la date et de l'heure de votre ordinateur. Utilisez le tableau de bord Date
& Heure pour régler la date et l'heure.
Apple Computer, Inc.
© 2001Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions intern
tionales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement
écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des
fins commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impre
sion.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, AirPort et Power Mac sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays.
4 G4 Cube - Battery F073-0542
Latch
Latch : Loquet
F
Instructions de Remplacement
Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le
bénéfice de sa garantie.
Le changement du boîtier de l'ordinateur s'effectue en trois temps :
• Extinction de l'ordinateur.
• Extraction de la partie centrale du boîtier.
• Réinsertion du bloc central de l'ordinateur dans le nouveau boîtier.
Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/.
Outils Requis
Aucun outil n'est requis pour cette procédure.
Décharge d'Electricité Statique (DES)
L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge
d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager
les composants internes de votre ordinateur. Pour les éviter, suivez attentivement ces instructions.
Enlèvement de la Partie Centrale de l'Ordinateur du Boîtier
Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants internes.
1. Placez votre ordinateur sur une surface propre et lisse.
2. Eteignez votre ordinateur en déroulant le menu Spécial et en choisissant Eteindre. Attendez ensuite cinq minutes afin que
les composants internes refroidissent.
3. Débranchez tous les câbles reliés à votre ordinateur à l'exception du cordon d'alimentation.
Remarque : Si vous n'avez jamais branché votre ordinateur, branchez-le sur secteur à l'aide du cordon d'alimentation.
4. Déposez l'ordinateur sur le côté sur un chiffon propre et doux et raccordez-vous à la terre en touchant la barre métallique se
situant entre les ports vidéo.
Important : Afin d'éviter toute décharge d'électricité statique, raccordez-vous toujours à la terre en touchant la barre
métallique avant d'accéder à tout composant interne de votre ordinateur ou d'y installer un composant externe. Pour ne pas
recharger votre corps en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé l'ordinateur.
F073-0545 G4 Cube - Computer Enclosure 1
Boîtier de l'ordinateur
AppleCare5. Débranchez le cordon d'alimentation.
6. Retournez l'ordinateur à l'envers et poussez le loquet vers le bas pour le libérer. Déployez complètement le loquet.
7. Enlevez doucement la partie centrale de l'ordinateur de son boîtier et placez-la sur un chiffon doux.
2 G4 Cube - Computer Enclosure F073-0545
Touch
Bare
Metal
Latch Extended Latch
Core
Enclosure
Touch Bare Metal : Touchez Barre Métallique
Latch : Loquet
Extended Latch : Loquet Déployé
Core : Partie Centrale
Enclosure : BoîtierRéinsertion du bloc central de l'ordinateur dans le nouveau boîtier
1. Tenez la partie centrale par le loquet et insérez-la dans le boîtier.
Remarque : La partie centrale ne peut se placer dans le boîtier que d'une seule façon. Positionnez la partie centrale de
façon à ce que les ports soient en regard de l'arrière du boîtier.
2. Tenez votre main à plat et poussez le loquet vers le bas jusqu'à ce qu'il se bloque en position. Appuyez ferment sur la partie
centrale pour vous assurer qu'elle est parfaitement en place dans le boîtier.
Important : Il est déconseillé de soulever ou de déplacer votre ordinateur en le tenant par le loquet. Le boîtier pourrait se
séparer de la partie centrale et s'endommager.
3. Remettez votre ordinateur à l'endroit et reconnectez tous les câbles.
4. Redémarrez votre ordinateur.
Attention : N'allumez jamais votre ordinateur avant que tous ses composants internes et externes ne soient en
place et qu'il soit fermé. Le fait d'utiliser un ordinateur qui est ouvert ou ne comprenant pas l'ensemble de
ses composants peut l'endommager et occasionner des blessures.
F073-0545 G4 Cube - Computer Enclosure 3
Core
Enclosure
Core : Partie Centrale
Enclosure : Boîtier
Latch
Latch : Loquet Apple Computer, Inc.
© 2001Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales
applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, AirPort et Power Mac sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays.
4 G4 Cube - Computer Enclosure F073-0545
Instructions de Remplacement
Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le
bénéfice de sa garantie.
Outils Requis
• Tournevis cruciforme.
Décharge d'Electricité Statique (DES)
L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge
d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager
les composants internes de votre ordinateur. Pour les éviter, ne vous déplacez pas dans la pièce pendant cette procédure et
suivez attentivement les instructions concernant la décharge d'électricité statique.
Enlèvement du Clavier Installé
1. Placez votre ordinateur sur une surface propre et lisse.
2. Eteignez l'ordinateur, enlevez les modules des baies d’extension et déconnectez l'adaptateur secteur.
Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants
internes.
Les composants internes de votre PowerBook peuvent être chauds. Si vous avez utilisé votre PowerBook, attendez 30
minutes après son extinction pour laisser les composants internes refroidir avant de poursuivre.
3. Assurez-vous que les vis de blocage du clavier ne soient pas en position bloquée. Un nouveau PowerBook est livré clavier
débloqué. Par conséquent, à moins que vous ou quelqu'un d'autre n'ait bloqué le clavier, vous pouvez passer cette étape.
E081-1244 Rev. A PowerBook (Firewire) - Backup Battery 1
Pile Interne
AppleCare4. Libérez le clavier en le tirant vers le bas pour dégager ses attaches (situées à gauche des touches F1 et F9) jusqu'à ce que sa
partie haute se libère.
5. Soulevez la partie haute du clavier du PowerBook en direction de la rangée supérieure de touches et tirez-le en arrière
suffisamment loin pour libérer les petites attaches retenant l'arrière du clavier en place.
6. Retournez le clavier et déposez-le sur le repose-mains.
7. Afin d'éviter les décharges d'électricité statique, touchez une surface métallique à l'intérieur de l'ordinateur.
8. Déconnectez la pile interne de la carte mère et sortez-la de son emplacement.
2 PowerBook (Firewire) - Backup Battery E081-1244 Rev. AInstallation de la Pile Interne de Remplacement
1. Insérez la pile interne dans son emplacement et connectez-la à la carte mère.
2. Remettez le clavier à l'endroit et insérez les petites attaches de l'arrière du clavier dans les ouvertures du boîtier du PowerBook.
3. Tirez vers le bas les attaches de dégagement du clavier (situées à gauches des touches F1 et F9) et poussez vers le bas la partie supérieure du clavier.
4. Laissez s'enclencher les attaches de libération du clavier pour qu'il se mette bien en place.
5. Réinstallez la batterie du PowerBook ou branchez l'adaptateur secteur.
Attention : N'allumez jamais l'ordinateur avant que tous ses composants internes et externes soient en place
et que l'ordinateur soit correctement refermé. L'utilisation d'un ordinateur ouvert ou incomplet peut
l'endommager et occasionner des blessures.
6. Redémarrez l'ordinateur.
Apple Computer, Inc.
© 2002 Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales
applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, FireWire et PowerBook sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays.
E081-1244 Rev. A PowerBook (Firewire) - Backup Battery 3
Instructions de remplacement
Respectez scrupuleusement les instructions de ce document. À défaut, vous risquez de détériorer votre matériel et d’invalider
sa garantie.
Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/.
Avertissement : Durant cette procédure, mettez les petites pièces hors de portée des enfants.
Avertissement : Il existe des bords tranchants à l’intérieur de l’ordinateur. Soyez vigilant.
Outils requis
Aucun outil n’est requis pour cette procédure.
Ouverture de l’ordinateur
Avertissement : Éteignez systématiquement l’ordinateur avant de l’ouvrir afin d’éviter d’endommager ses composants internes et de vous blesser. Après extinction, les composants internes risquent d’être très chauds.
Attendez qu’ils refroidissent avant de poursuivre.
1. Placez l’ordinateur sur une surface propre et plane.
2. Si vous pensez que le mode Suspension d’activité est déclenché, appuyez sur le bouton d’alimentation en façade pour réactiver l’ordinateur.
3. Éteignez l’ordinateur et patientez cinq minutes avant de poursuivre.
4. Si vous avez installé un câble antivol, retirez-le.
5. Débranchez tous les autres câbles connectés à l’ordinateur, à l’exception du cordon d’alimentation.
1 Power Mac G4 (QuickSilver 2002) - ATA Cable F073-0566 Rev. B
Cable ATA
AppleCare6. Touchez les caches métalliques des connecteurs PCI, à l’arrière de l’ordinateur. (Figure 1)
Important : Agissez toujours de même avant de toucher un élément ou d’installer un composant à l’intérieur de l’ordinateur. Pour éviter d’accumuler de l’électricité statique, ne vous déplacez pas dans la pièce avant d’avoir achevé l’installation et
refermé l’ordinateur.
7. Débranchez le cordon d’alimentation.
Avertissement : Ne branchez jamais le cordon d’alimentation et ne mettez jamais l’ordinateur sous tension
tant que les composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser. Assurez-vous que le cordon d’alimentation reste débranché jusqu’à la fin de la procédure, tant que l’ordinateur n’est pas refermé.
Avertissement : Le bloc d’alimentation de votre ordinateur est un composant haute tension à n’ouvrir sous
aucun prétexte, même lorsque l’ordinateur est éteint. S’il nécessite une intervention, contactez votre revendeur Apple ou votre Société de maintenance agréée Apple.
8. Soulevez le loquet situé sur le panneau latéral droit.
9. Abaissez délicatement le panneau latéral jusqu’à ce qu’il repose à plat. Afin de ne pas érafler le boîtier, prévoyez un linge
doux et propre.
Avertissement : Si des voyants sont allumés sur la carte mère, cela signifie que l’ordinateur n’est pas éteint.
Refermez le panneau d’accès latéral et éteignez l’ordinateur avant de poursuivre.
F073-0566 Rev. B Power Mac G4 (QuickSilver 2002) - ATA Cable 2
Figure 1Enlèvement du câble ATA
1. Déconnectez le câble ATA de la carte mère. (Figure 2A)
2. Déconnectez le câble ATA du disque dur (Figure 2B) et enlevez le câble de l’ordinateur.
Remarque : Débarrassez-vous de ce câble ; ne le retournez pas à Apple.
Installation du câble ATA de remplacement
1. Connectez le câble ATA de remplacement au disque dur.
Remarque : Si vous connectez le câble à deux disques installés dans le berceau, fixez le connecteur situé à l’extrémité du
câble sur le disque du bas.
2. Connectez l’autre extrémité du câble ATA à la carte mère.
3 Power Mac G4 (QuickSilver 2002) - ATA Cable F073-0566 Rev. B
A
B
Figure 2Fermeture de l’ordinateur
1. Relevez le panneau d’accès latéral, soulevez le loquet et pressez le panneau contre le boîtier jusqu’à ce qu’il s’enclenche.
2. Rebranchez tous les câbles et faites démarrer l’ordinateur.
Avertissement : Ne mettez jamais l’ordinateur sous tension tant que ses composants internes et externes ne
sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager
l’ordinateur ou de vous blesser.
Apple Computer, Inc.
© 2002 Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales
applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option - I) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, Mac, Macintosh et le logo Mac sont des marques d’Apple Computer Inc., déposées aux États-Unis et dans d’autres pays.
Power Mac est une marque d’Apple Computer, Inc.
F073-0566 Rev. B Power Mac G4 (QuickSilver 2002) - ATA Cable 4
Instructions de remplacement
Respectez scrupuleusement les instructions de ce document. À défaut, vous risquez de détériorer votre matériel et d’invalider
sa garantie.
Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/.
Avertissement : Durant cette procédure, mettez les petites pièces hors de portée des enfants.
Avertissement : Il existe des bords tranchants à l’intérieur de l’ordinateur. Soyez vigilant.
Outils requis
• Tournevis cruciforme
• Pince
Ouverture de l’ordinateur
Avertissement : Éteignez systématiquement l’ordinateur avant de l’ouvrir afin d’éviter d’endommager ses composants internes et de vous blesser. Après extinction, les composants internes risquent d’être très chauds.
Attendez qu’ils refroidissent avant de poursuivre.
1. Placez l’ordinateur sur une surface propre et plane.
2. Si vous pensez que le mode Suspension d’activité est déclenché, appuyez sur le bouton d’alimentation en façade pour réactiver l’ordinateur.
3. Éteignez l’ordinateur et patientez cinq minutes avant de poursuivre.
4. Si vous avez installé un câble antivol, retirez-le.
5. Débranchez tous les autres câbles connectés à l’ordinateur, à l’exception du cordon d’alimentation.
1 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card F073-0562 Rev. G
Carte Vidéo
AppleCare6. Touchez les caches métalliques des connecteurs PCI, à l’arrière de l’ordinateur. (Figure 1)
Important : Agissez toujours de même avant de toucher un élément ou d’installer un composant à l’intérieur de l’ordinateur. Pour éviter d’accumuler de l’électricité statique, ne vous déplacez pas dans la pièce avant d’avoir achevé l’installation et
refermé l’ordinateur.
7. Débranchez le cordon d’alimentation.
Avertissement : Ne branchez jamais le cordon d’alimentation et ne mettez jamais l’ordinateur sous tension
tant que les composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser. Assurez-vous que le cordon d’alimentation reste débranché jusqu’à la fin de la procédure, tant que l’ordinateur n’est pas refermé.
Avertissement : Le bloc d’alimentation de votre ordinateur est un composant haute tension à n’ouvrir sous
aucun prétexte, même lorsque l’ordinateur est éteint. S’il nécessite une intervention, contactez votre revendeur Apple ou votre Société de maintenance agréée Apple.
8. Soulevez le loquet situé sur le panneau latéral droit.
9. Abaissez délicatement le panneau latéral jusqu’à ce qu’il repose à plat. Afin de ne pas érafler le boîtier, prévoyez un linge
doux et propre.
Avertissement : Si des voyants sont allumés sur la carte mère, cela signifie que l’ordinateur n’est pas éteint.
Refermez le panneau d’accès latéral et éteignez l’ordinateur avant de poursuivre.
F073-0562 Rev. G Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card 2
Figure 1
Power Mac G4 (QuickSilver 2002) Power Mac G4 (Mirrored Drive Doors_FW 800)Dépose de la Carte installée
Important : Les cartes vidéo sont soit des cartes AGP (Accelerated Graphics Port) soit des cartes PCI (Peripheral Component
Interconnect). Ces cartes s’encastrent dans des connecteurs d’extension situés sur la carte mère.
Les étapes pour remplacer ces deux types de cartes sont identiques. Toutefois, les cartes AGP doivent être installées dans le
petit connecteur 1 (Figure 2A), alors que les cartes PCI doivent être installées dans les connecteurs d’extension PCI longs.
(Figure 2B)
1. A l’aide d’un tournevis cruciforme, enlevez la vis de fixation de la carte. (Figure 2C)
2. Si vous remplacez une carte vidéo PCI, tirez doucement la carte et enlevez-la de son connecteur d’extension PCI.
3. Si vous remplacez une carte vidéo AGP, abaissez le loquet de la carte vidéo qui retient le clip pour dégager la carte. Ensuite,
tirez la carte vers le haut et enlevez-la du connecteur d’extension AGP. (Figure 3)
Avertissement : Pour éviter d’endommager la carte mère ou le connecteur AGP, n’imprimez pas un mouvement de bascule à la carte lors de son enlèvement. Sortez-la du connecteur en la levant tout droit.
3 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card F073-0562 Rev. G
Figure 2
Power Mac G4 (QuickSiver 2002_Mirrored Drive Doors_FW 800)
Figure 3Installation de la carte de remplacement
1. Sortez la carte vidéo de remplacement de son emballage anti-statique et tenez-la par les coins en évitant de toucher le connecteur doré ou tout autre composant de la carte.
2. Si une carte de remplacement ne possède pas de barre d’appui, encastrez la barre d’appui fournie dans le coffret. A l’aide
d’un tournevis cruciforme, installez les deux petites vis Phillips :
(Figure 4A) de chaque côté du connecteur ADC et les deux grandes vis Phillips
(Figure 4B) sur les deux loquets de la barre d’appui. A l’aide d’une pince, vissez les deux écrous jack-nut
(Figure 4C) de chaque côté du connecteur VGA.
3. Alignez le connecteur de la carte sur son connecteur d’extension et appuyez vers le bas jusqu’à ce que la carte soit complètement insérée dans le connecteur.
• N’imprimez pas un mouvement de bascule à la carte, mais enfoncez-la directement dans le connecteur.
• Ne forcez pas sur la carte. Si vous faites face à beaucoup de résistance, retirez la carte. Inspectez le connecteur afin de
trouver d’éventuels dégâts ou obstacles, puis essayez d’insérer la carte à nouveau.
• Tirez doucement la carte pour voir si elle est correctement connectée. Si elle résiste, reste en place et si ses connecteurs
dorés sont à peine visibles, la carte est bien connectée.
4. Replacez la vis de fixation de la carte et vissez-la pour immobiliser la carte.
F073-0562 Rev. G Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card 4
C
A
B
B
Figure 4Fermeture de l’ordinateur
1. Vérifiez que vous avez réinstallé toutes les vis et que tous les câbles internes sont connectés.
2. Relevez le panneau d’accès latéral, soulevez le loquet et pressez le panneau contre le boîtier jusqu’à ce qu’il s’enclenche.
3. Rebranchez tous les câbles et faites démarrer l’ordinateur.
Avertissement : Ne mettez jamais l’ordinateur sous tension tant que ses composants internes et externes ne
sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager
l’ordinateur ou de vous blesser.
Apple Computer, Inc.
© 2003 Apple Computer, Inc. Tous droits réservés.
Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales
applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option - I) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale.
Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression.
Apple Computer, Inc.
1 Infinite Loop
Cupertino, CA 95014-2084
USA
+ 1 408 996 1010
http://www.apple.com
Apple, le logo Apple, Mac, Macintosh et le logo Mac sont des marques d’Apple Computer Inc., déposées aux États-Unis et dans d’autres pays.
Power Mac est une marque d’Apple Computer, Inc.
5 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card F073-0562 Rev. G
AirPort Express
Guide de
configuration3
Table des matières
5 Chapitre 1 : Premiers contacts
6 À propos de l’AirPort Express
8 À propos du logiciel AirPort
8 Ce qu’il vous faut pour commencer
10 Branchement de l’AirPort Express
11 Voyants d’état de la borne AirPort Express
12 Étape suivante
13 Chapitre 2 : Utilisation de la borne AirPort Express
13 Utilisation de l’AirPort Express avec votre connexion Internet à large bande
15 Utilisation de l’AirPort Express avec AirTunes pour lire des morceaux de musique d’iTunes
sur votre chaîne stéréo
16 Utilisation de l’AirPort Express sur un réseau sans fil existant pour diffuser de la musique
sur votre chaîne stéréo
21 Utilisation de l’AirPort Express pour le partage d’une imprimante USB
22 Extension de la portée d’un réseau AirPort Extreme ou AirPort Express existant
24 Utilisation d’AirPort Express avec votre réseau AirPort Extreme
25 Chapitre 3 : Configuration de l’AirPort Express
27 Utilisation de l’Utilitaire AirPort4 Table des matières
29 Création d’un nouveau réseau sans fil
29 Configuration et partage de l’accès à Internet
31 Connexion à un réseau sans fil existant
32 Extension de la portée d’un réseau AirPort Extreme ou AirPort Express existant
33 Réglage des options avancées
35 Chapitre 4 : AirPort Express en déplacement
39 Chapitre 5 : Astuces et dépannage
45 Considérations sur le placement de l’AirPort Express
46 Éléments pouvant provoquer des interférences avec Airport
47 Chapitre 6 : En savoir plus, service après-vente et support
47 Ressources en ligne
48 Aide en ligne
48 Obtention d’un service de garantie
48 Où trouver le numéro de série de votre AirPort Express
49 Annexe : Caractéristiques de l’AirPort Express
50 Astuces de sécurité de l’AirPort Express
51 Évitez les endroits humides
52 N’effectuez pas vous-même les réparations
52 À propos de la manipulation
53 Regulatory Compliance Information1
5
1 Premiers contacts
Félicitations pour l’achat de votre AirPort Express.
Lisez ce guide pour commencer à l’utiliser.
Vous pouvez utiliser l’AirPort Express pour partager votre accès à Internet à large
bande avec des ordinateurs sans fil sur votre réseau, écouter de la musique iTunes
sur votre chaîne stéréo et bien plus encore.
Votre AirPort Express est livrée avec AirTunes, un logiciel permettant de lire des morceaux
de musique d’iTunes à travers des haut-parleurs distants.
Grâce à la borne AirPort Express, vous pouvez :
 Créer un réseau sans fil à votre domicile, puis vous connecter à Internet et partager
la connexion avec simultanément jusqu’à 10 ordinateurs. Tous les membres d’une
famille peuvent, de cette manière, se connecter en même temps à Internet.
 Connecter l’AirPort Express à votre chaîne stéréo ou à vos haut-parleurs sous tension
et utiliser AirTunes pour lire vos morceaux de musique d’iTunes sur votre chaîne à
partir d’un ordinateur Macintosh équipé d’une carte AirPort ou AirPort Extreme,
ou d’un ordinateur sans fil compatible sous Windows XP ou Windows 2000.
 Configurer une connexion sans fil vers votre réseau Ethernet. Les ordinateurs Macintosh
équipés d’une carte AirPort et AirPort Extreme ou les ordinateurs Windows XP ou
Windows 2000 ont alors accès à l’ensemble du réseau sans être reliés par un câble.6 Chapitre 1 Premiers contacts
 Étendre la portée de votre réseau en ajoutant l’AirPort Express à votre réseau sans fil
AirPort Extreme ou AirPort Express existant (ce que l’on appelle un système de distribution sans fil, ou WDS).
 Connecter une imprimante USB à votre AirPort Express. Tous les ordinateurs compatibles
du réseau AirPort, qu’ils soient avec ou sans fil, peuvent imprimer sur cette imprimante.
 Créer des profils personnalisés afin de pouvoir stocker les réglages de cinq emplacements différents. Emportez AirPort Express partout et connectez-vous rapidement
aux réseaux large bande, comme ceux que l’on trouve parfois dans les chambres
d’hôtel.
À propos de l’AirPort Express
L’AirPort Express possède trois ports, situés sur la partie inférieure :
 un port Ethernet (G) pour connecter un modem DSL ou câble, ou pour se connecter
à un réseau Ethernet existant ;
 un mini-jack audio stéréo numérique analogique et optique (-) pour connecter
l’AirPort Express à une chaîne stéréo ou à des haut-parleurs ;Chapitre 1 Premiers contacts 7
 un port USB (d) pour brancher une imprimante compatible à AirPort Express.
À côté des ports se trouve un bouton de réinitialisation, utilisé pour le dépannage de
votre AirPort Express. Sur le côté de la borne AirPort Express, le voyant d’état affiche
l’état actuel.
Voyant d’état
Port USB
Adaptateur pour prise CA
Bouton de réinitialisation
Port Ethernet
Port de sortie
(mini-jack audio numérique
optique et analogique)8 Chapitre 1 Premiers contacts
À propos du logiciel AirPort
L’AirPort Express utilise le logiciel AirPort livré sur le CD de l’AirPort Express.
Ce qu’il vous faut pour commencer
Pour configurer l’AirPort Express à l’aide d’un Macintosh, vous devez disposer des
éléments suivants :
 Un ordinateur Macintosh avec une carte AirPort ou AirPort Extreme installée
 Mac OS X 4 ou ultérieur
Utilitaire AirPort
L’utilitaire AirPort vous aide à configurer votre AirPort Express pour créer un réseau
sans fil, à vous connecter à Internet et à partager une imprimante USB. Vous pouvez
également connecter de votre AirPort Express à votre réseau sans fil AirPort Extreme
ou AirPort Express existant pour étendre la portée de votre réseau grâce à WDS. Utilisez l’utilitiare AirPort pour configurer rapidement et facilement votre AirPort Express
et votre réseau sans fil.
L’Utilitaire AirPort est également un outil sophistiqué permettant de configurer et
de gérer les bornes d’accès AirPort Extreme et AirPort Express. Employez l’Utilitaire
AirPort pour définir les réglages de réseau, de routage et de sécurité, ainsi que
d’autres options avancées.
Menu d’état d’AirPort de la barre des menus
Le menu d’état d’AirPort vous permet de passer instantanément d’un réseau AirPort
à l’autre, de contrôler la qualité du signal du réseau sélectionné, de créer un réseau
« ordinateur à ordinateur » et d’activer ou de désactiver AirPort. Le menu d’état est
disponible sur les ordinateurs utilisant Mac OS X.
ZChapitre 1 Premiers contacts 9
Pour configurer l’AirPort Express à l’aide d’un PC Windows, vous devez disposer
des éléments suivants :
 Un PC Windows doté d’une vitesse de processeur de 300 MHz ou supérieure
 Windows XP Familial ou Professionel
Vous devez disposer d’iTunes pour la lecture audio depuis votre ordinateur sur une
chaîne stéréo connectée à la borne AirPort Express. Pour être certain de posséder
la dernière version d’iTunes, rendez-vous sur le site www.apple.com/fr/itunes.
Vous pouvez utiliser la borne AirPort Express avec n’importe quel ordinateur utilisant
une technologie sans fil conforme à la norme IEEE 802.11b ou 802.11g. Pour pouvoir
configurer l’AirPort Express, votre ordinateur doit répondre à toutes les conditions
mentionnées ci-dessus.10 Chapitre 1 Premiers contacts
Branchement de l’AirPort Express
Avant de brancher votre AirPort Express, branchez tout d’abord les câbles appropriés
dans les ports que vous souhaitez utiliser, notamment le câble Ethernet connecté à
votre modem DSL ou câble (si vous souhaitez vous connecter à Internet), le câble audio
connecté à votre chaîne stéréo (si vous souhaitez utiliser AirTunes pour écouter de la
musique grâce à iTunes) et un câble USB connecté à une imprimante USB compatible
(si vous souhaitez utiliser une imprimante USB).
Après avoir branché les câbles de tous les périphériques que vous prévoyez d’utiliser,
branchez si besoin un adaptateur pour prise CA. Branchez l’AirPort Express à une prise
murale. Il n’y a pas d’interrupteur.
Adaptateur pour prise CAChapitre 1 Premiers contacts 11
Lorsque vous branchez l’AirPort Express à une prise murale, le voyant d’état vert clignote
et devient de couleur ambre pendant le démarrage. Une fois que le démarrage est
complètement terminé, le voyant d’état reste vert mais ne clignote plus.
Voyants d’état de la borne AirPort Express
Le tableau ci-dessous répertorie les séquences des voyants lumineux de l’AirPort Express
et explique ce qu’ils indiquent.
Voyant État/Description
Éteint L’AirPort Express est débranchée.
Vert clignotant L’AirPort Express est en train de démarrer.
Remarque : en sélectionnant Clignotement en cas d’activité dans le
menu local Voyant d’état qui se trouve dans la sous-fenêtre de la
borne d’accès de l’utilitaire AirPort via le menu de configuration, le
voyant d’état vert clignote pour indiquer que l’activité est normale.
Vert fixe L’AirPort Express est allumée et fonctionne correctement. Si vous
choisissez Clignotement en cas d’activité dans le menu local
Voyant d’état qui se trouve dans la sous-fenêtre de la borne
d’accès de l’utilitaire AirPort, le voyant d’état vert clignote pour
indiquer que l’activité est normale.
Ambre clignotant La borne AirPort Express ne peut pas établir la connexion avec
le réseau ou Internet. reportez-vous à la section « Le voyant
d’état de votre AirPort Express est de couleur ambre et
il clignote » à la page 42.
Ambre L’AirPort Express termine sa séquence de démarrage.
Clignotement ambre et vert Il peut y avoir un problème pour démarrer. L’AirPort Express va
redémarrer. Réessayez ensuite.12 Chapitre 1 Premiers contacts
Étape suivante
Après avoir branché AirPort Express, vous devez utiliser l’Utilitaire AirPort pour le configurer afin de pouvoir l’utiliser avec votre connexion à Internet, votre chaîne stéréo,
une imprimante USB ou un réseau existant.
Reportez-vous à la section « Utilisation de la borne AirPort Express » à la page 13 pour
obtenir des exemples de toutes les possibilités d’utilisation de l’AirPort Express et des
informations sur la configuration de votre réseau sans fil.
Consultez ensuite la rubrique « Configuration de l’AirPort Express » à la page 25 pour
en savoir plus sur le processus de configuration.2
13
2 Utilisation de la borne
AirPort Express
Dans ce chapitre, vous trouverez des explications sur
les différentes façons d’utiliser l’AirPort Express.
Ce chapitre contient des exemples des réglages à effectuer en fonction de la façon dont
vous souhaitez utiliser l’AirPort Express. Il vous donne également une brève explication
de ce qu’il faut faire pour pouvoir utiliser rapidement votre réseau AirPort Express.
Utilisation de l’AirPort Express avec votre connexion Internet à
large bande
Lorsque vous configurez l’AirPort Express pour accéder à Internet et au réseau, les ordinateurs Macintosh équipés des cartes AirPort et AirPort Extreme et les ordinateurs
équipés de la technologie sans fil 802.11b et 802.11g peuvent accéder au réseau sans fil
AirPort pour partager des fichiers, jouer en réseau et utiliser des applications Internet
telles que des navigateurs Web et des applications de messagerie électronique.14 Chapitre 2 Utilisation de la borne AirPort Express
Schéma des connexions
Configuration
1 Branchez votre modem DSL ou câble à votre AirPort Express en utilisant le port
Ethernet (G).
2 Utilisez l’utilitaire AirPort pour créer un nouveau réseau (pour en savoir plus,
reportez-vous à la page 25).
Les ordinateurs utilisant AirPort et ceux utilisant d’autres cartes ou adaptateurs sans fil
se connectent à Internet via la borne AirPort Express.
Les ordinateurs sans fil communiquent entre eux via l’AirPort Express.
Modem DSL ou câble
Port Ethernet
Vers Internet
GChapitre 2 Utilisation de la borne AirPort Express 15
Utilisation de l’AirPort Express avec AirTunes pour lire
des morceaux de musique d’iTunes sur votre chaîne stéréo
Vous pouvez brancher votre AirPort Express à votre chaîne stéréo par un câble mini
numérique à fibres optiques vers Toslink, un câble mini stéréo vers double RCA ou
un câble mini stéréo vers mini stéréo (selon le type du connecteur de votre chaîne)
et utiliser AirTunes pour écouter sans fil de la musique grâce à iTunes.
Schéma des connexions
Port d’entrée audio numérique optique
ou
ou
Câble numérique à fibres
optiques Toslink
vers mini-jack
ou
Câble mini-jack stéréo
vers RCA
Chaîne stéréo
Ordinateur équipé d’iTunes
Port
de sortie
Ports d’entrée
audio gauche et
droit de type RCA16 Chapitre 2 Utilisation de la borne AirPort Express
Configuration
1 Branchez votre AirPort Express à vos enceintes domestiques stéréo ou à vos enceintes
alimentées par amplifiés grâce à un câble numérique à fibres optiques, un câble
analogique mini stéréo vers double RCA ou un câble mini stéréo vers mini stéréo (selon
le type du connecteur de votre chaîne), branché sur la prise mini stéréo (-).
Remarque : vous ne pouvez pas utiliser des haut-parleurs USB amplifiés avec l’AirPort
Express. Utilisez des haut-parleurs amplifiés avec un connecteur mini-jack stéréo.
1 Utilisez l’utilitaire AirPort pour créer un nouveau réseau (pour en savoir plus,
reportez-vous à la page 25).
2 Ouvrez iTunes sur votre ordinateur et choisissez votre chaîne stéréo ou vos haut-parleurs
dans le menu local des haut-parleurs situé en bas à droite de la fenêtre d’iTunes.
Les ordinateurs sans fil se trouvant dans le rayon de détection de l’AirPort Express
peuvent, sans fil, y diffuser de la musique à l’aide d’iTunes 4.6 ou ultérieur. Un seul
ordinateur à la fois peut diffuser de la musique sur l’AirPort Express. Vous ne pouvez
pas diffuser de la musique vers plus d’un AirPort Express à la fois.
Remarque : ne connectez pas l’AirPort Express à la prise phono de votre stéréo.
Utilisation de l’AirPort Express sur un réseau sans fil existant
pour diffuser de la musique sur votre chaîne stéréo
Vous avez également la possibilité de connecter l’AirPort Express à un réseau sans fil et
d’utiliser AirTunes pour diffuser de la musique sur votre chaîne stéréo depuis iTunes. En
connectant AirPort Express à votre réseau existant, vous pouvez placer AirPort Express
dans une autre pièce, dans la portée de votre réseau.Chapitre 2 Utilisation de la borne AirPort Express 17
Schéma des connexions
Pour accéder au réseau sans fil, utilisez le menu d’état d’AirPort dans la barre des
menus de votre Mac. Sur un ordinateur Windows, maintenez le curseur sur l’icône
de la connexion sans fil jusqu’à ce que vous voyiez apparaître le nom de votre réseau
AirPort (SSID) et sélectionnez-le dans la liste si plusieurs réseaux sont disponibles.
Modem DSL
ou câble
Vers Internet
Chaîne stéréo
Port de sortie
Borne d’accès
AirPort Extreme
Vers port Ethernet18 Chapitre 2 Utilisation de la borne AirPort Express
Il existe d’autres façons de connecter votre AirPort Express à votre chaîne stéréo.
Si votre ordinateur est doté d’une carte AirPort Extreme ou d’une carte sans fil compatible pour Windows, vous pouvez utiliser AirTunes pour écouter de la musique issue
d’iTunes sur une chaîne stéréo branchée à votre AirPort Express.
Modem DSL
ou câble
Vers Internet
Chaîne stéréo
Port de sortieChapitre 2 Utilisation de la borne AirPort Express 19
Vous pouvez également connecter votre AirPort Express à Internet et fournir ainsi un
accès à Internet aux ordinateurs qui se joignent au réseau. Connectez votre AirPort
Express à votre chaîne stéréo afin que les ordinateurs du réseau dotés d’une carte
AirPort Extreme ou dotés de cartes 802.11b ou 802.11g compatibles puissent utiliser
iTunes pour diffuser de la musique sur la chaîne stéréo.
Modem DSL
ou câble
Vers Internet
Chaîne
stéréo
Port Ethernet Port de sortie20 Chapitre 2 Utilisation de la borne AirPort Express
Câbles audio et câble d’alimentation facultatifs
Vous pouvez vous procurer le kit de connexion stéréo facultatif de l’AirPort Express
contenant des câbles Monster pour connecter votre AirPort Express à votre chaîne
stéréo ou à vos haut-parleurs. Ce kit comprend des connecteurs analogiques mini-jack
stéréo vers double RCA, un câble numérique à fibres optiques Toslink et un câble
d’alimentation.
 Connectez le câble analogique à votre chaîne stéréo si celle-ci utilise des câbles
analogiques standard.
 Connectez le câble numérique à fibres optiques si votre chaîne stéréo possède un
port numérique Toslink.
 Connectez le câble d’alimentation si vous configurez votre AirPort Express à distance
d’une prise de courant.
Câble mini-jack stéréo vers RCA
Câble numérique à fibres optiques
Toslink vers mini-jack
Câble d’alimentationChapitre 2 Utilisation de la borne AirPort Express 21
Utilisation de l’AirPort Express pour le partage d’une
imprimante USB
Lorsque vous connectez une imprimante USB à votre AirPort Express, tous les ordinateurs du réseau sans fil peuvent l’utiliser.
Schéma des connexions
Port USB
Imprimante partagée
d22 Chapitre 2 Utilisation de la borne AirPort Express
Configuration
1 Reliez l’imprimante au port USB (d) de la borne AirPort Express à l’aide d’un câble USB.
2 Utilisez l’utilitaire AirPort pour créer un réseau ou rejoignez un réseau sans fil existant.
Pour partager l’imprimante, les ordinateurs sans fil doivent utiliser Mac OS X 10.2.7 ou
ultérieur, ou bien Windows 2000 ou Windows XP.
Pour utiliser l’imprimante depuis un ordinateur Mac OS X :
1 Ouvrez l’utilitaire de configuration d’imprimante (situé dans le dossier Utilitaires dans
le dossier Applications).
2 Sélectionnez l’imprimante dans la liste.
Si l’imprimante ne figure pas sur la liste, cliquez sur Ajouter, puis choisissez Bonjour
dans le menu local avant de sélectionner l’imprimante dans la liste.
Pour utiliser l’imprimante depuis un ordinateur Windows :
1 Installez Bonjour pour Windows à partir du disque fournit avec votre AirPort Express.
2 Suivez les instructions à l’écran pour connecter votre imprimante.
Extension de la portée d’un réseau AirPort Extreme ou
AirPort Express existant
Vous avez la possibilité de connecter une borne AirPort Express supplémentaire pour
étendre la portée de votre réseau AirPort Extreme ou AirPort Express existant. L’ajout
d’une borne d’accès ou de l’AirPort Express à un réseau existant crée un système de
distribution sans fil WDS.
Si le réseau AirPort est connecté à Internet, les ordinateurs peuvent alors se connecter
au réseau AirPort et partager la connexion Internet.Chapitre 2 Utilisation de la borne AirPort Express 23
Schéma des connexions
Configuration
1 Vous devez posséder un réseau AirPort créé par une borne d’accès AirPort Extreme ou
un AirPort Express connecté à Internet. Cette borne d’accès est appelée la borne d’accès
principale et partage sa connexion Internet avec votre AirPort Express.
2 Utilisez l’utilitaire AirPort pour vous connecter à votre réseau et étendre sa portée
(pour en savoir plus, reportez-vous à la page 25).
Les deux bornes d’accès utilisent la technologie sans fil pour partager la connexion
Internet avec les ordinateurs clients, ou la technologie Ethernet si les ordinateurs clients
sont reliés par Ethernet.
Salle de séjour Salle à manger Salon
Vers Internet
Borne d’accès
AirPort Extreme
Modem DSL
ou cable24 Chapitre 2 Utilisation de la borne AirPort Express
Utilisation d’AirPort Express avec votre réseau AirPort Extreme
L’illustration ci-dessous montre un réseau sans fil regroupant tous les exemples
précédemment cités.
Configuration
 Utilisez l’utilitaire AirPort pour créer un réseau et tirer profit de toutes les fonctionnalités de AirPort Express.
Modem DSL
Vers port de sortie Vers port USB ou câble
Vers Internet
Vers port
Ethernet
Salle de séjour Salon
Borne d’accès
AirPort Extreme3
25
3 Configuration de l’AirPort Express
Ce chapitre contient des informations et des instructions
sur l’utilisation du logiciel de l’AirPort pour configurer
votre AirPort Express.
Utilisez les schémas du chapitre précédent pour vous aider à décider de l’endroit où
vous souhaitez utiliser votre AirPort Express, et des fonctionnalités que vous souhaitez
configurer sur votre réseau AirPort. Utilisez ensuite les instructions de ce chapitre pour
configurer facilement l’AirPort Express et votre réseau AirPort.
Grâce à l’utilitaire AirPort, vous pouvez :
 Configurer un nouveau réseau que des ordinateurs sans fil peuvent utiliser pour
communiquer entre eux. Si vous configurez votre AirPort Express comme une
borne d’accès et la connectez à Internet, des ordinateurs sans fil pourront également
partager la connexion Internet.
 Connecter votre AirPort Express à votre réseau sans fil existant et utiliser AirTunes
pour écouter de la musique d’iTunes sur votre chaîne stéréo ou vos haut-parleurs
amplifiés ainsi que partager une imprimante USB.
 Connecter votre AirPort Express à votre réseau AirPort Extreme ou l’AirPort Express
existant et étendre la portée de ce réseau en utilisant l’AirPort Express comme un
pont sans fil. Cette méthode est appelée système de distribution sans fil (WDS). 26 Chapitre 3 Configuration de l’AirPort Express
Vous pouvez utiliser AirTunes pour écouter des morceaux de musique d’iTunes et
partager une imprimante USB quel que soit le type de réseau que vous configurez,
qu’il s’agisse d’un nouveau réseau ou d’un accès à un réseau existant.
Si vous possédez plusieurs bornes AirPort Express, vous pouvez en brancher une à la
chaîne stéréo de votre salon et une autre aux haut-parleurs amplifiés de votre bureau.
À l’aide d’AirTunes, vous pouvez diffuser votre musique d’iTunes sur l’une ou l’autre
borne AirPort Express, selon la pièce de la maison dans laquelle vous vous trouvez.
Choisissez pour cela le nom de la borne AirPort Express que vous souhaitez utiliser
dans le menu local des haut-parleurs d’iTunes.
Ce chapitre explique comment utiliser l’Assistant réglages dans l’utilitaire AirPort pour
configurer votre réseau et d’autres fonctionnalités de votre AirPort Express. Pour en
savoir plus sur la mise en réseau sans fil et sur les fonctionnalités avancées de l’utilitaire AirPort, consultez le document « Création de réseaux AirPort 802.11n » sur le site
www.apple.com/fr/support/airport.
Le document fournit de nombreux détails concernant les deux documents suivants :
 l’utilisation de l’utilitaire AirPort avec la borne d’accès AirPort Extreme 802.11n ;
 l’utilisation de l’utilitaire AirPort pour configurer votre borne d’accès AirPort Extreme
802.11g.
Remarque : vous pouvez effectuer la plupart des opérations d’installation et de configuration de votre réseau à l’aide de l’Assistant réglages de l’utilitaire AirPort. Pour configurer les options avancées, choisissez Configuration manuelle dans le menu Borne
d’accès de l’utilitaire AirPort. Voir « Réglage des options avancées » à la page 33.Chapitre 3 Configuration de l’AirPort Express 27
Utilisation de l’Utilitaire AirPort
Pour configurer votre AirPort Express afin qu’elle utilise AirPort pour l’accès à Internet
et la mise en réseau sans fil, utilisez l’Assistant réglages dans l’Utilitaire AirPort. Lutilitaire est automatiquement installé, à partir du CD AirPort Express, sur votre ordinateur
en même temps que le logiciel.
Sur un ordinateur Macintosh Mac OS X 10.4 ou ultérieur :
1 Ouvrez l’utilitaire AirPort situé dans le dossier Utilitaires dans votre dossier Applications.
2 Sélectionnez votre borne d’accès et cliquez sur Configurer.
3 Suivez les instructions à l’écran pour configurer votre AirPort Express et votre réseau
sans fil.
Sur un ordinateur Windows XP (Service Pack 2) :
1 Ouvrez l’Utilitaire AirPort, situé dans Démarrer > Tous les programmes > AirPort.
2 Sélectionnez votre borne d’accès et cliquez sur Configurer.28 Chapitre 3 Configuration de l’AirPort Express
3 Suivez les instructions à l’écran pour configurer votre AirPort Express et votre réseau
sans fil.
L’assistant de réglage de l’utilitaire AirPort vous pose une série de questions concernant le type de réseau que vous souhaitez utiliser et les services que vous souhaitez
configurer. L’Assistant réglages vous aide à saisir les réglages adaptés au réseau que
vous configurez.
Si vous utilisez AirPort Express pour vous connecter à Internet, vous devez disposer
d’un compte à haut débit (DSL ou modem câble) via un fournisseur d’accès à Internet
ou une connexion utilisant un réseau Ethernet existant. Si vous avez reçu des informations particulières de votre fournisseur d’accès (telles qu’une adresse IP statique ou
l’identifiant du client DHCP), il vous faudra les saisir dans l’utilitaire AirPort. Regroupez
toutes ces informations avant de configurer votre AirPort Express.Chapitre 3 Configuration de l’AirPort Express 29
Création d’un nouveau réseau sans fil
Vous pouvez utiliser l’Assistant réglages de l’utilitaire AirPort pour créer un réseau sans
fil. L’Assistant réglages vous guidera tout au long des étapes nécessaires pour nommer
votre réseau, protéger votre réseau avec un mot de passe et configurer d’autres options.
Si vous prévoyez partager une imprimante USB sur votre réseau :
1 Reliez l’imprimante ou le disque dur au port USB (d) de la borne AirPort Express.
2 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur
un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP.
3 Suivez les instructions à l’écran pour créer un réseau.
Configuration et partage de l’accès à Internet
Si vous prévoyez partager votre connexion Internet avec les ordinateurs du réseau
configurés pour la communication sans fil, vous devez configurer votre AirPort Express
en conséquence. Une fois qu’elle est configurée, les ordinateurs peuvent accéder à
Internet via le réseau AirPort. La borne d’accès se connecte à Internet et transmet
les informations aux ordinateurs via le réseau AirPort.
Avant d’utiliser l’utilitaire AirPort pour configurer votre borne d’accès, branchez votre
modem câble ou DSL au port Ethernet (G) d’AirPort Express. Si vous vous connectez à
Internet via un réseau Ethernet existant, vous pouvez alors connecter l’AirPort Express
au réseau Ethernet.
Utilisez l’Assistant réglages de l’utilitaire AirPort pour saisir les réglages de votre FAI
et configurer le mode de partage de ces réglages entre l’AirPort Express et les autres
ordinateurs.30 Chapitre 3 Configuration de l’AirPort Express
1 Sélectionnez le réseau sans fil que vous souhaitez modifier.
Sur un Mac, utilisez le menu d’état d’AirPort dans la barre des menus. Sur un ordinateur Windows XP, maintenez le curseur sur l’icône de la connexion sans fil jusqu’à ce
que vous voyiez apparaître le nom de votre réseau AirPort (SSID) et sélectionnez-le
dans la liste si plusieurs réseaux sont disponibles.
Le nom de réseau par défaut d’une borne d’accès Apple est AirPortNetworkXXXXXX, où
XXXXXX est remplacé par les six chiffres de l’identifiant AirPort, aussi appelé adresse MAC.
L’identifiant AirPort est imprimé sur le côté de la prise électrique de l’AirPort Express.
2 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur
un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP.
3 Sélectionnez votre borne d’accès et cliquez sur Configurer.
4 Suivez les instructions à l’écran pour configurer et partager l’accès Internet de votre
AirPort Express.
L’utilisation de l’utilitaire AirPort est un moyen rapide et facile de configurer votre
borne d’accès et votre réseau sans fil. Si vous désirez configurer des options supplé-
mentaires pour votre réseau, telles que des restrictions d’accès ou des réglages avancés d’options DHCP, vous pouvez choisir Configuration manuelle dans le menu Borne
d’accès de l’utilitaire AirPort. Chapitre 3 Configuration de l’AirPort Express 31
Connexion à un réseau sans fil existant
Vous pouvez utiliser l’utilitaire AirPort pour accéder à un réseau sans fil existant.
Lorsque vous connectez la borne AirPort Express à votre chaîne stéréo, les ordinateurs
de votre réseau sans fil peuvent alors utiliser AirTunes pour écouter des morceaux de
musique d’iTunes sur la chaîne stéréo. Lorsque vous connectez une imprimante USB à
votre AirPort Express, tous les ordinateurs du réseau peuvent l’utiliser.
Avant d’utiliser l’Assistant réglages AirPort , vérifiez que le câble audio est bien branché
à votre chaîne stéréo et que le câble USB est relié à votre imprimante.
1 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur
un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows.
2 Suivez les instructions à l’écran pour connecter votre AirPort Express et votre réseau
sans fil.32 Chapitre 3 Configuration de l’AirPort Express
Extension de la portée d’un réseau AirPort Extreme ou
AirPort Express existant
Vous pouvez étendre la portée d’un réseau sans fil AirPort Express ou AirPort Extreme
en le configurant comme membre d’un WDS. Les ordinateurs sans fil pourront alors
se connecter au réseau et partager la connexion Internet et des fichiers ou jouer en
réseau. Si vous connectez l’AirPort Express à votre chaîne stéréo, les ordinateurs de
votre réseau sans fil peuvent alors utiliser AirTunes pour écouter des morceaux de
musique d’iTunes sur la chaîne stéréo. Lorsque vous connectez une imprimante USB
à votre AirPort Express, tous les ordinateurs du réseau peuvent l’utiliser.
m Ouvrez l’utilitaire AirPort et suivez les instructions à l’écran pour étendre la portée de
votre réseau AirPort Extreme ou AirPort Express.
L’extension de la portée d’un réseau avec WDS peut réduire les performances globales
du réseau.Chapitre 3 Configuration de l’AirPort Express 33
Réglage des options avancées
Pour configurer manuellement des options avancées de votre AirPort Express, vous
pouvez utilisez l’utilitaire AirPort. Parmi ces options avancées, vous pouvez configurer,
par exemple, la sécurité, des réseaux fermés, la durée de bail DHCP, le contrôle d’accès,
le contrôle de puissance, les comptes d’utilisateurs et bien plus encore.
Pour régler les options avancées :
1 Sélectionnez le réseau sans fil que vous souhaitez modifier.
Sur un Mac, utilisez le menu d’état d’AirPort dans la barre des menus. Sur un ordinateur Windows XP, maintenez le curseur sur l’icône de la connexion sans fil jusqu’à ce
que vous voyiez apparaître le nom de votre réseau AirPort (SSID) et sélectionnez-le
dans la liste si plusieurs réseaux sont disponibles.
Le nom de réseau par défaut d’une borne d’accès Apple est AirPortNetwork XXXXXX, où
XXXXXX est remplacé par les six chiffres de l’identifiant AirPort, aussi appelé adresse MAC.
L’identifiant AirPort est imprimé sur le côté de la prise électrique de l’AirPort Express.
2 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur
un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP.
3 Si plusieurs bornes d’accès figurent dans la liste, sélectionnez celle que vous souhaitez
configurer. Si la borne que vous souhaitez configurer ne figure pas dans cette liste,
cliquez sur Rescanner pour parcourir les bornes d’accès disponibles, puis sélectionnez
la borne d’accès voulue.34 Chapitre 3 Configuration de l’AirPort Express
4 Choisissez Configuration manuelle dans le menu Borne d’accès. Si le système vous
demande un mot de passe, saisissez-le.
Pour plus d’informations et d’instructions détaillées au sujet de la configuration
manuelle des fonctionnalités de l’utilitaire AirPort, consultez le document « Création
de réseau AirPort Extreme 802.11n » sur le site www.apple.com/fr/airport.
Le document fournit de nombreux détails concernant les deux documents suivants :
 l’utilisation de l’utilitaire AirPort avec la borne d’accès AirPort Extreme 802.11n
 l’utilisation de l’utilitaire AirPort pour configurer votre borne d’accès AirPort Extreme
802.11g4
35
4 AirPort Express en déplacement
AirPort Express peut stocker des réglages pour différents
emplacements afin que vous puissiez facilement le déplacer
d’un endroit à l’autre.
L’AirPort Express peut stocker jusqu’à cinq configurations, appelées profils. Un profil
contient les réglages de votre AirPort Express, tels que le nom et le mot de passe du
haut-parleur iTunes, ainsi que des informations sur le réseau, telles que le nom et
le mot de passe réseau.
Les profils sont utiles si vous déplacez votre AirPort Express d’un endroit à un autre. Par
exemple, vous pouvez configurer un profil pour votre AirPort Express à votre domicile,
où vous utilisez AirTunes pour diffuser de la musique sur votre chaîne stéréo à partir
d’iTunes et vous connecter à Internet via le protocole PPPoe. Vous pouvez également
configurer un autre profil pour utiliser AirPort Express à l’hôtel, où vous vous connectez à Internet via le protocole DHCP.36 Chapitre 4 AirPort Express en déplacement
Utilisez l’Utilitaire Admin AirPort dans Applications/Utilitaires sur Mac, et dans
Démarrer > Programmes > AirPort sur un ordinateur Windows XP pour créer,
modifier, renommer et effacer des profils. Chapitre 4 AirPort Express en déplacement 37
Pour créer un profil :
1 Ouvrez l’utilitaire AirPort, sélectionnez votre AirPort Express dans la liste puis choisissez
Configuration manuelle dans le menu Borne d’accès.
2 Saisissez un mot de passe pour la borne d’accès si nécessaire.
3 Choisissez Gérer les profils dans le menu Borne d’accès.
4 Cliquez sur Ajouter pour créer un nouveau profil, donnez-lui un nom puis cliquez sur OK.
5 Définissez les options, telles que le nom du réseau, le nom du haut-parleur distant,
les mots de passe et le mode de connexion à Internet.
6 Une fois le réglage des options terminé, cliquez sur Mettre à jour.
Dès que vous possédez un profil dans la liste, le menu local Profils devient disponible
au bas de la fenêtre utilitaire AirPort.
Pour modifier un profil existant :
1 Ouvrez l’utilitaire AirPort, sélectionnez votre AirPort Express dans la liste puis choisissez
Configuration manuelle dans le menu Borne d’accès.
2 Saisissez un mot de passe si nécessaire.
3 Choisissez le profil à modifier dans le menu Profils du menu local.
4 Modifiez les options du profil. Une fois les options modifiées, cliquez sur Mettre à jour
ou enregistrer le profil et le rendre actif sur votre AirPort Express.5
39
5 Astuces et dépannage
Vous pouvez rapidement résoudre la plupart des problèmes
liés à AirPort Express en suivant les conseils donnés dans
ce chapitre.
Le logiciel d’AirPort Express ne peut pas détecter le matériel AirPort
approprié
Assurez-vous que l’ordinateur que vous utilisez est équipé d’une carte AirPort ou d’une
carte AirPort Extreme. Si vous avez installé la carte récemment, éteignez votre ordinateur et vérifiez que la carte est installée correctement. Vérifiez que l’antenne AirPort
est connectée fermement à la carte (vous devez entendre un clic lorsque vous la connectez). Vérifiez que la carte est fermement insérée dans le connecteur du logement
de la carte AirPort.
Si vous utilisez un ordinateur Windows, assurez-vous que l’adaptateur ou la carte sans
fil est installé correctement. Reportez-vous à la documentation livrée avec votre ordinateur pour vérifier la connexion.40 Chapitre 5 Astuces et dépannage
Impossible de diffuser de la musique sur votre chaîne stéréo à partir
d’iTunes
Vérifiez les points suivants :
 Vérifiez qu’AirPort Express est branchée sur une prise de courant, qu’elle se trouve
dans le rayon de détection de votre ordinateur et que les câbles appropriés sont
bien connectés. Il vous faudra pour cela accéder au réseau AirPort Express.
 Veillez à sélectionner votre AirPort Express dans le menu local des haut-parleurs
d’iTunes.
 Vérifiez que vous utilisez iTunes 4.6 ou ultérieur.
Impossible d’entendre la musique
Si un morceau est en cours de lecture (la barre de progression en haut de la fenêtre
iTunes avance) mais que vous n’entendez rien, vérifiez les points suivants :
 Si vous essayez d’écouter de la musique avec des haut-parleurs connectés à une
AirPort Express et que vous avez coché la case « Désactiver le contrôle de volume
pour les haut-parleurs distants » dans la sous-fenêtre Audio des Préférences iTunes,
vérifiez que vos haut-parleurs distants sont sélectionnés dans le menu local en bas de
la fenêtre iTunes et que le contrôle du volume des haut-parleurs distants n’est pas au
minimum.
Vous avez oublié votre mot de passe réseau ou AirPort Express
Vous pouvez effacer le mot de passe du réseau AirPort ou d’AirPort Express en réinitialisant AirPort Express. Pour cela, procédez comme suit :
1 Utilisez l’extrémité d’un trombone déplié pour appuyer sur le bouton de réinitialisation
et le maintenir enfoncé pendant une seconde. Chapitre 5 Astuces et dépannage 41
2 Sélectionnez votre réseau AirPort.
 Sur un Macintosh, utilisez le menu d’état d’AirPort dans la barre des menus pour
sélectionner le réseau créé par l’AirPort Express (le nom du réseau reste inchangé).
 Sur un ordinateur Windows 2000 ou Windows XP, maintenez le curseur sur l’icône de
la connexion sans fil jusqu’à ce que vous voyiez apparaître le nom de votre réseau
AirPort (SSID) et sélectionnez-le dans la liste si plusieurs réseaux sont disponibles.
3 Ouvrez l’Utilitaire AirPort (que vous trouverez dans le dossier Applications/Utilitaires sur
un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP
ou Windows 2000).
4 Sélectionnez votre AirPort Express et cliquez sur Configurer.
5 Dans la zone de dialogue qui s’affiche, effectuez les changements suivants :
 Réinitialisez le mot de passe AirPort Express.
 Sélectionnez le cryptage pour activer la protection par mot passe de votre réseau
AirPort. Si vous activez le cryptage, tapez un nouveau mot de passe pour votre
réseau AirPort.
6 Cliquez sur OK.
AirPort Express redémarre pour charger les nouveaux réglages.
Votre AirPort Express ne répond pas
Essayez de la débrancher puis de la rebrancher sur une prise électrique.
Si votre AirPort Express ne répond plus du tout, vous devrez peut-être rétablir les
réglages d’origine par défaut. Cette opération efface tous les réglages que vous avez
effectués et rétablit ceux d’origine. 42 Chapitre 5 Astuces et dépannage
Le voyant d’état de votre AirPort Express est de couleur ambre et
il clignote
Le câble Ethernet n’est peut-être pas connecté correctement ; l’AirPort Express est
peut-être hors du rayon de détection du réseau AirPort, ou bien il se peut qu’il y ait
un problème avec votre fournisseur d’accès Internet. Si vous êtes connecté à Internet
avec un modem câble ou DSL, le modem n’est peut-être plus connecté au réseau ou à
Internet. Même si le modem semble fonctionner correctement, débranchez le modem,
attendez quelques secondes puis rebranchez-le. Assurez-vous que l’AirPort Express est
directement connecté au modem via Ethernet avant de rebrancher le modem.
Si votre AirPort Express est configuré comme membre d’un WDS, le lien WDS est
peut-être interrompu.
Remarque : si l’AirPort Express est configuré comme un client sans fil et que le réseau
auquel il se joint est protégé par une liste de contrôle d’accès, l’AirPort Express doit
faire partie de cette liste pour pouvoir se connecter au réseau.
Pour savoir pourquoi la lumière brune clignote, ouvrez l’utilitaire AirPort, sélectionnez
votre borne d’accès puis choisissez Configuration manuelle dans le menu Borne d’accès.
Saisissez le mot de passe de la borne d’accès si nécessaire puis cliquez sur État de
la borne d’accès pour en savoir plus sur la lumière clignotante.
Pour revenir aux réglages d’origine de l’AirPort Express :
m Utilisez l’extrémité d’un trombone déplié pour appuyer sur le bouton de réinitialisation
et le maintenir enfoncé pendant dix secondes.
AirPort Express redémarre avec les réglages suivants :
 L’AirPort Express reçoit son adresse IP via DHCP.Chapitre 5 Astuces et dépannage 43
 Le nom du réseau redevient Réseau Apple XXXXXX (où X est une lettre ou un chiffre).
 Le mot de passe AirPort Express redevient public.
Si vous avez utilisé l’Utilitaire AirPort pour créer des profils pour votre AirPort Express,
ces profils sont conservés lorsque vous réinitialisez AirPort Express.
Si vous souhaitez revenir aux réglages d’origine de l’AirPort Express et supprimer des
profils que vous aviez configurés :
1 Débranchez l’AirPort Express.
2 Utilisez l’extrémité d’un trombone déplié pour maintenir le bouton de réinitialisation
enfoncé pendant que vous branchez l’AirPort Express.
Attendez de voir les lumières d’état clignoter puis réinitialiser la borne d’accès.
Votre imprimante ne répond pas
Si vous avez connecté une imprimante au port USB de l’AirPort Express et que les ordinateurs du réseau AirPort ne peuvent pas imprimer, procédez comme suit :
1 Assurez-vous que l’imprimante est branchée et allumée.
2 Assurez-vous que les câbles sont bien connectés à l’imprimante et au port USB de
l’AirPort Express.
3 Assurez-vous que l’imprimante est bien sélectionnée dans la fenêtre Liste d’imprimantes des ordinateurs clients. Pour ce faire, sur un ordinateur Mac OS X 10.3 ou ultérieur :
 Ouvrez l’utilitaire de configuration d’imprimante situé dans le dossier Utilitaires dans
le dossier Applications.
 Si l’imprimante n’est pas dans la liste, cliquez sur Ajouter.
 Sélectionnez Bonjour dans le menu local.
 Sélectionnez l’imprimante et cliquez sur Ajouter.44 Chapitre 5 Astuces et dépannage
Pour sélectionner votre imprimante sur un ordinateur Windows XP ou Windows 2000 :
 Ouvrez le Panneau de configuration depuis le menu Démarrer, puis double-cliquez
sur Imprimantes et télécopieurs.
 Sélectionnez l’imprimante. Si l’imprimante ne figure pas dans la liste, cliquez sur
Ajouter une imprimante puis suivez les instructions à l’écran.
4 Éteignez l’imprimante, attendez quelques secondes puis rallumez-la.
Pour en savoir plus sur la configuration d’une imprimante sur un ordinateur fonctionnant sous Windows, consultez la rubrique « Utiliser une imprimante via un ordinateur
Windows » à la page 23.
Vous souhaitez mettre à jour votre logiciel AirPort
Apple met régulièrement à jour le logiciel AirPort.
Pour mettre à jour votre borne d’accès AirPort :
1 Ouvrez l’utilitaire AirPort situé dans le dossier Utilitaires dans le dossier Applications.
2 Sélectionnez « Rechercher les mises à jour » dans le menu Utilitaire AirPort.
3 Cliquez sur Télécharger pour obtenir toutes les mises à jour de programme interne ou
cliquez sur Afficher les détails pour sélectionner le programme interne spécifique à
votre borne d’accès.
4 Après le téléchargement du programme interne, cliquez sur Mettre à jour pour l’installer
sur votre borne d’accès. Si vous désirez mettre à jour plusieurs bornes d’accès, cliquez sur
Afficher les détails pour sélectionner les bornes que vous souhaitez mettre à jour.Chapitre 5 Astuces et dépannage 45
Considérations sur le placement de l’AirPort Express
Les recommandations suivantes peuvent permettre à votre AirPort Express d’atteindre
une portée sans fil maximale et une couverture réseau optimale.
 Placez votre AirPort Express dans un endroit dégagé avec peu d’obstacles tels
que des meubles imposants ou des murs. Essayez de la tenir éloignée des surfaces
métalliques.
 Si vous placez votre AirPort Express derrière un meuble, laissez au moins trois centimètres entre la borne AirPort Express et le bord du meuble.
 Évitez de placer votre AirPort Express dans des zones entourées de surfaces métalliques
sur trois côtés ou plus.
 Si vous placez votre AirPort Express à proximité d’autres appareils électriques tels
que la chaîne stéréo, évitez d’entourer complètement l’AirPort Express de câbles d’alimentation, audio ou vidéo. Positionnez votre AirPort Express de façon que les câbles
passent d’un seul côté. Laissez autant d’espace que possible entre l’AirPort Express
et les câbles.
 Si vous placez votre AirPort Express derrière votre équipement stéréo, placez-la sur
le côté. Évitez de la centrer derrière la chaîne stéréo.
 Essayez de placer votre AirPort Express à 7,5 mètres au moins d’un four à micro-ondes,
d’un téléphone sans fil de 2,4 GHz, ou d’autres sources d’interférences.46 Chapitre 5 Astuces et dépannage
Éléments pouvant provoquer des interférences avec Airport
Plus la source d’interférences est éloignée, plus le risque de problème est faible.
Les éléments suivants peuvent provoquer des interférences avec Airport :
 Les fours à micro-ondes.
 Les pertes de fréquence radio DSS (Direct Satellite Service).
 Le câble coaxial d’origine fourni avec certains types d’antennes paraboliques.
Contactez le fabricant du produit pour obtenir des câbles plus récents.
 Certains dispositifs électriques tels que les lignes électriques, les voies ferrées électrifiées
et les centrales électriques.
 Les téléphones sans fil qui fonctionnent sur la fréquence porteuse de 2,4 GHz. Si vous
rencontrez des problèmes avec votre téléphone ou avec la communication avec
AirPort, changez le canal utilisé par votre borne d’accès ou par l’AirPort Express.
 Des bornes d’accès adjacentes qui utilisent des canaux voisins. Ainsi, si une borne
d’accès A est réglée sur le canal 1, la borne B doit être réglée sur le canal 4 ou
supérieur.6
47
6 En savoir plus, service après-vente
et support
Vous trouverez davantage d’informations sur l’utilisation de
la borne AirPort Express sur votre disque dur, sur le Web et
dans l’aide en ligne.
Ressources en ligne
Pour obtenir les toutes dernières informations sur la borne AirPort Express,
rendez-vous sur le site www.apple.com/fr/airportexpress.
Pour enregistrer l’AirPort Express (si vous ne l’avez pas déjà fait lors de
l’installation du logiciel à partir du CD de l’AirPort Express), rendez-vous sur
le site www.apple.com/fr/register.
Pour plus d’informations sur le service après-vente et le support d’AirPort,
des forums avec des informations et des retours sur différents produits, et
les versions les plus récentes des logiciels Apple à télécharger, rendez-vous
sur le site www.apple.com/fr/support/airport.
Pour le support en dehors des États-Unis, rendez-vous sur le site
www.apple.com/fr/support et choisissez votre pays dans le menu local.48 Chapitre 6 En savoir plus, service après-vente et support
Aide en ligne
m Pour en savoir plus sur l’utilisation d’AirPort, ouvrez l’Utilitaire AirPort et choisissez
Aide > Aide Utilitaire AirPort.
Obtention d’un service de garantie
Si le produit est endommagé ou ne fonctionne pas correctement, suivez les conseils de
cette brochure, de l’aide à l’écran et des ressources en ligne.
Si l’unité ne fonctionne toujours pas, rendez-vous sur le site www.apple.com/fr/support
pour obtenir des instructions sur l’obtention d’un service de garantie.
Où trouver le numéro de série de votre AirPort Express
Le numéro de série est imprimé à l’arrière de votre AirPort Express.49
Annexe
Caractéristiques de
l’AirPort Express
Caractéristiques de l’AirPort
 Vitesse de transfert des données sans fil : jusqu’à 54 mégabits par seconde (Mbps)
 Portée : jusqu’à 45 mètres en utilisation normale (selon l’environnement)
 Bande de fréquence : 2,4 gigahertz (GHz)
 Alimentation de la sortie radio : 15 dBm (nominale)
 Normes : 802.11 DSSS 1 et 2 Mbps standard, 802.11b et caractéristique 802.11g
Interfaces
 Connecteur LAN Ethernet RJ-45 pour la mise en réseau 10/100Base-T intégrée (G)
 Impression USB (Universal Serial Bus) (d)
 Mini-jack optique analogique/numérique de 3,5 mm
 AirPort Extreme
Conditions ambiantes
 Température de fonctionnement : de 0° à 35° C (32° à 95° F)
 Température de stockage : de -25° à 60° C (-13° à 140° F)
 Humidité relative (en fonctionnement) : de 20 % à 80 %
 Humidité relative (en stockage) : de 10 % à 90 % (sans condensation)
 Altitude de fonctionnement : de 0 à 3 048 m (de 0 à 10 000 pieds)
 Altitude maximale de stockage : 4 572 m (15 000 pieds)50 Annexe Caractéristiques de l’AirPort Express
Taille et poids
 Hauteur : 94 mm
 Largeur : 75 mm
 Épaisseur : 28,5 mm
 Poids : 188 grammes
Adresses matérielles
Deux adresses matérielles pour l’AirPort sont imprimées sur le côté du boîtier :
 L’identifiant AirPort : adresse utilisée pour identifier l’AirPort Express sur un réseau
sans fil.
 Le numéro Ethernet : également appelé adresse MAC. Il vous faudra peut-être communiquer cette adresse à votre FAI pour connecter la borne AirPort Express à Internet.
Astuces de sécurité de l’AirPort Express
 La seule façon d’éteindre complètement votre AirPort Express est de la débrancher
de sa source d’alimentation.
 Lorsque vous branchez ou débranchez votre AirPort Express, tenez-la toujours par
les côtés. Éloignez vos doigts de la partie métallique de la prise.
 Votre AirPort Express est un composant haute tension et ne doit en aucun cas être
ouverte, même lorsqu’elle est débranchée. Si votre AirPort Express doit être réparée,
consultez la rubrique « En savoir plus, service après-vente et support » à la page 47. Annexe Caractéristiques de l’AirPort Express 51
 N’insérez jamais de force un connecteur dans les ports. Si le connecteur ne s’emboîte
pas facilement dans le port, c’est probablement qu’ils ne sont pas compatibles.
Vérifiez que le connecteur est adapté au port et qu’il est correctement positionné
par rapport à celui-ci.
 Si vous utilisez le câble d’alimentation facultatif, évitez de laisser pendre la borne
AirPort Express en la tenant par le câble.
 Pendant que vous utilisez votre AirPort Express, il est normal que le boîtier chauffe.
Le boîtier de l’AirPort Express agit comme une surface de refroidissement qui transfère la chaleur de l’intérieur de l’unité vers l’air extérieur plus frais.
Évitez les endroits humides
 Tenez l’AirPort Express à l’écart des sources de liquides, telles que les boissons,
les lavabos, les baignoires, les cabines de douche, etc.
 Protégez la borne AirPort Express de la lumière directe du soleil ou de la pluie ou
d’autre source d’humidité.
 Prenez garde à ne pas renverser de nourriture ou de liquide sur votre AirPort Express.
Si tel est le cas, débranchez l’AirPort Express avant de nettoyer.
Si c’est un liquide qui a été renversé, il faudra peut-être envoyer l’appareil à Apple pour
réparation. Reportez-vous à la section « En savoir plus, service après-vente et support »
à la page 47.
AVERTISSEMENT : pour réduire le risque d’électrocution ou de blessure, n’utilisez pas
votre AirPort Express dans des emplacements mouillés ou humides ni à proximité
de ceux-ci.52 Annexe Caractéristiques de l’AirPort Express
N’effectuez pas vous-même les réparations
À propos de la manipulation
Votre AirPort Express peut être endommagée à la suite d’une manipulation ou d’un
stockage inapproprié. Prenez garde à ne pas laisser tomber votre AirPort Express en
la transportant.
AVERTISSEMENT : n’essayez pas d’ouvrir ou de démonter votre AirPort Express. Vous
risqueriez de vous électrocuter et d’annuler la garantie. Aucune pièce réparable par
l’utilisateur ne se trouve à l’intérieur.53
Regulatory Compliance Information
FCC Declaration of Conformity
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2)
this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio or
television reception is suspected.
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference to
radio or television reception, try to correct the
interference by using one or more of the following
measures:
 Turn the television or radio antenna until the
interference stops.
 Move the computer to one side or the other of the
television or radio.
 Move the computer farther away from the television or
radio.
 Plug the computer into an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are on
circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product. Or,
consult an experienced radio/television technician for
additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc. could void the EMC
compliance and negate your authority to operate the
product.
This product was tested for FCC compliance under
conditions that included the use of Apple peripheral
devices and Apple shielded cables and connectors
between system components. It is important that you
use Apple peripheral devices and shielded cables and
connectors between system components to reduce the
possibility of causing interference to radios, television
sets, and other electronic devices. You can obtain Apple
peripheral devices and the proper shielded cables and
connectors through an Apple-authorized dealer. For
non-Apple peripheral devices, contact the manufacturer
or dealer for assistance.
Responsible party (contact for FCC matters only): Apple
Inc., Product Compliance, 1 Infinite Loop M/S 26-A,
Cupertino, CA 95014-2084, 408-974-2000.54
Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de la Class B respecte toutes les
exigences du Règlement sur le matériel brouilleur du
Canada.
VCCI Class B Statement
Europe — Déclaration de conformité EU
Conforme aux directives européennes 72/23/EEC,
89/336/1999/5 Pour obtenir plus d’informations,
rendez-vous sur www.apple.com/euro/compliance.
Union européenne— Information concernant
l’élimination des déchets
Ce symbole signifie que, selon les normes et la
législation de votre pays, vous devez vous débarrasser
de votre produit sans le mélanger avec les ordures
ménagères. Lorsque ce produit n’est plus utilisable,
portez-le dans un centre de traitement des déchets
agréé par les autorités locales. Certains centrent
acceptent les produits gratuitement. Le traitement et le
recyclage séparé de votre produit lors de son
élimination aideront à préserver les ressources naturelles
et à protéger l’environnement et la santé des êtres
humains.www.apple.com/airport
www.apple.com/support/airport
© 2007 Apple Inc. Tous droits réservés.
Apple, le logo Apple, AirPort, AirPort Express, Airport Extreme, Bonjour, iTunes, Mac, Macintosh et Mac OS sont
des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. AirTunes est une marque d’Apple Inc.
F019-0989-A
Félicitations, vous et votre iMac êtes faits
l’un pour l’autre.Dites bonjour à votre iMac.
www.apple.com/fr/imac
finder
Finder
Parcourez vos
fichiers de la
même manière
que vous naviguez
parmi vos
morceaux de
musique avec
Cover Flow.
Aide Mac
Caméra iSight intégrée avec iChat
Discutez en vidéo avec vos amis et
votre famille, où qu’ils soient dans
le monde.
Aide Mac
isight
Mail
Gérez tous vos comptes de
messagerie d'un même point.
Aide Mac
mail
iCal et Carnet d’adresses
Votre emploi du temps
et vos contacts toujours
synchronisés.
Aide Mac
isyncTime Machine
Sauvegardez et
restaurez automatiquement vos fichiers.
Aide Mac
Spotlight
Trouvez tout ce que
vous recherchez
sur votre Mac
immédiatement.
time machine Aide Mac
spotlight
Safari
Profitez pleinement
du web grâce au
navigateur le plus
rapide du monde.
Aide Mac
safari
Coup d’œil
Prévisualisez vos
fichiers en un clin
d’œil.
Aide Mac
Mac OS X Snow Leopard
www.apple.com/fr/macosx
iLife ’11
www.apple.com/fr/ilife
iPhoto
Vos clichés avec ce
quelque chose en
plus.
Aide iPhoto
photos
iMovie
Vos films
époustouflants en
quelques minutes.
Aide iMovie
GarageBand
Créez facilement
un morceau au son
peaufiné.
Aide GarageBand
coup d’œil
film enregistrementTable des matières 5
Table des matières
Chapitre 1 : Prêt, feu, configurez !
9 Contenu de la boîte
10 Configuration de votre iMac
15 Extinction ou suspension d’activité de votre iMac
Chapitre 2 : Votre iMac au quotidien
18 Caractéristiques de base de votre iMac
20 Ports présents sur votre iMac
22 Autres composants de votre iMac
24 Fonctionnalités du clavier sans fil Apple et de la souris Apple Magic Mouse
26 Utilisation du clavier sans fil Apple
28 Utilisation de la souris Apple Magic Mouse
30 Utilisation de la télécommande Apple Remote
32 Comment obtenir des réponses à vos doutes
Chapitre 3 : Augmentez votre mémoire
37 L’installation de mémoire
42 Vérification de la reconnaissance de la nouvelle mémoire par votre iMac6 Table des matières
Chapitre 4 : À tout problème sa solution
45 Problèmes vous empêchant d’utiliser votre iMac
47 Remplacement des piles
50 Utilisation d’Apple Hardware Test
51 Problèmes de connexion à Internet
54 Problèmes de communication sans fil avec AirPort
54 Maintien à jourde votre logiciel
55 Lorsqu’une application ne répond plus
56 Réinstallation des logiciels fournis avec votre iMac
57 Autres problèmes
59 Informations, services et assistance
62 Localisation du numéro de série de votre produit
Chapitre 5 : Dernières recommandations
64 Informations importantes concernant la sécurité
68 Informations importantes concernant la manipulation
69 Entretien de votre iMac
71 Comprendre l’ergonomie
73 Apple et l’environnementAide Mac Assistant Migration
www.apple.com/fr/imac
Prêt, feu, configurez !
18 Chapitre 1 Prêt, feu, configurez !
Votre iMac est conçu pour que vous puissiez le configurer facilement et commencer
à travailler immédiatement. Si vous n’avez jamais utilisé d’ iMac ou si vous n’êtes pas
familiarisé avec les ordinateurs Mac, vous trouverez dans ce chapitre des informations
qui vous aideront à débuter.
Important : lisez attentivement toutes les instructions d’installation de ce chapitre et
les consignes de sécurité débutant à la page 64 avant de brancher votre iMac sur une
prise de courant.
Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser
votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2, «
Votre iMac au quotidien, » pour découvrir les nouvelles fonctionnalités de cet iMac.
L’Aide Mac contient de nombreuses réponses aux questions concernant votre iMac.
Pour en savoir plus sur l’Aide Mac, consultez la rubrique « Comment obtenir des
réponses à vos doutes » à la page 32.
Retirez tout film de protection de votre iMac avant de le configurer.Chapitre 1 Prêt, feu, configurez ! 9
Contenu de la boîte
Votre iMac est fourni avec un clavier sans fil Apple, une souris sans fil
Apple Magic Mouse et un câble d’alimentation secteur CA. Si vous avez commandé
une télécommande Apple Remote, elle est aussi contenue dans la boîte.
Câble d’alimentation secteur CA
Clavier Apple Wireless Keyboard Souris Apple Magic Mouse10 Chapitre 1 Prêt, feu, configurez !
Configuration de votre iMac
Suivez les étapes ci-après pour configurer votre iMac. Attendez l’étape 4 pour allumer
votre iMac.
Étape 1 : faites passer le câble d’alimentation à travers le trou présent sur le socle,
branchez-le sur le port d’alimentation au dos de votre iMac, puis insérez-le dans
une prise de courant.Chapitre 1 Prêt, feu, configurez ! 11
Étape 2 : pour accéder à Internet ou à un réseau, connectez une extrémité d’un
câble Ethernet au port Ethernet de votre iMac. Connectez l’autre extrémité à un
modem câble, un modem DSL ou un réseau.
Votre iMac est équipé de la technologie AirPort Extreme de mise en réseau sans fil.
Pour en savoir plus sur la configuration d’une connexion sans fil, choisissez Aide >
Aide Mac, puis recherchez le terme « AirPort ».
Pour utiliser une connexion commutée, vous avez besoin d’un modem USB externe.
Branchez le modem sur un port USB de votre iMac, puis utilisez un câble téléphonique
pour connecter le modem à une prise de téléphone.12 Chapitre 1 Prêt, feu, configurez !
Étape 3 : allumez votre clavier et votre souris sans fil.
Appuyez sur le bouton de mise sous tension situé sur le côté droit du clavier sans fil
Apple faites glisser le commutateur se trouvant sur la partie inférieure de votre souris
Apple Magic Mouse pour les activer.
Votre clavier et votre souris sans fil, fournis avec des piles AA, sont déjà jumelés avec
votre iMac. Le jumelage leur permet de communiquer sans fil avec votre iMac.
Bouton Marche/Arrêt Lampe témoin
Lampe témoin Interrupteur Marche/Arrêt
Lorsque vous allumez votre clavier ou votre souris pour la première fois, la lampe
témoin reste allumée pendant 5 secondes, indiquant que les piles sont en bon état.
Si votre clavier ou souris ne fonctionne pas, vérifiez que les piles sont bien mises en
place et chargées (voir la page 47).
La lampe témoin clignote jusqu’à ce que vous allumiez votre iMac et qu’une connexion
soit établie.
Remarque : si vous avez acheté un clavier ou une souris USB, connectez le câble à un
port USB (d) situé sur la partie arrière de votre iMac.Chapitre 1 Prêt, feu, configurez ! 13
Étape 4 : appuyez sur le bouton d’alimentation (®) situé au dos pour allumer
votre iMac.
Un signal sonore retentit lorsque vous allumez l’iMac. Faites un clic avec la souris afin
de la connecter à votre iMac.
®
®
®
Important : si votre clavier et votre souris ne sont pas jumelés, suivez les instructions à
l’écran pour les jumeler avec votre iMac. Cliquez une fois avec la souris pour établir une
connexion. Pour en savoir plus sur le jumelage, voir la page 27.14 Chapitre 1 Prêt, feu, configurez !
Étape 5 : utilisez l’Assistant réglages pour configurer votre iMac.
La première fois que vous démarrez votre iMac, l’Assistant réglages se met en route.
Il vous aide à saisir les informations de connexion à Internet et au courrier électronique
ainsi qu’à configurer un compte d’utilisateur sur votre iMac. Si vous possédez
déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transférer
automatiquement les fichiers, les applications et d’autres informations de votre
ancien Mac vers votre nouvel iMac.
Si vous n’avez pas l’intention de garder ou d’utiliser votre autre Mac, il est préférable
de retirer l’autorisation pour lire de la musique, des vidéos ou des livres audio que vous
avez achetés sur iTunes Store. Si vous retirer l’autorisation d’un ordinateur, il n’est pas
possible à une autre personne de lire les morceaux, les vidéos ou les livres audio achetés
cela libère de la place pour utiliser une autre autorisation. Pour en savoir plus sur le
retrait de l’autorisation d’accès, choisissez Aide iTunes dans le menu Aide d’iTunes.
Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du
démarrage initial, vous pouvez le faire ultérieurement à l’aide de l’Assistant migration.
Accédez au dossier Applications, ouvrez Utilitaires et double-cliquez sur Assistant
migration.
Une fois la configuration terminée, vérifiez les mises à jour de logiciels. Choisissez
le menu Pomme () > « Mise à jour de logiciels…» dans la barre de menu et suivez
les instructions à l’écran.Chapitre 1 Prêt, feu, configurez ! 15
Étape 6 : personnalisez votre bureau et configurer vos préférences.
Vous pouvez facilement personnalisez votre bureau à l’aide des Préférences Système,
votre centre de commandes pour la plupart des réglages de votre iMac. Choisissez le
menu Pomme () > Préférences Système dans la barre de menu, ou cliquez sur l’icône
Préférences Système dans le Dock. Pour en savoir plus, ouvrez l’Aide Mac et recherchez
« Préférences Système » ou la préférence que vous souhaitez modifier.
Extinction ou suspension d’activité de votre iMac
Lorsque vous avez terminé de travailler avec votre iMac suspendez son activité
ou éteignez-le.
Suspension de l’activité de votre iMac
Si vous envisagez de ne pas utiliser votre iMac pendant une période courte, suspendezen l’activité. Lorsque l’activité de votre iMac est suspendue, son écran est noir. Vous
avez la possibilité de réactiver votre iMac rapidement sans passer par la procédure
de démarrage.
Pour suspendre l’activité de votre iMac, procédez de l’une des manières suivantes :
 Choisissez le menu Pomme () > Suspendre, dans la barre des menus.
 Appuyez sur le bouton d’alimentation (®) situé au dos de votre iMac.
 Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Économiseur
d’énergie et réglez une minuterie de mise en veille.
 Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande optionnelle
Apple Remote pendant 3 secondes.16 Chapitre 1 Prêt, feu, configurez !
Pour réactiver votre iMac, procédez de l’une des manières suivantes :
 Appuyez sur n’importe quelle touche du clavier.
 Cliquez à l’aide de la souris.
 Appuyez sur le bouton d’alimentation (®) situé au dos de votre iMac.
 Appuyez sur un des boutons de la télécommande optionnelle Apple Remote.
À la réactivation de votre iMac, vos applications, vos documents et vos réglages sont
conservés tels que vous les aviez laissés.
Extinction de votre iMac
Si vous ne comptez pas utiliser votre iMac pendant plusieurs jours, éteignez-le.
Choisissez Apple () > Éteindre. Pour rallumer votre iMac, appuyez sur le bouton (®)
d’alimentation.
AVIS : éteignez votre iMac avant de le déplacer. Tout déplacement de votre iMac
lorsque le disque dur est en train de tourner risque d’endommager ce dernier et
d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur.Aide Mac iLife
www.apple.com/fr/macosx
Votre iMac au quotidien
218 Chapitre 2 Votre iMac au quotidien
Caractéristiques de base de votre iMac
Lecteur SuperDrive
à chargement
par fente
Caméra iSight
intégrée
Micro intégré
Lampe témoin
de la caméra
Logement de
la carte SD
Haut-parleurs
stéréo intégrés
Récepteur
à infrarouge
(IR) intégréChapitre 2 Votre iMac au quotidien 19
Micro intégré
Enregistrez des sons directement sur votre iMac ou utilisez l’application iChat incluse
pour converser avec vos amis sur Internet.
Lampe témoin de la caméra
La lampe témoin de la caméra est allumée lorsque la caméra iSight est en marche.
Caméra iSight intégrée
Cette caméra permet d’organiser des vidéoconférences à l’aide de l’application iChat,
de prendre des photos à travers Photo Booth ou de capturer de la vidéo avec iMovie.
Lecteur SuperDrive à chargement par fente
Le lecteur SuperDrive à chargement par fente lit et écrit sur des CD et des DVD de taille
standard.
Logement de carte SD
Transférez facilement vos photos, vidéos et données vers et à partir de votre iMac avec
une carte SD.
Haut-parleurs stéréo intégrés
Ces haut-parleurs diffusent le son de vos fichiers de musique, de vos vidéos, de vos jeux
ou d’autres fichiers multimédias.
Récepteur à infrarouge (IR) intégré
Utilisez une télécommande Apple Remote optionnelle (disponible séparément) avec le
récepteur infrarouge pour contrôler Front Row et Keynote sur votre iMac à des distances
pouvant aller jusqu’à 9,1 mètres.20 Chapitre 2 Votre iMac au quotidien
Ports présents sur votre iMac
®
Port de sortie
casque/audio
numérique optique
Port d’entrée audio/
audio numérique
optique
,
f
Port
Mini DisplayPort
£
d Ports USB 2.0 (4)
Port Ethernet
(10/100/1000
Base-T)
G
H Port FireWire 800Chapitre 2 Votre iMac au quotidien 21
G Port Ethernet (10/100/1000Base-T)
Connectez-vous à un réseau Ethernet 10/100/1000 Base-T à grande vitesse ou à un
modem câble ou DSL, ou bien connectez-vous à un autre ordinateur et transférez les
fichiers. Le port Ethernet détecte automatiquement les autres périphériques Ethernet.
£ Port Mini Display Port
Port de sortie avec prise en charge DVI, VGA et DVI double liaison. Le modèle de
27 pouces prend aussi en charge l’entrée vidéo de sources d’affichage externes.
Les câbles et adaptateurs nécessaires sont disponibles séparément.
d Quatre port USB 2.0 (Universal Serial Bus) à haut débit
Grâce à ces ports, vous pouvez brancher entre autres un iPod, un iPhone, un iPas, une
souris, un clavier, une imprimante, un disque dur, un appareil photo numérique, une
manette de jeu ou un modem externe USB sur votre iMac. Ces ports peuvent également
accueillir des périphériques USB 1.1.
, Port d’entrée audio/audio numérique optique
Branchez-y un micro externe alimenté ou tout autre équipement audio numérique.
Ce port peut également servir de mini-prise stéréo 3,5 S/PDIF.
f Port de sortie casque/audio numérique optique
Connect headphones, external powered speakers, or digital audio equipment.
Ce port peut également servir de mini-prise stéréo 3,5 S/PDIF.
H Port FireWire 800
Connectez-y des périphériques externes à haute vitesse, tels que des caméras vidéo
numériques ou des périphériques de stockage externe. Ce port offre une puissance
maximale de 7 watts.22 Chapitre 2 Votre iMac au quotidien
Autres composants de votre iMac
®
Bouton d’alimentation
Port secteur
®
Accès à la mémoire
(par-dessous)
Logement de sécuritéChapitre 2 Votre iMac au quotidien 23
Port secteur
Utilisez-le pour brancher le câble d’alimentation à votre iMac.
Logement de sécurité
Attachez votre ordinateur à l’aide d’un câble et d’un cadenas pour décourager les
tentatives de vol (disponible séparément).
® Bouton d’alimentation
Il permet d’allumer votre iMac ou de suspendre son activité. Maintenez ce bouton
enfoncé pour redémarrer votre lors des procédures de dépannage.
Accès à la mémoire
Votre iMac est équipé d’au moins 4 Go de mémoire installée sous la forme de deux
modules de mémoire de 2 Go chacun.
Z Technologie sans fil AirPort Extreme (interne)
Connectez-vous à un réseau sans fil grâce à la technologie AirPort Extreme intégrée.
◊ Technologie sans fil Bluetooth
®
2.1+EDR (interne)
Connectez les appareils sans fil, tels que le clavier sans file Apple, la souris
Apple Magic Mouse, les téléphones portables Bluetooth et les assistants
numériques personnels.24 Chapitre 2 Votre iMac au quotidien
Fonctionnalités du clavier sans fil Apple et de la souris
Apple Magic Mouse
Touches
de luminosité
Clavier
Apple
Wireless
Keyboard
Touches
de réglage
du volume
-
Exposé Dashboard
Souris
Apple
Magic
Mouse
Touche d’éjection
de disque
C
Touches
multimédiaChapitre 2 Votre iMac au quotidien 25
Souris Apple Magic Mouse
Intègre un moteur de suivi laser, la technologie sans fil Bluetooth, un interpréteur
transparent qui utilise la technologie Multi-Touch pour prendre en charge plusieurs
boutons, le défilement 360°, l’agrandissement écran et le contrôle du curseur de
votre iMac. Utilisez les préférences Souris pour ajuster le suivi, les clics et la vitesse de
défilement ou pour ajouter la prise en charge d’un bouton secondaire (voir la page 29).
Clavier sans fil Apple
Combinez la liberté du sans fil avec les fonctions clés pré-programmées pour fonctionner
avec vos applications.
C Touche d’éjection de disque
Maintenez cette touche enfoncée pour éjecter un disque. Vous pouvez aussi éjecter
un disque en faisant glisser son icône dans la Corbeille.
Touche Dashboard (F4)
Vous permet d’ouvrir le Dashboard pour accéder à vos widgets.
Touche Exposé (F3)
Ouvrez Exposé pour afficher simultanément toutes les fenêtres ouvertes sur votre
bureau.
Touches de réglage de luminosité (F1, F2)
Augmentez ( ) ou diminuez ( ) la luminosité de l’écran.
’ Clés d’accès (F7, F8, F9)
Effectuez un retour rapide ( ), lancez la lecture ou mettez en pause (’), ou effectuez
une avance rapide ( ) durant l’écoute d’un morceau de musique, le visionnage d’une
vidéo ou la présentation d’un diaporama.
- Touches de réglage du volume (F10, F11, F12)
Coupez le son (—), baissez (–) ou augmentez (-) le volume du son diffusé par les hautparleurs ou à travers le port de sortie casque de votre iMac.26 Chapitre 2 Votre iMac au quotidien
Utilisation du clavier sans fil Apple
Votre clavier sans fil, fourni avec deux piles AA, est déjà jumelé avec votre iMac.
Le jumelage signifie que votre clavier et votre iMac sont connectés sans fil et
peuvent communiquer entre eux.
À propos de la lampe témoin
Le voyant DEL de votre clavier sans fil fonctionne comme indicateur de piles et comme
voyant d’état. Lorsque vous allumez votre clavier pour la première fois, le voyant reste
allumé pendant 5 secondes, indiquant que les piles sont en bon état, puis s’éteint.
Si vous appuyez sur le bouton Marche/Arrêt (®) de votre clavier sans fil et que la
lampe témoin ne s’allume pas, vous devez changer les piles. Consultez « Remplacement
des piles » à la page 47.
Lampe témoin Bouton Marche/ArrêtChapitre 2 Votre iMac au quotidien 27
Pour jumeler votre clavier sans fil
Si votre clavier sans fil n’est pas jumelé avec votre , la lampe témoin se met à clignoter.
Cela indique que votre clavier est en mode découverte et qu’il est prêt pour le
jumelage avec votre iMac.
Pour jumeler votre clavier sans fil :
1 Appuyez puis relâchez le bouton Marche/Arrêt (®) pour allumer votre clavier sans fil.
2 Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Clavier.
3 Cliquez sur « Configurer le clavier Bluetooth… », situé dans l’angle inférieur droit.
4 Sélectionnez votre clavier sans fil, puis suivez les instructions à l’écran.
Si vous ne jumelez pas votre clavier avec votre iMac au cours des 3 minutes, la lampe
témoin et le clavier s’éteignent pour économiser la durée des piles. Appuyez sur le
bouton Marche/Arrêt (®) pour allumer à nouveau votre clavier et le jumeler avec votre
iMac. Une fois le jumelage entre votre clavier et votre iMac terminé, la lampe témoin
reste allumée pendant 3 secondes puis s’éteint.
Utilisation de votre clavier
Personnalisez votre clavier en utilisant les préférences Clavier. Vous pouvez notamment
changer les touches de modification et assigner les raccourcis clavier aux commandes
du menu liées à une application Mac OS X ou au Finder.
Pour personnaliser votre clavier :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Clavier, puis sur Clavier ou Raccourcis clavier.28 Chapitre 2 Votre iMac au quotidien
Utilisation de la souris Apple Magic Mouse
Votre souris sans fil Apple Magic Mouse, fournie avec deux piles AA, est déjà jumelée
avec votre iMac. Le jumelage signifie que votre Apple Magic Mouse et votre iMac
peuvent communiquer grâce à une connexion sans fil établie entre eux.
À propos de la lampe témoin
Lorsque vous allumez votre souris Apple Magic Mouse pour la première fois, le voyant
reste allumé pendant 5 secondes, indiquant que les piles sont en bon état. Lorsque
vous allumez votre souris et que la lampe témoin ne s’allume pas, vous devez changer
les piles. Consultez « Remplacement des piles » à la page 47.
Lampe témoin
Interrupteur
Marche/ArrêtChapitre 2 Votre iMac au quotidien 29
Pour jumeler votre clavier sans fil :
Si votre souris Apple Magic Mouse n’est pas jumelée avec votre iMac, la lampe témoin
se met à clignoter. Cela indique que votre souris est en mode découverte et qu’elle est
prête pour le jumelage.
Pour jumeler votre souris :
1 Allumez la souris en faisant glisser l’interrupteur Marche/Arrêt situé sur sa partie
inférieure.
2 Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Souris.
3 Cliquez sur « Configurer la souris Bluetooth… », situé dans l’angle inférieur droit.
4 Sélectionnez votre souris sans fil, puis suivez les instructions à l’écran.
Si vous ne jumelez pas votre souris avec votre iMac au cours des 3 minutes, la lampe
témoin et la souris s’éteignent pour économiser la durée des piles. Faites glisser
l’interrupteur Marche/Arrêt pour allumer à nouveau votre souris et la jumeler avec
votre iMac. Une fois le jumelage entre votre souris et votre iMac terminé, la lampe
témoin reste allumée.
Utilisation de la souris Apple Magic Mouse
Pour en savoir plus sur les gestes Multi-Touch que vous pouvez faire avec votre souris
Apple_Magic Mouse ou pour modifier son fonctionnement, utilisez les Préférences
Souris. Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Souris.30 Chapitre 2 Votre iMac au quotidien
Utilisation de la télécommande Apple Remote
Si une télécommande Apple Remote vous a été fournie, vous pouvez l’utiliser avec tous
les produits Apple disposant d’un récepteur à infrarouge (IR) intégré. Contrôlez et lisez
un film DVD ou de la musique de votre bibliothèque iTunes, visionnez des diaporamas
de photos, des bandes-annonces et bien plus.
Haut
Bas
Menu Lecture/Pause
Gauche Droite
Sélection
Pour jumeler votre télécommande :
1 Appuyez sur Lecture/Pause pour lancer lecture ou mettre en pause l’écoute d’un
morceau de musique, le visionnage d’une vidéo ou la présentation d’un diaporama.
2 Appuyez sur Droite ou Gauche pour passer à la chanson suivante ou revenir à la
précédente de votre bibliothèque iTunes ou au chapitre précédent ou suivant sur un DVD.
3 Maintenez Droite ou Gauche enfoncée pour l’avance ou le retour rapide dans un
morceau ou une vidéo.
4 Appuyez sur Haut ou Bas pour ajuster le volume.Chapitre 2 Votre iMac au quotidien 31
Jumelage de votre télécommande Apple Remote
Jumeler votre télécommande Apple Remote avec votre iMac ou un autre produit
Apple. Une fois le jumelage avec votre iMac ou un autre produit Apple, l’appareil
ne peut être contôlé qu’au moyen de cette télécommande.
Pour jumeler votre télécommande :
1 Approchez-vous à 8 ou 10 cm de votre iMac ou autre produit Apple.
2 Dirigez votre télécommande vers le récepteur à infrarouge de votre iMac ou de
votre produit Apple.
3 Maintenez les boutons Droite et Menu enfoncés 5 secondes.
Une fois le jumelage effectué, une icône de maillon de chaîne s’affiche à l’écran.
Pour désactiver le jumelage de votre télécommande et de votre iMac :
1 Choisissez le menu Pomme () > Préférences Système dans la barre de menu.
2 Cliquez sur Sécurité, puis sur « Désactiver le jumelage ».
Pour l’Apple TV ou d’autres produits Apple, maintenez les boutons Menu et
Gauche enfoncés pour désactiver le jumelage.
Remplacement de la pile
Pour remplacer la pile :
1 Utilisez une pièce pour retirer le couvercle du compartiment de la pile.
2 Insérez une pile CR2032, la face positive (+) tournée vers le haut.32 Chapitre 2 Votre iMac au quotidien
3 Remettez le couvercle en place et resserrez-le à l’aide d'une pièce de monnaie.
Compartiment
pour la pile
Comment obtenir des réponses à vos doutes
De plus amples informations concernant votre iMac sont disponibles dans l’aide Mac
et sur Internet, à l’adresse www.apple.com/fr/support/imac.
Pour ouvrir l’Aide Mac :
1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran).
2 Choisissez Aide > Aide Mac (cliquez sur le menu Aide dans la barre des menus puis
sélectionnez Aide Mac).
3 Cliquez dans le champ Rechercher, tapez votre question puis appuyez sur la touche
Retour du clavier.
Informations supplémentaires
Pour en savoir plus sur l’utilisation de votre iMac, consultez le tableau suivant :
Pour en savoir plus sur… Consultez
L’installation de mémoire le chapitre 3, « Augmentez votre mémoire » à la page 35.
Le dépannage de votre iMac
en cas de problème
le chapitre 4, « À tout problème sa solution » à la page 43.Chapitre 2 Votre iMac au quotidien 33
Pour en savoir plus sur… Consultez
L’obtention de services et d’une
assistance pour votre iMac
« Informations, services et assistance » à la page 59. Vous pouvez
également vous rendre sur le site web d’assistance Apple à
l’adresse www.apple.com/fr/support.
L’utilisation de Mac OS X Le site web de Mac OS X à l’adresse www.apple.com/fr/macosx
ou recherchez « Mac OS X » dans l’Aide Mac.
La migration depuis un PC
vers un Mac
« Pourquoi vous adorerez le Mac » sur
www.apple.com/fr/getamac/whymac.
L’utilisation des applications
iLife
Le site web d’iLife à l’adresse www.apple.com/fr/ilife.
Vous pouvez aussi ouvrir une application iLife, ouvrir l’aide
consacrée à cette application, puis saisir une question dans
le champ de recherche.
La modification des
Préférences Système
Les Préférences Système en choisissant le menu Pomme (K) >
Préférences Système. Vous pouvez également rechercher
« préférences système » dans l’Aide Mac.
L’utilisation de la caméra iSight L’Aide Mac en recherchant « iSight ».
Utilisation de votre clavier ou
de votre souris
Les Préférences Système en choisissant Clavier ou Souris.
Vous pouvez également ouvrir l’Aide Mac et rechercher
le terme « clavier » ou « souris ».
L’utilisation de la technologie
sans fil AirPort Extreme
La page web d’assistance AirPort à l’adresse
www.apple.com/support/airport. Vous pouvez également
ouvrir l’Aide Mac et rechercher le terme « AirPort ».
L’utilisation de la technologie
sans fil Bluetooth
Ouvrez l’Aide Mac et recherchez le terme « Bluetooth ».
Vous pouvez également consulter la page web d’assistance
Bluetooth à l’adresse www.apple.com/fr/support/bluetooth.34 Chapitre 2 Votre iMac au quotidien
Pour en savoir plus sur… Consultez
La connexion d’une
imprimante
L’Aide Mac en recherchant « impression ».
Les connexions FireWire et USB. L’Aide Mac en recherchant « FireWire » ou « USB ».
La connexion à Internet L’Aide Mac en recherchant « Internet ».
Un moniteur externe Ouvrez l’Aide Mac et rechercher les termes « port de sortie
vidéo » ou « mode moniteur externe ».
La télécommande Apple
Remote
L’Aide Mac en recherchant « télécommande ».
Front Row L’Aide Mac en recherchant « Front Row ».
L’utilisation du lecteur
SuperDrive
L’Aide Mac en recherchant « lecteur optique ».
Les caractéristiques La page des Caractéristiques à l’adresse
www.apple.com/fr/support/specs pour les caractéristiques
techniques standard. Vous pouvez également ouvrir Informations
Système en choisissant le menu Pomme (K) > « À propos de ce
Mac » dans la barre des menus, puis en cliquant sur Plus d’infos.
Actualités Apple,
téléchargements gratuits
et catalogues en ligne de
logiciels et de matériel
Le site web d’Apple, à l’adresse www.apple.com/fr/.
Instructions, assistance
technique et manuels
destinés aux produits Apple
Le site d’assistance Apple, à l’adresse www.apple.com/fr/support.Aide Mac RAM
www.apple.com/fr/store
Augmentez votre mémoire
336 Chapitre 3 Augmentez votre mémoire
Votre iMac est équipé d’au moins 4 gigaoctets (Go) de mémoire DRAM (Dynamic
Random Access) DDR 3 (Double Data Rate 3) installés sous la forme de deux modules
de mémoire de 2 Go chacun. Vous pouvez augmenter la mémoire jusqu’à 16 Go
en remplaçant ou en installant de la mémoire supplémentaire par des modules
de mémoire de 2 ou 4 Go. Les modules de mémoire doivent être conformes aux
spécifications suivantes :
 format Small Outline Dual Inline Memory Module (SO-DIMM) ;
 1333 MHz, PC3-8500, compatible DDR3 (également appelé DDR3 1333) ;
 sans tampon et non enregistrée.
AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un
technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance
qui accompagnent votre iMac pour savoir comment contacter Apple. Tout dommage
causé à votre matériel en tentant d’installer vous-même de la mémoire n’est pas
couvert par la garantie limitée de votre iMac.Chapitre 3 Augmentez votre mémoire 37
L’installation de mémoire
Votre iMac possède quatre logements mémoire. Deux sont occupés respectivement
par un module de mémoire d’au moins 2 Go. Vous pouvez installer de la mémoire
supplémentaire dans les logements libres ou remplacer la mémoire des logements
occupés par des modules de mémoire de 2 ou 4 Go.
Vous pouvez acheter de la mémoire Apple supplémentaire chez un revendeur agréé
Apple, dans un magasin Apple Store ou sur l’Apple Store en ligne à l’adresse
www.apple.com/fr/store.
AVERTISSEMENT : éteignez toujours votre iMac et retirez le câble d’alimentation avant
d’installer de la mémoire. N’essayez pas d’installer de la mémoire alors que votre iMac
est branché.
Pour installer de la mémoire :
1 Éteignez votre iMac en choisissant le menu Pomme () > Éteindre.
2 Débranchez tous les câbles de votre iMac, y compris le câble d’alimentation.
3 Placez un linge ou un chiffon propre et doux sur votre surface de travail. Tout en tenant
votre iMac par les côtés, posez-le à plat de manière à faire reposer l’écran
contre la surface de la table et à tourner la partie inférieure de l’ordinateur vers vous.38 Chapitre 3 Augmentez votre mémoire
4 Soulevez le socle et utilisez un tournevis cruciforme n° 2 pour desserrer les trois vis
imperdables sur le cache d’accès à la mémoire. Faites-les tourner dans le sens inverse
des aiguilles d’une montre.
Tournevis
cruciforme
Soulevez
le socle
®
Cache d’accès
à la mémoire
5 Retirez le cache d’accès à la mémoire et mettez-le de côté.Chapitre 3 Augmentez votre mémoire 39
6 Sortez les languettes du compartiment de mémoire.
7 Pour remplacer un module de mémoire, vous devez tirer sur la languette afin d’éjecter
le module de mémoire installé. Retirez les modules de mémoire que vous souhaitez
remplacer.
®
Sortez la languette
Sortez la
languette40 Chapitre 3 Augmentez votre mémoire
8 Insérez les nouveaux modules de mémoire dans les logements, avec l’encoche tournée
vers la droite, comme indiqué sur l’illustration.
 Si vous installez des modules de mémoires supplémentaires, insérez-les dans
les logements vides.
 Si vous remplacez des modules de mémoires existants, insérez un nouveau module
dans chacun des logements se trouvant le loin du moniteur.
9 Enfoncez fortement chaque module de mémoire dans son logement. Vous entendrez
un léger clic indiquant que le module de mémoire est correctement installé.
10 Remettez les languettes dans le compartiment de mémoire.
®
Modules de mémoire Remettez la
languetteChapitre 3 Augmentez votre mémoire 41
11 Remettez le cache d’accès à la mémoire en place et resserrez les trois vis imperdables
à l’aide d’un tournevis cruciforme n° 2.
AVERTISSEMENT : n’oubliez pas de remettre le cache d’accès à la mémoire en place
après avoir installé la mémoire. Votre iMac ne fonctionnera pas correctement sans le
cache d’accès à la mémoire.
Tournevis
cruciforme
Soulevez
le socle
®
Cache d’accès
à la mémoire
12 Tenez votre iMac par les côtés pour le remettre en position de marche. Reconnectez
ensuite les câbles et le cordon d’alimentation.
13 Allumez votre iMac en appuyant sur le bouton d’alimentation (®) situé à l’arrière.42 Chapitre 3 Augmentez votre mémoire
Vérification de la reconnaissance de la nouvelle mémoire
par votre iMac
Après avoir installé la mémoire, assurez-vous que l’ordinateur la reconnaît.
Pour vérifier la mémoire installée sur votre iMac :
1 Démarrez votre iMac.
2 Lorsque le bureau Mac OS s’affiche, choisissez le menu Pomme () > À propos de ce Mac.
La quantité totale de mémoire installée sur votre iMac s’affichera alors. Pour un aperçu
plus détaillé de la quantité de mémoire installée, ouvrez Informations Système en
cliquant sur Plus d’infos.
Si la mémoire que vous avez installée n’atteint pas le niveau de la configuration requise
(voir la page 36), votre iMac sonnera trois fois toutes les cinq secondes. Si tel est le cas,
éteignez votre iMac et vérifiez à nouveau les instructions d’installation pour vous assurer
que la mémoire est compatible avec votre iMac et qu’elle est correctement installée.
Si les problèmes persistent, retirez la mémoire et consultez les informations d’assistance
technique fournies avec la mémoire ou contactez le fournisseur de la mémoire.Aide Mac aide
www.apple.com/fr/support
À tout problème sa solution
444 Chapitre 4 À tout problème sa solution
Il se peut que vous rencontriez à titre exceptionnel des problèmes en utilisant votre iMac.
Ce chapitre vous propose des conseils de dépannage à essayer en cas de problème.
Vous trouverez également d’autres informations de dépannage dans l’Aide Mac ou
sur le site web d’assistance à l’adresse www.apple.com/fr/support/imac.
Il existe généralement une solution simple et rapide aux problèmes qui peuvent
survenir au cours de l’utilisation de votre iMac. Si vous rencontrez un problème, essayez
de noter les opérations que vous avez effectuées avant que le problème ne survienne.
Ce récapitulatif permet de restreindre les causes possibles du problème et de trouver
la solution. Les éléments à noter comprennent :
 Les applications que vous étiez en train d’utiliser quand le problème est apparu.
Les problèmes qui ne surgissent qu’avec une application particulière peuvent
indiquer que cette application n’est pas compatible avec la version de Mac OS
installée sur votre iMac.
 Tout logiciel que vous avez récemment installé.
 Tout nouveau composant matériel connecté ou installé (mémoire supplémentaire
ou périphérique, par exemple).
AVERTISSEMENT : n’essayez pas d’ouvrir votre iMac,sauf pour y installer de la mémoire.
Si votre iMac a besoin d’être inspecté, reportez-vous à la rubrique « Informations,
services et assistance » à la page 59 pour savoir comment contacter Apple ou un
fournisseur de services agréé Apple. L’utilisateur ne peut remplacer aucune pièce de
l’iMac excepté la mémoire.Chapitre 4 À tout problème sa solution 45
Problèmes vous empêchant d’utiliser votre iMac
Si votre iMac ne répond plus ou que le pointeur se fige
 Vérifiez que votre clavier sans fil Apple ou votre souris Apple Magic Mouse est activé et
que les pilessont en état de marche. (Consultez « Remplacement des piles » à la page 47.)
Si vous utilisez un clavier ou une souris USB, assurez-vous qu’ils sont connectés.
Débranchez puis rebranchez les connecteurs et vérifiez qu’ils sont correctement
mis en place.
 Essayez de forcer à quitter les applications qui rencontrent un problème. Maintenez
les touches Option et Commande (x) enfoncées, puis appuyez sur Échap. Si une
zone de dialogue apparaît, sélectionnez-y l’application et cliquez sur Forcer à quitter.
Enregistrez alors le travail de toute application ouverte, puis redémarrez l’iMac afin
de vous assurer que le problème est entièrement réglé.
 Si vous ne parvenez pas à forcer la fermeture de l’application, éteignez votre ordinateur
en maintenant enfoncé le bouton d’alimentation (®) situé à l’arrière de votre iMac
pendant cinq secondes. Débranchez le câble d’alimentation de l’iMac. Rebranchez
ensuite le câble, puis appuyez sur le bouton d’alimentation (®) pour rallumer l’iMac.
Si le problème survient chaque fois que vous utilisez une application particulière, consultez
le fabricant de cette application pour vérifier si elle est compatible avec votre iMac.
Pour obtenir des informations de contact et d’assistance concernant les logiciels fournis
avec votre ordinateur, consultez la page www.apple.com/guide ou rendez-vous sur le
site du fabricant.
Si le problème survient fréquemment, essayez de réinstaller votre logiciel système
(consultez la rubrique « Réinstallation des logiciels fournis avec votre iMac » à la page 56).46 Chapitre 4 À tout problème sa solution
Si votre iMac se bloque au démarrage ou si un point d’interrogation clignotant
apparaît
 Patientez quelques secondes. Si votre iMac ne démarre pas dans un bref délai,
éteignez-le en maintenant le bouton d’alimentation (®) enfoncé pendant 5 secondes.
Maintenez ensuite la touche Option enfoncée tout en appuyant à nouveau sur le
bouton d’alimentation (®) pour démarrer votre ordinateur. Maintenez la touche
Option enfoncée jusqu’au démarrage de votre iMac, puis cliquez sur la flèche située
sous l’icône du disque dur que vous voulez utiliser.
 Après le démarrage de votre iMac, ouvrez Préférences Système et cliquez sur
Démarrage. Sélectionnez un dossier système local de Mac OS X.
 Si le problème survient fréquemment, il se peut que vous deviez réinstaller votre
logiciel système (consultez la rubrique « Problèmes vous empêchant d’utiliser votre
iMac » à la page 45).
Si votre iMac ne répond plus ou que le pointeur se fige
 Assurez-vous que le câble d’alimentation est correctement connecté à l’iMac et
branché sur une prise électrique en état de marche.
 Appuyez sur le bouton d’alimentation (®) et maintenez immédiatement les touches
Commande (x), Option, P et R enfoncées jusqu’à ce que vous entendiez une deuxième
fois le signal sonore de démarrage. Cela permet de réinitialiser la mémoire RAM des
paramètres (PRAM).
 Si vous avez récemment installé de la mémoire et que votre iMac fait retentir une
sonnerie toutes les cinq secondes, assurez-vous que la mémoire est correctement
installée et qu’elle est compatible avec votre iMac. Vérifiez si le retrait de cette
mémoire permet à l’iMac de démarrer (voir la page 42).Chapitre 4 À tout problème sa solution 47
 Débranchez le câble d’alimentation et attendez au moins 30 secondes. Rebranchez
le câble, puis appuyez sur le bouton d’alimentation (®) pour allumer votre iMac.
 Si vous ne parvenez toujours pas à redémarrer votre iMac, consultez la rubrique
« Informations, services et assistance » à la page 59 pour obtenir les coordonnées
du service de réparation Apple.
Remplacement des piles
Votre clavier sans fil Appleet votre souris Apple Magic Mouse sont fournis avec deux
piles AA déjà installées. Vous pouvez les remplacer par des piles AA alcalines, au lithium
ou rechargeables.
Conservez le couvercle du compartiment des piles hors de portée des enfants en bas âge.
AVERTISSEMENT : lorsque vous remplacez les piles, remplacez-les toutes en même
temps. Ne mélangez pas les anciennes piles avec les nouvelles et ne mélangez pas
différents types de piles (par exemple, des piles alcalines et des piles au lithium).
N’ouvrez pas les piles, ne les percez pas, ne les installez pas à l’envers ou ne les
exposez pas à des flammes, à des températures élevées ou à de l’eau. Conservezles hors de portée des enfants.48 Chapitre 4 À tout problème sa solution
Pour changer les piles de votre clavier sans fil :
1 Appuyez puis relâchez le bouton Marche/Arrêt (®) pour allumer votre clavier sans fil.
2 Utilisez une pièce pour retirer le couvercle du compartiment des piles.
Couvercle du compartiment des piles
3 Placez deux piles AA dans le compartiment des piles comme illustré ci-dessous.
Insérez les piles
4 Replacez le couvercle du compartiment des piles.
Pour contrôler l’état des piles, appuyez sur le bouton Marche/Arrêt (®). Si la lampe
témoin ne s’allume pas, vous devez changer les piles. Vous pouvez contrôler l’état
des piles dans les Préférences Clavier. Choisissez le menu Pomme () > Préférences
Système, puis cliquez sur Clavier. L’état des piles apparaît à gauche en bas.Chapitre 4 À tout problème sa solution 49
Pour remplacer les piles de la souris Apple Magic Mouse :
1 Allumez la souris en faisant glisser l’interrupteur Marche/Arrêt situé sur sa partie
inférieure.
2 Faites glisser le loquet et retirez le couvercle des piles.
Loquet Piles
3 Insérez les piles, face positive (+) vers le haut, comme illustré ci-dessous.
4 Replacez le couvercle et allumez votre souris.
vous devez cliquer une fois avec votre souris Apple Magic Mouse pour la reconnecter
avec votre iMac.
Faites glisser l’interrupteur Marche/Arrêt (®) situé sur la partie inférieure de la souris
pour vérifier l’état des piles. Si la lampe témoin ne s’allume pas, vous devez changer
les piles. Vous pouvez contrôler l’état des piles dans les Préférences Souris. Choisissez
le menu Pomme () > Préférences Système, puis cliquez sur Souris. L’état des piles
apparaît à gauche en bas.50 Chapitre 4 À tout problème sa solution
Utilisation d’Apple Hardware Test
Si vous pensez que votre iMac souffre d’un problème matériel, utilisez l’application
Apple Hardware Test pour vérifier s’il existe un problème avec l’un des composants
de l’ordinateur (tels que la mémoire ou le processeur).
Pour utiliser Apple Hardware Test :
1 Déconnectez tous les périphériques externes de votre iMac, exceptés le clavier et la
souris USB si vous les utilisez. Si un câble Ethernet est connecté, déconnectez-le.
2 Redémarrez votre iMac en maintenant la touche D enfoncée.
3 Lorsque l’écran de sélection de langue de l’application Apple Hardware Test apparaît,
sélectionnez la langue à utiliser.
4 Appuyez sur la touche Retour ou sur le bouton Continuer.
5 Lorsque l’écran principal Apple Hardware Test apparaît (environ 45 secondes plus tard),
suivez les instructions affichées à l’écran.
6 Apple Hardware Test affiche un code d’erreur dès qu’un problème est détecté. Notez
le code d’erreur avant d’entreprendre les démarches d’assistance. Si aucune panne
matérielle n’est détectée par Apple Hardware Test, il s’agit peut-être d’un problème
de logiciel.
Si cette procédure ne donne aucun résultat, vous pouvez insérer le DVD d’installation
d’applications fourni avec votre iMac pour utiliser l’application Apple Hardware Test.
Pour en savoir plus, consultez le fichier Ouvrez-moi Apple Hardware Test disponible
sur le DVD d’installation d’applications.Chapitre 4 À tout problème sa solution 51
Problèmes de connexion à Internet
Votre iMac dispose de l’application Assistant réglages de réseau pour vous aider tout
au long de la procédure de configuration d’une connexion Internet. Ouvrez Préférences
Système, puis cliquez sur Réseau. Cliquez sur le bouton « Assistant » pour ouvrir
l’Assistant réglages de réseau.
En cas de problème avec votre connexion Internet, vous pouvez soit essayer les étapes
de cette rubrique en fonction de votre type de connexion, soit utiliser Diagnostic réseau.
Pour utiliser Diagnostic réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau puis cliquez sur « Assistant ».
3 Cliquez sur Diagnostic pour lancer Diagnostic réseau.
4 Suivez les instructions à l’écran.
Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe
peut-être au niveau du fournisseur d’accès à Internet (FAI) auquel vous essayez de vous
connecter, du périphérique externe utilisé pour la connexion au FAI ou du serveur
auquel vous essayez d’accéder. Vous pouvez essayer les instructions décrites dans
les rubriques suivantes.
Connexion à Internet par modem câble, modem DSL et réseau local (LAN)
Assurez-vous que tous les câbles du modem sont fermement branchés, y compris le
câble d’alimentation du modem, le câble reliant le modem à l’ordinateur, ainsi que le
câble reliant le modem à la prise murale. Vérifiez également les câbles et l’alimentation
de vos éventuels routeurs et concentrateurs Ethernet.52 Chapitre 4 À tout problème sa solution
Éteignez, puis rallumez le modem afin de réinitialiser le matériel du modem.
Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains
fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation
du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez
l’actionner avant ou après avoir éteint puis rallumé le modem.
Important : les instructions faisant référence à des modems ne concernent pas les
utilisateurs de réseau local. Ces derniers peuvent disposer de concentrateurs, de
commutateurs, de routeurs ou de blocs de connexion que les utilisateurs de modem DSL
ne possèdent pas. Les utilisateurs de réseau local doivent s’adresser à leur administrateur
réseau plutôt qu’à un fournisseur d’accès à Internet.
Connexions PPPoE
Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via
PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les données saisies
dans les préférences Réseau sont correctes.
Pour saisir les réglages PPPoE :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau.
3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez
PPPoE dans le menu local Interface.
4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez
Ethernet si vous vous connectez à un réseau câblé ou AirPort si vous vous connectez à
un réseau sans fil.Chapitre 4 À tout problème sa solution 53
5 Saisissez les informations fournies par votre fournisseur d’accès, tel que le nom du
compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès le
demande).
6 Cliquez sur Appliquer pour activer les réglages.
Connexions au réseau
Assurez-vous que le câble Ethernet est branché sur votre iMac et sur le réseau.
Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet.
Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet,
assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre
fournisseur d’accès à Internet fournit une seule ou plusieurs adresses IP, autrement dit,
une pour chaque ordinateur.
Si une seule adresse IP est utilisée, vous devez disposer d’un routeur capable de
partager la connexion (on parle alors de conversion d’adresse réseau (NAT) ou de
« masquage d’adresses IP »). Pour obtenir des informations sur la configuration,
consultez la documentation fournie avec votre routeur ou contactez la personne qui
a configuré votre réseau. La borne d’accès AirPort peut être utilisée pour partager
plusieurs adresses IP entre plusieurs ordinateurs. Pour en savoir plus sur l’utilisation
d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web de
l’AirPort Extreme, à l’adresse www.apple.com/fr/support/airport.
Si ces informations ne vous permettent pas de résoudre le problème, adressez-vous
à votre fournisseur d’accès à Internet ou à votre administrateur réseau.54 Chapitre 4 À tout problème sa solution
Problèmes de communication sans fil avec AirPort
En cas de problèmes avec les communications sans fil AirPort :
 Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est
actif et dispose d’un point d’accès sans fil.
 Assurez-vous que vous avez correctement configuré le logiciel en respectant les
instructions fournies avec votre borne d’accès ou votre point d’accès.
 Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la
zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques
ou des structures métalliques se trouvant à proximité peuvent interférer avec
les communications sans fil et réduire la portée de votre antenne. Il est possible
d’améliorer la réception en réorientant ou en faisant pivoter l’ordinateur.
 Vérifiez le menu d’état AirPort (Z) dans la barre des menus. Ce menu affiche jusqu’à
quatre barres indiquant la puissance du signal. Si le signal est faible, essayez de
changer de place.
 Consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide
AirPort dans la barre des menus). Lisez également les instructions fournies avec
le périphérique sans fil.
Maintien à jourde votre logiciel
Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les
dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple.Chapitre 4 À tout problème sa solution 55
Chaque fois que vous vous connectez à Internet, Mise à jour de logiciels recherche
des mises à jour disponibles pour votre ordinateur. Vous pouvez régler votre iMac
pour que cette recherche soit effectuée de manière périodique, afin que vous puissiez
télécharger et installer des logiciels mis à jour.
Pour rechercher des mises à jour de logiciels :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur l’icône Mise à jour de logiciels, puis suivez les instructions à l’écran.
 Pour en savoir plus, recherchez « Mise à jour de logiciels » dans l’Aide Mac.
 Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse
www.apple.com/fr/macosx.
Lorsqu’une application ne répond plus
Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Avec Mac OS X, il
est possible de quitter une application qui ne répond plus sans redémarrer votre iMac,
ce qui permet d’enregistrer le travail effectué dans d’autres applications ouvertes.
Pour forcer une application à quitter :
1 Appuyez sur Commande (x) + Option + Échap ou choisissez le menu Pomme () >
Forcer à quitter.
La boîte de dialogue Forcer à quitter des applications apparaît avec l’application
sélectionnée.
2 Cliquez sur Forcer à quitter.
L’application quitte, en laissant toutes les autres applications ouvertes.56 Chapitre 4 À tout problème sa solution
Réinstallation des logiciels fournis avec votre iMac
Les disques d’installation de logiciels fournis avec votre iMac permettent de réinstaller
Mac OS X et toute application livrée avec votre ordinateur.
Important : Apple vous recommande de sauvegarder les données de votre disque dur
avant de restaurer le logiciel. Apple décline toute responsabilité en cas de perte de
données.
Installation de Mac OS X
Pour installer Mac OS X :
1 Sauvegardez vos fichiers importants.
2 Insérez le DVD d’installation de Mac OS X fourni avec votre iMac.
3 Double-cliquez sur « Installer Mac OS X ».
4 Suivez les instructions à l’écran.
Lorsque, dans la sous-fenêtre, vous êtes invité à sélectionner un disque, choisissez votre
disque dur actuel Mac OS X (dans la plupart des cas, ce sera le seul disque disponible).
5 Pour choisir les parties de Mac OS X à installer, cliquez sur Personnaliser, puis sélectionnez
les parties que vous souhaitez installer. Cliquez sur le triangle d’affichage situé à côté
d’Applications pour cocher les cases des applications que vous souhaitez installer.
6 Une fois l’installation terminée, cliquez sur Redémarrer pour redémarrer votre iMac.
7 Suivez les instructions de l’Assistant réglages pour configurer votre nouveau compte
utilisateur.Chapitre 4 À tout problème sa solution 57
Si vous souhaitez effacer et installer, assurez-vous de sauvegarder vos données
d’utilisateur avant de commencer. Utilisez Utilitaire de disque sur votre DVD d’installation
de Mac OS X pour effacer votre disque dur. Pour plus d’informations à propos d’Utilitaire
de disque, consultez l’Aide Mac ou ouvrez Utilitaire de disque (dans Apllications /
Utilitaires) et sélectionnez Aide > Aide Utilitaire de disque. Vous pouvez également
trouver des informations détaillées dans l’article suivant :
http://support.apple.com/kb/HT3910?viewlocale=fr_FR.
L’installation des applications iLife
Vous pouvez réinstaller les application iLife fournies avec votre iMac si vous les avez
accidentellement supprimées ou après avoir effectué un effacer et installer.
Pour installer les applications iLife fournies avec votre ordinateur :
1 Insérez le DVD d’installation d’applications fourni avec votre iMac.
2 Suivez les instructions à l’écran. Dans la sous-fenêtre Type d’installation, cliquez
sur Personnaliser.
3 Une fois l’installation terminée, cliquez sur Fermer.
Autres problèmes
Pour les problèmes liés aux logiciels provenant d’éditeurs tiers, contactez l’éditeur
concerné. Les fabricants de logiciels proposent souvent des mises à jour de leurs
produits sur leur site web.58 Chapitre 4 À tout problème sa solution
Vous pouvez utiliser la sous-fenêtre Mise à jour de logiciels des Préférences Système
pour rechercher et installer les logiciels Apple les plus récents. Par défaut, votre iMac
recherche automatiquement les mises à jour une fois par semaine, mais vous pouvez
le configurer pour qu’il effectue cette recherche une fois par jour ou une fois par
mois. Vous pouvez également rechercher manuellement les mises à jour. Pour plus
d’informations, choisissez Aide > Aide Mac, puis recherchez « Mise à jour de logiciels ».
En cas de problèmes avec l’insertion d’un disque
 En effectuant un mouvement continu, enfoncez le disque dans le lecteur jusqu’à
ce que vos doigts touchent le bord de votre iMac.
 Utilisez uniquement un disque de taille standard.
En cas de problèmes avec l’éjection d’un disque
 Quitter toutes les applications susceptibles d’utiliser le disque, puis appuyez sur la
touche d’éjection de disque (C) de votre clavier.
 Ouvrez une fenêtre du Finder et cliquez sur l’icône d’éjection (située à côté de celle
du disque dans la barre latérale), ou bien faites glisser l’icône du disque du bureau
vers la Corbeille.
 Fermez la session de votre compte utilisateur en choisissant le menu Pomme () >
Fermer la session « Utilisateur » (votre nom de compte apparaît dans le menu),
puis appuyez sur la touche d’éjection de disque (C) de votre clavier.
 Redémarrez votre iMac en maintenant le bouton de la souris enfoncé.
En cas de problème de défilement avec votre souris
 Si votre souris est dotée d’une boule de défilement et que celle-ci ne défile pas
vers le haut, vers le bas, ou latéralement, retournez la souris et faites rouler la boule
énergiquement tout en la nettoyant.Chapitre 4 À tout problème sa solution 59
 Pour en savoir plus, reportez-vous à la rubrique « Entretien de votre souris » à la page 70.
En cas de problème de fonctionnement de votre iMac ou de Mac OS X
 Si la réponse à votre question ne figure pas dans ce manuel, recherchez des
instructions et des informations de dépannage dans l’Aide Mac. Dans le Finder,
choisissez Aide > Aide Mac.
 Pour obtenir les dernières informations de dépannage et des mises à jour de logiciels,
consultez le site web d’assistance Apple, à l’adresse www.apple.com/fr/support.
Si vous perdez continuellement vos réglages de date et d’heure
 La batterie de secours interne de votre ordinateur a peut-être besoin d’être
remplacée. Pour en savoir plus sur la manière de contacter Apple pour reportez-vous
à la rubrique « Informations, services et assistance » ci-dessous.
Informations, services et assistance
Votre iMac ne contient aucune pièce susceptible d’être remplacée par l’utilisateur, à
l’exception du clavier, de la souris et de la mémoire. Si vous avez besoin de services de
réparation, adressez-vous à Apple ou portez votre iMac chez un fournisseur de services
agréé Apple. Vous trouverez de plus amples informations sur votre iMac en ligne, dans
l’aide à l’écran, dans Informations Système et via Apple Hardware Test.
Informations en ligne
Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur
www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez
faire des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de
nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums
de discussion Apple.60 Chapitre 4 À tout problème sa solution
Aide à l’écran
Vous trouverez bien souvent des réponses à vos questions ainsi que des instructions et
des informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac.
Informations Système
Pour obtenir des informations sur votre iMac, utilisez Informations Système. Cette
application vous fournit la liste des composants matériels et des logiciels installés,
le numéro de série et de version du système d’exploitation, la quantité de mémoire
installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () >
« À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos.
Service et assistance AppleCare
Votre iMac est fourni avec 90 jours d’assistance technique et 1 an de couverture pour
les réparations de matériel effectuées dans les magasins Apple Store ou les centres
de réparations agréés Apple, tel qu’un fournisseur de services agréé Apple. Vous avez
la possibilité d’étendre la durée de cette couverture en adhérant à un programme
AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur
www.apple.com/fr/support/products ou bien visitez le site web de votre pays (dans
la liste ci-dessous).
Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare
peut vous aider à installer et à ouvrir les applications et offre des services de
dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous
(gratuit pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série
de votre iMac à portée de main lorsque vous appelez.
Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date
d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer.Chapitre 4 À tout problème sa solution 61
Pays Téléphone Site web
Allemagne (49) 01805 009 433 www.apple.com/de/support
Autriche (43) 0810 300 427 www.apple.com/at/support
Belgique (flamand)
(français)
(32) 070 700 772
(32) 070 700 773
www.apple.com/benl/support
www.apple.com/befr/support
France (Metropolitain)
(DOM-TOM)
(33) 0805 540 003 www.apple.com/fr/support
Luxembourg (352) 800 24550 www.apple.com/befr/support
Suisse (français)
(allemand)
(41) 0848 000 132
(41) 0848 000 132
www.apple.com/chfr/support
www.apple.com/chde/support
Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques
locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet :
www.apple.com/support/contact/phone_contacts.html62 Chapitre 4 À tout problème sa solution
Localisation du numéro de série de votre produit
Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre iMac :
 Choisissez le menu Pomme () > « À propos de ce Mac ». Cliquez sur le numéro
de version sous les mots « Mac OS X » pour faire apparaître le numéro de version,
la version et le numéro de série Mac OS X.
 Cliquez sur l’icône du Finder et ouvrez /Applications/Utilitaires/Informations
Système. Cliquez sur Matériel dans la sous-fenêtre Contenu.
 Regardez sous le socle de l’iMac.Aide Mac ergonomie
www.apple.com/fr/environment
Dernières recommandations
564 Chapitre 5 Dernières recommandations
Afin d’assurer votre sécurité et la préservation de votre matériel, veillez à observer
ces consignes pour le nettoyage et la manipulation de votre iMac, ainsi que
l’aménagement d’un espace de travail confortable. Gardez ces instructions dans
un endroit facilement accessible par vous et par d’autres utilisateurs éventuels.
AVIS : l’utilisation ou le rangement incorrect de votre ordinateur peut entraîner
l’annulation de la garantie du fabricant.
Informations importantes concernant la sécurité
AVERTISSEMENT : le non-respect de ces consignes de sécurité peut entraîner un
incendie, un choc électrique ou d’autres types de dommages ou de blessures
corporelles.
Manipulation correcte Installez votre iMac sur une surface de travail stable. N’insérez
jamais d’objets dans les ouvertures de ventilation.
Eau et endroits humides Gardez votre iMac à l’écart de toute source de liquide (boissons,
éviers, baignoires, cabines de douche, etc.). Protégez votre iMac de l’humidité ou des
intempéries comme la pluie, la neige et le brouillard.
Alimentation La seule manière de couper complètement l’alimentation de l’ordinateur
consiste à débrancher le câble d’alimentation. Veillez à tirer sur la fiche plutôt que sur
le câble. Débranchez toujours le câble d’alimentation avant d’ouvrir l’ordinateur pour
installer de la mémoire.Chapitre 5 Dernières recommandations 65
Débranchez le câble d’alimentation (en tirant sur la fiche plutôt que sur le câble)
et déconnectez le câble Ethernet ou le cordon téléphonique si l’un des cas suivants
se présente :
 Vous souhaitez ajouter de la mémoire.
 Le câble ou la fiche d’alimentation est usé(e) ou endommagé(e).
 Vous avez renversé quelque chose dans le boîtier de l’ordinateur.
 Votre iMac est exposé à la pluie ou à une humidité excessive.
 Votre iMac a subi une chute ou le boîtier a été endommagé.
 Vous pensez que votre iMac a besoin d’être inspecté ou réparé.
 Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions
fournies plus bas).
Important : la seule manière de couper complètement l’alimentation de l’ordinateur
consiste à débrancher le câble d’alimentation. Assurez-vous de pouvoir aisément
atteindre le câble d’alimentation pour débrancher votre iMac si besoin est.
AVERTISSEMENT : votre câble CA dispose d’une fiche de terre à trois broches
(fiche équipée d’une troisième broche de mise à la terre). Cette fiche ne peut être
branchée que sur une prise CA reliée à la terre. Si vous ne pouvez pas brancher la
fiche car la prise n’est pas reliée à la terre, contactez un électricien agréé pour qu’il
remplace cette prise par une prise correctement reliée à la terre. Ne dérogez en
aucun cas à cette consigne.66 Chapitre 5 Dernières recommandations
Spécifications de l’alimentation :
 Tension : 100 à 240 V CA
 Courant : 3 A, maximum
 Fréquence : 50 à 60 Hz
Diminution de l’acuité auditive L’utilisation d’écouteurs ou d’un casque d’écoute à un
niveau de volume trop élevé peut provoquer une perte d’acuité auditive irréversible.
Réglez le volume à un niveau normal. L’oreille peut s’adapter petit à petit à des volumes
sonores de plus en plus élevés qui peuvent sembler normaux, mais qui risquent à la
longue d’endommager votre système auditif. Si vous percevez un sifflement dans vos
oreilles ou s’il vous semble que le son des voix est étouffé, arrêtez immédiatement
l’écoute et faites examiner votre audition. Plus le volume est élevé, plus votre audition
risque d’être rapidement endommagée. Les spécialistes recommandent les mesures
suivantes pour protéger votre audition :
 Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque
d’écoute.
 Évitez d’augmenter le volume pour ne pas entendre les bruits environnants.
 Baissez immédiatement le volume si vous ne parvenez plus à entendre les personnes
qui parlent autour de vous.
Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des
installations nucléaires, pour la navigation ou la communication aérienne, pour le
contrôle du trafic aérien, ni dans aucune autre situation où une panne du système
informatique pourrait entraîner la mort, des blessures ou de graves dommages
écologiques.Chapitre 5 Dernières recommandations 67
Informations concernant le laser des lecteurs de disque optique
AVERTISSEMENT : l’exécution de réglages ou d’opérations qui ne sont pas spécifiés
dans le manuel de votre équipement risque de vous exposer à des rayonnements
dangereux.
Le laser intégré au lecteur de disque optique de votre iMac ne présente aucun danger
en cas d’utilisation normale, mais peut s’avérer dangereux pour la vue en cas de
démontage du lecteur. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé
que par un fournisseur de services agréé Apple.
Important : le matériel électrique peut s’avérer dangereux s’il n’est pas utilisé
correctement. L’utilisation de ce produit ou de tout produit similaire doit toujours
être supervisée par un adulte. Évitez que des enfants ne manipulent les composants
internes ou les câbles de ces appareils.
AVERTISSEMENT : n’introduisez jamais d’objets d’aucune sorte dans les ouvertures
de ventilation du boîtier. Cela peut s’avérer dangereux et endommager votre
ordinateur.
Ne procédez à aucune réparation par vous-même
Votre iMac ne contient aucune pièce susceptible d’être remplacée par l’utilisateur, à
l’exception du clavier, de la souris et de la mémoire (voir « L’installation de mémoire » à
la page 37). Si votre iMac a besoin d’être inspecté, contactez Apple ou un fournisseur de
services agréé Apple. Consultez la rubrique « Informations, services et assistance » à la
page 59.68 Chapitre 5 Dernières recommandations
Si vous ouvrez votre iMac ou que vous installez d’autres éléments que la mémoire, vous
risquez d’endommager votre matériel. Les dommages de ce type ne sont pas couverts
par la garantie limitée de votre iMac.
Informations importantes concernant la manipulation
AVIS : le non-respect de ces instructions de manipulation peut provoquer
des dommages pour votre iMac ou tout autre bien.
Environnement d’utilisation L’utilisation de votre iMac en dehors de ces plages peut
gêner son bon fonctionnement :
 Température de fonctionnement : 10° à 35° C
 Température de stockage : -20° à 47° C
 Humidité relative : 5 % à 95 % (sans condensation)
 Altitude maximale de fonctionnement : 3048 mètres
N’utilisez pas votre iMac dans des endroits spécialement poussiéreux ou enfumés,
près d’une cuisinière, d’une cheminée ou d’un humidificateur à ultrasons fonctionnant
avec de l’eau du robinet non filtrée. Les fines particules produites par la fumée, la
cusine, la combustion ou l’utilisation d’humidificateurs à ultrasons fonctionnant avec
de l’eau non filtrée peuvent, dans de rares cas de figure, s'infiltrer dans les ouvertures
de ventilation de votre iMac et, sous certaines conditions, entraîner la formation de
poussières derrière la vitre de l’écran de votre iMac.Chapitre 5 Dernières recommandations 69
Mise sous tension de votre iMac N’allumez jamais le tant que tous ses composants
internes ou externes ne sont pas en place. L’utilisation de l’ordinateur sans l’un de
ses composants peut s’avérer dangereuse et risque de l’endommager.
Transport de votre iMac Veillez à éteindre votre et à déconnecter tous les câbles
et cordons qui y sont rattachés avant de le soulever ou de le changer de place.
Pour soulever ou déplacer votre iMac, tenez-le par ses côtés.
Utilisation des connecteurs et des ports Ne forcez jamais l’insertion d’un connecteur
dans un port. Lorsque vous connectez un périphérique, assurez-vous que le port n’est
pas obstrué, que le connecteur est adapté au port et qu’il est correctement orienté par
rapport à ce dernier.
Utilisation du lecteur optique Le lecteur SuperDrive de votre iMac prend en charge
les disques standards (12 cm). Les disques de forme irrégulière ou de taille inférieure
à 12 cm ne sont pas acceptés.
Rangement de votre iMac Si vous comptez ranger votre iMac pendant une longue
période, veillez à le conserver dans un endroit frais (idéalement, 22° C).
Entretien de votre iMac
Respectez les règles suivantes lors du nettoyage de votre iMac et de ses accessoires :
 Éteignez votre iMac et débranchez tous les câbles.
 Pour nettoyer la partie extérieure de l’Mac, utilisez un chiffon doux, légèrement
humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture
que ce soit. Ne vaporisez jamais de liquide directement sur l’iMac.
 N’utilisez ni aérosols, ni dissolvant, ni abrasifs.70 Chapitre 5 Dernières recommandations
Nettoyage de l’écran de votre iMac
Utilisez le chiffon fourni avec votre iMac pour nettoyer l’écran.
Pour nettoyer l’écran de votre iMac, procédez comme suit :
 Éteignez votre iMac et débranchez tous les câbles.
 Humidifiez, à l’eau seulement, le chiffon fourni avec votre iMac— (ou tout autre
chiffon propre—, doux et non pelucheux), puis essuyez l’écran. Ne vaporisez
jamais de liquide directement sur l’écran.
Entretien de votre souris
Vous devez nettoyer votre souris de temps en temps pour éliminer la saleté et la
poussière qui se sont accumulées. Utilisez un chiffon non pelucheux légèrement
humidifié avec de l’eau. Évitez que la moindre humidité ne pénètre dans une
ouverture et n’utilisez pas d’aérosols, de dissolvants ou d’abrasifs.
Si vous avez commandé une souris USB d’Apple avec votre iMac, tenez celle-ci à
l’envers et faites rouler vigoureusement la boule de défilement avec le chiffon fourni
avec votre iMac, ou tout autre chiffon propre, doux et non pelucheux, pour déloger
les particules qui pourraient gêner le défilement.Chapitre 5 Dernières recommandations 71
Comprendre l’ergonomie
Voici quelques conseils sur la mise en place d’un environnement de travail sain
Clavier
Veillez à maintenir vos épaules relâchées lorsque vous utilisez le clavier. Votre bras et
votre avant-bras doivent former un angle plus ou moins droit, tandis que votre poignet
et votre main doivent se trouver sur une ligne à peu près droite.
Modifiez fréquemment la position de vos mains pour éviter la fatigue. Certains
utilisateurs peuvent éprouver une certaine gêne au niveau des mains, des poignets
ou des bras après avoir travaillé de manière intensive sans observer de pauses. Si ces
douleurs persistent, consultez un spécialiste.
Souris
Veillez à ce que la souris se trouve à hauteur du clavier. Ménagez un espace suffisant
pour la manipuler avec aisance.
Écran
Placez le moniteur de manière à ce que le haut de l’écran se trouve légèrement en
dessous du niveau de vos yeux lorsque vous êtes assis au clavier. La distance idéale
entre vos yeux et l’écran est une question d’appréciation personnelle, mais la plupart
des utilisateurs semblent adopter une distance comprise entre 45 et 70 cm.
Orientez l’écran de manière à ce qu’il reflète le moins possible la lumière provenant de
l’éclairage et des fenêtres proches. Le pied vous permet d’orienter l’écran de façon à
obtenir un angle de vision idéal et de réduire ou d’éliminer ainsi les reflets provoqués
par des sources lumineuses que vous ne pouvez pas déplacer.72 Chapitre 5 Dernières recommandations
Cuisses légèrement
inclinées
Épaules
détendues
Écran positionné
de façon à éviter tout
reflet éblouissant
Avant-bras
et mains en
ligne droite
Avant-bras
légèrement
inclinés
Bas du dos
soutenu
Pieds fixes au sol
ou sur un repose-pied
Haut de l'écran au
niveau des yeux ou
juste en dessous
Côté inférieur au plan
de travail dégagé
45–70 cm
Siège
Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables.
Réglez la hauteur du siège de sorte que vos cuisses reposent à l’horizontale et vos
pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à-
dire la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte
que le réglage du dossier soit parfaitement adapté à votre morphologie.Chapitre 5 Dernières recommandations 73
Vous devrez peut-être remonter votre siège afin que vos avant-bras et vos mains
forment un angle approprié par rapport au clavier. Si, dans ce cas, vos pieds ne
reposent plus à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur.
Vous pouvez également abaisser le niveau du plan de travail pour éviter l’emploi d’un
repose-pied. Une troisième solution consiste à utiliser un bureau dont le poste de saisie
est situé plus bas que le plan de travail.
Vous trouverez d’autres informations concernant l’ergonomie sur Internet :
www.apple.com/fr/about/ergonomics
Apple et l’environnement
Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact
de ses produits et de ses activités sur l’environnement.
Des informations supplémentaires sont disponibles sur Internet :
www.apple.com/fr/environment75
Regulatory Compliance Information
FCC Compliance Statement
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio or
television reception is suspected.
L‘utilisation de ce dispositif est autorisée seulement
aux conditions suivantes : (1) il ne doit pas produire de
brouillage et (2) l’utilisateur du dispositif doit être prêt
à accepter tout brouillage radioélectrique reçu, même
si ce brouillage est susceptible de compromettre le
fonctionnement du dispositif.
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference
to radio or television reception, try to correct the
interference by using one or more of the following
measures:
• Turn the television or radio antenna until the
interference stops.
• Move the computer to one side or the other of the
television or radio.
• Move the computer farther away from the television
or radio.
• Plug the computer into an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are
on circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product.
Or, consult an experienced radio/television technician
for additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc. could void the EMC
compliance and negate your authority to operate the
product.
This product has demonstrated EMC compliance
under conditions that included the use of compliant
peripheral devices and shielded cables between system
components. It is important that you use compliant
peripheral devices and shielded cables (including
Ethernet network cables) between system components
to reduce the possibility of causing interference to
radios, television sets, and other electronic devices.76
Responsible party (contact for FCC matters only):
Apple Inc. Corporate Compliance
1 Infinite Loop, MS 26-A
Cupertino, CA 95014
Wireless Radio Use
This device is restricted to indoor use when operating in
the 5.15 to 5.25 GHz frequency band.
Cet appareil doit être utilisé à l’intérieur.
この製品は、周波数帯域 5.18 ~ 5.32 GHz で動作しているときは、
屋内においてのみ使用可能です。
Exposure to Radio Frequency Energy
The radiated output power of this device is well
below the FCC and EU radio frequency exposure
limits. However, this device should be operated with
a minimum distance of at least 20 cm between its
antennas and a person’s body and the antennas used
with this transmitter must not be co-located or operated
in conjunction with any other antenna or transmitter
subject to the conditions of the FCC Grant.
FCC Bluetooth Wireless Compliance
The antenna used with this transmitter must not be
co-located or operated in conjunction with any other
antenna or transmitter subject to the conditions of the
FCC Grant.
Bluetooth Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de la Class B respecte toutes
les exigences du Règlement sur le matériel brouilleur
du Canada.
Industry Canada Statement
Complies with the Canadian ICES-003 Class B
specifications. Cet appareil numérique de la classe B est
conforme à la norme NMB-003 du Canada. This device
complies with RSS 210 of Industry Canada.
Bluetooth Europe—EU Declaration of
Conformity
This wireless device complies with the R&TTE Directive.
Europe—EU Declaration of Conformity
Consultez www.apple.com/euro/compliance.
Communauté européenne
Conforme aux directives européennes 72/23/EEC et
89/336/EEC.
Korea Warning Statements
Singapore Wireless Certification77
Taiwan Wireless Statements
Taiwan Class B Statement
VCCI Class B Statement
Russia
Mouse Class 1 Laser Information
The Apple Magic Mouse is a Class 1 laser product in
accordance with IEC60825-1 A1 A2 and 21 CFR 1040.10
and 1040.11 except for deviations pursuant to Laser
Notice No.
Caution: Modification of this device may result in
hazardous radiation exposure. For your safety, have
this equipment serviced only by an Apple Authorized
Service Provider.
A Class 1 laser is safe under reasonably foreseeable
conditions per the requirements in IEC 60825-1 AND
21 CFR 1040. However, it is recommended that you do
not direct the laser beam at anyone’s eyes. However, it
is recommended that you do not direct the laser beam
at anyone’s eyes.
External USB Modem Information
When connecting your iMac to the phone line using an
external USB modem, refer to the telecommunications
agency information in the documentation that came
with your modem.78
ENERGY STAR
®
Compliance
As an ENERGY STAR
®
partner, Apple has determined
that standard configurations of this product meet the
ENERGY STAR
®
guidelines for energy efficiency. The
ENERGY STAR
®
program is a partnership with electronic
equipment manufacturers to promote energy-efficient
products. Reducing energy consumption of products
saves money and helps conserve valuable resources.
This computer is shipped with power management
enabled with the computer set to sleep after 10 minutes
of user inactivity. To wake your computer, click the
mouse or press any key on the keyboard.
For more information about ENERGY STAR
®
, visit:
www.energystar.gov
Türkiye 79
Informations relatives à l’élimination et au
recyclage
Ce symbole indique que votre produit doit être mis au
rebus dans des conditions adéquates selon les lois et les
réglementations locales. Lorsque votre produit arrive en
fin de vie, contactez Apple ou vos autorités locales pour
en savoir plus sur les options de recyclage.
Pour plus d’informations sur le programme
de recyclage Apple, consultez
www.apple.com/fr/environment/recycling.
Brazil—Disposal Information:
Brasil: Informações sobre eliminação e reciclagem
O símbolo indica que este produto e/ou sua bateria
não devem ser descartadas no lixo doméstico. Quando
decidir descartar este produto e/ou sua bateria, faça-o
de acordo com as leis e diretrizes ambientais locais. Para
informações sobre o programa de reciclagem da Apple,
pontos de coleta e telefone de informações, visite www.
apple.com/br/environment.
Union européenne — Informations concernant
l’élimination des déchets :
Le symbole ci-dessus signifie que vous devez vous
débarrasser de votre produit sans le mélanger avec les
ordures ménagères, selon les normes et la législation
de votre pays. Lorsque ce produit n’est plus utilisable,
portez-le dans un centre de traitement des déchets
agréé par les autorités locales. Certains centres acceptent
les produits gratuitement. Le traitement et le recyclage
séparé de votre produit lors de son élimination aideront
à préserver les ressources naturelles et à protéger
l’environnement et la santé des êtres humains.
Caution: There is a risk of explosion if the battery is
replaced by an incorrect type. Dispose of used batteries
according to the instructions in this manual.
Achtung: Wenn die Batterie nicht mit dem richtigen
Batterietyp ersetzt wird, besteht Explosionsgefahr.
Entsorgen Sie verbrauchte Batterien gemäß der
Anweisungen in diesem Handbuch.
Attenzione: C’è rischio di esplosione se la batteria viene
sostituita con un tipo di batteria non corretto. Smaltire
le batterie usate secondo le istruzioni riportate in questo
manuale.
VARNING: Om batteriet ersätts med ett batteri av fel
typ finns det risk för explosion. Lämna in batteriet
för återvinning i enlighet med anvisningarna i denna
handbok.80
Informations sur l’enlèvement de la batterie
Jetez vos batteries usagées en respectant les lois
et les consignes environnementales de votre pays.
California: The coin cell battery in the optional Apple
Remote contains perchlorates. Special handling and
disposal may apply. Refer to:
www.dtsc.ca.gov/hazardouswaste/perchlorate
Deutschland: Dieses Gerät enthält Batterien. Bitte
nicht in den Hausmüll werfen. Entsorgen Sie dieses
Gerätes am Ende seines Lebenszyklus entsprechend der
maßgeblichen gesetzlichen Regelungen.
Das Gerät enthält Batterien. Diese gehören nicht in
den Hausmüll. Sie können verbrauchte Batterien beim
Handel oder bei den Kommunen unentgeltlich abgeben.
Um Kurzschlüsse zu vermeiden, kleben Sie die Pole der
Batterien vorsorglich mit einem Klebestreifen ab.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca) worden
gedeponeerd.
Taiwan:KApple Inc.
© 2010 Apple Inc. Tous droits réservés.
En application des lois et conventions en vigueur,
aucune reproduction totale ni partielle du manuel n’est
autorisée, sauf consentement écrit préalable d’Apple.
Tout a été mis en œuvre pour que les informations
présentées dans ce manuel soient exactes. Apple
n’est pas responsable des erreurs de reproduction
ou d’impression.
Apple
1 Infinite Loop
Cupertino, CA 95014
408-996-1010
www.apple.com
Le logo Apple est une marque d’Apple Inc., déposée
aux États-Unis et dans d’autres pays. En l’absence du
consentement écrit d’Apple, l’utilisation à des fins
commerciales de ce logo via le clavier (Option + 1)
pourra constituer un acte de contrefaçon et/ou de
concurrence déloyale.
Apple, le Logo Apple, AirPort, AirPort Extreme,
Cover Flow, Exposé, FireWire, GarageBand, iCal, iChat,
iLife, iMac, iMovie, iPhone, iPhoto, iPod, iSight, iTunes,
Keynote, Mac, Mac OS, Photo Booth, QuickTime, Safari,
Snow Leopard, Spotlight, SuperDrive et Time Machine
sont des marques déposées d’Apple Inc., déposées
États-Unis et dans d’autres pays.
Finder, le logo FireWire, iPad et Multi-Touch sont des
marques d’Apple Inc.
AppleCare, Apple Store et iTunes Store sont des marques
de service d’Apple Inc. déposées aux États-Unis et dans
d’autres pays.
ENERGY STAR
®
est une marque déposée aux États-Unis.
La marque et les logos Bluetooth
®
sont des marques
déposées de Bluetooth SIG, Inc. et sont utilisés sous
licence par Apple.
Les autres noms de produits et de sociétés mentionnés
dans ce document peuvent être des marques de leurs
détenteurs respectifs. Les produits commercialisés par
des entreprises tierces ne sont mentionnés que pour
information,sans aucune intention de préconisation ni
de recommandation. Apple décline toute responsabilité
quant à l’utilisation et au fonctionnement de ces produits.
Fabriqué sous licence de Dolby Laboratories. « Dolby »,
« Pro Logic » et le logo double-D sont des marques
déposées de Dolby Laboratories. Ouvrages confidentiels
inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits
réservés.
Publié simultanément aux États-Unis et au Canada.
Félicitations, vous et votre MacBook
êtes faits l’un pour l’autre.Dites bonjour à votre MacBook.
www.apple.com/fr/macbook
finder
Finder
Parcourez vos
fichiers de la
même manière
que vous naviguez
parmi vos
morceaux de
musique avec
Cover Flow.
Aide Mac
Caméra iSight intégrée avec iChat
Discutez en vidéo avec vos amis et votre
famille, où qu’ils soient dans le monde.
Aide Mac
isight
MacBook
Mail
Gérez tous vos comptes
de messagerie d'un
même point
Aide Mac
mail
iCal et Carnet d’adresses
Votre emploi du temps
et vos contacts toujours
synchronisés.
Aide Mac
isyncMac OS X Leopard
www.apple.com/fr/macosx
iLife ’09
www.apple.com/fr/ilife
iPhoto
Partagez vos photos
sur le web ou créez
des livres, des cartes
et des calendriers.
Aide iPhoto
GarageBand
Créez votre propre
morceau avec des
musiciens sur une
scène virtuelle.
Aide GarageBand
iWeb
Construisez des sites
web avec des photos,
des films, des blogs
et des podcasts.
Aide iWeb
iMovie
Réalisez un film
et partagez-le
facilement sur le web.
Aide iMovie
photos
film
enregistrement site web
Time Machine
Sauvegardez et
restaurez automatiquement vos fichiers.
Aide Mac
Spotlight
Trouvez tout ce que
vous recherchez
sur votre Mac
immédiatement.
time machine Aide Mac
spotlight
Safari
Profitez pleinement
du web grâce au
navigateur le plus
rapide du monde.
Aide Mac
safari
Coup d’œil
Prévisualisez vos
fichiers en un clin
d’œil.
Aide Mac
coup d’œilTable des matières 5
Table des matières
Chapitre 1 : Prêt, feu, configurez !
9 Contenu de la boîte
9 Configuration du MacBook
16 Extinction ou suspension d’activité de votre MacBook
Chapitre 2 : Votre MacBook au quotidien
20 Caractéristiques de base de votre MacBook
23 Fonctionnalités du clavier de votre MacBook
25 Ports présents sur votre MacBook
27 Utilisation du Trackpad et du clavier
28 Utilisation de la batterie du MacBook
30 Comment obtenir des réponses à vos doutes
Chapitre 3 : Augmentez votre mémoire
37 Installation de mémoire supplémentaire
44 Vérification de la reconnaissance de la nouvelle mémoire par votre MacBook
Chapitre 4 : À tout problème sa solution
47 Problèmes vous empêchant d’utiliser votre MacBook
51 Utilisation d’Apple Hardware Test6 Table des matières
52 Problèmes de connexion à Internet
55 Problèmes de communication sans fil avec AirPort Extreme
56 Maintien à jour de vos logiciels
57 Réinstallation des logiciels fournis avec le MacBook
59 Informations, services et assistance
61 Localisation du numéro de série de votre produit
Chapitre 5 : Dernières recommandations
64 Informations importantes concernant la sécurité
68 Informations importantes sur la manipulation
71 Ergonomie
73 Apple et l’environnement
75 Regulatory Compliance Information1
1 Prêt, feu, configurez !
www.apple.com/fr/macbook
Aide Mac Assistant Migration8 Chapitre 1 Prêt, feu, configurez !
Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Si vous n’avez jamais utilisé de MacBook ou si vous n’êtes pas familiarisé avec les
ordinateurs Mac, vous trouverez dans ce chapitre des instructions qui vous aideront à
débuter.
Important : lisez attentivement toutes les instructions d’installation (et les consignes de
sécurité débutant à la page 63) avant d’utiliser votre ordinateur pour la première fois.
Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser
votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2,
« Votre MacBook au quotidien » pour découvrir les nouvelles fonctionnalités de cet
MacBook.
Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en savoir
plus sur l’utilisation de l’Aide Mac, consultez la rubrique « Comment obtenir des réponses
à vos doutes » à la page 30. Comme Apple publie de temps à autres de nouvelles versions
et mises à jour de ses logiciels système, il est possible que les images de ce manuel soient
légèrement différentes de ce que vous voyez à l’écran.
Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 60 W
avant de configurer le MacBook.Chapitre 1 Prêt, feu, configurez ! 9
Contenu de la boîte
Configuration du MacBook
Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Les pages suivantes contiennent des informations qui vous guideront tout au
long du processus de configuration, notamment des opérations suivantes :
 Le branchement de l’adaptateur secteur MagSafe 60 W.
 Le branchement des câbles et l’accès à un réseau.
 La mise sous tension du MacBook et l’utilisation du trackpad.
 La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages.
 La configuration des préférences et du bureau Mac OS X.
Câble secteur
Fiche
secteur
Adaptateur secteur MagSafe de 60 W10 Chapitre 1 Prêt, feu, configurez !
Étape 1 : Branchez l’adaptateur secteur MagSafe 60 W pour alimenter le MacBook
et recharger sa batterie.
Assurez-vous que la fiche CA est complètement insérée dans l’adaptateur et que les
broches de la fiche sont complètement déployées. Branchez la fiche CA de votre adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le port secteur
MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez la force d’un
aimant l’attirant.
Pour rallonger le câble de l’adaptateur secteur, tirez d’abord sur la fiche secteur pour la
retirer de l’adaptateur. Connectez le câble secteur inclus à l’adaptateur, en vous assurant qu’il est fermement connecté. Branchez l’autre extrémité sur une prise de courant.
Le câble d’alimentation secteur fournit une connexion avec mise à la terre.
Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de l’ordinateur, débranchez la prise et non le câble.
¯
Câble secteur
Fiche
secteur
Connecteur MagSafe Port secteur MagSafeChapitre 1 Prêt, feu, configurez ! 11
La première fois que vous branchez l’adaptateur secteur sur le MacBook, la lampe
témoin du connecteur MagSafe s’illumine. Une lumière orange indique que la batterie
est en charge. Une lumière verte indique que la batterie est rechargée ou qu’elle n’est
pas installée. Si la lampe témoin ne s’allume pas, vérifiez que le connecteur est correctement branché.
Étape 2 : Pour accéder à Internet ou à un réseau, branchez une extrémité du câble
Ethernet sur le MacBook et l’autre extrémité sur un modem câble, un modem DSL
ou un réseau.
Pour une connexion commutée, vous aurez besoin d’un modem Apple USB Modem
externe, disponible sur l’Apple Store en ligne à l’adresse www.apple.com/fr/store ou
auprès des revendeurs agréés Apple. Branchez le modem Apple USB Modem sur un
port USB du MacBook, puis reliez le modem à une prise téléphonique à l’aide d’un
câble téléphonique (non inclus).
G
Câble
Ethernet
Port Ethernet Gigabit
(10/100/1000Base-T)12 Chapitre 1 Prêt, feu, configurez !
Remarque : votre MacBook est également équipé de la technologie AirPort Extreme de
mise en réseau sans fil. Pour en savoir plus sur la configuration d’une connexion sans
fil, choisissez Aide > Aide Mac (dans la barre des menus), puis recherchez « AirPort ».
Consultez « Comment obtenir des réponses à vos doutes » à la page 30.
Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer
votre MacBook.
Votre ordinateur émet un signal sonore lorsque vous l’allumez.
Sa mise en route prend quelques instants. Après le démarrage, Assistant réglages
s’ouvre automatiquement.
Si l’ordinateur ne s’allume pas, consultez la rubrique « Si votre MacBook ne s’allume ou
ne démarre pas » à la page 49.
Trackpad Bouton du trackpad
® Bouton d’alimentationChapitre 1 Prêt, feu, configurez ! 13
Étape 4 : Configurez votre MacBook à l’aide d’Assistant réglages
La première fois que vous démarrez votre MacBook, l’Assistant réglages se met en
route. Il vous aide à saisir les informations de connexion à Internet et au courrier électronique ainsi qu’à configurer un compte d’utilisateur sur votre MacBook. Si vous possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transférer
automatiquement les fichiers, les applications et d’autres informations de votre ancien
ordinateur. Pour en savoir plus, consultez la rubrique suivante « Migration d’informations vers votre MacBook ».
Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui
retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur
l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un
tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation
afin qu’elle puisse être utilisée. Pour plus d’informations sur le retrait d’autorisation,
ouvrez iTunes et choisissez Aide > Aide iTunes14 Chapitre 1 Prêt, feu, configurez !
Migration d’informations vers votre MacBook
Vous pouvez suivre les invites de l’Assistant réglages pour effectuer la migration
des comptes d’utilisateurs, fichiers, applications existant(e)s, et d’autres informations
à partir d’un autre Mac. Pour cela, procédez de l’une des manières suivantes :
 Utilisez un câble FireWire pour brancher les deux ordinateurs ensemble et transférer
les informations
 Utilisez un câble Ethernet reliant directement les deux ordinateurs, ou connectez
ces derniers au même réseau
 Sans câble, directement entre les deux ordinateurs, ou en ayant les deux ordinateurs
sur le même réseau sans fil
Avant d’effectuer la migration, servez-vous de Mise à jour de logiciels sur votre autre
Mac afin de vous assurer que vous possédez la dernière version du logiciel Mac OS X,
à savoir Mac OS X v10.4.11 ou Mac OS X v10.5.6 (ou version ultérieure).
Vous pouvez choisir les éléments (comptes d’utilisateur, documents, séquences, musique,
photos, etc.) dont vous souhaitez effectuer la migration sur votre MacBook.
Important : n’utilisez pas l’autre Mac tant que la migration n’est pas terminée.
Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du premier
démarrage de l’ordinateur, vous pouvez le faire ultérieurement. Si la connexion est interrompue pendant la migration, vous pouvez reprendre cette dernière ultérieurement en vous
servant de l’Assistant migration de votre MacBook et de l’autre Mac. Allez dans le dossier
Applications, ouvrez le dossier Utilitaires, puis double-cliquez sur Assistant migration.Chapitre 1 Prêt, feu, configurez ! 15
Étape 5 : Personnalisez le bureau Mac OS X et réglez les préférences.
Barre des
menus
Dock Icône des Préférences Système
Menu Aide Icône de recherche de Spotlight
Icône du Finder16 Chapitre 1 Prêt, feu, configurez !
Grâce aux Préférences Système, vous pouvez donner à votre bureau l’apparence souhaitée sans perdre de temps. Choisissez le menu Pomme () > Préférences Système
dans la barre des menus. À mesure que vous vous familiarisez avec votre ordinateur,
explorez les Préférences Système, le centre de commandes de la plupart des réglages
de votre MacBook. Pour en savoir plus, ouvrez l’Aide Mac et recherchez « Préférences
Système » ou la préférence que vous souhaitez modifier.
Extinction ou suspension d’activité de votre MacBook
Lorsque vous avez terminé de travailler avec le MacBook, suspendez son activité ou
éteignez-le.
Suspension de l’activité de votre MacBook
Suspendez l’activité de votre MacBook si vous ne comptez vous en éloigner que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à le redémarrer.
Pour suspendre l’activité de votre MacBook, procédez de l’une des manières
suivantes :
 Rabattez l’écran.
 Choisissez Pomme () > Suspendre l’activité, dans la barre des menus.
 Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans la
zone de dialogue qui apparaît.Chapitre 1 Prêt, feu, configurez ! 17
 Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur
d’énergie et définissez un délai pour la minuterie de mise en veille.
Pour réactiver le MacBook :
 Si l’écran est fermé, il suffit de l’ouvrir pour réactiver votre MacBook.
 Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®) ou sur l’une des
touches du clavier.
À la réactivation de votre MacBook, vos applications, vos documents et vos réglages
sont conservés tels que vous les aviez laissés.
AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension
d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le
disque dur a cessé de tourner) avant de déplacer votre MacBook. Tout déplacement
de votre ordinateur lorsque le disque dur est en train de tourner risque
d’endommager ce dernier et d’entraîner une perte de données ou l’impossibilité de
démarrer à partir du disque dur.18 Chapitre 1 Prêt, feu, configurez !
Extinction de votre MacBook
Si vous ne comptez pas utiliser votre MacBook pendant un jour ou deux, il est préférable de l’éteindre. La lampe témoin de suspension d’activité reste allumée quelques instants au moment de l’extinction.
Pour éteindre le MacBook, procédez de l’une des manières suivantes :
 Choisissez Pomme () > Éteindre, dans la barre des menus.
 Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de dialogue qui apparaît.
Si vous comptez ranger votre MacBook pour une durée prolongée, consultez la rubrique « Informations importantes sur la manipulation » à la page 68 afin d’obtenir des
informations sur les mesures à prendre pour éviter que votre batterie ne se décharge
complètement.2
2 Votre MacBook au quotidien
www.apple.com/fr/macosx
Aide Mac Mac OS X20 Chapitre 2 Votre MacBook au quotidien
Caractéristiques de base de votre MacBook
®
® Bouton
d’alimentation
Lampe témoin
de la caméra
Caméra iSight
Microphone
Haut-parleurs
stéréo
Lampe témoin de
suspension d’activité
Récepteur à infrarouge
Trackpad
Batterie
(en dessous)
Bouton du
trackpad
Lecteur optique
à chargement
par fenteChapitre 2 Votre MacBook au quotidien 21
Microphone intégré
Enregistrez du son à l’aide du micro (situé à gauche de la caméra iSight) ou profitez de
l’application iChat AV incluse pour discuter en direct avec vos amis via une connexion à
haut débit.
Caméra iSight intégrée et lampe témoin de la caméra
Cette caméra permet d’organiser des vidéoconférences avec d’autres utilisateurs à l’aide
d’iChat AV, de prendre des photos à travers Photo Booth ou de capturer de la vidéo avec
iMovie. La lampe témoin brille lorsque la caméra iSight fonctionne.
Haut-parleurs stéréo intégrés
Permettent d’écouter de la musique, des films, des jeux et d’autres types de données
multimédia.
Batterie
Utilisez le MacBook en puisant l’énergie de la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. Le retrait de la batterie permet d’accéder à la mémoire de
votre MacBook.
Trackpad et bouton du trackpad
Permet de déplacer le pointeur à l’écran avec l’index ; inclut également une fonction de
défilement en utilisant deux doigts sur le trackpad. Appuyez légèrement sur le trackpad
pour cliquer ou double-cliquer sur une sélection.22 Chapitre 2 Votre MacBook au quotidien
Lampe témoin de suspension d’activité
Une lumière blanche clignote lorsque le MacBook est en suspension d’activité.
Récepteur à infrarouge
Associé à une télécommande Apple Remote (vendue séparément sur le site
www.apple.com/fr/store), le récepteur à infrarouge vous permet de contrôler, jusqu’à
une distance de 9 mètres, les applications Front Row et Keynote sur votre MacBook.
SuperDrive à chargement par fente
Le lecteur optique peut lire et écrire sur des CD et DVD de taille standard.
® Bouton d’alimentation
Permet d’allumer ou d’éteindre votre MacBook ou d’en suspendre l’activité. Maintenez
ce bouton enfoncé pour redémarrer le MacBook lors des procédures de dépannage.Chapitre 2 Votre MacBook au quotidien 23
Fonctionnalités du clavier de votre MacBook
esc
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12
—
C
-
Touche
de fonction (Fn)
Touches de
réglage du
volume
Touches de
réglage de la
luminosité
Touches de
fonction
standard
Touche
d’éjection
de disques
Touche
Silence
Touche
Exposé
Touche
Dashboard Commandes
multimédia24 Chapitre 2 Votre MacBook au quotidien
Touche de fonction (Fn)
Maintenez cette touche enfoncée pour activer les actions personnalisées affectées aux
touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches de
fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez « touches
de fonction ».
Touches de réglage de luminosité (F1, F2)
Permettent d’augmenter ( ) ou de réduire ( ) la luminosité de l’écran.
Touche Exposé (F3)
Vous permet d’ouvrir Exposé pour accéder rapidement à toutes vos fenêtres ouvertes.
Touche Dashboard (F4)
Vous permet d’ouvrir le Dashboard pour accéder à vos widgets.
’ Commandes multimédia (F7, F8, F9)
Retour rapide ( ), lecture ou pause (’) ou avance rapide ( ) d’un morceau, d’un film
ou d’un diaporama.
— Touche silence (F10)
Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie
casque.
- Touches de réglage du volume (F11, F12)
Permettent d’augmenter (-) ou de diminuer (–) le volume du son provenant du hautparleur intégré ou du port de sortie casque.
C Touche d’éjection de disque
Maintenez cette touche enfoncée pour éjecter un disque. Il est également possible
d’éjecter un disque en faisant glisser son icône dans la Corbeille.Chapitre 2 Votre MacBook au quotidien 25
Ports présents sur votre MacBook
¯
Port Ethernet
Gigabit
G
Logement
de sécurité
Port de sortie
audio
f
Port d’entrée
audio
,
Port
Mini-DVI
£ Port
FireWire
400
H Ports
USB 2.0
Port d
d’adaptateur
secteur
MagSafe26 Chapitre 2 Votre MacBook au quotidien
¯ Port d’adaptateur secteur MagSafe
Branchez-y l’adaptateur secteur MagSafe 60 W (inclus) pour recharger la batterie du
MacBook.
G Port Ethernet Gigabit
Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou
encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques
Ethernet sans avoir besoin de câble croisé Ethernet.
£ Port Mini-DVI (sortie vidéo)
Permet de connecter votre ordinateur à un écran ou à un système de projection externe
doté d’un connecteur DVI ou VGA. Vous pouvez acheter des adaptateurs correspondant
aux différents formats vidéo compatibles.
H Port FireWire 400
Permettent de brancher sur l’ordinateur des périphériques externes à haute vitesse tels
que des caméras vidéo numériques et des périphériques de stockage.
d Deux ports USB (Universal Serial Bus) 2.0
Grâce à ses ports, vous pouvez brancher sur le MacBook un modem, un iPod, un iPhone,
une souris, un clavier, une imprimante, un appareil photo numérique et plus encore.
Vous pouvez connecter un appareil externe USB de grande puissance. Vous pouvez
également y brancher des périphériques USB 1.1.
, Port d’entrée audio
Permet de connecter un micro ou un appareil audio numérique à votre MacBook.
f Port de sortie audio
Il permet de connecter des haut-parleurs externes, un casque ou des appareils audio
numériques.
Logement de sécurité
Ce logement vous permet de protéger votre ordinateur contre le vol en y fixant un
cadenas et un câble (disponible séparément).Chapitre 2 Votre MacBook au quotidien 27
Remarque : les adaptateurs et autres accessoires sont vendus séparément sur
www.apple.com/fr/store.
Utilisation du Trackpad et du clavier
Utilisez le trackpad pour déplacer le pointeur ainsi que pour faire défiler, cliquer, double-cliquer et faire glisser. Le déplacement du pointeur à l’écran est proportionnel à la
vitesse à laquelle vous déplacez votre doigt sur le trackpad. Pour effectuer un petit
déplacement du pointeur, décalez votre doigt lentement sur le trackpad. Plus vous
bougerez votre doigt rapidement, plus le déplacement du pointeur sera important.
Pour régler avec plus de précision la vitesse de déplacement dans les Préférences Système, choisissez menu Pomme () > Préférences Système, cliquez sur Clavier et souris,
puis sur Trackpad.
Voici quelques astuces et raccourcis pour le trackpad et le clavier :
 Un clic secondaire ou un « clic droit » vous permet d’accéder aux commandes de menu
contextuel.
Pour activer cette option, sélectionnez « Placez deux doigts sur le trackpad et cliquez
sur le bouton pour effectuer un clic secondaire » dans la sous-fenêtre Trackpad des
préférences Clavier et souris.
Vous pouvez également effectuer un clic secondaire en maintenant enfoncer la touche Contrôle (ctrl) tout en cliquant.
 Le défilement à deux doigts vous permet de faire glisser deux doigts pour faire défiler
rapidement vers le haut, vers le bas ou vers les côtés dans la fenêtre active.
Pour activer cette option, sélectionnez « Utilisez deux doigts pour faire défiler » et
« Autoriser le défilement horizontal » dans la sous-fenêtre Trackpad des préférences
Clavier et souris.28 Chapitre 2 Votre MacBook au quotidien
 La suppression vers l’avant supprime des caractères situés à la droite du point d’insertion. La touche Suppr. élimine les caractères situés à gauche du point d’insertion.
Pour supprimer vers l’avant, maintenez enfoncée la touche de fonction (fn) tout en
pressant la touche Supprimer.
Utilisation de la batterie du MacBook
Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook est alimenté par
sa batterie. L’autonomie du MacBook varie en fonction des applications utilisées et des
périphériques externes qui sont connectés à votre MacBook. La désactivation de fonctions sans fil telles qu’AirPort Extreme ou Bluetooth®
contribue à économiser l’énergie
de votre batterie.
Si votre batterie faiblit pendant que vous travaillez, branchez l’adaptateur secteur et
laissez la batterie se recharger. Pour remplacer une batterie presque déchargée par une
batterie chargée lorsque votre ordinateur n’est pas connecté à un adaptateur secteur,
éteignez l’ordinateur.
Pour connaître le niveau de charge de votre batterie, vous pouvez observer les lampes
témoins de niveau de charge dont elle est dotée. Appuyez sur le bouton situé en
regard des témoins lumineux afin que ces derniers brillent brièvement pour indiquer
le niveau de charge de la batterie. Vous pouvez vérifier le niveau de charge, que la
batterie soit ou non insérée dans votre MacBook.
Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun
témoin n’est allumé, c’est que la batterie est complètement vide et que le MacBook ne
pourra démarrer sans l’adaptateur secteur. Branchez l’adaptateur secteur et laissez la
batterie se recharger ou remplacez la batterie à plat par une batterie complètement
rechargée (voir la page 37).Chapitre 2 Votre MacBook au quotidien 29
Vous pouvez également connaître la charge actuelle de la batterie en observant l’icône
d’état de la batterie ( ) située dans la barre des menus. Le niveau affiché dépend
de la quantité d’énergie restant dans la batterie, mais aussi des applications et des
périphériques en cours d’utilisation, ainsi que des réglages actuels de votre système.
Pour disposer de plus d’énergie, fermez des applications, déconnectez les périphériques non utilisés et réglez la fonction d’Économiseur d’énergie. Pour en savoir plus
sur l’économie de la batterie et obtenir des astuces pour améliorer ses performances,
rendez-vous à l’adresse www.apple.com/fr/batteries/notebooks.html.
Batterie
Témoins LED
de la batterie
Bouton
¥
Á30 Chapitre 2 Votre MacBook au quotidien
Recharge de la batterie
Lorsque l’adaptateur secteur fourni avec le MacBook est connecté, la batterie se
recharge, que l’ordinateur soit éteint, allumé ou en mode de suspension d’activité.
La recharge sera toutefois plus rapide si l’ordinateur est éteint ou en mode de
suspension d’activité.
Comment obtenir des réponses à vos doutes
De plus amples informations sur l’utilisation du MacBook sont disponibles
dans l’Aide Mac qui s’affiche sur votre ordinateur et sur Internet, à l’adresse
www.apple.com/fr/support/macbook.
Pour faire apparaître l’Aide Mac :
1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran).
2 Cliquez sur le menu Aide dans la barre des menus et procédez de l’une des manières
suivantes :
a Saisissez une question ou un terme dans le champ de recherche, puis sélectionnez
une rubrique dans la liste des résultats ou sélectionnez « Afficher tous les résultats »
pour voir toutes les rubriques.
b Choisissez Aide Mac pour ouvrir la fenêtre de l’Aide Mac, qui vous permet de cliquer
sur des liens ou de saisir une question.Chapitre 2 Votre MacBook au quotidien 31
Informations supplémentaires
Pour en savoir plus sur l’utilisation de votre MacBook, consultez le tableau suivant :
Pour obtenir des
informations sur : Reportez-vous aux sources suivantes :
L’installation de mémoire le chapitre 3, « Augmentez votre mémoire, » à la page 35.
Le dépannage de votre MacBook en cas de problème
le chapitre 4, « À tout problème sa solution, » à la page 45.
L’obtention de services et
d’une assistance pour votre
MacBook
« Informations, services et assistance » à la page 59. Sinon,
consultez le site web de support Apple à l’adresse
www.apple.com/fr/support/macbook.
L’utilisation de Mac OS X le site web de Mac OS X à l’adresse www.apple.com/fr/macosx.
Vous pouvez également rechercher « Mac OS X » dans l’Aide Mac.
La migration depuis un PC
vers un Mac
la page « Pourquoi vous adorerez le Mac » sur
http://www.apple.com/fr/getamac/whymac/.
L’utilisation des applications
iLife
le site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous pouvez
également ouvrir une application iLife, ouvrir l’Aide de cette
application, puis saisir une question dans le champ de recherche.
La modification des Préférences Système
Préférences Système, accessibles en choisissant le menu Pomme
(K) > Préférences Système. Vous pouvez également rechercher
« préférences système » dans l’Aide Mac.
L’utilisation de votre trackpad Recherchez « trackpad » dans l’Aide Mac. ou bien ouvrez Préfé-
rences Système, cliquez sur Clavier et souris, puis sur Trackpad.
L’utilisation de votre clavier Recherchez « clavier » dans l’Aide Mac.
L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide Mac.32 Chapitre 2 Votre MacBook au quotidien
L’utilisation de la technologie
sans fil AirPort Extreme
la page web d’assistance AirPort à l’adresse
www.apple.com/fr/support/airport.
L’utilisation de la technologie
sans fil Bluetooth
la page web d’assistance Bluetooth à l’adresse
www.apple.com/fr/support/bluetooth. Vous pouvez aussi
ouvrir l’utilitaire Échange de fichiers Bluetooth (dans le dossier
Utilitaires du dossier Applications) et sélectionner Aide >
Aide Bluetooth.
L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac.
La connexion d’une
imprimante
Recherchez « impression » dans l’Aide Mac.
Les connexions FireWire et USB Recherchez « USB » ou « FireWire » dans l’Aide Mac.
La connexion à Internet Recherchez « Internet » dans l’Aide Mac.
La connexion d’un moniteur
externe
Recherchez « port moniteur » dans l’Aide Mac.
La télécommande Apple Recherchez « télécommande » dans l’Aide Mac.
Front Row Recherchez « Front Row » dans l’Aide Mac
La gravure d’un CD ou DVD Recherchez « graver disque » dans l’Aide Mac.
Les caractéristiques la page web concernant les caractéristiques, à l’adresse
www.apple.com/fr/support/specs. Vous pouvez également ouvrir
Informations Système en choisissant le menu Pomme (K) >
« À propos de ce Mac » dans la barre des menus, puis en cliquant
sur Plus d’infos.
Pour obtenir des
informations sur : Reportez-vous aux sources suivantes :Chapitre 2 Votre MacBook au quotidien 33
Actualités, téléchargement
gratuits et catalogues en ligne
des logiciels et du matériel
Apple
le site web d’Apple à l’adresse www.apple.com/fr.
Instructions, assistance technique et manuels des produits
Apple
le site web d’assistance Apple à l’adresse
www.apple.com/fr/support.
Pour obtenir des
informations sur : Reportez-vous aux sources suivantes :3
3 Augmentez votre mémoire
mémoire RAM
www.apple.com/fr/store
Aide Mac36 Chapitre 3 Augmentez votre mémoire
Ce chapitre fournit des informations et des instructions pour installer de la mémoire
supplémentaire et pour retirer et remettre en place la batterie de votre MacBook.
Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez
accéder en retirant sa batterie. Votre MacBook est fourni avec un minimum de
2 gigaoctets (Go) de mémoire DDR2 (Double Data Rate) SDRAM (Synchronous
Dynamic Random-Access Memory) à 800 MHz. Les deux logements de mémoire
peuvent accueillir un module SDRAM conforme aux spécifications suivantes :
 format DDR2 SO-DIMM (Double Data Rate Small Outline Dual Inline Memory Module) ;
 3,18 cm (soit 1,25 pouce) ;
 1 Go ou 2 Go ;
 200 broches ;
 mémoire RAM de type PC2-5300 DDR2 à 800 MHz.
Vous pouvez ajouter deux modules de mémoire de 2 Go pour un total de 4 Go de
mémoire au maximum. Pour obtenir des performances optimales, ne laissez aucun
des deux logements vides et installez-y des modules de mémoire identiques.
AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un
technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance
qui accompagnent votre ordinateur pour savoir comment contacter Apple. Tout
dommage causé à votre matériel en tentant d’installer vous-même de la mémoire
n’est pas couvert par la garantie limitée de votre ordinateur.Chapitre 3 Augmentez votre mémoire 37
Installation de mémoire supplémentaire
Pour installer de la mémoire, il faut enlever la batterie puis la remettre en place.
La procédure suivante inclut des instructions sur le retrait de la batterie, l’ajout de
mémoire et la remise en place de la batterie.
Étape 1 : Enlevez la batterie.
1 Éteignez le MacBook. Débranchez l’adaptateur secteur, le câble Ethernet, les câbles USB
et tous les autres câbles connectés au MacBook afin d’éviter toute détérioration de ce
dernier.
AVERTISSEMENT : soyez prudent lorsque vous manipulez la batterie. Consultez les
informations de sécurité sur la batterie à la page 66.38 Chapitre 3 Augmentez votre mémoire
2 Retournez le MacBook et repérez l’emplacement du verrou de la batterie. Utilisez une
pièce de monnaie pour faire tourner le verrou d’un quart de tour vers la droite afin de
débloquer la batterie, puis retirez cette dernière avec précaution.
AVERTISSEMENT : les composants internes de votre MacBook risquent d’être chauds.
Si vous venez d’utiliser votre MacBook, attendez 10 minutes après l’extinction afin de
laisser aux composants internes le temps de se refroidir.
¥
Á
¥
ÁChapitre 3 Augmentez votre mémoire 39
Étape 2 : Installer la mémoire.
1 Desserrez les trois vis imperdables maintenant le support en L, tirez sur la barre la plus
longue pour retirer le support et écartez celui-ci.
Les leviers situés dans les logements de mémoire se soulèvent automatiquement
lorsque vous retirez le support.
2 Touchez la surface métallique à l’intérieur de l’ordinateur afin de décharger toute
électricité statique que vous pouvez avoir emmagasinée.
Desserrez les trois vis
Tirez sur cette barre
¥
Á40 Chapitre 3 Augmentez votre mémoire
3 Pour retirer un module de mémoire placé dans un logement, poussez le levier vers la
gauche d’un mouvement rapide, ce qui fait apparaître le bord du module de mémoire.
Retirez le module de mémoire. Répétez l’opération avec l’autre module de mémoire.
Leviers
¥
ÁChapitre 3 Augmentez votre mémoire 41
4 Insérez les nouveaux modules de mémoire dans les logements :
a Commencez par insérer le bord doré, avec l’encoche sur le côté gauche.
b Poussez fermement avec deux doigts sur les modules de mémoire pour les mettre
en place. Vous devez entendre un clic indiquant que la mémoire est correctement
insérée.
Remarque : il est possible qu’une sorte de lubrifiant soit présent sur le nouveau
module de mémoire afin de faciliter le processus d’insertion. Ceci est normal et vous
ne devez pas essuyer ou nettoyer le module pour tenter de l’éliminer.
c Si les leviers ne reviennent pas en position fermée, déplacez-les vers la droite pour
les fermer.
Encoches
¥
Á42 Chapitre 3 Augmentez votre mémoire
5 Replacez le support en L en insérant d’abord le bras le plus court, puis resserrez les vis.
Insérez Resserrez les trois vis
d’abord
¥
ÁChapitre 3 Augmentez votre mémoire 43
Étape 3 : Remplacez la batterie.
1 Placez le bord droit de la batterie dans son compartiment, puis appuyez doucement
sur le bord gauche pour la mettre en place. Utilisez une pièce de monnaie pour faire
tourner le verrou d’un quart de tour vers la gauche afin d’immobiliser la batterie.
2 Reconnectez l’adaptateur secteur et tout autre câble connecté auparavant à
l’ordinateur.
¥
Á
¥
Á44 Chapitre 3 Augmentez votre mémoire
Vérification de la reconnaissance de la nouvelle mémoire par
votre MacBook
Après avoir ajouté de la mémoire au MacBook, vérifiez si elle est reconnue.
Pour vérifier la mémoire de votre ordinateur :
1 Démarrez votre MacBook.
2 Lorsque le bureau Mac OS X s’affiche, choisissez le menu Pomme () > À propos de
ce Mac.
Pour plus de détails sur la mémoire installée sur votre ordinateur, ouvrez
Informations Système en cliquant sur Plus d’infos puis sur Mémoire.
Si le MacBook ne reconnaît pas la mémoire ou ne démarre pas correctement, vérifiez
que la mémoire est compatible avec le MacBook et qu’elle est correctement installée.4
4 À tout problème sa solution
www.apple.com/fr/support
Aide Mac aide46 Chapitre 4 À tout problème sa solution
Il se peut que vous rencontriez à titre exceptionnel des problèmes en utilisant
le MacBook . Lisez ce chapitre pour trouver des idées de solution qui vous aideront
à régler vos problèmes. Vous trouverez aussi des informations supplémentaires
concernant le dépannage dans l’Aide Mac et sur le site web d’assistance consacré
au MacBook, à l’adresse www.apple.com/fr/support/macbook.
Il existe généralement une solution simple et rapide aux problèmes qui peuvent
survenir au cours de l’utilisation de votre MacBook. Réfléchissez aux conditions qui
ont entraîné l’apparition de ce problème. Ce récapitulatif de la totalité des opérations
effectuées avant que le problème ne survienne permet de restreindre les causes possibles et de trouver la solution. Les éléments à noter comprennent:
 les applications que vous étiez en train d’utiliser quand le problème est apparu ; les
problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer
que cette application n’est pas compatible avec la version de Mac OS installée sur
votre ordinateur ;
 les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre
dossier Système ;
 tout composant matériel installé (mémoire supplémentaire ou périphérique, par
exemple).Chapitre 4 À tout problème sa solution 47
Problèmes vous empêchant d’utiliser votre MacBook
Si votre MacBook ne répond plus ou que le pointeur se fige
Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Mac OS X permet
de quitter une application figée sans redémarrer votre ordinateur.
Pour forcer la fermeture d’une application :
1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu
Pomme () > Forcer à quitter dans la barre des menus.
La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application est
sélectionnée.
2 Cliquez sur Forcer à quitter.
L’application se ferme, en laissant toutes les autres applications ouvertes.
Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone de
dialogue.
Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez
l’ordinateur afin de vous assurer que le problème est entièrement réglé.
Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des
menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en cas
de blocage de l’ordinateur ou s’il ne répond pas.
Si le problème ne survient que lorsque vous utilisez une application particulière, vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir
des informations de contact et une assistance relatifs aux logiciels fournis avec votre
MacBook, rendez-vous à l’adresse www.apple.com/guide.48 Chapitre 4 À tout problème sa solution
Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le
logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels
fournis avec le MacBook » à la page 57.
Si le MacBook se bloque au démarrage, si un point d’interrogation clignotant apparaît ou si l’écran est éteint et que la lampe témoin de suspension d’activité reste
allumée (pas en mode de suspension d’activité)
Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient
pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe
relié à l’ordinateur.
 Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le
en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes.
Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur
en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option
enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis
sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système
et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.
 Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire de
disque :
 Insérez le DVD d’installation de Mac OS X dans votre ordinateur.
 Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du
démarrage.
 Choisissez Programme d’installation dans la barre des menus, puis choisissez Ouvrir
l’Utilitaire de disque. Lorsqu’Utilitaire de disque s’ouvre, suivez les instructions de la
sous-fenêtre S.O.S pour savoir s’il est en mesure de réparer le disque.Chapitre 4 À tout problème sa solution 49
Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller
le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook » à la page 57.
Si votre MacBook ne s’allume ou ne démarre pas
Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :
 Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une
prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe
60 W fourni avec le MacBook. Si l’adaptateur secteur ne recharge plus l’ordinateur et
que la lampe témoin de l’adaptateur secteur ne s’allume pas lorsque vous branchez
le câble d’alimentation, essayez de le débrancher puis de le brancher à nouveau afin
de le positionner correctement.
 Vérifiez si votre batterie à besoin d’être rechargée. Appuyez sur le petit bouton situé
sur la batterie. Vous devriez voir apparaître un à quatre voyants indiquant le niveau
de charge de la batterie. Si une seule lampe témoin de niveau de la batterie clignote,
branchez l’adaptateur secteur pour charger la batterie jusqu’à ce qu’au moins cette
lampe témoin reste allumée en permanence.
 Si le problème persiste, réinitialisez le gestionnaire d’alimentation de MacBook en
débranchant l’adaptateur secteur, en retirant la batterie et en maintenant le bouton
d’alimentation (®) enfoncé pendant au moins 5 secondes.
 Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement
installée et compatible avec votre ordinateur. Vérifiez si le retrait de cette mémoire
et la remise en place de l’ancienne permet à l’ordinateur de démarrer (consultez la
page 39). 50 Chapitre 4 À tout problème sa solution
 Appuyez sur le bouton d’alimentation (®) et maintenez immédiatement les touches
Commande (x), Option, P, et R enfoncées jusqu’à entendre une deuxième fois le son
du démarrage. Cette action réinitialise le paramètre RAM (PRAM).
 Si vous ne parvenez toujours pas à démarrer le MacBook, consultez la rubrique
« Informations, services et assistance » à la page 59 qui contient les informations
nécessaires pour prendre contact avec Apple.
Si l’écran devient subitement noir ou que votre MacBook se bloque
Essayez de redémarrer votre MacBook.
1 Débranchez tout périphérique connecté à votre MacBook excepté l’adaptateur secteur.
2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système.
3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant la connexion d’un périphérique et la reprise du travail.
Pour vérifier le niveau de charge de la batterie, observez l’icône d’état de la batterie
( ) située dans la barre des menus.
Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie de
la batterie sont en place.
Si vous avez oublié votre mot de passe
Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de
tous les autres comptes.
1 Insert the DVD d’installation de Mac OS X. Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du démarrage.
2 Dans la barre des menus, choisissez Utilitaires > Réinitialiser le mot de passe. Suivez les
instructions à l’écran.Chapitre 4 À tout problème sa solution 51
En cas de problème à l’éjection d’un disque
 Fermez toutes les applications susceptibles d’utiliser le disque et essayez à nouveau.
 Si cela ne donne pas de résultats, redémarrez l’ordinateur tout en maintenant le bouton du trackpad enfoncé.
Utilisation d’Apple Hardware Test
Si vous pensez qu’il y a un problème avec les composants matériels du MacBook,
vous pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas
(les composants affectés peuvent être la mémoire ou le processeur, par exemple).
Pour utiliser Apple Hardware Test :
1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur
secteur. Si un câble Ethernet est connecté, déconnectez-le.
2 Redémarrez votre MacBook tout en maintenant enfoncée la touche D.
3 Lorsque l’écran principal d’Apple Hardware Test s’affiche, sélectionnez votre langue.
4 Appuyez sur la touche Retour ou cliquez sur la flèche droite.
5 Lorsque l’écran principal d’Apple Hardware Test s’affiche (après 45 secondes environ),
suivez les instructions à l’écran.
6 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur. Notez
le code d’erreur avant d’entreprendre les démarches d’assistance. Si Apple Hardware Test
ne détecte pas de panne matérielle, il est probable que le problème soit lié aux logiciels.
Pour en savoir plus sur l’Apple Hardware Test, consultez le fichier Ouvrez-moi d’Apple
Hardware Test qui se trouve sur le DVD d’installation des applications fourni avec votre
ordinateur.52 Chapitre 4 À tout problème sa solution
Problèmes de connexion à Internet
Le MacBook est équipé de l’application Assistant réglages, destinée à vous aider à configurer une connexion à Internet. Ouvrez Préférences Système, puis cliquez sur Réseau.
Cliquez sur le bouton « Assistant » pour ouvrir Assistant réglages de réseau.
En cas de problèmes avec votre connexion à Internet, vous pouvez essayer les méthodes proposées dans cette rubrique en commençant par Diagnostic réseau.
Pour utiliser Diagnostic réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau puis cliquez sur « Assistant ».
3 Cliquez sur Diagnostic pour lancer Diagnostic réseau.
4 Suivez les instructions à l’écran.
Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe
peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous
connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès à
Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter
de réaliser les opérations suivantes.
Connexions à Internet par modem câble, ligne DSL et réseau local (LAN)
Assurez-vous que tous les câbles du modem sont correctement branchés. Vérifiez le
câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et celui reliant
le modem à la prise secteur. Vérifiez également les câbles et les sources d’alimentation
de vos routeurs et concentrateurs Ethernet. Chapitre 4 À tout problème sa solution 53
Éteignez, puis rallumez le modem afin de réinitialiser le matériel du modem.
Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains
fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation
du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez
l’actionner avant ou après avoir éteint puis rallumé le modem.
Important : les instructions relatives aux modems ne concernent pas les utilisateurs de
réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de
réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs
de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI.
Connexions PPPoE
Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via
PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les informations que
vous avez saisies dans les préférences Réseau sont correctes.
Pour vérifier les réglages PPPoE :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau.
3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez
PPPoE dans le menu local Interface.
4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez
Ethernet si vous vous connectez à un réseau filaire ou AirPort s’il s’agit d’un réseau sans
fil.
5 Saisissez les informations transmises par votre fournisseur d’accès, telles que le nom de
compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès l’exige). 54 Chapitre 4 À tout problème sa solution
6 Cliquez sur Appliquer pour activer les réglages.
Connexions au réseau
Assurez-vous que le câble Ethernet est branché sur le MacBook et sur le réseau.
Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet.
Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre FAI
fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur.
Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de masquage d’adresses IP. Pour obtenir des informations sur la configuration, consultez la
documentation fournie avec votre routeur ou contactez la personne qui a configuré
votre réseau. Vous pouvez utiliser une borne d’accès AirPort pour partager une adresse
IP unique entre plusieurs ordinateurs. Pour obtenir plus d’informations sur l’utilisation
d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web
AirPort d’Apple, à l’adresse www.apple.com/fr/support/airport.
Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés, adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau.Chapitre 4 À tout problème sa solution 55
Problèmes de communication sans fil avec AirPort Extreme
En cas de problèmes avec les communications sans fil AirPort Extreme :
 Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé
et dispose d’un point d’accès sans fil.
 Assurez-vous que le logiciel est correctement configuré conformément aux instructions incluses avec votre borne d’accès ou point d‘accès.
 Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la
zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou
des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.
 Vérifiez l’icône d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres de
mesure apparaissent pour afficher la puissance du signal. Si l’intensité du signal est
faible, essayez de changer de place.
 Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac,
puis Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions
fournies avec votre appareil sans fil.56 Chapitre 4 À tout problème sa solution
Maintien à jour de vos logiciels
Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement
les dernières versions de logiciels, gestionnaires et autres améliorations fournies par
Apple.
Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte
les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer le MacBook
afin qu’il recherche régulièrement des mises à jour et que vous puissiez télécharger et
installer les logiciels mis à jour.
Pour rechercher des logiciels mis à jour :
1 Ouvrez les Préférences Système.
2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.
 Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.
 Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse
www.apple.com/fr/macosx.Chapitre 4 À tout problème sa solution 57
Réinstallation des logiciels fournis avec le MacBook
Utilisez les disques d’installation de logiciels fournis avec votre ordinateur pour réinstaller Mac OS X et les applications livrées avec votre ordinateur. Vous pouvez choisir soit
« Archiver et installer » afin d’enregistrer vos fichiers et réglages existants, soit « Effacer
et installer » pour effacer toutes vos données.
Important : Apple vous recommande de sauvegarder les données de votre disque dur
avant de procéder à la restauration des logiciels. Nous vous conseillons de sauvegarder
vos fichiers essentiels avant d’installer Mac OS X et d’autres applications car l’option
« Effacer et installer » efface les données du disque dur. Apple décline toute responsabilité en cas de perte de données.
Installation de Mac OS X
Pour installer Mac OS X :
1 Sauvegardez vos fichiers essentiels.
2 Assurez-vous que votre adaptateur secteur est connecté et branché sur une prise de
courant.
3 Insérez le DVD d’installation de Mac OS X fourni avec votre ordinateur.
4 Double-cliquez sur Installer Mac OS X.
5 Suivez les instructions à l’écran.
Remarque : pour rétablir les réglages d’origine de Mac OS X sur votre ordinateur, cliquez sur Options dans la sous-fenêtre « Sélectionner une destination » du programme
d’installation, puis choisissez Effacer et installer. Si vous choisissez « Effacer et installer »,
un message vous rappelle d’utiliser le DVD d’installation des applications pour réinstaller les applications incluses avec votre ordinateur.58 Chapitre 4 À tout problème sa solution
6 Une fois l’installation terminée, cliquez sur Redémarrer pour redémarrer votre ordinateur.
7 Suivez les instructions données par l’Assistant réglages pour configurer votre nouveau
compte utilisateur.
Installation d’applications
Si vous réinstallez Mac OS X sur votre ordinateur, puis que vous sélectionnez l’option
« Effacer et installer », vous devez réinstaller les applications fournies avec votre ordinateur, telles que les applications iLife.
Pour installer les applications fournies avec votre ordinateur :
1 Assurez-vous que votre adaptateur secteur est connecté et branché sur une prise de
courant.
2 Insérez le DVD d’installation des applications fourni avec votre ordinateur.
3 Double-cliquez sur « Installer les logiciels inclus ».
4 Suivez les instructions à l’écran.
5 Cliquez sur Fermer une fois l’installation terminée.Chapitre 4 À tout problème sa solution 59
Informations, services et assistance
Outre le disque dur et la mémoire, votre MacBook ne contient aucune pièce que vous
puissiez réparer vous-même. Si vous avez besoin de services de réparation, adressezvous à Apple ou portez votre MacBook chez un fournisseur de services agréé Apple.
Vous trouverez de plus amples informations sur le MacBook en ligne, dans l’aide à
l’écran, dans Informations Système et via Apple Hardware Test.
Informations en ligne
Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur
www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire
des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de
discussion Apple.
Aide à l’écran
Vous pouvez chercher des réponses à vos questions ainsi que des instructions et des
informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac.
Informations Système
Pour obtenir des informations sur le MacBook, servez-vous d’Informations Système.
Cette application vous fournit la liste des composants matériels et des logiciels installés, le numéro de série et de version du système d’exploitation, la quantité de mémoire
installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme ( ) >
« À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos.60 Chapitre 4 À tout problème sa solution
Service et assistance AppleCare
Le MacBook est fourni avec 90 jours d’assistance technique et 1 an de garantie sur
les réparations de matériel effectuées dans les magasins Apple Store ou dans des centres de réparations agréés Apple tels que les fournisseurs de services agréés Apple.
Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un
programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur
www.apple.com/fr/support/products ou bien visitez le site web adapté à votre
pays (répertorié ci-dessous).
Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare
peut vous aider à installer et à ouvrir les applications et offre des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit
pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre
MacBook à portée de main lorsque vous appelez.
Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date
d’achat. Des frais téléphoniques peuvent être applicables.
Pays Téléphone Site web
Allemagne (49) 01805 009 433 www.apple.com/de/support
Autriche (43) 0810 300 427 www.apple.com/at/support
Belgique (flamand)
(français)
(32) 070 700 772
(32) 070 700 773
www.apple.com/benl/support
www.apple.com/befr/support
France (33) 0805 540 003 www.apple.com/fr/support
Luxembourg (352) 800 24550 www.apple.com/befr/supportChapitre 4 À tout problème sa solution 61
Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques
locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet:
Localisation du numéro de série de votre produit
Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre
ordinateur :
 Choisissez Apple () > À propos de ce Mac, puis cliquez sur le numéro de version
sous les mots « Mac OS X » pour passer du numéro de version de Mac OS X à la version, puis au numéro de série.
 Cliquez sur l’icône du Finder et ouvrez /Applications/Utilitaires/Informations Système.
Cliquez sur Matériel dans la sous-fenêtre Contenu.
 Retirez la batterie. Le numéro de série de votre MacBook se trouve dans la baie de la
batterie. Pour en savoir plus sur l’extraction de la batterie, consultez la page 37.
Suisse (français)
(allemand)
(41) 0848 000 132
(41) 0848 000 132
www.apple.com/chfr/support
www.apple.com/chde/support
Pays Téléphone Site web
www.apple.com/contact/phone_contacts.html www.apple.com/contact/phone_contacts.html5
5 Dernières recommandations
www.apple.com/fr/environment
Aide Mac ergonomie64 Chapitre 5 Dernières recommandations
Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces consignes concernant le nettoyage et la manipulation de votre MacBook ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un endroit
facile d’accès pour vous et pour les utilisateurs éventuels.
Informations importantes concernant la sécurité
Manipulation Installez le MacBook sur un plan de travail stable qui laisse convenablement circuler l’air sous l’ordinateur et autour de celui-ci. N’utilisez pas le MacBook en
le posant sur un coussin ou tout autre objet de structure non solide car cela pourrait
empêcher les conduits d’aération de fonctionner correctement. Évitez également de
placer des objets sur le clavier lorsque vous utilisez votre MacBook. N’introduisez
jamais d’objets d’aucune sorte dans les ouvertures servant à la ventilation.
La partie inférieure du MacBook peut chauffer au cours d’une utilisation normale de
l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il émane vous gêne, posezle plutôt sur un plan de travail stable.
AVERTISSEMENT : un stockage ou un usage incorrect de votre ordinateur peut annuler la garantie du fabricant.
AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner
des décharges électriques ou entraîner tout type de blessure ou dommage.Chapitre 5 Dernières recommandations 65
Eau et endroits humides Évitez de placer votre MacBook à proximité de sources de
liquide telles que des boissons, un évier, un lavabo, une baignoire ou une douche,
par exemple. Protégez votre MacBook de l’humidité et des intempéries (neige, pluie
et brouillard par exemple).
Adaptateur secteur MagSafe 60 W Veillez à ce que la fiche ou le câble d’alimentation
secteur CA soit totalement enclenché dans l’adaptateur secteur avant de brancher ce
dernier sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne
le MacBook ou, au besoin, un adaptateur secteur agréé Apple compatible avec ce produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant ou
posez-le par terre, dans un endroit correctement aéré.
Débranchez l’adaptateur secteur, retirez la batterie et débranchez tous les autres câbles
si l’un des cas suivants se présente :
 Vous souhaitez ajouter de la mémoire.
 Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions
fournies à la page 70).
 La prise ou le câble d’alimentation est endommagé.
 Le MacBook ou l’adaptateur secteur est exposé à la pluie ou à une humidité excessive, ou du liquide a été versé dans le boîtier.
 Le MacBook ou l’adaptateur secteur a subi une chute, le boîtier a été endommagé ou
vous pensez qu’une réparation est nécessaire.66 Chapitre 5 Dernières recommandations
Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte
de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de
matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment
ou autres) à moins de 25 mm de ce port.
Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les doucement à l’aide d’un bâtonnet de coton.
Caractéristiques du port d’alimentation MagSafe :
 Fréquence : 50 à 60 Hz, monophasée
 Tension : 100 à 240 V
 Tension de sortie : 16,5 V CA, 3,65 A
Batterie Évitez de la faire tomber, de la démonter, de l’écraser, de l’incinérer ou de
l’exposer au feu ou à des températures supérieures à 100 ºC. N’utilisez plus la batterie si
elle vous semble endommagée de quelque façon que ce soit. Remplacez la batterie de
ce produit uniquement par une batterie autorisée par Apple. Éliminez rapidement les
batteries usagées conformément aux directives d’environnement locales en vigueur.Chapitre 5 Dernières recommandations 67
Diminution de l’acuité auditive Vous risquez une perte d’audition irréparable si vous
utilisez un casque ou des écouteurs à un volume sonore élevé. L’oreille peut s’adapter
petit à petit à des volumes sonores de plus en plus élevés qui peuvent sembler normaux, mais qui risquent à la longue d’endommager votre système auditif. En cas de sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les écouteurs et
consultez un médecin. Plus le volume est élevé, plus votre audition risque d’être affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent de
prendre les mesures suivantes :
 Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque
d’écoute.
 Évitez d’augmenter le volume afin de bloquer les bruits environnants.
 Baissez le volume si vous ne parvenez pas à entendre une personne qui parle à côté
de vous.
Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle
du trafic aérien, ni dans aucune autre situation où une panne du système informatique
pourrait entraîner la mort, des blessures ou de graves dommages écologiques.68 Chapitre 5 Dernières recommandations
Informations concernant le laser pour lecteurs optiques
Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux s’il
est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un
fournisseur de services agréé Apple.
Informations importantes sur la manipulation
Environnement de fonctionnement : toute utilisation de votre MacBook en dehors de
ces plages peut affecter ses performances :
 Température de fonctionnement : 10° à 35° C
 Température de stockage : -20° à 45° C
 Humidité relative : 5% à 90 % (sans condensation)
 Altitude d’utilisation : 0 à 3 048 mètres
AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui ne
sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à des
rayonnements dangereux.
AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer des
dommages à votre MacBook ou à d’autres objets.Chapitre 5 Dernières recommandations 69
Mise sous tension de votre MacBook N’allumez jamais le MacBook tant que tous
ses composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur
alors que certains composants manquent peut s’avérer dangereuse et risque de
l’endommager.
Transport du MacBook Si vous transportez le MacBook dans un sac ou dans un
attaché-case, assurez-vous que ce dernier ne contient pas d’objets non attachés (des
trombones ou des pièces de monnaie, par exemple) qui pourraient pénétrer accidentellement dans l’ordinateur par une ouverture (comme la fente du lecteur optique)
ou se coincer à l’intérieur d’un port. Maintenez également à l’écart du port secteur
MagSafe tout objet à sensibilité magnétique.
Utilisation des connecteurs et des ports Ne forcez jamais un connecteur à entrer dans
un port. Lorsque vous branchez un appareil, assurez-vous que le port ne contient
aucun résidu quelconque, que le connecteur correspond bien au port et qu’il est placé
de manière à entrer correctement dans le port.70 Chapitre 5 Dernières recommandations
Utilisation du lecteur optique Le SuperDrive de votre MacBook prend en charge les
disques de 12 cm. Les disques de forme irrégulière et de moins de 12 cm ne peuvent
pas être lus et peuvent rester coincés dans le lecteur.
Stockage du MacBook Si vous décidez de ranger le MacBook pendant une longue
période, placez-le dans un endroit frais (idéalement, à 22° C) et déchargez la batterie
jusqu’à 50 pour cent. Avant de ranger votre ordinateur pour une période de temps
supérieure à cinq mois, déchargez la batterie jusqu’à environ 50 pour cent, puis retirezla de votreMacBook. Pour conserver les capacités de la batterie, rechargez la batterie
jusqu’à 50 pour cent tous les six mois environ.
Nettoyage du MacBook Lorsque vous nettoyez le boîtier du MacBook et ses composants, éteignez d’abord le MacBook, débranchez l’adaptateur secteur et retirez la batterie. Puis, pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon doux, humide et
non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit.
Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni aérosols,
ni dissolvants, ni abrasifs qui pourraient endommager les finitions de l’appareil.
Nettoyage de l’écran du MacBook Pour nettoyer l’écran du MacBook, éteignez tout
d’abord votre MacBook, débranchez l’adaptateur secteur, puis retirez la batterie.
Ensuite utilisez le chiffon fourni pour nettoyer l’écran. Humidifiez le chiffon à l’eau
si nécessaire. Ne vaporisez jamais de liquide directement sur l’écran.Chapitre 5 Dernières recommandations 71
Ergonomie
Voici quelques conseils pour la mise en place d’un environnement de travail sain.
Clavier et trackpad
Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main
étant placée dans le prolongement du poignet.
Position
à éviter
Position
recommandée72 Chapitre 5 Dernières recommandations
Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou que
vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes.
Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail
continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs
aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste.
Souris externe
Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier.
Ménagez un espace suffisant pour la manipuler avec aisance.
Siège
Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale
et vos pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire,
c’est-à-dire la partie inférieure de votre dos. Suivez les instructions du fabricant de
sorte que le réglage du dossier soit parfaitement adapté à votre morphologie.
Position
à éviter
Position
recommandéeChapitre 5 Dernières recommandations 73
Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à
plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont
le poste de saisie est situé plus bas que le plan de travail.
Écran intégré
Orientez l’écran de manière à réduire le plus possible les reflets de l’éclairage
électrique et de la lumière du jour. Ne forcez pas l’écran si vous rencontrez une résistance. L’angle d’ouverture maximal de l’écran ne peut dépasser 130 degrés.
Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez l’ordinateur ou que l’éclairage ambiant change.
Vous trouverez d’autres informations concernant l’ergonomie sur Internet :
Apple et l’environnement
Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement.
Des informations supplémentaires sont disponibles sur Interne
www.apple.com/about/ergonomics
www.apple.com/fr/environment75
Regulatory Compliance Information
FCC Compliance Statement
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2)
this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio or
television reception is suspected.
L‘utilisation de ce dispositif est autorisée seulement aux
conditions suivantes: (1) il ne doit pas produire de
brouillage et (2) l’utilisateur du dispositif doit étre prêt à
accepter tout brouillage radioélectrique reçu, même si
ce brouillage est susceptible de compromettre le
fonctionnement du dispositif.
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference to
radio or television reception, try to correct the
interference by using one or more of the following
measures:
 Turn the television or radio antenna until the
interference stops.
 Move the computer to one side or the other of the
television or radio.
 Move the computer farther away from the television
or radio.
 Plug the computer in to an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are on
circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product.
Or consult an experienced radio/television technician
for additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc. could void the EMC
compliance and negate your authority to operate the
product.
This product has demonstrated EMC compliance under
conditions that included the use of compliant peripheral
devices and shielded cables (including Ethernet network
cables) between system components. It is important
that you use compliant peripheral devices and shielded
cables between system components to reduce the
possibility of causing interference to radios, television
sets, and other electronic devices.76
Responsible party (contact for FCC matters only):
Apple Inc. Corporate Compliance
1 Infinite Loop, MS 26-A
Cupertino, CA 95014
Utilisation de la radio sans fil
Cet appareil est restreint à un usage intérieur lorsqu’il
fonctionne à des bandes de fréquence de 5,15 to 5,25 GHz.
Cet appareil doit être utilisé à l’intérieur.
Exposure to Radio Frequency Energy
The radiated output power of the AirPort Extreme
technology is below the FCC radio frequency exposure
limits. Nevertheless, it is advised to use the wireless
equipment in such a manner that the potential for
human contact during normal operation is minimized.
FCC Bluetooth Wireless Compliance
The antenna used with this transmitter must not be
collocated or operated in conjunction with any other
antenna or transmitter subject to the conditions of the
FCC Grant.
Bluetooth Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de la Classe B respecte toutes
les exigences du Règlement sur le matériel brouilleur
du Canada.
Industry Canada Statement
Complies with the Canadian ICES-003 Class B
specifications. Cet appareil numérique de la classe B est
conforme à la norme NMB-003 du Canada. This device
complies with RSS 210 of Industry Canada.
Bluetooth Europe - Déclaration de conformité
UE
Cet appareil sans fil est conforme à la directive R&TTE.
Europe : déclaration de conformité EU
Cet appareil est conforme à la recommandation 1999/
519/CE du Conseil de l’Union européenne, du 12 juillet
1999, relative à la limitation de l’exposition aux champs
électromagnétiques (de 0 Hz à 300 GHz).
Apple Inc. déclare par la présente que la carte Mini-PCIe
802.11a/b/g/n
est conforme à la directive R&TTE.
Conforme aux directives européennes Basse tension et
CEM.
Voir : www.apple.com/euro/compliance (en anglais)
Korea Warning Statements
Singapore Wireless Certification77
Taiwan Wireless Statements
Taiwan Class B Statement
VCCI Class B Statement
Russia
External USB Modem Information
Si vous connectez votre MacBook à une ligne
téléphonique par le biais d’un modem USB externe,
veuillez vous reporter aux informations fournies par
l’agence de télécommunications mentionnées dans
la documentation livrée avec votre modem.
ENERGY STAR®
Compliance
As an ENERGY STAR®
partner, Apple has determined
that standard configurations of this product meet the
ENERGY STAR®
guidelines for energy efficiency. The
ENERGY STAR®
program is a partnership with electronic
equipment manufacturers to promote energy-efficient
products. Reducing energy consumption of products
saves money and helps conserve valuable resources.
This computer is shipped with power management
enabled with the computer set to sleep after 10 minutes
of user inactivity. To wake your computer, click the
mouse or trackpad button or press any key on the
keyboard.
For more information about ENERGY STAR®, visit:
www.energystar.gov78
Informations sur l’élimination et le recyclage
Le symbole ci-dessus signifie que vous devez vous
débarrasser de votre produit selon les normes et la
législation de votre pays. La lampe de rétro-éclairage de
cet appareil contient du mercure, vous ne pouvez donc
pas le mélanger avec les ordures ménagères. Lorsque
votre produit n’est plus utilisable, contactez Apple ou les
autorités locales afin de connaître les possibilités de
recyclage.
Pour en savoir plus sur le programme
de recyclage d’Apple, consultez le site
www.apple.com/fr/environment/recycling.
Informations sur l’enlèvement de la batterie
Jetez vos batteries usagées en respectant les lois et les
consignes environnementales de votre pays.
Deutschland: Dieses Gerät enthält Batterien. Bitte nicht
in den Hausmüll werfen. Entsorgen Sie dieses Gerätes
am Ende seines Lebenszyklus entsprechend der
maßgeblichen gesetzlichen Regelungen.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca) worden
gedeponeerd.
Taiwan:79
Union européenne—instructions concernant
l’élimination des déchets :
Le symbole ci-dessus signifie que vous devez vous
débarrasser de votre produit sans le mélanger avec les
ordures ménagères, selon les normes et la législation de
votre pays. Lorsque ce produit n’est plus utilisable,
portez-le dans un centre de traitement des déchets
agréé par les autorités locales. Certains centres
acceptent les produits gratuitement. Le traitement et le
recyclage séparé de votre produit lors de son
élimination aideront à préserver les ressources naturelles
et à protéger l’environnement et la santé des êtres
humains.K Apple Inc.
© 2009 Apple Inc. Tous droits réservés.
En application des lois et conventions en vigueur,
aucune reproduction totale ni partielle du manuel n’est
autorisée, sauf consentement écrit préalable d’Apple.
Tout a été mis en œuvre pour que les informations pré-
sentées dans ce manuel soient exactes. Apple n’est pas
responsable des erreurs de reproduction ou d’impression.
Apple
1 Infinite Loop
Cupertino, CA 95014
408-996-1010
www.apple.com
Apple, le logo Apple, AirPort, AirPort Extreme, Cover Flow,
Exposé, FileVault, FireWire, GarageBand, iCal, iChat, iLife,
iMovie, iPhoto, iPod, iSight, iTunes, Keynote, Mac, MacBook, Macintosh, Mac OS, MagSafe, Photo Booth, Safari,
SuperDrive et Time Machine sont des marques d’Apple
Inc. déposées aux États-Unis et dans d’autres pays.
Finder, le logo FireWire, iPhone, iWeb et Spotlight sont
des marques d’Apple Inc.
AppleCare, Apple Store et iTunes Store sont des marques de service d’Apple Inc. déposées aux États-Unis et
dans d’autres pays.
ENERGY STAR®
est une marque déposée aux États-Unis.
Intel, Intel Core et Xeon sont des marques d’Intel Corp.
aux États-Unis et dans d’autres pays.
La marque et les logos Bluetooth® sont des marques
déposées appartenant à Bluetooth SIG, Inc., utilisées
sous licence par Apple Inc.
Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits commercialisés par des entreprises tierces ne sont
mentionnés que pour information, sans aucune intention de préconisation ni de recommandation. Apple
décline toute responsabilité quant à l’utilisation et au
fonctionnement de ces produits.
Fabriqué sous licence de Dolby Laboratories. « Dolby »,
« Pro Logic » et le logo double-D sont des marques
déposées de Dolby Laboratories. Travaux confidentiels
inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits
réservés.
Le produit décrit dans le présent manuel intègre des
technologies de protection de droits d’auteur ellesmêmes protégées par divers brevets américains ainsi
que d’autres droits de propriété intellectuelle appartenant à Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection des
droits d’auteurs doit être autorisée par Macrovision Corporation et est destinée à un cadre privé ou de visualisation restreinte, sauf consentement de Macrovision
Corporation. Tout démontage ou ingénierie inverse est
interdit.
L’appareil est couvert par les brevets des États-Unis portant les numéros 4 631 603, 4 577 216, 4 819 098 et
4 907 093 sous licence à des fins de visualisation limitée
uniquement.
Publié simultanément aux États-Unis et au Canada.
Félicitations, vous et votre MacBook
êtes faits l’un pour l’autre.Caméra iSight intégrée
Réalisez des vidéoconférences avec
3 amis au maximum partout dans
le monde et en temps réel.
www.apple.com/macbook
Front Row avec la
télécommande Apple Remote
Profitez de vos films, de votre
musique et de vos photos
depuis votre canapé.
Spotlight
Retrouvez n´importe quoi
sur votre système à l’instant
même où vous en saisissez le nom.
www.apple.com/macbook
www.apple.com/fr/macbook
Aide Mac iSight
www.apple.com/fr/macosx
Aide Mac Spotlight
Aide Mac Front Row
www.apple.com/fr/macbook
MusiqueAmusez-vous avec vos photos
Importez, organisez et partagez
jusqu’à 250 000 photos, puis
faites-en d’élégants albums de
photos.
Widgets de Dashboard
Obtenez les toutes dernières
informations instantanément.
Affichez l’état de la bourse, la météo,
les prochains vols d’avions et autres.
Podcasts
Enregistrez des podcasts dotés d’un
son professionnel grâce aux effets
sonores et aux jingles.
Des sites web en un clic
Créez des sites web et des
blogs en toute simplicité et
agrémentez-les de vidéos,
de podcasts et de photos.
Publier
www.apple.com/fr/macosx
Aide Mac Dashboard
Aide iPhoto photo
www.apple.com/fr/ilife/garageband
Aide GarageBand podcast
www.apple.com/fr/ilife/iweb
Aide iWeb site web
www.apple.com/fr/ilife/iphotoTable des matières 5
Table des matières
Chapitre 1 : Prêt, feu, configurez !
9 Contenu de la boîte
9 Configuration du MacBook
15 Extinction ou suspension d’activité de votre MacBook
Chapitre 2 : Votre MacBook au quotidien
22 Caractéristiques de base de votre MacBook
25 Fonctionnalités du clavier de votre MacBook
27 Ports présents sur votre MacBook
29 Utilisation de la batterie du MacBook
31 Comment obtenir des réponses à vos doutes
Chapitre 3 : Augmentez votre mémoire
37 Installation de mémoire supplémentaire
44 Vérification de la reconnaissance de la nouvelle mémoire par votre MacBook
Chapitre 4 : À tout problème sa solution
46 Problèmes vous empêchant d’utiliser votre MacBook
51 Utilisation d’Apple Hardware Test
52 Problèmes de connexion à Internet6 Table des matières
55 Problèmes de communication sans fil avec AirPort Extreme
56 Maintien à jour de vos logiciels
56 Réinstallation des logiciels fournis avec votre MacBook
58 Informations, services et assistance
60 Localisation du numéro de série de votre produit
Chapitre 5 : Dernières recommandations
62 Informations importantes concernant la sécurité
65 Informations importantes sur la manipulation
67 Ergonomie
69 Apple et l’environnement
71 Regulatory Compliance Information1
1Prêt, feu, configurez !
www.apple.com/fr/macbook
Aide Mac Assistant Migration8 Chapitre 1 Prêt, feu, configurez !
Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Si vous n’avez jamais utilisé de MacBook ou si vous n’êtes pas familiarisé avec
les ordinateurs Macintosh, vous trouverez dans ce chapitre des instructions qui vous
aideront à débuter.
Important : lisez attentivement toutes les instructions d’installation (et les consignes de
sécurité débutant à la page 61) avant d’utiliser votre ordinateur pour la première fois.
Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser
votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2,
« Votre MacBook au quotidien », pour découvrir les nouvelles fonctionnalités de cet
MacBook.
Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en savoir
plus sur l’accès à l’Aide Mac, consultez la section « Comment obtenir des réponses à
vos doutes » à la page 31. Apple est susceptible de publier de nouvelles versions et
mises à jour de ses logiciels système, il est possible que les images de ce manuel soient
légèrement différentes de ce que vous voyez à l’écran.
Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 60 W
avant de configurer le MacBook.Chapitre 1 Prêt, feu, configurez ! 9
Contenu de la boîte
Configuration du MacBook
Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Les pages suivantes contiennent des informations qui vous guideront tout au
long du processus de configuration, notamment des opérations suivantes :
 Le branchement de l’adaptateur secteur MagSafe 60 W.
 Le branchement des câbles et l’accès à un réseau.
 La mise sous tension du MacBook et l’utilisation du trackpad.
 La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages.
 La configuration des préférences et du bureau Mac OS X.
Câble secteur
Télécommande Apple Remote
Fiche
secteur
Adaptateur secteur MagSafe de 60 W
MENU10 Chapitre 1 Prêt, feu, configurez !
Étape 1 : Branchez l’adaptateur secteur MagSafe 60 W pour alimenter le MacBook
et recharger sa batterie.
Assurez-vous que la fiche secteur est complètement insérée dans l’adaptateur et que
les broches de la fiche sont complètement déployées. Branchez la fiche secteur de
votre adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le
port secteur MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez
la force d’un aimant l’attirant.
Pour rallonger le câble de l’adaptateur secteur, tirez d’abord sur la fiche secteur pour la
retirer de l’adaptateur. Connectez le câble secteur inclus à l’adaptateur, en vous assurant qu’il est fermement connecté. Branchez l’autre extrémité sur une prise de courant.
Le câble secteur fournit une connexion avec mise à la terre.
Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de l’ordinateur,
débranchez la prise et non le câble.
¯
Câble secteur
Fiche
secteur
Connecteur MagSafe Port secteur MagSafeChapitre 1 Prêt, feu, configurez ! 11
Remarque : la première fois que vous branchez l’adaptateur secteur sur le MacBook,
la lampe témoin du connecteur MagSafe s’illumine. Une lumière orange indique que
la batterie est alimentée. Une lumière verte indique que la batterie n’est pas alimentée,
ce qui peut signifier qu’elle est complètement rechargée ou qu’elle n’est pas installée.
Si la lampe témoin ne s’allume pas, vérifiez que le connecteur est correctement branché.
Étape 2 : Pour accéder à Internet ou à un réseau, branchez une extrémité du câble
Ethernet sur le MacBook et l’autre extrémité sur un modem câble, un modem DSL
ou un réseau.
Pour une connexion commutée, vous aurez besoin d’un modem Apple USB Modem
externe, disponible sur l’Apple Store en ligne à l’adresse www.apple.com/fr/store ou
auprès des revendeurs agréés Apple. Branchez le modem Apple USB Modem sur
un port USB du MacBook, puis reliez le modem à une prise téléphonique à l’aide
d’un câble téléphonique (non inclus).
G
Câble
Ethernet
Port Ethernet Gigabit
(10/100/1000Base-T)12 Chapitre 1 Prêt, feu, configurez !
Remarque : votre MacBook est également équipé de la technologie AirPort Extreme de
mise en réseau sans fil. Pour en savoir plus sur la configuration d’une connexion sans fil,
choisissez dans la barre des menus Aide > Aide Mac, puis Bibliothèque > Aide AirPort.
Consultez la section « Comment obtenir des réponses à vos doutes » à la page 31.
Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer
votre MacBook.
Votre ordinateur émet un signal sonore lorsque vous l’allumez.
Sa mise en route prend quelques instants. Après le démarrage, Assistant réglages
s’ouvre automatiquement.
Si l’ordinateur ne s’allume pas, consultez la section « Si votre MacBook ne s’allume ou
ne démarre pas » à la page 49.
Trackpad Bouton du trackpad
® Bouton d’alimentationChapitre 1 Prêt, feu, configurez ! 13
Le trackpad du MacBook permet de sélectionner et de déplacer des éléments à l’écran
de la même façon que la souris d’un ordinateur de bureau.
 Pour déplacer le pointeur à l’écran, glissez votre index sur le trackpad. Appuyez sur
le bouton du trackpad pour sélectionner un élément, cliquer ou faire un double-clic.
 Faites glisser deux doigts sur le trackpad pour faire défiler.
Pour plus d’informations, choisissez Aide > Aide Mac et recherchez « trackpad ».
Étape 4 : Configurez votre MacBook à l’aide d’Assistant réglages
La première fois que vous démarrez votre MacBook, l’Assistant réglages se met en route.
Il vous aide à saisir les informations de connexion à Internet et au courrier électronique
ainsi qu’à configurer un compte d’utilisateur sur votre MacBook. Si vous possédez déjà
un ordinateur Macintosh, l’Assistant réglages peut vous aider à transférer automatiquement les fichiers, les applications et d’autres informations de votre ancien ordinateur.
Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui
retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur
l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un
tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation
afin qu’elle puisse être utilisée. Pour plus d’informations sur le retrait d’autorisation,
ouvrez iTunes et choisissez Aide > Aide iTunes.
Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors
du premier démarrage de l’ordinateur, vous pouvez le faire ultérieurement.
Allez dans le dossier Applications, ouvrez le dossier Utilitaires, puis double-cliquez
sur Assistant migration.14 Chapitre 1 Prêt, feu, configurez !
Étape 5 : Personnalisez le bureau Mac OS X et réglez les préférences.
Barre des
menus
Dock Icône des Préférences Système
Icône de recherche
de Spotlight
Menu Aide
Icône du FinderChapitre 1 Prêt, feu, configurez ! 15
Grâce aux Préférences Système, vous pouvez donner à votre bureau l’apparence souhaitée sans perdre de temps. Choisissez le menu Pomme () > Préférences Système
dans la barre des menus. À mesure que vous vous familiarisez avec votre ordinateur,
explorez les Préférences Système, le centre de commandes de la plupart des réglages
de votre MacBook. Pour en savoir plus, ouvrez l’Aide Mac et recherchez « Préférences
Système » ou la préférence que vous souhaitez modifier.
Extinction ou suspension d’activité de votre MacBook
Lorsque vous avez terminé de travailler avec le MacBook, suspendez son activité
ou éteignez-le.
Suspension de l’activité de votre MacBook
Suspendez l’activité de votre MacBook si vous ne comptez vous en éloigner que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à le redémarrer.
Pour suspendre l’activité de votre MacBook, procédez de l’une des manières suivantes :
 Rabattez l’écran.
 Choisissez Pomme () > Suspendre l’activité, dans la barre des menus.
 Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans
la zone de dialogue qui apparaît.
 Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur
d’énergie et définissez un délai pour la minuterie de mise en veille.16 Chapitre 1 Prêt, feu, configurez !
 Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande Apple Remote
pendant 3 secondes.
Pour réactiver le MacBook :
 Si l’écran est fermé, il suffit de l’ouvrir pour réactiver votre MacBook.
 Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®), sur l’une des
touches du clavier ou sur un bouton de la télécommande Apple Remote.
À la réactivation de votre MacBook, vos applications, vos documents et vos réglages
sont conservés tels que vous les aviez laissés.
AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension
d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le disque
dur a cessé de tourner) avant de déplacer votre MacBook. Tout déplacement de votre
ordinateur lorsque le disque dur est en train de tourner risque d’endommager ce dernier
et d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur.Chapitre 1 Prêt, feu, configurez ! 17
Extinction de votre MacBook
Si vous ne comptez pas utiliser votre MacBook pendant un jour ou deux, il est préférable de l’éteindre. La lampe témoin de suspension d’activité reste allumée quelques
instants au moment de l’extinction.
Pour éteindre le MacBook, procédez de l’une des manières suivantes :
 Choisissez Pomme () > Éteindre, dans la barre des menus.
 Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de
dialogue qui apparaît.
Si vous comptez ranger votre MacBook pour une durée prolongée, consultez la section
« Informations importantes sur la manipulation » à la page 65 afin d’obtenir des informations sur les mesures à prendre pour éviter que votre batterie ne se décharge
complètement.2
2Votre MacBook au quotidien
www.apple.com/fr/macosx
Aide Mac Mac OS XChapitre 2 Votre MacBook au quotidien 21
Cette rubrique vous offre un aperçu des différentes parties et caractéristiques
de votre MacBook.
Le site web d’Apple, à l’adresse www.apple.com/fr/, vous donne accès aux actualités
Apple, à des téléchargements gratuits et des catalogues en ligne des logiciels et
matériaux Apple destinés à votre MacBook.
Vous trouverez également les manuels de nombreux produits Apple, ainsi que
l’assistance technique pour tous les produits Apple, sur le site web d’assistance
Apple à l’adresse www.apple.com/fr/support.22 Chapitre 2 Votre MacBook au quotidien
Caractéristiques de base de votre MacBook
®?
® Bouton
d’alimentation
Lampe témoin
de la caméra
Caméra iSight
Microphone
Haut-parleurs
stéréo
Lampe témoin de
suspension d’activité
Récepteur à infrarouge
Trackpad
Batterie
(en dessous)
Bouton du
trackpad
Lecteur optique
à chargement
par fenteChapitre 2 Votre MacBook au quotidien 23
Microphone intégré
Capturez des données audio directement avec le micro (situé à gauche de la caméra
iSight) ou bien, si vous disposez d’une connexion à haut débit, discutez avec vos amis
en direct via l’application iChat AV, incluse.
Caméra iSight intégrée et lampe témoin de la caméra
Elle vous permet de réaliser des vidéoconférences avec d’autres utilisateurs grâce à
l’application iChat AV, de prendre des photos avec Photo Booth ou de capturer des
vidéos avec iMovie HD. La lampe témoin de la caméra s’allume lorsque la caméra iSight
est en fonctionnement.
Haut-parleurs stéréo intégrés
Permettent d’écouter de la musique, des films, des jeux et d’autres types de données
multimédia.
Batterie
Utilisez le MacBook en puisant l’énergie de la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. En retirant la batterie, vous pouvez avoir accès à la mémoire
du MacBook.
Trackpad et bouton du trackpad
Permet de déplacer le pointeur à l’écran avec l’index ; inclut également une fonction de
défilement en utilisant deux doigts sur le trackpad. Appuyez légèrement sur le trackpad
pour cliquer ou double-cliquer sur une sélection.24 Chapitre 2 Votre MacBook au quotidien
Lampe témoin de suspension d’activité
Une lumière blanche clignote lorsque le MacBook est en suspension d’activité.
Récepteur à infrarouge
Associé à la télécommande Apple Remote, le récepteur à infrarouge intégré vous permet
de contrôler, jusqu’à une distance de 9 mètres, les applications Front Row et Keynote s’exé-
cutant sur le MacBook.
Lecteur de disque optique à chargement par fente
Le lecteur optique peut lire des CD et DVD de taille standard et écrire sur des CD. Si vous
disposez d’un lecteur SuperDrive, vous pouvez également écrire sur des disques DVD.
® Bouton d’alimentation
Permet d’allumer ou d’éteindre votre MacBook ou d’en suspendre l’activité. Maintenez
ce bouton enfoncé pour redémarrer le MacBook lors des procédures de dépannage.Chapitre 2 Votre MacBook au quotidien 25
Fonctionnalités du clavier de votre MacBook
esc
num
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12
lock
— i
C
-
Touche
de fonction (Fn)
Touches de
réglage du
volume
Touches de
réglage de la
luminosité
Touche de
verrouillage
numérique
Touche
d’éjection
de disques
Touche
Silence
Touches de
fonction
standard
Touche de bascule
du mode vidéo26 Chapitre 2 Votre MacBook au quotidien
Touche de fonction (Fn)
Maintenez cette touche enfoncée pour activer les actions personnalisées affectées aux
touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches de
fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez « touches
de fonction ».
F1, F2 (touches de réglage de la luminosité)
Permettent d’augmenter ( ) ou de diminuer ( ) la luminosité de l’écran de votre MacBook.
— F3 (touche silence)
Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie casque.
- F4, F5 (touches de réglage du volume)
Permettent d’augmenter (-) ou de diminuer (–) le volume du son provenant des
haut-parleurs intégrés et du port de sortie casque.
F6 (touche verrouillage numérique)
Permet d’activer et de désactiver le pavé numérique intégré au clavier du MacBook.
Lorsque le pavé numérique est activé, une lumière verte brille sur la touche de verrouillage numérique.
i F7 (touche de bascule du mode vidéo)
Permet de passer du mode double-écran (affichage de votre bureau en mode étendu,
à la fois sur l’écran intégré et sur un écran externe) au mode de recopie vidéo (affichage
des mêmes informations sur les deux écrans), et vice versa.
F11, F12 (touches Exposé et Dashboard)
Par défaut, la touche F11 ouvre Exposé et la touche F12 ouvre Dashboard.
C Touche d’éjection de disque
Maintenez cette touche enfoncée pour éjecter un disque. Il est également possible
d’éjecter un disque en faisant glisser son icône dans la Corbeille.Chapitre 2 Votre MacBook au quotidien 27
Ports présents sur votre MacBook
¯
Port Ethernet
Gigabit (10/100/
1000 Base-T)
G
Logement
de sécurité
Port de sortie
casque/audio
numérique
optique
f
Port d’entrée
de ligne audio/
audio numérique
optique
,
Port
Mini-DVI
£ Port
FireWire
400
H Ports
USB 2.0
Port d
d’adaptateur
secteur
MagSafe28 Chapitre 2 Votre MacBook au quotidien
¯ Port d’adaptateur secteur MagSafe
Branchez-y l’adaptateur secteur MagSafe 60 W (inclus) pour recharger la batterie
du MacBook.
G Port Ethernet Gigabit (10/100/1000 Base-T)
Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou
encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques
Ethernet sans avoir besoin de câble croisé Ethernet.
£ Port Mini-DVI (sortie vidéo)
Permet de brancher un moniteur externe, un projecteur ou un téléviseur équipé d’un
connecteur DVI, VGA, composite ou S-vidéo. Selon le type de périphérique externe
auquel vous connectez votre ordinateur, utilisez un adaptateur Mini-DVI vers DVI,
Mini-DVI vers VGA ou Mini-DVI vers Vidéo, tous vendus séparément à l’adresse
www.apple.com/fr/store.
H Port FireWire 400
Permettent de brancher sur l’ordinateur des périphériques externes à haute vitesse tels
que des caméras vidéo numériques et des périphériques de stockage.
d Deux ports USB (Universal Serial Bus) 2.0
Grâce à ses ports, vous pouvez brancher sur le MacBook un modem, un iPod, une souris, un
clavier, une imprimante, un lecteur de disques, un appareil photo numérique, une manette
de jeu et plus encore. Vous pouvez également y brancher des périphériques USB 1.1.
, Port d’entrée de ligne audio/audio numérique optique
Permet de connecter un micro ou un appareil audio numérique à votre MacBook.
f Port de sortie casque/audio numérique optique
Il permet de connecter des haut-parleurs externes, un casque ou des appareils audio
numériques.
Logement de sécurité
Fixez-y un verrou et un câble antivol (disponibles sur le site www.apple.com/fr/store).Chapitre 2 Votre MacBook au quotidien 29
Utilisation de la batterie du MacBook
Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook est alimenté par sa
batterie. L’autonomie du MacBook varie en fonction des applications utilisées et des
périphériques externes qui y sont connectés. La désactivation de fonctions sans fil telles qu’AirPort Extreme ou Bluetooth®
contribue à économiser l’énergie de votre batterie.
Si votre batterie faiblit pendant que vous travaillez, branchez l’adaptateur secteur et
laissez la batterie se recharger. Pour remplacer une batterie presque déchargée par une
batterie chargée lorsque votre ordinateur n’est pas connecté à un adaptateur secteur,
éteignez l’ordinateur.
Pour connaître le niveau de charge de votre batterie, vous pouvez observer les lampes
témoins de niveau de charge dont elle est dotée. Appuyez sur le bouton situé en
regard des témoins lumineux afin que ces derniers brillent brièvement pour indiquer
le niveau de charge de la batterie. Vous pouvez vérifier le niveau de charge, que la
batterie soit ou non insérée dans votre MacBook.
Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun
témoin n’est allumé, c’est que la batterie est complètement vide et que le MacBook ne
pourra démarrer sans l’adaptateur secteur. Branchez l’adaptateur secteur et laissez la
batterie se recharger ou remplacez la batterie à plat par une batterie complètement
rechargée (voir « Retrait de la batterie » à la page 37).30 Chapitre 2 Votre MacBook au quotidien
Vous pouvez également connaître la charge actuelle de la batterie en observant l’icône
d’état de la batterie ( ) située dans la barre des menus. Le niveau affiché dépend de
la quantité d’énergie restant dans la batterie, mais aussi des applications et des périphériques en cours d’utilisation, ainsi que des réglages actuels de votre système. Pour
disposer de plus d’énergie, fermez des applications, déconnectez les périphériques non
utilisés et réglez la fonction d’Économiseur d’énergie. Pour en savoir plus sur l’économie de la batterie et obtenir des astuces pour améliorer ses performances, rendez-vous
à l’adresse www.apple.com/fr/batteries/notebooks.html.
Batterie
Témoins LED
de la batterie
Bouton
¥
ÁChapitre 2 Votre MacBook au quotidien 31
Recharge de la batterie
Lorsque l’adaptateur secteur fourni avec le MacBook est connecté, la batterie se recharge,
que l’ordinateur soit éteint, allumé ou en mode de suspension d’activité. La recharge sera
toutefois plus rapide si l’ordinateur est éteint ou en mode de suspension d’activité.
Comment obtenir des réponses à vos doutes
De plus amples informations sur l’utilisation de votre sont disponibles dans l’Aide Mac
et sur Internet, à l’adresse www.apple.com/fr/support/macbook.
Pour faire apparaître l’Aide Mac :
1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran).
2 Choisissez Aide > Aide Mac (cliquez sur le menu Aide dans la barre des menus puis
sélectionnez Aide Mac).
3 Cliquez dans le champ de recherche, tapez votre question et appuyez sur la touche
Retour du clavier.32 Chapitre 2 Votre MacBook au quotidien
Informations supplémentaires
Pour en savoir plus sur l’utilisation de votre MacBook, consultez le tableau suivant :
Pour obtenir des
informations sur : Effectuez l’opération suivante :
L’installation de mémoire Consultez le chapitre 3, « Augmentez votre mémoire », à la
page 35.
Le dépannage de votre
MacBook en cas de problème
Consultez le chapitre 4, « À tout problème sa solution », à la
page 45.
L’obtention de services et
d’une assistance pour votre
MacBook
Consultez la section « Informations, services et assistance » à la
page 58. Sinon, consultez le site web de support Apple à
l’adresse www.apple.com/fr/support/macbook.
L’utilisation de Mac OS X Le site web de Mac OS X à l’adresse
www.apple.com/fr/macosx/overview. Vous pouvez également
consulter le document intitulé « Bienvenue dans Tiger », disponible dans le dossier /Bibliothèque/Documentation/User Guides
And Information de votre disque dur, ou encore rechercher
« Mac OS X » dans l’Aide Mac.
La migration depuis un PC
vers un Mac
Consultez l’article « How To Move To Mac » (Comment passer au
Mac) à l’adresse www.apple.com/fr/macosx/switch. Vous pouvez
également cliquer sur le lien « Passage de Windows à Mac », qui
se trouve dans la rubrique « Problèmes fréquemment rencontrés par les utilisateurs » de la page d’accueil de l’Aide Mac.
L’utilisation des applications
iLife
Visitez le site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous
pouvez aussi ouvrir une application iLife, puis ouvrir l’Aide de
l’application et saisir une question dans le champ de recherche.Chapitre 2 Votre MacBook au quotidien 33
La modification des
Préférences Système
Ouvrez Préférences Système en choisissant le menu Pomme (K) >
Préférences Système. Vous pouvez également rechercher
« préférences système » dans l’Aide Mac.
L’utilisation de votre trackpad Recherchez « trackpad » dans l’Aide Mac ou bien ouvrez
Préférences Système, cliquez sur Clavier et souris, puis sur Trackpad.
L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide Mac.
L’utilisation de la technologie
sans fil AirPort Extreme
Visitez la page web d’assistance AirPort à l’adresse
www.apple.com/fr/support/airport. Vous pouvez également
ouvrir l’Aide AirPort en cliquant sur le bouton d’accueil (situé en
haut de la page de l’Aide Mac) et en le maintenant enfoncé, puis
en sélectionnant Aide AirPort dans la liste.
L’utilisation de la technologie
sans fil Bluetooth
Visitez la page web d’assistance Bluetooth à l’adresse
www.apple.com/fr/support/bluetooth. Vous pouvez aussi ouvrir
l’utilitaire Échange de fichiers Bluetooth (dans le dossier Utilitaires
du dossier Applications) et sélectionner Aide > Aide Bluetooth.
L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac.
La connexion d’une imprimante Recherchez « impression » dans l’Aide Mac.
Les connexions FireWire et USB Recherchez « USB » ou « FireWire » dans l’Aide Mac.
La connexion à Internet Recherchez « Internet » dans l’Aide Mac.
La connexion d’un moniteur
externe
Recherchez « port de moniteur » dans l’Aide Mac.
La télécommande
Apple Remote
Recherchez « télécommande » dans l’Aide Mac.
Front Row Recherchez « Front Row » dans l’Aide Mac.
Pour obtenir des
informations sur : Effectuez l’opération suivante :34 Chapitre 2 Votre MacBook au quotidien
La gravure d’un CD ou DVD Recherchez « graver un disque » dans l’Aide Mac.
Les caractéristiques Visitez la page web concernant les caractéristiques, à l’adresse
www.apple.com/fr/support/specs. Vous pouvez également ouvrir
Informations Système en choisissant le menu Pomme (K) >
« À propos de ce Mac » dans la barre des menus, puis en cliquant
sur Plus d’infos.
Pour obtenir des
informations sur : Effectuez l’opération suivante :3
3Augmentez votre mémoire
mémoire RAM
www.apple.com/fr/store
Aide Mac36 Chapitre 3 Augmentez votre mémoire
Ce chapitre fournit des informations et des instructions pour installer de la mémoire
supplémentaire et pour retirer et remettre en place la batterie de votre MacBook.
Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez accéder
en retirant sa batterie. Votre MacBook est fourni avec un minimum de 1 gigaoctet (Go)
de mémoire DDR2 (Double Data Rate) SDRAM (Synchronous Dynamic Random-Access
Memory) à 667 MHz. Les deux logements de mémoire peuvent accueillir un module
SDRAM conforme aux spécifications suivantes :
 format DDR2 SO-DIMM (Double Data Rate Small Outline Dual Inline Memory Module) ;
 taille inférieure à 3,8 cm ;
 512 Mo ou 1 Go ;
 à 200 broches ;
 mémoire RAM de type PC2-5300 DDR2 à 667 MHz.
Pour obtenir des performances optimales, ne laissez aucun des deux logements vides
et installez-y des modules de mémoire identiques.
AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un
technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance
qui accompagnent votre ordinateur pour savoir comment contacter Apple. Tout dommage causé à votre matériel en tentant d’installer vous-même de la mémoire n’est
pas couvert par la garantie limitée de votre ordinateur.Chapitre 3 Augmentez votre mémoire 37
Installation de mémoire supplémentaire
Pour installer de la mémoire, il faut enlever la batterie puis la remettre en place. La procédure suivante inclut des instructions sur le retrait de la batterie, l’ajout de mémoire et
la remise en place de la batterie.
Étape 1 : Retrait de la batterie
1 Éteignez le MacBook. Débranchez l’adaptateur secteur, le câble Ethernet et tous les
autres câbles connectés au MacBook afin d’éviter toute détérioration de ce dernier.
AVERTISSEMENT : soyez prudent lorsque vous manipulez la batterie. Consultez
les informations de sécurité sur la batterie à la page 64.38 Chapitre 3 Augmentez votre mémoire
2 Retournez le MacBook et repérez l’emplacement du verrou de la batterie. Utilisez une
pièce de monnaie pour faire tourner le verrou d’un quart de tour vers la droite afin de
débloquer la batterie, puis retirez cette dernière avec précaution.
AVERTISSEMENT : les composants internes de votre MacBook risquent d’être chauds.
Si vous venez d’utiliser votre MacBook, attendez 10 minutes après l’extinction afin de
laisser aux composants internes le temps de se refroidir.
¥
Á
¥
ÁChapitre 3 Augmentez votre mémoire 39
Étape 2 : Installation de la mémoire
1 Desserrez les trois vis imperdables maintenant le support en L, tirez sur la barre la plus
longue pour retirer le support et écartez celui-ci.
Les leviers situés dans les logements de mémoire se soulèvent automatiquement lorsque vous retirez le support.
2 Touchez la surface métallique de l’intérieur de l’ordinateur afin de décharger toute
électricité statique que vous pouvez avoir emmagasinée.
Desserrez les trois vis
Tirez sur cette barre
¥
Á40 Chapitre 3 Augmentez votre mémoire
3 Pour retirer un module de mémoire placé dans un logement, poussez le levier vers la
gauche d’un mouvement rapide, ce qui fait apparaître le bord du module de mémoire.
Retirez le module de mémoire. Répétez l’opération avec l’autre module de mémoire.
Leviers
¥
ÁChapitre 3 Augmentez votre mémoire 41
4 Insérez les nouveaux modules de mémoire dans les logements :
a Commencez par insérer le bord doré, avec l’encoche sur le côté gauche.
b Poussez fermement avec deux doigts sur les modules de mémoire pour les mettre
en place. Vous devriez entendre un clic lorsque la mémoire s’enclenche.
Remarque : il est possible qu’une sorte de lubrifiant soit présent sur le nouveau
module de mémoire afin de faciliter le processus d’insertion. Ceci est normal et
vous ne devez pas essuyer ou nettoyer le module pour tenter de l’éliminer.
c Si les leviers ne reviennent pas en position fermée, déplacez-les vers la droite pour
les fermer.
Encoches
¥
Á42 Chapitre 3 Augmentez votre mémoire
5 Replacez le support en L en insérant d’abord le bras le plus court, puis resserrez les vis.
Insérez Resserrez les trois vis
d’abord
¥
ÁChapitre 3 Augmentez votre mémoire 43
Étape 3 : Remise en place de la batterie
1 Placez le bord droit de la batterie dans son compartiment, puis appuyez doucement
sur le bord gauche pour la mettre en place. Utilisez une pièce de monnaie pour faire
tourner le verrou d’un quart de tour vers la gauche afin d’immobiliser la batterie.
2 Reconnectez l’adaptateur secteur et tout autre câble connecté auparavant à l’ordinateur.
¥
Á
¥
Á44 Chapitre 3 Augmentez votre mémoire
Vérification de la reconnaissance de la nouvelle mémoire
par votre MacBook
Après avoir ajouté de la mémoire au MacBook, vérifiez si elle est reconnue.
Pour vérifier la mémoire de votre ordinateur :
1 Démarrez votre MacBook.
2 Lorsque le bureau Mac OS X s’affiche, choisissez le menu Pomme () > À propos
de ce Mac.
Pour plus de détails sur la mémoire installée sur votre ordinateur, ouvrez
Informations Système en cliquant sur Plus d’infos puis sur Mémoire.
Si le MacBook ne reconnaît pas la mémoire ou ne démarre pas correctement, vérifiez
que la mémoire est compatible avec le MacBook et qu’elle est correctement installée.4
4À tout problème sa solution
www.apple.com/fr/support
Aide Mac aide46 Chapitre 4 À tout problème sa solution
Il se peut que vous rencontriez à titre exceptionnel des problèmes en utilisant le
MacBook . Lisez ce chapitre pour trouver des idées de solution qui vous aideront à
régler vos problèmes. Vous trouverez aussi des informations supplémentaires concernant le dépannage dans l’Aide Mac et sur le site web d’assistance consacré au MacBook,
à l’adresse www.apple.com/fr/support/macbook.
Il existe généralement une solution simple et rapide aux problèmes qui peuvent survenir
au cours de l’utilisation de votre MacBook. Réfléchissez aux conditions qui ont entraîné
l’apparition de ce problème. Ce récapitulatif de la totalité des opérations effectuées avant
que le problème ne survienne permet de restreindre les causes possibles et de trouver la
solution. Les éléments à noter comprennent :
 les applications que vous étiez en train d’utiliser quand le problème est apparu ;
les problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer que cette application n’est pas compatible avec la version de Mac OS installée
sur votre ordinateur ;
 les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre
dossier Système ;
 tout composant matériel installé (mémoire supplémentaire ou périphérique,
par exemple).
Problèmes vous empêchant d’utiliser votre MacBook
Si votre MacBook ne répond plus ou que le pointeur se fige
Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Mac OS X permet
de quitter une application figée sans redémarrer votre ordinateur. Vous pouvez ainsi
enregistrer le travail effectué dans d’autres applications ouvertes.Chapitre 4 À tout problème sa solution 47
Pour forcer une application à se fermer :
1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu
Pomme () > Forcer à quitter dans la barre des menus.
La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application
est sélectionnée.
2 Cliquez sur Forcer à quitter.
L’application se ferme, en laissant toutes les autres applications ouvertes.
Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone
de dialogue.
Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez l’ordinateur afin de vous assurer que le problème est entièrement réglé.
Si vous ne parvenez pas à forcer la fermeture d’une application, maintenez enfoncé
le bouton d’alimentation (®) durant quelques secondes pour éteindre l’ordinateur.
Attendez 10 secondes puis allumez l’ordinateur.
Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des
menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en
cas de blocage de l’ordinateur ou s’il ne répond pas.
Si le problème ne survient que lorsque vous utilisez une application particulière, vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir
des informations de contact et une assistance relatifs aux logiciels fournis avec votre
MacBook, rendez-vous à l’adresse www.apple.com/fr/guide.48 Chapitre 4 À tout problème sa solution
Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le
logiciel système de votre ordinateur. Consultez « Réinstallation des logiciels fournis
avec votre MacBook » à la page 56.
Si le MacBook se bloque au démarrage, si un point d’interrogation clignotant apparaît ou si l’écran est éteint et que la lampe témoin de suspension d’activité reste
allumée (pas en mode de suspension d’activité)
Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient
pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe
relié à l’ordinateur.
 Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le
en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes.
Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur
en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option
enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis
sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système
et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.
 Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire
de disque :
 Insérez le CD « Mac OS X Install Disc 1 » dans votre ordinateur.
 Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors
du démarrage.
 Choisissez Installation > Ouvrir Utilitaire de disque. Lorsque Utilitaire de disque
s’ouvre, suivez les instructions de la sous-fenêtre S.O.S pour savoir s’il est en
mesure de réparer le disque.Chapitre 4 À tout problème sa solution 49
Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller
le logiciel système de votre ordinateur. Consultez « Réinstallation des logiciels fournis
avec votre MacBook » à la page 56.
Si votre MacBook ne s’allume ou ne démarre pas
Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :
 Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une
prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe
60 W fourni avec le MacBook. Si l’adaptateur secteur ne recharge plus l’ordinateur et
que la lampe témoin de l’adaptateur secteur ne s’allume pas lorsque vous branchez
le câble d’alimentation, essayez de le débrancher puis de le brancher à nouveau afin
de le positionner correctement.
 Vérifiez si votre batterie a besoin d’être rechargée. Appuyez sur le petit bouton situé
sur la batterie. Vous devriez voir apparaître un à quatre voyants indiquant le niveau
de charge de la batterie. Si une seule lampe témoin de niveau de la batterie clignote,
branchez l’adaptateur secteur pour charger la batterie jusqu’à ce qu’au moins cette
lampe témoin reste allumée en permanence.
 Si le problème persiste, rétablissez les réglages par défaut de l’ordinateur en débranchant l’adaptateur secteur, en retirant la batterie et en maintenant le bouton d’alimentation (®) enfoncé pendant au moins 5 secondes.
 Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement
installée et compatible avec votre ordinateur. Vérifiez si le retrait de cette mémoire et
la remise en place de l’ancienne permet à l’ordinateur de démarrer (consultez la section « Installation de la mémoire » à la page 39). 50 Chapitre 4 À tout problème sa solution
 Pour réinitialiser la PRAM, appuyez sur le bouton d’alimentation (®) et maintenez
immédiatement les touches Commande (x), Option, P et R enfoncées jusqu’à ce
que vous entendiez une deuxième fois le signal sonore de démarrage.
 Si vous ne parvenez toujours pas à démarrer le MacBook, consultez la section
« Informations, services et assistance » à la page 58 qui contient les informations
nécessaires pour prendre contact avec Apple.
Si l’écran devient subitement noir ou que votre MacBook se bloque
Essayez de redémarrer votre MacBook.
1 Débranchez tout périphérique connecté à votre MacBook excepté l’adaptateur secteur.
2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système.
3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant la connexion d’un périphérique et la reprise du travail.
Pour vérifier le niveau de charge de la batterie, observez l’icône d’état de la batterie
( ) située dans la barre des menus.
Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie de
la batterie sont en place.
Si vous avez oublié votre mot de passe
Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe
de tous les autres comptes.
1 Insérez le CD « Mac OS X Install Disc 1 ». Redémarrez ensuite votre ordinateur et maintenez la touche C enfoncée pendant le démarrage.
2 Dans la barre des menus, choisissez Utilitaires > Réinitialiser le mot de passe. Suivez
les instructions à l’écran.Chapitre 4 À tout problème sa solution 51
En cas de problème à l’éjection d’un disque
 Fermez toutes les applications susceptibles d’utiliser le disque et essayez à nouveau.
 Si cela ne donne pas de résultats, redémarrez l’ordinateur tout en maintenant le bouton du trackpad enfoncé.
Utilisation d’Apple Hardware Test
Si vous pensez qu’il y a un problème avec les composants matériels du MacBook, vous
pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas (les composants affectés peuvent être la mémoire ou le processeur, par exemple).
Pour utiliser Apple Hardware Test :
1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur
secteur. Si un câble Ethernet est connecté, déconnectez-le.
2 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur.
3 Redémarrez ensuite votre ordinateur en maintenant la touche D enfoncée lors du
démarrage.
4 Lorsque l’écran principal d’Apple Hardware Test s’affiche, suivez les instructions à l’écran.
5 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur.
Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si
Apple Hardware Test ne détecte pas de panne matérielle, il est probable que le
problème soit lié aux logiciels.
Pour en savoir plus sur Apple Hardware Test, consultez le fichier « À propos d’AHT »
sur le disque « Mac OS X Install Disc 1 ».52 Chapitre 4 À tout problème sa solution
Problèmes de connexion à Internet
Le MacBook est équipé de l’application Assistant réglages, destinée à vous aider à configurer une connexion à Internet. Ouvrez Préférences Système, puis cliquez sur Réseau.
Cliquez sur le bouton « Assistant » pour ouvrir Assistant réglages de réseau.
En cas de problèmes avec votre connexion à Internet, vous pouvez essayer les méthodes
proposées dans cette rubrique en commençant par Diagnostic réseau.
Pour utiliser Diagnostic réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau puis cliquez sur « Assistant ».
3 Cliquez sur Diagnostic pour lancer Diagnostic réseau.
4 Suivez les instructions à l’écran.
Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe
peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous
connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès à
Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter
de réaliser les opérations suivantes.
Connexions à Internet par modem câble, ligne DSL et réseau local (LAN)
Assurez-vous que tous les câbles du modem sont correctement branchés. Vérifiez le
câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et celui reliant
le modem à la prise secteur. Vérifiez également les câbles et les sources d’alimentation
de vos routeurs et concentrateurs Ethernet. Chapitre 4 À tout problème sa solution 53
Éteignez, puis rallumez le modem afin de réinitialiser le matériel du modem.
Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains
fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation du
modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem.
Important : les instructions relatives aux modems ne concernent pas les utilisateurs de
réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de
réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs
de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI.
Connexions PPPoE
Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via
PPPoE, assurez-vous que les informations que vous avez saisies dans les préférences
Réseau sont correctes.
Pour vérifier les réglages des Préférences Réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau.
3 Dans le menu local Afficher, sélectionnez Configurations de ports réseau.
4 Sélectionnez Ethernet intégré, puis faites glisser cette configuration en haut
de la liste des configurations de ports.
5 Dans le menu local Afficher, sélectionnez Ethernet intégré.
6 Cliquez sur PPPoE.
7 Sélectionnez Se connecter via PPPoE.54 Chapitre 4 À tout problème sa solution
8 Vérifiez le champ Nom de compte pour vous assurer que vous avez correctement
saisi les informations fournies par votre fournisseur d’accès à Internet.
9 Si vous avez choisi d’enregistrer votre mot de passe, tapez-le à nouveau afin d’être
sûr qu’il est correct.
10 Cliquez sur TCP/IP. Assurez-vous d’avoir saisi dans cette sous-fenêtre les informations
correctes fournies par votre fournisseur d’accès à Internet.
11 Cliquez sur Appliquer.
Connexions au réseau
Assurez-vous que le câble Ethernet est branché sur le MacBook et sur le réseau.
Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet.
Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre FAI
fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur.
Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de masquage
d’adresses IP. Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre réseau.
Vous pouvez utiliser une borne d’accès AirPort pour partager une adresse IP unique
entre plusieurs ordinateurs. Pour obtenir plus d’informations sur l’utilisation d’une borne
d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web AirPort d’Apple, à
l’adresse www.apple.com/fr/support/airport.
Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés, adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau.Chapitre 4 À tout problème sa solution 55
Problèmes de communication sans fil avec AirPort Extreme
En cas de problèmes avec les communications sans fil AirPort Extreme :
 Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé
et dispose d’un point d’accès sans fil.
 Assurez-vous que le logiciel est correctement configuré conformément aux instructions incluses avec votre borne d’accès ou point d‘accès.
 Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la
zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou
des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.
 Vérifiez le menu d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres
de mesure apparaissent pour afficher la puissance du signal. Si l’intensité du signal
est faible, tentez de déplacer l’appareil.
 Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis
Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions fournies avec votre appareil sans fil.56 Chapitre 4 À tout problème sa solution
Maintien à jour de vos logiciels
Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les
dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple.
Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte les
serveurs Internet d’Apple pour rechercher les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer le MacBook afin qu’il lance régulièrement des recherches sur
les serveurs Apple, puis qu’il télécharge et installe les mises à jour de logiciels trouvées.
Pour rechercher des logiciels mis à jour :
1 Ouvrez les Préférences Système.
2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.
 Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.
 Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse
www.apple.com/fr/macosx.
Réinstallation des logiciels fournis avec votre MacBook
Les disques d’installation de logiciels fournis avec votre ordinateur permettent de réinstaller Mac OS X et les applications livrées avec votre ordinateur.
Important : Apple vous recommande de sauvegarder les données de votre disque dur
avant de procéder à la restauration du logiciel. Apple décline toute responsabilité en
cas de perte de données.Chapitre 4 À tout problème sa solution 57
Installation de Mac OS X et des applications
Pour installer Mac OS X et les applications qui accompagnent votre ordinateur :
1 Sauvegardez vos fichiers essentiels.
Nous vous conseillons de sauvegarder vos fichiers essentiels avant d’installer Mac OS X
et d’autres applications car l’option Effacer et installer efface les données du disque dur.
2 Assurez-vous que l’adaptateur secteur est correctement branché.
3 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur.
4 Double-cliquez sur « Install Mac OS X and Bundled Software ». Pour n’installer que les applications fournies avec l’ordinateur, double-cliquez sur « Install Bundled Software Only ».
Remarque : pour installer iCal, iChat AV, iSync, iTunes, Safari et les applications iLife,
double-cliquez sur « Install Mac OS X and Bundled Software ».
5 Suivez les instructions à l’écran.
6 Après avoir sélectionné le volume de destination pour l’installation, suivez les instructions
à l’écran. Il se peut que votre ordinateur redémarre et vous invite à insérer le disque d’installation Mac OS X suivant.
Remarque : pour rétablir les réglages d’origine de Mac OS X sur votre ordinateur, cliquez sur Options dans la fenêtre « Sélectionner une destination » du programme d’installation, puis choisissez Effacer et installer. 58 Chapitre 4 À tout problème sa solution
Informations, services et assistance
L’utilisateur ne peut remplacer aucune pièce du MacBook, excepté la mémoire. Si vous
avez besoin de services de réparation, adressez-vous à Apple ou portez votre MacBook
chez un fournisseur de services agréé Apple. Vous trouverez de plus amples informations sur le MacBook en ligne, dans l’aide à l’écran, dans Informations Système et via
Apple Hardware Test.
Informations en ligne
Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur
www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire
des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de
discussion Apple.
Aide à l’écran
Vous trouverez bien souvent des réponses à vos questions ainsi que des instructions et
des informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac.
Informations Système
Pour obtenir des informations sur le MacBook, servez-vous d’Informations Système.
Cette application vous fournit la liste des composants matériels et des logiciels installés, le numéro de série et de version du système d’exploitation, la quantité de mémoire
installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () >
« À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos.Chapitre 4 À tout problème sa solution 59
Service et assistance AppleCare
Le MacBook est fourni avec 90 jours d’assistance technique et 1 an de couverture sur les,
réparations de matériel effectuées dans les magasins Apple Store ou les centres de réparations agréés Apple, tels que les fournisseurs de services agréés Apple. Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un programme AppleCare
Protection Plan. Pour en savoir plus, rendez-vous sur www.apple.com/fr/support/products
ou bien visitez le site web de votre pays (dans la liste ci-dessous).
Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare
peut vous aider à installer et à ouvrir les applications et offre des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit
pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre
MacBook à portée de main lorsque vous appelez.
Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date
d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer.
Pays Téléphone Site web
Allemagne (49) 01805 009 433 www.apple.com/de/support
Autriche (43) 0810 300 427 www.apple.com/at/support
Belgique (flamand)
(français)
(32) 070 700 772
(32) 070 700 773
www.apple.com/benl/support
www.apple.com/befr/support
France (33) 0825 888 024 www.apple.com/fr/support
Luxembourg (352) 800 24550 www.apple.com/befr/support
Suisse (français)
(allemand)
(41) 0848 000 132
(41) 0848 000 132
www.apple.com/chfr/support
www.apple.com/chde/support60 Chapitre 4 À tout problème sa solution
Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques
locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet.
Localisation du numéro de série de votre produit
Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre ordinateur :
 Choisissez Apple () > À propos de ce Mac puis cliquez sur le numéro de version,
en dessous des mots « Mac OS X ». Cliquez à cet endroit de façon répétitive pour
afficher l’un après l’autre la version de Mac OS X, le numéro de sous-version et le
numéro de série.
 Ouvrez Informations Système (dans /Applications/Utilitaires/), et cliquez sur Matériel.
 Retirez la batterie. Le numéro de série de votre MacBook se trouve dans la baie de la
batterie. Pour en savoir plus sur l’extraction de la batterie, consultez la section page 37 .
www.apple.com/contact/phone_contacts.html www.apple.com/contact/phone_contacts.html5
5Dernières recommandations
www.apple.com/fr/environment
Aide Mac ergonomie62 Chapitre 5 Dernières recommandations
Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces consignes concernant le nettoyage et la manipulation de votre MacBook ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un endroit
facile d’accès pour vous et pour les utilisateurs éventuels.
Informations importantes concernant la sécurité
Utilisation près de l’eau et dans des endroits humides Évitez de placer votre ordinateur à proximité d’un évier, d’un lavabo, d’une baignoire ou d’une douche, par exemple. Protégez votre ordinateur de l’humidité et des intempéries (neige, pluie, brouillard
par exemple).
Manipulation du MacBook Installez le MacBook sur un plan de travail stable qui laisse
convenablement circuler l’air sous l’ordinateur et autour de celui-ci. N’utilisez pas le
MacBook en le posant sur un coussin ou tout autre objet de structure non solide car cela
pourrait empêcher les conduits d’aération de fonctionner correctement. Évitez également de placer des objets sur le clavier lorsque vous utilisez l’ordinateur. N’introduisez
jamais d’objets d’aucune sorte dans les ouvertures servant à la ventilation.
La partie inférieure du MacBook peut chauffer au cours d’une utilisation normale de
l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il émane vous gêne, posezle plutôt sur un plan de travail stable.
AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner des décharges électriques ou entraîner tout type de blessure ou dommage.Chapitre 5 Dernières recommandations 63
Utilisation de l’adaptateur secteur MagSafe 60 W Veillez à ce que la fiche secteur ou
le câble d’alimentation secteur soit totalement inséré dans l’adaptateur secteur avant de
le brancher sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne le MacBook ou, au besoin, un adaptateur secteur agréé Apple compatible avec ce
produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant ou
posez-le par terre, dans un endroit correctement aéré.
Débranchez l’adaptateur secteur, retirez la batterie et débranchez tous les autres câbles
si l’un des cas suivants se présente :
 Vous souhaitez ajouter de la mémoire.
 Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions
fournies à la page 66).
 La prise ou le câble d’alimentation est endommagé.
 Le MacBook ou l’adaptateur secteur est exposé à la pluie ou à une humidité excessive, ou du liquide a été versé dans le boîtier.
 Le MacBook ou l’adaptateur secteur a subi une chute, le boîtier a été endommagé
ou vous pensez qu’une réparation est nécessaire.
Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte
de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de
matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment
ou autres) à moins de 25 mm de ce port.
Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les doucement à l’aide d’un bâtonnet de coton.64 Chapitre 5 Dernières recommandations
Manipulation de la batterie Évitez de la faire tomber, de la démonter, de l’écraser, de
la brûler ou de l’exposer à des températures supérieures à 100° C. N’utilisez plus la batterie si elle est endommagée de quelque façon que ce soit. Ne remplacez la batterie
que par une batterie certifiée par Apple pour ce produit. Éliminez rapidement les batteries usagées conformément aux directives d’environnement locales en vigueur.
Prévention de la diminution de l’acuité auditive Vous risquez une perte d’audition
irréparable si vous utilisez un casque ou des écouteurs à volume sonore élevé. L’oreille
peut s’adapter petit à petit à des volumes sonores de plus en plus élevés qui peuvent
sembler normaux, mais qui risquent à la longue d’endommager votre système auditif.
En cas de sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les
écouteurs et consultez un médecin. Plus le volume est élevé, plus votre audition risque
d’être affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent de prendre les mesures suivantes :
 Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque
d’écoute.
 Évitez d’augmenter le volume afin de bloquer les bruits environnants.
 Baissez le volume si vous ne parvenez pas à entendre une personne qui parle
à côté de vous.
Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle
du trafic aérien, ni dans aucune autre situation où une panne du système informatique
pourrait entraîner la mort, des blessures ou de graves dommages écologiques.Chapitre 5 Dernières recommandations 65
Informations concernant le laser pour lecteurs optiques
Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux s’il
est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un
fournisseur de services agréé Apple.
Informations importantes sur la manipulation
Mise sous tension de votre MacBook N’allumez jamais le MacBook tant que tous ses
composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur alors
que certains composants manquent peut s’avérer dangereuse et risque de l’endommager.
Transport du MacBook Si vous transportez le MacBook dans un sac ou dans un attaché-
case, assurez-vous que ce dernier ne contient pas d’objets non attachés (des trombones
ou des pièces de monnaie, par exemple) qui pourraient pénétrer accidentellement dans
l’ordinateur par une ouverture (comme la fente du lecteur optique) ou se coincer à l’inté-
rieur d’un port. Maintenez également à l’écart du port secteur MagSafe tout objet à sensibilité magnétique.
AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui
ne sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à
des rayonnements dangereux.
AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer
des dommages à votre MacBook ou à d’autres objets.66 Chapitre 5 Dernières recommandations
Utilisation des connecteurs et des ports Ne forcez jamais un connecteur à entrer dans
un port. Lorsque vous branchez un appareil, assurez-vous que le port ne contient
aucun résidu quelconque, que le connecteur correspond bien au port et qu’il est placé
de manière à entrer correctement dans le port.
Utilisation du lecteur optique Le lecteur optique du MacBook prend en charge les disques de 12 cm. Les disques de forme irrégulière et de moins de 12 cm ne peuvent pas
être lus.
Stockage du MacBook Si vous décidez de ranger le MacBook pendant une longue
période, placez-le dans un endroit frais (idéalement, à 22° C) et déchargez la batterie
jusqu’à 50 pour cent. Avant de ranger votre ordinateur pour une période de temps
supérieure à cinq mois, déchargez la batterie jusqu’à environ 50 pour cent, puis retirezla du MacBook. Pour conserver les capacités de la batterie, rechargez la batterie jusqu’à
50 pour cent tous les six mois environ.
Nettoyage du MacBook Lorsque vous nettoyez le boîtier du MacBook et ses composants, éteignez l’ordinateur, débranchez l’adaptateur secteur et retirez la batterie. Puis,
pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon doux, humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni aérosols, ni dissolvants,
ni abrasifs qui pourraient endommager les finitions de l’appareil.
Nettoyage de l’écran du MacBook Pour nettoyer l’écran du MacBook, éteignez tout
d’abord votre MacBook, débranchez l’adaptateur secteur, puis retirez la batterie. Humidifiez ensuite, à l’eau seulement, un chiffon propre, doux et non pelucheux et essuyez
l’écran. Ne vaporisez jamais de liquide directement sur l’écran.Chapitre 5 Dernières recommandations 67
Ergonomie
Voici quelques conseils pour la mise en place d’un environnement de travail sain.
Clavier et trackpad
Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main
étant placée dans le prolongement du poignet.
Position
à éviter
Position
recommandée68 Chapitre 5 Dernières recommandations
Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou
que vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes.
Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail
continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs
aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste.
Souris externe
Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier.
Ménagez un espace suffisant pour la manipuler avec aisance.
Siège
Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables.
Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale et vos
pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à-dire
la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte que le réglage
du dossier soit parfaitement adapté à votre morphologie.
Position
à éviter
Position
recommandéeChapitre 5 Dernières recommandations 69
Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient
placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus
à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont
le clavier est situé plus bas que le plan de travail.
Écran intégré
Orientez l’écran de manière à réduire le plus possible les reflets de l’éclairage électrique et de la lumière du jour. Ne forcez pas l’écran si vous rencontrez une résistance.
L’angle d’ouverture maximal de l’écran ne peut dépasser 130 degrés.
Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez l’ordinateur ou que l’éclairage ambiant change.
Vous trouverez d’autres informations concernant l’ergonomie sur Internet :
Apple et l’environnement
Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses
produits et de ses activités sur l’environnement.
Des informations supplémentaires sont disponibles sur Internet :
www.apple.com/about/ergonomics
www.apple.com/fr/environment71
Regulatory Compliance Information
FCC Compliance Statement
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2)
this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio or
television reception is suspected.
L‘utilisation de ce dispositif est autorisée seulement
aux conditions suivantes : (1) il ne doit pas produire de
brouillage et (2) l’utilisateur du dispositif doit être prêt
à accepter tout brouillage radioélectrique reçu, même
si ce brouillage est susceptible de compromettre le
fonctionnement du dispositif.
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference to
radio or television reception, try to correct the
interference by using one or more of the following
measures :
 Turn the television or radio antenna until the
interference stops.
 Move the computer to one side or the other of the
television or radio.
 Move the computer farther away from the television or
radio.
 Plug the computer in to an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are on
circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple-authorized service
provider or Apple. See the service and support
information that came with your Apple product. Or,
consult an experienced radio/television technician for
additional suggestions.
Important: changes or modifications to this product not
authorized by Apple Inc., could void the EMC
compliance and negate your authority to operate the
product.
This product has demonstrated EMC compliance under
conditions that included the use of compliant peripheral
devices and shielded cables (including Ethernet network
cables) between system components. It is important
that you use compliant peripheral devices and shielded
cables between system components to reduce the
possibility of causing interference to radios, television
sets, and other electronic devices.72
Responsible party (contact for FCC matters only):
Apple Inc. Product Compliance,
1 Infinite Loop M/S 26-A, Cupertino, CA 95014-2084,
408-974-2000.
Wireless Radio Use
This device is restricted to indoor use when operating in
the 5.15 to 5.25 GHz frequency band.
Cet appareil doit être utilisé à l’intérieur.
Exposure to Radio Frequency Energy
The radiated output power of the AirPort Extreme
technology is below the FCC radio frequency exposure
limits. Nevertheless, it is advised to use the wireless
equipment in such a manner that the potential for
human contact during normal operation is minimized.
FCC Bluetooth Wireless Compliance
The antenna used with this transmitter must not be
collocated or operated in conjunction with any other
antenna or transmitter subject to the conditions of the
FCC Grant.
Bluetooth Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de la Classe B respecte toutes
les exigences du Règlement sur le matériel brouilleur
du Canada.
Industry Canada Statement
Complies with the Canadian ICES-003 Class B
specifications. Cet appareil numérique de la classe B est
conforme à la norme NMB-003 du Canada. This device
complies with RSS 210 of Industry Canada.
Bluetooth Europe—EU Declaration of
Conformity
This wireless device complies with the specifications
EN 300 328, EN 301-489, and EN 60950 following the
provisions of the R&TTE Directive.
Europe : déclaration de conformité EU
The equipment complies with the RF Exposure
Requirement 1999/519/EC, Council Recommendation of
12 July 1999 on the limitation of exposure of the general
public to electromagnetic fields (0 Hz to 300 GHz). This
equipment meets the following conformance standards:
EN300 328, EN301 893, EN301 489-17, EN60950
Par la présente Apple Inc. déclare que l’appareil
802.11a/b/g Mini-PCIe card est conforme aux exigences
essentielles et aux autres dispositions pertinentes de la
directive.
Complies with European Directives
72/23/EEC, 89/336/EEC, 1999/5/EC
See http://www.apple.com/euro/compliance
Korea Statements
Singapore Wireless Certification73
Taiwan Wireless Statements
Taiwan Class B Statement
VCCI Class B Statement
Russia
Informations sur les modems USB
Si vous connectez votre MacBook à une ligne
téléphonique par le biais d’un modem USB externe,
veuillez vous reporter aux informations fournies par
l’agence de télécommunications mentionnées dans
la documentation livrée avec votre modem.
ENERGY STAR®
Compliance
As an ENERGY STAR®
partner, Apple has determined
that standard configurations of this product meet the
ENERGY STAR®
guidelines for energy efficiency. The
ENERGY STAR®
program is a partnership with electronic
equipment manufacturers to promote energy-efficient
products. Reducing energy consumption of products
saves money and helps conserve valuable resources.
This computer is shipped with power management
enabled with the computer set to sleep after 10 minutes
of user inactivity. To wake your computer, click the
mouse or trackpad button or press any key on the
keyboard.
For more information about ENERGY STAR®, visit:
www.energystar.gov74
Informations sur l’élimination et le recyclage
Ce symbole indique que vous devez suivre les normes et
la législation de votre pays pour jeter ce produit. La
lampe de rétro-éclairage de cet appareil contient du
mercure, vous ne pouvez donc pas le mélanger avec les
ordures ménagères. Lorsque ce produit n’est plus
utilisable, contactez Apple ou les autorités locales pour
en savoir plus sur les possibilités de recyclage.
Pour en savoir plus sur le programme
de recyclage d’Apple, consultez le site
www.apple.com/fr/environment/recycling/.
Informations sur l’enlèvement de la batterie
Jetez vos batteries usagées en respectant les lois et les
consignes environnementales de votre pays.
California: The coin cell battery in your product contains
perchlorates. Special handling and disposal may apply.
Refer to www.dtsc.ca.gov/hazardouswaste/perchlorate.
Deutschland: Dieses Gerät enthält Batterien. Bitte nicht
in den Hausmüll werfen. Entsorgen Sie dieses Gerätes
am Ende seines Lebenszyklus entsprechend der
maßgeblichen gesetzlichen Regelungen.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca)
worden gedeponeerd.75
Taïwan:
Union européenne—instructions concernant
l’élimination des déchets :
Le symbole ci-dessus signifie que vous devez vous
débarrasser de votre produit sans le mélanger avec les
ordures ménagères, selon les normes et la législation de
votre pays. Lorsque ce produit n’est plus utilisable, portezle dans un centre de traitement des déchets agréé par les
autorités locales. Certains centres acceptent les produits
gratuitement. Le traitement et le recyclage séparé de
votre produit lors de son élimination aideront à préserver
les ressources naturelles et à protéger l’environnement et
la santé des êtres humains.K Apple Inc.
© 2007 Apple Inc. Tous droits réservés.
En application des lois et conventions en vigueur,
aucune reproduction totale ni partielle du manuel n’est
autorisée, sauf consentement écrit préalable d’Apple.
Tout a été mis en œuvre pour que les informations pré-
sentées dans ce manuel soient exactes. Apple n’est pas
responsable des erreurs de reproduction ou d’impression.
Apple
1 Infinite Loop
Cupertino, CA 95014-2084
408-996-1010
www.apple.com
Apple, le logo Apple, AirPort, AirPort Extreme, Exposé,
FileVault, FireWire, iCal, iLife, iMovie, iPhoto, iPod, iSight,
iTunes, Keynote, Mac, MacBook, Macintosh, Mac OS et
SuperDrive sont des marques d’Apple Inc. déposées
aux États-Unis et dans d’autres pays.
AirPort Express, Finder, le logo FireWire, MagSafe, Safari,
Spotlight et Tiger sont des marques d’Apple Inc.
AppleCare et Apple Store sont des marques de service
d’Apple Inc. déposées aux États-Unis et dans d’autres pays.
iTunes Store est une marque de service d’Apple Inc.
ENERGY STAR® est une marque déposée aux États-Unis.
Intel et Intel Core sont des marques d’Intel Corp. aux
États-Unis et dans d’autres pays.
La marque et les logos Bluetooth® sont la propriété
de Bluetooth SIG, Inc. et sont utilisés sous licence par
Apple Inc.
Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits de
tierce partie ne sont mentionnés que pour information,
sans aucune intention de préconisation ni de recommandation. Apple décline toute responsabilité quant à
l’utilisation et au fonctionnement de ces produits.
Fabriqué sous licence de Dolby Laboratories. « Dolby »,
« Pro Logic » et le logo double-D sont des marques
déposées de Dolby Laboratories. Travaux confidentiels
inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits
réservés.
Le produit décrit dans le présent manuel intègre des
technologies de protection de droits d’auteur ellesmêmes protégées par divers brevets américains ainsi
que d’autres droits de propriété intellectuelle appartenant à Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection des
droits d’auteurs doit être autorisée par Macrovision Corporation et est destinée à un cadre privé ou de visualisation restreinte, sauf consentement de Macrovision
Corporation. Tout démontage ou toute ingénierie
inverse sont interdits.
Réclamations concernant l’appareillage aux États-Unis.
Brevets n˚ 4 631 603, 4 577 216, 4 819 098 et 4 907 093 sous
licence à des fins de visualisation limitée uniquement.
Publié simultanément aux États-Unis et au Canada.
Félicitations, vous et votre MacBook Pro
êtes faits l’un pour l’autre.Finder
Parcourez le contenu
de votre ordinateur
à l’aide de Cover Flow.
www.apple.com/fr/macosx
Aide Mac finder
Caméra iSight intégrée
Réalisez des vidéoconférences avec
3 amis au maximum partout dans
le monde et en temps réel.
www.apple.com/fr/macbookpro
Aide Mac isight
Time Machine
Sauvegardez automatiquement
vos fichiers sur un disque dur
externe.
www.apple.com/fr/macosx
Aide Mac time machineGarageBand
Créez de la musique en ajoutant
des musiciens sur une scène
virtuelle. Améliorez vos chansons
pour jouer comme un pro.
Aide GarageBand enregistrement
iWeb
Créez de magnifiques sites
web avec photos, films, blogs,
podcasts et widgets web
dynamiques.
iPhoto
Organisez toutes vos photos
par événements. Publiez-les
sur une galerie web en
un seul clic.
iMovie
Rassemblez toutes vos vidéos
dans une seule vidéothèque.
Créez et partagez vos films
en quelques minutes.
Aide iMovie film
www.apple.com/fr/ilife/imovie
Aide Help photo
www.apple.com/fr/ilife/iphoto
www.apple.com/fr/ilife/garageband www.apple.com/fr/ilife/iweb
Aide iWeb site webTable des matières 5
Table des matières
Chapitre 1 : Prêt, feu, configurez !
9 Contenu de la boîte
9 Configuration du MacBook Pro
16 Extinction ou suspension d’activité de votre MacBook Pro
Chapitre 2 : Votre MacBook Pro au quotidien
22 Caractéristiques de base de votre MacBook Pro
24 Autres fonctionnalités de votre MacBook Pro
26 Fonctionnalités du clavier de votre MacBook Pro
28 Ports présents sur votre MacBook Pro
30 Utilisation du trackpad et du clavier
31 Utilisation de la batterie du MacBook Pro
33 Comment obtenir des réponses à vos doutes
Chapitre 3 : Augmentez votre mémoire
39 Installation de mémoire supplémentaire
47 Reconnaissance de la nouvelle mémoire par le MacBook Pro6 Table des matières
Chapitre 4 : À tout problème sa solution
50 Problèmes vous empêchant d’utiliser votre MacBook Pro
55 Utilisation d’Apple Hardware Test
56 Problèmes de connexion à Internet
59 Problèmes de communication sans fil avec AirPort Extreme
60 Maintien à jour de vos logiciels
61 Réinstallation des logiciels fournis avec le MacBook Pro
62 Informations, services et assistance
64 Localisation du numéro de série de votre produit
Chapitre 5 : Dernières recommandations
66 Informations importantes concernant la sécurité
69 Informations importantes sur la manipulation
71 Ergonomie
73 Apple et l’environnement
75 Regulatory Compliance Information1
1Prêt, feu, configurez !
www.apple.com/fr/macbookpro
Aide Mac Assistant Migration8 Chapitre 1 Prêt, feu, configurez !
Votre MacBook Pro est conçu pour pouvoir être configuré rapidement et utilisé immé-
diatement. Si vous n’avez jamais utilisé de MacBook Pro ou si vous n’êtes pas familiarisé avec les ordinateurs Macintosh, vous trouverez dans ce chapitre des instructions
qui vous aideront à débuter.
Important : lisez attentivement toutes les instructions d’installation (et les consignes de
sécurité débutant à la page 65) avant d’utiliser votre ordinateur pour la première fois.
Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser
votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2,
« Votre MacBook Pro au quotidien », pour découvrir les nouvelles fonctionnalités de cet
MacBook Pro.
Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en savoir
plus sur l’accès à l’Aide Mac, consultez la rubrique « Comment obtenir des réponses à vos
doutes » à la page 33. Comme Apple publie de temps à autres de nouvelles versions et
mises à jour de ses logiciels système, il est possible que les images de ce manuel soient
légèrement différentes de ce que vous voyez à l’écran. Certaines illustrations d’ordinateur peuvent être légèrement différentes selon le modèle de votre MacBook Pro.
Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 85 W
avant de configurer le MacBook Pro.Chapitre 1 Prêt, feu, configurez ! 9
Contenu de la boîte
Configuration du MacBook Pro
Le MacBook Pro est conçu pour être configuré rapidement et utilisé immédiatement.
Les pages suivantes contiennent des informations qui vous guideront tout au long du
processus de configuration, notamment des opérations suivantes :
 Le branchement de l’adaptateur secteur MagSafe 85 W.
 Le branchement des câbles et l’accès à un réseau.
 La mise sous tension du MacBook Pro et l’utilisation du trackpad.
 La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages.
Câble secteur
Télécommande Apple Remote
Adaptateur DVI
vers VGA
®
MENU
Adaptateur secteur
MagSafe de 85 W10 Chapitre 1 Prêt, feu, configurez !
 La configuration des préférences et du bureau Mac OS X.
Étape 1 : Branchez l’adaptateur secteur MagSafe 85 W pour alimenter
le MacBook Pro et recharger sa batterie.
Assurez-vous que la fiche CA est complètement insérée dans l’adaptateur et que les
broches de la fiche sont complètement déployées. Branchez la fiche CA de votre adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le port secteur
MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez la force d’un
aimant l’attirant.
Pour rallonger le câble de l’adaptateur secteur, tirez d’abord sur la fiche CA pour la retirer de l’adaptateur. Connectez le câble d’alimentation secteur inclus à l’adaptateur, en
vous assurant qu’il est fermement connecté. Branchez l’autre extrémité sur une prise
de courant. Le câble d’alimentation secteur fournit une connexion avec mise à la terre.
Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de l’ordinateur, débranchez la prise et non le câble.
Connecteur MagSafe ¯ Port secteur MagSafe
Câble secteur
? ®
Fiche
secteurChapitre 1 Prêt, feu, configurez ! 11
Remarque : la première fois que vous branchez l’adaptateur secteur sur le MacBook Pro,
la lampe témoin du connecteur MagSafe s’illumine. Si la lumière est orange, la batterie
est en cours de rechargement. Si elle est verte, la batterie est complètement rechargée
ou n’est pas installée. Si vous ne voyez pas de lampe témoin, vérifiez que le connecteur
est correctement branché.
Étape 2 : Pour accéder à Internet ou à un réseau, branchez une extrémité du câble
Ethernet sur le MacBook Pro et l’autre extrémité sur un modem câble, un modem
DSL ou un réseau.
Câble ®
Ethernet
®
Port Ethernet Gigabit
(10/100/1000 Base-T)
G12 Chapitre 1 Prêt, feu, configurez !
Pour une connexion commutée, vous aurez besoin d’un modem Apple USB Modem
externe, disponible sur l’Apple Store en ligne à l’adresse www.apple.com/fr/store ou
auprès des revendeurs agréés Apple. Branchez le modem Apple USB Modem sur un
port USB du MacBook Pro, puis reliez le modem à une prise téléphonique à l’aide d’un
câble téléphonique (non inclus).
Remarque : votre MacBook Pro est également équipé de la technologie AirPort Extreme
de mise en réseau sans fil. Pour en savoir plus sur la configuration d’une connexion sans
fil, choisissez dans la barre des menus Aide > Aide Mac, puis recherchez « AirPort ».
Consultez la rubrique « Comment obtenir des réponses à vos doutes » à la page 33. Chapitre 1 Prêt, feu, configurez ! 13
Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer
votre MacBook Pro.
Votre ordinateur émet un signal sonore lorsque vous l’allumez.
Le démarrage du MacBook Pro prend quelques instants. Après le démarrage,
Assistant réglages s’ouvre automatiquement.
Si le MacBook Pro ne s’allume pas, consultez la rubrique « Si votre MacBook Pro ne
s’allume ou ne démarre pas » à la page 53.
®
Trackpad
Lampe témoin de
suspension d’activité
Bouton du
trackpad
® Bouton d’alimentation14 Chapitre 1 Prêt, feu, configurez !
Étape 4 : Configurez votre MacBook Pro à l’aide d’Assistant réglages.
La première fois que vous démarrez votre MacBook Pro, l’Assistant réglages se met en
route. Il vous aide à saisir les informations de connexion à Internet et au courrier électronique ainsi qu’à configurer un compte d’utilisateur sur votre MacBook Pro. Si vous
possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transfé-
rer automatiquement les fichiers, les applications et d’autres informations de votre
ancien ordinateur.
Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui
retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur
l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un
tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation
afin qu’elle puisse être utilisée. Pour en savoir plus sur le retrait de l’autorisation
d’accès, choisissez Aide iTunes dans le menu Aide de l’application iTunes.
Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors
du premier démarrage de l’ordinateur, vous pouvez le faire ultérieurement.
Allez dans le dossier Applications, ouvrez le dossier Utilitaires, puis double-cliquez
sur Assistant migration. Chapitre 1 Prêt, feu, configurez ! 15
Étape 5 : Personnalisez le bureau Mac OS X et réglez les préférences.
Barre des
menus
Dock Icône des Préférences Système
Icône de recherche
de Spotlight
Menu Aide
Icône du Finder16 Chapitre 1 Prêt, feu, configurez !
Grâce aux Préférences Système, vous pouvez donner à votre bureau l’apparence souhaitée sans perdre de temps. Choisissez le menu Pomme () > Préférences Système
dans la barre des menus. À mesure que vous vous familiarisez avec votre ordinateur,
explorez les Préférences Système, le centre de commandes de la plupart des réglages
de votre MacBook Pro. Pour en savoir plus, ouvrez l’Aide Mac et recherchez
« Préférences Système » ou la préférence que vous souhaitez modifier.
Extinction ou suspension d’activité de votre MacBook Pro
Lorsque vous avez terminé de travailler avec le MacBook Pro, suspendez son activité ou
éteignez-le.
Suspension de l’activité de votre MacBook Pro
Suspendez l’activité de votre MacBook Pro si vous ne comptez vous en éloigner que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à le redémarrer.
Pour suspendre l’activité de votre MacBook Pro, procédez de l’une des manières
suivantes :
 Rabattez l’écran.
 Choisissez Pomme () > Suspendre l’activité, dans la barre des menus.
 Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans
la zone de dialogue qui apparaît.
 Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur
d’énergie et définissez un délai pour la minuterie de mise en veille.Chapitre 1 Prêt, feu, configurez ! 17
 Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande Apple Remote
pendant 3 secondes.
Pour réactiver le MacBook Pro :
 Si l’écran est fermé, il suffit de l’ouvrir pour réactiver le MacBook Pro.
 Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®), sur l’une des
touches du clavier ou sur l’un bouton de la télécommande Apple Remote.
À la réactivation de votre MacBook Pro, vos applications, vos documents et vos réglages
sont conservés tels que vous les aviez laissés.
AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension
d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le
disque dur a cessé de tourner) avant de déplacer le MacBook Pro. Tout déplacement
de votre ordinateur lorsque le disque dur est en train de tourner risque d’endommager
ce dernier et d’entraîner une perte de données ou l’impossibilité de démarrer à partir
du disque dur.18 Chapitre 1 Prêt, feu, configurez !
Extinction de votre MacBook Pro
Si vous ne comptez pas utiliser votre MacBook Pro pendant un jour ou deux, il est pré-
férable de l’éteindre. La lampe témoin de suspension d’activité reste allumée quelques
instants au moment de l’extinction.
Pour éteindre le MacBook Pro, procédez de l’une des manières suivantes :
m Choisissez Pomme () > Éteindre, dans la barre des menus.
m Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de
dialogue qui apparaît.
Si vous comptez ranger votre MacBook Pro pour une durée prolongée, consultez la
rubrique « Informations importantes sur la manipulation » à la page 69 afin d’obtenir
des informations sur les mesures à prendre pour éviter que votre batterie ne se
décharge complètement.2
2Votre MacBook Pro
au quotidien
www.apple.com/fr/macosx
Aide Mac Mac OS XChapitre 2 Votre MacBook Pro au quotidien 21
Cette rubrique vous offre un aperçu des différentes parties et caractéristiques de votre
MacBook Pro.
Le site web d’Apple, à l’adresse www.apple.com/fr/, vous donne accès aux actualités
Apple, à des téléchargements gratuits et des catalogues en ligne des logiciels et
matériaux Apple destinés à votre MacBook Pro.
Vous trouverez également les manuels de nombreux produits Apple, ainsi que l’assistance technique pour tous les produits Apple, sur le site web d’assistance Apple à
l’adresse www.apple.com/fr/support.22 Chapitre 2 Votre MacBook Pro au quotidien
Caractéristiques de base de votre MacBook Pro
® Bouton
d’alimentation
Lampe témoin de
suspension d’activité
Batterie
(en dessous)
Trackpad
Bouton d'ouverture
de l'écran
Bouton du
trackpad
Lecteur optique
à chargement
par fente
®Chapitre 2 Votre MacBook Pro au quotidien 23
® Bouton d’alimentation
Permet d’allumer, d’éteindre ou de suspendre l’activité du MacBook Pro.
Trackpad et bouton du trackpad
Permet de déplacer le pointeur sur l’écran du MacBook Pro avec l’index ; inclut également
une fonction de défilement en utilisant deux doigts sur le trackpad. Appuyez sur le bouton
du trackpad pour cliquer ou double-cliquer.
SuperDrive à chargement par fente
Ce lecteur optique permet de lire et de graver des CD et DVD de taille standard.
Bouton d’ouverture de l’écran
Appuyez sur ce bouton pour ouvrir l’écran et le MacBook Pro.
Lampe témoin de suspension d’activité
Une lumière blanche clignote lorsque le MacBook Pro est en suspension d’activité.
Batterie
Utilisez le MacBook Pro en puisant l’énergie de la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. 24 Chapitre 2 Votre MacBook Pro au quotidien
Autres fonctionnalités de votre MacBook Pro
®
Haut-parleurs
stéréo integrés
Lampe témoin
de la caméra
Caméra iSight
Microphone
Récepteur à
infrarougeChapitre 2 Votre MacBook Pro au quotidien 25
Caméra vidéo iSight intégrée
Elle vous permet de réaliser des vidéoconférences avec d’autres utilisateurs grâce à
l’application iChat AV intégrée, de prendre des photos avec Photo Booth ou de capturer
des vidéos avec iMovie ‘08.
Lampe témoin de la caméra vidéo
La lampe témoin verte de la caméra brille lorsque la caméra iSight intégrée est en
fonctionnement.
Haut-parleurs stéréo intégrés
Permettent d’écouter de la musique, des films, des jeux et d’autres types de données
multimédias.
Microphone (situé sous la grille du haut-parleur de gauche)
Il vous permet de capturer des sons directement ou bien de discuter avec vos amis en
direct à travers une connexion à haut débit et iChat AV.
Récepteur à infrarouge
Associé à votre télécommande Apple Remote, le récepteur à infrarouge intégré vous permet de contrôler, jusqu’à une distance de 9 mètres, les applications Front Row et Keynote
(vendue séparément) s’exécutant sur le MacBook Pro. 26 Chapitre 2 Votre MacBook Pro au quotidien
Fonctionnalités du clavier de votre MacBook Pro
Touches de
réglage du
volume
Touches de
réglage de
luminosité
Touche de
verrouillage
numérique
Touche
d’éjection
de disques
Touche
silence
Touche
de fonction
(Fn)
Touches de
fonction
standard
Touche de
bascule du
mode vidéo
Touches
d'éclairage
du clavier
esc
num
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12
lock
®
—
i C
- øChapitre 2 Votre MacBook Pro au quotidien 27
Touche de fonction (Fn)
Maintenez cette touche enfoncée pour activer les actions personnalisées affectées aux
touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches de
fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez « touches
de fonction ».
¤ Touches de réglage de luminosité (F1, F2)
Permettent d’augmenter ( ) ou de réduire ( ) la luminosité de l’écran de votre MacBook Pro.
— Touche silence (F3)
Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie
casque.
- Touches de réglage du volume (F4, F5)
Permettent d’augmenter (+) ou de baisser (–) le volume du son provenant des haut-parleurs
intégrés et du port de sortie casque.
Touche de verrouillage numérique (F6)
Permet d’activer et de désactiver le pavé numérique intégré au clavier du MacBook Pro.
Lorsque le pavé numérique est activé, une lumière verte s’allume sur la touche.
i Touche de bascule du mode vidéo (F7)
Permet de passer du mode double-écran (affichage de votre bureau en mode étendu, à
la fois sur l’écran intégré et sur un écran externe) au mode de recopie vidéo (affichage
des mêmes informations sur les deux écrans), et vice versa.
o Touches d’éclairage du clavier (F8, F9, F10)
Permettent d’augmenter (o), de diminuer (ø) ou de désactiver (O) la luminosité de
l’éclairage du clavier.
Touches Exposé et Dashboard (F11, F12)
La touche F11 est présélectionnée pour ouvrir Exposé et la touche F12 ouvre Dashboard.
C Touche d’éjection de disque
Maintenez cette touche enfoncée pour éjecter un disque. Il est également possible
d’éjecter un disque en faisant glisser son icône dans la Corbeille.28 Chapitre 2 Votre MacBook Pro au quotidien
Ports présents sur votre MacBook Pro
HPort FireWire 800 £ Port DVI
Port
FireWire 400
Logement H
de sécurité
Gauche
dPort USB 2.0
Port Ethernet Gigabit
(10/100/1000 Base-T)
G
Port
d’adaptateur
secteur
MagSafe
¯ Port d’entrée
de ligne audio/
audio numérique
optique
, Logement ExpressCard/34
Ports USB 2.0 (1 port sur
la gauche du modèle de 15 pouces)
d Port de sortie casque/audio
numérique optique
f
DroiteChapitre 2 Votre MacBook Pro au quotidien 29
¯ Port secteur MagSafe
Branchez-y l’adaptateur secteur MagSafe 85 W (inclus) pour recharger la batterie du
MacBook Pro.
d Ports haute vitesse USB (Universal Serial Bus) 2.0
Grâce à ses ports, vous pouvez brancher sur le MacBook Pro un modem, un iPod, une souris,
un clavier, une imprimante, un lecteur de disques, un appareil photo numérique, une
manette de jeu et plus encore. Vous pouvez également y brancher des périphériques USB 1.1.
, Port d’entrée de ligne audio/ audio numérique optique
Permet de connecter un micro ou un appareil audio numérique à votre MacBook Pro.
f Port de sortie casque/audio numérique optique
Il permet de connecter des haut-parleurs externes, un casque ou des appareils audio
numériques.
Logement ExpressCard/34
Développez les fonctionnalités de votre MacBook Pro grâce aux cartes ExpressCard
standard de 34 mm. Pour éjecter une ExpressCard, appuyer doucement dessus pour
activer le ressort puis retirez-la du logement.
Logement de sécurité
Fixez-y un verrou et un câble antivol (disponibles sur le site www.apple.com/fr/store).
H Deux ports FireWire (FireWire 400 et FireWire 800)
Permettent de brancher sur l’ordinateur des périphériques externes à haute vitesse tels
que des caméras vidéo numériques et des périphériques de stockage.
G Port Gigabit Ethernet (10/100/1000Base-T)
Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou
encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques
Ethernet sans avoir besoin de câble croisé Ethernet.
£ Port DVI (moniteur externe)
Permet de brancher un moniteur externe, un projecteur ou un téléviseur équipé d’un connecteur DVI ou de raccorder un moniteur VGA en utilisant l’adaptateur DVI vers VGA inclus.30 Chapitre 2 Votre MacBook Pro au quotidien
Utilisation du trackpad et du clavier
Utilisez le trackpad pour déplacer le curseur et faire défiler, taper, taper deux fois et
faire glisser des éléments. La distance de déplacement du pointeur à l’écran est proportionnel à la vitesse de déplacement de votre doigt sur le trackpad. Pour déplacer légè-
rement le pointeur, déplacez lentement votre doigt sur le trackpad. Plus vous faites
glisser rapidement votre doigt, plus le pointeur se déplace loin. Pour ajuster la vitesse
de déplacement dans les Préférences Système, choisissez le menu Pomme () >
Préférences Système, cliquez sur Clavier et souris, puis sur Trackpad.
Voici quelques astuces et raccourcis utiles du trackpad et du clavier :
 Le clic secondaire ou « clic droit » vous permet d’accéder aux commandes du menu
contextuel.
Pour définir cette option, sélectionnez « Placer deux doigts sur le trackpad et cliquer
sur le bouton pour effectuer un clic secondaire » dans la sous-fenêtre Trackpad des
préférences Clavier et souris.
Vous pouvez également effectuer un clic secondaire en maintenant la touche
Contrôle (ctrl) enfoncée au moment où vous cliquez.
 Le défilement à deux doigts vous permet de faire glisser deux doigts pour défiler
rapidement vers le haut, le bas ou latéralement dans la fenêtre active.
Pour définir cette option, sélectionnez « Utiliser deux doigts pour le défilement » et
« Autoriser le défilement horizontal » dans la sous-fenêtre Trackpad des préférences
Clavier et souris.
 La suppression en avant supprime les caractères à droite du point d’insertion.
En appuyant sur la touche Supprimer, vous supprimez les caractères se trouvant
à gauche du point d’insertion.Chapitre 2 Votre MacBook Pro au quotidien 31
Pour supprimer en avant, maintenez la touche Fonction (fn) enfoncée tout en
appuyant sur la touche Supprimer.
Utilisation de la batterie du MacBook Pro
Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook Pro est alimenté
par sa batterie. L’autonomie du MacBook Pro varie en fonction des applications utilisées et des périphériques externes qui y sont connectés. MacBook ProLa désactivation
de fonctions sans fil telles qu’AirPort Extreme ou Bluetooth®
contribue à économiser
l’énergie de votre batterie.
Si votre batterie faiblit pendant que vous travaillez, branchez l’adaptateur secteur et
laissez la batterie se recharger. Pour remplacer une batterie presque déchargée par
une autre rechargée lorsque votre ordinateur n’utilise pas d’adaptateur secteur, il est
préférable d’éteindre l’ordinateur et de suivre les étapes décrites à la page 39.
Pour connaître le niveau de charge de votre batterie, vous pouvez observer les lampes
témoins de niveau de charge dont elle est dotée. Appuyez sur le bouton situé en
regard des témoins lumineux afin que ces derniers brillent brièvement pour indiquer le
niveau de charge de la batterie. Vous pouvez vérifier le niveau de charge de la batterie
qu’elle soit ou non insérée dans le MacBook Pro.
Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun
témoin n’est allumé, c’est que la batterie est complètement vide et que le MacBook Pro
ne pourra démarrer sans l’adaptateur secteur. Branchez l’adaptateur secteur et laissez
la batterie se recharger ou remplacez la batterie à plat par une batterie complètement
rechargée (voir la page 46).32 Chapitre 2 Votre MacBook Pro au quotidien
Vous pouvez également savoir quelle est la charge actuelle de la batterie en vérifiant
l’icône d’état de la batterie ( ), située dans la barre des menus. Le niveau affiché
dépend de la quantité d’énergie restant dans la batterie, mais aussi des applications
et des périphériques en cours d’utilisation, ainsi que des réglages actuels de votre système. Pour disposer de plus d’énergie, fermez des applications, déconnectez les périphériques non utilisés et réglez la fonction d’Économiseur d’énergie. Pour en savoir
plus sur l’économie de la batterie et obtenir des astuces pour améliorer ses performances, rendez-vous à l’adresse www.apple.com/fr/batteries/notebooks.html.
Batterie Témoins LED
de la batterie
BoutonChapitre 2 Votre MacBook Pro au quotidien 33
Recharge de la batterie
Lorsque l’adaptateur secteur fourni avec le MacBook Pro est connecté, la batterie se
recharge, que l’ordinateur soit éteint, allumé ou en mode de suspension d’activité.
La recharge sera toutefois plus rapide si l’ordinateur est éteint ou en mode de
suspension d’activité.
Comment obtenir des réponses à vos doutes
De plus amples informations sur l’utilisation du MacBook Pro sont disponibles
dans l’Aide Mac qui s’affiche sur votre ordinateur et sur Internet, à l’adresse
www.apple.com/fr/support/macbookpro.
Pour faire apparaître l’Aide Mac :
1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de
l’écran).
2 Choisissez Aide > Aide Mac (cliquez sur le menu Aide dans la barre des menus puis
sélectionnez Aide Mac).
3 Cliquez dans le champ de recherche, tapez votre question et appuyez sur la touche
Retour du clavier.34 Chapitre 2 Votre MacBook Pro au quotidien
Informations supplémentaires
Pour en savoir plus sur l’utilisation de votre MacBook Pro, consultez le tableau suivant :
Pour obtenir
des informations sur : Effectuez l’opération suivante :
L’installation de mémoire Consultez le chapitre 3, « Augmentez votre mémoire », à la
page 37.
Le dépannage de votre
MacBook Pro en cas de
problème
Consultez le chapitre 4, « À tout problème sa solution », à la
page 49.
L’obtention de services et
d’une assistance pour votre
MacBook Pro
Consultez la rubrique « Informations, services et assistance » à la
page 62. Vous pouvez également vous rendre sur le site web d’assistance Apple à l’adresse www.apple.com/fr/support/macbookpro.
L’utilisation de Mac OS X Le site web de Mac OS X à l’adresse www.apple.com/fr/macosx
ou encore rechercher « Mac OS X » dans l’Aide Mac.
La migration depuis un PC vers
un Mac
Consultez l’article « How To Move To Mac » (Comment passer au
Mac) à l’adresse www.apple.com/getamac/movetomac (en anglais).
Utilisation des applications
iLife ‘08
Visitez le site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous
pouvez également ouvrir une application iLife ‘08, ouvrir l’Aide
de l’application, puis saisir une question dans le champ de
recherche.
La modification des
Préférences Système
Ouvrez Préférences Système en choisissant le menu Pomme (K) >
Préférences Système. Vous pouvez également rechercher
« préférences système » dans l’Aide Mac.
L’utilisation de votre trackpad Recherchez « trackpad » dans l’Aide Mac ou bien ouvrez Préfé-
rences Système, cliquez sur Clavier et souris, puis sur Trackpad.
L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide MacChapitre 2 Votre MacBook Pro au quotidien 35
L’utilisation de la technologie
sans fil AirPort Extreme
Visitez la page web d’assistance AirPort à l’adresse
www.apple.com/fr/support/airport.
L’utilisation de la technologie
sans fil Bluetooth
Visitez la page web d’assistance Bluetooth à l’adresse
www.apple.com/fr/support/bluetooth. Vous pouvez aussi ouvrir
l’utilitaire Échange de fichiers Bluetooth (dans le dossier Utilitaires
du dossier Applications) et sélectionner Aide > Aide Bluetooth.
L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac
La connexion
d’une imprimante
Recherchez « impression » dans l’Aide Mac.
Les connexions FireWire et USB Recherchez « USB » ou « FireWire » dans l’Aide Mac,
La connexion à Internet Recherchez « Internet » dans l’Aide Mac.
La connexion d’un moniteur
externe
Recherchez « port de moniteur » dans l’Aide Mac.
La télécommande Apple
Remote
Recherchez « télécommande » dans l’Aide Mac.
Front Row Recherchez « Front Row » dans l’Aide Mac.
La gravure d’un CD ou DVD Recherchez « graver un disque » dans l’Aide Mac.
Les caractéristiques Visitez la page web concernant les caractéristiques, à l’adresse
www.apple.com/support/specs (en anglais). Vous pouvez également ouvrir Informations Système en choisissant le menu
Pomme (K) > « À propos de ce Mac » dans la barre des menus,
puis en cliquant sur Plus d’infos.
Pour obtenir
des informations sur : Effectuez l’opération suivante :3
3Augmentez votre mémoire
mémoire RAM
www.apple.com/fr/store
Aide Mac38 Chapitre 3 Augmentez votre mémoire
Ce chapitre fournit des informations et des instructions pour installer de la mémoire
supplémentaire et pour retirer et remettre en place la batterie de votre MacBook Pro.
Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez accé-
der en retirant le cache de mémoire dans la baie de la batterie. Votre MacBook Pro est
fourni avec un minimum de 2 gigaoctets (Go) de mémoire DDR2 (Double Data Rate)
SDRAM (Synchronous Dynamic Random-Access Memory) à 667 MHz. Les deux logements de mémoire peuvent accueillir un module SDRAM conforme aux spécifications
suivantes :
 format DDR SO-DIMM (Double Data Rate Small Outline Dual Inline Memory Module)
 taille inférieure à 3,8 cm
 1 Go ou 2 Go
 à 200 broches
 mémoire RAM de type PC2-5300 DDR2 à 667 MHz
Vous pouvez ajouter deux modules de mémoire de 2 Go pour un total de 4 Go de
mémoire au maximum.
AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un
technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance
qui accompagnent votre ordinateur pour savoir comment contacter Apple. Tout
dommage causé à votre matériel en tentant d’installer vous-même de la mémoire
n’est pas couvert par la garantie limitée de votre ordinateur.Chapitre 3 Augmentez votre mémoire 39
Installation de mémoire supplémentaire
Pour installer de la mémoire, il faut enlever la batterie puis la remettre en place.
La procédure suivante inclut des instructions sur le retrait de la batterie, l’ajout de
mémoire et le remise en place de la batterie.
Étape 1 : Retirez la batterie.
1 Éteignez votre MacBook Pro. Débranchez l’adaptateur secteur, le câble Ethernet et tous les
autres câbles connectés au MacBook Pro afin d’éviter toute détérioration de ce dernier.
AVERTISSEMENT : soyez prudent lorsque vous manipulez la batterie. Consultez
les informations de sécurité sur la batterie à la page 68.40 Chapitre 3 Augmentez votre mémoire
2 Retournez le MacBook Pro et repérez les loquets d’ouverture sur les côtés de la batterie. Faites glisser les deux loquets vers le haut. La batterie se dégagera légèrement.
Retirez-la.
AVERTISSEMENT : les composants internes de votre MacBook Pro risquent d’être
chauds. Si vous venez d’utiliser votre MacBook Pro, attendez 10 minutes après l’avoir
éteint afin de laisser aux composants internes le temps de se refroidir avant de continuer.Chapitre 3 Augmentez votre mémoire 41
Étape 2 : Installez la mémoire.
1 À l’aide d’un tournevis à pointe cruciforme de taille 00, dévissez les vis qui fixent
le cache de la mémoire, puis détachez-le de la baie de la batterie de l’ordinateur.
Selon le modèle de votre MacBook Pro, vous aurez trois ou quatre vis.
MacBook Pro de 15 pouces
MacBook Pro de 17 pouces42 Chapitre 3 Augmentez votre mémoire
2 Touchez la surface métallique de l’intérieur de l’ordinateur afin de décharger toute
électricité statique que vous pouvez avoir emmagasinée.Chapitre 3 Augmentez votre mémoire 43
3 Si vous devez retirer une carte mémoire insérée dans le logement, écartez les languettes du logement de manière à libérer les encoches de la carte mémoire. Cette dernière
se dégage alors légèrement. Inclinez la carte selon un angle de 25 degrés, puis retirezla doucement en la glissant hors du logement.
4 Insérez la carte mémoire selon un angle de 25 degrés. Alignez l’encoche de la carte
avec la petite languette du logement mémoire puis faites glisser la carte dans ce logement jusqu’à ce que le bord doré soit presque invisible. Poussez alors fermement la
carte mémoire dans le logement mémoire. Une légère résistance peut se faire sentir. 44 Chapitre 3 Augmentez votre mémoire
5 Écartez doucement les petites languettes du logement mémoire pour les séparer des
encoches et appuyez sur la carte mémoire jusqu’à ce que les deux loquets latéraux de
la carte soient enclenchés fermement.
25
O
Bien
insérée
Mal
inséréeChapitre 3 Augmentez votre mémoire 45
Remarque : assurez-vous que la mémoire est installée comme indiqué sur cette
illustration ; les contacts dorés doivent être presque complètement insérés dans
le connecteur.
6 Insérez toute autre mémoire dans le deuxième logement.
7 Remettez le cache de la mémoire en place et assurez-vous qu’il est bien à plat avant de
resserrer les vis.
MacBook Pro de 15 pouces
MacBook Pro de 17 pouces46 Chapitre 3 Augmentez votre mémoire
Étape 3 : Replacez la batterie.
1 Placez le bord inférieur de la batterie dans son compartiment. Appuyez doucement sur
le bord supérieur de la batterie jusqu’à ce que les loquets soient bloqués.
2 Reconnectez l’adaptateur secteur et tout autre câble connecté auparavant à l’ordinateur.Chapitre 3 Augmentez votre mémoire 47
Reconnaissance de la nouvelle mémoire par le MacBook Pro
Après avoir ajouté de la mémoire au MacBook Pro, vérifiez si elle est reconnue.
Pour vérifier la mémoire de votre ordinateur :
1 Démarrez votre MacBook Pro.
2 Lorsque le bureau Mac OS X apparaît, choisissez le menu Pomme () dans la barre
des menus, puis sélectionnez « À propos de ce Mac ».
La mémoire totale inclut la quantité de mémoire d’origine intégrée à votre ordinateur
et la mémoire que vous avez ajoutée. Pour plus de détails sur la quantité de mémoire
installée sur votre ordinateur, ouvrez Informations système en cliquant sur Plus d’infos
puis sur Mémoire.
Si le MacBook Pro ne reconnaît pas la mémoire ou ne démarre pas correctement, vérifiez que la mémoire est compatible avec le MacBook Pro et qu’elle est correctement
installée en la remettant en place.4
4À tout problème sa solution
www.apple.com/fr/support
Aide Mac aide50 Chapitre 4 À tout problème sa solution
Vous pouvez rencontrer, à titre exceptionnel, des problèmes en utilisant le MacBook Pro .
Lisez ce chapitre pour trouver des idées de solution qui vous aideront à régler vos
problèmes. Vous trouverez des informations supplémentaires concernant le dépannage
dans l’Aide Mac et sur le site web d’assistance consacré au MacBook Pro, à l’adresse
www.apple.com/fr/support/macbookpro.
Il existe généralement une solution simple et rapide aux problèmes que vous pouvez
rencontrer à l’utilisation du MacBook Pro. Réfléchissez aux conditions qui ont entraîné
l’apparition de ce problème. Ce récapitulatif de la totalité des opérations effectuées
avant que le problème ne survienne permet de restreindre les causes possibles et
de trouver la solution. Les éléments à noter comprennent:
 les applications que vous étiez en train d’utiliser quand le problème est apparu ; les
problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer
que cette application n’est pas compatible avec la version de Mac OS installée sur
votre ordinateur ;
 les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre
dossier Système ;
 Tout nouveau composant matériel installé (mémoire supplémentaire ou périphérique,
par exemple).
Problèmes vous empêchant d’utiliser votre MacBook Pro
Si votre MacBook Pro ne répond plus ou que le pointeur se fige
Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Mac OS X permet
de quitter une application figée et d’enregistrer vos travaux dans d’autres applications
en cours d’exécution sans redémarrer votre ordinateur.Chapitre 4 À tout problème sa solution 51
Pour forcer une application à se fermer :
1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu
Pomme () > Forcer à quitter dans la barre des menus.
La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application est
sélectionnée.
2 Cliquez sur Forcer à quitter.
L’application se ferme, en laissant toutes les autres applications ouvertes.
Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone de
dialogue.
Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez
l’ordinateur afin de vous assurer que le problème est entièrement réglé.
Si vous ne parvenez pas à forcer la fermeture d’une application, maintenez enfoncé
le bouton d’alimentation (®) durant quelques secondes pour éteindre l’ordinateur.
Attendez 10 secondes puis allumez l’ordinateur.
Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des
menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en cas
de blocage de l’ordinateur ou s’il ne répond pas.
Si le problème ne survient que lorsque vous utilisez une application particulière, vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir
des informations de contact et une assistance concernant les logiciels fournis avec
le MacBook Pro, rendez-vous à l’adresse www.apple.com/fr/guide.52 Chapitre 4 À tout problème sa solution
Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le
logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels
fournis avec le MacBook Pro » à la page 61.
Si le MacBook Pro se bloque au démarrage, si un point d’interrogation clignotant
apparaît ou si l’écran est éteint et que la lampe témoin de suspension d’activité
reste allumée (pas en mode de suspension d’activité)
Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient
pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe
relié à l’ordinateur.
 Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le
en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes.
Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur
en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option
enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis
sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système
et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.
 Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire de
disque :
 Insérez le CD « Mac OS X Install Disc 1 » dans votre ordinateur.
 Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du
démarrage.
 Choisissez Installation dans la barre des menus puis sélectionnez Ouvrir Utilitaire de
disque. Lorsque Utilitaire de disque s’ouvre, suivez les instructions de la sous-fenê-
tre S.O.S pour savoir s’il est en mesure de réparer le disque.Chapitre 4 À tout problème sa solution 53
Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller
le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook Pro » à la page 61.
Si votre MacBook Pro ne s’allume ou ne démarre pas
Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :
 Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une
prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe 85 W
fourni avec le MacBook Pro. Si l’adaptateur secteur ne recharge plus l’ordinateur et
que la lampe témoin du connecteur MagSafe ne s’allume pas lorsque vous branchez
le câble d’alimentation, essayez de débrancher le câble puis de le brancher à nouveau
afin de le réinitialiser ou essayer à partir d’une autre prise.
 Vérifiez si votre batterie à besoin d’être rechargée. Appuyez sur le petit bouton situé
sur la batterie. Vous devriez voir apparaître un à quatre voyants indiquant le niveau
de charge de la batterie. Si une seule lampe témoin de niveau de la batterie clignote,
branchez l’adaptateur secteur pour charger la batterie jusqu’à ce qu’au moins cette
lampe témoin reste allumée en permanence.
 Si cela ne résout pas le problème, réinitialisez le système de gestion de l’alimentation
du MacBook Pro en débranchant l’adaptateur secteur, en retirant la batterie puis en
maintenant le bouton d’alimentation (®) enfoncé pendant au moins 5 secondes.
 Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement
installée et compatible avec votre ordinateur. Vérifiez si le retrait de cette mémoire
et la remise en place de l’ancienne permet à l’ordinateur de démarrer (consultez
la rubrique « Installation de mémoire supplémentaire » à la page 39). 54 Chapitre 4 À tout problème sa solution
 Pour réinitialiser la PRAM, appuyez sur le bouton d’alimentation (®) et maintenez
immédiatement les touches Commande (x), Option, P et R enfoncées jusqu’à ce que
vous entendiez une deuxième fois le signal sonore de démarrage.
 Si vous ne parvenez toujours pas à démarrer le MacBook Pro, consultez la rubrique
« Informations, services et assistance » à la page 62 qui contient les informations
nécessaires pour prendre contact avec Apple.
Si l’écran devient subitement noir ou que votre MacBook Pro se bloque
Essayez de redémarrer votre MacBook Pro.
1 Débranchez tout périphérique connecté à votre MacBook Pro excepté l’adaptateur secteur.
2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système.
3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant
la connexion d’un périphérique et la reprise du travail.
Pour vérifier le niveau de charge de la batterie, cliquez sur l’icône d’état de la batterie ( )
située dans la barre des menus.
Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie de
la batterie sont en place.
Si vous avez oublié votre mot de passe
Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de
tous les autres comptes.
1 Insérez le CD « Mac OS X Install Disc 1 ». Redémarrez ensuite votre ordinateur et maintenez la touche C enfoncée pendant le démarrage.
2 Choisissez Utilitaires > « Réinitialiser le mot de passe » dans la barre des menus,
puis suivez les instructions à l’écran.Chapitre 4 À tout problème sa solution 55
En cas de problème à l’éjection d’un disque
 Fermez toutes les applications susceptibles d’utiliser le disque et essayez à nouveau.
Si cela ne donne pas de résultats, redémarrez l’ordinateur puis immédiatement
maintenez le bouton du trackpad enfoncé.
Utilisation d’Apple Hardware Test
Si vous pensez qu’il y a un problème avec les composants matériels du MacBook Pro,
vous pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas
(les composants affectés peuvent être la mémoire ou le processeur, par exemple).
Pour utiliser Apple Hardware Test :
1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur secteur.
Si un câble Ethernet est connecté, déconnectez-le.
2 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur.
3 Redémarrez ensuite votre ordinateur en maintenant la touche D enfoncée lors du
démarrage.
4 Lorsque l’écran principal d’Apple Hardware Test s’affiche, suivez les instructions à
l’écran.
5 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur.
Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si
Apple Hardware Test ne détecte pas de panne matérielle, il est probable que
le problème soit lié aux logiciels.
Pour en savoir plus sur Apple Hardware Test, consultez le fichier « À propos de Apple
Hardware Test » présent sur le CD « Mac OS X Install Disc 1 ».56 Chapitre 4 À tout problème sa solution
Problèmes de connexion à Internet
Le MacBook Pro est équipé de l’application Assistant réglages, destinée à vous aider à
configurer une connexion à Internet. Ouvrez Préférences Système, puis cliquez sur
Réseau. Cliquez sur le bouton « Assistant » pour ouvrir Assistant réglages de réseau.
En cas de problème avec votre connexion à Internet, vous pouvez essayer les méthodes
exposées dans cette rubrique pour votre type de connexion ou vous pouvez utiliser
Diagnostic réseau.
Pour utiliser Diagnostic réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau puis cliquez sur « Assistant ».
3 Cliquez sur Diagnostic pour lancer Diagnostic réseau.
4 Suivez les instructions à l’écran.
Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe
peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous
connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès à
Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter
de réaliser les opérations suivantes.Chapitre 4 À tout problème sa solution 57
Connexions à Internet par modem câble, modem DSL ou réseau local (LAN)
Assurez-vous que tous les câbles du modem sont correctement branchés, y compris
le câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et le câble
raccordant le modem à la prise murale. Vérifiez également les câbles et l’alimentation
de vos routeurs et concentrateurs Ethernet.
Éteignez puis rallumez le modem et réinitialisez les composants matériels du modem.
Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains
fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation du
modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem.
Important : les instructions relatives aux modems ne concernent pas les utilisateurs de
réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de
réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs
de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI.58 Chapitre 4 À tout problème sa solution
Connexions PPPoE
Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via
PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les informations que
vous avez saisies dans les préférences Réseau sont correctes.
Pour vérifier les réglages de vos préférences Réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau.
3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez
PPPoE dans le menu local Interface.
4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez
Ethernet si vous vous connectez à un réseau câblé ou AirPort si vous vous connectez à
un réseau sans fil.
5 Saisissez les informations fournies par votre fournisseur d’accès, tel que le nom du
compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès
le demande).
6 Cliquez sur Appliquer pour activer les réglages.
Connexions au réseau
Assurez-vous que le câble Ethernet est branché sur le MacBook Pro et sur le réseau.
Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet.
Si vous disposez de plusieurs ordinateurs tentant de partager une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si
votre FAI fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque
ordinateur.Chapitre 4 À tout problème sa solution 59
Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de masquage d’adresses IP. Pour obtenir des informations sur la configuration, consultez la
documentation fournie avec votre routeur ou contactez la personne qui a configuré
votre réseau. La borne d’accès AirPort peut être utilisée pour que plusieurs ordinateurs
partagent une adresse IP. Pour obtenir de plus amples informations sur l’utilisation
d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web
d’Apple consacré à AirPort Extreme, à l’adresse www.apple.com/fr/support/airport.
Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés,
adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau.
Problèmes de communication sans fil avec AirPort Extreme
En cas de problème avec les communications sans fil AirPort Extreme
 Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé
et dispose d’un point d’accès sans fil.
 Assurez-vous que le logiciel est correctement configuré conformément aux instructions incluses avec votre borne d’accès ou point d‘accès.
 Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la
zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou
des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.60 Chapitre 4 À tout problème sa solution
 Vérifiez l’icône d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres de
mesure apparaissent pour afficher la puissance du signal. Si les barres ne s’affichent
pas, tentez de changer de place.
 Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac,
puis Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions
fournies avec votre appareil sans fil.
Maintien à jour de vos logiciels
Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les
dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple.
Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte
les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer votre
MacBook Pro afin qu’il recherche régulièrement les mises à jour disponibles, pour
que vous puissiez ensuite télécharger et installer les mises à jour de logiciels.
Pour rechercher des logiciels mis à jour :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.
 Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.
 Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse
www.apple.com/fr/macosx.Chapitre 4 À tout problème sa solution 61
Réinstallation des logiciels fournis avec le MacBook Pro
Les disques d’installation de logiciels fournis avec votre ordinateur permettent de
réinstaller Mac OS X et les applications livrées avec votre ordinateur.
Important : Apple vous recommande de sauvegarder les données de votre disque dur
avant de procéder à la réinstallation de logiciels. Apple décline toute responsabilité en
cas de perte de données.
Installation de Mac OS X et des applications
Pour installer Mac OS X et les applications qui accompagnent le MacBook Pro :
1 Sauvegardez vos fichiers essentiels.
Nous vous conseillons de sauvegarder vos fichiers essentiels avant d’installer Mac OS X
et d’autres applications car l’option Effacer et installer efface les données du disque dur.
2 Assurez-vous que l’adaptateur secteur est correctement branché et que le témoin est
allumé.
3 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur.
4 Double-cliquez sur « Install Mac OS X and Bundled Software ». Pour n’installer que les
applications fournies avec l’ordinateur, double-cliquez sur « Bundled Software Only ».
Remarque : pour installer iCal, iChat AV, iSync, iTunes, Safari et les applications iLife ‘08,
double-cliquez sur « Install Mac OS X and Bundled Software ».
5 Suivez les instructions à l’écran.
6 Après avoir sélectionné le volume de destination pour l’installation, suivez les instructions
à l’écran. Il se peut que votre ordinateur redémarre et vous invite à insérer le disque d’installation Mac OS X suivant.62 Chapitre 4 À tout problème sa solution
Remarque : pour rétablir les réglages d’origine de Mac OS X sur votre ordinateur, cliquez sur Options dans la sous-fenêtre Sélectionner une destination du programme
d’installation, puis choisissez Effacer et installer.
Informations, services et assistance
L’utilisateur ne peut remplacer aucune pièce du MacBook Pro, excepté la mémoire.
Si vous avez besoin de services de réparation, adressez-vous à Apple ou portez
votre MacBook Pro chez un fournisseur de services agréé Apple. Vous trouverez de
plus amples informations sur le MacBook Pro en ligne, dans l’aide à l’écran, dans
Informations Système et via Apple Hardware Test.
Informations en ligne
Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur
www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire
des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de
discussion Apple.
Aide à l’écran
Vous pouvez chercher des réponses à vos questions ainsi que des instructions et des
informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac.
Informations Système
Pour obtenir des informations sur le MacBook Pro, servez-vous d’Informations Système.
Cette application vous fournit la liste des composants matériels et des logiciels installés,
le numéro de série et de version du système d’exploitation, la quantité de mémoire
installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () >
« À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos.Chapitre 4 À tout problème sa solution 63
Service et assistance AppleCare
Votre MacBook Pro est fourni avec 90 jours d’assistance technique et 1 an de couverture pour les réparations de matériel effectuées dans les magasins Apple Store ou
les centres de réparations agréés Apple, tel qu’un fournisseur de services agréé Apple.
Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un
programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur
www.apple.com/fr/support/products ou bien visitez le site web de votre pays
(dans la liste ci-dessous).
Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare
peut vous aider à installer et à ouvrir les applications et offre des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit
pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre
MacBook Pro à portée de main lorsque vous appelez.
Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date
d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer.
Pays Téléphone Site web
Allemagne (49) 01805 009 433 www.apple.com/de/support
Autriche (43) 0810 300 427 www.apple.com/at/support
Belgique (flamand)
(français)
(32) 070 700 772
(32) 070 700 773
www.apple.com/benl/support
www.apple.com/befr/support
France (33) 0825 888 024 www.apple.com/fr/support
Luxembourg (352) 800 24550 www.apple.com/befr/support
Suisse (français)
(allemand)
(41) 0848 000 132
(41) 0848 000 132
www.apple.com/chfr/support
www.apple.com/chde/support64 Chapitre 4 À tout problème sa solution
Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques
locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet:
Localisation du numéro de série de votre produit
Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre
ordinateur :
 Choisissez le menu Pomme () dans la barre des menus puis sélectionnez « À propos de ce Mac ». Cliquez sur le numéro de version situé sous les mots « Mac OS X ».
Cliquez à cet endroit de façon répétitive pour afficher l’un après l’autre la version de
Mac OS X, le numéro de sous-version et le numéro de série.
 Cliquez sur l’icône du Finder puis ouvrez /Applications/Utilitaires/Informations Système.
Cliquez alors sur Matériel dans le panneau Contenu.
 Retirez la batterie. Le numéro de série de votre MacBook Pro se trouve dans la baie
de la batterie. Pour en savoir plus sur l’extraction de la batterie, consultez la page 39 .
www.apple.com/contact/phone_contacts.html5
5Dernières recommandations
www.apple.com/fr/environment
Aide Mac ergonomie66 Chapitre 5 Dernières recommandations
Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces consignes concernant le nettoyage et la manipulation de votre MacBook Pro ainsi que
l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un
endroit facile d’accès pour vous et pour les utilisateurs éventuels.
Informations importantes concernant la sécurité
Utilisation près de l’eau et dans des endroits humides Évitez de placer
votre MacBook Pro à proximité d’un évier, d’un lavabo, d’une baignoire ou d’une
douche, par exemple. Protégez votre MacBook Pro de l’humidité et des intempéries
(neige, pluie et brouillard par exemple).
Manipulation du MacBook Pro Installez le MacBook Pro sur un plan de travail stable
qui laisse convenablement circuler l’air sous l’ordinateur et autour de celui-ci. N’utilisez
pas le MacBook Pro en le posant sur un coussin ou tout autre objet de structure non
solide car cela pourrait empêcher les conduits d’aération de fonctionner correctement.
Évitez également de placer des objets sur le clavier lorsque vous utilisez votre
MacBook Pro. N’introduisez jamais d’objets d’aucune sorte dans les ouvertures servant
à la ventilation.
La partie inférieure du MacBook Pro peut chauffer au cours d’une utilisation normale
de l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il émane vous gêne,
posez-le plutôt sur un plan de travail stable.
AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner
des décharges électriques ou entraîner tout type de blessure ou dommage.Chapitre 5 Dernières recommandations 67
Utilisation de l’adaptateur secteur MagSafe 85 W Veillez à ce que la fiche CA ou le
câble d’alimentation secteur soit totalement inséré dans l’adaptateur secteur avant de
le brancher sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne le MacBook Pro ou, au besoin, un adaptateur secteur agréé Apple compatible avec
ce produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de
l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant
ou posez-le par terre, dans un endroit correctement aéré.
Débranchez l’adaptateur secteur, retirez la batterie et débranchez tous les autres câbles
si l’un des cas suivants se présente :
 Vous souhaitez ajouter de la mémoire.
 Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions
fournies à la page 70).
 La prise ou le câble d’alimentation est endommagé.
 Le MacBook Pro ou l’adaptateur secteur est exposé à la pluie ou à une humidité
excessive, ou du liquide a été versé dans le boîtier.
 Le MacBook Pro ou l’adaptateur secteur a subi une chute, le boîtier a été endommagé
ou vous pensez qu’une réparation est nécessaire.
Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte
de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de
matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment
ou autres) à moins de 25 mm de ce port.
Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les
doucement à l’aide d’un bâtonnet de coton.68 Chapitre 5 Dernières recommandations
Manipulation de la batterie Évitez de la faire tomber, de la démonter, de l’écraser, de
la brûler ou de l’exposer à des températures supérieures à 100° C. N’utilisez plus la batterie si elle est endommagée de quelque façon que ce soit. Ne remplacez la batterie
que par une batterie certifiée par Apple pour ce produit. Éliminez rapidement les batteries usagées conformément aux directives d’environnement locales en vigueur.
Prévention de la diminution de l’acuité auditive Vous risquez une perte d’audition
irréparable si vous utilisez un casque ou des écouteurs à volume sonore élevé. L’oreille
peut s’adapter petit à petit à des volumes sonores de plus en plus élevés qui peuvent
sembler normaux, mais qui risquent à la longue d’endommager votre système auditif.
En cas de sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les
écouteurs et consultez un médecin. Plus le volume est élevé, plus votre audition risque
d’être affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent de prendre les mesures suivantes :
 Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque
d’écoute.
 Évitez d’augmenter le volume afin de bloquer les bruits environnants.
 Baissez le volume si vous ne parvenez pas à entendre une personne qui parle à côté
de vous.
Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle
du trafic aérien, ni dans aucune autre situation où une panne du système informatique
pourrait entraîner la mort, des blessures ou de graves dommages écologiques.Chapitre 5 Dernières recommandations 69
Informations concernant le laser pour lecteurs optiques
Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux s’il
est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un
fournisseur de services agréé Apple.
Informations importantes sur la manipulation
Mise sous tension de votre MacBook Pro N’allumez jamais le MacBook Pro tant que
tous ses composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur alors que certains composants manquent peut s’avérer dangereuse et risque de
l’endommager.
Transport du MacBook Pro Si vous transportez le MacBook Pro dans un sac ou dans
un attaché-case, assurez-vous que ce dernier ne contient pas d’objets non attachés
(des trombones ou des pièces de monnaie, par exemple) qui pourraient pénétrer accidentellement dans l’ordinateur par une ouverture (comme la fente du lecteur optique)
ou se coincer à l’intérieur d’un port. Maintenez également à l’écart du port secteur
MagSafe tout objet à sensibilité magnétique.
AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui ne
sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à des
rayonnements dangereux.
AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer des
dommages à votre MacBook Pro ou à d’autres objets.70 Chapitre 5 Dernières recommandations
Utilisation des connecteurs et des ports Ne forcez jamais un connecteur à entrer dans
un port. Lorsque vous branchez un appareil, assurez-vous que le port ne contient
aucun résidu quelconque, que le connecteur correspond bien au port et qu’il est placé
de manière à entrer correctement dans le port.
Utilisation du lecteur optique Le lecteur SuperDrive du MacBook Pro prend en charge
les disques de 12 cm. Les disques de forme irrégulière et de moins de 12 cm ne peuvent pas être lus.
Stockage du MacBook Pro Si vous décidez de ranger le MacBook Pro pendant une
longue période, placez-le dans un endroit frais (idéalement, à 22° C) et déchargez la
batterie jusqu’à 50 pour cent. Avant de ranger votre MacBook Pro pour une période
de temps supérieure à cinq mois, déchargez la batterie jusqu’à environ 50 pour cent,
puis retirez-la de votre MacBook Pro. Pour conserver les capacités de la batterie, rechargez la batterie jusqu’à 50 pour cent tous les six mois environ.
Nettoyage du MacBook Pro Lorsque vous nettoyez le boîtier de votre MacBook Pro
et ses composants, éteignez d’abord le MacBook Pro, puis débranchez l’adaptateur secteur et retirez la batterie. Puis, pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon
doux, humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni
aérosols, ni dissolvants, ni abrasifs qui pourraient endommager les finitions de l’appareil.
Nettoyage du moniteur du MacBook Pro MacBook ProPour nettoyer l’écran du
MacBook Pro, éteignez tout d’abord l’ordinateur, débranchez l’adaptateur secteur, puis
retirez la batterie. Humidifiez ensuite, à l’eau seulement, un chiffon propre, doux et non
pelucheux et essuyez l’écran. Ne vaporisez jamais de liquide directement sur l’écran.Chapitre 5 Dernières recommandations 71
Ergonomie
Voici quelques conseils pour la mise en place d’un environnement de travail sain.
Clavier et trackpad
Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main
étant placée dans le prolongement du poignet.
Position
à éviter
Position
recommandée72 Chapitre 5 Dernières recommandations
Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou que
vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes.
Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail
continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs
aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste.
Souris externe
Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier.
Ménagez un espace suffisant pour la manipuler avec aisance.
Siège
Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale
et vos pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire,
c’est-à-dire la partie inférieure de votre dos. Suivez les instructions du fabricant de
sorte que le réglage du dossier soit parfaitement adapté à votre morphologie.
Position
à éviter
Position
recommandéeChapitre 5 Dernières recommandations 73
Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à
plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont
le poste de saisie est situé plus bas que le plan de travail.
Écran intégré
Orientez l’écran de manière à réduire le plus possible les reflets de l’éclairage
électrique et de la lumière du jour. Ne forcez pas l’écran si vous rencontrez une
résistance. L’angle d’ouverture maximal de l’écran ne peut dépasser 130 degrés.
Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez l’ordinateur ou que l’éclairage ambiant change.
Vous trouverez d’autres informations concernant l’ergonomie sur Internet:
Apple et l’environnement
Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses
produits et de ses activités sur l’environnement.
Des informations supplémentaires sont disponibles sur Internet:
www.apple.com/about/ergonomics
www.apple.com/fr/environment75
Regulatory Compliance Information
Compliance Statement
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2)
this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio or
television reception is suspected.
L‘utilisation de ce dispositif est autorisée seulement aux
conditions suivantes: (1) il ne doit pas produire de
brouillage et (2) l’utilisateur du dispositif doit être prêt à
accepter tout brouillage radioélectrique reçu, même si
ce brouillage est susceptible de compromettre le
fonctionnement du dispositif.
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference to
radio or television reception, try to correct the
interference by using one or more of the following
measures:
 Turn the television or radio antenna until the
interference stops.
 Move the computer to one side or the other of the
television or radio.
 Move the computer farther away from the television
or radio.
 Plug the computer into an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are on
circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple-authorized service
provider or Apple. See the service and support
information that came with your Apple product.
Or, consult an experienced radio/television technician
for additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc., could void the EMC
compliance and negate your authority to operate the
product.
This product has demonstrated EMC compliance under
conditions that included the use of compliant peripheral
devices and shielded cables (including Ethernet network
cables) between system components. It is important
that you use compliant peripheral devices and shielded
cables between system components to reduce the
possibility of causing interference to radios, television
sets, and other electronic devices.76
Responsible party (contact for FCC matters only):
Apple Inc. Corporate Compliance
1 Infinite Loop, M/S 26-A
Cupertino, CA 95014-2084
Wireless Radio Use
This device is restricted to indoor use when operating in
the 5.15 to 5.25 GHz frequency band.
Cet appareil doit être utilisé à l’intérieur.
Exposure to Radio Frequency Energy
The radiated output power of the AirPort Extreme
technology is below the FCC radio frequency exposure
limits. Nevertheless, it is advised to use the wireless
equipment in such a manner that the potential for
human contact during normal operation is minimized.
FCC Bluetooth Wireless Compliance
The antenna used with this transmitter must not be
colocated or operated in conjunction with any other
antenna or transmitter subject to the conditions of the
FCC Grant.
Bluetooth Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de la Class B respecte toutes les
exigences du Règlement sur le matériel brouilleur
du Canada.
Industry Canada Statement
Complies with the Canadian ICES-003 Class B
specifications. Cet appareil numérique de la classe B est
conforme à la norme NMB-003 du Canada. This device
complies with RSS 210 of Industry Canada.
Bluetooth Europe - Déclaration de conformité UE
Cet appareil sans fil est conforme à la directive R&TTE.
Europe : déclaration de conformité EU
The equipment complies with the RF Exposure
Requirement 1999/519/EC, Council Recommendation of
12 July 1999 on the limitation of exposure of the general
public to electromagnetic fields (0 Hz to 300 GHz.
Par la présente Apple Inc. déclare que l’appareil 802.11a/
b/g/n Mini-PCIe card est conforme aux exigences
essentielles et aux autres dispositions pertinentes de la
directive R&TTE.
Conforme aux directives européennes sur
la basse tension et la CEM. Consultez la page http://
www.apple.com/euro/compliance.
Korea Statements
Singapore Wireless Certification77
Taiwan Wireless Statements
Taiwan Class B Statement
VCCI Class B Statement
External USB Modem Information
When connecting your MacBook Pro to the phone line
using an external USB modem, refer to the
telecommunications agency information in the
documentation that came with your modem.
ENERGY STAR®
Compliance
As an ENERGY STAR®
partner, Apple has determined
that standard configurations of this product meet the
ENERGY STAR®
guidelines for energy efficiency. The
ENERGY STAR®
program is a partnership with electronic
equipment manufacturers to promote energy-efficient
products. Reducing energy consumption of products
saves money and helps conserve valuable resources.
This computer is shipped with power management
enabled with the computer set to sleep after 10 minutes
of user inactivity. To wake your computer, click the
mouse or trackpad button or press any key on the
keyboard.
For more information about ENERGY STAR®, visit:
www.energystar.gov 78
Informations sur l’élimination et le recyclage
Le symbole ci-dessus signifie que vous devez vous
débarrasser de votre produit selon les normes et la
législation de votre pays. Étant donné que la lampe de
rétro-éclairage dans le MacBook Pro de 17 pouces
contient du mercure, vous devez vous en débarrasser
séparément des ordures ménagères. Lorsque votre
produit n’est plus utilisable, contactez Apple ou les
autorités locales afin de connaître les possibilités de
recyclage.
Pour en savoir plus sur le programme de
recyclage d’Apple, consultez le site
www.apple.com/fr/environment/recycling.79
Informations sur l’enlèvement de la batterie
Jetez vos batteries usagées en respectant les lois et les
consignes environnementales de votre pays.
California: The coin cell battery in your product contains
perchlorates. Special handling and disposal may apply.
Refer to www.dtsc.ca.gov/hazardouswaste/perchlorate.
Deutschland: Dieses Gerät enthält Batterien. Bitte nicht
in den Hausmüll werfen. Entsorgen Sie dieses Gerätes
am Ende seines Lebenszyklus entsprechend der
maßgeblichen gesetzlichen Regelungen.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca) worden
gedeponeerd.
Taïwan:
Union européenne—instructions concernant
l’élimination des déchets :
Le symbole ci-dessus signifie que vous devez vous
débarrasser de votre produit sans le mélanger avec les
ordures ménagères, selon les normes et la législation de
votre pays. Lorsque ce produit n’est plus utilisable,
portez-le dans un centre de traitement des déchets
agréé par les autorités locales. Certains centres
acceptent les produits gratuitement. Le traitement et le
recyclage séparé de votre produit lors de son
élimination aideront à préserver les ressources naturelles
et à protéger l’environnement et la santé des êtres
humains.K Apple Inc.
© 2007 Apple Inc. Tous droits réservés.
En application des lois et conventions en vigueur,
aucune reproduction totale ni partielle du manuel n’est
autorisée, sauf consentement écrit préalable d’Apple.
Tout a été mis en œuvre pour que les informations pré-
sentées dans ce manuel soient exactes. Apple n’est pas
responsable des erreurs de reproduction ou d’impression.
Apple
1 Infinite Loop
Cupertino, CA 95014-2084
408-996-1010
www.apple.com
Apple, le logo Apple, AirPort, AirPort Express, AirPort
Extreme, Exposé, FileVault, FireWire, GarageBand, iCal,
iLife, iMovie, iPhoto, iPod, iSight, iTunes, Keynote, Mac,
MacBook, Macintosh, Mac OS, MagSafe et SuperDrive
sont des marques d’Apple Inc. déposées aux États-Unis
et dans d’autres pays.
Cover Flow, Finder, le logo FireWire, iPhone, iWeb, Safari
et Spotlight sont des marques d’Apple Inc.
AppleCare et Apple Store sont des marques de service
d’Apple Inc. déposées aux États-Unis et dans d’autres
pays.
iTunes Store est une marque de service d’Apple Inc.
ENERGY STAR®
est une marque déposée aux États-Unis.
Intel, Intel Core et Xeon sont des marques d’Intel Corp.
aux États-Unis et dans d’autres pays.
La marque et les logos Bluetooth®
sont la propriété
de Bluetooth SIG, Inc. et sont utilisés sous licence
par Apple Inc.
Les autres noms de produits et de sociétés sont la
propriété de leurs détenteurs respectifs. Les produits
commercialisés par des entreprises tierces ne sont mentionnés que pour information, sans aucune intention
de préconisation ni de recommandation. Apple décline
toute responsabilité quant à l’utilisation et au fonctionnement de ces produits.
Fabriqué sous licence de Dolby Laboratories. « Dolby »,
« Pro Logic » et le logo double-D sont des marques
déposées de Dolby Laboratories. Travaux confidentiels
inédits. © 1992–1997 Dolby Laboratories, Inc. Tous droits
réservés.
Le produit décrit dans le présent manuel intègre des
technologies de protection de droits d’auteur ellesmêmes protégées par divers brevets américains ainsi
que d’autres droits de propriété intellectuelle appartenant à Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection
des droits d’auteurs doit être autorisée par Macrovision
Corporation et est destinée à un cadre privé ou de
visualisation restreinte, sauf consentement de Macrovision Corporation. Tout démontage ou ingénierie inverse
est interdit.
Réclamations concernant l’appareillage aux États-Unis.
Brevets n˚ 4 631 603, 4 577 216, 4 819 098 et 4 907 093
sous licence à des fins de visualisation limitée
uniquement.
Publié simultanément aux États-Unis et au Canada.
Mac OS X Server
Mise à niveau et migration
Pour Leopard version 10.5 Apple Inc.
© 2007 Apple Inc. Tous droits réservés.
Le propriétaire ou l’utilisateur autorisé d’un exemplaire
enregistré du logiciel Mac OS X Server peut reproduire
cette publication aux fins d’apprentissage du logiciel.
Cette publication ne peut être reproduite ou transmise
en tout ou partie à des fins commerciales, comme la
vente de copies de cette publication ou la fourniture
d’un service d’assistance payant.
Tous les efforts nécessaires ont été mis en œuvre pour
que les informations contenues dans ce manuel soient
les plus exactes possibles. Apple Inc. n’est pas responsable des erreurs d’impression ou de reproduction.
Apple
1 Infinite Loop
Cupertino CA 95014-2084
www.apple.com
Le logo Apple est une marque d’Apple Inc., déposée aux
États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales
de ce logo via le clavier (Option + 1) pourra constituer
un acte de contrefaçon et/ou de concurrence déloyale.
Apple, le logo Apple, iChat, Mac, Macintosh, QuickTime,
Xgrid et Xserve et WebObjects sont des marques d’Apple
Computer, Inc. déposées aux États-Unis et dans d’autres
pays. Finder est une marque d’Apple Inc.
Adobe et PostScript sont des marques d’Adobe Systems
Incorporated.
Intel, Intel Core et Xeon sont des marques d’Intel Corp.
aux États-Unis et dans d’autres pays.
JavaTM et tous les logos et marques dérivés de Java sont
des marques ou des marques déposées de Sun Microsystems, Inc. aux États-Unis et dans d’autres pays.
PowerPCTM et le logo PowerPC TM sont des marques
d’International Business Machines Corporation utilisées
sous licence.
UNIX est une marque de The Open Group.
Les autres noms de sociétés et de produits mentionnés
ici sont des marques de leurs détenteurs respectifs.
La mention de produits tiers n’est effectuée qu’à des fins
informatives et ne constitue en aucun cas une approbation ni une recommandation. Apple n’assume aucune
responsabilité vis-à-vis des performances ou de l’utilisation de ces produits.
F019-0937/01-09-2007 3
1 Table des matières
Préface 5 À propos de ce guide
5 Contenu de ce guide
6 Utilisation de ce guide
6 Utilisation de l’aide à l’écran
7 Guides d’administration de Mac OS X Server
8 Visualisation de guides au format PDF à l’écran
8 Impression des guides PDF
9 Obtenir des mises à jour de documentation
9 Pour obtenir des informations supplémentaires
Chapitre 1 11 Avant de commencer
11 Serveurs à partir desquels réaliser une mise à niveau ou une migration
11 Mise à niveau à la version 10.5
12 Migration vers la version 10.5 des serveurs antérieurs à la version 10.5
12 Migration à partir de Windows NT
12 Migration d’utilisateurs et de groupes
13 Enregistrement et réutilisation des comptes d’utilisateur et de groupe
13 Comptes système
15 Application d’un nouveau numéro de série
Chapitre 2 17 Mise à niveau de Mac OS X Server 10.4
17 Éléments pouvant être réutilisés
18 Mise à niveau d’un maître Open Directory et de ses répliques
19 Instructions pas à pas
27 Mise à niveau du serveur web Apache vers la version 2.2 à partir de la version 1.3
Chapitre 3 29 Migration à partir de Mac OS X Server 10.4
29 Avant de commencer
30 Éléments pouvant migrer
31 Outils pouvant être utilisés
32 Instructions pas à pas
Chapitre 4 51 Mise à niveau de Mac OS X Server 10.3
51 Éléments pouvant être réutilisés4 Table des matières
52 Mise à niveau d’un maître Open Directory et de ses répliques
53 Instructions pas à pas
61 Mise à niveau du serveur web Apache vers la version 2.2 à partir de la version 1.3
Chapitre 5 63 Migration à partir de Mac OS X Server 10.3
63 Avant de commencer
64 Éléments pouvant migrer
65 Outils pouvant être utilisés
66 Instructions pas à pas
Chapitre 6 85 Migration à partir de Mac OS X Server 10.2
85 Avant de commencer
86 Éléments pouvant migrer
86 Outils pouvant être utilisés
87 Instructions pas à pas
Chapitre 7 99 Migration vers Mac OS X Server à partir de Windows NT
100 Avant de commencer
100 Éléments pouvant migrer
101 Ce que les utilisateurs migrés peuvent faire
102 Planification de votre migration
107 Outils pouvant être utilisés
107 Outils de migration d’utilisateurs, de groupes et d’ordinateurs
108 Outils de migration du service de fichiers
108 Outils pour fournir à Windows l’accès au service d’impression
108 Instructions pas à pas
108 Migration d’utilisateurs, de groupes et d’ordinateurs
119 Migration du service de fichiers Windows
123 Accès de Windows au service d’impression
Index 127 5
Préface
À propos de ce guide
Utilisez ce guide pour passer à Mac OS X Server 10.5 depuis
une version antérieure du serveur ou pour faire migrer des
données Windows NT vers Mac OS X Server 10.5.
Mise à niveau et migration contient des instructions sur la réutilisation de données
et de réglages de versions antérieures du serveur. Il existe deux approches :
 Effectuez une installation de mise à niveau. Cette approche conserve l’ensemble de vos
données et réglages et vous permet de réutiliser votre serveur pour Mac OS X Server 10.5.
Vous pouvez effectuer une installation de mise à niveau de serveurs 10.4 et 10.3.
 Faites migrer manuellement les données et réglages. Cette approche transfère les
données et réglages vers un ordinateur distinct qui exécute Mac OS X Server 10.5.
Vous pouvez faire migrer des données et des réglages depuis les versions 10.4, 10.3
et 10.2 du serveur.
Contenu de ce guide
Ce guide comprend les chapitres suivants :
 Le Chapitre 1, « Avant de commencer » récapitule les options et la configuration
requise pour la mise à niveau et la migration.
 Le Chapitre 2, « Mise à niveau de Mac OS X Server 10.4 » décrit la mise à niveau d’un serveur 10.4.10 ou ultérieur vers la version 10.5.
 Le Chapitre 3, « Migration à partir de Mac OS X Server 10.4 » décrit la migration de données d’un serveur 10.4.10 ou ultérieur vers un autre ordinateur exécutant la version 10.5.
 Le Chapitre 4, « Mise à niveau de Mac OS X Server 10.3 » décrit la mise à niveau d’un serveur 10.3.9 vers la version 10.5.
 Le Chapitre 5, « Migration à partir de Mac OS X Server 10.3 » décrit la migration de données d’un serveur 10.3.9 vers un autre ordinateur exécutant la version 10.5.
 Le Chapitre 6, « Migration à partir de Mac OS X Server 10.2 » décrit la migration de données d’un serveur 10.2.8 vers un autre ordinateur exécutant la version 10.5.
 Le Chapitre 7, « Migration vers Mac OS X Server à partir de Windows NT » décrit
la migration de données d’un serveur Windows NT vers un ordinateur exécutant
Mac OS X Server 10.5.6 PréfaceÀ propos de ce guide
Utilisation de ce guide
Ce guide est simple d’utilisation. Lisez le chapitre 1 pour vous assurer de bien comprendre toutes les possibilités. Consultez ensuite le chapitre qui traite de la stratégie de mise
à jour ou de migration. Vous trouverez des instructions pas à pas sur la conservation et
la réutilisation de données de serveur à l’aide de divers outils et techniques manuelles.
Vous trouverez également des références à des instructions et des informations supplémentaires dans d’autres guides de la suite du serveur. La page suivante présente les documents
de la suite et comment y accéder.
Utilisation de l’aide à l’écran
L’application Visualisation Aide permet d’obtenir des instructions à l’écran tout en gérant
Leopard Server. L’aide peut être affichée sur un serveur ou sur un ordinateur administrateur. (Un ordinateur administrateur est un ordinateur Mac OS X sur lequel est installé le
logiciel d’administration de serveur Leopard Server.)
Pour obtenir de l’aide dans le cas d’une configuration avancée de Leopard Server :
m Ouvrez Admin Serveur ou Gestionnaire de groupe de travail, puis :
 Utilisez le menu Aide pour rechercher une tâche à exécuter.
 Choisissez Aide > Aide Admin Serveur ou Aide > Aide Gestionnaire de groupe de travail
avant d’explorer les rubriques d’aide et d’effectuer des recherches.
L’Aide l’écran contient des instructions issues de Administration du serveur et d’autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server ».
Pour visualiser les rubriques d’aide les plus récentes concernant les serveurs :
m Assurez-vous que le serveur ou l’ordinateur administrateur est connecté à Internet pendant
que vous consultez l’Aide.
Visualisation Aide extrait automatiquement les rubriques d’aide les plus récentes depuis
Internet et les stocke en mémoire cache. Lorsque vous n’êtes pas connecté à Internet,
Visualisation Aide affiche les rubriques d’aide mises en cache.Préface À propos de ce guide 7
Guides d’administration de Mac OS X Server
Premiers contacts couvre l’installation de base et les méthodes de configuration de départ
pour une configuration avancée de Leopard Server, ainsi que pour une configuration standard ou de groupe de travail. Le guide avancé Administration du serveur aborde la planification, l’installation, la configuration et d’autres opérations de façon avancée. Une série de
guides supplémentaires, énumérés ci-dessous, décrit la planification, la configuration, ainsi
que la gestion avancée des services individuels.Vous pouvez obtenir ces guides au format
PDF sur le site web de documentation de Mac OS X Server :
www.apple.com/fr/server/documentation
Ce guide ... explique comment :
Premiers contacts et
Feuille d’opération d’installation
et de configuration
Installer Mac OS X Server et le configurer pour la première fois.
Administration de ligne
de commande
Installer, configurer et gérer Mac OS X Server à l’aide de fichiers
de configuration et d’outils de ligne de commande UNIX.
Administration des services
de fichier
Partager certains volumes ou dossiers de serveur entre les clients
du serveur, à l’aide des protocoles AFP, NFS, FTP et SMB.
Administration du service iCal Configurer et gérer le service de calendrier partagé d’iCal.
Administration du service iChat Configurer et gérer le service de messagerie instantanée d’iChat.
Configuration de la sécurité
de Mac OS X
Renforcer la sécurité des ordinateurs (clients) Mac OS X,
comme l’exigent les entreprises et les organismes publics.
Configuration de la sécurité
de Mac OS X Server
Renforcer la sécurité de Mac OS X Server et de l’ordinateur
sur lequel il est installé, comme l’exigent les entreprises
et les organismes publics.
Administration du service
de messagerie
Configurer et gérer les services de messagerie IMAP, POP et SMTP
sur le serveur.
Administration des services
de réseau
Installer, configurer et administrer les services DHCP, DNS, VPN, NTP,
coupe-feu IP, NAT et RADIUS sur le serveur.
Administration d’Open Directory Configurer et gérer les services de répertoire et d’authentification,
ainsi que configurer les clients autorisés à accéder aux services
de répertoire.
Administration de Podcast Producer Configurer et gérer le service Podcast Producer destiné
à enregistrer, traiter et distribuer des podcasts.
Administration du service
d’impression
Héberger les imprimantes partagées et gérer les files d’attente
et travaux d’impression associés.
Administration de QuickTime
Streaming et Broadcasting
Capturer et encoder du contenu QuickTime. Configurer et gérer
le service QuickTime Streaming en vue de diffuser des données
multimédias en temps réel ou à la demande.
Administration du serveur Mettre en place l’installation et la configuration avancées
du logiciel serveur et gérer des options qui s’appliquent
à plusieurs services ou à l’intégralité du serveur.8 PréfaceÀ propos de ce guide
Visualisation de guides au format PDF à l’écran
Lorsque vous lisez la version PDF d’un guide à l’écran, vous pouvez :
 Afficher les signets pour visualiser le plan du guide et cliquer sur un signet pour accéder
directement à la section correspondante.
 Rechercher un mot ou une phrase pour afficher une liste des endroits où ce mot ou cette
phrase apparaît dans le document. Cliquez sur un de ces endroits pour afficher la page
correspondante.
 Cliquer sur une référence croisée pour accéder directement à la rubrique référencée.
Cliquez sur un lien pour visiter le site web dans votre navigateur.
Impression des guides PDF
Si vous devez imprimer un guide, procédez comme suit pour économiser du papier
et de l’encre :
 Économisez de l’encre ou du toner en évitant d’imprimer la couverture.
 Si vous disposez d’une imprimante couleur, économisez de l’encre en choisissant
une option d’impression en niveaux de gris ou en noir et blanc dans une des sections
de la zone de dialogue Imprimer.
 Réduisez le volume du document imprimé et économisez du papier en imprimant
plusieurs pages par feuille.Dans la zone de dialogue Imprimer, réglez Échelle sur 115 %
(155 % pour Premiers contacts). Choisissez ensuite Mise en page dans le menu local sans
titre. Si votre imprimante prend en charge l’impression recto verso (duplex),sélectionnez
l’une des options proposées. Sinon, choisissez 2 dans le menu local Pages par feuille et,
si vous le souhaitez, Simple extra fine dans le menu Bordure. (Si vous utilisez Mac OS X
10.4 ou antérieur, le réglage Échelle se trouve dans la zone de dialogue Format d’impression et les réglages relatifs à la mise en page dans la zone de dialogue Imprimer.)
Administration de Mise à jour de
logiciels et d’Imagerie système
Utiliser NetBoot, NetInstall et Mise à jour de logiciels pour automatiser
la gestion du système d’exploitation et des autres logiciels utilisés
par les ordinateurs clients.
Mise à niveau et migration Utiliser des réglages de données et de services correspondant
à une version antérieure de Mac OS X Server ou de Windows NT.
Gestion des utilisateurs Créer et gérer des comptes utilisateur, des groupes et des ordinateurs.
Configurer les préférences gérées des clients Mac OS X.
Administration des technologies
web
Configurer et gérer des technologies web telles que les blogs,
WebMail, wiki, MySQL, PHP, Ruby on Rails (RoR) et WebDAV.
Informatique à haute performance et administration Xgrid
Configurer et gérer des grappes de calcul de systèmes Xserve
et d’ordinateurs Mac.
Glossaire Mac OS X Server Savoir à quoi correspondent les termes utilisés pour les produits
de serveur et les produits de stockage.
Ce guide ... explique comment :Préface À propos de ce guide 9
Il peut s’avérer utile d’agrandir les pages imprimées même si vous n’imprimez pas en
recto verso, car la taille des pages PDF est inférieure à celle du papier d’imprimante standard. Dans la zone de dialogue Imprimer ou dans la zone de dialogue Format d’impression, essayez de régler Échelle sur 115 % (155 % pour Premiers contacts qui possède des
pages de la taille d’un CD).
Obtenir des mises à jour de documentation
Apple publie régulièrement des pages d’aide révisées ainsi que de nouvelles éditions
de ses guides. Certaines pages d’aide révisées sont des mises à jour des dernières éditions de ces guides.
 Pour afficher les nouvelles rubriques d’aide à l’écran d’une application de serveur, assurez-vous que votre serveur ou votre ordinateur administrateur est connecté à Internet
et cliquez sur le lien des dernières rubriques d’aide ou de mise à jour dans la page d’aide
principale de l’application.
 Pour télécharger les guides les plus récents en format PDF, rendez-vous sur le site web
de documentation de Mac OS X Server :
www.apple.com/fr/server/documentation
Pour obtenir des informations supplémentaires
Pour plus d’informations, consultez les ressources suivantes :
 Documents Ouvrez-moi : mises à jour importantes et informations spécifiques.
Recherchez-les sur les disques du serveur.
 Site web de Mac OS X Server (www.apple.com/fr/server/macosx) : passerelle vers
des informations détaillées sur de nombreux produits et technologies.
 Site web de service et d’assistance Mac OS X Server
(www.apple.com/fr/support/macosxserver) : accès à des centaines d’articles du
service d’assistance d’Apple.
 Site web de formation d’Apple (www.apple.com/fr/training) : cours dirigés par un instructeur et d’autoformation pour améliorer vos compétences d’administration serveur.
 Groupes de discussions Apple, en anglais, (discussions.apple.com) : un moyen de partager
questions, connaissances et conseils avec d’autres administrateurs.
 Site web des listes d’envoi Apple, en anglais, (www.lists.apple.com) : abonnez-vous
à des listes d’envoi afin de pouvoir communiquer par courrier électronique avec
d’autres administrateurs.1
11
1 Avant de commencer
Prenez un moment pour vous familiariser avec la configuration
requise et les options de mise à niveau et de migration.
Si vous utilisez Mac OS X Server 10.3 ou 10.4, il n’est peut-être pas nécessaire de faire migrer
les données du serveur vers un autre ordinateur. Une mise à niveau de votre serveur peut
s’avérer suffisante ; il s’agit d’un processus qui installe et configure Mac OS X Server 10.5 sur
votre ordinateur serveur existant tout en conservant les données et les réglages de service.
Serveurs à partir desquels réaliser une mise à niveau ou
une migration
Vous pouvez réutiliser les réglages et les données du serveur avec Mac OS X Server 10.5 en :
 mettant à niveau la version 10.4.10 ou ultérieure du serveur ou la version 10.3.9 ;
 effectuant une migration à partir des versions 10.4.10 ou ultérieures, de la version 10.3.9
ou de la version 10.2.8 ;
 effectuant une migration à partir de Windows NT.
Mise à niveau à la version 10.5
Vous pouvez mettre à niveau la version 10.4.10 ou ultérieure ou la version 10.3.9
de votre serveur à la version 10.5 ou ultérieure si :
 vous n’avez pas besoin de reformater le disque dur de l’ordinateur actuel ;
 le matériel de votre serveur est équipé des éléments suivants :
 un processeur Intel ou PowerPC G5 ou G4 cadencé à 1 GHz ou plus ;
 au moins 1 Go de mémoire vive (RAM) ;
 20 Go minimum d’espace disque disponible.
La mise à niveau d’un serveur consiste à installer une mise à niveau sur votre ordinateur
serveur à partir des disques d’installation du serveur.Vos données et vos réglages sont
conservées automatiquement, et vous n’avez que très peu de réglages manuels à effectuer.
Remarque :Mac OS X Server 10.5 ne prend pas en charge le Gestionnaire Macintosh.12 Chapitre 1Avant de commencer
Migration vers la version 10.5 des serveurs antérieurs à la version 10.5
Même si votre serveur existant respecte la configuration minimale requise pour la mise
à niveau, il est parfois préférable d’effectuer une migration. Par exemple, il se peut que
vous soyez en train de mettre des ordinateurs à jour et que vous décidiez de rétablir
votre environnement serveur sur des ordinateurs plus récents.
Les migrations à partir des versions 10.4.10 ou ultérieures, 10.3.9 et 10.2.8 de Mac OS X
Server sont prises en charge. Effectuer une migration consiste à installer et à configurer Mac OS X Server 10.5 sur un ordinateur, à restaurer sur cet ordinateur désormais
équipé de la version 10.5 les fichiers qui se trouvent sur l’ordinateur tournant sous la
version antérieure à la version 10.5, puis à effectuer les réglages manuels éventuellement nécessaires.
Remarque :la migration des données du Gestionnaire Macintosh n’est pas prise en charge.
Vous devez effectuer une migration, et non une mise à niveau, vers la version 10.5
de Mac OS X Server si :
 le disque dur de votre serveur 10.2.8, 10.3.9, 10.4.10 ou ultérieur a besoin d’être reformaté.
 votre serveur 10.2.8, 10.3.9, 10.4.10 ou ultérieur ne dispose pas de :
 un processeur Intel ou PowerPC G5 ou G4 cadencé à 1 GHz ou plus ;
 au moins 1 Go de mémoire vive (RAM) ;
 au moins 20 Go d’espace disque disponible ;
 vous souhaitez déplacer sur un autre serveur les données et les réglages que vous
utilisiez sur un serveur 10.2.8, 10.3.9, 10.4.10 ou ultérieur ;
 la version du serveur que vous utilisiez jusqu’à présent est antérieure à la version 10.2.8.
Migration à partir de Windows NT
Mac OS X Server permet d’offrir divers services aux utilisateurs d’ordinateurs tournant
sous Microsoft Windows 95, 98, ME (Millennium Edition), XP, Vista, NT 4 et 2000. En fournissant ces services, Mac OS X Server peut remplacer les serveurs Windows NT dans les
petits groupes de travail.
Le chapitre 7, « Migration vers Mac OS X Server à partir de Windows NT » explique comment importer des utilisateurs, des groupes et des ordinateurs dans un contrôleur de
domaine principal (PDC) Mac OS X Server depuis un serveur Microsoft Windows NT. Il
fournit également des explications sur la migration des répertoires de départ, des points
de partage et des informations de configuration du serveur.
Migration d’utilisateurs et de groupes
Toutes les versions de Mac OS X Server à partir desquelles vous pouvez effectuez une
migration sont prises en charge par les outils conçus pour vous aider à déplacer les
comptes utilisateurs et de groupe depuis un serveur existant vers un serveur 10.5.Chapitre 1 Avant de commencer 13
Enregistrement et réutilisation des comptes d’utilisateur et de groupe
Pour enregistrer les comptes utilisateurs et de groupe destinés à être importés ultérieurement, créez une copie de sauvegarde de la base de données du maître Open Directory ou exportez les comptes utilisateurs et de groupe à l’aide du Gestionnaire de
groupe de travail. Pour restaurer les comptes utilisateurs et de groupe, restaurez la base
de données du maître Open Directory ou utilisez le Gestionnaire de groupe de travail
ou l’outil dsimport.
Chaque chapitre traitant de la migration fournit des instructions relatives à l’utilisation
de ces outils.
Comptes système
Lorsque vous installez Mac OS X Server, plusieurs comptes utilisateurs et de groupe
sont créés dans le répertoire local. Ces comptes sont parfois appelés comptes système
parce qu’ils sont utilisés par le logiciel système du serveur. Pour savoir comment les
comptes prédéfinis sont utilisés, reportez-vous à Gestion des utilisateurs.
Il n’est pas possible de modifier le nom des identifiants des comptes système. Il est donc
inutile d’essayer de le faire lorsque vous faites migrer des utilisateurs et des groupes. En
revanche, vous pouvez, lors de la migration, ajouter des utilisateurs aux deux groupes système — admin et wheel :
 Les groupes wheel et admin offrent la possibilité à leurs membres d’utiliser la commande
su (substitut d’utilisateur) de l’application Terminal pour ouvrir une session en tant qu’utilisateur root sur un ordinateur distant (pour pouvoir se servir de la commande su, les
membres de ces groupes doivent connaître le mot de passe root).
Utilisez la commande ssh pour ouvrir une session, tapez su, puis indiquez le mot
de passe root lorsque vous y êtes invité.
 Les membres du groupe admin ont le droit d’administrer Mac OS X Server. Les utilisateurs admin peuvent utiliser les applications de gestion du serveur et installer des
logiciels qui nécessitent des autorisations administrateur. Par défaut, les membres
du groupe admin peuvent obtenir le privilège root à l’aide de la commande sudo.
Voici les comptes d’utilisateur prédéfinis :
Nom Nom abrégé Id. Util.
Utilisateur sans autorisation nobody -2
Administrateur système root 0
Services système daemon 1
Services d’impression lp 26
Utilisateur Postfix postfix 27
Clé VPN MPPE vpn_nnnnnnnnnnnn 57
Serveur World Wide Web www 7014 Chapitre 1Avant de commencer
Voici les groupes prédéfinis :
Utilisateur Apple Events eppc 71
Serveur MySQL MySQL 74
sshd (séparation des autorisations) sshd 75
QuickTime Streaming Server
(QTSS)
qtss 76
Utilisateur Cyrus IMAP cyrus 77
Utilisateur Mailman mailman 78
Serveur d’applications appserver 79
Utilisateur Clamav clamav 82
Utilisateur Amavisd amavisd 83
Utilisateur Jabber jabber 84
Xgrid Controller xgridcontroller 85
Xgrid Agent xgridagent 86
Propriétaire de l’application appowner 87
WindowServer WindowServer 88
Utilisateur inconnu unknown 99
Nom Nom abrégé Id. Util.
Nom abrégé Id. de groupe
nobody -2
nogroup -1
wheel 0
daemon 1
kmem 2
sys 3
tty 4
operator 5
mail 6
bin 7
staff 20
lp 26
postfix 27
postdrop 28
utmp 45
uucp 66
dialer 68Chapitre 1 Avant de commencer 15
Application d’un nouveau numéro de série
Si vous effectuez une mise à niveau vers Mac OS X Server 10.5 à partir de la version 10.4,
vous devez configurer votre système de façon à ce qu’il utilise un numéro de série prévu
pour la version 10.5.
network 69
www 70
MySQL 74
sshd 75
qtss 76
mailman 78
appserverusr 79
admin 80
appserveradm 81
clamav 82
amavisd 83
jabber 84
xgridcontroller 85
xgridagent 86
appowner 87
WindowServer 88
accessibility 90
unknown 99
Nom abrégé Id. de groupe2
17
2 Mise à niveau de
Mac OS X Server 10.4
Suivez les instructions qui apparaissent dans ce chapitre
pour mettre à niveau un serveur 10.4.10 ou ultérieur vers
la version 10.5.
Vous pouvez mettre à niveau les ordinateurs qui tournent sous Mac OS X Server 10.4.10
ou ultérieur si leur disque dur n’a pas besoin d’être reformaté et s’ils présentent les caractéristiques suivantes :
 un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus ;
 au moins 1 Go de mémoire vive (RAM) ;
 au moins 20 Go d’espace disque disponible.
Éléments pouvant être réutilisés
Lorsque vous effectuez une mise à niveau à partir de Mac OS X Server 10.4.10 ou ultérieur,
quasiment toutes les données et tous les réglages existants sont conservés et peuvent être
réutilisés.Toutefois, tenez compte des remarques suivantes :
 Il est possible de réutiliser les images NetBoot créées avec les versions 10.3 et 10.4
de Mac OS X Server,mais pas celles qui ont été créées avec des versions antérieures.
 Lorsque vous effectuez une mise à niveau vers Mac OS X Server 10.5, les démons de
lancement (/Système/Bibliothèque/LaunchDaemons) sont remplacés par leur version
Mac OS X Server 10.5.
 Les mises à niveau vers la version 10.5 suppriment l’application QTSS Publisher mais laissent les fichiers utilisés par celle-ci. En principe, ces fichiers doivent continuer à fonctionner normalement avec la version 10.5,mais vous devez les déplacer jusqu’aux emplacements appropriés. Pour en savoir plus sur le déplacement de ces fichiers, reportez-vous
à « Fichiers et dossiers de QTSS Publisher » à la page 48.18 Chapitre 2Mise à niveau de Mac OS X Server 10.4
 PHP :Hypertext Preprocessor (PHP) 4 deviendra obsolète le 31 décembre 2007, et plus
aucun correctif de sécurité critique ne sera mis au point après le 8 août 2008, comme
annoncé sur le site web www.php.net. Si vous effectuez une mise à niveau vers Mac OS X
Server 10.5 et que vous conservez PHP 4.4.x et Apache 1.3,songez à passer à PHP 5.x
et Apache 2.2 avant le 8 août 2008 afin d’assurer la continuité de la sécurité de PHP.
Remarque :le Gestionnaire Macintosh n’est pas pris en charge sous Mac OS X Server 10.5.
Mise à niveau d’un maître Open Directory et de ses répliques
Si le serveur que vous voulez mettre à niveau est un maître ou une réplique Open
Directory, mettez tout d’abord à niveau le maître, et ensuite les répliques.
Pour mettre à niveau le maître et ses répliques :
1 Mettez le maître à niveau vers la version 10.5 en suivant les instructions indiquées
dans « Instructions pas à pas » à la page 19.
Pendant la mise à niveau du maître, les ordinateurs clients ne peuvent pas se connecter
à ce dernier pour accéder aux services Open Directory.
Il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai lors de la
recherche automatique d’une réplique de serveur Open Directory. Vous pouvez supprimer
ce délai en modifiant le service DHCP de sorte qu’il utilise l’adresse d’une réplique de serveur Open Directory si le serveur fournit une adresse de serveur LDAP aux clients.
Lorsque la mise à niveau du maître est terminée, vous pouvez modifier le service DHCP
pour utiliser l’adresse du maître. Pour obtenir des instructions sur la configuration des
réglages LDAP relatifs au service DHCP, reportez-vous à Administration des services
de réseau.
2 Mettez chaque réplique de serveur à niveau vers la version 10.5.
3 À l’aide d’Admin Serveur, connectez-vous à chaque réplique de serveur, puis reconnectez
les répliques avec le maître.
Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître,
consultez la section « Services de répertoire » à la page 25.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 19
Instructions pas à pas
Pour mettre à niveau un serveur 10.4.10 ou ultérieur vers la version 10.5,suivez les instructions de cette rubrique.
Étape 1 :mettez votre serveur à jour vers la version 10.4.10 ou ultérieure
Au besoin, servez-vous de la Mise à jour de logiciels pour mettre votre serveur
à jour vers la version 10.4.10 ou ultérieure.
Étape 2 :enregistrez tous les réglages de service
Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service pour
pouvoir vous y reporter ultérieurement. Par ailleurs,servez-vous des Informations Système
pour générer un profil complet de votre système. Enregistrez les réglages de service exportés et le profil de votre serveur sur un disque amovible ou sur un autre système.
Important :avant la mise à niveau, il est également recommandé de créer un clone complet et démarrable du serveur et de le tester en le démarrant afin de disposer d’une copie
de sauvegarde au cas où elle s’avérerait nécessaire par la suite.
Étape 3 :enregistrez les réglages du service d’impression
Enregistrez les réglages du service d’impression à l’aide de la commande serveradmin
settings print avant de démarrer la mise à niveau.
serveradmin settings print > exported_print_settings
Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir
les utiliser ultérieurement.
Étape 4 :effectuez une mise à niveau vers la version 10.5
Vous pouvez vous servir du disque d’installation de la version 10.5 pour effectuer
la mise à niveau au niveau local sur votre ordinateur serveur si ce dernier est relié
à un écran, à un clavier et à un lecteur optique.
1 Mettez votre serveur à jour vers
la dernière version 10.3 du serveur.
2 Effectuez une installation de
mise à niveau vers la version 10.4.
3 Effectuez les réglages nécessaires
après l'installation initiale du serveur.20 Chapitre 2Mise à niveau de Mac OS X Server 10.4
Une fois la mise à niveau terminée, l’ordinateur redémarre et l’Assistant du serveur vous
indique la marche à suivre pour la configuration initiale de ce dernier. Vos réglages existants sont affichés et vous pouvez les modifier si vous le souhaitez.
Pour effectuer une mise à niveau vers la version 10.5 et configurer les réglages
initiaux du serveur au niveau local :
1 Assurez-vous que les serveurs DHCP ou DNS dont dépend votre serveur sont en marche.
2 Allumez l’ordinateur et insérez le disque d’installation dans le lecteur optique.
3 Redémarrez le serveur tout en maintenant la touche C du clavier enfoncée.
L’ordinateur démarre à partir du disque d’installation. Vous pouvez relâcher la touche
C lorsque le logo Apple s’affiche.
Pour obtenir des informations sur le redémarrage d’un système Xserve sans périphérique
de contrôle, reportez-vous au Guide de l’utilisateur qui vous a été fourni avec le système.
4 Lorsque le programme d’installation s’ouvre, suivez les instructions à l’écran de chaque
sous-fenêtre en cliquant sur Continuer pour passer à la suivante.
Remarque :dans la sous-fenêtre Sélectionner une destination, assurez-vous de sélectionner le disque ou la partition sur lequel la version 10.4.10 ou ultérieure est installée.
Au cours de l’installation, l’état d’avancement des opérations est affiché.
Une fois l’installation terminée, l’ordinateur redémarre et l’Assistant du serveur s’ouvre
pour vous permettre de procéder à la configuration initiale du serveur.
5 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées.
Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier
si vous le souhaitez.
Pour chaque serveur que vous mettez à niveau, saisissez un numéro de série unique
de logiciel serveur. Vous trouverez ce numéro imprimé sur les documents fournis
avec le logiciel. Si vous possédez une licence de site, vous devez saisir le nom du propriétaire enregistré et l’organisation exactement tels qu’ils ont été spécifiés par votre
représentant Apple.
Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé
des données.
6 Révisez les données de configuration, et cliquez sur Revenir si vous souhaitez les modifier.
7 Pour lancer la configuration du serveur, cliquez sur Appliquer.
8 Au terme de la configuration du serveur, cliquez sur Redémarrer.
Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie
après la mise à niveau du serveur.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 21
Pour effectuer une mise à niveau vers la version 10.5 et configurer à distance
les réglages initiaux du serveur :
1 Assurez-vous que les serveurs DHCP ou DNS dont dépend votre serveur sont en marche.
2 Démarrez l’ordinateur à partir du disque d’installation.
La procédure suivie dépend de la présence ou de l’absence sur le serveur cible d’un
lecteur optique capable de lire votre disque d’installation. Si vous disposez d’un DVD
d’installation, le lecteur optique doit pouvoir lire les DVD.
Si le serveur cible est muni d’un clavier et d’un lecteur optique capable de lire votre disque
d’installation, insérez ce dernier dans le lecteur optique, puis redémarrez l’ordinateur tout
en maintenant la touche C du clavier enfoncée.
Si le serveur cible est un système Xserve équipé d’un lecteur optique intégré capable
de lire votre disque d’installation, démarrez le serveur à l’aide du disque d’installation
en suivant les instructions du Guide de l’utilisateur Xserve relatives au démarrage à partir d’un disque système.
Si le serveur cible ne dispose pas d’un lecteur optique intégré capable de lire votre disque
d’installation, vous pouvez le démarrer en mode disque cible et insérer le disque d’installation dans le lecteur optique de votre ordinateur administrateur.Vous pouvez aussi vous servir d’un lecteur optique FireWire externe.
Si le serveur cible est un système Xserve, vous pouvez déplacer son module de disque
sur un autre système Xserve équipé d’un lecteur optique capable de lire votre disque
d’installation.
Vous trouverez des instructions relatives à l’utilisation du mode disque cible et des lecteurs
optiques externes dans le guide Présentation, dans le guide Premiers contacts ou dans
le Guide de l’utilisateur fournis avec votre système Xserve ou votre ordinateur Macintosh.
3 Sur un ordinateur administrateur, naviguez jusqu’à /Applications/Server/, ouvrez l’Assistant
du serveur (il n’est pas nécessaire que vous disposiez des privilèges d’administrateur sur
l’ordinateur local pour pouvoir utiliser l’Assistant du serveur), puis sélectionnez « Installer
les logiciels sur un serveur distant ».
4 Identifiez le serveur que vous souhaitez mettre à niveau.
Si celui-ci se trouve sur le sous-réseau local, sélectionnez-le dans la liste.
Sinon, cliquez sur Serveur à l’adresse IP puis saisissez une adresse IP au format IPv4
(000.000.000.000).
5 Lorsque vous êtes invité à saisir un mot de passe, tapez l’ancien mot de passe
d’administrateur.
6 Avancez dans les écrans d’installation en suivant les instructions affichées.22 Chapitre 2Mise à niveau de Mac OS X Server 10.4
7 Lorsque la sous-fenêtre Volumes apparaît,sélectionnez un disque ou un volume (partition)
cible et cliquez sur Continuer.
Au cours de l’installation, l’état d’avancement des opérations est affiché.
Une fois l’installation terminée, l’ordinateur redémarre, puis l’Assistant du serveur s’ouvre
et une sous-fenêtre Bienvenue apparaît.
8 Pour lancer la configuration du serveur, sélectionnez « Configurer un serveur distant »
et cliquez sur Continuer.
9 Dans la colonne Appliquer de la sous-fenêtre Destination, cochez le serveur que vous
mettez à niveau, puis tapez son mot de passe prédéfini dans le champ Mot de passe
et cliquez sur Continuer pour vous connecter au serveur.
Si le serveur n’apparaît pas dans la liste, cliquez sur Ajouter pour l’ajouter ou Actualiser
pour voir s’il est disponible.
10 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées.
Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier
si vous le souhaitez.
Pour chaque serveur que vous mettez à niveau, vous devez saisir un numéro de série unique de logiciel serveur.Vous trouverez ce numéro imprimé sur les documents fournis avec
le logiciel. Si vous possédez une licence de site,saisissez le nom du propriétaire enregistré
et celui de son organisation tels qu’ils ont été spécifiés par votre représentant Apple.
Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé
des données.
11 Révisez les données de configuration, en cliquant de manière facultative sur Revenir
pour les modifier.
12 Pour lancer la configuration du serveur, cliquez sur Appliquer.
13 Au terme de la configuration du serveur, cliquez sur Redémarrer.
Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie
après la mise à niveau du serveur.
Étape 5 :procédez aux ajustements nécessaires au terme de la configuration initiale
du serveur
Vous pouvez désormais utiliser le Gestionnaire de groupe de travail, Admin Serveur,
Terminal ainsi que d’autres applications pour affiner les réglages de votre serveur et tirer
parti des nouvelles fonctionnalités de la version 10.5.
Pour obtenir des explications relatives aux nouvelles fonctionnalités et à celles qui ont été
modifiées, reportez-vous au guide d’administration de chaque service.Voici quelques suggestions intéressantes.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 23
Réglages du service d’impression
Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer
à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés.
Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes
au serveur et les allumez. Toutefois, vous devez ajouter les imprimantes réseau en cliquant
sur Admin Serveur > Imprimer (pour les imprimantes LPR ou AppleTalk) ou sur Préférences Système > Imprimantes et fax (pour tous les types d’imprimante).
Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de
lui redonner le même nom que celui qu’elle avait avant le processus de mise à niveau.
Si le nom est différent, Admin Serveur n’importe pas les réglages correctement.
Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD générique) »
pour toute file d’attente appliquant des quotas étant donné qu’il existe des problèmes
connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour en
savoir plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous trouverez à l’adresse suivante :
http://docs.info.apple.com/article.html?artnum=303538.
Une fois les files d’attente d’impression créées, importez les réglages enregistrés :
réglages serveradmin exported_print_settings
WebObjects
Restaurez httpd.conf à la version précédente (httpd.conf.AppleSaved), ou incluez la ligne
suivante dans le nouveau fichier httpd.conf :
Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf
Si vous n’avez pas installé JavaTM 1.4.2 sur votre serveur 10.4.10 ou ultérieur, vous devez
mettre manuellement à jour les projets d’application WebObjects pour pouvoir utiliser
la version de la Machine virtuelle Java (JVM, Java Virtual Machine) qui vous a été fournie
avec la version 10.5.24 Chapitre 2Mise à niveau de Mac OS X Server 10.4
Pour mettre à jour un projet WebObjects :
1 Ouvrez le projet dans Xcode.
2 Dans la présentation Expert des réglages de la cible principale, changez la valeur
de la propriété de JAVA_VM à java.
Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin Serveur.
Si le serveur que vous mettez à niveau comprend l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services
WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportez-vous à Administration des technologies web et Déploiement de WebObjects.
Certificats Secure Sockets Layer (SSL)
Servez-vous d’Admin Serveur pour importer les certificats SSL existants que vous souhaitez
continuer à utiliser pour les services iChat,Open Directory, de messagerie ou web.
Pour importer un certificat SSL :
1 Ouvrez Admin Serveur.
2 Dans la liste des ordinateurs et des services, sélectionnez le serveur mis à niveau.
3 Cliquez sur Certificats.
4 Importez les certificats que vous souhaitez utiliser.
Vous pouvez aussi créer un certificat auto-signé et générer une demande de signature
de certificat (CSR, Certificate Signing Request) afin d’obtenir un certificat SSL délivré
par une autorité de certificat, puis installer celui-ci.
5 Cliquez sur Enregistrer.
6 Activez les certificats de chaque service.
Pour en savoir plus sur l’importation, la création et l’activation des certificats auto-signés,
reportez-vous à Administration du service iChat, à Administration du service de messagerie,
Administration d’Open Directory et à Administration des technologies web.
Groupes
Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités de la version 10.5 telles que l’emboîtement et la vérification plus stricte de l’adhésion de groupe,
mettez les fiches de groupe à niveau à l’aide du Gestionnaire de groupe de travail.
Pour mettre à niveau un enregistrement de groupe :
1 Ouvrez Gestionnaire de groupe de travail.
2 Ouvrez le répertoire qui contient les groupes concernés.
3 Sélectionnez un ou plusieurs groupes, puis cliquez sur « Mettre à niveau le groupe hérité ».
4 Cliquez sur Enregistrer.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 25
Services de répertoire
Après la mise à niveau, il est conseillé de convertir un répertoire NetInfo partagé en LDAP.
Pour obtenir des informations sur les avantages de l’utilisation du protocole LDAP et pour
savoir comment effectuer la conversion à l’aide d’Admin Serveur, reportez-vous à Administration d’Open Directory.
Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est pas
activé,servez-vous de la commande suivante qui permet de conserver les mots de passe
existants et de les ajouter à un nouveau centre de distribution de clés (KDC, Key Distribution Center) :
slapconfig -kerberize
Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés
et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous pouvez vous servir du Gestionnaire de groupe de travail pour les mettre à niveau et les convertir ainsi en mots de passe Open Directory.
Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez au
répertoire dans lequel réside le compte utilisateur. Authentifiez-vous en tant qu’administrateur de domaine, puis sélectionnez un utilisateur avec un mot de passe crypté. Cliquez
sur Avancé, choisissez Open Directory dans le menu local Type du mot de passe, cliquez
sur Élémentaires,spécifiez un nouveau mot de passe, puis cliquez sur Enregistrer.
Pour en savoir plus sur slapconfig, reportez-vous à sa page man.
Listes de contrôle d’accès LDAP
En raison d’un changement de format, vous devez déplacer manuellement les listes
de contrôle d’accès (ACL, Access Control List) LDAP une fois la mise à niveau terminée.
Pendant le processus de mise à niveau, le contenant ou la fiche des contrôles d’accès
(accesscontrols) et des informations relatives aux listes de contrôles n’est disponible
qu’en lecture seule.
Ajoutez des listes de contrôle d’accès personnalisées au nouvel attribut olcAccess (dans
olcBDBConfig).Vous devez aussi vous servir de la directive set au lieu de la directive group.26 Chapitre 2Mise à niveau de Mac OS X Server 10.4
Schémas LDAP
Si vous mettez à jour le fichier slapd.conf lors de l’ajout de fichiers de schéma, exécutez
la commande slaptest. Cette commande permet d’identifier le changement correspondant à l’ajout du nouveau schéma et de le rendre persistant dans la base de données.
Pour exécuter la commande slaptest :
1 Créez une copie de sauvegarde du répertoire slapd.d (dans /etc/openldap).
2 Exécutez la commande suivante pour spécifier un autre fichier slapd.conf :
slaptest -f -F
3 Comparez l’ancien répertoire slapd.d et le nouveau pour déterminer les modifications
à effectuer.
4 Relancez slapd.
DNS
La première fois que vous sélectionnez DNS dans Admin Serveur après une mise à
niveau, Admin Serveur vous demande si vous souhaitez effectuer une mise à niveau.
Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers
de configuration du service DNS qui existaient avant la mise à niveau vers la version 10.5.
Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez modifier
les fichiers de configuration du service DNS.
Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration
à niveau au format de la version 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur
pour apporter des modifications à la configuration du service DNS.
Images NetBoot
Après la mise à niveau, vous pouvez réutiliser les images NetBoot créées avec les versions
10.3 et 10.4.
Pour gérer les images Netboot, utilisez l’Utilitaire d’images de système, qui remplace
l’Utilitaire d’images de réseau pendant la mise à niveau.
Historique de la mise à niveau d’Open Directory
Les informations relatives à la mise à niveau du serveur LDAP Open Directory sont stockées
dans le fichier /Bibliothèque/Logs/slapconfig.log.
Service Web
Si vous avez apporté des modifications à /etc/httpd/workers.properties, appliquez
à nouveau celles-ci à la version du fichier installée avec Mac OS X Server 10.5.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 27
Mise à niveau du serveur web Apache vers la version 2.2
à partir de la version 1.3
Lorsque vous effectuez une mise à niveau de Mac OS X Server 10.4.10 ou ultérieur vers
Mac OS X Server 10.5, le processus de mise à niveau maintient la configuration de service
web utilisée pour exécuter Apache 1.3.
Pour passer à la version 2.2 d’Apache après la mise à niveau vers Mac OS X Server 10.5,
utilisez l’option du service web conçue pour la mise à niveau d’Apache accessible depuis
Admin Serveur.
Pour effectuer la mise à niveau vers Apache 2.2 :
1 Ouvrez Admin Serveur.
2 Dans la liste des ordinateurs et des services, sélectionnez Web.
3 Cliquez sur Vue d’ensemble, puis sur « Mettre à niveau la version d’Apache ».
4 Cliquez sur 2.2.
5 Cliquez sur Continuer.
6 Une fois la mise à niveau effectuée, cliquez sur Fermer.
7 Dans la sous-fenêtre Vue d’ensemble, vérifiez que la version d’Apache est bien la 2.2.
Important :Apache 2.2 s’exécute en tant que processus 64 bits si le matériel est adéquat,
mais Apache 1.3 ne fonctionne qu’en 32 bits.
Pour en savoir plus sur la mise à niveau vers Apache 2.2, reportez-vous à Administration
des services de réseau.
AVERTISSEMENT :il est possible que l’exécution du script de conversion d’Apache 1
à Apache 2 ait des effets secondaires, notamment sur les réglages liés à la sécurité,
ce qui aura des répercussions sur la sécurité de votre mise à niveau.3
29
3 Migration à partir de
Mac OS X Server 10.4
Suivez les instructions de ce chapitre si vous devez faire
migrer des données d’un serveur 10.4.10 ou ultérieur vers
un autre ordinateur tournant sous la version 10.5.
Il est possible de faire migrer les données qui se trouvent sur des ordinateurs Mac OS X
Server 10.4.10 ou ultérieurs même si ceux-ci ne peuvent être ou ne seront pas mis à niveau
vers la version 10.5 ou ultérieure. Il se peut que ces ordinateurs :
 requièrent que leur disque dur soit reformaté ou nécessitent un remplacement
par un ordinateur plus récent ;
 utilisent un matériel de serveur qui ne dispose pas des éléments suivants :
 un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus ;
 au moins 1 Go de mémoire vive (RAM) ;
 au moins 20 Go d’espace disque disponible.
Avant de commencer
Avant de suivre les instructions de ce chapitre, procédez à la configuration initiale du serveur 10.5 vers lequel vous ferez migrer les données. Pour obtenir des instructions, consultez la section Premiers contacts.
Au besoin, mettez à niveau le serveur dont vous ferez migrer les données de sorte qu’il
tourne sous la version 10.4.10 ou ultérieure.
Si le serveur est un maître ou une réplique Open Directory, configurez tout d’abord
le maître 10.5, puis les répliques 10.5.
Pour rétablir le maître et ses répliques :
1 Configurez le maître 10.5.
Pendant la configuration du maître, les ordinateurs clients ne peuvent pas se connecter
au maître 10.4.10 ou ultérieur pour accéder aux services Open Directory.30 Chapitre 3Migration à partir de Mac OS X Server 10.4
En outre, il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai
lors de la recherche automatique de la réplique de serveur Open Directory la plus proche.
Vous pouvez remédier à ce retard en modifiant le service DHCP pour utiliser l’adresse
d’un serveur réplique Open Directory s’il fournit aux clients l’adresse d’un serveur LDAP.
Lorsque le maître 10.5 est prêt, vous pouvez modifier le service DHCP de sorte qu’il utilise
l’adresse du maître.
Pour obtenir des instructions sur la configuration des réglages LDAP relatifs au service
DHCP, reportez-vous à Administration des services de réseau.
2 Modifiez le rôle de la réplique 10.4.10 ou ultérieure de sorte qu’elle soit autonome,
puis configurez le serveur 10.5 pour en faire une réplique du maître 10.5.
Pour obtenir des instructions sur la modification du rôle Open Directory d’un serveur
afin de rendre ce dernier autonome et d’en faire une réplique, reportez-vous à Administration d’Open Directory.
Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître,
consultez l’étape 6 page 40.
Éléments pouvant migrer
Les informations qui apparaissent dans « Instructions pas à pas » à la page 32 expliquent
comment réutiliser les données de la version 10.4 indiquées ci-dessous avec la version 10.5 :
 Données de configuration Web
 Contenu Web
 Données MySQL
 Base de données de courrier
 Données WebMail
 Fichiers de configuration FTP
 Réglages du serveur LDAP
 Images NetBoot
 Applications et structures WebObjects
 Données Tomcat
 Applications JBoss
 Réglages AFP
 Réglages SMB
 Configuration de coupe-feu IP
 Réglages DNS
 Réglages DHCP
 Réglages NAT
 Réglages d’impressionChapitre 3 Migration à partir de Mac OS X Server 10.4 31
 Réglages VPN
 Données utilisateur, notamment les répertoires de départ
 Fichiers et dossiers du Serveur d’enchaînement QuickTime
 Fichiers et dossiers de QTSS Publisher
 Comptes d’utilisateur et de groupe
 Réglages du serveur iChat
Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service afin
de pouvoir vous y reporter ultérieurement. Enregistrez les réglages de service exportés
sur un disque amovible ou sur un autre système.
Remarque :l’une des méthodes permettant d’enregistrer les réglages de service dans
Admin Serveur consiste à sélectionner le service dans la liste des ordinateurs et des services située à gauche, à cliquer sur Réglages, puis à faire glisser le bouton situé dans l’angle
inférieur droit vers le Bureau. Cette opération crée un fichier contenant les réglages de service sur le Bureau.
Dans la version 10.5, watchdog a été remplacé par launchd. Pour réactiver le redémarrage
automatique du matériel, utilisez la sous-fenêtre Économiseur d’énergie des Préférences
Système. Pour faire migrer les réglages correspondant aux services que vous avez ajoutés
à /etc/watchdog.conf, créez un fichier plist launchd et installez-le dans /Système/Bibliothèque/LaunchDaemons/. Pour en savoir plus sur launchd, reportez-vous à sa page man.
Outils pouvant être utilisés
Plusieurs outils sont disponibles :
 Vous pouvez vous servir du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe de la version 10.4 vers un fichier délimité, puis les importer
dans un serveur 10.5. Vous pouvez également importer des utilisateurs et des groupes
à l’aide de l’outil de ligne de commande dsimport.
 La fonction d’importation de Gestionnaire de groupe de travail et l’outil dsimport vous
permettent également d’importer d’autres types de données, comme des ordinateurs
et des listes d’ordinateurs.
 Utilisez l’outil 59_webconfigmigrator pour faire migrer les réglages de service web.
 Utilisez 50_ipfwconfigmigrator pour exporter les réglages de service coupe-feu.
 Utilisez 58_jabbermigrator.pl pour faire migrer les réglages de service iChat.
Les instructions des sections suivantes expliquent quand et comment utiliser ces utilitaires.32 Chapitre 3Migration à partir de Mac OS X Server 10.4
Instructions pas à pas
Pour déplacer des données d’un ordinateur 10.4.10 ou ultérieur à un ordinateur
sur lequel Mac OS X Server 10.5 est installé, suivez les instructions de cette rubrique.
Étape 1 :exportation d’utilisateurs et de groupes
Servez-vous du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe depuis un répertoire NetInfo ou LDAP3 vers un fichier délimité par
des caractères qui peut ensuite être importé dans un répertoire pour être utilisé avec
Mac OS X Server 10.5.
1 Exportez les informations
des utilisateurs et groupes.
2 Créez des fichiers d'archive des données
et un fichier utilisateur d'exportation.
4 Copiez les fichiers d'archive
vers le nouveau serveur.
6 Importez les fichiers des
utilisateurs et groupes.
8 Configurez les points de
partage et les autorisations.
9 Testez le nouveau serveur.
7 Replacez les fichiers de données
sur le nouveau serveur.
3 Notez les points de partage
et les autorisations actuels.
utilisateur
groupe
2017
Gestionnaire de groupe de travail
Gestionnaire de
groupe de travail
ou outil dsimport
5 Configurez l'infrastructure
des répertoires de départ.
Ingénierie
Lecture et écriture
Bureau d'études
Documents
Lecture seule
Lecture et écriture
Shared Folders
Shared Folders
Ingénierie
Lecture et écriture
Bureau
d'études
Documents
Lecture seule
Lecture et écriture
.XML
Ingénierie
Lecture et écriture
Bureau d'études
Documents
Lecture seule
Lecture et écriture
Shared Folders
utilisateur
groupe
2017
donnéesutilisateur.tar
basededonnées.tar
donnéesutilisateur.tar
basededonnées.tarChapitre 3 Migration à partir de Mac OS X Server 10.4 33
Pour exporter des utilisateurs et des groupes :
1 Dans Gestionnaire de groupe de travail, cliquez sur Comptes, puis sur l’icône représentant
un globe sous la barre d’outils et choisissez le répertoire à partir duquel vous souhaitez
exporter des comptes.
2 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine
(habituellement, diradmin).
3 Cliquez sur le bouton Utilisateurs pour exporter des utilisateurs ou sur le bouton Groupes
pour exporter des groupes.
4 Exportez les comptes utilisateurs ou de groupe comme suit :
 Pour exporter l’ensemble des comptes, sélectionnez-les tous.
 Pour exporter un compte particulier, sélectionnez-le.
 Pour exporter plusieurs comptes, sélectionnez-les en maintenant enfoncée la touche
Commande ou Maj.
5 Choisissez Serveur > Exporter.
6 Spécifiez un nom à attribuer au fichier d’exportation ainsi que son emplacement.
7 Cliquez sur Exporter.
Lorsque vous exportez des utilisateurs à l’aide de Gestionnaire de groupe de travail,
les informations des mots de passe ne sont pas exportées. Si vous souhaitez définir
des mots de passe, vous pouvez modifier le fichier d’exportation avant de l’importer
ou définir chaque mot de passe après l’importation à l’aide de la commande passwd
ou du Gestionnaire de groupe de travail. Pour en savoir plus sur la définition des mots
de passe après l’importation des utilisateurs, reportez-vous à Gestion des utilisateurs.
Étape 2 :créez des archives des fichiers suivants
Enregistrez tous les fichiers de données que vous souhaitez réutiliser avec Mac OS X
Server 10.5. Lors de l’étape 4, vous déplacerez les fichiers décrits ci-dessous, ainsi
que le fichier d’exportation créé lors de l’étape 1, vers l’ordinateur qui tourne sous
la version 10.5.
Pour les grandes quantités de données, vous pouvez créer une ou plusieurs archives
tar, ou utiliser /usr/bin/mkdmg pour créer des fichiers d’image disque. Vous pouvez
transférer des images disque et des fichiers tar en vous servant des protocoles AFP
ou FTP.
Remarque :vous pouvez aussi utiliser scp -r pour effectuer une copie sécurisée
des fichiers et rsync pour copier les fichiers à distance. La commande rsync est particulièrement utile si vous avez une grande quantité de données qu’il est possible de faire
migrer avant le passage à la nouvelle version puis de mettre rapidement à jour.34 Chapitre 3Migration à partir de Mac OS X Server 10.4
Pour créer une archive tar, utilisez la commande tar dans l’application Terminal. L’indicateur -c de la commande crée un fichier d’archives au format tar. Utilisez l’indicateur -f
pour spécifier le nom du fichier d’archives. Utilisez l’indicateur -v (détaillé) pour afficher
les informations relatives à la progression lors de l’exécution de la commande :
tar -cvf /MyHFSVolume/Stuff.tar /MyHFSVolume/My\ Stuff
Le caractère d’échappement (\ dans l’exemple ci-dessus) indique un espace dans le nom.
Vous pouvez également utiliser des guillemets pour gérer les espaces incorporés :
tar -cvf /MyHFSVolume/Stuff.tar “/MyHFSVolume/My Stuff”
Données de configuration Web
Enregistrez les fichiers et les répertoires suivants :
 /etc/httpd/httpd.conf
 /etc/httpd/httpd_macosxserver.conf
 /etc/httpd/httpd_mailman.conf
 /etc/httpd/httpd_squirrelmail.conf
 /etc/httpd/magic
 /etc/httpd/mime.types
 /etc/httpd/mime_macosxserver.types
 /etc/httpd/ssl.crt
 /etc/httpd/ssl.key
 /etc/httpd/tomcat.conf
 /etc/webperfcache/webperfcache.conf
 /Bibliothèque/WebServer/
Contenu Web
Copiez le contenu Web que vous souhaitez réutiliser à partir de :
 /Bibliothèque/WebServer/Documents/
 /Bibliothèque/WebServer/CGI-Executables/
 tout autre emplacement où il réside.
Données MySQL
Mac OS X Server 10.4.10 ou ultérieur comprend la version 4.1.22 de MySQL. Mac OS X
Server 10.5 installe MySQL 5.0.45.
Pour faire migrer les bases de données MySQL d’un ordinateur vers un autre, vous pouvez
vous servir de la commande mysqldump afin de créer une copie de sauvegarde de vos données. Cette commande est différente selon l’ampleur des données à sauvegarder. La migration peut en effet concerner des tables individuelles, une ou plusieurs bases de données
ou toutes les bases de données qui se trouvent sur le serveur.Chapitre 3 Migration à partir de Mac OS X Server 10.4 35
Pour créer une copie de sauvegarde des tables individuelles, tapez :
mysqldump database tb1 [tb2 tb3...] > backup-file.sql
où database est le nom de la base de données qui contient les tables répertoriées
et tb1, tb2 et tb3 le nom des tables.
Pour créer une copie de sauvegarde d’une ou plusieurs bases de données, tapez :
mysqldump --databases db1 [db2 db3...] > backup-file.sql
Pour créer une copie de sauvegarde de toutes les bases de données contenues dans
le système, tapez :
mysqldump --all-databases > backup-file.sql
Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de la restauration des bases de données dans la documentation relative à MySQL sur le site web
www.mysql.org.
Pour créer une copie de sauvegarde des tables ou des bases de données qui requièrent
un accès root (par exemple, les tables d’octroi de privilèges et les autres données d’accès
restreint), exécutez la commande mysqldump avec les options --user=root et -p :
mysqldump --user=root -p --all-datagases > backup-file.sql
Lorsque vous utilisez l’option -p, mysqldump vous demande le mot de passe root de MySQL
avant de continuer.
Base de données de courrier
Si vous souhaitez réutiliser la base de données et le stockage du courrier, arrêtez le service de messagerie s’il est en cours d’exécution et enregistrez les fichiers de la messagerie. Si le service de messagerie n’est pas en cours d’exécution, vous pouvez copier tous
ses répertoires.
Par défaut :
 La base de données de courrier est situé à l’emplacement /var/imap/.
 Le stockage de courrier est situé à l’emplacement /var/spool/imap/. Vous pouvez sauvegarder des dossiers individuels de stockage de courrier ou bien l’ensemble du stockage de courrier.
L’outil de ligne de commande ditto est utile pour sauvegarder les fichiers de courrier.
Pour en savoir plus sur la commande ditto, reportez-vous à sa page man.
Par ailleurs, enregistrez une copie du fichier /usr/bin/cyrus/bin/ctl_mboxlist afin de pouvoir le déplacer sur le serveur 10.5 lors de l’étape 4 décrite page 39. Ce fichier est nécessaire pour faire migrer correctement la base de données du service de messagerie lors
de l’étape 7 décrite page 41.36 Chapitre 3Migration à partir de Mac OS X Server 10.4
Données WebMail
Si vous avez utilisé SquirrelMail, qui a été installé en même temps que la version 10.4,
et que vous souhaitez continuer à vous en servir après la migration, créez une copie
des carnets d’adresses et des préférences stockés dans /var/db/squirrelmail/data/.
Fichiers de configuration FTP
Pour migrer vos réglages FTP, sauvegardez les fichiers de configuration suivants :
Serveur LDAP
Créez une copie de sauvegarde des informations de configuration du serveur LDAP.
Pour créer une copie de sauvegarde de la base de données Open Directory,
qui comprend la configuration du serveur LDAP :
1 Dans Admin Serveur, sélectionnez Open Directory dans la liste des ordinateurs
et des services.
2 Cliquez sur Archive.
3 Dans le champ Archiver dans, sélectionnez le chemin d’accès de l’archive.
4 Cliquez sur le bouton Archive.
5 Dans le champ Nom de l’archive, tapez le nom du fichier dans lequel les informations
seront stockées.
6 Dans le champ Mot de passe, tapez le mot de passe de l’archive.
7 Cliquez sur OK.
AFP
Enregistrez /Bibliothèque/Preferences/com.apple.AppleFileServer.plist.
SMB
Enregistrez /Bibliothèque/Preferences/SystemConfiguration/com.apple.smb.server.plist.
Dans ce répertoire Sauvegardez ces fichiers
/Bibliothèque/FTPServer/Configuration/ ftpaccess
ftpconversions
ftphosts
ftpgroups
ftpusers
/Bibliothèque/FTPServer/Messages/ banner.txt
welcome.txt
limit.txtChapitre 3 Migration à partir de Mac OS X Server 10.4 37
Images NetBoot
Vous pouvez faire migrer les images NetBoot créées avec Mac OS X Server 10.4.
Enregistrez le dossier .nbi de chacune des images que vous souhaitez faire
migrer en notant le chemin d’accès à ce dossier si vous souhaitez le créer à nouveau
dans la version 10.5.
Enregistrez aussi les réglages NetBoot. Dans Admin Serveur, sélectionnez NetBoot dans
la liste des ordinateurs et des services située à gauche, cliquez sur Réglages, puis faites
glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette action crée un
fichier contenant les réglages du service NetBoot sur le Bureau. Enregistrez ce fichier.
Applications et structures WebObjects
Enregistrez les applications et structures WebObjects situées dans :
 /Bibliothèque/WebObjects/
 /Système/Bibliothèque/WebObjects/
Données Tomcat
Enregistrez les servlets Tomcat que vous souhaitez réutiliser. Ils se trouvent dans
/Bibliothèque/Tomcat/webapps/.
Si vous avez installé Axis indépendamment de la version fournie avec le serveur, enregistrez
les éventuels services SOAP (Simple Object Access Protocol).
Applications JBoss
Enregistrez les applications JBoss situées dans /Bibliothèque/JBoss/3.2/deploy/.
Coupe-feu IP
Dans l’application Terminal, exécutez la commande suivante :
sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/
50_ipfwconfigmigrator
Ensuite, enregistrez le contenu de /etc/ipfilter.
NAT
Enregistrez le contenu de /etc/nat/natd.plist.
Impression
Utilisez la commande serveradmin settings print pour enregistrer les réglages
d’impression avant de commencer le processus de migration.
serveradmin settings print > exported_print_settings
Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir
les utiliser ultérieurement.38 Chapitre 3Migration à partir de Mac OS X Server 10.4
VPN
Copiez :
 /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist
 /Bibliothèque/Keychains/System.keychain
 /etc/racoon/psk.text
Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text,
ce secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist
ou System.keychain.
DNS
Enregistrez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout
son contenu.
DHCP
Dans Admin Serveur, sélectionnez DHCP dans la liste des ordinateurs et des services
située à gauche, cliquez sur Réglages, puis faites glisser le bouton situé dans l’angle
inférieur droit vers le Bureau.
Cette action crée un fichier contenant les réglages du service DHCP sur le Bureau.
Enregistrez ce fichier.
Données utilisateur
Enregistrez tous les dossiers ou fichiers de données utilisateur que vous souhaitez réutiliser,
en particulier les dossiers du répertoire de départ.
Fichiers et dossiers du Serveur d’enchaînement QuickTime
Enregistrez les fichiers et les dossiers du répertoire /Bibliothèque/QuickTimeStreaming/.
Fichiers et dossiers de QTSS Publisher
Enregistrez ce qui suit :
 les fichiers et les dossiers qui se trouvent dans
/Bibliothèque/Application Support/Apple/QTSS Publisher/ ;
 les fichiers et les dossiers de chaque chemin d’utilisateur QTSS Publisher :
/Users//Bibliothèque/Application Support/Apple/QTSS
Publisher
Serveur iChat
Enregistrez les dossiers suivants :
 /var/jabber/spool
 /etc/jabberChapitre 3 Migration à partir de Mac OS X Server 10.4 39
Étape 3 :points de partage et autorisations actuels
Si votre serveur 10.4 contient des points de partage et des privilèges que vous souhaitez
créer à nouveau sur le serveur 10.5, notez-les. Consignez les points de partage destinés aux
répertoires de départ.
Étape 4 :copie des fichiers d’archive sur le nouveau serveur
Transférez les fichiers enregistrés lors des étapes 1 et 2 sur le serveur 10.5.
Pour transférer les fichiers tar ou les images de disque via FTP :
1 Utilisez Admin Serveur sur le nouveau serveur afin de démarrer le service FTP.
2 Configurez le partage pour le dossier dans lequel vous placerez les fichiers que vous
transférez depuis l’ordinateur 10.4.
3 Sur le serveur 10.4,servez-vous du service FTP pour copier les fichiers tar ou les images
disque sur l’ordinateur 10.5.
4 Sur le serveur 10.5, double-cliquez sur un fichier tar pour en extraire le contenu ou doublecliquez sur une image disque pour la monter.
Étape 5 :configuration de l’infrastructure des répertoires de départ
Configurez la destination des répertoires de départ que vous souhaitez restaurer.
L’emplacement des répertoires de départ identifié dans les comptes d’utilisateur importés
doit correspondre à l’emplacement physique des répertoires de départ restaurés, y compris
l’emplacement du point de partage.
Pour obtenir des explications détaillées sur la marche à suivre en ce qui concerne les étapes
de la procédure ci-dessous, reportez-vous àGestion des utilisateurs.
Pour préparer le serveur pour le stockage des répertoires de départ :
1 Si nécessaire, créez le dossier que vous souhaitez utiliser comme point de partage
du répertoire de départ.
Si vous le souhaitez, vous pouvez utiliser le dossier /Utilisateurs prédéfini.
2 Ouvrez Admin Serveur sur le serveur où vous souhaitez stocker les répertoires de départ.
3 Cliquez sur Partage de fichiers pour configurer un point de partage pour les répertoires
de départ.
Si les comptes utilisateurs sont destinés à résider dans un répertoire Open Directory
partagé, créez un point de partage AFP ou NFS à montage automatique dynamique
pour les répertoires de départ. Assurez-vous que le point de partage est publié dans
le répertoire dans lequel résideront les comptes d’utilisateur qui en dépendent.
4 Dans le Gestionnaire de groupe de travail de l’ordinateur à partir duquel vous allez
importer les utilisateurs, cliquez sur Comptes, puis ouvrez le répertoire dans lequel
les utilisateurs importés seront stockés.40 Chapitre 3Migration à partir de Mac OS X Server 10.4
Si vous restaurez les répertoires de départ dans des emplacements qui ne correspondent
pas exactement à ceux identifiés dans les fiches utilisateurs exportées, vous pouvez configurer un préréglage qui identifie l’emplacement de restauration. Si vous identifiez le pré-
réglage lors de l’importation des utilisateurs, le nouvel emplacement remplace celui qui
existe dans les enregistrements utilisateur.
Vous pouvez également utiliser le préréglage pour spécifier d’autres réglages par défaut
dont les utilisateurs importés doivent hériter, par exemple pour les mots de passe,
le courrier, etc.
Étape 6 :importation d’utilisateurs, de groupes et d’autres données
Si vous faites migrer des utilisateurs et des groupes à partir d’un maître Open Directory,
suivez les instructions de « Réglages du serveur LDAP » à la page 44. Si vous faites migrer
des utilisateurs et des groupes du nœud local,servez-vous du Gestionnaire de groupe
de travail ou de l’outil dsimport.
Pour en savoir plus sur l’importation à l’aide du Gestionnaire de groupe de travail, reportezvous à Gestion des utilisateurs.
Pour en savoir plus sur les mots de passe des utilisateurs créés à l’origine avec
Mac OS X Server 10.1.5 ou antérieur, reportez-vous à Administration d’Open Directory.
Pour en savoir plus sur dsimport et pour obtenir une description du format d’exportation
du Gestionnaire de groupe de travail, reportez-vous à Administration de ligne de commande.
Pour importer des utilisateurs et des groupes à l’aide de Gestionnaire de groupe
de travail :
1 Placez les fichiers d’exportation créés lors de l’étape 1 dans un emplacement accessible
à partir du serveur.
Vous pouvez modifier les comptes d’utilisateur dans un fichier d’exportation si vous
souhaitez définir des mots de passe avant d’importer les utilisateurs. Pour obtenir
des instructions, consultez la section Gestion des utilisateurs.
En outre, vous pouvez configurer le préréglage défini lors de l’étape 5 ci-dessus de sorte
que les mots de passe des utilisateurs soient validés à l’aide de l’authentification Open
Directory, et vous pouvez configurer les options de validation de mot de passe afin d’obliger les utilisateurs à changer de mot de passe la prochaine fois qu’ils ouvriront une session.
Pour obtenir des informations sur l’utilisation de mots de passe Kerberos, reportez-vous
à la dernière étape de cette procédure.
2 Dans Gestionnaire de groupe de travail, cliquez sur Comptes.
3 Dans la barre d’outils, cliquez sur l’icône représentant un globe afin d’ouvrir le répertoire
dans lequel vous souhaitez importer les comptes.
4 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine.Chapitre 3 Migration à partir de Mac OS X Server 10.4 41
5 Choisissez Serveur > Importer, sélectionnez le fichier d’importation, puis spécifiez
les options d’importation.
Si vous utilisez un préréglage, assurez-vous de le spécifier.
6 Cliquez sur Importer.
7 Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités
de la version 10.5, mettez-les à niveau à l’aide du Gestionnaire de groupe de travail.
Dans le Gestionnaire de groupe de travail, ouvrez le répertoire qui contient les groupes,
sélectionnez un ou plusieurs groupes, cliquez sur « Mettre à niveau le groupe hérité »,
puis cliquez sur Enregistrer.
8 Pour créer des répertoires de départ pour les utilisateurs importés, utilisez l’une des options
suivantes.
Créez les répertoires de départ un par un, en sélectionnant un compte d’utilisateur
dans Gestionnaire de groupe de travail, en cliquant sur Départ, puis sur Créer Départ.
Créez tous les répertoires de départ en utilisant l’argument -a de la commande
createhomedir. Pour plus de détails, reportez-vous à Administration de ligne de commande ou à la page man de createhomedir.
S’il n’existe pas déjà, un répertoire de départ associé à un point de partage AFP est
créé la première fois que l’utilisateur ouvre une session.
9 Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est
pas activé, servez-vous de la commande suivante qui permet de conserver les mots
de passe existants et de les ajouter à un nouveau centre de distribution de clés (KDC,
Key Distribution Center).
slapconfig -kerberize
Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés
et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous pouvez vous servir du Gestionnaire de groupe de travail pour les mettre à niveau et les convertir en mots de passe Open Directory.
Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez
au répertoire où réside le compte utilisateur. Authentifiez-vous en tant qu’administrateur d’Open Directory (généralement diradmin) puis sélectionnez un utilisateur dont
le mot de passe est chiffré. Cliquez sur Avancé, choisissez Open Directory dans le menu
local Type du mot de passe, cliquez sur Élémentaires,spécifiez un nouveau mot de passe,
puis cliquez sur Enregistrer.
Pour en savoir plus sur slapconfig, reportez-vous à sa page man.42 Chapitre 3Migration à partir de Mac OS X Server 10.4
Étape 7 :déplacez les fichiers de données enregistrés suivants
Placez les fichiers enregistrés à partir de votre serveur 10.4 à leur emplacement final.
Données de configuration Web
Pour migrer la configuration Web :
1 Ouvrez Admin Serveur.
2 Sous le serveur 10.5 dans la liste des ordinateurs et des services, cliquez sur Web.
3 Cliquez sur « Arrêter le service web » si le service web est en cours d’exécution.
4 Supprimez les fichiers suivants :
 /etc/httpd/sites
 /etc/httpd/ssl.crt
 /etc/httpd/ssl.key
5 Copiez le répertoire et les fichiers enregistrés avec la version 10.4 sur le serveur 10.5.
6 Dans l’application Terminal, tapez la commande suivante :
sudo cd /etc/httpd
7 Ouvrez le fichier httpd.conf en tant qu’administrateur root pour pouvoir l’éditer.
8 Dans le fichier httpd.conf :
 Remplacez var/run/proxy par /var/run/proxy-1.3.
 Remplacez /var/run/httpd.pid par /var/run/http-1.3.pid.
9 Enregistrez vos modifications.
10 Pour faire migrer les réglages du service web, dans Terminal, exécutez la commande
suivante :
sudo /Système/Bibliothèque/ServerSetup/translateApache.rb
11 Si vous avez modifié /etc/httpd/workers.properties, appliquez à nouveau toutes
les modifications à la version du fichier installée avec le serveur 10.5.
Le fichier workers.properties de la version 10.5 contient une nouvelle entrée pour
le service Blog.
12 Dans Admin Serveur, démarrez le service Web.
Contenu Web
Copiez le contenu web enregistré aux emplacements suivants et à tous les autres
emplacements où vous avez placé du contenu web sur le serveur :
 /Bibliothèque/WebServer/Documents/
 /Bibliothèque/WebServer/CGI-Executables/
Données MySQL
Avant d’importer les données sauvegardées de MySQL, assurez-vous que le service
MySQL est actif. Vous pouvez activer le service MySQL à l’aide d’Admin Serveur ou
de la commande serveradmin.Chapitre 3 Migration à partir de Mac OS X Server 10.4 43
Pour activer le service MySQL à l’aide de la commande serveradmin, tapez :
serveradmin start mysql
Pour importer les copies de sauvegarde de bases de données, tapez :
mysql < backup-file.sql
Pour importer des données dans des bases de données auxquelles il n’est possible
d’accéder qu’avec des privilèges, exécutez la commande mysql avec les options
--user=root et -p :
mysql --user=root -p < backup-file.sql
Lorsque vous utilisez l’option -p, mysql vous demande le mot de passe root de MySQL
avant de continuer.
Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de la restauration des bases de données MySQL dans la documentation relative à MySQL sur
le site web www.mysql.org.
Base de données de courrier
Pour migrer la base de données de courrier :
1 Assurez-vous que le service de messagerie de la version 10.5 n’est pas en cours d’exécution.
Ouvrez Admin Serveur, puis cliquez sur Courrier. Si le cercle qui se trouve sur le côté
gauche et qui correspond à la messagerie (Mail) n’est pas grisé, cliquez sur Arrêter
Mail dans l’angle inférieur gauche.
2 Restaurez la base de données de courrier et le stockage de courrier enregistrés.
La base de données de courrier est située par défaut à l’emplacement /var/imap/
et le stockage de courrier dans /var/spool/imap/.
3 Assurez-vous que les répertoires de la messagerie et leur contenu appartiennent
au groupe de messagerie et à l’utilisateur _cyrus.
4 Renommez le fichier ctl_mboxlist enregistré de sorte que son nom soit
ctl_mboxlist.old, puis déplacez-le jusque dans /usr/bin/cyrus/bin/.
Si ce fichier ctl_mboxlist.old est inexistant, le script upgradedb ne fonctionnera
pas correctement lors de l’étape 8 ci-dessous.
5 Dans Admin Serveur, sélectionnez Mail dans la liste des ordinateurs et des services.
6 Cliquez sur Réglages,sur Avancé, puis sur Base de données pour indiquer l’emplacement
dans lequel vous avez restauré la base de données et le stockage du courrier.
7 Cliquez sur Enregistrer.
8 Exécutez le script upgradedb de la base de données de courrier :
sudo -u cyrusimap /Système/Bibliothèque/ServerSetup/MigrationExtras/
61_migrate_cyrus_db44 Chapitre 3Migration à partir de Mac OS X Server 10.4
9 Exécutez la commande suivante pour vous assurer que les fichiers d’index de tous
les comptes de messagerie fonctionnent correctement :
sudo /usr/bin/cyrus/bin/reconstruct –i
10 Dans Admin Serveur, lancez le service de messagerie en cliquant sur Mail,
puis sur Démarrer Mail.
Données WebMail
Placez les carnets d’adresses et les préférences enregistrés dans le répertoire
/var/db/squirrelmail/data/.
Fichiers de configuration FTP
Copiez les fichiers de configuration FTP enregistrés dans :
 /Bibliothèque/FTPServer/Configuration/
 /Bibliothèque/FTPServer/Messages/
Réglages du serveur LDAP
Restaurez les informations de configuration du serveur LDAP.
Pour restaurer la base de données Open Directory, qui comprend la configuration
du serveur LDAP :
1 Dans Admin Serveur, sélectionnez Open Directory dans la liste des ordinateurs
et des services.
2 Cliquez sur Archive.
3 Dans le champ « Archiver à partir de », sélectionnez le chemin d’accès de l’archive.
4 Cliquez sur le bouton Restaurer.
5 Dans le champ Mot de passe, tapez le mot de passe de l’archive.
6 Cliquez sur OK.
Configuration AFP
Pour faire migrer la configuration AFP, restaurez /Bibliothèque/Préférences/
com.apple.AppleFileServer.plist.
Configuration SMB
Pour faire migrer la configuration SMB, restaurez /Bibliothèque/Preferences/SystemConfiguration/com.apple.smb.server.plist.
Images NetBoot
Copiez le dossier .nbi correspondant à chaque image que vous souhaitez faire
migrer et placez-le éventuellement à l’emplacement où il se trouvait auparavant.
Par ailleurs, restaurez le fichier qui contient les réglages NetBoot.Chapitre 3 Migration à partir de Mac OS X Server 10.4 45
Pour restaurer les réglages NetBoot :
1 Ouvrez Admin Serveur, puis sélectionnez NetBoot dans la liste des ordinateurs
et des services.
2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages NetBoot
à partir du fichier que vous avez exporté auparavant (voir « Images NetBoot » à la page 37).
3 Passez en revue les réglages NetBoot pour vous assurer qu’ils ont été correctement
importés.
Applications et structures WebObjects
Pour faire migrer WebObjects :
1 Copiez les applications enregistrées dans /Bibliothèque/WebObjects/Applications/.
2 Copiez les cadres d’applications enregistrés dans /Bibliothèque/Frameworks/.
3 Ajoutez la ligne suivante au nouveau fichier httpd.conf :
Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf
Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin Serveur.
Si le serveur que vous mettez à niveau comprend l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services
WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportez-vous à Administration
destechnologiesweb et Déploiement deWebObjects.
4 (Facultatif) Si Java 1.4.2 n’est pas installé sur votre serveur 10.4.10 ou ultérieur, mettez
les projets d’application WebObjects à jour manuellement en les ouvrant un par un
dans Xcode ; ensuite, dans la présentation Expert des réglages de la cible principale,
changez la valeur de la propriété de JAVA_VM à java.
Il est nécessaire de mettre ces projets à jour manuellement pour pouvoir utiliser la version
de la Machine virtuelle Java (JVM,Java Virtual Machine) fournie avec Mac OS X Server 10.5.
Important :Java 1.5 doit être installé pour que WebObjects 5.4, inclus avec Mac OS X
Server 10.5, puisse fonctionner.
Données Tomcat
Restaurez les servlets Tomcat dans /Bibliothèque/Tomcat/webapps/.
Placez les services SOAP que vous souhaitez faire migrer dans
/Bibliothèque/Tomcat/webapps/axis/. Il se peut que Mac OS X Server 10.5 comprenne
une
version d’Axis plus récente ou plus ancienne que celle que vous utilisiez jusqu’à présent.46 Chapitre 3Migration à partir de Mac OS X Server 10.4
Applications JBoss
JBoss n’est pas fourni avec Mac OS X Server 10.5. Avant de restaurer vos applications
JBoss, installez JBoss sur votre serveur.
Pour en savoir plus sur l’installation et la migration des applications JBoss, reportez-vous
à la documentation de JBoss.
Configuration de coupe-feu IP
Pour faire migrer la configuration du coupe-feu IP, restaurez le dossier /etc/ipfilter.
Ouvrez Admin Serveur, puis cliquez sur Coupe-feu pour vérifier les réglages et vous assurer
qu’ils sont correctement configurés.
NAT
Restaurez le contenu de /etc/nat/natd.plist.
Vous pouvez restaurer à tout moment les réglages NAT par défaut de la version 10.5
(situés dans/etc/natd/natd.plist.default) en supprimant le fichier de la configuration
active (/etc/nat/natd.plist). Lors de l’accès suivant au NAT à l’aide d’Admin Serveur,
le fichier de configuration par défaut est utilisé pour la création d’un nouveau fichier
de configuration active.
Remarque :dans la version 10.5, le réglage par défaut d’unregistered_only dans
/etc/nat/natd.plist.default est « vrai ».
Réglages du service d’impression
Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer
à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés.
Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes
au serveur et les allumez. Cependant, pour les imprimantes réseau, vous devez ajouter
les imprimantes en cliquant sur Admin Serveur > Impression (pour les imprimantes LPR
ou AppleTalk) ou sur Préférences Système > Imprimantes et fax (pour tous les types
d’imprimante).
Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de lui
redonner le même nom que celui qu’elle avait sur l’ancien système. Si le nom est différent,
Admin Serveur n’importera pas les réglages correctement.Chapitre 3 Migration à partir de Mac OS X Server 10.4 47
Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre
Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD
générique) » pour toute file d’attente appliquant des quotas étant donné qu’il existe
des problèmes connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour en savoir plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous trouverez à l’adresse suivante :
http://docs.info.apple.com/article.html?artnum=303538.
Une fois les files d’attente d’impression créées, importez les réglages enregistrés :
serveradmin settings exported_print_settings
VPN
Restaurez ce qui suit :
 /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist.
 /Bibliothèque/Keychains/System.keychain
 /etc/racoon/psk.text
Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text,
ce secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist
ou System.keychain.
Faites migrer l’utilisateur de la clé VPN MPPE à l’aide de l’outil de ligne de commande
vpnaddkeyagentuser. Pour en savoir plus sur cette commande, reportez-vous à sa
page man.
Configuration DNS
Pour faire migrer la configuration DNS :
1 Restaurez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout son
contenu.
2 Dans Admin Serveur, sélectionnez DNS dans la liste des ordinateurs et des services.
Une zone de dialogue apparaît et vous demande s’il faut effectuer la mise à niveau :
 Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers
de configuration du service DNS qui existaient avant la migration vers la version 10.5.
Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez
les effectuer directement dans les fichiers de configuration du service DNS.
 Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration
à niveau au format de la version 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur
pour apporter des modifications à la configuration du service DNS.48 Chapitre 3Migration à partir de Mac OS X Server 10.4
Réglages DHCP
Pour migrer la configuration DHCP :
1 Ouvrez Admin Serveur, puis sélectionnez DHCP dans la liste des ordinateurs et des services.
2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages DHCP
à partir du fichier que vous avez exporté auparavant (voir « DHCP » à la page 38).
3 Examinez les sous-fenêtres Sous-réseaux et Cartes statiques du service DHCP pour
vous assurer que les réglages de sous-réseau et de liaison statique ont été correctement importés.
Données utilisateur
Restaurez les fichiers de données utilisateur enregistrés.
Placez les répertoires de départ dans des emplacements correspondant à ceux des
enregistrements utilisateur importés. Si nécessaire, vous pouvez utiliser Gestionnaire
de groupe de travail pour éditer les comptes utilisateur, de sorte que les emplacements dans le compte et sur le disque soient identiques.
Fichiers et dossiers du Serveur d’enchaînement QuickTime
Suivez les instructions qui apparaissent dans Administration de QuickTime Streaming et
Broadcasting pour réutiliser les fichiers et les dossiers enregistrés à partir de /Bibliothè-
que/QuickTimeStreaming/.
Fichiers et dossiers de QTSS Publisher
QTSS Publisher a été supprimé de Mac OS X Server 10.5.Toutefois, les fichiers créés avec
QTSS Publisher sous la version 10.4 devraient continuer à fonctionner normalement avec
la version 10.5.
Restaurez les fichiers et les dossiers de QTSS Publisher sur Mac OS X Server 10.5.
En principe, les fichiers multimédias et MP3 QTSS Publisher sont stockés dans :
 /Bibliothèque/Application Support/Apple/ QTSS Publisher/Libraries/
 /Users//Bibliothèque/Application Support/Apple/QTSS
Publisher/Libraries/
Pour faire migrer les listes de lecture multimédias et MP3 QTSS Publisher vers
Administration web QTSS :
1 Déplacez tous les dossiers qui se trouvent dans /Bibliothèque/Application Support/
Apple/QTSS Publisher/Playlists/ vers /Bibliothèque/QuickTimeStreaming/Playlists.
Par exemple, vous déplacez :
/Bibliothèque/Application Support/Apple/QTSS Publisher/Playlists/my_playlist/
Pour
/Bibliothèque/QuickTimeStreaming/Playlists/my_playlist/Chapitre 3 Migration à partir de Mac OS X Server 10.4 49
2 Vérifiez que le propriétaire des dossiers et des fichiers qui se trouvent dans
/Bibliothèque/QuickTimeStreaming/Playlists est bien qtss.
3 Dans le cas des listes de lecture multimédias, vérifiez que le dossier /Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/Media/ contient les fichiers multimédias
répertoriés dans les fichiers .playlist.
4 Pour les listes de lecture MP3, vérifiez que le dossier /Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/MP3/ contient les fichiers multimédias répertoriés
dans les fichiers .playlist.
5 Mettez à jour le fichier .config de chaque liste de lecture de sorte que les chemins d’accès
indiquent le nouveau dossier contenant les listes de lecture dans /Bibliothèque/QuickTimeStreaming/Playlists.
Ceci inclut les chemins définis dans les préférences pid_file, playlist_file et sdp_file
(listes de lecture multimédias uniquement).
6 Activez l’administration web QTSS à l’aide d’Admin Serveur.
7 Ouvrez l’Administration web à l’aide de Safari (http://:1220), puis ouvrez
une session.
8 Cliquez sur Listes de lecture.
Vous pouvez maintenant commencer à gérer les listes de lecture QTSS Publisher
à l’aide de l’Administration web QTSS.
Pour obtenir des informations sur l’Administration web, reportez-vous au Guide de
l’administrateur du Serveur d’enchaînement Darwin de QuickTime Streaming Server
disponible à l’adresse developer.apple.com/opensource/server/streaming.
Serveur iChat
Pour faire migrer les réglages du serveur iChat :
1 Restaurez les dossiers suivants :
 /var/jabber/spool
 /etc/jabber
2 Exécutez le script suivant avec les privilèges root :
sudo execute “/Système/Bibliothèque/ServerSetup/MigrationExtras/
58_jabbermigrator.pl
Le script 58_jabbermigrator.pl appelle trois autres scripts pour faire migrer les réglages
du serveur iChat. Le cas échéant, vous pouvez exécuter ces scripts individuellement pour
personnaliser la migration. Les scripts sont accompagnés d’une documentation qui contient des informations utiles.50 Chapitre 3Migration à partir de Mac OS X Server 10.4
Étape 8 :configuration de points de partage et d’autorisations
Créez à nouveau les points de partage et les privilèges en fonction des besoins.
Pour créer un point de partage et configurer des autorisations :
1 Ouvrez Admin Serveur, puis cliquez sur Partage de fichiers.
2 Cliquez sur Volumes, puis sélectionnez le volume ou le dossier que vous voulez partager.
3 Cliquez sur Partager.
4 Cliquez sur Autorisations pour configurer les autorisations d’accès.
5 Cliquez sur Enregistrer.
Les nouveaux points de partage sont partagés à l’aide des services AFP, SMB et FTP,
mais pas NFS. Pour exporter un point de partage avec NFS, utilisez le volet Protocole.
Pour en savoir plus sur la configuration des points de partage, reportez-vous à Administration des services de fichier.
Étape 9 :test du nouveau serveur
Pour tester le nouveau serveur :
1 Ouvrez Gestionnaire de groupe de travail et inspectez les comptes d’utilisateur et
de groupe.
2 Ouvrez Admin Serveur et inspectez les réglages des services dont vous avez migré
les données de configuration.4
51
4 Mise à niveau de
Mac OS X Server 10.3
Suivez les instructions de ce chapitre pour mettre à niveau
un serveur 10.3.9 vers la version 10.5.
Vous pouvez mettre à niveau les ordinateurs qui tournent sous Mac OS X Server 10.3.9
si leur disque dur n’a pas besoin d’être reformaté et s’ils présentent les caractéristiques
suivantes :
 un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus ;
 au moins 1 Go de mémoire vive (RAM) ;
 au moins 20 Go d’espace disque disponible.
Éléments pouvant être réutilisés
Lorsque vous effectuez une mise à niveau à partir de Mac OS X Server 10.3.9, quasiment
toutes les données et tous les réglages existants sont conservés et peuvent être utilisés.
Toutefois, tenez compte des remarques suivantes :
 Il est possible de réutiliser les images NetBoot créées avec la version 10.3.
 Dans la version 10.5, watchdog a été remplacé par launchd. Pour réactiver le redé-
marrage matériel automatique, utilisez la sous-fenêtre Économiseur d’énergie des
Préférences Système. Pour faire migrer les réglages pour les services que vous avez
ajoutés à /etc/watchdog.conf, créez un fichier launchd plist et installez-le dans
/Système/Bibliothèque/LaunchDaemons/. Pour en savoir plus, reportez-vous à
la page man de launchd.conf.
 Dans la version 10.5, hwmond a été remplacé par launchd.
 Les mises à niveau vers la version 10.5 suppriment l’application QTSS Publisher mais
laissent les fichiers utilisés par celle-ci. En principe, ces fichiers doivent continuer à
fonctionner normalement avec la version 10.5, mais vous devez les déplacer jusqu’aux
emplacements appropriés. Pour en savoir plus sur le déplacement de ces fichiers,
reportez-vous à « Fichiers et dossiers de QTSS Publisher » à la page 48.
Remarque :le Gestionnaire Macintosh n’est pas pris en charge sous Mac OS X Server 10.5.52 Chapitre 4Mise à niveau de Mac OS X Server 10.3
Mise à niveau d’un maître Open Directory et de ses répliques
Si le serveur que vous voulez mettre à niveau est un maître ou une réplique
Open Directory, mettez tout d’abord à niveau le maître, et ensuite les répliques.
Pour mettre à niveau le maître et ses répliques :
1 Mettez le maître à niveau vers la version 10.5 en suivant les instructions indiquées
dans « Instructions pas à pas » à la page 53.
Pendant la mise à niveau du maître, les ordinateurs clients ne peuvent pas se connecter
à ce dernier pour accéder aux services Open Directory.
En outre, il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai
lors de la recherche automatique de la réplique de serveur Open Directory la plus proche.
Vous pouvez remédier à ce retard en modifiant le service DHCP pour utiliser l’adresse d’un
serveur réplique Open Directory si le serveur fournit aux clients l’adresse d’un serveur LDAP.
Lorsque la mise à niveau du maître est terminée, vous pouvez modifier le service DHCP
pour utiliser l’adresse du maître.
Pour obtenir des instructions sur la configuration des réglages LDAP relatifs au service
DHCP, reportez-vous à Administration des services de réseau.
2 Mettez chaque réplique de serveur à niveau vers la version 10.5.
3 À l’aide d’Admin Serveur, connectez-vous à chaque serveur réplique et rétablissez
les répliques.
Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître,
consultez la section « Services de répertoire » à la page 58.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 53
Instructions pas à pas
Pour mettre à niveau un serveur 10.3.9 vers la version 10.5, suivez les instructions
de cette rubrique.
Étape 1 :mettez votre serveur à jour vers la version 10.3.9
Au besoin,servez-vous de la Mise à jour de logiciels pour mettre votre serveur à jour vers
la version10.3.9.
Étape 2 :enregistrez tous les réglages de service
Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service pour
pouvoir vous y reporter ultérieurement. Par ailleurs,servez-vous des Informations Système
pour générer un profil complet de votre système. Enregistrez les réglages de service exportés et le profil de votre serveur sur un disque amovible ou sur un autre système.
Avant la mise à niveau, il est recommandé de créer un clone complet et démarrable
du serveur et de le tester en le démarrant afin de disposer d’une copie de sauvegarde
au cas où elle s’avérerait nécessaire par la suite.
Étape 3 :enregistrez les réglages du service d’impression
Enregistrez les réglages du service d’impression à l’aide de la commande serveradmin
settings print avant de démarrer la mise à niveau.
serveradmin settings print > exported_print_settings
Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir
les utiliser ultérieurement.
1 Mettez votre serveur à jour
vers la version 10.2.8.
2 Effectuez une installation de mise
à niveau vers la version 10.4.
3 Effectuez les réglages nécessaires
après l'installation initiale du serveur.54 Chapitre 4Mise à niveau de Mac OS X Server 10.3
Étape 4 :effectuez une mise à niveau vers la version 10.5
Vous pouvez vous servir du disque d’installation de la version 10.5 pour effectuer la mise
à niveau locale sur votre ordinateur serveur si ce dernier est relié à un écran, à un clavier
et à un lecteur optique.
Une fois la mise à niveau terminée, l’ordinateur redémarre et l’Assistant du serveur vous
indique la marche à suivre pour la configuration initiale de ce dernier. Vos réglages existants sont affichés et vous pouvez les modifier si vous le souhaitez.
Pour effectuer une mise à niveau vers la version 10.5 et configurez les réglages initiaux
du serveur au niveau local :
1 Assurez-vous que les serveurs DHCP ou DNS dont dépend votre serveur sont en marche.
2 Allumez l’ordinateur et insérez le disque d’installation dans le lecteur optique.
3 Redémarrez l’ordinateur en maintenant appuyée la touche C de votre clavier.
L’ordinateur démarre à partir du disque d’installation. Vous pouvez relâcher la touche
C lorsque le logo Apple s’affiche.
Pour obtenir des informations sur le redémarrage d’un système Xserve sans périphérique
de contrôle, reportez-vous au Guide de l’utilisateur fourni avec le système.
4 Lorsque le programme d’installation s’ouvre, suivez les instructions à l’écran de chaque
sous-fenêtre en cliquant sur Continuer pour passer à la suivante.
Remarque :dans la sous-fenêtre Sélectionner une destination, assurez-vous de sélectionner le disque ou la partition sur lequel la version v10.3.9 est installée.
Au cours de l’installation, l’état d’avancement des opérations est affiché.
Une fois l’installation terminée, l’ordinateur redémarre et l’Assistant du serveur s’ouvre
pour vous permettre de procéder à la configuration initiale du serveur.
5 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées.
Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier
si vous le souhaitez.
Pour chaque serveur que vous mettez à niveau,saisissez un numéro de série unique de
logiciel serveur.Vous trouverez ce numéro imprimé sur les documents fournis avec le logiciel. Si vous possédez une licence de site, vous devez saisir le nom du propriétaire enregistré et l’organisation exactement tels qu’ils ont été spécifiés par votre représentant Apple.
Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé
des données.
6 Révisez les données de configuration, en cliquant de manière facultative sur Revenir
pour les modifier.
7 Pour lancer la configuration du serveur, cliquez sur Appliquer.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 55
8 Au terme de la configuration du serveur, cliquez sur Redémarrer.
Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie
après la mise à niveau du serveur.
Pour effectuer une mise à niveau vers la version 10.5 et configurer à distance
les réglages initiaux du serveur :
1 Assurez-vous que tous les serveurs DHCP ou DNS dont dépend votre serveur sont
en cours d’exécution.
2 Démarrez l’ordinateur à partir du disque d’installation.
La procédure utilisée dépend de la présence ou de l’absence d’un lecteur optique capable
de lire votre disque d’installation sur le serveur cible. Si vous disposez d’un DVD d’installation, le lecteur optique doit pouvoir lire les DVD.
Si le serveur cible est équipé d’un clavier et d’un lecteur optique capable de lire votre
disque d’installation, insérez ce dernier dans le lecteur optique, puis redémarrez l’ordinateur tout en maintenant la touche C du clavier enfoncée.
Si le serveur cible est un système Xserve équipé d’un lecteur optique intégré capable
de lire votre disque d’installation, démarrez le serveur à l’aide du disque d’installation
en suivant les instructions du Guide de l’utilisateur Xserve relatives au démarrage à partir
d’un disque système.
Si le serveur cible ne dispose pas d’un lecteur optique intégré capable de lire votre disque
d’installation, vous pouvez le démarrer en mode disque cible et insérer le disque d’installation dans le lecteur optique de votre ordinateur administrateur. Vous pouvez aussi vous
servir d’un lecteur optique FireWire externe.
Si le serveur cible est un système Xserve, vous pouvez déplacer son module de disque
sur un autre système Xserve équipé d’un lecteur optique capable de lire votre disque
d’installation.
Vous trouverez des instructions relatives à l’utilisation du mode disque cible et des lecteurs
optiques externes dans le guide Présentation, dans le guide Premiers contacts ou dans le
Guide de l’utilisateur qui vous ont été fournis avec votre système Xserve ou votre ordinateur Macintosh.
3 Sur un ordinateur administrateur, naviguez jusqu’à /Applications/Server/, ouvrez l’Assistant
du serveur (il n’est pas nécessaire de disposer des privilèges d’administrateur sur l’ordinateur local pour pouvoir utiliser l’Assistant du serveur), puis sélectionnez « Installer les logiciels sur un serveur distant ».
4 Identifiez le serveur que vous souhaitez mettre à niveau.
Si celui-ci se trouve sur le sous-réseau local, sélectionnez-le dans la liste.
Sinon, cliquez sur Serveur à l’adresse IP puis saisissez une adresse IP au format IPv4
(000.000.000.000).56 Chapitre 4Mise à niveau de Mac OS X Server 10.3
5 Lorsque vous êtes invité à saisir un mot de passe, tapez l’ancien mot de passe
d’administrateur.
6 Avancez dans les écrans d’installation en suivant les instructions affichées.
7 Lorsque la sous-fenêtre Volumes apparaît,sélectionnez un disque ou un volume
(partition) cible et cliquez sur Continuer.
Au cours de l’installation, l’état d’avancement des opérations est affiché.
Une fois l’installation terminée, l’ordinateur redémarre, puis l’Assistant du serveur
s’ouvre et une sous-fenêtre Bienvenue apparaît.
8 Pour lancer la configuration du serveur, sélectionnez « Configurer un serveur distant »
et cliquez sur Continuer.
9 Dans la sous-fenêtre Destination, placez une coche dans la colonne Appliquer du serveur distant que vous mettez à niveau, puis tapez son mot de passe de préréglage
dans le champ Mot de passe et cliquez sur Continuer pour vous connecter au serveur.
Si le serveur n’apparaît pas dans la liste, cliquez sur Ajouter pour l’ajouter ou Actualiser
pour voir s’il est disponible.
10 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées.
Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier
si vous le souhaitez.
Pour chaque serveur que vous mettez à niveau, vous devez saisir un numéro de série unique de logiciel serveur.Vous trouverez ce numéro imprimé sur les documents fournis avec
le logiciel. Si vous possédez une licence de site,saisissez le nom du propriétaire enregistré
et celui de son organisation tels qu’ils ont été spécifiés par votre représentant Apple.
Lorsque vous utilisez la sous-fenêtre Utilisation du répertoire, il est plus sûr de sélectionner l’option « Aucune modification » dans la configuration de répertoire du serveur. Une
fois la configuration terminée, vous pouvez effectuer certains ajustements si nécessaire.
Pour ce faire,suivez les instructions qui apparaissent dans Administration d’Open Directory.
Il est impossible d’activer ou de désactiver le service de messagerie ou le service WebDAV dans la sous-fenêtre Services. Si l’un ou l’autre de ces services est en cours d’exécution lorsque vous effectuez la mise à niveau, il sera en cours d’exécution une fois la mise
à niveau terminée. De même,si l’un ou l’autre de ces services est inactif lors de la mise
à niveau, il restera inactif après celle-ci.
Pour activer ou désactiver le service de messagerie ou le service WebDAV, servez-vous
d’Admin Serveur une fois la configuration initiale du serveur terminée.
Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé
des données.
11 Révisez les données de configuration, en cliquant de manière facultative sur Revenir
pour les modifier.
12 Pour lancer la configuration du serveur, cliquez sur Appliquer.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 57
13 Au terme de la configuration du serveur, cliquez sur Redémarrer.
Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie
après la mise à niveau du serveur.
Étape 5 :procédez aux ajustements nécessaires au terme de la configuration initiale
du serveur
Servez-vous du Gestionnaire de groupe de travail, d’Admin Serveur, de Terminal et des
autres applications pour affiner les réglages de votre serveur et tirer parti des nouvelles
fonctionnalités de la version 10.5.
Pour obtenir des explications relatives aux nouvelles fonctionnalités et à celles qui ont
été modifiées, reportez-vous au guide d’administration de chaque service. Voici quelques
suggestions intéressantes.
WebObjects
Restaurez httpd.conf à la version précédente (httpd.conf.AppleSaved), ou incluez
la ligne suivante dans le nouveau fichier httpd.conf :
Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf
Si vous n’avez pas installé Java 1.4.2 sur votre serveur 10.3.9, vous devez mettre manuellement à jour les projets d’application WebObjects pour pouvoir utiliser la version
de la Machine virtuelle Java (JVM, Java Virtual Machine) qui vous a été fournie avec
la version 10.5.
Pour mettre à jour un projet WebObjects :
1 Ouvrez le projet dans Xcode.
2 Dans la présentation Expert des réglages de la cible principale, changez la valeur de la propriété de JAVA_VM à java.
Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont
désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin
Serveur. Si le serveur que vous mettez à niveau comprend l’élément de démarrage
/Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet
élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportezvous à Administration des technologies web et Déploiement de WebObjects.58 Chapitre 4Mise à niveau de Mac OS X Server 10.3
Certificats Secure Sockets Layer (SSL)
Servez-vous d’Admin Serveur pour importer les certificats SSL existants que vous souhaitez
continuer à utiliser pour les services iChat, Open Directory, de messagerie ou web.
Pour importer un certificat SSL :
1 Ouvrez Admin Serveur.
2 Dans la liste des ordinateurs et des services, sélectionnez le serveur mis à niveau.
3 Cliquez sur Certificats.
4 Importez les certificats que vous souhaitez utiliser.
Vous pouvez aussi créer un certificat auto-signé et générer une demande de signature
de certificat (CSR, Certificate Signing Request) afin d’obtenir un certificat SSL délivré
par une autorité de certificat, puis installer celui-ci.
5 Cliquez sur Enregistrer.
6 Activez les certificats de chaque service.
Pour en savoir plus sur l’importation, la création et l’activation des certificats auto-signés,
reportez-vous à Administration du service iChat, Administration du service de messagerie, à
Administration d’Open Directory et à Administration des technologies web.
Groupes
Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités de la version 10.5 telles que l’emboîtement et la vérification plus stricte de l’adhésion de groupe,
mettez les fiches de groupe à niveau à l’aide du Gestionnaire de groupe de travail.
Pour mettre à niveau un enregistrement de groupe :
1 Ouvrez Gestionnaire de groupe de travail.
2 Ouvrez le répertoire qui contient les groupes concernés.
3 Sélectionnez un ou plusieurs groupes, puis cliquez sur « Mettre à niveau le groupe hérité ».
4 Cliquez sur Enregistrer.
Services de répertoire
Après la mise à niveau, il est conseillé de convertir un répertoire NetInfo partagé en LDAP.
Pour obtenir des informations détaillées sur les avantages de l’utilisation du protocole
LDAP et pour savoir comment effectuer la conversion à l’aide d’Admin Serveur, reportezvous à Administration d’Open Directory.
Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est
pas activé, servez-vous de la commande suivante qui permet de conserver les mots
de passe existants et de les ajouter à un nouveau centre de distribution de clés
(KDC, Key Distribution Center) :
slapconfig -kerberizeChapitre 4 Mise à niveau de Mac OS X Server 10.3 59
Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés
et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous
pouvez vous servir du Gestionnaire de groupe de travail pour utiliser un mot de passe
Open Directory :
Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez
au répertoire dans lequel réside le compte utilisateur. Authentifiez-vous en tant
qu’administrateur de domaine Open Directory (habituellement, diradmin), puis sélectionnez un utilisateur avec un mot de passe chiffré. Cliquez sur Avancé, choisissez
Open Directory dans le menu local Type du mot de passe, cliquez sur Élémentaires,
spécifiez un nouveau mot de passe, puis cliquez sur Enregistrer.
Pour en savoir plus sur slapconfig, reportez-vous à sa page man.
Listes de contrôle d’accès LDAP
En raison d’un changement de format, vous devez déplacer manuellement les listes
de contrôle d’accès (ACL, Access Control List) LDAP une fois la mise à niveau terminée.
Pendant le processus de mise à niveau, le contenant ou la fiche des contrôles d’accès
(accesscontrols) et des informations relatives aux listes de contrôles n’est disponible
qu’en lecture seule.
Ajoutez des listes de contrôle d’accès personnalisées au nouvel attribut olcAccess (dans
olcBDBConfig).Vous devez aussi vous servir de la directive set au lieu de la directive group.
Schémas LDAP
Si vous mettez à jour le fichier slapd.conf lors de l’ajout de fichiers de schéma, exécutez
la commande slaptest. Cette commande permet d’identifier le changement correspondant à l’ajout du nouveau schéma et de le rendre persistant dans la base de données.
Pour exécuter la commande slaptest :
1 Créez une copie de sauvegarde du répertoire slapd.d (dans /etc/openldap).
2 Exécutez la commande suivante pour spécifier un autre fichier slapd.conf :
slaptest -f -F
3 Comparez l’ancien répertoire slapd.d et le nouveau pour déterminer les modifications
à effectuer.
4 Relancez slapd.
Images NetBoot
Après la mise à niveau, vous pouvez réutiliser les images NetBoot créées avec
la version v10.3.
Pour gérer les images Netboot, servez-vous de l’Utilitaire d’images de système,
qui remplace l’Utilitaire d’images de réseau pendant la mise à niveau.60 Chapitre 4Mise à niveau de Mac OS X Server 10.3
Service d’impression
Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer
à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés.
Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes
au serveur et les allumez.Toutefois, vous devez ajouter les imprimantes réseau en cliquant
sur Admin Serveur > Impression (pour les imprimantes LPR ou AppleTalk) ou sur
Préférences Système > Imprimantes et fax (pour tous les types d’imprimante).
Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de
lui redonner le même nom que celui qu’elle avait avant le processus de mise à niveau.
Si le nom est différent, Admin Serveur n’importera pas les réglages correctement.
Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD générique) »
pour toute file d’attente appliquant des quotas étant donné qu’il existe des problèmes
connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour
en savoir plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous
trouverez à l’adresse suivante :
http://docs.info.apple.com/article.html?artnum=303538.
Une fois les files d’attente d’impression créées, importez les réglages enregistrés :
réglages serveradmin exported_print_settings
DNS
La première fois que vous sélectionnez DNS dans Admin Serveur après une mise
à niveau, Admin Serveur vous demande si vous souhaitez effectuer une mise à niveau.
Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers
de configuration du service DNS qui existaient avant la mise à niveau vers la version 10.5.
Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez éditer
les fichiers de configuration du service DNS.
Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration
à niveau au format 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur pour apporter
des modifications à la configuration du service DNS.
Historique de la mise à niveau d’Open Directory
Les informations relatives à la mise à niveau du serveur LDAP Open Directory sont stockées
dans le fichier /Bibliothèque/Logs/slapconfig.log.
Service Web
Si vous avez apporté des modifications à /etc/httpd/workers.properties, appliquez
à nouveau celles-ci à la version du fichier installée avec la version 10.5.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 61
Mise à niveau du serveur web Apache vers la version 2.2
à partir de la version 1.3
Lorsque vous effectuez une mise à niveau de Mac OS X Server 10.3.9 vers Mac OS X Server
10.5, le processus de mise à niveau maintient la configuration de service web utilisée pour
exécuter Apache 1.3.
Pour passer à la version 2.2 d’Apache après la mise à niveau vers Mac OS X Server 10.5,
utilisez l’option du service web prévue pour la mise à niveau d’Apache, accessible depuis
Admin Serveur. Pour en savoir plus, consultez la section « Mise à niveau du serveur web
Apache vers la version 2.2 à partir de la version 1.3 » à la page 27.5
63
5 Migration à partir de
Mac OS X Server 10.3
Suivez les instructions de ce chapitre si vous devez faire
migrer des données d’un serveur 10.3.9 vers un autre
ordinateur tournant sous la version 10.5.
Il est possible de faire migrer les données qui se trouvent sur des ordinateurs Mac OS X
Server 10.3.9 même si ceux-ci ne peuvent pas être ou ne seront pas mis à niveau vers
la version 10.5 ou ultérieure. Il se peut que ces ordinateurs :
 requièrent un reformatage du disque dur ou un remplacement par un ordinateur
plus récent ;
 utilisent un matériel de serveur qui ne dispose pas des éléments suivants :
 un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus,
 au moins 1 Go de mémoire vive (RAM),
 au moins 20 Go d’espace disque disponible.
Avant de commencer
Avant de suivre les instructions de ce chapitre, procédez à la configuration initiale
du serveur 10.5 vers lequel vous ferez migrer les données. Pour obtenir des instructions, consultez la section Premiers contacts.
Au besoin, mettez à niveau le serveur dont vous ferez migrer les données de sorte
qu’il tourne sous la version 10.3.9.
Si le serveur est un maître ou une réplique Open Directory, configurez tout d’abord
le maître 10.5, puis les répliques 10.5.64 Chapitre 5Migration à partir de Mac OS X Server 10.3
Pour rétablir le maître et ses répliques :
1 Configurez le maître 10.5.
Pendant la configuration du maître, les ordinateurs clients ne peuvent pas se connecter au maître 10.3.9 pour accéder aux services Open Directory.
En outre, il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai
lors de la recherche automatique de la réplique de serveur Open Directory la plus proche.
Vous pouvez remédier à ce retard en modifiant le service DHCP pour utiliser l’adresse
d’un serveur réplique Open Directory s’il fournit aux clients l’adresse d’un serveur LDAP.
Lorsque le maître 10.5 est prêt, vous pouvez modifier le service DHCP de sorte qu’il utilise
l’adresse du maître.
Pour obtenir des instructions sur la configuration des réglages LDAP relatifs au service
DHCP, reportez-vous à Administration des services de réseau.
2 Modifiez le rôle de la réplique 10.3.9 de sorte qu’elle soit autonome, puis configurez
le serveur 10.5 pour en faire une réplique du maître 10.5.
Administration d’Open Directory contient des instructions relatives à la modification du rôle
Open Directory d’un serveur afin de rendre ce dernier autonome et d’en faire une réplique.
Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître,
consultez l’étape 6 page 73.
Éléments pouvant migrer
Les informations qui apparaissent dans « Instructions pas à pas » à la page 66 expliquent
comment réutiliser avec la version 10.5 les données de la version 10.3 indiquées ci-dessous :
 Données de configuration Web
 Contenu Web
 Données MySQL
 Base de données de courrier
 Données WebMail
 Fichiers de configuration FTP
 Images NetBoot
 Applications et structures WebObjects
 Données Tomcat
 Applications JBoss
 Réglages AFP
 Configuration de coupe-feu IP
 Configuration DNS
 Réglages DHCP
 Réglages NATChapitre 5 Migration à partir de Mac OS X Server 10.3 65
 Réglages d’impression
 Réglages VPN
 Données utilisateur, notamment les répertoires de départ
 Fichiers et dossiers du Serveur d’enchaînement QuickTime
 Fichiers et dossiers de QTSS Publisher
 Comptes d’utilisateur et de groupe
Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service afin
de pouvoir vous y reporter ultérieurement. Enregistrez les réglages de service exportés
sur un disque amovible ou sur un autre système.
Remarque :l’une des méthodes permettant d’enregistrer les réglages de service dans
Admin Serveur consiste à sélectionner le service dans la liste des ordinateurs et des
services située à gauche, à cliquer sur Réglages, puis à faire glisser le bouton situé
dans l’angle inférieur droit sur le Bureau. Cette action crée sur le Bureau un fichier
contenant les réglages de service.
Dans la version 10.5, watchdog a été remplacé par launchd. Pour réactiver le redémarrage
automatique du matériel, utilisez la sous-fenêtre Économiseur d’énergie des Préférences
Système. Pour faire migrer les réglages correspondant aux services que vous avez ajoutés
à /etc/watchdog.conf, créez un fichier plist launchd et installez-le dans /Système/Bibliothèque/LaunchDaemons/. Pour en savoir plus sur launchd, reportez-vous à sa page man.
Outils pouvant être utilisés
Plusieurs outils sont disponibles :
 Vous pouvez vous servir du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe de la version 10.3 vers un fichier délimité par des caractères,
puis les importer dans un serveur 10.5.Vous pouvez également importer des utilisateurs
et des groupes à l’aide de l’outil de ligne de commande dsimport.
 La fonction d’importation de Gestionnaire de groupe de travail et l’outil dsimport
vous permettent également d’importer d’autres types de données, comme des
ordinateurs et des listes d’ordinateurs.
 Utilisez l’outil 59_webconfigmigrator pour faire migrer votre configuration Web.
 Utilisez l’outil 50_ipfwconfigmigrator pour faire migrer votre configuration
de coupe-feu.
Les instructions des sections suivantes expliquent quand et comment utiliser ces utilitaires.66 Chapitre 5Migration à partir de Mac OS X Server 10.3
Instructions pas à pas
Pour déplacer des données d’un ordinateur Mac OS X Server 10.3.9 vers un ordinateur
sur lequel Mac OS X Server 10.5 est installé, suivez les instructions de cette rubrique.
Étape 1 :exportation d’utilisateurs et de groupes
Servez-vous du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe depuis un répertoire NetInfo ou LDAP3 vers un fichier délimité
par des caractères qui peut ensuite être importé dans un répertoire pour être utilisé
avec Mac OS X Server 10.5.
1 Exportez les informations
des utilisateurs et groupes.
2 Créez des fichiers d'archive des données
et un fichier utilisateur d'exportation.
4 Copiez les fichiers d'archive
vers le nouveau serveur.
6 Importez les fichiers des
utilisateurs et groupes.
8 Configurez les points de
partage et les autorisations.
9 Testez le nouveau serveur.
7 Replacez les fichiers de données
sur le nouveau serveur.
3 Notez les points de partage
et les autorisations actuels.
utilisateur
groupe
2017
Gestionnaire de groupe de travail
Gestionnaire de
groupe de travail
ou outil dsimport
5 Configurez l'infrastructure
des répertoires de départ.
Ingénierie
Lecture et écriture
Bureau d'études
Documents
Lecture seule
Lecture et écriture
Shared Folders
Shared Folders
Ingénierie
Lecture et écriture
Bureau
d'études
Documents
Lecture seule
Lecture et écriture
.XML
Ingénierie
Lecture et écriture
Bureau d'études
Documents
Lecture seule
Lecture et écriture
Shared Folders
utilisateur
groupe
2017
donnéesutilisateur.tar
basededonnées.tar
donnéesutilisateur.tar
basededonnées.tarChapitre 5 Migration à partir de Mac OS X Server 10.3 67
Pour exporter des utilisateurs et des groupes :
1 Dans Gestionnaire de groupe de travail, cliquez sur Comptes, puis sur l’icône représentant un globe sous la barre d’outils et choisissez le répertoire à partir duquel vous souhaitez exporter des comptes.
2 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine.
3 Cliquez sur le bouton Utilisateurs pour exporter des utilisateurs ou sur le bouton Groupes
pour exporter des groupes.
4 Exportez les comptes utilisateurs ou de groupe comme suit :
 Pour exporter l’ensemble des comptes, sélectionnez-les tous.
 Pour exporter un compte particulier, sélectionnez-le.
 Pour exporter plusieurs comptes, sélectionnez-les en maintenant enfoncée la touche
Commande ou Maj.
5 Choisissez Serveur > Exporter.
6 Spécifiez un nom à attribuer au fichier d’exportation ainsi que son emplacement.
7 Cliquez sur Exporter.
Lorsque vous exportez des utilisateurs à l’aide de Gestionnaire de groupe de travail,
les informations des mots de passe ne sont pas exportées. Si vous souhaitez définir
des mots de passe, vous pouvez modifier le fichier d’exportation avant de l’importer
ou définir chaque mot de passe après l’importation à l’aide de la commande passwd
ou du Gestionnaire de groupe de travail. Pour en savoir plus sur la définition des mots
de passe après l’importation des utilisateurs, reportez-vous à Gestion des utilisateurs.
Étape 2 :créez des archives des fichiers suivants
Enregistrez tous les fichiers de données que vous souhaitez réutiliser avec Mac OS X
Server 10.5. Lors de l’étape 4, vous déplacerez les fichiers décrits ci-dessous, ainsi que le
fichier d’exportation créé lors de l’étape 1 vers l’ordinateur qui tourne sous la version 10.5.
Pour les grandes quantités de données, vous pouvez créer une ou plusieurs archives
tar, ou utiliser /usr/bin/mkdmg pour créer des fichiers d’image disque. Vous pouvez
transférer des images disque et des fichiers tar en vous servant des protocoles AFP
ou FTP.
Remarque :vous pouvez aussi utiliser scp -r pour effectuer une copie sécurisée des
fichiers et rsync pour copier les fichiers à distance. La commande rsync est particulièrement utile si vous avez une grande quantité de données qu’il est possible de faire migrer
avant le passage à la nouvelle version puis de mettre rapidement à jour.68 Chapitre 5Migration à partir de Mac OS X Server 10.3
Pour créer une archive tar, utilisez la commande tar dans l’application Terminal. L’indicateur -c de la commande crée un fichier d’archives au format tar. Utilisez l’indicateur -
f pour spécifier le nom du fichier d’archives. Utilisez l’indicateur -v (détaillé) pour afficher les informations relatives à la progression lors de l’exécution de la commande :
tar -cvf /MyHFSVolume/Stuff.tar /MyHFSVolume/My\ Stuff
Le caractère d’échappement (\ dans l’exemple ci-dessus) indique un espace dans le nom.
Vous pouvez également utiliser des guillemets pour gérer les espaces incorporés :
tar -cvf /MyHFSVolume/Stuff.tar “/MyHFSVolume/My Stuff”
Données de configuration Web
Enregistrez les fichiers et les répertoires suivants :
 /etc/httpd/httpd.conf
 /etc/httpd/httpd_macosxserver.conf
 /etc/httpd/httpd_squirrelmail.conf
 /etc/httpd/magic
 /etc/httpd/mime.types
 /etc/httpd/mime_macosxserver.types
 /etc/httpd/ssl.crt
 /etc/httpd/ssl.key
 /etc/httpd/tomcat.conf
 /etc/webperfcache/webperfcache.conf
 /Bibliothèque/WebServer/
Contenu Web
Copiez le contenu Web que vous souhaitez réutiliser à partir de :
 /Bibliothèque/WebServer/Documents/
 /Bibliothèque/WebServer/CGI-Executables/
 Tout autre emplacement dans lequel il se trouve
Données MySQL
Mac OS X Server 10.3.9 comprend la version 4.0.18 de MySQL. Mac OS X Server 10.5 installe
MySQL 5.0.45.
Pour faire migrer des bases de données MySQL d’un ordinateur vers un autre, vous
pouvez vous servir de la commande mysqldump afin de créer une copie de sauvegarde
de vos données. Cette commande est différente selon l’ampleur des données à sauvegarder. La migration peut en effet concerner des tables individuelles, une ou plusieurs
bases de données ou toutes les bases de données qui se trouvent sur le serveur.Chapitre 5 Migration à partir de Mac OS X Server 10.3 69
Pour créer une copie de sécurité de tables particulières, tapez :
mysqldump database tb1 [tb2 tb3...] > backup-file.sql
où database est le nom de la base de données qui contient les tables répertoriées
et tb1, tb2 et tb3 le nom des tables.
Pour créer une copie de sauvegarde d’une ou plusieurs bases de données, tapez :
mysqldump --databases db1 [db2 db3...] > backup-file.sql
Pour créer une copie de sauvegarde de toutes les bases de données du système, tapez :
mysqldump --all-databases > backup-file.sql
Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de
la restauration des bases de données dans la documentation relative à MySQL sur
le site www.mysql.org.
Pour créer une copie de sauvegarde des tables ou des bases de données qui requièrent
un accès root (par exemple, les tables d’octroi de privilèges et les autres données d’accès
restreint), exécutez la commande mysqldump avec les options --user=root et -p :
mysqldump --user=root -p --all-datagases > backup-file.sql
Lorsque vous utilisez l’option -p, mysqldump vous demande le mot de passe root de MySQL
avant de continuer.
Base de données de courrier
Si vous souhaitez réutiliser la base de données et le stockage du courrier, arrêtez le service de messagerie s’il est en cours d’exécution et enregistrez les fichiers de la messagerie. Si le service de messagerie n’est pas en cours d’exécution, vous pouvez copier
tous ses répertoires.
Par défaut :
 La base de données de courrier est situé à l’emplacement /var/imap/.
 Le stockage de courrier est situé à l’emplacement /var/spool/imap/. Vous pouvez
sauvegarder des dossiers individuels de stockage de courrier ou bien l’ensemble
du stockage de courrier.
L’outil de ligne de commande ditto est utile pour sauvegarder les fichiers de courrier.
Pour en savoir plus sur ditto, reportez-vous à sa page man.
Par ailleurs, enregistrez une copie du fichier /usr/bin/cyrus/bin/ctl_mboxlist afin de pouvoir
déplacer celui-ci sur le serveur 10.5 lors de l’étape 4 décrite page 72. Ce fichier est nécessaire pour que la migration de la base de données du service de messagerie puisse se faire
correctement lors de l’étape 7 décrite page 75.70 Chapitre 5Migration à partir de Mac OS X Server 10.3
Données WebMail
Si vous avez utilisé SquirrelMail, installé en même temps que la version 10.3, et que vous
souhaitez continuer à vous en servir après la migration, créez des copies des carnets
d’adresses et des préférences stockés dans /var/db/squirrelmail/data/.
Fichiers de configuration FTP
Pour migrer vos réglages FTP, sauvegardez les fichiers de configuration suivants :
AFP
Enregistrez /Bibliothèque/Preferences/com.apple.AppleFileServer.plist.
Images NetBoot
Vous pouvez faire migrer les images NetBoot créées avec Mac OS X Server 10.3.
Enregistrez le dossier .nbi de chacune des images que vous souhaitez faire
migrer en notant le chemin d’accès à ce dossier si vous souhaitez le créer à nouveau
dans la version 10.5.
Enregistrez aussi les réglages NetBoot. Dans Admin Serveur, sélectionnez NetBoot dans
la liste des ordinateurs et des services située à gauche, cliquez sur Réglages, puis faites
glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette action crée sur
le Bureau un fichier contenant les réglages du service NetBoot. Enregistrez ce fichier.
Applications et structures WebObjects
Enregistrez les applications et structures WebObjects situées dans :
 /Bibliothèque/WebObjects/
 /Système/Bibliothèque/WebObjects/
Données Tomcat
Enregistrez les servlets Tomcat que vous souhaitez réutiliser. Ils se trouvent dans
/Bibliothèque/Tomcat/webapps/.
Si vous avez installé Axis indépendamment de la version fournie avec le serveur,
enregistrez les éventuels services SOAP (Simple Object Access Protocol).
Applications JBoss
Enregistrez les applications JBoss situées dans /Bibliothèque/JBoss/3.2/deploy/.
Dans ce répertoire Sauvegardez ces fichiers
/Bibliothèque/FTPServer/Configuration/ ftpaccess
ftpconversions
ftphosts
ftpgroups
ftpusers
/Bibliothèque/FTPServer/Messages/ banner.txt
welcome.txt
limit.txtChapitre 5 Migration à partir de Mac OS X Server 10.3 71
Coupe-feu IP
Dans l’application Terminal, exécutez la commande suivante :
sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/
50_ipfwconfigmigrator
Ensuite, enregistrez le contenu de /etc/ipfilter.
NAT
Enregistrez le contenu de /etc/nat/natd.plist.
Impression
Utilisez la commande serveradmin settings print pour enregistrer les réglages
d’impression avant de commencer le processus de migration.
serveradmin settings print > exported_print_settings
Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir
les utiliser ultérieurement.
VPN
Copiez :
 /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist
 /Bibliothèque/Keychains/System.keychain
 /etc/racoon/psk.text
Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text,
ce secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist
ou System.keychain.
DNS
Enregistrez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout
son contenu.
DHCP
Dans Admin Serveur, sélectionnez le service DHCP à gauche, cliquez sur Réglages, puis
faites glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette action crée
sur le Bureau un fichier contenant les réglages du service DHCP. Enregistrez ce fichier.
Données utilisateur
Enregistrez tous les dossiers ou fichiers de données utilisateur que vous souhaitez réutiliser,
en particulier les dossiers du répertoire de départ.
Fichiers et dossiers du Serveur d’enchaînement QuickTime
Enregistrez les fichiers et les dossiers du répertoire /Bibliothèque/QuickTimeStreaming/.72 Chapitre 5Migration à partir de Mac OS X Server 10.3
Fichiers et dossiers de QTSS Publisher
Enregistrez ce qui suit :
 les fichiers et les dossiers qui se trouvent dans
/Bibliothèque/Application Support/Apple/QTSS Publisher/
 les fichiers et les dossiers de chaque chemin d’utilisateur QTSS Publisher :
/Users//Bibliothèque/Application Support/Apple/QTSS
Publisher
Étape 3 :points de partage et autorisations actuels
Si votre serveur 10.3 contient des points de partage et des privilèges que vous souhaitez
créer à nouveau sur le serveur 10.5, notez-les. Consignez les points de partage destinés
aux répertoires de départ.
Étape 4 :copie des fichiers d’archive sur le nouveau serveur
Transférez les fichiers enregistrés lors des étapes 1 et 2 sur le serveur 10.5.
Pour transférer les fichiers tar ou les images de disque via FTP :
1 Utilisez Admin Serveur sur le nouveau serveur afin de démarrer le service FTP.
2 Configurez le partage pour le dossier dans lequel vous placerez les fichiers transférés
depuis l’ordinateur 10.3.
3 Sur le serveur 10.3, servez-vous du service FTP pour copier les fichiers tar ou les images
disque sur l’ordinateur 10.5.
4 Sur le serveur 10.5, double-cliquez sur un fichier tar pour en extraire le contenu ou doublecliquez sur une image disque pour la monter.
Étape 5 :configuration de l’infrastructure des répertoires de départ
Configurez la destination des répertoires de départ que vous souhaitez restaurer.
L’emplacement des répertoires de départ identifié dans les comptes d’utilisateur importés
doit correspondre à l’emplacement physique des répertoires de départ restaurés, y compris
l’emplacement du point de partage.
Pour obtenir des explications détaillées sur la marche à suivre en ce qui concerne les étapes
de la procédure ci-dessous, reportez-vous à Gestion des utilisateurs.
Pour préparer le serveur pour le stockage des répertoires de départ :
1 Si nécessaire, créez le dossier que vous souhaitez utiliser comme point de partage
du répertoire de départ.
Si vous le souhaitez, vous pouvez utiliser le dossier /Utilisateurs prédéfini.
2 Ouvrez Admin Serveur sur le serveur où vous souhaitez stocker les répertoires de départ.Chapitre 5 Migration à partir de Mac OS X Server 10.3 73
3 Cliquez sur Partage de fichiers pour configurer un point de partage pour les répertoires
de départ.
Si les comptes utilisateurs sont destinés à résider dans un répertoire Open Directory
partagé, créez un point de partage AFP ou NFS à montage automatique dynamique
pour les répertoires de départ. Assurez-vous que le point de partage est publié dans
le répertoire dans lequel résideront les comptes d’utilisateur qui en dépendent.
4 Dans le Gestionnaire de groupe de travail de l’ordinateur à partir duquel vous allez
importer les utilisateurs, cliquez sur Comptes, puis ouvrez le répertoire dans lequel
les utilisateurs importés seront stockés.
Si vous restaurez les répertoires de départ à des emplacements qui ne correspondent
pas exactement à ceux identifiés dans les fiches utilisateurs exportées, vous pouvez
configurer un préréglage qui identifie l’emplacement de restauration. Si vous identifiez
le préréglage lors de l’importation des utilisateurs, le nouvel emplacement remplace
celui qui existe dans les enregistrements utilisateur.
Vous pouvez également utiliser le préréglage pour spécifier d’autres réglages par
défaut dont les utilisateurs importés doivent hériter, par exemple pour les mots
de passe, le courrier, etc.
Étape 6 :importation d’utilisateurs, de groupes et d’autres données
Vous pouvez vous servir du Gestionnaire de groupe de travail ou de l’outil dsimport
pour importer des utilisateurs, des groupes et d’autres données :
Pour en savoir plus sur l’importation à l’aide du Gestionnaire de groupe de travail,
reportez-vous à Gestion des utilisateurs.
Pour en savoir plus sur les mots de passe des utilisateurs créés à l’origine avec
Mac OS X Server 10.1.5 ou antérieur, reportez-vous à Administration d’Open Directory.
Pour en savoir plus sur dsimport et pour obtenir une description du format d’exportation
du Gestionnaire de groupe de travail, reportez-vous à Administration de ligne de commande.74 Chapitre 5Migration à partir de Mac OS X Server 10.3
Pour importer des utilisateurs et des groupes à l’aide de Gestionnaire de groupe
de travail :
1 Placez les fichiers d’exportation créés lors de l’étape 1 dans un emplacement accessible
à partir du serveur.
Vous pouvez modifier les comptes d’utilisateur dans un fichier d’exportation si vous souhaitez définir des mots de passe avant d’importer les utilisateurs. Pour obtenir des instructions, consultez la section Gestion des utilisateurs.
En outre, vous pouvez configurer le préréglage défini lors de l’étape 5 ci-dessus de sorte
que le mot de passe des utilisateurs soit validé à l’aide de l’authentification Open Directory, et vous pouvez configurer les options de validation de mot de passe afin d’obliger
les utilisateurs à changer de mot de passe la prochaine fois qu’ils ouvriront une session.
Pour obtenir des informations sur l’utilisation de mots de passe Kerberos, reportez-vous
à la dernière étape de cette procédure.
2 Dans Gestionnaire de groupe de travail, cliquez sur Comptes.
3 Dans la barre d’outils, cliquez sur l’icône représentant un globe afin d’ouvrir le répertoire
dans lequel vous souhaitez importer les comptes.
4 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine.
5 Choisissez Serveur > Importer, sélectionnez le fichier d’importation, puis spécifiez
les options d’importation.
Si vous utilisez un préréglage, assurez-vous de le spécifier.
6 Cliquez sur Importer.
7 Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités
de la version 10.5, mettez-les à niveau à l’aide du Gestionnaire de groupe de travail.
Dans le Gestionnaire de groupe de travail, ouvrez le répertoire qui contient les groupes,
sélectionnez un ou plusieurs groupes, cliquez sur « Mettre à niveau le groupe hérité »,
puis cliquez sur Enregistrer.
8 Pour créer des répertoires de départ pour les utilisateurs importés, utilisez l’une des options
suivantes :
Créez les répertoires de départ un par un, en sélectionnant un compte d’utilisateur
dans Gestionnaire de groupe de travail, en cliquant sur Départ, puis sur Créer Départ.
Créez tous les répertoires de départ en utilisant l’argument -a de la commande
createhomedir. Pour plus de détails, reportez-vous à Administration de ligne de commande ou à la page man de createhomedir.
S’il n’existe pas déjà, un répertoire de départ associé à un point de partage AFP est créé
la première fois que l’utilisateur ouvre une session.Chapitre 5 Migration à partir de Mac OS X Server 10.3 75
9 Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est
pas activé, servez-vous de la commande suivante qui permet de conserver les mots
de passe existants et de les ajouter à un nouveau centre de distribution de clés
(KDC, Key Distribution Center).
slapconfig -kerberize
Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés
et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous
pouvez vous servir du Gestionnaire de groupe de travail pour utiliser un mot de passe
Open Directory.
Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez
au répertoire où réside le compte utilisateur. Authentifiez-vous en tant qu’administrateur
de domaine, puis sélectionnez un utilisateur avec un mot de passe crypté. Cliquez sur
Avancé, choisissez Open Directory dans le menu local Type du mot de passe, cliquez
sur Élémentaires,spécifiez un nouveau mot de passe, puis cliquez sur Enregistrer.
Pour en savoir plus sur slapconfig, reportez-vous à sa page man.
Étape 7 :replacement des fichiers de données enregistrés
Placez les fichiers enregistrés à partir de votre serveur 10.3 dans leurs emplacements
respectifs finaux.
Données de configuration Web
Pour faire migrer les données de configuration web :
1 Ouvrez Admin Serveur.
2 Sous le serveur 10.5 dans la liste des ordinateurs et des services, cliquez sur Web.
3 Cliquez sur « Arrêter le service web » si le service web est en cours d’exécution.
4 Supprimez les fichiers suivants :
 /etc/httpd/sites
 /etc/httpd/ssl.crt
 /etc/httpd/ssl.key
5 Copiez le répertoire et les fichiers enregistrés avec la version 10.3 sur le serveur 10.5.
6 Ouvrez l’application Terminal, puis, avec les privilèges root, tapez la commande
suivante :
sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/59_webconfigmigrator
Un historique des modifications apportées aux fichiers est créé dans le fichier /Bibliothèque/Logs/Migration/webconfigmigrator.log.
Les fichiers de la version 10.3 qui se trouvent dans /etc/httpd/ sont renommés de sorte
que leurs noms soient httpd.conf.obsolete, httpd_macosxserver.conf.obsolete et
mime_macosxserver.types.obsolete.
Un nouveau fichier httpd.conf et un nouveau répertoire de sites sont créés.76 Chapitre 5Migration à partir de Mac OS X Server 10.3
7 Si vous avez modifié /etc/httpd/workers.properties, appliquez à nouveau toutes
les modifications à la version du fichier installée avec le serveur 10.5.
Le fichier workers.properties de la version 10.5 contient une nouvelle entrée pour
le service Blog.
8 Dans Admin Serveur, démarrez le service Web.
Contenu Web
Copiez le contenu web enregistré dans les emplacements suivants et dans tous
les autres endroits où vous avez placé du contenu web sur le serveur :
 /Bibliothèque/WebServer/Documents/
 /Bibliothèque/WebServer/CGI-Executables/
Données MySQL
Avant d’importer les données sauvegardées de MySQL, assurez-vous que le service
MySQL est activé. Vous pouvez activer le service MySQL à l’aide d’Admin Serveur
ou de la commande serveradmin.
Pour activer le service MySQL à l’aide de la commande serveradmin, tapez :
serveradmin start mysql
Pour importer les copies de sauvegarde de bases de données, tapez :
mysql < backup-file.sql
Pour importer des données dans des bases de données auxquelles il n’est possible
d’accéder que si l’on dispose de privilèges, exécutez la commande mysql avec les
options --user=root et -p :
mysql --user=root -p < backup-file.sql
Lorsque vous utilisez l’option -p, mysql vous demande le mot de passe root de MySQL
avant de continuer.
Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de la restauration des bases de données MySQL dans la documentation relative à MySQL sur le
site web www.mysql.org.Chapitre 5 Migration à partir de Mac OS X Server 10.3 77
Base de données de courrier
Pour migrer la base de données de courrier :
1 Assurez-vous que le service de messagerie de la version 10.5 n’est pas en cours d’exécution.
Ouvrez Admin Serveur, puis cliquez sur Courrier. Si le cercle qui se trouve sur le côté
gauche et qui correspond à la messagerie (Mail) n’est pas grisé, cliquez sur Arrêter Mail
(dans l’angle inférieur gauche).
2 Restaurez la base de données de courrier et le stockage de courrier enregistrés.
La base de données de courrier est située par défaut à l’emplacement /var/imap/
et le stockage de courrier dans /var/spool/imap/.
3 Assurez-vous que les répertoires de la messagerie et leur contenu appartiennent
au groupe de messagerie et à l’utilisateur _cyrus.
4 Renommez le fichier ctl_mboxlist enregistré de sorte que son nom soit
ctl_mboxlist.old, puis déplacez-le vers /usr/bin/cyrus/bin/.
Si ce fichier ctl_mboxlist.old est inexistant, le script upgradedb ne fonctionnera
pas correctement lors de l’étape 8 ci-dessous.
5 Dans Admin Serveur, sélectionnez Mail dans la liste des ordinateurs et des services.
6 Cliquez sur Réglages, puis sur Avancé, et ensuite sur Base de données pour indiquer
l’emplacement dans lequel vous avez restauré la base de données et le stockage
du courrier.
7 Cliquez sur Enregistrer.
8 Exécutez le script upgradedb de la base de données de courrier :
sudo -u cyrusimap /Système/Bibliothèque/ServerSetup/SetupExtras/upgradedb
9 Exécutez la commande suivante pour vous assurer que les fichiers d’index de tous
les comptes de messagerie fonctionnent correctement :
sudo /usr/bin/cyrus/bin/reconstruct –i
10 Dans Admin Serveur, lancez le service de messagerie en cliquant sur Mail,
puis sur Démarrer Mail.
Données WebMail
Placez les carnets d’adresses et les préférences enregistrés dans le répertoire
/var/db/squirrelmail/data/.
Fichiers de configuration FTP
Copiez les fichiers de configuration FTP enregistrés dans :
 /Bibliothèque/FTPServer/Configuration/
 /Bibliothèque/FTPServer/Messages/78 Chapitre 5Migration à partir de Mac OS X Server 10.3
Configuration AFP
Pour faire migrer la configuration AFP, restaurez /Bibliothèque/Préférences/
com.apple.AppleFileServer.plist.
Images NetBoot
Copiez le dossier .nbi correspondant à chaque image que vous souhaitez
faire migrer et placez-le éventuellement à l’emplacement où il se trouvait auparavant.
Par ailleurs, restaurez le fichier qui contient les réglages NetBoot.
Pour restaurer les réglages NetBoot :
1 Ouvrez Admin Serveur, puis sélectionnez NetBoot dans la liste des ordinateurs
et des services.
2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages NetBoot
à partir du fichier que vous avez exporté auparavant (voir « Images NetBoot » à la page 70).
3 Révisez ces réglages NetBoot pour vous assurer qu’ils ont été correctement importés.
Applications et structures WebObjects
Pour faire migrer WebObjects :
1 Copiez les applications enregistrées dans /Bibliothèque/WebObjects/Applications/.
2 Copiez les cadres d’applications enregistrés dans /Bibliothèque/Frameworks/.
3 Ajoutez la ligne suivante au nouveau fichier httpd.conf :
Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf
Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin Serveur.
Si le serveur que vous mettez à niveau comprend l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services
WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportez-vous à Administration
destechnologiesweb et Déploiement deWebObjects.
4 (Facultatif) Si Java 1.4.2 n’était pas installé sur votre serveur 10.3, mettez les projets
d’application WebObjects à jour manuellement en les ouvrant un par un dans Xcode ;
ensuite, dans la présentation Expert des réglages de la cible principale, changez la valeur
de la propriété de JAVA_VM à java.
Il est nécessaire de mettre ces projets à jour manuellement pour pouvoir utiliser la version
de la Machine virtuelle Java (JVM,Java Virtual Machine) fournie avec Mac OS X Server 10.5.
Important :il faut que Java 1.5 soit installé pour que WebObjects 5.4, qui est inclus avec
Mac OS X Server 10.5, puisse fonctionner.Chapitre 5 Migration à partir de Mac OS X Server 10.3 79
Données Tomcat
Restaurez les servlets Tomcat dans /Bibliothèque/Tomcat/webapps/.
Placez les services SOAP que vous souhaitez faire migrer dans /Bibliothèque/Tomcat/
webapps/axis/. Il se peut que Mac OS X Server 10.5 comprenne une version d’Axis plus
récente ou plus ancienne que celle que vous utilisiez jusqu’à présent.
Applications JBoss
JBoss n’est pas fourni avec Mac OS X Server 10.5. Pour pouvoir restaurer vos applications
JBoss, vous devez installer JBoss sur votre serveur.
Pour en savoir plus sur l’installation et la migration des applications JBoss, reportez-vous
à la documentation de JBoss.
Configuration de coupe-feu IP
Pour faire migrer la configuration du Coupe-feu IP, restaurez le dossier /etc/ipfilter.
Ouvrez Admin Serveur, puis cliquez sur Coupe-feu pour vérifier les réglages et vous
assurer qu’ils sont correctement configurés.
NAT
Restaurez le contenu de /etc/nat/natd.plist.
Vous pouvez restaurer à tout moment les réglages NAT par défaut de la version 10.5
(qui se trouvent dans /etc/natd/natd.plist.default) en supprimant le fichier de la configuration active (/etc/nat/natd.plist). Lors de l’accès suivant au NAT à l’aide d’Admin
Serveur, le fichier de configuration par défaut est utilisé pour la création d’un nouveau
fichier de configuration active.
Remarque :dans la version 10.5, le réglage par défaut d’unregistered_only dans
/etc/nat/natd.plist.default est « vrai ».
Réglages du service d’impression
Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer
à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés.
Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes
au serveur et les allumez. Pour les imprimantes réseau, vous devez ajouter les imprimantes
en cliquant sur Admin Serveur > Impression (pour les imprimantes LPR ou AppleTalk)
ou sur Préférences Système > Imprimantes et fax (pour tous les types d’imprimante).
Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de lui
redonner le même nom que celui qu’elle avait sur l’ancien système. Si le nom est différent,
Admin Serveur n’importera pas les réglages correctement.80 Chapitre 5Migration à partir de Mac OS X Server 10.3
Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD générique) »
pour toute file d’attente appliquant des quotas étant donné qu’il existe des problèmes connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour en savoir
plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous trouverez à
l’adresse suivante http://docs.info.apple.com/article.html?artnum=303538.
Une fois les files d’attente d’impression créées, importez les réglages enregistrés :
réglages serveradmin exported_print_settings
VPN
Restaurez ce qui suit :
 /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist.
 /Bibliothèque/Keychains/System.keychain
 /etc/racoon/psk.text
Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text, ce
secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist
ou System.keychain.
Faites migrer l’utilisateur de la clé VPN MPPE à l’aide de l’outil de ligne de commande
vpnaddkeyagentuser. Pour en savoir plus sur cette commande, reportez-vous à sa page
man.
Configuration DNS
Pour faire migrer la configuration DNS :
1 Restaurez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout
son contenu.
2 Dans Admin Serveur, sélectionnez DNS dans la liste des ordinateurs et des services.
Une zone de dialogue apparaît et vous demande s’il faut effectuer la mise à niveau :
 Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers
de configuration du service DNS qui existaient avant la migration vers la version 10.5.
Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez apporter les modifications directement dans les fichiers de configuration du service DNS.
 Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration
à niveau au format de la version 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur pour apporter des modifications à la configuration du service DNS.Chapitre 5 Migration à partir de Mac OS X Server 10.3 81
Réglages DHCP
Pour migrer la configuration DHCP :
1 Ouvrez Admin Serveur, puis sélectionnez DHCP dans la liste des ordinateurs et des services.
2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages DHCP
à partir du fichier que vous avez exporté auparavant (voir « DHCP » à la page 71).
3 Examinez les sous-fenêtres Sous-réseaux et Cartes statiques du service DHCP pour
vous assurer que les réglages de sous-réseau et de liaison statique ont été correctement importés.
Données utilisateur
Restaurez les fichiers de données utilisateur enregistrés.
Placez les répertoires de départ dans des emplacements correspondant à ceux des
enregistrements utilisateur importés. Si nécessaire, vous pouvez utiliser Gestionnaire
de groupe de travail pour éditer les comptes utilisateur, de sorte que les emplacements dans le compte et sur le disque soient identiques.
Fichiers et dossiers du Serveur d’enchaînement QuickTime
Suivez les instructions qui apparaissent dans Administration de QuickTime Streaming et
Broadcasting pour réutiliser les fichiers et les dossiers enregistrés à partir de /Bibliothè-
que/QuickTimeStreaming/.
Fichiers et dossiers de QTSS Publisher
QTSS Publisher a été supprimé de Mac OS X Server 10.5. Toutefois, les fichiers créés
avec QTSS Publisher sous la version 10.4 continuent à fonctionner normalement
avec la version 10.5.
Restaurez les fichiers et les dossiers de QTSS Publisher sur Mac OS X Server 10.5.
En principe, les fichiers multimédias et MP3 QTSS Publisher sont stockés dans :
 /Bibliothèque/Application Support/Apple/ QTSS Publisher/Libraries/
 /Users/
/Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/82 Chapitre 5Migration à partir de Mac OS X Server 10.3
Pour faire migrer les listes de lecture multimédias et MP3 QTSS Publisher vers
Administration web QTSS :
1 Déplacez tous les dossiers de /Bibliothèque/Application Support/Apple/QTSS Publisher/
Playlists/ vers /Bibliothèque/QuickTimeStreaming/Playlists.
Par exemple, ceci implique de déplacer :
/Bibliothèque/Application Support/Apple/QTSS Publisher/Playlists/my_playlist/
Pour
/Bibliothèque/QuickTimeStreaming/Playlists/my_playlist/
2 Vérifiez que le propriétaire des dossiers et des fichiers qui se trouvent à l’intérieur de
/Bibliothèque/QuickTimeStreaming/Playlists est bien qtss.
3 Dans le cas des listes de lecture multimédias, vérifiez que le dossier /Bibliothèque/
Application Support/Apple/QTSS Publisher/Libraries/Media/ contient les fichiers multimédias répertoriés dans les fichiers .playlist.
4 Pour les listes de lecture MP3, vérifiez que le dossier /Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/MP3/ contient les fichiers multimédias répertoriés
dans les fichiers .playlist.
5 Mettez à jour le fichier .config de chaque liste de lecture de sorte que les chemins
d’accès indiquent le nouveau dossier dans lequel se trouvent les listes de lecture
dans /Bibliothèque/QuickTimeStreaming/Playlists.
Ceci inclut les chemins définis dans les préférences pid_file, playlist_file et sdp_file
(listes de lecture multimédias uniquement).
6 Activez l’administration web QTSS à l’aide d’Admin Serveur.
7 Ouvrez l’Administration web à l’aide de Safari (http://:1220), puis ouvrez
une session.
8 Cliquez sur Listes de lecture.
Vous pouvez maintenant commencer à gérer les listes de lecture QTSS Publisher à l’aide
de l’Administration web QTSS.
Pour obtenir des informations sur l’Administration web, reportez-vous au Guide de
l’administrateur du Serveur d’enchaînement Darwin de QuickTime Streaming Server
disponible à l’adresse developer.apple.com/opensource/server/streaming.Chapitre 5 Migration à partir de Mac OS X Server 10.3 83
Étape 8 :configuration de points de partage et d’autorisations
Créez à nouveau les points de partage et les privilèges en fonction des besoins.
Pour créer un point de partage et configurer des autorisations :
1 Ouvrez Admin Serveur, puis cliquez sur Partage de fichiers.
2 Cliquez sur Volumes, puis sélectionnez le volume ou le dossier que vous voulez partager.
3 Cliquez sur Partager.
4 Cliquez sur Autorisations pour configurer les autorisations d’accès.
5 Cliquez sur Enregistrer.
Les nouveaux points de partage sont partagés à l’aide des services AFP, SMB et FTP,
mais pas NFS. Pour exporter un point de partage avec NFS, utilisez le volet Protocole.
Pour en savoir plus sur la configuration des points de partage, reportez-vous à Administration des services de fichier.
Étape 9 :test du nouveau serveur
Pour tester le nouveau serveur :
1 Ouvrez Gestionnaire de groupe de travail et inspectez les comptes d’utilisateur
et de groupe.
2 Ouvrez Admin Serveur et inspectez les réglages des services dont vous avez migré
les données de configuration.6
85
6 Migration à partir de
Mac OS X Server 10.2
Suivez les instructions de ce chapitre si vous devez faire
migrer des données d’un serveur 10.2.8 vers un autre
ordinateur exécutant la version 10.5.
Vous pouvez faire migrer des données d’ordinateurs Mac OS X Server 10.2.8 qui ne
peuvent être ou ne seront mis à niveau vers la version 10.5 ou ultérieure. Il se peut
que ces ordinateurs :
 requièrent un reformatage du disque dur ou un remplacement par un ordinateur
plus récent ;
 utilisent un matériel de serveur qui ne dispose pas des éléments suivants :
 un processeur Intel ou PowerPC G5 ou G4 (cadencé à 867 MHz ou plus),
 au moins 1 Go de RAM,
 au moins 20 Go d’espace disque disponible.
Avant de commencer
Avant de suivre les instructions figurant dans ce chapitre, procédez à une configuration
initiale du serveur 10.5 vers lequel vous ferez migrer des données. Pour obtenir des instructions, consultez la section Premiers contacts.
Si nécessaire, mettez à niveau le serveur dont vous ferez migrer les données, de sorte
qu’il exécute la version 2.8.86 Chapitre 6Migration à partir de Mac OS X Server 10.2
Éléments pouvant migrer
Les informations de la section « Instructions pas à pas » à la page 87 décrivent comment
réutiliser les données 10.2 suivantes avec 10.5 :
 Données de configuration Web
 Contenu Web
 Base de données de courrier
 Données WebMail
 Fichiers de configuration FTP
 Applications et structures WebObjects
 Données Tomcat
 Configuration DNS
 Données utilisateur, notamment les répertoires de départ
 Fichiers et répertoires du Serveur d’enchaînement QuickTime
 Comptes d’utilisateur et de groupe
Utilisez serveradmin ou Admin Serveur pour exporter les réglages de service pour
référence. Stockez les réglages de service exportés sur un support amovible ou un
autre système.
Remarque :pour enregistrer les réglages de service dans Admin Serveur, vous pouvez
par exemple sélectionner le service dans la liste d’ordinateurs et de services sur la gauche,
cliquer sur Réglages et faire glisser le bouton dans l’angle inférieur droit du bureau. Le glissement de ce bouton crée un fichier sur le bureau contenant les réglages de service.
Dans la version 10.5, watchdog est remplacé par launchd. Pour réactiver le redémarrage
matériel automatique, utilisez la sous-fenêtre Économiseur d’énergie des Préférences
Système.Pour faire migrer des réglages de services ajoutés à /etc/watchdog.conf, créez
un fichier launchd plist et copiez-le dans /Système/Bibliothèque/LaunchDaemons/.
Pour en savoir plus sur launchd, consultez sa page man.
Outils pouvant être utilisés
Plusieurs outils sont disponibles :
 Utilisez Gestionnaire de groupe de travail pour exporter des comptes utilisateur et
de groupes de la version 10.2 vers un fichier de données séparées par des caractères,
puis pour les importer dans un serveur 10.5.Vous pouvez également importer des utilisateurs et des groupes à l’aide de l’outil de ligne de commande dsimport.
 La fonction d’importation de Gestionnaire de groupe de travail et l’outil dsimport
vous permettent également d’importer d’autres types de données, comme des
ordinateurs et des listes d’ordinateurs.
 Utilisez l’outil 59_webconfigmigrator pour faire migrer votre configuration Web.Chapitre 6 Migration à partir de Mac OS X Server 10.2 87
 Utilisez la commande Importer dans Admin Serveur pour importer des réglages
de service.
Les instructions des sections suivantes expliquent quand et comment utiliser ces utilitaires.
Instructions pas à pas
Pour déplacer des données d’un ordinateur Mac OS X Server 10.2.8 vers un ordinateur
équipé de Mac OS X Server 10.5, suivez les instructions de cette section.
1 Exportez les informations
des utilisateurs et groupes.
2 Créez des fichiers d'archive des données
et un fichier utilisateur d'exportation.
4 Copiez les fichiers d'archive
vers le nouveau serveur.
6 Importez les fichiers des
utilisateurs et groupes.
8 Configurez les points de
partage et les autorisations.
9 Testez le nouveau serveur.
7 Replacez les fichiers de données
sur le nouveau serveur.
3 Notez les points de partage
et les autorisations actuels.
utilisateur
groupe
2017
Gestionnaire de groupe de travail
Gestionnaire de
groupe de travail
ou outil dsimport
5 Configurez l'infrastructure
des répertoires de départ.
Ingénierie
Lecture et écriture
Bureau d'études
Documents
Lecture seule
Lecture et écriture
Shared Folders
Shared Folders
Ingénierie
Lecture et écriture
Bureau
d'études
Documents
Lecture seule
Lecture et écriture
.XML
Ingénierie
Lecture et écriture
Bureau d'études
Documents
Lecture seule
Lecture et écriture
Shared Folders
utilisateur
groupe
2017
donnéesutilisateur.tar
basededonnées.tar
donnéesutilisateur.tar
basededonnées.tar88 Chapitre 6Migration à partir de Mac OS X Server 10.2
Étape 1 :exportation d’utilisateurs et de groupes
Utilisez Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de
groupes d’un répertoire NetInfo ou LDAPv3 vers un fichier de données séparées par des
caractères que vous pouvez importer dans un répertoire en vue d’une utilisation avec
Mac OS X Server 10.5.
Pour exporter des utilisateurs et des groupes :
1 Dans Gestionnaire de groupe de travail, cliquez sur Comptes puis sur l’icône illustrant un
globe sous la barre d’outils et choisissez le répertoire depuis lequel exporter des comptes.
2 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine.
3 Cliquez sur le bouton Utilisateurs pour exporter des utilisateurs, ou sur le bouton Groupes
pour exporter des groupes.
4 Exportez des comptes utilisateurs ou de groupes comme suit :
 Pour exporter tous les comptes, sélectionnez-les tous.
 Pour exporter un seul compte, sélectionnez-le.
 Pour exporter plusieurs comptes, sélectionnez-les en maintenant enfoncée la touche
Commande ou Maj.
5 Choisissez Serveur > Exporter.
6 Spécifiez un nom à attribuer au fichier d’exportation ainsi que son emplacement.
7 Cliquez sur Exporter.
Lorsque vous exportez des utilisateurs à l’aide de Gestionnaire de groupe de travail, les
informations des mots de passe ne sont pas exportées. Pour définir des mots de passe,
vous pouvez modifier le fichier d’exportation avant de l’importer, ou bien définir des mots
de passe de façon individuelle après importation à l’aide de la commande passwd ou de
Gestionnaire de groupe de travail. Pour en savoir plus sur la définition des mots de passe
après importation, consultez Gestion des utilisateurs.
Étape 2 :créez des archives des fichiers ci-après.
Enregistrez tous les fichiers de données à réutiliser avec Mac OS X Server 10.5. À l’étape
4, vous déplacerez les fichiers décrits ci-dessous, ainsi que le fichier d’exportation créé
à l’étape 1, vers l’ordinateur 10.5.
Pour les grandes quantités de données, vous pouvez créer une ou plusieurs archives
tar, ou utiliser /usr/bin/mkdmg pour créer des fichiers d’image disque. Vous pouvez
transférer des images disque et des fichiers tar via AFP ou FTP.
Remarque :vous pouvez également utiliser scp -r pour sécuriser la copie de fichiers
et rsync pour effectuer des copies de fichiers à distance. La commande rsync s’avère
particulièrement utile dans le cas d’une grande quantité de données que vous pouvez
faire migrer, puis mettre à jour dans une petite fenêtre de temps d’arrêt.Chapitre 6 Migration à partir de Mac OS X Server 10.2 89
Pour créer une archive tar, utilisez la commande tar dans l’application Terminal. L’indicateur de commande -c crée un fichier d’archive au format tar. Utilisez l’indicateur -f
pour préciser le nom du fichier d’archive. Utilisez l’indicateur -v (verbose) pour afficher
les informations de progression lors de l’exécution de la commande :
tar -cvf /MyHFSVolume/Stuff.tar /MyHFSVolume/My\ Stuff
Le caractère d’échappement (\ dans l’exemple ci-dessus) indique un espace dans le nom.
Vous pouvez également utiliser des guillemets pour gérer les espaces incorporés :
tar -cvf /MyHFSVolume/Stuff.tar “/MyHFSVolume/My Stuff”
Données de configuration Web
Enregistrez les fichiers et les répertoires suivants :
 /etc/httpd/httpd.conf
 /etc/httpd/httpd_macosxserver.conf
 /etc/httpd/httpd_squirrelmail.conf
 /etc/httpd/magic
 /etc/httpd/mime.types
 /etc/httpd/mime_macosxserver.types
 /etc/httpd/ssl.crt
 /etc/httpd/ssl.key
 /etc/httpd/tomcat.conf
 /etc/webperfcache/webperfcache.conf
 /Bibliothèque/WebServer/
Contenu Web
Copiez le contenu Web que vous souhaitez réutiliser à partir de :
 /Bibliothèque/WebServer/Documents/
 /Bibliothèque/WebServer/CGI-Executables/
 Tout autre emplacement dans lequel il se trouve
Base de données de courrier
Sauvegardez la base de données de courrier, si vous souhaitez la réutiliser.
Son emplacement par défaut est /Bibliothèque/AppleMailServer/.
Données WebMail
Si vous utilisez SquirrelMail déjà présent au moment de l’installation de la version 10.2
et voulez continuer à l’utiliser après la migration, faites des copies des carnets d’adresses
et des préférences stockés dans /var/db/squirrelmail/data/.90 Chapitre 6Migration à partir de Mac OS X Server 10.2
Fichiers de configuration FTP
Pour migrer vos réglages FTP, sauvegardez les fichiers de configuration suivants :
Applications et structures WebObjects
Enregistrez les applications et structures WebObjects situées dans :
 /Bibliothèque/WebObjects/
 /Système/Bibliothèque/WebObjects/
Données Tomcat
Enregistrez les servlets Tomcat que vous souhaitez réutiliser. Ils se trouvent dans
/Bibliothèque/Tomcat/webapps/.
Si vous avez installé Axis indépendamment de la version fournie avec le serveur, enregistrez
les éventuels services SOAP (Simple Object Access Protocol).
Coupe-feu IP
Il est impossible de faire migrer directement les informations de configuration du coupefeu IP vers Mac OS X Server 10.5 car NetInfo n’est pas pris en charge dans cette version.
Vous pouvez procéder de l’une des manières suivantes :
 taper à nouveau manuellement les règles du coupe-feu ;
 faire migrer les informations de configuration vers un système Mac OS X Server 10.3
ou 10.4, puis vers la version 10.5.
Pour faire migrer les informations du coupe-feu vers un système Mac OS X Server 10.3
ou 10.4, enregistrez la configuration du coupe-feu IP après l’exécution de la commande
suivante depuis l’application Terminal :
nidump -r /config/IPFilters . > firewallconfig
Cette commande écrit l’enregistrement de configuration du coupe-feu IP stocké
dans NetInfo dans un fichier nommé firewallconfig :
Pour terminer le processus de migration, consultez « Configuration de coupe-feu IP »
à la page 96.
Dans ce répertoire Sauvegardez ces fichiers
/Bibliothèque/FTPServer/Configuration/ ftpaccess
ftpconversions
ftphosts
ftpgroups
ftpusers
/Bibliothèque/FTPServer/Messages/ banner.txt
welcome.txt
limit.txtChapitre 6 Migration à partir de Mac OS X Server 10.2 91
DNS
Enregistrez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout
son contenu.
DHCP
Dans Admin Serveur,sélectionnez DHCP dans la liste d’ordinateurs et de services sur
la gauche, cliquez sur Réglages et faites glisser le bouton dans l’angle inférieur droit
du bureau. Le glissement de ce bouton crée un fichier sur le bureau contenant les réglages
du service DHCP.Enregistrez ce fichier.
Données utilisateur
Enregistrez tous les dossiers et les fichiers de données utilisateur que vous souhaitez
réutiliser, en particulier les dossiers du répertoire de départ.
Fichiers et dossiers du Serveur d’enchaînement QuickTime
Enregistrez les fichiers et les dossiers du répertoire /Bibliothèque/QuickTimeStreaming/.
Pour en savoir plus sur la migration de QTSS, consultez Administration de QuickTime
Streaming et Broadcasting.
Étape 3 :points de partage et autorisations actuels
Si votre serveur 10.2 possède des points de partage et des privilèges que vous voulez
recréer sur le serveur 10.5, relevez-les. Notez les points de partage qui concernent
les répertoires de départ.
Étape 4 :copie des fichiers d’archive sur le nouveau serveur
Transférez les fichiers enregistrés aux étapes 1 et 2 sur le serveur 10.5.
Pour transférer les fichiers tar ou les images de disque via FTP :
1 Utilisez Admin Serveur sur le nouveau serveur afin de démarrer le service FTP.
2 Configurez le partage pour un dossier dans lequel vous placez les fichiers que vous transférez depuis l’ordinateur version 10.2.
3 Sur le serveur 10.2, utilisez le service FTP pour copier les fichiers tar ou les images disque
sur l’ordinateur 10.5.
4 Sur le serveur 10.5, double-cliquez sur un fichier tar pour en extraire le contenu, ou bien
sur une image disque pour la monter.
Étape 5 :configuration de l’infrastructure des répertoires de départ
Configurez la destination des répertoires de départ que vous souhaitez restaurer.
L’emplacement des répertoires de départ identifié dans les comptes d’utilisateur importés
doit correspondre à l’emplacement physique des répertoires de départ restaurés, y compris l’emplacement du point de partage.
Pour des informations détaillées sur l’application de ces étapes dans la procédure suivante,
consultez Gestion des utilisateurs et Administration desservices de fichier.92 Chapitre 6Migration à partir de Mac OS X Server 10.2
Pour préparer le serveur pour le stockage des répertoires de départ :
1 Si nécessaire, créez le dossier que vous souhaitez utiliser comme point de partage
du répertoire de départ.
Si vous le souhaitez, vous pouvez utiliser le dossier /Utilisateurs prédéfini.
2 Ouvrez Admin Serveur sur le serveur où les répertoires de départ doivent figurer.
3 Cliquez sur Partage de fichiers pour configurer un point de partage pour les répertoires
de départ.
Si les comptes utilisateur doivent se trouver dans un répertoire Open Directory partagé,
créez un point de partage AFP ou NFS monté de façon dynamique et automatique pour
les répertoires de départ.Assurez-vous que le point de partage est publié dans le répertoire dans lequel résideront les comptes d’utilisateur qui en dépendent.
4 Dans Gestionnaire de groupe de travail,sur l’ordinateur où vous importerez des utilisateurs,
cliquez sur Comptes, puis ouvrez le répertoire dans lequel vous effectuerez l’importation.
Si vous restaurez des répertoires de départ à des emplacements qui ne correspondent
pas exactement à ceux identifiés dans les enregistrements utilisateur exportés, vous pouvez configurer un préréglage identifiant l’emplacement de restauration.Si vous identifiez
le préréglage lors de l’importation des utilisateurs, le nouvel emplacement remplace celui
qui existe dans les enregistrements utilisateur.
Vous pouvez également utiliser le préréglage pour spécifier d’autres réglages par défaut
dont les utilisateurs importés doivent hériter, par exemple pour les mots de passe,
le courrier, etc.
Étape 6 :importation d’utilisateurs, de groupes et d’autres données
Vous pouvez utiliser Gestionnaire de groupe de travail ou l’outil dsimport pour importer
des utilisateurs, des groupes et d’autres données :
Pour en savoir plus sur l’importation à l’aide de Gestionnaire de groupe de travail, consultez
Gestion des utilisateurs.
Pour en savoir plus sur les mots de passe des utilisateurs créés avec Mac OS X Server
version 10.1.5 ou antérieure, consultez Administration d’Open Directory.
Pour en savoir plus sur dsimport et obtenir la description du format d’exportation
de Gestionnaire de groupe de travail, consultez Administration de ligne de commande.Chapitre 6 Migration à partir de Mac OS X Server 10.2 93
Pour importer des utilisateurs et des groupes à l’aide de Gestionnaire de groupe
de travail :
1 Placez les fichiers d’exportation créés à l’étape 1 page 88 à un emplacement accessible
à partir du serveur.
Vous pouvez modifier les comptes d’utilisateur dans un fichier d’exportation si vous
souhaitez définir des mots de passe avant d’importer les utilisateurs. Pour obtenir
des instructions, consultez la section Gestion des utilisateurs.
Vous pouvez également configurer le préréglage défini au point 5 de l’étape 5 ci-dessus afin que les mots de passe utilisateur soient validés à l’aide d’une authentification
d’Open Directory ; vous pouvez aussi configurer les options de validation des mots de
passe de façon à obliger les utilisateurs à modifier leur mot de passe à la prochaine
ouverture de session.
2 Dans Gestionnaire de groupe de travail, cliquez sur Comptes.
3 Cliquez sur l’icône illustrant un globe dans la barre d’outils afin d’ouvrir le répertoire
dans lequel vous souhaitez importer des comptes.
4 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine.
5 Choisissez Serveur > Importer, sélectionnez le fichier d’importation, puis spécifiez
les options d’importation.
Si vous utilisez un préréglage, prenez soin de le préciser.
6 Cliquez sur Importer.
7 Pour que des groupes utilisent les nouvelles fonctionnalités de la version 10.5, mettez-les
à niveaux à l’aide de Gestionnaire de groupe de travail.
Dans Gestionnaire de groupe de travail, ouvrez le répertoire contenant les groupes,
sélectionnez-en un ou plusieurs, cliquez sur « Mettre à niveau le groupe hérité » puis
sur Enregistrer.
8 Pour créer des répertoires de départ pour des utilisateurs importés, utilisez l’une
des options suivantes :
Créez les répertoires de départ un par un, en sélectionnant un compte d’utilisateur
dans Gestionnaire de groupe de travail, en cliquant sur Départ, puis sur Créer Départ.
Créez tous les répertoires de départ avec l’argument -a de la commande createhomedir.
Pour plus de détails, consultez la section Administration de ligne de commande ou la page
man de createhomedir.
Un répertoire de départ associé à un point de partage AFP est créé s’il n’existe pas
lors de la première connexion d’un utilisateur.
Étape 7 :replacement des fichiers de données enregistrés
Placez les fichiers enregistrés à partir de votre serveur version 10.2 aux emplacements
finaux.94 Chapitre 6Migration à partir de Mac OS X Server 10.2
Données de configuration Web
Pour faire migrer la configuration Web :
1 Ouvrez Admin Serveur.
2 Dans la liste d’ordinateurs et de services sous le serveur 10.5, cliquez sur Web.
3 Cliquez sur Arrêter le service si le service Web est actif.
4 Supprimez les fichiers suivants :
 /etc/httpd/sites
 /etc/httpd/ssl.crt
 /etc/httpd/ssl.key
5 Copiez les fichiers et le répertoire 10.2 enregistrés sur le serveur 10.5.
6 Ouvrez l’application Terminal et, avec des privilèges root, tapez la commande suivante :
/Système/Bibliothèque/ServerSetup/MigrationExtras/59_webconfigmigrator
Un historique des modifications apportées aux fichiers est créé dans
/Bibliothèque/Logs/Migration/webconfigmigrator.log.
Les fichiers de la version 10.2 dans /etc/httpd/ sont renommés httpd.conf.obsolete,
httpd_macosxserver.conf.obsolete et mime_macosxserver.types.obsolete.
Un nouveau fichier httpd.conf est créé, ainsi qu’un répertoire de sites.
7 Si vous avez apporté des modifications à /etc/httpd/workers.properties, appliquez-les
aussi à la version du fichier installée avec le serveur 10.5.
Le fichier workers.properties de la version 10.5 possède une nouvelle entrée pour
le service blog.
8 Dans Admin Serveur, démarrez le service Web.
Contenu Web
Copiez le contenu Web enregistré dans :
 /Bibliothèque/WebServer/Documents/
 /Bibliothèque/WebServer/CGI-Executables/Chapitre 6 Migration à partir de Mac OS X Server 10.2 95
Base de données de courrier
Pour migrer la base de données de courrier :
1 Assurez-vous que le service de messagerie 10.5 n’est pas actif.
Ouvrez Admin Serveur, puis cliquez sur Courrier. Si le cercle Courrier sur la gauche
n’est pas grisé, cliquez sur Arrêter le courrier dans l’angle inférieur gauche.
2 Cliquez sur Maintenance, puis sur Migration.
3 Placez la base de données enregistrée sur le serveur 10.5 et vérifiez qu’aucun autre
fichier ne se trouve à l’emplacement sélectionné.
Si vous placez la base de données à l’emplacement par défaut (/var/imap),
son emplacement et ses comptes s’affichent.
Sinon, recherchez la base de données pour identifier son emplacement et dresser
la liste de ses comptes.
4 Assurez-vous que l’utilisateur _cyrus et le groupe de courrier sont propriétaires
des répertoires de courrier et de leur contenu.
5 Assurez-vous que le disque de destination possède un espace libre au moins égal
à la taille de la base de données de courrier.
6 Faites migrer un seul utilisateur ou tous les utilisateurs.
Pour faire migrer le courrier pour un seul utilisateur uniquement,sélectionnez l’utilisateur
puis cliquez sur Faire migrer l’utilisateur.
Pour faire migrer l’ensemble de la base de données, cliquez sur Tout faire migrer.
7 Exécutez le commande suivante pour que les fichiers d’index de tous les comptes
de courrier se trouvent dans le bon ordre :
sudo /usr/bin/cyrus/bin/reconstruct –i
8 Dans Admin Serveur, démarrez le service de messagerie en cliquant sur Courrier,
puis sur Démarrer le courrier.
Données WebMail
Placez les carnets d’adresses et les préférences enregistrés dans le répertoire
/var/db/squirrelmail/data/.
Fichiers de configuration FTP
Copiez les fichiers de configuration FTP enregistrés dans :
 /Bibliothèque/FTPServer/Configuration/
 /Bibliothèque/FTPServer/Messages/96 Chapitre 6Migration à partir de Mac OS X Server 10.2
Applications et structures WebObjects
Pour faire migrer WebObjects :
1 Copiez les applications enregistrées dans /Bibliothèque/WebObjects/Applications/.
2 Copiez les structures enregistrées dans /Bibliothèque/Frameworks/.
3 Ajoutez la ligne suivante au nouveau fichier httpd.conf :
Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf
Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd et accessibles via Admin Serveur. Si le serveur que vous mettez
à niveau possède l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorer. Il est en effet désactivé par défaut et n’est pas nécessaire pour
le démarrage automatique des services WebObjects avec Mac OS X Server 10.5. Pour en
savoir plus, consultez Administration destechnologies web et Déploiement deWebObjects.
4 (Facultatif) Si Java 1.4.2 n’est pas installé sur votre serveur 10.2, mettez manuellement
à jour les projets de l’application WebObjects en ouvrant chacun d’eux dans Xcode ;
dans la présentation expert pour les réglages de la cible principale, remplacez la valeur
de la propriété JAVA_VM par java.
Ces projets doivent être mis à jour manuellement pour utiliser la version de la machine
virtuelle Java (JVM) fournie avec Mac OS X Server 10.5.
Important :Mac OS X Server 10.5 inclut WebObjects 5.4, pour lequel Java 1.5 doit
être installé.
Données Tomcat
Restaurez les servlets Tomcat dans /Bibliothèque/Tomcat/webapps/.
Placez les services SOAP à faire migrer dans /Bibliothèque/Tomcat/webapps/axis/.
Mac OS X Server version 10.5 inclut une version d’Axis plus récente ou plus ancienne que
la version utilisée jusqu’à présent.
Configuration de coupe-feu IP
Pour migrer la configuration de coupe-feu IP :
1 Restaurez le fichier firewallconfig sur un serveur Mac OS X Server 10.3 ou 10.4.
2 Ouvrez Admin Serveur et assurez-vous que le service de coupe-feu n’est pas en cours
d’exécution.
3 Ouvrez le Gestionnaire NetInfo, qui se trouve dans le répertoire /Applications/Utilitaires.
4 Authentifiez-vous et accédez au répertoire /config.
5 Sélectionnez Répertoire > Nouveau sous-répertoire afin de créer un enregistrement
dans /config.
6 Remplacez le nom du nouvel enregistrement « newdirectory » par « IPFilters »
en sélectionnant la valeur de la propriété de nom et en la modifiant.Chapitre 6 Migration à partir de Mac OS X Server 10.2 97
7 Dans l’application Terminal, exécutez la commande suivante à partir du répertoire
dans lequel réside le fichier firewallconfig :
sudo niload -r /config/IPFilters . < firewallconfig
8 Tapez la commande suivante :
sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/
50_ipfwconfigmigrator
L’exécution de ce script crée un dossier /etc/ipfilter avec tous les fichiers requis pour
la migration.
9 Sur le serveur Mac OS X Server 10.5, ouvrez Admin Serveur et vérifiez que le service
de coupe-feu n’est pas actif.
10 Copiez le dossier /etc/ipfilter généré par le script 50_ipfwconfigmigrator sur le serveur
Mac OS X Server 10.5 vers lequel vous voulez faire migrer les réglages.
11 Démarrez le service de coupe-feu sur le serveur Mac OS X Server 10.5.
Configuration DNS
Pour faire migrer la configuration DNS :
1 Restaurez le fichier /etc/named.conf et le répertoire /var/named/ et son contenu.
2 Dans Admin Serveur, sélectionnez DNS dans la liste d’ordinateurs et de services.
Une zone de dialogue s’ouvre et vous demande de confirmer la mise à niveau :
 Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur laissent les fichiers
de configuration DNS tels qu’avant la migration vers 10.5. DNS continue son exécution
mais vous ne pouvez pas modifier la configuration DNS avec Admin Serveur. Pour faire
des changements, vous devez éditer directement les fichiers de configuration DNS.
 En revanche, si vous cliquez sur Mettre à niveau, Admin Serveur met à niveau
les fichiers de configuration vers le format 10.5. Vous pouvez alors utiliser Admin
Serveur pour modifier la configuration DNS.
Réglages DHCP
Pour migrer la configuration DHCP :
1 Ouvrez Admin Serveur et sélectionnez DHCP dans la liste d’ordinateurs et de services.
2 Choisissez Serveur > Importer > Réglages du service pour importer les réglages DHCP
depuis le fichier exporté auparavant (voir « DHCP » à la page 91).
3 Consultez les sous-fenêtres du service DHCP pour vérifier que les réglages DHCP
ont été correctement importés.98 Chapitre 6Migration à partir de Mac OS X Server 10.2
Données utilisateur
Restaurez les fichiers de données utilisateur enregistrés.
Placez les répertoires de départ dans des emplacements correspondant à ceux des enregistrements utilisateur importés. Si nécessaire, vous pouvez utiliser Gestionnaire de groupe de
travail pour éditer les comptes utilisateur, de sorte que les emplacements dans le compte et
sur le disque soient identiques.
Fichiers et dossiers du Serveur d’enchaînement QuickTime
Suivez les instructions dans Administration de QuickTime Streaming et Broadcasting pour
réutiliser les fichiers et les dossiers enregistrés depuis /Bibliothèque/QuickTimeStreaming/.
Étape 8 :configuration de points de partage et d’autorisations
Recréez les points de partage et les autorisations selon vos besoins.
Pour créer un point de partage et configurer des autorisations :
1 Ouvrez Admin Serveur et cliquez sur Partage de fichiers.
2 Cliquez sur Volumes et sélectionnez le volume ou le dossier à partager.
3 Cliquez sur Partager.
4 Cliquez sur Autorisations pour configurer les autorisations d’accès.
5 Cliquez sur Enregistrer.
Les nouveaux points de partage sont partagés via AFP, SMB et FTP, mais pas NFS. Pour
exporter un point de partage avec NFS, utilisez le volet Protocole. Pour en savoir plus sur
la configuration des points de partage, consultez Administration des services de fichier.
Étape 9 :test du nouveau serveur
Pour tester le nouveau serveur :
1 Ouvrez Gestionnaire de groupe de travail et inspectez les comptes d’utilisateur
et de groupe.
2 Ouvrez Admin Serveur et inspectez les réglages des services dont vous avez migré
les données de configuration.7
99
7 Migration vers Mac OS X Server
à partir de Windows NT
Ce chapitre contient des instructions pour le transfert
de données et de réglages d’un serveur Windows NT
vers un ordinateur exécutant Mac OS X Server 10.5.
Il comporte les sections suivantes :
 « Avant de commencer » à la page 100 décrit les tâches prérequises à réaliser
avant d’entamer le processus de migration.
 « Éléments pouvant migrer » à la page 100 décrit les éléments que vous pouvez
faire migrer d’un serveur Windows NT vers un ordinateur Mac OS X Server 10.5.
 « Outils pouvant être utilisés » à la page 107 décrit les outils permettant de faire
migrer un serveur Windows NT vers un ordinateur Mac OS X Server 10.5.
 « Instructions pas à pas » à la page 108 explique comment transférer des enregistrements d’utilisateurs, de groupes et d’ordinateurs d’un contrôleur de domaine principal Windows NT (PDC) vers un PDC Mac OS X Server. Cette section décrit également
comment configurer des répertoires de départ et des profils utilisateur itinérants sur
Mac OS X Server pour des utilisateurs Windows.
Vous découvrirez aussi comment configurer des dossiers partagés sur Mac OS X Server
et y copier des fichiers et des dossiers partagés à partir de dossiers réseau Windows NT.
Par ailleurs, cette section explique comment configurer les files d’attente de Mac OS X
Server pour l’accès à Windows et comment les ajouter en tant qu’imprimantes sur des
ordinateurs Windows clients.
Pour en savoir plus sur la configuration et la gestion de services pour des utilisateurs
Windows, consultez la section Administration des services de fichier. Vous apprendrez
aussi comment gérer des enregistrements d’utilisateurs, de groupes et d’ordinateurs
pour des clients Windows.
Remarque :étant donné qu’Apple publie régulièrement de nouvelles versions et mises
à jour de ses logiciels, les illustrations de ce document peuvent être différentes de celles qui s’affichent à l’écran.100 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Avant de commencer
Avant de suivre les instructions figurant dans ce chapitre, procédez à une configuration
initiale du serveur Mac OS X Server 10.5 vers lequel vous ferez migrer des données.
Pour obtenir des instructions, consultez la section Premiers contacts.
Éléments pouvant migrer
Les instructions de la section « Instructions pas à pas » à la page 108 décrivent comment
réutiliser les données suivantes d’un serveur Windows NT avec un PDC Mac OS X Server :
 Comptes d’utilisateur et de groupe.
 Enregistrements pour des ordinateurs membres du domaine NT.
 Fichiers personnels des utilisateurs dans les dossiers Mes documents et les répertoires de départ.
 Profils utilisateur itinérants.
Pour faire migrer des enregistrements d’utilisateurs, de groupes et d’ordinateurs, il vous faut
un système Mac OS X Server qui soit ou puisse être un maître Open Directory.
Après la migration, le chemin du répertoire de départ des utilisateurs migrés reste le
même. Lors de la migration, le chemin du répertoire de départ de chaque utilisateur est
copié dans son compte utilisateur Mac OS X Server. Les utilisateurs doivent pouvoir continuer à utiliser leurs répertoires de départ, même s’ils se trouvaient sur le serveur du contrôleur de domaine principal Windows NT, qui doit être désactivé après la migration.
Si les utilisateurs ont des répertoires de départ sur le serveur du contrôleur de domaine
principal Windows NT, ils doivent temporairement copier les fichiers qu’ils contiennent
à un autre emplacement avant de faire migrer leurs enregistrements vers le PDC
Mac OS X Server.
Ces utilisateurs peuvent copier les fichiers de leurs répertoires de départ dans leurs
dossiers Mes documents si leurs ordinateurs clients possèdent assez d’espace disque.
Ils peuvent également copier leurs fichiers dans un dossier réseau qui ne se trouve
pas sur le serveur du PDC.
Vous devrez configurer de nouveaux répertoires de départ pour ces utilisateurs sur le
PDC Mac OS X Server ou sur un serveur membre. Après leur migration, ces utilisateurs
pourront copier des fichiers dans leurs nouveaux répertoires de départ.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 101
Ce que les utilisateurs migrés peuvent faire
Lorsque vous faites migrer des utilisateurs, des groupes et des ordinateurs d’un serveur
Windows NT vers Mac OS X Server, l’ordinateur Mac OS X Server devient un contrôleur
de domaine principal (PDC). Les utilisateurs migrés peuvent alors effectuer les actions
suivantes :
 ouvrir une session dans le domaine du PDC avec les mêmes noms d’utilisateurs, mots
de passe et postes de travail qu’avant,
 faire que leurs profils itinérants soient stockés et récupérés sur un système Mac OS X
Server,
 utiliser des dossiers de départ réseau situés sur un système Mac OS X Server,
 rester membres du même groupe,
 accéder au contenu de dossiers réseau que vous copiez sur des points de partage
Mac OS X Server,
 utiliser des files d’attente d’impression configurées sur Mac OS X Server et les ajouter
comme imprimantes aux postes de travail Windows des utilisateurs.
D’autres utilisateurs dont vous avez configuré les comptes Mac OS X Server peuvent
également utiliser ces services. Par ailleurs, Mac OS X Server peut fournir Windows
Internet Naming Service (WINS) et le parcours de domaines Windows à travers des
sous-réseaux aux utilisateurs Windows migrés et nouveaux.
Mac OS X Server peut fournir d’autres services aux utilisateurs Windows, Mac OS X et UNIX,
dont Mail,Web, Blog, iChat (Jabber),VPN, DHCP, DNS et NAT. Pour des informations
détaillées, consultez les guides de configuration et d’administration de Mac OS X Server
décrits dans la préface.
En fournissant ces services, Mac OS X Server peut remplacer des serveurs Windows NT
dans de petits groupes de travail.
Imaginez administrer par exemple plusieurs serveurs Windows NT acquis au fil des
années pour prendre en charge l’accès à des domaines et des dossiers réseau partagés.
Selon les standards actuels, vos anciens serveurs sont probablement lents et offrent
une capacité de stockage réduite.
Vous avez la possibilité de faire migrer des comptes utilisateur depuis plusieurs contrôleurs
de domaine Windows NT vers un même système Mac OS X Server. Ce système Mac OS X
Server peut aussi héberger des dossiers réseau partagés pour des utilisateurs Windows.
Si vous préférez isoler des comptes utilisateur sur un système Mac OS X Server dédié,
les dossiers partagés peuvent se trouver sur un autre système Mac OS X Server.102 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Outre les utilisateurs de postes de travail Windows, Mac OS X Server peut transférer des
utilisateurs d’ordinateurs Mac OS X. Un compte utilisateur sur le serveur peut permettre
d’ouvrir une session depuis un ordinateur Mac OS X, ainsi qu’un poste de travail Windows.
Un utilisateur qui ouvre une session sur les deux plate-formes peut posséder le même
répertoire de départ, quelle que soit la machine sur laquelle la session est ouverte.
Remarque :les expressions Ouvrir une session et se connecter désignent la même opération.
Se connecter s’emploie généralement dans l’environnement Windows, alors qu’il est habituel d’ouvrir une session dans l’environnement Mac OS X.
Planification de votre migration
Avant d’entamer la migration de comptes et de services d’un serveur Windows NT
vers Mac OS X Server, vous devez planifier ce qui suit :
 Migration d’utilisateurs, de groupes et d’ordinateurs vers un contrôleur de domaine
principal (PDC) Mac OS X Server
 Indication de répertoires de départ et de profils utilisateur itinérants
 Migration du service de fichiers Windows
 Accès de Windows au service d’impression
 Configuration DNS
Migration d’utilisateurs, de groupes et d’ordinateurs vers un contrôleur de
domaine principal (PDC) Mac OS X Server
Mac OS X Server inclut l’outil de ligne de commande ntdomainmigration.sh, lequel :
 configure Mac OS X Server en tant que PDC,
 extrait des informations d’utilisateurs et de groupes et s’en sert pour créer des comptes
utilisateur et de groupes Mac OS X Server.
 extrait des informations d’ordinateurs et s’en sert pour ajouter des ordinateurs Windows
à la liste d’ordinateurs Windows de Mac OS X Server : ils deviennent alors membres du
domaine du PDC Mac OS X Server.
Important :en raison d’un problème connu, le script de migration du domaine Windows NT (NTdomainmigration.sh) ne fait pas migrer les informations de groupes. La
solution consiste à créer manuellement les informations de groupes sur le serveur
Mac OS X Server faisant office de PDC.
Les comptes utilisateur et de groupes migrés sont stockés dans le répertoire LDAP
du serveur avec les enregistrements d’ordinateurs migrés et d’autres informations.
Le contrôleur de domaine principal (PDC) a accès aux informations de ce répertoire
car vous faites migrer un serveur qui est un maître Open Directory et héberge un répertoire LDAP.
Le répertoire LDAP fonctionne correctement jusqu’à 200 000 enregistrements, à condition
que le serveur dispose d’assez d’espace disque pour stocker tous ces enregistrements.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 103
Le PDC utilise également le serveur de mots de passe du maître Open Directory pour
authentifier des utilisateurs lorsqu’ils ouvrent une session dans le domaine Windows.
Le serveur de mots de passe peut valider des mots de passe à l’aide de NTLMv2,
NTLMv1, LAN Manager et bien d’autres méthodes d’authentification.
Le maître Open Directory peut aussi posséder un centre de distribution de clés (KDC, Key
Distribution Center) Kerberos. La fonction PDC n’utilise pas Kerberos pour authentifier des
utilisateurs pour des services Windows, mais le courrier et d’autres services peuvent être
configurés pour employer Kerberos en vue d’authentifier les utilisateurs de postes de travail
Windows possédant des comptes dans le répertoire LDAP. Pour en savoir plus sur le répertoire et les services d’authentification, consultez la section Administration d’Open Directory.
Si vous voulez autoriser des opérations de basculement et de copie de sauvegarde pour
le nouveau contrôleur de domaine principal (PDC) et possédez d’autres systèmes Mac OS X
Server, vous pouvez désigner l’un ou plusieurs de ces derniers comme des contrôleurs de
domaine secondaires (BDC). Le PDC et les BDC possèdent des copies synchronisées des
données de répertoire et d’authentification, et ils partagent les demandes de clients pour
ces données. Si le PDC n’est plus disponible, les clients basculent vers un BDC jusqu’à ce
que le PDC redevienne disponible.
Pour en savoir plus et obtenir des instructions sur la configuration d’un BDC, consultez
la section Administration d’Open Directory.
Si vous possédez des systèmes Mac OS X Server qui ne sont ni des PDC, ni des BDC,
vous pouvez les configurer pour fournir d’autres services Windows comme membres
du domaine Windows de Mac OS X Server. En tant que membres du domaine Windows, les services Windows de Mac OS X Server utilisent le contrôleur de domaine
pour identifier et authentifier les utilisateurs.
Au moment de configurer Mac OS X Server comme PDC, assurez-vous que votre réseau
ne comporte pas un autre PDC avec le même nom de domaine. Le réseau peut comporter plusieurs maîtres Open Directory, mais un seul PDC.
Fourniture de répertoires de départ et de profils utilisateur itinérants
Les utilisateurs migrés peuvent continuer à utiliser leurs répertoires de départ, sauf s’ils
se trouvent sur le serveur Windows NT que vous désactivez. Si certains utilisateurs ont
des répertoires de départ sur ce serveur, vous pouvez faire migrer ces répertoires vers
Mac OS X Server. Vous pouvez aussi faire migrer les répertoires de départ d’autres utilisateurs vers Mac OS X Server.
Avant de faire migrer des répertoires de départ à partir d’un serveur Windows NT,
les utilisateurs doivent temporairement copier leurs fichiers à un autre emplacement,
comme leur dossier Mes documents ou un dossier réseau. Une fois les répertoires
de départ Mac OS X Server configurés, les utilisateurs peuvent copier les fichiers
dans les nouveaux répertoires de départ.104 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Lorsqu’un utilisateur avec un répertoire de départ Mac OS X Server ouvre une session
dans le domaine Windows du PDC Mac OS X Server,Windows mappe le répertoire de
départ sur une unité réseau. Si le même utilisateur ouvre une session sur un ordinateur
client Mac OS X, le système Mac OS X monte automatiquement le même répertoire de
travail. L’utilisateur possède alors le même dossier de départ réseau, qu’il ouvre une session sur un ordinateur Windows ou sur un ordinateur Mac OS X.
Un répertoire de départ Mac OS X Server se trouve sur un point de partage, à savoir
un dossier, un disque dur, une partition de disque dur ou tout autre volume accessible
sur le réseau. Le point de partage d’un répertoire de départ peut se trouver sur le même
serveur que le PDC, ou bien sur un membre du domaine Mac OS X Server. Les réglages
dans le compte utilisateur indiquent l’emplacement du répertoire de départ et la lettre
d’unité pour l’unité Windows mappée. Vous pouvez gérer les points de partage et les
réglages des répertoires de départ avec Gestionnaire de groupe de travail.
Mac OS X Server stocke également un profil utilisateur pour chaque utilisateurWindows qui
ouvre et ferme une session sur le PDC. Il s’agit dans ce cas de profils itinérants. Chaque utilisateur possède le même profil au moment d’ouvrir une session sur le PDC depuis n’importe
quel poste de travailWindows sur le réseau. Un profil utilisateur stocke les réglages (écran
de veille, couleurs, arrière-plans,sons, cookies Web, etc.), les favoris, le dossier Mes documents et d’autres données de l’utilisateur Windows dans un point de partage sur un système Mac OS X Server.
En général, le serveur PDC stocke les données du profil itinérant des utilisateurs, mais
un autre système Mac OS X Server peut également stocker ces données pour n’importe
quel utilisateur. Si vous disposez d’un seul système Mac OS X Server, il peut servir de PDC
tout en hébergeant des répertoires de départ et des profils utilisateur itinérants.
Fourniture d’un service de fichiers
Si vous faites migrer des utilisateurs, des groupes et des ordinateurs vers un PDC
Mac OS X Server, vous pouvez configurer Mac OS X Server pour remplacer le service
de fichiers actuellement fourni par Windows NT aux utilisateurs Windows.
Les comptes utilisateur définis sur Mac OS X Server peuvent être utilisés pour authentifier
l’accès à des dossiers réseau partagés via le protocole Windows standard SMB (Server
Message Block) pour le service de fichiers. Les utilisateurs Windows accèdent à des dossiers partagés sur Mac OS X Server à l’aide de procédures courantes, telles que le mappage d’une unité réseau.
Les comptes utilisateur du PDC Mac OS X Server (le répertoire LDAP du serveur) peuvent
servir à accéder aux dossiers partagés du serveur PDC, le cas échéant. Les comptes utilisateur PDC peuvent aussi être employés pour accéder à des dossiers partagés sur des serveurs membres du domaine Windows. Par ailleurs, les comptes utilisateur définis dans
le domaine de répertoire local d’un serveur peuvent permettre d’accéder à des dossiers
partagés sur ce serveur.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 105
Les dossiers partagés se trouvent dans des points de partage Mac OS X Server.
Les utilisateurs Windows peuvent mapper des unités réseau sur des points de partage
de Mac OS X Server comme ils le font sur des dossiers réseau des serveurs Windows NT.
Vous pouvez configurer des points de partage pour l’utilisation exclusive ou non exclusive
d’utilisateurs Windows.
Par exemple, vous pouvez configurer un point de partage dans lequel les utilisateurs
Windows et Mac OS X enregistrent des images partagées ou des fichiers de traitement
de texte utilisables sur une autre plate-forme.
À l’inverse, vous pouvez configurer un point de partage réservé à un accès SMB afin
d’offrir un point d’accès unique à vos utilisateurs Windows et leur permettre de profiter
du verrouillage de fichiers opportuniste (oplocks) et du verrouillage de fichiers strict.
En général, le verrouillage de fichiers empêche plusieurs clients de modifier simultanément
les mêmes informations. Un client verrouille le fichier ou une partie du fichier pour profiter
d’un accès exclusif. Le verrouillage opportuniste offre un accès exclusif, mais il permet aussi
à un client de mettre localement en cache ses modifications (sur l’ordinateur client) pour
améliorer les performances.
Important :n’activez pas le verrouillage opportuniste, ou oplocks,, pour un point
de partage utilisant un protocole autre que SMB.
Vous pouvez contrôler l’accès des utilisateurs aux dossiers et aux fichiers stockés dans
des points de partage Mac OS X Server en définissant des autorisations UNIX standard
(lecture, lecture et écriture, écriture, aucune) pour le propriétaire, le groupe ou quiconque. Pour un contrôle plus flexible, vous pouvez utiliser des listes de contrôle d’accès.
Pour en savoir plus sur les points de partage et les autorisations, consultez la section
Administration des services de fichier.
Les utilisateurs Windows
peuvent mapper
des unités réseau sur
des points de partage
Mac OS X Server106 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Fourniture d’un service d’impression
Le service d’impression de Mac OS X Server vous permet de configurer un environnement d’impression géré sur votre réseau. Vous pouvez partager des imprimantes compatibles PostScript en leur configurant des files d’attente sur un serveur. Lorsqu’un
utilisateur imprime vers une file d’attente partagée, la tâche d’impression attend sur
le serveur que l’imprimante soit disponible ou que les critères de planification établis
soient respectés.
Vous pouvez par exemple :
 conserver une tâche pour l’imprimer ultérieurement,
 limiter le nombre de pages individuelles que les utilisateurs peuvent imprimer
sur des imprimantes déterminées,
 conserver des historiques qui résument l’utilisation des imprimantes.
Mac OS X Server peut offrir aux utilisateurs Windows l’accès à des files d’attente via
le protocole Windows standard de partage d’imprimantes SMB. L’impression vers
une file d’attente Mac OS X Server revient à imprimer vers n’importe quelle imprimante réseau dans Windows.
L’installation d’une imprimante sur un ordinateur Windows requiert des autorisations administrateur. Les utilisateurs ayant ouvert une session avec des comptes PDC ne peuvent pas
installer des imprimantes,sauf s’ils sont membres du groupe local Administrateurs (ou du
groupe local Utilisateurs avec pouvoir dans Windows 2000).
Pour contrôler le nombre de pages imprimées par chaque utilisateur, vous fixez des
quotas d’impression. Un quota d’impression détermine le nombre de pages qu’un utilisateur peut imprimer au cours d’une période donnée. Un utilisateur qui atteint le quota
d’impression ne peut plus imprimer jusqu’à la fin de la durée du quota. Pour chaque
utilisateur, vous définissez un seul quota valable pour toutes les files d’attente, ou bien
des quotas individuels pour chacune d’elles.
Configuration DNS
Pour certains services de Mac OS X Server, un DNS correctement configuré est obligatoire ou du moins en simplifie l’utilisation. En particulier, l’authentification Kerberos
requiert un DNS correctement configuré.
Même si Mac OS X Server n’utilise pas Kerberos pour authentifier des utilisateurs Windows
pour l’accès à des domaines ou le service d’impression, Mac OS X Server peut s’en servir
pour authentifier des utilisateurs Windows pour d’autres services. Par exemple, Mac OS X
Server peut utiliser Kerberos pour authentifier des utilisateurs Mac OS X pour l’ouverture
de sessions et le service de fichiers.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 107
Si vous souhaitez que Mac OS X Server fournisse des services à des utilisateurs tant
Mac OS X que Windows, assurez-vous que le DNS de votre réseau est configuré pour
résoudre le nom du serveur avec son adresse IP et une recherche inverse de l’adresse
IP du serveur avec son nom.
DNS peut aussi servir de mécanisme de secours pour la résolution de noms par des postes
de travailWindows. Les postes de travailWindows tentent dans un premier temps de reconnaître le PDC via NetBIOS :DNS n’est alors pas requis pour que Mac OS X Server fournisse
un PDC ou d’autres services aux utilisateurs Windows. Toutefois, les clients Windows auront
recours à la résolution de noms DNS s’ils ne peuvent pas identifier le nom d’un serveur via
NetBIOS. Par conséquent, il peut s’avérer utile pour les utilisateurs Windows d’avoir un DNS
correctement configuré et activé.
Votre DNS peut être fourni par Mac OS X Server ou tout autre serveur sur votre réseau.
Si vous avez un fournisseur d’accès à Internet (FAI) indépendant, ce dernier peut aussi
vous fournir un DNS. Pour en savoir plus sur la configuration du DNS dans Mac OS X
Server, consultez la section Administration des services de réseau.
Outils pouvant être utilisés
Cette section décrit les outils disponibles pour la migration de Windows NT vers
Mac OS X Server 10.5.
Outils de migration d’utilisateurs, de groupes et d’ordinateurs
Pour faire migrer des utilisateurs, des groupes et des ordinateurs, utilisez :
 Admin Serveur, pour convertir Mac OS X Server en maître Open Directory et configurer
le service WINS.
 l’outil de ligne de commande ntdomainmigration.sh pour configurer Mac OS X Server
en tant que PDC et y faire migrer les informations d’utilisateurs et d’ordinateurs depuis
le serveur NT.
Important :en raison d’un problème connu, le script de migration de domaine
Windows NT (NTdomainmigration.sh) ne fait pas migrer les informations de groupes.
La solution consiste à créer manuellement les informations de groupes sur le serveur
Mac OS X Server servant de PDC.
 Gestionnaire de groupe de travail pour modifier des comptes utilisateur et de groupes,
configurer des dossiers de départ réseau et configurer des profils utilisateur itinérants.
 Windows Explorer pour copier des fichiers d’utilisateurs dans leurs nouveaux répertoires
de départ.108 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Outils de migration du service de fichiers
Pour faire migrer le service de fichiers, utilisez :
 Gestionnaire de groupe de travail pour créer des points de partage et des dossiers partagés, ainsi que définir des listes de contrôle d’accès et des privilèges UNIX pour celles-ci.
 Windows Explorer pour copier des fichiers partagés et mapper des unités réseau sur
des points de partage Mac OS X Server.
Outils pour fournir à Windows l’accès au service d’impression
Pour offrir à Windows l’accès au service d’impression, utilisez :
 Admin Serveur pour configurer des files d’attente pour l’accès de Windows et l’application de quotas d’impression.
 L’assistant Ajouter une imprimante sur chaque poste de travail Windows pour ajouter
des files d’attente comme imprimantes.
 Gestionnaire de groupe de travail pour configurer des quotas pour les utilisateurs
(facultatif).
Instructions pas à pas
Cette section décrit comment effectuer une migration de Windows NT vers
Mac OS X Server 10.5.
 « Migration d’utilisateurs, de groupes et d’ordinateurs » à la page 108.
 « Migration du service de fichiers Windows » à la page 119.
 « Accès de Windows au service d’impression » à la page 123.
Migration d’utilisateurs, de groupes et d’ordinateurs
Suivez les instructions dans cette section pour transférer des comptes utilisateur et de
groupes, des enregistrements d’ordinateurs et des fichiers personnels d’utilisateurs d’un
PDC Windows NT vers un PDC Mac OS X Server.
Important :en raison d’un problème connu, le script de migration de domaine Windows
NT (NTdomainmigration.sh) ne fait pas migrer les informations de groupes. La solution
consiste à créer manuellement les informations de groupes sur le serveur Mac OS X Server servant de PDC.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 109
Le diagramme suivant récapitule les étapes pour la migration d’utilisateurs, de groupes
et d’ordinateurs. Vous trouverez en dessous des instructions détaillées.
Étape 1 :configurez un maître Open Directory.
Vous pouvez configurer un maître Open Directory lors de la configuration initiale du
serveur après l’installation de Mac OS X Server. Si Mac OS X Server est déjà installé,
vous pouvez utiliser Admin Serveur pour configurer un maître Open Directory.
Lorsque vous configurez un maître Open Directory, Kerberos démarre seulement si le
serveur est configuré pour utiliser un service DNS qui résout le nom DNS qualifié complet du serveur, ainsi qu’une recherche inverse de l’adresse IP du serveur.
Mac OS X Server utilise l’authentification Kerberos pour des services autres que les services
Windows. Si vous souhaitez que Mac OS X Server fournisse des services aux utilisateurs tant
Mac OS X que Windows, configurez-le de façon à ce que Kerberos soit actif.
3 Migration des fiches d'utilisateurs,
de groupes et d'ordinateurs.
5 Transfert des scripts
d'ouverture de session.
4 Configuration de l'infrastructure
du répertoire de départ.
1 Configuration du maître
Open Directory.
6 Les utilisateurs transfèrent les fichiers
vers les nouveaux répertoires de départ.
Mac OS X
Server
Serveur
Windows NT
7 Les utilisateurs se déconnectent pour
enregistrer les réglages du profil.
Clients Windows
2 Les utilisateurs copient les
fichiers depuis les anciens
répertoires de départ.110 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Pour convertir Mac OS X Server en maître Open Directory :
1 Si Mac OS X Server doit utiliser un service DNS existant, configurez le service DNS de votre
réseau pour résoudre le nom et l’adresse IP du serveur, ainsi que la recherche inverse
de l’adresse IP du serveur avec son nom.
2 Installez le logiciel Mac OS X Server 10.5 s’il n’est pas déjà installé.
Pour obtenir des instructions d’installation, consultez la section Premiers contacts.
Si le logiciel Mac OS X Server est déjà installé, passez à l’étape 4.
3 Lors de la configuration initiale du serveur juste après l’installation, utilisez la configuration
avancée pour créer un maître Open Directory avec les informations suivantes,mais ne créez
pas de PDC Windows et ne configurez pas le service de fichiers SMB pour un démarrage
automatique :
 Dans la sous-fenêtre Réglages TCP/IP, tapez l’adresse IP d’un ou plusieurs serveurs DNS
configurés pour résoudre le nom et l’adresse IP du nouveau serveur.
Si aucun serveur DNS n’est configuré pour résoudre le nom et l’adresse IP du nouveau
serveur, ne tapez pas d’adresse du serveur DNS.
 Dans la sous-fenêtre Utilisation du répertoire, choisissez Maître Open Directory dans
le menu local « Réglez l’utilisation du répertoire sur ». Ne sélectionnez pas « Activer
le contrôleur de domaine principal Windows ». Le serveur devient un PDC à l’étape 3,
« faites migrer des utilisateurs, des groupes et des ordinateurs vers Mac OS X Server. »
à la page 111.
 Dans la sous-fenêtre Services, laissez le service de fichiers Windows désélectionné.
Vous pouvez activer d’autres services dans cette sous-fenêtre. Si vous n’activez
pas de services à présent, vous pourrez le faire plus tard à l’aide d’Admin Serveur.
4 Si Mac OS X Server doit fournir son propre service DNS, utilisez ce qui suit pour
le configurer ainsi que les préférences réseau du serveur.
 Pour obtenir des instructions sur la configuration du service DNS du serveur, consultez
la section Administration des services de réseau.
 Dans la sous-fenêtre Réseau des Préférences Système, vérifiez que l’adresse IP du serveur
est la première adresse dans le champ Serveurs DNS pour l’interface réseau principale.
Pour obtenir des instructions, ouvrez les Préférences Système, choisissez
Aide > Aide Préférences Système et recherchez « modification des réglages réseau ».
5 Utilisez Admin Serveur pour confirmer que le serveur est un maître Open Directory
et savoir si Kerberos est en cours d’exécution.
Ouvrez Admin Serveur, connectez-vous au serveur, sélectionnez Open Directory dans
la liste d’ordinateurs et de services, cliquez sur Vue d’ensemble et vérifiez ce qui suit.
 Si la sous-fenêtre Vue d’ensemble d’Open Directory n’indique pas que le serveur est
un maître Open Directory, cliquez sur Réglages puis sur Général et choisissez Maître
Open Directory dans le menu local Rôle. Pour obtenir des instructions détaillées,
consultez la section Administration d’Open Directory.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 111
 Si la sous-fenêtre Vue d’ensemble indique que Kerberos est arrêté, démarrez-le. Cliquez
sur Réglages,sur Général puis sur Kerbériser et authentifiez-vous lorsque demandé.
Pour obtenir des instructions détaillées sur le démarrage de Kerberos après la configuration d’un maître Open Directory, consultez la section Administration d’Open Directory.
Kerberos ne démarre pas si le serveur n’est pas configuré pour utiliser un serveur
DNS qui résout le nom DNS qualifié complet du serveur et la recherche inverse
de l’adresse IP du serveur.
6 Utilisez Admin Serveur pour procéder comme suit afin de vérifier que les méthodes
d’authentification employées par les services Windows (NTLMv1, NTLMv2 et éventuellement LAN Manager) sont activées.
Si Open Directory est sélectionné pour le serveur PDC dans la liste d’ordinateurs et de
service d’Admin Serveur, cliquez sur Réglages,sur Règlement, puis sur Authentification.
Assurez-vous que l’option NTLMv1 et NTLMv2 est sélectionnée. Sélectionnez d’autres
méthodes d’authentification requises par des services et des utilisateurs du serveur.
Étape 2 :demandez aux utilisateurs de copier les fichiers de leurs anciens répertoires
de départ.
Indiquez aux utilisateurs qui ont des répertoires de départ sur le serveur Windows NT
qui sera désactivé qu’ils doivent copier les fichiers de leurs répertoires de départ dans
leur dossier Mes documents ou dans un dossier réseau restant actif. Ils pourront ensuite
copier ces fichiers dans les nouveaux répertoires de départ Mac OS X Server.
Les utilisateurs qui ont des répertoires de départ sur des serveurs Windows demeurant
actifs n’ont pas besoin de copier les fichiers contenus dans ces répertoires. Après leur
migration vers Mac OS X Server, ces utilisateurs pourront accéder comme auparavant
à leurs répertoires de départ.
Étape 3 :faites migrer des utilisateurs, des groupes et des ordinateurs vers
Mac OS X Server.
Utilisez l’outil de ligne de commande ntdomainmigration.sh pour faire migrer
des informations d’utilisateurs, de groupes et d’ordinateurs depuis un serveur NT.
Pour les utilisateurs et les groupes migrés, l’outil crée des comptes dans le répertoire
LDAP de Mac OS X Server.
Pour les ordinateurs migrés, il crée des enregistrements et les ajoute à la liste d’ordinateurs
Windows dans le répertoire LDAP.
Par ailleurs, l’outil configure Mac OS X Server comme PDC et démarre les services Windows.
Pour utiliser ntdomainmigration.sh, vous devez connaître le domaine Windows du serveur NT, le nom et le mot de passe d’un administrateur du domaine NT, ainsi que le
nom et le mot de passe d’un administrateur du répertoire LDAP. Si votre réseau comporte un serveur WINS, vous devez aussi en connaître l’adresse IP ou le nom DNS.112 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Lorsque vous exécutez ntdomainmigration.sh, il envoie des informations sur les utilisateurs, les groupes et les ordinateurs migrés. Vous pouvez enregistrer ces informations
si vous voulez conserver un historique de la migration.
Pour faire migrer des utilisateurs, des groupes et des ordinateurs et convertir
Mac OS X Server en PDC :
1 Configurez Mac OS X Server pour utiliser le serveur WINS existant sur votre réseau
ou pour fournir un service WINS en procédant comme suit :
Ouvrez Admin Serveur, connectez-vous au serveur et sélectionnez SMB dans la liste
d’ordinateurs et de services. Cliquez sur Réglages puis sur Avancé, et procédez
de l’une des manières suivantes :
 Si votre réseau comporte un serveur WINS, sélectionnez « S’inscrire sur ce serveur
WINS » et tapez l’adresse IP ou le nom DNS du serveur WINS.
 Si votre réseau n’a pas de serveur WINS, sélectionnez « Activer le serveur WINS ».
Vous ne devez pas forcément configurer le service WINS si Mac OS X Server se trouve
sur le même sous-réseau que le serveur Windows NT ; cette opération n’est pas pour
autant un problème.
2 Vérifiez que le service Windows est arrêté en procédant comme suit :
Si SMB est sélectionné dans la liste d’ordinateurs et de services, cliquez sur Vue d’ensemble. Si la sous-fenêtre Vue d’ensemble indique que le service SMB est actif, cliquez sur
Arrêter SMB ou choisissez Serveur > Arrêter le service.
3 Ouvrez Terminal, tapez la commande suivante (en remplaçant comme décrit dans
la tableau suivant), et appuyez sur la touche Retour :
sudo /usr/sbin/ntdomainmigration.sh
Pour Remplacer par
Le nom de domaine Windows du serveur NT
Le nom NetBIOS du serveur NT
Le nom d’un utilisateur du domaine NT avec des droits administrateur
Le nom d’un compte utilisateur du répertoire LDAP avec des autorisations
administrateurChapitre 7 Migration vers Mac OS X Server à partir de Windows NT 113
4 Lorsqu’un message vous le demande, comme suit, tapez votre mot de passe utilisateur
d’exécution (vous devez être autorisé à utiliser sudo dans le fichier /private/etc/sudoers),
le mot de passe de l’administrateur du domaine NT indiqué et le mot de passe de l’administrateur du répertoire LDAP indiqué :
Mot de passe :
Tapez le mot de passe de l’administrateur du domaine NT () :
Tapez le mot de passe de l’administrateur LDAP () :
Après la première invite, tapez le mot de passe de l’utilisateur root. Il est généralement
identique au mot de passe d’administrateur du serveur saisi lors de la configuration initiale du serveur.
À la deuxième et troisième invites, à la place de , vous voyez le nom de
l’administrateur du domaine NT que vous avez indiqué et à la place de
le nom de l’administrateur du répertoire LDAP précisé.
5 Au terme de l’exécution de ntdomainmigration.sh, vous pouvez enregistrer un historique
de migration en choisissant Fichier > « Enregistrer le texte sous ».
Une fois les trois mots de passe saisis, ntdomainmigration.sh envoie des informations
sur les enregistrements des utilisateurs, des groupes et des ordinateurs qu’il fait migrer.
Lorsque l’outil a terminé, le message « La migration du domaine a abouti » apparaît.
Vous pouvez enregistrer ces informations sous forme d’historique de migration.
Si l’erreur se produit au cours de la migration, ntdomainmigration.sh les enregistre
dans l’historique du système. Pour afficher l’historique du système, ouvrez Admin Serveur, sélectionnez le serveur dans la liste d’ordinateurs et de services, cliquez sur Historiques, puis choisissez Historique du système dans le menu local Présentation.
6 Vous pouvez éventuellement utiliser Gestionnaire de groupe de travail pour modifier
les comptes utilisateur et de groupes comme suit.
Vous pouvez sélectionner les comptes utilisateur et de groupes migrés et en modifier
les réglages. Vous pouvez par exemple :
 Sélectionner tous les comptes utilisateur migrés et définir les critères de mot de passe
dans la sous-fenêtre Avancé afin que les utilisateurs soient obligés de changer leur mot
de passe à la prochaine ouverture de session.
Tant que les utilisateurs migrés ne réinitialisent pas leur mot de passe, ils travaillent
uniquement avec les méthodes d’authentification NTLMv1, NTLMv2 et LAN Manager
employées par les services Windows. Les mots de passe des utilisateurs migrés doivent être réinitialisés pour utiliser des méthodes d’authentification requises par
d’autres services.
 Ajouter des utilisateurs à des groupes dans la sous-fenêtre Membres pour les comptes
de groupes, ou dans la sous-fenêtre Groupes pour les comptes utilisateur.
 Sélectionner plusieurs comptes utilisateur et en configurer les comptes de messagerie
dans la sous-fenêtre Courrier.114 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
 Indiquer un point de partage pour les dossiers de départ réseau des utilisateurs
sélectionnés, comme décrit à l’étape suivante.
Pour obtenir des instructions sur la définition des critères et des options de sécurité
des mots de passe, consultez la section Administration d’Open Directory. Pour d’autres
instructions sur les tâches des utilisateurs et des groupes, consultez la section Gestion
des utilisateurs.
7 Utilisez Admin Serveur pour démarrer le service SMB comme suit :
Ouvrez Admin Serveur, sélectionnez SMB dans la liste d’ordinateurs et de services,
puis cliquez sur Vue d’ensemble. Si le service SMB est arrêté, cliquez sur Démarrer
SMB ou choisissez Serveur > Démarrer le service.
8 Arrêtez le PDC Windows NT.
Mac OS X Server devient alors le PDC pour le domaine Windows, et le domaine
ne doit pas avoir deux PDC.
Étape 4 :configurez l’infrastructure des répertoires de départ.
Si des utilisateurs avaient des répertoires de départ sur le serveur Windows NT arrêté, vous
devez leur configurer des répertoires de départ Mac OS X Server.Vous pouvez également
configurer des répertoires de départ Mac OS X Server pour d’autres utilisateurs migrés.
Le répertoire de départ d’un utilisateur est monté lorsque celui-ci ouvre une session avec
un compte utilisateur Mac OS X Server. Le répertoire de départ est mappé sur une unité
réseau et vous pouvez indiquer la lettre d’unité pour chaque utilisateur.
La configuration de répertoires de départ Mac OS X Server pour des utilisateurs Windows
se fait en deux temps :
 Configuration de points de partage Mac OS X Server pour des répertoires de départ
 Indication des réglages des répertoires de départ (emplacement et lettre d’unité)
pour des comptes utilisateur
Le point de partage configuré pour des répertoires de départ peut correspondre au dossier /Utilisateurs prédéfini sur le PDC Mac OS X Server. Si vous préférez que les répertoires
de départ des utilisateurs se trouvent sur un ou plusieurs autres serveurs, vous pouvez
créer des points de partage sur d’autres systèmes Mac OS X Server. Un point de partage
pour un répertoire de départWindows doit se trouver sur un serveur membre du domaine
Windows ou sur un serveur PDC, et il doit être configuré pour utiliser le protocole SMB.
Pour obtenir des instructions sur la configuration d’un système Mac OS X Server comme
membre du domaine Windows, consultez la section Administration desservices de fichier.
Si le point de partage sera utilisé pour les répertoires de départ des utilisateurs tant
Windows que Mac OS X, il doit également employer le protocole AFP ou NFS et avoir
un enregistrement de montage réseau configuré pour les répertoires de départ. Pour
obtenir des instructions sur la configuration des répertoires de départ Mac OS X, consultez le chapitre traitant des répertoires de départ dans Gestion des utilisateurs.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 115
Pour une vue d’ensemble des points de partage, ainsi qu’une explication des problè-
mes à prendre éventuellement en compte avant leur création, consultez le chapitre
sur les points de partage dans Administration des services de fichier.
Pour configurer un point de partage pour les répertoires de départ des utilisateurs
Windows :
1 Ouvrez Admin Serveur et sélectionnez un point de partage existant ou configurez-en
un nouveau pour les répertoires de départ :
 Pour utiliser un point de partage existant, connectez Admin Serveur au serveur sur
lequel figure le point de partage, cliquez sur Partage de fichiers puis sur Points de
partage, et sélectionnez le point de partage en question.
 Pour configurer un nouveau point de partage, connectez Admin Serveur au serveur
sur lequel figure le point de partage, cliquez sur Partage de fichiers puis sur Volumes,
accédez au dossier devant servir de point de partage des répertoires de départ, puis
cliquez sur Partager.
 Pour créer un dossier comme point de partage, cliquez sur le bouton Nouveau dossier,
tapez le nom du dossier, cliquez sur Créer,sélectionnez le nouveau dossier et cliquez
sur Partager.
Remarque :n’utilisez pas de barre oblique (/) dans un nom de dossier ou de volume
amené à être partagé. Les utilisateurs qui tentent d’accéder au point de partage peuvent avoir des difficultés à le voir.
2 Une fois le point de partage des répertoires de départ sélectionné dans Admin Serveur,
définissez-en l’accès et les autorisations dans la sous-fenêtre Autorisations, puis cliquez
sur Enregistrer :
 Pour changer le propriétaire ou le groupe du point de partage, cliquez sur le bouton
Ajouter (+) et faites glisser un nom depuis le volet Utilisateurs et groupes vers la liste
POSIX. Utilisez les menus locaux en regard des champs pour changer les autorisations.
 Pour ajouter une entrée à la liste de contrôle d’accès, faites glisser un nom depuis le volet
Utilisateurs et groupes. Utilisez les menus locaux en regard des champs pour changer
les autorisations.
 Pour supprimer une entrée de la liste de contrôle d’accès ou de la liste POSIX,
sélectionnez-la et cliquez sur le bouton Supprimer (–).
Les privilèges UNIX habituels pour un point de partage contenant des répertoires
de départ sont les suivants :
 Propriétaire désigne l’administrateur du serveur principal et possède des autorisations
en lecture et écriture.
 Groupe correspond à « admin » et possède des autorisations en lecture et écriture.
 Tous possèdent une autorisation en lecture seule.
Pour en savoir plus sur les listes de contrôle d’accès et les privilèges UNIX, consultez
la section Administration des services de fichier.116 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
3 Une fois le point de partage sélectionné dans Admin Serveur, cliquez sur Point de partage
et sur Options de protocole, configurez les réglages pour SMB et d’autres protocoles, puis
cliquez sur Enregistrer.
Pour configurer les réglages SMB du point de partage, cliquez sur SMB puis sur « Partager
cet élément via SMB ». Configurez les réglages SMB comme il convient et cliquez sur OK.
Important :si des utilisateurs Mac OS ou UNIX doivent aussi accéder au point de partage,
vérifiez que l’option « Activer le verrouillage strict » est sélectionnée.
Configurez les autres protocoles de partage de fichiers comme nécessaire.
Pour en savoir plus sur la configuration des réglages de fichiers AFP, SMB, FTP et NFS,
consultez la section Administration des services de fichier.
4 Si le point de partage sera utilisé pour des répertoires de départ Mac OS X et Windows,
configurez-le pour un montage automatique sur des ordinateurs clients :
Une fois le point de partage sélectionné dans Admin Serveur, cliquez sur Point de partage,
sur « Activer le montage automatique », effectuez les configurations nécessaires, cliquez
sur OK, puis sur Enregistrer.
Pour en savoir plus sur la configuration du montage automatique pour le point de partage,
consultez la section Administration desservices de fichier.
Pour indiquer un emplacement et une lettre d’unité pour les répertoires de départ
des utilisateurs Windows :
1 Dans Gestionnaire de groupe de travail,sélectionnez les comptes utilisateur pour lesquels
configurer des répertoires de départ.
Pour sélectionner des comptes utilisateur, cliquez sur le bouton Comptes, puis sur l’icône
illustrant un petit globe sous la barre d’outils, et ouvrez le répertoire LDAP du PDC.
Pour modifier les informations sur le répertoire de départ, cliquez sur le verrou pour vous
authentifier en tant qu’administrateur du domaine du répertoire LDAP, puis sélectionnez
un ou plusieurs utilisateurs dans la liste d’utilisateurs.
2 Si vous voulez utiliser le même dossier de départ réseau pour Windows et pour
Mac OS X, cliquez sur Départ et indiquez le point de partage à employer :
Dans la liste de points de partage,sélectionnez /Utilisateurs ou tout autre point de partage
souhaité, puis cliquez sur Créer Départ.
Si le point de partage à utiliser n’est pas répertorié, cliquez sur le bouton Ajouter (+)
et tapez l’URL du point de partage et le chemin du répertoire de départ de l’utilisateur
dans le point de partage.
Si vous voulez choisir le point de partage /Utilisateurs mais qu’il ne figure pas dans la liste,
cliquez sur le bouton Ajouter (+) et tapez le chemin du répertoire de départ de l’utilisateur
dans le champ Départ.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 117
Tapez le chemin comme suit :
/Utilisateur/nomutilisateurabrégé
Remplacez nomutilisateurabrégé par le premier nom abrégé du compte utilisateur
configuré.
3 Cliquez sur Windows, tapez l’emplacement du répertoire de départ dans le champ Chemin,
choisissez une lettre d’unité dans le menu local Disque dur, puis cliquez sur Enregistrer en
gardant ce qui suit à l’esprit :
 Laissez le champ Chemin vide pour utiliser le même répertoire de départ pour l’ouverture de session sur Windows et sur Mac OS X. Vous pouvez aussi indiquer ce répertoire
de départ en tapant un chemin UNC n’incluant pas de point de partage :
\\nomserveur\nomutilisateurabrégé
Remplacez nomserveur par le nom NetBIOS du serveur du PDC ou un serveur membre
du domaine Windows où se trouve le point de partage.
Remplacez nomutilisateurabrégé par le premier nom abrégé du compte utilisateur
configuré.
 Pour indiquer un autre point de partage SMB, tapez un chemin UNC incluant
ce point de partage :
\\nomserveur\nompartage\nomutilisateurabrégé
Remplacez nompartage par le nom du point de partage.
 La lettre d’unité par défaut est H. Windows se sert de cette lettre pour identifier
le répertoire de départ monté.
4 Si le champ Chemin n’est pas vide, vérifiez que le point de partage indiqué contient
un dossier pour le répertoire de départ de l’utilisateur.
Le nom du dossier doit correspondre au premier nom abrégé de l’utilisateur, et ce dernier
doit posséder les autorisations en lecture et écriture sur ce dossier.
Si le champ Chemin est vide, il n’est pas obligatoire que le point de partage du répertoire
de départ contienne un dossier pour le répertoire de départ de l’utilisateur.Dans ce cas,
Mac OS X Server crée un dossier de répertoire de départ dans le point de partage indiqué
dans la sous-fenêtre Départ.
Étape 5 :transférez des scripts d’ouverture de session vers Mac OS X Server.
Si des utilisateurs ont des scripts d’ouverture de session sur un serveur Windows NT,
vous pouvez les copier sur le PDC Mac OS X Server et configurer des comptes utilisateur
en vue de les utiliser. Vous pouvez copier les scripts via le réseau ou à l’aide d’un disque
amovible comme un disque CD-R ou USB.
Sur le PDC Mac OS X Server, les scripts d’ouverture de session utilisateur se trouvent
dans le dossier /etc/netlogon/.118 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Pour les copier sur le PDC Mac OS X Server sur le réseau :
1 Sur un ordinateur Windows où vous pouvez accéder au serveur NT et un point de
partage Mac OS X Server dans lequel copier les fichiers, ouvrez le dossier contenant
les scripts à copier.
2 Connectez-vous au point de partage Mac OS X Server et mappez une unité réseau
sur ce point.
Pour obtenir des instructions sur le mappage d’une unité réseau, consultez l’aide
à l’écran dans Windows.
3 Copiez les scripts sur le point de partage Mac OS X Server mappé.
4 Ouvrez une session dans le PDC Mac OS X Server avec le nom d’utilisateur et le mot de
passe root, ouvrez le dossier du point de partage dans lequel vous avez fait la copie et
copiez les scripts dans le dossier /etc/netlogon/.
Le nom d’utilisateur root est « root » ou « administrateur système » et le mot de passe
est identique à celui donné au premier compte administrateur créé.
Si vous copiez des scripts dans le Finder, vous pouvez ouvrir /etc/netlogon/ en choisissant Aller > Aller au dossier, en tapant /etc/netlogon/ et en cliquant sur Aller.
5 Fermez la session puis ouvrez-en une autre avec le nom et le mot de passe de l’administrateur du serveur.
6 Dans Gestionnaire de groupe de travail, sélectionnez tous les comptes utilisateur du
PDC Windows et assurez-vous que l’emplacement du script d’ouverture de session est
correctement indiqué dans la sous-fenêtre Windows.
Le champ Script d’ouverture de session doit contenir le chemin relatif du script
d’ouverture de session figurant dans /etc/netlogon/. Par exemple, si vous avez copié
un script nommé setup.bat dans /etc/netlogon/, le champ Script d’ouverture de session doit afficher setup.bat.
Étape 6 :demandez aux utilisateurs de transférer des fichiers vers les répertoires
de départ Mac OS X Server.
Les utilisateurs qui ont effectué une copie de sauvegarde de fichiers de l’ancien serveur
Windows NT (à l’étape 2 page 111) peuvent désormais copier ces fichiers dans les répertoires de départ Mac OS X Server configurés pour eux (à l’étape 4 page 114).
Lorsque chaque utilisateur ouvre une session avec un compte utilisateur du PDC
Mac OS X Server, son répertoire de départ est mappé sur une unité réseau. L’utilisateur
peut alors copier des fichiers depuis le dossier Mes documents et des dossiers réseau.
Une fois ces fichiers copiés dans le répertoire de départ, demandez aux utilisateurs de
les supprimer des emplacements précédents.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 119
Les utilisateurs doivent généralement conserver les fichiers volumineux dans leur dossiers
de départ réseau au lieu du dossier Mes documents. Plus la taille du dossier Mes documents est importante, plus la synchronisation à l’ouverture et à la fermeture de sessions
du domaine prend du temps.Toutefois, les utilisateurs qui doivent accéder aux fichiers
quand ils sont déconnectés du réseau ne doivent pas conserver ces fichiers dans leurs
dossiers de départ réseau.
Étape 7 :demandez aux utilisateurs de fermer la session pour mettre à jour leurs
profils itinérants.
Les profils itinérants stockés sur l’ancien serveur du PDC Windows NT sont migrés de façon
individuelle lorsque des utilisateurs migrésferment la session du domaineWindows du PDC
Mac OS X Server. Ces profils ne sont pas migrés en masse de l’ancien au nouveau PDC.
La première fois que chaque utilisateur ouvre une session sur le nouveau PDC, le poste
de travail Windows ne peut pas charger le profil itinérant depuis l’ancien PDC car il est
alors arrêté. Dans ce cas, Windows se sert de la copie locale du profil utilisateur stocké
sur le poste de travail Windows. Lorsque l’utilisateur ferme la session, Windows enregistre les réglages et le contenu du profil du dossier Mes documents sur le serveur du PDC
Mac OS X Server. À partir de là, Windows peut charger le profil itinérant lorsque l’utilisateur ouvre une session sur le domaine Windows du PDC Mac OS X Server.
Pour avoir des profils itinérants stockés sur un serveur autre que le PDC Mac OS X Server,
indiquez le chemin du profil pour chaque utilisateur dans la sous-fenêtre Windows de
Gestionnaire de groupe de travail. Pour obtenir des instructions, consultez la section
Gestion des utilisateurs.
Migration du service de fichiers Windows
Suivez les instructions dans cette section pour transférer le contenu des dossiers réseau
sur un serveur Windows NT vers des points de partage sur des systèmes Mac OS X Server.
Configurez le service de fichiers Mac OS X Server en désignant les dossiers sur le serveur
comme des points de partage et en plaçant les fichiers pour les utilisateurs Windows dans
les dossiers de points de partage.Vous pouvez définir des listes de contrôle d’accès et des
privilèges UNIX standard afin de contrôler le type d’accès dont bénéficient les utilisateurs
pour les points de partage et les dossiers. Les utilisateurs Windows peuvent ensuite mapper des unités réseau sur des points de partage Mac OS X Server et accéder à leur contenu.120 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Le diagramme suivant récapitule les étapes de migration. Vous trouverez à la suite
des instructions détaillées.
Étape 1 :configurez des points de partage SMB dans Mac OS X Server.
Utilisez Gestionnaire de groupe de travail pour configurer des points de partage pour
des dossiers et des volumes (y compris des disques, des partitions de disque, des CD
et des DVD) que les utilisateurs Windows doivent partager.
Si vous avez configuré un PDC Mac OS X Server, vous avez peut-être configuré des points
de partage pour les répertoires de départ et les profils utilisateur itinérants ou utilisé les
valeurs par défaut.Vous pouvez configurer d’autres points de partage sur des serveurs
membres du domaine Windows ou sur le PDC à proprement parler.
Si vous n’avez pas de PDC, vous pouvez configurer des points de partage sur un système
Mac OS X Server configuré pour les services Windows autonomes.
Les points de partage configurés sur un serveur autonome, un serveur membre
du domaine ou un serveur du PDC peuvent répondre à une utilisation exclusive
ou non exclusive des utilisateurs Windows.
Pour une vue d’ensemble des points de partage, avec une présentation des listes de contrôle d’accès et des privilèges UNIX standard, consultez la section Administration desservices
de fichier.
Mac OS X
Server
Serveur
Windows NT
Clients Windows
1 Configuration des
points de partage.
2 Transfert des fichiers.
3 Définiton des
autorisations
UNIX et/ou ACL.
4 Mise en correspondance des lecteurs
réseau avec les points de partage.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 121
Pour créer un point de partage SMB et en contrôler l’accès :
1 Ouvrez Admin Serveur, connectez-vous au serveur qui hébergera le point de partage
et cliquez sur Partage de fichiers.
2 Vous pouvez éventuellement définir des autorisations de liste de contrôle d’accès
pour le nouveau point de partage ou les dossiers qu’il renferme.
3 Cliquez sur Volumes et sélectionnez le volume à partager.
Pour créer un dossier à utiliser comme point de partage, cliquez sur Parcourir,
sur Nouveau dossier, tapez le nom du dossier et cliquez sur Créer.
Remarque :n’utilisez pas de barre oblique (/) dans un nom de dossier ou de volume amené
à être partagé. Les utilisateurs qui tentent d’accéder au point de partage pourraient avoir
des difficultés à le voir.
4 Pour partager le volume ou le dossier, cliquez sur Partager.
5 Pour contrôler les utilisateurs accédant au point de partage, cliquez sur Points de partage,
sur Autorisations, puis ajoutez des autorisations de liste de contrôle d’accès et/ou des privilèges UNIX standard.
Pour obtenir des instructions sur la configuration des autorisations d’un point de partage,
consultez la section Administration desservices de fichier.
6 Cliquez sur Enregistrer, sur Point de partage, sur Options de protocole, puis sur SMB.
7 Sélectionnez « Partager cet élément via SMB ».
8 Pour permettre aux utilisateurs non enregistrés d’accéder au point de partage,sélectionnez
« Autoriser l’accès comme invité SMB ».
Important :pour une plus grande sécurité, ne sélectionnez pas cette option.
9 Pour changer le nom que les clients voient lorsqu’ils recherchent un point de partage pour
s’y connecter via SMB, tapez un nouveau nom dans le champ Nom SMB personnalisé.
Le changement de nom personnalisé est sans incidence sur le nom du point de partage
et ne concerne que le nom que les clients SMB voient.
10 Sélectionnez le type de verrouillage pour ce point de partage :
 Pour permettre aux clients d’effectuer un verrouillage de fichiers opportuniste,
sélectionnez Activer les oplocks.
Important :n’activez pas les oplocks pour un point de partage utilisant un protocole
autre que SMB.
 Pour que les clients utilisent des verrouillages standard sur les fichiers du serveur,
sélectionnez « Activer le verrouillage strict ».122 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
11 Choisissez une méthode pour attribuer les autorisations d’accès UNIX par défaut
pour les nouveaux fichiers et dossiers dans le point de partage :
 Pour que de nouveaux éléments adoptent les autorisations de l’élément parent,
sélectionnez « Recevoir l’autorisation des parents ».
 Pour attribuer des autorisations spécifiques, sélectionnez Affecter comme suit
et définissez les autorisations Propriétaire, Groupe et Tous via les menus locaux.
12 Pour empêcher l’accès AFP au nouveau point de partage, cliquez sur AFP et désélectionnez
« Partager cet élément via AFP ».
13 Pour empêcher l’accès FTP au nouveau point de partage, cliquez sur FTP et désélectionnez
« Partager cet élément via FTP ».
14 Pour empêcher l’accès NFS au nouveau point de partage, cliquez sur NFS et désélectionnez
« Exporter cet élément et son contenu vers ».
15 Cliquez sur OK.
16 Assurez-vous que le service SMB est en cours d’exécution.
Ouvrez Admin Serveur, sélectionnez SMB dans la liste d’ordinateurs et de services,
puis cliquez sur Vue d’ensemble. Si le service SMB est arrêté, cliquez sur Démarrer SMB.
Étape 2 :transférez des fichiers de Windows NT vers des points de partage
Mac OS X Server.
Une fois des points de partage Mac OS X Server configurés, vous pouvez y transférer
des fichiers depuis des dossiers réseau sur le serveur Windows. Utilisez un ordinateur
pouvant se connecter aux dossiers réseau Windows et aux points de partage Mac OS X
Server. Les utilisateurs Windows peuvent aussi copier leurs propres fichiers sur des
points de partage auxquels ils ont accès en lecture et écriture.
Lorsque vous vous connectez à chaque point de partage, utilisez le nom et le mot de passe
d’un compte utilisateur Mac OS X Server qui a accès en lecture et écriture aux dossiers dans
lesquels vous allez copier des fichiers. Les autorisations par défaut que vous avez configurées auparavant pour un point de partage (à l’étape 1, « configurez des points de partage
SMB dans Mac OS X Server. ») sont attribuées aux dossiers copiés dans ce point de partage.
Étape 3 :contrôlez l’accès à des fichiers et des dossiers copiés.
Vous pouvez définir des listes de contrôle d’accès sur des dossiers ou changer les privilèges
UNIX attribués par défaut aux fichiers et dossiers copiés depuis des dossiers réseau Windows NT dans des points de partage Mac OS X Server.
Vous pouvez définir des listes de contrôle d’accès ou attribuer des privilèges UNIX pour
limiter l’accès aux dossiers détenus par des utilisateurs. Par exemple, vous pouvez
octroyer à un utilisateur l’accès en lecture et écriture à un dossier et l’accès en écriture
seulement à tous les autres utilisateurs, ce qui crée une boîte de dépôt.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 123
Vous pouvez également définir des listes de contrôle d’accès pour offrir à certains groupes
plus d’accès à un dossier.Vous pouvez par exemple donner à un groupe l’accès en lecture
et écriture, à un autre groupe l’accès en lecture seule et à tous les autres utilisateurs aucun
accès.Vous pouvez attribuer des privilèges UNIX pour qu’un groupe ait un accès plus
étendu que les autres.
Pour en savoir plus sur les listes de contrôle d’accès et les privilèges UNIX, consultez
la section Administration des services de fichier.
Étape 4 :les utilisateurs peuvent mapper des unités en réseau sur des points
de partage.
Les utilisateurs Windows peuvent désormais se connecter aux points de partage Mac OS X
Server qu’ils voient sous forme de dossiers réseau et mapper des unités réseau sur ces
points de partage. Pour obtenir des instructions de base sur le mappage d’une unité réseau,
consultez l’aide à l’écran dans Windows.
Le nom et le mot de passe d’ouverture de session de l’utilisateur sont utilisés par
défaut pour authentifier la connexion à un point de partage Mac OS X Server. Si l’utilisateur n’a pas ouvert la session sur Windows avec le nom et le mot de passe d’un
compte utilisateur Mac OS X Server, il peut cliquer sur « Se connecter sous un nom
d’utilisateur différent » dans la zone de dialogue « Connecter un lecteur réseau » et
saisir le nom et le mot de passe d’un compte utilisateur Mac OS X Server.
Vous pouvez ajouter des comptes utilisateur pour des utilisateurs Windows qui n’en possèdent pas encore à l’aide de Gestionnaire de groupe de travail. Pour obtenir des instructions, consultez la section Gestion des utilisateurs.
Accès de Windows au service d’impression
Suivez les instructions de cette section pour configurer l’accès aux files d’attente
d’impression Mac OS X Server depuis des postes de travail Windows.
Pour configurer le service d’impression pour des utilisateurs Windows, configurez des files
d’attente d’impression pour l’emploi du protocole SMB. Ces utilisateurs peuvent ensuite
se servir de l’assistant Ajouter une imprimante pour installer (se connecter à) des files
d’attente d’impression comme des imprimantes réseau sur leurs postes de travailWindows.
Ils verront alors ces files d’attente sous forme d’imprimantes.
Pour installer une file d’attente d’impression sur un ordinateur Windows, il vous faut
un compte utilisateur membre du groupe Administrateurs ou Utilisateurs avec pouvoir
de l’ordinateur (pour Windows 2000). Par défaut, les comptes utilisateur du PDC ne sont
pas membres de ces comptes locaux.
Pour limiter le nombre de pages que des utilisateurs peuvent imprimer, établissez
des quotas d’impression sur leur compte.124 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Le diagramme suivant récapitule les étapes de migration pour configurer l’accès aux
files d’attente d’impression Mac OS X Server depuis des postes de travail Windows.
Vous trouverez à la suite des instructions détaillées.
Étape 1 :configurez des files d’attente d’impression SMB dans Mac OS X Server.
Utilisez Admin Serveur pour créer des files d’attente sur le serveur pour des imprimantes
PostScript réseau, rendre ces files d’attente disponibles pour des utilisateurs Windows
et démarrer le service d’impression sur le serveur.
Pour configurer une file d’attente d’impression partagée pour l’accès SMB :
1 Dans Admin Serveur, sélectionnez Imprimer dans la liste d’ordinateurs et de services.
2 Cliquez sur Files d’attente.
3 Sélectionnez une file d’attente existante que vous voulez rendre disponible pour
des utilisateurs Windows, puis cliquez sur le bouton Modifier (en forme de stylo)
ou sur le bouton Ajouter (+) pour créer une file d’attente.
Si vous cliquez sur le bouton Ajouter (+) pour créer une file d’attente, choisissez
le protocole de l’imprimante dans le menu local en haut de la zone de dialogue,
puis indiquez l’imprimante avec les informations suivantes :
 Pour une imprimante AppleTalk ou Open Directory, sélectionnez-la dans la liste
et cliquez sur OK.
 Pour une imprimante LPR, tapez son adresse IP ou son nom DNS et cliquez sur OK
(si vous ne voulez pas utiliser la file d’attente d’impression par défaut du serveur,
désélectionnez « Utiliser la file d’attente par défaut sur le serveur » et tapez
un nom de file d’attente).
4 Dans la sous-fenêtre d’édition de files d’attente, vérifiez que le champ Nom de partage
respecte les règles de dénomination SMB.
Pour le protocole SMB, le nom de partage doit comporter un maximum de 15 caractères
et contenir uniquement les caractères A–Z, a–z, 0–9 et _ (traite de soulignement).
Certains clients Windows limitent la longueur du nom à 12 caractères.
Mac OS X
Server
Imprimantes
PostScript
Clients Windows
3 Définiton des quotas
d'impression (facultatif).
1 Configuration des files
d'attente d'impression.
2 Connexion aux files
d'attente et impression.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 125
Le nom de partage est celui de la file d’attente que les utilisateurs voient comme nom
d’imprimante. Le changement du nom de partage est sans incidence sur le nom de l’imprimante sur le serveur, qui apparaît au-dessus de le champ Nom de partage.Vous pouvez
modifier le nom de l’imprimante, le type (modèle) et l’emplacement dans la zone de dialogue Ajouter une imprimante, accessible depuis la zone de dialogue Imprimer.
Pour éviter des conflits, assurez-vous que le nom de partage n’est pas identique à un nom
de point de partage SMB.
5 Sélectionnez SMB et d’autres protocoles utilisés par des ordinateurs clients.
Les ordinateursWindows peuvent utiliser SMB. Les ordinateursWindows 2000,Windows XP
et Windows Vista peuvent utiliser SMB ou LPR.
Les ordinateurs Mac OS X et Mac OS 9 peuvent utiliser AppleTalk ou LPR.
6 Pour appliquer les quotas d’impression fixés pour des utilisateurs dans Gestionnaire
de groupe de travail, sélectionnez « Appliquer des quotas pour cette file d’attente ».
7 Cliquez sur Enregistrer.
8 Si le service d’impression est arrêté, cliquez sur Démarrer l’impression dans la barre
d’outils ou choisissez Fichier > Démarrer le service.
9 Assurez-vous que le service d’impression est en cours d’exécution en sélectionnant
Imprimer dans la liste d’ordinateurs et de services et en cliquant sur Vue d’ensemble.
10 Si le service d’impression est arrêté, cliquez sur Démarrer l’impression ou choisissez
Serveur > Démarrer le service.
Étape 2 :les clients Windows peuvent se connecter à des files d’attente
Mac OS X Server.
Les utilisateurs Windows peuvent désormais ajouter des connexions à des files
d’attente Mac OS X Server à l’aide de l’assistant Ajouter une imprimante.
Sur un ordinateur Windows XP, l’ajout d’une connexion à une file d’attente suppose
l’ouverture de session avec un compte utilisateur membre du groupe Administrateurs
de l’ordinateur.
Sur un ordinateur Windows 2000, l’ajout d’une connexion à une file d’attente suppose
l’ouverture de session avec un compte utilisateur membre du groupe Administrateurs
ou Utilisateurs avec pouvoir de l’ordinateur.
Par défaut, les comptes utilisateur du PDC ne sont pas membres de ces groupes.
Pour obtenir des instructions sur l’ajout d’utilisateurs à des comptes de groupes locaux,
consultez l’aide à l’écran dans Windows sur la gestion de l’ordinateur. Pour obtenir
des instructions de base sur la connexion à des imprimantes réseau, consultez l’aide
à l’écran dans Windows.126 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT
Étape 3 :définissez et appliquez des quotas d’impression (facultatif ).
La définition de quotas d’impression se fait en deux temps :
 Indication du quota et de la durée pour chaque utilisateur avec Gestionnaire
de groupe de travail.
 Configuration du service d’impression pour appliquer des quotas pour les files
d’attente avec Admin Serveur.
Pour fixer le quota d’impression pour un ou plusieurs utilisateurs :
1 Dans Gestionnaire de groupe de travail,sélectionnez les comptes utilisateur pour lesquels
configurer un répertoire de départ.
2 Cliquez sur Quota d’impression et sélectionnez une option de quota d’impression :
 Pour fixer un quota pour toutes les files d’attente, sélectionnez « Toutes les files
d’attente » et tapez le nombre de pages et le nombre de jours après lesquels
le quota sera réinitialisé.
 Pour fixer un quota pour une seule file d’attente,sélectionnez Par file d’attente, choisissez
la file d’attente dans la liste déroulante et tapez le quota et la durée.
Si la file d’attente ne se trouve pas dans la liste, cliquez sur Ajouter et remplacez « sans
titre » par le nom de la file d’attente. Choisissez ensuite le file d’attente dans la liste déroulante,tapez l’adresse IP ou le nom DNS du serveur hébergeant cette file d’attente et tapez
le quota de pages et la durée du quota pour l’utilisateur.
3 Cliquez sur Enregistrer.
Les quotas ne s’appliquent pas tant que vous n’activez pas leur application pour
des files d’attente spécifiques dans le service d’impression avec Admin Serveur.
Pour appliquer des quotas pour une file d’attente d’impression :
1 Dans Admin Serveur, sélectionnez Imprimer dans la liste d’ordinateurs et de services.
2 Cliquez sur Files d’attente.
3 Sélectionnez une file d’attente dans la liste.
4 Sélectionnez « Appliquer des quotas pour cette file d’attente ».
5 Cliquez sur Enregistrer. 127
Index
Index
A
accès
listes de contrôle d’accès (ACL)25, 59, 122
points de partage SMB120, 122, 123
Voir aussi LDAP; autorisations; SOAP
administrateur, privilèges d’13
Admin Serveur31, 65, 86
adresses IP106
aide, utilisation6
applications JBoss
migration à partir de la version 10.370, 79
migration à partir de la version 10.437, 46
archivage
migration à partir de la version 10.367, 72
migration à partir de la version 10.433, 39
migration de 10.288, 91
authentification25, 111
Voir aussi Kerberos; mots de passe
authentification de NTLMv1 et 2111
authentification standard. Voir mots de passe chiffrés
autorisations
administrateur13
migration à partir de la version 10.372, 83
migration à partir de la version 10.439, 50
migration de 10.291, 98
migration de Windows NT105, 115, 118
root13, 118
autorisations root13, 118
B
BDC (contrôleur de domaine secondaire)103
C
certificats, importation24, 58
certificats SSL (Secure Sockets Layer)24, 58
CIFS (Common Internet File System). Voir SMB/CIFS
clients. Voir groupes; utilisateurs
Common UNIX Printing System. Voir CUPS
comptes. Voir groupes; utilisateurs; Gestionnaire de
groupe de travail
comptes d’utilisateur12, 13
comptes de groupe, enregistrement et
réutilisation12, 13
comptes prédéfinis13, 14
comptes système13
comptes utilisateurs
Voir aussi utilisateurs
configuration
mise à niveau à partir de la version 10.354, 55
mise à niveau à partir de la version 10.420, 21
configuration requise29, 63
configuration requise, système85
contrôleur de domaine principal. Voir PDC
contrôleur de domaine secondaire. Voir BDC
contrôleurs, PDC101, 102, 104, 112, 119
copies de sauvegarde, compte utilisateur103
courrier électronique. Voir service de messagerie
CSR (demande de signature de certificat)24
CUPS (Common UNIX Printing System)
migration à partir de la version 10.371, 79
migration à partir de la version 10.437, 46
mise à niveau à partir de la version 10.353, 60
mise à niveau à partir de la version 10.419, 23
D
Demande de signature de certificat. Voir CSR
démon launchd24, 45, 57, 78, 96
démon wotaskd24, 45, 57, 78, 96
dittooutil69
documentation7, 8, 9
domaines, annuaire. Voir Open Directory
domaine Windows. Voir SMB/CIFS
Domain Name System. Voir DNS
dossiers. Voir dossiers de départ
dossiers de départ
migration à partir de la version 10.372, 74
migration à partir de la version 10.439, 41
migration de 10.291, 93
migration de Windows NT100, 103, 111, 114, 118
dsimport outil65
E
exportation
réglages de serveur19128 Index
utilisateurs et groupes31, 32, 65, 66, 88
Voir aussi importation
F
fichiers
déplacement de41, 75
relocalisation de93
transfert d’un utilisateur Windows118
verrouillage de105
Voir aussi archivage
fichiers partagés. Voir partage de fichiers
files d’attente, imprimer23, 125, 126
G
Gestionnaire de groupe de travail
enregistrement et réutilisation des utilisateurs et
des groupes13
exportation d’utilisateurs et de groupes31, 32,
65, 66
importation d’utilisateurs et de groupes40, 73,
86
mise à niveau de mot de passe59
mise à niveau des mots de passe25
Gestionnaire Macintosh11
groupe admin13
groupes
comptes prédéfinis13, 14
exportation31, 32, 65, 66, 88
importation40, 73, 92
migration de Windows NT100, 101, 102, 107,
108, 111
mise à niveau24, 58
groupe wheel13
H
historiques, Open Directory26, 60
hôtes. Voir serveurs
I
images. Voir images disque; service NetBoot
images disque, archivage de fichiers33, 67
Voir aussi service NetBoot
importation
certificats SSL24, 58
dsimport outil31, 65
groupes40, 73, 92
outil dsimport13
utilisateurs40, 73, 92
Voir aussi exportation
Initiales de « Dynamic Host Configuration Protocol »
(protocole de configuration dynamique
d’hôtes). Voir DHCP
Initiales de « File Transfer Protocol » (protocole de
transfert de fichiers). Voir FTP
Initiales de « Network address translation »
(conversion d’adresses réseau). Voir NAT
installation, mise à niveau19, 54
J
Java
migration à partir de la version 10.445, 78
migration de 10.496
mise à niveau à partir de la version 10.423
K
Kerberos
migration à partir de la version 10.375
migration à partir de la version 10.441
migration de Windows NT103, 106, 109, 111
mise à niveau à partir de la version 10.358
mise à niveau à partir de la version 10.425
L
Lightweight Directory Access Pr
listes de contrôle d’accès (ACL)25, 59, 122
M
Mac OS X Server
et le Gestionnaire Macintosh11
en remplacement de serveurs Windows NT101
Voir aussi version
maître Open Directory
migration à partir de la version 10.429
migration de Windows NT100, 102, 109
mise à niveau à partir de la version 10.352
mise à niveau à partir de la version 10.418
mappages d’unités réseau123
migration à partir de la version 10.211, 12
migration à partir de Windows NT
vue d’ensemble11, 12
migration de la version 10.285, 86, 87
migration de Windows NT
aperçu99, 100
configuration DNS106
procédure pas à pas108
remarques de planification102
service d’impression106, 108, 123
services de fichiers104, 108, 119
utilisateurs et groupes101, 102, 103, 107, 108,
111, 119
migration et mise à niveau5, 6
migration par rapport à mise à niveau11, 12, 13
mise à jour de logiciels19, 53
Mise à jour de logiciels, service19, 53
mise à niveau et migration5, 6
mise à niveau par rapport à migration11, 12, 13
mot de passe
chiffrés59
mise à niveau à partir de la version 10.359Index 129
mot de passe chiffrés59
mots de passe
chiffrés25, 41
migration à partir de la version 10.367
migration à partir de la version 10.433, 40, 41
migration de 10.288
mise à niveau à partir de la version 10.425
Open Directory25, 103
ouverture de session d’utilisateur root13
mots de passe chiffrés25, 41
MySQL
migration à partir de la version 10.368
migration à partir de la version 10.434, 42, 76
N
NAT (Network Address Translation)
migration à partir de la version 10.371, 79
migration à partir de la version 10.437, 46
NetBIOS107
numéro de série, serveur15
O
Open Directory
historiques26, 60
migration à partir de la version 10.429, 36, 44
mise à niveau à partir de la version 10.418, 26
OpenLDAP
Voir aussi Open Directory
ordinateurs, migration de Windows NT100, 101,
102, 108, 111
outil createhomedir41
outil dsimport13, 31
outils de l13
outils de ligne de commande
archivage33, 67, 88
copie33, 67, 69, 88
copie de fichiers à distance33, 88
dossiers de départ41
importation13, 31, 65
ouverture de session13
test de schéma LDAP26, 59
outil ssh13
outil su13
outil tar33
ouverture de session
utilisateur root13
utilisateurs Windows102, 104, 117
P
Partage de fichiers
Voir aussi points de partage
migration à partir de la version 10.373, 83
migration à partir de la version 10.439
migration de 10.292
migration de Windows NT104
PDC (contrôleur de domaine principal)101, 102,
104, 112, 119
PHP Hypertext Preprocessor (PHP)18
points de partage
migration à partir de la version 10.372, 83
migration à partir de la version 10.439, 50
migration de 10.291, 98
et utilisateurs Windows104, 105, 114, 120, 122,
123
Postscript générique (PPD générique)23
privilèges, administrateur
Voir aussi autorisations
privilèges administrateur13
procédures de configuration. Voir configuration;
installation
profils utilisateur itinérants103, 119
Q
QTSS Publisher
migration à partir de la version 10.372, 81
migration à partir de la version 10.438, 48
mise à niveau à partir de la version 10.351
mise à niveau à partir de la version 10.417
QuickTime Streaming Server (QTSS)
migration à partir de la version 10.371, 81
migration à partir de la version 10.438, 48
migration de 10.291
migration de 10.498
quotas, imprimer126
R
répertoires. Voir services de répertoire; dossiers de
départ
réplique Open Directory
migration à partir de la version 10.429
mise à niveau à partir de la version 10.352
mise à niveau à partir de la version 10.418
requise, configuration11
réseau privé. Voir VPN
rsync outil33, 88
S
schémas, domaine d’annuaire59
schémas, domaine de répertoire26
scp outil33, 67, 88
script NTdomainmigration.sh102, 107, 108, 111
Secure Sockets Layer. Voir SSL
sécurité
authentification111
Voir aussi accès; service coupe-feu; Kerberos; mots
de passe
sécurité
authentification25
certificats SSL24, 58130 Index
Server Message Block/Common Internet File System.
Voir SMB/
serveur Apache
mise à niveau à partir de la version 10.361
mise à niveau à partir de la version 10.418, 27
serveur d’applications Tomcat
migration à partir de la version 10.370, 79
migration à partir de la version 10.437, 45
migration de 10.290, 96
serveur d’applications WebObjects
migration à partir de la version 10.370, 78
migration à partir de la version 10.437, 45
migration de 10.290, 96
mise à niveau à partir de la version 10.357
mise à niveau à partir de la version 10.423
serveur de mots de passe. Voir serveur de mots de
passe Open Directory
serveur de mots de passe Open Directory102
serveur Leopard. Voir Mac OS X Server
serveurs
mises à niveau à distance21, 55
numéro de série15
test50, 83, 98
Voir aussi version
serveurs distants, mise à niveau21, 55
service AFP (Apple Filing Protocol)
migration à partir de la version 10.370, 78
migration à partir de la version 10.436, 44
service AFP. Voir AFP
service coupe-feu
migration à partir de la version 10.371, 79
migration à partir de la version 10.437, 46
service coupe-feu IP. Voir service coupe-feu
service d’impression
migration à partir de la version 10.371, 79
migration à partir de la version 10.437, 46
migration de Windows NT106, 108, 123
mise à niveau à partir de la version 10.353, 60
mise à niveau à partir de la version 10.419, 23
service de conversation. VoiriChat
service de coupe-feu
migration de 10.290, 96
service de messagerie
migration à partir de la version 10.369, 77
migration à partir de la version 10.435, 43
migration de 10.289, 95
Voir aussi WebMail
service de protocole SMB/CIFS (Server Message
Block/Common Internet File System)
migration à partir de la version 10.436, 44
migration de Windows NT105, 106, 120, 123
service DHCP (Dynamic Host Configuration Protocol)
migration à partir de la vers29
migration à partir de la version 10.371, 81
migration à partir de la version 10.438, 48
migration de 10.291, 97
mise à niveau à p18
mise à niveau à partir de la version 10.352
service DNS (Domain Name System)
migration à partir de la version 10.371, 80
migration à partir de la version 10.438, 47
migration de 10.291, 97
migration de Windows NT106, 110
mise à niveau à partir de la version 10.360
mise à niveau à partir de la version 10.426
service FTP (File Transfer Protocol)
migration à partir de la version 10.370, 77
migration à partir de la version 10.436, 44
migration de 10.290, 95
Service iChat38, 49
service LDAP (Lightweight Directory Access
Protocol)
migration à partir de la version 10.436, 44
migration de Windows NT103
mise à niveau à partir de la version 10.359
mise à niveau à partir de la version 10.425, 26
service NetBoot
migration à partir de la version 10.370, 78
migration à partir de la version 10.437, 44
mise à niveau à partir de la version 10.351, 59
mise à niveau à partir de la version 10.417, 26
services d’annuaire et mise à niveau25, 58
Voir aussi Open Directory
services de fichiers, migration de Windows NT104,
108, 119
Voir aussi AFP; FTP; points de partage; SMB/CIFS
services du domaine NT. Voir SMB/CIFS; migration de
Windows NT
services réseau. Voir DHCP; DNS; service coupe-feu;
adresses IP; NAT; VPN
service web
migration à partir de la version 10.368, 75, 76
migration à partir de la version 10.434, 42
migration de 10.289, 94
mise à niveau à partir de la version 10.360
mise à niveau à partir de la version 10.426
Si24
Simple Object Access Protocol. Voir SOAP
slaptest outil26, 59
SOAP (Simple Object Access Protocol)
migration à partir de la version 10.370, 79
migration à partir de la version 10.437, 45
migration de 10.290, 96
T
tâches, imprimer (files d’attente)23, 125, 126
tar outil67, 88
U
utilisateurs
autorisations105Index 131
exportation31, 32, 65, 66, 88
importation40, 73, 92
migration à partir de la version 10.371, 81
migration à partir de la version 10.438, 48
migration de 10.291, 98
migration de Windows NT100, 101, 102, 107,
108, 111, 118, 119
mise à niveau à partir de la version 10.359
ouverture de session13, 102, 104, 117
profils itinérants103, 119
root13, 118
Voir aussi groupes; dossiers de départ; comptes
utilisateurs
V
verrouillage, fichier105
verrouillage de fichiers opportuniste (oplocks)105
verrouillage de fichiers strict105
version 10.3
migration12, 61, 63, 64, 65, 66
mise à niveau11, 51, 52, 53
version 10.4
migration12, 29, 31, 32
migration à partir de la29, 30
mise à niveau11, 17, 19
mise à niveau à partir de18
mise à niveau à partir de la27
VPN (Virtual Private Network)
migration à partir de la version 10.371, 80
migration à partir de la version 10.438, 47
W
WebMail
migration à partir de la version 10.370, 77
migration à partir de la version 10.436, 44
Webmail
migration de 10.289, 95
Windows Internet Naming Service. Voir WINS
WINS (Windows Internet Naming Service)101
X
Xserve, installation de mise à niveau à distance
avec21, 55
Mac OS X Server
Premiers contacts
Pour la version 10.5 LeopardK Apple Inc.
© 2007 Apple Inc. Tous droits réservés.
Le propriétaire ou l’utilisateur autorisé d’un exemplaire
valide du logiciel Mac OS X Server peut reproduire la
présente publication à des fins d’apprentissage dudit
logiciel. La présente publication ne peut être reproduite
ou transmise en totalité ou en partie à des fins commerciales, telles que la vente de copies ou la prestation d’un
service d’assistance payant.
Tous les efforts nécessaires ont été mis en œuvre pour
que les informations contenues dans ce manuel soient
les plus exactes possibles. Apple Inc n’est pas responsable des erreurs d’impression ou de reproduction.
Étant donné qu’Apple publie régulièrement de nouvelles versions et mises à jour de ses logiciels, les illustrations de ce document peuvent être différentes de celles
qui s’affichent à l’écran.
Apple
1 Infinite Loop
Cupertino, CA 95014-2084
408-996-1010
www.apple.com
Le logo Apple est une marque d’Apple Inc., déposée aux
États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option + 1) pourra
constituer un acte de contrefaçon et/ou de concurrence
déloyale.
Apple, le logo Apple, AirPort, AirPort Express, AirPort
Extreme, Bonjour, FireWire, iCal, iPod, iSight, iTunes, Keychain, Keynote, Mac, Mac OS, Macintosh, Panther, Power
Mac, QuickTime, Xcode, Xgrid et Xserve sont des marques d’Apple Inc. déposées aux États-Unis et dans
d’autres pays. Apple Remote Desktop, Apple TV, Finder,
iPhone, Leopard, Safari, Spotlight et Tiger sont des marques d’Apple Inc.
Adobe et PostScript sont des marques d’Adobe Systems
Incorporated.
Intel, Intel Core et Xeon sont des marques d’Intel Corp.
aux États-Unis et dans d’autres pays.
PowerPC™ et le logo PowerPC™ sont des marques
d’International Business Machines Corporation utilisées
sous licence.
UNIX est une marque déposée du groupe Open aux
États-Unis et dans d’autres pays.
Les autres noms de sociétés et de produits mentionnés
ici sont des marques de leurs détenteurs respectifs. La
mention de produits tiers n’est effectuée qu’à des fins
informatives et ne constitue en aucun cas une approbation ni une recommandation. Apple n’assume aucune
responsabilité vis-à-vis des performances ou de l’utilisation de ces produits.
F034-4192-A/01-09-20073
Table des matières
11 Chapitre 1 : Présentation de Mac OS X Server
12 Nouveautés de Leopard Server
13 Configuration simple
15 Préférences du serveur et état du serveur
16 Serveur iCal
18 Services de groupe avec wikis et blogs
20 Répertoire
21 Podcast Producer
23 Serveur Spotlight
24 Compatibilité avec UNIX
24 Calcul 64 bits
25 Configurations de serveur
27 Fonctionnement de Leopard Server
30 Leopard Server au sein d’un groupe de travail
32 Services
35 Applications et utilitaires
36 Outils et applications avancés4 Table des matières
39 Chapitre 2 : Installation de Mac OS X Server
40 Éléments requis pour l’installation de Leopard Server
42 Installation Locale
44 Préparation d’un ordinateur administrateur
45 Installation à distance
49 Chapitre 3 : Configuration de Mac OS X Server
50 Configuration locale d’un serveur
52 Sécurité de votre serveur
52 Protection du compte administrateur système (root)
53 Configuration à distance d’un serveur
57 Chapitre 4 : Gestion de votre serveur
57 Utilisation de Préférences du serveur
59 Utilisation du widget d’état du serveur
61 Recherche de réglages dans Préférences du serveur
61 Connexion de Préférences du serveur à un serveur distant
62 Fermeture d’une connexion de Préférences du serveur
63 Sauvegarde et restauration du serveur
64 Mise à jour de Leopard Server
67 Chapitre 5 : Gestion des utilisateurs
68 À propos des comptes utilisateur
72 À propos des comptes d’administrateur
74 Ajout d’un compte utilisateurTable des matières 5
76 Importation d’utilisateurs
78 Importation automatique de groupes d’utilisateurs
80 Suppression d’un compte utilisateur
81 Modification des réglages d’un compte utilisateur
83 Modification des informations de contact d’un utilisateur
84 Contrôle de l’accès d’un utilisateur aux différents services
85 Modification de l’appartenance d’un utilisateur à des groupes
86 Modification du nom ou du mot de passe d’un utilisateur
88 Modification de la photo d’un utilisateur
89 Personnalisation du message électronique d’accueil
91 Personnalisation du message électronique d’invitation du serveur
92 Personnalisation du message électronique d’invitation du groupe
95 Chapitre 6 : Gestion des ordinateurs des utilisateurs
95 Configuration automatique des ordinateurs Mac Leopard
99 Configuration de services pour les nouveaux utilisateurs de Leopard
101 Configuration d’utilisateurs Leopard à partir d’un message d’invitation
103 Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire
105 Configuration manuelle des ordinateurs des utilisateurs
107 Configuration d’une connexion VPN pour les utilisateurs Mac
109 Configuration manuelle de la connexion VPN d’un utilisateur
110 Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard6 Table des matières
113 Chapitre 7 : Gestion des groupes
114 Création d’un nouveau groupe
117 Suppression d’un groupe
118 Ajout ou suppression de membres d’un groupe
120 Ajout ou suppression de membres externes d’un groupe
122 Modification des réglages de groupe
123 Modification du nom d’un groupe
123 Configuration d’un dossier de partage de fichiers d’un groupe
124 Configuration d’une liste d’envoi de groupe
124 Configuration du site web wiki d’un groupe
126 Configuration du calendrier d’un groupe
127 Configuration des archives de la liste d’envoi d’un groupe
129 Chapitre 8 : Personnalisation des services
129 Gestion du service de partage de fichiers
130 À propos du service de partage de fichiers
130 Ajout d’un dossier partagé
131 Suppression d’un dossier partagé
132 Contrôle de l’accès au dossier partagé
133 Recherche d’une adresse de partage de fichiers sur un serveur
134 Gestion du service iCal
135 À propos du service iCal
136 Gestion du service iChat
136 À propos du service iChatTable des matières 7
137 Ajout de tous les utilisateurs à la liste de contacts de chaque utilisateur
138 Conversation avec les utilisateurs de Google Talk et d’autres services XMPP
138 Enregistrement et archivage des messages instantanés
139 Gestion du service de messagerie
139 À propos du service de messagerie
140 Choix d’un serveur de relais du courrier électronique
141 À propos du filtrage des messages indésirables et des virus
142 Analyse des messages indésirables et des virus entrants
143 Gestion des services web
144 À propos des services web
145 Recherche de l’adresse du site web du serveur
145 Hébergement d’un site web conventionnel
146 Configuration du service wiki de groupe
147 Configuration du service Webmail
147 Configuration des blogs d’utilisateur
148 Gestion du service VPN
149 À propos du service VPN
150 Modification du secret partagé VPN
151 Création d’un fichier de configuration VPN
152 Modification de la plage d’adresses IP pour le VPN
154 Fourniture d’un service VPN via un routeur Internet
155 Personnalisation des services à l’aide d’applications avancées8 Table des matières
157 Chapitre 9 : Gestion des informations du serveur
157 Gestion des informations du serveur
158 Modification du numéro de série ou des détails de la licence de site
159 Modification des réglages de notification
160 Modification du nom de votre serveur
161 Modification de l’adresse IP de votre serveur
162 Connexion à un serveur de répertoire
163 Modification des réglages de coupe-feu
164 À propos du coupe-feu
165 Consultation des historiques du serveur
168 Contrôle des courbes du serveur
171 Chapitre 10 : En savoir plus
171 Utilisation de l’aide à l’écran
173 Guides d’administration de Mac OS X Server
176 Visualisation de guides PDF à l’écran
177 Impression des guides PDF
178 Obtenir des mises à jour de documentation
179 Pour obtenir des informations supplémentaires
181 Annexe A : Préparation des disques pour l’installation de Mac OS X Server
182 Effacement à l’aide du programme d’installation
183 Effacement à l’aide d’Assistant du serveur
183 Effacement à l’aide d’Utilitaire de disqueTable des matières 9
184 Partitionnement d’un disque dur
184 Création d’un ensemble RAID
185 Annexe B : Configuration d’un routeur Internet
185 Configuration du mappage des ports sur une borne d’accès AirPort Extreme
187 Configuration manuelle du mappage de ports sur un routeur Internet
189 Index1
11
1 Présentation de Mac OS X Server
Mac OS X Server possède tout ce dont vous avez besoin pour
fournir des services de groupe de travail et des services Internet standard. Il convient parfaitement à l’enseignement et aux
petites et grandes entreprises.
Mac OS X Server 10.5 Leopard combine une base UNIX éprouvée et stable, des standards
ouverts et la simplicité d’utilisation de Macintosh. Il propose une vaste gamme de services
prenant en charge des ordinateurs clients Macintosh, Windows et UNIX via un réseau.
Avec Leopard Server, les petites entreprises et les petits groupes de travail qui n’ont
pas de service informatique peuvent profiter au mieux des avantages d’un serveur.
Même un utilisateur sans connaissances techniques est en mesure de configurer et de
gérer Leopard Server pour un groupe. Les autres utilisateurs du groupe peuvent configurer automatiquement leur Mac pour bénéficier des services de Leopard Server.
Leopard Server dispose également d’options de configuration et d’outils de gestion
avancés destinés aux informaticiens.12 Chapitre 1 Présentation de Mac OS X Server
Nouveautés de Leopard Server
Mac OS X Server 10.5 Leopard propose d’importantes améliorations dans plusieurs
domaines clés :
 Configuration simple
 Préférences du serveur et état du serveur
 Serveur iCal
 Services de groupe avec wikis et blogs
 Application Répertoire
 Podcast Producer
 Serveur Spotlight
 Compatibilité avec UNIX et calcul 64 bits
Les performances et l’extensibilité de Leopard Server ont également été améliorées de
manière significative en ce qui concerne des services clés tels que le partage de fichiers
et les services de messagerie.
Si vous êtes un administrateur de serveur expérimenté et que vous souhaitez configurer
un serveur d’entreprise ou que vous avez d’autres besoins complexes, vous découvrirez
les améliorations apportées dans les domaines du partage de fichiers, des technologies
web, de la diffusion de données multimédias, de la messagerie instantanée, du service
de messagerie, de l’authentification liées aux répertoires et aux réseaux, de la création
d’images de système et de la gestion de clients. Admin Serveur, Gestionnaire de groupe
de travail et Utilitaire d’images de système ont tous été améliorés. Pour en savoir plus,
consultez Administration du serveur ainsi que les autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server » à la page 173.Chapitre 1 Présentation de Mac OS X Server 13
Configuration simple
Mac OS X Server n’a jamais été aussi simple à utiliser. Assistant du serveur élimine les
difficultés liées à la configuration d’un serveur. Il vous guide tout au long du processus
d’installation et de la configuration des services de base. Il configure automatiquement
votre borne d’accès AirPort Extreme (802.11n) et analyse le réseau afin de vérifier l’état
des connexions au réseau local et à Internet. En quelques clics, Leopard Server prépare
le partage de fichiers, le courrier électronique, les sites web de groupe, la messagerie
instantanée, les calendriers individuels, l’accès à distance et les fonctions de sauvegarde. 14 Chapitre 1 Présentation de Mac OS X Server
Les utilisateurs peuvent ainsi configurer rapidement et facilement des ordinateurs Mac
équipés de Mac OS X Leopard en vue d’obtenir des services du serveur. Il suffit de cliquer
sur un bouton présent dans un message électronique ou d’ouvrir l’application Utilitaire
d’annuaire pour ouvrir un assistant qui se connecte au serveur et configure les applications afin qu’elles utilisent ses services. En quelques instants, Mail, iChat, iCal et une connexion réseau VPN sont prêts à être utilisés. Chaque utilisateur d’iChat voit s’afficher les
autres utilisateurs dans sa liste de contacts iChat. Les utilisateurs de Mail sont prêts à
envoyer du courrier aux personnes de leur groupe. Carnet d’adresses, Répertoire et Mail
sont prêts à consulter les coordonnées de contacts partagées dans le répertoire du serveur. Toute imprimante connectée au port USB du serveur est automatiquement mise à
la disposition des utilisateurs.Chapitre 1 Présentation de Mac OS X Server 15
Préférences du serveur et état du serveur
Leopard Server est encore plus simple à gérer. Vous souhaitez modifier certains éléments ?
Les préférences du serveur permettent de gérer rapidement les utilisateurs, les groupes,
les services et les informations du système. Vous pouvez soit utiliser les préférences du
serveur directement sur le serveur, soit utiliser un autre Mac pour gérer votre serveur
via le réseau.
Retrouvez le réglage
qui vous intéresse
sans connaître son
emplacement exact16 Chapitre 1 Présentation de Mac OS X Server
Pour contrôler les performances et les services du serveur, vous pouvez vous référer
aux graphiques et aux statistiques proposés par le widget d’état du serveur disponible
dans le Dashboard. État du serveur fonctionne en réseau, ce qui vous permet de surveiller
le serveur depuis un autre Mac.
Serveur iCal
Le serveur iCal facilite le partage de calendriers et la planification des rendez-vous ;
il permet également de coordonner des événements au sein d’un groupe de travail,
d’une petite entreprise ou d’une grande organisation. Plusieurs collègues peuvent vérifier
leurs disponibilités respectives, proposer et accepter des réunions, réserver des projecteurs et bien plus encore. Le serveur iCal envoie des invitations avec agendas ou listes
de tâches et gère les réponses.
Vérifiez le processeur,
le réseau ou l’utilisation
des disques
Vérifiez l’état du serviceChapitre 1 Présentation de Mac OS X Server 17
Le serveur iCal s’intègre aux applications de calendrier avancées telles qu’iCal 3 de Leopard, ainsi qu’aux applications de calendrier de tierce partie prenant en charge le protocole standard CalDAV.18 Chapitre 1 Présentation de Mac OS X Server
Services de groupe avec wikis et blogs
Leopard Server comprend un service wiki qui permet aux groupes de créer et de diffuser facilement des informations via leurs propres sites web intranet partagés. Tous les
membres d’un groupe peuvent aisément visualiser, rechercher et modifier du contenu
wiki à partir de leur navigateur web. En utilisant les modèles proposés ou en créant
leurs propres modèles, ils peuvent ajouter, supprimer, modifier et mettre en forme le
contenu de la manière la plus naturelle possible, même sans connaître les balises HTML
ou une syntaxe spécifique. Ils peuvent en quelques clics, joindre des fichiers et des images, publier des podcasts, assigner des mots-clés et créer des liens vers d’autres pages
wiki ou d’autres sites web. Il leur est également possible de visualiser l’intégralité de
l’historique des changements wiki et de rétablir les anciennes versions des pages. Ils
peuvent en outre visualiser des calendriers partagés, des blogs et des archives de listes
d’envoi et y contribuer.Chapitre 1 Présentation de Mac OS X Server 19
Chaque utilisateur peut avoir son propre blog lui permettant de tenir ses collègues au courant de ses différents projets ou des fichiers sur lesquels il travaille et de publier des images
ou des podcasts. Un blog personnel constitue l’emplacement idéal pour proposer des
informations destinées à votre groupe ou simplement pour conserver des références.20 Chapitre 1 Présentation de Mac OS X Server
Répertoire
L’application Répertoire permet aux utilisateurs d’accéder à des informations partagées
sur les personnes, les groupes, les emplacements et les ressources de l’organisation. Les
utilisateurs peuvent partager des contacts, ajouter des groupes, configurer des services
de groupe et gérer les coordonnées de leurs propres contacts.Chapitre 1 Présentation de Mac OS X Server 21
Podcast Producer
Une caméra vidéo, un Mac et Leopard Server, c’est tout ce dont vous avez besoin pour
produire des podcasts de cours, de formation ou d’autres projets audio et vidéo. Podcast
Producer automatise la capture, l’encodage et la distribution vidéo et audio. 22 Chapitre 1 Présentation de Mac OS X Server
L’application Transfert de Podcast installée sur tous les ordinateurs Mac équipés de Leopard permet aux utilisateurs d’enregistrer des fichiers audio et vidéo de haute qualité à
partir d’une caméra FireWire, d’un micro USB, d’iSight ou de tout autre périphérique
compatible connecté à un Mac local ou distant. Transfert de Podcast envoie automatiquement l’enregistrement terminé à Podcast Producer sur Leopard Server ; ce dernier
l’encode et le publie en se basant sur votre sélection de processus dans Transfert de
Podcast. Podcast Producer peut ajouter des effets tels que des filigranes, des titres et
des vidéos de présentation avant de publier le podcast sur une page web, un blog, iTunes, iTunes U, QuickTime Streaming Server, un iPod, Apple TV, iPhone ou un autre type
de téléphone portable. Le service de messagerie de Leopard Server peut même vous
prévenir lorsque le travail est terminé.
Outre l’enregistrement audio et vidéo, Transfert de Podcast peut enregistrer ce qui est
affiché à l’écran (une présentation Keynote par exemple) ainsi que le son provenant d’une
source locale ou distante. Vous pouvez de même utiliser Transfert de Podcast pour partager des séquences QuickTime avec d’autres personnes.
Toute personne disposant d’une connexion à Internet et d’une autorisation d’utilisation
de Transfert de Podcast peut lancer le processus. Il suffit pour cela d’ouvrir une session
Transfert de Podcast, de sélectionner quelques options et de cliquer sur un bouton pour
commencer à enregistrer. Pour terminer, cliquez sur un autre bouton pour arrêter l’enregistrement, saisissez un titre et une description, puis cliquez sur un dernier bouton pour
lancer le processus de publication de podcast. Podcast Producer s’occupe du reste.Chapitre 1 Présentation de Mac OS X Server 23
Podcast Producer utilise automatiquement le service Xgrid 2 de votre serveur pour optimiser les performances d’encodage de podcast. Xgrid répartit via le réseau les tâches
d’encodage aux ordinateurs Mac dont le système Leopard est configuré pour partager
leur capacité de traitement inutilisée. Vous pouvez produire des podcasts supplémentaires en ajoutant des ordinateurs Mac ; Xgrid s’adapte automatiquement.
Serveur Spotlight
Spotlight simplifie la recherche de contenu sur un Mac et, désormais, sur le réseau grâce
à Leopard Server. Le serveur Spotlight permet aux utilisateurs Mac de trouver rapidement
et facilement des documents, des fichiers et d’autres contenus stockés sur leur serveur.
Sa méthode de recherche est plus intelligente, car il ne se limite pas à rechercher les noms
de fichier, il peut également explorer le contenu des volumes réseau montés. Vous
n’avez pas besoin de vous rappeler du nom donné à un document, à un projet ou à un
fichier partagé particulier. Utilisez Coup d’œil pour visualiser, lire et regarder les fichiers
trouvés sans les ouvrir.
L’indexation des contenus est effectuée de manière automatique et transparente sur
le serveur. Il n’est pas nécessaire de configurer le serveur ou les ordinateurs Mac des
utilisateurs.
Pour plus de sécurité, le serveur Spotlight utilise le système Mac OS X Server d’autorisation
et de contrôle de l’accès aux fichiers. La recherche effectuée par un utilisateur se limite
aux éléments auxquels il a accès, ce qui permet de protéger de manière sûre la confidentialité de certaines informations. Ainsi, tous les membres d’un groupe peuvent stocker
des fichiers sur le serveur. Ils peuvent facilement retrouver des fichiers partagés, mais
les personnes qui ne font pas partie du groupe n’y ont pas accès. 24 Chapitre 1 Présentation de Mac OS X Server
Compatibilité avec UNIX
Leopard Server est un produit Open Brand UNIX 03, certifié conforme aux spécifications
SUSv3 et POSIX 1003.1 pour les utilitaires Shell, les fils d’exécution et l’API C. Leopard Server
peut compiler et exécuter tout votre code compatible UNIX 03, ce qui permet de le
déployer dans des environnements exigeant une compatibilité totale. Mac OS X Server
est également entièrement compatible avec votre logiciel de serveur et vos applications.
Calcul 64 bits
Pour la première fois sur Leopard Server, des composants clés de logiciel serveur peuvent
exploiter le calcul 64 bits pour optimiser les performances et la puissance de traitement
et pour manipuler des ensembles de données plus volumineux. Leopard Server exécute
les applications 64 bits parallèlement aux applications 32 bits en assurant leur optimisation.Chapitre 1 Présentation de Mac OS X Server 25
Configurations de serveur
Leopard Server dispose de plusieurs options pour configurer votre serveur en fonction
de vos besoins particuliers. Le tableau de la page suivante répertorie quelques-unes
des raisons pour choisir chacune des configurations suivantes :
 Standard : configuration simplifiée idéale pour le premier serveur ou l’unique serveur
d’une petite organisation.
 Groupe de travail : configuration facile à utiliser idéale pour un groupe de travail dans
une organisation avec un serveur de répertoire existant.
 Avancée : configuration flexible idéale pour les déploiements hautement personnalisés
et avancés.
Vous pouvez transformer une configuration standard en configuration de groupe de travail en connectant le serveur à un serveur de répertoire de votre organisation. De la même
manière, vous pouvez passer d’une configuration de groupe de travail à une configuration
standard en déconnectant le serveur du serveur de répertoire. Il est également possible
de convertir en configuration avancée une configuration standard ou une configuration
de groupe de travail (le contraire étant impossible, sauf si vous réinstallez Leopard Server).
Pour en savoir plus sur le changement de configuration, consultez les rubriques
« Connexion à un serveur de répertoire » à la page 162 et Administration du serveur
(description dans « Guides d’administration de Mac OS X Server » à la page 173).26 Chapitre 1 Présentation de Mac OS X Server
Raison du choix Standard
Groupe
de travail Avancée
Configurer le premier serveur ou l’unique serveur
d’une petite organisation.
%
Configurer automatiquement tous les services. %
Configurer uniquement certains services
automatiquement.
%
Utiliser des comptes utilisateur existants présents
dans le serveur de répertoire de votre organisation.
%
Utiliser une seule application simple (Préférences
du serveur) pour gérer les réglages fondamentaux
des comptes utilisateur, des groupes et des services.
% %
Configurer automatiquement les ordinateurs Mac
équipés de Leopard pour qu’ils utilisent le serveur.
% %
Aucune expérience d’administration de serveur
n’est requise.
% %
Contrôle total de centaines de réglages de configuration
de service pour plusieurs serveurs.
%
Gérer des comptes utilisateur, des dossiers de départ
et des préférences pour des centaines ou même des
milliers d’utilisateurs, de groupes et d’ordinateurs.
%
Configurer des dossiers de départ réseau et des
comptes utilisateur mobiles.
%Chapitre 1 Présentation de Mac OS X Server 27
Fonctionnement de Leopard Server
L’illustration suivante présente une configuration standard de Mac OS X Server dans
une petite organisation. Le serveur est connecté à un réseau local et à quelques ordinateurs d’utilisateurs. Les autres ordinateurs d’utilisateurs se connectent sans fil au réseau
local via une borne d’accès AirPort Extreme. AirPort Extreme se connecte à Internet via
un modem DSL ou un modem câble et partage sa connexion Internet avec le serveur
et les ordinateurs des utilisateurs. Le serveur et les ordinateurs des utilisateurs obtiennent leur adresse réseau via le serveur DHCP d’AirPort Extreme. Ils bénéficient du service de noms DNS offert le fournisseur d’accès à Internet.
Le serveur fournit des comptes utilisateur et des comptes de groupe, des dossiers partagés, des calendriers partagés, une messagerie instantanée et un site web wiki contenant des blogs. Comme le fournisseur d’accès à Internet ne fournit pas un nombre
suffisant d’adresses électroniques pour chaque personne de l’organisation, c’est le serveur qui fournit les adresses électroniques et le service de messagerie.
Utiliser de puissantes applications, telles qu’Admin
Serveur et Gestionnaire de groupe de travail, ou
des outils à ligne de commande pour configurer
des services et gérer des clients.
%
Enregistrer des données de configuration en vue de
la configuration automatique de plusieurs serveurs.
%
Mettre à niveau des serveurs existants. %
Raison du choix Standard
Groupe
de travail Avancée28 Chapitre 1 Présentation de Mac OS X Server
Certains utilisateurs peuvent consulter leur courrier électronique à distance, mais ne
disposent pas d’un ordinateur portable à emporter chez eux ou lors de leurs déplacements. Ils peuvent se connecter au service WebMail du serveur depuis leur ordinateur
fixe personnel ou tout ordinateur équipé d’un navigateur web.
D’autres utilisateurs disposent d’un ordinateur portable et d’un ordinateur fixe personnel configurés pour se connecter au VPN du serveur via Internet. Cela leur permet
d’accéder à distance et de manière sécurisée à tous les services fournis par le serveur
sur le réseau local lorsqu’ils travaillent chez eux ou lorsqu’ils sont en déplacement.Chapitre 1 Présentation de Mac OS X Server 29
Mac OS X
Server
DSL ou
modem câble
Internet
Ordinateur
Mac OS X
VPN
Serveur
DNS ISP
Ordinateurs Mac OS X
AirPort
Extreme30 Chapitre 1 Présentation de Mac OS X Server
Leopard Server au sein d’un groupe de travail
L’illustration ci-dessous décrit une configuration de groupe de travail de Mac OS X Server
utilisée par tout un service d’une grande organisation. Cette organisation dispose d’un
service informatique qui fournit le service DHCP d’affectation d’adresses de réseau, un
service de noms DNS, un service de messagerie, un accès à Internet et un VPN.
Comme toutes les personnes du service disposent déjà d’un compte utilisateur fourni par
le serveur Open Directory de l’organisation, leurs comptes utilisateur ont été importés
dans le serveur du groupe de travail. Il leur suffit alors d’utiliser leur nom d’utilisateur
et leur mot de passe habituels pour s’identifier auprès des services proposés par le serveur du groupe de travail. Ces services sont automatiquement configurés pour utiliser
l’authentification Kerberos du serveur Open Directory, ce qui permet aux utilisateurs de
se connecter une seule fois par session pour l’ensemble des services de groupe de travail.
Le serveur de groupe de travail fournit des services de calendrier et de messagerie instantanée compatibles avec les applications iCal et iChat de Mac OS X. Il fournit également des dossiers partagés et de sites web wiki aux groupes du service. Certains de ces
groupes incluent des personnes externes au service. Les membres externes du groupe
utilisent leur compte utilisateur pour accéder au dossier partagé, au calendrier, au wiki
et au blog du groupe.
Le service compte quelques utilisateurs Windows qui utilisent Internet Explorer et Safari
pour accéder au wiki, au calendrier et au blog de leur groupe. Les dossiers partagés se
présentent sous forme d’unités mappées dans les emplacements réseau correspondants.
Les PC de ces utilisateurs Windows sont configurés pour utiliser le service de messagerie
instantanée Jabber du serveur de groupe de travail.Chapitre 1 Présentation de Mac OS X Server 31
Serveurs de toute l’organisation
Organisation Groupe de travail
Mac OS X
Server
AirPort
Extreme
Ordinateur Mac OS X
de l’administrateur
Ordinateurs Windows Ordinateurs Mac OS X
Internet
Intranet32 Chapitre 1 Présentation de Mac OS X Server
Services
Leopard Server fournit les services et les fonctionnalités de système figurant dans le
tableau ci-dessous. Les services et les informations système sont automatiquement
configurés pour une configuration standard ou de groupe de travail à l’aide des informations que vous avez fournies lors de la configuration initiale du serveur.
Après avoir effectué une configuration standard ou de groupe de travail, vous pouvez
modifier les réglages de service et de système. Vous pouvez désactiver les services inutiles (ceux dont vous disposez déjà par exemple). Vous n’avez, par exemple, pas besoin
du service de messagerie d’une configuration standard si vous souhaitez utiliser le service de messagerie d’un fournisseur d’accès à Internet. De même, si personne ne doit
accéder à votre serveur à partir de son domicile ou dans le cadre d’un déplacement,
désactivez le service VPN.
Une configuration de groupe de travail ne doit pas nécessairement fournir le service
de messagerie ou le service VPN si ces services sont déjà fournis par votre organisation.
Pour en savoir plus sur les réglages de service et de système, consultez le chapitre 4,
« Gestion de votre serveur », le chapitre 8, « Personnalisation des services », et le
chapitre 9, « Gestion des informations du serveur ».
Si vous sélectionnez une configuration avancée lors de la configuration initiale, les services ne sont pas configurés de façon automatique. Vous devez utiliser des applications
d’administration avancées, telles qu’Admin Serveur et Gestionnaire de groupe de travail
ou des outils de ligne de commande, pour configurer des réglages avancés pour les services devant être fournis par le serveur. Pour en savoir plus sur la configuration avancée,
consultez Administration du serveur ainsi que les autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server » à la page 173.Chapitre 1 Présentation de Mac OS X Server 33
Service Standard
Groupe
de travail Avancée
Partage de fichiers (protocoles AFP et SMB) Inclus Facultatif Facultatif
Partage de fichiers (protocoles FTP et NFS) Inutilisé Inutilisé Facultatif
Partage d’imprimantes (imprimante USB ou FireWire
directement connectée)
Automatique Automatique Inutilisé
Impression Inutilisé Inutilisé Facultatif
iCal (partage de calendriers, planification d’événements) Inclus Facultatif Facultatif
iChat (messagerie instantanée) Inclus Facultatif Facultatif
Courrier électronique avec filtrage spam et antivirus Inclus Facultatif Facultatif
Web (wikis, blogs, WebMail) Inclus Facultatif Facultatif
VPN (accès à distance sécurisé) Facultatif Facultatif Facultatif
Passerelle Internet (NAT, DNS) Facultatif Facultatif Facultatif
Sauvegarde du serveur via Time Machine Facultatif Facultatif Inutilisé
Open Directory (comptes utilisateur et autres données) Automatique Automatique Facultatif
Coupe-feu d’application Facultatif Facultatif Inutilisé
Coupe-feu IP avec coupe-feu adaptatif en option Inutilisé Inutilisé Facultatif
Podcast Producer Inutilisé Inutilisé Facultatif
Gestion totale des utilisateurs et des groupes de travail Inutilisé Inutilisé Facultatif
Xgrid (constitution de grappes de calcul) Inutilisé Inutilisé Facultatif
DHCP, DNS, NAT Automatique Automatique Facultatif
RADIUS Inutilisé Inutilisé Facultatif34 Chapitre 1 Présentation de Mac OS X Server
NetBoot et NetInstall (création d’image système) Inutilisé Inutilisé Facultatif
Spotlight (recherche) Automatique Automatique Automatique
QuickTime Streaming Inutilisé Inutilisé Facultatif
Mise à jour de logiciels Inutilisé Inutilisé Facultatif
Gestion à distance Inclus Inclus Inclus
Ouverture de session à distance (ssh) Inclus Inclus Inclus
Service Standard
Groupe
de travail AvancéeChapitre 1 Présentation de Mac OS X Server 35
Applications et utilitaires
Une fois Leopard Server configuré, vous pouvez modifier les réglages des services et
exécuter d’autres tâches d’administration de serveur au moyen des applications décrites ci-après. Vous pouvez également utiliser l’application Répertoire, destinée aux utilisateurs non administrateurs, pour gérer les informations partagées dans le répertoire
du serveur. Répertoire est installé sur tous les ordinateurs Mac équipés de Leopard,
ainsi que sur votre serveur. Pour plus d’informations concernant l’utilisation de l’application Répertoire ou de l’Utilitaire d’annuaire, puis utilisez le menu Aide. Pour en savoir
plus sur l’utilisation des autres applications, consultez les autres chapitres.
Applications réservées aux administrateurs de serveurs standard et de groupe de travail
Répertoire
(sous /Applications/Utilitaires/)
Permet aux utilisateurs d’accéder aux informations partagées concernant les personnes, les groupes, les emplacements et les ressources. Les utilisateurs peuvent
partager des contacts, ajouter des groupes, configurer
des services de groupe et gérer les coordonnées de
leurs contacts.
Utilitaire d’annuaire
(sous /Applications/Utilitaires/)
Connecte votre serveur à un serveur de répertoire
de votre organisation.
Assistant du serveur
(sous /Applications/Server/)
Installe ou configure Mac OS X Server sur un ordinateur
distant.
Préférences serveur
(sous /Applications/Server/)
Permet de gérer les utilisateurs et les groupes, de personnaliser les services et les informations système et,
enfin, de surveiller l’activité du serveur.
Widget d’état du serveur pour
Dashboard
Permet de surveiller l’activité du serveur depuis
n’importe quel Mac équipé de Leopard.36 Chapitre 1 Présentation de Mac OS X Server
Outils et applications avancés
Si vous effectuez une configuration avancée de Leopard Server, l’administration se fait
via les applications et les outils ci-dessous. Pour en savoir plus, consultez Administration
du serveur ainsi que les autres guides d’administration avancés décrits dans « Guides
d’administration de Mac OS X Server » à la page 173.
Important : si vous disposez d’applications et d’outils d’administration provenant de
Mac OS X Server 10.4 Tiger ou antérieur, ne les utilisez pas avec Leopard Server.
Applications et outils réservés aux administrateurs de serveur avancés
Utilitaire d’annuaire
(sous /Applications/Utilitaires/)
Connecte le serveur à un serveur de répertoire de
votre organisation.
Transfert de Podcast
(sous /Applications/Utilitaires/)
Permet aux utilisateurs d’enregistrer des fichiers audio
et vidéo de haute qualité à partir d’une caméra locale
ou distante, de capturer ce qui s’affiche à l’écran ou de
télécharger des fichiers QuickTime dans Podcast Producer afin de les encoder et de les distribuer.
QuickTime Broadcaster
(sous /Applications/)
Capture des fichiers audio et vidéo en temps réel et
fonctionne de manière transparente avec QuickTime
Streaming Server pour obtenir une diffusion en réseau
de haute qualité.
RAID Admin
(sous /Applications/Server/)
Configure et surveille le matériel Xserve RAID.
Admin Serveur
(sous /Applications/Server/)
Configure des services, gère des points de partage de
fichiers, modifie la configuration des services et personnalise les réglages du serveur. Surveille l’activité du
serveur et affiche les historiques de maintenance
détaillés.Chapitre 1 Présentation de Mac OS X Server 37
Assistant du serveur
(sous /Applications/Server/)
Installe ou configure Mac OS X Server sur un ordinateur
distant.
Contrôle de serveur
(sous /Applications/Server/)
Surveille et gère à distance un ou plusieurs systèmes
Xserve.
Utilitaire d’images de système
(sous /Applications/Server/)
Crée et personnalise des images NetBoot et NetInstall
pour les ordinateurs Mac OS X et Mac OS X Server.
Gestionnaire de groupe de travail
(sous /Applications/Server/)
Gère les utilisateurs, les groupes, les ordinateurs et les
groupes d’ordinateurs dans le cadre de déploiements
de serveur avancés. Gère les préférences des utilisateurs de Mac OS X.
Xgrid Admin
(sous /Applications/Server/)
Gère les grappes de serveurs à distance et surveille
l’activité des contrôleurs, des agents, ainsi que l’état
des tâches sur la grille de calcul.
Utilitaires de ligne de commande Utilise des outils UNIX pour installer et configurer les
logiciels de serveur, administrer les services, gérer les
utilisateurs, etc.
Applications et outils réservés aux administrateurs de serveur avancés2
39
2 Installation de Mac OS X Server
Utilisez le programme d’installation pour installer Leopard Server
localement ou Assistant du serveur pour l’installer à distance.
Avant de commencer, vous devez :
 Vous assurer que le serveur cible est conforme à la configuration requise.
 Connecter le serveur cible à votre réseau Ethernet.
 Utiliser Feuille d’opération d’installation et de configuration pour rassembler les informations nécessaires (ce document se trouve dans le dossier Documentation du
disque d’installation de Mac OS X Server).
 Installez Mac OS X Server 10.5 Leopard via l’une des méthodes suivantes :
 Procédez à une installation locale si le serveur cible dispose d’un moniteur.
 Procédez à une installation à distance si le serveur cible n’est pas facilement accessible ou s’il n’a pas de moniteur.
Pour en savoir plus sur l’installation de Leopard Server sur plusieurs serveurs, les installations automatisées et les autres méthodes d’installation avancées, consultez Administration
du serveur. Pour en savoir plus sur la mise à niveau ou la migration vers Leopard Server
depuis une version antérieure de Mac OS X Server, consultez Mise à niveau et migration.
Ces guides avancés sont décrits dans « Guides d’administration de Mac OS X Server » à la
page 173.40 Chapitre 2 Installation de Mac OS X Server
Éléments requis pour l’installation de Leopard Server
Pour installer Leopard Server, vous avez besoin d’un ordinateur de bureau Macintosh
ou d’un serveur disposant des éléments suivants :
 Un processeur Intel ou un processeur PowerPC G5 ou G4 (867 MHz ou plus rapide).
 Au moins 1 Go de mémoire vive (RAM).
 20 Go minimum d’espace disque disponible.
 Une connexion active à un réseau Ethernet sécurisé.
Un serveur de groupe de travail ou standard requiert beaucoup plus d’espace disque,
une grande capacité de disque dur externe, par exemple, si vous voulez effectuer des
sauvegardes du serveur à l’aide de Time Machine. (La sauvegarde des données d’un
serveur via Time Machine n’est pas prise en charge pour les serveurs avancés.)
Un lecteur DVD intégré est pratique, mais vous pouvez le remplacer par un lecteur DVD
FireWire externe ou utiliser un Mac équipé d’un lecteur DVD et fonctionnant en mode
disque cible.
Le moniteur est optionnel. Vous pouvez installer et administrer Mac OS X Server sur un
ordinateur dépourvu de moniteur à partir d’un ordinateur administrateur. Pour en savoir
plus, consultez la rubrique « Préparation d’un ordinateur administrateur » à la page 44.
Certaines opérations d’encodage nécessitent une carte graphique compatible.
Il n’est pas nécessaire de placer votre serveur dans un endroit où il sera constamment
accessible. Vous pouvez utiliser n’importe quel Mac configuré en tant qu’ordinateur administrateur pour effectuer des tâches administratives.Chapitre 2 Installation de Mac OS X Server 41
À moins que vous ne disposiez d’une licence de site, il vous faut un numéro de série
unique pour chaque serveur. Vous devez utiliser un numéro de série Mac OS X Server
10.5 Leopard (qui commence par XSVR-105).
Installation sécurisée de Mac OS X Server
Lorsque vous démarrez un ordinateur à partir du disque d’installation de Mac OS X Server,
le service d’ouverture de session à distance ssh et le service de partage d’écran VNC
démarrent automatiquement pour vous permettre d’exécuter l’installation à distance.
Important : assurez-vous que le réseau est sécurisé avant d’installer ou de réinstaller
Mac OS X Server. En effet, SSH et VNC donnent à d’autres personnes l’accès à l’ordinateur par le réseau.
Par exemple, configurez votre réseau local de façon à ce que seuls des utilisateurs dignes
de confiance y aient accès. Évitez d’utiliser les prises Ethernet dans les lieux publics. Si
vous possédez une borne d’accès AirPort ou tout autre point d’accès sans fil, configurez-le de façon à ce qu’il utilise l’authentification WEP-2 ainsi qu’un mot de passe difficile à deviner. Il est recommandé d’attribuer un nom que vous seul connaissez au réseau
sans fil. De la même manière, efforcez-vous de ne pas révéler le numéro de série maté-
riel car celui-ci est utilisé comme mot de passe dans le cadre de l’installation et de la
configuration à distance.42 Chapitre 2 Installation de Mac OS X Server
Installation Locale
Vous pouvez installer Mac OS X Server directement sur le serveur cible en démarrant le
serveur à partir du disque d’installation de Mac OS X Server. Le programme d’installation
vous guide tout au long du processus d’installation interactif. Le serveur cible doit disposer d’un moniteur afin que vous puissiez communiquer avec le programme d’installation.
Vous pouvez effectuer :
 Une nouvelle installation de Mac OS X Server sur un disque sur lequel Mac OS X Server
ou Mac OS X n’est pas installé.
 Une installation spéciale, qui consiste à installer Mac OS X Server après avoir effacé
et formaté un disque cible.
Pour procéder à une installation locale de Mac OS X Server :
1 Si vous envisagez d’effacer ou de partitionner le disque cible, assurez-vous que vous
possédez une copie de sauvegarde du disque.
2 Vérifiez que l’ordinateur dispose d’une connexion active à un réseau Ethernet sécurisé.
Cette connexion au réseau est nécessaire pour configurer le domaine Open Directory
du serveur.
Programme d’installation
Serveur cibleChapitre 2 Installation de Mac OS X Server 43
3 Démarrez l’ordinateur, ouvrez une session si nécessaire et insérez le disque d’installation de Mac OS X Server dans le lecteur DVD.
4 Ouvrez l’application d’installation de Mac OS X Server et cliquez sur le bouton Redémarrer.
L’application se trouve dans la fenêtre Disque d’installation de Mac OS X Server.
Si, dans l’angle inférieur droit de la fenêtre de l’application, un bouton Installer apparaît
au lieu d’un bouton Redémarrer, cliquez sur Installer et suivez les étapes du programme
d’installation (ignorez les étapes 5 à 8 ci-dessous). Lorsque l’installation est terminée, redé-
marrez le serveur. Assistant du serveur s’ouvre afin que vous puissiez configurer le serveur. Pour en savoir plus, consultez le chapitre 3, « Configuration de Mac OS X Server ».
5 Après le redémarrage de l’ordinateur, choisissez la langue que vous souhaitez utiliser
sur le serveur, puis cliquez sur le bouton représentant une flèche.
6 Effectuez les étapes du programme d’installation en suivant les instructions à l’écran.
7 Lorsque la sous-fenêtre Sélectionner une destination apparaît, choisissez un disque ou
un volume (partition) cible en vous assurant que celui-ci se trouve à l’état adéquat.
Si vous souhaitez effacer le disque cible, cliquez sur Options, sélectionnez Effacer et Installer, choisissez un format, puis cliquez sur OK.
Vous pouvez également choisir Utilitaires > Utilitaire de disque pour effacer le disque
cible en utilisant un format moins courant, partitionner le disque dur du serveur ou
créer un ensemble RAID.
Pour plus d’informations, consultez l’annexe A, « Préparation des disques pour
l’installation de Mac OS X Server ».
8 Une fois l’installation terminée, l’ordinateur redémarre et Assistant du serveur s’ouvre
pour vous permettre de configurer le serveur.
Pour en savoir plus, consultez le chapitre 3, « Configuration de Mac OS X Server ».44 Chapitre 2 Installation de Mac OS X Server
Préparation d’un ordinateur administrateur
Vous pouvez utiliser un ordinateur administrateur pour installer Mac OS X Server sur un
autre ordinateur via le réseau. Comme illustré ci-dessous, démarrez le serveur à l’aide
du disque d’installation de Mac OS X Server, puis utilisez l’application Assistant du serveur pour exécuter l’installation à distance. Il n’est pas nécessaire que le serveur cible
soit équipé d’un moniteur.
Il est également possible d’utiliser un ordinateur administrateur pour configurer et
gérer Mac OS X Server à distance. Pour en savoir plus, consultez « Configuration à distance d’un serveur » à la page 53 et « Connexion de Préférences du serveur à un serveur distant » à la page 61.
Pour transformer un ordinateur Mac OS X en ordinateur administrateur, vous devez installer un logiciel d’administration de serveur dessus. Si vous disposez d’un autre serveur
sur lequel Leopard Server est déjà configuré, vous pouvez également l’utiliser en tant
qu’ordinateur administrateur.
Ordinateur de
l’administrateur
Serveur cible
avec lecteur DVD
Assistant serveurChapitre 2 Installation de Mac OS X Server 45
Pour configurer un ordinateur administrateur :
1 Assurez-vous que la version 10.5 Leopard de Mac OS X est installée sur l’ordinateur
Mac OS X.
2 Insérez le disque Outils d’administration.
3 Ouvrez le dossier du programme d’installation.
4 Double-cliquez sur ServerAdministrationSoftware.mpkg pour ouvrir le programme
d’installation et suivez les instructions à l’écran.
Installation à distance
Si vous utilisez Assistant du serveur sur un ordinateur administrateur, il est possible
d’installer Mac OS X Server sur un autre ordinateur via le réseau. S’il n’est pas nécessaire que l’ordinateur sur lequel vous procédez à l’installation dispose d’un moniteur, il
doit néanmoins être équipé d’un lecteur DVD pour le disque d’installation de Mac OS X
Server. Si l’ordinateur ne dispose pas d’un lecteur DVD intégré, vous pouvez le remplacer par un lecteur DVD FireWire externe ou utiliser un ordinateur Mac équipé d’un lecteur DVD et fonctionnant en mode disque cible.
Vous pouvez effectuer :
 Une nouvelle installation de Mac OS X Server sur un disque sur lequel Mac OS X Server
ou Mac OS X n’est pas installé.
 Une installation spéciale qui consiste à installer Mac OS X Server après avoir effacé
et formaté un disque cible.46 Chapitre 2 Installation de Mac OS X Server
Pour procéder à une installation à distance de Mac OS X Server :
1 Si vous envisagez d’effacer le disque ou la partition cible , assurez-vous que vous possédez une copie de sauvegarde et utilisez éventuellement Utilitaire de disque pour pré-
parer le disque cible.
Si vous ne devez effacer le disque cible qu’en utilisant le format le plus courant, Mac OS
Étendu (journalisé), il n’est pas nécessaire d’utiliser Utilitaire de disque. Utilitaire de disque permet d’effacer le disque cible en utilisant d’autres formats, de partitionner le disque dur du serveur ou de créer un ensemble RAID. Pour en savoir plus sur l’utilisation
d’Utilitaire de disque pour ces tâches, consultez l’annexe A, « Préparation des disques
pour l’installation de Mac OS X Server ».
2 Démarrez le serveur cible à partir du disque d’installation de Mac OS X Server.
Si le serveur cible est équipé d’un lecteur DVD intégré, insérez le disque, puis redémarrez l’ordinateur tout en maintenant enfoncée la touche C. Relâchez la touche lorsque
le logo Apple s’affiche.
Si le serveur cible est équipé d’un lecteur DVD FireWire externe, redémarrez l’ordinateur
tout en maintenant la touche Option enfoncée, sélectionnez l’icône du disque d’installation de Mac OS X Server, puis cliquez sur le bouton représentant une flèche.
3 Sur un ordinateur administrateur, ouvrez Assistant du serveur, sélectionnez « Installer
Mac OS X Server sur un ordinateur distant » et cliquez sur Continuer.
Assistant du serveur est situé dans /Applications/Server/. Vous pouvez utiliser Assistant
du serveur sans compte administrateur.
4 Dans la sous-fenêtre Destination, identifiez le serveur cible et sélectionnez-le dans la liste.
Vous pouvez reconnaître un serveur par son adresse iP, son nom DNS ou son adresse
MAC (également appelée adresse Ethernet ou adresse matérielle).Chapitre 2 Installation de Mac OS X Server 47
Pour les serveurs trouvés par Assistant du serveur sur le réseau local (sous-réseau IP),
l’adresse IP peut être automatiquement attribuée par un serveur DHCP sur le réseau.
S’il n’existe aucun serveur DHCP, le serveur cible utilise une adresse de type 169.254.xxx.xxx
unique parmi les serveurs du réseau local. Vous pouvez modifier l’adresse IP ultérieurement, lors de la configuration du serveur.
Si le serveur qui vous intéresse n’est pas dans la liste, vous pouvez cliquer sur Actualiser,
afin qu’Assistant du serveur recherche à nouveau les serveurs prêts à être installés sur
votre réseau local. Si le serveur qui vous intéresse se trouve sur un autre réseau local,
choisissez « Serveur à l’adresse IP » dans le menu local Installer sur, puis saisissez une
adresse IP au format IPv4 (par exemple, 192.0.2.200). Il est également possible de choisir
« Serveur du nom DNS » et de saisir le nom DNS du serveur.
5 Lorsque vous êtes invité à fournir un mot de passe, saisissez les huit premiers caractères
du numéro de série matériel intégré au serveur.
Pour obtenir ce numéro de série, cherchez une étiquette sur le serveur. Respectez les
majuscules lorsque vous saisissez le numéro de série.
Pour les ordinateurs sans numéro de série matériel intégré, utilisez 12345678 comme
mot de passe.
6 Ouvrez les sous-fenêtres Langue d’installation, Informations importantes et Licence
du logiciel et suivez les instructions à l’écran.
Pour en savoir plus sur les réglages d’une sous-fenêtre d’Assistant du serveur, cliquez
sur le bouton Aide de la sous-fenêtre.
7 Dans la sous-fenêtre Volumes, sélectionnez un disque ou une partition cible, assurezvous qu’il se trouve dans un état adéquat et cliquez sur Continuer.48 Chapitre 2 Installation de Mac OS X Server
Pour en savoir plus sur les icônes d’état du disque, cliquez sur le bouton Aide de la
sous-fenêtre Volumes.
8 Si Mac OS X Server ou Mac OS X est installé sur le volume sélectionné, sélectionnez
une option disponible et cliquez sur OK.
Ces options peuvent être les suivantes :
 « Effacer en utilisant le formatage Mac OS X étendu (journalisé) puis installer » : efface la totalité du volume de destination avant d’installer une nouvelle copie de Mac OS X Server.
 « Mise à niveau de Mac OS X Server » : cette option est uniquement disponible si le
volume cible dispose de la dernière mise à niveau de Mac OS X Server 10.4 Tiger ou
de Mac OS X Server 10.3.9 Panther. Vous pouvez mettre ce volume à niveau avec une
configuration avancée de Leopard Server sans effacer le volume de destination. Pour
plus d’informations, reportez-vous à la section Mise à niveau et migration (décrite
dans « Guides d’administration de Mac OS X Server » à la page 173).
9 Une fois l’installation terminée, le serveur cible redémarre et vous pouvez continuer
à utiliser Assistant du serveur pour configurer le serveur à distance.
Pour en savoir plus, consultez le chapitre 3, « Configuration de Mac OS X Server ».
Au lieu d’utiliser Assistant du serveur sur un ordinateur administrateur, vous pouvez contrô-
ler l’installation à distance en utilisant le partage d’écran sur un Mac équipé de Mac OS X
10.5 Leopard ou un autre Mac équipé d’Apple Remote Desktop (que vous pouvez acheter
séparément). Pour plus d’informations, reportez-vous à la section Administration du
serveur (décrite dans « Guides d’administration de Mac OS X Server » à la page 173).3
49
3 Configuration de Mac OS X Server
L’Assistant du serveur vous guide tout au long de la première
configuration de votre serveur.
L’Assistant du serveur s’ouvre automatiquement lorsque :
 Vous avez terminé l’installation de Mac OS X Server 10.5 Leopard.
 Vous démarrez un nouveau serveur sur lequel Leopard Server est préinstallé.
Vous pouvez utiliser l’Assistant du serveur :
 Localement sur le serveur.
 À distance sur un ordinateur administrateur afin de configurer le serveur via le réseau.
Pour en savoir plus sur la configuration interactive de plusieurs serveurs ou la configuration automatique d’une configuration avancée, consultez Administration du serveur
(décrit dans « Guides d’administration de Mac OS X Server » à la page 173).50 Chapitre 3 Configuration de Mac OS X Server
Configuration locale d’un serveur
Vous pouvez configurer un nouveau serveur ou un nouvel ordinateur sur lequel Mac OS X
Server vient d’être installé en utilisant le clavier, la souris et le moniteur du serveur.
Pour configurer un serveur localement :
1 Préparez la configuration en remplissant une copie imprimée de la Feuille d’opération
d’installation et de configuration.
La Feuille d’opération d’installation et de configuration se trouve sur le disque d’installation de Mac OS X Server, dans le dossier Documentation.
2 Si vous disposez d’un service DHCP ou DNS fourni par votre fournisseur d’accès à Internet, d’un routeur Internet ou d’autres serveurs sur votre réseau, assurez-vous qu’ils sont
configurés pour votre nouveau serveur et qu’ils sont en cours de fonctionnement.
3 Si vous souhaitez configurer votre serveur en tant que passerelle Internet pour qu’il
partage une connexion Internet avec d’autres ordinateurs de votre réseau, vérifiez les
éléments suivants :
 Un port ou une interface Ethernet est connecté à votre modem DSL, votre modem
câble ou toute autre source Internet. L’interface Internet doit disposer d’une adresse
IP publique (il ne doit pas s’agir d’une adresse IP privée telle que 10.0.1.1 ou 192.168.1.1).
 Un autre port Ethernet est connecté à votre réseau local.
Lors de la configuration, vous devez indiquer le port connecté à Internet. Par exemple,
si le port Ethernet intégré au serveur est connecté à Internet, vous devez le définir
comme étant le port Internet. Si votre serveur compte plus de deux ports Ethernet,
vous devez sélectionner l’un d’entre eux comme port réseau local.
4 Si le serveur est éteint, allumez-le.
Lorsque le serveur démarre, l’Assistant du serveur s’ouvre automatiquement.Chapitre 3 Configuration de Mac OS X Server 51
5 Suivez les instructions à l’écran présentées dans les sous-fenêtres successives de l’Assistant du serveur en saisissant les informations que vous avez notées dans la Feuille
d’opération d’installation et de configuration.
Pour en savoir plus sur les réglages figurant dans les sous-fenêtres de l’Assistant du serveur, cliquez sur le bouton Aide de la sous-fenêtre.
Au terme de la configuration du serveur, vous pouvez :
 Effectuer quelques opérations supplémentaires pour sécuriser votre serveur. Pour en
savoir plus, consultez les rubriques « Sécurité de votre serveur » et « Protection du
compte administrateur système (root) ».
 Utiliser Mise à jour de logiciels pour installer les mises à jour disponibles de Mac OS X
Server. Pour en savoir plus, consultez la rubrique « Mise à jour de Leopard Server »
à la page 64.
 Configurer une borne d’accès AirPort ou un routeur Internet de façon à ce que les
utilisateurs puissent accéder à votre serveur via Internet. Pour en savoir plus, consultez l’annexe B, « Configuration d’un routeur Internet »
 Utiliser Préférences du serveur pour configurer des utilisateurs et des groupes, personnaliser des services et des informations système et surveiller l’activité du serveur.
Vous pouvez également utiliser le widget d’état du serveur avec Dashboard pour surveiller votre serveur. Pour en savoir plus sur ces tâches, lisez les chapitres 4 à 9 ou
ouvrez Préférences du serveur et consultez le menu Aide.52 Chapitre 3 Configuration de Mac OS X Server
Sécurité de votre serveur
Pour garantir la sécurité de votre serveur, vous devez créer un compte utilisateur standard
après avoir configuré votre serveur. Lorsque vous ouvrez une session sur le serveur,
utilisez toujours ce compte standard plutôt qu’un compte administrateur. Votre compte
administrateur est réservé aux applications exigeant des autorisations d’administrateur.
Utilisez par exemple votre nom et votre mot de passe d’administrateur avec Préférences
du serveur pour gérer des utilisateurs, des groupes ou des services.
Pour créer un compte utilisateur standard, utilisez la sous-fenêtre Comptes des Préférences
Système du serveur. Pour obtenir des informations, ouvrez Préférences Système et consultez le menu Aide.
Protection du compte administrateur système (root)
Le mot de passe d’administrateur que vous saisissez lors de la configuration est également utilisé pour le compte administrateur système du serveur (ou root). Le compte
administrateur système (root) peut déplacer ou supprimer n’importe quel fichier du
système, y compris les fichiers système non accessibles par un compte administrateur
de serveur ou un compte utilisateur quelconque. Vous n’avez pas besoin des privilèges
d’utilisateur root pour administrer votre serveur.
Important : il est très important de protéger le mot de passe d’utilisateur root en veillant
à ce qu’il ne soit pas identique au mot de passe d’un autre compte.
Une fois le serveur configuré, vous devez modifier le mot de passe du compte utilisateur
root. Pour en savoir plus sur la modification du mot de passe root, ouvrez Utilitaire
d’annuaire (sous /Applications/Utilitaires/) et consultez le menu Aide.Chapitre 3 Configuration de Mac OS X Server 53
Configuration à distance d’un serveur
Si vous venez d’installer Mac OS X Server sur un nouveau serveur ou un autre ordinateur,
vous pouvez le configurer via le réseau à l’aide de l’Assistant du serveur à partir d’un ordinateur administrateur. Le serveur que vous configurez ne doit pas nécessairement disposer d’un clavier ou d’un moniteur. Pour en savoir plus sur les ordinateurs administrateur,
consultez la rubrique « Préparation d’un ordinateur administrateur » à la page 44.
Pour configurer un serveur distant :
1 Préparez la configuration en remplissant une copie imprimée de la Feuille d’opération
d’installation et de configuration.
La Feuille d’opération d’installation et de configuration se trouve sur le disque d’installation de Mac OS X Server, dans le dossier Documentation.
2 Si vous disposez d’un service DHCP ou DNS fourni par votre fournisseur d’accès à Internet, d’un routeur Internet ou d’autres serveurs sur votre réseau, assurez-vous qu’ils sont
configurés pour votre nouveau serveur et qu’ils sont en cours de fonctionnement.
3 Si vous souhaitez configurer votre serveur en tant que passerelle Internet, afin qu’il
partage une connexion Internet avec d’autres ordinateurs de votre réseau, vérifiez les
éléments suivants :
 Un port ou une interface Ethernet est connecté à votre modem DSL, votre modem
câble ou toute autre source Internet. L’interface Internet doit disposer d’une adresse
IP publique (il ne doit pas s’agir d’une adresse IP telle que 10.0.1.1 or 192.168.1.1).
 Un autre port Ethernet est connecté à votre réseau local.54 Chapitre 3 Configuration de Mac OS X Server
Lors de la configuration, vous devez indiquer le port connecté à Internet. Par exemple,
si le port Ethernet intégré au serveur est connecté à Internet, vous devez le définir
comme étant le port Internet. Si votre serveur compte plus de deux ports Ethernet,
vous devez sélectionner l’un d’entre eux comme port réseau local.
4 Si le serveur est éteint, allumez-le.
Lorsque le serveur démarre, l’Assistant du serveur s’ouvre automatiquement et attend
que la configuration à distance commence.
5 Sur un ordinateur administrateur, ouvrez l’Assistant du serveur, sélectionnez
« Configurer un serveur distant », puis cliquez sur Continuer.
L’Assistant du serveur se trouve dans /Applications/Server/. Il est possible d’utiliser
l’Assistant du serveur sans compte administrateur sur l’ordinateur local.
6 Dans la sous-fenêtre Destination, saisissez dans la colonne Mot de passe le mot de passe
prédéfini pour le serveur que vous souhaitez configurer, puis cochez la case Appliquer.
Si le serveur n’est pas dans la liste, cliquez sur Actualiser, afin que l’Assistant du serveur
recherche à nouveau les serveurs prêts à être installés sur votre réseau local (sous-réseau IP).
Si le serveur qui vous intéresse se trouve sur un autre réseau local, cliquez sur le bouton
Ajouter (+) et saisissez son adresse IP ou son nom DNS.
Le mot de passe prédéfini est composé des 8 premiers caractères du numéro de série
matériel intégré à l’ordinateur. Vous trouverez ce numéro sur une étiquette collée sur
l’ordinateur. Respectez les majuscules lorsque vous saisissez le numéro de série. Pour les
ordinateurs sans numéro de série matériel intégré, utilisez 12345678 comme mot de passe.
7 Cliquez sur Continuer et suivez les instructions présentées dans les sous-fenêtres successives de l’Assistant du serveur en saisissant les informations que vous avez notées
dans la Feuille d’opération d’installation et de configuration.Chapitre 3 Configuration de Mac OS X Server 55
Pour en savoir plus sur les réglages présents dans l’Assistant du serveur, cliquez sur
le bouton Aide de n’importe quelle sous-fenêtre.
Au terme de la configuration du serveur, vous pouvez :
 Effectuer quelques opérations permettant de sécuriser votre serveur. Pour en savoir
plus, consultez les rubriques « Sécurité de votre serveur » à la page 52 et « Protection
du compte administrateur système (root) » à la page 52.
 Utiliser Mise à jour de logiciels pour installer les mises à jour disponibles de Mac OS X
Server. Pour en savoir plus, consultez la rubrique « Mise à jour de Leopard Server » à
la page 64.
 Configurer une borne d’accès AirPort ou un routeur Internet de façon à ce que les
utilisateurs puissent accéder à votre serveur via Internet. Pour en savoir plus, consultez l’annexe B, « Configuration d’un routeur Internet ».
 Utiliser Préférences du serveur pour configurer des utilisateurs et des groupes, personnaliser des services et des informations système et surveiller l’activité du serveur.
Vous pouvez également utiliser le widget d’état du serveur avec Dashboard pour surveiller votre serveur. Pour en savoir plus sur ces tâches, lisez les chapitres 4 à 9 ou
ouvrez Préférences du serveur et consultez le menu Aide.4
57
4 Gestion de votre serveur
Utilisez le widget d’état du serveur, Préférences du serveur,
Time Machine et Mise à jour de logiciels pour vérifier l’état,
modifier les réglages, sauvegarder, restaurer et mettre à jour
le logiciel du serveur.
Vérifiez l’état à l’aide de Préférences du serveur ou du widget d’état du serveur. Rechercher et modifier les réglages du serveur à l’aide de Préférences du serveur. Utilisez Pré-
férences du serveur et le widget d’état du serveur soit sur le serveur lui-même, soit via
le réseau à partir de n’importe quel Mac équipé de Leopard. Réglez les préférences de
Time Machine de façon à effectuer une copie de sauvegarde du serveur. La restauration
s’effectue à l’aide de l’application Time Machine ou du programme d’installation. Maintenez le logiciel du serveur à jour via Mise à jour de logiciels.
Utilisation de Préférences du serveur
Préférences du serveur permet de vérifier l’état des services et de modifier leurs réglages.
Vous devez utiliser Préférences du serveur pour gérer divers aspects d’une configuration
standard ou d’une configuration de groupe de travail de Leopard Server, notamment
les personnes autorisées à utiliser les services, le type de configuration de ces services
ou leur état.58 Chapitre 4 Gestion de votre serveur
Lorsque vous ouvrez Préférences du serveur, les préférences individuelles sont regroupées dans les catégories décrites ci-dessous.
 Comptes : gère les utilisateurs et les groupes.
 Services : personnalise les réglages du partage de fichiers, le service de calendrier iCal,
le service de messagerie instantané iChat, le service de messagerie, les services web
et le service d’accès à distance VPN.
 Système : vérifiez les informations du serveur, les journaux de fonctionnement,
les graphes d’activité du serveur et les réglages du pare-feu.
Pour gérer un serveur standard ou de groupe de travail :
1 Ouvrez Préférences du serveur.
Préférences du serveur est disponible dans /Applications/Server/.
2 Si Préférences du serveur vous invite à saisir le nom de votre serveur, votre nom d’utilisateur et votre mot de passe, saisissez le nom DNS ou l’adresse IP du serveur, le nom d’un
compte administrateur du serveur et le mot de passe de ce compte administrateur.
Le compte que vous avez créé lorsque vous avez configuré le serveur est un compte
administrateur.Chapitre 4 Gestion de votre serveur 59
Utilisation du widget d’état du serveur
Vous pouvez utiliser le widget d’état du serveur pour surveiller l’état de Mac OS X Server
soit sur le serveur lui-même, soit depuis un autre ordinateur équipé de Mac OS X Server
ou de Mac OS X.
Pour utiliser le widget d’état du serveur :
1 Ouvrez Dashboard, cliquez sur le bouton Ouvrir (+), puis sur le widget d’état du serveur,
ou faites glisser ce dernier hors de la barre des widgets.
Vous pouvez ouvrir Dashboard en cliquant sur son icône dans le Dock ou en utilisant
son raccourci clavier (touche F12).
2 Saisissez le nom DNS ou l’adresse IP du serveur, un nom et un mot de passe d’administrateur, puis cliquez sur Terminé.
3 Une fois le widget d’état du serveur connecté à un serveur, il affiche le nom DNS du
serveur ainsi que des informations concernant l’état du serveur et de ses services.
Contrôlez l’utilisation du processeur, la charge du réseau ou l’utilisation des disques en
cliquant sur l’une des icônes situées sous le graphique.60 Chapitre 4 Gestion de votre serveur
Cliquez sur le graphique pour modifier l’échelle de temps du graphique du processeur
ou du réseau (une heure, un jour ou une semaine).
Si votre serveur dispose de plusieurs disques, vous pouvez consulter l’état de chacun
d’eux tour à tour en cliquant sur le graphe d’utilisation de disque.
Vérifiez l’indicateur d’état et le nombre actuel de connexions pour les services répertoriés.
Un voyant vert signifie que le service fonctionne normalement.
Ouvrez la sous-fenêtre Préférences du serveur correspondant à l’un des services de
la liste en cliquant sur ce service dans le widget.
Connectez-vous à un autre serveur en déplaçant la souris vers l’angle supérieur gauche
du widget et en cliquant sur le petit bouton Informations (i).
Vous pouvez ouvrir un autre widget d’état du serveur pour visualiser en même temps
plusieurs aspects de l’état d’un serveur ou pour surveiller un autre serveur du réseau.
Le widget d’état du serveur nécessite Mac OS X Server 10.5 Leopard ou Mac OS X 10.5
Leopard.
Pour en savoir plus sur les widgets et sur Dashboard, basculez sur le Finder et consultez
le menu Aide.
Il est également possible de visualiser les graphiques d’activité du serveur à l’aide de
Préférences du serveur.Pour en savoir plus, consultez la rubrique « Contrôle des courbes
du serveur » à la page 168.Chapitre 4 Gestion de votre serveur 61
Recherche de réglages dans Préférences du serveur
Préférences du serveur contient des dizaines de réglages que vous pouvez modifier pour
personnaliser votre ordinateur. Vous pouvez rapidement rechercher le réglage qui vous
intéresse dans Préférences du serveur.
Pour rechercher des réglages dans Préférences du serveur :
1 Ouvrez Préférences du serveur.
2 Dans le champ de recherche, saisissez un mot ou une phrase décrivant l’élément à
modifier. Par exemple, si vous souhaitez ajouter des membres à un groupe, saisissez
« membres de groupe».
À mesure que vous saisissez des mots, des propositions vous sont faites sous le champ
de recherche.
3 Arrêtez la saisie lorsque l’élément que vous recherchez figure dans la liste des résultats
de recherche. Une ou plusieurs préférences sont mises en surbrillance dans la fenêtre
Préférences du serveur.
4 Cliquez sur l’élément correspondant à ce que vous souhaitez modifier. Dans la sous-fenêtre
qui s’ouvre, changez les réglages de cet élément.
Connexion de Préférences du serveur à un serveur distant
Vous pouvez connecter Préférences du serveur à un serveur via le réseau et gérer
des utilisateurs, des groupes, des services et des informations système à distance.
Pour gérer un serveur à distance :
1 Ouvrez Préférences du serveur sur un ordinateur administrateur et choisissez
Connexion > Nouvelle connexion.62 Chapitre 4 Gestion de votre serveur
Pour en savoir plus sur les ordinateurs administrateur, consultez la rubrique
« Préparation d’un ordinateur administrateur » à la page 44.
2 Saisissez le nom DNS ou l’adresse IP du serveur distant, ainsi que le nom et le mot
de passe d’un compte administrateur sur le serveur distant.
Une fois Préférences du serveur connecté à un serveur distant, le nom ou l’adresse IP
du serveur est affiché dans la barre de titre de la fenêtre Préférences du serveur.
Pour vous reconnecter à un serveur auquel vous vous êtes connecté récemment, choisissez
Connexion > Ouvrir connexion récente, puis choisissez le serveur qui vous intéresse.
Vous pouvez connecter Préférences du serveur aux configurations standard et de groupe
de travail de Leopard Server, mais pas à une configuration avancée de Leopard Server
ou à une version antérieure de Mac OS X Server.
Fermeture d’une connexion de Préférences du serveur
Par sécurité, fermez la fenêtre Préférences du serveur lorsque vous ne l’utilisez pas pour
gérer les utilisateurs, les groupes, les services ou les informations système du serveur. Le
fait de laisser ouverte une connexion à un serveur sur un serveur non utilisé peut permettre à une personne non autorisée de modifier les utilisateurs, les groupes ou les services.
Voici plusieurs méthodes permettant de fermer une connexion Préférences du serveur :
m Fermez la fenêtre Préférences du serveur.
m Choisissez Connexion > Fermer.
m Quittez Préférences du serveur.Chapitre 4 Gestion de votre serveur 63
Si vous fermez la seule fenêtre ouverte de Préférences du serveur, l’application se ferme
automatiquement.
Sauvegarde et restauration du serveur
Il est possible de sauvegarder automatiquement les fichiers du serveur à l’aide de Time
Machine. Il s’agit d’une solution de sauvegarde complète du système. Elle permet de
sauvegarder automatiquement l’intégralité des fichiers du système sur un disque dur
externe local ou à distance sur un système de fichiers en réseau. Ce système permet
également d’assurer un suivi des fichiers que vous avez créés, mis à jour ou supprimés.
Time Machine sauvegarde les changements et crée un historique du système de fichiers
que vous pouvez parcourir en fonction de la date. Vous pouvez utiliser son navigateur
visuel intuitif et chronologique pour rechercher des fichiers sauvegardés à une date
ultérieure et les restaurer.
Vous pouvez dresser la liste des dossiers et des disques à ne pas sauvegarder. Time
Machine exclut automatiquement les fichiers temporaires et en cache situés sous
/tmp/, /Bibliothèque/Logs/, /Bibliothèque/Caches/ et /Utilisateurs/nomutilisateur/
Bibliothèque/Caches/.
Les options de sauvegarde se règlent dans la sous-fenêtre Time Machine des Préférences
Système. Utilisez l’application Time Machine pour restaurer des fichiers. Vous pouvez de
même restaurer une version antérieure du système à l’aide du programme d’installation.
Pour en savoir plus sur la sauvegarde et la restauration à l’aide de Time Machine ou du
programme d’installation, ouvrez Préférences Système et consultez le menu Aide.64 Chapitre 4 Gestion de votre serveur
Remarque : s’il est possible de restaurer une configuration standard ou une configuration
de groupe de travail à partir d’une sauvegarde Time Machine, il n’est pas toujours possible
de restaurer complètement des réglages avancés modifiés à l’aide d’Admin Serveur.
Mise à jour de Leopard Server
Si votre serveur est connecté à Internet, Mise à jour de logiciels peut récupérer automatiquement la dernière version gratuite de Leopard Server, des mises à jour de sécurité
et d’autres améliorations conçues par Apple. Votre serveur est réglé pour rechercher
automatiquement des mises à jour une fois par semaine, mais vous pouvez le régler
pour qu’il effectue cette recherche une fois par jour ou une fois par mois. Vous pouvez
également rechercher immédiatement des mises à jour.
Pour rechercher des mises à jour ou régler la mise à jour automatique :
1 Ouvrez Préférences Système.
2 Cliquez sur l’icône Mise à jour de logiciels et suivez les instructions à l’écran.Chapitre 4 Gestion de votre serveur 65
Si votre organisation dispose d’un autre serveur équipé de Mac OS X Server, votre serveur
peut passer par celui-ci plutôt que par le site d’Apple pour récupérer des mises à jour
de logiciels. Un administrateur qualifié peut configurer Mac OS X Server de façon à ce
qu’il propose un service de mise à jour de logiciels à l’aide d’Admin Serveur.
Vous pouvez également télécharger des mises à jour de logiciels directement sur le site
web de téléchargements d’Apple :
www.apple.com/fr/support/downloads5
67
5 Gestion des utilisateurs
Créez ou importez des comptes utilisateur, modifiez leurs
réglages ou supprimez-les dans la sous-fenêtre Utilisateurs
de Préférences du serveur.
La sous-fenêtre Utilisateurs vous permet de configurer des comptes pour les personnes
qui utilisent les services fournis par ce serveur et de contrôler les services auxquels elles
ont accès. Vous pouvez mettre à jour leurs informations de contact et changer leur
appartenance à des groupes. Il est également possible de modifier les messages électroniques à envoyer aux nouveaux utilisateurs. Pour en savoir plus sur les réglages et
les commandes figurant dans cette sous-fenêtre, cliquez sur le bouton Aide situé dans
l’angle inférieur droit de la fenêtre de Préférences du serveur.68 Chapitre 5 Gestion des utilisateurs
À propos des comptes utilisateur
Les comptes utilisateurs sur votre serveur permettent aux utilisateurs d’avoir accès aux
services fournis par le serveur. Un compte utilisateur renferme les informations permettant de prouver l’identité de l’utilisateur pour l’ensemble des services exigeant une
authentification. Un compte utilisateur constitue également une zone de stockage des
informations de contact et d’autres données de l’utilisateur.
Chaque compte utilisateur peut fournir une adresse e-mail, une adresse de messagerie
instantanée iChat, un calendrier individuel et un accès distant VPN à votre serveur. Les
utilisateurs peuvent également être membres de groupes, en les autorisant à accéder
à des ressources de groupes telles qu’un dossier de groupe partagé, un site Web de groupe
et un calendrier de groupe. Les utilisateurs n’ont évidemment plus accès à ces services
lorsque ces derniers sont désactivés.Chapitre 5 Gestion des utilisateurs 69
Vous pouvez ajouter de nouveaux comptes utilisateur via la sous-fenêtre Utilisateurs de
Préférences du serveur en :
 créant des comptes,
 important des comptes existants, si votre organisation dispose d’un serveur de répertoire et que votre serveur est connecté à celui-ci.
Il est possible d’importer individuellement des comptes utilisateur. Vous pouvez également
importer automatiquement l’ensemble des comptes utilisateur membres d’un groupe.
Les comptes utilisateur que vous créez sont stockés dans le répertoire de votre serveur. Les
comptes utilisateur importés demeurent sur le serveur de répertoire de votre organisation.
Vous pouvez ajouter aux comptes importés des informations de contact, des informations
sur l’appartenance aux groupes, etc. Ces informations sont stockées dans le répertoire de
votre serveur. Lorsqu’une personne utilise un compte utilisateur importé, votre serveur
combine automatiquement les informations stockées sur le serveur de répertoire avec les
informations supplémentaires stockées sur le répertoire de votre serveur.
Vous pouvez utiliser Préférences du serveur pour modifier les comptes utilisateur crées
sur votre serveur. L’application Répertoire permet également aux utilisateurs de modifier
leurs comptes.
Si votre serveur a importé des comptes utilisateur, vous pouvez utiliser Préférences du
serveur pour modifier les informations supplémentaires ajoutées aux comptes importés
dans le répertoire de votre serveur, mais pas les informations de compte figurant dans
le répertoire de votre organisation. Tout administrateur de ce répertoire peut modifier
ses informations de compte à l’aide d’outils du serveur de répertoire.70 Chapitre 5 Gestion des utilisateurs
Les utilisateurs bénéficiant d’autorisations d’administrateur sur leur ordinateur peuvent
créer des comptes utilisateur locaux via la sous-fenêtre Comptes des Préférences Système.
Ces comptes utilisateur locaux sont stockés sur l’ordinateur de l’utilisateur. Les comptes
utilisateur locaux disposent chacun d’un dossier de départ sur l’ordinateur et peuvent
être utilisés pour ouvrir une session sur l’ordinateur. Les comptes utilisateur locaux ne
peuvent être utilisés pour accéder au serveur via le réseau.
Votre serveur étant également un ordinateur Mac OS X, il dispose, outre ses comptes
de serveur, de comptes locaux ainsi que d’éventuels comptes importés. Les comptes
locaux de votre serveur peuvent servir à ouvrir une session sur le serveur ; un compte
local disposant d’autorisations d’administrateur peut être utilisé pour administrer le
serveur. Pour en savoir plus sur les autorisations d’administrateur, consultez la rubrique
suivante, « À propos des comptes d’administrateur ».Chapitre 5 Gestion des utilisateurs 71
Le tableau ci-dessous résume les différences principales entre les comptes de serveur,
les comptes importés et les comptes locaux.
Type de compte Stocké dans Créé par Utilisé pour
Comptes de serveur Le répertoire
de votre serveur
Vous (un administrateur de serveur) via
Préférences du serveur
L’appartenance aux
groupes, les informations de contact,
l’authentification
auprès des services
Comptes importés Le serveur de répertoire de votre organisation, avec ajout
d’informations supplé-
mentaires au répertoire de votre serveur
L’administrateur du
serveur de répertoire
L’appartenance aux
groupes, les informations de contact,
l’authentification
auprès des services
Comptes locaux Tous les ordinateurs
équipés de Mac OS X
Un utilisateur disposant d’un compte
d’administrateur sur
l’ordinateur, à l’aide
des préférences
Comptes
Les dossiers de départ,
l’ouverture de session
sur l’ordinateur72 Chapitre 5 Gestion des utilisateurs
À propos des comptes d’administrateur
Vous devez disposer d’un compte d’administrateur sur votre serveur pour pouvoir créer
d’autres comptes utilisateur ou des groupes, pour modifier les réglages du serveur et
pour exécuter d’autres tâches à l’aide de Préférences du serveur. Le compte administrateur vous permet également de modifier les préférences verrouillées dans les Préférences Système, d’installer des logiciels sur le serveur et d’exécuter des tâches que les
utilisateurs standard ne sont pas autorisés à exécuter.
Votre serveur dispose de deux comptes administrateur une fois terminé le processus de
configuration initial décrit au chapitre 3. Le compte administrateur principal est celui dont
vous avez saisi le nom et le mot de passe au moment de la configuration du serveur.
L’autre compte administrateur dispose également du mot de passe que vous avez saisi,
mais le nom correspondant est Administrateur local et le nom abrégé est localadmin.
Le tableau ci-dessous résume les similarités et les différences entre ces deux comptes.
Le compte administrateur principal se trouve dans le répertoire de votre serveur, ainsi
que les comptes utilisateur que vous créez dans la sous-fenêtre Utilisateurs de Préférences
du serveur. Vous pouvez utiliser ce compte administrateur sur le serveur ; il peut également vous permettre de gérer votre serveur via le réseau depuis un autre Mac.Chapitre 5 Gestion des utilisateurs 73
Le compte administrateur local est stocké sur le serveur, pas dans son répertoire, avec
les comptes utilisateur créés via la sous-fenêtre Comptes des Préférences Système. Utilisez le compte administrateur local pour ouvrir une session sur le serveur et utilisez Pré-
férences du serveur du serveur si vous constatez un dysfonctionnement rendant l’autre
compte administrateur inutilisable.
Lorsque vous créez un compte utilisateur, vous devez spécifier s’il s’agit d’un utilisateur
administrateur ou standard. Vous pouvez également transformer un compte utilisateur
importé en administrateur de serveur. Si vous ne souhaitez pas qu’un utilisateur soit
autorisé à utiliser Préférences du serveur ou à installer des logiciels sur le serveur, ne lui
donnez pas d’autorisation administrateur.
Administrateur principal Administrateur local
Nom et nom abrégé Spécifié au moment
de la configuration
Administrateur local
et localadmin
Mot de passe Spécifié au moment
de la configuration
Spécifié au moment
de la configuration
Stocké sur le répertoire
du serveur
Oui Non
Utilisable depuis un
ordinateur administrateur
Oui Non74 Chapitre 5 Gestion des utilisateurs
Afin de sécuriser votre ordinateur , ne partagez jamais un nom et un mot de passe
d’administrateur avec quelqu’un d’autre. Veillez à fermer la session lorsque vous quittez
votre ordinateur ou à mettre en place un économiseur d’écran verrouillé à l’aide de la
sous-fenêtre Économiseur d’écran et de la sous-fenêtre Sécurité des Préférences Système.
Si vous vous absentez alors que votre session est ouverte et que l’écran est déverrouillé,
n’importe qui peut utiliser votre ordinateur et modifier des éléments à l’aide de vos
autorisations d’administrateur.
Pour renforcer la sécurité, ouvrez régulièrement une session sur le serveur via un compte
utilisateur standard. Utilisez vos nom et mot de passe administrateur pour ouvrir les Pré-
férences du serveur ou toute autre application exigeant des autorisations administrateur.
Ne configurez jamais le serveur pour qu’il démarre automatiquement une session administrateur. Si vous le faites, toute personne qui redémarre le serveur peut ouvrir une
session en tant qu’administrateur.
Ajout d’un compte utilisateur
Vous pouvez ajouter des comptes utilisateur pour toute personne utilisant les services
fournis par votre serveur. Votre serveur attribue une adresse électronique personnelle,
une adresse iChat et un calendrier à chaque compte utilisateur. Les comptes utilisateur
ont également accès aux fichiers partagés et aux sites web partagés du serveur et ils
peuvent utiliser VPN pour accéder à distance au serveur. Pour être disponibles, les services doivent être activés ; il est possible de contrôler individuellement l’accès de chaque compte utilisateur aux différents services.Chapitre 5 Gestion des utilisateurs 75
Pour ajouter un nouveau compte utilisateur :
1 Cliquez sur le bouton Ajouter (+) de la sous-fenêtre Utilisateurs de Préférences du serveur.
2 Si un menu local s’affiche, choisissez l’une des commandes suivantes :
« Importer l’utilisateur du répertoire » : vous pouvez importer des comptes utilisateur
existants depuis le répertoire de votre organisation. Pour en savoir plus sur cette opération, consultez la rubrique « Importation d’utilisateurs » à la page 76.
Créer un utilisateur : lorsque cela est possible, vous pouvez ajouter de nouveaux utilisateurs à partir du serveur de répertoire de votre entreprise. Il est toutefois possible de
créer des comptes utilisateur dans le répertoire de votre serveur. Pour réaliser cette
opération, passez à l’étape 3.
Si aucun menu local n’apparaît lorsque vous cliquez sur le bouton Ajouter (+), votre
serveur n’est pas connecté à un serveur de répertoire. Passez à l’étape 3 pour créer un
compte utilisateur dans le répertoire de votre serveur.
3 Saisissez le nom de l’utilisateur.
Le nom peut contenir jusqu’à 255 caractères (255 caractères romains ou 85 caractères
japonais). Ce nom peut comporter des espaces.
4 Si vous ne souhaitez pas utiliser le nom abrégé généré automatiquement, saisissez un
nouveau nom abrégé (une fois le compte créé, il est impossible de modifier ce nom).
Le nom abrégé contient généralement huit caractères ou moins, mais il peut comprendre
jusqu’à 255 caractères latins. Ce nom peut uniquement être composé des caractères a
à z, A à Z, 0 à 9, _ (soulignement) ou - (trait d’union).
Remarque : si l’utilisateur dont vous êtes en train de créer le compte possède déjà un
Mac configuré, utilisez le même nom abrégé pour le compte utilisateur sur le serveur.
Cela facilite l’accès aux services.76 Chapitre 5 Gestion des utilisateurs
5 Saisissez le mot de passe utilisateur dans les champs Mot de passe et Confirmer.
Vous pouvez utiliser l’Assistant mot de passe pour vous aider à choisir un nouveau mot
de passe. Cliquez sur le bouton de clé à droite du champ Mot de passe pour vérifier la
qualité du nouveau mot de passe.
6 Sélectionnez « Autoriser l’utilisateur à administrer l’ordinateur » si ce compte utilisateur
a besoin de créer d’autres comptes utilisateur ou des groupes, d’installer des logiciels
sur le serveur ou de modifier des réglages du serveur.
Importation d’utilisateurs
Si votre serveur est connecté au serveur de répertoire de votre organisation, vous pouvez importer des comptes utilisateur existants. Votre serveur attribue une adresse électronique personnelle, une adresse iChat et un calendrier à chaque compte utilisateur
importé. Les comptes utilisateur importés ont également accès aux fichiers partagés et
aux sites web partagés du serveur. Si le service de messagerie et le service VPN de
votre serveur sont activés, les comptes utilisateur importés reçoivent une adresse électronique et peuvent utiliser le service VPN pour accéder à distance au serveur. Les services doivent être activés pour être accessibles ; il est possible de contrôler
individuellement l’accès de chaque compte utilisateur importé aux différents services.
Pour importer un compte utilisateur :
1 Avant d’importer un compte utilisateur, assurez-vous que le contenu du message électronique d’invitation est adapté à vos besoins.
Pour en savoir plus, consultez la rubrique « Personnalisation du message électronique
d’invitation du serveur » à la page 91.Chapitre 5 Gestion des utilisateurs 77
2 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, cliquez sur le bouton Ajouter (+) et choisissez « Importer l’utilisateur du répertoire » dans le menu local.
Si aucun menu local n’apparaît lorsque vous cliquez sur le bouton Ajouter (+), votre
serveur n’est pas connecté à un serveur de répertoire de votre organisation. Consultez
la rubrique « Connexion à un serveur de répertoire » à la page 162.
Si votre organisation ne dispose pas d’un serveur de répertoire (votre serveur excepté),
vous pouvez créer des comptes utilisateur. Pour en savoir plus sur la création de comptes utilisateur, consultez la rubrique « Ajout d’un compte utilisateur » à la page 74.
3 Sélectionnez un compte utilisateur dans la liste des comptes du serveur de répertoire
de votre organisation, sélectionnez l’option (facultative) « Envoyer une invitation par
courrier électronique aux utilisateurs importés », puis cliquez sur Importer.
4 Une fois l’importation des comptes utilisateur terminée, cliquez sur Terminé.
Les comptes utilisateur importés via cette procédure apparaissent dans la liste Importés
de la sous-fenêtre Utilisateurs.
Vous pouvez importer automatiquement des comptes utilisateur à partir de groupes au
lieu de les importer un par un via cette procédure. Pour en savoir plus sur cette opération, consultez la rubrique suivante.78 Chapitre 5 Gestion des utilisateurs
Importation automatique de groupes d’utilisateurs
Si votre serveur est connecté au serveur de répertoire de votre organisation, il est possible d’importer des groupes de comptes utilisateur existants. Lorsque vous importez
un groupe, votre serveur importe automatiquement les comptes utilisateur de tous les
membres de ce groupe. Votre serveur vérifie régulièrement sur le serveur de répertoire
de votre organisation s’il y a eu des changements dans la composition de chaque
groupe importé et ajoute ou supprime automatiquement des comptes utilisateur
importés en fonction de ces changements.
Votre serveur attribue une adresse électronique personnelle, une adresse iChat et un
calendrier à chaque compte utilisateur importé. Les comptes utilisateur importés ont
également accès aux fichiers partagés et aux sites web partagés du serveur. Si le service de messagerie et le service VPN de votre serveur sont activés, les comptes utilisateur importés reçoivent une adresse électronique et peuvent utiliser le service VPN
pour accéder à distance au serveur. Les services doivent être activés pour être accessibles ;
il est possible de contrôler individuellement l’accès de chaque compte utilisateur
importé aux différents services.
Pour importer automatiquement des comptes utilisateur à partir de groupes :
1 Avant d’importer des comptes utilisateur à partir de groupes, assurez-vous que le contenu du message électronique d’invitation est adapté à vos besoins.
Pour en savoir plus, consultez la rubrique « Personnalisation du message électronique
d’invitation du serveur » à la page 91.
2 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, cliquez sur le bouton
Action (en forme d’engrenage) et choisissez « Importer les utilisateurs des groupes »
dans le menu local.Chapitre 5 Gestion des utilisateurs 79
Si le menu local Action ne comprend pas cette option, votre serveur n’est pas connecté
à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire »
à la page 162.
Si votre organisation ne dispose pas d’un serveur de répertoire (votre serveur excepté),
vous pouvez créer des comptes utilisateur. Pour en savoir plus sur la création de comptes utilisateur, consultez la rubrique « Ajout d’un compte utilisateur » à la page 74.
3 Modifiez la liste de droite de façon à ce qu’elle contienne les groupes dont vous souhaitez importer automatiquement les membres.
Ajoutez un groupe disponible en le sélectionnant dans la liste de gauche, puis en cliquant sur Ajouter.
Supprimez un groupe à importer en le sélectionnant dans la liste de droite, puis en cliquant sur Supprimer.
4 Si vous le souhaitez, sélectionnez « Envoyer une invitation par courrier électronique aux
nouveaux utilisateurs importés ».
5 Si la liste des groupes à importer vous convient, cliquez sur Enregistrer.
Les comptes utilisateur automatiquement importés à partir de groupes figurent sous
la mention « Automatique » dans la sous-fenêtre Utilisateurs.
Vous pouvez également importer individuellement des comptes utilisateur. Pour en
savoir plus sur cette opération, consultez la rubrique « Importation d’utilisateurs » à la
page 76.80 Chapitre 5 Gestion des utilisateurs
Suppression d’un compte utilisateur
Vous pouvez utiliser Préférences du serveur pour supprimer des comptes utilisateur
dont votre serveur n’a plus de besoin. Supprimer un compte utilisateur entraîne l’annulation de son appartenance à un groupe et le retire de la liste des contacts automatiques
d’iChat. Cette suppression entraîne de même la suppression de l’adresse électronique
stockée par l’utilisateur sur le serveur et empêche l’accès de l’utilisateur à son calendrier
personnel.
Pour supprimer un compte utilisateur :
1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte
utilisateur à modifier dans la liste de gauche.
2 Cliquez sur le bouton Supprimer (-).Chapitre 5 Gestion des utilisateurs 81
Modification des réglages d’un compte utilisateur
Changez le nom, le mot de passe, la photo ou les autorisations d’administrateur d’un
utilisateur en cliquant sur Compte dans la sous-fenêtre Utilisateurs de Préférences du
serveur.
Pour changer les réglages d’un compte utilisateur :
1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche.
2 Cliquez sur Compte et modifiez tous les réglages disponibles en vous aidant des informations suivantes :
Nom : saisissez le nom de l’utilisateur. Le nom, associé au mot de passe, peut être utilisé
pour l’authentification en vue d’utiliser des services.82 Chapitre 5 Gestion des utilisateurs
Nom abrégé : il s’agit de l’abréviation du nom de l’utilisateur. Le nom abrégé est utilisé
pour l’adresse électronique de l’utilisateur et les adresses iChat. Il peut également être
utilisé avec le mot de passe pour l’authentification auprès des services. Il ne peut plus
être modifié une fois que le compte a été créé.
« Réinitialiser le mot de passe » : cliquez sur cette option pour réinitialiser le mot de
passe. Il est impossible de modifier le mot de passe d’un compte utilisateur importé
depuis un serveur de répertoire.
Image : cliquez ici pour éditer la photo de l’utilisateur en choisissant une photo, en prenant une photo avec un appareil photo connecté à votre ordinateur ou en appliquant
un effet visuel.
« Autoriser l’utilisateur à administrer ce serveur » : si vous sélectionnez cette option,
le compte utilisateur peut gérer des utilisateurs, des groupes et des services à l’aide
de Préférences du serveur.
Si les réglages situés en regard du nom abrégé sont estompés dans la sous-fenêtre
Compte, il est impossible de les modifier, car ils sont stockés sur le serveur de répertoire
auquel votre serveur est connecté.
Les utilisateurs équipés de Leopard peuvent modifier leurs propres informations de
compte à l’aide de l’application Répertoire.Chapitre 5 Gestion des utilisateurs 83
Modification des informations de contact d’un utilisateur
Modifiez le nom et le prénom, l’adresse, l’adresse électronique, l’adresse de chat,
l’adresse de site web et l’adresse de blog d’un utilisateur en cliquant sur Informations
de contact dans la sous-fenêtre Utilisateurs de Préférences du serveur.84 Chapitre 5 Gestion des utilisateurs
Pour modifier les informations de contact d’un utilisateur :
1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche.
2 Cliquez sur Informations de contact et modifiez tous les réglages disponibles en vous
aidant des informations suivantes :
Nom : nom et prénom de l’utilisateur.
Adresse : adresse postale de l’utilisateur.
Contact : adresse de messagerie instantanée et adresse électronique de l’utilisateur.
 Pour ajouter une adresse, cliquez sur le bouton Ajouter (+).
 Pour supprimer une adresse, sélectionnez-la et cliquez sur le bouton Supprimer (–).
Site web : adresse du site web personnel de l’utilisateur (commence par http://).
Journal web : adresse du blog personnel de l’utilisateur (commence par http://).
Si les réglages de la sous-fenêtre Informations de contact sont estompés, il est impossible de les modifier, car ils sont stockés sur le serveur de répertoire auquel votre serveur
est connecté.
Les utilisateurs équipés de Leopard peuvent modifier leurs informations de contact à l’aide
de l’application Répertoire. Pour en savoir plus, consultez la rubrique « Utilisation des
informations de répertoire sur les ordinateurs des utilisateurs de Leopard » à la page 110.
Contrôle de l’accès d’un utilisateur aux différents services
Contrôlez l’accès d’un utilisateur à des services particuliers en cliquant sur Services dans
la sous-fenêtre Utilisateurs de Préférences du serveur.Chapitre 5 Gestion des utilisateurs 85
Pour changer les réglages d’accès aux services d’un utilisateur :
1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à contrôler dans la liste de gauche.
2 Cliquez sur Services et cochez les services auxquels l’utilisateur peut accéder. Décochez
les services dont vous ne souhaitez pas accorder l’accès à l’utilisateur.
Modification de l’appartenance d’un utilisateur à des groupes
Intégrez un utilisateur à un groupe ou supprimez un utilisateur d’un groupe en cliquant
sur Groupes dans la sous-fenêtre Utilisateurs.86 Chapitre 5 Gestion des utilisateurs
Pour changer l’appartenance d’un utilisateur à des groupes :
1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche.
2 Cliquez sur Groupes, puis sur Modifier l’adhésion.
3 Cochez la case en regard de chaque groupe auquel vous souhaitez intégrer l’utilisateur.
Décochez la case en regard de chaque groupe auquel vous souhaitez ne pas intégrer
l’utilisateur.
4 Une fois vos changements effectués, cliquez à nouveau sur Modifier l’adhésion pour
afficher une liste statique des groupes auxquels l’utilisateur appartient.
Pour en savoir plus sur l’ajout, la suppression ou la configuration des groupes, consultez
le chapitre 7, « Gestion des groupes ».
Modification du nom ou du mot de passe d’un utilisateur
Vous pouvez utiliser Préférences du serveur pour modifier le nom ou le mot de passe
d’un compte utilisateur standard ou d’un compte administrateur.
Pour changer le nom ou le mot de passe d’un compte utilisateur :
1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur standard ou administrateur à modifier dans la liste de gauche, puis cliquez sur
Compte.
2 Pour changer le nom, modifiez le champ Nom.
Le nom peut contenir jusqu’à 255 caractères (255 caractères romains ou 85 caractères
japonais). Ce nom peut comporter des espacesChapitre 5 Gestion des utilisateurs 87
Il est impossible de changer le nom abrégé d’un compte utilisateur à l’aide de Préfé-
rences du serveur.
3 Pour changer le mot de passe, cliquez sur « Réinitialiser le mot de passe », saisissez le
nouveau mot de passe dans les champs « Nouveau mot de passe » et Confirmer, puis
cliquez sur « Modifier le mot de passe ».
Vous pouvez utiliser l’Assistant mot de passe pour vous aider à choisir un nouveau mot
de passe. Cliquez sur le bouton Clé à droite du champ « Nouveau mot de passe » pour
vérifier la qualité du nouveau mot de passe.
Les utilisateurs équipés de Leopard peuvent modifier leurs nom et mot de passe à l’aide
de l’application Répertoire. Les utilisateurs peuvent modifier leur mot de passe lors de
l’authentification pour le partage de fichiers.
Si votre serveur comporte des comptes utilisateur importés ou des comptes utilisateur
importés automatiquement à partir de groupes, leurs nom et mot de passe peuvent
être modifiés par un administrateur du serveur de répertoire contenant les comptes. Si
ce serveur de répertoire est une configuration standard de Mac OS X Server et que vous
en êtes administrateur, vous pouvez y connecter Préférences du serveur à distance et
effectuer vos changements. Pour en savoir plus sur la connexion à distance, consultez
la rubrique « Connexion de Préférences du serveur à un serveur distant » à la page 61.
Si les comptes utilisateur importés de votre serveur sont stockés sur une configuration
avancée de Mac OS X Server, l’administrateur du répertoire peut utiliser Gestionnaire de
groupe de travail pour modifier les nom et mot de passe du compte. Pour en savoir plus
sur Gestionnaire de groupe de travail, ouvrez cette application et consultez le menu Aide.88 Chapitre 5 Gestion des utilisateurs
Pour changer le mot de passe ou d’autres attributs du compte administrateur local, utilisez la sous-fenêtre Comptes des Préférences Système après avoir configuré le serveur.
Pour en savoir plus sur la modification des comptes locaux, ouvrez Préférences Système
et consultez le menu Aide.
Pour changer le mot de passe du compte administrateur système (root), utilisez l’application Utilitaire d’annuaire après avoir configuré le serveur. Pour en savoir plus sur l’utilisation d’Utilitaire d’annuaire, ouvrez l’application et consultez le menu Aide.
Modification de la photo d’un utilisateur
Vous pouvez utiliser Préférences du serveur pour modifier la photo d’un compte utilisateur standard ou d’un compte administrateur. Si votre serveur contient des comptes
utilisateur importés ou des comptes utilisateur automatiquement importés à partir de
groupes, vous pouvez changer les photos sauf si elles ont été définies sur le serveur de
répertoire de votre organisation.
Pour changer la photo d’un compte utilisateur :
1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche, puis cliquez sur Compte.
2 Pour utiliser une photo de la liste, cliquez sur le champ de photo et choisissez une photo
dans le menu local.
3 Pour modifier la photo ou pour utiliser une photo provenant d’un appareil photo ou
d’un fichier, cliquez sur le champ de photo, choisissez Modifier l’image dans le menu
local, effectuez vos modifications, puis cliquez sur Définir ou Annuler.
Pour choisir une photo que vous avez utilisée récemment, cliquez sur Photos récentes.Chapitre 5 Gestion des utilisateurs 89
Pour déplacer la photo, faites-la glisser vers le haut, vers le bas ou de gauche à droite.
Pour rogner la photo, faites glisser le curseur.
Pour capturer une nouvelle photo à l’aide d’un appareil connecté à l’ordinateur, cliquez
sur le bouton d’appareil photo.
Pour appliquer un effet visuel, cliquez sur le bouton Effets visuels (grille), faites défiler
les effets disponibles et sélectionnez celui qui vous intéresse.
Pour utiliser un fichier d’image, cliquez sur Choisir.
Les utilisateurs équipés de Leopard peuvent modifier leurs photos à l’aide de l’application Répertoire. Pour en savoir plus, consultez la rubrique « Utilisation des informations
de répertoire sur les ordinateurs des utilisateurs de Leopard » à la page 110.
Personnalisation du message électronique d’accueil
Vous pouvez utiliser les Préférences du serveur pour ajouter votre nom, votre adresse,
votre adresse électronique et une introduction personnelle au message électronique
standard que votre serveur envoie aux nouveaux utilisateurs concernant ses services.
Ce message standard précise le nom DNS du serveur, l’adresse électronique du destinataire et explique les services offerts par le serveur. Il comprend également des liens vers
le partage de fichiers disponible et les services web.
Le serveur envoie automatiquement un message chaque fois que vous ajoutez un compte
utilisateur. Il n’envoie toutefois pas de message électronique si le service de messagerie
n’est pas activé au moment où vous ajoutez des comptes utilisateur.90 Chapitre 5 Gestion des utilisateurs
Pour personnaliser le courrier électronique envoyé aux nouveaux comptes utilisateur :
1 Dans la sous-fenêtre Utilisateur des Préférences du serveur, cliquez sur le bouton d’action
et sélectionnez « Réglages des messages électroniques » dans le menu local.
2 Saisissez le nom et l’adresse électronique de l’expéditeur dans les champs « Nom complet de l’Admin » et « Adresse électronique de l’Admin ».
3 Vous pouvez également inscrire un message personnel dans le champ Accueil.
Vous pouvez utiliser ce message pour vous introduire, les destinataires sauront ainsi
qu’il s’agit d’un message authentique. Par exemple : Bonjour, je suis l’administrateur de
notre serveur, monserveur.exemple.com. Si vous avez besoin d’aide pour en obtenir les
services, n’hésitez pas à m’envoyer un courrier électronique ou à m’appeler au 01 23 45
67 89. —Frédéric.
Les utilisateurs reçoivent le message électronique d’accueil lorsqu’ils commencent à
utiliser leur compte de messagerie. Ils peuvent voir votre nom et votre message dans
une section séparée du texte de message standard généré par le serveur.Chapitre 5 Gestion des utilisateurs 91
Personnalisation du message électronique d’invitation du serveur
Vous pouvez utiliser les Préférences du serveur pour ajouter votre nom, votre adresse,
votre adresse électronique et une introduction personnelle au message électronique
standard que votre serveur peut envoyer pour expliquer aux nouveaux utilisateurs
importés comment obtenir ses services. Ce message standard précise le nom DNS du
serveur et explique les services offerts par le serveur. Les destinataires qui dispose de
Mac OS X version 10.5 Leopard peuvent cliquer sur un bouton dans le courrier électronique pour configurer automatiquement leur Mac afin d’obtenir les services de votre
serveur. Il comprend également des liens vers le partage de fichiers disponible et les
services web.
Vous pouvez sélectionner une option permettant d’envoyer ce message électronique
lorsque vous importez des utilisateurs ou un groupe d’utilisateurs. Le serveur envoie
l’invitation aux adresses électroniques figurant dans les comptes utilisateur importés.
Le serveur n’envoie pas d’invitation aux comptes utilisateur importés ne contenant pas
d’adresse électronique.
Pour personnaliser le courrier électronique envoyé aux nouveaux comptes
utilisateur importés :
1 Dans la sous-fenêtre Utilisateur des Préférences du serveur, cliquez sur le bouton d’action
et sélectionnez « Réglages des messages électroniques » dans le menu local.
2 Saisissez le nom et l’adresse électronique de l’expéditeur dans les champs « Nom complet de l’Admin » et « Adresse électronique de l’Admin ».
3 Vous pouvez également inscrire un message personnel dans le champ d’invitation.
Si vous ne voyez pas de champ Invitation, votre serveur n’est pas connecté à un serveur
de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » à la page 162.92 Chapitre 5 Gestion des utilisateurs
Vous pouvez utiliser ce message pour vous introduire, les destinataires sauront ainsi
qu’il s’agit d’un message authentique. Par exemple : Bonjour, je suis l’administrateur de
notre serveur, monserveur.exemple.com. Si vous avez besoin d’aide pour configurer
votre ordinateur afin d’en obtenir les services, n’hésitez pas à m’envoyer un courrier
électronique ou à m’appeler au 01 23 45 67 89. —Frédéric.
Les destinataires peuvent voir votre nom et votre message dans une section séparée
du texte de message standard généré par le serveur.
Personnalisation du message électronique d’invitation du groupe
Vous pouvez utiliser les Préférences du serveur pour ajouter votre nom, votre adresse,
votre adresse électronique et une introduction personnelle au message électronique
standard que votre serveur peut envoyer pour expliquer aux nouveaux utilisateurs
externes d’un groupe comment obtenir les services de ce groupe. Ce message standard
précise le nom du groupe et le nom DNS du serveur et explique les services offerts par
ce serveur. Il comprend également des liens vers le partage de fichiers disponible et
les services de groupes.
Vous pouvez sélectionner une option permettant d’envoyer le message lorsque vous
ajoutez des utilisateurs ou des groupes issus du serveur de répertoire de votre organisation en tant que membres externes d’un groupe sur votre serveur. Le serveur envoie
l’invitation aux adresses électroniques figurant dans chaque compte utilisateur de nouveau membre externe. Le serveur n’envoie pas d’invitation aux nouveaux membres
externes dont le compte utilisateur ne contient pas d’adresse électronique.Chapitre 5 Gestion des utilisateurs 93
Pour personnaliser le message électronique envoyé aux nouveaux membres externes
d’un groupe :
1 Dans la sous-fenêtre Utilisateur des Préférences du serveur, cliquez sur le bouton
d’action et sélectionnez « Réglages des messages électroniques » dans le menu local.
2 Saisissez le nom et l’adresse électronique de l’expéditeur dans les champs « Nom complet de l’Admin » et « Adresse électronique de l’Admin ».
3 Vous pouvez également inscrire un message personnel dans le champ d’invitation au
groupe.
Si vous ne voyez pas le champ Invitation au groupe, votre serveur n’est pas connecté
à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire »
à la page 162.
Vous pouvez utiliser ce message pour vous introduire, les destinataires sauront ainsi
qu’il s’agit d’un message authentique. Par exemple : Bonjour, je suis l’administrateur du
serveur monserveur.exemple.com qui fournit des services qu groupe. Si vous avez besoin
d’aide pour obtenir des services de groupe à partir du serveur, n’hésitez pas à m’envoyer
un courrier électronique ou à m’appeler au 01 23 45 67 89. —Frédéric.
Les destinataires peuvent voir votre nom et votre message dans une section séparée
du texte de message standard généré par le serveur.6
95
6 Gestion des ordinateurs
des utilisateurs
Apprenez à aider les utilisateurs à configurer leur ordinateur de
manière à pouvoir utiliser les services fournis par votre serveur.
Les utilisateurs ont besoin de configurer leur ordinateur pour bénéficier des services de
votre serveur. Les utilisateurs qui disposent de Mac OS X 10.5 Leopard peuvent configurer leur ordinateur automatiquement. Ceux qui disposent de Mac OS X ou de Windows
doivent le configurer manuellement.
Les utilisateurs dont le Mac est doté de Leopard et qui sont connectés à votre serveur
peuvent utiliser l’application Répertoire pour partager des contacts, ajouter des groupes, configurer des services de groupe et gérer leurs propres informations de contact.
Configuration automatique des ordinateurs Mac Leopard
Les utilisateurs qui disposent de Mac OS X v10.5 Leopard peuvent configurer automatiquement leur ordinateur Mac pour bénéficier de services disponibles sur votre serveur.
Comme expliqué dans le tableau suivant, la procédure de configuration varie selon trois
types d’utilisateurs de Leopard.96 Chapitre 6 Gestion des ordinateurs des utilisateurs
Une fois que l’utilisateur a accompli l’une des procédures de configuration automatique,
il est prêt à accéder aux services présentés dans le tableau de la page suivante (il ne peut,
bien évidemment, accéder qu’aux services activés).
Le compte local de l’utilisateur est rattaché à son compte serveur et porte la mention
« Géré » dans la sous-fenêtre Comptes de Préférences Système. Les deux comptes ont
le même mot de passe.
 Si le compte serveur de l’utilisateur est nouveau, son mot de passe est remplacé par
le mot de passe du compte local de l’utilisateur.
 Si le compte serveur de l’utilisateur est importé à partir d’un compte existant sur un
serveur de répertoire, le mot de passe de ce compte remplace le mot de passe du
compte local de l’utilisateur.
Configuration automatique
pour les
Commence dès que
les utilisateurs ont
Pour obtenir des
informations, voir
nouveaux utilisateurs de Leopard (qui ont un nouveau Mac
ou qui ont récemment installé
Leopard) si la configuration de
votre serveur est standard.
effectué l’étape correspondant
à la sous-fenêtre « Se connecter à Mac OS X Server » lors de
la configuration de Leopard.
« Configuration de services
pour les nouveaux utilisateurs
de Leopard » ci-dessous.
utilisateurs actuels de Leopard
dont vous importez les comptes depuis un serveur de
répertoire.
cliqué sur le bouton dans le
courrier électronique d’invitation reçu.
« Configuration d’utilisateurs
Leopard à partir d’un message
d’invitation » à la page 101.
utilisateurs actuels de Leopard
dont vous créez les comptes
sur le serveur.
ouvert l’application Utilitaire
d’annuaire (ou après l’ouverture
automatique de cet utilitaire).
« Configuration d’un Mac à
l’aide de l’Utilitaire
d’annuaire » à la page 103.Chapitre 6 Gestion des ordinateurs des utilisateurs 97
Si l’utilisateur change le mot de passe dans la sous-fenêtre Comptes de Préférences
Système, le mot de passe du compte serveur est modifié en conséquence.
Si les comptes d’un utilisateur ont été créés avec différents noms d’utilisateur, l’utilisateur
peut modifier le nom complet du compte local à l’aide de la sous-fenêtre Comptes de
Préférences Système. Il peut également utiliser l’application Répertoire pour changer le
nom complet du compte serveur.
Pour obtenir des informations sur les comptes utilisateur locaux, les comptes serveur
et les comptes importés, reportez-vous à la rubrique « À propos des comptes utilisateur »
à la page 68.
Application prête à accéder
Carnet d’adresses à d’autres coordonnées d’utilisateur.
Répertoire à des informations sur les utilisateurs, les groupes
et les ressources.
Finder aux dossiers partagés.
iCal au calendrier personnel de l’utilisateur et
au calendrier de groupe.
iChat au compte Jabber de l’utilisateur et à sa liste de contacts.
Mail au compte de messagerie de l’utilisateur et aux
adresses électroniques des contacts de l’utilisateur.98 Chapitre 6 Gestion des ordinateurs des utilisateurs
Safari au site web du serveur : http://monserveur.exemple.com
Wikis de groupe :
http://monserveur.exemple.com/groups
Blogs d’utilisateurs :
http://monserveur.exemple.com/users
Webmail : http://monserveur.exemple.com/webmail
Préférences Réseau à la connexion VPN
Application prête à accéderChapitre 6 Gestion des ordinateurs des utilisateurs 99
Configuration de services pour les nouveaux utilisateurs de Leopard
Pendant la configuration initiale d’un nouveau Mac ou d’un Mac équipé de Mac OS X
10.5 Leopard nouvellement installé, la sous-fenêtre « Se connecter à Mac OS X Server »
permet à l’utilisateur de choisir votre serveur si sa configuration est la configuration
standard de Leopard Server et s’il possède un compte sur le serveur. (La configuration
d’un serveur est standard si celui-ci ne comporte pas de comptes utilisateurs importés
et s’il n’est pas connecté à un serveur de répertoire.)
L’utilisateur choisit votre serveur
L’utilisateur spécifie un compte sur
votre serveur100 Chapitre 6 Gestion des ordinateurs des utilisateurs
Ce sous-volet apparaît uniquement si le Mac détecte une configuration standard de
Leopard Server sur le réseau. Ce sous-volet ne permet pas à un utilisateur de choisir
une configuration de groupe de travail de Leopard Server. (Un serveur possède une
configuration de groupe de travail s’il est connecté à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » page 136.)
Si l’utilisateur accompli l’étape correspondant à cette sous-fenêtre :
 Un compte utilisateur local est créé sur le Mac de l’utilisateur à partir du compte spé-
cifié sur le serveur. Les deux comptes ont les mêmes nom complet, nom abrégé et
mot de passe.
 Un dossier de départ est configuré sur l’ordinateur de l’utilisateur.
 L’ordinateur de l’utilisateur est automatiquement connecté à votre serveur et configuré
pour bénéficier des services de ce dernier. Pour savoir comment l’ordinateur obtient
des services, reportez-vous à la rubrique « Configuration automatique des ordinateurs
Mac Leopard » à la page 95.
Il peut arriver, pour diverses raisons, que l’utilisateur ne parvienne pas à terminer l’étape
correspondant à la sous-fenêtre « Se connecter à Mac OS X Server ». Par exemple :
 Il ne connaît pas le nom de votre serveur ou ne possède pas de compte utilisateur sur
le serveur. Si tel est le cas, il peut ignorer la sous-fenêtre « Se connecter à Mac OS X
Server » en désélectionnant l’option « Utiliser le Mac OS X Server suivant ».
 Son Mac n’est pas connecté au réseau lors de la configuration initiale. Si tel est le cas,
la sous-fenêtre « Créer votre compte » apparaît à la place de la sous-fenêtre « Se connecter à Mac OS X Server ». L’utilisateur crée alors un nouveau compte sans se baser
sur le compte serveur.Chapitre 6 Gestion des ordinateurs des utilisateurs 101
Si l’utilisateur ne termine pas l’étape correspondant à la sous-fenêtre « Se connecter à
Mac OS X Server », quelle qu’en soit la raison, il peut mettre fin à la configuration initiale,
puis configurer le Mac pour bénéficier des services disponibles sur votre serveur. Pour
savoir comment procéder, reportez-vous à la rubrique « Configuration d’un Mac à l’aide
de l’Utilitaire d’annuaire » à la page 103.
Configuration d’utilisateurs Leopard à partir d’un message d’invitation
Si Mac OS X 10.5 Leopard est déjà installé sur les ordinateurs de certains utilisateurs et
si vous importez leurs comptes utilisateur à partir d’un serveur de répertoire, vous pouvez leur envoyer un message électronique les invitant à se joindre au serveur. Les utilisateurs de Leopard peuvent cliquer sur un bouton dans ce message d’invitation pour
lancer un assistant qui connecte leur ordinateur au serveur et configure leurs applications pour obtenir les services de votre serveur. Pour en savoir plus sur l’assistant, consultez la rubrique « Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire ».
Remarque : pour recevoir un message d’invitation, un utilisateur importé doit avoir
une adresse électronique dans le compte utilisateur situé sur le serveur de répertoire.
Seuls les utilisateurs qui ont des comptes utilisateur importés reçoivent ce message
d’invitation. Les utilisateurs dont les comptes sont créés par vous sur votre serveur ne
reçoivent pas de message d’invitation. Les deux rubriques suivantes expliquent comment
leurs ordinateurs peuvent être configurés.102 Chapitre 6 Gestion des ordinateurs des utilisateurs
Lorsqu’un utilisateur de Leopard clique sur le bouton se trouvant dans le message
d’invitation pour utiliser l’assistant, celui-ci recherche sur le serveur un compte utilisateur
dont le nom complet ou abrégé correspond au compte utilisateur local dont la session
est actuellement ouverte sur l’ordinateur de l’utilisateur. Si l’assistant trouve un tel nom,
il demande à l’utilisateur s’il veut rattacher le compte local au compte serveur. Si celui-ci
accepte, le compte local est modifié de manière à utiliser le mot de passe du compte
serveur. Le dossier de départ de l’utilisateur demeure sur son ordinateur.
L’utilisateur choisit ensuite de configurer ou non ses applications pour obtenir les services
disponibles sur le serveur. Pour savoir comment les applications sont configurées, reportezvous à la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95.
Pour obtenir des informations sur l’ajout de votre nom, votre adresse électronique et
une introduction personnelle au message électronique standard que votre serveur élabore comme courrier électronique d’invitation, consultez la rubrique « Personnalisation
du message électronique d’invitation du serveur » à la page 91.Chapitre 6 Gestion des ordinateurs des utilisateurs 103
Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire
Si un Mac équipé de Mac OS X 10.5 Leopard n’est pas encore connecté à un serveur et
si Leopard détecte votre serveur sur le réseau, l’Utilitaire d’annuaire s’ouvre automatiquement. Un assistant s’affiche alors et connecte le Mac au serveur, puis configure les
applications du Mac pour qu’elles utilisent les services du serveur. L’utilisateur peut
également ouvrir manuellement l’Utilitaire d’annuaire qui affichera l’assistant s’il
détecte votre serveur. 104 Chapitre 6 Gestion des ordinateurs des utilisateurs
Lors de l’utilisation de l’assistant :
 L’utilisateur décide s’il configure le Mac pour obtenir les services disponibles sur votre
serveur. Si l’utilitaire trouve plusieurs serveurs qui peuvent fournir des services, il pré-
sente une liste de ces serveurs en les triant par nom d’ordinateur et par adresse IP.
L’utilisateur doit alors savoir quel serveur choisir. La liste contient uniquement les serveurs ayant une configuration standard ou de groupe de travail Leopard Server.
 L’utilisateur saisit le nom et le mot de passe du compte utilisateur sur le serveur et le
mot de passe du compte utilisateur local dont la session est actuellement ouverte sur
son ordinateur. Le mot de passe du compte serveur est alors remplacé par le mot de
passe du compte local. Le dossier de départ de l’utilisateur demeure sur son ordinateur.
 L’utilisateur choisit ensuite de configurer ou non ses applications pour obtenir les services disponibles sur le serveur. Pour savoir comment les applications obtiennent ces
services, reportez-vous à la rubrique « Configuration automatique des ordinateurs
Mac Leopard » à la page 95.Chapitre 6 Gestion des ordinateurs des utilisateurs 105
Configuration manuelle des ordinateurs des utilisateurs
Les utilisateurs qui disposent de Mac OS X 10.4 Tiger ou d’une version antérieure, ou
ceux qui utilisent Windows, peuvent bénéficier des services de votre serveur en configurant manuellement leurs applications. Ils peuvent utiliser les réglages présentés dans
le tableau suivant, en remplaçant les exemples de données en italique par le nom DNS
de votre serveur et par leur nom abrégé d’utilisateur.
Application Réglages
Finder
(partage de fichiers)
afp://monserveur.exemple.com
smb://monserveur.exemple.com
iChat
(application de messagerie instantanée
XMPP)
Type de compte : Jabber
Serveur : monserveur.exemple.com
Identifiant Jabber :
nomabrégé@monserveur.exemple.com
Authentification : Kerberos v5 de préférence
Port : 5223
Mail
(application de courrier électronique)
Type de compte : IMAP ou POP
Serveur de courrier entrant : monserveur.exemple.com
Serveur de courrier sortant : monserveur.exemple.com
Adresse électronique :
nomabrégé@monserveur.exemple.com
Authentification : Kerberos v5 de préférence
iCal
(application de calendrier CalDAV)
S’abonner à : http://monserveur.exemple.com:8008/
principals/users/nomabrégé
Si l’application calendrier prend en charge le protocole
SSL, inscrivez-vous à : http://monserveur.exemple.com:
8443/principals/users/nomabrégé106 Chapitre 6 Gestion des ordinateurs des utilisateurs
Safari
(navigateur web)
Site web : http://monserveur.exemple.com
Wikis de groupe :
http://monserveur.exemple.com/groups
Blogs d’utilisateurs :
http://monserveur.exemple.com/users
Webmail : http://monserveur.exemple.com/webmail
Connexion à Internet
(connexion VPN)
Voir « Configuration d’une connexion VPN pour les utilisateurs Mac » ci-dessous, ou « Configuration manuelle
de la connexion VPN d’un utilisateur » à la page 109.
Application RéglagesChapitre 6 Gestion des ordinateurs des utilisateurs 107
Configuration d’une connexion VPN pour les utilisateurs Mac
Vous pouvez utiliser Préférences du serveur pour générer un fichier que les utilisateurs
Mac peuvent ouvrir en vue de créer automatiquement une configuration VPN. L’utilisateur peut ensuite établir une connexion VPN au serveur et à son réseau via Internet. Le
fichier de configuration fonctionne avec Mac OS X 10.3 ou ultérieur. Pour savoir comment générer un fichier de configuration, reportez-vous à la page 151.
Lorsque vous donnez aux utilisateurs Mac un fichier de configuration VPN que vous
avez généré, vous pouvez également leur fournir les instructions suivantes.108 Chapitre 6 Gestion des ordinateurs des utilisateurs
Utilisation d’un fichier de configuration VPN
Si la personne qui gère votre serveur vous a remis un fichier de configuration VPN et
si vous disposez de Mac OS X 10.3 ou ultérieur, vous pouvez utiliser ce fichier pour
configurer votre ordinateur en vue d’établir des connexions VPN au serveur. Le fichier
de configuration contient toutes les informations nécessaires à l’établissement d’une
connexion VPN au serveur, à l’exception du nom et du mot de passe de votre compte
utilisateur sur le serveur.
Pour importer une configuration VPN à partir d’un fichier :
1 Ouvrez le fichier et sélectionnez VPN (L2TP) si l’on vous demande où placer la configuration importée.
2 Saisissez le nom de votre compte utilisateur dans le champ Nom de compte.
3 Si l’administrateur du serveur vous demande de saisir le mot de passe de votre
compte utilisateur, saisissez-le dans le champ Mot de passe.
Si vous disposez de la version Mac OS X 10.5 Leopard, cliquez sur Réglages
d’authentification pour voir le champ Mot de passe.
Pour des raisons de sécurité, l’administrateur peut vous demander de ne pas saisir
votre mot de passe pour l’instant.
4 Quittez l’application et enregistrez ou appliquez les modifications à l’invite.
Si vous voulez établir une connexion VPN à partir d’un réseau équipé d’un coupe-feu,
configurez ce dernier pour qu’il autorise le trafic sur les ports UDP 500 et 4500, ainsi
que sur le protocole IP 50.
Si vous n’avez pas saisi votre mot de passe avant d’enregistrer la configuration VPN, il vous
sera demandé de le saisir à chaque fois que vous établirez une connexion VPN au serveur.Chapitre 6 Gestion des ordinateurs des utilisateurs 109
Configuration manuelle de la connexion VPN d’un utilisateur
Il arrive que des utilisateurs ne puissent pas importer des réglages VPN à partir d’un
fichier de configuration, car ils ne disposent pas du fichier ou qu’ils utilisent des ordinateurs Windows qui ne peuvent pas utiliser ce fichier. Ces utilisateurs peuvent configurer
manuellement leurs ordinateurs pour établir une connexion VPN à votre serveur. Pour
ce faire, ils doivent créer une nouvelle configuration VPN et saisir les réglages de connexion VPN suivants :
 Serveur ou hôte VPN : nom DNS de votre serveur ou son adresse IP publique.
 Type de VPN : L2TP via IPSec.
 Secret partagé (clé) pour IPSec : apparaît dans la sous-fenêtre VPN de Préférences du
serveur lorsque vous cliquez sur Modifier, puis que vous sélectionnez « Afficher secret
partagé ».
 Nom de compte : nom abrégé du compte de l’utilisateur sur votre serveur.
 Mot de passe de l’utilisateur : mot de passe du compte de l’utilisateur sur votre serveur.
Les utilisateurs qui veulent établir une connexion VPN à partir d’un ordinateur équipé
d’un coupe-feu doivent configurer le coupe-feu de manière à autoriser le trafic sur les
ports UDP 500 et 4500, ainsi que sur le protocole IP 50.110 Chapitre 6 Gestion des ordinateurs des utilisateurs
Utilisation des informations de répertoire sur les ordinateurs
des utilisateurs de Leopard
Les utilisateurs équipés de Mac OS X 10.5 Leopard peuvent utiliser l’application Répertoire pour afficher des informations partagées sur des personnes, des groupes, des
emplacements et des ressources. Ils peuvent utiliser Répertoire pour partager des contacts, ajouter et supprimer des groupes, modifier leur appartenance aux groupes, configurer des services de groupe et gérer leurs propres coordonnées. Chapitre 6 Gestion des ordinateurs des utilisateurs 111
Lorsque des utilisateurs consultent des informations sur d’autres personnes, ils ne voient
pas seulement leurs coordonnées. Répertoire peut afficher la photo de la personne
concernée, présenter une liste des groupes publics auxquels elle appartient, présenter
une liste de ses supérieurs et de ses subalternes directs et afficher une carte permettant
de localiser l’endroit où se trouve la personne.
Répertoire fonctionne avec plusieurs applications Mac OS X. Les utilisateurs peuvent
créer des contacts partagés à partir des entrées de Carnet d’adresses, cliquer sur des
adresses électroniques pour envoyer des messages à l’aide de Mail ou visiter les sites
web wiki de groupe à l’aide de Safari.
Répertoire permet aux utilisateurs de consulter les enregistrements stockés dans le
répertoire de votre serveur. Si votre serveur est connecté à un serveur de répertoire,
Répertoire montre également les enregistrements stockés sur ce serveur.
Remarque : les modifications effectuées par les utilisateurs à l’aide de Répertoire sont
visibles dans Préférences du serveur. Pour afficher les modifications les plus récentes effectuées avec Répertoire, sélectionnez Présentation > Actualiser dans Préférences du serveur.
Pour savoir comment utiliser Répertoire, ouvrez-le et utilisez le menu Aide. Répertoire
est disponible dans /Applications/Utilitaires/.7
113
7 Gestion des groupes
Utilisez la sous-fenêtre Groupes pour ajouter ou supprimer
des groupes, afficher et modifier des compositions de groupe
ou configurer des services de groupe.
La sous-fenêtre Groupes vous permet de créer des groupes, de configurer des services
de groupe tels que les wikis et les blogs, d’ajouter et de supprimer des membres dans
des groupes et de supprimer des groupes inutiles. Pour obtenir des informations sur les
réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide situé dans
le coin inférieur droit de la fenêtre Préférences du serveur.114 Chapitre 7 Gestion des groupes
Création d’un nouveau groupe
Vous pouvez créer un nouveau groupe lorsque des utilisateurs de serveur ont besoin
de leurs propres listes d’envoi, dossier de groupe partagé, wiki et blog, calendrier ou
archives de liste d’envoi. Vous devez sélectionner les services disponibles pour chaque
groupe.
Pour créer un nouveau groupe :
1 Cliquez sur le bouton Ajouter (+) dans la sous-fenêtre Groupes de Préférences du serveur.
2 Tapez le nom du groupe, changez éventuellement le nom abrégé, puis cliquez sur
Créer le groupe.Chapitre 7 Gestion des groupes 115
Le nom du groupe peut comporter jusqu’à 255 caractères (de 255 caractères latins à
seulement 85 caractères japonais). Ce nom peut comporter des espaces.
Une fois le compte créé, vous ne pourrez plus modifier le nom abrégé. Si vous ne souhaitez pas utiliser le nom abrégé généré automatiquement, tapez un nouveau nom abrégé.
Le nom abrégé se limite généralement à huit caractères, mais il peut comporter jusqu’à
255 caractères latins. Utilisez uniquement les caractères a à z, A à Z, 0 à 9, _ (souligné),
ou - (tiret).
3 Sélectionnez les services à mettre à la disposition de ce groupe.
Dossier de partage de fichiers : permet de configurer un dossier de groupe partagé afin
que les membres du groupe puissent accéder aux fichiers du dossier de groupe partagé
et y placer leurs propres fichiers. Ce dossier porte le nom abrégé du groupe et se trouve
sur le disque de démarrage du serveur, dans /Groupes/.
Liste d’envoi : une adresse électronique de groupe est définie à l’aide du nom abrégé
du groupe et les membres du groupe reçoivent tous les messages électroniques envoyés
à l’adresse du groupe.
Wiki et blog : permet aux membres d’un groupe d’utiliser leur navigateur web pour afficher le wiki du groupe et y contribuer.
Calendrier web : permet aux membres d’un groupe d’utiliser leur navigateur web pour
consulter le calendrier du groupe et y ajouter des événements.
Archives web de liste d’envoi : permet aux membres d’un groupe de lire des messages
électroniques archivés envoyés à l’adresse électronique du groupe.
4 Ajoutez des utilisateurs au groupe en cliquant sur Membres et ajoutez des utilisateurs
et des groupes provenant du serveur de répertoire de votre organisation en cliquant
sur Membres externes.116 Chapitre 7 Gestion des groupes
Pour obtenir des instructions, consultez les rubriques « Ajout ou suppression de membres
d’un groupe » à la page 118 et « Ajout ou suppression de membres externes d’un groupe »
à la page 120.
Si vous ne voyez pas d’onglet Membres externes (présenté à la page 120), votre serveur n’est pas connecté à un serveur de répertoire. Consultez la rubrique « Connexion à
un serveur de répertoire » à la page 162.
Pour accéder aux services de groupe, les membres du groupe doivent s’authentifier à
l’aide du nom et du mot de passe de leur compte utilisateur. Les services du groupe ne
sont disponibles que si le service de partage de fichiers, le service iCal, les services web
et le service de messagerie sont activés.
Les utilisateurs disposant de Leopard peuvent ajouter des groupes à l’aide de l’application Répertoire. Pour en savoir plus, consultez la rubrique « Utilisation des informations
de répertoire sur les ordinateurs des utilisateurs de Leopard » à la page 110.Chapitre 7 Gestion des groupes 117
Suppression d’un groupe
Vous pouvez utiliser Préférences du serveur pour supprimer les groupes devenus inutiles.
Pour supprimer un groupe :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à supprimer dans la liste de gauche.
2 Cliquez sur le bouton Supprimer (–).
Après avoir supprimé un groupe, le dossier partagé du groupe et le dossier de sites web
demeurent sur le disque de démarrage du serveur. Le dossier partagé se trouve dans
/Groups/ et le dossier de sites web du groupe dans /Bibliothèque/Collaboration/Groups/.
Vous pouvez conserver ces dossiers ou les faire glisser dans la corbeille.
Les utilisateurs disposant de Leopard peuvent supprimer des groupes à l’aide de l’application Répertoire. Pour obtenir des instructions, les utilisateurs peuvent ouvrir Répertoire,
puis consulter le menu Aide.118 Chapitre 7 Gestion des groupes
Ajout ou suppression de membres d’un groupe
La sous-fenêtre Groupes vous permet d’ajouter ou de supprimer des membres de groupe
qui sont des utilisateurs que vous avez créés ou importés dans la sous-fenêtre Utilisateurs.
(Pour disposer d’utilisateurs importés, votre serveur doit être connecté à un serveur de
répertoire.)Chapitre 7 Gestion des groupes 119
Pour ajouter ou supprimer des membres d’un groupe :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à modifier
dans la liste de gauche.
2 Cliquez sur Membres, puis sur Modifier l’adhésion.
3 Cochez la case en regard de chaque utilisateur que vous souhaitez intégrer au groupe.
Désactivez la case en regard de chaque utilisateur à retirer du groupe.
4 Une fois que vous avez terminé, cliquez à nouveau sur Modifier l’adhésion pour afficher
une liste statique des membres du groupe.
Les utilisateurs disposant de Leopard peuvent ajouter et supprimer des membres de
groupe à l’aide de l’application Répertoire. Pour en savoir plus, consultez la rubrique
« Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard »
à la page 110.
Pour en savoir plus sur l’ajout, la suppression ou la configuration des comptes utilisateur,
reportez-vous au chapitre 5, « Gestion des utilisateurs ».120 Chapitre 7 Gestion des groupes
Ajout ou suppression de membres externes d’un groupe
Si votre serveur est connecté à un serveur de répertoire, les membres de votre groupe
peuvent inclure des utilisateurs et un groupe issu du serveur de répertoire. Les membres externes ne disposent pas de compte utilisateur sur votre serveur, mais peuvent
utiliser le site web wiki de groupe. Utilisez la sous-fenêtre Groupes pour ajouter ou supprimer des membres externes.Chapitre 7 Gestion des groupes 121
Pour ajouter ou supprimer des membres externes :
1 Avant d’ajouter des membres externes, assurez-vous que le message électronique
d’invitation est formulé conformément à vos besoins.
Pour en savoir plus, consultez la rubrique « Personnalisation du message électronique
d’invitation du groupe » à la page 92 ;
2 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à modifier dans la liste de gauche, puis cliquez sur Membres externes.
Si vous ne voyez pas d’onglet Membres externes, votre serveur n’est pas connecté à un
serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » à
la page 162.
3 Pour supprimer un membre externe du groupe, sélectionnez le membre dans la liste
de droite et cliquez sur le bouton Supprimer (–) sous la liste.
4 Pour ajouter un membre au groupe, cliquez sur le bouton Ajouter (+) sous la liste des
membres.
5 Sélectionnez un membre potentiel dans la liste, sélectionnez éventuellement « Envoyer
une invitation électronique aux utilisateurs ajoutés », puis cliquez sur Ajouter au groupe.
Pour rechercher un utilisateur ou un groupe, tapez le début du nom dans le champ de
recherche.
Pour afficher ou masquer des utilisateurs ou des groupes situés sous un titre particulier,
cliquez sur le triangle qui se trouve dans le titre.
6 Une fois que vous avez fini d’ajouter des membres, cliquez sur Terminé.
Pour en savoir plus sur l’ajout, la suppression ou la configuration des comptes utilisateur,
reportez-vous au chapitre 5, « Gestion des utilisateurs ».122 Chapitre 7 Gestion des groupes
Modification des réglages de groupe
Vous pouvez modifier le nom d’un groupe ou configurer des services de groupe en cliquant sur Groupes dans la sous-fenêtre Utilisateurs de Préférences du serveur. Les services de groupe incluent un dossier de groupe partagé, une liste d’envoi de groupe, un
site web de groupe avec wiki et blog, un calendrier web et des archives web de liste
d’envoi. Pour obtenir des informations sur les réglages et les commandes disponibles
dans cette sous-fenêtre, cliquez sur le bouton Aide situé dans le coin inférieur droit de
la fenêtre Préférences du serveur.Chapitre 7 Gestion des groupes 123
Modification du nom d’un groupe
Vous pouvez utiliser Préférences du serveur pour modifier le nom d’un groupe.
Pour modifier le nom d’un groupe :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à modifier dans la liste de gauche, puis cliquez sur Réglages du groupe.
2 Modifiez le champ Nom du groupe.
Le nom peut comporter jusqu’à 255 caractères (de 255 caractères latins à seulement 85
caractères japonais). Ce nom peut comporter des espaces.
Vous ne pouvez pas changer le nom abrégé d’un groupe à l’aide de Préférences du serveur.
Configuration d’un dossier de partage de fichiers d’un groupe
Vous pouvez utiliser Préférences du serveur pour configurer un dossier partagé de groupe.
Les membres du groupe peuvent consulter des fichiers dans le dossier de groupe partagé
et y placer leurs propres fichiers. Ce dossier porte le nom abrégé du groupe et se trouve
sur le disque de démarrage du serveur, dans /Groups/.
Pour configurer un dossier de partage de fichiers pour un groupe :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez un groupe dans
la liste de gauche ou créez un nouveau groupe, puis cliquez sur Réglages du groupe.
Pour en savoir plus, consultez la rubrique « Création d’un nouveau groupe » à la page 114.
2 Sélectionnez « Dossier de partage de fichiers ».124 Chapitre 7 Gestion des groupes
3 Cliquez sur Tout afficher, puis sur Partage de fichiers et assurez-vous que le service de
partage de fichiers et l’accès au dossier partagé Groupe sont activés.
Les membres du groupe s’authentifient à l’aide du nom et du mot de passe de leur
compte utilisateur pour accéder au dossier partagé du groupe.
Configuration d’une liste d’envoi de groupe
Vous pouvez utiliser Préférences du serveur pour configurer une liste d’envoi de groupe.
L’adresse électronique du groupe est constituée à partir du nom abrégé du groupe.
Le serveur récupère les messages électroniques envoyés à cette adresse et les envoie
à l’adresse électronique de chaque membre du groupe.
Pour configurer la liste d’envoi d’un groupe :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez un groupe dans
la liste de gauche ou créez un nouveau groupe, puis cliquez sur Réglages du groupe.
2 Sélectionnez « Liste d’envoi ».
3 Cliquez sur Tout afficher et assurez-vous que le service de messagerie est activé.
Configuration du site web wiki d’un groupe
Vous pouvez utiliser Préférences du serveur pour configurer un site web avec wiki, blog,
calendrier (facultatif) et archives de liste d’envoi facultatif) de groupe. À l’aide de leur
navigateur web, les membres du groupe peuvent afficher le wiki et le blog du groupe
et y contribuer, vérifier le calendrier du groupe et y ajouter des événements, et lire les
messages électroniques archivés envoyés à l’adresse électronique du groupe.Chapitre 7 Gestion des groupes 125
Pour configurer le site web wiki d’un groupe :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez un groupe dans
la liste de gauche ou créez un nouveau groupe, puis cliquez sur Réglages du groupe.
2 Sélectionnez « Wiki et blog ».
3 Sélectionnez Calendrier web si vous voulez que le site web du groupe comprenne un
calendrier partagé.
4 Sélectionnez « Archives web de liste d’envoi » et « Liste d’envoi » si vous voulez que le
site web du groupe comprenne des archives de liste d’envoi.
5 Cliquez sur Tout afficher, puis sur Web et assurez-vous que le service web est activé et
que l’option « Activer les wikis de groupe » est sélectionnée.
6 Si vous avez activé le calendrier web à l’étape 3, cliquez sur Tout afficher et assurez-vous
que le service iCal est activé.
7 Si vous avez activé l’option d’archives web de liste d’envoi à l’étape 4, cliquez sur Tout
afficher et assurez-vous que le service de messagerie est activé.
Vous pouvez ouvrir le site web wiki du groupe en cliquant sur la flèche de lien en regard
de « Wiki et blog ». Vous pouvez ouvrir le calendrier web du groupe en cliquant sur la
flèche de lien en regard de « Calendrier web ».
Pour en savoir plus sur l’utilisation du wiki, du blog, du calendrier et des archives de liste
d’envoi, reportez-vous à l’aide disponible sur le site web du groupe.
Les membres du groupe peuvent accéder à leur site web à l’adresse suivante :
http://nomDNSduserveur/groups/nomabrégédugroupe126 Chapitre 7 Gestion des groupes
Remplacez les exemples en italique par le nom DNS du serveur et le nom abrégé du
groupe. Le nom DNS du serveur est affiché dans la sous-fenêtre Information de Préfé-
rences du serveur.
Les membres du groupe doivent ouvrir une session à l’aide du nom et du mot de passe
de leur compte utilisateur pour accéder au wiki, au blog, au calendrier web ou aux
archives web de la liste d’envoi du groupe.
Vous pouvez contrôler l’accès aux services du groupe en utilisant l’application Répertoire
(située dans /Applications/Utilitaires/). Pour savoir comment utiliser Répertoire, ouvrez
l’application et utilisez le menu Aide.
Configuration du calendrier d’un groupe
Vous pouvez utiliser Préférences du serveur pour configurer un calendrier de groupe
dans le cadre d’un site web wiki. Les utilisateurs peuvent utiliser leur navigateur web
pour consulter le calendrier du groupe et y ajouter des événements.
Pour configurer le calendrier web d’un groupe dans le cadre d’un site web wiki :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, cliquez sur Réglages du groupe
et, dans la liste de gauche, sélectionnez un groupe disposant d’un site web wiki.
2 Sélectionnez « Calendrier web ».
3 Cliquez sur Tout afficher, puis sur iCal et assurez-vous que le service iCal est activé.
Vous pouvez ouvrir le calendrier web du groupe en cliquant sur la flèche de lien située
en regard de « Calendrier web ».Chapitre 7 Gestion des groupes 127
Les membres du groupe peuvent afficher leur calendrier web à l’adresse suivante :
http://nomDNSduserveur/groups/nomabrégédugroupe/calendar
Remplacez les exemples en italique par le nom DNS du serveur et le nom abrégé du
groupe. Le nom DNS du serveur est affiché dans la sous-fenêtre Information de Préfé-
rences du serveur.
Les membres du groupe doivent ouvrir une session à l’aide du nom et du mot de passe
de leur compte utilisateur pour accéder au calendrier web du groupe.
Configuration des archives de la liste d’envoi d’un groupe
Vous pouvez utiliser Préférences du serveur pour configurer les archives de la liste d’envoi
d’un groupe dans le cadre d’un site web wiki. Ce service permet aux utilisateurs d’utiliser
leur navigateur web pour lire les messages électroniques archivés envoyés à l’adresse
électronique du groupe.
Pour configurer des archives web de liste d’envoi :
1 Dans la sous-fenêtre Groupes de Préférences du serveur, cliquez sur Réglages du groupe
et, dans la liste de gauche, sélectionnez un groupe disposant d’un site web wiki.
2 Sélectionnez « Archives web de liste d’envoi » et « Liste d’envoi ».
3 Cliquez sur Tout afficher, puis sur Mail et assurez-vous que le service de messagerie est
activé.
Les membres du groupe peuvent consulter leurs archives web de liste d’envoi à
l’adresse suivante :
http://nomDNSduserveur/groups/nomabrégédugroupe/mailinglist128 Chapitre 7 Gestion des groupes
Remplacez les exemples en italique par le nom DNS du serveur et le nom abrégé du
groupe. Le nom DNS du serveur est affiché dans la sous-fenêtre Information de Préfé-
rences du serveur.
Les membres du groupe doivent ouvrir une session à l’aide du nom et du mot de passe
de leur compte utilisateur pour accéder aux archives web de la liste d’envoi du groupe.8
129
8 Personnalisation des services
Utilisez Préférences du serveur pour modifier les réglages de
partage de fichiers, d’iCal, d’iChat, de Mail, du service web et
des services VPN.
Gestion du service de partage de fichiers
Utilisez la sous-fenêtre Partage de fichiers pour activer et désactiver le service de partage
de fichiers ou l’accès sécurisé aux dossiers partagés Groupes et Public. Vous pouvez
aussi ajouter vos propres dossiers partagés, également connus sous le nom de points
de partage, ou les supprimer. Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide dans le coin inférieur droit de
la fenêtre Préférences du serveur.130 Chapitre 8 Personnalisation des services
À propos du service de partage de fichiers
Mac OS X Server Le service de partage de fichiers permet aux utilisateurs d’accéder aux
dossiers partagés et de stocker des fichiers sur le serveur. Ceux-ci peuvent utiliser des
ordinateurs Macintosh, Windows ou UNIX pour accéder à leurs fichiers et dossiers partagés
sans logiciel spécifique et ce, à l’aide de protocoles de fichiers natifs, notamment les protocoles AFP et SMB. Les utilisateurs de Windows voient les serveurs de fichiers Mac OS X
Server dans leurs Favoris réseau, de la même manière que les serveurs de fichiers Windows.
Ajout d’un dossier partagé
Vous pouvez ajouter un dossier partagé que les utilisateurs peuvent sélectionner lorsqu’ils
se connectent au serveur pour le partage de fichiers. Les utilisateurs de Mac voient le
dossier partagé comme un disque partagé dans le Finder. Les utilisateurs de Windows
voient le dossier partagé dans les Favoris réseau. Les dossiers partagés sont également
appelés points de partage.Chapitre 8 Personnalisation des services 131
Pour ajouter un dossier partagé :
1 Si vous voulez partager un fichier qui n’existe pas encore, créez-le et donnez-lui un nom
dans le Finder.
2 Dans la sous-fenêtre Partage de fichiers de Préférences du serveur, cliquez sur le bouton
Ajouter (+), sélectionnez le dossier que vous souhaitez partager et cliquez sur Ouvrir.
Si vous utilisez Préférences du serveur sur le serveur, vous pouvez également faire glisser
un dossier à partager depuis une fenêtre du Finder pour le placer dans la liste de la
sous-fenêtre Partage de fichiers.
3 Pour autoriser les utilisateurs à accéder à ce dossier sans devoir ouvrir une session ou
pour modifier la liste des utilisateurs pouvant accéder à ce dossier partagé, cliquez sur
Modifier les autorisations.
Pour obtenir des informations, consultez la rubrique « Contrôle de l’accès au dossier
partagé » à la page 132.
Si vous voulez configurer un dossier de partage de fichiers de groupe, utilisez la sousfenêtre Groupes de Préférences du serveur. Les dossiers de partage de fichiers de groupe
se trouvent dans /Groups/ dossier partagé. Pour obtenir des instructions, consultez la
rubrique « Configuration d’un dossier de partage de fichiers d’un groupe » à la page 123.
Suppression d’un dossier partagé
Vous pouvez utiliser Préférences du serveur pour supprimer les dossiers partagés que
vous ne souhaitez plus utiliser pour le partage de fichiers. Lorsque vous supprimez un
dossier partagé, le dossier et son contenu restent sur le disque du serveur.132 Chapitre 8 Personnalisation des services
Pour supprimer un dossier partagé :
m Dans la sous-fenêtre Partage de fichiers de Préférences du serveur, sélectionnez le dossier
partagé à supprimer, puis cliquez sur le bouton Supprimer (–).
Contrôle de l’accès au dossier partagé
Vous pouvez autoriser ou interdire l’accès à chaque dossier partagé affiché dans la
sous-fenêtre Partage de fichiers de Préférences du serveur. Vous pouvez indiquer quels
utilisateurs ont un accès en lecture et écriture à chaque dossier partagé et à son contenu :
tous les utilisateurs ayant un compte sur votre serveur ou uniquement les utilisateurs
et groupes de votre choix. Vous pouvez également décider d’activer ou de désactiver
l’accès des invités pour chaque dossier partagé. L’activation de l’accès au dossier partagé
permet aux utilisateurs d’utiliser les protocoles de partage de fichiers AFP et SMB pour
accéder au dossier. Les invités peuvent accéder au dossier partagé sans avoir à ouvrir
de session.
Pour modifier les réglages d’un fichier partagé :
1 Dans la sous-fenêtre Partage de fichiers, trouvez le dossier partagé dans la liste.
2 Pour autoriser l’accès à un dossier partagé, sélectionnez la case correspondante.
3 Pour donner à tous les utilisateurs ayant un compte sur votre serveur un accès en lecture
et écriture au dossier partagé et à son contenu, cliquez sur Modifier les autorisations et
sélectionnez « Tous les utilisateurs enregistrés ».
4 Pour restreindre l’accès en lecture et écriture au dossier partagé et à son contenu, cliquez
sur Modifier les autorisations, sélectionnez « Uniquement ces utilisateurs et groupes
enregistrés », puis cochez la case se trouvant à côté de chaque utilisateur et groupe
auquel vous souhaitez autoriser l’accès.Chapitre 8 Personnalisation des services 133
Si vous donnez à un groupe un accès en lecture et écriture, tous les membres du groupe
ont un accès en lecture et écriture, même si les cases qui leur correspondent sont désé-
lectionnées.
5 Pour permettre aux utilisateurs invités de lire le contenu d’un dossier partagé, cliquez
sur Modifier les modifications et sélectionnez « Autoriser l’accès en lecture seule pour
les invités ». Désélectionnez cette option pour ne plus autoriser l’accès aux invités.
Si vous autorisez l’accès à un dossier partagé, les utilisateurs peuvent y avoir accès à l’aide
des protocoles de fichiers de partage les plus communs, AFP et SMB.
Vous pouvez également modifier les autorisations d’accès à un dossier partagé ou à tout
élément de ce dossier en utilisant la fenêtre d’information dans le Finder. Pour obtenir
des informations sur le réglage des autorisations d’accès aux dossiers et fichiers, allez
dans le Finder, puis utilisez le menu Aide.
Recherche d’une adresse de partage de fichiers sur un serveur
Les utilisateurs et éventuellement les invités peuvent se connecter aux dossiers partagés
du serveur en utilisant les protocoles AFP ou SMB aux adresses suivantes :
 smb://nomDNSduserveur
 afp://nomDNSduserveur
Remplacez l’exemple en italique par le nom DNS de votre serveur, qui est affiché dans
la sous-fenêtre Information de Préférences du serveur.134 Chapitre 8 Personnalisation des services
Pour accéder aux dossiers partagés pour lesquels l’accès par les invités est désactivé,
les utilisateurs doivent ouvrir une session en utilisant le nom et le mot de passe de leur
compte utilisateur sur le serveur. Une fois la session ouverte, les utilisateurs ont accès
au dossier partagé de chaque groupe auquel ils appartiennent. Si l’accès par les invités
à un dossier de partage est activé, les utilisateurs peuvent se connecter sans avoir à
ouvrir de session. Pour obtenir des informations, consultez la rubrique « Contrôle de
l’accès au dossier partagé » à la page 132.
Gestion du service iCal
Utilisez la sous-fenêtre iCal pour activer et désactiver le service calendrier iCal, limiter la
taille du fichier joint ou limiter le volume total de données du calendrier de l’utilisateur.
Pour configurer la sous-fenêtre iCal :
m Modifiez tous les paramètres disponibles en vous référant aux informations suivantes :
Activé/Désactivé indique l’état du service iCal et le bouton Activé/Désactivé active ou
désactive le service.Chapitre 8 Personnalisation des services 135
Limiter la taille de chaque événement de calendrier à__ Mo’: définit la taille totale maximale
d’un événement, de la tâche à réaliser ou d’un autre objet du calendrier, notamment
la taille totale de tous les fichiers joints. Si l’utilisateur tente d’enregistrer un objet de calendrier plus important, le serveur envoie un message d’erreur à l’application de calendrier
de l’utilisateur.
Limiter la taille de calendrier totale de chaque utilisateur à__ Mo : limite la quantité d’espace
disque que les événements des utilisateurs, les tâches à réaliser et d’autres données relatives au calendrier peuvent utiliser sur le serveur. Si un utilisateur dépasse cette limite,
le serveur envoie un message d’erreur à l’application de calendrier de l’utilisateur.
À propos du service iCal
Le service de calendrier de Mac OS X Server, iCal Server, permet aux utilisateurs de partager des calendriers, de programmer des rencontres et de coordonner des événements,
le tout de manière aisée. Les utilisateurs peuvent vérifier rapidement et facilement la
disponibilité des autres utilisateurs, mettre en place et proposer des rencontres, réserver des salles de conférence, réserver des projecteurs et plus encore. iCal Server envoie
les invitations, qui peuvent contenir des informations telles qu’un agenda ou une liste
des tâches, et présente les réponses sous forme de tableau.
Un ordinateur équipé de Mac OS X 10.5 Leopard peut configurer automatiquement son
application iCal en vue d’utiliser iCal Server. Consultez la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95.
iCal Server fonctionne également avec d’autres applications de calendrier courantes,
prenant en charge le protocole CalDAV standard.136 Chapitre 8 Personnalisation des services
Gestion du service iChat
Utilisez la sous-fenêtre iChat pour activer et désactiver le service de messagerie instantanée iChat, ajouter tous les utilisateurs à la liste de contacts de chaque utilisateur, activer la conversation avec d’autres systèmes de messagerie instantanée ou configurer le
listage et l’archivage de toutes les conversations. Pour obtenir des informations sur les
réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide dans le
coin inférieur droit de la fenêtre Préférences du serveur.
À propos du service iChat
Le service iChat fournit une messagerie instantanée sécurisée (MI) aux utilisateurs de
Macintosh, Windows et Linux. Les membres du groupe peuvent chercher des solutions
ensemble, établir des plans, échanger des URL ou transférer des fichiers sans avoir à
craindre l’intrusion de personnes étrangères qui pourraient intercepter des informations
confidentielles. Le service iChat fournit une messagerie textuelle entre les utilisateurs ou
entre des utilisateurs multiples. Il facilite également les connexions directes entre les utilisateurs en matière d’audio, de vidéo et de sessions audio et vidéo multidirectionnelles.Chapitre 8 Personnalisation des services 137
Les informations sur le compte iChat des utilisateurs sont stockées sur le serveur. Les
utilisateurs peuvent accéder à leurs comptes depuis n’importe quel Mac et voir les mêmes
listes de contacts, groupes et ainsi de suite.
L’application iChat d’un ordinateur équipé de Mac OS X 10.5 Leopard peut être configurée
automatiquement en vue d’utiliser le service iChat de votre serveur. Consultez la rubrique
« Configuration automatique des ordinateurs Mac Leopard » à la page 95.
Le service iChat fonctionne également avec des logiciels de messagerie instantanée
compatibles avec Jabber, disponibles avec Windows, Linux et même avec des assistants numériques personnels classiques.
Ajout de tous les utilisateurs à la liste de contacts de chaque utilisateur
Les identifiants Jabber (noms d’écrans) de tous les utilisateurs ayant un compte sur le
serveur peuvent être ajoutés automatiquement à la liste de contacts de chaque utilisateur. Les utilisateurs voient leurs listes de contacts Jabber dans iChat (ou une autre application de messagerie instantanée XMPP). Ils peuvent ajouter ou supprimer des contacts.
Pour ajouter tous les utilisateurs à la liste de contacts Jabber de chaque utilisateur :
1 Dans la sous-fenêtre iChat de Préférences du serveur, sélectionnez « Ajouter automatiquement tous les utilisateurs à chaque liste de contacts ».
2 Redémarrez le service iChat en cliquant deux fois sur Activé/Désactivé.
Les modifications apportées au service iChat prennent effet une fois ce dernier redémarré.
Si vous désélectionnez l’option « Ajouter automatiquement tous les utilisateurs à chaque liste de contacts », les utilisateurs ne sont pas supprimés automatiquement des listes de contacts. Chaque utilisateur peut supprimer les contacts qui ont été ajoutés
automatiquement à sa liste de contacts.138 Chapitre 8 Personnalisation des services
Conversation avec les utilisateurs de Google Talk et d’autres services XMPP
Vous pouvez autoriser les utilisateurs du serveur à échanger des messages instantanés
avec des utilisateurs de Google Talk et d’autres systèmes de messagerie instantanée
utilisant le protocole XMPP.
Pour autoriser la conversation via Google Talk et d’autres services XMPP :
1 Dans la sous-fenêtre iChat des Préférences du serveur, sélectionnez « Activer la communication de serveur à serveur ».
2 Redémarrez le service iChat en cliquant deux fois sur Activé/Désactivé.
Les modifications apportées au service iChat prennent effet une fois ce dernier redémarré.
Enregistrement et archivage des messages instantanés
Le service iChat peut enregistrer une copie de tous les messages instantanés dans
un fichier texte. Le service comprime la copie et enregistre une archive une fois par
semaine. La dernière copie et les archives comprimées se trouvent dans /var/jabberd/
message_archives/.
Pour enregistrer et archiver des messages instantanés :
1 Dans la sous-fenêtre iChat des Préférences du serveur, sélectionnez « Enregistrer et
archiver toutes les conversations ».
2 Redémarrez le service iChat en cliquant deux fois sur Activé/Désactivé.
Les modifications apportées au service iChat prennent effet une fois ce dernier redémarré.Chapitre 8 Personnalisation des services 139
Gestion du service de messagerie
Utilisez la sous-fenêtre Messagerie pour activer et désactiver le service de messagerie,
modifier le message d’accueil envoyé aux nouveaux utilisateurs, spécifier un serveur relais
pour les messages sortants ou ajuster le filtrage des messages indésirables et des virus.
Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre,
cliquez sur le bouton Aide dans le coin inférieur droit de la fenêtre Préférences du serveur.
À propos du service de messagerie
Le service de messagerie permet aux utilisateurs d’envoyer et de recevoir des messages
électroniques sur votre réseau local et sur Internet en utilisant n’importe quelle application
de courrier électronique. Le service de messagerie peut fournir des listes d’envoi pour
les groupes et il contient des filtres qui protègent les utilisateurs contre le courrier indé-
sirable et les virus.140 Chapitre 8 Personnalisation des services
Toutes les personnes ayant un compte utilisateur obtiennent une adresse électronique.
L’application de messagerie d’un ordinateur doté de Mac OS X 10.5 Leopard peut être
configurée automatiquement de manière à utiliser le service de messagerie de votre
serveur. Consultez la rubrique « Configuration automatique des ordinateurs Mac Leopard »
à la page 95.
Le service de messagerie fonctionne également avec d’autres applications de messagerie
classiques qui utilisent les protocoles de messagerie standard. Les utilisateurs peuvent
recevoir du courrier électronique en utilisant le protocole IMAP ou POP et en envoyer
en utilisant le protocole SMTP.
Choix d’un serveur de relais du courrier électronique
Votre service de messagerie peut transmettre un message sortant via un autre serveur,
qui transfère alors le courrier électronique vers sa destination.
 Si vous utilisez un fournisseur d’accès à Internet (FAI), celui-ci peut stipuler que tous
les messages sortants doivent être pris en charge par un serveur désigné.
 Si votre organisation fournit un service Internet, il se peut que votre serveur ait besoin
d’utiliser un serveur relais pour transmettre les messages sortants via un coupe-feu.
Si tel est le cas, votre organisation désignera un serveur particulier qui relaiera les
messages via un coupe-feu.
Important : utilisez un serveur relais uniquement si votre FAI ou votre organisation l’exige.
Relayer des messages via un autre serveur sans autorisation peut faire de votre serveur
un système qui abuse du service de messagerie. Chapitre 8 Personnalisation des services 141
Pour relayer des messages sortants via un autre serveur :
1 Dans la sous-fenêtre Mail des Préférences du serveur, sélectionnez « Relayer les messages
sortants via le FAI ».
Si cette option est déjà sélectionnée, cliquez sur le bouton Modifier se trouvant en regard.
Apparaît alors une zone de dialogue dans laquelle vous devez saisir des informations
sur la connexion du serveur relais.
2 Tapez le nom DNS du serveur relais ou l’adresse IP fournie par votre FAI ou votre
organisation.
3 Si votre FAI ou votre organisation demande également l’authentification de votre serveur avant l’envoi de messages électroniques, sélectionnez « Activer l’authentification
du relais SMPT ».
À propos du filtrage des messages indésirables et des virus
Le service de messagerie peut examiner les messages entrants avant de les livrer pour
vérifier qu’ils sont exempts de virus et de messages indésirables. Mac OS X Server utilise SpamAssassin (spamassassin.apache.org) pour analyser le texte du message et calcule la probabilité qu’il s’agisse d’un message indésirable.
Aucun filtre de courrier indésirable n’est efficace à 100 % en matière d’identification.
Mac OS X Server ne supprime pas les messages indésirables. Il transmet toutefois les messages avec la mention « ***COURRIER INDÉSIRABLE*** » ajoutée à l’objet. Le destinataire
peut vérifier s’il s’agit réellement de messages indésirables et les traiter en conséquence. 142 Chapitre 8 Personnalisation des services
Chaque message est analysé et les statistiques des mots les plus fréquents sont enregistrées. Les messages électroniques contenant beaucoup des mots généralement rencontrés dans les messages indésirables reçoivent un score plus élevé indiquant leur
forte probabilité d’être des messages indésirables.
Mac OS X Server utilise ClamAV (www.clamav.net) pour analyser les messages et rechercher des virus. Le courrier électronique infecté par un virus suspect est supprimé et
un avis est envoyé à l’adresse électronique de notification indiquée dans la sous-fenêtre
Information des Préférences du serveur. Le serveur met automatiquement à jour la
définition des virus une fois par jour via Internet.
Analyse des messages indésirables et des virus entrants
Le service de messagerie peut analyser les messages entrants pour rechercher les messages indésirables et les virus. Les messages contenant des virus connus sont supprimés. Les messages suspectés d’être des messages indésirables sont transmis avec la
mention ***COURRIER INDÉSIRABLE***.
Pour que le service de messagerie analyse les messages indésirables et les virus :
1 Dans la sous-fenêtre Mail des Préférences du serveur, sélectionnez « Filtrer le courrier
indésirable et les virus ».
2 Ajustez le curseur pour définir le niveau de tolérance du filtre en matière de classification d’un message entrant comme courrier indésirable.
Agressif : le filtre de messages indésirables tolère peu de signes indiquant que le courrier
peut être indésirable.
Modéré : le filtre de messages indésirables tolère quelques signes indiquant que
le courrier peut être indésirable.Chapitre 8 Personnalisation des services 143
Prudent : le filtre de messages indésirables marque le message entrant comme courrier
indésirable uniquement s’il contient de nombreux signes indiquant que le courrier
peut être indésirable.
Gestion des services web
Utilisez la sous-fenêtre Web pour activer et désactiver les services web, modifier l’emplacement de la page d’accueil de votre site web, activer les sites web wiki de groupe ou
d’autres services web. Pour obtenir des informations sur les réglages et les commandes
de cette sous-fenêtre, cliquez sur le bouton Aide dans le coin inférieur droit de la fenêtre
Préférences du serveur.144 Chapitre 8 Personnalisation des services
À propos des services web
Les services web peuvent accueillir un site web conventionnel ou fournir des sites web
de groupe avec des wikis, blogs, calendriers facultatifs et archives de listes d’envoi facultatives. D’autres services web fournissent un accès web au courrier électronique.
Tous les membres d’un groupe peuvent aisément afficher, rechercher et modifier du contenu wiki directement à partir de leurs navigateurs web. En utilisant les modèles fournis
ou en créant leurs propres modèles, ils peuvent ajouter, supprimer, modifier et formater
naturellement le contenu, sans avoir à connaître les codes de balise ou la syntaxe spécifiques. Ils ont la possibilité, en quelques clics ou par un glisser-déposer, de joindre des
fichiers et des images, de publier du contenu dans des podcasts, d’attribuer des motsclés et d’établir des liens vers d’autres pages wiki ou d’autres sites web. Ils peuvent afficher l’historique complet des modifications du wiki et revenir à une ancienne version
de n’importe quelle page. Ils peuvent également consulter des calendriers partagés,
des blogs et des listes d’envoi et y contribuer.
Les blogs permettent aux utilisateurs non techniciens de tenir leurs collègues informés
des projets, des fichiers sur lesquels ils travaillent et des images ou podcasts. Les utilisateurs publient leurs propres blogs, par simple glisser-déposer, à l’aide d’une sélection
de modèles professionnels prédéfinis.
Avec WebMail, les utilisateurs peuvent recevoir et envoyer du courrier électronique depuis
un navigateur web, n’importe où sur Internet. Ils peuvent accéder à tout leur courrier électronique comme s’ils utilisaient l’application Mail de Mac OS X ou une autre application de
messagerie sur leur ordinateur.Chapitre 8 Personnalisation des services 145
Recherche de l’adresse du site web du serveur
L’adresse du site web de votre serveur est la suivante :
http://nomDNSduserveur
Remplacez l’exemple en italique par le nom DNS de votre serveur, qui est affiché dans
la sous-fenêtre Information de Préférences du serveur.
Si le site web de votre serveur est un wiki de groupe, les visiteurs doivent ouvrir une
session à l’aide du nom et du mot de passe d’un membre du groupe.
Hébergement d’un site web conventionnel
Plutôt que d’utiliser un site web avec wiki de groupe configuré pour vous par Mac OS X
Server, votre serveur peut héberger un site web conventionnel composé de fichiers
HTML statiques. Pour créer ce site web, utilisez le logiciel de développement de votre
choix ou faites-le créer par un tiers, puis copiez les fichiers du site web sur votre serveur.
Pour héberger un site web conventionnel :
1 Assurez-vous que la page d’accueil de votre site web porte le nom index.html ou
index.php.
2 Ouvrez le dossier des sites web du serveur, qui se trouve dans /Bibliothèque/WebServer/Documents/. Vous pouvez si vous le souhaitez supprimer les fichiers d’exemple.
3 Copiez vos fichiers de site web dans le dossier des sites web.
4 Dans la sous-fenêtre Web de Préférences du serveur, sélectionnez « Page d’accueil du
serveur » dans le menu local Page d’accueil.
5 Si les services web ne sont pas activés, cliquez sur le bouton Activé/Désactivé dans
la sous-fenêtre Web.146 Chapitre 8 Personnalisation des services
Configuration du service wiki de groupe
Vous pouvez utiliser la sous-fenêtre Web de Préférences du serveur pour rendre tous
les sites web wiki de groupe disponibles ou non sur le réseau. Lorsque des sites web
wiki de groupe sont disponibles, chaque membre du groupe peut accéder au wiki de
groupe, au blog, au calendrier facultatif et aux archives de listes d’envoi facultatives.
Vous pouvez activer et définir des options pour chaque wiki de groupe dans la sousfenêtre Groupes.
Pour activer le service wiki pour tous les groupes :
1 Dans la sous-fenêtre Web de Préférences du serveur, sélectionnez « Activer les wikis
de groupe » et assurez-vous que le service web est activé.
S’il n’est pas activé, cliquez sur le bouton Activé/Désactivé.
2 Si vous voulez visiter la page wiki contenant des liens vers tous les wikis de groupe,
cliquez sur la flèche gauche pour « Activer les wikis de groupe ».
3 Si vous voulez configurer un wiki pour un nouveau groupe ou un groupe existant,
cliquez sur « Créer un nouveau groupe avec un site web wiki ».
Le fait de cliquer sur ce lien vous permet d’afficher la sous-fenêtre Groupes, dans laquelle
vous pouvez créer un nouveau groupe ou sélectionner un groupe existant, puis configurer le wiki du groupe. Pour obtenir des informations sur la création de groupes et sur
la configuration de wikis de groupe, consultez les rubriques « Création d’un nouveau
groupe » à la page 114 et « Configuration du site web wiki d’un groupe » à la page 124.Chapitre 8 Personnalisation des services 147
Configuration du service Webmail
Vous pouvez utiliser Préférences du serveur pour activer et désactiver le service Webmail.
Ce service permet à tous les utilisateurs du serveur d’utiliser un navigateur web pour
accéder à leur courrier via Internet.
Pour activer et désactiver le service Webmail :
m Dans la sous-fenêtre Web de Préférences du serveur, sélectionnez ou désélectionnez
l’option Webmail.
Si cette option est sélectionnée, le fait de cliquer sur la flèche gauche située à côté ouvre
le site web Webmail.
Les utilisateurs accèdent au Webmail de votre serveur en ajoutant /webmail à l’adresse
du site web de votre serveur. Par exemple :
http://serveur.exemple.com/webmail
Configuration des blogs d’utilisateur
Vous pouvez utiliser Préférences du serveur pour activer ou désactiver le service web
consacré aux blogs d’utilisateur. Ce service permet à tous les utilisateurs de créer leur
propre blog à l’aide d’un navigateur web.
Pour activer et désactiver les blogs d’utilisateur :
m Dans la fenêtre web de Préférences du serveur, sélectionnez ou désélectionnez Blogs
d’utilisateur.
Si cette option est sélectionnée, le fait de cliquer sur la flèche gauche située à côté ouvre
le site web des blogs.148 Chapitre 8 Personnalisation des services
Les utilisateurs accèdent à leurs blogs en ajoutant /utilisateurs/nomabrégé à l’adresse
du site web de votre serveur. Par exemple :
http://serveur.exemple.com/users/rpatel
Gestion du service VPN
Utilisez la sous-fenêtre VPN pour activer et désactiver le service d’accès à distance VPN,
vérifier ou modifier le secret VPN, définir la plage d’adresses IP pour les utilisateurs VPN
ou enregistrer un ficher de configuration VPN pour les utilisateurs de Mac OS X. Pour
obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez
sur le bouton Aide dans le coin inférieur droit de la fenêtre Préférences du serveur.Chapitre 8 Personnalisation des services 149
À propos du service VPN
Le service VPN (virtual private network) permet aux utilisateurs de se connecter à votre
réseau depuis chez eux ou depuis d’autres endroits distants via Internet. Ils établissent
une connexion VPN sécurisée pour accéder aux services de groupe de travail tels que le
partage de fichiers, la messagerie, iChat, iCal et le service web. Le service VPN utilise le
protocole L2TP et un secret partagé pour assurer la confidentialité, l’authentification et
l’intégrité des communications.
Un secret partagé sécurisé est généré automatiquement lorsque vous configurez votre
serveur. Le secret partagé n’est pas utilisé pour authentifier les utilisateurs des ordinateurs clients lors de la connexion VPN. Il permet néanmoins au serveur de faire confiance
aux ordinateurs clients qui disposent du secret partagé et inversement.
Serveur et ordinateurs clients doivent disposer du secret partagé. Un ordinateur équipé
de Mac OS X10.5 Leopard peut automatiquement obtenir le secret partagé et être configuré pour établir des connexions au service VPN du serveur. Consultez la rubrique
« Configuration automatique des ordinateurs Mac Leopard » à la page 95.
Les autres ordinateurs Mac et Windows peuvent être configurés de différentes façons
pour se connecter au service VPN. Consultez les rubriques « Configuration d’une connexion VPN pour les utilisateurs Mac » à la page 107 et « Configuration manuelle de
la connexion VPN d’un utilisateur » à la page 109.150 Chapitre 8 Personnalisation des services
Modification du secret partagé VPN
Vous pouvez utiliser Préférences du serveur pour modifier le secret partagé utilisé par
le serveur et un ordinateur client pour l’authentification lors de l’établissement d’une
connexion VPN. Le fait de changer régulièrement de secret partagé améliore la sécurité
VPN, mais n’est pas pratique car les utilisateurs doivent également changer le secret
partagé sur les ordinateurs qu’ils utilisent pour les connexions VPN.
Pour modifier le secret partagé VPN :
1 Dans la sous-fenêtre VPN de Préférences du serveur, cliquez sur Édition.
2 Sélectionnez « Afficher le secret partagé » de manière à pouvoir lire le secret, tapez
un nouveau secret et cliquez sur OK.
Le secret partagé doit comporter au moins 8 caractères (de préférence 12 caractères
ou plus) comprenant des lettres, des chiffres et des symboles, mais pas d’espace. Initialement, le secret partagé est constitué de 32 caractères aléatoires.
Vous pouvez utiliser l’Assistant de mot de passe pour vous aider à composer un nouveau
secret partagé. Activez temporairement la sous-fenêtre Utilisateurs, cliquez sur Compte,
sur « Réinitialiser le mot de passe », sur le bouton Clé à droite du champ « Nouveau mot
de passe », puis sur Annuler et retournez à la sous-fenêtre VPN. L’Assistant de mot de
passe reste ouvert. Vous pouvez l’utiliser pour générer un nouveau secret partagé que
vous copiez dans le champ Suggestion et collez dans le champ Secret partagé.
Après avoir changé leur secret, tous les utilisateurs VPN doivent procéder au même
changement dans leur configuration VPN. Pour obtenir des informations sur cette
modification, consultez la rubrique « Configuration manuelle de la connexion VPN
d’un utilisateur » à la page 109.Chapitre 8 Personnalisation des services 151
Création d’un fichier de configuration VPN
Vous pouvez utiliser Préférences du serveur pour générer un fichier que les utilisateurs
Mac peuvent ouvrir pour créer automatiquement une configuration VPN. Après avoir créé
la configuration VPN, l’utilisateur peut établir une connexion VPN au serveur et à son
réseau via Internet. Le fichier de configuration fonctionne avec Mac OS X 10.3 ou ultérieur.
Pour générer un fichier de configuration VPN :
1 Dans la sous-fenêtre VPN de Préférences du serveur, cliquez sur Enregistrer sous, sélectionnez un emplacement pour le fichier de configuration VPN, puis cliquez sur Enregistrer.
2 Distribuez le fichier de configuration enregistré aux utilisateurs qui ont besoin de configurer une configuration VPN sur leur Mac.
Pour configurer un Mac, il suffit à un utilisateur d’ouvrir le fichier de configuration VPN
que vous avez généré. L’ouverture de ce fichier entraîne l’ouverture soit de la sousfenêtre Réseau des Préférences Système, soit de Connexion à Internet (selon la version
Mac OS X), puis l’importation d’une configuration VPN avec toutes les informations
nécessaires à l’établissement d’une connexion VPN, à l’exception du nom et du mot de
passe de compte utilisateur sur le serveur. Si Connexion à Internet demande à l’utilisateur où placer la configuration importée, celui-ci doit sélectionner VPN (L2TP). L’utilisateur ne doit pas sélectionner VPN (PPTP) ou toute autre option.152 Chapitre 8 Personnalisation des services
Lorsque les Préférences Réseau ou Connexion à Internet ont terminé l’importation de la
configuration VPN, l’utilisateur doit taper un nom de compte et éventuellement un mot
de passe, puis les enregistrer pour qu’ils fassent partie de la configuration VPN au moment
de quitter l’application. Si l’utilisateur enregistre à la fois le nom et le mot de passe
comme faisant partie de la configuration VPN, toute personne utilisant l’ordinateur en
question pourra ouvrir automatiquement une session pour établir une connexion VPN
à votre serveur.
Par mesure de sécurité, vous pouvez demander aux utilisateurs de taper leur nom de
compte mais pas leur mot de passe, puis de quitter l’application (Préférences Système
ou Connexion à Internet). Si les utilisateurs n’enregistrent pas de mot de passe dans la
configuration VPN sur leur ordinateur, il leur sera demandé d’ouvrir une session à chaque fois qu’ils établiront une connexion à votre serveur.
Pour obtenir les informations à transmettre aux utilisateurs et leur expliquer comment
utiliser le fichier de configuration VPN, consultez la rubrique « Configuration d’une connexion VPN pour les utilisateurs Mac » à la page 107.
Modification de la plage d’adresses IP pour le VPN
Vous pouvez utiliser Préférences du serveur pour modifier la plage d’adresses réservée
par le serveur pour attribuer des adresses aux ordinateurs distants qui se connectent
via VPN au serveur. Vous pouvez, par exemple, étendre cette plage pour rendre plus
d’adresses IP disponibles pour les connexions VPN.
Important : il s’agit d’adresses présentes sur le réseau du serveur, qui ne peuvent pas
être utilisées par d’autres ordinateurs ou périphériques sur le réseau. Cette plage
d’adresses ne peut comporter aucune adresse IP statique utilisée sur le réseau, ni
empiéter sur la plage d’adresses IP attribuées par le serveur DHCP.Chapitre 8 Personnalisation des services 153
Pour modifier la plage d’adresses IP du service VPN :
1 Dans la sous-fenêtre VPN de Préférences du serveur, modifiez la première et la dernière
adresse IP de la plage, ou les deux.
La plage d’adresses doit être suffisamment large pour pouvoir inclure le nombre maximum d’ordinateurs distants simultanément connectés via VPN. Le service VPN attribue
une adresse IP pour la durée de la connexion VPN et récupère l’adresse attribuée lorsque l’ordinateur distant se déconnecte.
2 Si vous disposez d’une borne d’accès AirPort ou d’un autre routeur Internet (passerelle)
qui fournit le service DHCP, il peut s’avérer nécessaire d’adapter sa plage d’adresses IP
de sorte que les plages d’adresses DHCP et VPN ne se chevauchent pas.
Pour obtenir des informations sur la modification des réglages d’un routeur Internet,
consultez la documentation du routeur.
Lorsqu’un ordinateur distant établit une connexion VPN, le serveur lui attribue une
adresse IP inutilisée provenant de la plage d’adresses réservées. Cette adresse IP ne
remplace pas l’adresse IP déjà utilisée par l’ordinateur distant pour se connecter à Internet. L’ordinateur distant conserve cette adresse IP et toute autre adresse IP qu’il utilise
et ajoute l’adresse IP qui lui est attribuée pour le VPN. 154 Chapitre 8 Personnalisation des services
Fourniture d’un service VPN via un routeur Internet
Si votre serveur fournit un service VPN à travers une borne d’accès AirPort ou tout autre
routeur Internet et si les ordinateurs des utilisateurs ont besoin d’établir des connexions
VPN via leurs propres bornes d’accès ou routeurs Internet, votre serveur doit se trouver
sur un sous-réseau IP différent de celui des ordinateurs des utilisateurs VPN. En d’autres
termes, les trois premiers nombres (tels que 10.0.1 ou 192.168.1) de l’adresse IP de votre
serveur ne peuvent être identiques aux trois premiers nombres des adresses IP des utilisateurs VPN.
Vous pouvez éviter ce conflit en modifiant le troisième nombre de l’adresse IP de tous
les périphériques rattachés au réseau local de votre serveur : borne d’accès AirPort ou
autre routeur Internet, serveur et autres ordinateurs. Utilisez un nombre compris entre
2 et 254. Par exemple, si votre serveur et d’autres périphériques rattachés à son réseau
ont des adresses IP commençant par « 10.0.1 », modifiez-les de sorte qu’elles commencent par « 10.0.2 » ou par « 10.0.100 ». Si leurs adresses IP commencent par « 192.168.1 »,
vous pouvez les changer pour qu’elles commencent par « 192.168.5 » ou par « 192.168.70 ».
Vous pouvez également utiliser les valeurs 172.16.0 à 172.31.255. Dans tous les cas,
utilisez le masque de sous-réseau 255.255.255.0.
Si votre borne d’accès AirPort, un autre routeur Internet ou le serveur DHCP attribue
des adresses IP aux ordinateurs de votre réseau, modifiez-les pour attribuer des adresses IP commençant par les trois premiers nombres de l’adresse IP de votre serveur. Si
possible, effectuez ces modifications avant de configurer votre serveur. Pour procéder à
ces modifications sur une borne d’accès AirPort, utilisez Utilitaire AirPort (qui se trouve
dans /Applications/Utilitaires/). Pour obtenir des instructions, ouvrez Utilitaire AirPort,
puis consultez le menu Aide. Pour obtenir des informations sur la configuration d’un autre
type de routeur ou de passerelle Internet, consultez la documentation correspondante.Chapitre 8 Personnalisation des services 155
Pour obtenir des informations sur le changement de l’adresse IP de votre serveur, consultez la rubrique « Modification de l’adresse IP de votre serveur » à la page 161.
Après avoir changé l’adresse IP de votre borne d’accès AirPort ou d’un autre routeur
Internet, procédez aux changements nécessaires sur votre serveur et sur les autres ordinateurs de son réseau pour pouvoir utiliser la nouvelle adresse comme adresse de routeur. Pour effectuer ces changements, utilisez la sous-fenêtre Réseau des Préférences
Système sur votre serveur et sur les autres Macs. Pour obtenir des informations sur
le changement d’adresses IP d’autres périphériques, consultez leur documentation.
Personnalisation des services à l’aide d’applications avancées
Bien que Préférences du serveur et le widget d’état du serveur soient les outils les mieux
adaptés pour l’administration d’une configuration standard ou de groupe de travail de
Leopard Server, vous pouvez également utiliser Admin Serveur, Gestionnaire de groupe
de travail, ainsi que d’autres applications et outils avancés énumérés à la rubrique
« Outils et applications avancés » à la page 36. Vous pouvez utiliser les applications et
les outils avancés pour personnaliser des services en modifiant leurs options avancées.
Vous pouvez également activer des services, tels que QuickTime Streaming Server, ne
faisant pas partie d’une configuration standard ou de groupe de travail. Pour obtenir
des informations sur les services, les options et les applications avancés, consultez
Administration du serveur et les autres guides d’administration avancée décrits à la
rubrique « Guides d’administration de Mac OS X Server » à la page 173.156 Chapitre 8 Personnalisation des services
Important : avant d’utiliser Admin Serveur, Gestionnaire de groupe de travail ou d’autres
outils et applications avancés pour apporter des modifications à une configuration
standard ou de groupe de travail, notez soigneusement les réglages actuels au cas où
vous auriez besoin d’y revenir. Vous pouvez, par exemple, faire une capture d’écran de
chaque sous-fenêtre et zone de dialogue avant de changer les réglages qu’elles contiennent. (Pour plus d’informations sur les captures d’écran, basculez vers le Finder, puis
utilisez le menu d’Aide.)9
157
9 Gestion des informations du serveur
Utilisez les Préférences serveur pour obtenir des informations
générales, vérifier les historiques de service, consulter les graphes
d’activité du serveur et modifier les réglages du pare-feu.
Gestion des informations du serveur
Utilisez la sous-fenêtre Informations de Préférences du serveur pour obtenir des informations sur votre serveur, notamment le matériel et les logiciels installés, les noms et
l’adresse réseau, ainsi que le numéro de série. Vous pouvez également modifier le nom
et le numéro de série de l’ordinateur du serveur. Pour plus d’informations sur les réglages et les commandes disponibles dans cette sous-fenêtre, cliquez sur le bouton Aide
situé dans l’angle inférieur droit de la sous-fenêtre Préférences du serveur.158 Chapitre 9 Gestion des informations du serveur
Modification du numéro de série ou des détails de la licence de site
Vous pouvez utiliser Préférences du serveur pour modifier le numéro de série du logiciel
Mac OS X Server et les informations de la licence de site.
Pour modifier le numéro de série du logiciel ou la licence de site :
1 Dans la sous-fenêtre Informations de Préférence du serveur, cliquez sur le bouton
Modifier situé à côté des informations de la licence du serveur.
2 Tapez un autre numéro de série ou modifiez les détails de la licence de site en fonction
de vos besoins, puis cliquez sur Enregistrer.Chapitre 9 Gestion des informations du serveur 159
Modification des réglages de notification
Vous pouvez utiliser Préférences du serveur pour modifier l’adresse électronique à laquelle
le serveur envoie des messages pour vous avertir en cas d’espace disque faible, vous
signaler les mises à jour de logiciels et vous prévenir lorsque des messages électroniques infectés par un virus ont été supprimés. Vous pouvez également activer ou désactiver chaque type de notification.
Pour changer d’adresse électronique de notification :
1 Dans la sous-fenêtre Informations de Préférences du serveur, cliquez sur le bouton
Modifier situé sur la ligne Notifications.
2 Tapez l’adresse électronique souhaitée dans le champ des notifications électroniques.
Si vous souhaitez qu’aucune notification ne soit envoyée, laissez vierge le champ des
notifications électroniques.
3 Sélectionnez les types de notification que doit envoyer le serveur, puis cliquez sur
Enregistrer.
Espace disque faible : envoie un message dès qu’un disque ou une partition contient
moins de 5 pour cent d’espace libre disponible.
Mises à jour de logiciels disponibles : envoie un message lorsque de nouvelles mises à
jour de logiciels sont disponibles pour le serveur.
Virus détecté dans message entrant : envoie un message lorsque le filtre antivirus du
courrier électronique détecte un virus.160 Chapitre 9 Gestion des informations du serveur
Modification du nom de votre serveur
Vous pouvez utiliser Préférences du serveur pour modifier le nom de l’ordinateur du
serveur. Cela permet d’identifier le serveur auprès des ordinateurs clients qui recherchent des serveurs de fichiers en réseau, des files d’attente d’impression ou d’autres
ressources réseau identifiées par un nom d’ordinateur plutôt que par un nom DNS.
Pour modifier le nom de l’ordinateur du serveur :
m Dans la sous-fenêtre Informations de Préférences du serveur, modifiez le champ Nom
de l’ordinateur.
Spécifiez un nom de 63 caractères latins maximum (espaces compris) en évitant d’utiliser
les caractères =, : ou @. Mac OS X convertit automatiquement le nom de l’ordinateur
en format compatible avec le partage de fichiers SMB.
Pour modifier le nom d’hôte local du serveur, utilisez la sous-fenêtre Partage des Préfé-
rences Système sur le serveur. Les autres ordinateurs du réseau local du serveur (sousréseau IP) peuvent utiliser le nom d’hôte local du serveur pour contacter le serveur. Si
vous modifiez le nom d’hôte local de votre serveur, les utilisateurs des autres ordinateurs
devront peut-être modifier leurs signets ou d’autres réglages pour pouvoir utiliser le
nouveau nom d’hôte local du serveur. Pour plus d’informations concernant l’utilisation
des Préférences Système, ouvrez cette sous-fenêtre, puis utilisez le menu Aide.
Seul l’administrateur de votre service DNS peut modifier le nom DNS du serveur. Évitez
de modifier le nom DNS du serveur car cela obligera les utilisateurs de ses services à
reconfigurer leurs ordinateurs.
 Les utilisateurs disposant de Mac OS X 10.5 Leopard doivent utiliser Utilitaire d’annuaire
pour déconnecter leur ordinateur du serveur et pour se connecter de nouveau au
serveur. Chapitre 9 Gestion des informations du serveur 161
 Les utilisateurs disposant d’une version plus ancienne de Mac OS X ou utilisant Windows devront modifier leurs abonnements à des calendriers partagés, leurs adresses
iChat, leurs adresses électroniques, l’adresse du site web du serveur, les adresses wiki
de groupe et l’adresse VPN du serveur.
Modification de l’adresse IP de votre serveur
L’adresse IP du serveur fait partie des réglages de connexion au réseau de la sous-fenêtre
Réseau des Préférences Système. Pour plus d’informations sur la modification des pré-
férences Réseau, ouvrez Préférences Système sur le serveur, puis utilisez le menu Aide.
Important : si votre service DNS est fourni par votre fournisseur d’accès à Internet ou
par un autre serveur situé sur votre réseau, modifiez l’enregistrement DNS de votre serveur afin d’utiliser la nouvelle adresse IP.
La modification de l’adresse IP de votre serveur peut interrompre la connexion des
ordinateurs fonctionnant sous Mac OS X 10.5 Leopard. Si cela se produit, les utilisateurs
de ces ordinateurs doivent utiliser Utilitaire d’annuaire pour déconnecter leur ordinateur
du serveur et pour se connecter de nouveau au serveur. 162 Chapitre 9 Gestion des informations du serveur
Connexion à un serveur de répertoire
Si votre organisation possède un serveur de répertoire, mais que vous n’y avez pas connecté votre serveur lors de la configuration, vous pouvez le faire maintenant. Vous pouvez ensuite importer, pour les membres de votre groupe de travail, des comptes utilisateur
depuis ce serveur de répertoire. Vous pouvez également donner à d’autres comptes
utilisateur du serveur de répertoire l’accès aux services de votre groupe de travail en
définissant ces comptes comme membres de groupe externes. Pour plus d’informations,
consultez les rubriques « Importation automatique de groupes d’utilisateurs » à la
page 78 et « Ajout ou suppression de membres externes d’un groupe » à la page 120.
Utilisez Utilitaire d’annuaire (situé dans /Applications/Utilitaires/) pour vous connecter
à un serveur de répertoire. Pour plus d’informations concernant la connexion à un serveur
de répertoire, ouvrez Utilitaire d’annuaire, puis utilisez le menu Aide.
Votre serveur est considéré comme une configuration de groupe de travail s’il est connecté à un serveur de répertoire.Chapitre 9 Gestion des informations du serveur 163
Modification des réglages de coupe-feu
Utilisez la sous-fenêtre Coupe-feu de Préférences du serveur pour configurer un coupefeu protégeant votre serveur des utilisateurs provenant d’autres réseaux ou d’Internet.
Le coupe-feu contrôle les connexions entrantes provenant de l’extérieur de votre réseau
local (sous-réseau IP). Le coupe-feu permet à des services individuels d’accepter des
connexions entrantes provenant d’ordinateurs hors du réseau local de votre serveur
ou de forcer des services sélectionnés à accepter les connexions entrantes provenant
d’ordinateurs du réseau local de votre serveur. Vous pouvez démarrer le coupe-feu
et sélectionner les services limitant les connexions entrantes. Vous pouvez également
empêcher le coupe-feu d’autoriser les connexions réseau entrantes à tous les services
extérieurs au réseau local de votre serveur.164 Chapitre 9 Gestion des informations du serveur
Pour modifier les réglages de coupe-feu :
1 Dans la sous-fenêtre Coupe-feu de Préférences du serveur, cliquez sur le bouton Activé/
Désactivé pour activer ou désactiver le coupe-feu.
Activez le coupe-feu si vous voulez contrôler séparément les connexions entrantes de
chacun des services de la liste.
Vous pouvez également désactiver le coupe-feu pour autoriser les connexions réseau
entrantes à tous les services extérieurs au réseau local de votre serveur.
2 Dans la liste des services, cochez la case d’un des services si vous voulez que celui-ci
accepte uniquement les connexions entrantes provenant du réseau local du serveur.
Désélectionnez la case d’un des services si vous voulez que celui-ci accepte les connexions entrantes provenant de tous les réseaux, y compris Internet.
Les réglages de la liste des services prennent effet uniquement si le coupe-feu est activé.
À propos du coupe-feu
Mac OS X Server comprend un logiciel coupe-feu que vous pouvez utiliser pour bloquer
les communications réseau indésirables avec votre serveur. Ce coupe-feu est appelé
coupe-feu d’application, car il accepte ou refuse les connexions entrantes en fonction de
l’application, du service ou de tout autre module logiciel particulier essayant d’accepter
la connexion. Ce coupe-feu ne contrôle pas le trafic réseau sortant. Les réglages de la
sous-fenêtre Coupe-feu de Préférences du serveur permettent de contrôler le même
coupe-feu que les réglages de la sous-fenêtre Coupe-feu de la sous-fenêtre Sécurité de
Préférences du serveur. Chapitre 9 Gestion des informations du serveur 165
Mac OS X Server dispose d’un autre coupe-feu fonctionnant différemment. Appelé
coupe-feu IP, il accepte ou refuse le trafic entrant ou sortant en se basant sur les attributs
du trafic, tels que le port de destination ou l’adresse IP d’origine. Le coupe-feu IP peut
être utilisé en même temps que le coupe feu d’application. Pour obtenir des informations sur le coupe-feu IP, consultez la rubrique Administration des services de réseau
(décrite dans « Guides d’administration de Mac OS X Server » à la page 173).
Consultation des historiques du serveur
Utilisez la sous-fenêtre Historiques de Préférences du serveur pour afficher les historiques
de messages conservés par les composants Mac OS X Server lorsqu’ils fournissent des
services. Ces historiques comprennent les messages affichés dans les zones de dialogue
d’avertissement, ainsi que des messages (uniquement visibles dans les historiques)
d’avertissements, d’erreurs et d’opérations de routine. Si vous recevez un message
d’erreur dans une zone de dialogue, un historique peut afficher des détails complé-
mentaires relatifs au problème.166 Chapitre 9 Gestion des informations du serveur
Les messages d’historiques sont plutôt techniques et ne sont pas très compréhensibles pour les utilisateurs moyens, mais ils peuvent aider les techniciens à résoudre
les problèmes.
Voici quelques façons d’utiliser la sous-fenêtre Historiques :
m Sélectionnez un historique dans le menu local Présentation.
Le nom de fichier de l’historique et son emplacement sur le serveur sont affichés au-dessus
du contenu de l’historique.
m Affichez uniquement les entrées d’historique contenant une phrase ou un mot particulier en saisissant ce mot ou cette phrase dans le champ Filtre, en haut de la fenêtre.Chapitre 9 Gestion des informations du serveur 167
m Affichez toutes les entrées de l’historique sélectionné en supprimant le contenu du champ
Filtre ou en cliquant sur le bouton X du champ.
Vous pouvez également afficher les historiques Mac OS X Server et d’autres historiques
via l’application Console (située dans /Applications/Utilitaires/) sur le serveur. Vous pouvez
par exemple utiliser Console pour afficher le fichier console.log qui contient des messages importants provenant d’applications ouvertes sur le serveur. Pour obtenir des informations sur l’utilisation de Console, ouvrez l’application, puis utilisez le menu Aide.168 Chapitre 9 Gestion des informations du serveur
Contrôle des courbes du serveur
Utilisez la sous-fenêtre Courbes des Préférences du serveur pour obtenir une image de
l’activité du serveur sur la durée. Vous pouvez ainsi repérer les moments où le serveur
est habituellement occupé, voir s’il fonctionne presque à son niveau maximum et vérifier à quel moment il est susceptible d’être moins utilisé.Chapitre 9 Gestion des informations du serveur 169
Voici quelques façons d’utiliser la sous-fenêtre Courbes :
m Choisissez un type d’activité et une période dans les menus locaux.
Utilisation du processeur : surveille la charge de travail du ou des processeurs du serveur
(également appelés unités centrales de traitement ou UCT).
Trafic réseau : suit le nombre de données entrantes et sortantes transférées par le serveur
sur le réseau.
Espace disque : vérifiez la quantité d’espace utilisée et la quantité disponible sur chaque
disque monté ou volume (partition).
Trafic du partage de fichiers : suit le nombre de données entrantes et sortantes transférées
par les services de partage de fichiers sur le réseau.
Trafic de site web : suit le nombre de données entrantes et sortantes transférées par les
services web sur le réseau.
Vous pouvez également surveiller l’activité du serveur en utilisant le widget d’état du
serveur directement sur le serveur ou à partir d’un autre ordinateur du réseau. Pour
plus d’informations, consultez la rubrique « Utilisation du widget d’état du serveur »
à la page 59.
Si le serveur possède un écran, vous pouvez utiliser Moniteur d’activité (situé dans
/Applications/Utilitaires/) sur le serveur. Moniteur d’activité affiche les processus et les
applications ouverts sur l’ordinateur. Il vous permet également de surveiller la charge
de travail du processeur à court terme, l’activité des disques et l’activité du réseau. Pour
obtenir des informations sur Moniteur d’activité, ouvrez cette application, puis utilisez
le menu Aide.10
171
10 En savoir plus
Pour en savoir plus sur l’utilisation de Mac OS X Server,
consultez l’aide à l’écran, les guides avancés et le web.
Utilisation de l’aide à l’écran
Vous pouvez obtenir des instructions à l’écran pendant que vous utilisez Leopard Server.
L’aide peut être affichée sur un serveur ou sur un ordinateur administrateur (un ordinateur administrateur est un ordinateur Mac OS X sur lequel est installé le logiciel d’administration de Leopard Server). Pour en savoir plus, consultez la rubrique « Préparation
d’un ordinateur administrateur » à la page 44.
Pour obtenir de l’aide dans le cas d’une configuration standard ou de groupe
de travail de Leopard Server :
m Ouvrez Préférences du serveur, puis :
 Choisissez Aide > Préférences du serveur, pour explorer les rubriques d’aide et faire
des recherches.
 Cliquez sur un bouton d’aide dans Préférences du serveur.
 Utilisez le menu Aide pour rechercher une tâche à exécuter.172 Chapitre 10 En savoir plus
L’aide à l’écran de Préférences du serveur contient toutes les instructions de ce guide
pour gérer une configuration standard ou de groupe de travail de Leopard Server.
L’Aide de Préférences du serveur renferme d’autres rubriques centrées plus particulièrement que le guide sur des tâches spécialisées.
Pour obtenir de l’aide dans le cas d’une configuration avancée de Leopard Server :
m Ouvrez Admin Serveur ou Gestionnaire de groupe de travail, puis :
 Choisissez Aide > Aide Admin Serveur ou Aide > Aide Gestionnaire de groupe de travail
avant d’explorer les rubriques d’aide et d’effectuer des recherches.
 Utilisez le menu Aide pour rechercher une tâche à exécuter.
L’Aide contient des instructions issues de Administration du serveur ainsi que d’autres
guides d’administration avancés décrits dans « Guides d’administration de Mac OS X
Server ».
Pour visualiser les rubriques d’aide les plus courantes à propos du serveur :
m Assurez-vous que le serveur ou l’ordinateur administrateur est connecté à Internet pendant que vous consultez l’Aide.
Visualisation Aide extrait automatiquement depuis Internet et met en cache les rubriques
d’aide les plus courantes concernant les serveurs. Lorsque vous n’êtes pas connecté
à Internet, Visualisation Aide affiche les rubriques d’aide mises en cache.Chapitre 10 En savoir plus 173
Guides d’administration de Mac OS X Server
Premiers contacts traite de l’installation et de la configuration des configurations standard et de groupe de travail de Mac OS X Server. Pour les configurations avancées, consultez Administration du serveur, qui regroupe la planification, l’installation, la
configuration et l’administration du serveur en général. Une série de guides supplé-
mentaires, énumérés ci-dessous, décrit la planification, la configuration, ainsi que la
gestion avancée des services individuels. Vous pouvez obtenir ces guides au format
PDF sur le site web de documentation de Mac OS X Server :
www.apple.com/fr/server/documentation/174 Chapitre 10 En savoir plus
Ce guide ... explique comment :
Premiers contacts et Feuille d’opération d’installation et de configuration
Installer Mac OS X Server et mettre en place
une configuration standard ou de groupe de
travail.
Administration de ligne de commande Installer, configurer et gérer Mac OS X Server
à l’aide de fichiers de configuration et d’outils
de ligne de commande UNIX.
Administration des services de fichier Partager certains volumes ou dossiers de serveur entre les clients du serveur, à l’aide des
protocoles AFP, NFS, FTP et SMB.
Administration du service iCal Configurer et gérer le service de calendrier
partagé d’iCal.
Administration du service iChat Configurer et gérer le service de messagerie
instantanée d’iChat.
Configuration de la sécurité de Mac OS X Renforcer la sécurité des ordinateurs (clients)
Mac OS X, comme l’exigent les entreprises
et les organismes publics.
Configuration de la sécurité de Mac OS X Server Renforcer la sécurité de Mac OS X Server et de
l’ordinateur sur lequel il est installé, comme l’exigent les entreprises et les organismes publics.
Administration du service de messagerie Configurer et gérer les services de messagerie
IMAP, POP et SMTP sur le serveur.
Administration des services de réseau Installer, configurer et administrer les services
DHCP, DNS, VPN, NTP, coupe-feu IP, NAT et
RADIUS sur le serveur.Chapitre 10 En savoir plus 175
Administration d’Open Directory Configurer et gérer les services de répertoire et
d’authentification et configurer les clients autorisés à accéder aux services de répertoire.
Administration de Podcast Producer Configurer et gérer le service Podcast Producer
destiné à enregistrer, traiter et distribuer des
podcasts.
Administration du service d’impression Héberger les imprimantes partagées et gérer les
files d’attente et travaux d’impression associés.
Administration de QuickTime Streaming et Broadcasting
Capturer et encoder du contenu QuickTime.
Configurer et gérer le service QuickTime Streaming en vue de diffuser des données multimé-
dias en temps réel ou à la demande.
Administration du serveur Mettre en place l’installation et la configuration
avancées du logiciel serveur et gérer des options
qui s’appliquent à plusieurs services ou à l’inté-
gralité du serveur.
Administration de Mise à jour de logiciels et
d’Imagerie système
Utiliser NetBoot, NetInstall et Mise à jour de logiciels pour automatiser la gestion du système
d’exploitation et des autres logiciels utilisés
par les ordinateurs clients.
Mise à niveau et migration Utiliser des réglages de données et de services
correspondant à une version antérieure de
Mac OS X Server ou de Windows NT.
Ce guide ... explique comment :176 Chapitre 10 En savoir plus
Visualisation de guides PDF à l’écran
Lorsque vous lisez la version PDF d’un guide à l’écran, vous pouvez :
 Afficher les signets pour visualiser le plan du guide et cliquer sur un signet pour accé-
der directement à la rubrique correspondante.
 Rechercher un mot ou une phrase pour afficher une liste des endroits où ce mot ou
cette phrase apparaît dans le document. Cliquez sur un de ces endroits pour afficher
la page correspondante.
 Cliquer sur une référence croisée pour accéder directement à la rubrique référencée.
Cliquez sur un lien pour visiter le site web dans votre navigateur.
Gestion des utilisateurs Créer et gérer des comptes utilisateur, des groupes et des ordinateurs. Configurer les préférences gérées des clients Mac OS X.
Administration des technologies web Configurer et gérer des technologies web telles
que les blogs, WebMail, wiki, MySQL, PHP, Ruby
on Rails (RoR) et WebDAV.
Administration Xgrid Configurer et gérer des grappes de calcul
de systèmes Xserve et d’ordinateurs Mac.
Glossaire Mac OS X Server Savoir à quoi correspondent les termes utilisés
pour les produits de serveur et les produits
de stockage.
Ce guide ... explique comment :Chapitre 10 En savoir plus 177
Impression des guides PDF
Afin d’économiser du papier et de l’encre et d’améliorer la lisibilité, suivez ces étapes
lorsque vous imprimez un guide :
 Économisez de l’encre ou du toner en évitant d’imprimer la couverture.
 Si vous disposez d’une imprimante couleur, économisez de l’encre en choisissant une
option d’impression en niveaux de gris ou en noir et blanc dans une des sections de
la zone de dialogue Imprimer.
 Réduisez le volume du document imprimé et économisez du papier en imprimant
plusieurs pages par feuille. Dans la zone de dialogue Imprimer, choisissez Présentation dans le menu local sans titre. Si votre imprimante prend en charge l’impression
recto verso (duplex), sélectionnez l’une des options proposées. Dans le cas contraire,
choisissez 2 dans le menu local Pages par feuille et réglez l’échelle sur 115 % (155 %
pour Premiers contacts).
 Pour imprimer Premiers contacts à partir du PDF, il est conseillé d’agrandir les pages
au format CD même si vous n’imprimez pas deux pages par feuille. Réglez l’échelle
sur 155 %.
Si vous utilisez Mac OS X 10.4 ou antérieur, vous trouverez le réglage d’échelle dans
la zone de dialogue Format d’impression.178 Chapitre 10 En savoir plus
Obtenir des mises à jour de documentation
Apple publie régulièrement des pages d’aide révisées ainsi que de nouvelles éditions
de ses guides. Certaines pages d’aide révisées sont des mises à jour des dernières éditions de ces guides.
 Pour afficher les nouvelles rubriques d’aide à l’écran d’une application de serveur,
assurez-vous que votre serveur ou votre ordinateur administrateur est connecté à
Internet et cliquez sur le lien des dernières rubriques d’aide ou de mise à jour dans
la page d’aide principale de l’application.
 Pour télécharger les guides les plus récents en format PDF, rendez-vous sur le site web
de documentation de Mac OS X Server :
www.apple.com/fr/server/documentation/Chapitre 10 En savoir plus 179
Pour obtenir des informations supplémentaires
Pour en savoir plus, consultez les ressources suivantes
Documents Lisez-moi (sur le disque d’installation de Mac OS X Server et le disque Outils
d’administration)
Mises à jour importantes et informations spéciales
Site web de Mac OS X Server (www.apple.com/fr/server/macosx)
Informations complètes sur le produit et la technologie
Site web d’assistance de Mac OS X Server (www.apple.com/fr/support/macosxserver)
Accès à des centaines d’articles du service d’assistance Apple
Sites web (en anglais) de discussions Apple (discussions.apple.com)
Ce site permet de poser des questions à d’autres administrateurs, de partager vos connaissances,
de donner des conseils et d’en recevoir
Site web (en anglais) des listes d’envoi d’Apple (www.lists.apple.com)
Abonnez-vous aux listes d’envoi pour discuter par courrier électronique avec d’autres administrateurs.Annexe
181
A
A Préparation des disques pour
l’installation de Mac OS X Server
Utilisez le programme d’installation, Assistant du serveur ou
Utilitaire de disque si vous devez effacer un disque, le partitionner en plusieurs volumes ou configurer un ensemble RAID.
Outils à utiliser Objectif À quel moment
Programme d’installation Effacer le disque cible en utilisant un format courant
Pendant l’installation locale
Assistant du serveur Effacer le disque cible en utilisant le format le plus courant :
Mac OS X Étendu (journalisé)
Pendant l’installation à distance
Utilitaire de disque Effacer le disque cible en utilisant des formats moins courants, partitionner l’intégralité
du disque en plusieurs volumes ou configurer un ensemble RAID
Pendant l’installation locale
Avant l’installation à distance182 Annexe A Préparation des disques pour l’installation de Mac OS X Server
Pour plus d’informations concernant l’utilisation du programme d’installation, d’Assistant
du serveur et d’Utilitaire de disque au cours de l’installation, reportez-vous au chapitre 2,
« Installation de Mac OS X Server ». Pour plus d’informations concernant le contrôle
d’Utilitaire de disque à distance (depuis un autre ordinateur) à l’aide d’Apple Remote
Desktop (que vous pouvez acheter séparément) avant l’installation à distance, reportez-vous à Administration du serveur (décrit dans « Guides d’administration de Mac OS X
Server » à la page 173).
Effacement à l’aide du programme d’installation
Vous pouvez effacer le disque cible lorsque vous utilisez le programme d’installation
de Mac OS X Server. Lorsque vous sélectionnez le disque cible dans le programme
d’installation, une option permettant d’effacer le disque cible durant l’installation vous
est proposée. Vous avez le choix entre deux formats de disque :
 Mac OS Étendu (Journalisé) est l’option recommandée. Il s’agit du format le plus courant
pour un volume de démarrage Mac OS X Server.
 Mac OS Étendu (sensible à la casse, journalisé) mérite votre attention si vous envisagez
d’héberger sur votre serveur un site web conventionnel à contenu web statique plutôt
que des sites web wiki de groupe. Les volumes sensibles à la casse peuvent héberger
du contenu web statique avec une correspondance plus directe entre les fichiers et
les adresses URL.
AVERTISSEMENT : avant de partitionner un disque, de créer un ensemble RAID ou
d’effacer un disque ou une partition sur un serveur, sauvegardez toutes les données
d’utilisateur que vous souhaitez enregistrer en les copiant sur un autre disque.Annexe A Préparation des disques pour l’installation de Mac OS X Server 183
Important : un logiciel tiers risque de ne pas fonctionner correctement s’il est installé
sur un volume sensible à la casse en raison d’une discordance imprévue de l’emploi
des majuscules. Une application peut, par exemple, comporter un dossier nommé
« Modules », alors que certaines parties de cette application appellent ce dossier
« modules ». Cela ne poserait aucun problème sur un volume Mac OS Étendu (journalisé), mais pas sur un volume Mac OS Étendu (sensible à la casse, journalisé).
Effacement à l’aide d’Assistant du serveur
Si vous utilisez Assistant du serveur pour installer Mac OS X Server à distance et si
Mac OS X Server ou Mac OS X est déjà installé sur le disque cible, Assistant du serveur
ne peut effacer le disque qu’en utilisant le format Mac OS Étendu (journalisé).
Effacement à l’aide d’Utilitaire de disque
Pour bénéficier d’un plus grand choix de formats, utilisez le menu Utilitaires du programme d’installation pour ouvrir l’application Utilitaire de disque, puis effacez le disque
cible à l’aide de cette application. Vous pouvez choisir les formats décrits à la page
précédente ou choisir leurs variantes non journalisées : Mac OS Étendu et Mac OS
Étendu (sensible à la casse). Le format ZFS ne convient pas aux disques de démarrage
Mac OS X Server.
Les versions plus anciennes de Mac OS X et de Mac OS X Server permettent également
d’effacer des disques en utilisant le format de fichiers UFS (UNIX File System). N’utilisez
pas ce format pour les disques de démarrage Mac OS X Server.184 Annexe A Préparation des disques pour l’installation de Mac OS X Server
Partitionnement d’un disque dur
Partitionner le disque dur permet de créer un volume destiné au logiciel système du
serveur et un ou plusieurs autres pour les données et les autres logiciels. La taille minimale recommandée pour une partition d’installation est de 20 Go. Un volume plus
important est recommandé pour les configurations standard ou les configurations de
groupe de travail, car elles conservent les dossiers partagés et les sites web de groupe
sur le volume de démarrage avec le logiciel serveur. Utilisez Utilitaire de disque pour
partitionner un disque dur.
Création d’un ensemble RAID
Si vous installez Leopard Server sur un ordinateur doté de plusieurs disques durs internes,
vous pouvez créer un ensemble RAID (matrice redondante de disques indépendants)
pour optimiser la capacité de stockage, améliorer les performances et augmenter la
fiabilité en cas de défaillance de disque. Un ensemble RAID en miroir, par exemple,
augmente la fiabilité en écrivant vos données simultanément sur deux disques ou plus.
Si l’un des disques est défaillant, votre serveur utilise automatiquement l’un des autres
disques de l’ensemble RAID.
Utilitaire de disque vous permet de configurer un ensemble RAID. Vous pouvez configurer la mise en miroir RAID après avoir installé Mac OS X Server si le disque utilisé
n’est pas partitionné. Afin d’éviter toute perte de données, vous devez configurer la
mise en miroir RAID le plus tôt possible. Pour plus d’informations sur la configuration
d’un ensemble RAID, ouvrez Utilitaire de disque, puis utilisez le menu Aide.Annexe
185
B
B Configuration d’un routeur Internet
Configurez une borne d’accès AirPort ou un routeur Internet, afin
de rendre les services de votre serveur disponibles via Internet.
Si vous disposez d’un routeur Internet ou d’une passerelle partageant une connexion
Internet entre les ordinateurs de votre réseau local, ce routeur ou cette passerelle isole
votre réseau local d’Internet. Les ordinateurs connectés à Internet ne peuvent pas accé-
der aux services fournis par votre serveur, à moins que votre routeur ne soit configuré
pour réexpédier vers votre serveur les requêtes effectuées auprès de chaque service.
Dans ce processus de réexpédition de ports (ou mappage de ports) chaque service
communique par le biais d’un port de communication numéroté et abstrait. Ces ports
ne sont pas physiques comme le port Ethernet de votre ordinateur.
Configuration du mappage des ports sur une borne d’accès
AirPort Extreme
Une configuration standard ou de groupe de travail de Mac OS X Server version 10.5
Leopard peut configurer automatiquement le mappage de ports sur une borne d’accès
AirPort Extreme (802.11n). Le serveur configure l’AirPort Extreme pour rendre les services
iChat, courrier électronique, web et VPN disponibles sur Internet. Le serveur configure
l’AirPort Extreme séparément pour chaque service lors du démarrage et de l’arrêt
du service.186 Annexe B Configuration d’un routeur Internet
Le serveur peut configurer automatiquement un mappage de ports sur une borne
d’accès AirPort utilisant le mot de passe par défaut (public). Si le mot de passe de la
borne d’accès AirPort est différent, vous pouvez le saisir lors de l’installation locale du
serveur et ce dernier peut ainsi configurer un mappage de ports sur la borne d’accès. Si
vous procédez à l’installation de votre serveur à distance, il pourra configurer automatiquement le mappage de ports, à condition que votre borne d’accès utilise le mot de
passe par défaut. Le mot de passe par défaut étant cependant généralement connu,
son utilisation compromet la sécurité de votre réseau sans fil.
Pour configurer automatiquement une borne d’accès AirPort, l’option Mode IPv6 doit
être réglée sur Tunnel dans l’application Utilitaire AirPort (située dans /Applications/Utilitaires/). La borne d’accès AirPort doit être configurée pour partager une connexion
Internet avec les ordinateurs qui y sont connectés via Ethernet.
Seules les configurations standard et de groupe de travail de Leopard Server peuvent
configurer automatiquement une borne d’accès AirPort. Les configurations avancées
de Leopard Server laissent le mappage de ports aux soins de l’administrateur.
Remarque : les utilisateurs ayant des comptes sur votre serveur doivent créer une connexion VPN vers votre serveur pour obtenir un accès distant sécurisé à tous les services
via Internet. La configuration de la réexpédition de ports, qu’elle soit automatique sur
un AirPort Extreme ou manuelle comme expliqué plus bas, ne rend disponibles via
Internet que certains des services de votre serveur.Annexe B Configuration d’un routeur Internet 187
Configuration manuelle du mappage de ports sur un routeur
Internet
Vous pouvez configurer manuellement le mappage de ports sur la plupart des routeurs
Internet en utilisant leur logiciel de configuration. Ce logiciel de configuration est
généralement constitué de plusieurs pages web. Ouvrez Safari, puis accédez à la page
web contenant les réglages de mappage de ports ou de réexpédition de ports. Dans
certains cas, vous pouvez sélectionner des services standard, tels que web ou VPN, et
spécifier que chacun d’entre eux doit être associé à l’adresse IP de votre serveur. Dans
d’autres cas, vous devez saisir les numéros de port des services, puis saisir l’adresse IP
de votre serveur pour chacun d’entre eux. 188 Annexe B Configuration d’un routeur Internet
Le tableau suivant regroupe les services et les ports correspondant pour lesquels il peut
être utile de configurer le mappage ou la réexpédition de ports. Certains routeurs Internet
peuvent vous demander de spécifier le protocole TCP ou UDP pour chaque port, d’autres
non. Pour obtenir des informations spécifiques sur la manière de configurer une réexpé-
dition de ports sur votre routeur Internet, reportez-vous à la documentation du routeur.
Service Port TCP ou UDP
Service iChat
iChat serveur à serveur
Proxy de transfert de fichiers
iChat
5269
7777
TCP
TCP
Service de messagerie
SMTP 25 TCP
Service web
HTTP 80 TCP
Service VPN
ISAKMP/IKE
L2TP
PPTP
IKE NAT Traversal
500
170
1723
4500
UDP
UDP
TCP
UDP189
Index
Index
A
accès
dossier 132
groupes 116
utilisateur 84, 86, 123
utilisateur root 52
administrateur
comptes 52
comptes pour 72, 87
configuration 52, 72, 88
Admin Serveur 64, 155
adresse IP
passerelle 50, 53
serveur, modification 161
serveur distant 47, 54
service VPN 152, 153
adresses électroniques 68, 115,
159
aide, utilisation 171
Apple Remote Desktop 48, 182
application Répertoire 97, 110
applications 35, 36
Voir aussi les applications
individuellement
archivage
listes d’envoi de
groupe 127
messages instantanés 138
Assistant du serveur 44, 45, 49,
50, 53
authentification
réseau sans fil 41
serveur relais pour le
courrier
électronique 141
services de groupe 116
utilisateur 71
VPN 149, 150
Voir aussi mots de passe
autorisation, fichier 132, 133
autorisations, root 52
B
blogs 19, 144, 147
borne d’accès AirPort
mappage de ports 185
sécurité 41
service DHCP de 153
VPN via 154
C
calendrier 74
calendriers. Voir service iCal
CIFS (Common Internet File
System). Voir SMB
ClamAV 142
Common Internet File System.
Voir SMB
compte administrateur
local 72, 88
comptes
administrateur 52, 72, 87
importation 76, 78, 87, 91
Voir aussi comptes de
groupe; comptes
utilisateur
comptes de groupe
ajout 110, 114
attribution de nom 123
membres 118, 120
réglages 122
suppression 110, 117
comptes utilisateur
ajout 74190 Index
appartenance à un
groupe 85
à propos 68, 72
Gestionnaire de groupe de
travail 87
importation 76, 87, 91
locaux 70
mots de passe 76, 87
noms 75, 86
réglages 81
standard 52, 73
suppression 80
Voir aussi administrateur;
Comptes de groupe;
utilisateurs
configuration
administrateur 52, 72, 88
à propos 25
borne d’accès AirPort 41,
153, 154, 185
mappage de ports 185
routeur Internet 154, 187
utilisateurs 68
Voir aussi configuration
avancée; configuration
standard; configuration
de groupe de travail
configuration, serveur
Voir aussi configuration
à distance 53
locale 50
configuration avancée
applications 36
à propos 25, 32
conversion 25
documentation 173
importation d’utilisateurs
de 87
services 32
configuration de groupe de
travail
applications 35
à propos 25, 30, 32
connexion au
répertoire 162
courbes 168
documentation 171, 178
gestion à distance 61, 62
graphiques 59
historiques 165
informations du
serveur 157
informations sur le
serveur 59
mise à jour de logiciels 64
mot de passe
d’administrateur 52
partage de fichiers 129
réglages 61
réglages de coupe-feu 163
restauration du serveur 63
sauvegarde du serveur 63
service de messagerie 139,
141
service iCal 134
service iChat 136
services compris 32
services web 143, 145
service VPN 107, 109, 148,
152
Voir aussi comptes de
groupe; services;
comptes utilisateur
configuration requise 40
configuration standard
applications 35
à propos 25, 27, 32
courbes 168
documentation 171, 178
gestion à distance 61, 62
graphiques 59
historiques 165
informations du serveur 59,
157
mise à jour de logiciels 64
mot de passe
d’administrateur 52
partage de fichiers 129
réglages 61
réglages de coupe-feu 163
restauration du serveur 63
sauvegarde du serveur 63Index 191
service de messagerie 139,
141
service iCal 134
service iChat 136
services compris 32
services web 143, 145
service VPN 107, 109, 148,
152
Voir aussi comptes de
groupe; services;
comptes utilisateur
conventions d’attribution de
nom
utilisateurs 75, 86
conventions de nom
groupes 123
nom de l’ordinateur 160
courbes, serveur 168
courrier électronique. Voir
service de messagerie;
messages
D
détection des messages
indésirables 141, 142
détection des virus 141, 142,
159
disque dur. Voir disques
disque en miroir. Voir en miroir,
disque
disques
effacement 182
formats 182, 183
installation cible 42, 46
partition 182, 184
documentation 173, 176, 177,
178
dossier de groupe 123, 129
dossier Public 129
dossiers partagés
dossier de groupe 123
Voir partage de fichiers
F
FAI (fournisseur d’accès à
Internet) 140
formats, disque 182, 183
fournisseur d’accès à
Internet 161
G
Gestionnaire de groupe de
travail 87, 155
graphiques, serveur 59
groupes
adhésion 118, 120
appartenance 85
attribution de nom 123
contrôle de l’accès 116
dossiers partagés 123, 129
importation 78
liste d’envoi 124, 127
partage de calendrier 126
réglages 113, 122
wikis 124, 126, 127, 146
H
historiques, serveur 165
I
importation
comptes utilisateur 76, 87,
91
groupes 78
informations de contact,
utilisateur 83
installation
à distance 45
à propos 39
automatisée 39
avancée 39
configuration requise 40
disque cible 42, 46
emplacement physique 40
information sur 39
locale 42
logiciel serveur 39, 42, 45
nouvelle 42, 45
préparation pour 40, 44,
182
sauvegarde avant 182
sécurité 41
spéciale 42, 45
installation automatisée 39
interfaces, réseau192 Index
Voir ports, Ethernet
J
journaux web. Voir blogs
L
L2TP (Layer Two Tunneling
Protocol) 149
Lecteur DVD 40
Leopard Server. Voir Mac OS X
Server
liste d’envoi 124, 127
logiciel. Voir Mac OS X Server
LTTP. Voir L2TP
M
Mac OS X Server
à propos de 12
configuration 49
installation 39
mise à jour 64
mappage de ports 185
matrices, disques. Voir RAID
messagerie instantanée.
Voirservice iChat
messages
accueil 89
invitation de groupe 92
invitation du groupe 121
invitation du serveur 91,
101
notifications 159
Voir aussi service iChat;
service de messagerie
mise à jour 64, 178
Mise à jour de logiciels 64
mise en miroir, disque 184
Moniteur d’activité 169
mots de passe
administrateur 52, 72, 88
compte utilisateur 76, 87
secret partagé 150
utilisateur root 52
N
nom abrégé 75, 114
nom d’hôte local 160
nom de domaine 160
nom de l’ordinateur 160
notifications 159
numéro de série
logiciel 41, 158
matériel 41, 47
O
ordinateur administrateur 44,
61
ordinateurs client
Voir ordinateurs
d’utilisateurs
ordinateurs des utilisateurs
configuration 95
connexion au serveur 95,
100, 101, 103
gestion 95
informations de
répertoire 110
secret partagé 149, 150
outils antivirus. Voir détection
de virus
P
partage d’imprimantes 14
partage de fichiers
adresses de serveur 133
ajout d’un fichier 130
à propos de 130
contrôle de l’accès 132
dossier de groupe 129
dossier Public 129
gestion 129
suppression de
dossiers 131
passerelle, serveur 50, 53
Voir aussi routeur Internet
photo, utilisateur 88
Podcast Producer 21
points de partage Voir partage
de fichiers
ports, coupe-feu 108, 109
ports Ethernet 50, 53
préférences. Voir Préférences
du serveur; Préférences
Système
Préférences du serveurIndex 193
à propos 57
recherche de réglages 61
utilisation à distance 61, 62
Préférences Système
adresse IP du serveur 161
comptes utilisateur 70, 72,
96
nom d’hôte local 160
sécurité de l’ordinateur 74
Time Machine 63
Programme d’installation 42,
63, 182
protocoles
AFP 133
CalDAV 135
IMAP 140
L2TP 149
POP 140
SMB 133
SMTP 140
XMPP 138
Protocole SMB (Server Message
Block). Voir SMB
R
RAID (matrice redondante de
disques
indépendants) 184
rechercher à l’aide de
Spotlight 23
réexpédition de ports.
Voirmappage de ports
réglages de coupe-feu 108,
109, 163
requise, configuration 40
réseau
adresse IP 152, 161
coupe-feu 163, 164
sécurité 41
VPN 148
ressources partagées 110
Voir aussi partage de fichiers
restauration du serveur 63
routeur. Voir routeur Internet
routeur Internet
mappage de ports 187
service DHCP de 153
VPN via 154
S
sauvegarde
avant l’installation 182
restauration à partir de 63
serveur 63
secret partagé 149, 150
sécurité
administrateur 52, 74
authentification 68, 116,
150
borne d’accès AirPort 41
installation 41
réglages de coupe-feu 163
réseau sans fil 41
root 52
secret partagé 149, 150
Voir aussi accès; mots de
passe
serveur de répertoire
connexion à 162
importation
d’utilisateurs 69, 76
importation de groupes 78
membres de groupes 92
membres du groupe 121
serveur DHCP 47, 152, 154
serveur local
configuration 50
installation 42
serveur relais, messagerie 140
serveurs
a 133, 145, 147, 148
adresse IP 161
configuration 49
courbes 168
emplacement physique 40
gestion 57
graphiques 59
historiques 165
informations sur 157
installation 39
logiciel 39
mise à jour 64194 Index
noms 160
numéro de série de 41, 47
numéro de série pour 158
restauration 63
sauvegarde de 63
surveillance de l’état 59
Voir aussi serveur de
répertoire; serveurs
distants; services
serveurs distants
configuration 53
état du serveur 59
installation 45
Préférences du serveur 61,
62
service AFP (Apple Filing
Protocol) 133
service AFP (Apple Filing
Protocol) Voir AFP
service de conversation.
Voir iChat
service de messagerie
à propos de 139
configuration
utilisateur 105
détection des messages
indésirables 141, 142
détection des virus 141, 142
détection de virus 159
liste d’envoi du groupe 124,
127
mappage de ports 188
serveur relais 140
webmail 147
service de protocole SMB
(Server Message
Block) 133
service DNS (Domain Name
System) 133, 161
service iCal
à propos de 16, 135
calendrier de groupe 126
configuration
utilisateur 105
gestion 134
restrictions concernant les
données de
l’utilisateur 135
tailles des pièces
jointes 135
service iChat
à propos de 136
archivage des
messages 138
configuration
utilisateur 105
enregistrement des
messages 138
gestion 136
Google Talk 138
mappage de ports 188
réglages concernant les
contacts 136
services XMPP 138
service mail
gestion 139
services
à propos 32
contrôle de l’accès d’un
utilisateur 84
gestion 57
groupe 115
historiques 165
mappage de ports 185
surveillance de l’état 59
Voir aussi services individuels
services web
à propos de 144
blogs d’utilisateur 144, 147
gestion 143
mappage de ports 188
wikis 144, 146
sites web
adresses 145, 147, 148
hébergement
conventionnel 145
wiki 124, 126, 127, 144
calcul 64 bits 24
spam. Voir détection des
messages indésirables
Spotlight 23
SSH 41Index 195
systèmes de messagerie
XMPP 138
T
Time Machine 63
trouver à l’aide de Spotlight 23
U
UCE (courrier commercial non
sollicité) Voir détection
des messages
indésirables
UNIX 24
utilisateur root 52
utilisateurs
à propos 67
attribution d’un nom 75, 86
authentification 68
blogs 19, 144, 147
configuration 68
contrôle de l’accès 84, 86,
123
gestion 95
Gestionnaire de groupe de
travail 87
informations de contact 83
messages 89, 91, 92
messages à 101, 121
photo 88
restrictions concernant les
données iCal 135
root 52
Voir aussi groupes; comptes
utilisateur; ordinateurs
d’utilisateurs
utilisateurs de Leopard
adresse IP du serveur 161
configuration 95, 99, 101,
103
informations de
répertoire 97, 110
nom DNS du serveur 160
utilisateurs de Tiger 105
Utilitaire d’annuaire 103, 160,
161
utilitaire de disque 183, 184
V
virtual private network. Voir
VPN
VNC 41
volumes, installation 47
VPN (virtual private network)
adresses IP 152
à propos de 149
connexion de
l’utilisateur 107, 109
coupe-feu 108, 109
fichier de configuration 151
gestion 148
mappage de ports 188
routeur Internet 154
secret partagé 150
W
webmail 147
widget d’état du serveur 59
wikis
à propos 18
services de groupe 124
services web 144
Félicitations, vous et votre Mac mini
êtes faits l’un pour l’autre.Table des matières 3
Table des matières
Chapitre 1: Configurez, utilisez
7 Gestion de Mac OS X Server
8 Contenu de la boîte
9 Configuration de votre Mac mini
16 Configuration de Partage de CD ou DVD
18 Pour obtenir des informations supplémentaires sur votre Mac mini
21 Extinction ou suspension d’activité de votre Mac mini
Chapitre 2: Prise en main de votre Mac mini
26 Description de la face avant de votre Mac mini
28 Description de la face arrière de votre Mac mini
30 Utilisation de la télécommande Apple Remote
33 Informations complètes
Chapitre 3: Une solution à chaque problème
40 Problèmes vous empêchant d’utiliser votre Mac mini
42 Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X »
46 Autres problèmes
48 Utilisation d’Apple Server Diagnostics
49 En cas de problème de connexion à Internet4 Table des matières
52 Problèmes de communications sans fil AirPort Extreme
53 Maintien à jour de votre logiciel
53 En savoir plus, service et assistance
57 Localisation du numéro de série de votre produit
Chapitre 4: Dernières recommandations
61 Informations importantes sur la sécurité
64 Informations importantes sur la manipulation
66 Principes ergonomiques
69 Apple et l’environnement
71 Regulatory Compliance Information1
1 Configurez, utilisez
www.apple.com/fr/macmini
Aide Mac Assistant serveurChapitre 1 Configurez, utilisez 7
Votre Mac mini est conçu pour être configuré facilement et utilisé immédiatement. Si
vous n’avez jamais utilisé de Mac mini ou n’êtes pas familiarisé avec les ordinateurs
Macintosh, vous trouverez dans ce chapitre des instructions pour débuter.
Important : lisez toutes les instructions d’installation et les consignes de sécurité à partir de la page 61 avant de brancher votre Mac mini à une prise électrique.
Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser
votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2,
« Prise en main de votre Mac mini, » pour découvrir les nouvelles fonctionnalités de
votre Mac mini.
De nombreuses réponses se trouvent dans l’Aide Mac de votre Mac mini. Pour en
savoir plus sur l’Aide Mac, reportez-vous à la rubrique « Informations complètes » à la
page 33.
Gestion de Mac OS X Server
Après avoir configuré votre Mac mini, ce dernier est alors prêt pour héberger l’intégralité des services fournis par Mac OS X Server. Pour en savoir plus sur la configuration et
l’usage de Mac OS X Server, reportez-vous à Mac OS X Server : Premiers contacts accessible sur le CD des outils Admin Tools. Pour en savoir plus sur les logiciels serveur, consultez l’ensemble de la documentation sur le site web des ressources serveur d’Apple à
l’adresse www.apple.com/fr/server/macosx/resources.8 Chapitre 1 Configurez, utilisez
Contenu de la boîte
Votre Mac mini est fourni avec les composants suivants :
Avant de configurer votre Mac mini, enlevez le film protecteur situé à l’extérieur de
votre ordinateur et de son adaptateur secteur. Suivez la procédure décrite dans les
pages suivantes pour le configurer.
Important : ne placez jamais d’objet sur votre Mac mini, car cela pourrait provoquer
des interférences avec les signaux sans fil AirPort ou Bluetooth®
.
Adaptateur Mini-DVI
vers DVI
Câble secteur Adaptateur secteurChapitre 1 Configurez, utilisez 9
Configuration de votre Mac mini
Placez votre Mac mini à l’endroit ou sur une face latérale, mais pas sur sa face supé-
rieure. Utilisez l’adaptateur secteur fourni avec votre Mac mini, à l’exclusion de tous les
autres.
Étape 1: Branchez le câble d’alimentation de l’adaptateur secteur à votre
Mac mini, puis branchez le cordon de l’adaptateur à une prise de terre.
®10 Chapitre 1 Configurez, utilisez
Étape 2: Pour accéder à Internet ou à un réseau, connectez une extrémité du câble
Ethernet à votre Mac mini et l’autre à un modem câble, à un modem DSL ou à un
réseau.
La technologie AirPort Extreme de gestion sans fil réseau est intégrée à votre Mac mini.
Pour en savoir plus sur la configuration d’une connexion sans fil, choisissez Aide > Aide
Mac, puis recherchez le terme « AirPort ».
®Chapitre 1 Configurez, utilisez 11
Étape 3: Connectez le câble USB de votre clavier et de votre souris.
Votre Mac mini n’est pas livré avec un clavier ou une souris, mais vous pouvez utiliser
pratiquement n’importe quel clavier USB et n’importe quelle souris USB avec votre
ordinateur. Si votre clavier dispose d’un port USB (d), vous pouvez connecter votre souris à ce dernier. Dans le cas contraire, vous pouvez connecter la souris à un des ports
USB (d) situés à l’arrière de votre Mac mini.
®12 Chapitre 1 Configurez, utilisez
Vous pouvez utiliser les préférences Clavier pour modifier le comportement des touches de modification Verrouillage Majuscules, Contrôle, Option et Commande (x). Pour
ouvrir les préférences Clavier, choisissez le menu Pomme () > Préférences système,
cliquez sur Clavier, puis sur « Touches de modification…». Suivez les instructions à
l’écran.
Si vous utilisez un clavier USB qui n’est pas spécialement conçu pour Mac OS, il se peut
qu’il ne soit pas doté d’une touche de modification Commande (x) ou Option, touches standard sur les claviers Apple. Si vous disposez d’un clavier d’un autre fabricant :
 La touche Windows (l’icône sur la touche ressemble au logo de Windows) équivaut à
la touche de modification Commande (x) d’un clavier Apple.
 La touche Alt équivaut à la touche de modification Option d’un clavier Apple.
Si vous utilisez une souris ou un clavier USB provenant d’un fabricant, des gestionnaires logiciels seront sans doute requis. Visitez le site Internet du fabricant pour trouver
les gestionnaires les plus récents.
Utilisation d’un clavier ou d’une souris sans fil
Si vous avez acheté un clavier ou une souris Apple sans fil avec votre Mac mini, suivez
les instructions qui accompagnent ces périphériques pour les configurer avec le
Mac mini.Chapitre 1 Configurez, utilisez 13
Étape 4: Branchez un câble vidéo sur le port mini-DVI ou Mini DisplayPort.
Votre Mac mini est livré sans moniteur. Vous pouvez brancher un écran doté d’un :
 Port Mini DisplayPort. Connectez-le directement au port Mini DisplayPort.
 Connecteur DVI. Utilisez l’adaptateur Mini-DVI vers DVI fourni avec votre Mac mini
pour le brancher sur le port mini-DVI.
 Connecteur VGA. Utilisez l’adaptateur Mini-DVI vers VGA pour le brancher
sur le port Mini-DVI ou l’adaptateur port Mini DisplayPort vers VGA pour le
brancher sur le port Mini DisplayPort. Des adaptateurs sont disponibles à l’adresse
www.apple.com/fr/store ou dans votre Apple Store le plus proche.
®
Port Mini-DVI Port Mini
DisplayPort14 Chapitre 1 Configurez, utilisez
Étape 5: Appuyez sur le bouton d’alimentation (®) à l’arrière du Mac mini pour
l’allumer.
Étape 6: Configurez votre Mac mini à l’aide de l’Assistant de Mac OS X Server.
La première fois que vous allumez votre Mac mini, l’Assistant de Mac OS X Server vous
demande alors de founir quelques renseignements de base que Mac OS X Server
nécessite afin de pouvoir démarrer et se connecter au réseau. Préparez les informations suivantes la première fois que vous allumez votre Mac mini afin de les
renseigner :
 les nom et mot de passe du compte d’un administrateur serveur ;
 le numéro de série de votre logiciel Mac OS X Server ;
®
®Chapitre 1 Configurez, utilisez 15
 les réglages détaillés du réseau, notamment l’adresse IP, le masque de sous-réseau et
les serveur DNS ;
 si vous choisissez de créer des comptes utilisateur ou groupe sur votre Mac mini ou
d’utiliser des comptes d’un service de répertoire existant.
Pour obtenir une liste des informations nécessaires pour entièrement configurer votre
Mac mini à l’aide d’Assistant du serveur, reportez-vous à Mac OS X Server : Installation
and Setup Worksheet Feuille d’opérations pour l’installation et la configuration accessible depuis le DVD d’installation de Mac OS X Server (ou depuis le site web des ressources serveur d’Apple à l’adresse www.apple.com/fr/server/macosx/resources.
Si vous possédez déjà un ordinateur Mac fonctionnant sous Mac OS X Server 10.4, 10.5
ou 10.6, l’Assistant de Mac OS X Server peut vous aider à transférer automatiquement
les réglages système, ceux des services, les comptes utilisateur, les fichiers, les applications et d’autres informations de votre ancien Mac vers votre Mac mini.Utilisez une
connexion Ethernet, FireWire ou sans fil pour transférer ces informations.
Pour en savoir plus sur l’utilisation des services sous Mac OS X Server, reportez-vous
au document Mac OS X Server : Premiers contacts inclus avec votre Mac mini.
Pour obtenir des renseignements détaillés sur Mac OS X Server, accédez à
www.apple.com/fr/server/macosx/resources.16 Chapitre 1 Configurez, utilisez
Étape 7: Personnalisez le bureau et réglez vos préférences
Vous pouvez facilement personnaliser votre bureau à l’aide des Préférences Système,
votre centre de commandes pour la plupart des réglages de votre Mac mini. Choisissez
le menu Pomme () > Préférences Système dans la barre des menus ou cliquez sur
l’icône Préférences Système située dans le Dock. Pour en savoir plus, choisissez Aide >
Aide Mac, puis recherchez « Préférences Système » ou le nom de préférences spécifiques à modifier.
Configuration de Partage de CD ou DVD
Vous pouvez utiliser Partage de CD ou DVD pour créer un « partenariat » entre votre
Mac mini et un autre ordinateur Mac ou Windows équipé d’un lecteur de disque optique et situé sur le même réseau câblé ou sans fil. Utilisez cet autre ordinateur pour :
 partager le contenu de DVD ou CD ou installer des applications (voir « Partage de disques avec « Partage de CD ou DVD » » à la page 18) ;
 installer Mac OS X Server à distance (voir « Réinstallation de logiciels à l’aide de
« Installation à distance de Mac OS X » » à la page 42) ou passer par Utilitaire de disque (voir « Utilisation d’Utilitaire de disque » à la page 45).
L’ordinateur équipé du lecteur optique peut être un Mac disposant de Mac OS X 10.4.11
ou ultérieur ou un ordinateur Windows XP ou Windows Vista. Si le Mac dispose de
Mac OS X 10.5.5 ou d’une version ultérieure, « Partage de CD ou DVD » est déjà installé.
Vous pouvez créer des partenariats avec plusieurs ordinateurs. Chapitre 1 Configurez, utilisez 17
Si l’autre ordinateur est un ordinateur Windows ou un Mac avec une version Mac OS X
antérieure à 10.5.5, insérez le DVD d’installation de Mac OS X fourni avec votre Mac mini
pour installer « Configuration du partage de CD ou DVD », qui inclut les logiciels pour
Partage de CD ou DVD, l’Assistant migration et Installation à distance de Mac OS X :
 Si l’autre ordinateur est un ordinateur Windows, choisissez « Partage de CD ou DVD »
à partir de l’Assistant d’installation qui démarre automatiquement.
 Si l’autre ordinateur est un Mac, double-cliquez sur le paquet de Configuration du
partage de CD ou DVD sur le DVD d’installation de Mac OS X.
Important : après avoir installé le paquet « Configuration du partage de CD ou DVD »
sur votre autre Mac, assurez-vous que vous disposez de la dernière version disponible
du logiciel, en choisissant Apple () > « Mise à jour de logiciels ». Installez toutes les
mises à jour de logiciels Mac OS X disponibles.18 Chapitre 1 Configurez, utilisez
Pour obtenir des informations supplémentaires sur votre
Mac mini
Si vous voulez installer des applications de tierces parties à partir d’un CD ou d’un DVD,
vous pouvez les installer sur votre Mac mini ou partager les informations en utilisant un
lecteur de disque optique sur un autre ordinateur Mac ou Windows (si « Partage de CD
ou DVD » est configuré et activé). Consultez la rubrique suivante pour plus d’informations.
Partage de disques avec « Partage de CD ou DVD »
Vous pouvez activer « Partage de CD ou DVD » sur un ordinateur Mac ou Windows afin
d’utiliser la fonctionnalité de disque distant de votre Mac mini. Le disque distant vous
permet de partager les disques que vous insérez dans le lecteur de disque optique de
l’autre ordinateur. Certains disques, notamment les DVD ou les disques de jeu, peuvent
être protégés en copie et donc inutilisables par le biais de « Partage de CD ou DVD ».
Assurez-vous d’avoir activé « Partage de CD ou DVD » sur tout ordinateur Mac ou Windows avec lequel vous souhaitez créer un partenariat. Pour en savoir plus, reportezvous à la page 16.
Pour activer « Partage de CD ou DVD » si votre autre ordinateur est un Mac :
1 Assurez-vous que l’autre Mac et votre Mac mini sont sur le même réseau sans fil.
Vérifiez l’icône d’état AirPort (Z) dans la barre des menus pour savoir à quel réseau
vous êtes connecté.Chapitre 1 Configurez, utilisez 19
2 Sur l’autre Mac, choisissez Pomme () > Préférences Système puis ouvrez Partage.
3 Dans la sous-fenêtre Partage, sélectionnez « Partage de CD ou DVD » dans la liste des
services. Si vous souhaitez que les autres utilisateurs doivent demander la permission
d’utiliser un DVD ou CD que vous partagez, cochez la case « Me demander avant
d’autoriser l’utilisation de mon lecteur DVD ».
Pour activer « Partage de CD ou DVD », si votre autre ordinateur est un ordinateur
Windows :
1 Assurez-vous que votre Mac mini et l’ordinateur Windows sont sur le même réseau
sans fil. 20 Chapitre 1 Configurez, utilisez
2 Sur l’ordinateur Windows, ouvrez le panneau de configuration « Partage de CD ou
DVD ».
3 Sélectionnez « Activer le partage de CD ou DVD ». Si vous souhaitez que les autres utilisateurs doivent demander la permission d’utiliser un DVD ou CD que vous partagez,
cochez la case « Me demander avant d’autoriser l’utilisation de mon lecteur DVD ».
Pour utiliser un DVD ou CD partagé :
1 Sur l’autre ordinateur, insérez un DVD ou un CD dans le lecteur de disque optique.
2 Sur votre Mac mini, sélectionnez le disque distant lorsqu’il apparaît dans Appareils dans
la barre latérale du Finder. Si le bouton « Demander à utiliser » apparaît, cliquez dessus.
3 Sur l’autre ordinateur, lorsque vous y êtes invité, cliquez sur Accepter pour autoriser
votre Mac mini à utiliser le DVD ou CD.
4 Sur votre Mac mini, utilisez le disque de la manière habituelle lorsqu’il devient disponible.Chapitre 1 Configurez, utilisez 21
Si vous essayez d’éteindre l’autre ordinateur ou d’éjecter le DVD ou CD partagé pendant que votre Mac mini l’utilise, un message vous indique que le disque est en cours
d’utilisation. Pour continuer, cliquez sur Continuer.
Extinction ou suspension d’activité de votre Mac mini
Lorsque vous avez fini d’utiliser votre Mac mini, vous pouvez suspendre son activité ou
l’éteindre.
Suspension de l’activité de votre Mac mini
Si vous envisagez de ne pas utiliser votre Mac mini pendant une période inférieure à
quelques jours, suspendez-en l’activité. Lorsque l’activité de votre Mac mini est suspendue, son écran est noir. Vous avez la possibilité de réactiver rapidement votre Mac mini
sans passer par la procédure de démarrage.
Pour suspendre l’activité de votre Mac mini, procédez de l’une des manières
suivantes :
 Choisissez Pomme () > Suspendre dans la barre de menus.
 Appuyez sur le bouton d’alimentation (®) situé à l’arrière de votre Mac mini.
 Choisissez Pomme () > Préférences Système, cliquez sur Économiseur d’énergie et
définissez un délai pour la minuterie de mise en veille.
 Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande Apple Remote
(vendue en option) pendant 3 secondes.22 Chapitre 1 Configurez, utilisez
Pour réactiver votre Mac mini, appuyez sur une touche du clavier ou un bouton de la
télécommande Apple Remote. À la réactivation de votre Mac mini, vos applications,
documents et réglages d’ordinateur réapparaissent exactement tels que vous les aviez
laissés.
Extinction de votre Mac mini
Si vous ne comptez pas utiliser votre Mac mini pendant plusieurs jours, éteignez-le. Choisissez Pomme () > Éteindre. Pour le rallumer, appuyez sur le bouton d’alimentation (®).
AVIS : éteignez votre Mac mini avant de le déplacer. Tout déplacement de votre
Mac mini lorsque le disque dur est en train de tourner risque d’endommager ce
dernier et d’entraîner une perte de données ou une impossibilité de démarrer à partir
du disque dur.2
2 Prise en main de votre
Mac mini
www.apple.com/fr/server/macosx
Aide Mac serveurChapitre 2 Prise en main de votre Mac mini 25
Veuillez lire la présentation des fonctions et des ports de votre Mac mini.
Le site web d’Apple, à l’adresse www.apple.com/fr, vous donne accès aux informations,
aux téléchargements gratuits et aux catalogues en ligne des logiciels et matériels
Apple les plus récents destinés à votre Mac mini.
Vous trouverez également les manuels de nombreux produits Apple, ainsi que l’assistance technique pour tous les produits Apple sur le site web d’assistance Apple, à
l’adresse www.apple.com/fr/support.26 Chapitre 2 Prise en main de votre Mac mini
Description de la face avant de votre Mac mini
Témoin lumineux
d’alimentation
Récepteur à
infrarouge intégré
Antenne
Bluetooth
Antennes AirPortChapitre 2 Prise en main de votre Mac mini 27
Remarque : les adaptateurs d’écran et autres accessoires pour Mac mini sont vendus
séparément sur www.apple.com/fr/store ou dans votre Apple Store le plus proche.
Z Technologie sans fil AirPort Extreme (interne)
Connectez-vous à un réseau sans fil grâce à la technologie AirPort Extreme. Afin d’éviter
toute interférence, veillez à libérer la zone entourant les antennes AirPort.
Récepteur à infrarouge intégré
Utilisez une télécommande Apple Remote facultative (disponible séparément) avec le
récepteur infrarouge afin de contrôler Front Row et Keynote de votre Mac mini d’une distance maximale de 9,1 mètres.
Témoin lumineux d’alimentation
Un témoin lumineux blanc indique que votre Mac mini est allumé ; un témoin clignotant
indique que son activité est suspendue.
◊ Technologie sans fil Bluetooth (interne)
Connectez des périphériques sans fil tels qu’un téléphone portable, un organiseur et une
imprimante Bluetooth, ainsi que le clavier et la souris Apple sans fil (tous deux en vente
sur le site www.apple.com/fr/store ou dans votre Apple Store le plus proche).28 Chapitre 2 Prise en main de votre Mac mini
Description de la face arrière de votre Mac mini
,
f
H
Bouton
d’alimentation
Logement
de sécurité
Port
secteur
®
¯
G
Port de sortie
casque/audio
numérique
optique
Port Ethernet
(10/100/1000 Base-T)
Port FireWire 800
£ Port Mini-DVI £ Port
Mini DisplayPort
d Ports
USB 2.0 (5)
Porte d’entrée
de ligne audio/
audio
®Chapitre 2 Prise en main de votre Mac mini 29
£ Port mini-DVI
Utilisez l’adaptateur mini-DVI vers DVI inclus pour brancher un écran DVI ou une TV.
£ Port Mini DisplayPort
Branchez un écran sur le port Mini DisplayPort.
Logements de sécurité
Attachez un verrou et un câble (disponible séparément) afin de dissuader les tentatives
de vol.
, Port d’entrée de ligne audio/audio numérique optique
Connectez un micro ou un appareil audio numérique de niveau ligne.
f Port de sortie casque/audio numérique optique
Il permet de connecter un casque, des haut-parleurs actifs externes ou des appareils
audio numériques.
d Cinq ports USB (Universal Serial Bus) 2.0 à haut-débit
Branchez un iPod, un iPhone, une souris, un clavier, une imprimante, un disque dur, un
appareil photo numérique, une manette de jeu, un modem externe USB, etc. Vous pouvez aussi brancher des périphériques USB 1.1.30 Chapitre 2 Prise en main de votre Mac mini
Utilisation de la télécommande Apple Remote
Avec la télécommande Apple Remote vous pouvez, à distance, lire la musique de votre
bibliothèque musicale iTunes, regarder des diaporamas de photos et des bandesannonces QuickTime, lire un DVD dans Lecteur DVD et plus encore.
Votre télécommande Apple Remote peut :
 Naviguer dans iTunes ou dans Lecteur DVD.
 Suspendre l’activité de votre Mac mini ou le remettre sous tension.
Pour utiliser votre télécommande Apple Remote :
 Appuyez sur le bouton Lecture/Pause (’) pour lire ou mettre en pause un morceau,
un diaporama ou un film.
H Port FireWire 800
Branchez des appareils externes à haut-débit, tels que les caméras vidéo numériques et
les appareils de stockage.
G Port Ethernet
Branchez un modem DSL ou un modem câble ou connectez-vous à un réseau Ethernet à
haut-débit 10/100/1000Base-T ou un autre ordinateur à travers ce port. Le port Ethernet
détecte automatiquement les dispositifs Ethernet et ne requiert pas de câble de connexion.
¯ Port d’alimentation
Il permet de connecter le câble d’alimentation relié à l’adaptateur secteur.
® Bouton d’alimentation
Allumez ou éteignez votre Mac mini ou suspendez l’activité. Maintenez ce bouton
enfoncé pour réinitialiser l’ordinateur lors des procédures de dépannage.Chapitre 2 Prise en main de votre Mac mini 31
 Appuyez sur les boutons Suivant/Avance rapide ( ) ou Précédent/Retour rapide ( )
pour passer au morceau suivant ou précédent de votre bibliothèque iTunes ou au
chapitre suivant ou précédent d’un film DVD.
 Maintenez enfoncé les boutons Suivant/Avance rapide ( ) ou Précédent/
Retour rapide ( ) pour effectuer une avance rapide ou un retour rapide dans un morceau ou un film.
 Appuyez sur les boutons Augmenter le volume (∂) et Diminuer le volume (D) pour
régler le volume.
Jumelage de votre télécommande Apple Remote
Si vous possédez dans une pièce plusieurs ordinateurs ou autres appareils dotés de
récepteurs à infrarouge intégrés (par exemple, plus d’un Mac mini dans un bureau personnel ou un laboratoire), vous avez la possibilité de « jumeler » votre télécommande
Apple Remote avec un ordinateur ou un appareil précis. Le jumelage permet de configurer l’ordinateur ou l’appareil récepteur de façon à ce qu’il soit contrôlé par une seule
télécommande. 32 Chapitre 2 Prise en main de votre Mac mini
Pour jumeler votre télécommande Apple Remote avec votre Mac mini :
1 Placez-vous à proximité de votre Mac mini (de 8 à 10 centimètres environ).
2 Dirigez la télécommande vers le devant de votre Mac mini.
3 Maintenez enfoncés simultanément les boutons Suivant/Avance rapide ( ) et Menu
(») pendant 5 secondes.
Lorsque vous avez correctement jumelé votre télécommande Apple Remote avec votre
Mac mini, un symbole en forme de maillon de chaîne ( ) apparaît à l’écran.
Pour annuler le jumelage de votre télécommande Apple Remote et de votre
Mac mini :
1 Choisissez le menu Pomme () > Préférences Système dans la barre des menus.
2 Cliquez sur Sécurité, puis sur Désactiver le jumelage.
Désactivation de la réception infrarouge
Vous pouvez utiliser les préférences Sécurité pour activer ou désactiver la réception
infrarouge.
Pour désactiver la réception infrarouge :
 Choisissez le menu Pomme () > Préférences Système dans la barre des menus et
cliquez sur Sécurité.
 Cochez la case « Désactiver le récepteur à infrarouge de la télécommande ».Chapitre 2 Prise en main de votre Mac mini 33
Informations complètes
Vous trouverez une multitude d’informations concernant l’utilisation de
votre Mac mini dans l’Aide Mac de votre ordinateur et sur Internet, à l’adresse
www.apple.com/fr/support.
Pour ouvrir l’Aide Mac :
1 Cliquez sur l’icône Finder dans le Dock (la barre d’icônes situé au bord de l’écran).
2 Cliquez sur menu Aide dans la barre des menus et effectuez l’une des opérations
suivantes :
a Tapez une question ou indiquez le terme voulu dans le champ Recherche et sélectionnez une rubrique dans la liste des résultats ou sélectionnez « Afficher tous les
résultats » pour retrouver toutes les rubriques.
b Sélectionnez Aide Mac pour ouvrir la fenêtre Aide Mac dans laquelle vous pouvez
parcourir les rubriques ou saisir une question de recherche.
Pour plus d’informations
Pour plus d’informations sur l’utilisation de votre Mac mini, reportez-vous aux rubriques suivantes :
Sujet traité Voir
Dépannage de votre Mac mini
en cas de problème
le chapitre 3, « Une solution à chaque problème, » à la page 37.
Service et assistance pour
votre Mac mini
Consultez « En savoir plus, service et assistance » à la page 53 ou
rendez-vous sur la page d’assistance du Mac mini à l’adresse
www.apple.com/fr/support/macmini.34 Chapitre 2 Prise en main de votre Mac mini
Utilisation de Mac OS X Server Site de Mac OS X Server, à l’adresse
www.apple.com/fr/server/macosx. Recherche de
« Mac OS X Server » dans l’Aide Mac.
Migration d’un PC vers un Mac « Pourquoi vous allez adorer un Mac » disponible sur
www.apple.com/fr/getamac/whymac.
Modification des préférences
système
Ouvrez les Préférences système en choisissant le menu Pomme
(K) > Préférences système. Ou recherchez « préférences
système » dans l’Aide Mac.
Utilisation de la technologie
sans fil AirPort Extreme
Page d’assistance AirPort, à l’adresse
www.apple.com/fr/support/airport Ou bien
ouvrez l’Aide Mac et recherchez « Airport ».
Utilisation de la technologie
sans fil Bluetooth
Ouvrez l’Aide Mac et recherchez « Bluetooth ».
Ou accédez à la Page d’assistance Bluetooth, à l’adresse
www.apple.com/fr/support/bluetooth.
Connexion d’une imprimante Ouvrez l’Aide Mac et recherchez « impression ».
Connexions FireWire et USB Ouvrez l’Aide Mac et recherchez « FireWire » ou « USB ».
Connexion à Internet Ouvrez l’Aide Mac et recherchez « Internet ».
Utilisation d’un moniteur Ouvrez l’Aide Mac et recherchez « écran ».
Connexion d’un téléviseur Site web du Mac mini, à l’adresse
www.apple.com/fr/macmini/accessories.html
Télécommande Ouvrez l’Aide Mac et recherchez « télécommande ».
Face avant Ouvrez l’Aide Mac et recherchez « Front Row ».
Sujet traité VoirChapitre 2 Prise en main de votre Mac mini 35
Caractéristiques Page Caractéristiques, à l’adresse www.apple.com/fr/support/specs.
Vous pouvez également ouvrir les Informations système en choisissant Pomme (K) > À propos de ce Mac dans la barre des menus,
puis en cliquant sur Plus d’infos.
Actualités Apple, téléchargements gratuits et catalogues
en ligne de logiciels et de
matériel
Site Apple à l’adresse www.apple.com/fr.
Instructions, assistance technique et manuels des produits
Apple
Site du service d’assistance d’Apple à l’adresse
www.apple.com/fr/support.
Sujet traité Voir3
3 Une solution à
chaque problème
www.apple.com/fr/support
Aide Mac aideChapitre 3 Une solution à chaque problème 39
Il se peut que vous rencontriez des problèmes lors de l’utilisation de votre Mac mini.
Lisez plus loin la présente documentation pour des astuces de dépannage.
Vous trouverez également des informations supplémentaires dans l’Aide Mac ou
sur le site web de service après-vente et d’assistance du Mac mini, à l’adresse
www.apple.com/fr/support/macmini.
II existe généralement une solution simple et rapide à tout problème rencontré avec le
Mac mini. Dans un tel cas, essayez de noter les opérations effectuées avant que le problème ne survienne. Cela permet de restreindre les causes possibles du problème et
trouver ainsi la solution. Les éléments à noter comprennent :
 les applications que vous étiez en train d’utiliser quand le problème est apparu (les
problèmes qui n’apparaissent qu’avec une application donnée peuvent indiquer que
celle-ci n’est pas compatible avec la version de Mac OS X Server installée sur votre
ordinateur) ;
 tout logiciel installé récemment ;
 tout nouveau matériel (tel qu’un périphérique) que vous aurez branché.
AVERTISSEMENT : n’essayez pas d’ouvrir votre Mac mini. Si votre Mac mini doit être
réparé, consultez « En savoir plus, service et assistance » à la page 53 pour en savoir
plus sur la façon de contacter un fournisseur de services agréé Apple ou Apple pour
un dépannage. Votre Mac mini ne contient aucune pièce manipulable par l’utilisateur.40 Chapitre 3 Une solution à chaque problème
Problèmes vous empêchant d’utiliser votre Mac mini
Si votre ordinateur ne répond plus ou que le pointeur se fige
 Assurez-vous que la souris et le clavier sont connectés. Débranchez puis rebranchez
les connecteurs et vérifiez qu’ils sont correctement mis en place.
 Si le problème persiste, essayer de forcer les applications posant problème à quitter.
Sur un clavier Apple Keyboard, maintenez les touches Option et Commande (x)
enfoncées puis appuyez sur la touche Échap. Sur les autres claviers, maintenez les
touches Windows et Alt enfoncées puis appuyez sur la touche Échap. Si une zone de
dialogue apparaît, sélectionnez l’application figée et cliquez sur Forcer à quitter. Enregistrez le travail de toute application ouverte, puis redémarrez votre Mac mini afin de
vous assurer que le problème est entièrement réglé.
 Appuyez sur le bouton d’alimentation (®) à l’arrière de votre Mac mini et maintenezle enfoncé cinq secondes pour arrêter l’ordinateur.
 Débranchez le câble d’alimentation de votre Mac mini. Rebranchez le câble, puis
appuyez sur le bouton d’alimentation (®) pour rallumer votre Mac mini.
Si le problème se reproduit lorsque vous utilisez une application particulière,
consultez le fabricant de cette application pour vérifier si elle est compatible
avec votre ordinateur.
Pour toute information sur le service après-vente relatif aux logiciels fournis avec votre
ordinateur, consultez la page à l’adresse www.apple.com/fr/guide ou accédez au site
web du fabricant.Chapitre 3 Une solution à chaque problème 41
Si le problème a fréquemment lieu, essayer de réinstaller votre logiciel système (voir
« Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X » » à la
page 42).
Si votre Mac mini se bloque au démarrage ou si un point d’interrogation clignote à
l’écran
 Patientez quelques secondes. Si votre Mac mini ne démarre pas après un certain
temps, éteignez votre Mac mini en maintenant le bouton d’alimentation (®) enfoncé
pendant environ cinq secondes, jusqu’à ce qu’il s’éteigne complètement. Maintenez
ensuite la touche Option enfoncée puis appuyez à nouveau sur le bouton d’alimentation (®) pour démarrer votre ordinateur. Maintenez la touche Option enfoncée
jusqu’au démarrage de votre Mac mini, puis cliquez sur la flèche située sous l’icône
du disque dur que vous souhaitez utiliser comme disque de démarrage.
 Une fois que votre Mac mini a démarré, ouvrez Préférences Système et cliquez sur
Démarrage. Sélectionnez un dossier Système Mac OS X Server.
 Si le problème se reproduit fréquemment, réinstallez éventuellement votre logiciel
système (voir « Réinstallation de logiciels à l’aide de « Installation à distance de
Mac OS X » » à la page 42).
Si votre Mac mini ne s’allume pas ou ne démarre pas
 Assurez-vous que le câble d’alimentation est branché sur votre Mac mini et dans
l’adaptateur secteur mais aussi une prise de courant qui fonctionne. 42 Chapitre 3 Une solution à chaque problème
 Appuyez sur le bouton d’alimentation (®) et maintenez immédiatement enfoncées
les touches Commande (x), Option, P et R du clavier Apple jusqu’à entendre une
deuxième fois le signal sonore de démarrage. L’opération permet de réinitialiser la
RAM de paramétrage (PRAM). Sur d’autres claviers, appuyez sur le bouton d’alimentation (®) et maintenez immédiatement enfoncées les touches Windows, Alt, P et R.
 Débranchez le câble d’alimentation et attendez au moins 30 secondes. Rebranchez le
câble, puis appuyez à nouveau sur le bouton d’alimentation (®) pour allumer votre
Mac mini.
 Si vous ne pouvez toujours pas démarrer votre Mac mini, reportez-vous à la rubrique
« En savoir plus, service et assistance » à la page 53 pour savoir comment prendre
contact avec Apple en vue d’une réparation.
Réinstallation de logiciels à l’aide de « Installation à distance
de Mac OS X »
Utilisez « Installation à distance de Mac OS X » sur un ordinateur partenaire dont vous
voulez partager le lecteur de disque optique, quand vous souhaitez effectuer l’une des
tâches suivantes sur votre Mac mini :
 Réinstaller Mac OS X Server et d’autres logiciels fournis avec votre Mac mini.
 Réinitialiser votre mot de passe.
 Utiliser Utilitaire de disque pour réparer le disque dur de votre Mac mini.
Les instructions pour l’installation du logiciel Configuration du partage de CD ou DVD
se trouvent en la page 16.Chapitre 3 Une solution à chaque problème 43
Pour utiliser « Installation à distance de Mac OS X » :
1 Insérez le DVD d’installation de Mac OS X Server dans le lecteur de disque optique de
l’autre ordinateur.
2 Si l’autre ordinateur est un Mac, ouvrez le sous-dossier Applications/Utilitaires/
« Installation à distance de Mac OS X ». (À moins que l’autre Mac dispose déjà de
Mac OS X 10.5.5, vous devrez installer cette application.) Sous Windows, choisissez
« Installation à distance de Mac OS X » à partir de l’Assistant d’installation.
3 Lisez l’introduction puis cliquez sur Continuer.
4 Sélectionnez le disque d’installation que vous souhaitez utiliser, puis cliquez
sur Continuer.
5 Sélectionnez une connexion réseau : AirPort, si vous utilisez un réseau AirPort, ou
Ethernet, si l’autre ordinateur se trouve sur un réseau Ethernet. Cliquez sur Continuer.44 Chapitre 3 Une solution à chaque problème
6 Redémarrez votre Mac mini en maintenant la touche Option enfoncée jusqu’à l’apparition de la liste des disques de démarrage disponibles.
7 Choisissez un disque de démarrage.
8 Cliquez sur Continuer dans « Installation à distance de Mac OS X ».
9 Si vous avez choisi AirPort comme réseau à l’étape 5, choisissez sur votre Mac mini
votre réseau AirPort dans la liste locale.
Si le réseau est sécurisé, vous êtes invité à saisir un mot de passe. Pour saisir un nom de
réseau privé, choisissez les points de suspension (…) puis tapez le nom du réseau.
10 Si vous avez choisi AirPort comme réseau à l’étape 5, lorsque l’icône d’état AirPort indiquant la force du signal apparaît, cliquez sur Continuer dans « Installation à distance de
Mac OS X ».
11 Sur votre Mac mini, cliquez sur le bouton en forme de flèche situé au-dessous de
l’icône du programme d’installation puis effectuez l’une des actions suivantes :
 Si vous avez oublié votre mot de passe et avez besoin de le réinitialiser, consultez la
rubrique « Réinitialisation de votre mot de passe » ci-dessous.
 Si vous souhaitez exécuter Utilitaire de disque, consultez la rubrique « Utilisation
d’Utilitaire de disque » à la page 45.Chapitre 3 Une solution à chaque problème 45
Réinitialisation de votre mot de passe
Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de
tous les autres comptes.
Pour réinitialiser votre mot de passe si vous utilisez un ordinateur partenaire et l’Installation à distance de Mac OS X :
1 Suivez la procédure d’utilisation d’« Installation à distance de Mac OS X » en commen-
çant à la page 43.
2 Cliquez sur Continuer dans « Installation à distance de Mac OS X ».
3 Sur votre Mac mini, choisissez Utilitaires > « Réinitialiser le mot de passe » dans la barre
des menus et suivez les instructions à l’écran. Une fois terminé, quittez le programme
d’installation de Mac OS X.
4 Sur l’autre ordinateur, cliquez sur Quitter pour quitter « Installation à distance de
Mac OS X ».
Utilisation d’Utilitaire de disque
Lorsque vous avez besoin de réparer, vérifier ou effacer le disque dur de votre
Mac mini, utilisez Utilitaire de disque en partageant le lecteur de disque optique d’un
autre ordinateur.
Pour utiliser Utilitaire de disque à partir d’un ordinateur partenaire :
1 Suivez la procédure d’utilisation d’« Installation à distance de Mac OS X » en commen-
çant à la page 43.
2 Cliquez sur Continuer dans « Installation à distance de Mac OS X ».46 Chapitre 3 Une solution à chaque problème
3 Sur votre Mac mini, choisissez Programme d’installation > « Ouvrir Utilitaire de
disque », puis suivez les instructions de la sous-fenêtre S.O.S. pour voir si Utilitaire de
disque peut réparer le disque. Une fois terminé, quittez le programme d’installation de
Mac OS X sur votre Mac mini.
4 Sur l’autre ordinateur, cliquez sur Quitter pour quitter « Installation à distance de
Mac OS X ».
Si Utilitaire de disque ne résout pas le problème, essayez de réinstaller le logiciel système de votre ordinateur. Voir la rubrique « Réinstallation de logiciels à l’aide de
« Installation à distance de Mac OS X » » à la page 42.
Autres problèmes
En cas de problème avec une application
Pour les problèmes liés aux logiciels provenant d’éditeurs tiers, contactez l’éditeur concerné. Les éditeurs de logiciels proposent souvent des mises à jour de leurs produits
sur leurs sites web.
Vous pouvez configurer votre Mac mini pour qu’il cherche et installe automatiquement les dernières mises à jour Apple via la sous-fenêtre Mise à jour de logiciels des
Préférences Système. Pour plus d’informations, choisissez Aide > Aide Mac et recherchez « mise à jour de logiciels ».Chapitre 3 Une solution à chaque problème 47
En cas de problème de fonctionnement de votre Mac mini ou de Mac OS X Server
 Si les réponses à vos questions ne figurent pas dans ce manuel, recherchez des instructions et des informations de dépannage dans l’Aide Mac. Sélectionnez Aide >
Aide Mac.
 Consultez le site web d’assistance Apple, à l’adresse www.apple.com/fr/support/
macosxserver pour obtenir les dernières informations de dépannage et des mises à
jour de logiciels.
Si vos réglages de date et heure disparaissent régulièrement
 La pile de secours interne de votre ordinateur a peut-être besoin d’être remplacée.
Pour savoir comment contacter le service après-vente d’Apple, reportez-vous à « En
savoir plus, service et assistance » à la page 53.48 Chapitre 3 Une solution à chaque problème
Utilisation d’Apple Server Diagnostics
Si vous pensez que votre matériel Mac mini présente un problème, utilisez Apple
Server Diagnostics pour vous aider à déterminer s’il s’agit d’un problème avec l’un des
composants de l’ordinateur.
Pour utiliser Apple Server Diagnostics :
1 Déconnectez tous les périphériques connectés à votre Mac mini à l’exception du clavier et de la souris. Si un câble Ethernet est connecté, déconnectez-le.
2 Redémarrez votre Mac mini tout en maintenant la touche D enfoncée.
3 Lorsque l’écran de sélection d’Apple Server Diagnostics apparaît, sélectionnez la langue qui vous convient.
4 Appuyez sur la touche Retour ou sur le bouton Continuer.
5 Lorsque l’écran principal Apple Server Diagnostics apparaît (environ 45 secondes plus
tard), suivez les instructions reprises à l’écran.
6 En cas de détection d’un problème, Apple Server Diagnostics affiche le code d’une
erreur. Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si
Apple Server Diagnostics ne détecte pas de panne matérielle, il est probable que le
problème soit lié aux logiciels.
Pour en savoir plus, consultez la documentation sur les diagnostics serveur Apple pré-
sente sur le CD des outils Admin Tools. Chapitre 3 Une solution à chaque problème 49
En cas de problème de connexion à Internet
Votre Mac mini comprend l’application Assistant de configuration qui vous aide à configurer une connexion Internet. Ouvrez Préférences Système, puis cliquez sur Réseau.
Cliquez sur Assistant pour lancer l’Assistant réglages de réseau.
En cas de problème avec votre connexion Internet, vous pouvez effectuer les opérations de cette section pour le type de connexion ou utiliser Diagnostic réseau.
Pour utiliser Diagnostic réseau :
1 Choisissez Pomme () > Préférences Système.
2 Cliquez sur Réseau puis sur Assistant.
3 Cliquez sur Diagnostic pour lancer Diagnostic réseau.
4 Suivez les instructions à l’écran.
Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci provient
peut-être du fournisseur d’accès Internet auquel vous essayez de vous connecter, du
périphérique externe utilisé pour la connexion au fournisseur d’accès Internet ou du
serveur auquel vous essayez d’accéder. Vous pouvez essayer les méthodes proposées
dans les sections suivantes.
Connexions à Internet par modem câble, modem DSL et réseau local (LAN)
Assurez-vous que tous les câbles du modem sont correctement branchés, y compris le
câble d’alimentation du modem, le câble reliant le modem à votre ordinateur et le
câble raccordant le modem à la prise murale. Vérifiez également les câbles et l’alimentation de vos concentrateurs Ethernet et routeurs. 50 Chapitre 3 Une solution à chaque problème
Allumez et éteignez le modem puis réinitialisez-le
Éteignez votre modem câble ou DSL, puis rallumez-le après quelques minutes. Certains fournisseurs d’accès Internet conseillent de débrancher le câble d’alimentation du
modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem.
Important : les instructions relatives aux modems ne s’appliquent pas aux utilisateurs
réseau. À la différence des utilisateurs de modem DSL, les utilisateurs réseau peuvent
posséder des concentrateurs, commutateurs, routeurs ou points de connexion. Les utilisateurs réseau doivent contacter leur administrateur réseau et non pas un FAI.
Connexions PPPoE
Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès Internet via
PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les bonnes informations ont été saisies dans les préférences Réseau.
Pour saisir les réglages PPPoE :
1 Choisissez Pomme () > Préférences Système.
2 Cliquez sur Réseau.
3 Cliquez sur Ajouter (+) situé en bas de la liste des services de connexion réseau, puis
choisissez PPPoE dans le menu local Interface.
4 Dans le menu local Ethernet, indiquez une interface pour le service PPPoE.
Sélectionnez Ethernet si vous vous connectez à un réseau câblé ou sur AirPort si vous
vous connectez à un réseau sans fil. Chapitre 3 Une solution à chaque problème 51
5 Saisissez les informations que vous avez reçues de votre fournisseur de service, telles
que le nom du compte, le mot de passe et le nom du service PPPoE (si votre fournisseur de service vous l’impose).
6 Cliquez sur Appliquer pour que les réglages s’appliquent.
Connexions au réseau
Assurez-vous que le câble Ethernet est branché à votre Mac mini et au réseau. Vérifiez
les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet.
Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre fournisseur d’accès Internet fournit une seule ou plusieurs adresses IP (une pour chaque
ordinateur).
Si une seule adresse IP est utilisée, vous devez disposer d’un routeur capable de partager la connexion (on parle alors de conversion d’adresse réseau (NAT) ou de masquage
d’adresses IP). Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre
réseau. La borne d’accès AirPort permet de partager une adresse IP entre plusieurs
ordinateurs. Pour plus d’informations sur l’utilisation de la borne d’accès AirPort,
consultez l’Aide Mac ou consultez le site web AirPort Extreme, à l’adresse
www.apple.com/fr/support/airport.
Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés,
contactez votre fournisseur d’accès Internet ou votre administrateur réseau.52 Chapitre 3 Une solution à chaque problème
Problèmes de communications sans fil AirPort Extreme
En cas de problème avec les communications sans fil AirPort Extreme :
 Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé
et dispose d’un point d’accès sans fil.
 Vérifiez que vous avez correctement configuré le logiciel en respectant les instructions fournies avec la borne d’accès ou le point d’accès.
 Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la
zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou
des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en réorientant votre ordinateur.
 Consultez le menu d’état AirPort (Z) dans la barre de menus. La puissance du signal
est représentée par quatre barres au maximum. Si le signal s’avère faible, tentez après
avoir changé d’endroit.
 Consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide AirPort
dans la barre de menus). Pour plus d’informations, consultez également les instructions du périphérique sans fil.Chapitre 3 Une solution à chaque problème 53
Maintien à jour de votre logiciel
Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les
dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple.
Chaque fois que vous vous connectez à Internet, Mise à jour de logiciels recherche la
présence de mises à jour pour votre ordinateur. Vous pouvez régler votre Mac mini
pour vérifier régulièrement la présence de mises à jour de logiciels, et éventuellement
les télécharger et les installer.
Pour rechercher des logiciels mis à jour :
1 Choisissez Pomme () > Préférences Système.
2 Cliquez sur l’icône Mise à jour de logiciels et suivez les instructions à l’écran.
 Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.
 Pour obtenir les toutes dernières informations sur Mac OS X Server, accédez à
www.apple.com/fr/server/macosx.
En savoir plus, service et assistance
Votre Mac mini ne contient aucune pièce manipulable par l’utilisateur. Si vous avez
besoin d’assistance, apportez votre Mac mini à un fournisseur de services agréé Apple
ou contactez Apple pour un dépannage. Vous pouvez trouver plus d’informations sur
votre Mac mini via des ressources en ligne, l’aide à l’écran, les Informations Système ou
Apple Hardware Test.
Si vous souhaitez étendre la mémoire du système, contactez un fournisseur de services
agréé Apple ou un magasin Apple Store.54 Chapitre 3 Une solution à chaque problème
Ressources en ligne
Pour obtenir des informations sur le service et l’assistance en ligne, rendez-vous à
l’adresse www.apple.com/fr/support/. Choisissez votre pays dans le menu local. Vous
pouvez rechercher les informations dans la base de connaissance AppleCare, consulter
les mises à jour de logiciels ou obtenir de l’aide dans les forums de discussion Apple.
Aide à l’écran
Vous trouverez souvent des réponses à vos questions ainsi que des instructions et
informations sur le dépannage dans l’Aide Mac. Sélectionnez Aide > Aide Mac.
Informations Système
Pour obtenir des informations sur votre Mac mini, utilisez les Informations Système. Les
Informations Système vous indiquent quel matériel et quels logiciels sont installés, le
numéro de série et la version du système d’exploitation, la quantité de mémoire installée, etc. Pour ouvrir les Informations Système, choisissez Pomme () > À propos de ce
Mac dans la barre des menus, puis cliquez sur Plus d’infos.
Service et assistance AppleCare
Votre Mac mini vous est fourni avec une garantie de 90 jours d’assistance technique et
d’un an de réparations matérielles dans un centre de réparation agréé par Apple (comme
par exemple un fournisseur de services agréé Apple ou un magasin Apple Store). Vous
pouvez étendre cette garantie en souscrivant au contrat AppleCare Protection Plan. Pour
en savoir plus, rendez-vous à l’adresse www.apple.com/fr/support/products ou bien visitez le site web de votre pays (voir tableau).
Apple fournit également une assistance d’expert pour Mac OS X Server. Au-delà de
l’assistance gratuite pendant 90 jours, ces produits disposent d’une assistance technique détaillée pendant une année complète.Chapitre 3 Une solution à chaque problème 55
Mac OS X Server Software Support permet de bénéficier d’une assistance et de conseils par téléphone
1
et par e-mail
2
pour les problèmes de mise en réseau et de flux de
productiondans les environnements Mac OS X Server, y compris de l’assistance pour
l’utilisation des outils de ligne de commande et d’intégration dans des environnements hétérogènes.
3
Chaque contrat Mac OS X Server Software Support s’accompagne de toutes les fonctionnalités de l’assistance AppleCare Help Desk Support, décrite
ci-dessous. Choisissez l’un des trois contrats suivants : Select, Preferred ou Alliance.
AppleCare Help Desk Support fait profiter d’un an d’expertise à votre service d’assistance technique interne. Ce produit fournit une assistance prioritaire par téléphone
1
et
par e-mail2
à deux contacts techniques désignés pour votre organisation. Les produits
couverts incluent Apple Remote Desktop, Final Cut Studio, Final Cut Server, Aperture,
Logic Studio, Mac OS et l’interface utilisateur graphique de Mac OS X Server. Vous recevez également un abonnement à AppleCare Help Desk Tools, bibliothèque de disques
de diagnostics matériels et d’installation de Mac OS mise à jour tous les trimestres.
1.
Les numéros de téléphone et les horaires d’intervention peuvent varier et être modifiés ; des frais de communications téléphoniques locales peuvent s’appliquer.
2.
L’accès aux ressources web requiert l’utilisation d’un fournisseur d’accès à Internet compatible ; des frais peuvent
s’appliquer.
3.
Les détails sur la couverture de l’assistance ainsi que la liste des technologies Apple prises en charge figurent dans
les contrats Mac OS X Server Software Support et AppleCare Help Desk Support disponibles à l’adresse :
www.apple.com/fr/support/products/macosxserver_sw_supt.html
www.apple.com/fr/support/products/helpdesk.html56 Chapitre 3 Une solution à chaque problème
Si vous avez besoin d’une assistance complémentaire, les techniciens du centre télé-
phonique AppleCare peuvent vous aider à installer et ouvrir des applications et à
résoudre certains problèmes élémentaires. Appelez le centre d’appel le plus près de
chez vous (pendant les 90 premiers jours, ce service est gratuit). Au moment de votre
appel, il vous faudra connaître la date d’achat de votre Mac mini et son numéro de
série.
Remarque : la période de 90 jours d’assistance téléphonique gratuite démarre le jour
de l’achat ; des coûts de communication téléphoniques peuvent être facturés.
Les numéros de téléphone sont susceptibles de changer et des coûts téléphoniques
locaux ou nationaux peuvent s’appliquer. La liste complète est disponible sur le web :
Pays Téléphone Site web
Allemagne (49) 01805 009 433 www.apple.com/de/support
Autriche (43) 0810 300 427 www.apple.com/at/support
Belgique (flamand)
(français)
(32) 070 700 772
(32) 070 700 773
www.apple.com/benl/support
www.apple.com/befr/support
France (33) 0805 540 003 www.apple.com/fr/support
Luxembourg (33) 0825 888 024 www.apple.com/befr/support
Suisse (français)
(allemand)
(41) 0848 000 132
(41) 0848 000 132
www.apple.com/chfr/support
www.apple.com/chde/support
www.apple.com/contact/phone_contacts.htmlChapitre 3 Une solution à chaque problème 57
Localisation du numéro de série de votre produit
Optez pour l’une des méthodes suivantes pour trouver le numéro de série de votre
Mac mini :
 Choisissez Pomme () dans la barre de menus, puis choisissez À propos de ce Mac.
Cliquez sur le numéro de version sous les mots « Mac OS X Server » pour passer entre
les numéros de version, de compilation et de série de Mac OS X Server.
 Ouvrez Informations système (accessible dans le dossier /Applications/Utilitaires/),
puis cliquez sur Matériel.
 Regardez dans le bas de votre Mac mini.4
4 Dernières recommandations
www.apple.com/fr/environment
Aide Mac ergonomieChapitre 4 Dernières recommandations 61
Afin d’éviter toute blessure et de préserver votre matériel, veillez à observer les consignes exposées ici pour le nettoyage et la manipulation de votre Mac mini ainsi que
l’aménagement d’un espace de travail confortable. Gardez ces instructions pour que
vous et tout autre utilisateur puissiez vous y reporter facilement.
Informations importantes sur la sécurité
Manipulation appropriée Mettez-en place votre Mac mini sur une surface de travail
stable permettant une bonne ventilation sous et autour de l’ordinateur. Ne faites pas
fonctionner votre Mac mini sur un coussin ou tout autre matériau mou, celui-ci pouvant bloquer la circulation de l’air. N’introduisez jamais d’objet dans les orifices de
ventilation.
Plans d’eau et endroits humides Évitez de placer votre Mac mini à proximité d’un
évier, d’un lavabo, d’une baignoire, d’une douche, etc. Protégez votre Mac mini de
l’humidité et des intempéries (neige, pluie ou brouillard).
Adaptateur secteur Suivez ces indications au moment d’utiliser l’adaptateur secteur:
 Veillez à engager fermement les fiches dans l’adaptateur secteur, l’ordinateur et la
prise secteur.
AVIS : un stockage ou un usage incorrect de votre ordinateur peut entraîner
l’invalidation de la garantie du fabricant.
AVERTISSEMENT : ne pas suivre les présentes instructions peut entraîner le départ
d’un feu, une électrocution ou toute autre blessure ou détérioration.62 Chapitre 4 Dernières recommandations
 Laissez toujours de l’espace autour de l’adaptateur secteur et placez votre Mac mini
dans un endroit permettant la circulation d’air.
 Utilisez uniquement l’adaptateur secteur fourni avec votre ordinateur. Votre Mac mini
utilise emploie un adaptateur secteur de 110 watts.
 La seule manière de couper complètement l’alimentation de l’ordinateur consiste à
débrancher le câble d’alimentation. Veillez à tirer sur la prise et non pas sur le câble.
Débranchez l’adaptateur secteur et tout autre câble si l’un des cas suivants se
présente :
 vous comptez nettoyer votre Mac mini (suivez obligatoirement les conseils décrits en
la page 66) ;
 la prise ou le câble d’alimentation est usé ou endommagé ;
 votre Mac mini ou son adaptateur secteur est exposé à la pluie, à une humidité
excessive ou du liquide est accidentellement versé dans le boîtier ;
 votre Mac mini ou son adaptateur secteur est tombé ou est détérioré, ou vous
soupçonnez que son entretien ou sa réparation devient obligatoire.
Caractéristiques électriques :
 Fréquence : 50 à 60 Hz
 Tension de ligne : 100 à 240 V CA
AVERTISSEMENT : il est normal que l’adaptateur secteur chauffe lorsqu’il est utilisé.
Veillez à toujours prévoir une ventilation adéquate et à éviter tout contact prolongé
avec l’appareil.Chapitre 4 Dernières recommandations 63
Détérioration de l’audition L’utilisation d’écouteurs ou d’un casque d’écoute à un
niveau de volume trop élevé peut provoquer une perte d’acuité auditive permanente.
Il est possible de supporter petit à petit des volumes sonores de plus en plus élevés qui
peuvent sembler normaux à la longue, mais qui risquent néanmoins d’endommager
votre ouïe. En cas de bourdonnements dans les oreilles ou d’un affaiblissement de
l’audition, cessez l’écoute et consultez un médecin. Plus le volume sonore est élevé,
plus les atteintes à l’audition sont rapides. Les experts de l’audition recommandent les
mesures de précaution suivantes :
 Limitez la durée d’utilisation d’écouteurs ou d’un casque à volume sonore élevé.
 Évitez de monter le volume pour couvrir les bruits ambiants.
 Baissez le son si vous n’entendez pas les personnes parler autour de vous.
Activités à risque Cet ordinateur n’est pas conçu pour être exploité dans des installations nucléaires, pour la navigation ou la communication aérienne, dans le contrôle
aérien ou pour aucun autre usage où une panne de votre système informatique pourrait entraîner la mort, des blessures ou de graves dommages écologiques.
AVERTISSEMENT : apporter des modifications ou ne pas se conformer aux procédures indiquées dans le manuel livré avec votre équipement peut vous exposer à des
radiations dangereuses. 64 Chapitre 4 Dernières recommandations
Important : le matériel électrique peut s’avérer dangereux s’il n’est pas utilisé correctement. L’utilisation de ce produit ou de tout produit similaire doit toujours être supervisée par un adulte. Évitez que des enfants ne manipulent les composants internes ou les
câbles de ces appareils.
Ne procédez à aucune réparation par vous-même
Votre Mac mini ne contient aucune pièce manipulable par l’utilisateur. N’essayez pas
d’ouvrir votre Mac mini. S’il a besoin d’être réparé, consultez les informations sur le service après-vente fournies avec votre ordinateur pour savoir comment contacter Apple
ou un fournisseur de services agréé Apple à cet effet.
Si vous ouvrez votre Mac mini ou installez des éléments, vous risquez d’endommager
votre matériel ; ce type de dommage n’est pas couvert par la garantie limitée de votre
Mac mini.
Informations importantes sur la manipulation
Environnement de fonctionnement Faire fonctionner votre Mac mini sans respecter
les limites indiquées peut influer sur les performances :
 Températures de fonctionnement : 10* à 35° C
AVERTISSEMENT : n’introduisez jamais d’objet d’aucune sorte dans les ouvertures de
ventilation du boîtier. Cela pourrait être dangereux et endommager votre ordinateur.
AVIS : ne pas suivre les présentes instructions de manipulation peut entraîner la
détérioration de votre Mac mini ou de la propriété d’autrui.Chapitre 4 Dernières recommandations 65
 Températures pour le stockage : - 40° à 47° C
 Humidité relative : 5 % à 95 % (sans condensation)
 Altitude de fonctionnement maximale : 3 048 mètres
Mise sous tension de votre Mac mini N’allumez jamais votre Mac mini sans vous assurer que ses composants internes et ses périphériques externes sont en place. Faire
fonctionner l’ordinateur lorsque des éléments manquent peut s’avérer dangereux et
endommager votre ordinateur.
Transport de votre Mac mini Avant de soulever ou de repositionner votre Mac mini,
éteignez-le et débranchez tous les câbles qui y sont connectés. Si vous transportez
votre Mac mini dans un sac ou une mallette, assurez-vous qu’aucun objet libre (tels
que des trombones ou des pièces de monnaie) peut s’introduire accidentellement à
l’intérieur de l’ordinateur par les orifices de ventilation ou le logement du lecteur optique ou se bloquer dans un des ports.
Utilisation de connecteurs et de ports Ne forcez jamais au moment d’enficher un
connecteur dans un port. Pour brancher un périphérique, assurez-vous que le port
n’est pas obstrué, que le connecteur correspond bien au port et que vous l’avez positionné correctement.66 Chapitre 4 Dernières recommandations
Rangement de votre Mac mini Si vous rangez votre Mac mini pour une période longue, placez-le dans un endroit à température ambiante non excessive (de préférence
autour de 22° C).
Nettoyage de votre Mac mini Pour nettoyer le boîtier de votre Mac mini et ses composants, éteignez d’abord votre Mac mini et débranchez-le du secteur. Servez-vous
alors d’un chiffon doux, humide et non pelucheux pour nettoyer l’extérieur de l’ordinateur. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez
jamais de liquide directement sur l’ordinateur. N’utilisez pas d’aérosols, de solvants ou
d’abrasifs pouvant détériorer les finitions.
Principes ergonomiques
Voici quelques astuces pour l’installation d’un environnement de travail sain.
Clavier
Veillez à maintenir vos épaules relâchées lorsque vous utilisez le clavier. Le bras et
l’avant-bras doivent former un angle quasiment droit, la main étant placée dans le prolongement du poignet.
Changez souvent la position des mains pour éviter la fatigue musculaire. Certains utilisateurs risquent de ressentir une certaine incommodité dans les mains, les poignets ou
les bras après des durées de travail intensif sans pause. Si vous commencez à ressentir
une douleur ou une certaine incommodité chronique au niveau des mains, des poignets ou des bras, consultez un professionnel de la santé qualifié.Chapitre 4 Dernières recommandations 67
Souris
Positionnez la souris à la même hauteur que le clavier et vous permettant de l’atteindre confortablement.
Siège
Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de sorte que vos cuisses soient horizontales et que vos
pieds reposent à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire,
c’est-à-dire la partie inférieure de votre dos. Suivez les instructions du fabricant afin
que le réglage du dossier soit parfaitement adapté à votre morphologie.
Si nécessaire, relevez votre siège pour que la position de vos avant-bras et vos mains
forme un angle approprié avec le clavier. Si, dans ce cas, vos pieds ne reposent plus à
plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Vous pouvez
également abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied.
Une autre solution consiste à utiliser un bureau doté d’un support à clavier situé plus
bas que la surface de travail.
Moniteur
Placez le moniteur de manière à ce que le haut de l’écran se trouve légèrement en dessous du niveau des yeux lorsque vous êtes assis au clavier. Il vous appartient de juger
de la meilleure distance entre vos yeux et l’écran. Elle se situe en général entre 45 et
70 cm.68 Chapitre 4 Dernières recommandations
Orientez l’écran de manière à ce qu’il reflète le moins possible la lumière provenant de
l’éclairage et des fenêtres. Si possible, utilisez un support inclinable pour l’écran. Le
support permet de définir le meilleur angle de vue et de contribuer à réduire ou à éliminer l’éblouissement provoqué par les sources lumineuses fixes.
Pour plus d’informations sur l’ergonomie, rendez-vous le web :
Cuisses légèrement inclinées
Épaules
détendues
Écran positionné de
manière à éviter les reflets
Avants-bras
et mains
alignés
Avants-bras
à plat ou
légèrement
inclinés
Bas du dos
maintenu
Pieds à plat sur le sol
ou sur un respose-pied
Partie supérieure de l’écran
au niveau des yeux ou légè-
rement en dessous (vous
devrez éventuellement ré-
gler la hauteur de votre
moniteur en surélevant ou
en abaissant votre surface
de travail).
Espace dégagé sous
la surface de travail
45–70 cm
www.apple.com/fr/about/ergonomicsChapitre 4 Dernières recommandations 69
Apple et l’environnement
Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement.
Pour plus d’informations, rendez-vous à l’adresse :
www.apple.com/fr/environment71
Regulatory Compliance Information
Compliance Statement
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio or
television reception is suspected.
L’utilisation de ce dispositif est autorisée seulement aux
conditions suivantes : (1) il ne doit pas produire de
brouillage et (2) l’utilisateur du dispositif doit être prêt à
accepter tout brouillage radioélectrique reçu, même si
ce brouillage est susceptible de compromettre le
fonctionnement du dispositif.
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference to
radio or television reception, try to correct the
interference by using one or more of the following
measures:
 Turn the television or radio antenna until the
interference stops.
 Move the computer to one side or the other of the
television or radio.
 Move the computer farther away from the television
or radio.
 Plug the computer into an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are
on circuits controlled by different circuit breakers
or fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product.
Or consult an experienced radio/television technician
for additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc. could void the EMC
compliance and negate your authority to operate the
product.
This product has demonstrated EMC compliance under
conditions that included the use of compliant peripheral
devices and shielded cables (including Ethernet network
cables) between system components. It is important
that you use compliant peripheral devices and shielded
cables between system components to reduce the
possibility of causing interference to radios, television
sets, and other electronic devices.72
Responsible party (contact for FCC matters only):
Apple Inc. Corporate Compliance
1 Infinite Loop, MS 26-A
Cupertino, CA 95014
Wireless Radio Use
Cet appareil doit être utilisé à l’intérieur lorsqu’il
fonctionne dans l’intervalle de fréquences compris de
5,15 à 5,25 GHz.
Cet appareil doit être utilisé à l’intérieur.
Exposure to Radio Frequency Energy
The radiated output power of the AirPort Extreme
technology is below the FCC and EU radio frequency
exposure limits. Nevertheless, it is advised to use the
wireless equipment in such a manner that the potential
for human contact during normal operation is
minimized.
FCC Bluetooth Wireless Compliance
The antenna used with this transmitter must not be
colocated or operated in conjunction with any other
antenna or transmitter subject to the conditions of the
FCC Grant.
Bluetooth Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de Classe B respecte toutes les
exigences du Règlement sur le matériel brouilleur
du Canada.
Industry Canada Statement
Complies with the Canadian ICES-003 Class B
specifications. Cet appareil numérique de la classe B est
conforme à la norme NMB-003 du Canada. This device
complies with RSS 210 of Industry Canada.
Bluetooth Europe—Déclaration de conformité
UE
Cet appareil sans fil est conforme à la directive R&TTE.
Europe—Déclaration de conformité UE
See www.apple.com/euro/compliance.
Korea Warning Statements
Singapore Wireless Certification
Taiwan Wireless Statements73
Taiwan Class B Statement
VCCI Class B Statement
External USB Modem Information
When connecting your Mac mini to the phone line
using an external USB modem, refer to the
telecommunications agency information in the
documentation that came with your modem.
ENERGY STAR®
Compliance
As an ENERGY STAR®
partner, Apple has determined
that standard configurations of this product meet the
ENERGY STAR®
guidelines for energy efficiency. The
ENERGY STAR®
program is a partnership with electronic
equipment manufacturers to promote energy-efficient
products. Reducing energy consumption of products
saves money and helps conserve valuable resources.
This computer is shipped with power management
enabled with the computer set to sleep after 10 minutes
of user inactivity. To wake your computer, click the
mouse or trackpad button or press any key on the
keyboard.
For more information about ENERGY STAR®, visit:
www.energystar.gov.74
Informations sur l’élimination et le recyclage
Ce symbole indique que la mise au rebut de votre
produit doit obéir aux lois et réglementations locales.
Quand vous souhaitez mettre au rebut votre produit,
contactez Apple ou les autorités locales pour en savoir
plus sur les modalités de son recyclage.
Pour en savoir plus sur le programme de recyclage
d’Apple, rendez-vous sur l’adresse www.apple.com/fr/
environment/recycling.
Informations sur l’élimination des batteries
Débarrassez-vous des batteries en respectant les lois et
les consignes environnementales locales.
Deutschland: Dieses Gerät enthält Batterien. Bitte nicht
in den Hausmüll werfen. Entsorgen Sie dieses Gerätes
am Ende seines Lebenszyklus entsprechend der
maßgeblichen gesetzlichen Regelungen.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca) worden
gedeponeerd.
Taïwan:
Union européenne—Informations sur l’élimination
Le symbole ci-dessus signifie que vous devez vous
débarrasser de votre produit sans le mélanger avec les
ordures ménagères, selon les normes et la législation de
votre pays. Lorsque ce produit n’est plus utilisable,
portez-le dans un centre de traitement des déchets
agréé par les autorités locales. Certains centres
acceptent les produits gratuitement. Le traitement et le
recyclage séparé de votre produit lors de son
élimination aideront à préserver les ressources naturelles
et à protéger l’environnement et la santé des êtres
humains.K Apple Inc.
© 2009 Apple Inc. Tous droits réservés.
En application des lois et conventions en vigueur,
aucune reproduction totale ni partielle du manuel n’est
autorisée, sauf consentement écrit préalable d’Apple.
Le logo Apple est une marque d’Apple Inc., déposée aux
États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option + 1) pourra
constituer un acte de contrefaçon et/ou de concurrence
déloyale.
Tout a été mis en œuvre pour que les informations pré-
sentées dans ce manuel soient exactes. Apple n’est pas
responsable des erreurs de reproduction ou d’impression.
Apple
1 Infinite Loop
Cupertino, CA 95014
408-996-1010
www.apple.com
Apple, le logo Apple, AirPort, AirPort Extreme, FireWire,
iPod, iTunes, Keynote, Mac, Mac OS et QuickTime sont
des marques d’Apple Inc. déposées aux États-Unis et
dans d’autres pays.
Aperture, Apple Remote Desktop, Final Cut Studio, Finder, le logo FireWire, iPhone et Logic Studio sont des
marques d’Apple Inc.
AppleCare et Apple Store sont des marques de service
d’Apple Inc. déposées aux États-Unis et dans d’autres
pays.
ENERGY STAR®
est une marque déposée aux États-Unis.
La marque et les logos Bluetooth®
sont des marques
déposées par Bluetooth SIG, Inc. et sont utilisés sous
licence par Apple.
Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits commercialisés par des entreprises tierces ne sont
mentionnés que pour information, sans aucune intention de préconisation ni de recommandation. Apple
décline toute responsabilité quant à l’utilisation et au
fonctionnement de ces produits.
Fabriqués sous licence par Dolby Laboratories. « Dolby »,
« Pro Logic » et le symbole double D sont des marques
de Dolby Laboratories. Ouvrages confidentiels inédits, ©
1992–1997 Dolby Laboratories, Inc. Tous droits réservés.
Le produit décrit dans ce manuel intègre des technologies de protection des droits d’auteur elles-mêmes protégées par divers brevets des États-Unis ainsi que par
d’autres droits de propriété intellectuelle appartenant à
Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection des droits
d’auteur doit être autorisée par Macrovision Corporation et est destinée à un cadre privé ou restreint, sauf
consentement de Macrovision Corporation. Tout
démontage ou ingénierie inverse est interdit.
L’appareil est couvert par les brevets des États-Unis portant les numéros 4,631,603, 4,577,216, 4,819,098 et
4,907,093 sous licence à des fins de visualisation limitée
uniquement.
Publié simultanément aux États-Unis et au Canada.
Création de
réseaux AirPort
grâce à
l’Utilitaire AirPort
Mac OS X 10.5 + Windows2
1 Table des matières
Chapitre 1 4 Premiers contacts
6 Configuration, à l’aide d’Utilitaire AirPort, de périphériques sans fil Apple pour l’accès à
Internet
7 Extension de la portée de votre réseau AirPort
7 Partage d’un disque dur USB branché sur une borne d’accès AirPort Extreme ou sur une
Time Capsule
8 Impression à l’aide d’un périphérique sans fil Apple
8 Partage de la connexion à Internet de votre ordinateur
Chapitre 2 11 Sécurité d’AirPort
11 Sécurité des réseaux AirPort domestiques
12 Sécurité des réseaux AirPort pour les entreprises et les écoles
13 WPA (Wi-Fi Protected Access) et WPA2
Chapitre 3 16 Configuration de réseaux AirPort
17 Configuration à l’aide d’Utilitaire AirPort
20 Configuration du réseau AirPort Extreme
27 Configuration et partage de l’accès à Internet
45 Réglage des options avancées
47 Configuration d’un système de distribution sans fil WDS
52 Extension de la portée d’un réseau 802.11n
54 Configuration d’un réseau bibande (2,4 GHz et 5 GHz)
55 Protection de votre réseau
61 Acheminement du trafic réseau vers un ordinateur particulier de votre réseau (mappage de ports)
63 Journalisation
64 Configuration de IPv6
65 Partage et protection de disques durs USB sur votre réseau
66 Utilisation d'une Time Capsule sur votre réseau
67 Connexion d’une imprimante USB à un périphérique sans fil Apple
68 Ajout d’un client sans fil à votre réseau 802.11n
69 Résolution des problèmesTable des matières 3
Chapitre 4 71 Considérations générales
71 Fonctionnement d’un réseau
75 Éléments pouvant provoquer des interférences avec AirPort
Glossaire 761
4
1 Premiers contacts
AirPort est le moyen le plus simple d’accéder sans fil à Internet
et aux réseaux, depuis n’importe quel emplacement de votre
maison, de votre bureau ou d’une salle de classe.
AirPort repose sur les dernières spécifications de l’avant-projet 802.11n de l’IEEE
(Institute of Electrical and Electronics Engineers) et assure une mise en réseau sans
fil rapide et fiable à la maison, dans les salles de classe ou dans les petites entreprises.
Il offre des taux de transfert de données jusqu’à cinq fois supérieurs au taux fournis par
la norme 802.11g et un rayon de détection réseau au moins deux fois plus étendu.
La borne d’accès AirPort Extreme et la Time Capsule sont des dispositifs bibandes, c’est-à-
dire qu’elles fonctionnent aussi bien dans le spectre de 2,4 Gigahertz (GHz) que de 5 GHz.
Elles sont en outre totalement rétrocompatibles, de sorte que les ordinateurs Mac et PC
équipés de cartes de connexion sans fil répondant aux normes 802.11a, 802.11b, 802.11g
ou à l’avant-projet de norme 802.11n de l’IEEE peuvent se connecter aux réseaux sans fil
Airport. Ils fonctionnent également sans problème avec AirPort Express pour diffuser
notamment de la musique via une connexion sans fil. La borne d’accès AirPort Extreme
et la Time Capsule sont dotées de trois ports Ethernet 10/100/1000Base-T Gigabit
supplémentaires ; il n’est donc pas nécessaire d’ajouter un routeur à votre réseau.
Pour configurer une borne d’accès AirPort Extreme, AirPort Express ou une Time
Capsule, vous devez exécuter Utilitaire AirPort, l’application de configuration et de gestion simplifiées. Utilitaire AirPort est doté d’une interface utilisateur simple rassemblant
l’ensemble des commandes logicielles. Il simplifie la gestion de plusieurs périphériques
sans fil Apple et offre des fonctions de contrôle de clients et de journalisation. Utilitaire
AirPort permet d’activer des comptes d’invité à durée de validité limitée pour autoriser
un accès temporaire à votre réseau. Il n’est, par conséquent, plus nécessaire de fournir
le mot de passe de votre réseau aux utilisateurs de passage. Vous pouvez même créer
des comptes dotés de limites temporaires afin d’exercer un contrôle parental optimal.
Cette version d’Utilitaire AirPort prend en charge IPv6 et Bonjour, afin que vous puissiez « rendre publics » des services réseau tels que l’impression et le partage de disque
dur à travers le port WAN.Chapitre 1 Premiers contacts 5
Remarque : lorsque les fonctionnalités abordées dans ce document s’appliquent indiffé-
remment à la borne d’accès AirPort Extreme, à l'AirPort Express et à la Time Capsule, les
périphériques sont alors appelés, dans leur ensemble, « périphériques sans fil Apple ».
Vous pouvez brancher un disque dur USB sur une borne d’accès AirPort Extreme ou sur
une Time Capsule pour que tout le monde ayant accès au réseau puisse sauvegarder,
stocker et partager des fichiers. Comme chaque Time Capsule comprend un disque
AirPort interne, il n’est pas nécessaire de brancher de disque externe. Vous pouvez,
si vous le désirez, connecter d’autres disques USB au port USB de votre Time Capsule.
Vous avez également la possibilité de brancher une imprimante USB sur le port USB
de n’importe quel périphérique sans fil Apple, afin que tous les utilisateurs du réseau
puissent accéder à l’imprimante ou au concentrateur.
Tous les périphériques sans fil Apple procurent un niveau élevé de sécurité d’accès sans
fil. Ils comportent un coupe-feu intégré et prennent en charge des technologies standard de chiffrement de données. L’utilitaire de configuration simple d’emploi et de
puissantes commandes d’accès permettent toutefois aux utilisateurs autorisés de se
connecter sans difficultés au réseau Airport qu’ils ont créés.
Utilisez l’une des méthodes suivantes avec un périphérique sans fil Apple pour assurer
un accès sans fil à Internet et partager une seule connexion à Internet entre plusieurs
ordinateurs :
 Configurez le périphérique en routeur destiné à fournir des adresses IP aux ordinateurs du réseau via DHCP et NAT. Si le périphérique sans fil est branché sur un
modem DSL ou câble connecté à Internet, il reçoit les pages web et le courrier électronique provenant d’Internet à travers sa connexion Internet, puis retransmet ce
contenu via le réseau sans fil (aux ordinateurs sans fil) ou via Ethernet (aux ordinateurs connectés par leur port Ethernet).
 Configurez le périphérique sans fil Apple en pont entre un réseau existant disposant
déjà d’un accès à Internet et un routeur fournissant les adresses IP. Le périphérique
transmet alors les adresses IP et la connexion Internet aux ordinateurs équipés
d’AirPort ou d’une carte sans fil ou aux ordinateurs connectés au périphérique sans fil
via Ethernet. 6 Chapitre 1 Premiers contacts
Ce document fournit des informations sur la borne d’accès AirPort Extreme, sur AirPort
Express et sur Time Capsule, ainsi que des informations détaillées sur la configuration
de réseaux 802.11n à l’aide d’Utilitaire AirPort pour des ordinateurs équipés de
Mac OS X v10.5 ou ultérieur ou de Windows XP et du Service Pack 2. Vous pouvez configurer un périphérique sans fil Apple pour vous connecter sans fil à Internet en quelques minutes. De plus, comme les périphériques sans fil Apple sont des produits de
mise en réseau à la fois souples et puissants, vous pouvez créer un réseau AirPort
offrant de nombreuses autres possibilités. Ce document permet également de concevoir et de mettre en place un réseau AirPort chargé de fournir, via Ethernet, un accès
Internet à des ordinateurs non équipés d’AirPort ou de tirer parti de certaines des fonctionnalités plus avancées de votre périphérique sans fil. Vous trouverez d’autres informations générales concernant les réseaux sans fil, ainsi qu’une vue d’ensemble de la
technologie AirPort, dans les documents AirPort publiés précédemment et disponibles
à l’adresse www.apple.com/fr/support/manuals/airport.
Remarque : les captures d’écran d’Utilitaire AirPort contenues dans ce document
proviennent de Mac OS X 10.5. Si vous utilisez un ordinateur Windows, il se peut que
les images de ce document diffèrent légèrement de ce qui apparaît sur votre écran.
Configuration, à l’aide d’Utilitaire AirPort, de périphériques
sans fil Apple pour l’accès à Internet
Tout comme votre ordinateur, les périphériques sans fil Apple doivent, pour se connecter à Internet, être configurés à l’aide des informations appropriées sur le matériel et
la mise en réseau IP. Installez Utilitaire AirPort, disponible sur le CD accompagnant votre
périphérique sans fil, et exécutez-le pour indiquer les données de configuration d’accès
à Internet et d’autres réglages réseau.
Cette version d’Utilitaire AirPort allie la simplicité d’usage d’Assistant réglages AirPort et
la puissance d’Utilitaire Admin AirPort. Elle est installée dans le dossier Utilitaires (situé
dans le dossier Applications) sur les ordinateurs Macintosh fonctionnant sous Mac OS X,
et dans Démarrer > Tous les programmes > AirPort sur les ordinateurs fonctionnant sous
Windows. Utilitaire AirPort vous guide tout au long de la procédure de configuration
en vous posant une série de questions visant à déterminer comment la connexion à
Internet de la borne d’accès et les autres interfaces doivent être configurées. Saisissez
les réglages Ethernet, PPPoE (PPP over Ethernet) ou LAN (réseau local) qui vous ont été
fournis par votre fournisseur d’accès à Internet ou votre administrateur réseau, attribuez
à votre réseau AirPort un nom et un mot de passe, configurez une borne d’accès comme
pont sans fil pour étendre le champ de détection de votre réseau AirPort existant et
réglez d’autres options.
Une fois que vous avez terminé la saisie des réglages, Utilitaire AirPort transfère ces
derniers à votre périphérique sans fil. Il se connecte ensuite à Internet et partage sa
connexion Internet avec les ordinateurs qui accèdent au réseau AirPort.Chapitre 1 Premiers contacts 7
Vous pouvez également créer un réseau AirPort exploitant les fonctions de mise en
réseau plus avancées offertes par les périphériques sans fil Apple. Pour le réglage
d’options AirPort plus évoluées, Utilitaire AirPort vous permet de configurer manuellement votre périphérique sans fil ou de reprendre et modifier rapidement des réglages
que vous avez déjà configurés sur un autre périphérique. Certaines des fonctions avancées de mise en réseau AirPort ne peuvent être mises en place qu’à l’aide des fonctions de configuration manuelle d’Utilitaire AirPort.
Utilitaire AirPort vous permet de configurer manuellement votre périphérique sans fil
Apple si :
 vous souhaitez fournir l’accès Internet à des ordinateurs qui se connectent au
périphérique sans fil via Ethernet ;
 vous avez déjà configuré votre périphérique, mais vous devez modifier un réglage
(les informations d’identification de votre compte par exemple) ;
 vous devez configurer des réglages avancés tels que la fréquence de canal, les options
avancées de sécurité, les réglages relatifs aux réseaux fermés, la durée de bail DHCP,
le contrôle d’accès, la confidentialité WAN, les réglages de puissance de transmission,
le mappage de ports ou d’autres options.
Pour obtenir des instructions relatives à l’usage d’Utilitaire AirPort en vue de configurer
manuellement votre périphérique sans fil et votre réseau, reportez-vous à la rubrique
« Configuration à l’aide d’Utilitaire AirPort » à la page 17.
Extension de la portée de votre réseau AirPort
Vous pouvez étendre la portée de votre réseau en vous servant d’Utilitaire AirPort soit
pour configurer des connexions sans fil entre plusieurs périphériques de votre réseau
et créer ainsi un système WDS (Wireless Distribution System), soit pour connecter un
périphérique via Ethernet afin de créer un réseau itinérant. Pour plus d’informations sur
la configuration d’un WDS ou d’un réseau itinérant, consultez la section « Connexion
de périphériques sans fil supplémentaires à votre réseau AirPort » à la page 45.
Partage d’un disque dur USB branché sur une borne d’accès
AirPort Extreme ou sur une Time Capsule
Si vous utilisez une Time Capsule ou la toute dernière borne d’accès AirPort Extreme,
vous pouvez brancher un disque dur USB dessus afin que les ordinateurs Macintosh ou
Windows, connectés sans fil ou par câbles, puissent partager des fichiers sur le disque
dur. Comme chaque Time Capsule comprend un disque AirPort interne, il n’est pas
nécessaire de brancher de disque externe. Vous pouvez, si vous le désirez, connecter
d’autres disques USB au port USB de votre Time Capsule. Voir « Partage et protection de
disques durs USB sur votre réseau » à la page 65.8 Chapitre 1 Premiers contacts
Impression à l’aide d’un périphérique sans fil Apple
Si vous disposez d’une imprimante compatible USB branchée sur votre périphérique
sans fil Apple, les ordinateurs du réseau AirPort peuvent utiliser Bonjour (technologie
réseau Apple sans configuration nécessaire) pour exploiter l’imprimante. Pour obtenir
des instructions sur l’utilisation d’une imprimante USB à partir d’un ordinateur, reportez-vous à la section intitulée « Connexion d’une imprimante USB à un périphérique
sans fil Apple » à la page 67.
Partage de la connexion à Internet de votre ordinateur
Si votre ordinateur est connecté à Internet, vous pouvez partager votre connexion avec
d’autres ordinateurs fonctionnant sous Mac OS X 10.2 ou ultérieur ou sous Windows XP
Service Pack 2. On parle alors d’ordinateur en configuration de borne d’accès logicielle.
Vous pouvez partager votre connexion à Internet à condition que votre ordinateur soit
connecté à Internet. Si votre ordinateur passe en mode veille, si vous le redémarrez ou
si la connexion à Internet est interrompue, vous devez réactiver le partage Internet.
Pour démarrer le partage Internet sur un ordinateur sous Mac OS X 10.5 :
1 Ouvrez Préférences Système, puis cliquez sur Partage.
2 Choisissez le port à utiliser pour partager votre connexion Internet dans le menu local
« Partager votre connexion depuis ».
3 Sélectionnez le port à utiliser pour partager votre connexion Internet dans la liste
« Aux ordinateurs via ». Vous pouvez, par exemple, partager votre connexion avec
des ordinateurs équipés d’une carte AirPort ou d’un port Ethernet intégré.
4 Sélectionnez Partage Internet dans la liste des services.Chapitre 1 Premiers contacts 9
5 Si vous souhaitez partager votre connexion Internet avec des ordinateurs équipés
d’AirPort, cliquez sur Options AirPort pour attribuer un nom et un mot de passe à
votre réseau.
Pour démarrer le partage Internet sur un ordinateur fonctionnant sous Windows :
1 Ouvrez le Panneau de configuration accessible depuis le menu Démarrer, puis cliquez
sur Réseau et Internet.
2 Cliquez sur « Centre Réseau et partage ».
3 Cliquez sur « Gérer les connexions réseau » dans la liste Tâches.
4 Cliquez à l’aide du bouton droit de la souris sur la connexion réseau à partager,
puis sélectionnez Propriétés.
5 Cliquez sur Partage et cochez la case « Autoriser d’autres utilisateurs du réseau à se
connecter via la connexion Internet de cet ordinateur ».10 Chapitre 1 Premiers contacts
Remarque : si vous utilisez le même port (le port Ethernet intégré, par exemple) pour
la connexion à Internet et pour la connexion au réseau local, consultez votre FAI avant
d’activer le partage Internet. En effet, dans certains cas (si vous utilisez un modem
câble par exemple), il est possible que l’activation du partage Internet ait des répercussions sur les réglages réseau d’autres clients de votre FAI. Ce dernier risque alors de
résilier votre accès à Internet afin de vous empêcher de perturber son réseau.
Les chapitres suivants décrivent les options de sécurité AirPort, la conception et
la configuration de réseaux AirPort ainsi que d’autres options avancées.2
11
2 Sécurité d’AirPort
Ce chapitre présente une vue d’ensemble des fonctions de
sécurité disponibles avec AirPort.
Les périphériques sans fil Apple sont conçus pour offrir plusieurs niveaux de sécurité,
afin que vous puissiez accéder à Internet, gérer vos transactions financières en ligne
ou envoyer et recevoir du courrier électronique en toute tranquillité. La borne d’accès
AirPort Extreme et la Time Capsule comprennent également un logement permettant
d’insérer un cadenas pour dissuader tout vol du matériel.
Pour obtenir des informations et des instructions sur la configuration de ces fonctions de
sécurité, consultez la section « Configuration du réseau AirPort Extreme » à la page 20.
Sécurité des réseaux AirPort domestiques
Apple vous offre plusieurs moyens de protéger votre réseau AirPort sans fil ainsi que
les données qui y circulent.
Pare-feu NAT
Il est possible de protéger votre réseau sans fil à l’aide d’un coupe-feu. Les périphériques sans fil Apple disposent d’un coupe-feu NAT (Network Address Translation)
intégré qui constitue une barrière entre votre réseau et Internet, protégeant ainsi
vos données contre les attaques IP venant d’Internet. Le coupe-feu est activé automatiquement lorsque vous configurez le périphérique pour le partage d’une connexion
Internet unique. Pour les ordinateurs équipés d’un modem câble ou DSL, AirPort se
révèle en réalité plus sûr qu’une connexion filaire.
Réseau fermé
La création d’un réseau fermé permet de maintenir la confidentialité du nom et de
l’existence même de votre réseau. Les utilisateurs potentiels de votre réseau doivent
connaître le nom et le mot de passe de celui-ci pour pouvoir y accéder. Pour créer
un réseau fermé, utilisez Utilitaire AirPort, situé dans le dossier Utilitaires du dossier
Applications sur les ordinateurs Macintosh ou dans Démarrer > Tous les programmes >
AirPort sur les ordinateurs exécutant Windows.12 Chapitre 2 Sécurité d’AirPort
Protection et chiffrement des mots de passe
AirPort utilise la protection et le chiffrement des mots de passe pour offrir un niveau
de sécurité comparable à celui des réseaux filaires traditionnels. Les utilisateurs doivent
parfois saisir un mot de passe pour se connecter au réseau AirPort. Pour transmettre
des données et des mots de passe, le périphérique sans fil utilise un chiffrement à
128 bits, par accès protégé WPA (Wi-Fi Protected Access), WPA2 ou WEP (Wireless
Equivalent Privacy), afin de brouiller et de protéger les données. Si vous configurez
un périphérique AirPort 802.11n, vous pouvez également utiliser WEP (Transitional
Security Network) si des ordinateurs compatibles WEP et WPA/WPA2 sont susceptibles
de se connecter à votre réseau.
Remarque : la sécurité WPA est uniquement disponible pour les périphériques sans fil
AirPort Extreme, les clients AirPort et AirPort Extreme fonctionnant sous Mac OS X 10.3
ou ultérieur et utilisant AirPort 3.3 ou ultérieur, ainsi que les clients non-Apple utilisant
d’autres adaptateurs sans fil 802.11 compatibles avec WPA. La sécurité WPA2 requiert
la version 5.6 ou ultérieure du programme interne dans le cas d’une borne d’accès
AirPort Extreme, la version 6.2 ou ultérieure en ce qui concerne AirPort Express,
la version 7.3 ou ultérieure pour Time Capsule et un ordinateur Macintosh doté d’une
carte sans fil AirPort Extreme utilisant AirPort 4.2 ou ultérieur. Si votre ordinateur utilise
Windows XP ou Windows Vista, consultez la documentation qui l’accompagne pour
savoir s’il prend en charge WPA2.
Sécurité des réseaux AirPort pour les entreprises et les écoles
Les entreprises et les écoles doivent restreindre les communications réseau aux utilisateurs autorisés et protéger les données des regards indiscrets. Pour répondre à ce
besoin, les périphériques et logiciels d’accès sans fil Apple offrent une suite fiable
de mécanismes de sécurité. Ouvrez Utilitaire AirPort pour configurer ces fonctions
de sécurité avancées.
Contrôle de la puissance de transmission
Étant donné que les ondes radio circulent dans toutes les directions, elles peuvent se
propager en dehors des limites d’un immeuble. Le réglage Puissance de transmission
disponible dans Utilitaire AirPort vous permet de régler la plage de transmission du
réseau de votre périphérique. Seuls les utilisateurs situés à proximité du réseau ont
accès au réseau.
Contrôle d’accès par adresses MAC
Toutes les cartes sans fil et AirPort possèdent une adresse MAC (Media Access Control)
unique. Pour les cartes AirPort et AirPort Extreme, l’adresse MAC est parfois appelée
« identifiant AirPort ». La prise en charge du contrôle d’accès par adresses MAC permet
aux administrateurs d’établir une liste d’adresses MAC et de limiter l’accès au réseau
aux seuls utilisateurs dont les adresses MAC figurent dans la liste de contrôle d’accès.Chapitre 2 Sécurité d’AirPort 13
Gestion RADIUS
Le service RADIUS (Remote Authentication Dial-In User Service) permet de sécuriser
facilement les réseaux de grande envergure. RADIUS est un protocole de contrôle
d’accès qui permet à un administrateur système de créer une liste des noms d’utilisateur et des mots de passe des ordinateurs pouvant accéder au réseau. Placer cette liste
sur un serveur centralisé permet à de nombreux périphériques sans fil d’y accéder et
facilite la mise à jour. Si l’adresse MAC de l’ordinateur d’un utilisateur (propre à chaque
carte sans fil 802.11) ne figure pas sur votre liste d’adresses MAC approuvées, l’utilisateur ne pourra pas se connecter à votre réseau.
WPA (Wi-Fi Protected Access) et WPA2
La vulnérabilité du WEP est devenu un problème de plus en plus préoccupant. Pour faire
face à ce problème, la Wi-Fi Alliance, en conjonction avec l’IEEE, a mis au point des normes de sécurité interfonctionnelles avancées, appelées WPA (Wi-Fi Protected Access)
et WPA2.
WPA et WPA2 utilisent des caractéristiques rassemblant des mécanismes de sécurité
interfonctionnels standard et augmentant considérablement le niveau de protection
des données et le contrôle d’accès des réseaux LAN sans fil. Avec le WPA et le WPA2,
les utilisateurs de réseaux LAN sans fil ont la garantie que leurs données sont proté-
gées et que seuls les utilisateurs autorisés peuvent accéder au réseau. Pour accéder à
un réseau sans fil qui utilise WPA ou WPA2, les ordinateurs doivent prendre en charge
WPA ou WPA2. WPA offre une protection élevée des données et requiert une authentification de l’utilisateur lorsqu’il est utilisé en mode Entreprise.
Les principales technologies fondées sur les normes qui composent le WPA sont,
entre autres : le protocole TKIP (Temporal Key Integrity Protocol), 802.1x, MIC
(Message Integrity Check) et le protocole EAP (Extensible Authentication Protocol).
Le protocole TKIP permet un chiffrement avancé des données en comblant les failles
du chiffrement WEP, y compris la fréquence à laquelle les clés sont utilisées pour chiffrer la connexion sans fil. 802.1x et EAP offrent la possibilité d’authentifier un utilisateur
sur le réseau sans fil.
802.1x est une méthode de contrôle d’accès réseau fondée sur le port destinée aux
réseaux filaires ou sans fil. L’IEEE a adopté la norme 802.1x en août 2001.
La fonction MIC (Message Integrity Check) a pour but d’empêcher un pirate d’intercepter des paquets de données, de les falsifier et de les renvoyer. La fonction MIC propose
une fonction mathématique puissante par laquelle le récepteur et l’émetteur calculent
puis comparent le MIC. Si les MIC ne correspondent pas, on suppose que les données
ont été falsifiées et le paquet est supprimé. Si la fonction MIC échoue plusieurs fois,
le réseau peut lancer des contre-mesures.14 Chapitre 2 Sécurité d’AirPort
Le protocole EAP connu comme TLS (Transport Layer Security) présente les informations d’identification des utilisateurs sous forme de certificats numériques. Les certificats numériques d’un utilisateur incluent, par exemple, les noms d’utilisateurs et mots
de passe, les cartes intelligentes, les mots de passe de connexion ou toute autre information d’identification que l’administrateur du système informatique a décidé d’utiliser. WPA utilise un large éventail d’implémentations EAP fondées sur les normes,
notamment le protocole EAP-TLS (EAP-Transport Layer Security), le protocole EAP-TTLS
(EAP-Tunnel Transport Layer Security) et le protocole PEAP (Protected Extensible
Authentication Protocol). AirPort Extreme prend également en charge le protocole
LEAP (Lightweight Extensible Authentication Protocol), une protocole de sécurité utilisé par les points d’accès Cisco pour attribuer de manière dynamique une clé WEP distincte à chaque utilisateur. AirPort Extreme est compatible avec le protocole de sécurité
LEAP de Cisco, ce qui permet aux utilisateurs AirPort de se connecter, via le protocole
LEAP, aux réseaux sans fil hébergés par Cisco.
En plus de TKIP, WPA2 prend en charge le protocole de chiffrement AES-CCMP. Basé sur
AES (Advanced Encryption Standard), le standard de chiffrement par blocs sécurisé
adopté aux États-Unis, combinant les techniques les plus sophistiquées, AES-CCMP
a été spécialement conçu pour les réseaux sans fil. La migration de WEP vers WPA2
requiert le nouveau programme interne de la borne d’accès AirPort Extreme (version
5.6 ou ultérieure) et de l’AirPort Express (version 6.2 ou ultérieure). Les périphériques
utilisant le mode WPA2 ne sont plus compatibles avec WEP.
WPA et WPA2 disposent de deux modes :
 le mode Personnel, qui s’appuie sur les capacités des protocoles TKIP ou AES-CCMP
sans avoir recours à un serveur d’authentification ;
 le mode Entreprise, qui utilise un serveur séparé, comme par exemple le serveur
RADIUS, pour l’authentification des utilisateurs.
WPA et WPA2 Personnel
 Pour les réseaux domestiques ou les petites entreprises à domicile, WPA et WPA2
fonctionnent en mode Personnel afin de prendre en compte le fait que ces utilisateurs ne possèdent pas de serveur d’authentification. Au lieu de s’authentifier auprès
d’un serveur RADIUS, les utilisateurs saisissent manuellement un mot de passe pour
se connecter au réseau sans fil. Lorsqu’un utilisateur saisit correctement son mot de
passe, le périphérique sans fil lance le processus de chiffrement à l’aide du protocole
TKIP ou AES-CCMP. Les protocoles TKIP ou AES-CCMP utilisent le mot de passe d’origine et calculent mathématiquement ses clés de chiffrement à partir du mot de
passe réseau. La clé de chiffrement est régulièrement modifiée et alternée afin
qu’aucune clé ne soit utilisée deux fois de suite. À part la saisie du mot de passe
réseau, aucune intervention de l’utilisateur n’est requise pour faire fonctionner
le WPA ou WPA2 Personnel à son domicile.Chapitre 2 Sécurité d’AirPort 15
WPA et WPA2 Entreprise
WPA est un sous-ensemble de la future norme IEEE 802.11i qui répond efficacement aux
besoins en matière de sécurité WLAN (Wireless Local Area Network) pour l’entreprise.
WPA2 est la mise en œuvre de la norme ratifiée IEEE 802.11i. Dans une entreprise dotée
de ressources informatiques, WPA doit être utilisé en conjonction avec un serveur
d’authentification tel que RADIUS pour offrir une gestion et un contrôle d’accès centralisés. Une fois cette implémentation effectuée, les solutions complémentaires telles que
les réseaux privés virtuels (VPN) ne sont plus nécessaires, tout au moins pour sécuriser
les connexions sans fil d’un réseau.
Pour plus d’informations sur la configuration d’un réseau protégé par WPA ou WPA2,
consultez la section « Utilisation de WPA (Wi-Fi Protected Access) » à la page 56.3
16
3 Configuration de réseaux AirPort
Ce chapitre contient des informations et des instructions
d’ordre général sur les types de réseaux AirPort Extreme
que vous pouvez configurer et sur certaines des options
avancées proposées par AirPort Extreme.
Reportez-vous à ce chapitre au moment de créer et de configurer votre réseau
AirPort Extreme.
La configuration de votre périphérique sans fil Apple pour mettre en place un réseau se
fait en trois étapes :
Étape 1 : Configuration du réseau AirPort Extreme
Les ordinateurs communiquent avec le périphérique sans fil à travers le réseau sans fil
AirPort. Lorsque vous configurez le réseau AirPort créé par le périphérique sans fil,
vous pouvez attribuer un nom au réseau sans fil, définir un mot de passe nécessaire
pour accéder à ce réseau et régler d’autres options.
Étape 2 : Configuration et partage de l’accès à Internet
Lorsque des ordinateurs accèdent à Internet via le réseau AirPort Extreme, le périphérique sans fil se connecte à Internet, puis transmet les informations à travers le réseau
AirPort Extreme. Vous devez définir les réglages de votre périphérique sans fil en fonction des données fournies par votre FAI et configurer la manière dont le périphérique
sans fil partage cette connexion avec les autres ordinateurs.
Étape 3 : Réglage des options avancées
Ces réglages sont facultatifs pour la plupart des utilisateurs. Ils comprennent l’utilisation du périphérique sans fil Apple comme pont entre votre réseau AirPort Extreme
et un réseau Ethernet, le réglage d’options de sécurité avancées, la configuration d’un
système de distribution sans fil WDS (Wireless Distribution System) afin d’étendre
le réseau AirPort à d’autres périphériques sans fil et le réglage plus précis d’autres
options.
Pour des instructions précises sur toutes ces étapes, consultez les sections plus loin
dans ce chapitre.Chapitre 3 Configuration de réseaux AirPort 17
Vous pouvez effectuer la plupart de vos tâches d’installation et de configuration à l’aide
d’Utilitaire AirPort et en suivant les instructions à l’écran relatives à la saisie des informations concernant votre réseau et votre fournisseur d’accès à Internet. Pour régler
les options avancées, vous devez passer par Utilitaire AirPort pour configurer manuellement votre périphérique sans fil Apple et votre réseau AirPort.
Configuration à l’aide d’Utilitaire AirPort
Pour configurer votre ordinateur ou votre périphérique sans fil Apple, afin d’établir un
réseau sans fil de base à l’aide d’une borne d’accès AirPort Extreme, ouvrez Utilitaire
AirPort et répondez à une série de questions concernant vos réglages Internet et la
manière dont vous souhaitez configurer votre réseau.
1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
2 Sélectionnez votre périphérique dans la liste de gauche si votre réseau comprend plusieurs périphériques. Cliquez sur Continuer, puis suivez les instructions à l’écran pour
saisir les réglages transmis par votre fournisseur d’accès à Internet ou votre administrateur réseau en fonction du type de réseau à configurer. Reportez-vous aux diagrammes de réseau présentés plus loin dans ce chapitre pour connaître les différents types
de réseaux que vous pouvez configurer à l’aide d’Utilitaire AirPort.
Pour configurer un réseau plus complexe, ou pour apporter des modifications à un
réseau que vous avez déjà configuré, utilisez les fonctions de configuration manuelle
disponibles dans Utilitaire AirPort.18 Chapitre 3 Configuration de réseaux AirPort
Définition des préférences AirPort
Utilisez les préférences AirPort pour configurer votre périphérique sans fil afin qu’il vous
signale la disponibilité des mises à jour. Vous pouvez également la configurer pour
qu’elle vous notifie lorsqu’elle détecte des problèmes, et qu’elle vous fournissent des
instructions visant à résoudre le problème.
Pour définir les Préférences AirPort :
1 Ouvrez Utilitaire AirPort, situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows.
2 Choisissez Préférences, dans le menu Utilitaire AirPort si vous possédez un Mac,
ou dans le menu Fichier s’il s’agit d’un ordinateur Windows.
Activez les cases suivantes :
 Activez la case « Rechercher les mises à jour à l’ouverture d’Utilitaire AirPort » pour
rechercher automatiquement sur le site web Apple les mises à jour de logiciel et de
programme interne à chaque fois que vous ouvrez Utilitaire AirPort.
 Activez la case « Rechercher les mises à jour », puis choisissez un intervalle de temps
comme hebdomadaire, dans le menu local, pour rechercher les mises à jour de logiciel et de programme interne en arrière-plan. Utilitaire AirPort s’ouvre si des mises à
jour sont disponibles.
 Sélectionnez « Surveiller les périphériques sans fil Apple pour détecter les problèmes »
afin de détecter les problèmes à l’origine du clignotement orange du voyant d’état du
périphérique. Lorsque cette case est activée, Utilitaire AirPort s’ouvre si un problème
est détecté et fournit des instructions pour vous aider à résoudre le problème. Cette
option permet de surveiller tous les périphériques sans fil du réseau.
 Sélectionnez « Ne surveiller que les périphériques sans fil Apple que j’ai configurés »
pour surveiller uniquement les périphériques que vous avez configurés à l’aide de
cet ordinateur.
La détection des problèmes de périphérique requiert un périphérique AirPort sans fil
prenant en charge la version 7.0 ou ultérieure du programme interne.
Pour configurer manuellement votre périphérique sans fil :
1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
2 Sélectionnez votre périphérique dans la liste.
3 Choisissez Configuration manuelle dans le menu Borne d’accès, puis saisissez le mot de
passe si nécessaire. Le mot de passe par défaut est public.Chapitre 3 Configuration de réseaux AirPort 19
Si votre périphérique sans fil ne figure pas dans la liste :
1 Ouvrez le menu d’état AirPort dans la barre des menus, dans le cas d’un ordinateur
Mac, et assurez-vous que vous êtes connecté au réseau AirPort créé par votre périphérique sans fil. Dans le cas d’un ordinateur Windows, placez le pointeur de la souris sur
l’icône représentant le réseau sans fil dans la barre de notification pour vous assurer
que l’ordinateur est connecté au bon réseau.
Le nom de réseau par défaut d’un périphérique sans fil Apple est « Réseau AirPort
xxxxxx », les xxxxxx représentant les six derniers chiffres de l’identifiant AirPort,
également connu sous le nom d’adresse MAC. L’identifiant AirPort est placé au bas
des périphériques sans fil Apple.
2 Assurez-vous que les réglages réseau et TCP/IP de votre ordinateur sont configurés
correctement.
Sur un ordinateur Mac OS X, choisissez AirPort dans le menu local Afficher de la sousfenêtre Réseau des Préférences Système. Choisissez ensuite Via DHCP dans le menu
local Configurer IPv4 de la sous-fenêtre TCP/IP.
Sur un ordinateur Windows, cliquez avec le bouton droit de la souris sur l’icône de
connexion sans fil affichant le réseau AirPort, puis choisissez État. Cliquez sur Propriétés,
sélectionnez Protocole Internet (TCP/IP), puis cliquez sur Propriétés. Assurez-vous que
la case « Obtenir une adresse IP automatiquement » est sélectionnée.
Si vous ne parvenez pas à ousipvrir les réglages du périphérique sans fil :
1 Assurez-vous que vos réglages réseau et TCP/IP sont configurés correctement.
Si votre ordinateur fonctionne sous Mac OS X, choisissez AirPort dans la liste des services de connexion réseau située dans la sous-fenêtre Réseau des Préférences Système.
Cliquez sur Avancé, puis choisissez Via DHCP dans le menu local Configurer IPv4 de
la sous-fenêtre TCP/IP.
Sur un ordinateur Windows, cliquez avec le bouton droit de la souris sur l’icône de connexion sans fil affichant le réseau AirPort, puis choisissez État. Cliquez sur Propriétés,
sélectionnez Protocole Internet (TCP/IP), puis cliquez sur Propriétés. Assurez-vous que
la case « Obtenir une adresse IP automatiquement » est sélectionnée.
2 Veillez à saisir correctement le mot de passe du périphérique sans fil. Le mot de passe
par défaut est public. Si vous avez oublié le mot de passe, vous pouvez rétablir le mot
de passe par défaut (public) en réinitialisant l’équipement.
Pour rétablir temporairement le mot de passe par défaut (public), maintenez le bouton
de réinitialisation enfoncé pendant une seconde. Pour restaurer les réglages par défaut
du périphérique, appuyez sur le bouton de réinitialisation pendant cinq secondes.
Si vous accédez à un réseau Ethernet comportant d’autres périphériques ou si vous
utilisez Ethernet pour vous connecter au périphérique :
Utilitaire AirPort analyse le réseau Ethernet pour créer la liste des périphériques. Par
conséquent, lorsque vous ouvrez Utilitaire AirPort, il se peut que vous y trouviez des
périphériques que vous ne pouvez pas configurer.20 Chapitre 3 Configuration de réseaux AirPort
Configuration du réseau AirPort Extreme
La première étape de la configuration de votre périphérique sans fil Apple consiste à en
définir les réglages ainsi que ceux du réseau qu’il est censé créer. Le réglage de la plupart des fonctions peut être effectué à l’aide d’Utilitaire AirPort en suivant les instructions à l’écran indiquant comment saisir les informations communiquées par votre
fournisseur d’accès à Internet ou votre administrateur réseau.
Pour configurer manuellement un réseau ou pour définir des options avancées, ouvrez
la configuration de votre périphérique sans fil dans Utilitaire AirPort, puis configurez
manuellement votre périphérique et votre réseau.
1 Choisissez le réseau du périphérique sans fil à configurer dans le menu AirPort (sur un
ordinateur Mac OS X) ou à l’aide de l’icône de connexion sans fil située dans la barre de
notification (sur un ordinateur Windows).
2 Ouvrez Utilitaire AirPort et sélectionnez le périphérique sans fil dans la liste. S’il n’y
figure pas, cliquez sur Rescanner pour parcourir les périphériques sans fil disponibles,
puis sélectionnez celui qui convient.
3 Choisissez Configuration manuelle dans le menu Borne d’accès, puis saisissez le mot de
passe si nécessaire. Le mot de passe par défaut est public.Chapitre 3 Configuration de réseaux AirPort 21
Vous avez également la possibilité de double-cliquer sur le nom du périphérique sans fil
pour ouvrir sa configuration dans une fenêtre distincte. La sous-fenêtre Résumé est affichée lorsque vous ouvrez la fenêtre de configuration manuelle. Cette sous-fenêtre fournit des informations sur votre périphérique sans fil et sur le réseau et indique leur état.
Si le périphérique présente un problème, l’icône d’état devient jaune. Cliquez sur
« État » pour afficher le problème ainsi que des suggestions de solution.22 Chapitre 3 Configuration de réseaux AirPort
Réglages de périphérique sans fil
Cliquez sur le bouton AirPort, puis cliquez sur Borne d’accès. La sous-fenêtre Borne
d’accès d’Utilitaire AirPort permet de saisir des informations sur le périphérique sans fil.
Attribution d’un nom au périphérique sans fil
Attribuez un nom aisément identifiable au périphérique. Ce nom permet aux administrateurs de localiser plus facilement un périphérique donné sur un réseau Ethernet qui
en compte plusieurs.
Modification du mot de passe du périphérique sans fil
Le mot de passe du périphérique protège sa configuration de sorte que seul l’administrateur peut la modifier. Le mot de passe par défaut est public. Il est recommandé de
changer ce mot de passe pour empêcher des modifications non autorisées.
Si vous conservez public comme mot de passe, aucun mot de passe ne vous sera
demandé lorsque vous sélectionnerez le périphérique dans la liste et que vous
cliquerez sur Configurer.
Autres informations
 Autorisez la configuration via le port WAN. Cela vous permet d’administrer le périphérique sans fil à distance.
 Rendez le matériel public sur Internet via Bonjour. Si vous disposez d’un compte
bénéficiant d’un service DNS dynamique, vous pouvez vous y connecter par Internet.
 Réglez automatiquement l’heure du périphérique. Si vous avez accès à un serveur
NTP (Network Time Protocol), sur votre réseau ou sur Internet, sélectionnez-le dans
le menu local. Cela permet de s’assurer que l’heure du périphérique sans fil est toujours correctement réglée.Chapitre 3 Configuration de réseaux AirPort 23
Définition des options de la borne d’accès
Cliquez sur Options de la borne d’accès, puis définissez les options suivantes :
 Saisissez le nom et les coordonnées d’une personne de contact pour le périphérique
sans fil. Ces données sont incluses dans certains historiques générés par le périphérique. Les champs Contact et Configuration peuvent également vous être utiles si vous
disposez de plusieurs périphériques sans fil sur votre réseau.
 Réglez le comportement du voyant d’état sur Toujours activé ou sur « Clignotement
en cas d’activité ». Si vous choisissez « Clignotement en cas d’activité », le voyant
d’état du périphérique clignote au gré du trafic réseau.
 Si votre périphérique sans fil prend en charge cette option, sélectionnez « Recherche
mise à jour du prog. interne », puis choisissez une fréquence, par exemple Tous les
jours, dans le menu local.
Réglages de réseau sans fil
Cliquez sur Sans fil, puis saisissez le nom du réseau, le mode radio et d’autres informations relatives au réseau sans fil.
Réglage du mode sans fil
L’AirPort Extreme prend en charge trois modes sans fil :
 Créer un réseau sans fil. Choisissez cette option si vous créez un nouveau réseau
AirPort Extreme.
 Participer à un réseau WDS. Choisissez cette option si vous créez un réseau WDS ou
que vous connectez ce périphérique sans fil Apple à un réseau WDS déjà configuré.
 Étendre un réseau sans fil. Choisissez cette option si vous comptez connecter un
autre périphérique sans fil Apple au réseau que vous configurez.24 Chapitre 3 Configuration de réseaux AirPort
Attribution d’un nom au réseau AirPort Extreme
Attribuez un nom à votre réseau AirPort. Ce nom apparaîtra dans le menu d’état AirPort
des ordinateurs équipés de la technologie AirPort et se trouvant dans la zone de couverture de votre réseau AirPort.
Choix du mode radio
Choisissez « 802.11n (compatible 802.11b/g) » dans le menu local Mode radio si des
ordinateurs équipés d’une carte sans fil 802.11n, 802.11g ou 802.11b doivent accéder
au réseau. Chaque ordinateur client se connectera au réseau et transmettra le trafic
réseau à sa vitesse maximale.
Choisissez « 802.11n uniquement (2,4 GHz) » si seuls des ordinateurs équipés d’une
carte sans fil compatible 802.11n doivent accéder au réseau dans la gamme de fré-
quence de 2,4 GHz.
Choisissez « 802.11n (compatible 802.11a) » si des ordinateurs équipés d’une carte sans
fil 802.11n ou 802.11a doivent accéder au réseau dans la gamme de fréquence de 5 GHz.
Les ordinateurs équipés d’une carte sans fil 802.11g ou 802.11b ne pourront pas accéder
au réseau.
Choisissez « 802.11n uniquement (5 GHz) » si des ordinateurs équipés d’une carte sans
fil 802.11n doivent accéder au réseau. Le réseau adoptera une vitesse de transmission
équivalente à celle de la spécification 802.11n. Les ordinateurs équipés d’une carte sans
fil 802.11g, 802.11b ou 802.11a ne pourront pas accéder au réseau.
Remarque : si vous ne souhaitez pas utiliser le mode radio 802.11n, maintenez la touche
Option enfoncée puis choisissez un mode radio qui ne comporte pas 802.11n.
Modification du canal
Le « canal » correspond à la fréquence radio sur laquelle votre périphérique sans fil communique. Si vous n’utilisez qu’un seul périphérique (chez vous par exemple), il est peu probable que vous deviez changer de fréquence. En revanche, si vous configurez plusieurs
périphériques sans fil (dans une école ou au bureau), vous devez utiliser des fréquences
différentes sur les périphériques situés à moins de 45 m environ les uns des autres.
L’écart entre les fréquences de canal de périphériques sans fil adjacents doit être d’au
moins quatre canaux. Ainsi, si un périphérique A est réglé sur le canal 1, le périphérique B doit être réglé sur le canal 6 ou 11. Pour un résultat optimal, utilisez les canaux 1,
6 ou 11 si vous utilisez votre périphérique dans la plage de fréquence de 2,4 GHz.
Les ordinateurs munis d’AirPort se calent automatiquement sur la fréquence de votre
périphérique sans fil lorsqu’ils se connectent au réseau AirPort. Si vous modifiez la fré-
quence, les ordinateurs clients AirPort n’ont besoin d’effectuer aucun changement.
Remarque : si vous réglez le mode radio de votre périphérique sans fil sur « 802.11n
uniquement (5 GHz) », il est impossible de changer de canal. Le mode de fréquence de
5 GHz choisit automatiquement le canal.Chapitre 3 Configuration de réseaux AirPort 25
Protection de votre réseau par mot de passe
Pour protéger votre réseau par mot de passe, vous pouvez choisir parmi plusieurs
options de sécurité sans fil. Dans la sous-fenêtre AirPort d’Utilitaire AirPort, cliquez sur
Sans fil, puis choisissez l’une des options suivantes dans le menu local Sécurité d’accès
sans fil :
 Aucune : si vous sélectionnez cette option, la protection par mot de passe du réseau
sera désactivée. N’importe quel ordinateur équipé d’un adaptateur ou d’une carte
sans fil peut rejoindre le réseau, sauf si ce dernier est configuré pour utiliser le contrôle d’accès. Voir « Configuration du contrôle d’accès » à la page 58.
 WEP : si votre périphérique prend en charge cette option, sélectionnez-la, puis choisissez un mot de passe pour protéger votre réseau à l’aide d’un mot de passe WEP (Wired
Equivalent Privacy). Votre périphérique sans fil Apple prend en charge le chiffrement à
40 et à 128 bits. Pour utiliser le WEP 40-bit, n’utilisez pas le mode radio 802.11n.
 WEP (réseau de sécurité transitionnel) : si votre périphérique prend en charge cette
option, vous pouvez l’utiliser pour permettre à tous les ordinateurs utilisant WPA ou
WPA2 d’accéder au réseau. Ainsi, les ordinateurs ou les périphériques qui utilisent
WEP peuvent également accéder au réseau. WEP (Transitional Security Network)
prend en charge le chiffrement 128-bit. Pour utiliser cette option, le périphérique
sans fil doit utiliser un mode radio 802.11n.
 WPA/WPA2 Personnel : choisissez cette option pour protéger votre réseau à l’aide
d’un mot de passe WPA (Wi-Fi Protected Access). Vous pouvez choisir un mot de
passe de 8 à 63 caractères ASCII ou bien une clé prépartagée comprenant exactement 64 caractères hexadécimaux. Les ordinateurs qui prennent en charge WPA
ou WPA2 peuvent accéder au réseau. Choisissez WPA2 Personnel pour que seuls
les ordinateurs prenant en charge WPA2 puissent accéder au réseau.
 WPA/WPA2 Entreprise : choisissez cette option si vous configurez un réseau comportant un serveur d’authentification, tel qu’un réseau RADIUS, avec des comptes utilisateur individuels. Saisissez l’adresse IP et le numéro de port des serveurs principal
et secondaire, puis saisissez un « secret partagé » qui correspond au mot de passe
du serveur. Choisissez WPA2 Entreprise pour que seuls les ordinateurs prenant en
charge WPA2 puissent accéder au réseau.
Pour obtenir plus informations et d’instructions sur la configuration de WPA et WPA2
sur votre réseau, consultez « Utilisation de WPA (Wi-Fi Protected Access) » à la page 56.26 Chapitre 3 Configuration de réseaux AirPort
Réglages des options d’accès sans fil
Cliquez sur « Options d’accès sans fil » pour définir des options supplémentaires pour
votre réseau.
Réglage des options d’accès sans fil supplémentaires
Pour définir les options ci-dessous, utilisez la sous-fenêtre « Options d’accès sans fil » :
 Région : définissez le code de région correspondant à l’endroit où se trouve votre
réseau.
 Taux de multidiffusion : choisissez un taux de multidiffusion dans le menu local.
Si vous choisissez un taux de multidiffusion élevé, seuls les clients du réseau se
trouvant dans la zone de couverture et capables d’atteindre la vitesse sélectionnée
pourront recevoir les transmissions.
 Puissance de transmission : ce menu local permet de définir la portée du réseau
(plus le pourcentage est faible, plus la portée est réduite).
 Délai de la clé de groupe WPA : tapez un nombre dans le champ de texte, puis choisissez un incrément dans le menu local pour changer la fréquence de rotation de clé.
 Utiliser les canaux larges : si vous configurez votre réseau afin qu’il utilise la gamme
de fréquence de 5 GHz, vous pouvez utiliser des canaux larges pour fournir un débit
réseau plus élevé.
Remarque : dans certains pays, l’utilisation de canaux larges est interdite.
 Créer un réseau fermé : sélectionner cette option permet de masquer le nom du
réseau, afin que les utilisateurs soient obligés de saisir le nom et le mot de passe
exacts du réseau pour accéder au réseau AirPort Extreme. Chapitre 3 Configuration de réseaux AirPort 27
 Robustesse d’interférence : cette option peut aider à résoudre les problèmes
d’interférences provoqués par d’autres appareils ou réseaux.
Pour définir d’autres options avancées de sécurité, voir « Protection de votre réseau » à
la page 55.
Configuration et partage de l’accès à Internet
L’étape suivante consiste à configurer la connexion Internet de votre périphérique sans fil
et à partager cet accès avec les ordinateurs clients. Les sections ci-après vous expliquent
comment procéder, en fonction du mode de connexion à Internet de votre périphérique.
Vous utilisez un modem DSL ou câble
Vous pouvez, dans la plupart des cas, mettre en place ce type de réseau à l’aide d’Utilitaire AirPort, en suivant les instructions à l’écran de configuration de votre périphérique sans fil et de votre réseau. Utilitaire AirPort n’est nécessaire pour configurer
manuellement votre périphérique que si vous souhaitez configurer ou modifier
des réglages avancés facultatifs.
Schéma des connexions
Fonctionnement
 Le périphérique sans fil Apple (dans notre exemple, une Time Capsule) se connecte à
Internet via sa connexion Internet WAN (<) à votre modem DSL ou câble.
 Les ordinateurs utilisant AirPort ou les ordinateurs connectés au port LAN Ethernet (G)
du périphérique sans fil se connectent à Internet à travers le périphérique.
 Le périphérique est configuré pour se connecter à Internet à l’aide d’une adresse IP
publique et utilise les protocoles DHCP et NAT pour partager sa connexion Internet
avec d’autres ordinateurs du réseau à l’aide d’adresses IP privées.
 Les ordinateurs AirPort et Ethernet peuvent communiquer entre eux par le biais du
périphérique sans fil.
modem DSL ou câble
vers Internet
vers port Ethernet
Time Capsule
< port WAN Ethernet28 Chapitre 3 Configuration de réseaux AirPort
Important : utilisez uniquement le port LAN (G) du périphérique pour brancher les
ordinateurs Ethernet non connectés à Internet. Comme le périphérique peut fournir
des services réseau, vous devez le configurer soigneusement afin d’éviter d’éventuels
conflits avec d’autres services sur votre réseau Ethernet.
Éléments requis pour une connexion par modem DSL ou modem câble
Procédure à suivre
Si vous faites appel à Utilitaire AirPort pour vous aider à configurer le périphérique
sans fil Apple pour l’accès à Internet :
1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
2 Suivez les instructions à l’écran, saisissez les réglages de connexion à Internet qui vous
ont été communiqués par votre fournisseur d’accès à Internet, puis configurez le périphérique afin qu’il partage sa connexion Internet avec les ordinateurs du réseau.
Si vous configurez manuellement votre périphérique sans fil à l’aide d’Utilitaire AirPort :
1 Assurez-vous que votre modem DSL ou câble est branché sur le port WAN Ethernet (<)
de votre périphérique sans fil Apple.
2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
Sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans
le menu Borne d’accès ou double-cliquez sur l’icône de votre périphérique dans la liste,
afin d’ouvrir la configuration dans une fenêtre distincte.
3 Cliquez sur le bouton Internet. Cliquez sur Connexion à Internet, puis choisissez Ethernet
ou PPPoE dans le menu local Connexion via, en fonction de la méthode de connexion
requise par votre fournisseur d’accès. Si votre FAI vous a fourni un logiciel de connexion
PPPoE, tel qu’EnterNet ou MacPoET, choisissez PPPoE.
Remarque : si vous vous connectez à Internet à l’aide d’un routeur via PPPoE et que
votre périphérique sans fil Apple est connecté au routeur via Ethernet, il est inutile
d’utiliser PPPoE sur votre périphérique. Choisissez Ethernet dans le menu local
« Connexion via » de la sous-fenêtre Internet, puis décochez la case « Distribuer les
adresses IP » dans la sous-fenêtre Réseau. En cas de doute, contactez votre FAI.
Éléments Vérification Commentaires
Compte Internet auprès d’un FAI
par modem câble ou DSL
Votre fournisseur d’accès utiliset-il une configuration DHCP ou
IP statique ?
Vous pouvez soit obtenir ces
informations dans la sous-fenêtre
des préférences Réseau de l’ordinateur que vous utilisez pour
accéder à Internet via votre FAI,
soit les demander à ce dernier.
Périphérique sans fil Apple
(borne d’accès AirPort Extreme,
AirPort Express ou Time Capsule)
Placez le périphérique à proximité de votre modem DSL ou
câble.Chapitre 3 Configuration de réseaux AirPort 29
4 Choisissez Manuellement ou Via DHCP dans le menu local Configurer IPv4 si vous avez
choisi Ethernet dans le menu local Connexion via, en fonction de la méthode utilisée
par votre fournisseur d’accès pour distribuer les adresses IP.
 S’il vous a fourni une adresse IP ainsi que d’autres données avec votre abonnement,
vous devez utiliser ces informations pour configurer manuellement l’adresse IP du
périphérique. En cas de doute, renseignez-vous auprès du fournisseur d’accès. Saisissez les informations concernant l’adresse IP dans les champs situés en dessous du
menu local Configurer IPv4.
 Si vous choisissez PPPoE, votre fournisseur d’accès à Internet vous fournit automatiquement une adresse IP via DHCP.
Si votre fournisseur d’accès vous demande l’adresse MAC de votre périphérique sans fil,
utilisez l’adresse du port WAN Ethernet (<) imprimée sur l’étiquette qui se trouve sous
l’appareil.
Si vous avez configuré votre périphérique sans fil à l’aide d’Utilitaire AirPort, il se peut
que les champs situés sous le menu local Configurer IPv4 contiennent déjà les données appropriées à votre fournisseur d’accès.
Vous pouvez modifier la vitesse du port WAN Ethernet si vous avez des conditions spé-
cifiques pour le réseau auquel vous êtes connecté. Dans la plupart des cas, les réglages
configurés automatiquement sont corrects. Votre fournisseur d’accès devrait pouvoir
vous dire si ces réglages doivent être modifiés ou non.
Contactez votre fournisseur d’accès pour connaî-
tre les informations à
saisir dans ces champs.
Utilisez ce menu local si
vous avez besoin d’ajuster la vitesse du port
WAN Ethernet.30 Chapitre 3 Configuration de réseaux AirPort
La modification du débit du port WAN Ethernet peut modifier le mode d’interaction
entre le périphérique sans fil et Internet. À moins que votre fournisseur d’accès ne vous
ait communiqué des réglages spécifiques, utilisez les réglages automatiques. La saisie
de réglages inadéquats risque d’affecter la performance du réseau.
Si vous configurez TCP/IP via DHCP, choisissez Via DHCP dans le menu local Configurer
IPv4. Les informations IP vous sont automatiquement fournies via DHCP par votre fournisseur d’accès à Internet.
5 Si vous avez choisi PPPoE dans le menu local Connexion via, saisissez les réglages
PPPoE indiqués par votre fournisseur d’accès. À moins que votre FAI ne requière un
nom de service, ne remplissez pas le champ Nom du service.
Il se peut que votre FAI
vous demande de remplir ces champs.Chapitre 3 Configuration de réseaux AirPort 31
Remarque : AirPort ne requiert pas l’utilisation d’une application de connexion PPPoE
de tierce partie. Vous pouvez vous connecter à Internet via AirPort.
Si vous vous connectez à Internet à l’aide d’un routeur via PPPoE et que votre périphé-
rique sans fil est connecté au routeur par Ethernet, il est inutile d’utiliser PPPoE sur
votre périphérique. Choisissez Ethernet dans le menu local « Connexion via » de la
sous-fenêtre Internet, puis décochez la case « Distribuer les adresses IP » dans la sousfenêtre Réseau. Comme les adresses IP sont distribuées par votre routeur, votre périphérique n’a pas besoin d’assurer cette fonction. Si plusieurs appareils d’un réseau
fournissent des adresses IP, vous risquez de rencontrer des problèmes.
Contactez votre fournisseur d’accès pour connaî-
tre les informations à
saisir dans ces champs.32 Chapitre 3 Configuration de réseaux AirPort
6 Cliquez sur PPPoE pour définir des options PPPoE pour votre connexion.
 Choisissez Toujours active, Automatique ou Manuelle, en fonction de la manière dont
vous souhaitez contrôler la connexion à Internet de votre périphérique sans fil.
Si vous choisissez Toujours active, votre périphérique demeure connecté à votre
modem et à Internet tant que le modem est allumé. Si vous choisissez Automatique,
le périphérique se connecte au modem, qui se connecte à son tour à Internet, dès
qu’une application nécessitant une connexion (telle qu’une application de messagerie électronique, de messagerie instantanée ou de navigation sur le web) est utilisée.
Si vous choisissez Manuelle, vous devez vous-même connecter le modem à Internet
lorsque vous utilisez une application qui nécessite une connexion à Internet.
Si vous choisissez Automatique ou Manuelle dans le menu local Connexion, vous
devez choisir un délai tel que « 10 minutes » dans le menu local « Déconnecter si
inactif ». Si aucune application Internet n’est requise à l’expiration du délai sélectionné, vous serez déconnecté d’Internet.
Remarque : si votre périphérique sans fil est connecté à votre modem via un port
LAN Ethernet et que votre modem est connecté à Internet via PPPoE, vous ne
pouvez pas utiliser la configuration manuelle.
 Saisissez les adresses de serveur DNS et un nom de domaine spécifique auquel votre
périphérique accède lorsque vous vous connectez à Internet.
7 Cliquez sur le bouton Réseau et configurez le mode de partage de l’accès Internet de
votre périphérique avec les ordinateurs connectés via AirPort et Ethernet.Chapitre 3 Configuration de réseaux AirPort 33
Si vous choisissez Ethernet dans le menu local Connexion via, sélectionnez, dans le
menu local Partage de connexion, le mode de partage de connexion à Internet utilisé
par votre périphérique.
 Pour partager une connexion à Internet unique avec des ordinateurs AirPort et des
ordinateurs connectés au périphérique via Ethernet et à l’aide des protocoles DHCP
et NAT, choisissez « Partager une adresse IP publique » dans le menu local Partage
de connexion. L’utilisation de DHCP et de NAT permet au périphérique sans fil d’attribuer automatiquement des adresses IP dynamiques aux ordinateurs clients, ce qui
simplifie la configuration TCP/IP de chacun des ordinateurs. Voir « Définition d’options
DHCP et NAT » à la page 34.
Par défaut, le périphérique sans fil permet aux autres périphériques et ordinateurs se
connectant par Ethernet, et aux ordinateurs se connectant par AirPort, de communiquer entre eux par le biais de protocoles non-IP (AppleTalk, par exemple). Si vous
souhaitez connecter une imprimante Ethernet AppleTalk au périphérique sans fil
Apple ou utiliser AppleTalk entre des ordinateurs reliés par câble et d’autres communiquant sans fil, assurez-vous que les appareils sont branchés sur le port LAN Ethernet (G) du périphérique.
 Pour distribuer une plage d’adresses IP en utilisant uniquement DHCP, choisissez
« Distribuer une plage d’adresses IP ». Voir « Définition d’options DHCP uniquement »
à la page 36.34 Chapitre 3 Configuration de réseaux AirPort
 Si vous ne souhaitez pas que votre périphérique sans fil partage son adresse IP,
choisissez « Désactivé (mode pont) ». Si vous configurez votre périphérique en mode
pont, les ordinateurs AirPort ont accès à tous les services du réseau Ethernet et le
périphérique ne fournit pas les services de partage Internet. Pour en savoir plus sur
la configuration de votre périphérique sans fil en mode pont, reportez-vous à
la rubrique « Vous utilisez un réseau Ethernet existant » à la page 40.
L’utilisation du périphérique sans fil en tant que pont peut s’avérer un moyen de
résoudre d’éventuelles incompatibilités entre les fonctions de partage Internet du
périphérique et le mode de connexion de votre FAI.
Définition d’options DHCP et NAT
Si vous choisissez « Partager une adresse IP publique » dans le menu local Partage de
connexion, vous pouvez définir des options DHCP et NAT. Cliquez sur DHCP.
 Choisissez une plage d’adresses IP dans le menu local Plage d’adresses DHCP.
Choisissez 10.0, 192.168 ou 172.16, puis saisissez des adresses de début et de fin
dans les champs Première adresse DHCP et Dernière adresse DHCP, en fonction
des adresses que vous souhaitez voir attribuer par le périphérique sans fil.
 Tapez une valeur dans le champ Bail DHCP, puis choisissez des minutes, des heures
ou des jours dans le menu local.
 Tapez un message de bienvenue dans le champ Message DHCP. Ce message est
affiché dès qu’un ordinateur accède à votre réseau.
 Si votre réseau est configuré pour utiliser un serveur LDAP, vous pouvez taper
l’adresse de ce serveur dans le champ Serveur LDAP, afin que les ordinateurs de
votre réseau puissent y accéder.Chapitre 3 Configuration de réseaux AirPort 35
 Pour fournir des adresses IP spécifiques à certains ordinateurs de votre réseau sans fil,
cliquez sur Ajouter (+) sous la liste Réservations DHCP, puis suivez les instructions à
l’écran pour attribuer un nom à la réservation et réserver l’adresse par adresse MAC
ou identifiant de client DHCP. Si vous choisissez l’adresse MAC, cliquez sur Continuer,
puis saisissez l’adresse MAC et l’adresse IP spécifique.
Vous pouvez ensuite définir des options NAT pour le réseau. Cliquez sur NAT.
 Vous pouvez configurer un hôte par défaut sur votre réseau. Un hôte par défaut
(parfois nommé un DMZ) est un ordinateur de votre réseau qui est exposé à Internet
et reçoit tout le trafic entrant. Il peut s’avérer utile si vous utilisez sur votre réseau
AirPort un ordinateur dédié aux jeux en réseau ou si vous voulez acheminer l’ensemble du trafic Internet à travers un seul ordinateur.
 Vous pouvez configurer le protocole de mappage de ports NAT (NAT-PMP). Il s’agit
d’un projet Internet de l’Internet Engineering Task Force constituant une alternative au
protocole UPnP (Universal Plug and Play), plus couramment utilisé et implémenté
dans de nombreux routeurs NAT. Le protocole NAT-PMP permet à un ordinateur situé
sur un réseau privé (derrière un routeur NAT) de configurer automatiquement le routeur de manière à permettre à des parties situées à l’extérieur du réseau privé de
contacter cet ordinateur.
Ce protocole comprend une méthode de récupération de l’adresse IP publique d’une
passerelle NAT, ce qui permet à un client de faire connaître cette adresse IP publique
et le numéro de port à des homologues qui souhaitent communiquer avec lui. Ce
protocole est implémenté dans des produits Apple actuels, notamment Mac OS X
10.4 Tiger, les produits de mise en réseau AirPort Extreme et AirPort Express, ainsi que
Bonjour for Windows.36 Chapitre 3 Configuration de réseaux AirPort
Vous avez également la possibilité de configurer le mappage de ports. Pour vous
assurer que les demandes sont acheminées correctement vers votre serveur web,
AppleShare ou FTP, ou bien encore vers un ordinateur particulier de votre réseau,
vous devez établir une adresse IP permanente pour le serveur ou l’ordinateur et fournir
des informations de « mappage de ports en entrée » au périphérique sans fil Apple.
Voir « Acheminement du trafic réseau vers un ordinateur particulier de votre réseau
(mappage de ports) » à la page 61.
Définition d’options DHCP uniquement
Si vous choisissez « Distribuer une plage d’adresses IP » dans le menu local Partage
de connexion, votre périphérique sans fil est configuré pour exploiter DHCP afin de
distribuer une plage d’adresses IP via DHCP uniquement. Cette option ne permet pas
d’utiliser NAT. Cliquez sur DHCP, puis tapez les adresses de début et de fin de la plage
d’adresses que vous souhaitez distribuer aux ordinateurs accédant à votre réseau sans fil.
Vous pouvez définir des options DHCP supplémentaires, telles que le Bail DHCP,
le Message DHCP et d’autres, en suivant les instructions ci-dessus.
Configuration des ordinateurs clients
Pour configurer TCP/IP sur des ordinateurs clients fonctionnant sous Mac OS X 10.5 :
1 Ouvrez Préférences Système sur l’ordinateur client, puis cliquez sur Réseau.
2 Effectuez l’une des opérations suivantes :
a Si l’ordinateur client utilise AirPort, sélectionnez AirPort dans la liste des services de
connexion réseau, puis cliquez sur Avancé.Chapitre 3 Configuration de réseaux AirPort 37
Choisissez ensuite DHCP dans le menu local Configurer IPv4.
b Si vous avez activé un serveur DHCP au moment de configurer le réseau du périphé-
rique sans fil et si l’ordinateur client utilise Ethernet, sélectionnez Ethernet dans la
liste des services de connexion réseau, puis choisissez Via DHCP dans le menu local
Configurer.38 Chapitre 3 Configuration de réseaux AirPort
c Si vous avez sélectionné « Distribuer une plage d’adresses IP » lorsque vous avez
configuré le réseau du périphérique sans fil, vous pouvez fournir l’accès à Internet
aux ordinateurs clients Ethernet en définissant manuellement leurs adresses IP.
Pour ce faire, sélectionnez Ethernet dans la liste des services de connexion réseau,
puis choisissez Manuellement dans le menu local Configurer.
Si vous configurez manuellement des clients Ethernet pour un périphérique sans fil
qui fournit le service NAT via Ethernet, vous pouvez utiliser des adresses IP comprises entre 10.0.1.2 et 10.0.1.200.
Dans le champ Masque de sous réseau, saisissez 255.255.255.0. Dans le champ
Routeur, saisissez 10.0.1.1.
Tapez l’adresse de serveur de noms et les informations de domaine de recherche correspondant à celles que vous avez saisies lors de la configuration du périphérique.
Pour configurer TCP/IP sur des ordinateurs clients exécutant Windows :
Veuillez-vous assurer que vous avez installé l’adaptateur sans fil ainsi que le logiciel
nécessaire à sa configuration.
Pour configurer TCP/IP sur un ordinateur client :
1 Ouvrez le Panneau de configuration accessible depuis le menu Démarrer, puis cliquez
sur Réseau et Internet.
2 Cliquez sur « Centre Réseau et partage ».
3 Cliquez sur « Gérer les connexions réseau » dans la liste Tâches.
4 Cliquez à l’aide du bouton droit de la souris sur la connexion sans fil à partager,
puis sélectionnez Propriétés.
Saisissez les adresses IP et
de routeur situées dans la
plage fournie votre périphé-
rique. Saisissez les adresses
DNS et de domaine de
recherche si nécessaire.Chapitre 3 Configuration de réseaux AirPort 39
5 Cliquez sur « Protocole Internet version 4 (TCP/IPv4) », puis sur Propriétés.
 Si vous avez choisi « Partager une adresse IP publique » dans la sous-fenêtre Réseau
d’Utilitaire AirPort, sélectionnez « Obtenir une adresse IP automatiquement ».
 Si vous avez choisi « Distribuer une plage d’adresses IP » en configurant le réseau du
périphérique sans fil, vous pouvez fournir l’accès Internet aux ordinateurs clients en
définissant manuellement les adresses IP. Dans ce cas, sélectionnez « Utiliser l’adresse
IP suivante ».
Lorsque vous configurez manuellement des clients pour un périphérique sans fil
fournissant le service NAT, utilisez des adresses IP situées dans les plages 10.0.1.2 à
10.0.1.200, 172.16.1.2 à 172.16.1.200 ou 192.168.1.2 à 192.168.1.200.40 Chapitre 3 Configuration de réseaux AirPort
Dans le champ Masque de sous réseau, saisissez 255.255.255.0. Dans le champ
Passerelle par défaut, saisissez 10.0.1.1, 172.16.1.1 ou 192.168.1.1, en fonction de la configuration d’adressage utilisée. Tapez l’adresse de serveur de noms et les informations de
domaine de recherche correspondant à celles que vous avez saisies lors de la configuration du périphérique.
Vous utilisez un réseau Ethernet existant
Vous pouvez faire appel à Utilitaire AirPort pour configurer aisément le périphérique
sans fil Apple pour l’accès à Internet via un réseau Ethernet existant disposant déjà d’un
routeur, d’un commutateur ou de tout autre périphérique réseau fournissant des adresses IP. Utilisez les fonctions de configuration manuelle d’Utilitaire AirPort si vous devez
effectuer d’autres réglages avancés facultatifs.
Schéma des connexions
Fonctionnement
 Le périphérique sans fil Apple (dans notre exemple, une Time Capsule) utilise votre
réseau Ethernet pour communiquer avec Internet via le port LAN Ethernet (G).
 Les clients AirPort et Ethernet accèdent à Internet et au réseau Ethernet via
le périphérique sans fil Apple.
Router
vers Internet
vers port Ethernet
Time Capsule
Tous les programmes > AirPort sur un ordinateur Windows).
2 Cliquez sur Continuer, puis suivez les instructions à l’écran pour vous connecter à votre
réseau local (LAN).
Si vous configurez manuellement votre périphérique sans fil à l’aide d’Utilitaire AirPort :
1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
2 Sélectionnez votre périphérique, puis choisissez Configuration manuelle dans le menu
Borne d’accès ou double-cliquez sur l’icône de votre périphérique afin d’ouvrir la configuration dans une fenêtre distincte.
3 Cliquez sur Internet, puis choisissez Ethernet dans le menu local Connexion via.
4 En fonction de la manière dont les adresses IP sont fournies sur votre réseau Ethernet,
choisissez Manuellement ou Via DHCP dans le menu contextuel Configurer IPv4.
En cas de doute, renseignez-vous auprès de votre FAI ou de votre administrateur
réseau.
Éléments Commentaires
Périphérique sans fil Apple
(borne d’accès AirPort Extreme,
AirPort Express ou Time Capsule)
Configurez le périphérique en
mode pont.
Routeur, commutateur ou autre
périphérique réseau Ethernet
Le routeur, le commutateur ou
les autres périphériques de
réseau sont configurés pour
fournir des adresses IP aux ordinateurs et aux appareils connectés au réseau Ethernet.
Câbles Ethernet42 Chapitre 3 Configuration de réseaux AirPort
Si vos adresses sont fournies manuellement, choisissez Manuellement dans le menu
local Configurer IPv4. Saisissez les informations d’adresse IP dans les champs situés en
dessous du menu local Configurer IPv4.
Si Utilitaire AirPort vous a servi à configurer votre périphérique sans fil Apple, il se peut
que les champs situés sous le menu local Configurer IPv4 contiennent déjà les données appropriées.
Si votre adresse IP est fournie par DHCP, choisissez Via DHCP dans le menu local
Configurer IPv4.
Contactez votre administrateur réseau pour connaître les informations à
saisir dans ces champs.Chapitre 3 Configuration de réseaux AirPort 43
5 Choisissez « Désactivé (mode pont) » dans le menu local Partage de connexion. Votre
périphérique sans fil établit alors un « pont » entre la connexion Internet des réseaux
Ethernet et les ordinateurs connectés sans fil ou via Ethernet au périphérique.
Pour obtenir des informations sur la configuration des ordinateurs clients qui se connectent au réseau Ethernet, reportez-vous à la section « Configuration des ordinateurs
clients » à la page 36.
Connexion de périphériques supplémentaires à votre réseau
AirPort Extreme
Branchez une imprimante USB sur le port USB de votre périphérique sans fil Apple
(dans notre exemple, une Time Capsule) de sorte que tout ceux qui accèdent au réseau
puissent utiliser l’imprimante. Branchez un concentrateur USB sur le port USB d’une
borne d’accès AirPort Extreme ou d'une Time Capsule, puis connectez un disque dur
et une imprimante afin que tous les utilisateurs du réseau puissent y accéder.
Si vous branchez une Time Capsule, vous pouvez utiliser Time Machine sous
Mac OS X 10.5.2 ou ultérieur pour sauvegarder les données de tous les ordinateurs
Mac OS X 10.5 du réseau.
Schéma des connexions
modem DSL ou câble
imprimante USB
Time Capsule
vers Internet
port WAN Ethernet
AirPort Extreme
<44 Chapitre 3 Configuration de réseaux AirPort
Procédure à suivre
Suivez les instructions des sections précédentes pour configurer votre réseau
AirPort Extreme en fonction de votre mode de connexion à Internet ou de la configuration de votre réseau sans fil. Connectez un disque dur, une imprimante ou un concentrateur USB au port USB de votre borne d’accès AirPort Extreme ou de votre Time Capsule.
Remarque : si vous utilisez une AirPort Express sur votre réseau, vous pouvez brancher
une imprimante USB sur le port USB, afin que tout le monde ayant accès au réseau
puisse utiliser cette imprimante. AirPort Express ne prend pas en charge la connexion
de disques durs USB.
Utilisation d’un Apple TV sur votre réseau AirPort Extreme afin de lire du contenu
iTunes
En connectant (sans fil ou par Ethernet) un Apple TV à votre réseau AirPort Extreme,
puis en reliant l’Apple TV à votre téléviseur à écran large, vous pouvez profiter de votre
contenu iTunes favori (films, émissions de télévision, musique et bien plus encore). Pour
obtenir des instructions sur la configuration de l’Apple TV, consultez la documentation
incluse avec cet appareil.
modem DSL ou câble
vers Internet
vers port Ethernet
< port WAN Ethernet
Time Capsule
Apple TVChapitre 3 Configuration de réseaux AirPort 45
Réglage des options avancées
Connexion de périphériques sans fil supplémentaires à votre
réseau AirPort
Vous pouvez connecter des périphériques sans fil Apple supplémentaires pour étendre
la portée de votre réseau sans fil. Vous pouvez, par exemple, connecter une borne
d’accès AirPort Extreme ou une Time Capsule via Ethernet. Les réseaux constitués de
périphériques reliés par Ethernet sont appelés réseaux itinérants. Vous avez également
la possibilité de connecter sans fil des périphériques Apple. Cela permet de créer un
réseau connu sous le nom de WDS (Wireless Distribution System).
Configuration de l’itinérance
Plusieurs bornes d’accès AirPort Extreme ou Time Capsule peuvent être configurées
pour créer un seul réseau sans fil. Les ordinateurs clients utilisant AirPort peuvent
passer d’un périphérique à l’autre sans interruption de fonctionnement des services
(procédé appelé itinérance).
Pour configurer l’itinérance :
1 Connectez toutes les bornes d’accès AirPort Extreme et Time Capsule au même
sous-réseau de votre réseau Ethernet.
2 Attribuez un nom unique à chaque périphérique.
3 Attribuez le même nom de réseau et le même mot de passe à tous les périphériques.
4 Configurez les périphériques en tant que ponts en suivant les instructions de
la rubrique précédente.46 Chapitre 3 Configuration de réseaux AirPort
Si vous voulez qu’un périphérique attribue des adresses IP via DHCP, procédez
également comme suit :
1 Configurez un des périphériques comme serveur DHCP.
2 Configurez les autres périphériques comme ponts en suivant les instructions de
la rubrique précédente.
Le périphérique faisant office de serveur DHCP peut également recevoir son adresse IP
via DHCP soit à partir d’un serveur situé sur un réseau Ethernet, soit à partir d’un
modem câble ou DSL connecté à un fournisseur d’accès à Internet (FAI).
vers port Ethernet ports LAN Ethernet vers Internet
AirPort Extreme
modem DSL ou câble
G
Time Capsule < port WAN EthernetChapitre 3 Configuration de réseaux AirPort 47
Configuration d’un système de distribution sans fil WDS
Si vous constituez un réseau WDS en connectant sans fils plusieurs périphériques,
vous devez configurer chacun de ces périphériques en périphérique principal,
en périphérique distant ou en périphérique de relais.
Vous pouvez connecter ensemble des bornes d’accès AirPort Extreme ou des
Time Capsule 802.11n et utiliser la bande de fréquences de 5 GHz sur le réseau. Dans ce
cas, seuls les ordinateurs clients disposant d’une carte sans fil 802.11n peuvent accéder
au réseau. Pour que des ordinateurs clients équipés de cartes sans fil 802.11b ou 802.11g
puissent accéder au réseau, configurez ce dernier pour la bande de fréquences de 2,4
GHz ou ajoutez une borne d’accès AirPort Extreme ou AirPort Express 802.11g au
réseau. Pour plus d’informations sur le réglage de la bande de fréquences du réseau,
reportez-vous à la section « Choix du mode radio » à la page 24. Vous pouvez également configurer un réseau bibande, utilisant à la fois les bandes de fréquences de
2,4 GHz et 5 GHz, afin que les ordinateurs clients équipés d’une carte sans fil 802.11n
puissent accéder au segment 5 GHz du réseau et que les ordinateurs équipés d’une
carte sans fil 802.11b ou 802.11g puissent accéder au segment 2,4 GHz. Voir
« Configuration d’un réseau bibande (2,4 GHz et 5 GHz) » à la page 54.
Un périphérique sans fil principal se connecte à Internet et partage sa connexion avec
des périphériques distants et des périphériques de relais. Un périphérique distant partage la connexion Internet du périphérique principal. Enfin, un périphérique de relais
partage la connexion Internet du périphérique principal et la transfère à d’autres périphériques distants ou de relais.
Ces trois configurations de périphérique (principale, distante et relais) peuvent également partager la connexion Internet d’un périphérique principal, soit sans fil avec
des ordinateurs clients, soit via Ethernet si les ordinateurs clients sont connectés au
périphérique via Ethernet.
vers port Ethernet port WAN Ethernet vers Internet
AirPort Extreme
<
modem DSL ou câble
Time Capsule48 Chapitre 3 Configuration de réseaux AirPort
Si vous configurez des périphériques sans fil pour former un réseau WDS, vous devez
connaître l’identifiant AirPort de chaque périphérique. L’identifiant AirPort est également appelé adresse MAC. Pour simplifier la configuration d’un réseau WDS, placez
tous les périphériques sur une table, puis branchez-les sur une prise de courant.
Lors de la phase de configuration WDS, il est recommandé d’attribuer un nom unique à
chaque périphérique, afin de pouvoir les identifier plus facilement ultérieurement.
Pour configurer le périphérique sans fil principal afin qu’il partage sa connexion
Internet avec d’autres périphériques sans fil :
1 Cliquez sur le menu d’état AirPort de la barre des menus et sélectionnez le réseau sans fil
créé par le périphérique que vous souhaitez configurer comme périphérique principal.
2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
Sélectionnez le périphérique principal, puis choisissez Configuration manuelle dans
le menu Borne d’accès ou double-cliquez sur l’icône du périphérique pour ouvrir la
configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. Si le
périphérique utilise le mot de passe par défaut (à savoir, public), vous n’êtes pas invité
à fournir un mot de passe.
3 Cliquez sur le bouton Sans fil, puis choisissez « Participer à un réseau WDS » dans
le menu local Mode sans fil.
4 Cliquez sur WDS, puis choisissez WDS principal dans le menu local Mode WDS.
5 Cochez la case « Autoriser les clients sans fil » si vous souhaitez que les ordinateurs
clients se connectent à ce périphérique.
6 Cliquez sur le bouton Ajouter (+), puis tapez l’adresse MAC des périphériques sans fil
qui doivent se connecter à ce périphérique principal.Chapitre 3 Configuration de réseaux AirPort 49
Pour supprimer un périphérique de la liste, sélectionnez-le, puis cliquez sur le bouton
Supprimer (–).
7 Cliquez sur Mettre à jour pour transmettre les nouveaux réglages aux périphériques du
réseau WDS.
La case « Autoriser les clients sans fil » est activée par défaut. Si vous décochez cette
case, puis que vous décidez ultérieurement de modifier les réglages du périphérique
sans fil, vous devrez connecter un câble Ethernet au port LAN du périphérique.
Dans ce cas, vous ne pourrez pas vous connecter sans fil au périphérique.
Pour configurer d’autres périphériques distants de sorte qu’ils se connectent au
périphérique principal :
Pour ajouter d’autres périphérique de relais ou distants au réseau WDS, après avoir
configuré le périphérique principal et les périphériques distants, exécutez à nouveau
Utilitaire AirPort.
Les périphériques distants doivent communiquer sur le même canal que celui du périphérique principal. Avant de configurer des périphériques distants supplémentaires,
repérez le canal du périphérique principal. Pour ce faire, ouvrez Utilitaire AirPort,
accédez aux réglages AirPort, puis à la sous-fenêtre Résumé.
1 Cliquez sur le menu d’état AirPort de la barre des menus et sélectionnez le réseau sans
fil créé par le périphérique que vous souhaitez configurer comme périphérique distant.50 Chapitre 3 Configuration de réseaux AirPort
2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
ordinateur Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur
Windows). Sélectionnez le périphérique distant, puis choisissez Configuration manuelle
dans le menu Borne d’accès. Saisissez un mot de passe le cas échéant. Si le périphérique utilise le mot de passe par défaut (à savoir, public), vous n’êtes pas invité à fournir
de mot de passe.
3 Saisissez au besoin le même mot de passe réseau que celui du périphérique principal.
4 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil. Choisissez « Participer à un
réseau WDS » dans le menu local Mode sans fil, puis choisissez le même canal que
celui du périphérique dans le menu local Canal.
5 Cliquez sur WDS, puis choisissez « WDS distant » dans le menu local.
6 Tapez l’adresse MAC du périphérique principal dans le champ WDS principal. L’adresse
MAC, également appelée « identifiant AirPort », est imprimée sur l’étiquette située sous
l’appareil.
7 Cliquez sur Mettre à jour pour transférer les réglages.
La case « Autoriser les clients sans fil » est activée par défaut. Si vous décochez cette
case, puis que vous décidez ultérieurement de modifier les réglages du périphérique
sans fil, vous devrez connecter un câble Ethernet au port LAN du périphérique.
Dans ce cas, vous ne pourrez pas vous connecter sans fil au périphérique.Chapitre 3 Configuration de réseaux AirPort 51
Pour configurer un périphérique de relais afin qu’il se connecte au périphérique
principal et partage sa connexion avec des périphériques distants supplémentaires :
Pour configurer un périphérique de relais du réseau WDS afin qu’il partage sa connexion avec d’autres périphériques distants et des clients sans fil, exécutez à nouveau
Utilitaire AirPort.
Lorsque vous configurez un périphérique de relais, vous devez également configurer au
moins un périphérique distant supplémentaire pour partager la connexion du périphé-
rique de relais. Pour ce faire, configurez-le d’abord en tant que périphérique distant en
suivant les instructions de la page 49.
Les périphériques de relais et les périphériques distants doivent communiquer sur le
même canal que celui du périphérique principal. Avant de configurer un périphérique
distant ou de relais, repérez le canal du périphérique principal. Pour ce faire, ouvrez
Utilitaire AirPort, accédez aux réglages AirPort, puis à la sous-fenêtre Résumé.
1 Cliquez sur le menu d’état AirPort de la barre des menus pour accéder au réseau sans
fil créé par le périphérique sans fil que vous souhaitez configurer comme périphérique
de relais.
2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
ordinateur Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur
Windows). Sélectionnez le périphérique de relais, puis choisissez Configuration
manuelle dans le menu Borne d’accès. Si le périphérique utilise le mot de passe par
défaut (à savoir, public), vous n’êtes pas invité à fournir un mot de passe.
3 Saisissez au besoin le même mot de passe réseau que celui du périphérique principal.
4 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil. Choisissez « Participer à un
réseau WDS » dans le menu local Mode sans fil, puis choisissez le même canal que
celui du périphérique principal dans le menu local Canal.
5 Cliquez sur WDS, puis choisissez « WDS relais » dans le menu local Mode WDS.
6 Tapez l’adresse MAC du périphérique principal dans le champ Identifiant AirPort.
L’adresse MAC, également appelée « identifiant AirPort », est imprimée sur l’étiquette
située sous l’appareil.
7 Cliquez sur le bouton Ajouter (+), puis tapez l’identifiant AirPort du périphérique
distant auquel ce périphérique de relais doit se connecter.
Pour supprimer un périphérique de la liste, sélectionnez-le, puis cliquez sur le bouton
Supprimer (–).
8 Cliquez sur Mettre à jour pour transférer les nouveaux réglages WDS aux périphériques
de relais et aux périphériques distants.52 Chapitre 3 Configuration de réseaux AirPort
Extension de la portée d’un réseau 802.11n
L’extension de la portée d’un réseau 802.11n s’avère plus simple si vous connectez un
autre périphérique 802.11n. Le processus de configuration d’un réseau WDS se trouve
simplifié par la simple connexion de deux périphériques sans fil Apple 802.11n.
Pour étendre la portée d’un réseau 802.11n :
1 Ouvrez Utilitaire AirPort, puis sélectionnez le périphérique chargé de se connecter à
Internet. Reportez-vous aux sections précédentes de ce document pour obtenir des
instructions sur la configuration de votre périphérique sans fil, en fonction de votre
connexion Internet.
2 Choisissez Configuration manuelle dans le menu Borne d’accès ou double-cliquez
sur l’icône du périphérique pour ouvrir la configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
3 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil.
4 Choisissez « Créer un réseau sans fil » dans le menu local Mode sans fil, puis cochez
la case « Autoriser les extensions à ce réseau ».Chapitre 3 Configuration de réseaux AirPort 53
5 Sélectionnez ensuite le périphérique chargé d’étendre ce réseau, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
du périphérique dans la liste pour ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
6 Choisissez « Étendre un réseau sans fil » dans le menu local Mode sans fil, puis choisissez,
dans le menu local Nom de réseau, le réseau dont vous souhaitez étendre la portée.
7 Le cas échéant, saisissez le nom du réseau et son mot de passe.
8 Cliquez sur Mettre à jour pour actualiser le périphérique avec les nouveaux réglages
réseau.54 Chapitre 3 Configuration de réseaux AirPort
Configuration d’un réseau bibande (2,4 GHz et 5 GHz)
Vous pouvez configurer un réseau bibande, utilisant à la fois les bandes de fréquences
de 2,4 GHz et 5 GHz, afin que les ordinateurs clients équipés d’une carte sans fil 802.11n
puissent accéder au segment 5 GHz du réseau et que les ordinateurs équipés d’une
carte sans fil 802.11b ou 802.11g puissent accéder au segment 2,4 GHz.
Configuration d’un réseau bibande :
Reportez-vous à la rubrique « Choix du mode radio » à la page 24 pour obtenir des
instructions sur la configuration de votre périphérique sans fil Apple dans la bande
de fréquences de 5 GHz. Configurez la connexion à Internet de votre périphérique en
fonction du type de service que vous utilisez (par modem câble ou DSL ou par connexion a un réseau Ethernet existant disposant d’un accès à Internet). Attribuez un
nom, tel que Bureau 5G, à votre réseau 5 GHz, afin que les ordinateurs clients 802.11n
puissent accéder au segment 5 GHz du réseau.
Connectez votre périphérique sans fil Apple 2,4 GHz à votre périphérique 802.11n via
Ethernet. Suivez ensuite les instructions présentées plus haut dans ce chapitre pour
configurer votre nouveau périphérique en tant que pont. Attribuez un nom différent,
tel que « Bureau 2,4 », au segment 2,4 GHz de votre réseau, afin que les ordinateurs
clients 802.11b et 802.11g puissent accéder au segment 2,4 GHz du réseau.
Dans l’illustration précédente, une AirPort Express est connectée au segment 2,4 GHz
du réseau, de sorte que les ordinateurs clients 802.11b et 802.11g peuvent diffuser en
continu de la musique vers l’AirPort Express via AirTunes, tandis que les ordinateurs
clients 5 GHZ peuvent accéder au segment 5 GHZ du réseau créé par la borne d’accès
AirPort Extreme 802.11n.
Modem DSL ou câble
vers Internet
AirPort Express AirPort Extreme
(2,4 GHz)
Client
2,4 GHz
Client
5 GHz
haut-parleurs amplifiés
ports LAN Ethernet Tous les programmes > AirPort sur un ordinateur
Windows).
2 Sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans
le menu Borne d’accès, ou double-cliquez sur l’icône du périphérique pour ouvrir sa
configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire.
3 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil.
4 Cliquez sur « Options d’accès sans fil », puis choisissez une valeur dans le menu local
Puissance de transmission. Plus le pourcentage est bas, moins la portée est étendue.
Protection de votre réseau
Votre réseau est protégé par le mot de passe que vous lui donnez. Toutefois,
vous pouvez effectuer d’autres opérations pour assurer la protection de votre réseau.
Les réseaux gérés par le protocole SNMP (Simple Network Management Protocol) sont
susceptibles d’être vulnérables aux attaques par saturation. De même, si vous configurez votre périphérique sans fil via le port WAN, des utilisateurs non autorisés ont la possibilité de modifier vos réglages réseau. Lorsque la configuration distante est activée,
les informations Bonjour du périphérique (à savoir, son nom et son adresse IP) sont
publiées à travers le port WAN. Le fait de désactiver la configuration distante peut
contribuer à une protection accrue de votre réseau.
Pour protéger votre réseau et votre périphérique sans fil :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique, puis choisissez Configuration
manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant
le périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un
mot de passe si nécessaire.
2 Cliquez sur le bouton Avancé, puis cliquez sur Journalisation & SNMP.
3 Assurez-vous que les cases « Autoriser l’accès SNMP » et « Autoriser SNMP via WAN »
ne sont pas cochées.56 Chapitre 3 Configuration de réseaux AirPort
Utilisation de WPA (Wi-Fi Protected Access)
AirPort Extreme prend en charge les systèmes standard de sécurité WPA et WPA2 pour
réseau sans fil. En combinant Mac OS X 10.3 ou ultérieur ou Windows XP Service Pack 2
et les capacités d’authentification 802.1x, le système de sécurité WPA fournit un chiffrement de données plus sophistiqué que le système WEP et permet également l’authentification des utilisateurs, fonction quasiment inexistante avec WEP. Si votre ordinateur
est doté d’une carte sans fil AirPort Extreme, vous pouvez profiter des mises à jour de
sécurité WPA2 comprenant notamment le chiffrement AES-CCMP.
AirPort Extreme prend en charge deux modes de WPA et WPA2 : le mode Entreprise,
qui utilise un serveur d’authentification pour authentifier les utilisateurs, et le mode
Personnel qui s’appuie sur les capacités de TKIP (pour WPA) et d’AES-CCMP (pour WPA2)
sans avoir recours à un serveur d’authentification.
Le mode Entreprise est conçu pour les réseaux de grande envergure, dont la configuration et la gestion sont souvent assurées par un informaticien professionnel. Pour configurer un réseau WPA ou WPA2 Entreprise, vous devez tout d’abord configurer une
connexion 802.1X dans les préférences Réseau (sur un Mac). Pour configurer une connexion 802.1x sur un ordinateur Windows, reportez-vous à la documentation fournie
avec votre ordinateur. La connexion 802.1x requiert un protocole d’authentification,
tel que TTLS, LEAP ou PEAP.
La configuration d’un réseau WPA ou WPA2 Entreprise requiert la configuration d’un
serveur d’authentification, comme par exemple un serveur RADIUS, qui gérera et validera les informations d’identification des utilisateurs (les noms d’utilisateur, les mots
de passe et les certificats, par exemple). Pour le configurer, consultez la documentation
fournie avec le serveur.
Le mode Personnel est destiné aux réseaux des particuliers ou des petites entreprises
et peut être configuré et géré par la plupart des utilisateurs. Le mode personnel ne
requiert aucun serveur d’authentification distinct. Les utilisateurs du réseau ne doivent
généralement saisir que leur nom d’utilisateur et leur mot de passe pour accéder au
réseau.
Remarque : si vous changez le type de chiffrement d’un réseau WDS en passant de
WEP à WPA, il est nécessaire de réinitialiser les périphériques sans fil et de reconfigurer
votre WDS. Pour en savoir plus sur la réinitialisation de votre périphérique sans fil
Apple, reportez-vous à la documentation fournie.Chapitre 3 Configuration de réseaux AirPort 57
Pour configurer un réseau WPA ou WPA2 Entreprise :
Sur un ordinateur exécutant Mac OS X, vous devez d’abord configurer une connexion
802.1X.
1 Ouvrez Préférences Système, cliquez sur Réseau, puis sur AirPort.
2 Cliquez sur Avancé, puis sur 802.1X
3 Saisissez les réglages nécessaires à la connexion.
Remarque : certains protocoles d’authentification requièrent une autorisation du certificat numérique sur le serveur. Pour créer et distribuer des certificats numériques,
consultez la documentation livrée avec votre serveur.
4 Cliquez sur OK pour enregistrer les réglages de connexion.
Pour utiliser Utilitaire AirPort afin de configurer un réseau WPA ou WPA2 Entreprise
sur des ordinateurs exécutant Mac OS X et Windows XP :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
2 Choisissez WPA/WPA2 Entreprise ou WPA2 Entreprise dans le menu local « Sécurité
d’accès sans fil », en fonction des capacités des ordinateurs clients qui accéderont à
votre réseau.
3 Cliquez sur Configurer RADIUS, puis tapez l’adresse IP, le port et le secret partagé (ou
mot de passe) du serveur principal et du serveur secondaire d’authentification RADIUS.
Consultez l’administrateur du serveur RADIUS pour obtenir les informations à saisir
dans ces champs.
Pour configurer un réseau WPA et WPA2 Personnel :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
2 Choisissez WPA/WPA2 Personnel ou WPA2 Personnel dans le menu local « Sécurité
d’accès sans fil », en fonction des capacités des ordinateurs clients qui accéderont à
votre réseau.
3 Tapez un mot de passe comprenant entre 8 et 63 caractères ASCII.58 Chapitre 3 Configuration de réseaux AirPort
Configuration du contrôle d’accès
Le contrôle d’accès vous permet d’indiquer les ordinateurs AirPort autorisés à échanger
des informations sur le réseau filaire à travers le périphérique sans fil.
Chaque ordinateur sans fil possède une adresse MAC unique. Vous pouvez restreindre
l’accès en créant une liste de contrôle n’incluant que les adresses MAC des ordinateurs
auxquels vous souhaitez autoriser l’accès à votre réseau filaire.
Pour rechercher l’adresse MAC (identifiant AirPort) de la carte AirPort de votre ordinateur, cliquez sur le bouton AirPort de la sous-fenêtre Réseau des Préférences Système.
Pour configurer la liste de contrôle d’accès :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès. Saisissez un mot de passe si nécessaire.
2 Cliquez sur le bouton AirPort, puis sur Accès.
3 Choisissez Accès programmé ou RADIUS dans le menu local « Contrôle d’accès
d’adresses MAC », en fonction du périphérique que vous configurez.Chapitre 3 Configuration de réseaux AirPort 59
 Si vous choisissez Accès programmé, cliquez sur le bouton Ajouter (+) puis saisissez
l’adresse MAC et une description ou le nom des ordinateurs auxquels vous autorisez
l’accès au réseau. Vous pouvez également cliquer sur Cet ordinateur pour ajouter
l’adresse MAC et le nom de l’ordinateur que vous utilisez pour configurer ce périphérique sans fil. Double-cliquez sur l’ordinateur mentionné dans la liste, puis choisissez une
valeur dans chaque menu local. Choisissez un jour de la semaine ou « Tous les jours »
dans le menu local correspondant au jour, puis sélectionnez « toute la journée » ou «
entre » dans l’autre menu local. Si vous choisissez « entre », vous pouvez modifier les
heures du jour en double-cliquant dans les champs correspondant aux heures.
 Si vous choisissez RADIUS, tapez le type de service RADIUS, les adresses IP RADIUS,
le secret partagé et le port principal du serveur RADIUS principal. Saisissez les informations correspondant au serveur RADIUS secondaire le cas échéant. Si vous ne
disposez pas de ces informations, adressez-vous à l’administrateur du serveur.
Important : le contrôle d’accès AirPort empêche les ordinateurs ne figurant pas dans
la liste de contrôle d’accéder au réseau AirPort. Pour savoir comment empêcher les
ordinateurs non autorisés de se connecter au réseau AirPort, consultez la rubrique
« Configuration du réseau AirPort Extreme » à la page 20.
Vous pouvez également ajouter l’adresse MAC d’une carte de réseau sans fil 802.11 de
tierce partie à la liste de contrôle d’accès. L’adresse MAC de la plupart des cartes de
tierce partie est indiquée sur une étiquette apposée sur leur boîtier métallique.
Le contrôle d’accès n’est pas compatible avec le mode WPA ou WPA2 Entreprise.
Vous pouvez utiliser le contrôle d’accès ou le mode WPA Entreprise dans un réseau,
mais pas les deux à la fois.
Utilisation d’un serveur RADIUS
L’utilisation d’un serveur RADIUS sur votre réseau vous permet d’authentifier les adresses MAC (identifiants AirPort) à partir d’un ordinateur distinct, évitant ainsi que les
différents périphériques réseau stockent l’adresse MAC des ordinateurs ayant accès
au réseau. Les adresses sont stockées sur un serveur auquel on accède à l’aide d’une
adresse IP spécifique.
Pour configurer l’authentification à l’aide d’un serveur RADIUS :
1 Sur le serveur, saisissez les adresses MAC des ordinateurs qui pourront accéder au réseau.
2 Une fois le serveur RADIUS configuré, ouvrez Utilitaire AirPort, sélectionnez votre
périphérique sans fil et choisissez Configuration manuelle dans le menu local Borne
d’accès, ou double-cliquez sur l’icône représentant votre périphérique pour ouvrir sa
configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire.
3 Cliquez sur AirPort, sur Contrôle d’accès, puis choisissez RADIUS dans le menu local
« Contrôle d’accès d’adresses MAC ».60 Chapitre 3 Configuration de réseaux AirPort
4 Choisissez un format dans le menu local RADIUS.
Si vous sélectionnez Par défaut, votre périphérique sans fil utilise le format d’adresses
MAC 010203-0a0b0c. Ces adresses sont ensuite utilisées comme noms d’utilisateur
sur le serveur RADIUS. Le secret partagé constitue le mot de passe que les utilisateurs
saisissent pour se connecter au réseau. Ce format est souvent utilisé avec les serveurs
Lucent et Agere.
Si vous choisissez Autre, les adresses MAC utiliseront le format 0102030a0b0c et seront
utilisées à la fois comme nom d’utilisateur et mot de passe par les utilisateurs se
connectant au réseau. Ce format est souvent utilisé par les serveurs Cisco.
5 Saisissez l’adresse IP, le port et le secret partagé (ou mot de passe) des serveurs
principal et secondaires.
Pour plus d’informations sur la configuration du serveur RADIUS, consultez la documentation RADIUS fournie avec votre serveur ou contactez votre administrateur réseau.
La liste de contrôle d’accès et RADIUS fonctionnent conjointement. Lorsqu’un utilisateur tente de se connecter à un réseau utilisant l’authentification par contrôle d’accès
ou par un serveur RADIUS, le périphérique sans fil recherche d’abord dans la liste de
contrôle l’adresse MAC de cet utilisateur et autorise l’accès si elle s’y trouve. Si l’adresse
MAC n’y figure pas, le périphérique la recherche sur le serveur RADIUS. Si elle s’y trouve,
l’utilisateur peut se connecter au réseau.
Remarque : le contrôle d’accès RADIUS n’est pas compatible avec le mode WPA ou
WPA2 Personnel. Vous pouvez utiliser le contrôle d’accès RADIUS ou le mode WPA
Entreprise dans un réseau, mais pas les deux à la fois.Chapitre 3 Configuration de réseaux AirPort 61
Acheminement du trafic réseau vers un ordinateur particulier
de votre réseau (mappage de ports)
AirPort Extreme utilise le protocole NAT pour partager une adresse IP unique avec les
ordinateurs qui se connectent au réseau AirPort Extreme. Pour fournir l’accès Internet
à plusieurs ordinateurs à l’aide d’une seule adresse IP, le protocole NAT attribue des
adresses IP privées à chaque ordinateur du réseauAirPort Extreme, puis fait correspondre ces adresses à des numéros de port. Le périphérique sans fil crée une entrée de
tableau « port/adresse IP privée » dès qu’un ordinateur de votre réseau AirPort (privé)
envoie une demande d’informations sur Internet.
Si vous utilisez un serveur web, AppleShare ou FTP sur votre réseau AirPort Extreme,
d’autres ordinateurs entrent en communication avec votre serveur. Comme le périphé-
rique sans fil Apple ne possède aucune entrée de tableau pour ces demandes, il ne dispose d’aucun moyen d’acheminer les informations à l’ordinateur approprié sur votre
réseau AirPort.
Pour vous assurer que les demandes sont correctement acheminées vers votre serveur
web, AppleShare ou FTP, vous devez établir une adresse IP permanente pour votre
serveur et fournir les données de mappage de ports en entrée à votre périphérique
sans fil Apple.
Pour configurer le mappage de ports en entrée :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
2 Cliquez sur le bouton Avancé, puis sur Mappage de port.62 Chapitre 3 Configuration de réseaux AirPort
3 Cliquez sur le bouton Ajouter (+), puis choisissez un service, tel que le partage de
fichiers personnels, dans le menu local Service.
Tapez toute information supplémentaire nécessaire dans les champs correspondants.
Pour utiliser le mappage de ports, vous devez configurer TCP/IP manuellement sur
l’ordinateur exécutant le serveur web, AppleShare ou FTP.
Vous pouvez également configurer un ordinateur comme hôte par défaut pour établir
une adresse IP permanente pour cet ordinateur et fournir des informations de mappage de ports en entrée à la borne d’accès AirPort Extreme ou AirPort Express. Ce dispositif est parfois appelé « zone DMZ » et s’avère très utile avec certains jeux en réseau
ou avec la vidéoconférence.
Pour configurer un hôte par défaut :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
2 Cliquez sur le bouton Internet, puis cliquez sur NAT.
3 Cochez la case « Activer l’hôte par défaut ». L’adresse IP par défaut est 10.0.1.253.
4 Saisissez la même adresse IP sur l’ordinateur hôte.Chapitre 3 Configuration de réseaux AirPort 63
Journalisation
Vous pouvez configurer votre périphérique sans fil afin qu’il enregistre les informations
d’état dans l’historique système Mac OS X ou dans l’application Syslog sous Windows.
Cela s’avère utile pour comprendre les problèmes et contrôler les performances d’un
périphérique.
Pour configurer la journalisation :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
représentant le périphérique afin d’ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
2 Cliquez sur le bouton Avancé, puis cliquez sur Journalisation et SNMP.
3 Tapez l’adresse IP de l’ordinateur destiné à recevoir les historiques dans le champ
« Adresse de destination Syslog ».
4 Choisissez un niveau dans le menu local Niveau Syslog.
Vous devez attribuer un serveur NTP (Network Time Protocol) à chaque périphérique
sans fil, afin que les informations de journalisation mentionnent l’heure exacte des
historiques d’état.
Pour définir l’heure automatiquement :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
2 Cliquez sur le bouton AirPort, puis cliquez sur Borne d’accès.
3 Cochez la case « Régler l’heure automatiquement », puis choisissez un serveur NTP
dans le menu local si vous avez accès à un tel serveur sur votre réseau ou sur Internet.
En cliquant sur « Historiques et statistiques », vous pouvez consulter et exporter les historiques ou consulter des informations concernant les clients sans fil et les clients DHCP.
Si vous exportez les historiques, utilisez l’application Console de Mac OS X (qui se
trouve dans le dossier Utilitaires, à l’intérieur du dossier Applications, sur les ordinateurs Macintosh ou sous Démarrer > Tous les programmes > AirPort sur les ordinateurs
Windows) pour consulter les historiques sur l’ordinateur désigné pour les recevoir.64 Chapitre 3 Configuration de réseaux AirPort
Configuration de IPv6
IPv6 est une nouvelle version du protocole IP (Internet Protocol). IPv6 est actuellement
utilisé principalement dans certaines institutions de recherche. La plupart des ordinateurs ne nécessitent aucune configuration pour utiliser IPv6.
Le principal avantage d’IPv6 est qu’il augmente la taille d’adressage de 32 bits (norme
IPv4 actuelle) à 128 bits. Une taille d’adresse de 128 bits est assez grande pour prendre
en charge des milliards et des milliards d’adresses. Cela permet de gérer beaucoup plus
d’adresses et de noeuds qu’à l’heure actuelle. IPv6 offre également plus de manières de
configurer les adresses et des configuration automatiques plus simples.
Par défaut, IPv6 est configuré automatiquement, et les réglages par défaut sont suffisants. Cependant, si votre administrateur réseau ou fournisseur d’accès à Internet vous
a spécifiquement demandé de configurer IPv6 manuellement, suivez les instructions
ci-dessous.
Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez
Configuration manuelle dans le menu Borne d’accès. Saisissez un mot de passe si
nécessaire. Cliquez sur le bouton AirPort, puis cliquez sur IPv6.
Pour configurer manuellement les options IPv6 :
1 Choisissez Noeud ou Tunnel dans le menu local Mode IPv6, en fonction de la méthode
que l’on vous a demandé d’utiliser.
2 Choisissez Manuellement dans le menu local Configurer IPv6, puis saisissez les informations fournies par votre FAI ou votre administrateur réseau.
Personnalisation du coupe-feu IPv6
Si cela est possible pour votre périphérique sans fil, vous pouvez définir des réglages
de coupe-feu IPv6 à l’aide d’Utilitaire AirPort.
Pour régler les paramètres du coupe-feu IPv6 :
1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
2 Sélectionnez votre périphérique dans la liste, puis tapez le mot de passe.
3 Cliquez sur le bouton AirPort, puis cliquez sur Coupe-feu IPv6.
Par défaut, les cases « Autoriser les tunnels Teredo » et « Autoriser l’authentification
IPSec entrante » sont cochées.
Pour permettre à des appareils spécifiques d’accéder à votre réseau depuis l’extérieur
du coupe-feu IPv6, cliquez sur le bouton Ajouter (+) et entrez l’adresse IPv6 et/ou le
numéro de port de l’appareil.
L’utilisation d’un coupe-feu IPv6 requiert un périphérique sans fil Apple 802.11n.Chapitre 3 Configuration de réseaux AirPort 65
Partage et protection de disques durs USB sur votre réseau
Si vous branchez un disque dur USB sur votre borne d’accès AirPort Extreme ou sur
votre Time Capsule, tous les ordinateurs, Mac ou Windows, connectés au réseau par
câble ou sans fil, peuvent accéder au disque dur pour sauvegarder, partager ou stocker
des fichiers.
Si vous utilisez une Time Capsule, il n’est pas nécessaire de brancher un disque dur.
Chaque Time Capsule comprend un disque AirPort interne.
Pour partager un disque dur sur votre réseau :
1 Branchez le disque dur sur le port USB situé à l’arrière de la borne d’accès AirPort Extreme
ou de la Time Capsule.
2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
3 Sélectionnez votre borne d’accès AirPort Extreme ou Time Capsule, puis choisissez
Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône
représentant le périphérique afin d’ouvrir sa configuration dans une fenêtre distincte.
Saisissez un mot de passe si nécessaire.
4 Cliquez sur le bouton Disques, puis sur Partage de fichiers.
5 Choisissez soit « Avec un mot de passe de disque » ou « Avec le mot de passe de
la borne » si vous voulez protéger le disque partagé à l’aide d’un mot de passe,
soit « Avec les comptes » si vous voulez protéger le disque à l’aide de comptes.
 Si vous décidez d’utiliser des comptes, cliquez sur Configurer les comptes, cliquez sur
le bouton Ajouter (+), puis saisissez un nom et un mot de passe pour chaque utilisateur qui accédera au disque.
6 Choisissez Non autorisé, Lecture seule ou Lecture et écriture pour accorder l’accès en
invité au disque.
vers Internet
modem DSL ou câble
AirPort Extreme
lecteur de
disque dur USB
< port WAN Ethernet66 Chapitre 3 Configuration de réseaux AirPort
7 Cochez la case « Partager des disques via le port WAN Ethernet » si vous souhaitez
autoriser l’accès à distance au disque via le port WAN.
La vitesse de transfert des données peut varier, selon le réseau.
Utilisation d'une Time Capsule sur votre réseau
Si vous utilisez une Time Capsule et que votre ordinateur fonctionne sous
Mac OS X 10.5.2 ou ultérieur, vous pouvez utiliser Time Machine pour sauvegarder
automatiquement les données de tous les ordinateurs Mac OS X 10.5 du réseau.
Les autres ordinateurs Mac et Windows peuvent toujours accéder au disque AirPort
interne de la Time Capsule pour sauvegarder, stocker et partager des fichiers.
Comme chaque Time Capsule dispose également de toutes les fonctions d’une borne
d’accès 802.11n, vous pouvez configurer la vôtre pour partager une connexion Internet
avec les ordinateurs du réseau AirPort qu’elle crée.
Pour en savoir plus sur l’utilisation de votre Time Capsule avec Time Machine sous
Mac OS X 10.5, recherchez « Time Capsule » dans l’Aide Mac.
vers Internet
modem DSL ou câble
Time Capsule
< port WAN EthernetChapitre 3 Configuration de réseaux AirPort 67
Connexion d’une imprimante USB à un périphérique
sans fil Apple
Vous pouvez connecter une imprimante USB compatible sur votre périphérique
sans fil Apple (à savoir, une borne d’accès AirPort Extreme, une AirPort Express ou une
Time Capsule), afin que toute personne accédant au réseau sous Mac OS X 10.2.3 ou
ultérieur, sous Windows XP Service Pack 2 ou sous Windows Vista, puisse imprimer.
Pour utiliser une imprimante sur votre réseau :
1 Connectez l’imprimante au port USB du périphérique sans fil Apple.
2 Configurez les ordinateurs clients :
 Si votre ordinateur fonctionne sous Mac OS X 10.5 ou ultérieur, ouvrez Préférences
Système puis cliquez sur Imprimantes et fax. Sélectionnez l’imprimante dans la liste
Imprimantes. Si le nom de l’imprimante n’y figure pas, cliquez sur Ajouter (+) en bas
de la liste, sélectionnez l’imprimante, puis cliquez sur Ajouter.
 Sur un ordinateur exécutant Mac OS X 10.2.3 ou ultérieur, ouvrez Configuration d’imprimante (disponible dans le dossier Utilitaires, à l’intérieur du dossier Applications),
puis sélectionnez l’imprimante dans la liste. Si l’imprimante ne figure pas sur la liste,
cliquez sur Ajouter, puis choisissez Bonjour dans le menu local avant de sélectionner
l’imprimante dans la liste.
 Sur un ordinateur exécutant Windows, installez Bonjour for Windows à partir du CD
Utilitaire AirPort, puis suivez les instructions à l’écran pour établir la connexion avec
l’imprimante.
Vous pouvez changer le nom par défaut de l’imprimante et lui en attribuer un de
votre choix.
Pour renommer votre imprimante USB :
1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique, puis choisissez Configuration
manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le
périphérique afin d’ouvrir sa configuration dans une fenêtre distincte.
2 Cliquez sur le bouton Imprimante puis tapez un nom pour l’imprimante dans le champ
Imprimantes USB.68 Chapitre 3 Configuration de réseaux AirPort
Ajout d’un client sans fil à votre réseau 802.11n
Si votre périphérique sans fil Apple prend en charge cette fonction, et si votre réseau
est protégé par un mot de passe chiffré WPA Personnel ou WPA/WPA2 Personnel,
vous pouvez fournir aux clients sans fil un accès à votre réseau sans exiger le mot
de passe réseau.
Lorsque vous permettez à un client d’accéder à votre réseau, le nom et l’adresse MAC
(ou ID AirPort) du client sont stockés dans la liste de contrôle d’accès de Utilitaire AirPort,
jusqu’à ce que vous les supprimiez. Vous pouvez fournir un accès pour 24 heures,
délai au delà duquel le client ne peut plus accéder à votre réseau.
Lorsque vous autorisez l’accès à votre réseau sans fil à un client, celui-ci n’a pas à saisir
le mot de passe du réseau.
Pour autoriser l’accès de clients à votre réseau :
1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un
Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows).
2 Sélectionnez votre périphérique sans fil Apple, puis choisissez Configuration manuelle
dans le menu Borne d’accès. Saisissez un mot de passe si nécessaire.
3 Choisissez « Ajouter des clients sans fil » dans le menu Borne d’accès.
4 Sélectionnez le mode d’accès du client au réseau :
 Sélectionnez PIN pour saisir le numéro à 8 chiffres fourni par le client demandant à
accéder au réseau.
 Sélectionnez « Première tentative » pour autoriser l’accès au premier client essayant
d’entrer sur le réseau.
 Sélectionnez « Limiter l’accès du client à 24 heures », si vous souhaitez autoriser
un accès à votre réseau pour une seule journée. Si vous ne sélectionnez pas cette
option, le client aura accès au réseau jusqu’à ce que vous retiriez son nom de la liste.Chapitre 3 Configuration de réseaux AirPort 69
Résolution des problèmes
En cas de problème de connexion à Internet, quelle que soit la configuration de votre
réseau AirPort Extreme, essayez les solutions suivantes :
Sur un ordinateur exécutant Mac OS X :
 Assurez-vous que le périphérique sans fil est connecté à Internet. Les ordinateurs de
votre réseau AirPort ne peuvent pas se connecter à Internet si votre périphérique ne
l’est pas au préalable.
 Testez votre connexion à Internet à l’aide de votre ordinateur. Si vous ne parvenez
pas à vous connecter à l’aide de votre ordinateur, il se peut que le problème provienne de la connexion à Internet.
 Sur un Mac exécutant Mac OS X 10.5, vérifiez les services réseau actifs en ouvrant
Préférences Système, puis la sous-fenêtre Réseau. Assurez-vous que les ports à utiliser
sont actifs.
 Ouvrez Préférences Réseau, puis cliquez sur AirPort. Assurez-vous que l’ordinateur est
connecté au réseau AirPort créé par votre périphérique sans fil.
 Redémarrez votre ordinateur. Cela permet de renouveler l’adresse IP que vous recevez du périphérique sans fil. Les adresses IP doivent être comprises entre 10.0.1.2 et
10.0.1.200, 172.16.1.2 et 172.16.1.200 ou 192.168.1.2 et 192.168.1.200, conformément au
système d’adresses utilisé par le périphérique sans fil.
 Si le périphérique sans fil est configuré comme serveur DHCP, veillez à sélectionner
« Partager une adresse IP publique » dans le menu local Partage de connexion de
la sous-fenêtre Connexion à Internet des réglages Internet d’Utilitaire AirPort.
 Si vous utilisez un modem câble et que votre périphérique sans fil ne parvient pas à
accéder à Internet, mettez le modem câble hors tension, patientez quelques minutes, puis rallumez-le.
Sur un ordinateur exécutant Windows :
 Assurez-vous que le périphérique sans fil est connecté à Internet. Les ordinateurs de
votre réseau AirPort ne peuvent pas se connecter à Internet si votre périphérique ne
l’est pas au préalable.
 Testez votre connexion à Internet à l’aide de votre ordinateur. Si vous ne parvenez
pas à vous connecter à l’aide de votre ordinateur, il se peut que le problème provienne de la connexion à Internet.70 Chapitre 3 Configuration de réseaux AirPort
 Cliquez à l’aide du bouton droit de la souris sur l’icône de connexion sans fil et
choisissez État.
 Assurez-vous que l’ordinateur est connecté au réseau AirPort créé par votre périphé-
rique sans fil.
 Redémarrez votre ordinateur. Cela permet de renouveler l’adresse IP que vous recevez du périphérique sans fil. Les adresses IP doivent être comprises entre 10.0.1.2 et
10.0.1.200, 172.16.1.2 et 172.16.1.200 ou 192.168.1.2 et 192.168.1.200, conformément au
système d’adresses utilisé par le périphérique.
 Si le périphérique est configuré comme serveur DHCP, assurez-vous que la case
« Obtenir une adresse IP automatiquement » est cochée dans la sous-fenêtre
Général des propriétés du protocole Internet (TCP/IP). Cliquez avec le bouton
droit sur l’icône de connexion sans fil et choisissez Propriétés. Cliquez sur Protocole
Internet (TCP/IP), puis sur Propriétés.
Informations supplémentaires sur AirPort
Vous pouvez obtenir de plus amples informations sur AirPort dans aux endroits suivants :
 Aide Utilitaire AirPort
L’Aide Utilitaire AirPort fournit notamment des informations sur la configuration d’un
réseau AirPort Extreme, sur l’utilisation d’une borne d’accès AirPort Extreme, d’une
AirPort Express ou d’une Time Capsule ; sur la modification des réglages, sur la minimisation des sources d’interférences ; ou encore sur la recherche d’informations complémentaires sur Internet. Sur un ordinateur exécutant Mac OS X, ouvrez Utilitaire
AirPort, puis choisissez Aide Utilitaire AirPort dans le menu Aide. Sur un ordinateur
exécutant Windows, ouvrez Utilitaire AirPort, puis cliquez sur Aide.
 Web
Site web Apple AirPort à l’adresse www.apple.com/fr/airportextreme
Site Web d’assistance Apple à l’adresse www.apple.com/fr/support/airport4
71
4 Considérations générales
Ce chapitre définit les termes et concepts utilisés dans le cadre
des réseaux d’ordinateurs. Il vous servira de référence pour
comprendre le fonctionnement de votre réseau sans fil AirPort.
Fonctionnement d’un réseau
Paquets et trafic
Les informations transmises sur un réseau circulent sous forme de paquets. Chaque
paquet possède un en-tête indiquant sa provenance et sa destination, un peu comme
l’adresse sur l’enveloppe lorsque vous envoyez une lettre par la poste. L’ensemble du
flux constitué par ces paquets sur le réseau est appelé trafic.
Acheminement des données
Adresses matérielles
Votre ordinateur « écoute » l’ensemble du trafic sur son réseau local et sélectionne
les paquets qui lui sont destinés en vérifiant l’adresse matérielle (également appelée
adresse MAC, de l’anglais media access control) contenue dans l’en-tête du paquet.
Cette adresse correspond à un numéro propre à votre ordinateur.
Tout appareil conçu pour fonctionner en réseau doit obligatoirement posséder une
adresse matérielle unique incorporée de manière permanente. Le numéro de votre
carte AirPort constitue son identifiant (ID) AirPort.
Adresses IP
Internet étant un réseau de réseaux (reliant des millions d’ordinateurs), les adresses
matérielles ne suffisent pas à elles seules pour transmettre des données sur Internet.
Il serait en effet impossible que votre ordinateur détecte ses paquets sur l’ensemble du
trafic mondial et impossible pour Internet d’acheminer tout le trafic sur tous les réseaux.72 Chapitre 4 Considérations générales
C’est pourquoi votre ordinateur possède également une adresse IP (Internet Protocol)
qui indique exactement à quel endroit et sur quel réseau il est situé. Les adresses IP
permettent de s’assurer que votre réseau Ethernet local ne reçoit que le trafic qui lui est
destiné. De même que le système hiérarchique utilisé pour définir les codes postaux ou
les noms de rues, les adresses IP sont créées selon un ensemble de règles et leur attribution est gérée avec minutie.
L’adresse matérielle est comparable à votre nom : elle vous identifie de façon unique
et permanente, mais ne fournit aucune indication sur le lieu où vous vous trouvez.
Elle n’est donc utile que dans un contexte local. Par contre, une adresse IP est semblable à votre adresse postale, qui permet à votre courrier de parvenir chez vous.
Règles régissant l’envoi de données (protocoles)
Un protocole est un ensemble de règles qui définissent comment s’effectue la communication. Un protocole de réseau peut, par exemple, définir la manière dont les données doivent être formatées et adressées, tout comme l’écriture d’une adresse sur
une enveloppe est régie par certaines règles.
Utilisation de la borne d’accès AirPort Extreme
Cette section présente les différentes interfaces réseau de la borne d’accès
AirPort Extreme et décrit les fonctions fournies par cette dernière.
Interfaces de la borne d’accès
Pour exploiter la borne d’accès AirPort Extreme, vous devez configurer la manière dont
ses interfaces réseau seront utilisées. La borne d’accès AirPort Extreme possède cinq
interfaces réseau matérielles :
 Interface AirPort : l’interface AirPort crée un réseau AirPort pour que les ordinateurs
équipés d’AirPort s’y connectent. La borne peut fournir des services IP tels que DHCP
et NAT à travers cette interface. Elle ne peut pas utiliser l’interface AirPort pour établir une connexion à Internet.
 Interface WAN Ethernet (<) : cette interface est utilisée pour brancher des modems
DSL ou câble et se connecter à Internet.
 Interface LAN Ethernet (G) : si votre borne d’accès est dotée de ports d’interface
LAN Ethernet, vous pouvez les utiliser pour fournir des services IP aux clients Ethernet
locaux.Chapitre 4 Considérations générales 73
 Interface USB (d) : cette interface est utilisée pour connecter une imprimante USB à
la borne d’accès AirPort Extreme.
Utilisation de la Time Capsule
Cette section présente les différentes interfaces réseau de Time Capsule et décrit
les fonctions proposées.
Interfaces de la Time Capsule
Pour exploiter votre Time Capsule, vous devez configurer la manière dont ses interfaces réseau seront utilisées. La Time Capsule présente cinq interfaces réseau matérielles :
 Interface AirPort : l’interface AirPort crée un réseau AirPort pour que les ordinateurs
équipés d’AirPort s’y connectent. La Time Capsule peut fournir des services IP tels
que DHCP et NAT à travers cette interface. Elle ne peut pas utiliser l’interface AirPort
pour établir une connexion à Internet.
 Interface WAN Ethernet (<) : cette interface est utilisée pour brancher des modems
DSL ou câble et se connecter à Internet.
 Interface LAN Ethrnet (G) : la Time Capsule est dotée de trois ports d’interface LAN
Ethernet. Vous pouvez les utiliser pour fournir des services IP aux clients
Ethernet locaux.
 Interface USB (d) : cette interface est utilisée pour connecter une imprimante USB à
la borne d’accès AirPort Extreme.
Utilisation de la borne d’accès AirPort Express
Cette section présente les différentes interfaces réseau de la borne d’accès AirPort Express
et décrit les fonctions qu’elle propose.
Voyant d’état Port WAN Ethernet
Port secteur Port USB
Ports Ethernet Bouton
de réinitialisation
Logement de sécurité
< G
¯
∏
d
< G
≤ d ∏
Voyant d’état Port WAN Ethernet
Port secteur Bouton
de réinitialisation
Port USB
Ports Ethernet
Logement de sécurité 74 Chapitre 4 Considérations générales
Interfaces de la borne d’accès AirPort Express
Pour configurer la borne d’accès AirPort Express, vous devez configurer la manière
dont ses interfaces réseau seront utilisées. La borne possède quatre interfaces réseau
matérielles :
 Interface AirPort : l’interface AirPort crée un réseau AirPort pour que les ordinateurs
équipés d’AirPort s’y connectent. La borne peut fournir des services IP tels que DHCP
et NAT à travers cette interface. Elle ne peut pas utiliser l’interface AirPort pour établir une connexion à Internet.
 Interface WAN Ethernet (<) : cette interface permet de brancher des modems DSL
ou câble afin de se connecter à Internet.
 Interface USB (d) : cette interface permet de connecter une imprimante USB à
la borne d’accès AirPort Extreme.
 Interface audio (-) : le mini-jack audio stéréo analogique et numérique optique permet de connecter une borne AirPort Express à une chaîne stéréo ou à des haut-parleurs ;
Fonctions des périphériques sans fil Apple
 Pont : chaque périphérique sans fil Apple est configuré par défaut comme pont
entre le réseau sans fil AirPort et le réseau câblé Ethernet. La connexion d’un réseau
AirPort à un réseau Ethernet à travers le port LAN Ethernet (G) du périphérique
établit un pont entre le réseau sans fil et le réseau câblé.
Important : si vous connectez un réseau Ethernet au port LAN Ethernet (G) du
périphérique, assurez-vous que le réseau Ethernet ne dispose pas d’une connexion
à Internet.
 Routeur NAT : la capacité des périphériques sans fil Apple à partager une connexion à Internet avec plusieurs ordinateurs constitue l’une de leurs fonctions les
plus puissantes. Pour offrir ce service, le périphérique agit comme routeur. Il est
possible de le configurer pour qu’il assure simultanément les services de pontage
et les services de routage.
Voyant d’état Adaptateur
pour prise CA
Port USB
Port Ethernet Port de sortie
(mini-jack audio numérique
optique et analogique)
Bouton de réinitialisation
G -
d ∏Chapitre 4 Considérations générales 75
 Serveur DHCP : lorsque vous configurez le périphérique sans fil pour qu’il fasse
office de serveur DHCP, il fournit des adresses IP aux ordinateurs clients (connectés
sans fil ou par câble) configurés pour obtenir ces adresses via DHCP. Pour les ordinateurs clients, l’utilisation de DHCP simplifie la configuration IP, car cela les dispense
de saisir leurs propres informations IP.
Éléments pouvant provoquer des interférences avec AirPort
Plus la source d’interférences est éloignée, plus le risque de problème est faible.
Les éléments suivants peuvent provoquer des interférences avec AirPort :
 Les fours à micro-ondes.
 Les pertes de fréquence radio DSS (Direct Satellite Service).
 Le câble coaxial d’origine fourni avec certains types d’antennes paraboliques.
Contactez le fabricant du produit pour obtenir des câbles plus récents.
 Certaines installations électriques telles que les lignes à haute tension, les voies
ferrées et les centrales électriques.
 Les téléphones sans fil qui fonctionnent sur la fréquence porteuse de 2,4 gigahertz
(GHz). Si votre téléphone ou la communication AirPort posent problème, changez
le canal de votre borne d’accès.
 Autres réseaux AirPort et sans fil.
 Des bornes d’accès adjacentes qui utilisent des canaux voisins. Ainsi, si une borne
d’accès A est réglée sur le canal 1, la borne d’accès B doit être réglée sur le canal 6 ou
11. Pour un résultat optimal, utilisez les canaux 1, 6 ou 11 si vous utilisez votre borne
d’accès dans la plage de fréquence de 2,4 GHz.
 Tout déplacement d’objet provoquant la présence temporaire de pièces métalliques
entre votre ordinateur et la borne d’accès.Glossaire
76
Glossaire
10/100/1000Base-T Terme décrivant diverses technologies de transmission de paquets
Ethernet à un débit d’un gigabit par seconde. Parfois nommé Ethernet Gigabit. En
2000, le Power Mac G4 et le PowerBook G4 d’Apple furent les premiers ordinateurs produits en masse présentant une connexion 10/100/1000Base-T. Cette connexion a été
vite intégrée à beaucoup d’autres ordinateurs.
10/100Base-T Norme de réseau qui prend en charge des vitesses de transfert de données pouvant atteindre 100 Mbps (100 megabits par seconde). Étant donné qu’elle est
10 fois plus rapide qu’Ethernet, elle est souvent nommée Fast Ethernet.
10Base-T La méthode de câblage la plus courante pour Ethernet. 10Base-T est conforme à la norme IEEE 802.3. Elle a été développée pour permettre la communication
des données sur des câbles à paires torsadées non blindées (téléphone) à des vitesses
pouvant atteindre 10 megabits par seconde et sur des distances d’environ 100 mètres
sur un segment de réseau.
802.11a Norme IEEE pour les réseaux sans fil qui fonctionne à 5 GHz avec des débits
pouvant atteindre 54 Mbps.
802.11b Norme IEEE pour les réseaux sans fil qui fonctionne à 2,4 GHz avec des débits
pouvant atteindre 11 Mbps.
802.11g Norme IEEE pour les réseaux sans fil qui fonctionne à 2,4 GHz avec des débits
pouvant atteindre 54 Mbps.
802.11n Groupe de travail du comité IEEE 802.11 dont l’objectif est de définir une
norme pour les vitesses élevées d’au moins 100 Mbps sur les réseaux sans fil. Certaines
propositions en cours de test par le groupe de travail incluent des conceptions pour
des débits pouvant atteindre 540 Mbps. la technologie MIMO (multiple-input multipleoutput) qui utilise de simples récepteurs et émetteurs côté client et côté point d’accès
pour obtenir de meilleures performances ; celles-ci devraient former la base de la spécification finale. Voir Mbps, MIMO.Glossaire 77
adresse IP Adresse de protocole Internet. IP Version 4, le protocole Internet le plus
largement utilisé fournit un numéro de 32-bit qui identifie l’expéditeur et le récepteur
des informations envoyées par Internet. Une adresse IP se divise en deux parties :
l’identificateur du réseau spécifique sur Internet et l’identificateur de l’appareil spécifique (qui peut être un serveur ou une station de travail) au sein de ce réseau. La nouvelle version d’IP, la version 6, fournit un système d’adressage sur 128-bit pour prendre
en charge un nombre bien plus important d’adresses IP. Voir DHCP, DNS, IP.
adresse MAC Adresse Media Access Control. Numéro de matériel unique qui identifie
chaque appareil sur le réseau. Un appareil peut être un ordinateur, une imprimante, etc.
L’adresse MAC est également appelée ID AirPort.
authentification Processus qui se produit après association pour vérifier l’identité
d’un appareil sans fil ou d’un utilisateur final et lui permettre d’accéder au réseau.
Voir WPA, WPA2.
bande passante Capacité de transmission maximale d’un canal de communication à
un point quelconque du temps. La bande passante, généralement mesurée en bits par
seconde (bps), détermine la vitesse à laquelle les informations sont envoyées à travers
le réseau. Si vous comparez le canal de communication à un tuyau, la bande passante
représente la largeur du tuyau et détermine la quantité de données qui peuvent circuler à travers le tuyau à un point quelconque du temps. Plus la bande passante est élevée, plus les données circulent vite. Voir bps.
bibande Appareil capable de fonctionner dans deux fréquences. Sur un réseau sans
fil, les appareils bibande sont capables de fonctionner sur les bandes de 2,4 GHz
(802.11b/g) ou 5 GHz (802.11a).
Bluetooth Technologie conçue pour les communications sans fil de faible portée
entre des ordinateurs, des produits mobiles, y compris les ordinateurs personnels,
les ordinateurs portables, les assistants personnels, les imprimantes, et les téléphones
mobiles. Conçue pour remplacer le câble, Bluetooth permet une transmission de faible
portée de la voix et des données sur la fréquence de 2,4 GHz dans une plage d’environ
9 mètres.
borne d’accès Dans le domaine des réseaux d’ordinateurs sans fil, une borne d’accès
est un récepteur/émetteur radio qui tient lieu de concentrateur du réseau local sans
file, et peut également jouer le rôle de passerelle entre un réseau câblé et le réseau
sans fil. Une borne d’accès peut également être appélée point d’accès ou routeur.78 Glossaire
bps Bits par seconde. Mesure de la vitesse de transmission des données sur un réseau
ou un canal de communication ; bps représente le nombre de bits qui peut être envoyé
ou reçu en une seconde. Il mesure la vitesse à laquelle les données sont transférées et
ne devrait pas être confondu avec bytes (octets) par seconde, même si c’est souvent
le cas. Tandis que « bits » est une mesure de vitesse de transmission, « bytes » (octets)
est une mesure de capacité de stockage. Voir bande passante, Mbps.
canal Portion du spectre radio disponible qui tous les appareils d’un réseau sans fil
utilisent pour communiquer. Le changement de canal sur le point d’accès/routeur peut
contribuer à réduire les interférences.
certification Wi-Fi Norme de certification qui désigne les produits de réseau local sans
fil (WLAN) reposant sur IEEE 802.11 qui sont conformes aux exigences de test d’interopérabilité développés et régis par l’Alliance Wi-Fi.
chiffrement Mécanisme permettant d’assurer la confidentialité des données.
Voir WPA, WPA2.
client Tout ordinateur ou périphérique connecté à un réseau qui demande des fichiers
et des services (fichiers, impressions) au serveur ou tout autre périphérique
du réseau. Ce terme fait également référence à l’utilisateur final.
concentrateur Appareil équipé de plusieurs ports utilisé pour connecter les appareils
clients à un réseau Ethernet câblé. Les concentrateurs peuvent présenter de nombreux
ports et transmettre les données à des vitesses comprises entre 10 et 1000 Mbps à tous les
ports connectés. Un petit concentrateur câblé peut connecter seulement 4 ordinateurs,
tandis qu’un gros concentrateur peut connecter 48 ordinateurs ou plus. Voir routeur.
coupe-feu Système combinant des logiciels et du matériel qui réside entre deux
réseaux pour éviter que des utilisateurs non autorisés puissent y accéder. L’utilisation
la plus courante du coupe-feu consiste à assurer la sécurité entre un réseau local et
Internet. Les coupe-feux peuvent rendre un réseau invisible depuis Internet et empê-
cher les utilisateurs non autorisés ou indésirables d’accéder aux fichiers et aux systè-
mes qui composent le réseau. Les coupe-feux matériels et logiciels surveillent et
contrôlent
le flux de données entrant et sortant des ordinateurs sur les réseaux d’entreprise ou
domestiques, qu’ils soient sans fil ou non. Ils peuvent être réglés pour intercepter,
analyser et arrêter un large éventail d’intrus et de pirates qui foisonnent sur Internet.
débit Généralement mesuré en bps, Kbps, Mbps ou Gbps, le débit représente la quantité de données qui peut être envoyée d’un endroit à un autre dans une période de
temps spécifique. Voir bps, Mbps.Glossaire 79
DHCP Protocole de configuration d’hôte dynamique. Protocole qui permet d’affecter
dynamiquement les adresses IP à partir d’une liste prédéfinie de noeuds dans un
réseau. Lorsqu’ils se connectent, les noeuds de réseau reçoivent automatiquement
une adresse IP à partir d’un pool d’adresses envoyées par un serveur DHCP. Le serveur
DHCP fournit (ou prête) une adresse IP à un client pour une période de temps définie.
Le client demande automatiquement le renouvellement de l’adresse IP lorsque celle-ci
arrive à échéance. Si le renouvellement n’est pas demandé, l’adresse IP expire et
retourne au pool d’adresses IP disponibles. L’utilisation de DHCP pour gérer les adresses IP simplifie la configuration du client et permet une attribution optimale des adresses IP. Voire Adresse IP.
DNS Système de nom de domaine. Service Internet qui convertit les noms de domaines alphanumériques en adresses IP attribuées et inversement. Ce terme décrit spécifiquement le serveur qui effectue la traduction. Chaque site Web possède sa propre
adresse IP sur Internet. Le serveur DNS consulte généralement une base de données de
noms et d’adresses Internet qui convertit les noms alphanumériques en nombres du
protocole IP officiels et inversement. Par exemple, un serveur DNS convertit un nom tel
que monsiteweb.com en une série de chiffres tels que 107.22.55.26. Voir IP, adresse IP.
DSL Digital Subscriber Ligne, ligne d’abonné numérique. Circuit numérique dédié
entre une résidence ou une entreprise et le central d’une compagnie de téléphone.
Il permet la transmission des données, de la voix et de la vidéo à haute vitesse sur des
lignes téléphoniques anciennes en fils de cuivre à paire torsadée existants. Voir large
bande.
Ethernet Technologie standard internationale la plus courante pour les réseaux locaux
câblés (LAN). Elle offre des vitesses de transmission à partir de 10 Mbps sur des réseaux
Ethernet 10Base-T de base, jusqu’à 100 Mbps sur des réseaux Fast Ethernet, 1000 Mbps
sur Ethernet Gigabit et jusqu’à 10 000 Mbps sur Ethernet Gigabit 10.
IEEE 802.11 Famille de spécifications développée par le comité 802.11 de l’IEEE (Institute of Electrical and Electronics Engineers), qui établit les normes des réseaux Ethernet sans fil. Les normes 802.11 définissent l’interface de transmission radio entre les
clients sans fil et la borne d’accès, ou le point d’accès qui est relié physiquement au
réseau câblé.
IP Internet Protocol, protocole Internet. Protocole de communication de base d’Internet.
Voir Adresse IP, TCP/IP.
itinérance (Wi-Fi) Possibilité de passer d’une zone de couverture Wi-Fi à une autre
sans perdre la connectivité (transfert intercellulaire).80 Glossaire
LAN Local area network, réseau local. Système permettant de connecter des ordinateurs personnels et d’autres appareils dans un lieu restreint pour partager des ressources telles qu’une connexion Internet, des imprimantes, des fichiers et des lecteurs.
Lorsque ces appareils sont connectés au moyen de la technologie Wi-Fi, le système
se nomme alors un réseau LAN sans fil ou WLAN. Voir WAN.
large bande Connexion Internet comparativement rapide qui possède une bande
passante suffisante pour gérer simultanément plusieurs canaux de voix, de données
et vidéo. Le câble, la ligne DSL et le satellite sont tous considérés comme des canaux
de large bande ; ils offrent une vitesse bien supérieure à celle de la connexion Internet
via une ligne d’abonné numérique sur des fils de téléphone. Voir modem câble, DSL.
Mbps Megabits par seconde. Mesure de la vitesse des données équivalente à un
million de bits par seconde.
MIMO Multiple-input multiple-output (entrées multiples, sorties multiples). Technologie de traitement du signal évoluée qui utilise plusieurs récepteurs et émetteurs côté
client et côté point d’accès pour obtenir des débits pouvant atteindre 100 Mbps. Voir
802.11n.
modem câble Périphérique utilisé avec un service Internet large bande fourni par un
service de télévision par câble traditionnel. Les modems câble convertissent les données analogies de systèmes de télévision par câble en un format numérique qui peut
être utilisé par un ordinateur. Voir modem large bande.
modem large bande Périphérique qui connecte un ordinateur local ou un réseau à un
service Internet à haute vitesse, tel que DSL ou Cable Internet. Voir modem câble, DSL.
NAT Network Address Translation (traduction d’adresse réseau). Capacité réseau qui
permet à plusieurs ordinateurs de partager dynamiquement une seule adresse IP
entrante à partir d’une connexion par modem, par câble ou DSL. Le protocole NAT
prend une adresse IP entrante unique et la convertit en une adresse IP privée pour
chaque client du réseau. Voir DHCP, adresse IP.
NIC Carte d’interface réseau. Carte sans fil ou non pour ordinateur personnel qui permet à un ordinateur client d’utiliser les ressources du réseau. La plupart des cartes
d’interface réseau domestiques câblées fonctionnent à 100 Mbps. Les cartes d’interface
réseau sans fil offrent des vitesses de transmission de données définies par les normes
802.11.
nom de réseau Nom utilisé pour identifier un réseau sans fil. Voir SSID.
paquet Unité d’informations transmises d’un appareil à un autre sur un réseau.
En règle générale, le paquet contient un en-tête avec les informations d’adressage,
les données et une somme de contrôle pour assurer l’intégrité des données. Glossaire 81
passerelle Dans le monde sans fil, une passerelle est un point d’accès équipé de capacités logicielles supplémentaires telles que les protocoles NAT et DHCP. Les passerelles
peuvent également prendre en charge les réseaux privés virtuels, l’itinérance, les
coupe-feux, divers niveaux de sécurité, etc.
phrase de passe Série de caractères permettant de créer une clé utilisée par la technologie Wi-Fi Protected Access (WPA). Voir PSK, WPA.
point d’accès Également nommé point d’accès sans fil (WAP), appareil qui relie des
périphériques sans fil pour former un réseau.
point de d’accès sans fil Emplacement à partir duquel les utilisateurs peuvent accéder
à Internet via des ordinateurs portables Wi-Fi et d’autres appareils équipés de la technologie Wi-Fi. L’accès peut-être gratuit ou payant. Les points d’accès sans fil se trouvent le plus souvent dans les cafés, les magasins, les hôtels, les salles d’embarquement
des aéroports, les gares, les centres de congrès, les stations services, les aires de repos
et d’autres lieux publiques. Les grandes entreprises et les universités offrent souvent
ce service à leurs invités. Le service de point d’accès sans fil est parfois disponible dans
les avions, les trains et les bateaux.
pont Appareil sans fil qui relie plusieurs réseaux ensemble. L’utilisation d’un point
d’accès en tant que pont désactive la traduction d’adresse réseau NAT (Network
Address Translation) et le routage DHCP et étend simplement la plage de service.
PSK Clé pré-partagée. Mécanisme de Wi-Fi Protected Access (WPA)-Personnel qui permet l’utilisation de clés et mots de passe saisis manuellement afin d’assurer la sécurité
WPA. Le PSK est saisi sur le point d’accès ou la passerelle sans fil domestique et sur chaque ordinateur personnel du réseau Wi-Fi. Une fois le mot de passe saisi, le mécanisme
Wi-Fi Protected Access prend aussitôt le relais. Il éloigne les pirates et autres utilisateurs non autorisés en exigeant que tous les appareils présentent un mot de passe qui
correspond. Le mot de passe met également en oeuvre le processus de chiffrement
qui, sous WPA est un protocole TKIP (Temporal Key Integrity Protocol) et sous WPA2 est
AES (Advanced Encryption Standard). Voir TKIP, WPA-Personnel, WPA2-Personnel.
réseau fédérateur Partie centrale d’un réseau étendu qui relie deux ou plusieurs sousréseaux. Le réseau fédérateur est le principal chemin de transmission des données sur
les réseaux étendus tels que les réseaux d’entreprises et des fournisseurs de service.
Un réseau fédérateur peut être sans fil ou non.
réseau sans fil Appareils connectés à un réseau à l’aide d’un point d’accès sans fil
centralisé. Voir WLAN.
routeur Un routeur sans fil est un appareil qui accepte les connexions des appareils
sans fil du réseau, intègre un coupe-feu sans fil pour assurer la sécurité et fournit des
adresses de réseau local. Voir concentrateur.82 Glossaire
serveur Ordinateur qui fournit des ressources ou des services à d’autres ordinateurs et
appareils sur le réseau. Différents types de serveurs existent, dont les serveurs d’impression, les serveurs Internet, les serveurs de messagerie et les serveurs DHCP. Il est également possible de combiner un serveur avec un concentrateur ou un routeur. Voir DHCP,
concentrateur, routeur.
serveur d’impression Appareil réseau, souvent un ordinateur qui se connecte à au
moins une imprimante et qui permet de la partager avec les ordinateurs d’un réseau.
sous-réseau Plage d’adresses IP qui fait partie d’une plage d’adresses plus large. Les
sous-réseaux permettent de diviser une adresse de réseau d’un réseau plus étendu en
réseaux plus petits. Les sous-réseaux se connectent à d’autres réseaux via un routeur.
Chaque réseau local sans fil utilise généralement le même sous-réseau pour tous ses
clients. Voir adresse IP, routeur.
sous-réseau IP Un sous-réseau IP est un réseau local défini par des numéros de réseau
IP. La connexion à un sous-réseau implique à la fois la connexion au réseau matériel
approprié et la configuration du protocole IP pour ce réseau.
SSID Service set identifier. Nom de réseau unique de 32 caractères, ou identificateur,
qui différentie un réseau local sans fil d’un autre. Tous les points d’accès et les clients
qui essaient de se connecter à un WLAN spécifique doivent utiliser le même SSID.
Le SSID peut être une entrée alphanumérique quelconque jusqu’à 32 caractères.
Voir nom de réseau.
TCP Transmission Control Protocol. Protocole de niveau transport utilisé avec le protocole IP (Internet Protocol) pour acheminer les données sur Internet. Voir IP, TCP/IP.
TCP/IP Technologie sous-jacente des communications Internet. Tandis que le protocole IP gère la livraison réelle des données, la couche TCP effectue le suivi des paquets
de données pour acheminer efficacement un message via Internet. Chaque ordinateur
d’un réseau TCP/IP possède sa propre adresse IP qui est attribuée dynamiquement ou
affectée au démarrage (voir DHCP) ou affectée définitivement comme adresse statique. Tous les messages TCP/IP contiennent l’adresse du réseau de destination, ainsi que
l’adresse du poste de destination. Ainsi, les messages TCP/IP peuvent être transmis à
plusieurs réseaux (sous-réseaux) d’une entreprise ou du monde entier. Par exemple,
lorsqu’un utilisateur télécharge une page web, TCP divise le fichier de la page sur le serveur web en paquets, il numérote les paquets et les transfert individuellement vers
l’adresse IP de l’utilisateur. Les paquets peuvent emprunter différents chemins avant
d’atteindre l’adresse de l’utilisateur. Une fois les paquets arrivés à destination, TCP les
réassemble après avoir attendu qu’ils soient tous arrivés, afin de les présenter sous
la forme d’un fichier unique. Voir IP, adresse IP, paquet, TCP.Glossaire 83
USB Universal Serial Bus. Connexion série bidirectionnelle à haute vitesse utilisée
pour transférer des données entre un ordinateur et des périphériques telles que des
appareils-photos numériques et des cartes mémoire.
WEP Wired equivalent privacy. Norme de sécurité d’origine utilisée dans les réseaux
sans fil pour chiffrer le trafic du réseau sans fil. 6 Voir WPA, réseau local sans fil
Wi-Fi Terme développé par l’alliance Wi-Fi pour décrire les produits d’un réseau local
sans fil (WLAN) qui reposent sur l’IEEE (Institute of Electrical and Electronics Engineers).
WLAN (WLAN). Réseau de communication de données qui s’étend sur des zones locales, régionales, nationales et internationales et est généralement fourni par un transporteur publique (comme une compagnie de téléphone ou un fournisseur de services).
Ce terme est utilisé pour distinguer les réseaux de données à base de lignes téléphoniques des réseaux Wi-Fi. Les réseaux filaires sont considérés comme des réseaux étendus (WAN) tandis que les réseaux Wi-Fi sont considérés comme des réseaux locaux sans
fil (WLAN). Voir LAN.
WPA - Entreprise (Wi-Fi Protected Access-Entreprise). Méthode de sécurité sans fil qui
fournit une protection des données robuste pour plusieurs utilisateurs et de grands
réseaux gérés. Elle utilise le framework d’authentification 802.1X avec le chiffrement
TKIP et empêche les accès non autorisés au réseau en vérifiant les utilisateurs du réseau
via un serveur d’authentification. Voir 802.1X.
WPA - Personnel (Wi-Fi Protected Access-Personnel). Méthode de sécurité sans fil qui
fournit une protection des données robuste et empêche les accès non autorisés à des
réseaux de petite taille. Elle utilise le chiffrement TKIP et protège des accès non autorisés au réseau.84 Glossaire
WPA2 (Wi-Fi Protected Access 2). Successeur de la technologie de sécurité WPA pour
les réseaux sans fil, qui assure une protection renforcée des données et présente un
contrôle plus complet des accès réseau. Elle offre aux utilisateurs Wi-Fi particuliers ou
entreprises un haut niveau d’assurance que seuls les utilisateur autorisés peuvent accé-
der à leurs réseaux sans fil. Reposant sur la norme IEEE 802.11i ratifiée, WPA2 fournit une
sécurité de niveau gouvernementale en mettant en oeuvre l’algorithme de chiffrement
AES compatible avec le National Institute of Standards and Technology (NIST) FIPS
140-2 et l’authentification 802.1X. Il existe deux versions de WPA2 : WPA2-Personnel et
WPA2-Entreprise. WPA2-Personnel empêche les accès non autorisés au réseau en utilisant un mot de passe configuré. WPA2-Entreprise vérifie les utilisateurs du réseau via
un serveur. WPA2 offre la rétrocompatibilité avec WPA. À l’instar de WPA, WPA2 utilise le
framework 802.1X/EAP comme partie de l’infrastructure qui assure une authentification
mutuelle centralisée et une gestion des clés dynamique et offre une clé pré-partagée
à utiliser dans les environnements domestiques et des petites entreprises. À l’instar
de WPA, WPA2 est conçu pour sécuriser toutes les versions des périphériques 802.11,
y compris 802.11b, 802.11a et 802.11g, multibande et multimode. Voir WPA2-Entreprise,
WPA2-Personnel.
WPA2 - Entreprise Wi-Fi Protected Access 2 - Entreprise. Dernière version de la
méthode de sécurité sans fil de WPA qui fournit une protection supérieure des données pour plusieurs utilisateurs et sur de larges réseaux gérés. Elle empêche les accès
non autorisés au réseau en vérifiant les utilisateurs du réseau via un serveur d’authentification. Voir WPA2.
WPA2 - Personnel Wi-Fi Protected Access 2 - Personnel. Dernière version de la
méthode de sécurité de WPA pour les réseaux sans fil qui assure une meilleure protection des données et empêche les accès non autorisés aux réseaux de petite taille. Voir
WPA2, PSK.
www.apple.com/airportextreme
www.apple.com/airport
© 2008 Apple Inc. Tous droits réservés.
Apple, le logo Apple, AirPort, AirPort Extreme, AppleShare, AppleTalk, Bonjour, Mac et Mac OS sont des marques
d’Apple Computer, Inc. déposées aux États-Unis et dans d’autres pays. AirPort Express, AirTunes, Time Capsule et
Time Machine sont des marques d’Apple Inc. Les autres noms de produits et de sociétés figurant dans ce
manuel peuvent être des marques de leurs détenteurs respectifs.
F019-1155
iPod touch
Guide de l’utilisateur5 Chapitre 1 : Démarrage
5 Éléments nécessaires
5 Enregistrement de l’iPod touch
6 Synchronisation avec iTunes
11 Comptes Mail, Contacts et Calendrier.
13 Installation de profils de configuration
14 Déconnexion de l’iPod touch de votre ordinateur
15 Chapitre 2 : Notions élémentaires
15 Vue d’ensemble de l’iPod touch
17 Écran d’accueil
20 Bouton de Marche/Veille
21 Écran tactile
24 Clavier à l’écran
28 Connexion à Internet
28 Recharge de la batterie.
30 Entretien de l’iPod touch
30 Redémarrage et réinitialisation de l’iPod touch
31 Chapitre 3 : Musique et vidéo
31 Obtention de musique, vidéo, etc.
33 Musique et autres audios
38 Vidéos
41 Réglage d’une minuterie de veille
42 Modification des boutons de navigation
43 Chapitre 4 : Photos
43 Synchronisation de photos avec votre ordinateur
43 Visionnage de photos
45 Diaporamas
46 Fond d’écran
46 Enregistrement d’images à partir d’un message électronique ou d’une page web
46 Envoi d’une photo par courrier électronique
46 Envoi de photo à une Galerie MobileMe
2
Table des matièresTable des matières 3
47 Attribution d’une photo à un contact
48 Chapitre 5 : iTunes Stores
48 iTunes Wi-Fi Music Store
52 App Store
58 Synchronisation du contenu acheté
58 Vérification des achats
59 Mise à jour de votre compte
60 Chapitre 6 : Autres applications
60 Safari
65 Calendrier
70 Mail
76 YouTube
79 Bourse
80 Plans
86 Météo
88 Horloge
90 Calculette
92 Notes
93 Contacts
95 Chapitre 7 : Réglages
95 Wi-Fi
96 VPN
96 Nouvelles données
97 Luminosité
97 Général
103 Musique
104 Vidéo
105 Photos
105 Mail, Contacts, Calendrier
109 Safari
111 L’annexe A : Dépannage
111 Général
112 iTunes et synchronisation
114 Safari, Mail et Contacts
115 Son, musique et vidéo
116 iTunes Store
116 Sauvegarde de l’iPod touch
119 Mise à jour et restauration du logiciel de l’iPod touch
120 Fonctions d’accessibilité de l’iPod touch4 Table des matières
121 L’annexe B : Autres ressources
121 Informations relatives à la sécurité, au logiciel et au service après-vente
122 Guide de l’utilisateur optimisé pour iPod touch 5
· AVERTISSEMENT : Pour éviter toute blessure, consultez toutes les consignes d’utilisation présentes dans ce guide et les informations relatives à la sécurité apparaissant dans le Guide des informations importantes sur le produit disponible à la page
www.apple.com/ca/fr/support/manuals/ipodtouch avant d’utiliser l’iPod touch.
Éléments nécessaires
Pour utiliser l’iPod touch, vous avez besoin des éléments suivants :
 un Mac ou un PC équipé d’un port USB 2.0 et de l’un des systèmes d’exploitation
suivants :
 Mac OS X version 10.4.10 ou ultérieure,
 Windows XP Édition familiale ou Professionnel avec Service Pack 2 ou ultérieur,
 Windows Vista Édition Familiale Premium, Professionnel, Entreprise ou Édition
Intégrale ;
 une résolution écran de 1024 x 768 minimum ;
 iTunes 7.7 ou une version ultérieure, disponible à la page
www.itunes.com/ca/fr/download ;
 un compte iTunes Store (pour les achats auprès de l’iTunes Wi-Fi Music Store ou de
l’App Store) ;
 une connexion Internet pour votre ordinateur (haut débit recommandé).
Enregistrement de l’iPod touch
Avant de pouvoir vous servir des fonctionnalités qu’offrent l’iPod touch, vous devez
utiliser iTunes pour configurer l’iPod touch. Vous pouvez également enregistrer votre
iPod touch et créer un compte iTunes Store (disponible dans la majorité des pays) si
vous n’en avez pas encore un.
Enregistrement de votre iPod touch :
1 Téléchargez et installez la dernière version d’iTunes à la page
www.itunes.com/ca/fr/download.
1
Démarrage2 Connectez l’iPod touch à un port USB 2.0 de votre Mac ou PC à l’aide du câble fourni
avec l’iPod touch.
3 Suivez les instructions à l’écran dans iTunes pour enregistrer votre iPod touch et synchroniser votre iPod touch avec les contacts, calendriers et signets de votre ordinateur.
Synchronisation avec iTunes
Avec l’iPod touch, il est facile d’avoir un accès instantané à vos contacts, vos calendriers
et même les signets de votre navigateur. iTunes peut synchroniser toutes ces informations sur l’iPod touch, ainsi que votre musique, vos vidéos et d’autres contenus de
votre bibliothèque iTunes.
Configuration de la synchronisation
Vous pouvez régler iTunes de manière à synchroniser certains ou tous les éléments
suivants :
 Contacts : noms, numéros de téléphone, adresses, adresses électroniques, etc.
 Calendriers (rendez-vous et événements)
 Réglages de compte de messagerie
 Signets de page web
 Musique et livres audio
 Photos
 Podcasts
 Vidéos
 Applications achetées ou téléchargées auprès de l’iTunes Store
Vous pouvez ajuster vos réglages de synchronisation chaque fois que l’iPod touch est
connecté à votre ordinateur.
6 Chapitre 1 DémarrageChapitre 1 Démarrage 7
La musique, les livres audio, les podcasts, le contenu vidéo et les applications achetées
sont synchronisés à partir de votre bibliothèque iTunes. Si vous n’avez pas encore de
contenu dans iTunes, l’iTunes Store (disponible dans certains pays) facilite l’achat de
contenu ou l’abonnement à du contenu, et son téléchargement sur iTunes. Vous pouvez également ajouter de la musique à votre bibliothèque iTunes à partir de vos CD.
Pour en savoir plus sur iTunes et l’iTunes Store, ouvrez iTunes et choisissez Aide > Aide
iTunes.
Les contacts, calendriers et signets de page web sont synchronisés à partir des applications de votre ordinateur, comme indiqué dans la section suivante. Les contacts et
les calendriers sont synchronisés selon les deux méthodes à partir de votre ordinateur
et de votre iPod touch. Les entrées ou les modifications apportées à l’iPod touch sont
synchronisées vers votre ordinateur et inversement. Les signets de page web sont
également synchronisés dans les deux sens. Les photos peuvent être synchronisées à
partir d’une application ou d’un dossier.
Les réglages de compte de messagerie ne se synchronisent que depuis l’application de
messagerie électronique de votre ordinateur vers votre iPod touch. Cela vous permet
de personnaliser vos comptes de messagerie sur l’iPod touch sans influer pour autant
les réglages de compte de messagerie instaurés sur votre ordinateur.
Remarque : Vous pouvez également configurer directement des comptes de messagerie électronique sur l’iPod touch. Voir la section ªComptes Mail, Contacts et
Calendrier.» à la page 11.
Les achats effectués sur l’iPod touch à partir de l’iTunes Wi-Fi Music Store ou de l’App
Store sont synchronisés vers votre bibliothèque iTunes. Vous pouvez également acheter ou télécharger directement de la musique et des applications depuis l’iTunes Store
sur votre ordinateur, puis les synchroniser sur votre iPod touch.
Si vous le souhaitez, vous pouvez régler l’iPod touch pour qu’il ne synchronise qu’une
partie du contenu de votre ordinateur. Par exemple, vous pouvez synchroniser un seul
groupe de contacts de votre carnet d’adresses ou uniquement les podcasts vidéo non
visionnés.
Important : Vous ne pouvez connecter et synchroniser qu’un iPod touch à la fois.
Déconnectez-en un avant d’en connecter un autre. Vous devez ouvrir une session sur
votre ordinateur avant de connecter votre iPod touch. Sur un PC, si vous synchronisez
plus d’un iPod touch ou iPod avec le même compte utilisateur, vous devez utilisez les
mêmes réglages de synchronisation pour chacun d’entre eux.
Configuration de la synchronisation iTunes :
1 Connectez l’iPod touch à votre ordinateur et ouvrez iTunes (s’il ne s’est pas ouvert
automatiquement).
2 Dans iTunes, sélectionnez iPod touch dans la barre latérale.3 Ajustez les réglages de synchronisation dans chacun des volets de réglage.
La section suivante décrit les volets.
Remarque : Si vous configurez l’iPod touch de manière à synchroniser contacts, calendriers ou signets avec MobileMe ou Microsoft Exchange, la synchronisation de ces
éléments est désactivée dans iTunes. Voir la section ªConfiguration de comptes.» à la
page 11.
4 Cliquez sur Appliquer dans le coin inférieur droit de l’écran.
Par défaut, l’option ”Ouvrir iTunes à la connexion de cet iPod” est sélectionnée.
Volets des réglages iPod touch dans iTunes
Les sections suivantes offrent un aperçu de chacun des volets de réglage de
l’iPod touch. Pour plus de renseignements, ouvrez iTunes et choisissez Aide > Aide
iTunes.
Volet Résumé
Sélectionnez ”Ouvrir iTunes à la connexion de cet iPod” pour qu’iTunes s’ouvre et
synchronise automatiquement votre iPod touch lorsque vous connectez ce dernier à
votre ordinateur. Désélectionnez cette option si vous souhaitez ne synchroniser qu’en
cliquant le bouton Synchroniser d’iTunes. Pour plus de renseignements sur la manière
d’éviter la synchronisation automatique, consultez la section ªÉviter la synchronisation
automatique» à la page 10.
Sélectionnez « Ne synchroniser que les morceaux et vidéos cochés » si vous ne souhaitez synchroniser que les éléments cochés de votre bibliothèque iTunes.
8 Chapitre 1 DémarrageChapitre 1 Démarrage 9
Sélectionnez l’option « Gérer manuellement la musique et les clips vidéo » pour désactiver la synchronisation automatique dans les volets de réglages Musique et Vidéo. Voir
la section ªGestion manuelle du contenu» à la page 32.
Volet Infos
La sous-fenêtre Info permet de configurer les réglages de synchronisation de vos
contacts, calendriers, comptes de messagerie et signets de navigateur web.
 Dans le menu principal, choisissez Contacts, pour configurer et personnaliser vos
comptes de messagerie pour l’“iPhone”.
Vous pouvez synchroniser vos contacts avec des applications telles que Carnet
d’adresses de Mac OS X, Microsoft Entourage, le carnet d’adresses Yahoo! et le carnet d’adresses Google sur un Mac, ou avec le carnet d’adresses Yahoo! , le carnet
d’adresses Google, le carnet d’adresses Windows (Outlook Express), les contacts Vista
ou Microsoft Outlook 2003 ou 2007 sur un PC. (Sur un Mac, vous pouvez synchroniser vos contacts avec plusieurs applications. Sur un PC, vous ne pouvez synchroniser
vos contacts qu’avec une application à la fois.
Si vous synchronisez avec le carnet d’adresses Yahoo! , vous avez seulement besoin
de cliquer sur Configurer pour saisir vos nouvelles informations de connexion lorsque vous changez de nom d’utilisateur ou de mot de passe Yahoo! après avoir réglé
la synchronisation.
 Calendriers
Vous pouvez synchroniser des calendriers à partir d’applications telles qu’iCal et
Microsoft Entourage sur un Mac ou à partir de Microsoft Outlook 2003 ou 2007 sur
un PC. Sur un Mac, vous pouvez synchroniser vos calendriers avec plusieurs applications. Sur un PC, vous ne pouvez synchroniser vos calendriers qu’avec une application à la fois.
 Comptes de messagerie
Vous pouvez synchroniser les réglages de compte de messagerie depuis l’application Mail sur Mac et depuis Microsoft Outlook 2003 ou 2007 ou Outlook Express
sur PC. Les réglages de compte ne sont transférés que depuis votre ordinateur vers
l’iPod touch. Les modifications que vous apportez à un compte de messagerie électronique sur votre iPod touch n’influent pas sur le compte sur de votre ordinateur.
Remarque : Le mot de passe de votre compte de messagerie Yahoo! n’est pas enregistré sur votre ordinateur et ne ne peut donc pas être synchronisé : il doit être saisi
sur l’iPod touch. Dans Réglages, choisissez « Mail, Contacts, Calendrier », touchez
votre compte Yahoo! et saisissez le mot de passe.
 Navigateur web
Vous pouvez synchroniser des signets à partir de Safari sur un Mac, ou à partir de
Safari ou Microsoft Internet Explorer sur un PC.
 AvancéCes options vous permettent de remplacer lors de la prochaine synchronisation les
informations qui se trouvent sur l’iPod touch par celles qui se trouvent sur votre
ordinateur.
Volets Musique, Films, Émissions de TV et Podcasts
Utilisez ces sous-fenêtres pour indiquer les données à synchroniser. Vous pouvez synchroniser tous vos morceaux de musique, vos films, vos émissions de télévision et vos
podcasts, ou sélectionner les listes de lecture et articles souhaités sur l’iPod touch.
Si vous souhaitez regarder des films loués sur votre iPod touch, transférez-les sur
l’iPod touch à l’aide du volet Films d’iTunes.
Si l’iPod touch n’a plus suffisamment d’espace libre pour tous les éléments multimédias indiqués, iTunes vous demande si vous souhaitez créer une liste de lecture
spéciale. iTunes crée celle-ci pour vous et la règle pour qu’elle se synchronise avec
l’iPod touch.
Volet Photos
Vous pouvez synchroniser des photos avec iPhoto 4.0.3 ou ultérieur ou avec Aperture
sur un Mac, ou avec Adobe Photoshop Album 2.0 ou supérieur ou Adobe Photoshop
Elements 3.0 ou supérieur sur un PC. Vous pouvez également synchroniser des photos
à partir de tout dossier de votre ordinateur qui contient des images.
Volet Applications
Utilisez le volet Applications pour indiquer quelles applications de l’App Store vous
souhaitez installer sur l’iPod touch. Toutes les applications directement téléchargées
sur l’iPod touch sont automatiquement sauvegardées dans votre bibliothèque iTunes
lorsque vous effectuez une synchronisation. Si vous supprimez manuellement une application sur votre iPod touch, vous pouvez la réinstaller à partir de ce volet à partir du
moment où il a été synchronisé précédemment.
Éviter la synchronisation automatique
Vous pouvez empêcher l’iPod touch de synchroniser automatiquement lorsque
vous le connectez à un ordinateur autre que celui avec lequel vous le synchronisez
habituellement.
Désactivation de la synchronisation pour l’iPod touch: Connectez l’iPod touch à votre ordinateur. Dans iTunes, sélectionnez iPod touch dans la barre latérale puis cliquez
sur l’onglet Résumé. « Ouvrir iTunes à la connexion de cet iPod ». Vous pouvez toujours
synchroniser en cliquant sur le bouton Synchroniser.
Éviter la synchronisation automatique pour tous les iPod touch : Dans iTunes choisissez iTunes > Préférences (sur un Mac) ou Édition > Préférences (sur un PC), cliquez
sur Synchronisation et sélectionnez l’option “Désactiver la synchronisation automatique pour tous les iPhone et iPod”.
10 Chapitre 1 DémarrageChapitre 1 Démarrage 11
Si cette case est cochée, l’iPod touch ne se synchronisera pas automatiquement même
si l’option “Ouvrir iTunes à la connexion de cet iPod” est sélectionnée dans le volet
Résumé.
Éviter une fois la synchronisation automatique sans modifier les réglages : Ouvrez
iTunes. Lorsque vous connectez l’iPod touch à votre ordinateur, maintenez enfoncées
les touches Commande Option (sur un Mac) ou Maj Contrôle (sur un PC) jusqu’à l’apparition de l’iPod touch dans la barre latérale.
Synchronisation manuelle : Dans iTunes, sélectionnez iPod touch dans la barre
latérale puis cliquez sur Synchroniser dans le coin inférieur droit de la fenêtre.
Alternativement, si vous avez modifié des réglages de synchronisation, cliquez sur
Appliquer.
Comptes Mail, Contacts et Calendrier.
L’iPod touch fonctionne avec MobileMe, Microsoft Exchange et de nombreux systèmes
de messagerie populaires.
Configuration de comptes.
MobileMe et Microsoft Exchange proposent non seulement de la messagerie électronique mais également des informations sur les contacts et calendriers qui peuvent être
synchronisées automatiquement sur l’iPod touch sans fil. MobileMe peut également
synchroniser vos signets Safari. MobileMe, Exchange et les autres comptes de messagerie se configurent directement sur l’iPod touch.
L’iPod touch utilise le protocole Exchange ActiveSync pour synchroniser messagerie électronique, calendriers et contacts avec les versions suivantes de Microsoft
Exchange :
 Exchange Server 2003 Service Pack 2
 Exchange Server 2007 Service Pack 1
Pour de nombreux comptes de messagerie populaires, l’iPod touch configure automatiquement la majorité des réglages pour vous.
Si vous n’en avez pas encore, vous pouvez obtenir un compte de messagerie gratuit à
www.yahoo.com, www.google.com ou www.aol.com. Vous pouvez également essayer
MobileMe gratuitement pendant 60 jours. Accédez à la page www.me.com/fr.Ajout d’un compte sur l’iPod touch:
1 À partir de l’écran d’accueil de l’iPod touch, touchez Réglages.
2 Touchez « Mail, Contacts, Calendrier » puis touchez Ajouter un compte.
3 Touchez un type de compte :
 Microsoft Exchange
 MobileMe
 Google Mail
 Carnet d’adresses Yahoo!, Mail
 AOL
 Autre
4 Saisissez vos informations de compte et touchez Enregistrer.
Votre prestataire de service ou administrateur système peut vous fournir les réglages
de compte nécessaires.
5 Si vous configurez un compte MobileMe ou Exchange, touchez pour activer le courrier électronique, les contacts, les calendriers et les signets (MobileMe uniquement).
Touchez ensuite Enregistrer.
Important : Si vous activez les contacts ou calendriers sur un compte MobileMe ou
Exchange, la synchronisation des contacts ou calendriers est alors désactivée dans l’application iTunes elle-même. Toutes les contacts ou calendrier présents sur l’iPod touch
son remplacés par ceux de votre compte MobileMe ou Exchange.
Comptes de type « Push »
MobileMe, Microsoft Exchange et Yahoo! Mail sont des comptes de type « Push ».
Lorsque des informations sont disponibles, par exemple lorsqu’un message électronique arrive, les informations sont automatiquement livrées (envoyées ou « poussées »)
vers votre ordinateur ou votre iPod touch. (Au contraire, les services de récupération
ou services « Fetch » forcent votre logiciel de messagerie à vérifier régulièrement
auprès de votre prestataire de service l'arrivée de nouveaux messages et à demander
leur livraison.) MobileMe et Exchange synchronisent également vos contacts, calendriers et signets (MobileMe seulement) de la même manière. Par exemple, si vous
ajoutez un contact au carnet d’adresses de votre ordinateur, le nouveau contact est
automatiquement envoyé à l’iPod touch ainsi qu’à tout ordinateur ou appareil configuré auprès du service.
Les informations synchronisées sont transférées automatiquement par le biais de votre connexion sans fil ; vous n’avez donc pas besoin de connecter l’iPod touch à votre
ordinateur pour synchroniser. iPod touch peut recevoir des informations envoyées par
le biais d’une connexion Wi-Fi seulement lorsque l’iPod touch est activé (l'écran est
allumé ou l’iPod touch est connecté à votre ordinateur ou à un adaptateur secteur).
12 Chapitre 1 DémarrageChapitre 1 Démarrage 13
Installation de profils de configuration
Dans un environnement d’entreprise, vous pouvez être amené à configurer des comptes et d’autres éléments sur votre iPod touch en installant un profil de configuration.
Les profils de configuration offrent un moyen aux administrateurs système de configurer rapidement votre iPod touch pour fonctionner avec les systèmes informatiques de
votre société, votre école ou votre organisation. Par exemple, un profil de configuration
pourrait configurer votre iPod touch pour accéder aux serveurs Microsoft Exchange de
votre bureau, permettant à votre iPod touch d’accéder au courrier électronique, aux
calendriers et aux contacts Exchange.
Les profils de configuration peuvent configurer simultanément plusieurs réglages
sur l’iPod touch. Par exemple, un profil de configuration pourrait régler votre compte
Microsoft Exchange, votre compte VPN et des certificats destinés à un accès sécurisé
au réseau et aux informations de votre société. Un profil de configuration peut activer
le Verrouillage par code, ce qui vous oblige à créer et à saisir un code pour utiliser votre iPod touch.
Votre administrateur système peut distribuer des profils de configuration par courrier
électronique ou en les plaçant sur une page web sécurisée.
Installation d’un profil de configuration :
1 Sur votre iPod touch, ouvrez le message électronique ou téléchargez le profil de configuration à partir du site web fourni par votre administrateur système.
2 Lorsque le profil de configuration s’ouvre, touchez Installer.
3 Saisissez les mots de passe et les autres informations demandées.
Important : On vous demandera problablement si l’on peut faire confiance au profil
de configuration. En cas de doute, consultez votre administrateur système avant d’installer un profil de configuration.
Les réglages apportés par un profil de configuration ne peuvent pas être modifiés. Si
vous souhaitez modifier ces réglages, vous devez d'abord supprimer le profil de configuration ou en installer un mis à jour.
Suppression de profil : Dans Réglages, choisissez Général > Profil puis sélectionnez le
profil de configuration et touchez Supprimer.
La suppression d’un profil de configuration supprime les réglages et toutes les autres
informations installées par le profil de configuration de l’iPod touch. Déconnexion de l’iPod touch de votre ordinateur
Sauf si l’iPod touch est en cours de synchronisation avec votre ordinateur, vous pouvez
l’en déconnecter à tout moment.
Lorsque l’iPod touch est en cours de synchronisation avec votre ordinateur,
l’iPod touch indique Synchronisation en cours. Si vous déconnectez l’iPod touch avant
qu’il ait terminé la synchronisation, il se peut que certaines données ne soient pas
transférées. Lorsque l’iPod touch a terminé de se synchroniser, iTunes indique « La synchronisation de l’iPod touch est terminée ».
Annulation d’une synchronisation : Faites glisser le curseur sur l’iPod touch.
14 Chapitre 1 Démarrage15
Vue d’ensemble de l’iPod touch
Bouton de
marche/veille
Port écouteurs
Connecteur Dock
Antenne Wi-Fi
Bouton principal
Écran tactile
Icônes des
applications
Barre d’état
2
Notions élémentairesiPod touch Accessoires inclus
Socle
Écouteurs stéréo Câble connecteur Dock vers USB
Chiffon de nettoyage
iPod
Élément Utilisation
Casque stéréo Écoutez votre musique et vos vidéos.
Câble Connecteur Dock vers USB Utilisez le câble pour connecter l’iPod touch à
votre ordinateur afin de le synchroniser et le recharger ou à l’adaptateur secteur pour le charger.
Le câble est utilisable avec la station d’accueil
vendue en option, ou peut être directement
branché sur l’iPod touch.
Socle Posez l’iPod touch pour afficher des vidéos ou des
diaporamas photo.
Chiffon de nettoyage Essuyez l’écran de l’iPod touch.
Icônes d’état
Les icônes de la barre d’état située en haut de l’écran proposent des informations
concernant l’iPod touch :
Icône d’état Signification
Wi-Fi Indique que l’iPod touch est connecté à
Internet par un réseau Wi-Fi. Le nombre de
barres est proportionnel à la qualité de la
connexion. Voir la section page 28.
Activité réseau Indique une activité réseau. Certaines
applications tierces peuvent également
utiliser cette icône pour indiquer un processus actif.
VPN Indique que vous êtes connecté à un ré-
seau en utilisant un VPN (réseau privé virtuel). Voir la section ªRéseau» à la page 98.
16 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 17
Icône d’état Signification
Verrouillage Indique que l’iPod touch est verrouillé. Voir
la section page 19.
Lecture Indique qu’un morceau, un livre audio ou
un podcast est à l’écoute. Voir la section
page 33.
Alarme Indique qu’une alarme est réglée. Voir la
section page 88.
Batterie Indique le niveau de la batterie ou l’état
de la charge. Voir la section page 28.
Écran d’accueil
Appuyez sur le bouton principal à tout moment pour voir les applications de votre
iPod touch. Touchez l’icône de n’importe quelle application pour démarrer.
Applications iPod touch
Les applications suivantes sont incluses avec iPod touch :
Musique
Écoutez des morceaux, podcasts ou livres audio. Définissez votre propre limite de
volume pour le confort d’écoute.
Vidéos
Regardez des films, des vidéos musicales, des podcasts vidéo et des émissions de
télévision.
Photos
Affichez des photos et images transférées à partir de votre ordinateur ou enregistrées
sur l’iPod touch, affichez-les en mode Portrait ou Paysage, zoomez sur une photo,
visionnez un diaporama, envoyez des photos par courrier électronique,ajoutez-les à
une galerie MobileMe, assignez-les à des contacts et utilisez-les comme fond d’écran.
iTunes
Effectuez des recherches dans le catalogue de musique de l’iTunes Wi-Fi Music Store
ou parcourez, écoutez des extraits et achetez les nouveautés, les morceaux et albums
les plus vendus, et plus
1
. À certains emplacements Starbucks
3
, découvrez le morceau
à l’écoute dans le café et achetez-le instantanément. Parcourez d’autres morceaux des
collections Starbucks, écoutez-en des extraits et achetez-les.App Store
Recherchez dans l’App Store des applications iPod touch que vous pouvez acheter ou
télécharger à l’aide de votre connexion au réseau de données Wi-Fi. Lisez ou rédigez
vos propres évaluations de vos applications préférées. Téléchargez et installez les
applications sur votre écran d’accueil
1
.
Safari
Explorez n’importe quel site web en mode Wi-Fi. Faites pivoter l’iPod touch d’un quart
de tour pour un affichage grand écran. Double-touchez pour agrandir ou réduire,
Safari adapte automatiquement la colonne de la page web à l’écran de l’iPod touch
pour faciliter la lecture. Ajoutez des Web Clip Safari à l’écran d’accueil pour un accès
rapide à vos sites web préférés. Enregistrez des images dans votre Photothèque à
partir de sites web.
Calendrier
Affichez vos calendriers MobileMe, iCal, Microsoft Entourage, Microsoft Outlook ou
Microsoft Exchange. Saisissz des événement sur votre iPod touch et synchronisezles vers le calendrier de votre ordinateur. Définissez des alarmes pour vous rappeler
d’événements, rendez-vous et échéances.
Mail
L’iPod touch fonctionne avec MobileMe, Microsoft Exchange et de nombreux systèmes de messagerie communs, notamment Yahoo! Mail, Google Mail et AOL, ainsi
que la plupart des systèmes de messagerie POP3 et IMAP standard. Affichez des PDF
et d’autres pièces jointes dans Mail. Enregistrez des photos et éléments graphiques
joints dans votre photothèque.
Contacts
Synchronisez les coordonnées de vos contacts à partir de MobileMe, Carnet d’adresses Mac OS X, le carnet d’adresses Yahoo! , le carnet d’adresses Google, le carnet
d’adresses Windows (Outlook Express), Microsoft Outlook ou Microsoft Exchange.
Recherchez, ajoutez, modifiez ou supprimez des contacts qui sont ensuite synchronisés vers votre ordinateur.
YouTube
Lisez des vidéos de votre collection YouTube en ligne
1
. Recherchez des vidéos ou
parcourez les vidéos sélectionnées, les plus populaires, les plus récentes et les mieux
cotées.
Bourse
Affichez la cotation de titres choisis, actualisée automatiquement via Internet.
Plans
Affichez un plan de ville, une vue satellite ou une vue mixte de lieux à travers le monde. Détaillez une carte par un zoom avant, recherchez et suivez votre emplacement
actuel approximatif. obtenez des itinéraires routiers détaillés et afficher les conditions
actualisées du trafic autoroutier, trouver des commerces à proximité.
2
18 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 19
Météo
Obtenez la météo du jour et des prévisions à six jours, Ajoutez vos villes préférées
pour obtenez à tout moment un bulletin météo rapide.
Horloge
Affichez l’heure qu’il est dans des villes du monde entier (vous pouvez créer des horloges pour les villes de votre choix), réglez une ou plusieurs alarmes, utilisez le chronomètre ou réglez un compte à rebours.
Calculette
Ajoutez, soustrayez, multipliez et divisez. Faites pivoter l’iPod touch pour utiliser ses
fonctions scientifiques étendues.
Notes
Prenez des notes à tout moment : aide-mémoire, listes de courses, réflexions et envoyez-les par courrier électronique.
Réglages
Effectuez tous les réglages de l’iPod touch de façon centralisée, Définissez votre fond
d’écran, la luminosité de votre écran et les réglages de votre réseau, votre courrier,
votre accès web, votre musique, vos vidéos, vos photos, etc. Activez le verrouillage
automatique et un code de sécurité. Restreignez l’accès au contenu iTunes explicite
et à certaines applications. Réinitialisez l’iPod touch.
1
Fonction non disponible à certains endroits.
2
Les fonctionnalités et services de Plans ne sont pas tous disponibles partout.
3
États-Unis uniquement.
Personnaliser l’écran d’accueil
Vous pouvez personnaliser la disposition des icônes sur l’écran d’accueil (y compris les
icônes du Dock du bas de l’écran). Vous avez la possibilité de les réorganiser sur plusieurs menus principaux.
Modifier la disposition des icônes :
1 Touchez et faites glisser un icône de l’écran d’accueil jusqu’à ce que les icônes commencent à frémir.
2 Réorganisez les icônes en les faisant glisser.
3 Appuyez sur le bouton principal pour enregistrer votre agencement.
Vous pouvez également ajouter des liens vers vos pages web favorites sur l’écran d’accueil. Voir la section ªWeb Clip» à la page 64.Créer des écrans d’accueil supplémentaires : Lorsque vous changez la disposition des
icônes, faites glisser une icône vers l’extrémité droite de l’écran jusqu’à ce qu’un nouvel écran apparaisse. Feuilletez la page écran afin de revenir à l’écran d’origine et faire
glisser d’autres icônes vers le nouvel écran.
Vous pouvez créer jusqu’à neuf écrans. Le nombre de points apparaissant au-dessus
du Dock indique le nombre d’écrans dont vous disposez et celui qui est actuellement
affiché.
Basculer vers un autre écran d’accueil : Feuilletez vers la gauche ou la droite
Réinitialiser votre écran d’accueil avec la disposition par défaut : Choisissez Réglages
> Général > Réinitialiser et touchez Réinitialiser l’écran principal.
Bouton de Marche/Veille
Si vous n’utilisez pas l’iPod touch, vous pouvez le verrouiller.
En cas de verrouillage, l’iPod touch ne répond pas si vous touchez son écran.
Par défaut, l’iPod touch se verrouille automatiquement si vous ne touchez pas l'écran
pendant une minute.
Bouton de
marche/veille
20 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 21
Verrouiller l’iPod touch Appuyez sur le bouton de Marche/Veille.
Déverrouiller l’iPod touch Appuyez sur le bouton du menu principal ou
sur le bouton de Marche/Veille, puis faites glisser
le curseur.
Éteindre complètement l’iPod touch Maintenez le bouton de Marche/Veille enfoncé
pendant quelques secondes jusqu’à ce que le
curseur rouge apparaisse, puis faites glisser le
curseur.
Allumer l’iPod touch Maintenez le bouton de Marche/Veille enfoncé
jusqu’à ce que le logo Apple apparaisse.
Pour plus de renseignements sur la manière de régler l’iPod touch pour qu'un mot de
passe soit exigé pour le déverrouiller, consultez la section ª» à la page 99.
Écran tactile
Les contrôles de l’écran tactile de l’iPod touch changent dynamiquement en fonction
des tâches que vous réalisez.
Ouverture d’applications
Ouverture d’une application: Toucher d’une icône.
Retour à l’écran d’accueil : Appuyez sur le bouton d’accueil situé au-dessous de
l’écran.Défilement
Faites défiler verticalement l’affichage en faisant glisser votre doigt. Sur certains écrans,
notamment les pages web, vous pouvez également faire défiler latéralement.
Lorsque vous faites glisser votre doigt pour faire défiler, vous ne choisissez ni n’activez
aucune fonction sur l’écran.
Feuilletez pour faire défiler l’affichage rapidement.
Vous pouvez attendre que le défilement s’arrête ou toucher n’importe quel endroit de
l’écran pour qu’il s’arrête immédiatement. Lorsque vous touchez l’écran pour arrêter le
défilement, vous ne choisissez ni n’activez aucun des éléments affichés.
Pour défiler rapidement jusqu’au début d’une liste, d’une page web ou d’un message
électronique, touchez simplement la barre d’état.
22 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 23
Listes
Certaines listes présentent un index sur le côté droit.
Recherche d’éléments dans une liste indexée : Touchez une lettre pour passer directement aux éléments commençant par cette lettre. Faites glisser le doigt le long de
l’index pour faire rapidement défiler la liste.
Index
Choix d’un élément : Touchez un élément de la liste.
Suivant la liste, toucher un élément peut avoir des conséquences différentes. Par exemple, cette opération peut ouvrir une nouvelle liste, lire un morceau, ouvrir un message
électronique ou afficher les coordonnées de quelqu’un.
Retour à une liste précédente : Touchez le bouton Précédent dans le coin supérieur
gauche.
Zoom avant ou arrière
Lorsque vous consultez des photos, pages web, messages électroniques ou plans, vous
pouvez agrandir ou réduire ceux-ci. Rapprochez ou écartez vos doigts pour contrôler
ainsi le zoom. Pour les photos et les pages web, vous pouvez double-toucher (toucher
rapidement deux fois) pour effectuer un zoom avant, puis double-toucher à nouveau
pour pour effectuer un zoom arrière. Dans le cas de cartes routières, double-touchez
pour effectuer un zoom avant et touchez l’écran une seule fois avec deux doigts pour
effectuer un zoom arrière.Clavier à l’écran
Utilisez le clavier à l’écran pour saisir du texte, par exemple des coordonnées, des messages de texte ou des adresses web.
Saisie de texte
Suivant l’application que vous utilisez, le clavier intelligent peut automatiquement suggérer des corrections pendant que vous tapez pour éviter les fautes d’orthographe.
Saisie de texte :
1 Touchez un champ de texte, par exemple dans une note ou un nouveau contact, pour
activer le clavier.
2 Touchez les touches du clavier selon vos besoins.
Commencez par taper seulement avec votre index. Avec de l’expérience, vous pourrez
taper plus rapidement avec vos pouces.
Lors de votre saisie, chaque lettre apparaît au-dessus de votre doigt. Si vous touchez la
mauvaise touche, vous pouvez faire glisser votre doigt jusqu’à la bonne. La lettre n’est
pas saisie tant que vous ne relâchez pas votre doigt de la touche.
Taper en majuscules Touchez la touche Maj avant de toucher une
lettre.
Saisir rapidement un point et un espace Double-touchez la barre d’espace.
Activer le verrouillage majuscules Activez le verrouillage des majuscules (voir la
section ªClavier» à la page 101), puis doubletouchez la touche Maj . La touche Maj devient
bleue et toutes les lettres que vous tapez s’affichent en majuscules. Touchez à nouveau la touche Maj pour déverrouiller les majuscules.
24 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 25
Affichage de nombres, de ponctuation ou de
symboles
Touchez la touche Nombre . Touchez la
touche Symbole pour accéder aux signes de
ponctuation et aux symboles complémentaires.
Saisie de lettres ou symboles qui n’apparaissent
pas sur le clavier
Touchez la lettre ou le symbole associé et maintenez le doigt dessus, puis faite glisser pour choisir
une variation.
Claviers internationaux
L’iPod touch propose des claviers en de nombreuses langues et gère les formats de
clavier suivants : anglais, anglais (R-U), danois, allemand, espagnol, finnois, français,
français (Canada), italien, japonais QWERTY, japonais Kana, coréen, norvégien Bokmål,
néerlandais, polonais, portugais (Brésil), portugais (Portugal), russe, suédois, chinois
(simplifié) pinyin, chinois (simplifié) manuel, et chinois (traditionnel) manuel.
Activation et désactivation des claviers internationaux :
1 Dans Réglages, choisissez Général > International > Claviers.
2 Activez les claviers souhaités. Pour les langues proposant plusieurs clavier (notamment
japonais et chinois), le nombre de claviers disponibles est indiqué. Touchez pour choisir un clavier pour la langue en question.
Basculement entre claviers lorsque plusieurs
sont activés
Touchez pour basculer entre les claviers.
Lorsque vous touchez le symbole, le nom
du clavier que vous venez d’activer apparaît
brièvement.
Saisie en Japonais Kana Utilisez le clavier Kana pour sélectionner des
syllabes. Pour plus d’options de syllabes, touchez
la flèche et sélectionnez une autre syllabe ou un
autre mot dans la fenêtre.
Saisie en japonais QWERTY Utilisez le clavier QWERTY pour saisir du code
pour les syllabes japonaises. Pendant que vous tapez, les syllabes suggérées apparaissent. Touchez
la syllabe pour la choisir.
Saisie en coréen Utilisez le clavier coréen à 2 jeux de touches pour
taper les caractères hangul. Pour tapez des doubles consonnes ou des voyelles composées, touchez la lettre, maintenez le doigt dessus et faites
glisser pour choisir le double caractère. Saisie en chinois simplifiée pinyin Utilisez le clavier QWERTY pour saisir du pinyin
correspondant aux caractères chinois. Pendant
que vous tapez, les caractères chinois suggérés
apparaissent. Touchez un caractère pour le choisir
ou continuez à saisir du pinyin pour afficher davantage d’options de caractères.
Saisie de chinois simplifié ou traditionnel
manuel
Utilisez le bloc tactile pour saisir des caractè-
res chinois avec votre doigt. Tandis que vous
tracez des traits, l’iPod touch les reconnaît et
propose une liste de caractères correspondants
classée par ordre de similarité. Lorsque vous
choisissez un caractère, ceux qui y sont associés
apparaissent dans la liste en tant que choix
supplémentaires.
Lorsque les formats manuels de chinois simplifié ou traditionnel sont activés, vous
pouvez saisir des caractères chinois avec votre doigt, comme illustré :
Voir la section ªInternational» à la page 102 pour plus de renseignements sur la configuration de langue pour l’iPod touch et les autres réglages du clavier.
26 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 27
Dictionnaire
L’iPod touch propose des dictionnaires de vérification d’orthographe pour toutes les
langues gérées. Le dictionnaire approprié s’active automatiquement en sélectionnant
un clavier sur l’iPod touch. L’iPod touch utilise le dictionnaire actif pour suggérer des
corrections ou compléter le mot en cours de saisie.
Vous n’avez pas besoin d’interrompre votre frappe pour accepter le mot proposé.
Mot proposé
Acceptation ou refus de suggestions du dictionnaire :
 Pour rejeter le mot suggéré, terminez de taper le mot comme vous le souhaitez, puis
touchez le « x » pour refuser la suggestion avant de taper autre chose. Chaque fois
que vous rejetez une proposition pour un même mot, l’iPod touch tend à accepter
votre mot.
 Pour utiliser le mot suggéré, tapez un espace, un signe de ponctuation ou le caractère
Retour.
Modification de texte : Touchez et maintenez le contact pour agrandir l’affichage, puis
faites glisser le doigt pour positionner le point d’insertion.Connexion à Internet
L’iPod touch se connecte automatiquement à Internet par le biais de réseaux Wi-Fi
. iPod touch peut accéder aux réseaux AirPort et autres réseaux Wi-Fi domestiques,
professionnels ou aux points d’accès Wi-Fi de par le monde. Lorsqu’il est connecté à un
réseau Wi-Fi connecté à Internet, l’iPod touch se connecte automatiquement à Internet
chaque fois que vous utilisez Mail, Safari, YouTube, Bourse, Plans, Météo, l’App Store ou
l’iTunes Wi-Fi Music Store.
Accès à un réseau Wi-Fi
Les réglages Wi-Fi vous permettent d’activer la fonction Wi-Fi et d’accéder aux réseaux
Wi-Fi.
Activation du mode Wi-Fi : Choisissez Réglages > Wi-Fi et activez l’option de Wi-Fi.
Accès à un réseau Wi-Fi : Choisissez Réglages > Wi-Fi, attendez un moment pendant
que l’iPod touch détecte les réseaux à portée, puis sélectionnez le réseau (l’accès à
certains réseaux Wi-Fi est payant). Le cas échéant, tapez un mot de passe et touchez
Rejoindre (les réseaux qui nécessitent un mot de passe présentent une icône repré-
sentant un cadenas).
Une fois que vous avez rejoint manuellement un réseau Wi-Fi, l’iPod touch s y connecte automatiquement chaque fois que le réseau est à portée. Si plusieurs réseaux déjà
utilisés sont à portée, l’iPod touch rejoint le dernier utilisé.
Lorsque l’iPod touch est connecté à un réseau Wi-Fi, l’icône Wi-Fi située dans la barre
d’état en haut de l’écran affiche l’intensité du signal de connexion. Le nombre de barres qui s’affiche est proportionnel à la qualité de la connexion.
Pour plus de renseignements sur la configuration des réglages Wi-Fi, voir la section
ªWi-Fi» à la page 95.
Recharge de la batterie.
L’iPod touch est doté d’une batterie interne rechargeable.
AVERTISSEMENT : Des renseignements importants sur la recharge de votre
iPod touch sont disponibles dans le Guide des informations importantes sur le produit
à la page www.apple.com/ca/fr/support/manuals/ipodtouch.
Recharge de la batterie et synchronistion de l’iPod touch: Connectez l’iPod touch à
votre ordinateur à l’aide du câble USB inclus,
28 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 29
Important : Si l’iPod touch est connecté à un ordinateur éteint, en mode de veille ou
en mode de suspension d’activité, il est possible que la batterie de l’iPod touch se
décharge.
Une icône située dans le coin supérieur droit de l’écran indique l’état de charge de la
batterie.
En charge Rechargé
Si vous chargez la batterie pendant qu’une synchronisation est en cours ou tout en
utilisant l’iPod touch, l’opération peut prendre plus de temps . Vous pouvez aussi recharger l’iPod touch à l’aide de adaptateur secteur USB Apple, vendu séparément.
Important : Si le niveau de la batterie de l’iPod touch est très faible, une des image suivantes peut s’afficher afin d’indiquer que l’iPod touch à besoin d’être rechargé dix minutes avant que vous puissiez l’utiliser. Au cas où l’alimentation de l’iPod touch est extrêmement faible, il se peut que l’écran reste éteint pendant un temps pouvant s’étendre jusqu’à deux minutes avant que l’une des images de faible charge apparaisse.
ou
Le nombre de cycles de recharge des batteries rechargeables reste limité et il peut
s’avérer nécessaire de les remplacer. La batterie de l’iPod touch n’est pas remplaçable
par l’utilisateur, elle ne peut l’être que par un prestataire de service agréé. Pour plus de
renseignements, consultez la page www.apple.com/ca/fr/batteries.Entretien de l’iPod touch
Pour nettoyer l’iPod touch, débranchez tous les câbles et éteignez l’iPod touch (appuyez sur le bouton Veille/Activation, maintenez-le enfoncé,puis faites glisser le curseur à l’écran). Utilisez un tissu doux, légèrement humide et sans peluche. Évitez que
toute humidité pénètre dans les orifices de l’appareil. N’utilisez pas de produit lavevitre, détergent domestique, aérosol, solvant, alcool, ammoniac ou produit abrasif pour
nettoyer l'iPod touch.
Redémarrage et réinitialisation de l’iPod touch
En cas de dysfonctionnement, le redémarrage ou la réinitialisation de l’iPod touch devrait résoudre le problème.
Redémarrage de l’iPod touch : Maintenez le bouton de Marche/Veille enfoncé jusqu’à
l’apparition du curseur rouge. Faites glisser votre doigt sur le curserur pour éteindre l’iPod touch. Pour rallumer l’iPod touch, appuyez sur le bouton de Marche/Veille
jusqu’à l’apparition du logo Apple.
Réinitialisation de l’iPod touch. Maintenez simultanément enfoncés les boutons de
Marche/Veille et du menu principal pendant au moins dix secondes jusqu’à l’apparition du logo Apple.
Pour plus de suggestions de dépannage, consultez la section L’annexeªDépannage,» à
la page 111.
30 Chapitre 2 Notions élémentaires31
L’iPod touch synchronise avec iTunes sur votre ordinateur pour obtenir des morceaux,
vidéos et autres contenus que vous avez rassemblés dans votre bibliothèque iTunes.
Pour plus de renseignements sur l’ajout de musique et d’autres éléments multimédias
à votre bibliothèque iTunes, ouvrez iTunes et choisissez Aide > Aide iTunes.
Obtention de musique, vidéo, etc.
Pour obtenir de la musique, des vidéos et des podcasts sur votre iPod touch, vous pouvez configurer iTunes sur votre ordinateur de manière à synchroniser le contenu de
votre bibliothèque, ou gérer manuellement les éléments multimédias que vous placez
sur votre iPod touch.
Synchronisation de contenu à partir d’iTunes
Vous pouvez obtenir de la musique, de la vidéo et d’autres contenus sur votre
iPod touch en synchronisant le contenu à partir d’iTunes. Vous pouvez synchroniser
tous vos éléments multimédias ou sélectionner certains morceaux, vidéos et podcasts.
Configuration d’iTunes de manière à synchroniser le contenu iPod :
1 Connectez l’iPod touch à votre ordinateur.
2 Dans iTunes, sélectionnez iPod touch dans la barre latérale.
3 Dans les onglets Musique, Films, Émissions TV et Podcasts, sélectionnez le contenu que
vous souhaitez transférer sur votre iPod touch. Par exemple, vous pouvez synchroniser
certaines listes de lecture de musique et les trois épisodes les plus récents de votre
podcast vidéo préféré.
4 Cliquez sur Appliquer.
Seuls les morceaux et les vidéos codés dans des formats gérés par l’iPod touch sont
transférés sur l’iPod touch. Pour plus de renseignements sur les formats gérés par
l’iPod touch, consultez la section ªUn morceau, une vidéo ou autre ne fonctionne
pas» à la page 115.
3 Musique et vidéoSi la bibliothèque iTunes contient plus morceaux que ne peut en stocker votre
iPod touch, iTunes propose de créer une liste de lecture spéciale pour synchroniser
avec l’iPod touch. iTunes remplit la liste de lecture à partir d’une sélection de votre
bibliothèque. Vous pouvez ajouter ou supprimer des morceaux à la liste de lecture et
synchroniser à nouveau.
Si vous écoutez une partie d’un podcast ou d’un livre audio, l’endroit où vous vous
êtes arrêté est inclus lors de la synchronisation du contenu avec iTunes. Si vous avez
commencé l’écoute sur l’iPod touch, vous pouvez reprendre où vous vous êtes arrêté
en utilisant iTunes sur votre ordinateur, et inversement.
Pour plus de renseignements sur l’utilisation d’iTunes pour obtenir de la musique et
d’autres éléments multimédias sur votre ordinateur, consultez la section ªÉléments né-
cessaires» à la page 5.
Gestion manuelle du contenu
La fonction de gestion manuelle vous permet de choisir seulement la musique, les vidéos et les podcasts que vous souhaitez avoir sur votre iPod touch.
Configuration de l’iPod touch pour la gestion manuelle de contenu :
1 Connectez l’iPod touch à votre ordinateur.
2 Dans iTunes, sélectionnez iPod touch dans la barre latérale.
3 Cliquez sur l’onglet Résumé et sélectionnez « Gérer manuellement la musique et les
clips vidéo ».
4 Cliquez sur Appliquer.
Ajout d’éléments à l’iPod touch : Faites glisser un morceau, une vidéo, un podcast
ou une liste de lecture de votre bibliothèque vers iPod touch (dans la barre latérale).
Cliquez en maintenant la touche Maj ou Commande enfoncée pour sélectionner plusieurs éléments à ajouter simultanément.
iTunes synchronise immédiatement le contenu. Si vous désélectionnez l’option « Gérer
manuellement la musique et les clips vidéo », le contenu que vous avez ajouté manuellement est supprimé de l’iPod touch la prochaine fois qu’iTunes synchronise le
contenu.
Suppression d’éléments de l’iPod touch : Connectez l’iPod touch à votre ordinateur
puis sélectionnez l’icône iPod touch dans la barre latérale d’iTunes. Cliquez sur le triangle d’expansion situé à gauche de l’icône pour afficher le contenu. Sélectionnez une
zone de contenu, par exemple Musique ou Films, puis sélectionnez les éléments que
vous souhaitez supprimer et appuyez sur la touche Suppr du clavier.
La suppression d’un élément de l’iPod touch ne supprime pas l’élément de votre bibliothèque iTunes.
32 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 33
Important : Si vous supprimez un élément d’iTunes, il sera également supprimé de
l’iPod touch à la prochaine synchronisation.
Transfert de contenu acheté à partir d’un autre ordinateur
Vous pouvez transférer du contenu présent sur l’iPod touch, qui a été acheté à l’aide
d’iTunes sur un ordinateur d’une bibliothèque iTunes vers un autre ordinateur autorisé.
L’ordinateur doit être autorisé à lire du contenu à partir de votre compte iTunes. Pour
autoriser l’ordinateur, ouvrez iTunes sur l’ordinateur et choisissez Store > Autoriser
l’ordinateur.
Transfert de contenu acheté : Connectez l’iPod touch à l’autre ordinateur. iTunes vous
demande si vous souhaitez transférer le contenu acheté.
Conversion de vidéos pour l’iPod touch
Vous pouvez ajouter des vidéos autres que celles que vous avez achetées auprès de
l’iTunes Store sur votre iPod touch, par exemple des vidéos que vous avez créées dans
iMovie sur un Mac ou des vidéos que vous avez téléchargées sur Internet puis ajoutées
à iTunes.
Si vous essayez d’ajouter une vidéo sur l’iPod touch à partir d’iTunes et qu’un message
indique que la vidéo ne peut pas être lue sur l’iPod touch, vous pouvez la convertir.
Conversion d’une vidéo pour qu’elle fonctionne avec l’iPod touch: Sélectionnez la
vidéo dans votre bibliothèque iTunes et choisissez Avancé > « Convertir la sélection
pour l’iPod/iPhone ». Ajoutez ensuite la vidéo convertie à l’iPod touch.
Musique et autres audios
L’affichage Multi-Touch haute résolution fait de l’écoute de morceaux sur l’iPod touch
une expérience tout aussi visuelle que musicale. Vous pouvez faire défiler vos listes de
lecture ou utiliser Cover Flow pour explorer les pochettes de vos albums.
AVERTISSEMENT : Des renseignements importants sur la prévention de la perte
d'audition sont disponibles dans le Guide des informations importantes sur le produit à
la page www.apple.com/ca/fr/support/manuals/ipodtouch.
Lecture de morceaux
Exploration de votre collection : Touchez Listes de lecture, Artistes ou Morceaux.
Touchez Plus pour explorer les albums, les livres audio, les compilations, les compositeurs, les genres ou les podcasts.
Lecture d’un morceau : Touchez le morceau.Contrôle de la lecture de morceaux
Lorsque vous écoutez un morceau, l’écran À l’écoute apparaît.
Suivant/Avance rapide
Lecture/Pause
Retour Liste des pistes
Précédent/Retour rapide
Volume
Mettre en pause un morceau Touchez ou cliquez sur le bouton du micro du
casque d’écoute de l’iPod touch.
Reprendre la lecture Touchez ou cliquez sur le bouton du micro du
casque d’écoute de l’iPod touch.
Augmenter ou diminuer le volume Faites glisser le curseur de volume ou utilisez les
boutons latéraux de l’iPod touch.
Redémarrer un morceau ou un chapitre de livre
audio ou de podcast
Touchez .
Passer au morceau ou chapitre de livre audio ou
de podcast précédent ou suivant
Touchez deux fois pour passer au morceau
précédent. Touchez pour passer au morceau
suivant ou appuyez deux fois rapidement sur
le bouton du micro du casque d’écoute de
l’iPod touch.
Effectuer un retour ou une avance rapide Touchez ou et gardez le doigt dessus. Plus
vous maintenez le doigt longtemps sur la commande, plus l’opération de retour ou d’avance
rapide s’accélère.
Retour aux listes de navigation de l’iPod Touchez ou balayez vers la droite par dessus
la couverture de l’album.
Retour à l’écran À l’écoute Touchez À l’écoute.
Afficher les paroles d’un morceau Touchez la couverture de l’album pendant la lecture du morceau. (les paroles n’apparaissent que
si vous les avez ajoutées au morceau à l’aide de la
fenêtre Infos du morceau dans iTunes.)
34 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 35
Vous pouvez afficher les commandes de lecture à tout moment lorsque vous écoutez
de la musique et utilisez une autre application, ou même lorsque l’iPod touch est verrouillé, en double-cliquant le bouton principal .
Si vous utilisez une application, les commandes de lecture apparaissent par-dessus
l’application. Après avoir utilisé les commandes, vous pouvez les fermer ou toucher
Musique pour passer à l’écran À l’écoute. Si l’iPod touch est verrouillé, les commandes
apparaissent à l’écran puis disparaissent automatiquement lorsque vous avez fini de
les utiliser.
Commandes supplémentaires
À partir de l’écran À l’écoute, touchez la pochette de l’album.
Le commandes de répétition et de lecture aléatoire apparaissent, ainsi que le défileur,
le temps écoulé, le temps restant et le numéro du morceau. Les paroles du morceau
apparaissent également si vous les avez ajoutées au morceau dans iTunes.
Défileur
Répétition
Aléatoire
Tête de
lectureRégler l’iPod touch pour la répétition de
morceaux
Touchez . Touchez à nouveau pour régler
l’iPod touch de manière à répéter seulement le
morceau actuel.
= l’iPod touch est réglé de manière à répéter
tous les morceaux de l’album ou la liste en cours.
= l’iPod touch est réglé de manière à répéter
sans arrêt le morceau en cours de lecture.
= l’iPod touch n’est pas réglé pour répéter les
morceaux.
Passer à n’importe quel endroit d’un morceau Faites glisser la tête de lecture le long du défileur.
Régler l’iPod touch pour le choix aléatoire de
morceaux
Touchez . Touchez à nouveau pour régler
l’iPod touch de manière à jouer les morceaux
dans l’ordre.
= l’iPod touch est réglé de manière à choisir
aléatoirement les morceaux.
= l’iPod touch est réglé de manière à lire les
morceaux dans l’ordre.
Choisir aléatoirement les pistes d’une liste de
lecture, d’un album ou de toute autre liste de
morceaux
Touchez Aléatoire en haut de la liste. Par exemple,
pour jouer les morceaux dans un ordre aléatoire
sur l’iPod touch, choisissez Morceaux > Aléatoire.
Que l’iPod touch soit ou non réglé sur la lecture
aléatoire, si vous touchez Aléatoire en haut d’une
liste des morceaux, l’iPod touch la lit dans un
ordre aléatoire.
Exploration des pochettes d’album en mode Cover Flow
Lorsque vous explorez votre musique, vous pouvez faire pivoter l’iPod touch d’un
quart de tour pour afficher votre contenu iTunes en mode Cover Flow et explorer votre
musique par pochette d’album.
36 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 37
Affichage du contenu dans Cover Flow Faites pivoter l’iPod touch d’un quart de tour.
Parcourir les pochettes d’album Faites glisser ou « feuilletez » vers la gauche ou
la droite.
Affichage des pistes d’un album Touchez une pochette ou .
Lire une piste Touchez la piste. Faites défiler vers le haut ou le
bas pour faire défiler les pistes.
Revenir à la pochette Touchez la barre de titre ou touchez à
nouveau.
Lire ou mettre en pause le morceau actuel Touchez ou . Si vous utilisez le casque stéréo
inclus, appuyez sur le bouton du microphone.
Affichage de toutes les pistes d’un album
Affichage de toutes les pistes de l’album contenant le morceau à l’écoute : À partir
de l’écran À l’écoute, touchez . Touchez une piste pour la lire. Touchez la vignette de
la pochette de l’album pour revenir à l’écran À l’écoute.
Barre de
classement
Retour à l’écran
« À l’écoute »
Pistes de
l’album
En affichage de la liste des pistes, vous pouvez affecter des notes aux morceaux. Vous
pouvez utiliser des notes pour créer dans iTunes des listes de lecture intelligentes qui
se mettent dynamiquement à jour pour inclure par exemple vos morceaux les mieux
notés.
Affectation d’une note à un morceau : Faites glisser votre pouce sur la barre de classements pour donner au morceau entre zéro et cinq étoiles.
Création de listes de lecture directement sur l’iPod touch
Création d’une liste de lecture On-The-Go :
1 Touchez Listes de lect. et touchez On-The-Go.2 Recherchez des morceaux à l’aide des boutons situés au bas de l’écran. Touchez un
morceau ou une vidéo pour l’ajouter à la liste de lecture. Touchez Tous les morceaux
en haut de toute liste de morceaux pour ajouter tous les morceaux de la liste.
3 Lorsque vous avez fini, touchez Terminé.
Lorsque vous créez une liste de lecture On-The-Go puis synchronisez l’iPod touch à
votre ordinateur, la liste de lecture est enregistrée sur l’iPod touch dans votre bibliothèque iTunes puis supprimée de l’iPod touch. La première est enregistrée sous le nom
« On-The-Go 1 », la deuxième sous « On-The-Go 2 » et ainsi de suite. Pour remettre
une liste de lecture sur l’iPod touch, sélectionnez l’iPod touch dans la barre latérale
d’iTunes, cliquez sur l’onglet Musique et réglez la liste de lecture pour qu’elle se
synchronise.
Modification d’une liste de lecture On-The-Go :Touchez Listes de lect., On-The-Go et
Modifier, puis effectuez l’une des actions suivantes :
 Pour déplacer un morceau vers le haut ou vers le bas dans la liste, faites glisser à côté
du morceau.
 Pour supprimer un morceau de la liste de lecture, touchez à côté du morceau en
question puis touchez Supprimer.Lorsque vous supprimez un morceau d’une liste
de lecture On-The-Go, il n’est pas supprimé de l’iPod touch.
 Pour effacer toute la liste de lecture, touchez Effacer la liste de lecture.
 Pour ajouter plus de morceaux, touchez .
Vidéos
L’iPod touch vous permet de visionner du contenu vidéo comme des films, des clips
et des podcasts. Si une vidéo contient des chapitres, vous pouvez passer au chapitre
suivant ou précédent ou activer une liste pour lancer la lecture à partir du chapitre
de votre choix. Si une vidéo propose plusieurs langues, vous pouvez choisir celle de
l’audio ou celle du sous-titrage.
Lecture de vidéos
Lecture de vidéo : Touchez Vidéos puis la vidéo en question.
Affichage des commandes de lecture : Touchez l’écran pour afficher les commandes.
Touchez à nouveau pour les masquer.
38 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 39
Dès qu’une partie suffisante de la vidéo s’est téléchargée, la lecture
commence.
Les vidéos sont lues en mode Écran large pour profiter au mieux de l’affichage.
Échelle
Lecture/Pause
Redémarrer/ Avance rapide
Retour rapide
Tête de lecture
Volume
Défileur
Run de Gnarls Barkley est disponible sur iTunes dans les pays sélectionnés.
Lire ou mettre en pause une vidéo Touchez ou .
Augmenter ou diminuer le volume Faites glisser le curseur de volume.
Redémarrer une vidéo Faites glisser complètement sur la gauche la tête
de lecture sur le défileur, ou touchez si la vidéo n’inclut pas de chapitres.
Passage au chapitre précédent ou suivant (le
cas échéant)
Touchez pour revenir au chapitre précédent.
Touchez pour passer au chapitre suivant.
Lecture d’un chapitre donné (le cas échéant) Touchez , puis choisissez un chapitre dans la
liste.
Effectuer un retour ou une avance rapide Touchez ou et gardez le doigt dessus.
Passer directement à un point particulier d’une
vidéo
Faites glisser la tête de lecture le long du défileur.
Interrompre une vidéo avant sa fin Touchez Terminé ou appuyez sur le bouton principal .Redimensionner une vidéo de manière à remplir l’écran ou à s’adapter à l’écran
Touchez pour que la vidéo remplisse l’écran.
Touchez pour qu’elle s’adapte à la taille de
l’écran. Vous pouvez également double-toucher
la vidéo pour qu’elle remplisse l’écran ou pour
qu’elle s’y adapte.
Lorsque vous redimensionnez une vidéo de
manière à remplir l’écran, il est possible que les
côtés ou la partie supérieure soient éliminés de
l’affichage. Lorsque vous la redimensionnez de
manière à l’adapter à l’écran, il est possible que
des barres noires apparaissent en dessous, audessus ou sur les côtés de la vidéo.
Sélection d’une autre langue audio (le cas
échéant)
Touchez , puis choisissez une langue dans la
liste Audio.
Affichage ou masquage des sous-titres (le cas
échéant)
Touchez , puis choisissez une langue ou l’option Désactivé dans la liste Sous-titrage.
Visionnage de films loués
Il vous est possible de louer des films depuis l’iTunes Store pour les visionner sur
l’iPod touch. iTunes vous permet de les louer et de les transférer directement sur votre
iPod touch. (La location de film n’est pas disponible partout. iTunes version 7.6 ou ulté-
rieure, et QuickTime version 7.4.5 ou ultérieure sont requis.)
Les films loués ne sont visionnables que pour un temps limité. Le temps qui vous reste
pour finir de regarder un film en location apparaît à côté de son titre. Les films sont
ensuite automatiquement supprimés à leur expiration. Consultez l’iTunes Store pour
connaître les délais d’expiration avant de louer un film.
Transfert de films loués sur l’iPod touch: Connectez l’iPod touch à votre ordinateur.
Sélectionnez ensuite iPod touch dans la barre latérale d’iTunes, cliquez sur Films, et
sélectionnez les films loués que vous souhaitez transférer. Assurez-vous que votre ordinateur est connecté à Internet.
Visionnage d’un film loué : Choisissez Vidéos puis sélectionnez un film.
40 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 41
Visionnage de vidéos sur un téléviseur
Vous pouvez connecter l’iPod touch à votre téléviseur et regarder vos vidéos sur un
écran de plus grande dimension. Utilisez le câble AV Composant Apple, AV Composite
Apple, ou tout autre câble compatible iPod touch autorisé. Vous pouvez également
utiliser ces câbles avec la station d’accueil Apple Universal Dock pour connecter
l’iPod touch à votre téléviseur (La station d’accueil Apple Universal Dock est fournie
avec une télécommande qui vous permet de commander la lecture à distance.) Les
câbles et stations d’accueil Apple sont disponibles à la vente séparément à la page
www.apple.com/ca/fr/ipodstore.
Suppression de vidéos à partir de l’iPod touch
Vous pouvez supprimer de vidéos de l’iPod touch pour économiser de l’espace.
Suppression de vidéo : Dans les listes vidéo, balayez vers la gauche ou la droite sur la
vidéo puis touchez Supprimer.
Lorsque vous supprimez une vidéo (autre qu’un film loué) à partir de l’iPod touch, elle
n’est pas supprimée de votre bibliothèque iTunes et vous pouvez la synchroniser à
nouveau vers votre iPod touch ultérieurement. Si vous ne souhaitez pas synchroniser à
nouveau la vidéo sur l’iPod touch, configurez iTunes de manière à ne plus le faire. Voir
la section ªÉléments nécessaires» à la page 5.
Important : Si vous supprimez un film en location depuis l’iPod touch, il est supprimé
définitivement et ne peut pas être transféré à nouveau vers votre ordinateur.
Réglage d’une minuterie de veille
Vous pouvez régler l’iPod touch de manière à interrompre la lecture de musique ou de
vidéos après un certain temps.
Réglage d’une minuterie de veille : Dans l’écran d’accueil, choisissez Horloge >
Minuteur, puis feuilletez pour régler le nombre d’heures et de minutes. Touchez À expiration et choisissez Mettre l’iPod en veille, touchez Choisir puis touchez Démarrer pour
lancer la minuterie.
À l’expiration de la minuterie, l’iPod touch interrompt la lecture de la musique ou de la
vidéo, ferme les éventuelles applications ouvertes et se verrouille.Modification des boutons de navigation
Vous pouvez remplacer les boutons Listes de lecture, Artiste, Morceaux ou Vidéos situés au bas de l’écran par d’autres que vous utilisez plus fréquemment. Par exemple, si
vous écoutez souvent des podcasts et ne regardez pas beaucoup de vidéos, vous pouvez remplacer le bouton Vidéos par le bouton Podcasts.
Modification des boutons de navigation : Touchez Plus puis Modifier, puis faites glisser un bouton vers le bas de l’écran, par-dessus celui que vous souhaitez remplacer.
Vous pouvez faire glisser vers la gauche ou la droite les boutons situés au bas de
l’écran afin de les réarranger. Touchez Terminé lorsque vous avez fini. Touchez Plus à
tout moment pour accéder aux boutons que vous avez remplacés.
42 Chapitre 3 Musique et vidéo43
L'iPod touch vous permet de toujours transporter vos photos avec vous de manière à
les partager avec vos proches et vos collègues.
Synchronisation de photos avec votre ordinateur
iTunes peut synchroniser vos photos avec les applications suivantes :
 Mac : iPhoto 4.0.3 ou ultérieur, ou Aperture
 PC : Adobe Photoshop Album 2.0 ou ultérieur, ou Adobe Photoshop Elements 3.0
ou ultérieur
ªÉléments nécessaires» à la page 5 Voir la section “Éléments nécessaires”.
Visionnage de photos
Vous pouvez visionner dans Photos les photos synchronisées à partir de votre
ordinateur.
Visualisation de photos :
1 Dans Photos:
 Touchez Photothèque pour visualiser toutes vos photos.
 Touchez un album pour visualiser uniquement ces photos.
2 Touchez une vignette pour afficher la photo en plein écran.
4
PhotosAfficher ou masquer les commandes : Touchez la photo en plein écran pour afficher
les commandes. Touchez à nouveau pour les masquer.
Affichage d’une photo en mode paysage : Faites pivoter l’iPod touch d’un quart de
tour. La photo se réoriente automatiquement et couvre tout l’écran si elle est en format Paysage.
Zoom avant sur une partie d’une photo : Double-touchez l’endroit sur lequel vous
souhaitez zoomer. Double-touchez à nouveau pour effectuer un zoom arrière Vous
pouvez également pincer l’image pour l’agrandir ou écarter les doigts pour la réduire.
Exploration d’une photo: Faites glisser la photo.
44 Chapitre 4 PhotosChapitre 4 Photos 45
Affichage de la photo précédente ou suivante : Feuilletez vers la gauche ou la droite
Touchez l’écran pour afficher les commandes puis ou .
Diaporamas
Vous pouvez visualiser vos photos dans un diaporama, accompagné d’une musique de
fond.
Affichage de photos dans un diaporama : Choisissez un album photo, puis touchez .
Vous pouvez également toucher pour démarrer un diaporama lorsque vous visualisez une photo individuelle. Si vous ne voyez pas , touchez la photo pour afficher les
commandes.
Arrêt d’un diaporama : Touchez l’écran.
Réglage d’un diaporama : Dans Réglages, choisissez Photos puis réglez les options
suivantes :
 Pour définir la durée d’apparition de chaque diapositive, touchez Afficher chaque photo pendant puis choisissez une durée.
 Pour définir des effets de transition lors du passage d’une photo à la suivante, touchez
Transition puis choisissez un type de transition.
 Pour définir la répétition des diaporamas, activez ou désactivez Répéter.
 Pour définir l’affichage aléatoire des photos, activez ou désactivez Aléatoire.
Écoute de musique pendant un diaporama : Dans iPod, jouez un morceau puis choisissez Photos dans l’écran d’accueil et démarrez un diaporama.Fond d’écran
Une photo apparaît en tant que fond d’écran lorsque vous déverrouillez votre
iPod touch.
Choix d’une photo comme fond d’écran :
1 Choisissez une photo, touchez , puis touchez Utiliser en fond d’écran.
2 Faites glisser la photo pour la déplacer, pincez-la pour la réduire ou écartez les doigts
pour l’agrandir, jusqu’à ce qu’elle prenne les dimensions souhaitées.
3 Touchez Valider.
Vous pouvez également choisir parmi plusieurs images de fond d’écran incluses sur
l’iPod touch en choisissant Réglages > Fond d’écran >Fond d’écran à partir de l’écran
d’accueil.
Enregistrement d’images à partir d’un message électronique
ou d’une page web
Vous pouvez ajouter à votre photothèque des images jointes à un message électronique ou à une page web.
Ajout de photo à votre photothèque : Maintenez votre doigt sur la photo puis touchez Enregistrer l’image.
L’image est ajoutée à votre album Photothèque. Vous pouvez télécharger les images
de votre dans l’application photo de votre ordinateur en connectant votre iPod touch
à votre ordinateur.
Envoi d’une photo par courrier électronique
Envoi d’une photo par courrier électronique : Choisissez une photo, touchez , puis
Envoyer par courrier.
L'iPod touch doit être configuré pour le courrier électronique. Voir ªOrganisation du
courrier électronique» à la page 74.
Envoi de photo à une Galerie MobileMe
Si vous avez un compte MobileMe, vous pouvez directement envoyer des photos de
votre iPod touch vers une galerie que vous avez créée. Vous pouvez également envoyer les photos vers la galerie MobileMe d’une autre personne si celle-ci a activé les
contributions par courrier électronique.
Avant de pouvoir envoyer des photos à une galerie, vous devez :
 configurer votre compte MobileMe sur l’iPod touch
46 Chapitre 4 PhotosChapitre 4 Photos 47
 publier une galerie MobileMe et autoriser le téléchargement par courrier
électronique
Pour plus d’informations sur la création de galeries, consultez l’Aide MobileMe.
Envoi de photo à votre galerie : Choisissez une photo et touchez , puis touchez
Envoyer à la Galerie.
Attribution d’une photo à un contact
Vous avez la possibilité d’attribuer une photo à un contact.
Attribution d’une photo à un contact :
1 Choisir une photo enregistrée sur iPod touch et toucher .
2 Touchez « Assigner à un contact » puis désignez le contact.
3 Positionnez et redimensionnez la photo jusqu’à ce qu’elle ait l’aspect souhaité.
Faites glisser la photo pour la déplacer, pincez les doigts pour l’agrandir et écartez-les
pour la réduire.
4 Touchez Valider.
Vous pouvez également affecter une photo à un contact dans Contacts en touchant
Modifier, puis en touchant l’icône d’image.48
iTunes Wi-Fi Music Store
Vous pouvez effectuer des recherches dans le catalogue musical de l’iTunes Wi-Fi
Music Store ou parcourir, écouter des extraits, acheter et télécharger des morceaux et
des albums, le tout directement de l’iPod touch. Le contenu acheté est automatiquement copié dans votre bibliothèque iTunes dès que vous synchronisez l’iPod touch
avec votre ordinateur.
Pour pouvoir utiliser l’iTunes Wi-Fi Music Store, vous devez accéder à un réseau Wi-Fi
connecté à Internet à l’aide de votre iPod touch. Pour plus de renseignements sur la
connexion à un réseau Wi-Fi, consultez la section ªConnexion à Internet» à la page 28.
Vous aurez également besoin d’un compte iTunes Store pour acheter des morceaux en
mode Wi-Fi (l’iTunes Wi-Fi Music Store est seulement disponibles dans certains pays). Si
vous ne disposez encore pas d’un compte iTunes Store, ouvrez iTunes sur votre ordinateur et choisissez Store > Compte pour en configurer un.
Remarque : Vous ne pouvez pas accéder à l’iTunes Wi-Fi Music Store par le biais d’un
réseau de données cellulaire. Si vous tentez d’accéder à l’iTunes Wi-Fi Music Store sans
vous connecter à un réseau Wi-Fi, un message d’erreur s’affiche.
Recherche de morceaux et d’albums
Parcourez les sélections pour voir les nouveautés et les recommandations de l’iTunes
Wi-Fi Music Store. Parcourez les classements pour voir les morceaux et albums les plus
vendus dans plusieurs catégories. Si vous recherchez un morceau, un album ou un artiste donné, utilisez le champ Recherche>.
5
iTunes StoresChapitre 5 iTunes Stores 49
Exploration de morceaux et albums recommandés : Touchez Sélection et sélectionnez une catégorie en haut de l’écran.
Exploration des classements de morceaux et albums : Touchez Classements, choisissez une catégorie, puis touchez Classement morceaux ou Classement albums.Recherche de morceaux et albums : Touchez Recherche, le champ de recherche, saisissez un ou plusieurs mots, puis touchez Rechercher.
Affichage des morceaux d’un album Touchez l’album.
Affichage de l’album contenant un morceau : Double-touchez le morceau.
Parcours des sélections Starbucks
Si vous vous connectez à un réseau Wi-Fi Starbucks dans certains emplacements
Starbucks (aux États-Unis seulement), l’icône Starbucks apparaît au bas de l’écran à
côté de Sélection. Touchez l’icône Starbucks pour connaître le morceau diffusé dans le
café et pour parcourir les collections Starbucks de titres recommandés.
Une liste des emplacements Starbucks désignés se trouve à la page
www.apple.com/itunes/starbucks.
50 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 51
Découverte du morceau à l’écoute : Touchez Starbucks. Le morceau en cours de
lecture apparaît en haut de l’écran. Touchez le morceau pour accéder à l’album qui le
contient et retrouver les autres morceaux de l’album.
Affihage des Morceaux récents et d’autres listes de lectures Starbucks : Touchez
Starbucks, puis choisissez Morceaux récents l’une des listes de lecture Starbucks.
Achat de morceaux et d’albums
Lorsque vous trouvez un morceau ou un album qui vous plaît dans l’iTunes Wi-Fi Music
Store, vous pouvez l’acheter et le télécharger sur l’iPod touch. Il vous est possible
d’écouter un extrait du morceau avant de l’acheter pour vous assurer qu’il s’agit bien
d’un morceau que vous voulez. Dans les emplacements Starbucks désignés (disponible
seulement aux États-Unis), vous pouvez également écouter un extrait du morceau diffusé, et l’acheter le cas échéant, ainsi que d’autres morceaux des collections Starbucks
de titres recommandés.
Écoute d’un extrait de morceau : Touchez le morceau.
Achat et téléchargement d’un morceau ou album :
1 Touchez le prix, puis l’option Acheter.
Si vous aviez ouvert une session sur votre compte iTunes Store dans iTunes la dernière
fois que vous avez synchronisé votre iPod touch, vous n’avez pas besoin de saisir à
nouveau votre identifiant de compte. Dans le cas contraire, il vous est demandé de
saisir votre identifiant.
2 Saisissez votre mot de passe, puis touchez OK.
Votre achat est débité de votre compte iTunes Store. Pour tout achat supplémentaire
effectué dans un délai de quinze minutes, le mot de passe ne vous est pas redemandé.Un avertissement s'affiche si vous avez déjà acheté un ou plusieurs morceaux d’un
album. Touchez Acheter si vous voulez acheter l’intégralité de l’album, y compris les
morceaux déjà acquis, ou touchez Annuler si vous voulez acheter seulement des morceaux précis parmi ceux restants.
Certains albums prévoient du contenu en bonus, téléchargé dans la bibliothèque iTunes de votre ordinateur. Tout ces bonus ne sont pas transférés directement sur votre
iPod touch.
Affichage du statut des morceaux et albums téléchargés : Touchez Téléchargés.
Pour interrompre un téléchargement, touchez .
Si vous avez besoin d’éteindre votre iPod touch ou de quitter la zone de votre
connexion Wi-Fi, vous pouvez interrompre le téléchargement sans inquiétude.
L’iPod touch redémarre le téléchargement lorsque l’iPod touch accède à un réseau WiFi connecté à Internet. Sinon, si vous ouvrez iTunes sur votre ordinateur, l’application
termine alors le téléchargement sur votre bibliothèque iTunes.
Les morceaux achetés s’ajoutent à une liste de lecture intitulée Achats sur l’iPod touch.
Si vous supprimez cette liste, iTunes en crée une nouvelle lorsque vous achetez un article auprès de l’iTunes Wi-Fi Music Store.
App Store
Vous pouvez directement rechercher, explorer, acheter et télécharger des applications à partir de l’App Store sur votre iPod touch, ainsi que rédiger des avis. Vous
pouvez également installer les applications que vous avez achetées ou téléchargées
par le biais d’iTunes sur votre ordinateur lors de votre dernière synchronisation de
l’iPod touch. Les applications que vous téléchargez et installez à partir de l’App Store
sur votre iPod touch sont sauvegardées dans votre bibliothèque iTunes la prochaine
fois que vous synchronisez votre iPod touch avec votre ordinateur.
Pour utiliser l’App Store, l’iPod touch doit être connecté à Internet. Vous aurez également besoin d’un compte iTunes Store (disponible dans de nombreux pays) afin de
télécharger des applications. Si vous ne disposez encore pas d’un compte iTunes Store,
ouvrez iTunes sur votre ordinateur et choisissez Store > Compte pour en configurer un.
Exploration et recherche
Explorez les sélections, les nouveautés et les recommandations de l’App Store.
Parcourez les 25 applications les plus populaires. Si vous recherchez une application
donnée, utilisez Recherche.
52 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 53
Exploration des applications sélectionnées : Touchez Sélection et sélectionnez une
catégorie sélectionnée en haut de l’écran.
Exploration par catégorie : Touchez Catégories et sélectionnez une genre pour afficher une liste d’applications.Exploration des 25 applications les plus téléchargées : Touchez Top 25 puis parcourez la liste d’applications.
Recherche d’applications : Touchez Recherche, le champ de recherche, saisissez un ou
plusieurs mots, puis touchez Rechercher.
54 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 55
Écran Informations
Touchez n’importe quelle application d’une liste pour afficher davantage d’informations, par exemple le prix courant de l’application, les avis rédigés et d’autres
informations.
Si vous avez déjà installé l’application, la mention « Installée » s’affiche sur l’écran d’informations à la place du prix.
Envoi par courrier électronique d’un lien vers une application : À partir de l’écran
Infos, touchez Recommander à un ami.
Consultation d’avis : Dans l’écran Infos, touchez Avis.
Téléchargement d’applications
Lorsque vous trouvez une application qui vous plaît dans l’App Store, vous pouvez
l’acheter et la télécharger sur votre iPod touch. Si l’application est gratuite, vous pouvez la télécharger sans frais après avoir fourni les informations de votre compte iTunes.
Une fois que vous téléchargez une application, elle s’installe immédiatement sur votre
iPod touch.
Achat et téléchargement d’application :
1 Touchez le prix (ou touchez Gratuit), puis touchez Acheter.
Si vous aviez ouvert une session sur votre compte iTunes Store dans iTunes la dernière
fois que vous avez synchronisé votre iPod touch, vous n’avez pas besoin de saisir à
nouveau votre identifiant de compte. Dans le cas contraire, il vous est demandé de
saisir votre identifiant.
2 Saisissez votre mot de passe, puis touchez OK.Les téléchargements d’achats sont débités sur votre compte iTunes Store. Pour tout
téléchargement supplémentaire effectué dans un délai de quinze minutes, le mot de
passe ne vous est pas redemandé.
Consultation du statut du téléchargement d’applications : Une fois que vous avez
commencé le téléchargement d’une application, son icône apparaît sur votre écran
d’accueil et indique le statut du téléchargement et de l’installation.
Si vous avez besoin d’éteindre votre iPod touch ou de quitter la zone de votre
connexion réseau, vous pouvez interrompre le téléchargement sans inquiétude.
L’iPod touch redémarre le téléchargement lorsque l’iPod touch accède à un réseau
connecté à Internet.
Suppression d’applications de l’App Store
Vous pouvez supprimer des applications que vous avez installées à partir de l’App
Store. Si vous supprimez une application, les données associées à l’application ne seront plus à la disposition de l’iPod touch, même si vous réinstallez l’application.
Vous pouvez réinstaller à partir de votre bibliothèque iTunes n’importe quelle application et les éventuelles donnée associées à partir du moment où vous avez sauvegardé
l’application par synchronisation avec l’ordinateur. Si vous essayez de supprimer une
application qui n’a pas été sauvegardée sur votre ordinateur, une alarme apparaît.
Suppression d’une application de l’App Store :
1 Touchez l’icône d’une application de l’écran d’accueil et maintenez le doigt dessus
jusqu’à ce que les icônes se mettent à bouger.
2 Touchez le « x » situé dans le coin de l’application à supprimer.
3 Touchez Supprimer, puis appuyez sur le bouton principal pour enregistrer votre disposition actuelle.
Pour écraser les données associées à une application, utilisez l’option « Effacer contenu
et réglages » dans les réglages de l’iPod touch. Consultez la section ªRéinitialisation de
l'iPod touch» à la page 102.
Rédaction d’avis et signalement de problèmes
Vous pouvez rédiger et soumettre vos propres avis sur une application ou signaler directement un problème applicatif sur l’iPod touch.
Rédaction d’un avis :
1 Dans l’écran Infos, touchez Avis.
2 Dans l’écran Avis, touchez , puis « Rédiger un avis ».
56 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 57
3 Sélectionnez le nombre d’étoiles (entre 1 et 5) pour la note que vous donnez à l’application et saisissez le titre de l’avis et des commentaires facultatifs. Si vous avez rédigé
des avis par le passé, votre pseudonyme est déjà indiqué. Dans le cas contraire, il vous
est demandé de créer un pseudonyme pour votre avis.
4 Touchez Envoyer par courrier.
Vous devez avoir ouvert une session sur votre compte iTunes Store pour pouvoir soumettre des avis.
Signalement de problème : Dans l’écran Avis, touchez , puis touchez « Signaler un
problème ». Sélectionnez un problème dans la liste, ou tapez des commentaires facultatifs et touchez Signaler.
Mise à jour d’applications
Chaque fois que vous accédez à l’App Store, il recherche des mises à jour éventuelles
des applications que vous avez installées. Par défaut, l’App Store recherche également
automatiquement des mises à jour chaque semaine. L’icône App Store indique le nombre total de mises à jour d’application disponibles.
Si une mise à jour est disponible et que vous accédez à l’App Store, l’écran Mises à jour
apparaît immédiatement. Les mises à jour d’application sont gratuites. Elles sont télé-
chargées et installée automatiquement lorsque vous choisissez de le faire. Les mises
à niveau d’application sont de nouvelles versions qui peuvent être achetées et télé-
chargées à partir de l’App Store sur l’iPod touch ou à partir de l’iTunes Store sur votre
ordinateur.
Mise à jour d’une application :
1 Au bas de l’écran, touchez Mises à jour.
2 Touchez une application pour afficher plus de renseignements sur la mise à jour.
3 Touchez Mettre à jour.
Mise à jour de toutes les applications : Au bas de l’écran, touchez Mises à jour puis
touchez Tout mettre à jour.
Si vous essayez de mettre à jour une application achetée à partir d’un autre compte
iTunes Store, l’identifiant et le mot de passe du compte en question vous sont demandés avant le téléchargement de la mise à jour.Synchronisation du contenu acheté
iTunes synchronise automatiquement les morceaux, albums et applications que vous
avez achetés sur l’iPod touch vers votre bibliothèque iTunes lorsque vous connectez
l’iPod touch à votre ordinateur. Ceci vous permet d’écouter sur votre ordinateur les
articles que vous avez achetés et offre une sauvegarde si vous supprimez des applications ou du contenu acheté de votre iPod touch.
«Les morceaux sont synchronisés dans la liste de lecture « Acheté sur ». iTunes crée la liste de lecture si elle n’existe pas. iTunes copie également
vos achats dans la liste de lecture Achats utilisée pour les achats effectués sur votre
ordinateur, si cette liste de lecture existe et qu’elle est configurée pour se synchroniser
avec l’iPod touch.
Les applications sont synchronisées dans la liste Applications de votre bibliothèque
iTunes. iTunes crée la liste si elle n’existe pas.
Vérification des achats
Vous pouvez utiliser iTunes pour vérifier que tous les morceaux, vidéos, applications
et autres articles que vous avez achetés auprès de l’iTunes Wi-Fi Music Store ou l’App
Store se trouent dans votre bibliothèque iTunes. Il peut s’avérer judicieux de procéder
ainsi si un téléchargement s’est interrompu.
Vérification de vos achats :
1 Assurez-vous que votre ordinateur est connecté à Internet.
2 Dans iTunes, choisissez Store > Recherchez les achats effectués..
3 Saisissez l’identifiant de votre compte iTunes Store et son mot de passe, puis cliquez
sur Rechercher.
Les achats qui ne se trouvent pas encore sur votre ordinateur sont téléchargés.
La liste de lecture Achats reprend tous vos achats. Comme vous pouvez ajouter ou
supprimer des éléments de la liste, cette dernière peut ne pas être exacte. Pour voir
tous vos achats, assurez-vous d’avoir ouvert une session avec votre compte, choisissez
Store > Visualiser mon compte, et cliquez sur Historique des achats.
58 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 59
Mise à jour de votre compte
iPod touch récupère vos informations de compte iTunes Store depuis iTunes. Vous
pouvez afficher et modifier les informations de votre compte iTunes Store en utilisant
iTunes sur votre ordinateur.
Affichage et modification des informations de votre compte iTunes Store : Dans iTunes, choisissez Store > Visualiser mon compte.
Vous devez avoir ouvert une session sous votre compte iTunes Store. Si l’option
« Visualiser mon compte » n’apparaît pas dans le menu Store, choisissez Store > Se
connecter.
Achat de musique ou d’applications à partir d’un autre compte iTunes
Store : Ouvrez une session avec ce compte lorsque vous vous connectez à l’iTunes WiFi Music Store ou que vous achetez ou téléchargez une application de l’App Store.60
Safari
Safari vous permet de surfer le web et de consulter des pages web sur l’iPod touch
comme si vous utilisiez un ordinateur. Vous pouvez créer des signets sur l’iPod touch et
les synchroniser avec votre ordinateur. Ajoutez des Web Clip pour accéder rapidement
à vos sites favoris depuis l’écran d’accueil.
Visualisation de pages web
Vous pouvez afficher les pages web en mode portrait ou paysage. Faites pivoter
l’iPod touch : la page web pivote alors et sa taille est ajustée automatiquement.
Ouverture de pages web
Ouverture d’une page web : Touchez le champ d’adresse puis tapez l’adresse web et
touchez Accéder. Si le champ d’adresse n’est pas visible, touchez la barre d’état située
en haut de l’écran pour faire rapidement défiler jusqu’au champ d’adresse situé en
haut de la page web.
6
Autres applicationsChapitre 6 Autres applications 61
À mesure que vous tapez, les adresses web commençant avec les mêmes lettres apparaissent. Il s’agit de pages enregistrées dans les signets ou de pages que vous avez
ouvertes récemment. Touchez une adresse pour accéder à cette page. Continuez à taper si vous souhaitez saisir une adresse web ne faisant pas partie de la liste.
Effacement du texte dans le champ d’adresse : Touchez le champ d’adresse, puis
touchez .
Zoom et défilement
Zoom arrière ou avant : Double-touchez une colonne sur une page web pour étendre
la colonne. Double-touchez à nouveau pour effectuer un zoom arrière.
Vous pouvez également pincer l’image pour l’agrandir ou la réduire manuellement.
Défilement d’une page Faites glisser la page vers le haut, le bas ou le
côté. Pendant le défilement, vous pouvez toucher
et faire glisser n’importe quel endroit de la page
sans activer les éventuels liens.
Défilement d’une image sur une page web Utilisez deux doigts pour faire défiler une image
sur une page web. Utiliser un doigt pour faire
défiler la page web entière.
Faites rapidement défiler jusqu’au début d’une
page web
Touchez la barre d’état dans la partie supérieure
de l’écran iPod touch.
Navigation dans les pages web
Généralement, les liens présents dans des pages web vous dirigent vers d’autres sites.
Suivi d’un lien sur une page web : Touchez le lien.
Les liens sur l’iPod touch peuvent également afficher un emplacement dans Plans ou
créer un message électronique préadressé. Pour revenir à Safari après qu’un lien a
ouvert une autre application, appuyez sur le bouton du menu principal et touchez
Safari.Afficher l’adresse de destination d’un lien Touchez le lien et maintenez votre doigt dessus.
L’adresse apparaît à côté de votre doigt. Vous
pouvez toucher une image et maintenir votre
doigt dessus pour vérifier si elle contient un lien.
Interruption du chargement d’une page web. Touchez .
Actualisation d’une page web Touchez .
Retour à la page précédente ou suivante Touchez ou au bas de l’écran.
Retourner à une page visualisée récemment Touchez puis touchez Historique. Pour effacer
l’historique, touchez Effacer.
Envoi d’une adresse de page web par courrier
électronique
Touchez puis touchez « Envoyer un lien vers
cette page par courrier électronique ».
Enregistrement d’une image ou d'une photo
sur votre album Pellicule
Touchez et maintenez votre doigt sur l’image,
puis touchez Enregistrer l’image.
Ouverture de plusieurs pages
Vous pouvez avoir jusqu’à huit pages ouvertes simultanément. Certains liens ouvrent
automatiquement une nouvelle page au lieu de remplacer la page actuelle.
Le nombre situé dans l’icône de pages au bas de l’écran indique le nombre de pages ouvertes. Si aucun nombre ne s’affiche, cela signifie qu’une seule page est ouverte.
Par exemple :
= une page est ouverte
= trois pages sont ouvertes
Ouverture d’une nouvelle page : Touchez puis touchez Nouvelle page.
Accès à une autre page : Touchez et feuilletez vers la droite ou la gauche. Touchez
la page que vous souhaitez afficher.
62 Chapitre 6 Autres applicationsChapitre 6 Autres applications 63
Fermeture d’une page : Touchez puis . Il est impossible de fermer une page si
c’est la seule ouverte.
Saisie de champs de texte
Certaines pages web disposent de champs de texte et de formulaires à remplir.
Appel du clavier Touchez à l’intérieur d’un champ de texte.
Passage à un autre champ de texte Touchez un autre champ de texte ou touchez le
bouton Suivant et Précédent.
Envoi d’un formulaire Une fois que vous avez fini de remplir un formulaire, touchez Accéder ou Rechercher. Une fois
que vous avez fini de remplir les champs de texte
sur la page, touchez Accéder ou Rechercher.
Fermeture du clavier sans envoyer le formulaire Touchez Terminé
Recherche sur le Web
Par défaut, Safari utilise Google pour effectuer les recherches. Vous pouvez également
utiliser Yahoo! pour effectuer vos recherches.
Recherche sur le web :
1 Touchez pour afficher le champ de recherche.
2 Tapez un mot ou une phrase décrivant ce que vous recherchez, puis touchez Google.
3 Touchez un lien dans la liste de résultats pour ouvrir une page web.
Réglage de Safari pour utiliser les recherches Yahoo! : À partir de l’écran d’accueil ,
choisissez Réglages > Safari > Moteur de recherche, puis choisissez Yahoo!.
Signets
Vous pouvez mettre en signet des pages web que vous souhaitez consulter à nouveau
ultérieurement.
Mise en signet de page web : Ouvrez la page et touchez Touchez ensuite Ajouter
un signet.
Lorsque vous enregistrez un signet, vous pouvez modifier son titre. Par défaut, les signets sont enregistrés dans le dossier de plus haut niveau de Signets. Touchez Signets
pour choisir un dossier différent.
Si vous utilisez Safari sur un Mac, ou Safari ou Microsoft Internet Explorer sur un PC,
vous pouvez synchroniser vos signets avec le navigateur web de votre ordinateur.
Synchronisation de signets avec votre ordinateur :
1 Connectez l’iPod touch à votre ordinateur.
2 Dans iTunes, sélectionnez iPod touch dans la barre latérale.3 Cliquez sur l’onglet Infos, sélectionnez “Synchronisez les signets ...” sous Navigateur
web, puis cliquez sur Appliquer.
ªSynchronisation avec iTunes» à la page 6 voir la section “Synchronisation avec iTunes”;
Synchronisation de signets avec MobileMe : Dans Réglages sur l’iPod touch, sélectionnez Signets dans votre compte MobileMe.ªConfiguration de comptes.» à la page 11
Voir la section “Configuration de compte”.
Ouverture d’une page web mise en signet : Touchez puis choisissez un signet ou
touchez un dossier pour voir les signets qui s’y trouvent.
Modification d’un signet ou d’un dossier de signets : Touchez , choisissez le
dossier qui contient le signet ou le dossier que vous souhaitez modifier, puis touchez
Modifier. Touchez , choisissez le dossier qui contient le signet ou le dossier que vous
souhaitez modifier, puis touchez Modifier.
 Pour créer un nouveau dossier, touchez Nouveau dossier.
 Pour supprimer un signet ou un dossier, touchez , puis touchez Supprimer.
 Pour repositionner un signet ou un dossier, faites glisser .
 Pour en modifier le nom ou l’adresse, ou pour le changer de dossier, touchez le signet
ou dossier.
Lorsque vous avez terminé, touchez Terminé.
Web Clip
Ajoutez des Web Clip à l’écran d’accueil pour accélérer l’accès à vos pages web préfé-
rées. Les Web Clip apparaissent sous forme d’icônes sur l’écran d’accueil. Vous pouvez
les réarranger, ainsi que les autres icônes. Voir ªApplications iPod touch» à la page 17.
Ajout d’un Web Clip: Ouvrez la page web et touchez Touchez ensuite « Ajouter à
l’écran d’accueil ».
Lorsque vous ouvrez un Web Clip, Safari effectue un zoom automatique et défile
jusqu’à la zone de la page web affichée lorsque vous avez enregistré le Web Clip. La
zone affichée est également utilisée pour créer l’icône pour le Web Clip sur votre écran
d’accueil, à moins que la page web intègre sa propre icône.
Lorsque vous ajoutez un Web Clip, vous pouvez modifier son nom. Si le nom est trop
long (plus de 10 caractères environ), il risque d’apparaître abrégé sur l’écran d’accueil.
Les Web Clip ne sont pas des signets et ne sont pas synchronisés par MobileMe ou
iTunes.
Suppression d’un Web Clip :
1 Touchez n’importe quelle icône de l’écran d’accueil et maintenez le doigt dessus
jusqu’à ce que les icônes commencent à bouger.
64 Chapitre 6 Autres applicationsChapitre 6 Autres applications 65
2 Touchez le « x » situé dans l’angle du Web Clip que vous souhaitez supprimer.
3 Touchez Supprimer, puis appuyez sur le bouton principal pour enregistrer votre disposition actuelle.
Calendrier
Calendrier vous permet de visualiser vos événements dans une liste continue, présentée par jour ou par mois. Synchronisez l’iPod touch avec les calendriers de votre ordinateur. Créez, modifiez ou annulez des rendez-vous sur l’iPod touch et synchronisez-les
avec votre ordinateur. Si vous avez un compte Microsoft Exchange, vous pouvez recevoir des invitations à des réunions et y répondre.
Synchronisation de calendriers
Vous pouvez synchroniser Calendrier d’une des manières suivantes :
 Dans iTunes, utilisez les sous-fenêtres de préférences de l’iPod touch pour synchroniser avec iCal ou Microsoft Entourage sur un Mac, ou Microsoft Outlook 2003 ou 2007
sur un PC lorsque vous connectez l’iPod touch à votre ordinateur.ªSynchronisation
avec iTunes» à la page 6 voir la section “Synchronisation avec iTunes”;
 Dans les Réglages de l’iPod touch, sélectionnez Calendrier dans votre compte
MobileMe ou Microsoft Exchange pour synchroniser sans fil les informations de votre calendrier.ªConfiguration de comptes.» à la page 11 Voir la section “Configuration
de compte”.
Ajout d’événements de calendrier à l’iPod touch
Vous pouvez également saisir et modifier des événements de calendrier directement
sur l’iPod touch.
Ajout d’un événement : Touchez et saisissez les informations sur l’événement, puis
touchez Terminé.
Vous pouvez saisir les informations suivantes :
 Titre
 Lieu
 Heures de début et de fin (ou activez Sur la journée si l’événement se déroule toute
la journée)
 Récurrence : aucune, tous les jours, toutes les semaines, toutes les deux semaines,
tous les mois ou tous les ans
 Alarme : de cinq minutes à deux jours avant l’événementLorsque vous définissez une alarme, l’option pour définir une seconde alarme apparaît. Lorsqu’une alarme se déclenche, l’iPod touch affiche un message. Vous pouvez
également régler l’iPod touch de manière qu’il produise un son (voir ci-dessous).
Important : Lorsque vous êtes en déplacement, l'iPod touch risque de ne pas vous
avertir à la bonne heure locale. Pour régler manuellement l’heure correcte, consultez
la section “Date et heure”.ªDate et heure» à la page 101
 Notes
Pour sélectionner le calendrier auquel ajouter l’événement, touchez Calendrier. Les calendriers en lecture seule n’apparaissent pas dans la liste.
Modification d’un événement Touchez l’événement, puis touchez Modifier.
Supprimer un événement Touchez l’événement, touchez Modifier, puis faites défiler et touchez Supprimer l’événement.
Réponse à des invitations à des réunions
Si vous avez configuré un compte Microsoft Exchange sur votre iPod touch avec les
calendriers activés, vous pouvez recevoir des invitations à des réunions envoyées par
d’autres personnes de votre organisation, et y répondre. Lorsque vous recevez une
invitation, la réunion apparaît dans votre calendrier, entourée d’une ligne en pointillés.
L’icône située dans l’angle inférieur droit de l’écran et l’icône Calendrier de l’écran
d’accueil indiquent chacune le nombre total de nouvelles invitations que vous avez
reçues.
Nombre d’invitations
à des réunions
66 Chapitre 6 Autres applicationsChapitre 6 Autres applications 67
Réponse à une invitation dans Calendrier :
1 Touchez dans le calendrier une invitation à une réunion, ou touchez pour afficher
l’écran Événement et touchez une invitation.
 Touchez "Invitation de” pour obtenir les coordonnées de l’organisateur de la réunion. Touchez l’adresse électronique pour envoyer un message à l’organisateur.
 Touchez Participants pour afficher les autres personnes invitées à la réunion.
Touchez un nom pour afficher les coordonnées du participant. Touchez l’adresse
électronique pour envoyer un message au participant.
 Touchez Alarme pour régler l’iPod touch de manière à produire une alarme sonore
avant la réunion.
 Touchez Annoter pour ajouter des commentaires au message électronique de ré-
ponse envoyé à l’organisateur de la réunion. Vos commentaires apparaîtront également dans l’écran d’information de la réunion.
Les remarques sont ajoutées par l’organisateur de la réunion.
2 Touchez Accepter, Peut-être ou Décliner.
Lorsque vous tentez d’accepter, acceptez ou déclinez l’invitation, un message électronique de réponse, comprenant les éventuels commentaires que vous avez ajoutés, est
envoyé à l’organisateur.
Si vous acceptez ou tentez d’accepter la réunion, vous pouvez toujours modifier
votre réponse ultérieurement. Touchez Annoter si vous souhaitez modifier vos
commentaires.
Les invitations à des réunions Exchange sont également envoyées dans un message
électronique qui vous permet d’ouvrir l’écran d’information de la réunion à partir de
Mail.Ouverture d’une invitation à une réunion dans un message électronique : Touchez
l’invitation.
Alarmes
Réglage des alarmes de calendrier : Dans Réglages, choisissez Sons puis activez
Alarmes de calendrier dans le menu Général > Effets sonores puis sélectionnez si vous
souhaitez activer les effets sonores par le biais du haut-parleur interne, des écouteurs,
ou les deux. Si l’option Effets sonores est désactivée, l’iPod touch affiche un message
lorsqu’un événement est sur le point de se produire, mais il ne produit aucun son.
Alarmes sonores pour les invitations : Dans Réglages, choisissez “Mail, Contacts,
Calendrier”. Sous Calendrier, touchez Alarme Nouv. invitation pour l’activer.
Affichage de votre calendrier
Vous pouvez afficher vos événements de calendrier dans une liste, par jour ou par
mois. Les événements de tous vos calendriers synchronisés apparaissent dans le même
calendrier sur l’iPod touch.
Basculement d’affichage : Touchez Liste, Jour ou Mois.
 Présentation en liste : tous les rendez-vous et événements apparaissent dans une
liste que vous pouvez faire défiler.
 Présentation par jour : faites défiler vers le haut ou vers le bas pour afficher les évé-
nements d’une journée. Touchez ou pour afficher les événements de la veille ou
du lendemain.
68 Chapitre 6 Autres applicationsChapitre 6 Autres applications 69
 Présentation par mois : Touchez une journée pour afficher ses événements. Touchez
ou pour afficher le mois précédent ou suivant.
Les jours marqués
d’un point
contiennent des
événements
programmés
Ajouter un événement
Changer de
présentation
Événements du jour
sélectionné
Aller à aujourd’hui Répondre à
une invitation
du calendrier
Affichage des détails d’un événement : Touchez l’événement.
Réglage de l’iPod touch de manière à régler les heures des événements sur un fuseau horaire sélectionné :
1 Dans Réglages, choisissez Général > Date et heure.
2 Activation de la gestion de fuseau horaire.
3 Touchez Fuseau horaire et recherchez une ville principale située dans le fuseau horaire
souhaité.
Lorsque la gestion de fuseau horaire est activée, Calendrier affiche les dates et heures
des événements dans le fuseau horaire de la ville sélectionnée. Lorsque la gestion de
fuseau horaire est désactivée, Calendrier affiche les dates et heures des événements
dans le fuseau local, tel qu’indiqué par l’heure réseau.Mail
Mail fonctionne avec MobileMe, Microsoft Exchange et de nombreux autres systèmes
populaires de courrier électronique, notamment Yahoo! Mail, Google Mail et AOL, ainsi
que d’autres systèmes de messagerie POP3 and IMAP standard. Vous pouvez envoyer
et recevoir des photos et des éléments graphiques intégrés et visualiser des PDF et
d’autres pièces jointes.
Configuration de comptes de messagerie
Vous pouvez configurer des comptes de messagerie sur iPod touch d’une des maniè-
res suivantes :
 dans iTunes, utilisez les volets de Préférences iPod touch pour synchroniser les réglages de vos comptes de messagerie depuis votre ordinateur :ªSynchronisation avec
iTunes» à la page 6 voir la section “Synchronisation avec iTunes”;
 configurer un compte directement sur votre iPod touch.ªConfiguration de comptes.» à la page 11 Voir la section “Configuration de compte”.
Envoi de courrier électronique.
Vous pouvez envoyer un message électronique à quiconque possédant une adresse
électronique.
Composition et envoi de message :
1 Touchez .
2 Tapez un nom ou une adresse électronique dans le champ À, ou touchez pour
ajouter un nom à partir de vos contacts.
Lors de la saisie d’une adresse électronique, les adresses électroniques correspondantes de votre liste de contacts apparaissent en dessous. Touchez une adresse pour
l’ajouter. Pour ajouter davantage de noms, touchez Retour ou .
Remarque : Si vous rédigez un message à partir de votre compte Microsoft Exchange
et avez accès à la Liste d’accès global (GAL) de votre entreprise, les adresses correspondantes provenant de vos contacts sur l'iPod touch apparaissent d’abord, suivies des
adresses GAL correspondantes.
3 Touchez Cc/Cci/De si vous souhaitez copier d’autres personnes (directement ou en
copie invisible). Si vous avez plusieurs comptes de messagerie, vous pouvez touchez le
champ De pour changer le compte à partir duquel vous envoyez des messages.
4 Saisissez l’objet, puis votre message.
Vous pouvez toucher Retour pour passer d’un champ au champ suivant.
5 Touchez Envoyer par courrier.
70 Chapitre 6 Autres applicationsChapitre 6 Autres applications 71
Envoi d’une photo dans un message Dans Photos, choisissez une photo, touchez ,
puis touchez Envoyer par courrier.
La photo est envoyée à partir de votre compte de
messagerie par défaut ªMail» à la page 106 (voir
la section “Mail” du chapitre Réglages).
Enregistrement du brouillon d’un message à
terminer ultérieurement
Touchez Annuler, puis Enregistrer. Le message est
enregistré dans Brouillons.
Réponse à un message. Touchez . Touchez Répondre pour répondre
uniquement à l’expéditeur ou Répondre à tous
pour répondre à l’expéditeur ainsi qu’à tous les
destinataires. Tapez votre message de réponse,
puis touchez Envoyer.
Les fichiers ou images joints au message initial ne
sont pas renvoyés.
Réexpédition d’un message Ouvrez un message et touchez , puis
Transférer. Ajoutez une ou plusieurs adresses
électroniques, saisissez votre message, puis touchez Envoyer.
Lorsque vous transférez un message, vous pouvez
inclure les fichiers ou images joints au message
d’origine.
Envoi d’un message à une personne présente
dans un champ d’adresse
Ouvrez le message et touchez un nom ou une
adresse électronique, puis touchez Courrier
électronique.
Relève de la boîte aux lettres et lecture du courrier électronique
L’icône Mail indique le nombre total de messages non lus dans toutes vos boîtes de
réception. Vous pouvez avoir d’autres messages non lus dans d’autres boîtes à lettres.
Nombre de courriers
électroniques non lus dans
votre boîte de réception
Sur chaque écran de compte figure le nombre de messages non lus dans chaque boîte
à lettres.
Nombre de
messages non lus
Tapotez ici pour voir
tous vos comptes
de messagerieTouchez une boîte à lettres pour afficher son contenu. Les messages non lus sont accompagnés d’un point bleu .
Messages non écoutés
Lire un message : Touchez une boîte à lettres, puis touchez un message. À l’intérieur
d’un message, touchez ou pour afficher le message précédent ou le message
suivant.
Zoom sur une partie d’un message Double-touchez la zone du message sur laquelle
vous souhaitez zoomer. Double-touchez à nouveau pour effectuer un zoom arrière.
Redimensionnement de toute colonne ou texte
pour l’adapter à l’écran.
Double-touchez le texte.
Redimensionnement manuel d’un message Pincez le texte pour le réduire, écartez les doigts
pour l’agrandir.
Suivi d’un lien Touchez le lien.
Les liens de type texte sont généralement soulignés en bleu. De nombreuses images sont également des liens. Un lien peut mener à afficher une
page web, ouvrir une carte, composer un numéro
de téléphone ou ouvrir un nouveau message
électronique dont le champ du destinataire est
déjà rempli
Les liens web et les liens de cartographie
ouvrent Safari ou Plans sur l’iPod touch. Pour retourner à votre courrier électronique, appuyez sur
le Bouton principal et touchez Mail.
Afficher l’adresse de destination d’un lien Touchez le lien et maintenez votre doigt dessus.
L’adresse apparaît à côté de votre doigt.
L'iPod touch affiche la plupart des formats d’images en pièces jointes (JPEG, GIF et
TIFF) dans le corps du texte des messages électroniques. L'iPod touch peut lire de
nombreux formats de fichiers audio en pièces jointes (notamment MP3, AAC, WAV et
AIFF). Vous pouvez télécharger et afficher des fichiers (notamment fichiers PDF, pages
web, fichiers texte et documents au format Pages, Keynote, Numbers, Microsoft Word,
Excel ou PowerPoint) joints aux messages que vous recevez.
72 Chapitre 6 Autres applicationsChapitre 6 Autres applications 73
Ouverture d’un fichier joint : Touchez la pièce jointe. Elle se télécharge sur votre
iPod touch puis s’ouvre.
Tapotez sur la pièce
jointe à télécharger
Vous pouvez afficher les pièces jointes en mode portrait ou paysage. Si le format d’une
pièce jointe n’est pas géré par l’iPod touch, vous pouvez voir le nom du fichier mais
pas l’ouvrir. L'iPod touch gère les types de documents suivants :
.doc Microsoft Word
.docx Microsoft Word (XML)
.htm page web
.html page web
.key Keynote
.numbers Numbers
.pages Pages
.pdf Preview, Adobe Acrobat
.ppt Microsoft PowerPoint
.pptx Microsoft PowerPoint (XML)
.txt texte
.vcf coordonnées
.xls Microsoft Excel
.xlsx Microsoft Excel (XML)
Enregistrement d’une photo en pièce jointe sur la bibliothèque photo de votre album Pellicule : Maintenez votre doigt sur l’image puis touchez “Enregistrer image”.Relève du courrier électronique Choisissez une boîte à lettres ou touchez à
tout moment.
Affichage de tous les destinataires d’un
message
Touchez Détails.
Touchez un nom ou une adresse électronique
pour afficher les informations de contact du destinataire. Touchez alors une adresse électronique
ou un message de texte pour contacter la personne. Touchez Masquer pour ne pas afficher les
destinataires.
Ajout à votre liste de contacts d’un destinataire
de courrier électronique.
Touchez le message et, si nécessaire, touchez
Détails pour afficher les destinataires. Touchez
un nom ou une adresse électronique et touchez
« Créer un nouveau contact » ou « Ajouter à un
contact ».
Signalement d’un message comme non lu. Ouvrez le message et touchez « Signaler comme
non lu ».
Un point bleu s’affiche en regard du message
dans la liste de la boîte à lettres (et disparaît lorsque vous l’ouvrez de nouveau).
Ouverture d’une invitation à une réunion : Touchez l’invitation.
Vous pouvez obtenir les coordonnées de l’organisateur et des autres participants,
configurer une alerte, ajouter des remarques à l’événement et ajouter des commentaires à inclure dans votre réponse envoyée à l’organisateur. Vous pouvez tenter d’accepter, accepter ou décliner l’invitation.ªRéponse à des invitations à des réunions» à la
page 66Voir la section “Réponse à une invitation à une réunion”.
Activation et désactivation du mode “Push”: Dans Réglages, choisissez Nouvelles
données puis touchez Push.ªNouvelles données» à la page 96Voir la section “Nouvelles
données”.
Organisation du courrier électronique
Vous pouvez supprimer des messages l’un après l’autre ou sélectionner un groupe à
supprimer d’un coup. Vous pouvez également déplacer des messages d’une boîte à
lettres ou d’un dossier à l’autre.
Suppression de message : Ouvrez le message et touchez . Vous pouvez également
toucher Modifier puis toucher à côté du message.
74 Chapitre 6 Autres applicationsChapitre 6 Autres applications 75
Vous pouvez aussi directement supprimer un message dans la liste des messages de
la boîte à lettres : balayez à gauche ou à droite sur le titre du message puis touchez
Supprimer.
Pour afficher le bouton Supprimer,
faites balayer le message vers
la gauche ou vers la droite.
Suppression de plusieurs messages : Pendant la consultation d’une liste de messages,
touchez Modifier, sélectionnez les messages que vous souhaitez supprimer, puis touchez Supprimer.
Déplacement d’un message vers une boîte à lettres ou un dossier différent : Pendant la consultation d’un message, touchez , puis choisissez une boîte à
lettres ou un dossier.
Déplacement de plusieurs messages : Pendant la consultation d’une liste de messages, touchez Modifier, sélectionnez les messages que vous souhaitez déplacer, puis
touchez Déplacer et sélectionnez une boîte à lettres ou un dossier.YouTube
YouTube présente des vidéos de courte durée envoyées par des personnes du monde
entier. (Ce service n’est pas disponible dans toutes les langues et n’est pas disponible
partout.)
Recherche et visualisation de vidéos
Vous pouvez parcourir YouTube ou rechercher les vidéos que vous souhaitez regarder.
Exploration de vidéos : Touchez Sélection, Populaires ou Signets, Vous pouvez également toucher Plus pour parcourir Récentes, Les mieux cotées ou Historique.
 Sélection : vidéos passées en revue et conseillées par l’équipe de YouTube.
 Populaires : vidéos les plus visionnées par les utilisateurs de YouTube. Touchez Tout
pour afficher la liste des vidéos les plus visionnées de tous les temps, ou Aujourd’hui
ou Cette semaine pour afficher les vidéos les plus visionnées pendant la dernière
journée ou semaine.
 Signets : vidéos que vous avez mises en signet.
 Récentes : les plus récentes ajoutées sur Youtube
 Les mieux cotées : vidéos les mieux cotées par les utilisateurs de YouTube. Pour noter
une vidéo, accédez à www.youtube.com.
 Historique : vidéos que vous avez visionnés le plus récemment.
Recherche d’une vidéo :
1 Touchez Recherche puis touchez le champ de recherche YouTube.
2 Touchez un mot ou une phrase décrivant ce que vous recherchez, puis touchez
Rechercher. Touchez Recherche puis touchez le champ de recherche YouTube.
Lecture de vidéo : Touchez la vidéo.
Elle commence à se télécharger sur l’iPod touch et une barre de progression apparaît.
Dès qu’une partie suffisante de la vidéo s’est téléchargée, la lecture commence.
Touchez la vidéo.
76 Chapitre 6 Autres applicationsChapitre 6 Autres applications 77
Dès qu’une partie suffisante de la vidéo s’est téléchargée, la lecture
commence.
Lorsque la lecture d’une vidéo commence, les commandes disparaissent pour ne pas
gêner.
Afficher/masquer les commandes vidéo : Touchez l’écran.
Suivant/
Avance rapide
Lecture/Pause
Courrier
électronique
Échelle
Progression du
téléchargement
Volume
Précédent/Retour rapide
Signet
Tête de lecture Défileur
Lire ou mettre en pause une vidéo Touchez ou .
Augmenter ou diminuer le volume Faites glisser le curseur de volume. Vous pouvez
également utiliser les boutons de volume laté-
raux de l’iPod touch.
Redémarrer une vidéo Touchez .
Passer à la vidéo suivante ou précédente Touchez deux fois pour passer à la vidéo
précédente. Passer à la vidéo suivante ou
précédente
Effectuer un retour ou une avance rapide Touchez ou et gardez le doigt dessus.
Passer directement à un point particulier d’une
vidéo
Faites glisser la tête de lecture le long du défileur.
Interrompre une vidéo avant sa fin Touchez Terminé ou appuyez sur le bouton principal .
Basculer le redimensionnement de la vidéo
entre le remplissage de l’écran et l’adaptation
à l’écran.
Double-touchez la vidéo. Basculer le redimensionnement de la vidéo entre le remplissage
de l’écran et à l’adaptation à l’écran. Double-touchez la vidéo. Touchez à côté de la vidéo et touchez
Créer un signet. Mettre une vidéo en signet
Touchez Signets pour afficher vos vidéos mises
en signet.
Envoyer un lien vers la vidéo par courrier
électronique
Touchez à côté de la vidéo et touchez
Partager. Vous pouvez également commencer à
lire la vidéo puis toucher .
Vous pouvez également commencer à lire la
vidéo puis toucher .
Lisez l’intégralité de la vidéo, touchez Terminé en
cours de lecture ou touchez à côté d’une vidéo
d’une liste.
iPod touch affiche le classement de la vidéo, la
date de son ajout et d’autres informations. Lisez
l’intégralité de la vidéo, touchez Terminé en cours
de lecture ou touchez à côté d’une vidéo d’une
liste.
Modification des boutons de navigation
Vous pouvez remplacer les boutons Sélection, Populaires, Signets et Recherche situés
au bas de l’écran par d’autres que vous utilisez plus fréquemment. Supposons que
vous regardiez souvent les vidéos les mieux cotées mais ne regardiez pas beaucoup
les vidéos conseillées. Vous pouvez dans ce cas remplacer le bouton Sélection par le
bouton Les mieux cotées.
Modification des boutons de navigation : Touchez Plus puis Modifier, puis faites glisser un bouton vers le bas de l’écran, par-dessus celui que vous souhaitez remplacer.
Vous pouvez faire glisser vers la gauche ou la droite les boutons situés au bas de
l’écran afin de les réarranger. Lorsque vous avez fini, touchez Terminé.
78 Chapitre 6 Autres applicationsChapitre 6 Autres applications 79
Pendant que vous explorez les vidéos, touchez Plus pour accéder aux boutons d’accès
qui ne sont pas visibles.
Ajout de vos propres vidéos à YouTube
Pour plus de renseignements sur la manière d’ajouter vos propres vidéos à YouTube,
accédez à www.youtube.com et touchez Aide.
Bourse
Bourse vous permet de consulter les dernières cotations des titres sélectionnés.
Visualisation des cours de la bourse
Visualisation des cours de la Bourse Les cotations peuvent être décalées de 20 minutes
au maximum.
Ajouter un indice boursier ou un fonds au visualiseur de titres :
1 Touchez , puis .
2 Tapez un symbole, un nom de société, un indice ou un nom de fond, puis touchez
Rechercher.
3 Choisissez un élément dans la liste de recherche.
Afficher l’évolution d’un titre sur une période plus longue ou plus courte : Touchez
un symbole de titre, puis touchez 1d, 1w, 1m, 3m, 6m, 1y ou 2y. Affichage de l’évolution
d’un titre sur une période
Suppression de titre : Touchez et touchez à côté d’un titre, puis touchez
Supprimer.
Réorganisation de titres : Touchez . Puis faites glisser à côté d’un titre vers un
autre endroit de la liste.
Affichage de la modification en valeur ou en pourcentage : Touchez le nombre
représentant la modification. Passage entre l’affichage de la variation des titres en
pourcentage et celle en valeur Vous pouvez également toucher et touchez % ou
Nombres.
Pour obtenir plus d’informations
Consulter des informations sur un titre à Yahoo.com : Sélectionnez le titre et touchez
.Vous pouvez visualiser des nouvelles, des informations et des sites web associés au
titre, par exemple.
Plans
Plans fournit des plans de ville, des vues satellites et des vues mixtes de lieux à travers
le monde. Vous pouvez obtenir des itinéraires détaillés et des informations sur la circulation (à certains endroits). À certains endroits, vous pouvez également connaître et
suivre votre emplacement actuel (approximatif) et utiliser ces informations pour obtenir un itinéraire jusqu’à ou à partir d’un autre endroit.1
AVERTISSEMENT : Des informations importantes concernant la conduite et la navigation en toute sécurité sont disponibles dans le Guide des informations importantes sur
le produità la page www.apple.com/ca/fr/support/manuals/ipodtouch.
Recherche et visualisation de lieux
Recherche d’emplacement et consultation de plan :
1 Touchez le champ de recherche pour activer le clavier.
2 Tapez une adresse, une intersection, une région, un lieu connu, un signet, un contact
ou un code postal.
3 Touchez Rechercher.
Une épingle indique l’emplacement. Touchez l'épingle pour afficher le nom ou la description du lieu.
Tapotez sur pour obtenir des
renseignements sur le lieu et des
itinéraires ou ajouter le lieu à vos
signets ou à votre liste de contacts
1 Les plans, les itinéraires et les informations géographiques dépendent des données recueillies et des services fournis par
de tierces parties. Ces services de données sont soumises à modification et ne sont pas disponibles dans toutes les zones
géographiques. Par conséquent, certains plans, itinéraires ou informations géographiques sont susceptibles de ne pas
être disponibles, d’être inexacts ou incomplets. Pour en savoir plus, rendez-vous sur www.apple.com/ca/fr/ipodtouch. Afin
de déterminer votre situation géographique, des données sont regroupées dans un formulaire qui ne vous identifie pas
personnellement. Si vous ne souhaitez pas que ces données soient rassemblées, n’utilisez pas cette fonctionnalité. Si vous
n’utilisez pas cette fonctionnalité, le fonctionnement de votre iPod touch n’est pas altéré.
80 Chapitre 6 Autres applicationsChapitre 6 Autres applications 81
Trouver votre emplacement actuel et activer le mode suivi : Touchez .
L'iPod touch utilise les Services de localisation pour déterminer votre emplacement
actuel (approximatif). Services de localisation utilise les informations disponibles provenant du réseau de données cellulaire, des réseaux Wi-Fi locaux (si vous avez activé
le mode Wi-Fi), et GPS (si vous avez un “iPhone G”). Plus les informations sont exactes,
plus votre emplacement est indiqué avec précision. Cette fonctionnalité n’est pas disponible partout.
Si les services de localisation sont désactivés, il vous sera demandé de les activer. Il
est impossible de trouver et de suivre votre emplacement si les services de localisation sont désactivés.ªService de localisation» à la page 99Voir la section “Services de
localisation”.
Un cercle est utilisé pour indiquer votre emplacement approximatif. Lorsque vous
vous déplacez, l’iPod touch met à jour votre emplacement et règle le plan de manière
que l’indicateur de votre emplacement reste au centre de l’écran. Si vous touchez à
nouveau ou faites glisser le plan, l’ iPod touch continue à mettre à jour votre emplacement mais arrête de le centrer, de sorte que l’indicateur d’emplacement peut se
retrouver hors de l’écran.
Remarque : Pour économiser l’autonomie de la batterie, désactivez l’option Service de
localisation lorsque vous ne l’utilisez pas. Dans Réglages, choisissez Général > Services
de localisation.
Utilisez le repère sur le plan : Touchez , puis touchez Placer un repère.Une épingle est déposée sur le plan. Vous pouvez alors la faire glisser vers l’endroit de
votre choix.
Déplacer rapidement la épingle vers la zone actuellement affichée : Touchez , puis
touchez Replacer le repère.
Zoom sur une partie d’une carte Pincez la carte. Zoom sur une partie de la carte
Double-touchez à nouveau la partie sur laquelle
vous souhaitez effectuer un autre zoom avant.
ou double-touchez la partie sur laquelle vous
souhaitez zoomer.
Pincez la carte. Zoom arrière Vous pouvez pincer
à nouveau la carte pour effectuer un autre zoom
arrière.
Déplacer ou faire défiler vers un autre endroit
du plan
Faites glisser la page vers le haut, le bas, la gauche ou la droite.
Afficher une vue satellite ou mixte : Touchez , puis touchez Satellite ou Mixte pour
afficher uniquement une vue satellite ou un plan des rues associé à une vue satellite.
Touchez Carte pour revenir à l’affichage de la carte.
82 Chapitre 6 Autres applicationsChapitre 6 Autres applications 83
Affichage de l’emplacement de l’adresse d’une
personne répertoriée dans votre liste des
contacts
Touchez dans le champ de recherche, puis
touchez Contacts et choisissez un contact.
Pour situer une adresse de cette façon, le contact
doit inclure au moins une adresse. Si le contact
compte plusieurs adresses, vous devez choisir
l’adresse que vous souhaitez localiser. Vous
pouvez également trouver l’emplacement d’une
adresse en touchant l’adresse directement dans
Contacts.
Ajout d’un lieu à votre liste des contacts Recherchez un lieu, touchez l’épingle qui lui est
associée, touchez à côté du nom ou de la
description, puis touchez « Créer un nouveau
contact » ou « Ajouter un contact ».
Mise en signet d’emplacements
Vous pouvez associer des signets aux emplacements que vous souhaitez retrouver
ultérieurement.
Mise en signet d’un emplacement : Recherchez un lieu, touchez l’épingle qui lui est
associée, touchez à côté du nom ou de la description, puis touchez Ajouter aux
signets.
Afficher un emplacement mis en signet ou accédé récemment : Touchez dans le
champ de recherche, puis touchez Signets ou Historique.
Itinéraires
Vous pouvez obtenir un itinéraire pas à pas vers la destination de votre choix.
Obtention d’itinéraires :
1 Touchez Itinéraire.
2 Saisissez les lieux de départ et d’arrivée dans les champs de départ et d’arrivée. Par
défaut, l’iPod touch démarre l’application sur l’emplacement approximatif actuel (si les
informations sont disponibles). Touchez dans l’un des champs, puis choisissez un
emplacement dans Signets (dont votre emplacement approximatif actuel et l’épingle
déposée, le cas échéant), Historique ou Contacts.
Par défaut, “iPhone” part de votre emplacement approximatif (en cas de disponibilité
du service).
Pour inverser l’itinéraire, touchez .
3 Touchez Itinéraire, puis effectuez l’une des opérations suivantes :
 Pour afficher un itinéraire étape par étape, touchez Départ, puis touchez pour afficher la partie suivante de l’itinéraire. Touchez Itinéraire, puis effectuez l’une des
opérations suivantes :Â Pour afficher tous les itinéraires d’une liste, touchez puis touchez Liste. Touchez
n’importe quel élément de la liste pour afficher un plan représentant ce tronçon du
trajet.
Le temps de conduit approximatif apparaît en haut de l’écran. Si des données de circulation sont disponibles, la durée du trajet est modifiée en conséquence.
Pour trouver un itinéraire, vous pouvez également trouver un emplacement sur la
carte, touchez l’épingle qui lui correspond, touchez puis touchez Itinéraire vers ce
lieu ou Itinéraire à partir de ce lieu.
Basculer les points de départ et d’arrivée pour inverser l’itinéraire : Touchez .
Si ne s’affiche pas, touchez Liste, puis touchez Modifier.
Afficher les itinéraires récemment consultés : Touchez dans le champ de recherche, puis touchez Historique.
Afficher l’état de la circulation
Lorsque cela est possible, vous avez accès à l’état de la circulation des autoroutes sur le
plan.
Afficher ou masquer l’état de la circulation : Touchez , puis touchez Afficher la circulation ou Masquer la circulation.
84 Chapitre 6 Autres applicationsChapitre 6 Autres applications 85
Selon l’état de la circulation, des codes de couleur sont attribués aux autoroutes :
Gris = aucune donnée disponible
actuellement
Rouge = moins de 40 km/h
Jaune = entre 40 et 80 km/h
Vert = plus de 80 km/h
Si les autoroutes ne sont pas codées par des couleurs, vous risquez de devoir effectuer
un zoom arrière jusqu’au niveau ou les routes principales apparaissent. Il est aussi possible que l’état de la circulation ne soit pas disponible pour la région concernée.
Recherche et contact de commerces
Recherche d’un commerce :
1 Recherchez un lieu (tel qu’une ville et une région ou un pays ou une adresse postale)
ou faites défiler vers un lieu d’une carte.
2 Tapez le type de commerce dans le champ texte et touchez Rechercher.
Des épingles apparaissent pour les emplacements correspondants. Par exemple, si
vous localisez votre ville, tapez « films », puis touchez Rechercher, des épingles indiquent tous les cinémas de l’endroit où vous habitez.
Touchez l’épingle qui indique un commerce pour en afficher le nom ou la description.
Rechercher des commerces sans commencer par rechercher l’emplacement : Tapez
des mots-clés, tels que :
 restaurants paris france
 apple inc new yorkContacter un commerce ou demander un itinéraire : Touchez l’épingle qui pointe
vers une entreprise, puis touchez à côté du nom.
Obtenir des itinéraires
Visiter le site web
Tapotez sur pour
afficher les informations
sur le contact
Vous pouvez procéder comme suit :
 Touchez un numéro de téléphone à appeler, une adresse électronique à laquelle
envoyer un message électronique ou une adresse web à consulter.
 Pour obtenir des itinéraires, touchez Itinéraire à partir d’ici ou Itinéraire jusqu’ici.
 Pour ajouter le commerce à votre liste des contacts, faites défiler et touchez Créer
un nouveau contact ou « Ajouter au contact ».
Consulter une liste des commerces trouvés au cours de la recherche : Dans l’écran
Carte, touchez Liste.
Touchez un commerce pour voir son emplacement. Vous pouvez également toucher à côté d’un commerce pour afficher les informations qui lui sont associées.
Météo
Utilisez Météo pour obtenir la température actuelle et voir une prévision météorologique sur six jours pour une ou plusieurs villes mondiales.
86 Chapitre 6 Autres applicationsChapitre 6 Autres applications 87
Affichage de bulletins météo
Touchez Météo à partir de l’écran d’accueil pour afficher la météo actuelle pour la ville
sélectionnée.
Prévisions à 6 jours
Température actuelle
Conditions actuelles
Minima et maxima du jour
Ajouter et supprimer
des villes
Nombre de villes enregistrées
Si le tableau météo est bleu clair, il fait jour dans cette ville, c’est-à-dire entre 6 h 00 et
18 h 00. Si le tableau météo est violet foncé, il fait nuit dans cette ville, c’est-à-dire entre 18h00 et 6h00.
Ajout d’une ville :
1 Touchez , puis .
2 Saisissez un nom de ville ou un code postal, puis touchez Rechercher.
3 Choisissez une ville dans la liste de recherche.
Passage à une autre ville : Feuilletez vers la gauche ou la droite Le nombre de points
apparaissant au-dessous du tableau météo indique le nombre de villes stockées
Réorganisation des villes : Touchez , puis faites glisser à côté d’une ville vers un
nouvel emplacement dans la liste.
Suppression d’une ville : Touchez et touchez à côté d’une ville, puis touchez
Supprimer.
Affichage de la température en degrés Fahrenheit ou Celsius : Touchez , puis touchez °F ou °C.
Obtention de bulletins météo supplémentaires
Vous pouvez visualiser un bulletin météo plus détaillé, des nouvelles et des sites web
associés à la ville, par exemple.
Consultez des informations à propos d’une ville sur Yahoo.com : Touchez .Horloge
Horloge vous permet d’afficher l’heure à différents endroits du monde, de définir une
alarme, d’utiliser un chronomètre et de régler une minuterie.
Horloges mondiales
Vous pouvez ajouter des horloges pour afficher l’heure dans d’autres villes importantes
du monde et d’autres fuseaux horaires.
Afficher les horloges : Touchez Horloge.
Si la face de l’horloge est blanche, il fait jour dans la ville correspondance. Si la face est
noire, il y fait nuit. Si vous avez plus de quatre horloges, feuilletez pour les faire défiler.
Ajouter une horloge :
1 Touchez Horloge.
2 Touchez , puis tapez le nom d’une ville.
Ajout d’une horloge
3 Touchez une ville pour ajouter une horloge qui lui correspond.
Si vous ne voyez pas la ville que vous recherchez, essayez une autre ville située dans le
même fuseau horaire.
Suppression d’une horloge : Touchez Horloges puis Modifier. Touchez ensuite à
côté d’une horloge et touchez Supprimer.
Réordonner les horloges : Touchez Horloges puis Modifier. Faites ensuite glisser à
côté d’une horloge vers un nouvel emplacement dans la liste.
Alarmes
Vous pouvez régler plusieurs alarmes. Réglez chaque alarme de manière qu’elle sonne
les jours que vous indiquez, ou une seule fois.
Réglage d’une alarme :
1 Touchez Alarme puis .
2 Ajustez l’un des réglages suivants :
 Pour régler une alarme de manière qu’elle se répète certains jours, touchez Récurrence
et choisissez les jours.
 Pour choisir la sonnerie d’une alarme, touchez Sonorité.
88 Chapitre 6 Autres applicationsChapitre 6 Autres applications 89
 Pour indiquer si un rappel est associé à l’alarme, activez ou désactivez Rappel d’alarme.
Si l’option Rappel d’alarme est activée et que vous touchez Rappel d’alarme lorsque
l’alarme sonne, celle-ci s’arrête et sonne à nouveau dix minutes plus tard..
 Pour donner une description à l’alarme, touchez Libellé. L'iPod touch affiche le libellé
lorsque l’alarme sonne.
Si au moins une alarme est réglée et activée, l’icône apparaît dans la barre d’état de
l’iPod touch, en haut de l’écran.
Activation et désactivation d’une alarme : Touchez Alarme et activez ou désactivez
l’alarme de votre choix. Si une alarme est désactivée, elle ne sonnera plus sauf si vous
la réactivez.
Si une alarme est réglée pour ne sonner qu’une fois, elle se désactive automatiquement après avoir sonné. Vous pouvez la réactiver.
Modification des réglages d’une alarme : Touchez Alarme puis Modifier, puis touchez
à côté de l’alarme que vous souhaitez modifier.
Suppression d’une alarme : Touchez Alarme puis touchez Modifier et à côté de
l’alarme et touchez Supprimer.
Chronomètre
Utilisez le chronomètre pour chronométrer un événement :
1 Touchez Chronomètre.
2 Touchez Démarrer pour démarrer le chronomètre
 Pour enregistrer les temps au tour, touchez Tour après chaque tour.
 Pour mettre le chronomètre en pause, touchez Arrêter. Touchez Démarrer pour
redémarrer.
 Pour réinitialiser le chronomètre, touchez Réinitialiser lorsque le chronomètre est en
pause.
Si vous démarrez le chronomètre puis passez à une autre application de l’iPod touch,
le chronomètre continue à fonctionner en arrière-plan.
Minuterie
Réglage du minuteur : Touchez Minuteur, puis feuilletez pour régler le nombre d’heures et de minutes. Touchez Démarrer pour lancer le minuteur.
Choix de la sonnerie : Touchez Sonnerie.
Réglage d’une minuterie de veille : Réglez la minuterie, touchez Sonnerie et choisissez Mettre l’iPod en veille.
Lorsqu’une minuterie de veille est réglée, l’iPod touch arrête la lecture de la musique
ou de la vidéo lorsque la minuterie s’arrêteSi vous démarrez la minuterie puis passez à une autre application de l’iPod touch, la
minuterie continue à fonctionner en arrière-plan.
Calculette
Utilisation de la Calculette
Touchez les chiffres et fonctions de la Calculette comme vous le feriez avec une véritable calculatrice. Lorsque vous touchez sur le bouton d’addition, de soustraction, de
multiplication ou de division, un cadre blanc apparaît autour du bouton pour indiquer
l’opération à effectuer. Faites pivoter l’iPod touch pour obtenir une calculatrice scientifique étendue.
Fonctions mémoire standard
 C : touchez pour effacer le nombre affiché.
 MC : touchez pour effacer la mémoire.
 M+ : touchez pour ajouter le nombre affiché au nombre en mémoire. Si la mémoire
ne contient aucun nombre, touchez pour stocker en mémoire le nombre affiché.
 M- : touchez pour soustraire le nombre affiché du nombre en mémoire.
 MR : touchez pour remplacer le nombre affiché par le nombre en mémoire. Si le
bouton est entouré d’un anneau blanc, un nombre est stocké en mémoire.
Le nombre affiché reste en mémoire lorsque vous basculez entre la calculatrice normale et la calculatrice scientifique.
Touches de la calculatrice scientifique
Faites pivoter l’iPod touch en orientation paysage pour afficher la calculatrice
scientifique.
90 Chapitre 6 Autres applicationsChapitre 6 Autres applications 91
2 Transforme les boutons trigonométriques (sin, cos, tan, sinh, cosh et tanh) en leur
fonction inverse (sin-1, cos-1, tan-1, sinh-1, cosh-1 et tanh-1). Transforme également
ln en log2 et e
x
en 2
x
. Touchez à nouveau 2 pour restituer les fonctions d’origine des
boutons.
( Ouvre une expression entre parenthèses. Les expressions peuvent être imbriquées.
) Ferme une expression entre parenthèses.
% Calcule des pourcentages, ajoute des majorations et soustrait des remises. Pour calculer le pourcentage, utilisez-le avec la touche de multiplication (x). Par exemple, pour
calculer 8 % de 500, saisissez
500 x 8 % =
ce qui retourne 40.
Pour ajouter une majoration ou soustraire une remise, utilisez-la avec la touche plus
(+) ou moins (–). Par exemple, pour calculer le coût total d’un article de 500 $ avec
une taxe de 8 %, saisissez
500 + 8 % =
ce qui retourne 540.
1/x Retourne l’inverse d’une valeur au format décimal.
x
2
Élève une valeur au carré.
x
3
Élève une valeur au cube.
y
x
Touchez entre deux valeurs pour élever la première à la puissance de la deuxième. Par
exemple, pour calculer 3^4, saisissez
3 y
x
4 =
ce qui retourne 81.
x! Calcule la factorielle d’une valeur.
√ Calcule la racine carrée d’une valeur.
x
√y Touchez entre deux valeurs x et y pour calculer la racine x-ième de y. Par exemple,
pour calculer
4
√81, saisissez
81
x
√y 4 =
ce qui retourne 3.
log Retourne le logarithme de base 10 d’une valeur.
sin Calcule le sinus d’une valeur.
sin
-1
Calcule le sinus inverse d’une valeur. (Disponible lorsque le deuxième bouton est
enfoncé.)
cos Calcule le cosinus d’une valeur.
cos
-1
Calcule le cosinus inverse d’une valeur. (Disponible lorsque le deuxième bouton est
enfoncé.)
tan Calcule la tangente d’une valeur.
tan
-1
Calcule la tangente inverse d’une valeur. (Disponible lorsque le deuxième bouton est
enfoncé.)
ln Calcule le logarithme naturel d’une valeur.log2 Calcule le logarithme de base 2 d’une valeur. (Disponible lorsque le deuxième bouton
est enfoncé.)
sinh Calcule le sinus hyperbolique d’une valeur.
sinh
-1
Calcule le sinus hyperbolique inverse d’une valeur. (Disponible lorsque le deuxième
bouton est enfoncé.)
cosh Calcule le cosinus hyperbolique d’une valeur.
cosh
-1
Calcule le cosinus hyperbolique inverse d’une valeur. (Disponible lorsque le deuxième
bouton est enfoncé.)
tanh Calcule la tangente hyperbolique d’une valeur.
tanh
-1
Calcule la tangente hyperbolique inverse d’une valeur. (Disponible lorsque le deuxiè-
me bouton est enfoncé.)
e
x
Touchez après avoir saisi une valeur pour élever la constante « e »
(2,718281828459045...) à la puissance correspondante.
2
x
Calcule 2 à la puissance correspondante. Par exemple, 10 2
x
= 1024. (Disponible lorsque le deuxième bouton est enfoncé.)
Rad Change de mode pour exprimer les fonctions trigonométriques en radians.
Deg Change de mode pour exprimer les fonctions trigonométriques en degrés.
π Entre la valeur de π (3,141592653589793...).
EE Opérateur qui multiplie la valeur affichée par 10 à la puissance de la valeur que vous
saisissez ensuite.
Rand Retourne un nombre aléatoire entre 0 et 1.
Notes
Rédaction et lecture de notes
Les notes sont classées par date d’ajout, la note la plus récente figurant au début de la
liste. Les premiers mots de chaque note apparaissent dans la liste
Ajout de note : Touchez , puis tapez la note et touchez OK.
Lecture d’une note : Touchez la note. Touchez ou pour afficher la note précé-
dente ou suivante.
Modification d’une note : Touchez la note, n’importe où, pour activer le clavier.
Suppression d’une note : Touchez la note, puis touchez .
92 Chapitre 6 Autres applicationsChapitre 6 Autres applications 93
Envoi de note par courrier électronique
Envoi d’une note par courrier électronique : Touchez la note, puis touchez .
Pour envoyer une note par courrier électronique, l’iPod touch doit être configuré pour
le courrier électronique. Voir ªOrganisation du courrier électronique» à la page 74.
Contacts
Importation et synchronisation des contacts
Vous pouvez ajouter des contacts à l’iPod touch des manières suivantes :
 Dans iTunes, synchronisez vos contacts avec des applications de votre
ordinateurªSynchronisation avec iTunes» à la page 6(voir la section “Synchronisation
avec iTunes”)
 Configuration de comptes MobileMe ou Microsoft Exchange sur l’iPod touch, avec
Calendrier activé (voir la section ªConfiguration de comptes.» à la page 11)
 Installez un profil qui configure un compte Exchange avec Calendrier
activéªInstallation de profils de configuration» à la page 13(voir la section
“Installation de profils de configuration”)
 Saisie de contacts directement sur l’iPod touch
 Importation de contacts à partir d’une carte SIM
Recherche de contacts
Vous pouvez rechercher des contacts synchronisés avec l’iPod touch par nom, adresse
ou toute autre information incluse dans les contacts. Si vous avez configuré un compte
Microsoft Exchange sur l’iPod touch, vous pourrez peut-être rechercher dans la liste
globale d’adresses (GAL) de votre entreprise des contacts à l’intérieur de l’organisation.
Lorsque vous tapez des informations de recherche, les contacts dont les informations
correspondent apparaissent immédiatement au cours de la saisie.
Recherche de contacts : Dans Contacts, touchez le champ de recherche situé en haut
de toute liste de contacts et saisissez un nom, une adresse ou d’autres informations.
Recherche dans un GAL : Touchez Groupes, touchez Annuaires au bas de la liste puis
saisissez un nom, une adresse ou d’autres informations.
Vous ne pouvez pas modifier les contacts de votre GAL ni les enregistrer sur votre
iPod touch.Gestion des contacts sur l’iPod touch
Ajout d’un contact sur l’iPod touch: Touchez Contacts puis .
Suppression d’un contact Dans Contacts, choisissez un contact, puis touchez Modifier. Faites défiler et touchez Supprimer
le contact.
Ajout d’un contact depuis le clavier Touchez Clavier et saisissez un numéro, puis
touchez . Touchez Créer un nouveau contact
et saisissez les informations de l’appelant, ou
touchez « Ajouter à un contact » et choisissez un
contact.
Modification des informations de contact Dans Contacts, choisissez un contact, puis touchez Modifier. Pour ajouter un élément, touchez
. Pour supprimer un élément, touchez .
Saisie d’une pause dans un numéro Touchez puis Pause. Les pauses apparaissent
sous la forme de virgules lorsque le numéro est
enregistré.
Attribution d’une photo à un contact :
1 Touchez Contacts et choisissez un contact.
2 Touchez Modifier et touchez Ajouter une photo ou touchez la photo existante.
3 Touchez Choisir une photo et choisissez une photo.
4 Faites glisser et redimensionnez la photo comme souhaité.
5 Touchez Valider.
94 Chapitre 6 Autres applications95
Réglages vous permet de personnaliser les applications de l’iPod touch , de régler la
date et l’heure, de configurer votre connexion réseau et de saisir d’autres préférences
pour l'iPod touch.
Wi-Fi
Les réglages Wi-Fi déterminent si l’iPod touch utilise des réseaux locaux Wi-Fi pour se
connecter à Internet.
Activation et désactivation du mode Wi-Fi : Choisissez Wi-Fi puis activez ou désactivez le mode Wi-Fi.
Rejoindre un réseau Wi-Fi : Choisissez Wi-Fi, patientez quelques instants pendant que
l’iPod touch détecte les réseaux à portée puis sélectionnez un réseau. Si nécessaire,
saisissez un mot de passe et touchez Rejoindre (Les réseaux qui nécessitent un mot de
passe sont accompagnés d’une icône de verrouillage .)
Une fois que vous avez rejoint manuellement un réseau Wi-Fi, l’iPod touch s’y connecte
automatiquement chaque fois que le réseau est à portée. Si plusieurs réseaux déjà utilisés se trouvent à portée, l’iPod touch se connecte au dernier réseau utilisé.
Lorsque l’iPod touch est connecté à un réseau Wi-Fi, l’icône Wi-Fi située dans la
barre d’état en haut de l’écran indique la force de la connexion. Le nombre de barres
affichées est proportionnel à la qualité du signal.
Réglage de l’iPod touch pour confirmer l’accès à un nouveau réseau : Choisissez WiFi et activez ou désactivez l’option « Confirmer l’accès ».
7
RéglagesLorsque vous essayez d’accéder à Internet, à l’aide de Safari ou Courrier par exemple,
et que vous n’êtes pas à portée d’un réseau Wi-Fi que vous avez déjà utilisé, cette
option indique à l'iPod touch de rechercher un autre réseau. L'iPod touch affiche une
liste des réseaux Wi-Fi disponibles que vous pouvez choisir. (Les réseaux qui nécessitent un mot de passe sont accompagnés d’une icône de verrouillage.) Si l’option
“Confirmer l’accès” est désactivée, vous devez rejoindre manuellement un réseau pour
vous connecter à Internet lorsqu’aucun réseau déjà utilisé ni aucun réseau de données
cellulaire n’est disponible.
Oubli de réseau de sorte que l’iPod touch ne s’y connecte plus automatiquement :
Choisissez Wi-Fi et touchez à côté d’un réseau auquel vous vous êtes connecté
auparavant. Touchez ensuite « Oublier ce réseau ».
Rejoindre un réseau Wi-Fi fermé : Pour rejoindre un réseau Wi-Fi qui n’est pas indiqué dans liste des réseaux découverts, choisissez Wi-Fi > Autre et saisissez le nom du
réseau. Si le réseau requiert un mot de passe, touchez Sécurité, sélectionnez le type de
sécurité qu’utilise le réseau puis saisissez le mot de passe.
Vous devez connaître le nom du réseau, le mot de passe et le type de sécurité afin de
vous connecter à un réseau fermé.
Certains réseaux Wi-Fi peuvent nécessiter la saisie ou l’ajustement de réglages supplé-
mentaires, par exemple un identifiant client ou une adresse IP statique. Demandez à
l’administrateur réseau quels réglages utiliser.
Ajustement des réglages pour vous connecter à un réseau : Choisissez Wi-Fi puis
touchez à côté d’un réseau.
VPN
Ce réglage apparaît lorsque vous avez configuré un réseau virtuel (VPN) sur
l’iPod touch, ce qui vous permet d’activer ou désactiver le mode VPN..ªRéseau» à la
page 98Voir la section “Réseau”.
Nouvelles données
Ce réglage vous permet d’activer ou de désactiver le mode Push pour MobileMe,
Microsoft Exchange, Yahoo! Mail, et tout autre compte « Push » que vous avez configuré sur l’iPod touch. Les comptes « Push » envoient automatiquement des nouvelles informations sur votre ordinateur ou sur l’iPod touch lorsqu’elles apparaissent sur le serveur. Vous pouvez désactiver le mode « Push » pour interrompre la livraison de courrier
électronique et d’autres informations ou augmenter l’autonomie de la batterie.
96 Chapitre 7 RéglagesChapitre 7 Réglages 97
Lorsque le mode « Push » est désactivé, ou pour les comptes qui ne gèrent pas
ce mode, il est toujours possible d’« aller récupérer » les données, c’est-à-dire que
l’iPod touch peut vérifier si de nouvelles informations sont disponibles sur le serveur.
Utilisez le réglage Nouvelles données pour indiquer à quelle fréquence demander les
données. Pour optimiser l’autonomie de votre batterie, indiquez une fréquence faible.
Activation du mode « Push » : Touchez Nouvelles données puis touchez pour activer
le mode « Push ».
Réglage de l’intervalle de récupération des données : Touchez Nouvelles données
puis touchez la fréquence avec laquelle vous souhaitez récupérer des données pour
tous les comptes.
Limitez cette fréquence pour augmenter l’autonomie de la batterie.
Pour des renseignements sur la manière d’ajuster les réglages de compte avancés,
consultez la section “Comptes”.ªComptes» à la page 105
Luminosité
La luminosité de l’écran influe sur l’autonomie de la batterie. Baissez la luminosité de
l’écran pour prolonger la période avant qu’une recharge de l'iPod touch devienne né-
cessaire ou utilisez le mode Réglage automatique.
Réglage de la luminosité de l’écran : Choisissez Luminosité et faites glisser le curseur.
Réglage de l’ajustement automatique de la luminosité de l’iPod touch : Choisissez
Luminosité et activez ou désactivez Luminosité automatique. Si la luminosité automatique est activée, l'iPod touch ajuste la luminosité de l’écran en fonction des conditions
d’éclairage actuelles à l’aide du capteur de lumière ambiante intégré.
Général
Les réglages Général comprennent la date et l’heure, la sécurité, le réseau et d’autres
réglages ayant un effet sur plusieurs applications. Ces réglages permettent également
d’obtenir des informations concernant l'iPod touchet de restaurer les réglages d’origine de l'iPod touch.
Informations
Choisissez Général > Informations pour obtenir des renseignements sur l’iPod touch,
notamment :
 le nombre de morceaux, vidéos et photos qu’il contient ;
 la capacité totale de stockage ;
 l’espace disponible ; la version du logiciel ;
 les numéros de série et de modèle ;
 les adresses Wi-Fi ;
 les informations légales.
Fond d’écran
Une photo apparaît en tant que fond d’écran lorsque vous déverrouillez votre
iPod touch. Vous pouvez sélectionner l’une des images fournies avec l’iPod touchou
utiliser une photo que vous avez synchronisée avec l'iPod touch à partir de votre
ordinateur.
Choix du fond d’écran : Choisissez Fond d’écran et choisissez une photo.
Effets sonores
iPod touch peut produire des effets sonores lorsque vous :
 réception d’une alerte que vous avez configurée ;
 verrouillez ou déverrouillez l’iPod touch
 effectuez une saisie à l’aide du clavier.
Activation et désactivation des effets sonores : Choisissez Général > Effets sonores et
indiquez si vous souhaitez que les effets sonores soit émis par le haut-parleur interne,
le casque ou les deux. Sélectionnez Non pour désactiver les effets sonores.
Réseau
Utilisez les réglages Réseau pour configurer une connexion VPN (réseau privé virtuel)
ou les réglages d’accès Wi-Fi., ou pour activer ou désactiver les Données à l’étranger.
Ajout d’une nouvelle configuration VPN : Choisissez Général > Réseau > VPN >
Ajouter une configuration VPN.
Les connexions VPN utilisées au sein d’organisations vous permettent de communiquer des informations privées de manière sécurisée sur un réseau non privé. Vous pouvez être amené à configurer un réseau VPN pour notamment accéder à votre compte
de courrier électronique professionnel sur l’iPod touch.
iPod touch peut se connecter à des réseaux VPN utilisant les protocoles L2TP, PPTP
ou Cisco IPSec. Les réseaux VPN fonctionnent à la fois sur les connexions Wi-Fi et les
connexions de réseau de données cellulaire.
Demandez à votre administrateur réseau quels réglages utiliser. Dans la plupart des
cas, si vous avez configuré un VPN sur votre ordinateur, vous pouvez utiliser les mêmes
réglages de VPN pour l'iPod touch.
98 Chapitre 7 RéglagesChapitre 7 Réglages 99
Lorsque vous avez saisi les réglages de la connexion VPN, un commutateur VPN apparaît au niveau supérieur du menu Réglages. Vous pouvez l’utiliser pour activer ou
désactiver la connexion VPN.
Modification d’une configuration VPN : Choisissez Général > Réseau > VPN et touchez la configuration que vous souhaitez mettre à jour.
Activation et désactivation du réseau VPN : Touchez Réglages et activez ou désactivez VPN.
Suppression d’une configuration VPN : Choisissez Général > Réseau > VPN, touchez
la flèche bleue située à droite du nom de la configuration puis touchez Supprimer le
VPN au bas de l’écran de configuration.
Utilisation du mode Wi-Fi : ªWi-Fi» à la page 95Voir la section “Wi-Fi”.
Service de localisation
Service de localisation permet aux applications telles que Plans et Appareil photo de
recueillir et utiliser des données indiquant votre emplacement. Service de localisation
ne corrèle pas les données recueillies avec vos informations personnelles. Votre emplacement approximatif est déterminé à l’aide des informations disponibles provenant
des données du réseau cellulaire, réseaux Wi-Fi locaux (si vous avez activé le mode WiFi) et GPS (si vous avez un “iPhone G”).réseaux Wi-Fi locaux (si vous avez activé le mode
Wi-Fi).
Vous pouvez désactiver Service de localisation si vous ne souhaitez pas utiliser cette
fonction. Si vous désactivez Service de localisation, il vous sera demandé de le réactiver la prochaine fois qu’une application tente d’utiliser la fonction.
Activation et désactivation de Service de localisation : Choisissez Général > Service
de localisation et activez ou désactivez l’option Service de localisation.
Remarque : Pour économiser l’autonomie de la batterie, désactivez l’option Service de
localisation lorsque vous ne l’utilisez pas.
Verrouillage automatique
Le verrouillage de l’iPod touch désactive l’affichage de manière à économiser votre
batterie et à empêcher toute utilisation de l'iPod touch.
Réglage de la durée de déclenchement du verrouillage de l’iPod touch : Choisissez
Général > Verrouillage auto. et choisissez une durée.Verrouillage par code
Par défaut, l’iPod touch ne vous oblige pas à saisir un code pour le déverrouiller .
Définition d’un mot de passe : Choisissez Général > Verrouillage par code et saisissez un code de 4 chiffres puis saisissez le code à nouveau à titre de vérification.
L'iPod touch vous demande alors de saisir le code pour le déverrouiller.
Désactivation du verrouillage par code : Choisissez Général > Verrouillage par code
et touchez Désactiver le code, puis saisissez votre code.
Changement de code : Choisissez Général > Verrouillage par code et touchez
Changer le code, saisissez votre code actuel puis saisissez deux fois votre nouveau
code.
Si vous oubliez votre code, vous devrez restaurer le logiciel de l’iPod touch. Voir ª» à la
page 118.
Réglage du délai d’activation du verrouillage par code : Choisissez Général >
Verrouillage par code > Exiger le code, puis sélectionnez le délai d’inactivité de
l'iPod touch avant que vous deviez saisir votre code pour le déverrouiller.
Affichage d’un aperçu des SMS lorsque l’iPod touch est verrouillé : Choisissez
Général > Verrouillage par code et touchez pour activer l’aperçu des SMS.
Restrictions
Vous pouvez définir des restrictions pour le contenu iPod utilisable par certaines applications de l’iPod touch. Par exemple, les parents peuvent limiter l’accès à de la musique au contenu explicite dans les listes de lecture ou désactiver intégralement l’accès
à YouTube.
Tout contenu musical ou vidéo explicite acheté sur l’iTunes Store sera masqué. Le
contenu explicite est marqué comme tel par leurs distributeurs (comme les maisons
de disques) lorsqu’ils sont vendus sur l’iTunes Store.
Safari est désactivé et son icône est supprimée de l’écran principal. Vous ne pouvez
pas naviguer sur Internet ou accéder aux Web Clips.
YouTube est désactivé et son icône est supprimée de l’écran principal.
L’iTunes Wi-Fi Music Store est désactivé et son icône est supprimée de l’écran principal. Vous ne pouvez pas écouter un extrait, acheter ou télécharger du contenu.
L’App Store est désactivé et son icône est supprimée de l’écran principal. Vous ne
pouvez pas installer d’applications lorsque l’iPod touch se synchronise avec iTunes.
100 Chapitre 7 RéglagesChapitre 7 Réglages 101
Définition de restrictions :
1 Choisissez Général > Restrictions puis touchez Activer les restrictions.
2 Saisissez le code à quatre chiffres.
3 Saisissez-le à nouveau.
4 Définissez les restrictions souhaitées en activant ou désactivant les commandes individuelles. Par défaut, toutes les commandes sont activées (pas de restrictions). Touchez
un élément pour le désactiver ou restreindre son utilisation.
Désactivation de toutes les restrictions : Choisissez Général > Restrictions, puis saisissez le code. Touchez Désactiver les restrictions, puis saisissez à nouveau le code.
Si vous oubliez votre code, vous devrez restaurer le logiciel de l’iPod touch à partir
d’iTunes. Voir ª» à la page 118.
Date et heure
Ces réglages s’appliquent à l’heure indiquée dans la barre d’état en haut de l’écran et
dans les horloges mondiales et calendriers.
Définition du format 24 heures ou 12 heures de l'iPod touch : Choisissez Général >
Date et heure et activez ou désactivez l’option Réglage automatique.
Réglage manuel de la date et de l’heure : Choisissez Général > Date et heure et dé-
sactivez l’option Réglages automatiques. Touchez Fuseau horaire et saisissez le nom
d’une ville principale située dans votre fuseau horaire. Touche le bouton de retour
« Date et heure » puis touchez « Régler la date et l’heure » et saisissez la date et l’heure.
Clavier
Activation et désactivation des majuscules automatiques : Choisissez Général >
Clavier et activez ou désactivez l’option Maj. automatiques.
Par défaut, l’iPod touch capitalise automatiquement les mots lorsque vous tapez un
signe de ponctuation terminant une phrase ou le caractère de retour à la ligne
Activation et désactivation du verrouillage des majuscules : Choisissez Général >
Clavier et activez ou désactivez l’option Maj. verrouillées.
Si le verrouillage des majuscules est activé et que vous double-touchez la touche Maj
du clavier, toutes les lettres que vous tapez sont en majuscules. La touche Maj devient bleue lorsque le verrouillage de majuscules est activé.
Activation et désactivation du raccourci clavier « . » : Choisissez Général > Clavier et
activez ou désactivez le raccourci « . ».
Le raccourci « . » vous permet de double-toucher la barre d’espace pour saisir un point
suivi d’un espace lors de la frappe. Il est activé par défaut.Activation et désactivation des claviers internationaux Choisissez Général > Claviers
> Claviers internationaux et activez les claviers souhaités.
Si plusieurs claviers sont activés, touchez pour basculer entre eux lorsque vous tapez du texte. Lorsque vous touchez le symbole, le nom du nouveau clavier actif apparaît brièvement.
ªClaviers internationaux» à la page 25Voir la section “Claviers internationaux”.
International
Utilisez les réglages International pour définir la langue de l'iPod touch, activer ou dé-
sactiver les claviers de différentes langues et régler les formats de date, d’heure et de
numéro de téléphone pour votre région.
Réglage de la langue de l’iPod touch : Choisissez Général > International > Langue,
choisissez la langue souhaitée et touchez OK.
Activation et désactivation des claviers internationaux Choisissez Général >
International > Claviers internationaux et activez les claviers souhaités.
Si plusieurs claviers sont activés, touchez pour basculer entre eux lorsque vous
tapez du texte. Lorsque vous touchez le symbole, le nom du nouveau clavier actif
apparaît brièvement.ªClaviers internationaux» à la page 25Voir la section “Claviers
internationaux”.
Réglage des formats de date, d’heure et de numéro de téléphone : Choisissez
Général > International > Format régional, et choisissez votre région.
Réinitialisation de l'iPod touch
Réinitialisation de tous les réglages : Choisissez Général > Réinitialiser et touchez
Réinitialiser les réglages réseau.
Vos préférences et réglages sont tous réinitialisés. Les informations, telles que vos
contacts, calendriers et les fichiers multimédias (musique et vidéo) ne sont pas
supprimées.
Effacer tout le contenu et les réglages : Connectez l’iPod touch à votre ordinateur ou
à un adaptateur secteur. Choisissez Général > Réinitialiser et touchez « Effacer contenu
et réglages ».
Cette fonctionnalité réinitialise tous les réglages à leurs valeurs par défaut et supprime de manière définitive toutes vos informations et éléments multimédias de votre
iPod touch en effaçant toutes les données stockées sur l’iPod touch.
102 Chapitre 7 RéglagesChapitre 7 Réglages 103
Important : Vous ne pouvez pas utiliser votre iPod touch pendant que les données
sont en cours d’effacement. Cette opération peut prendre une à quatre heures ou plus
en fonction de la capacité de stockage de votre iPod touch.
Réinitialisation du dictionnaire clavier : Choisissez Général > Réinitialiser et touchez
Réinitialiser le dictionnaire clavier.
Vous ajoutez des mots au dictionnaire du clavier en rejetant les mots que l’iPod touch
suggère lors de la frappe. Touchez un mot pour rejeter la correction et ajouter votre
mot au dictionnaire de clavier. La réinitialisation du dictionnaire de clavier efface tous
les mots que vous avez ajoutés.
Réinitialisation des réglages réseau : Choisissez Général > Réinitialiser et touchez
Réinitialiser les réglages réseau.
Lorsque vous réinitialisez les réglages réseau, la liste des réseaux déjà utilisés et des
réglages VPN est supprimée. Wi-Fi est désactivé puis réactivé : vous êtes alors déconnecté de tout réseau le cas échéant. Les réglages Wi-Fi et « Confirmer l’accès » restent
activés.
Réinitialisation de la disposition de l’écran principal : Choisissez Général >
Réinitialiser et touchez Réinitialiser l’écran principal.
Réinitialisation des alertes de localisation : Choisissez Général > Réinitialiser et touchez Réinitialiser alertes de localisation.
Les alertes de localisation sont les demandes d’utilisation de Service de localisation effectuées par les applications (notamment Appareil et Plans). L'iPod touch arrête d’afficher l’alerte associée à une application la deuxième fois que vous touchez OK. Touchez
Réinitialiser alertes de localisation pour reprendre l’utilisation des alertes.
Musique
Les réglages Musique s’appliquent aux morceaux, aux podcasts et aux livres audio.
Réglage d’iTunes de manière à lire tous les morceaux au même niveau sonore : Dans iTunes, choisissez iTunes > Préférences si vous utilisez un Mac, ou Édition
> Préférences si vous utilisez un PC, puis cliquez sur Lecture et sélectionnez Égaliseur
de volume.
Réglage de l’iPod touch de manière à utiliser les réglages de volume d’iTunes
(Égaliseur de volume) :Choisissez Musique et activez l’option Égaliseur de volume.
Vous pouvez augmenter la vitesse de lecture des livres audio pour de manière à les
entendre plus rapidement, ou diminuer la vitesse de manière à les entendre plus
clairement.Réglage de la vitesse de lecture des livres audio : Choisissez Musique > Vitesse livres
audio puis choisissez lente, normale ou rapide.
Utilisation de l’égaliseur pour modifier le son de l’iPod touch de manière à s’adapter
à un son ou style donné : Choisissez Musique > Égaliseur et choisissez un réglage.
Réglage d’une limite de volume pour la musique et les vidéos : Choisissez Musique
> Volume maximum et faites glisser le curseur pour régler le volume maximum.
Touchez Verrouiller le volume maximum pour affecter un code de manière à éviter que
le réglage ne soit modifié.
AVERTISSEMENT : Des informations importantes sur la prévention de la perte d’audition sont disponibles dans le Guide des informations importantes sur le produità la
page www.apple.com/ca/fr/support/manuals/ipodtouch.
Vidéo
Les réglages vidéo s’appliquent au contenu vidéo, y compris les films loués. Vous pouvez régler à quel endroit reprendre la lecture des vidéos que vous avez démarrées
auparavant, activer ou désactiver les sous-titres et régler l’iPod touch de manière à restituer les vidéos sur votre téléviseur.
Réglage du point de reprise de lecture : Choisissez Vidéo > Démarrer, puis sélectionnez si vous souhaitez que les vidéos dont vous avez commencé la lecture reprennent
au début ou à l’endroit où vous avez les avez interrompues.
Activation et désactivation des sous-titres : Choisissez Vidéo et activez ou désactivez
l’option Sous-titres codés.
Utilisez ces réglages pour définir la manière dont l’iPod touch restitue les vidéos sur
votre téléviseur. Pour plus de renseignements sur l’utilisation de l’iPod touch de manière à restituer des vidéos sur votre téléviseur, consultez la section ª» à la page 40.
Activation et désactivation de l’écran large : Choisissez iPodVidéo et activez ou dé-
sactivez l’option Écran large.
Réglage du signal TV sur NTSC ou PAL : Choisissez iPodVidéo > Signal télévision et
sélectionnez NTSC ou PAL.
NTSC et PAL sont des normes de diffusion de télévision. NTSC affiche 480i et PAL affiche 576i. Votre téléviseur peut utiliser l’une ou l’autre de ces normes suivant l’endroit
où il a été commercialisé. Si vous n’êtes pas sûr du réglage à utiliser, vérifiez la documentation qui accompagne votre téléviseur.
104 Chapitre 7 RéglagesChapitre 7 Réglages 105
Photos
Utilisez les réglages Photos pour indiquer la façon dont les diaporamas affichent vos
photos.
Réglage de la durée d’affichage de chaque diapositive : Choisissez Photos > Afficher
chaque photo pendant et sélectionnez la durée.
Réglage d’un effet de transition : Choisissez Photos > Transition et sélectionnez un
effet de transition.
Réglage de la répétition des diaporamas : Choisissez Photos et activez ou désactivez
la répétition.
Réglage de l’apparition des photos par ordre aléatoire ou trié : Choisissez Photos et
activez ou désactivez la lecture aléatoire.
Mail, Contacts, Calendrier
Utilisez les réglages Mail, Contacts, Calendrier pour configurer et personnaliser les
comptes associés à votre iPod touch:
 Microsoft Exchange
 MobileMe
 Google Mail
 Carnet d’adresses Yahoo!, Mail
 AOL
 Autres systèmes de messagerie POP et IMAP
Comptes
La section Comptes vous permet de configurer des comptes sur votre iPod touch. Les
réglages spécifiques qui apparaissent dépendent du type de compte que vous configurez. Votre prestataire de service ou administrateur système doit pouvoir vous fournir
les informations nécessaires.
Pour plus de renseignements sur l’ajout de comptes, consultez la section
“Configuration de comptes”.ªConfiguration de comptes.» à la page 11
Modification des réglages d’un compte : Choisissez « Mail, Contacts, Calendrier »,
choisissez un compte puis effectuez les modifications souhaitées.
Les modifications apportées aux réglages d’un compte ne sont pas synchronisées avec
votre ordinateur. Vous pouvez donc configurer vos comptes pour qu’ils fonctionnent
avec votre iPod touch sans toucher les réglages de compte sur votre ordinateur.Interruption de l’utilisation d’un compte : Choisissez « Mail, Contacts, Calendrier »,
choisissez un compte puis désactivez l’option Compte.
Lorsqu’un compte est désactivé, l'iPod touch ne l’affiche pas, n’y envoie pas de courrier
électronique et ne vérifie pas le courrier électronique associé et ne synchronise aucune autre information avec ce compte tant que vous ne le réactivez pas.
Ajustement des réglages avancés : Choisissez « Mail, Contacts, Calendrier », choisissez
un compte puis effectuez l’une des opérations suivantes :
 Pour indiquer si les brouillons, les messages envoyés et les messages supprimés sont
stockés sur l’iPod touch ou à distance sur votre serveur de messagerie (comptes IMAP
uniquement), touchez Avancé et choisissez Brouillons, Messages envoyés ou Messages
supprimés.
Si vous stockez des messages sur l’iPod touch, vous pouvez alors les consulter
même si l’iPod touch n’est pas connecté à Internet.
 Pour régler la période après laquelle les messages sont supprimés de manière définitive
de Mail sur votre iPod touch, touchez Avancé puis touchez Supprimer, puis choisissez
une durée : Jamais, Après un jour, d’une semaine ou d’un mois.
 Pour ajuster les réglages du serveur de messagerie, sous « Serveur de réception »
ou « Serveur d’envoi », touchez Nom d’hôte, Nom d’utilisateur ou Mot de passe.
Demandez les réglages appropriés à l’administrateur de votre réseau ou à votre
fournisseur d’accès à Internet.
 Pour ajuster les réglages SSL et de mot de passe, touchez Avancé. Demandez les réglages appropriés à l’administrateur de votre réseau ou à votre fournisseur d’accès à
Internet.
Suppression d’un compte de l’iPod touch: Choisissez « Mail, Contacts, Calendrier »,
choisissez un compte puis faites défiler vers le bas et touchez Supprimer le compte.
La suppression d’un compte revient à supprimer l’accès au compte à partir de votre iPod touch. Tous les messages électroniques et les informations sur les contacts,
calendriers et signets synchronisés avec le compte sont supprimés de l’iPod touch.
Cependant, la suppression d’un compte n’élimine pas le compte ou les informations
associées à ce compte de votre ordinateur.
Mail
Les réglages de Mail, sauf indication contraire, s’appliquent à tous les comptes configurés sur votre iPod touch.
Réglage du nombre de messages affichés sur l’iPod touch: Choisissez « Mail,
Contacts, Calendrier » > Afficher, puis choisissez un réglage.
106 Chapitre 7 RéglagesChapitre 7 Réglages 107
Pour les comptes Microsoft Exchange, choisissez le nombre de jours de courrier électronique que vous souhaitez télécharger. Pour tous les autres comptes, choisissez le
nombre de messages récents à afficher (25, 50, 75,100 ou 200). Pour télécharger des
messages supplémentaires, dans Mail, faites défiler vers le bas de votre boîte de réception et touchez « Télécharger...plus ».
Réglage du nombre de lignes de chaque messages affichées en aperçu dans la liste
de messages : Choisissez « Mail, Contacts, Calendrier » > Aperçu, puis choisissez un
réglage.
Vous pouvez choisir d’afficher jusqu’à cinq lignes de chaque message. Ainsi, vous pouvez vous faire une idée du contenu des messages mentionnés dans la liste d’une boîte
à lettres.
Réglage d’une taille de police minimale pour les messages : Choisissez « Mail,
Contacts, Calendrier » > Taille des caractères, puis choisissez petite, moyenne, grande,
très grande ou géante.
Réglage de l’affichage par l’iPod touch des libellés À et Cc dans les listes de messages : Choisissez « Mail, Contacts, Calendrier » puis activez ou désactivez l’option
Champs À / Cc.
Si l’option Champs À / Cc est activée, l’icône To ou Cc à côté de chaque message
d’une liste indique si le message vous a été directement envoyé ou si vous étiez en
copie.
Réglage de la confirmation de suppression de message sur l’iPod touch : Choisissez
« Mail, Contacts, Calendrier » et activez ou désactivez l’option Confirmer suppression.
Si l’option « Confirmer suppression » est activée, vous devez toucher , puis confirmer
en touchant Supprimer.
Réglage de l’envoi automatique de copie par l’iPod touch pour chaque message
envoyé : Choisissez Mail, puis activez ou désactivez l’option M’ajouter en Cci.
Réglage du compte de messagerie par défaut : Choisissez « Mail, Contacts,
Calendrier » > Compte par défaut, puis choisissez un compte.
Ce réglage détermine le compte à partir duquel est envoyé un message que vous
créez sur une autre application iPod touch , par exemple lorsque vous envoyez une
photo à partir de Photos or touchez l’adresse électronique d’un commerce dans Plans.
Pour envoyer le message à partir d’un compte différent, touchez le champ De dans le
message puis choisissez un autre compte.Ajout d’une signature à vos messages : Choisissez Mail > Signature, puis tapez une
signature.
Vous pouvez régler l’iPod touch de manière à ajouter une signature (par exemple votre
citation favorite ou votre nom, position et numéro de téléphone) au bas de chaque
message que vous envoyez.
Contacts
Réglage de l’ordre des contacts : Choisissez « Mail, Contacts, Calendrier » puis, sous
Contacts, touchez Ordre de tri et effectuez l’une des opérations suivantes :
 Pour afficher le prénom en premier, touchez Prénom Nom
 Pour afficher le nom en premier, Touchez Nom, Prénom.
Réglage de l’affichage des contacts : Choisissez « Mail, Contacts, Calendrier » puis,
sous Contacts, touchez Ordre d’affichage et effectuez l’une des opérations suivantes :
 Pour afficher le prénom en premier, touchez Prénom Nom.
 Pour afficher le nom de famille en premier, touchez Nom Prénom.
Calendrier
Configuration des alarmes sonores déclenchées à la réception d’une invitation à
une réunion : Choisissez « Mail, Contacts, Calendrier » et, sous Calendrier, touchez
« Alerte nouv. invitation » pour activer l’option.
Réglage de la période historique pendant laquelle les événements de calendrier
sont affichés sur l’iPod touch : Choisissez « Mail, Contacts, Calendrier » > Synchroniser,
puis choisissez une durée.
Activation de la gestion de fuseau horaire dans Calendrier.Choisissez « Mail, Contacts,
Calendrier » > Heure locale, puis activer l’option Heure locale. Pour sélectionner un fuseau horaire pour les calendriers, touchez Fuseau horaire et saisissez le nom d’une ville
importante.
Lorsque la gestion de fuseau horaire est activée, Calendrier affiche les dates et heures
des événements dans le fuseau horaire de la ville sélectionnée. Lorsque la gestion de
fuseau horaire est désactivée, Calendrier affiche les dates et heures des événements
dans le fuseau local, tel qu’indiqué par l’heure réseau.
Important : Lorsque vous êtes en déplacement, l’iPod touch peut ne pas afficher les
événements ou faire sonner les alertes à la bonne heure locale. Pour régler manuellement l’heure correcte, consultez la section “Date et heure”.ªDate et heure» à la page 101
108 Chapitre 7 RéglagesChapitre 7 Réglages 109
Safari
Les réglages Safari vous permettent de sélectionner votre moteur de recherche
Internet, de régler les options de sécurité et (pour les développeurs), d’activer le mode
débogage.
Général
Vous pouvez utiliser Google ou Yahoo! pour effectuer des recherches sur Internet.
Sélection d’un moteur de recherche : Choisissez Safari > Moteur de recherche et sé-
lectionnez le moteur de recherche que vous souhaitez utiliser.
Sécurité
Par défaut, Safari est réglé pour afficher des fonctions à partir du web, notamment
certains films, animations et applications web. Vous pouvez désactiver certaines de
ces possibilités afin de protéger l’iPod touch contre les risques liés à la sécurité sur
Internet.
Modification des réglages de sécurité : Choisissez Safari, puis effectuez l’une des opé-
rations suivantes :
 Pour activer ou désactiver JavaScript, activez ou désactivez l’option JavaScript.
JavaScript permet aux développeurs web de contrôler les éléments de la page. Par
exemple, une page qui utilise JavaScript pourrait afficher la date et l’heure actuelles
ou faire qu’une page liée apparaisse dans une nouvelle fenêtre surgissante.
 Pour activer ou désactiver les modules externes, activez ou désactivez l’option Modules.
Les modules externes permettent à Safari de lire certains types de fichiers audio et
vidéo et d’afficher des fichiers Microsoft Word et des documents Microsoft Excel.
 Pour bloquer ou autoriser les pop-up, activez ou désactivez la fonction Bloquer les
pop-up. Le blocage des pop-up empêche seulement l’apparition des fenêtres surgissantes qui apparaissent lorsque vous fermez une page ou ouvrez une page en tapant son adresse. Il ne bloque pas les pop-up qui apparaissent lorsque vous cliquez
sur un lien.
 Pour régler si Safari accepte les cookies, touchez Accepter les cookies et choisissez
Jamais, des sites visités ou Toujours.
Un cookie est un ensemble d’informations qu’un site web place sur l'iPod touch
pour que le site web se souvienne de vous lors de votre prochaine visite.Les pages
web peuvent ainsi être personnalisées pour vous en fonction des informations que
vous pouvez avoir fournies.
Certaines pages ne fonctionnent pas correctement tant que l’iPod touch n’est pas
réglé pour accepter les cookies..
 Pour effacer l’historique des pages web consultées, touchez Effacer l’historique.
 Pour effacer les cookies de Safari, touchez Effacer les cookies. Pour effacer la mémoire cache, touchez Vider le cache.
La mémoire cache du navigateur stocke le contenu des pages de manière qu’elles
s’ouvrent plus rapidement la prochaine fois que vous le consultez. Si une page que
vous avez ouverte n’affiche pas de nouveau contenu, l’effacement de la mémoire
cache est susceptible d’aider.
Développeur
La Console peut vous aider à résoudre des erreurs de page web. Si elle est activée, la
console apparaît automatiquement lorsqu’une erreur de page web se produit.
Activation et désactivation de la console de débogage : Choisissez Safari >
Développeur, et activez ou désactivez l’option Console.
110 Chapitre 7 Réglages111
Général
L’image de batterie faible apparaît
L’iPod touch n’est presque plus alimenté et doit être rechargé pendant un délai pouvant aller jusqu’à dix minutes avant de pouvoir l’utiliser. Pour plus de renseignements
sur la recharge de l’iPod touch, consultez la section ªRecharge de la batterie.» à la
page 28.
ou
L’iPod touch ne répond pas
 La batterie de l’iPod touch est peut-être faible. Connectez l’iPod touch à votre ordinateur ou à son adaptateur secteur pour le recharger. Voir la section ªRecharge de la
batterie.» à la page 28.
 Appuyez sur le bouton principal et maintenez-le enfoncé pendant au moins six
secondes jusqu’à ce que l’application que vous utilisiez se ferme.
 Si cela ne fonctionne pas, éteignez l’iPod touch puis rallumez-le. Maintenez le bouton de veille/réactivation enfoncé, situé en haut de l’iPod touch pendant quelques
secondes jusqu’à ce que le curseur rouge apparaisse, puis faites glisser le curseur.
Maintenez ensuite le bouton de veille/réactivation enfoncé jusqu’à ce que le logo
Apple apparaisse.
 Si cela ne donne rien, réinitialisez l’iPod touch. Maintenez enfoncé les boutons de
Marche/Veille et du menu principal pendant au moins dix secondes jusqu’à ce
que le logo Apple apparaisse.
A L’annexe
Dépannage112 L’annexe A Dépannage
L’iPod touch ne répond toujours pas après sa réinitialisation
 Réinitialisez les réglages de l’iPod touch. Dans l’écran d’accueil, choisissez Réglages
> Général > Réinitialiser > Réinitialiser tous les réglages. Toutes vos préférences sont
réinitialisées mais vos données et fichiers multimédias ne sont pas supprimés.
 Si cela ne donne rien, effacez tout contenu de l’iPod touch. Voir la section
ªRéinitialisation de l'iPod touch» à la page 102.
 Si cela reste sans effet, restaurez le logiciel de l’iPod touch. Voir la section ª» à la
page 118.
Le message « Cet accessoire n’est pas géré par l’iPod touch » apparaît.
L’accessoire que vous avez connecté peut ne pas fonctionner avec l’iPod touch.
Assurez-vous qu’aucun débris ne se trouve dans le connecteur Dock.
L’écran Connectez-vous à iTunes apparaît
L’L’iPod touch doit être enregistré auprès d’iTunes. Connectez l’iPod touch à votre ordinateur et ouvrez iTunes s’il ne s’est pas ouvert automatiquement.
iTunes et synchronisation
L’iPod touch n’apparaît pas dans iTunes ou vous ne parvenez pas à
synchroniser
 La batterie de l’iPod touch peut avoir besoin d’être rechargée. Pour plus de renseignements sur la recharge de l’iPod touch, consultez la section ªRecharge de la batterie.» à la page 28.
 Déconnectez les autres appareils USB de votre ordinateur et connectez l’iPod touch
à un autre port USB 2.0 de votre ordinateur (pas sur votre clavier).
 Redémarrez votre ordinateur et reconnectez-y l’iPod touch.
 Téléchargez et installez (ou réinstallez) la dernière version d’iTunes à partir de
www.apple.com/ca/fr/itunes.
La synchronisation ne fonctionne pas
 La batterie de l’iPod touch peut avoir besoin d’être rechargée. Pour plus de renseignements sur la recharge de l’iPod touch, consultez la section ªRecharge de la batterie.» à la page 28.
 Déconnectez les autres appareils USB de votre ordinateur et connectez l’iPod touch
à un autre port USB 2.0 de votre ordinateur (pas sur votre clavier).
 Redémarrez votre ordinateur et reconnectez-y l’iPod touch.
 Téléchargez et installez (ou réinstallez) la dernière version d’iTunes à partir de
www.apple.com/ca/fr/itunes.L’annexe A Dépannage 113
Les contacts, calendriers ou signets ne se synchronisent pas
 Téléchargez et installez (ou réinstallez) la dernière version d’iTunes à partir de
www.apple.com/ca/fr/itunes.
 Si vous avez configuré un compte MobileMe ou Microsoft Exchange sur votre
iPod touch, iTunes ne synchroniser pas les contacts, calendriers ou signets que
vous configurez pour une synchronisation dans le volet de préférences Infos de
l’iPod touch. Vous devez désactivez tous les éléments de MobileMe ou Exchange
que vous ne souhaitez pas synchroniser par le biais d’iTunes. Dans Réglages, touchez
« Mail, Contacts, Calendrier », touchez le compte MobileMe ou Exchange et désélectionnez les éléments que vous souhaitez synchroniser par le biais d’iTunes. Si vous
avez à la fois un compte MobileMe et un compte Exchange, vous devez désélectionnez les éléments dans les deux comptes.
Remarque : Lorsque vous désélectionnez Contacts ou Calendrier dans votre compte
MobileMe ou Exchange, les informations sur le contact ou calendrier ne sont plus
accessibles par le biais de l’iPod touch.
Vous ne souhaitez pas synchroniser d’informations de l’iPod touch
vers votre ordinateur
Remplacez les contacts, calendriers, comptes de messagerie et signets sur l’iPod touch
par les informations de votre ordinateur.
Remplacement des informations présentes sur l’iPod touch :
1 Ouvrez iTunes.
2 Lorsque vous connectez l’iPod touch à votre ordinateur, maintenez enfoncées les touches Commande et Option (si vous utilisez un Mac) ou Maj et Contrôle (si vous utilisez
un PC) jusqu’à l’apparition d’iPod touch dans la barre latérale d’iTunes. Cela empêche
que l’iPod touch lance la synchronisation automatiquement.
3 Sélectionnez iPod touch dans la barre latérale iTunes puis cliquez sur l’onglet Infos.
4 Sous « Remplacer les informations sur cet iPod touch », sélectionnez Contacts,
Calendriers, Comptes Mail ou Signets. Vous pouvez sélectionner plusieurs types d’informations, si vous le souhaitez.
5 Cliquez sur Appliquer.
Les informations du type sélectionné sont supprimées de l’iPod touch et remplacées
par le contenu de votre ordinateur. Lors de la prochaine synchronisation, l’iPod touch
se synchronise normalement en ajoutant sur l’ordinateur les informations que vous
avez enregistrées sur l’iPod touch et vice-versa.114 L’annexe A Dépannage
Le carnet d’adresses Yahoo! ou Google ne se synchronise pas
Il est possible qu’iTunes ne puisse se connecter à Yahoo! ou Google. Assurez-vous
d’être connecté à Internet et que vous avez saisi l’identifiant et le mot de passe corrects dans iTunes. Connectez l’iPod touch à votre ordinateur, cliquez sur l’onglet Infos
dans iTunes, cliquez sur Configurer dans la section Contacts, puis saisissez votre identifiant et votre mot de passe actuels.
Le carnet d’adresses Yahoo! contient toujours des contacts supprimés
à partir de l’iPod touch
Le carnet d’adresses Yahoo! ne permet pas la suppression par synchronisation de
contacts contenant un identifiant Messenger. Pour supprimer un contact contenant un
identifiant Messenger, ouvrez une session sur votre compte Yahoo! en ligne et supprimez le contact à l’aide du carnet d’adresses Yahoo!.
Safari, Mail et Contacts
Une pièce jointe ne s’ouvre pas
Le type de fichier peut ne pas être géré. L’iPod touch gère les formats de fichiers suivants pour les pièces jointes :
.doc Microsoft Word
.docx Microsoft Word (XML)
.htm page web
.html page web
.key Keynote
.numbers Numbers
.pages Pages
.pdf Preview, Adobe Acrobat
.ppt Microsoft PowerPoint
.pptx Microsoft PowerPoint (XML)
.txt texte
.vcf coordonnées
.xls Microsoft Excel
.xlsx Microsoft Excel (XML)L’annexe A Dépannage 115
Le courrier ne peut être livré (délai d’inactivité atteint sur le port 25)
Il peut être nécessaire de modifier le réglage de port du serveur de messagerie sortant de l’un de vos comptes de messagerie. Pour plus de renseignements, accédez à
la page www.apple.com/ca/fr/support/ipodtouch et recherchez « Je peux recevoir du
courrier sur l’iPod touch mais pas en envoyer ».
Les contacts GAL n’apparaissent pas
Vérifiez vos réglages Microsoft Exchange pour vous assurer de contacter le bon serveur. Dans Réglages, touchez « Mail, Contacts, Calendrier » et choisissez un compte
pour afficher ses réglages.
Si vous essayez de chercher des contacts GAL dans Contacts, touchez Groupes puis
Annuaires au bas de la liste.
Son, musique et vidéo
Pas de son
 Débranchez et reconnectez vos écouteurs. Assurez-vous que le connecteur est bien
enfoncé.
 Vérifiez que le volume n’est pas complètement coupé.
 Il est possible que la musique sur l’iPod touch soit en pause. À partir de l’écran d’accueil, toucher Musique, toucher À l’écoute puis toucher .
 Vérifiez si la limite du volume est activée. Dans l’écran d’accueil, choisissez Réglages
> iPod > Volume maximum. Pour plus de renseignements, consultez la section
ªMusique» à la page 103.
 Assurez-vous que vous utilisez la dernière version d’iTunes (accédez à
www.apple.com/ca/fr/itunes).
 Si vous utilisez le port de sortie audio de la station d’accueil en option, assurez-vous
que votre stéréo ou vos enceintes externes sont sous tension et fonctionnent.
Un morceau, une vidéo ou autre ne fonctionne pas
Le morceau a peut-être été encodé dans un format que l’iPod touch ne prend pas en
charge. Les formats de fichier audio suivants sont pris en charge par l’iPod touch. Ils
englobent les formats de livres audio et de podcasts :
 AAC (M4A, M4B, M4P, jusqu’à 320 Kbps)
 Apple Lossless (format compressé de haute qualité)
 MP3 (jusqu’à 320 Kbps)
 MP3 VBR (Variable Bit Rate, débit binaire variable)
 WAV
 AA (texte parlé audible.com, formats 2, 3 et 4)116 L’annexe A Dépannage
 AAX (texte parlé audible.com, format AudibleEnhanced)
 AIFF
Les formats de fichier vidéo suivants sont pris en charge par l’iPod touch :
 H.264 (profil de base de niveau 3.0)
 MPEG-4 (profil simple)
Un morceau encodé au format Apple Lossless présente un son de qualité CD optimale,
mais n’occupe que la moitié environ de l’espace utilisé par un morceau encodé au format AIFF ou WAV. Un même titre encodé au format AAC ou MP3 occupe encore moins
d’espace. Lors de l’importation de musique à partir d’un CD à l’aide d’iTunes, le son est
converti par défaut au format AAC.
iTunes pour Windows vous permet de convertir les fichiers WMA non protégés au format AAC ou MP3. Cela peut s’avérer utile si vous disposez d’une bibliothèque de musique encodée au format WMA.
L’iPod touch ne gère pas les fichiers audio WMA, MPEG Layer 1, MPEG Layer 2 ni les
fichiers audible.com format 1.
Si vous possédez dans votre bibliothèque iTunes un morceau ou une vidéo non pris en
charge par l’iPod touch, il se peut que la conversion dans un format que l’iPod touch
prend en charge vous soit possible. Reportez-vous à l’Aide iTunes pour en savoir plus.
iTunes Store
L’iTunes Wi-Fi Music Store n’est pas disponible
Pour pouvoir utiliser l’iTunes Wi-Fi Music Store, vous devez accéder à un réseau Wi-Fi
connecté à Internet à l’aide de votre iPod touch. Pour plus de renseignements, consultez la section ªAccès à un réseau Wi-Fi» à la page 28. Le magasin en ligne iTunes Wi-Fi
Music Store n’est pas disponible dans tous les pays.
Impossible d’acheter de la musique ou des applications
Pour acheter des morceaux à partir de l’iTunes Wi-Fi Music Store (seulement disponible
dans certains pays) ou des applications à partir de l’App Store, vous devez disposer
d’un compte iTunes Store. Ouvrez iTunes sur votre ordinateur et choisissez Store >
Créer un compte.
Sauvegarde de l’iPod touch
iTunes crée des sauvegarde des réglages, applications téléchargées et autres informations sur l’iPod touch. Vous pouvez utiliser une sauvegarde pour restaurer ces éléments
sur votre iPod touch après une restauration de logiciel ou pour transférer les informations sur un autre iPod touch.L’annexe A Dépannage 117
La sauvegarde d’un iPod touch et sa restauration à partir d’une sauvegarde sont des
opération différentes de la synchronisation de contenu et d’autres éléments (notamment musique, podcasts, sonneries, photos, vidéos et applications téléchargés via iTunes) avec votre bibliothèque iTunes. Les sauvegardes comprennent les réglages, applications téléchargées et autres informations qui résident sur l’iPod touch. Vous pouvez
restaurer ces éléments à partir d’une sauvegarde à l’aide d’iTunes, mais vous pouvez
également devoir synchroniser à nouveau le contenu de votre bibliothèque iTunes.
Création de sauvegardes
Il est possible de créer des sauvegardes par l’une des manières suivantes :
 Une fois que l’iPod touch a été configuré pour se synchroniser avec un ordinateur
donné, iTunes effectue automatiquement une sauvegarde de l’iPod touch sur cet
ordinateur lorsque vous effectuez une synchronisation. iTunes ne sauvegarde pas
autoamtiquement un iPod touch non configuré pour se synchroniser avec cet ordinateur. Si vous avez configuré l’iPod touch pour se synchroniser automatiquement
avec iTunes sur un ordinateur donné, iTunes sauvegarde l’iPod touch chaque fois
que vous le connectez à cet ordinateur. La synchronisation automatique est activée
par défaut. iTunes n’effectue qu’une sauvegarde à chaque connexion, même si vous
effectuez plus synchronisations avant de vous déconnecter.
 Si vous choisissez de mettre à jour le logiciel de l’iPod touch, iTunes sauvegarde
automatiquement l’iPod touch même s’il n’est pas configuré pour se synchroniser
avec iTunes sur cet ordinateur.
 Si vous choisissez de restaurer le logiciel de l’iPod touch, iTunes vous demande si
vous souhaitez sauvegarder l’iPod touch avant la restauration.
Restauration à partir d’une sauvegarde
Vous pouvez restaurer les réglages, les applications téléchargées et d’autres informations à partir d’une sauvegare, ou utiliser cette fonctionnalité pour transférer les élé-
ments en question vers un autre iPod touch.
Restauration de l’iPod touch à partir d’une sauvegarde :
1 Connectez l’iPod touch à l’ordinateur avec lequel vous synchronisez habituellement.
2 Dans iTunes, sélectionnez iPod touch dans la barre latérale puis cliquez sur l’onglet
Résumé.
3 Cliquez sur Restaurer pour réinstaller le logiciel de l’iPod touch, restaurer ses réglages
par défaut et supprimer les données qui sont stockées sur l’iPod touch. Dans iTunes 7.7,
vous pouvez également restaurer à partir d’une sauvegarde sans supprimer les données stockées sur l’iPod touch.118 L’annexe A Dépannage
Remarque : Les données supprimées ne sont plus accessibles via l’interface utilisateur de l’iPod touch, mais elles ne sont pas effacées de manière définitive de votreiPod touch jusqu’à ce qu’elles soient écrasées par des données nouvelles. Pour plus de
renseignements sur la manière d’effacer de manière définitive tout le contenu et les
réglages, voir la section ªRéinitialisation de l'iPod touch» à la page 102.
À l’invite, sélectionnez l’option de restauration de vos réglages, applications téléchargées et autres informations à partir d’une sauvegarde et sélectionnez la sauvegarde
que vous souhaitez utiliser. Les sauvegardes multiples sont énumérées par appareil
en ordre chronologique, la plus récente sauvegarde pour un appareil apparaissant en
premier.
Suppression d’une sauvegarde
Vous pouvez supprimer une sauvegarde de l’iPod touch à partir de la liste des sauvegardes dans iTunes version 7.5 ou ultérieure. Vous pouvez par exemple utiliser cette
fonction si une sauvegarde a été créée sur l’ordinateur de quelqu’un d’autre.
Suppression d’une sauvegarde :
1 Dans iTunes, ouvrez les préférences iTunes.
 Windows : Choisissez Édition > Préférences.
 Mac : Choisissez iTunes > Préférences.
2 Cliquez sur Synchronisation (l’iPod touch n’a pas besoin d’être connecté).
3 Sélectionnez la sauvegarde que vous souhaitez supprimer et cliquez sur Supprimer la
sauvegarde.
4 Confirmez que vous souhaitez supprimer la sauvegarde sélectionnée en cliquant sur
Supprimer la sauvegarde.
5 Cliquez sur OK pour fermer la fenêtre de préférences iTunes.
Pour plus de renseignements sur les sauvegardes, notamment sur les réglages et
autres informations stockées dans une sauvegarde, consultez l’article support.apple.
com/kb/HT1766?viewlocale=fr_FR.L’annexe A Dépannage 119
Mise à jour et restauration du logiciel de l’iPod touch
Vous pouvez utilisez iTunes pour mettre à jour ou réinstaller le logiciel de l’iPod touch,
restaurer les réglages par défaut et supprimer toutes les données de l’iPod touch.
 Si vous effectuez une mise à jour, le logiciel de l’iPod touch est mis à jour mais vos applications téléchargées, réglages et morceaux ne sont pas touchés.
 Si vous effectuez une restauration, la dernière version du logiciel de l’iPod touch
est réinstallée, les réglages par défauts restaurés et les données stockées sur
l’iPod touch supprimées, y compris les applications téléchargées, morceaux, vidéos,
contacts, photos, informations de calendrier ainsi que toutes les autres données.
Dans iTunes 7.7, vous pouvez également restaurer à partir d’une sauvegarde sans
supprimer les données stockées sur l’iPod touch.
Remarque : Les données supprimées ne sont plus accessibles via l’interface utilisateur de l’iPod touch, mais elles ne sont pas effacées de manière définitive de votreiPod touch jusqu’à ce qu’elles soient écrasées par des données nouvelles. Pour plus de
renseignements sur la manière d’effacer de manière définitive tout le contenu et les
réglages, voir la section ªRéinitialisation de l'iPod touch» à la page 102.
Mise à jour ou restauration de l’iPod touch :
1 Assurez-vous que vous disposez d’une connexion Internet et avez installé la dernière
version d’iTunes depuis l’adresse www.apple.com/ca/fr/itunes.
2 Connectez l’iPod touch à votre ordinateur.
3 Sélectionnez iPod touch dans la barre latérale d’iTunes et cliquez sur l’onglet Résumé.
4 Cliquez sur « Rechercher les mises à jour ». iTunes vous indique alors si une version
plus récente du logiciel de l’iPod touch est disponible.
5 Cliquez sur Mettre à jour pour installer la dernière version en date du logiciel Vous
pouvez également cliquer sur Restaurer pour effectuer une restauration. Suivez les instructions à l’écran pour terminer le processus de restauration.
Pour plus de renseignements sur la mise à jour et la restauration du logiciel de
l’iPod touch, consultez l’article http://support.apple.com/kb/HT1414.120 L’annexe A Dépannage
Fonctions d’accessibilité de l’iPod touch
Les fonctions suivantes peuvent vous faciliter l’usage de l’iPod touch si vous avez un
handicap.
Sous-titres codés
Si des vidéos prévoient le sous-titrage codé, vous pouvez activer la fonction. Voir la
section ªVidéo» à la page 104.
Taille minimale de police pour les messages Mail
Vous pouvez définir une taille de police minimale pour le texte composant les courriers électroniques sur la taille Grande, Très grande ou Géante pour en améliorer la
lisibilité. Voir la section ªMail» à la page 106.
Zoom
Double-touchez ou pincez des pages web, des photos et des cartes pour les agrandir.
Voir la section ªZoom avant ou arrière» à la page 23.
Accès universel sous Mac OS X
Tirez parti des fonctionnalités d’accès universel de Mac OS X lorsque vous utilisez
iTunes pour synchroniser des données de votre bibliothèque iTunes avec votre
iPod touch. Dans le Finder, choisissez Aide > Aide Mac, puis recherchez « accès
universel ».
Pour plus de renseignements sur les fonctions d’accessibilité de l’iPod touch, consultez
la page www.apple.com/fr/accessibility.121
Informations relatives à la sécurité, au logiciel et au service
après-vente
Le tableau suivant explique où obtenir plus d’informations sur l’iPod touch en matière
de sécurité, de logiciel et de service après-vente.
Pour en savoir plus sur : Procédez ainsi
L’usage de l’iPod touch en toute sécurité Des renseignements récents importants
sur la sécurité et la réglementation sont
disponibles dans le Guide des informations importantes sur le produit à la page
www.apple.com/ca/fr/support/manuals/ipodtouch.
iPod touch : conseils en matière de service
après-vente et d’assistance, forums de discussion et téléchargements de logiciels Apple
Consultez la page
www.apple.com/ca/fr/support/ipodtouch.
Les toutes dernières informations sur l’
iPod touch
Consultez la page www.apple.com/ca/fr/ipodtouch.
L’utilisation d’iTunes Ouvrez iTunes et choisissez Aide > Aide iTunes.
Un didacticiel iTunes en ligne se trouve à la
page www.apple.com/ca/fr/support/itunes. (non
disponible partout).
MobileMe Accédez à la page www.me.com/fr.
L’utilisation d’iPhoto sous Mac OS X Ouvrez iPhoto et choisissez Aide > Aide iPhoto.
L’utilisation de Carnet d’adresses sous
Mac OS X
Ouvrez Carnet d’adresses et choisissez Aide > Aide
de Carnet d’adresses.
L’utilisation d’iCal sous Mac OS X Ouvrez iCal et choisissez Aide > Aide iCal.
Microsoft Outlook, Carnet d’adresses
Windows, Adobe Photoshop Album et Adobe
Photoshop Elements
Consultez la documentation fournie avec ces
applications.
B L’annexe
Autres ressources122 L’annexe B Autres ressources
Pour en savoir plus sur : Procédez ainsi
L’obtention du service assuré par la garantie Commencez par suivre les conseils prodigués dans ce guide et dans les ressources en ligne. Accédez alors à
www.apple.com/ca/fr/support ou consultez le Guide
des informations importantes sur le produit à la page
www.apple.com/ca/fr/support/manuals/ipodtouch.
Utilisation de l’iPod touch dans un contexte
d’entreprise
Accédez à la page
www.apple.com/fr/iphone/enterprise.
Guide de l’utilisateur optimisé pour iPod touch
Le Guide de l’utilisateur de l’iPod touch, optimisé pour un affichage sur l’iPod touch, est
disponible à la page:
http://help.apple.com/ipodtouchK © 2008 Apple Inc. Tous droits réservés.
Apple, le logo Apple, AirPort, Cover Flow, FireWire, iCal,
iPhoto, iPod, iTunes, Keynote, Mac, Macintosh, Mac OS,
Numbers, Pages et Safari sont des marques d'Apple Inc.,
déposées aux États-Unis et dans d'autres pays.
Finder, iPhone, Multi-Touch et Shuffle sont des marques
d'Apple Inc.
iTunes Store est une marque de service d'Apple Inc.,
déposée aux États-Unis et dans d'autres pays.
MobileMe est une marque de service d'Apple Inc.
Adobe et Photoshop sont des marques ou des marques
déposées d’Adobe Systems Incorporated, aux États-Unis
et/ou dans d’autres pays.
Finder, Safari et Shuffle sont des marques d’Apple Inc.
Adobe et Photoshop sont des marques ou des marques
déposées d’Adobe Systems Incorporated aux États-Unis
et/ou dans d’autres pays. Les autres noms de produits
et d’entreprises mentionnés dans le présent document
peuvent être des marques de leurs propriétaires respectifs. Tout arrangement, accord ou garantie, le cas
échéant, s’applique directement entre le revendeur et
les utilisateurs potentiels. La mention de produits tiers
n’est effectuée qu’à des fins informatives et ne constitue
en aucun cas une approbation ni une recommandation.
Apple n’assume aucune responsabilité vis-à-vis des performances ou de l’utilisation de ces produits.
Apparatus Claims des États-Unis Brevets numéro
L’ingénierie inverse et le désassemblage sont interdits.
C019-1261/2008-07
Félicitations, vous et votre MacBook Pro
étiez faits l’un pour l’autre.Dites bonjour à votre MacBook Pro.
www.apple.com/fr/macbookpro
finder
Finder
Parcourez vos fichiers
de la même manière
que vous naviguez
parmi vos morceaux
de musique avec
Cover Flow.
Aide Mac
Caméra iSight intégrée avec iChat
Discutez en vidéo avec vos amis et
votre famille, où qu’ils soient dans
le monde.
Aide Mac
isight
MacBook Pro
Trackpad Multi-Touch
Faites défiler des fichiers,
ajustez des images et
agrandissez du texte rien
qu’avec vos doigts.
Aide Mac
trackpad
Pincez et
agrandissez
Faites
pivoter
Faites défiler Feuilletez
Cliquez n’importe oùTime Machine
Sauvegardez et
restaurez automatiquement vos fichiers.
Aide Mac
Spotlight
Trouvez tout ce que
vous recherchez
sur votre Mac.
Aide Mac
time machine spotlight
Safari
Profitez pleinement
du web grâce au
navigateur le plus
rapide du monde.
Aide Mac
safari
Coup d’œil
Prévisualisez vos
fichiers en un clin
d’œil.
Aide Mac
Mac OS X Snow Leopard
www.apple.com/fr/macosx
iLife ’11
www.apple.com/fr/ilife
iPhoto
Vos clichés avec ce
quelque chose en
plus.
Aide iPhoto
iMovie
Vos films
époustouflants en
quelques minutes.
Aide iMovie
GarageBand
Créez facilement
un morceau au son
peaufiné.
Aide GarageBand
coup d’œil
photos film enregistrementTable des matières 5
Chapitre 1 : Prêt, feu, configurez !
9 Contenu de la boîte
9 Configuration du MacBook Pro
17 Extinction ou suspension d’activité de votre MacBook Pro
Chapitre 2 : Votre MacBook Pro au quotidien
20 Caractéristiques de base de votre MacBook Pro
22 Fonctionnalités du clavier de votre MacBook Pro
24 Ports présents sur votre MacBook Pro
26 Utilisation du trackpad Multi-Touch
30 Utilisation de la batterie du MacBook Pro
32 Comment obtenir des réponses à vos doutes
Chapitre 3 : Améliorez les performances de votre
MacBook Pro
39 Remplacement du disque dur
47 Installation de mémoire supplémentaire
Table des matières6 Table des matières
Chapitre 4 : À tout problème sa solution
55 Problèmes vous empêchant d’utiliser votre MacBook Pro
59 Utilisation d’Apple Hardware Test
60 Problèmes de connexion à Internet
63 Problèmes de communication sans fil avec AirPort Extreme
64 Maintien à jour de vos logiciels
65 Réinstallation des logiciels fournis avec le MacBook Pro
66 Utilisation d’Utilitaire de disque
67 Informations, services et assistance
70 Localisation du numéro de série de votre produit
Chapitre 5 : Dernières recommandations
72 Informations importantes concernant la sécurité
75 Informations importantes sur la manipulation
78 Ergonomie
80 Apple et l’environnement
81 Regulatory Compliance InformationAide Mac Assistant migration
www.apple.com/fr/macbookpro
Prêt, feu, configurez !
18 Chapitre 1 Prêt, feu, configurez !
Le MacBook Pro est conçu pour être configuré rapidement et utilisé immédiatement.
Si vous n’avez jamais utilisé de MacBook Pro ou si vous n’êtes pas familiarisé avec
les ordinateurs Macintosh, vous trouverez dans ce chapitre des instructions qui vous
aideront à débuter.
Important : lisez attentivement toutes les instructions d’installation (et les consignes
de sécurité à partir de la page 71) avant d’utiliser votre ordinateur pour la première fois.
Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser
votre nouvel ordinateur. Veillez néanmoins à consulter les informations du Chapitre 2,
« Votre MacBook Pro au quotidien », pour découvrir les nouvelles fonctionnalités de ce
MacBook Pro.
Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en
savoir plus sur l’utilisation de l’Aide Mac, consultez la rubrique « Comment obtenir
des réponses à vos doutes » à la page 32. Comme Apple publie régulièrement de
nouvelles versions et mises à jour de ses logiciels système, il est possible que les
images de ce manuel soient légèrement différentes de ce que vous voyez à l’écran.Chapitre 1 Prêt, feu, configurez ! 9
Contenu de la boîte
Adaptateur secteur Câble secteur
MagSafe de 85 W
®
Configuration du MacBook Pro
Le MacBook Pro est conçu pour être configuré rapidement et utilisé immédiatement.
Les pages suivantes contiennent des informations qui vous guideront tout au long du
processus de configuration, notamment des opérations suivantes :
 Le branchement de l’adaptateur secteur MagSafe 85 W.
 Le branchement des câbles et l’accès à un réseau.
 La mise sous tension du MacBook Pro et l’utilisation du trackpad.
 La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages.
 La configuration des préférences et du bureau Mac OS X.10 Chapitre 1 Prêt, feu, configurez !
Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 85 W
avant de configurer le MacBook Pro.
Étape 1 : Branchez l’adaptateur secteur MagSafe 85 W pour alimenter le MacBook
Pro et recharger sa batterie.
Assurez-vous que la fiche CA est complètement insérée dans l’adaptateur et que
les broches de la fiche sont complètement déployées. Branchez la fiche CA de votre
adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le port
secteur MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez la
force d’un aimant l’attirant.
Connecteur MagSafe
Câble secteur
Fiche CA ¯ Port secteur MagSafe
Pour rallonger le câble de l’adaptateur secteur, remplacez la fiche CA par le câble
d’alimentation secteur. Tirez d’abord sur la fiche CA pour la retirer de l’adaptateur, puis
branchez le câble d’alimentation secteur inclus sur l’adaptateur, en vous assurant que
tout est branché correctement.Chapitre 1 Prêt, feu, configurez ! 11
Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de
l’ordinateur, débranchez la prise et non le câble.
La première fois que vous branchez l’adaptateur secteur sur le MacBook Pro, la
lampe témoin du connecteur MagSafe s’allume. Si la lumière est orange, la batterie
est en cours de rechargement. Une lampe témoin verte indique que la batterie est
complètement chargée. Si aucune lumière ne s’allume, assurez-vous que le connecteur
est correctement branché et que l’adaptateur secteur est branché sur une prise
de courant.
Étape 2 : Connectez-vous à un réseau sans fil ou câblé.
 Pour utiliser un réseau sans fil à l’aide de la technologie intégrée AirPort Extreme,
assurez-vous que la borne d’accès sans fil est activée et que vous disposez du nom du
réseau. Après avoir allumé votre MacBook Pro, l’Assistant réglages vous guide à travers
le processus de connexion. Pour obtenir des conseils de dépannage, consultez la page 63.
 Pour utiliser une connexion câblée, reliez votre MacBook Pro et un modem câble, un
modem DSL ou un réseau à l’aide d’un câble Ethernet.12 Chapitre 1 Prêt, feu, configurez !
®
Câble
Ethernet
Port Ethernet Gigabit
(10/100/1000Base-T)
GChapitre 1 Prêt, feu, configurez ! 13
Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer
votre MacBook Pro.
Votre ordinateur émet un signal sonore lorsque vous l’allumez.
®
® Bouton d’alimentation
Le démarrage du MacBook Pro prend quelques instants. Après le démarrage, Assistant
réglages s’ouvre automatiquement.
Si votre MacBook Pro ne s’allume pas, consultez la rubrique « Si votre MacBook Pro ne
s’allume ou ne démarre pas » à la page 57.14 Chapitre 1 Prêt, feu, configurez !
Étape 4 : Configurez votre MacBook Pro à l’aide d’Assistant réglages
La première fois que vous démarrez votre MacBook Pro, l’Assistant réglages se met
en route. Il vous aide à saisir les informations de connexion à Internet et au courrier
électronique ainsi qu’à configurer un compte d’utilisateur sur votre MacBook Pro.
Si vous possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider
à transférer automatiquement les fichiers, les applications et d’autres informations
de votre ancien ordinateur par une connexion Ethernet ou une connexion sans fil.
Consultez la rubrique suivante, « Migration d’informations vers votre MacBook Pro »,
pour en savoir plus.
Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui
retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur
l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un
tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation
afin qu’elle puisse être utilisée. Pour en savoir plus sur le retrait de l’autorisation d’accès,
choisissez Aide iTunes dans le menu Aide d’iTunes.Chapitre 1 Prêt, feu, configurez ! 15
Migration d’informations vers votre MacBook Pro
Vous pouvez suivre les invites de l’Assistant réglages pour effectuer la migration des
comptes d’utilisateurs, fichiers, applications existant(e)s, et d’autres informations à partir
d’un autre Mac. Pour cela, procédez de l’une des manières suivantes :
 Utilisez un câble FireWire pour brancher les deux ordinateurs ensemble et transférer
les informations
 Utilisez un câble Ethernet reliant directement les deux ordinateurs, ou connectez ces
derniers au même réseau
 Sans câble, directement entre les deux ordinateurs, ou en ayant les deux ordinateurs
sur le même réseau sans fil
Avant de procéder à la migration, faites une Mise à jour de logiciels sur votre autre Mac.
Assurez-vous que ce dernier possède une des versions suivantes de Mac OS X :
Mac OS X 10.4.11 ou Mac OS X 10.5.6 (ou ultérieur).
Vous pouvez choisir les éléments (comptes d’utilisateur, documents, séquences,
musique, photos, etc.) dont vous souhaitez effectuer la migration sur votre MacBook Pro.
Important : n’utilisez pas l’autre Mac tant que la migration n’est pas terminée.
Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du premier
démarrage de l’ordinateur, vous pouvez le faire ultérieurement. Si la connexion est
interrompue pendant la migration, vous pouvez reprendre cette dernière ultérieurement
en vous servant de l’Assistant migration de votre MacBook Pro et de l’autre Mac.
Allez dans le dossier Applications, ouvrez le dossier Utilitaires, puis double-cliquez
sur Assistant migration.16 Chapitre 1 Prêt, feu, configurez !
Étape 5 : Personnalisez le bureau Mac OS X et définissez les préférences.
Barre des menus Menu Aide Icône de recherche Spotlight
Icône du Finder Dock Icône Préférences SystèmeChapitre 1 Prêt, feu, configurez ! 17
Vous pouvez rapidement personnaliser le bureau à l’aide des Préférences Système.
Choisissez le menu Pomme () > Préférences Système dans la barre des menus ou
cliquez sur l’icône Préférences Système dans le Dock. Les Préférences Système constituent
votre centre de commande pour la plupart des réglages de votre MacBook Pro. Pour en
savoir plus, ouvrez l’Aide Mac et recherchez « Préférences Système » ou la préférence que
vous souhaitez modifier.
Extinction ou suspension d’activité de votre MacBook Pro
Lorsque vous avez terminé de travailler avec le MacBook Pro, suspendez son activité
ou éteignez-le.
Suspension de l’activité de votre MacBook Pro
Suspendez l’activité de votre MacBook Pro si vous ne comptez vous en éloigner
que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à
le redémarrer.
Pour suspendre l’activité de votre MacBook Pro, procédez de l’une des manières
suivantes :
 Rabattez l’écran.
 Choisissez le menu Pomme () > Suspendre l’activité dans la barre des menus.
 Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans
la zone de dialogue qui apparaît.
 Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur
d’énergie, puis définissez un délai pour la suspension d’activité.18 Chapitre 1 Prêt, feu, configurez !
AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension
d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le disque
dur a cessé de tourner) avant de déplacer le MacBook Pro. Tout déplacement de votre
ordinateur lorsque le disque dur est en train de tourner risque d’endommager ce dernier
et d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur.
Pour réactiver le MacBook Pro :
 Si l’écran est fermé, il suffit de l’ouvrir pour réactiver le MacBook Pro.
 Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®) ou sur l’une des
touches du clavier.
À la réactivation de votre MacBook Pro, vos applications, vos documents et vos réglages
sont conservés tels que vous les aviez laissés.
Extinction de votre MacBook Pro
Si vous ne comptez pas utiliser votre MacBook Pro pendant deux jours ou plus, il
est préférable de l’éteindre. La lampe témoin de suspension d’activité reste allumée
quelques instants au moment de l’extinction.
Pour éteindre le MacBook Pro, procédez de l’une des manières suivantes :
m Choisissez le menu Pomme () > Éteindre dans la barre des menus.
m Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de
dialogue qui apparaît.
Si vous comptez ranger votre MacBook Pro pour une durée prolongée, consultez la
rubrique « Informations importantes sur la manipulation » à la page 75 pour obtenir des
informations sur les mesures à prendre pour éviter que votre batterie ne se décharge
complètement.Aide Mac Mac OS X
www.apple.com/fr/macosx
Votre MacBook Pro
au quotidien
220 Chapitre 2 Votre MacBook Pro au quotidien
Caractéristiques de base de votre MacBook Pro
®
® Bouton
d’alimentation
Lampe témoin
de la caméra
Caméra iSight
Haut-parleurs
stéréo integrés
Lampes témoins
de la batterie (côté)
Microphone
Lampe témoin de
suspension d’activité
Récepteur
à infrarouge
Trackpad
Lecteur optique
à chargement par fente
Logement
de sécuritéChapitre 2 Votre MacBook Pro au quotidien 21
Caméra iSight intégrée et lampe témoin
Cette caméra permet d’organiser des vidéoconférences à l’aide de l’application iChat,
de prendre des photos à travers Photo Booth ou de capturer de la vidéo avec iMovie.
La lampe témoin brille lorsque la caméra fonctionne.
Micro intégré
Capturez des sons grâce au micro (situé au-dessus de la touche Échap de votre clavier)
ou discutez avec des amis en direct et en haut débit à l’aide de l’application iChat incluse.
Haut-parleurs stéréo intégrés
Permettent d’écouter de la musique, des films, des jeux et d’autres types de données
multimédias.
Batterie intégrée et témoins de la batterie
Utilisez la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. Appuyez
sur le bouton de la batterie pour activer les lampes témoins du niveau de charge.
Trackpad
Vous pouvez cliquer ou double-cliquer n’importe où sur le trackpad. Touchez le trackpad
avec un ou plusieurs doigts pour déplacer le pointeur ou utiliser les gestes Multi-Touch
(décrits à la page 26).
Lampe témoin de suspension d’activité
Une lumière blanche clignote lorsque le MacBook Pro est en suspension d’activité.
Récepteur à infrarouge
Associé à une télécommande Apple Remote (disponible séparément), le récepteur à
infrarouge vous permet de contrôler, jusqu’à une distance de 9,1 mètres, les applications
Front Row et Keynote sur votre MacBook Pro.
Logement de sécurité
Ce logement vous permet de protéger votre ordinateur contre le vol en y fixant un
cadenas et un câble (disponible séparément).
SuperDrive à chargement par fente
Ce lecteur optique permet de lire et de graver des CD et DVD de taille standard.22 Chapitre 2 Votre MacBook Pro au quotidien
® Bouton d’alimentation
Permet d’allumer, d’éteindre ou de suspendre l’activité du MacBook Pro.
Fonctionnalités du clavier de votre MacBook Pro
®
Touche de
fonction (fn)
esc
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12
—
C
- Touches de
réglage du
volume
Touches de
réglage de
luminosité
Touche
d’éjection
de disques
Touche
silence
Exposé Dashboard Touches
multimédia
Touches d'éclairage
du clavier
’Chapitre 2 Votre MacBook Pro au quotidien 23
Fonction (Fn)
Maintenez cette touche enfoncée pour activer les actions personnalisées affectées
aux touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches
de fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez
« touches de fonction ».
¤ Touches de réglage de luminosité (F1, F2)
Augmentez ( ) ou diminuez ( ) la luminosité de l’écran.
Touche Exposé (F3)
Vous permet d’ouvrir Exposé pour accéder rapidement à toutes vos fenêtres ouvertes.
Touche Dashboard (F4)
Vous permet d’ouvrir le Dashboard pour accéder à vos widgets.
o Touches d’éclairage du clavier (F5, F6)
Permettent d’augmenter (o) ou de diminuer (ø) la luminosité de l’éclairage du clavier.
’ Touches multimédia (F7, F8, F9)
Permettent de rembobiner ( ), de lire ou de mettre en pause (’), ou encore d’effectuer
une avance rapide ( ) dans un morceau, une séquence ou un diaporama.
— Touche silence (F10)
Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie
audio.
- Touches de réglage du volume (F11, F12)
Permettent d’augmenter (-) ou de baisser (–) le volume du son provenant des hautparleurs intégrés et du port de sortie casque.
C Touche d’éjection de disques
Maintenez cette touche enfoncée pour éjecter un disque que vous n’utilisez pas. Il est
également possible d’éjecter un disque en faisant glisser son icône dans la Corbeille.24 Chapitre 2 Votre MacBook Pro au quotidien
Ports présents sur votre MacBook Pro
®
¯
Port Ethernet Gigabit
(10/100/1000Base-T)
G
Port de sortie
de ligne audio
f
Port d’entrée
de ligne audio
Port Mini ,
DisplayPort
£
Ports
USB 2.0
d Logement
ExpressCard/34
Port
d’adaptateur
secteur MagSafe
Port
FireWire 800
HChapitre 2 Votre MacBook Pro au quotidien 25
¯ Port d’adaptateur secteur MagSafe
Branchez-y l’adaptateur secteur MagSafe 85 W (inclus) pour recharger la batterie du
MacBook Pro.
G Port Ethernet Gigabit (10/100/1000Base-T)
Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou
encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques
Ethernet sans avoir besoin de câble croisé Ethernet.
H Un port FireWire 800
Ce port permet de brancher sur l’ordinateur des périphériques externes à haute vitesse
tels que des caméras vidéo numériques et des périphériques de stockage.
£ Port Mini DisplayPort (sortie vidéo)
Permet de connecter votre ordinateur à un écran ou à un système de projection externe
doté d’un connecteur DVI ou VGA. Vous pouvez acheter des adaptateurs correspondant
aux différents formats vidéo compatibles.
d Trois ports USB 2.0 (Universal Serial Bus) haut débit
Grâce à ces ports, vous pouvez brancher entre autres un iPod, un iPhone, une souris, un
clavier, une imprimante, un disque dur, un appareil photo numérique, une manette de
jeu, un modem sur votre MacBook Pro.
, Port d’entrée audio
Permet de connecter un micro ou un appareil audio numérique à votre MacBook Pro.
f Port de sortie audio
Permet de connecter des haut-parleurs externes, un casque (y compris iPhone) ou tout
autre périphérique audio numérique.
Logement ExpressCard/34
Développez les fonctionnalités de votre MacBook Pro grâce aux cartes ExpressCard
standard de 34 mm. Pour éjecter une ExpressCard, appuyer doucement dessus pour
activer le ressort puis retirez-la du logement.26 Chapitre 2 Votre MacBook Pro au quotidien
Remarque : les adaptateurs et autres accessoires sont vendus séparément sur
www.apple.com/fr/store et dans votre magasin Apple.
Utilisation du trackpad Multi-Touch
Le trackpad vous permet de déplacer le pointeur et de réaliser divers gestes Multi-Touch.
Contrairement aux trackpads habituels, celui du MacBook Pro fonctionne comme un
bouton en vous permettant de cliquer n’importe où sur sa surface. Pour activer les gestes
Multi-touch, visionner des vidéos d’apprentissage des gestes et définir d’autres options
pour le trackpad, choisissez le menu Pomme () > Préférences Système, puis cliquez sur
Trackpad.
Voici différentes manières d’utiliser le trackpad de votre MacBook Pro :
 Le défilement à deux doigts vous permet de défiler rapidement vers le haut, le bas ou
latéralement dans la fenêtre active. Cette option est activée par défaut. Vous pouvez
aussi activer ou désactiver le défilement dynamique. Lorsque cette option est activée,
l’écran continue de défiler un instant après que vous retiriez vos doigts du trackpad.
Elle est particulièrement pratique pour naviguer dans de longs documents et listes.Chapitre 2 Votre MacBook Pro au quotidien 27
 Le clic secondaire ou « clic droit » vous permet d’accéder aux commandes du menu
contextuel.
• Pour configurer le clic secondaire à deux doigts n’importe où sur le trackpad,
sélectionnez Clic secondaire sous l’option Deux doigts dans les préférences
Trackpad.
• Pour configurer une zone de clic secondaire à un doigt dans le coin inférieur
gauche ou droit du trackpad, sélectionnez Clic secondaire sous l’option Un doigt
dans les préférences Trackpad.
Zone de clic secondaire
Remarque : vous pouvez également effectuer un clic secondaire en maintenant la
touche Contrôle (Ctrl) enfoncée au moment où vous cliquez.28 Chapitre 2 Votre MacBook Pro au quotidien
Les gestes de trackpad suivants fonctionnent dans certaines applications. Pour
effectuer ces gestes, faites glisser légèrement vos doigts sur la surface du trackpad.
Pour en savoir plus, reportez-vous aux préférences Trackpad ou choisissez Aide >
Aide Mac, puis lancez une recherche sur le mot « trackpad ».
 En resserrant ou en écartant deux doigts vous pouvez effectuer un zoom avant ou
arrière dans les PDF, les images, les photos, etc.
 En pivotant deux doigts vous pouvez faire pivoter des photos, des pages, etc.Chapitre 2 Votre MacBook Pro au quotidien 29
 Le balayage à trois doigts vous permet de feuilleter rapidement un document, de
revenir à la photo précédente ou de passer à la suivante et bien plus encore.
 Le balayage à quatre doigts fonctionne dans le Finder et dans toutes les applications.
En faisant défiler quatre doigts vers la gauche ou la droite, vous activez Permutation
d’applications qui vous permet de passer d’une application ouverte à une autre.
Si vous balayez à quatre doigts vers le haut ou le bas, Exposé affiche le bureau ou
toutes les fenêtres ouvertes.
Pour activer ou désactiver un geste, sélectionnez le menu Pomme () > Préférences
Système, puis cliquez sur Trackpad. Cochez ou décochez les cases pour activer ou
désactiver les gestes.30 Chapitre 2 Votre MacBook Pro au quotidien
Utilisation de la batterie du MacBook Pro
Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook Pro puise son
alimentation de sa batterie intégrée. L’autonomie du MacBook Pro varie en fonction
des applications utilisées et des périphériques externes qui sont connectés à votre
MacBook Pro.
La désactivation de fonctions comme AirPort Extreme ou la technologie sans fil
Bluetooth® et la réduction de la luminosité de l’écran peuvent contribuer à économiser
la batterie lors des voyages en avion par exemple. De nombreuses Préférences Système
sont automatiquement réglées pour optimiser l’autonomie de la batterie.
Il est possible de déterminer la charge restante de la batterie en observant les huit
lampes témoins du niveau de la batterie, qui se trouvent sur le côté gauche de votre
MacBook Pro. Appuyez sur le bouton situé en regard des lampes témoins afin que ces
dernières s’allument brièvement pour indiquer la charge restante de la batterie.
Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun
témoin ne s’allume, c’est que la batterie est totalement vide et que le MacBook Pro ne
peut alors pas démarrer sans que l’adaptateur secteur ne soit branché sur une prise
de courant. Branchez l’adaptateur secteur pour permettre à la batterie de se recharger.
Pour en savoir plus sur les lampes témoins de la batterie, consultez la page 58.Chapitre 2 Votre MacBook Pro au quotidien 31
Vous pouvez également vérifier la charge restante de la batterie en observant l’icône
d’état ( ) de la batterie qui se trouve dans la barre des menus. Le niveau affiché
dépend de la quantité d’énergie restant dans la batterie, mais aussi des applications
et des périphériques en cours d’utilisation, ainsi que des réglages actuels de votre
système. Pour disposer de plus d’énergie, fermez des applications, déconnectez les
périphériques non utilisés et réglez la fonction d’Économiseur d’énergie. Pour en
savoir plus sur l’économie de la batterie et obtenir des astuces pour améliorer ses
performances, rendez-vous à l’adresse www.apple.com/fr/batteries/notebooks.html.
Recharge de la batterie
Lorsque l’adaptateur secteur fourni avec le MacBook Pro est branché, la batterie se
recharge, que l’ordinateur soit éteint, allumé ou en suspension d’activité. La recharge
est toutefois plus rapide si l’ordinateur est éteint ou en mode de suspension d’activité.
La batterie de votre MacBook Pro peut être remplacée uniquement par un fournisseur
de services agréé d’Apple ou un revendeur Apple.32 Chapitre 2 Votre MacBook Pro au quotidien
Comment obtenir des réponses à vos doutes
De plus amples informations sur l’utilisation du MacBook Pro sont disponibles dans
l’Aide Mac qui s’affiche sur votre ordinateur et sur Internet, à l’adresse
www.apple.com/fr/support/macbookpro.
Pour faire apparaître l’Aide Mac :
1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran).
2 Cliquez sur le menu Aide dans la barre des menus et procédez de l’une des manières
suivantes :
a Saisissez une question ou un terme dans le champ de recherche, puis sélectionnez
une rubrique dans la liste des résultats ou sélectionnez « Afficher tous les résultats »
pour voir toutes les rubriques.
b Choisissez Aide Mac pour ouvrir la fenêtre de l’Aide Mac, qui vous permet de cliquer
sur des liens ou de saisir une question.Chapitre 2 Votre MacBook Pro au quotidien 33
Informations supplémentaires
Pour en savoir plus sur l’utilisation de votre MacBook Pro, consultez le tableau suivant :
Pour obtenir des
informations sur :
Reportez-vous aux sources suivantes :
L’installation de mémoire Chapitre 3, « Améliorez les performances de votre MacBook Pro »
à la page 37.
Le dépannage de votre
MacBook Pro en cas de
problème
Chapitre 4, « À tout problème sa solution » à la page 53.
L’obtention de services et
d’une assistance pour votre
MacBook Pro
« Informations, services et assistance » à la page 67. Vous pouvez
également vous rendre sur le site d’assistance Apple à l’adresse
www.apple.com/fr/support/macbookpro.
L’utilisation de Mac OS X Site web de Mac OS X à l’adresse www.apple.com/fr/macosx.
Vous pouvez également rechercher « Mac OS X » dans l’Aide Mac.
La migration depuis
un PC vers un Mac
« Pourquoi vous adorerez le Mac » à l’adresse
www.apple.com/fr/getamac/whymac.
L’utilisation des applications
iLife
Site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous pouvez
également ouvrir une application iLife, ouvrir l’Aide de cette
application, puis saisir une question dans le champ de recherche.
La modification des
Préférences Système
Préférences Système, accessibles en choisissant le menu
Pomme (K) > Préférences Système. Vous pouvez également
rechercher « préférences système » dans l’Aide Mac.
Utilisation du trackpad Ouvrez Préférences Système, puis cliquez sur Trackpad.
L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide Mac.
L’utilisation du clavier Recherchez « clavier » dans l’Aide Mac.34 Chapitre 2 Votre MacBook Pro au quotidien
Pour obtenir des
informations sur :
Reportez-vous aux sources suivantes :
L’utilisation de la technologie
sans fil AirPort Extreme
Page web d’assistance AirPort à l’adresse
www.apple.com/fr/support/airport. Vous pouvez également
ouvrir l’Aide Mac et rechercher le terme « AirPort ».
L’utilisation de la technologie
sans fil Bluetooth
Page web d’assistance Bluetooth à l’adresse
www.apple.com/fr/support/bluetooth. Vous pouvez aussi ouvrir
l’utilitaire Échange de fichiers Bluetooth (dans le dossier Utilitaires
du dossier Applications) et sélectionner Aide > Aide Bluetooth.
L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac.
La connexion d’une
imprimante
Recherchez « impression » dans l’Aide Mac.
Les connexions FireWire et USB Recherchez « FireWire » ou « USB » dans l’Aide Mac.
La connexion à Internet Recherchez « Internet » dans l’Aide Mac.
La connexion d’un moniteur
externe
Recherchez « port affichage » dans l’Aide Mac.
La télécommande
Apple Remote
Recherchez « télécommande » dans l’Aide Mac.
Front Row Recherchez « Front Row » dans l’Aide Mac
La gravure d’un CD ou DVD Recherchez « graver disque » dans l’Aide Mac.
Les caractéristiques Page web des spécifications, à l’adresse support.apple.com/specs
(en anglais). Vous pouvez également ouvrir Informations Système
en choisissant le menu Pomme (K) > « À propos de ce Mac »
dans la barre des menus, puis en cliquant sur Plus d’infos.Chapitre 2 Votre MacBook Pro au quotidien 35
Pour obtenir des
informations sur :
Reportez-vous aux sources suivantes :
Actualités, téléchargement
gratuits et catalogues en
ligne des logiciels et du
matériel Apple
Site web d’Apple à l’adresse www.apple.com/fr.
Instructions, assistance
technique et manuels
des produits Apple
Site web d’assistance Apple à l’adresse www.apple.com/support/fr.Aide Mac Mémoire RAM
www.apple.com/fr/store
Améliorez les performances
de votre MacBook Pro
338 Chapitre 3 Améliorez les performances de votre MacBook Pro
Ce chapitre fournit des informations et des instructions pour l’installation d’un disque
dur plus performant et la mise en place de mémoire supplémentaire dans votre
MacBook Pro.
AVERTISSEMENT : Apple vous recommande de confier l’ajout de mémoire et la
mise en place d’un nouveau disque dur à un technicien agréé Apple. Consultez les
informations sur le dépannage et l’assistance qui accompagnent votre ordinateur
pour savoir comment contacter Apple. Tout dommage causé à votre matériel en
tentant d’installer vous-même de la mémoire ou un disque dur n’est pas couvert
par la garantie limitée de votre ordinateur.
Vous ne pouvez pas remplacer la batterie de votre MacBook Pro vous-même. Si vous
pensez que votre batterie doit être changée, contactez un revendeur Apple ou un
fournisseur de services agréé Apple.Chapitre 3 Améliorez les performances de votre MacBook Pro 39
Remplacement du disque dur
Vous pouvez remplacer le disque dur de votre MacBook Pro par un modèle plus
performant. Le disque dur se trouve à côté de la batterie intégrée lorsque vous ouvrez
le fond de votre MacBook Pro. Le disque dur de remplacement doit être de 2,5 pouces
et doté d’un connecteur Serial ATA (SATA).
Important : Apple vous recommande de sauvegarder les données de votre disque dur
avant de l’enlever et de le remplacer. Apple décline toute responsabilité en cas de perte
de données.
Pour remplacer le disque dur de votre MacBook Pro :
1 Éteignez votre MacBook Pro. Débranchez l’adaptateur secteur, le câble Ethernet, les
câbles USB, le verrou de sécurité et tous les autres câbles connectés au MacBook Pro
afin d’éviter toute détérioration de ce dernier.
AVERTISSEMENT : les composants internes de votre MacBook Pro risquent d’être
chauds. Si vous venez d’utiliser votre MacBook Pro, attendez 10 minutes après
l’avoir éteint, afin de laisser aux composants internes le temps de se refroidir.
2 Retournez votre MacBook Pro et retirez les dix (10) vis qui maintiennent le fond du
boîtier. Retirez les vis les plus courtes des angles, comme indiqué sur l’illustration.
Soulevez ce dernier et placez-le sur le côté.40 Chapitre 3 Améliorez les performances de votre MacBook Pro
Important : comme ces vis sont de longueurs différentes, prenez note de leur longueur
et de leur position respective pour pouvoir les replacer correctement. Rangez-les en
lieu sûr à portée de main.
Petit
GrandChapitre 3 Améliorez les performances de votre MacBook Pro 41
Important : en retirant le fond du boîtier, vous avez mis à nu des composants internes
fragiles. Ne touchez rien d’autre que la structure de montage du disque dur lorsque
vous retirez ou ajoutez un disque dur.
3 Touchez une surface métallique à l’intérieur de l’ordinateur afin de décharger toute
électricité statique que vous pourriez avoir emmagasinée.42 Chapitre 3 Améliorez les performances de votre MacBook Pro
4 Repérez l’attache qui se trouve au-dessus du disque dur. Utilisez un tournevis
cruciforme pour desserrer les deux vis imperdables qui maintiennent l’attache
en place. Rangez cette dernière en lieu sûr à portée de main.
5 Tirez sur la languette prévue à cet effet pour soulever doucement le disque et l’extraire
de la baie.
Attache
LanguetteChapitre 3 Améliorez les performances de votre MacBook Pro 43
6 Tenez le disque dur par les côtés tout en tirant doucement sur le connecteur qui se
trouve sur le côté droit du disque afin de le déconnecter. N’écrasez pas le disque entre
vos doigts et évitez de toucher les circuits situés sur la face inférieure du disque.
Connecteur
Le connecteur est relié à un câble et demeure à l’intérieur de la baie de disque dur.44 Chapitre 3 Améliorez les performances de votre MacBook Pro
Important : il y a quatre (4) vis de montage sur les côtés de votre disque dur. Si votre
nouveau disque dur n’est pas fourni avec des vis de montage, récupérez les vis de
votre ancien disque dur et montez-les sur le nouveau avant de l’installer.
Vis de montage
7 Branchez le connecteur sur la partie droite du nouveau disque dur.Chapitre 3 Améliorez les performances de votre MacBook Pro 45
8 Insérez le nouveau disque dur en le tenant incliné et en vous assurant que les vis de
montage sont correctement placées.
9 Replacez l’attache et serrez les vis.46 Chapitre 3 Améliorez les performances de votre MacBook Pro
10 Remettez le fond du boîtier en place. Remettez à leur place respective et serrez les dix
vis que vous avez retirées à l’étape 2 après vous être assuré que les plus courtes étaient
dans les angles, comme indiqué sur l’illustration.
Petit
Grand
Pour obtenir des informations sur l’installation de Mac OS X et des applications incluses,
consultez la rubrique « Réinstallation deslogicielsfournis avec le MacBook Pro » à la page 65.Chapitre 3 Améliorez les performances de votre MacBook Pro 47
Installation de mémoire supplémentaire
Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez
accéder en retirant le fond du boîtier. Le MacBook Pro est doté d’une mémoire DDR3
(Double Data Rate) SDRAM (Synchronous Dynamic Random-Access Memory) à
1066 MHz, d’un minimum de quatre gigaoctets (4 Go). Chaque logement de mémoire
peut accueillir un module SDRAM conforme aux spécifications suivantes :
 Module DDR3 (Double Data Rate Small Outline Dual Inline Memory Module)
 30 mm
 204 broches
 2 Go ou 4 Go
 Mémoire RAM de type PC3-8500 DDR3 SO-DIMM à 1066 MHz
Vous pouvez ajouter deux modules de mémoire de 4 Go pour un total de 8 Go
de mémoire au maximum. Pour des performances optimales, remplissez les deux
logements de mémoire en y installant des modules identiques.
Pour installer de la mémoire dans votre MacBook Pro :
1 Suivez les étapes 1 à 3 à partir de la page 39.
Important : en retirant le fond du boîtier, vous mettez à nu des composants internes
fragiles. Veillez à ne toucher que la structure de montage de la mémoire lorsque vous
retirez ou que vous ajoutez de la mémoire.48 Chapitre 3 Améliorez les performances de votre MacBook Pro
2 Repoussez vers l’extérieur les leviers qui se trouvent sur les côtés du module de
mémoire, afin de libérer le module du logement de la carte mémoire.
La carte mémoire se dégage alors en se soulevant légèrement d’un côté. Avant de la
retirer, assurez-vous que les encoches en demi-cercle sont bien visibles. Si ce n’est pas
le cas, réessayez en repoussant les leviers vers l’extérieur.Chapitre 3 Améliorez les performances de votre MacBook Pro 49
3 Saisissez le module de mémoire en le tenant par ses encoches, puis retirez-le du
logement.
4 Retirez l’autre module de mémoire.
Important : saisissez les modules de mémoire en les tenant par les côtés et en veillant
à ne pas toucher les connecteurs dorés.
5 Insérez le nouveau module de mémoire dans le logement :
a Alignez l’encoche du bord doré du module sur celle qui se trouve dans le logement
de mémoire inférieur.
b Inclinez la carte et poussez-la dans le logement.
c Utilisez deux doigts pour exercer une pression ferme et uniforme afin de pousser le
module de mémoire vers le bas.
Vous devez entendre un clic indiquant que la mémoire est correctement insérée.
d Répétez l’opération pour installer un module de mémoire supplémentaire dans le
logement supérieur. Appuyez sur le module pour vous assurer qu’il est bien de niveau.50 Chapitre 3 Améliorez les performances de votre MacBook Pro
Encoches
6 Suivez les instructions de replacement de la plaque du socle, présentées à l’étape 10
à la page 46.Chapitre 3 Améliorez les performances de votre MacBook Pro 51
Reconnaissance de la nouvelle mémoire par le MacBook Pro
Après avoir ajouté de la mémoire au MacBook Pro, vérifiez si elle est reconnue.
Pour vérifier la mémoire de votre ordinateur :
1 Démarrez votre MacBook Pro.
2 Lorsque le bureau Mac OS X apparaît, choisissez le menu Pomme () dans la barre
des menus, puis sélectionnez « À propos de ce Mac ».
Pour en savoir plus sur la quantité de mémoire installée sur votre ordinateur, ouvrez
Informations système en cliquant sur Plus d’infos, puis cliquez sur Mémoire.
Si votre MacBook Pro ne reconnaît pas la mémoire ou ne démarre pas correctement,
assurez-vous qu’elle est compatible avec votre MacBook Pro et correctement installée.Aide Mac Aide
www.apple.com/fr/support
À tout problème sa solution
454 Chapitre 4 À tout problème sa solution
Vous pouvez rencontrer, à titre exceptionnel, des problèmes en utilisant le MacBook Pro.
Lisez la suite pour obtenir des conseils de dépannage utiles en cas de problème. Vous
trouverez des informations supplémentaires concernant le dépannage dans l’Aide Mac
et sur le site web d’assistance consacré au MacBook Pro, à l’adresse
www.apple.com/fr/support/macbookpro.
Il existe généralement une solution simple et rapide aux problèmes que vous pouvez
rencontrer à l’utilisation du MacBook Pro. Réfléchissez aux conditions qui ont entraîné
l’apparition de ce problème. Ce récapitulatif de la totalité des opérations effectuées
avant que le problème ne survienne permet de restreindre les causes possibles et de
trouver la solution. Les éléments à noter comprennent:
 les applications que vous étiez en train d’utiliser quand le problème est apparu ; les
problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer
que cette application n’est pas compatible avec la version de Mac OS X installée sur
votre ordinateur ;
 les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre
dossier Système ;
 tout nouveau composant matériel installé (mémoire supplémentaire ou périphérique,
par exemple).Chapitre 4 À tout problème sa solution 55
Problèmes vous empêchant d’utiliser votre MacBook Pro
Si votre MacBook Pro ne répond plus ou que le pointeur se fige
Il peut arriver, très rarement, qu’une application se « bloque » à l’écran. Mac OS X offre
un moyen de fermer une application bloquée sans redémarrer votre ordinateur.
Pour forcer la fermeture d’une application :
1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu
Pomme () > Forcer à quitter dans la barre des menus.
La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application est
sélectionnée.
2 Cliquez sur Forcer à quitter.
L’application se ferme, en laissant toutes les autres applications ouvertes.
Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone
de dialogue.
Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez
l’ordinateur afin de vous assurer que le problème est entièrement réglé.
Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des
menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en
cas de blocage ou d’absence de réponse de l’ordinateur.
Si le problème ne survient que lorsque vous utilisez une application particulière,
vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir
des informations de contact et une assistance concernant les logiciels fournis avec le
MacBook Pro, rendez-vous à l’adresse www.apple.com/guide.56 Chapitre 4 À tout problème sa solution
Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le
logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels
fournis avec le MacBook Pro » à la page 65.
Si le MacBook Pro se bloque au démarrage, si un point d’interrogation clignotant
apparaîtou si l’écran est éteint et que la lampe témoin de suspension d’activité
reste allumée (pas en mode de suspension d’activité)
Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient
pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe
relié à l’ordinateur.
 Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le
en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes.
Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur
en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option
enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis
sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système
et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.
 Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire de
disque :
• Insérez le DVD d’installation de Mac OS X dans votre ordinateur.
• Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du
démarrage.
• Choisissez Installation dans la barre des menus puis sélectionnez Ouvrir Utilitaire de
disque. Lorsqu’Utilitaire de disque s’ouvre, suivez les instructions de la sous-fenêtre
S.O.S pour savoir s’il est en mesure de réparer le disque.Chapitre 4 À tout problème sa solution 57
Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller
le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des
logiciels fournis avec le MacBook Pro » à la page 65.
Si votre MacBook Pro ne s’allume ou ne démarre pas
Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :
 Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une
prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe 85 W
fourni avec le MacBook Pro. Si l’adaptateur secteur ne recharge plus l’ordinateur et
que la lampe témoin du connecteur MagSafe ne s’allume pas lorsque vous branchez
le câble d’alimentation, essayez de débrancher le câble puis de le brancher à nouveau
afin de le réinitialiser ou essayer à partir d’une autre prise.
 Vérifiez si votre batterie à besoin d’être rechargée. Appuyez sur le petit bouton qui
se trouve sur le côté gauche de votre ordinateur. Vous devez voir apparaître un à huit
témoins lumineux indiquant le niveau de charge de la batterie. Si une seule lampe
témoin est allumée, branchez votre adaptateur secteur pour recharger l’ordinateur.
Pour en savoir plus sur les lampes témoins de la batterie, consultez la page 58.
 Si le problème persiste, fermez tous les documents ouverts et quittez toutes les
applications. Pour rétablir les réglages d’origine de l’ordinateur (tout en préservant
vos fichiers), appuyez en même temps et pendant cinq secondes sur la touche
Maj gauche, la touche Option (alt) gauche, la touche Contrôle gauche et le bouton
d’alimentation (®) jusqu’à ce que l’ordinateur redémarre.
 Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement
installée et qu’elle est compatible avec votre ordinateur. Vérifiez si le retrait de cette
mémoire et la remise en place de l’ancienne permet à l’ordinateur de démarrer (voir
la page 47).58 Chapitre 4 À tout problème sa solution
 Pour réinitialiser la PRAM, appuyez sur le bouton d’alimentation (®) et maintenez
immédiatement les touches Commande (x), Option, P et R enfoncées jusqu’à ce
que vous entendiez une deuxième fois le signal sonore de démarrage.
 Si vous ne parvenez toujours pas à démarrer le MacBook Pro, consultez la rubrique
« Informations, services et assistance » à la page 67 qui contient les informations
nécessaires pour prendre contact avec Apple.
Si l’écran devient subitement noir ou que votre MacBook Pro se bloque
Essayez de redémarrer votre MacBook Pro.
1 Débranchez tout périphérique connecté à votre MacBook Pro excepté l’adaptateur
secteur.
2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système.
3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant la
connexion d’un périphérique et la reprise du travail.
Pour savoir où en est la charge de la batterie, cliquez sur l’icône d’état de la batterie
( ) dans la barre des menus ou jetez un œil aux témoins de la batterie, à gauche
de votre MacBook Pro.
Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie
de la batterie sont en place.
Si vous appuyez sur le bouton de la batterie et que toutes les lampes témoins
clignotent cinq fois de suite
Votre batterie doit être remplacée. Prenez contact avec un magasin Apple Store
ou un fournisseur de services agréé Apple.Chapitre 4 À tout problème sa solution 59
Si vous appuyez sur le bouton de la batterie et que les lampes témoins clignotent
cinq fois de suite de gauche à droite, puis de droite à gauche
Votre batterie n’est pas reconnue. Prenez contact avec un magasin Apple Store ou un
fournisseur de services agréé Apple.
Si vous oubliez votre mot de passe
Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de
tous les autres comptes.
1 Insérez le DVD d’installation de Mac OS X. Redémarrez ensuite votre ordinateur en
maintenant la touche C enfoncée lors du démarrage.
2 Choisissez Utilitaires > « Réinitialiser le mot de passe » dans la barre des menus, puis
suivez les instructions à l’écran.
En cas de problème à l’éjection d’un disque
Fermez toutes les applications susceptibles d’utiliser le disque et essayez à
nouveau. Si cela ne donne pas de résultats, redémarrez l’ordinateur, puis maintenez
immédiatement le bouton du trackpad enfoncé.
Utilisation d’Apple Hardware Test
Si vous pensez qu’il y a un problème avec les composants matériels du MacBook Pro,
vous pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas (les
composants affectés peuvent être la mémoire ou le processeur, par exemple).
Pour utiliser Apple Hardware Test :
1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur
secteur.60 Chapitre 4 À tout problème sa solution
Si un câble Ethernet est connecté, déconnectez-le.
2 Redémarrez ensuite votre ordinateur en maintenant la touche D enfoncée lors du
démarrage.
3 Lorsque l’écran de sélection d’Apple Hardware Test s’affiche, choisissez votre langue.
4 Appuyez sur la touche Retour ou cliquez sur la flèche droite.
5 Lorsque l’écran principal d’Apple Hardware Test s’affiche (après 45 secondes environ),
suivez les instructions à l’écran.
6 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur.
Notez le code d’erreur
avant d’entreprendre les démarches d’assistance. Si Apple Hardware Test ne détecte
pas de panne matérielle, il est probable que le problème soit lié aux logiciels.
Si la procédure ne fonctionne pas, insérez le DVD d’installation des applications pour lancer
l’outil Apple Hardware Test. Pour en savoir plus, consultez le fichier « À propos d’AHT » qui
se trouve sur le DVD d’installation des applications fourni avec votre ordinateur.
Problèmes de connexion à Internet
Votre MacBook Pro dispose de l’application Assistant réglages de réseau pour vous
aider tout au long de la procédure de configuration d’une connexion à Internet. Ouvrez
Préférences Système, puis cliquez sur Réseau. Cliquez sur le bouton « Assistant » pour
ouvrir Assistant réglages de réseau.
En cas de problème avec votre connexion à Internet, vous pouvez essayer les méthodes
exposées dans cette rubrique pour votre type de connexion ou vous pouvez utiliser
Diagnostic réseau.Chapitre 4 À tout problème sa solution 61
Pour utiliser Diagnostic réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau puis cliquez sur « Assistant ».
3 Cliquez sur Diagnostic pour lancer Diagnostic réseau.
4 Suivez les instructions à l’écran.
Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe
peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous
connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès
à Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter
de réaliser les opérations suivantes.
Connexions à Internet par modem câble, modem DSL ou réseau local (LAN)
Assurez-vous que tous les câbles du modem sont correctement branchés, y compris
le câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et le câble
raccordant le modem à la prise murale. Vérifiez également les câbles et l’alimentation
de vos routeurs et concentrateurs Ethernet.
Éteignez puis rallumez le modem et réinitialisez les composants matériels du modem.
Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains
fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation
du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez
l’actionner avant ou après avoir éteint puis rallumé le modem.
Important : les instructions relatives aux modems ne concernent pas les utilisateurs de
réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de
réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs
de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI.62 Chapitre 4 À tout problème sa solution
Connexions PPPoE
Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via
PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les informations que
vous avez saisies dans les préférences Réseau sont correctes.
Pour vérifier les réglages de vos préférences Réseau :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur Réseau.
3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez
PPPoE dans le menu local Interface.
4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez
Ethernet si vous vous connectez à un réseau câblé ou AirPort si vous vous connectez
à un réseau sans fil.
5 Saisissez les informations fournies par votre fournisseur d’accès, tel que le nom du
compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès le
demande).
6 Cliquez sur Appliquer pour activer les réglages.Chapitre 4 À tout problème sa solution 63
Connexions au réseau
Assurez-vous que le câble Ethernet est branché sur le MacBook Pro et sur le réseau.
Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet.
Si vous disposez de plusieurs ordinateurs tentant de partager une connexion à Internet,
assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre FAI
fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur.
Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de
partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de
masquage d’adresses IP. Pour obtenir des informations sur la configuration, consultez
la documentation fournie avec votre routeur ou contactez la personne qui a configuré
votre réseau. La borne d’accès AirPort peut être utilisée pour que plusieurs ordinateurs
partagent une adresse IP. Pour obtenir des informations sur l’utilisation d’une borne
d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web AirPort Extreme,
à l’adresse www.apple.com/fr/support/airport.
Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés,
adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau.
Problèmes de communication sans fil avec AirPort Extreme
En cas de problème avec les communications sans fil AirPort Extreme
 Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est
activé et dispose d’un point d’accès sans fil.
 Assurez-vous que le logiciel est correctement configuré conformément aux
instructions incluses avec votre borne d’accès ou point d‘accès.64 Chapitre 4 À tout problème sa solution
 Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la
zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques
ou des structures métalliques se trouvant à proximité peuvent interférer avec
les communications sans fil et réduire la portée de votre antenne. Vous pouvez
éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.
 Vérifiez l’icône d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres de
mesure apparaissent pour afficher la puissance du signal. Si les barres ne s’affichent
pas, tentez de changer de place.
 Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis
Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions
fournies avec votre appareil sans fil.
Maintien à jour de vos logiciels
Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les
dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple.
Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte
les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer votre
MacBook Pro afin qu’il recherche régulièrement les mises à jour disponibles, pour
que vous puissiez ensuite télécharger et installer les mises à jour de logiciels.
Pour rechercher des logiciels mis à jour :
1 Choisissez le menu Pomme () > Préférences Système.
2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.
 Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.
 Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse
www.apple.com/fr/macosx.Chapitre 4 À tout problème sa solution 65
Réinstallation des logiciels fournis avec le MacBook Pro
Les disques d’installation de logiciels fournis avec votre MacBook Pro permettent de
réinstaller Mac OS X et les applications livrées avec votre ordinateur. Vous pouvez
installer Mac OS X sans effacer le volume cible, ce qui vous permet de conserver vos
fichiers et réglages, mais si vous le souhaitez, vous pouvez effacer le volume pour
supprimer toutes vos données avant de réinstaller Mac OS X et les applications.
Important : Apple vous recommande de sauvegarder les données de votre disque dur
avant de procéder à la restauration des logiciels. Apple décline toute responsabilité en
cas de perte de données.
Installation de Mac OS X
Pour installer Mac OS X :
1 Sauvegardez vos fichiers importants.
2 Insérez le DVD d’installation de Mac OS X fourni avec votre ordinateur.
3 Double-cliquez sur Installation Mac OS X.
4 Suivez les instructions à l’écran.
Remarque : pour restaurer les réglages d’origine de Mac OS X sur votre MacBook Pro,
vous devez d’abord effacer le volume cible. Pour ce faire, vous pouvez avoir recours
à Utilitaire de disque pendant l’installation. Pour savoir comment procéder, consultez
l’article correspondant de la base de connaissance à l’adresse
support.apple.com/kb/HT3910?viewlocale=fr_FR.
5 Une fois l’installation terminée, cliquez sur Redémarrer pour redémarrer votre ordinateur.
6 Suivez les instructions données par l’Assistant réglages pour configurer votre compte
utilisateur.66 Chapitre 4 À tout problème sa solution
Si vous effacez votre disque dur pendant l’installation, vous devez réinstaller vos
applications ; consultez la section suivante.
Réinstallation des applications
Si vous avez effacé votre disque dur lors de la réinstallation de Mac OS X, vous devez
également réinstaller les applications fournies avec votre MacBook Pro (comme les
applications iLife).
Pour installer les applications fournies avec votre MacBook Pro :
1 Sauvegardez vos fichiers importants.
2 Insérez le DVD d’installation des applications fourni avec votre MacBook pro.
3 Double-cliquez sur « Install Bundled Software ».
4 Suivez les instructions à l’écran.
5 Cliquez sur Fermer une fois l’installation terminée.
Utilisation d’Utilitaire de disque
Vous pouvez utiliser Utilitaire de disque pour réparer, vérifier ou effacer le disque dur
de votre MacBook Pro.
Pour utiliser Utilitaire de disque :
1 Insérez le DVD d’installation de Mac OS X fourni avec votre ordinateur.
2 Double-cliquez sur Installation Mac OS X.
3 Après avoir sélectionné votre langue, choisissez Utilitaires > Ouvrir Utilitaire de disque,
puis suivez les instructions affichées dans la sous-fenêtre S.O.S. pour savoir si Utilitaire
de disque peut réparer votre disque.
4 Quittez le programme d’installation de Mac OS X.Chapitre 4 À tout problème sa solution 67
Si Utilitaire de disque ne résout pas le problème, essayez de réinstaller le logiciel
système de votre MacBook Pro. Consultez la rubrique « Réinstallation des logiciels
fournis avec le MacBook Pro » à la page 65.
Informations, services et assistance
Outre le disque dur et la mémoire, votre MacBook Pro ne contient aucune pièce que
vous puissiez réparer vous-même. Si vous avez besoin de services de réparation,
adressez-vous à Apple ou portez votre MacBook Pro chez un fournisseur de services
agréé Apple. Vous trouverez de plus amples informations sur le MacBook Pro en ligne,
dans l’aide à l’écran, dans Informations Système et via Apple Hardware Test.
Informations en ligne
Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur
www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez
faire des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de
nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums
de discussion Apple.
Aide à l’écran
Vous pouvez chercher des réponses à vos questions ainsi que des instructions et des
informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac.68 Chapitre 4 À tout problème sa solution
Informations Système
Pour obtenir des informations sur le MacBook Pro, servez-vous d’Informations Système.
Cette application vous fournit la liste des composants matériels et des logiciels installés,
le numéro de série et de version du système d’exploitation, la quantité de mémoire
installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () >
À propos de ce Mac dans la barre des menus, puis cliquez sur Plus d’infos.
Service et assistance AppleCare
Votre MacBook Pro s’accompagne d’une assistance technique de 90 jours et d’un an de
couverture pour les réparations de matériel effectuées dans les magasins Apple Store
ou les centres de réparations agréés Apple, tel qu’un fournisseur de services agréé
Apple. Vous avez la possibilité d’étendre la durée de cette couverture en adhérant
à un programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur
www.apple.com/fr/support/products ou visitez le site web correspondant à votre
pays (voir la liste ci-dessous).
Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare
peut vous aider à installer et à ouvrir les applications, et propose des services de
dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous
(gratuit pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série
de votre MacBook Pro à portée de main lorsque vous appelez.
Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date
d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer.Chapitre 4 À tout problème sa solution 69
Pays Téléphone Site web
Allemagne (49) 01805 009 433 www.apple.com/de/support
Autriche (43) 0810 300 427 www.apple.com/at/support
Belgique (flamand)
(français)
(32) 070 700 772
(32) 070 700 773
www.apple.com/benl/support
www.apple.com/befr/support
France (Metropolitain)
(DOM-TOM)
(33) 0805 540 003 www.apple.com/fr/support
Luxembourg (352) 800 24550 www.apple.com/befr/support
Suisse (français)
(allemand)
(41) 0848 000 132
(41) 0848 000 132
www.apple.com/chfr/support
www.apple.com/chde/support
Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques
locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet :
www.apple.com/support/contact/phone_contacts.html70 Chapitre 4 À tout problème sa solution
Localisation du numéro de série de votre produit
Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre
ordinateur :
 Retournez votre MacBook Pro. Le numéro de série est gravé sur le boîtier, près
de la charnière.
Numéro de série
 Choisissez le menu Pomme () dans la barre des menus, puis sélectionnez « À
propos de ce Mac ». Cliquez sur le numéro de version sous « Mac OS X » pour passer
du numéro de version de Mac OS X au numéro de révision, puis au numéro de série.
 Cliquez sur l’icône du Finder, puis ouvrez /Applications/Utilitaires/Informations
Système. Cliquez ensuite sur Matériel dans la sous-fenêtre Contenu.Aide Mac Ergonomie
www.apple.com/fr/environment
Dernières recommandations
572 Chapitre 5 Dernières recommandations
Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces
consignes concernant le nettoyage et la manipulation de votre MacBook Pro ainsi
que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans
un endroit facile d’accès pour vous et pour les utilisateurs éventuels.
AVERTISSEMENT : la garantie du fabricant pourra être annulée si votre ordinateur a
été utilisé ou stocké de manière impropre.
Informations importantes concernant la sécurité
AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner
des décharges électriques ou entraîner tout type de blessure ou dommage.
Batterie intégrée Ne retirez pas la batterie de votre MacBook Pro. La batterie doit
être remplacée uniquement par un fournisseur de services agréé Apple. Interrompez
l’utilisation de votre MacBook Pro s’il tombe ou semble cassé, tordu, déformé ou abîmé.
N’exposez pas l’ordinateur à des températures supérieures à 100 °C.
Manipulation correcte Installez le MacBook Pro sur un plan de travail stable en veillant à
ce que l’air puisse circuler librement sous l’ordinateur et autour de celui-ci. N’utilisez pas
le MacBook Pro en le posant sur un coussin ou tout autre objet de structure non solide
car cela pourrait empêcher les conduits d’aération de fonctionner correctement. Évitez
également de placer des objets sur le clavier lorsque vous utilisez votre MacBook Pro.
N’introduisez jamais d’objets d’aucune sorte dans les ouvertures servant à la ventilation.Chapitre 5 Dernières recommandations 73
La partie inférieure du MacBook Pro peut chauffer au cours d’une utilisation normale
de l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il dégage vous gêne,
posez-le plutôt sur un plan de travail stable.
Eau et endroits humides Évitez de placer votre MacBook Pro à proximité de sources
de liquide telles que des boissons, un évier, un lavabo, une baignoire ou une douche,
par exemple. Protégez votre MacBook Pro de l’humidité et des intempéries (neige,
pluie et brouillard par exemple).
Adaptateur secteur MagSafe 85 W Veillez à ce que la fiche ou le câble d’alimentation
secteur CA soit totalement enclenché dans l’adaptateur secteur avant de brancher ce
dernier sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne
le MacBook Pro ou, au besoin, un adaptateur secteur agréé Apple compatible avec
ce produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de
l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant
ou posez-le par terre, dans un endroit correctement aéré.
Débranchez l’adaptateur secteur et débranchez tous les autres câbles si l’un des cas
suivants se présente :
 Vous cherchez à ajouter de la mémoire ou à remplacer le disque dur.
 Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions
fournies à la page 77).
 La prise ou le câble d’alimentation est endommagé.
 Le MacBook Pro ou l’adaptateur secteur est exposé à la pluie ou à une humidité
excessive, ou du liquide a été versé dans le boîtier.
 Le MacBook Pro ou l’adaptateur secteur a subi une chute, le boîtier a été
endommagé ou vous pensez qu’une réparation est nécessaire.74 Chapitre 5 Dernières recommandations
Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte
de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de
matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment
ou autres) à moins de 25 mm de ce port.
Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les
doucement à l’aide d’un bâtonnet de coton.
Spécifications de l’alimentation MagSafe :
 Fréquence : phase unique de 50 à 60 Hz
 Tension de secteur : de 100 à 240 V
 Tension de sortie : 18,5 V CC, 4,6 A
Diminution de l’acuité auditive Vous risquez une perte d’audition irréparable si vous
utilisez un casque ou des écouteurs à un volume sonore élevé. L’oreille peut s’adapter
petit à petit à des volumes sonores de plus en plus élevés qui peuvent sembler
normaux, mais qui risquent à la longue d’endommager votre système auditif. En cas de
sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les écouteurs
et consultez un médecin. Plus le volume est élevé, plus votre audition risque d’être
affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent
de prendre les mesures suivantes :
 Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque
d’écoute.
 Évitez d’augmenter le volume afin de bloquer les bruits environnants.
 Baissez le volume si vous ne parvenez pas à entendre une personne qui parle
à côté de vous.Chapitre 5 Dernières recommandations 75
Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des
installations nucléaires, pour la navigation ou la communication aérienne, pour le
contrôle du trafic aérien, ni dans aucune autre situation où une panne du système
informatique pourrait entraîner la mort, des blessures ou de graves dommages
écologiques.
Informations concernant le laser pour lecteurs optiques
AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui ne
sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à des
rayonnements dangereux.
Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans
danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux
s’il est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par
un fournisseur de services agréé Apple.
Informations importantes sur la manipulation
AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer
des dommages à votre MacBook Pro ou à d’autres objets.
Environnement d’utilisation L’utilisation de votre MacBook Pro en dehors de ces
plages peut gêner son bon fonctionnement :
 Température de fonctionnement : de 10 à 35 °C
 Température de stockage : de -20 à 45 °C76 Chapitre 5 Dernières recommandations
 Humidité relative : de 5 % à 90 % (sans condensation)
 Altitude de fonctionnement : de 0 à 3 048 mètres (de 0 à 10 000 pieds)
Mise sous tension de votre MacBook Pro N’allumez jamais le MacBook Pro tant
que tous ses composants internes ou externes ne sont pas en place. L’utilisation de
l’ordinateur alors que certains composants manquent peut s’avérer dangereuse et
risque de l’endommager.
Transport du MacBook Pro Si vous transportez le MacBook Pro dans un sac ou dans
un attaché-case, assurez-vous que ce dernier ne contient pas d’objets non attachés
(des trombones ou des pièces de monnaie, par exemple) qui pourraient pénétrer
accidentellement dans l’ordinateur par un orifice d’aération ou la fente du lecteur
optique ou se coincer à l’intérieur d’un port. Maintenez également à l’écart du port
secteur MagSafe tout objet à sensibilité magnétique.
Utilisation des connecteurs et des ports Ne forcez jamais l’insertion d’un connecteur
dans un port. Lorsque vous connectez un périphérique, assurez-vous que le port n’est
pas obstrué, que le connecteur est adapté au port et qu’il est correctement orienté par
rapport à ce dernier.
Utilisation du lecteur optique Le lecteur SuperDrive du MacBook Pro prend en charge
les disques standard de 12 cm. Les disques de forme irrégulière et de moins de 12 cm
ne peuvent pas être lus.
Manipulation des parties en verre Votre MacBook Pro contient des composants
en verre, notamment l’écran et le trackpad. Si elles sont abîmées, n’utilisez pas votre
MacBook Pro tant qu’il n’a pas été réparé par un fournisseur de services agréé Apple.Chapitre 5 Dernières recommandations 77
Stockage du MacBook Pro Si vous décidez de ranger votre MacBook Pro pendant
une longue période, placez-le dans un endroit frais (idéalement à 22 °C) et déchargez
au moins la moitié de la batterie. Lorsque vous ne touchez plus à votre MacBook Pro
pendant plus de cinq mois, déchargez la batterie à environ 50 pour cent. Pour conserver
les capacités de la batterie, rechargez la batterie jusqu’à 50 pour cent tous les six mois
environ.
Nettoyage du MacBook Pro Lorsque vous nettoyez le boîtier de votre MacBook Pro
et de ses composants, éteignez d’abord le MacBook Pro et débranchez-le du secteur.
Puis, pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon doux, humide et non
pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne
vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni aérosols, ni
dissolvants, ni abrasifs qui pourraient endommager les finitions de l’appareil.
Nettoyage de l’écran de votre MacBook Pro Pour nettoyer l’écran de votre
MacBook Pro, éteignez d’abord celui-ci et débranchez-le du secteur. Humidifiez ensuite,
à l’eau seulement, le chiffon fourni et essuyez l’écran. Ne vaporisez jamais de liquide
directement sur l’écran.78 Chapitre 5 Dernières recommandations
Ergonomie
Voici quelques conseils pour la mise en place d’un environnement de travail sain.
Clavier et trackpad
Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules
doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main
étant placée dans le prolongement du poignet.
Position
à éviter
Position
recommandée
Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou que
vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes.Chapitre 5 Dernières recommandations 79
Position
à éviter
Position
recommandée
Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail
continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs
aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste.
Souris externe
Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier.
Ménagez un espace suffisant pour la manipuler avec aisance.
Siège
Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables.
Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale et vos
pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à-
dire la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte que
le réglage du dossier soit parfaitement adapté à votre morphologie.80 Chapitre 5 Dernières recommandations
Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient
placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à
plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez
d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter
l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont le
poste de saisie est situé plus bas que le plan de travail.
Écran intégré
Réglez l’angle d’affichage afin d’optimiser l’affichage dans votre environnement. Ne
forcez pas l’écran si vous rencontrez une résistance. L’angle d’ouverture maximal de
l’écran ne peut dépasser 130 degrés.
Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez
l’ordinateur ou que l’éclairage ambiant change.
Vous trouverez d’autres informations concernant l’ergonomie sur Internet :
www.apple.com/about/ergonomics
Apple et l’environnement
Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses
produits et de ses activités sur l’environnement.
Des informations supplémentaires sont disponibles sur Internet:
www.apple.com/fr/environment81
FCC Compliance Statement
This device complies with part 15 of the FCC rules. Operation
is subject to the following two conditions: (1) This device may
not cause harmful interference, and (2) this device must accept
any interference received, including interference that may cause
undesired operation. See instructions if interference to radio or
television reception is suspected.
L‘utilisation de ce dispositif est autorisée seulement aux
conditions suivantes: (1) il ne doit pas produire de brouillage
et (2) l’utilisateur du dispositif doit étre prêt à accepter tout
brouillage radioélectrique reçu, même si ce brouillage est
susceptible de compromettre le fonctionnement du dispositif.
Radio and Television Interference
This computer equipment generates, uses, and can radiate radiofrequency energy. If it is not installed and used properly—that
is, in strict accordance with Apple’s instructions—it may cause
interference with radio and television reception.
This equipment has been tested and found to comply with
the limits for a Class B digital device in accordance with the
specifications in Part 15 of FCC rules. These specifications
are designed to provide reasonable protection against such
interference in a residential installation. However, there is
no guarantee that interference will not occur in a particular
installation.
You can determine whether your computer system is causing
interference by turning it off. If the interference stops, it was
probably caused by the computer or one of the peripheral devices.
If your computer system does cause interference to radio or
television reception, try to correct the interference by using one or
more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the computer to one side or the other of the television
or radio.
• Move the computer farther away from the television or radio.
• Plug the computer into an outlet that is on a different circuit
from the television or radio. (That is, make certain the computer
and the television or radio are on circuits controlled by different
circuit breakers or fuses.)
If necessary, consult an Apple Authorized Service Provider or
Apple. See the service and support information that came with
your Apple product. Or consult an experienced radio/television
technician for additional suggestions.
Important: Changes or modifications to this product not
authorized by Apple Inc. could void the EMC compliance and
negate your authority to operate the product.
This product has demonstrated EMC compliance under conditions
that included the use of compliant peripheral devices and shielded
cables (including Ethernet network cables) between system
components. It is important that you use compliant peripheral
devices and shielded cables between system components to
reduce the possibility of causing interference to radios, television
sets, and other electronic devices.
Responsible party (contact for FCC matters only):
Apple Inc. Corporate Compliance
1 Infinite Loop M/S 26-A
Cupertino, CA 95014
Wireless Radio Use
This device is restricted to indoor use when operating in the 5.15 to
5.25 GHz frequency band.
Cet appareil doit être utilisé à l’intérieur.
Exposure to Radio Frequency Energy
The radiated output power of the AirPort Extreme technology is
below the FCC radio frequency exposure limits. Nevertheless, it is
advised to use the wireless equipment in such a manner that the
potential for human contact during normal operation is minimized.
FCC Bluetooth Wireless Compliance
The antenna used with this transmitter must not be colocated or
operated in conjunction with any other antenna or transmitter
subject to the conditions of the FCC Grant.
Bluetooth Industry Canada Statement
This Class B device meets all requirements of the Canadian
interference-causing equipment regulations.
Cet appareil numérique de la Class B respecte toutes les exigences
du Règlement sur le matériel brouilleur du Canada.82
Industry Canada Statement
Complies with the Canadian ICES-003 Class B specifications.
Cet appareil numérique de la classe B est conforme à la norme
NMB-003 du Canada. This device complies with RSS 210 of Industry
Canada.
Bluetooth Europe—EU Declaration of Conformity
This wireless device complies with the R&TTE Directive.
Europe—EU Declaration of Conformity
The equipment complies with the RF Exposure Requirement
1999/519/EC, Council Recommendation of 12 July 1999 on the
limitation of exposure of the general public to electromagnetic
fields (0 Hz to 300 GHz).
Hereby, Apple Inc. declares that this 802.11a/b/g/n Mini-PCIe card is
in compliance with the R&TTE Directive.
Complies with European Low Voltage and EMC Directives.
See: www.apple.com/euro/compliance
Korea Warning Statements
Singapore Wireless Certification
Taiwan Wireless Statements
Taiwan Class B Statement
VCCI Class B Statement83
External USB Modem Information
When connecting your Product Name to the phone line using an
external USB modem, refer to the telecommunications agency
information in the documentation that came with your modem.
ENERGY STAR
®
Compliance
As an ENERGY STAR
®
partner, Apple has determined that standard
configurations of this product meet the ENERGY STAR
®
guidelines
for energy efficiency. The ENERGY STAR
®
program is a partnership
with electronic equipment manufacturers to promote energyefficient products. Reducing energy consumption of products
saves money and helps conserve valuable resources.
This computer is shipped with power management enabled with
the computer set to sleep after 10 minutes of user inactivity. To
wake your computer, click the mouse or trackpad button or press
any key on the keyboard.
For more information about ENERGY STAR
®
, visit:
www.energystar.gov
Türkiye84
Informations sur l’élimination et le recyclage
Le symbole ci-dessus signifie que vous devez vous débarrasser
de votre produit selon les normes et la législation de votre pays.
Lorsque votre produit n’est plus utilisable, contactez Apple ou les
autorités locales afin de connaître les possibilités de recyclage.
Pour en savoir plus sur le programme de recyclage Apple,
consultez le site www.apple.com/fr/environment/recycling.
Brazil—Disposal Information:
Brasil: Informações sobre descarte e reciclagem.
O símbolo indica que este produto e/ou sua bateria não devem
ser descartadas no lixo doméstico. Quando decidir descartar
este produto e/ou sua bateria, faça-o de acordo com as leis e
diretrizes ambientais locais. Para informações sobre o programa de
reciclagem da Apple, pontos de coleta e telefone de informações,
visite www.apple.com/br/environment.
Union européenne—instructions concernant l’élimination
des déchets :
Le symbole ci-dessus signifie que vous devez vous débarrasser
de votre produit sans le mélanger avec les ordures ménagères,
selon les normes et la législation de votre pays. Lorsque ce produit
n’est plus utilisable, portez-le dans un centre de traitement des
déchets agréé par les autorités locales. Certains centres acceptent
les produits gratuitement. Le traitement et le recyclage séparé
de votre produit lors de son élimination aideront à préserver les
ressources naturelles et à protéger l’environnement et la santé
des êtres humains.
Informations sur l’enlèvement de la batterie
Jetez vos batteries usagées en respectant les lois et les consignes
environnementales de votre pays.
California: The coin cell battery in the optional Apple Remote
contains perchlorates. Special handling and disposal may apply.
Refer to: www.dtsc.ca.gov/hazardouswaste/perchlorate
Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den
Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines
Lebenszyklus entsprechend der maßgeblichen gesetzlichen
Regelungen.
Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de
chemokar of in een speciale batterijcontainer voor klein chemisch
afval (kca) worden gedeponeerd.
Taiwan:K Apple Inc.
© 2010 Apple Inc. Tous droits réservés.
En application des lois et conventions en vigueur, aucune
reproduction totale ni partielle du manuel n’est autorisée, sauf
consentement écrit préalable d’Apple.
Tout a été mis en œuvre pour que les informations présentées
dans ce manuel soient exactes. Apple n’est pas responsable des
erreurs de reproduction ou d’impression.
Apple
1 Infinite Loop
Cupertino, CA 95014
408-996-1010
www.apple.com
Le logo Apple est une marque d’Apple Inc. déposée aux États-Unis
et dans d’autres pays. En l’absence du consentement écrit d’Apple,
l’utilisation à des fins commerciales de ce logo via le clavier
(Option + 1) peut constituer un acte de contrefaçon et
de concurrence déloyale.
Apple, le logo Apple, AirPort, AirPort Extreme, Cover Flow, Exposé,
FileVault, FireWire, GarageBand, iCal, iChat, iLife, iMovie, iPhone,
iPhoto, iPod, iSight, iTunes, Keynote, Mac, MacBook, Macintosh,
Mac OS, MagSafe, Photo Booth, Safari, Snow Leopard, Spaces,
Spotlight, SuperDrive et Time Machine sont des marques d’Apple
Inc. déposées aux États-Unis et dans d’autres pays.
Finder, le logo FireWire et Multi-Touch sont des marques
d’Apple Inc.
AppleCare, Apple Store et iTunes Store sont des marques de
service d’Apple Inc. déposées aux États-Unis et dans d’autres pays.
ENERGY STAR
®
est une marque déposée aux États-Unis.
Intel, Intel Core et Xeon sont des marques d’Intel Corp. aux
États-Unis et dans d’autres pays.
La marque et les logos Bluetooth
®
sont la propriété de Bluetooth
SIG, Inc. et sont concédés sous licence par Apple Inc.
Les autres noms de produits et de sociétés sont la propriété de
leurs détenteurs respectifs. Les produits commercialisés par des
entreprises tierces ne sont mentionnés que pour information,
sans aucune intention de préconisation ni de recommandation.
Apple décline toute responsabilité quant à l’utilisation et au
fonctionnement de ces produits.
Fabriqué sous licence de Dolby Laboratories. « Dolby »,
« Pro Logic » et le logo double-D sont des marques déposées de
Dolby Laboratories. Ouvrages confidentiels inédits, © 1992–1997
Dolby Laboratories, Inc. Tous droits réservés.
Publié simultanément aux États-Unis et au Canada.
Comment démarrer
1
www.apple.com/fr/supportInstallez Leopard 3
Installez Leopard
Pour mettre à niveau Mac OS X à la version Leopard, insérez votre disque d’installation
et double-cliquez sur « Installation Mac OS X ». Cliquez ensuite sur Redémarrer. Votre
ordinateur redémarre alors et le programme d’installation de Mac OS X s’ouvre.
Apple Inc.
© 2007 Apple Inc. Tous droits réservés. Apple, le logo
Apple, Boot Camp, Exposé, FireWire, iCal, iPhoto,
Keynote, Mac et Mac OS sont des marques d’Apple Inc.
déposées aux États-Unis et dans d’autres pays. Aperture,
Cover Flow, Finder, iPhone, Leopard, Safari et Spotlight
sont des marques d’Apple Inc. AppleCare est une
marque de service d’Apple Inc. déposée aux États-Unis
et dans d’autres pays. .Mac est une marque de service
d’Apple Inc. Les noms des autres produits et sociétés
mentionnés ci-inclus peuvent être des marques de leurs
détenteurs respectifs.
Apple commercialisant fréquemment des nouvelles
versions et des mises à jour de ses logiciels, il se peut
que les images illustrant cet ouvrage ne correspondent
pas à ce que vous pouvez voir à l’écran.4 Installez Leopard Installez Leopard 5
Lancez l’installation
Cliquez sur Installer pour lancer l’installation de Mac OS X 10.5. Une fois l’installation
terminée, votre ordinateur redémarre.
Cliquez sur Personnaliser
si vous voulez changer
les éléments installés.
Cliquez sur Options si vous
voulez sélectionner un autre
type d’installation.
Pour des informations complémentaires, accédez au dossier Instructions situé sur votre
disque d’installation.
Sélectionnez la destination
Sélectionnez votre disque de démarrage ou le volume où la version de Mac OS X
à mettre à niveau se trouve.
Sélectionnez un volume. Il se
peut que vous ne soyez pas
en mesure d’installer Leopard
sur certains volumes.
Vous trouverez ici des
informations importantes
relatives à l’installation.À la rencontre de Leopard
2
www.apple.com/fr/macosx8 Bureau Bureau 9
Piles (“Stacks”)
Piles constitue un moyen pratique d’accéder à vos documents. Les dossiers déjà placés
dans le Dock se transforment automatiquement en piles. Pour créer une pile, faites glisser
un dossier contenant des documents sur le Dock.
Si vous cliquez sur une pile, ses
éléments s’a∑ chent alors sous
forme de grille ou d’éventail
au-dessus de l’icône.
Bureau
Du menu au Dock, Leopard présente un nouveau look et
se complète de Piles, un nouveau moyen de toujours rester
organisé.10 Bureau Bureau 11
Personnalisation
Piles s’a∑ che automatiquement sous forme d’éventail ou de grille selon le nombre
d’éléments se trouvant dans la pile. Vous pouvez indiquer le style à utiliser et modifi er
l’ordre de la pile.
Pour personnaliser une pile, placez
le pointeur sur l’icône de la pile puis
maintenez enfoncé le bouton de la souris
jusqu’à ce qu’un menu apparaisse.
Pile Téléchargements
Le Dock comprend une pile Documents et une pile Téléchargements. Les éléments que
vous téléchargez par le biais de Safari, de Mail ou d’iChat se placent toujours dans la pile
Téléchargements de façon à les retrouver rapidement.
Le téléchargement le plus
récent apparaît ici.
Cliquez sur la pile
Téléchargements pour
retrouver les éléments que
vous avez téléchargés.12 Finder Finder 13
Cover Flow
Cover Flow vous permet de visualiser entre autres vos séquences vidéo, vos présentations
et vos fi chiers PDF dans des aperçus de grande taille, au fur et à mesure que vous tournez
les pages de leur représentation.
Cliquez sur ce
bouton pour
activer Cover Flow.
Faites glisser le curseur
pour faire défi ler vos
documents l’un après
l’autre.
Placez le pointeur sur un
élément pour lire une
séquence vidéo ou pour
consulter les pages d’un
document par exemple.
Finder
Visualisez vos fi chiers dans Cover Flow et parcourez-les
rapidement.14 Finder Finder 15
Spotlight
Dans une fenêtre du Finder ou dans la barre des menus, utilisez Spotlight pour rechercher
des éléments situés sur les disques de votre ordinateur. Si vous lancez souvent la même
recherche, enregistrez-la dans la section Rechercher de la barre latérale.
Tapez votre recherche
dans le champ de
recherche.
Cliquez sur Enregistrer
pour ajouter un dossier
intelligent à la barre
latérale.
Retrouvez les résultats
de votre recherche dans
Cover Flow.
Barre latérale
La barre latérale du Finder simplifi e l’accès aux dossiers de votre ordinateur, à des
ordinateurs partagés connectés à votre réseau et à vos recherches enregistrées.
Les recherches d’usage courant
sont incluses dans la barre
latérale. Vous pouvez aussi
ajouter vos propres recherches.
Les ordinateurs partagés
accessibles depuis votre
réseau apparaissent
automatiquement à cet
endroit.16 Finder Finder 17
Partage d’écran
Le partage d’écran vous permet d’accéder au bureau d’ordinateurs partagés de votre
réseau. Vous pouvez ainsi, entre autres, contrôler leur usage, modifi er des réglages,
le tout depuis votre ordinateur.
Sélectionnez
l’ordinateur
puis cliquez sur
Partage d’écran.
Vous retrouvez
ainsi le bureau
de l’autre
ordinateur dans
une fenêtre.
Pour que l’a∑ chage occupe tout votre écran,
cliquez sur le bouton Plein écran.
Pour activer la
barre d’outils,
choisissez
Présentation >
A∑ cher la barre
Accédez d’outils.
immédiatement
au dossier Public
de n’importe quel
ordinateur partagé.
Recherchez des
documents situés
sur des ordinateurs
partagés.
Ordinateurs partagés
Les ordinateurs partagés accessibles depuis votre réseau apparaissent automatiquement
dans la barre latérale de façon à ce que vous puissiez retrouver rapidement les documents
qu’ils contiennent.18 Finder Finder 19
Retour vers Mon Mac
À l’aide de votre compte .Mac, d’une connexion Internet et avec les services de partage et
« Retour vers Mon Mac » activés, vous avez accès à n’importe lequel de vos ordinateurs, de
n’importe où à travers Internet.
Retour vers Mon Mac est
activé automatiquement.
Les ordinateurs « Retour
vers Mon Mac » apparaissent
dans la barre latérale.
Partage
Vous pouvez partager, entre autres, vos fi chiers, votre site web, l’a∑ chage de votre écran,
avec d’autres ordinateurs connectés à votre réseau. Pour activer la fonctionnalité, ouvrez
les Préférences Système puis cliquez sur Partage.
Cliquez sur le bouton Ajouter (+)
pour sélectionner les utilisateurs
et les groupes pouvant partager
vos fi chiers.
Cliquez sur le bouton
Ajouter (+) pour
sélectionner le dossier de
votre choix à partager.20 Coup d’œil Coup d’œil 21
Visualisez des documents
Coup d’œil s’utilise à partir du Finder, de Time Machine et de Mail. Pour a∑ cher
un élément dans Coup d’œil, sélectionnez-le et appuyez sur la barre d’espace.
Cliquez sur le bouton
Coup d’œil accessible
depuis la barre d’outils
de la fenêtre du Finder.
Cliquez sur
cette icône pour
agrandir l’aperçu
en plein écran.
Coup d’œil
Visualisez des aperçus de qualité pour, entre autres, des
séquences, des fi chiers PDF, des présentations ou des feuilles
de calcul, sans pour autant ouvrir l’application qui leur est
associée.22 Coup d’œil Coup d’œil 23
A∑ chez vos collections d’éléments
Coup d’œil vous permet d’a∑ cher plusieurs éléments en une seule fois. Pour passer
automatiquement en revue les éléments, cliquez sur le bouton de lecture.
Cliquez sur le bouton
Appareil photo pour ajouter
une photo à iPhoto.
Cliquez sur le bouton
Feuille d’index pour
visualiser tous les éléments.
Cliquez sur une image
de la feuille d’index
pour l’a∑ cher.
Chaque diapo d’une
présentation Keynote
apparaît à cet endroit.
Parcourez vos données
En visualisant des documents dans Coup d’œil, vous pouvez tourner chaque page
constituant votre document ou a∑ cher chaque diapo d’une présentation Keynote.24 Time Machine Time Machine 25
Activez Time Machine
Pour pouvoir utiliser Time Machine, branchez simplement un disque FireWire ou USB
sur votre ordinateur, puis cliquez sur « Utiliser en tant que disque de sauvegarde » dans
la zone de dialogue qui s’a∑ che.
Lorsque vous activez Time Machine,
l’outil sauvegarde les données
de votre ordinateur sur le disque
sélectionné.
Time Machine
Sauvegardez automatiquement votre Mac. S’il vous manque
un document, voyagez dans le temps pour le récupérer.26 Time Machine Time Machine 27
Défi nissez les préférences Time Machine
Pour défi nir les options de Time Machine, ouvrez les préférences Time Machine. Vous
pouvez sélectionner un autre disque de sauvegarde ou indiquer des dossiers ou des
disques à ne pas inclure à vos copies de sauvegarde.
Cliquez sur Options pour
sélectionner les éléments à
ne pas sauvegarder.
Récupérez vos fi chiers
Recherchez en toute simplicité un document manquant en retrouvant l’aspect qu’avait
votre bureau auparavant. Time Machine procède à une copie de sauvegarde chaque
heure de la journée en cours, puis e∂ ectue des copies de sauvegarde journalières.
Tapez le nom du
document que
vous recherchez
dans le champ de
recherche.
Lorsque vous retrouvez
le document,
sélectionnez-le puis
cliquez sur Restauration.
Cliquez sur la
fl èche allant vers
l’arrière pour
revenir dans
le temps.
Parcourez les éléments
de votre copie de
sauvegarde à l’aide de
Cover Flow.
Coup d’œil vous
permet de vérifi er
un document
avant de le restaurer.28 Spaces Spaces 29
Organisez vos fenêtres
Activez Spaces dans les préférences Exposé et Spaces, et appuyez sur F8 pour a∑ cher vos
espaces. Pour organiser vos fenêtres, faites-les glisser de l’espace actif sur un autre espace.
Faites glisser les fenêtres
à regrouper dans le
même espace.
Spaces
Organisez votre travail et manipulez-le en regroupant les
fenêtres des applications en « espaces ». Passez ensuite
rapidement d’un de vos espaces à l’autre.30 Spaces Spaces 31
Personnalisez les espaces
Après avoir activé Spaces, vous pouvez ajouter d’autres espaces. Vous pouvez aussi a∂ ecter
des applications à des espaces précis de façon à ce que les fenêtres de chaque application
s’ouvrent toujours dans le même espace.
Ajoutez des rangées
et des colonnes pour
créer les espaces
nécessaires.
Choisissez les
raccourcis clavier qui
vous conviennent.
Cliquez sur le bouton
Ajouter (+) pour a∂ ecter des
applications aux espaces.
Faites glisser les
espaces pour
les réorganiser.
Permutez les espaces
Pour passer d’un espace à l’autre, appuyez sur Contrôle + [touche fl échée]. Pour accéder
directement à un espace, appuyez sur Contrôle + [numéro]. Réorganisez les espaces selon
vos besoins.
Utilisez les raccourcis
clavier pour passer
rapidement d’un espace
à l’autre.32 Mail Mail 33
Modèles
En créant un message, sélectionnez un modèle pour lui appliquer le style qu’il faut, que ce
soit pour une fête ou une occasion plus solennelle. L’ajout de photos est simple grâce au
navigateur de photos.
Cliquez sur ce bouton
pour choisir le modèle
à utiliser.
Sélectionnez un type de
modèle, puis cliquez sur
le modèle à utiliser.
Sélectionnez des photos
d’iPhoto, de Photo Booth
ou d’Aperture.
Les photos apparaissent à
cet endroit. Faites-en glisser
une sur votre message.
Mail
Les modèles conçus par Apple vous permettent d’envoyer
des courriers électroniques élaborés incluant des photos.34 Mail Mail 35
Détection des données
Vous pouvez défi nir des événements iCal à partir de dates incluses dans vos courriers
électroniques. L’ajout du nom, des numéros de téléphone et des adresses aux fi ches de
vos contacts est des plus simples. Vous pouvez même situer des adresses sur un carte
a∑ chée dans Safari.
Placez le pointeur sur la date,
le nom ou l’adresse, puis
cliquez sur le triangle pour
choisir une option.
Notes et tâches à réaliser
Centralisez toutes vos notes et vos tâches à réaliser. Gri∂ onnez des rappels, la liste des
courses et des informations dont vous avez besoin. Ajoutez à vos éléments des images,
des URL et des pièces jointes.
Cliquez à cet endroit
pour défi nir les options
de la tâche à réaliser. Les
éléments apparaissent
automatiquement dans iCal.
Retrouvez vos notes et
vos tâches à réaliser dans
la section Rappels de
la barre latérale.
Cliquez sur un des
boutons pour créer
une note ou une
tâche à réaliser.
Pour créer une tâche
à réaliser, sélectionnez
le texte d’une note et
cliquez sur Tâche.36 iChat iChat 37
Arrière-plans vidéo
Utilisez des arrière-plans vidéo dans vos conversations pour « simuler » que vous êtes
quelque part dans le monde. iChat comprend des séquences et des images fi xes que
vous pouvez exploiter, mais vous pouvez aussi ajouter votre propre vidéo ou photo.
Ajoutez vos propres
séquences ou des
images personnelles
servant d’arrière-plan
vidéo.
Sélectionnez un arrière-plan
vidéo puis sortez du champ
de l’image un instant.
Cliquez sur E∂ ets
pour sélectionner
un e∂ et vidéo.
iChat
Rendez vos conversations plus attrayantes en utilisant des
e∂ ets vidéo, tels que les arrière-plans. Démontrez votre talent
avec iChat theater.38 iChat iChat 39
iChat theater
Pour a∑ cher des photos, des séquences ou des présentations lors d’une conversation
vidéo, lancez la conversation puis faites glisser le ou les fi chiers à a∑ cher dans la fenêtre
de la conversation.
Demandez l’avis de
votre contact sur
votre présentation.
Contrôlez votre
présentation à
travers cette fenêtre.
E∂ ets
Vous pouvez sélectionner des e∂ ets vidéo pour rendre en direct vos conversations plus
vivantes et intéressantes.
Cliquez sur l’e∂ et
de votre choix
pour l’utiliser.
Cliquez sur l’e∂ et au centre
pour rétablir la présentation
d’origine.40 iChat iChat 41
Conversations en onglets
Utilisez les conversations en onglets si vous suivez de nombreuses conversations à la fois.
Pour ce faire, ouvrez la sous-fenêtre Messages des préférences iChat, puis sélectionnez
« Rassembler les conversations dans une seule fenêtre ».
Cliquez sur une conversation pour y revenir.
La dernière réponse de
votre contact s’a∑ che.
Partage d’écran iChat
Le partage d’écran vous permet de contrôler l’ordinateur d’un contact pour lui montrer
comment réaliser une opération plutôt que de lui expliquer.
Cliquez ici pour
permuter les
écrans. Pour
copier un
document sur
cet ordinateur,
faites-le glisser
sur la fenêtre.
Sélectionnez un
contact disposant de
la fonctionnalité de
conversation vidéo, puis
cliquez sur le bouton
Partage d’écran.42 iChat iChat 43
Envoi de SMS
Échangez des SMS à partir d’iChat avec un contact utilisant un téléphone portable, tel que
l’iPhone. Choisissez Fichier > Envoyer un SMS, puis tapez le numéro de téléphone de votre
contact.
Ce contact peut recevoir
les SMS.
Remarque : l’envoi de SMS n’est disponible que sur les téléphones portables aux États-Unis.
Disponibilité
Si vous possédez plusieurs comptes .Mac, AIM, Jabber ou Google Talk, vous pouvez
en ouvrir la session simultanément dans iChat.
Utilisez une image GIF animée pour votre
photo en tant que contact.
Choisissez Invisible si vous
cherchez à savoir qui est
disponible sans pour autant
être vu.44 Dashboard Dashboard 45
Accédez à la page web dans Safari
et cliquez sur ce bouton.
Web clip
Pour créer un widget, accédez à une page web dans Safari puis choisissez Fichier > Ouvrir
dans Dashboard. Safari sélectionne automatiquement les zones de la page selon l’endroit
où vous placez le pointeur sur la page.
Une fois sélectionné la
partie qui vous intéresse,
cliquez sur Ajouter.
Faites glisser le rectangle de
sélection sur les informations
voulues puis cliquez. Vous
pouvez ensuite redimensionner
la sélection établie.
Dashboard
Créez votre propre widget à partir de n’importe quel segment
d’une page web et retrouvez-en les actualisations dans
Dashboard.46 Safari Safari 47
Navigation par onglets
Vous pouvez désormais faire glisser les onglets pour les réorganiser entre eux ou en
dehors du navigateur pour ouvrir une nouvelle fenêtre. Pour fusionner les fenêtres
ouvertes en une seule fenêtre à onglets, choisissez Fenêtre > Fusionner toutes les fenêtres.
Faites glisser les onglets pour
réorganiser l’ordre dans lequel
ils apparaissent.
Faites glisser un onglet en dehors
de la fenêtre pour le placer dans
une fenêtre distincte.
Pour passer d’un onglet
à l’autre, appuyez sur
Commande + Maj +
Crochet fermant ( ] ) ou
sur Commande + Maj +
Crochet ouvrant ( [ ).
Safari
Le plus beau navigateur web est encore plus simple à utiliser
grâce à la navigation dynamique par onglets mais aussi à
d’autres fonctionnalités inédites.48 Safari Safari 49
Ouvrez le fi chier PDF dans
Aperçu ou enregistrez-le dans
votre pile Téléchargements.
A∑ chage de documents PDF
Vous pouvez a∑ cher des fi chiers PDF dans la fenêtre de Safari. De nouvelles commandes
sont à votre disposition pour manipuler ces fi chiers plus facilement.
Pour accéder à ces
commandes, déplacez
le pointeur vers le bas
de la fenêtre de Safari.
Recherche
Pour rechercher du texte dans une page web, choisissez Édition > Rechercher >
Rechercher, puis tapez le texte recherché. Pour retrouver plus facilement ce que
vous recherchez, Safari met en surbrillance tous les résultats.
Safari met en surbrillance
les résultats trouvés sur la
page web de façon à ce
que puissiez les localiser
facilement.
Cliquez sur ces fl èches
pour placer la surbrillance
sur une occurrence
spécifi que.50 Contrôles parentaux Contrôles parentaux 51
Limites de temps
Décidez du moment où vos enfants peuvent utiliser l’ordinateur en réglant les limites
de temps en semaine, pendant le week-end et les horaires de nuit.
Indiquez combien
d’heures par jour votre
enfant est autorisé à
utiliser l’ordinateur.
Précisez les heures de nuit
auxquelles votre enfant ne
peut pas utiliser l’ordinateur,
pendant les jours d’école et
pendant le week-end.
Contrôles parentaux
Pour que vos enfants ne dépassent pas les bornes...
informatiques. Gérez le temps que vos enfants passent
devant l’ordinateur et ce qu’ils font de son utilisation.52 Contrôles parentaux Contrôles parentaux 53
Limites pour Mail et iChat
Protégez vos enfants des inconnus en indiquant ceux qui peuvent entretenir
une conversation avec eux et échanger des courriers électroniques.
Saisissez votre adresse
électronique afi n d’être informé
si vos enfants essaient de
communiquer avec quelqu’un
qui n’est pas dans la liste.
Cliquez sur le bouton
Ajouter (+) pour ajouter
une adresse.
Activez cette option pour
autoriser vos enfants à
n’accéder qu’à des sites
web spécifi ques.
Limites sur le contenu
Pour restreindre l’accès de vos enfants aux sites web qu’ils ont le droit de visiter, cliquez
sur Contenu puis sélectionnez le niveau de restrictions que vous voulez appliquer.
Sélectionnez cette option pour limiter
l’accès tenté à des sites web pour adultes.
Cliquez sur Personnaliser si vous voulez
indiquer les sites web que vos enfants
peuvent et ne peuvent pas visiter.54 Contrôles parentaux Contrôles parentaux 55
Sélectionnez l’ordinateur de votre enfant
et ouvrez une session. Sélectionnez ensuite
le nom d’utilisateur de votre enfant.
Activez cette option
sur l’ordinateur de
votre enfant.
Contrôles parentaux à distance
Gérez depuis votre ordinateur les contrôles parentaux pour l’accès de votre enfant à son
ordinateur. En activant les contrôles parentaux, sélectionnez l’option « Gérer les contrôles
parentaux à partir d’un autre ordinateur ».
Historiques
Utilisez la sous-fenêtre Historiques pour vérifi er l’activité de vos enfants devant
l’ordinateur et sur Internet.
Retrouvez les sites web que
vos enfants ont visités.56 Photo Booth Photo Booth 57
Arrière-plans vidéo
Faites comme si vous étiez quelque part dans le monde (ou loin de ce monde) à l’aide
d’arrière-plans vidéo lorsque vous prenez un instantané.
Sélectionnez un arrière-plan
puis sortez du champ de
l’image un instant.
Photo Booth
Découvrez de nouvelles façons de vous divertir avec les
nouveaux types d’instantanés. Les arrière-plans vidéo o∂ rent
des possibilités en plus.58 Photo Booth Photo Booth 59
Lors de l’aperçu
d’un plan vidéo,
déplacez le pointeur
sur l’image pour
contrôler la lecture.
Plans vidéo
Mettez au point un plan vidéo vous représentant avec des e∂ ets et des arrière-plans.
Utilisez votre plan comme message de salutations vidéo incluant de l’audio, à envoyer
à vos proches dans un courrier électronique.
Cliquez sur
le bouton
Plan vidéo.
Images constituées de quatre instantanés
Vous pouvez désormais prendre des photos composées de quatre instantanés. Exportez
votre image sur quatre instantanés en tant qu’image GIF animée et utilisez-la pour votre
photo de contact dans iChat.
Pendant l’aperçu
d’une image sur
quatre instantanés,
cliquez sur une
image pour la
prévisualiser et
choisir comment
l’utiliser.
Cliquez sur le bouton
représentant les
quatre instantanés
regroupés.60 Front Row Front Row 61
Sélectionnez ce
que vous voulez
regarder.
Télécommande Apple Remote
Pour ouvrir Front Row, appuyez sur le bouton Menu de votre télécommande Apple
Remote. Appuyez sur les touches de volume pour mettre en surbrillance les éléments.
Appuyez sur la touche de lecture pour sélectionner l’élément en surbrillance. Appuyez
sur Menu pour revenir au menu précédent.
Servez-vous de votre
télécommande Apple Remote,
installez-vous confortablement
et profi tez du programme.
Front Row
Profi tez de vos divertissements numériques sur votre Mac,
de n’importe où dans la pièce où vous êtes. Installez-vous
confortablement et prenez votre télécommande. Que le
spectacle commence.62 Front Row Front Row 63
Données multimédia partagées
À partir de Front Row, vous pouvez visionner des divertissements numériques partagés
par d’autres ordinateurs connectés à votre réseau.
Cliquez à cet
endroit pour
a∑ cher des photos
partagées sur votre
réseau.
Sélectionnez le
mode d’a∑ chage
de vos photos
par Front Row.
Choisissez
l’album photo
ou l’événement
iPhoto à a∑ cher.
Galerie photos
Transformez votre Mac en galerie compilant vos photos favorites. Grâce à Front Row,
vous pouvez a∑ cher vos photos dans iPhoto, dans Photo Booth et dans Aperture.64 Boot Camp Boot Camp 65
Installez Boot Camp
Ouvrez l’Assistant réglages de Boot Camp (situé dans le dossier Utilitaires accessible à
partir du dossier Applications) et imprimez le Guide d’installation et de confi guration
de Boot Camp. Créez ensuite une partition pour Windows.
Imprimez ce document
afi n de pouvoir suivre
les instructions pendant
l’installation de Windows.
Faites glisser le curseur
de division pour défi nir
la taille de la partition
Windows.
Si vous avez installé une version bêta de Boot Camp, vous n’avez seulement qu’à installer
les nouveaux gestionnaires Windows en accédant à Windows et en insérant le disque
d’installation de Mac OS X 10.5.
Boot Camp
Pour utiliser une application Windows sur votre Mac, installez
Boot Camp et votre copie de Windows. Vous êtes alors fi n prêt.66 Boot Camp Boot Camp 67
Passez d’un système à l’autre
Sous Mac OS X, ouvrez les Préférences Disque de démarrage pour sélectionner votre
partition Windows. Sous Windows, ouvrez la rubrique Boot Camp dans le Panneau de
confi guration, puis cliquez sur Disque de démarrage.
Sélectionnez votre partition
Windows, puis cliquez sur
Redémarrer.
Sélectionnez votre
disque de démarrage
Mac OS X, puis cliquez
sur Redémarrer.
Installez Windows
Insérez votre disque d’installation de Windows XP ou de Windows Vista et cliquez
sur Démarrer l’installation.
Cliquez sur ce bouton
une fois prêt à installer
Windows sur votre Mac.
Installez les gestionnaires
Windows une fois terminées
l’installation et la confi guration
de Windows.Besoin d’aide ?
3
www.apple.com/fr/support70 Assistance Apple Assistance Apple 71
Informations sur le service et l’assistance AppleCare
Votre produit Mac OS X comprend une assistance gratuite téléphonique de 90 jours.
Les techniciens de l’assistance par téléphone AppleCare peuvent vous aider pour
l’ouverture et l’installation d’applications et pour résoudre des problèmes simples.
Consultez le tableau ci-dessous pour connaître le centre d’assistance le plus proche.
Gardez la date d’achat et le numéro de série de votre ordinateur Apple à portée si
vous appelez.
Remarque : des frais de communication téléphonique peuvent s’appliquent.
Vous pouvez étendre votre couverture en faisant l’acquisition du programme
AppleCare Protection Plan. Pour en savoir plus sur le programme AppleCare
Protection Plan, rendez-vous sur le site web des produits et services AppleCare
à l’adresse www.apple.com/fr/support/products.
Pour obtenir des informations complémentaires pour contacter le service
d’assistance d’Apple, rendez-vous à l’adresse www.apple.com/fr/support/contact.
(Les numéros de téléphone sont sujets à modifi cation.)
Numéros de l’assistance technique
Belgique (32) 070 700 773 www.apple.com/befr/support
Canada (en français) 1-800-263-3394 www.apple.com/ca/fr/support
France (33) 0825 888 024 www.apple.com/fr/support
Luxembourg (352) 800 24550 www.apple.com/befr/support
Suisse (41) 0848 000 132 www.apple.com/chfr/support
En savoir plus, réparations et assistance
Ressources en ligne
Pour accéder aux informations en ligne de service et d’assistance, visitez la page
www.apple.com/fr/support. Sélectionnez votre pays à partir du menu local. Vous
pouvez y rechercher les mises à jour de logiciels et les manuels les plus récents,
retrouver des réponses par le biais de la base de connaissances AppleCare
(interface en anglais) ou obtenir de l’aide à travers les forums de discussion d’Apple.
Aide à l’écran
Vous retrouverez souvent des réponses à vos questions, ainsi que des instructions
et des informations pour résoudre des problèmes, à l’aide du menu Aide disponible
dans certaines applications. Choisissez Aide dans le menu Aide du Finder, tapez
quelques mots dans le champ de recherche et appuyez sur Retour.
Informations Système
Utilisez Informations Système pour accéder aux informations relatives à votre
ordinateur. Informations Système énumère les matériels et les logiciels installés
sur votre ordinateur, indique son numéro de série et la version de son système
d’exploitation, la capacité de la mémoire installée, ainsi que la charge restante de
la batterie. Pour ouvrir Informations Système, choisissez dans la barre des menus le
menu Pomme () > À propos de ce Mac, puis cliquez sur le bouton « Plus d’infos ». 72 73
Apple-labeled computer at a time. You agree not to install, use or run the Apple Software on any non-Applelabeled computer, or to enable others to do so. This License does not allow the Apple Software to exist on more
than one computer at a time, and you may not make the Apple Software available over a network where it
could be used by multiple computers at the same time.
B. Family Pack. If you have purchased a Mac OS X Family Pack, this License allows you to install and use one
(1) copy of the Apple Software on up to a maximum of fi ve (5) Apple-labeled computers at a time as long as
those computers are located in the same household and used by persons who occupy that same household.
By “household” we mean a person or persons who share the same housing unit such as a home, apartment,
mobile home or condominium, but shall also extend to student members who are primary residents of that
household but residing at a separate on-campus location. The Family Pack License does not extend to business
or commercial users.
C. You may make one copy of the Apple Software (excluding the Boot ROM code and other Apple fi rmware
that is embedded or otherwise contained in Apple-labeled hardware) in machine-readable form for backup
purposes only; provided that the backup copy must include all copyright or other proprietary notices contained
on the original. Apple Boot ROM code and fi rmware is provided only for use on Apple-labeled hardware and
you may not copy, modify or redistribute the Apple Boot ROM code or fi rmware, or any portions thereof.
D. Certain components of the Apple Software, and third party open source programs included with the
Apple Software, have been or may be made available by Apple on its Open Source web site (http://www.
opensource.apple.com/) (collectively the “Open-Sourced Components”). You may modify or replace only these
Open-Sourced Components; provided that: (i) the resultant modifi ed Apple Software is used, in place of the
unmodifi ed Apple Software, on a single Apple-labeled computer; and (ii) you otherwise comply with the terms
of this License and any applicable licensing terms governing use of the Open-Sourced Components. Apple is
not obligated to provide any updates, maintenance, warranty, technical or other support, or services for the
resultant modifi ed Apple Software.
You expressly acknowledge that if failure or damage to Apple hardware results from modifi cation of the OpenSourced Components of the Apple Software, such failure or damage is excluded from the terms of the Apple
hardware warranty.
E. Apple has provided, as part of the Apple Software package, access to certain third party software as a
convenience. To the extent that the Apple Software contains third party software, Apple has no express or
implied obligation to provide any technical or other support for such software. Please contact the appropriate
software vendor or manufacturer directly for technical support and customer service related to its software and
products.
F. Except as and only to the extent permitted by applicable licensing terms governing use of the Open-Sourced
Components, or by applicable law, you may not copy, decompile, reverse engineer, disassemble, modify, or
SOFTWARE LICENSE AGREEMENT FOR MAC OS X
APPLE INC.
SOFTWARE LICENSE AGREEMENT FOR MAC OS X
Single Use and Family Pack License for use on Apple-labeled Systems
PLEASE READ THIS SOFTWARE LICENSE AGREEMENT (“LICENSE”) CAREFULLY BEFORE USING THE APPLE
SOFTWARE. BY USING THE APPLE SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS
LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, DO NOT USE THE SOFTWARE. IF YOU DO NOT
AGREE TO THE TERMS OF THE LICENSE, YOU MAY RETURN THE APPLE SOFTWARE TO THE PLACE WHERE YOU
OBTAINED IT FOR A REFUND. IF THE APPLE SOFTWARE WAS ACCESSED ELECTRONICALLY, CLICK “DISAGREE/
DECLINE”. FOR APPLE SOFTWARE INCLUDED WITH YOUR PURCHASE OF HARDWARE, YOU MUST RETURN THE
ENTIRE HARDWARE/SOFTWARE PACKAGE IN ORDER TO OBTAIN A REFUND.
IMPORTANT NOTE: This software may be used to reproduce, modify, publish and distribute materials. It is
licensed to you only for reproduction, modifi cation, publication and distribution of non-copyrighted materials,
materials in which you own the copyright, or materials you are authorized or legally permitted to reproduce,
modify, publish or distribute. If you are uncertain about your right to copy, modify, publish or distribute any
material, you should contact your legal advisor.
1. General. The software (including Boot ROM code), documentation and any fonts accompanying this License
whether preinstalled on Apple-labeled hardware, on disk, in read only memory, on any other media or in any
other form (collectively the “Apple Software”) are licensed, not sold, to you by Apple Inc. (“Apple”) for use only
under the terms of this License, and Apple reserves all rights not expressly granted to you. The rights granted
herein are limited to Apple’s and its licensors’ intellectual property rights in the Apple Software as licensed
hereunder and do not include any other patents or intellectual property rights. You own the media on which
the Apple Software is recorded but Apple and/or Apple’s licensor(s) retain ownership of the Apple Software
itself. The terms of this License will govern any software upgrades provided by Apple that replace and/or
supplement the original Apple Software product, unless such upgrade is accompanied by a separate license in
which case the terms of that license will govern.
Title and intellectual property rights in and to any content displayed by or accessed through the Apple
Software belongs to the respective content owner. Such content may be protected by copyright or other
intellectual property laws and treaties, and may be subject to terms of use of the third party providing such
content. This License does not grant you any rights to use such content nor does it guarantee that such content
will continue to be available to you.
2. Permitted License Uses and Restrictions.
A. Single Use. This License allows you to install, use and run one (1) copy of the Apple Software on a single 74 75
educational institutional facility (i.e., college campus, public or private K-12 schools).
4. Consent to Use of Data. You agree that Apple and its subsidiaries may collect and use technical and related
information, including but not limited to technical information about your computer, system and application
software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product
support and other services to you (if any) related to the Apple Software, and to verify compliance with the
terms of this License. Apple may use this information, as long as it is in a form that does not personally identify
you, to improve our products or to provide services or technologies to you.
5. Termination. This License is e∂ ective until terminated. Your rights under this License will terminate
automatically without notice from Apple if you fail to comply with any term(s) of this License. Upon the
termination of this License, you shall cease all use of the Apple Software and destroy all copies, full or partial, of
the Apple Software.
6. Limited Warranty on Media. Apple warrants the media on which the Apple Software is recorded and
delivered by Apple to be free from defects in materials and workmanship under normal use for a period of
ninety (90) days from the date of original retail purchase. Your exclusive remedy under this Section shall be, at
Apple’s option, a refund of the purchase price of the product containing the Apple Software or replacement
of the Apple Software which is returned to Apple or an Apple authorized representative with a copy of the
receipt. THIS LIMITED WARRANTY AND ANY IMPLIED WARRANTIES ON THE MEDIA INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF SATISFACTORY QUALITY, AND OF FITNESS FOR
A PARTICULAR PURPOSE, ARE LIMITED IN DURATION TO NINETY (90) DAYS FROM THE DATE OF ORIGINAL RETAIL
PURCHASE. SOME JURISDICTIONS DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS,
SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. THE LIMITED WARRANTY SET FORTH HEREIN IS THE ONLY
WARRANTY MADE TO YOU AND IS PROVIDED IN LIEU OF ANY OTHER WARRANTIES (IF ANY) CREATED BY ANY
DOCUMENTATION, PACKAGING OR OTHERWISE. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS,
AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY BY JURISDICTION.
7. Disclaimer of Warranties. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT USE OF THE APPLE SOFTWARE
IS AT YOUR SOLE RISK AND THAT THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY
AND EFFORT IS WITH YOU. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE AND TO THE
MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE APPLE SOFTWARE AND ANY SERVICES PERFORMED
OR PROVIDED BY THE APPLE SOFTWARE (“SERVICES”) ARE PROVIDED “AS IS”, WITH ALL FAULTS AND WITHOUT
WARRANTY OF ANY KIND, AND APPLE AND APPLE’S LICENSORS (COLLECTIVELY REFERRED TO AS “APPLE” FOR
THE PURPOSES OF SECTIONS 7 and 8) HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH RESPECT
TO THE APPLE SOFTWARE AND ANY SERVICES, EITHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES AND/OR CONDITIONS OF MERCHANTABILITY, OF SATISFACTORY
QUALITY, OF FITNESS FOR A PARTICULAR PURPOSE, OF ACCURACY, OF QUIET ENJOYMENT, AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. APPLE DOES NOT WARRANT AGAINST INTERFERENCE WITH YOUR
create derivative works of the Apple Software or any part thereof. THE APPLE SOFTWARE IS NOT INTENDED
FOR USE IN THE OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR COMMUNICATION SYSTEMS,
AIR TRAFFIC CONTROL SYSTEMS, LIFE SUPPORT MACHINES OR OTHER EQUIPMENT IN WHICH THE FAILURE OF
THE APPLE SOFTWARE COULD LEAD TO DEATH, PERSONAL INJURY, OR SEVERE PHYSICAL OR ENVIRONMENTAL
DAMAGE.
G. If you use Setup/Migration Assistant to transfer software from one Apple-labeled computer to another
Apple-labeled computer, please remember that continued use of the original copy of the software may be
prohibited once a copy has been transferred to another computer, unless you already have a licensed copy of
such software on both computers. You should check the relevant software license agreements for applicable
terms and conditions.
3. Transfer. You may not rent, lease, lend, redistribute or sublicense the Apple Software. Subject to the
restrictions set forth below, you may, however, make a one-time permanent transfer of all of your license
rights to the Apple Software (in its original form as provided by Apple) to another party, provided that: (a) the
transfer must include all of the Apple Software, including all its component parts (excluding Apple Boot ROM
code and fi rmware), original media, printed materials and this License; (b) you do not retain any copies of the
Apple Software, full or partial, including copies stored on a computer or other storage device; and (c) the party
receiving the Apple Software reads and agrees to accept the terms and conditions of this License. You may
not rent, lease, lend, redistribute, sublicense or transfer any Apple Software that has been modifi ed or replaced
under Section 2D above. All components of the Apple Software are provided as part of a bundle and may not
be separated from the bundle and distributed as standalone applications. Apple Software provided with a
particular Apple-labeled hardware product may not run on other models of Apple-labeled hardware.
Updates: If an Apple Software update completely replaces (full install) a previously licensed version of the
Apple Software, you may not use both versions of the Apple Software at the same time nor may you transfer
them separately.
NFR (Not for Resale) and Evaluation Copies: Notwithstanding other sections of this License, Apple Software
labeled or otherwise provided to you on a promotional or not-for-resale basis may only be used for
demonstration, testing and evaluation purposes and may not be resold or transferred.
Apple System Restore Copies: Restore CDs or DVDs that may accompany an Apple hardware bundle, or are
otherwise provided by Apple in connection with an Apple hardware bundle, contain a copy of the Apple
Software that is to be used for diagnostic and restorative purposes only. These CDs and DVDs may be resold or
transferred only as part of the Apple hardware bundle.
Academic Copies: If the Apple Software package has an academic label or if you acquired the Apple Software
at an academic discount, you must be an Eligible Educational End User to use the Apple Software. “Eligible
Educational End Users” means students, faculty, sta∂ and administration attending and/or working at an 76 77
8. Limitation of Liability. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT SHALL APPLE BE LIABLE FOR
PERSONAL INJURY, OR ANY INCIDENTAL, SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER,
INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, LOSS OF DATA, BUSINESS INTERRUPTION
OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES, ARISING OUT OF OR RELATED TO YOUR USE OR INABILITY
TO USE THE APPLE SOFTWARE, HOWEVER CAUSED, REGARDLESS OF THE THEORY OF LIABILITY (CONTRACT,
TORT OR OTHERWISE) AND EVEN IF APPLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
JURISDICTIONS DO NOT ALLOW THE LIMITATION OF LIABILITY FOR PERSONAL INJURY, OR OF INCIDENTAL
OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION MAY NOT APPLY TO YOU. In no event shall Apple’s total
liability to you for all damages (other than as may be required by applicable law in cases involving personal
injury) exceed the amount of fi fty dollars ($50.00). The foregoing limitations will apply even if the above stated
remedy fails of its essential purpose.
9. Digital Certifi cates.
General. The Apple Software contains functionality that allows it to accept digital certifi cates either issued
from Apple or from third parties. YOU ARE SOLELY RESPONSIBLE FOR DECIDING WHETHER OR NOT TO RELY
ON A CERTIFICATE WHETHER ISSUED BY APPLE OR A THIRD PARTY. YOUR USE OF DIGITAL CERTIFICATES IS
AT YOUR SOLE RISK. APPLE MAKES NO WARRANTIES OR REPRESENTATIONS, EXPRESS OR IMPLIED, AS TO
MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE, ACCURACY, SECURITY, OR NON-INFRINGEMENT
OF THIRD PARTY RIGHTS WITH RESPECT TO DIGITAL CERTIFICATES. You agree that (a) you will not falsify or
misuse any certifi cate; (b) you will use Digital Certifi cates for legal purposes only and in accordance with any
applicable Certifi cate Policy, Certifi cate Practice Statement or other Certifi cate Authority business practice
disclosures; (c) you are solely responsible for preventing any unauthorized user from making use of your Digital
Certifi cates; and (d) you will revoke any certifi cate that you have reason to believe has been compromised.
Use of Digital Certifi cates in iChat. The Apple Software allows you to encrypt your iChat communications. This
feature uses digital certifi cates to verify that the iChat is coming from the iChat screen name that appears in
the iChat window and to encrypt and decrypt the chat. It does not verify the identity of the person using
that screen name. Apple does not guarantee that there will be no hacking or intrusions into the chat. YOUR
USE OF THIS FEATURE IN CONNECTION WITH ICHAT IS AT YOUR SOLE RISK. APPLE MAKES NO WARRANTIES OR
REPRESENTATIONS, EXPRESS OR IMPLIED, AS TO MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE,
ACCURACY, SECURITY, OR NON-INFRINGEMENT OF THIRD PARTY RIGHTS WITH RESPECT TO THE USE OF DIGITAL
CERTIFICATES AND/OR ENCRYPTION IN ICHAT. By using the Apple Software, you agree that (a) you will take no
action that interferes with the normal operation of digital certifi cates or encryption used in an iChat session
or otherwise falsify the digital certifi cate used to validate a screen name; (b) you will use the encrypted iChat
function solely for legal purposes; (c) you are solely responsible for preventing any unauthorized user from
having access to any certifi cate or private key stored on your computer; and (d) you will revoke any certifi cate
that you have reason to believe is compromised. Apple’s Certifi cate Policy and Certifi cate Practice Statements
ENJOYMENT OF THE APPLE SOFTWARE, THAT THE FUNCTIONS CONTAINED IN, OR SERVICES PERFORMED
OR PROVIDED BY, THE APPLE SOFTWARE WILL MEET YOUR REQUIREMENTS, THAT THE OPERATION OF THE
APPLE SOFTWARE OR SERVICES WILL BE UNINTERRUPTED OR ERROR-FREE, THAT THE APPLE SOFTWARE OR
SERVICES WILL BE COMPATIBLE WITH THIRD PARTY SOFTWARE, OR THAT DEFECTS IN THE APPLE SOFTWARE OR
SERVICES WILL BE CORRECTED. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY APPLE OR AN APPLE
AUTHORIZED REPRESENTATIVE SHALL CREATE A WARRANTY. SHOULD THE APPLE SOFTWARE OR SERVICES
PROVE DEFECTIVE, YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR LIMITATIONS ON
APPLICABLE STATUTORY RIGHTS OF A CONSUMER, SO THE ABOVE EXCLUSION AND LIMITATIONS MAY NOT
APPLY TO YOU.
The Apple Software automatically references, displays, links to, and provides web services related to, sites
and information located worldwide throughout the Internet. Because Apple has no control over such sites
and information, Apple makes no guarantees as to such sites and information, including but not limited
to: (a) the accuracy, availability, sequence, completeness, currency, content, validity or quality of any such
sites and information, or (b) whether an Apple search completed through the Apple Software may locate
unintended or objectionable content. Because some of the content on the Internet consists of material that
is adult-oriented or otherwise objectionable to some people or viewers under the age of 18, the results of
any search or entering of a particular URL using the Apple Software may automatically and unintentionally
generate links or references to objectionable material. By using the Apple Software, you acknowledge that
Apple makes no representations or warranties with regard to any sites or information displayed by or accessed
through the Apple Software, or any web services performed by the Apple Software in relation to such sites
or information. Apple, its o∑ cers, a∑ liates and subsidiaries shall not, directly or indirectly, be liable, in any
way, to you or any other person for the content you receive using the Apple Software or for any inaccuracies,
errors in or omissions from the content. Financial information displayed by the Apple Software is for general
informational purposes only and is not intended to be relied upon as investment advice. Before executing any
securities transaction based upon information obtained through the Apple Software, you should consult with
a fi nancial professional. Neither Apple nor any of its content providers guarantees the accuracy, completeness,
or timeliness of stock information appearing within the Apple Software. The Apple Software may be used
to conduct automated translations. As automated translations are performed by software tools and do not
involve any human intervention or verifi cation, it is not advisable to rely upon such translations where absolute
accuracy is required. Backup functions performed by the Apple Software are only carried out at certain times
and are subject to hardware limitations such as drive storage capacity.
Apple and its licensors reserve the right to change, suspend, remove, or disable access to any Services at any time
without notice. In no event will Apple be liable for the removal of or disabling of access to any such Services.
Apple may also impose limits on the use of or access to certain Services, in any case and without notice or liability.78 79
for such free software under the terms of the GPL or LGPL, as the case may be, without charge except for the
cost of media, shipping, and handling, upon written request to Apple. The GPL/LGPL software is distributed
in the hope that it will be useful, but WITHOUT ANY WARRANTY, without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. A copy of the GPL and LGPL is included with the
Apple Software.
C. The Apple Software includes certain software licensed under the IBM Public License Version 1.0 (IPL) or the
Common Public License Version 1.0 (CPL). A copy of the source code for the IPL and CPL licensed software may
be found in Apple’s Open Source repository. See Apple’s Open Source web site (http://www.opensource.apple.
com/) for information on how to obtain the source code. THE IPL AND CPL SOFTWARE IS PROVIDED ON AN
“AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING,
WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE. NEITHER APPLE, IBM NOR ANY OTHER CONTRIBUTOR TO THE IPL
AND CPL SOFTWARE SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, LOST PROFITS), HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE IPL AND CPL SOFTWARE OR THE
EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
D. MPEG-2 Notice. To the extent that the Apple Software contains MPEG-2 functionality, the following provision
applies: ANY USE OF THIS PRODUCT OTHER THAN CONSUMER PERSONAL USE IN ANY MANNER THAT COMPLIES
WITH THE MPEG-2 STANDARD FOR ENCODING VIDEO INFORMATION FOR PACKAGED MEDIA IS EXPRESSLY
PROHIBITED WITHOUT A LICENSE UNDER APPLICABLE PATENTS IN THE MPEG-2 PATENT PORTFOLIO, WHICH
LICENSE IS AVAILABLE FROM MPEG LA, L.L.C, 250 STEELE STREET, SUITE 300, DENVER, COLORADO 80206.
E. Use of MPEG-4. This product is licensed under the MPEG-4 Systems Patent Portfolio License for encoding in
compliance with the MPEG-4 Systems Standard, except that an additional license and payment of royalties are
necessary for encoding in connection with (i) data stored or replicated in physical media which is paid for on a
title by title basis and/or (ii) data which is paid for on a title by title basis and is transmitted to an end user for
permanent storage and/or use. Such additional license may be obtained from MPEG LA, LLC. See http://www.
mpegla.com for additional details.
This product is licensed under the MPEG-4 Visual Patent Portfolio License for the personal and non-commercial
use of a consumer for (i) encoding video in compliance with the MPEG-4 Visual Standard (“MPEG-4 Video”) and/
or (ii) decoding MPEG-4 video that was encoded by a consumer engaged in a personal and non-commercial
activity and/or was obtained from a video provider licensed by MPEG LA to provide MPEG-4 video. No license is
granted or shall be implied for any other use.
Additional information including that relating to promotional, internal and commercial uses and licensing
may be found at: http://www.apple.com/certifi cateauthority.
10. Export Control. You may not use or otherwise export or reexport the Apple Product except as authorized
by United States law and the laws of the jurisdiction in which the Apple Product was obtained. In particular,
but without limitation, the Apple Product may not be exported or re-exported (a) into any U.S. embargoed
countries or (b) to anyone on the U.S. Treasury Department’s list of Specially Designated Nationals or the U.S.
Department of Commerce Denied Person’s List or Entity List. By using the Apple Product, you represent and
warrant that you are not located in any such country or on any such list.
11. Government End Users. The Apple Software and related documentation are “Commercial Items”, as that
term is defi ned at 48 C.F.R. §2.101, consisting of “Commercial Computer Software” and “Commercial Computer
Software Documentation”, as such terms are used in 48 C.F.R. §12.212 or 48 C.F.R. §227.7202, as applicable.
Consistent with 48 C.F.R. §12.212 or 48 C.F.R. §227.7202-1 through 227.7202-4, as applicable, the Commercial
Computer Software and Commercial Computer Software Documentation are being licensed to U.S.
Government end users (a) only as Commercial Items and (b) with only those rights as are granted to all other
end users pursuant to the terms and conditions herein. Unpublished-rights reserved under the copyright laws
of the United States.
12. Controlling Law and Severability. This License will be governed by and construed in accordance with the
laws of the State of California, as applied to agreements entered into and to be performed entirely within
California between California residents. This License shall not be governed by the United Nations Convention
on Contracts for the International Sale of Goods, the application of which is expressly excluded. If for any reason
a court of competent jurisdiction fi nds any provision, or portion thereof, to be unenforceable, the remainder of
this License shall continue in full force and e∂ ect.
13. Complete Agreement; Governing Language. This License constitutes the entire agreement between
the parties with respect to the use of the Apple Software licensed hereunder and supersedes all prior or
contemporaneous understandings regarding such subject matter. No amendment to or modifi cation of this
License will be binding unless in writing and signed by Apple. Any translation of this License is done for local
requirements and in the event of a dispute between the English and any non-English versions, the English
version of this License shall govern.
14. Third Party Acknowledgements.
A. Portions of the Apple Software utilize or include third party software and other copyrighted material.
Acknowledgements, licensing terms and disclaimers for such material are contained in the “online” electronic
documentation for the Apple Software, and your use of such material is governed by their respective terms.
B. Certain software libraries and other third party software included with the Apple Software are free software
and licensed under the terms of the GNU General Public License (GPL) or the GNU Library/Lesser General Public
License (LGPL), as the case may be. You may obtain a complete machine-readable copy of the source code 80 81
may be obtained from MPEG LA, LLC. See http: //www.mpegla.com. For answers to frequently asked questions
regarding use fees under the MPEG LA Visual Patent Portfolio License see www.apple.com/mpeg4 or www.
apple.com/quicktime/products/qt/faq.html.
F. H.264/AVC Notice. To the extent that the Apple Software contains AVC encoding and/or decoding
functionality, commercial use of H.264/AVC requires additional licensing and the following provision applies:
THE AVC FUNCTIONALITY IN THIS PRODUCT IS LICENSED HEREIN ONLY FOR THE PERSONAL AND NONCOMMERCIAL USE OF A CONSUMER TO (i) ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD (“AVC
VIDEO”) AND/OR (ii) DECODE AVC VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A PERSONAL AND
NON-COMMERCIAL ACTIVITY AND/OR AVC VIDEO THAT WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO
PROVIDE AVC VIDEO. INFORMATION REGARDING OTHER USES AND LICENSES MAY BE OBTAINED FROM MPEG
LA L.L.C. SEE HTTP://WWW.MPEGLA.COM.
G. AMR Notice. The Adaptive Multi-Rate (“AMR”) encoding and decoding functionality in this product is not
licensed to perform cellular voice calls, or for use in any telephony products built on the QuickTime architecture
for the Windows platform. The AMR encoding and decoding functionality in this product is also not licensed for
use in a cellular communications infrastructure including: base stations, base station controllers/radio network
controllers, switching centers, and gateways to and from the public switched network.
H. FAA Notice. Aircraft Situation Display and National Airspace System Status Information data (collectively
“Flight Data”) displayed through the Apple Software is generated by the Federal Aviation Administration. You
agree not to redistribute Flight Data without the prior written consent of the FAA. The FAA and Apple disclaim
all warranties, expressed or implied (including the implied warranties of merchantability and fi tness for a
particular purpose), regarding the use and accuracy of the Flight Data. You agree that the FAA and Apple shall
not be liable, either collectively or individually, for any loss, damage, claim, liability, expense, or penalty, or for
any indirect, special, secondary, incidental, or consequential damages deriving from the use of the Flight Data.
The Apple Software is not sponsored or endorsed by the FAA. The FAA is not responsible for technical or system
problems, and you should not contact the FAA regarding such problems or regarding operational tra∑ c fl ow
issues.
I. Use of Adobe Color Profi les. You may use the Adobe Color Profi le software included with the Apple Software
pursuant to this License, but Adobe is under no obligation to provide any support for the Color Profi les
hereunder, including upgrades or future versions of the Profi les or other items. In addition to the provisions of
Sections 7 and 8 above, IN NO EVENT WILL ADOBE BE LIABLE TO YOU FOR ANY DAMAGES, CLAIMS OR COSTS
WHATSOEVER. The Adobe Color Profi le software distributed with the Apple Software is also available for
download from Adobe at www.adobe.com.
EA0390
Rev. 8-14-07
CONTRAT DE LICENCE DE LOGICIEL POUR MAC OS X
APPLE INC.
Licence d’utilisation individuelle et familiale destinée aux systèmes Apple
VEUILLEZ LIRE ATTENTIVEMENT CE CONTRAT DE LICENCE DE LOGICIEL (« LICENCE ») AVANT D’UTILISER LE
LOGICIEL APPLE. EN UTILISANT CE LOGICIEL, VOUS RECONNAISSEZ ÊTRE LIÉ PAR LES TERMES DE CETTE LICENCE.
SI VOUS ÊTES EN DÉSACCORD AVEC LES TERMES DE CETTE LICENCE, N’UTILISEZ PAS CE LOGICIEL. SI VOUS ÊTES
EN DÉSACCORD AVEC LES TERMES DE LA LICENCE, VEUILLEZ RESTITUER LE LOGICIEL APPLE À L’ENDROIT OÙ
VOUS L’AVEZ ACQUIS POUR EN OBTENIR LE REMBOURSEMENT. SI VOUS ACCÉDEZ À CE LOGICIEL DE MANIÈRE
ÉLECTRONIQUE, CLIQUEZ SUR « REFUSER ». POUR UN LOGICIEL APPLE INCLUS DANS UNE ACQUISITION
DE MATÉRIEL, VEUILLEZ RESTITUER L’INTÉGRALITÉ DU PAQUET LOGICIEL/MATÉRIEL AFIN D’OBTENIR SON
REMBOURSEMENT.
REMARQUE IMPORTANTE : ce logiciel peut être utilisé pour reproduire, modifi er, publier et distribuer des
données. Sa licence vous est exclusivement accordée pour la reproduction, la modifi cation, la publication et
la distribution de données non protégées par des droits d’auteur, de données dont vous possédez les droits
d’auteur ou de données que vous êtes légalement autorisé à reproduire, modifi er, publier ou distribuer. En
cas d’incertitude quant à votre droit de copier, de modifi er, de publier ou de distribuer des données, il est
préférable de vous informer auprès de votre conseiller juridique.
1. Généralités. Apple Inc. (« Apple ») vous concède une licence sur, et en aucun cas ne vous vend, le logiciel
(incluant le code de ROM de démarrage), toute documentation et polices de caractères accompagnant la
présente licence, qu’ils soient préinstallés sur un matériel Apple, sur disquette, sur mémoire morte (ROM),
sur tout autre support et sous toute autre forme (collectivement, le « logiciel Apple »), uniquement en vue
d’une utilisation conforme aux termes de cet accord. Apple se réserve la totalité des droits qui ne vous sont
pas expressément conférés. Les droits accordés ici se limitent aux droits de propriété intellectuelle d’Apple et
de ses concédants sur le logiciel Apple faisant l’objet de la présente licence et ne comprennent aucun autre
brevet ni droit de propriété intellectuelle. Vous êtes propriétaire du support sur lequel le logiciel Apple est
enregistré, mais Apple et/ou les concédants d’Apple restent propriétaires du logiciel Apple. Les droits accordés
par les termes de cette licence s’appliquent à toutes les mises à niveau de logiciel fournies par Apple servant
à remplacer et/ou compléter le logiciel Apple d’origine, à moins que ces mises à niveau ne comprennent une
licence distincte.
Le titre et les droits de propriété intellectuelle associés aux contenus a∑ chés dans le logiciel Apple ou rendus
accessibles via ce dernier sont la propriété de leur détenteur. Ces contenus sont susceptibles d’être protégés
par des copyrights ou autres traités sur la propriété intellectuelle et peuvent êtres soumis à des conditions
d’utilisation énoncées par la tierce partie les fournissant. La présente licence ne vous confère aucun droit
d’utilisation pour ces contenus ni ne garantit la disponibilité dudit contenu.82 83
2. Utilisations permises de la licence et restrictions.
A. Utilisation unique. Cette Licence vous autorise à installer, utiliser et exécuter un (1) seul exemplaire du
logiciel Apple sur un seul ordinateur Apple à la fois. Vous acceptez de ne pas installer, utiliser ou exécuter le
logiciel Apple sur un ordinateur n’étant pas de marque Apple et ne pas autoriser d’autres personnes à le faire.
La licence n’autorise pas la présence du logiciel Apple sur plus d’un ordinateur à la fois ni sur un réseau où il
peut être utilisé sur plusieurs ordinateurs à la fois.
B. Paquet familial. Si vous avez acheté un Paquet Familial Mac OS X, cette Licence vous autorise à installer et à
utiliser un (1) exemplaire du logiciel Apple sur un maximum de cinq (5) ordinateurs Apple à la fois à condition
que ces ordinateurs soient situés dans le même foyer et soient utilisés par des personnes occupant ledit foyer.
« Foyer » désigne une ou des personnes partageant le même logement, tel qu’un appartement, une maison,
une maison mobile ou une copropriété et s’étend également aux étudiants résidant principalement dans le
foyer en question mais vivant dans un campus situé dans un autre lieu. La Licence du Paquet Familial n’est pas
applicable aux utilisateurs professionnels ou commerciaux.
C. Vous êtes autorisé à e∂ ectuer une copie du logiciel Apple (à l’exception du code d’initialisation ROM et de
tout autre programme interne Apple incorporé ou contenu dans le matériel Apple) lisible par ordinateur à des
fi ns de sauvegarde uniquement, après y avoir intégré tous les avis concernant le copyright et autres avis de
propriétaire présents sur la version originale. Le code d’initialisation ROM et le programme interne Apple ne
sont fournis que dans le but d’être utilisés sur un matériel Apple et vous n’êtes pas autorisé à copier, à modifi er
ou à redistribuer le code d’initialisation ROM ou le programme interne, en partie ou en totalité.
D. Certains composants de ce logiciel Apple et des logiciels libres de tierce partie qui l’accompagnent ont été ou
peuvent être mis à disposition par Apple sur son site web de logiciels libres (http://www.opensource.apple.com/,
sous l’intitulé collectif « composants de logiciels libres »). Vous ne pouvez modifi er ou remplacer ces composants,
qu’à condition : (i) que le logiciel Apple modifi é qui en résulte ne soit utilisé, au lieu du logiciel Apple non modifi é,
que sur un seul ordinateur Apple ; et (ii) que vous respectiez par ailleurs les termes de cette licence et de toute
autre clause régissant l’utilisation des composants de logiciels libres. Apple n’est nullement tenu d’assurer la mise
à jour, l’entretien, la garantie, l’assistance technique ou autre, ou les services du logiciel Apple modifi é résultants.
Vous consentez expressément qu’en cas de panne ou de dégâts sur le matériel Apple résultant de la
modifi cation des composants de logiciels libres du logiciel Apple, ladite panne ou lesdits dégâts sont exclus des
conditions de garantie du logiciel Apple.
E. Apple fournit, au sein du paquet du logiciel Apple, l’accès à certains logiciels de tierce partie à titre de
commodité. Dans la mesure où le logiciel Apple contient des logiciels de tierce partie, Apple n’a aucune
obligation expresse ou implicite de fournir une quelconque assistance technique ou autre pour lesdits logiciels.
Veuillez contacter directement le fabricant ou le revendeur approprié afi n d’obtenir une assistance technique
et un service après-vente en lien avec ses logiciels et produits.
F. Dans toute la mesure permise par les termes de licence applicables concernant l’usage des composants de
logiciels libres et les dispositions légales applicables, vous ne pouvez copier, décompiler, procéder à l’ingénierie
inverse, désassembler, modifi er ni créer des produits dérivés du logiciel Apple ou de toute partie de ce
dernier. LE LOGICIEL APPLE N’EST PAS DESTINÉ À ÊTRE UTILISÉ DANS LE FONCTIONNEMENT D’INSTALLATIONS
NUCLÉAIRES, DE SYSTÈMES DE NAVIGATION OU DE COMMUNICATION AÉRIENNES, DE SYSTÈMES DE CONTRÔLE
DE TRAFIC AÉRIEN, D’APPAREILS DE SURVIE ARTIFICIELLE OU AUTRES ÉQUIPEMENTS DÈS LORS QU’UNE
DÉFAILLANCE DU LOGICIEL APPLE POURRAIT PROVOQUER LA MORT OU DE GRAVES DOMMAGES CORPORELS
OU ÉCOLOGIQUES.
G. Si vous utilisez l’Assistant réglages/migration pour transférer le logiciel d’un ordinateur Apple vers un autre
ordinateur Apple, veuillez noter que l’utilisation continue de la copie d’origine du logiciel peut être interdite
une fois qu’une copie a été transférée sur un autre ordinateur, à moins que vous ne disposiez déjà d’une copie
dudit logiciel fournie sous licence sur chaque ordinateur. Il est recommandé de consulter les contrats de licence
de logiciel appropriés pour connaître les termes et conditions applicables.
3. Transfert. Vous ne pouvez louer, louer en crédit bail, prêter ni concéder des licences du logiciel Apple.
Conformément aux restrictions ci-dessous, vous pouvez toutefois e∂ ectuer le transfert unique et permanent de
tous vos droits sur le logiciel Apple à une autre partie, à condition : (a) que ce transfert comprenne la totalité du
logiciel Apple, y compris la totalité de ses composants (excepté le code d’initialisation ROM et le programme
interne), données d’origine, documents imprimés ainsi que la licence ; (b) que vous ne conserviez aucune
copie du logiciel Apple, complète ou partielle, y compris toute copie stockée sur ordinateur ou toute autre
unité de stockage ; et (c) que la partie bénéfi ciaire prenne connaissance et accepte les termes et conditions
de la présente licence. Vous ne pouvez louer, louer en crédit bail, prêter, redistribuer, concéder ni transférer un
logiciel Apple qui a été modifi é ou remplacé, conformément à la section 2D ci-dessus. Tous les composants du
logiciel Apple sont fournis conjointement et ne peuvent être isolés pour être distribués comme application
autonome. Le logiciel Apple fourni avec un matériel Apple particulier peut ne pas fonctionner sur un autre
matériel Apple.
Mises à jour : si une mise à jour de logiciel Apple remplace l’intégralité (installation complète) d’une version
précédente de ce logiciel Apple pour laquelle une licence avait été accordée, vous n’êtes pas autorisé à utiliser
les deux versions du logiciel Apple en même temps ni à les céder séparément.
Vente interdite des copies et copies d’évaluation : nonobstant le contenu d’autres sections de la présente
licence, les logiciels Apple ou ceux faisant l’objet d’une o∂ re promotionnelle ou ceux interdits à la vente ne
peuvent s’utiliser qu’à des fi ns de démonstration, d’essai et d’évaluation. Ils ne peuvent être en aucun cas
revendus ou transférés.
Copies de restauration du système Apple : les CD ou DVD de restauration pouvant accompagner le paquet du
matériel Apple ou fournis par Apple en relation avec un paquet contenant un matériel Apple, contiennent une 84 85
copie du logiciel Apple utilisé uniquement à des fi ns de diagnostic et de restauration. Ces CD et DVD peuvent
être revendus ou transférés uniquement en tant que partie du paquet contenant le matériel Apple.
Copies réservées à l’usage académique : si l’emballage d’origine de votre logiciel Apple porte une étiquette
académique, ou si vous avez acquis le logiciel Apple à un tarif préférentiel destiné au milieu académique, vous
devez répondre au profi l d’utilisateur fi nal éducatif éligible pour utiliser ce logiciel. Cette désignation regroupe
les étudiants, les facultés, le personnel et l’administration d’un établissement ou d’une institution où est
dispensé un enseignement (campus universitaire, école fondamentale publique ou privée, par exemple).
4. Accord relatif à l’utilisation des données. Vous acceptez qu’Apple ainsi que ses fi liales puissent rassembler
et utiliser des informations techniques et a∂ érentes, incluant, sans s’y limiter, des informations techniques
concernant votre ordinateur, votre système, vos logiciels et les périphériques. Ces informations sont recueillies
régulièrement afi n de faciliter les o∂ res de mises à jour de logiciels, de support aux produits et de services
divers proposées au client (le cas échéant) et relatives aux logiciels Apple, ainsi que pour vérifi er la conformité
aux termes de la licence. Apple peut utiliser ces informations, en veillant à ce que l’identité du client ne soit pas
dévoilée, afi n d’améliorer ses produits ou de proposer des services et des technologies au client.
5. Terme de la licence. Cette licence est d’application jusqu’à son terme. Vos droits découlant de cette licence
prendront automatiquement fi n sans notifi cation de la part d’Apple Apple si vous ne vous conformez pas
à l’une quelconque de ses dispositions. Dès l’expiration de cette licence, vous serez tenu de cesser toute
utilisation du logiciel Apple et de détruire tous les exemplaires, complets ou partiels, dudit logiciel.
6. Garantie limitée des supports. Apple garantit les supports sur lesquels le logiciel Apple est enregistré contre
tout vice de matériau et de main d’œuvre dans le cadre d’une utilisation normale, pendant une période de
quatre-vingt-dix (90) jours à compter de la date d’achat initiale du produit. Votre seul recours, en vertu du
présent article, se limite, et ceci à la discrétion d’Apple, soit au remboursement du prix du produit contenant
le logiciel Apple, soit au remplacement du logiciel Apple, lorsqu’il est restitué à Apple ou à un représentant
autorisé d’Apple avec une copie de la facture. CETTE GARANTIE LIMITÉE ET TOUTES GARANTIES IMPLICITES
CONCERNANT LE SUPPORT, Y COMPRIS DE FAÇON NON LIMITATIVE LES GARANTIES IMPLICITES DE QUALITÉ
MARCHANDE, DE QUALITÉ SATISFAISANTE ET D’ADÉQUATION À UN OBJECTIF PARTICULIER, SONT LIMITÉES
À UNE DURÉE DE QUATRE-VINGT-DIX (90) JOURS À COMPTER DE LA DATE D’ACHAT INITIALE DU PRODUIT.
CERTAINES LÉGISLATIONS NE PERMETTANT PAS DE LIMITER LA DURÉE D’UNE GARANTIE IMPLICITE, IL EST
POSSIBLE QUE LA LIMITATION MENTIONNÉE CI-DESSUS NE VOUS CONCERNE PAS. CETTE LIMITATION DE
GARANTIE TELLE QU’ELLE EST EXPRIMÉE CI-DESSUS EST LA SEULE GARANTIE QUI VOUS SOIT ACCORDÉE ET
EXCLUT EXPRESSÉMENT L’APPLICATION DE TOUTE AUTRE GARANTIE (LE CAS ÉCHÉANT) DÉCOULANT DE TOUT
DOCUMENT OU EMBALLAGE. CETTE GARANTIE LIMITÉE VOUS DONNE DES DROITS SPÉCIFIQUES. IL SE PEUT EN
OUTRE QUE VOUS BÉNÉFICIEZ D’AUTRES DROITS QUI VARIENT SELON LES LÉGISLATIONS.
7. Exclusion de garanties. VOUS RECONNAISSEZ ET ADMETTEZ EXPRESSÉMENT QUE L’UTILISATION DU
LOGICIEL APPLE EST À VOS RISQUES ET PÉRILS ET QUE LA TOTALITÉ DU RISQUE RELATIF À LA QUALITÉ, AUX
PERFORMANCES, À L’EXACTITUDE ET AU MANIEMENT SATISFAISANTS REPOSE SUR VOUS. À L’EXCEPTION DE
LA GARANTIE LIMITÉE DES SUPPORTS STIPULÉE CI-DESSUS ET DANS LES LIMITES MAXIMALES AUTORISÉES
PAR LA LÉGISLATION EN VIGUEUR, LE LOGICIEL APPLE ET TOUT SERVICE RÉALISÉ OU FOURNI PAR LE LOGICIEL
APPLE (« SERVICES ») SONT FOURNIS « TELS QUELS » AVEC TOUS SES DÉFAUTS ET SANS AUCUNE GARANTIE
D’AUCUNE SORTE. APPLE ET LES CONCÉDANTS D’APPLE (DÉSIGNÉS COLLECTIVEMENT PAR L’EXPRESSION
« APPLE » AUX FINS DES DISPOSITIONS DES PARAGRAPHES 7 ET 8) EXCLUENT PAR LA PRÉSENTE LICENCE
LA TOTALITÉ DES GARANTIES ET CONDITIONS, EXPLICITES, TACITES OU LÉGALES, Y COMPRIS DE FAÇON
NON LIMITATIVE LES GARANTIES ET/OU CONDITIONS IMPLICITES DE QUALITÉ MARCHANDE, DE QUALITÉ
SATISFAISANTE, D’ADÉQUATION À UN OBJECTIF PARTICULIER, D’EXACTITUDE, DE SÉRÉNITÉ D’UTILISATION ET DE
NON EMPIÉTEMENT SUR LES DROITS DE TIERCES PARTIES, LE TOUT À L’ÉGARD DE TOUT SERVICE ET DU LOGICIEL
APPLE. APPLE NE GARANTIT NULLEMENT L’ABSENCE DE PERTURBATIONS LORS DE VOTRE UTILISATION DU
LOGICIEL APPLE, QUE LES FONCTIONS CONTENUES DANS LE LOGICIEL APPLE OU QUE LES SERVICES RÉALISÉS
OU FOURNIS PAR LEDIT LOGICIEL CORRESPONDRONT À VOS BESOINS, QUE LE FONCTIONNEMENT DES SERVICES
OU DU LOGICIEL APPLE SERA ININTERROMPU OU EXEMPT D’ERREUR, QUE LES SERVICES OU LE LOGICIEL APPLE
SERONT COMPATIBLES AVEC LES LOGICIELS DE TIERCE PARTIE OU QUE TOUT DÉFAUT DES SERVICES OU DU
LOGICIEL APPLE SERA CORRIGÉ. AUCUNE INFORMATION NI AUCUN CONSEIL COMMUNIQUÉS VERBALEMENT
OU PAR ÉCRIT PAR APPLE OU PAR L’UN DE SES REPRÉSENTANTS AUTORISÉS NE POURRA CONSTITUER UNE
GARANTIE. SI LES SERVICES OU LE LOGICIEL APPLE S’AVÉRAIENT DÉFECTUEUX, VOUS ASSUMERIEZ SEUL LE
COÛT TOTAL DE TOUTE RÉVISION, RÉPARATION OU RECTIFICATION NÉCESSAIRES. CERTAINES LÉGISLATIONS
NE PERMETTANT NI L’EXCLUSION DE GARANTIES IMPLICITES, NI LES RESTRICTIONS AUX DROITS EN VIGUEUR
DES CONSOMMATEURS, IL EST POSSIBLE QUE L’EXCLUSION ET LES LIMITES MENTIONNÉES CI-DESSUS NE VOUS
CONCERNENT PAS.
Le logiciel Apple référence, a∑ che, fournit et renvoie automatiquement à des services web, des sites et des
informations d’origine globale se trouvant sur Internet. Apple n’exerçant aucun contrôle sur ces sites et ces
informations, il ne garantit nullement, notamment, (a) la précision, la disponibilité, la succession, la totalité,
la validité, le contenu ou la qualité de ces sites et de ces informations, ou (b) qu’une recherche e∂ ectuée
via le logiciel Apple ne mène vers des contenus imprévus ou discutables. Certains contenus disponibles sur
Internet étant destinés à un public de plus de 18 ans ou étant de nature à heurter la sensibilité de certains
utilisateurs de moins de 18 ans, toute recherche ou saisie d’une URL particulière avec le logiciel Apple peut
automatiquement et involontairement générer des liens ou des références à des contenus à caractère
discutable. En utilisant le logiciel Apple vous reconnaissez qu’Apple n’est ni responsable ni garant d’aucun
site ni d’aucune information a∑ chés ou rendus accessibles par le logiciel Apple, ni d’aucun service web
réalisé par le logiciel Apple en lien avec ces sites ou ces informations. Apple, ses dirigeants, a∑ liés et fi liales
ne peuvent en aucun cas, directement ou indirectement, être tenus responsables envers vous ou tout autre 86 87
personne du contenu auquel vous accédez en utilisant le logiciel Apple, ni d’aucune inexactitude, erreur ou
omission de ce contenu. Les informations fi nancières apparaissant dans le logiciel Apple ne sont inclues qu’à
titre d’information d’ordre général et ne sauraient être utilisées sous forme de conseil en placement. Avant
d’exécuter toute transaction sécurisée basée sur les informations obtenues par le biais du logiciel Apple,
vous devriez consulter un professionnel fi nancier. Ni Apple ni aucun de ses fournisseurs de contenu garantit
l’exactitude, l’intégralité ou l’actualité des informations sur les titres boursiers apparaissant dans le logiciel
Apple. Il se peut que le logiciel Apple soit utilisé pour proposer des services de traduction automatisée.
Puisque ce type de traduction est accompli par des outils logiciels et ne met en œuvre aucune intervention ou
vérifi cation humaine, il est déconseillé de se fi er à ces traductions où la précision est primordiale. Les fonctions
de sauvegarde réalisées par le logiciel Apple sont uniquement e∂ ectuées à certains moments et sont soumises
à des restrictions telles que la capacité de stockage du lecteur.
Apple et ses concédants de licence se réservent le droit de modifi er, de suspendre, de supprimer ou de
désactiver l’accès à tout Service, à tout moment et sans préavis. En aucun cas Apple ne sera tenu responsable
de la suppression ou de la désactivation de l’accès auxdits Services. Apple peut également imposer des
restrictions quant à l’utilisation ou l’accès à certains Services, en toutes circonstances, sans préavis et sans être
en aucun cas responsable.
8. Limitation de responsabilité. DANS LA MESURE OÙ LA LÉGISLATION NE L’INTERDIT PAS, EN AUCUN CAS
APPLE NE SERA RESPONSABLE DE DOMMAGE CORPOREL NI DE QUELCONQUE DOMMAGE ACCIDENTEL,
SPÉCIAL, INDIRECT OU ACCESSOIRE, Y COMPRIS DE FAÇON NON LIMITATIVE, LES DOMMAGES DUS AUX PERTES
DE BÉNÉFICES, PERTES DE DONNÉES, INTERRUPTION DES ACTIVITÉS OU TOUT AUTRE DOMMAGE COMMERCIAL
OU PERTE COMMERCIALE RÉSULTANT DE OU RELATIFS À VOTRE UTILISATION OU VOTRE INAPTITUDE À UTILISER
LE LOGICIEL APPLE, QUELLE QU’EN SOIT LA CAUSE, SANS TENIR COMPTE DE LA THÉORIE DE LA RESPONSABILITÉ
(QUE CE SOIT POUR RUPTURE DE CONTRAT, EN RESPONSABILITÉ CIVILE, OU AUTRE) ET MÊME SI APPLE A
ÉTÉ INFORMÉ DE LA POSSIBILITÉ DE TELS DOMMAGES. CERTAINES JURIDICTIONS NE PERMETTANT PAS LA
LIMITATION DE RESPONSABILITÉ POUR DOMMAGES PERSONNELS, INDIRECTS OU ACCESSOIRES, IL EST POSSIBLE
QUE CETTE LIMITATION NE VOUS CONCERNE PAS. La responsabilité totale d’Apple envers vous au titre de tout
dommage (en dehors de ce que la législation pourrait exiger dans les cas impliquant une blessure) n’excédera
en aucun cas la somme de cinquante dollars (50 $). Les limitations susdites s’appliqueront même si le recours
indiqué ci-dessus fait défaut à sa vocation essentielle.
9. Certifi cats numériques.
Général. Les logiciels Apple permettent d’accepter des certifi cats numériques émis soit par Apple soit par
des tiers. VOUS ÊTES SEUL RESPONSABLE DE VOTRE DÉCISION DE FAIRE CONFIANCE OU PAS À UN CERTIFICAT,
QU’IL PROVIENNE D’APPLE OU D’UN TIERS. L’UTILISATION DE CERTIFICATS NUMÉRIQUES EST À VOTRE PROPRE
RISQUE. APPLE NE DONNE AUCUNE GARANTIE OU REPRÉSENTATION, EXPRESSE OU IMPLICITE, CONCERNANT LA
QUALITÉ MARCHANDE OU L’ADÉQUATION À UN USAGE PARTICULIER, LA PRÉCISION, LA SÉCURITÉ OU LA NON
VIOLATION DES DROITS DE TIERS EN CE QUI CONCERNE LES CERTIFICATS NUMÉRIQUES. Vous acceptez que (a)
vous ne falsifi erez ni abuserez d’aucun certifi cat ; (b) vous utiliserez les certifi cats numériques seulement à des
fi ns légales et en accord avec la Politique de certifi cat applicable, la Déclaration de pratique de certifi cation
ou autres divulgations de pratiques commerciales en accord avec l’Autorité de certifi cation ; (c) vous êtes seul
responsable d’empêcher qu’un utilisateur non autorisé utilise vos certifi cats numériques ; et (d) vous refuserez
tout certifi cat dont la fi abilité n’est pas garantie.
Utilisation des certifi cats numériques avec iChat. Les logiciels Apple vous permettent de crypter vos
communications iChat. Cette fonctionnalité utilise les certifi cats numériques pour vérifi er que votre
conversation iChat provient du nom de contact iChat qui apparaît dans la fenêtre iChat, ainsi que pour crypter
et décrypter la conversation. Elle ne permet pas de vérifi er l’identité de la personne qui utilise ce nom de
contact. Apple n’o∂ re aucune garantie quant au piratage et aux intrusions dans la conversation. L’UTILISATION
QUE VOUS FAITES DE CETTE FONCTIONNALITÉ EST À VOTRE PROPRE RISQUE. APPLE NE DONNE AUCUNE
GARANTIE OU REPRÉSENTATION, EXPRESSE OU IMPLICITE, CONCERNANT LA QUALITÉ MARCHANDE OU
L’ADÉQUATION À UN USAGE PARTICULIER, LA PRÉCISION, LA SÉCURITÉ OU LA NON VIOLATION DES DROITS
DE TIERS EN CE QUI CONCERNE LES CERTIFICATS NUMÉRIQUES ET/OU LE CRYPTAGE DANS ICHAT. En utilisant
les logiciels Apple, vous acceptez que (a) vous n’entreprendrez aucune action pouvant interférer avec le
fonctionnement normal des certifi cats numériques ou le cryptage utilisé dans une session iChat et que vous
ne falsifi erez pas le certifi cat numérique utilisé pour valider un nom de contact ; (b) vous utiliserez la fonction
de cryptage d’iChat uniquement à des fi ns légales ; (c) vous êtes seul responsable d’empêcher qu’un utilisateur
non autorisé ait accès à tout certifi cat ou clé privée mémorisés sur votre ordinateur ; et (d) vous refuserez
tout certifi cat dont la fi abilité n’est pas garantie. La Politique de certifi cation et la Déclaration de pratique de
certifi cation d’Apple sont disponibles sur : http://www.apple.com/certifi cateauthority.
10. Contrôle des exportations. Vous ne pouvez utiliser, exporter ou réexporter le logiciel Apple que
conformément à la législation des États-Unis et à la législation du pays dans lequel vous avez acquis le logiciel
Apple. En particulier, mais sans limitation, le logiciel Apple ne peut être exporté ni réexporté (a) vers tout pays
soumis à embargo des États-Unis ou (b) à toute personne fi gurant sur la liste « Specially Designated Nationals »
du Ministère des Finances des États-Unis ou sur les listes « Denied Persons » ou « Denied Entity » du Ministère
du Commerce des États-Unis. En utilisant le logiciel Apple, vous déclarez et garantissez n’être pas situé dans
un de ces pays ou inscrit sur les listes mentionnées ci-dessus. Vous acceptez également de ne pas utiliser les
logiciels Apple à des fi ns non autorisées par la législation des États-Unis, y compris, et sans aucune limitation,
le développement, la conception, la fabrication ou la production d’éléments nucléaires, de missiles ou d’armes
chimiques ou biologiques.
11. Gouvernement des États-Unis. Le logiciel et la documentation constituent des « Commercial Items »
(éléments commerciaux), tel que ce terme est défi ni dans la clause 48 C.F.R. (Code of Federal Rules)
§2.101, consistant en « Commercial Computer Software » (logiciel) et « Commercial Computer Software 88 89
Documentation » (documentation), tels que ces termes sont utilisés dans les clauses 48 C.F.R. §12.212 ou
48 C.F.R. §227.7202. Conformément à la clause 48 C.F.R. §12.212 ou 48 C.F.R. §227.7202-1 à 227.7202-4, le
« Commercial Computer Software » et le « Commercial Computer Software Documentation » sont fournis sous
licence au gouvernement des États-Unis (a) uniquement comme « Commercial Items » et (b) uniquement
accompagnés des droits octroyés à tous les autres utilisateurs conformément aux termes et conditions ci-inclus.
Droits non publiés réservés en vertu de la législation des droits d’auteur en vigueur aux États-Unis.
12. Loi applicable et divisibilité du contrat. Cette licence sera régie et interprétée en conformité avec la
législation de l’état de Californie, telle qu’elle s’applique aux accords conclus et réalisés entièrement en
Californie entre résidents californiens. Cette licence ne sera pas régie par la convention des Nations Unies sur
les contrats de vente internationale de biens, dont l’application est expressément exclue. Si pour une raison
quelconque un tribunal ayant juridiction juge qu’une disposition de la présente licence est inapplicable, en
totalité ou en partie, les autres dispositions de la présente licence resteront entièrement applicables.
13. Accord complet. Cette licence constitue l’intégralité de l’accord entre les parties quant à l’utilisation du
logiciel Apple objet de la présente licence, et remplace toutes les propositions ou accords antérieurs ou actuels,
écrits ou verbaux, à ce sujet. Aucun amendement ni aucune modifi cation de cette licence ne prendront e∂ et
à moins d’être stipulés par écrit et signés par un représentant dûment agréé d’Apple. Toute traduction de la
présente licence est e∂ ectuée pour des besoins locaux. En cas de litige entre la version anglaise et toute autre
version, seule la version anglaise sera d’application.
14. Mentions concernant les tierces parties.
A. Certaines portions du logiciel Apple utilisent ou comportent des logiciels de tierces parties et des mentions
concernant les droits d’auteurs. Les remerciements, les termes des licences et les exclusions de garanties des
dits éléments fi gurent dans la documentation électronique du logiciel Apple, et l’utilisation de ces données est
dictée par leurs conditions respectives.
B. Certaines bibliothèques de logiciels et autres logiciels de tierce partie inclus avec le logiciel Apple sont des
logiciels gratuits dont la licence est régie par les termes de la licence GPL (General Public License) de GNU ou
de la licence bibliothèque/LGPL (Lesser General Public License), le cas échéant. Il est possible d’obtenir, par
simple demande écrite à Apple, une copie électronique du code source du logiciel libre, selon les termes de
la licence GPL ou LGPL sans aucun frais, à l’exception de ceux de support, d’envoi et de traitement. Le logiciel
GPL/LGPL est distribué dans un but utilitaire, mais SANS AUCUNE GARANTIE, pas même la garantie implicite de
QUALITÉ MARCHANDE ou D’APTITUDE À UNE FIN SPÉCIFIQUE. Une copie des licences GPL et LGPL est fournie
avec le logiciel Apple.
C. Le logiciel Apple comprend certains logiciels soumis aux termes de la licence IBM Public License Version
1.0 (IPL) ou de la licence Common Public License Version 1.0 (CPL). Une copie du code source du logiciel sous
licence IPL et CPL est disponible dans le dépôt (repository) Open Source d’Apple. Consultez le site web Open
Source d’Apple à l’adresse pour en savoir plus sur l’obtention du code
source. LE LOGICIEL IPL ET CPL EST FOURNI « EN L’ÉTAT », SANS AUCUNE GARANTIE NI CONDITION D’AUCUNE
SORTE, EXPRESSE OU TACITE, Y COMPRIS, SANS AUCUNE LIMITATION, TOUTE GARANTIE OU CONDITION DE
TITRE, DE NON-CONTREFAÇON, DE QUALITÉ MARCHANDE OU D’APTITUDE À UNE UTILISATION PARTICULIÈRE.
NI APPLE, NI IBM, NI AUCUNE DES PARTIES AYANT CONTRIBUÉ AU LOGICIEL IPL ET CPL NE SERONT EN AUCUN
CAS ENGAGÉS POUR TOUS DOMMAGES DIRECTS, INDIRECTS, ACCESSOIRES, SPÉCIAUX, EXEMPLAIRES OU
CONSÉCUTIFS (Y COMPRIS, SANS S’Y LIMITER, LES BÉNÉFICES MANQUÉS), QUELLE QU’EN SOIT LA RAISON OU
TOUTE THÉORIE DE RESPONSABILITÉ, PAR CONTRAT, STRICTE RESPONSABILITÉ OU RESPONSABILITÉ EN CAS DE
PRÉJUDICE (Y COMPRIS EN CAS DE NÉGLIGENCE), ET DÉCOULANT DE L’UTILISATION OU DE LA DISTRIBUTION
DU LOGICIEL IPL ET CPL OU DE L’EXERCICE DES DROITS CITÉS PLUS BAS, MÊME APRÈS AVERTISSEMENT DE LA
POSSIBILITÉ DE CES DOMMAGES.
D. Avis MPEG-2. Si le logiciel Apple contient des fonctionnalités MPEG-2, la clause ci-dessous est applicable :
TOUT USAGE DE CE PRODUIT POUR D’AUTRES FINS QU’UNE UTILISATION PERSONNELLE EN ACCORD AVEC LA
NORME MPEG-2 D’ENCODAGE D’INFORMATIONS VIDÉO POUR CRÉER DES PRODUITS PRÊTS À L’EMPLOI EST
EXPRESSÉMENT INTERDIT SANS LICENCE RESPECTANT LES BREVETS APPLICABLES DU PORTEFEUILLE DE BREVETS
MPEG-2, DISPONIBLE AUPRÈS DE : MPEG LA, L.L.C, 250 STEELE STREET, SUITE 300, DENVER, COLORADO 80206.
E. Utilisation du MPEG-4. La licence de ce produit vous est concédée d’après les termes de la licence du
portefeuille de brevets de MPEG-4 Systems pour l’encodage selon la norme des systèmes MPEG-4. Une licence
additionnelle et le paiement d’une redevance sont toutefois nécessaires pour l’encodage (i) de données
stockées ou dupliquées dans un média physique payé titre par titre et/ou (ii) de données payées titre par
titre et transmises à un utilisateur fi nal pour un stockage et/ou une utilisation permanent(e)s. Vous pouvez
vous procurer cette licence additionnelle auprès de MPEG LA, LLC. Pour en savoir plus, rendez-vous sur le site
http://www.mpegla.com (en anglais).
La licence de ce produit vous est concédée d’après les termes de la licence du portefeuille de brevets de MPEG-
4 Visual dans le cadre d’une utilisation privée à but non commercial par un consommateur pour (i) l’encodage
de vidéo selon la norme MPEG-4 Visual (« Vidéo au format MPEG-4 ») et/ou (ii) le décodage de vidéo MPEG-4
encodée par un consommateur engagé dans une activité privée à but non commercial et/ou obtenue d’un
fournisseur vidéo sous licence de MPEG LA pour distribuer de la vidéo au format MPEG-4. Aucune licence ne
saurait être accordée ou être considérée comme implicite pour toute autre utilisation.
Des informations complémentaires sur l’utilisation à des fi ns promotionnelles, internes et commerciales et
sur l’attribution de licence dans de tels cas sont disponibles auprès de MPEG LA, LLC. Rendez-vous sur le site
http://www.mpegla.com (en anglais). Pour obtenir les réponses aux questions fréquemment posées au sujet des
frais répondant à la licence du portefeuille de brevets de la norme Visual de MPEG LA, consultez le site www.
apple.com/mpeg4 (en anglais) ou www.apple.com/quicktime/products/qt/faq.html (également en anglais).90
F. Notifi cation relative au H.264/AVC. Dans la mesure où les logiciels Apple incluent la fonctionnalité de
décodage et/ou d’encodage AVC, l’usage commercial de H.264/AVC requiert une concession de licence
complémentaire et la disposition suivante s’applique : LA PRÉSENTE LICENCE POUR LA FONCTIONNALITÉ AVC
DE CE PRODUIT N’EST ACCORDÉE QUE DANS LE CADRE D’UN USAGE PERSONNEL ET NON COMMERCIAL D’UN
CONSOMMATEUR POUR (i) ENCODER DE LA VIDÉO SELON LES NORMES D’ENCODAGE AVC (« AVC VIDÉO »)
ET/OU (ii) DÉCODER DE LA VIDÉO AVC ENCODÉE PAR UN CONSOMMATEUR DANS LE CADRE D’UNE ACTIVITÉ
PERSONNELLE ET NON COMMERCIALE ET/OU DE LA VIDÉO AVC PROVENANT D’UN FOURNISSEUR VIDÉO
AUTORISÉ À FOURNIR DE LA VIDÉO AVC. LES INFORMATIONS RELATIVES AUX AUTRES USAGES ET LICENCES
SONT DISPONIBLES AUPRÈS DE MPEG LA L.L.C. CONSULTEZ LE SITE HTTP://WWW.MPEGLA.COM.
G. Avis AMR. La fonctionnalité de codage et décodage Adaptive Multi-Rate (« AMR ») de ce produit ne fait pas
l’objet d’une licence permettant d’e∂ ectuer des appels depuis ou sur un téléphone portable, ou permettant son
utilisation sur n’importe quel produit de téléphonie conçu selon l’architecture QuickTime pour la plateforme
Windows. La fonctionnalité de codage et décodage AMR de ce produit ne fait pas l’objet d’une licence pour
l’utilisation au sein d’une infrastructure de communication cellulaire telle que les stations de base, les contrôleurs
de station de base ou de réseau radio, les centrales téléphoniques et les réseaux commutés publics.
H. Avis FAA. Les données provenant de National Airspace System Status Information (informations d’état du
système aérien national) et du projet Aircraft Situation Display (suivi des vols dans l’espace aérien), a∑ chées
dans le logiciel Apple, sont générées par la Federal Aviation Administration, FAA. Vous acceptez de ne pas
redistribuer de données concernant les vols sans l’accort préalable écrit de la FAA. La FAA et Apple refusent
toute garantie, exprimée ou implicite (y compris les garanties de qualité marchande et d’adéquation à un
usage particulier), quant à l’utilisation et à l’authenticité des données sur les vols. Vous acceptez que la FAA et
Apple ne peuvent être responsables, aussi bien collectivement qu’individuellement, de toute perte, dommage,
plainte, responsabilité, remboursement ou pénalité, ni même de tout dommage indirect, spécial, secondaire,
accessoire ou conséquent dérivant de l’utilisation de ces données. Le logiciel Apple n’est ni parrainé ni endossé
par la FAA. La FAA n’est pas responsable des problèmes techniques ou liés au système, et vous ne devez pas
contacter la FAA au sujet de tels problèmes ou de problèmes liés au trafi c aérien opérationnel.
I. Utilisation des profi ls de couleur Adobe. Vous pouvez utiliser le logiciel Adobe Color Profi le fourni avec le
logiciel Apple Software conformément à cette licence, mais Adobe n’est pas tenu de fournir le support pour
les profi ls de couleur ci-dessous, notamment les mises à jour ou les prochaines versions des profi ls ou de
tout autre élément. En plus des dispositions présentées dans les sections 7 et 8 ci-dessus, ADOBE NE SERA
EN AUCUN CAS RESPONSABLE DES ÉVENTUELS DOMMAGES, RÉCLAMATIONS OU FRAIS DONT VOUS POUVEZ
FAIRE L’OBJET. Le logiciel de profi ls de couleur Adobe qui est fourni avec le logiciel Apple peut également être
téléchargé à l’adresse www.adobe.com.
EA0390
Révisé le 14 août 2007
iPod
USB Power
AdapterEnglish 3
iPod USB
Power Adapter
The iPod USB Power Adapter is for use with
iPod shuffle, and with all iPods with Dock
Connectors.
Note: Your power adapter may look different
from the one pictured here.
Connect your iPod to the power adapter using
the USB cable that came with your iPod. If you
have an original iPod shuffle, you can connect it
directly to the power adapter.
Then extend the electrical prongs (if necessary)
and plug the adapter into an electrical outlet to
charge the iPod battery.
AC plug adapter
iPod USB Power Adapter
USB cable that came
with your iPod4 English
You can also connect the power adapter to an
iPod Dock and place iPod in the Dock.
For information on charging times, see the
manual that came with your iPod.
Important: If your power adapter has
retractable prongs, be sure to extend them
completely before you plug the adapter into
the outlet.
Safety
The only way to shut off power to your power
adapter completely is to disconnect it from
the power source.
Always leave space around your power
adapter. Don’t use it in a location where
airflow around the power adapter is
obstructed, such as a bookcase.
When connecting or disconnecting your
power adapter, always hold it by its sides.
Keep your fingers away from the metal part
of the plug.
Before connecting the USB cable to the
power adapter, make sure there are no
foreign objects inside the power adapter’s
USB port.
The power adapter is a high-voltage
component and should not be opened for
any reason, even when iPod is off.English 5
Never force a connector into the power
adapter USB port. If the connector and port
do not join with reasonable ease, make sure
that the connector matches the port and that
you have positioned the connector correctly
in relation to the port.
Keep your power adapter away from sources
of liquid, such as drinks, washbasins,
bathtubs, shower stalls, rain, and so on.
Take care not to spill any food or liquid on the
power adapter. If you do, unplug the power
adapter before cleaning up the spill. In case
of a spill, you may have to send your
equipment to Apple for service.
Do not attempt to open your power adapter
or disassemble it. You run the risk of electric
shock and voiding the limited warranty. No
user-serviceable parts are inside.
If the power adapter appears to be damaged
or does not function properly, go to
www.apple.com/support for instructions on
how to obtain warranty service.
Specifications
Input: AC 100-240 volts (V), 50/60 hertz (Hz)
Output: DC 5V, 1 A678Français 9
Adaptateur secteur
USB iPod Power
Adapter
L’adaptateur secteur de l’iPod USB Power
Adapter est à utiliser avec l’iPod shuffle ou
tout autre iPod muni du connecteur Dock.
Remarque : votre adaptateur secteur peut être
différent de celui illustré ci-dessus.
Branchez votre iPod à l’adaptateur secteur grâce
au câble USB fourni avec votre iPod. Si vous
disposez du tout premier iPod shuffle, vous
pouvez le brancher directement à l’adaptateur.
Adaptateur CA
Adaptateur secteur USB
iPod Power Adapter
Câble USB fourni
avec votre iPod10 Français
Étendez ensuite les broches électriques (si
besoin), puis branchez l’adaptateur à une prise
électrique afin de recharger la batterie de l’iPod.
Vous pouvez aussi placer votre iPod sur son
socle iPod Dock et brancher ce dernier à
l’adaptateur secteur.
Pour de plus amples informations sur les temps
de charge de la batterie, reportez-vous au
manuel fourni avec votre iPod.
Important : si votre adaptateur secteur est doté
de broches électriques à enrouleur, assurezvous de les étendre au maximum avant de
brancher l’adaptateur sur la prise.
Sécurité
Le seul moyen de couper complètement
le courant de votre adaptateur secteur est
de le débrancher de sa source électrique.
Gardez toujours un peu d’espace autour
de votre adaptateur secteur. Ne l’utilisez pas
dans un endroit où l’air ne circule pas autour
de l’adaptateur, comme c’est le cas dans une
bibliothèque.Français 11
Lorsque vous branchez ou débranchez votre
adaptateur secteur, tenez-le toujours par ses
côtés. Ne touchez pas la partie en métal de
la prise.
Avant de brancher le câble USB à l’adaptateur
secteur, assurez-vous qu’aucun objet n’est
logé dans le port USB de ce dernier.
L’adaptateur secteur est un composant à haut
voltage et ne doit en aucun cas être ouvert,
même si l’iPod est éteint.
Ne forcez jamais de connecteur à entrer dans
le port USB de l’adaptateur. Si le connecteur
et le port ne s’adaptent pas relativement
facilement, assurez-vous qu’ils sont bien
prévus pour se brancher ensemble et
que vous avez positionné correctement
le connecteur par rapport au port.
Éloignez l’adaptateur secteur des liquides
et sources de liquides, tels que les boissons,
les lavabos, les baignoires, les blocs de douche,
la pluie, etc.12 Français
Prenez garde de ne pas faire tomber de
nourriture ou de liquide sur l’adaptateur
secteur. Si le cas se présente, débranchez
l’adaptateur secteur avant de l’essuyer.
Si vous renversez quelque chose dessus, il
peut s’avérer nécessaire de renvoyer votre
équipement à Apple pour le faire réviser.
N’essayez pas d’ouvrir ou de démonter votre
adaptateur secteur. Vous risquez de recevoir
une décharge électrique et d’annuler la
garantie limitée. L’appareil ne contient pas de
pièces pouvant être réparées par l’utilisateur.
Si l’adaptateur secteur semble endommagé
ou ne fonctionne pas correctement, rendezvous sur le site www.apple.com/fr/support
pour connaître les conditions de réparation
dans le cadre de la garantie.
Spécifications
Entrée : CA 100-240 volts (V), 50/60 hertz (Hz)
Sortie : CC 5V, 1 ADeutsch 13
iPod USB Power
Adapter (Netzteil)
Der iPod USB Power Adapter (Netzteil) kann mit
dem iPod shuffle und allen iPod Playern mit
Dock Connector verwendet werden.
Hinweis: Ihr Netzteil sieht möglicherweise
anders als hier dargestellt aus.
Schließen Sie den iPod mit dem mitgelieferten
USB-Kabel an das Netzteil an. Wenn Sie einen
original iPod shuffle besitzen, können Sie diesen
direkt an das Netzteil anschließen.
Netzteilstecker
iPod USB Power Adapter
(Netzteil)
Mit dem iPod
geliefertes
USB-Kabel14 Deutsch
Klappen Sie dann die Steckerstifte (falls erforderlich) heraus und schließen Sie das Netzteil
an eine Steckdose an, um die iPod Batterie
zu laden.
Sie können das Netzteil auch mit einem
iPod Dock verbinden und den iPod in das
Dock stellen.
Informationen zu Ladezeiten finden Sie im
Handbuch, das Sie mit Ihrem iPod erhalten
haben.
Wichtig: Wenn Ihr Netzteil herausklappbare
Steckerstifte besitzt, stellen Sie sicher, dass Sie
diese vollständig herausgeklappt haben, bevor
Sie das Netzteil an die Steckdose anschließen.
Sicherheit
Die einzige Möglichkeit, die Stromzufuhr zum
Netzteil komplett zu unterbrechen, besteht
darin, das Kabel des Netzteils vom Stromnetz
zu trennen.
Achten Sie darauf, dass um das Netzteil ausreichend Freiraum vorhanden ist. Verwenden
Sie es nur in Umgebungen, in denen eine
ausreichende Luftzirkulation gewährleistet ist.
Verwenden Sie es zum Beispiel nicht in einem
Aktenkoffer oder Ähnlichem.Deutsch 15
Halten Sie das Netzteil an den Seiten, wenn
Sie es vom Stromnetz trennen oder daran
anschließen. Achten Sie darauf, die Metallstifte des Steckers nicht zu berühren.
Stellen Sie vor dem Anschließen des USBKabels an das Netzteil sicher, dass sich keine
Fremdkörper im USB-Anschluss des Netzteils
befinden.
Bei dem Netzteil handelt es sich um ein
Hochspannungsbauteil, das unter keinen
Umständen geöffnet werden darf, auch dann
nicht, wenn der iPod ausgeschaltet ist.
Versuchen Sie niemals, einen Stecker mit
Gewalt an den USB-Anschluss des Netzteils
anzuschließen. Wenn sich der Stecker nicht
relativ einfach mit dem Netzteil verbinden
lässt, vergewissern Sie sich, dass der Stecker
zum Anschluss passt und Sie den Stecker wie
erforderlich mit dem Anschluss ausgerichtet
haben.
Schützen Sie Ihr Netzteil vor Feuchtigkeit und
Witterungseinflüssen. Legen Sie es nicht in
der Nähe von Getränken, Waschbecken,
Bade- und Duschwannen und anderen
Feuchtigkeitsquellen ab.16 Deutsch
Achten Sie darauf, dass das Netzteil nicht
durch Speisereste oder Flüssigkeiten verunreinigt wird. Wenn dies doch einmal passiert,
trennen Sie das Netzteil vom Stromnetz, bevor
Sie es reinigen. Unter Umständen ist es erforderlich, Ihre Geräte an Apple zur Wartung
zu senden.
Versuchen Sie keinesfalls, das Netzteil zu öffnen oder auseinander zu bauen. Dabei kann
es zu einem Kurzschluss kommen, und Sie
riskieren den Verlust des Garantieanspruchs.
Im Innern des Gerätes befinden sich keine
Komponenten, die vom Benutzer gewartet
werden können.
Wenn das Netzteil beschädigt ist oder nicht
korrekt funktioniert, finden Sie Näheres zu
Ihren Garantieansprüchen und zu Service
und Support unter folgender Adresse:
www.apple.com/de/support.
Technische Daten
Eingangsleistung: 100 - 240 V Wechselstrom,
50/60 Hz
Ausgangsleistung: 5 V Gleichstrom, 1,0 A17
Disposal and Recycling Information
When this product has reached the end of its useful life,
please dispose of it according to
your local environmental laws and guidelines.
For information about Apple’s recycling program, go to
www.apple.com/environment/summary.html.
European Union—Disposal Information:
The symbol above means that according to local laws
and regulations your product should be disposed of
separately from household waste. When this product
reaches its end of life, take it to a collection point
designated by local authorities. Some collection points
accept products for free. The separate collection and
recycling of your product at the time of disposal will
help conserve natural resources and ensure that it is
recycled in a manner that protects human health and
the environment.18
Union Européenne : informations sur l’élimination
Le symbole ci-dessus signifie que vous devez vous
débarasser de votre produit sans le mélanger avec les
ordures ménagères, selon les normes et la législation de
votre pays. Lorsque ce produit n’est plus utilisable,
portez-le dans un centre de traitement des déchets
agréé par les autorités locales. Certains centres
acceptent les produits gratuitement. Le traitement et le
recyclage séparé de votre produit lors de son
élimination aideront à préserver les ressources
naturelles et à protéger l’environnement et la santé des
êtres humains.
Europäische Union – Informationen zur Entsorgung
Das Symbol oben bedeutet, dass dieses Produkt
entsprechend den geltenden gesetzlichen Vorschriften
und getrennt vom Hausmüll entsorgt werden muss.
Geben Sie dieses Produkt zur Entsorgung bei einer
offiziellen Sammelstelle ab. Bei einigen Sammelstellen
können Produkte zur Entsorgung unentgeltlich
abgegeben werden. Durch das separate Sammeln und
Recycling werden die natürlichen Ressourcen geschont
und es ist sichergestellt, dass beim Recycling des
Produkts alle Bestimmungen zum Schutz von
Gesundheit und Umwelt beachtet werden.19
Unione Europea: informazioni per l’eliminazione
Questo simbolo significa che, in base alle leggi e alle
norme locali, il prodotto dovrebbe essere eliminato
separatamente dai rifiuti casalinghi. Quando il prodotto
diventa inutilizzabile, portarlo nel punto di raccolta
stabilito dalle autorità locali. Alcuni punti di raccolta
accettano i prodotti gratuitamente. La raccolta separata
e il riciclaggio del prodotto al momento
dell’eliminazione aiutano a conservare le risorse naturali
e assicurano che venga riciclato in maniera tale da
salvaguardare la salute umana e l’ambiente.
Europeiska unionen – uttjänta produkter
Symbolen ovan betyder att produkten enligt lokala
lagar och bestämmelser inte får kastas tillsammans med
hushållsavfallet. När produkten har tjänat ut måste den
tas till en återvinningsstation som utsetts av lokala
myndigheter. Vissa återvinningsstationer tar
kostnadsfritt hand om uttjänta produkter. Genom att
låta den uttjänta produkten tas om hand för
återvinning hjälper du till att spara naturresurser och
skydda hälsa och miljö.Apple and the Environment
At Apple, we recognize our responsibility to minimize
the environmental impacts of our operations and
products.
For more information, go to
www.apple.com/environment/summary.html.
www.apple.com/ipod/support
© 2006 Apple Computer, Inc. All rights reserved.
Apple, the Apple logo, and iPod are trademarks of Apple
Computer, Inc., registered in the U.S. and other countries.
Shuffle is a trademark of Apple Computer, Inc.
0Z034-3775-A
Printed in XXXX
Feuille d’opérations de Mac OS X Server
Les réglages du serveur suivant sont indiqués dans les tableaux ci-dessous :
Serveur :
Élément Description Vos informations
Identité du serveur
distant pour
l’installation et
la configuration
Pour l’installation et la configuration interactives
d’un serveur distant sur le sous-réseau local,
l’une de ces valeurs du serveur :
- Adresse IP au format IPv4 (000.000.000.000).
- Nom d’hôte (serveur.exemple.com).
- Adresse MAC (00:03:93:71:26:52).
Pour les installations et configurations à partir de la
ligne de commande ou d’un sous-réseau distant,
l’adresse IP du serveur cible au format IPv4.
Mot de passe
prédéfini (pour
l’installation et
la configuration
à distance)
Les 8 premiers chiffres du numéro de série du
serveur cible, imprimé sur l’étiquette collée sur
l’ordinateur.
Pour les anciens ordinateurs ne portant pas ce
type de numéro, tapez 12345678.
Type d’installation Mise à niveau à partir de la version 10.3.9 ou 10.2.8,
installation complète sans formatage de disque ou
installation spéciale.
Le volume (partition) cible est effacé lorsque vous
effectuez une nouvelle installation.
Disque ou partition
cible
Nom du disque ou de la partition (volume) cible.
Format de disque
(lorsque l’effacement
du disque est validé)
Format du disque cible.
Dans la plupart des cas, utilisez Mac OS Étendu
(journalisé).
Vous pouvez également utiliser Mac OS Étendu.
N’utilisez pas système de fichiers UNIX ou tout
autre format sensible à la casse.
Partitionnement
de disque (lorsque
l’effacement du
disque est validé)
Indiquez si vous souhaitez partitionner le disque
cible.
La taille minimum recommandée d’une partition
de disque cible est de 10 Go.2
Mise en miroir RAID
(lorsque l’effacement
du disque est validé
et que vous disposez
d’un deuxième
disque physique sur
le serveur cible)
Indiquez si vous souhaitez configurer la mise
en miroir RAID. Le deuxième disque est utilisé
automatiquement si le disque principal n’est pas
disponible.
Si le disque cible comporte une partition unique
et que le deuxième disque physique comporte
une partition unique sans aucune donnée, vous
pouvez configurer la mise en miroir RAID après
l’installation. Cependant, afin d’éviter toute perte
de données, configurez la mise en miroir RAID
le plus tôt possible.
Utilisation de
données de
configuration
enregistrées
Si vous voulez utiliser les données de configuration
enregistrées pour configurer ce serveur, identifiez
le fichier ou le répertoire dans lequel elles sont
stockées . Si les données sont cryptées, identifiez
également la phrase secrète.
Si vous souhaitez enregistrer des réglages dans
un fichier ou un répertoire, utilisez l’une des deux
lignes suivantes.
Enregistrement
des données de
configuration
dans un fichier
Nommez le fichier à l’aide de l’une des options
suivantes :
- .plist (incluez les
zéros de début, mais omettez les deux-points).
Par exemple, 0030654dbcef.plist.
- .plist. Par exemple,
10.0.0.4.plist.
- .plist.
Par exemple, monserveur.plist.
- .plist (8 premiers caractères seulement).
Par exemple, ABCD1234.plist.
- .plist.
Par exemple, monserveur.exemple.com.plist.
- .plist.
Par exemple, 10.0.plist (trouve 10.0.0.4 et 10.0.1.2).
- generique.plist (fichier que tout serveur
reconnaîtra, utilisé pour configurer les serveurs qui
nécessitent les mêmes valeurs de configuration).
Si vous choisissez de crypter le fichier, vous
pouvez enregistrer la phrase secrète dans un
fichier nommé selon les conventions ci-dessus,
mais utilisez l’extension .pass et non .plist.
Placez le(s) fichier(s) à un emplacement où
le ou les serveurs cible peuvent le détecter.
Un serveur peut détecter les fichiers qui
résident sur un volume monté localement
dans /Volumes/*/Auto Server Setup/, où *
correspond à n’importe quel périphérique
monté sous /Volumes.
Élément Description Vos informations3
Enregistrement
de données de
configuration
dans un répertoire
Accédez au répertoire dans lequel vous souhaitez
enregistrer la configuration, puis nommez
l’enregistrement de configuration à l’aide
d’une des options suivantes :
- (insérez les zéros
à gauche mais omettez les deux-points). Par
exemple, 0030654dbcef.
- . Par exemple, 10.0.0.4.
- . Par exemple,
monserveur.
-
(8 premiers caractères seulement). Par exemple,
ABCD1234.
- .
Par exemple, monserveur.exemple.com.
- . Par exemple,
10.0 (trouve 10.0.0.4 et 10.0.1.2).
- generique (fichier que tout serveur reconnaîtra,
utilisé pour configurer les serveurs qui nécessitent
les mêmes valeurs de configuration).
Si vous choisissez de crypter le fichier,
vous pouvez enregistrer la phrase secrète
dans un fichier nommé à l’aide des conventions
ci-dessus, mais utilisez l’extension .pass.
Placez le fichier de phrase secrète à un
emplacement où le ou les serveurs cible peuvent
le détecter. Un serveur peut détecter le fichier
s’il réside sur un volume monté localement dans
/Volumes/*/Auto Server Setup/, où * correspond
à tout périphérique monté sous /Volumes.
Langue Langue à utiliser pour l’administration du serveur
(anglais, japonais, français ou allemand). La langue
affecte les formats de date et d’heure du serveur,
le texte affiché et l’encodage par défaut utilisé par
le serveur AFP.
Configuration
de clavier
Clavier de l’administration du serveur.
Élément Description Vos informations4
Numéro de série Numéro de série de votre copie de Mac OS X
Server. Le format du numéro de série du serveur
est xsvr-104-999-x-zzz-zzz-zzz-zzz-zzz-zzz-z, où x
est une lettre, 9 un chiffre et z une lettre ou
un chiffre. Le premier (xsvr) et le quatrième (x)
élément doivent être en minuscules.
Excepté si vous possédez une licence de site,
vous avez besoin d’un numéro de série unique
pour chaque serveur. Vous trouverez le numéro
de série du logiciel serveur imprimé sur les
documents fournis avec le logiciel.
Si vous possédez une licence de site, vous
devez saisir le nom du propriétaire enregistré
et l’organisation exactement tels qu’ils ont été
spécifiés par votre représentant Apple.
Si vous configurez un serveur avec un fichier
de configuration ou un enregistrement de
répertoire générique et que le numéro de
série ne correspond pas à une licence de site,
vous devez saisir le numéro de série du serveur
à l’aide d’Admin Serveur.
Nom long de
l’administrateur
(parfois appelé nom
complet ou nom réel)
Un nom long ne doit pas être composé de plus
de 255 octets. Le nombre de caractères va de
255 caractères romains à 85 caractères de 3 octets.
Ce nom peut comporter des espaces Il ne doit pas
être identique à un nom d’utilisateur prédéfini, tel
que l’administrateur système. Il respecte la casse
dans la fenêtre d’ouverture de session, mais pas
lors de l’accès aux serveurs de fichiers.
Nom abrégé de
l’administrateur
Le nom abrégé peut contenir jusqu’à 255 caractères
romains, même s’il se limite généralement à
huit ou moins. Ce nom ne peut être composé
que des caractères a à z, A à Z, 0 à 9, _ (trait de
soulignement) ou - (trait d’union). Évitez les noms
abrégés affectés par Apple à des utilisateurs
prédéfinis, tels que « root ».
Mot de passe de
l’administrateur
Cette valeur distingue les majuscules
des minuscules et doit contenir au moins
4 caractères. Il s’agit également du mot
de passe de l’utilisateur root.
Si vous enregistrez cette valeur, veillez à conserver
cette feuille d’opérations en lieu sûr.
À l’issue de la configuration, utilisez le
Gestionnaire de groupe de travail pour
changer le mot de passe de ce compte.
Élément Description Vos informations5
Nom d’hôte Vous ne pouvez pas spécifier ce nom lors de la
configuration du serveur. L’Assistant du serveur
configure le nom d’hôte sur AUTOMATIC dans
/etc/hostconfig. Avec ce réglage, le nom d’hôte
du serveur est le premier nom qui est vrai dans
cette liste :
- Le nom fourni par le serveur DHCP ou BootP
pour l’adresse IP principale.
- Le premier nom renvoyé par une requête DNS
inversé (adresse-vers-nom) pour l’adresse IP
principale.
- Le nom d’hôte local.
- Le nom « localhost ».
Nom de l’ordinateur Le nom AppleTalk et le nom par défaut utilisé
pour SLP/DA. Indiquez un nom de 63 caractères
ou moins, mais évitez d’utiliser les caractères
=, : et @.
L’Explorateur réseau du Finder utilise SMB/CIFS
pour rechercher les ordinateurs qui permettent
le partage de fichiers Windows. Les espaces sont
supprimés d’un nom d’ordinateur pour une
utilisation avec SMB/CIFS, et le nom ne doit pas
contenir plus de 15 caractères, sans caractères
spéciaux et sans ponctuation.
Nom d’hôte local Le nom qui désigne un ordinateur sur un sousréseau local. Il peut contenir des lettres minuscules,
des chiffres et/ou des traits d’union (mais pas aux
extrémités). Le nom se termine par « .local » et doit
être unique sur un sous-réseau local.
Données d’interface
réseau
Votre serveur est équipé d’un port Ethernet
intégré et éventuellement d’un autre port intégré
ou ajouté. Enregistrez les informations de chaque
port à activer.
Enregistrez les données
relatives à chaque port
dans le tableau fourni
plus loin dans cette
feuille d’opérations.
Élément Description Vos informations6
Utilisation des
répertoires
Sélectionnez l’un des éléments suivants :
- Serveur autonome (utilisez uniquement
le répertoire local).
- Connecté à un système de répertoire (obtenez
des informations d’un autre répertoire partagé
du serveur). Si vous sélectionnez cette option,
utilisez l’une des quatre lignes suivantes de ce
tableau pour indiquer la façon dont le serveur
se connecte au répertoire.
- Maître Open Directory (fournissez les informations
de répertoire aux autres ordinateurs). Si vous
choisissez cette option, utilisez la ligne Utilisation
du maître Open Directory.
- Aucune modification (pour les mises à niveau
seulement).
Utilisation de Tel
que spécifié par
le serveur DHCP
Le répertoire à utiliser sera identifié par un
serveur DHCP configuré pour fournir l’adresse
et la base de recherche d’un serveur LDAP
(option DHCP 95) ou l’adresse et la balise d’un
serveur NetInfo hérité.
Utilisation d’un
serveur Open
Directory
Le répertoire à utiliser sera un répertoire
LDAP identifié par un serveur DHCP ou par
la spécification d’une adresse IP ou d’un
nom de domaine pour le serveur LDAP.
Utilisation d’un
serveur NetInfo
Le répertoire à utiliser sera un répertoire parent
NetInfo sur un serveur Apple existant. Choisissez
un ou plusieurs moyens de localiser ce répertoire :
- Diffusion.
- DHCP.
- Adresse IP statique (indiquez l’adresse IP et la
balise NetInfo).
Utilisation d’un autre
serveur de répertoire
Le ou les répertoires à utiliser seront configurés
à l’aide de l’application Format de répertoire
une fois la configuration du serveur terminée.
Utilisation de maître
Open Directory
Vous pouvez éventuellement indiquer que vous
voulez activer un contrôleur de domaine principal
Windows sur le serveur. Indiquez un nom
d’ordinateur et un domaine Windows pour le
serveur. Le nom d’ordinateur et le domaine
peuvent contenir les caractères a à z, A à Z, 0 à 9, -,
mais pas de . ou d’espace ; en outre, ils ne peuvent
pas être composés uniquement de chiffres.
Terminez la configuration du répertoire à
héberger à l’aide d’Admin Serveur une fois
la configuration du serveur achevée.
Élément Description Vos informations7
Les réglages de configuration du port suivant apparaissent dans le tableau ci-dessous :
Automatisation du
démarrage du service
Indiquez si vous souhaitez lancer
automatiquement l’un des services ci-après
au démarrage du serveur. Ces services ne
nécessitent aucune autre configuration :
Service de fichiers Apple
Apple Remote Desktop
Service FTP
Service iChat
Service de courrier
Service NetBoot
Service d’horloge de réseau
Service QuickTime Streaming
Service de mise à jour de logiciels
Service web
Service WebDAV
Service de journal web (Weblog)
Service de fichiers Windows
Service Xgrid Agent
Service Xgrid Controller
Fuseau horaire Choisissez le fuseau horaire que le serveur doit
utiliser.
Horloge réseau Indiquez éventuellement un serveur horloge
de réseau. Apple recommande de préserver
la précision de l’horloge du serveur en la
synchronisant avec un serveur horloge de réseau.
Élément Description Vos informations
Nom du port :Ethernet intégré
Élément Description Vos informations
Nom du
périphérique
Un nom UNIX du port au format enx, où x commence par
0. Reportez-vous au manuel fourni avec le matériel pour
connaître la valeur de x pour le port que vous décrivez.
La valeur en0 désigne toujours un port Ethernet intégré.
en0
Adresse
Ethernet
L’adresse MAC (Media Access Control) du port
(00:00:00:00:00:00). Cette valeur se trouve généralement
sur un autocollant apposé sur le serveur, mais vous
pouvez également exécuter Informations Système Apple
ou un outil de ligne de commande tel que networksetup
pour retrouver cette valeur.
TCP/IP et
AppleTalk
Indiquez si vous souhaitez activer le port pour TCIP/IP
et/ou AppleTalk.
Vous pouvez connecter un port à Internet en activant
TCP/IP et utiliser le même port ou un autre port pour
AppleTalk. N’activez pas plus d’un port pour AppleTalk.8
Ordre des ports Si vous activez plusieurs ports, indiquez l’ordre dans
lequel vous devez accéder aux ports lors de la tentative
de connexion à un réseau. L’ensemble du trafic réseau
non local utilise le premier port actif.
Réglages TCP/IP Utilisez l’une des quatre lignes suivantes de ce tableau.
Manuellement Indiquez ces réglages si vous souhaitez spécifier
manuellement les réglages TCP/IP :
- Adresse IP (000.000.000.000). Adresse statique unique.
- Masque de sous-réseau (000.000.000.000). Utilisé pour
localiser le sous-réseau sur le réseau local où se trouve
le serveur. Ce masque est utilisé pour déduire la partie
réseau de l’adresse du serveur ; ce qui reste identifie
l’ordinateur serveur sur ce réseau.
- Routeur (000.000.000.000) prenant en charge le
sous-réseau sur lequel réside le serveur. Le routeur
est l’ordinateur du sous-réseau local vers lequel sont
envoyés les messages si l’adresse IP cible ne se trouve
pas sur le sous-réseau local.
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms DNS complets (et inversement)
pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous
ne les tapez pas entièrement. Par exemple, si vous
indiquez campus.univ.edu comme domaine de
recherche, vous pouvez saisir serveur1 dans la zone
de dialogue Se connecter au serveur du Finder pour
vous connecter à serveur1.campus.univ.edu.
Via DHCP avec
saisie manuelle
de l’adresse IP
Indiquez ces réglages si vous souhaitez utiliser un
serveur DHCP pour attribuer une adresse IP statique et
éventuellement d’autres réglages au port. Assurez-vous
que le serveur DHCP est déjà configuré et que le service
DHCP est en cours d’exécution lorsque vous lancez la
configuration du serveur :
- Adresse IP (000.000.000.000). Adresse statique unique.
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms DNS complets (et inversement)
pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous
ne les tapez pas entièrement. Par exemple, si vous
indiquez campus.univ.edu comme domaine de
recherche, vous pouvez saisir serveur1 dans la zone
de dialogue Se connecter au serveur du Finder pour
vous connecter à serveur1.campus.univ.edu.
Élément Description Vos informations9
Via DHCP Indiquez ces réglages si vous souhaitez utiliser un
serveur DHCP pour attribuer une adresse IP dynamique
et éventuellement d’autres réglages au port. Assurezvous que le serveur DHCP est déjà configuré et que
le service DHCP est en cours d’exécution lorsque vous
lancez la configuration du serveur :
- Identifiant client DHCP (facultatif). Chaîne utile pour
reconnaître un port lorsque son adresse IP change. Ne
spécifiez pas d’identifiant client DHCP lors de l’utilisation
de l’Assistant du serveur pour configurer le serveur à
distance. En revanche, après la configuration, utilisez les
préférences Réseau du serveur pour définir un identifiant
client DHCP.
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms DNS complets (et inversement)
pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous ne
les tapez pas entièrement. Par exemple, si vous indiquez
campus.univ.edu comme domaine de recherche, vous
pouvez saisir serveur1 dans la zone de dialogue Se
connecter au serveur du Finder pour vous connecter à
serveur1.campus.univ.edu.
Via BootP Spécifiez ces réglages si vous souhaitez utiliser un serveur
de protocole Bootstrap pour attribuer une adresse IP au
port identifié. Avec BootP, la même adresse IP est toujours
affectée à une interface réseau particulière. Elle est utilisée
principalement pour les ordinateurs qui démarrent à partir
d’une image NetBoot :
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms de domaine complets (et
inversement) pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous ne
les tapez pas entièrement. Par exemple, si vous indiquez
campus.univ.edu comme domaine de recherche, vous
pouvez saisir serveur1 dans la zone de dialogue Se
connecter au serveur du Finder pour vous connecter à
serveur1.campus.univ.edu.
Élément Description Vos informations10
Les réglages de configuration du port suivant apparaissent dans le tableau ci-dessous :
IPv6 Pour configurer l’adressage IPv6 pour le port,
sélectionnez Automatiquement ou Manuellement.
Choisissez Automatiquement si vous souhaitez que le
serveur génère automatiquement une adresse IPv6 pour
le port.
Choisissez Manuellement pour spécifier des réglages IPv6 :
- Adresse IPv6. Généralement au format
0000:0000:0000:0000:0000:0000:0000:0000.
- Routeur. Adresse IPv6 du routeur sur le sous-réseau local.
- Longueur du préfixe. Nombre de bits significatifs du
masque de sous-réseau utilisés pour identifier le réseau.
Réglages
Ethernet
Pour configurer automatiquement les réglages Ethernet
pour le port, choisissez Automatiquement.
Vous pouvez choisir Manuellement (Avancé) pour
spécifier les réglages si vous avez des besoins particuliers
concernant le réseau auquel le serveur est connecté. Notez
que des réglages Ethernet incorrects peuvent affecter les
performances réseau ou rendre un port inutilisable :
- Vitesse. Vitesse Ethernet maximale, en bits par seconde,
pour toute transmission via le port. Sélectionnez
l’une des options suivantes :sélection automatique,
10baseT/UTP, 100baseTX et 1000baseTX.
- Duplex. Détermine si les paquets d’entrée et de sortie
sont transmis simultanément (duplex intégral) ou en
alternance (semi-duplex).
- Taille maximale de paquet (MTU). Paquet le plus grand
envoyé ou reçu par le port. MTU signifie « unité de
transfert maximale », exprimée en octets. L’augmentation
de la taille de paquet améliore le débit, mais les
périphériques qui reçoivent le paquet (commutateurs,
routeurs, etc.) doivent prendre en charge cette taille de
paquet. Sélectionnez l’une des options suivantes :
Standard (1500), Jumbo (9000) ou Personnaliser (saisissez
une valeur comprise entre 72 et 1500).
Élément Description Vos informations
Nom du port :
Élément Description Vos informations
Nom du
périphérique
Un nom UNIX du port au format enx, où x commence par
0. Reportez-vous au manuel fourni avec le matériel pour
connaître la valeur de x pour le port que vous décrivez.
La valeur en0 désigne toujours un port Ethernet intégré.
Adresse
Ethernet
L’adresse MAC (Media Access Control) du port
(00:00:00:00:00:00). Cette valeur se trouve généralement
sur un autocollant apposé sur le serveur, mais vous
pouvez également exécuter Informations Système Apple
ou un outil de ligne de commande tel que networksetup
pour retrouver cette valeur.11
TCP/IP et
AppleTalk
Indiquez si vous souhaitez activer le port pour TCP/IP
et/ou AppleTalk.
Vous pouvez connecter un port à Internet en activant
TCP/IP et utiliser le même port ou un autre port pour
AppleTalk. N’activez pas plus d’un port pour AppleTalk.
Ordre des ports Si vous activez plusieurs ports, indiquez l’ordre dans
lequel vous devez accéder aux ports lors de la tentative
de connexion à un réseau. L’ensemble du trafic réseau
non local utilise le premier port actif.
Réglages TCP/IP Utilisez l’une des quatre lignes suivantes de ce tableau.
Manuellement Indiquez ces réglages si vous souhaitez spécifier
manuellement les réglages TCP/IP :
- Adresse IP (000.000.000.000). Adresse statique unique.
- Masque de sous-réseau (000.000.000.000). Utilisé pour
localiser le sous-réseau sur le réseau local où se trouve
le serveur. Ce masque est utilisé pour déduire la partie
réseau de l’adresse du serveur ; ce qui reste identifie
l’ordinateur serveur sur ce réseau.
- Routeur (000.000.000.000) prenant en charge le
sous-réseau sur lequel réside le serveur. Le routeur
est l’ordinateur du sous-réseau local vers lequel sont
envoyés les messages si l’adresse IP cible ne se trouve
pas sur le sous-réseau local.
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms DNS complets (et inversement)
pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous ne
les tapez pas entièrement. Par exemple, si vous indiquez
campus.univ.edu comme domaine de recherche, vous
pouvez saisir serveur1 dans la zone de dialogue Se
connecter au serveur du Finder pour vous connecter
à serveur1.campus.univ.edu.
Via DHCP avec
saisie manuelle
de l’adresse IP
Indiquez ces réglages si vous souhaitez utiliser un
serveur DHCP pour attribuer une adresse IP statique et
éventuellement d’autres réglages au port. Assurez-vous
que le serveur DHCP est déjà configuré et que le service
DHCP est en cours d’exécution lorsque vous lancez la
configuration du serveur :
- Adresse IP (000.000.000.000). Adresse statique unique.
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms DNS complets (et inversement)
pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous ne
les tapez pas entièrement. Par exemple, si vous indiquez
campus.univ.edu comme domaine de recherche, vous
pouvez saisir serveur1 dans la zone de dialogue Se
connecter au serveur du Finder pour vous connecter
à serveur1.campus.univ.edu.
Élément Description Vos informations12
Via DHCP Indiquez ces réglages si vous souhaitez utiliser un
serveur DHCP pour attribuer une adresse IP dynamique
et éventuellement d’autres réglages au port. Assurezvous que le serveur DHCP est déjà configuré et que
le service DHCP est en cours d’exécution lorsque vous
lancez la configuration du serveur :
- Identifiant client DHCP (facultatif). Chaîne utile pour
reconnaître un port lorsque son adresse IP change. Ne
spécifiez pas d’identifiant client DHCP lors de l’utilisation
de l’Assistant du serveur pour configurer le serveur à
distance. En revanche, après la configuration, utilisez les
préférences Réseau du serveur pour définir un identifiant
client DHCP.
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms DNS complets (et inversement)
pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous ne
les tapez pas entièrement. Par exemple, si vous indiquez
campus.univ.edu comme domaine de recherche, vous
pouvez saisir serveur1 dans la zone de dialogue Se
connecter au serveur du Finder pour vous connecter à
serveur1.campus.univ.edu.
Via BootP Spécifiez ces réglages si vous souhaitez utiliser un serveur
de protocole Bootstrap pour attribuer une adresse IP au
port identifié. Avec BootP, la même adresse IP est toujours
affectée à une interface réseau particulière. Elle est utilisée
principalement pour les ordinateurs qui démarrent à partir
d’une image NetBoot :
- Serveurs DNS (000.000.000.000) utilisés pour convertir
les adresses IP en noms DNS complets (et inversement)
pour le port.
- Domaines de recherche (facultatif). Noms à ajouter
automatiquement aux adresses Internet lorsque vous ne
les tapez pas entièrement. Par exemple, si vous indiquez
campus.univ.edu comme domaine de recherche, vous
pouvez saisir serveur1 dans la zone de dialogue Se
connecter au serveur du Finder pour vous connecter
à serveur1.campus.univ.edu.
Élément Description Vos informationsIPv6 Pour configurer l’adressage IPv6 pour le port,
sélectionnez Automatiquement ou Manuellement.
Choisissez Automatiquement si vous souhaitez que le
serveur génère automatiquement une adresse IPv6 pour
le port.
Choisissez Manuellement pour spécifier des réglages IPv6 :
- Adresse IPv6. Généralement au format
0000:0000:0000:0000:0000:0000:0000:0000.
- Routeur. Adresse IPv6 du routeur sur le sous-réseau local.
- Longueur du préfixe. Nombre de bits significatifs du
masque de sous-réseau utilisés pour identifier le réseau.
Réglages
Ethernet
Pour configurer automatiquement les réglages Ethernet
pour le port, choisissez Automatiquement.
Vous pouvez choisir Manuellement (Avancé) pour
spécifier les réglages si vous avez des besoins particuliers
concernant le réseau auquel le serveur est connecté.
Notez que des réglages Ethernet incorrects peuvent
affecter les performances réseau ou rendre un port
inutilisable :
- Vitesse. Vitesse Ethernet maximale, en bits par seconde,
pour toute transmission via le port. Sélectionnez
l’une des options suivantes :Sélection automatique,
10baseT/UTP, 100baseTX et 1000baseTX.
- Duplex. Détermine si les paquets d’entrée et de sortie
sont transmis simultanément (duplex intégral) ou en
alternance (semi-duplex).
- Taille maximale de paquet (MTU). Paquet le plus grand
envoyé ou reçu par le port. MTU signifie « unité de
transfert maximale », exprimée en octets. L’augmentation
de la taille de paquet améliore le débit, mais les
périphériques qui reçoivent le paquet (commutateurs,
routeurs, etc.) doivent prendre en charge cette taille
de paquet. Sélectionnez l’une des options suivantes :
Standard (1500), Jumbo (9000) ou Personnaliser (saisissez
une valeur comprise entre 72 et 1500).
Élément Description Vos informations
© 2006 Apple Computer, Inc. Tous droits réservés.
Apple, le logo Apple, AppleTalk, Mac, Mac OS, Macintosh, QuickTime et Xgrid
sont des marques d’Apple Computer, Inc. déposées aux États-Unis et dans d’autres pays.
Apple Remote Desktop et Finder sont des marques d’Apple Computer Inc. Juillet 2006.
F019-0742
Time Capsule
Installationshandbuch3
Inhalt
5 Kapitel 1: Einführung
7 Informationen zu Ihrer Time Capsule-Basisstation
9 Die AirPort-Software
10 Systemvoraussetzungen
12 Die Statusanzeigen der Time Capsule-Basisstation
15 Kapitel 2: Konfigurieren Ihrer Time Capsule-Basisstation
16 Verwenden der Time Capsule-Basisstation zum Erstellen eines drahtlosen Netzwerks
19 Verwenden des AirPort-Dienstprogramms
21 Einrichten eines neuen drahtlosen Netzwerks
22 Konfigurieren und Freigeben des Internetzugangs
24 Festlegen erweiterter Optionen
25 Ermöglichen des Netzwerkzugriffs durch drahtlose Clients ohne Eingabe eines
Kennworts
27 Verwenden von Time Machine mit Ihrer Time Capsule-Basisstation
29 Kapitel 3: Tipps zur Fehlerbeseitigung
29 Sie können keine Verbindung zum Internet herstellen
29 Sie haben Ihr Netzwerk- oder Time Capsule-Kennwort vergessen
31 Ihre Time Capsule-Basisstation reagiert nicht4 Inhalt
32 Die Statusanzeige der Time Capsule-Basisstation blinkt gelb
33 Ihr Drucker reagiert nicht
34 Aktualisieren der AirPort-Software
35 Überlegungen zur Platzierung der Time Capsule-Basisstation
36 Mögliche Störquellen, die Interferenzen mit AirPort verursachen können
37 Kapitel 4: Weitere Informationen, Service und Support
39 Anhang: Time Capsule – Technische Daten und Sicherheitsinformationen
43 Regulatory Compliance Information1
5
1 Einführung
Herzlichen Glückwunsch zum Kauf von Time Capsule.
Bitte lesen Sie dieses Handbuch, um die Basisstation in
Betrieb zu nehmen.
Die neue Time Capsule-Basisstation ermöglicht eine vollständig automatisierte
Datensicherung über Ihr Wi-Fi-Netzwerk. Mit dem Programm „Time Machine“ unter
Mac OS X 10.5.2 Leopard (oder neuer) lassen sich ganz einfach und automatisch
Sicherungskopien der Daten aller Computer in Ihrem Netzwerk auf einer einzigen
Time Capsule-Basisstation anlegen.
Gleichzeitig dient Time Capsule auch als eine AirPort Extreme-Basisstation, die einen
gleichzeitigen drahtlosen Dualband-Netzwerkbetrieb ermöglicht. Bei der Konfiguration Ihrer Time Capsule richtet diese zwei High-Speed-Wi-Fi-Netzwerke ein:
 Ein 2,4 Gigahertz- (GHz) Netzwerk für 802.11b-, 802.11g- und 802.11n-Geräte wie
iPhone, iPod touch und ältere Computer
 Ein 5 GHz-Netzwerk für 802.11n- und 802.11a-Geräte wie neuere Computer und
Apple TV6 Kapitel 1 Einführung
Geräte für die drahtlose Kommunikation können das Netzwerk nutzen, das ihnen eine
optimale Leistung und Kompatibilität bietet. Die Time Capsule-Basisstation stellt den
Computern und Geräten in Ihrem Netzwerk eine Breitband-Internetverbindung für die
gemeinsame Nutzung bereit.
Mit Time Capsule haben Sie folgende Möglichkeiten:
 Verwenden des Programms „Time Machine“ unter Mac OS X 10.5.2 (oder neuer) zum
Ausführen einer Datensicherung aller Computer in Ihrem drahtlosen Netzwerk sowie
von Computern, die via Ethernet mit Ihrer Time Capsule verbunden sind.
Hinweis: Abhängig davon, wie viele Daten Sie sichern wollen, kann die erste Datensicherung mit Time Capsule und Time Machine relativ lange dauern, etwa über Nacht
oder sogar länger. Sie können die erste Datensicherung beschleunigen, indem Sie
Ihren Computer über ein Ethernetkabel mit dem LAN-Anschluss der Time Capsule
verbinden. Weitere Informationen zum Verwenden von Time Machine finden Sie im
Abschnitt „Verwenden von Time Machine mit Ihrer Time Capsule-Basisstation“ auf
Seite 27.
 Erstellen eines durch Kennwort geschützten drahtlosen privaten Netzwerks, Herstellen einer Verbindung zum Internet und Freigeben der Verbindung für andere Computer oder Wi-Fi-Geräte wie iPhone, iPod touch und Apple TV. Sie können Daten mit
anderen mit dem Netzwerk verbundenen Computern gemeinsam nutzen.
 Einrichten eines Gastnetzwerks mit oder ohne Kennwortschutz, um drahtlosen
Geräten wie Computern, iPhone, iPod touch und Apple TV nur den Internetzugang
bereitzustellen.Kapitel 1 Einführung 7
 Verbinden der Time Capsule-Basisstation mit Ihrem Ethernetnetzwerk. MacintoshComputer, Windows XP- oder Windows Vista-Computer, die für die drahtlose Kommunikation konfiguriert sind, können dann auf ein komplettes Netzwerk zugreifen,
ohne durch Kabel verbunden zu sein.
 Anschließen eines kompatiblen USB-Druckers an Ihre Time Capsule-Basisstation.
Kompatible Computer in Ihrem AirPort-Netzwerk können diesen Drucker dann
drahtlos oder via Kabel verwenden.
 Verbinden einer zusätzlichen USB-Festplatte mit der Time Capsule-Basisstation.
Kompatible Computer in Ihrem AirPort-Netzwerk können dann drahtlos oder per
Kabel auf Informationen auf der Festplatte zugreifen.
 Verbinden eines USB-Hub mit der Time Capsule-Basisstation und Anschließen
mehrerer USB-Geräte wie Drucker oder Festplatten. Alle Computer im Netzwerk
können danach auf diese Geräte zugreifen.
Wichtig: Installieren Sie das AirPort-Dienstprogramm 5.4 von der CD, die Sie mit Ihrer
Time Capsule-Basisstation erhalten haben. Oder laden Sie das Dienstprogramm mithilfe der Softwareaktualisierung. Vorherige Versionen des AirPort-Assistenten und
des AirPort Admin-Dienstprogramms sind mit dieser Time Capsule-Basisstation
nicht kompatibel.
Informationen zu Ihrer Time Capsule-Basisstation
Ihre Time Capsule-Basisstation ist mit fünf Anschlüssen an der Rückseite ausgestattet:
 Einem 10/100/1000BASE-T Gigabit Ethernet-WAN-Anschluss (Wide Area Network) für
die Anbindung eines DSL- oder Kabelmodems oder für den Anschluss an ein vorhandenes Ethernetnetzwerk 8 Kapitel 1 Einführung
 Drei 10/100/1000BASE-T Gigabit Ethernet-LAN-Anschlüsse (Local Area Network) für
die Anbindung von Ethernetgeräten wie Druckern oder Computern oder für den
Anschluss an ein vorhandenes Ethernetnetzwerk
 Einem USB-Anschluss für die Anbindung eines kompatiblen USB-Druckers, einer
USB-Festplatte oder eines USB-Hubs für den Anschluss verschiedener Geräte
Die Reset-Taste neben den Anschlüssen wird für die Fehlerbeseitigung Ihrer
Time Capsule-Basisstation verwendet. Die Statusanzeige vorne am Gerät zeigt
den aktuellen Status an.
Statusanzeige Internet-WAN-Anschluss
Netzanschluss
Netzkabel
USB-Anschluss Reset-Taste
Ethernetanschlüsse
Anschluss für
Diebstahlsicherung
Anzeige für
EthernetaktivitätKapitel 1 Einführung 9
Die AirPort-Software
Ihre Time Capsule-Basisstation funktioniert mit dem AirPort-Dienstprogramm, das auf
der Time Capsule-CD enthalten ist.
Installieren Sie das AirPort-Dienstprogramm und befolgen Sie die Anleitungen auf den
folgenden Seiten, um die Time Capsule-Basisstation und Ihr drahtloses AirPort-Netzwerk zu konfigurieren.
Hinweis: Für die Konfiguration von Time Capsule ist das AirPort-Dienstprogramm Version 5.4 erforderlich. Mit älteren Versionen der AirPort-Software ist diese Time CapsuleBasisstation nicht kompatibel.
AirPort-Dienstprogramm
Verwenden Sie das AirPort-Dienstprogramm für die Konfiguration Ihrer Time CapsuleBasisstation, sodass Sie ein drahtloses Netzwerk einrichten, die Verbindung zum Internet herstellen und kompatible USB-Drucker und USB-Festplatten gemeinsam verwenden können. Sie können Ihre Time Capsule-Basisstation auch mit einem vorhandenen
drahtlosen AirPort Extreme-Netzwerk verbinden.
Das AirPort-Dienstprogramm eignet sich auch für die Konfiguration und Verwaltung
von Time Capsule-, AirPort Extreme- und AirPort Express-Basisstationen. Verwenden
Sie das Dienstprogramm, um die Einstellungen für Netzwerk, Datenweiterleitung
und Sicherheit sowie weitere Optionen manuell festzulegen.
Z AirPort-Symbol in der Menüleiste
Mithilfe des AirPort-Symbols in der Menüleiste können Sie schnell zwischen AirPortNetzwerken wechseln, die Signalqualität des derzeit ausgewählten Netzwerks überwachen, ein Computer-zu-Computer-Netzwerk einrichten und die AirPort-Kommunikation aktivieren oder deaktivieren. Das AirPort-Symbol wird bei Computern mit
Mac OS X in der Menüleiste angezeigt. 10 Kapitel 1 Einführung
Systemvoraussetzungen
Für die Verwendung von Time Capsule benötigen Sie einen Computer, der drahtlos
arbeiten kann und mit den Standards IEEE 802.11a, 802.11b oder 802.11g oder mit einer
Entwurfsversion des IEEE 802.11n-Standards konform ist. Damit Sie die Time CapsuleBasisstation konfigurieren können, muss Ihr Computer die unten genannten Systemvoraussetzungen erfüllen.
Hinweis: Sie benötigen Mac OS X 10.5.2 (oder neuer), um die Time Capsule-Basisstation
mit Time Machine von Mac OS X Leopard nutzen zu können.
Zum Konfigurieren Ihrer Time Capsule-Basisstation mit einem Macintosh-Computer
benötigen Sie Folgendes:
 Einen Macintosh-Computer mit einer installierten AirPort- oder AirPort Extreme-Karte
für die drahtlose Konfiguration oder einen Macintosh-Computer, der für die Konfiguration via Ethernet über ein Ethernetkabel mit der Time Capsule-Basisstation
verbunden ist
 Mac OS X 10.4 (oder neuer)
 AirPort-Dienstprogramm 5.4 (oder neuer)
Zum Konfigurieren der Time Capsule-Basisstation mit einem Windows-PC benötigen
Sie Folgendes:
 Einen Windows-PC mit einer Prozessorgeschwindigkeit von mindestens 300 MHz und
einer kompatiblen 802.11a-, 802.11b- oder 802.11g-Karte für die drahtlose Kommunikation oder einer Karte für die drahtlose Kommunikation, die mit einer Entwurfsversion
des Standards IEEE 802.11n konform ist
 Windows XP Home oder Professional (mit installiertem Service Pack 2) oder
Windows VistaKapitel 1 Einführung 11
 AirPort-Dienstprogramm 5.4 (oder neuer)
Anschließen der Time Capsule-Basisstation an das Stromnetz
Bevor Sie Ihre Time Capsule-Basisstation an das Stromnetz anschließen, verbinden Sie
zuerst die jeweiligen Kabel mit den Anschlüssen, die Sie verwenden wollen:
 Verbinden Sie das an Ihr DSL- oder Kabelmodem angeschlossene Ethernetkabel
(sofern Sie auf das Internet zugreifen werden) mit dem Ethernet-WAN-Anschluss (<).
 Verbinden Sie ein USB-Kabel mit dem USB-Anschluss (d) der Time Capsule-Basisstation und einem kompatiblen USB-Drucker (sofern Sie über einen USB-Drucker
drucken werden), einer Festplatte oder einem Hub.
 Verbinden Sie ein Ethernetkabel mit einem Ethernetgerät und den Ethernet-LANAnschlüssen (G).
Nachdem Sie die Kabel für alle vorgesehenen Geräte angeschlossen haben, verbinden
Sie das Netzkabel mit dem Netzanschluss der Time Capsule-Basisstation und dann die
Basisstation mit dem Stromnetz. Ein Ein-/Ausschalter ist nicht vorhanden.
Wichtig: Verwenden Sie nur das mit der Time Capsule-Basisstation gelieferte
Netzkabel.
Nachdem Sie die Time Capsule-Basisstation mit dem Stromnetz verbunden haben,
blinkt die Statusanzeige eine Sekunde lang grün und leuchtet dann während des
Startvorgangs gelb. Nach Abschluss des Startvorgangs blinkt die Statusanzeige gelb,
bis die Time Capsule-Basisstation mit den korrekten Einstellungen aktualisiert wurde.
Nachdem die Time Capsule-Basisstation korrekt konfiguriert und mit dem Internet bzw.
einem Netzwerk verbunden ist, leuchtet die Statusanzeige grün.
Wenn Sie Ethernetkabel mit den Ethernetanschlüssen verbinden, leuchten die Statusanzeigen über den Anschlüssen permanent grün.12 Kapitel 1 Einführung
Die Statusanzeigen der Time Capsule-Basisstation
In der folgenden Tabelle werden die Modi der Statusanzeigen der Time CapsuleBasisstation und deren Bedeutung erläutert.
Anzeige Status/Beschreibung
Aus Die Time Capsule-Basisstation ist nicht am Stromnetz
angeschlossen.
Leuchtet gelb Die Time Capsule-Basisstation beendet gerade den
Startvorgang.
Blinkt gelb Die Time Capsule-Basisstation kann keine Verbindung zum Netzwerk oder dem Internet herstellen oder hat ein Problem festgestellt. Vergewissern Sie sich, dass Sie das AirPort-Dienstprogramm
installiert haben. Stellen Sie mithilfe des Dienstprogramms die
Ursache für das Blinken der gelben Statusanzeige fest. Vgl. „Die
Statusanzeige der Time Capsule-Basisstation blinkt gelb“ auf
Seite 32.
Leuchtet grün Ihre Time Capsule-Basisstation ist eingeschaltet und funktioniert
ordnungsgemäß. Wenn Sie „Aufblinken bei Aktivität“ aus dem
Einblendmenü „Statusanzeige“ im Bereich „Basisstation“ der
AirPort-Einstellungen im AirPort-Dienstprogramm auswählen,
blinkt die Statusanzeige ggf. grün, um normale Aktivität
anzuzeigen.
Blinkt gelb und grün Beim Starten ist möglicherweise ein Problem aufgetreten.
Die Time Capsule-Basisstation wird neu gestartet.
Leuchtet blau Die Time Capsule-Basisstation ist bereit, einem drahtlosen ClientComputer den Zugriff auf das Netzwerk zu ermöglichen (vgl.
„Ermöglichen des Netzwerkzugriffs durch drahtlose Clients ohne
Eingabe eines Kennworts“ auf Seite 25).Kapitel 1 Einführung 13
Nächste Schritte
Nachdem Sie die Time Capsule-Basisstation angeschlossen haben, konfigurieren Sie sie
mithilfe des AirPort-Dienstprogramms für Ihre Internetverbindung, den USB-Drucker
oder die USB-Festplatte oder für ein vorhandenes Netzwerk. Das AirPort-Dienstprogramm befindet sich auf einem Computer mit Mac OS X im Ordner „Dienstprogramme“ innerhalb des Ordner „Programme“. Auf einem Computer mit Windows XP
oder Windows Vista finden Sie das Dienstprogramm unter „Start“ > „Programme“ >
„AirPort“.2
15
2 Konfigurieren Ihrer Time CapsuleBasisstation
Dieses Kapitel enthält Informationen und Anleitungen dazu,
wie Sie Ihre Time Capsule-Basisstation mit dem Internet verbinden und mit dem AirPort-Dienstprogramm konfigurieren,
um ein drahtloses Netzwerk zu erstellen oder auf ein solches
Netzwerk zuzugreifen.
Das vorliegende Kapitel erläutert, wie Sie die Time Capsule mit dem Internet verbinden
und den Assistenten des AirPort-Dienstprogramms für die Konfiguration Ihres Netzwerks und anderer Funktionen Ihrer Time Capsule-Basisstation verwenden. Weitere
Informationen zu drahtlosen Netzwerken sowie zu den erweiterten Funktionen des
AirPort-Dienstprogramms finden Sie im Dokument „Konzipieren von AirPort-Netzwerken – Verwenden des AirPort-Dienstprogramms (Mac OS X 10.5 + Windows)“,
das auf folgender Webseite verfügbar ist: www.apple.com/de/support/airport.
Nachdem Sie das AirPort-Dienstprogramm von der mit der Time Capsule-Basisstation
gelieferten CD installiert haben, können Sie einen Großteil Ihrer Netzwerkkonfigurationsaufgaben mithilfe des Assistenten des AirPort-Dienstprogramms ausführen. Zum
Festlegen erweiterter Optionen wählen Sie „Manuelle Konfiguration“ aus dem Menü
„Basisstation“ des AirPort-Dienstprogramms aus (vgl. „Festlegen erweiterter Optionen“
auf Seite 24).16 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation
Verwenden der Time Capsule-Basisstation zum Erstellen eines
drahtlosen Netzwerks
Wenn Sie Time Capsule für den Netzwerk- und Internetzugang einrichten, können die
folgenden Computer und Geräte auf das drahtlose AirPort-Netzwerk zugreifen, um
Dateien bereitzustellen, Computerspiele zu spielen und Internetprogramme wie
Webbrowser und E-Mail-Programme zu verwenden:
 Macintosh-Computer mit AirPort- oder AirPort Extreme-Karten
 Computer, die mit den Standards 802.11a, 802.11b und 802.11g sowie der Entwurfsversion des IEEE 802.11n-Standards konform sind
 Andere Wi-Fi-Geräte
Die via Ethernet mit der Time Capsule-Basisstation verbundenen Computer können
ebenfalls auf das Netzwerk zugreifen, um Dateien gemeinsam zu nutzen und eine
Verbindung zum Internet herzustellen.
Mit Mac OS X 10.5.2 (oder neuer) können Sie Time Machine so konfigurieren, dass auf
der Time Capsule-Basisstation eine Datensicherung aller Computer im Netzwerk erstellt
wird. Weitere Informationen hierzu finden Sie im Abschnitt „Verwenden von Time
Machine mit Ihrer Time Capsule-Basisstation“ auf Seite 27.
Wenn Sie einen kompatiblen USB-Drucker an Ihre Time Capsule-Basisstation anschlie-
ßen, können unterstützte Computer im Netzwerk (drahtlos oder per Kabel verbunden)
auf diesen Drucker zugreifen.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 17
Verwenden der Time Capsule-Basisstation zum Erstellen eines drahtlosen
Netzwerks
Gehen Sie wie folgt vor, um das drahtlose Netzwerk zu konfigurieren:
1 Schließen Sie Ihr DSL- oder Kabelmodem an Ihre Time Capsule-Basisstation an.
Verwenden Sie hierzu den Ethernet-WAN-Anschluss (<).
zum Internet
DSL- oder Kabelmodem
< Internet-WAN-Anschluss
Gemeinsam
genutzter Drucker
Time Capsule
zu USB-Anschlüssen
2,4 oder 5 GHz 2,4 GHz
2,4 oder 5 GHz18 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation
2 Wenn Sie einen USB-Drucker im Netzwerk freigeben möchten, verbinden Sie ihn über
ein USB-Kabel mit dem Time Capsule-USB-Anschluss (d) oder mit einem USB-Hub.
3 Öffnen Sie das AirPort-Dienstprogramm (im Ordner Dienstprogramme“ innerhalb des
Ordners „Programme“ auf einem Computer mit Mac OS X und unter „Start“ > „Programme“ > „AirPort“ auf einem Computer mit Windows), wählen Sie die Time CapsuleBasisstation aus und klicken Sie dann auf „Fortfahren“.
4 Befolgen Sie die auf dem Bildschirm angezeigten Anweisungen zum Erstellen eines
neuen Netzwerks.
Gehen Sie wie folgt vor, um von einem Computer mit Mac OS X 10.5 zu drucken:
1 Wählen Sie „Apple“ > „Systemeinstellungen“ und klicken Sie dann auf „Drucken &
Faxen“.
2 Klicken Sie auf „Hinzufügen“ (+) und wählen Sie Ihren Drucker aus der Liste aus.
3 Klicken Sie auf die Taste „Hinzufügen“.
Wird Ihr Drucker nicht in der Liste aufgeführt, suchen Sie mithilfe der Symbole in der
Symbolleiste danach.
Gehen Sie wie folgt vor, um von einem Computer mit Mac OS X 10.3 oder 10.4
zu drucken:
1 Öffnen Sie das Drucker-Dienstprogramm (im Ordner „Dienstprogramme“ innerhalb des
Ordners „Programme“).
2 Wählen Sie den Drucker aus der Liste aus.
Wenn der Drucker nicht in der Liste enthalten ist, klicken Sie auf „Hinzufügen“ und
wählen Sie „Bonjour“ aus dem Einblendmenü aus. Wählen Sie anschließend den
Drucker aus der Liste aus.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 19
Gehen Sie wie folgt vor, um von einem Computer mit Windows XP oder
Windows Vista zu drucken:
1 Installieren Sie das Programm „Bonjour für Windows“, das sich auf der mit der
Time Capsule-Basisstation gelieferten CD befindet.
2 Befolgen Sie die Anweisungen auf dem Bildschirm, um Ihren Drucker anzuschließen.
AirPort-fähige Computer oder Computer, die mit anderen Karten oder Adaptern für
die drahtlose Kommunikation ausgestattet sind, können über Time Capsule die Verbindung zum Internet herstellen. Die mit den Time Capsule-Ethernetanschlüssen verbundenen Computer können ebenfalls auf das Netzwerk und das Internet zugreifen.
Drahtlose Computer und mit den Ethernetanschlüssen verbundene Computer können
über Time Capsule auch untereinander kommunizieren.
Verwenden des AirPort-Dienstprogramms
Verwenden Sie den Assistenten des AirPort-Dienstprogramms, um Ihre Time CapsuleBasisstation zu konfigurieren. Das AirPort-Dienstprogramm wird auf Ihrem Computer
installiert, wenn Sie die Software von der Time Capsule-CD installieren.
Macintosh-Computer mit Mac OS X 10.4 oder neuer:
1 Öffnen Sie das AirPort-Dienstprogramm (im Ordner „Dienstprogramme“ innerhalb des
Ordners „Programme“).
2 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“.
Wird die Time Capsule nicht angezeigt, die Sie konfigurieren wollen, klicken Sie auf
„Erneut suchen“, um nach verfügbaren drahtlosen Geräten zu suchen. Wählen Sie dann
die gewünschte Basisstation aus der Liste aus.20 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation
3 Befolgen Sie die angezeigten Anleitungen, um Ihre Time Capsule-Basisstation und Ihr
drahtloses Netzwerk zu konfigurieren.
Computer mit Windows XP (mit Service Pack 2) oder Windows Vista:
1 Öffnen Sie das AirPort-Dienstprogramm, das sich unter „Start“ > „Programme“ >
„AirPort“ befindet.
2 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“.
3 Befolgen Sie die angezeigten Anleitungen, um Ihre Time Capsule-Basisstation und Ihr
drahtloses Netzwerk zu konfigurieren.
Beantworten Sie anschließend die Fragen des Assistenten des AirPort-Dienstprogramms zur Art des Netzwerks, das Sie verwenden möchten, und zu den Diensten,
die konfiguriert werden sollen. Der Assistent unterstützt Sie auch bei der Eingabe
der passenden Einstellungen.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 21
Wenn Sie mit Time Capsule auf das Internet zugreifen, müssen Sie bei einem Internetanbieter für einen Breitband-Account (DSL- oder Kabelmodem) registriert sein oder
eine Verbindung zum Internet über ein vorhandenes Ethernetnetzwerk besitzen. Wenn
Sie von Ihrem Internetanbieter zusätzliche Informationen erhalten haben (zum Beispiel
eine statische IP-Adresse oder eine DHCP-Client-ID), müssen Sie diese Informationen
möglicherweise im AirPort-Dienstprogramm eingeben. Legen Sie diese Informationen
bereit, bevor Sie mit der Konfiguration von Time Capsule beginnen.
Einrichten eines neuen drahtlosen Netzwerks
Sie können den Assistenten des AirPort-Dienstprogramms auch zum Erstellen eines
neuen drahtlosen Netzwerks verwenden. Der Assistent führt Sie durch die Schritte, die
zum Benennen Ihres Netzwerks, zum Schützen Ihres Netzwerks durch ein Kennwort
und zum Festlegen anderer Optionen erforderlich sind.
Gehen Sie wie folgt vor, wenn Sie einen USB-Drucker oder eine USB-Festplatte in Ihrem
Netzwerk gemeinsam nutzen möchten:
1 Schließen Sie den Drucker oder die Festplatte an den USB-Anschluss (d) der
Time Capsule-Basisstation an.
2 Öffnen Sie das AirPort-Dienstprogramm, das sich auf einem Macintosh-Computer im
Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“ oder auf einem Computer mit Windows XP unter „Start“ > „Programme“ > „AirPort“ befindet.
3 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“.
Wird die Time Capsule nicht angezeigt, die Sie konfigurieren wollen, klicken Sie auf
„Erneut suchen“, um nach verfügbaren drahtlosen Geräten zu suchen. Wählen Sie dann
die gewünschte Basisstation aus der Liste aus.22 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation
4 Befolgen Sie die auf dem Bildschirm angezeigten Anweisungen zum Erstellen eines
neuen Netzwerks.
Konfigurieren und Freigeben des Internetzugangs
Wenn Sie Ihren Internetzugang mit anderen für die drahtlose Kommunikation ausgelegten Computern im Netzwerk oder mit Computern, die mit den Ethernetanschlüssen
verbunden sind, gemeinsam nutzen möchten, müssen Sie die Time Capsule als AirPortBasisstation einrichten. Nach der Konfiguration Ihrer Time Capsule können Computer
über das AirPort-Netzwerk auf das Internet zugreifen. Die Time Capsule-Basisstation
stellt die Verbindung zum Internet her und verteilt Informationen an die Computer.
Schließen Sie Ihr DSL- oder Kabelmodem an den Ethernet-WAN-Anschluss (<) der
Time Capsule-Basisstation an, bevor Sie das AirPort-Dienstprogramm zum Konfigurieren Ihrer Basisstation verwenden. Wird die Time Capsule-Basisstation an ein Ethernetnetzwerk mit Internetzugriff angeschlossen, empfiehlt es sich, die Internetverbindung
via Ethernet bereitzustellen.
Verwenden Sie den Assistenten des AirPort-Dienstprogramms, um die Einstellungen
Ihres Internetanbieters einzugeben und zu konfigurieren, wie Time Capsule die Einstellungen für andere Computer bereitstellt.
1 Öffnen Sie das AirPort-Dienstprogramm, das sich auf einem Computer mit Mac OS X im
Ordner „Dienstprogramme“ innerhalb des Ordner „Programme“ befindet. Auf einem
Computer mit Windows XP oder Windows Vista finden Sie das Dienstprogramm unter
„Start“ > „Programme“ > „AirPort“.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 23
2 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“.
Wenn Sie Änderungen an einer Time Capsule-Basisstation vornehmen, die bereits
konfiguriert wurde, müssen Sie ggf. eine Verbindung zum vorhandenen Netzwerk
herstellen, bevor Sie Einstellungen der Time Capsule-Basisstation ändern.
Verwenden Sie auf einem Macintosh das AirPort-Symbol in der Menüleiste, um das
drahtlose Netzwerk auszuwählen, das Sie ändern möchten. Bewegen Sie auf einem
Computer mit Windows XP den Mauszeiger auf das Symbol für die drahtlose Verbindung und warten Sie, bis der Name des AirPort-Netzwerks (SSID) angezeigt wird.
Wählen Sie anschließend dieses Netzwerk aus der Liste aus, wenn mehrere Netzwerke
verfügbar sind.
3 Befolgen Sie die Anweisungen auf dem Bildschirm, um Ihre Time Capsule-Basisstation
zu konfigurieren und den Internetzugang freizugeben.
Mit dem AirPort-Dienstprogramm können Sie Ihre Time Capsule-Basisstation und Ihr
Netzwerk schnell und einfach konfigurieren. Wenn Sie weitere Optionen wie eine
Zugriffsbeschränkung für Ihr Netzwerk festlegen oder erweiterte DHCP-Optionen
einstellen wollen, wählen Sie „Manuelle Konfiguration“ aus dem Menü „Basisstation“
des AirPort-Dienstprogramms aus. 24 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation
Festlegen erweiterter Optionen
Konfigurieren Sie Ihre Time Capsule-Basisstation mit dem AirPort-Dienstprogramm
manuell, wenn Sie erweiterte Time Capsule-Optionen wie zusätzliche Sicherheitsoptionen, geschlossene Netzwerke, DHCP-Lease-Dauer, Zugriffssteuerung, Signalstärke, Benutzer-Accounts und mehr festlegen möchten.
Gehen Sie wie folgt vor, um erweiterte Optionen festzulegen:
1 Öffnen Sie das AirPort-Dienstprogramm, das sich auf einem Macintosh-Computer im
Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“ oder auf einem Computer mit Windows XP unter „Start“ > „Programme“ > „AirPort“ befindet.
2 Sind in der Liste mehrere drahtlose Geräte enthalten, wählen Sie das Gerät aus, das Sie
konfigurieren möchten. Wird die Time Capsule nicht angezeigt, die Sie konfigurieren
wollen, klicken Sie auf „Erneut suchen“, um nach verfügbaren drahtlosen Geräten zu
suchen. Wählen Sie dann die gewünschte Basisstation aus der Liste aus.
Wenn Sie Änderungen an einer Time Capsule-Basisstation vornehmen, die bereits
konfiguriert wurde, müssen Sie ggf. eine Verbindung zum vorhandenen Netzwerk
herstellen, bevor Sie Einstellungen der Time Capsule-Basisstation ändern.
Verwenden Sie auf einem Macintosh das AirPort-Symbol in der Menüleiste, um das
drahtlose Netzwerk auszuwählen, das Sie ändern möchten. Bewegen Sie auf einem
Computer mit Windows XP den Mauszeiger auf das Symbol für die drahtlose Verbindung und warten Sie, bis der Name des AirPort-Netzwerks (SSID) angezeigt wird.
Wählen Sie anschließend dieses Netzwerk aus der Liste aus, wenn mehrere Netzwerke
verfügbar sind.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 25
3 Wählen Sie „Manuelle Konfiguration“ aus dem Menü „Basisstation“ aus. Werden Sie zur
Eingabe eines Kennworts aufgefordert, geben Sie dieses ein.
Weitere Informationen zu den Funktionen für die manuelle Konfiguration im AirPortDienstprogramm finden Sie im Dokument „Konzipieren von AirPort-Netzwerken –
Verwenden des AirPort-Dienstprogramms (Mac OS X 10.5 + Windows)“ auf folgender
Webseite: www.apple.com/de/support/airport.
Ermöglichen des Netzwerkzugriffs durch drahtlose Clients
ohne Eingabe eines Kennworts
Wenn das Netzwerk mit einem WPA Personal- oder WPA/WPA2 Personal-Kennwort
geschützt ist, können Sie Clients den drahtlosen Zugriff auf Ihr Netzwerk erlauben,
ohne dass das Netzwerkkennwort eingegeben werden muss.
Wenn Sie einem Client den Zugriff auf Ihr Netzwerk erlauben, werden Name und MACAdresse für die drahtlose Kommunikation (oder AirPort-ID) des Clients in der Zugriffsliste im AirPort-Dienstprogramm gespeichert, bis Sie den Client wieder aus der Liste
entfernen. Sie können auch eine 24-Stunden-Zugriffsberechtigung festlegen, sodass
der Client nach Ablauf dieser Zeit nicht mehr auf das Netzwerk zugreifen kann.
Wenn Sie den Zugriff auf Ihr drahtloses Netzwerk freigeben, muss der Client kein Netzwerkkennwort eingeben.26 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation
Gehen Sie wie folgt vor, um einem Client Zugriff auf Ihr Netzwerk ohne Eingabe
eines Netzwerkkennworts zu erlauben:
1 Öffnen Sie das AirPort-Dienstprogramm, wählen Sie Ihre Time Capsule-Basisstation aus
und wählen Sie dann „Manuelle Konfiguration“ aus dem Menü „Basisstation“ aus. Geben
Sie bei Bedarf das Kennwort ein.
2 Wählen Sie „Drahtlose Clients hinzufügen“ aus dem Menü „Basisstation“ aus.
3 Legen Sie fest, auf welche Weise die Clients auf das Netzwerk zugreifen dürfen:
 Wählen Sie „PIN“, damit eine vorgegebene achtstellige Nummer vor dem ClientZugriff eingegeben werden muss.
 Wählen Sie „Erster Versuch“, damit der erste Client, der versucht, auf das Netzwerk
zuzugreifen, die Netzwerkverbindung herstellen kann.
Während die Time Capsule darauf wartet, dass der Client die Verbindung zum Netzwerk herstellt, leuchtet die Statusanzeige blau.
Wählen Sie „Zugriff für Client auf 24 Stunden beschränken“, wenn Sie Ihr Netzwerk nur
einen Tag lang für den Zugriff durch andere freigeben wollen. Wird diese Option nicht
ausgewählt, kann der Client so lange auf das Netzwerk zugreifen, bis Sie ihn aus der
Zugriffsliste entfernen.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 27
Verwenden von Time Machine mit Ihrer Time CapsuleBasisstation
Mit Time Machine von Mac OS X Leopard können Sie Sicherungskopien aller Daten
auf Ihrem Computer anlegen, u. a. von Fotos, Musik, Filmen und Dokumenten.
Nachdem Sie Time Machine konfiguriert haben, wird in regelmäßigen Abständen
automatisch eine Datensicherung Ihres Computers ausgeführt.
Wenn Sie Mac OS X 10.5.2 (oder neuer) verwenden, werden Sie beim ersten Verbindungsaufbau zur Time Capsule-Basisstation von Time Machine gefragt, ob Sie die
Basisstation als Speicherort für Ihre Sicherungskopien verwenden möchten. Klicken
Sie auf „Als Backup-Volume verwenden“. Time Machine übernimmt dann alle weiteren
Schritte für Sie.
Verwenden Sie die Systemeinstellung „Time Machine“ von Mac OS X Leopard, um automatische Datensicherungen festzulegen, ein anderes Sicherungsvolume auszuwählen
oder sonstige Einstellungen anzupassen.
Gehen Sie wie folgt vor, um Time Machine auf einem Computer mit Mac OS X
Leopard zu konfigurieren oder anzupassen:
1 Wählen Sie „Apple“ > „Systemeinstellungen“ und klicken Sie dann auf „Time Machine“.
2 Stellen Sie den Schalter auf „Ein“.
3 Klicken Sie auf „Volume wechseln“.
4 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Für Backup
verwenden“.28 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation
Abhängig davon, wie viele Daten Sie sichern wollen, kann die erste Datensicherung
mit Time Capsule und Time Machine relativ lange dauern, etwa über Nacht oder sogar
länger. Zum Beschleunigen der ersten Datensicherung verbinden Sie die Time Capsule
über Ethernet mit Ihrem Computer. Bei allen folgenden Datensicherungen sichert
Time Machine nur die Dateien, die sich seit der letzten Sicherung geändert haben.
Daher dauern die folgenden Sicherung auch nicht mehr so lange.
Die Time Capsule ist eine hervorragende Sicherungslösung für Mobilcomputer. Da die
erste Datensicherung relativ lange dauern kann, sollten Sie das Netzteil an Ihren Mobilcomputer anschließen. Hierdurch wird Batteriestrom eingespart und zudem ist sichergestellt, dass die Datensicherung nicht unterbrochen wird. Ferner empfiehlt es sich,
den Mobilcomputer im selben Raum wie die Time Capsule zu platzieren, um eine
optimale drahtlose Kommunikation zu gewährleisten.
Wenn Sie Ihren Mac während einer Datensicherung ausschalten oder den Ruhezustand
aktivieren, stoppt Time Machine die Sicherung und setzt sie nach dem Einschalten des
Mac oder Beenden des Ruhezustands an der Stelle fort, an der sie unterbrochen wurde.
Weitere Informationen zu Time Machine erhalten Sie, indem Sie auf einem Computer
mit Mac OS X Leopard „Hilfe“ > „Mac-Hilfe“ aus dem Menü „Finder“ auswählen und dann
den Begriff „Time Machine“ in das Suchfeld eingeben.3
29
3 Tipps zur Fehlerbeseitigung
Anhand der Tipps in diesem Kapitel können Sie die meisten
Probleme mit Ihrer Time Capsule-Basisstation schnell beheben.
Sie können keine Verbindung zum Internet herstellen
 Versuchen Sie, von Ihrem Computer direkt eine Verbindung zum Internet herzustellen.
Ist dies nicht möglich, überprüfen Sie, ob Ihre Netzwerkeinstellungen korrekt sind.
Wenn die Netzwerkeinstellungen Ihrer Meinung nach korrekt sind und dennoch keine
Verbindung aufgebaut wird, wenden Sie sich an Ihren Internetanbieter (ISP).
 Vergewissern Sie sich, dass Sie die Verbindung zum korrekten Netzwerk herstellen.
Sie haben Ihr Netzwerk- oder Time Capsule-Kennwort
vergessen
Sie können das Kennwort für das AirPort-Netzwerk oder für die Time CapsuleBasisstation löschen, indem Sie die Time Capsule-Basisstation zurücksetzen.
Gehen Sie wie folgt vor, um das Time Capsule-Kennwort zurückzusetzen:
1 Drücken Sie mit einem spitzen Gegenstand (etwa einem Kugelschreiber) auf die
Reset-Taste und halten Sie die Taste ca. eine (1) Sekunde gedrückt.
Wichtig: Wenn Sie die Reset-Taste länger als eine Sekunde gedrückt halten, gehen Ihre
Netzwerkeinstellungen möglicherweise verloren.30 Kapitel 3 Tipps zur Fehlerbeseitigung
2 Wählen Sie Ihr AirPort-Netzwerk aus.
 Verwenden Sie auf einem Macintosh-Computer das AirPort-Symbol in der Menüleiste,
um das von Time Capsule eingerichtete Netzwerk auszuwählen. (Der Netzwerkname
ändert sich nicht.)
 Bewegen Sie auf einem Computer mit Windows XP den Mauszeiger auf das Symbol für
die drahtlose Verbindung und warten Sie, bis der Name des AirPort-Netzwerks (SSID)
angezeigt wird. Wählen Sie diesen aus der Liste aus, wenn mehrere Netzwerke verfügbar sind.
3 Öffnen Sie das AirPort-Dienstprogramm (das auf einem Macintosh-Computer im Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“ oder auf einem Computer
mit Windows XP unter „Start“ > „Programme“ > „AirPort“ befindet).
4 Wählen Sie Ihre Time Capsule-Basisstation aus und wählen Sie dann „Manuelle Konfiguration“ aus dem Menü „Basisstation“ aus.
5 Klicken Sie in der Symbolleiste auf „AirPort“ und klicken Sie dann auf „Basisstation“.
6 Geben Sie ein neues Kennwort für Ihre Time Capsule-Basisstation ein.
7 Klicken Sie auf „Drahtlos“ und wählen Sie eine Verschlüsselungsmethode aus dem
Einblendmenü „Schutz“ aus, um die Verschlüsselung und den Kennwortschutz für Ihr
AirPort-Netzwerk zu aktivieren. Wenn Sie die Verschlüsselung aktiviert haben, geben
Sie ein neues Kennwort für Ihr AirPort-Netzwerk ein.
8 Klicken Sie auf „Aktualisieren“, um die Time Capsule-Basisstation neu zu starten und die
neuen Einstellungen zu laden.Kapitel 3 Tipps zur Fehlerbeseitigung 31
Ihre Time Capsule-Basisstation reagiert nicht
Trennen Sie die Basisstation vom Stromnetz und schließen Sie sie dann wieder an das
Stromnetz an.
Wenn Ihre Time Capsule-Basisstation gar nicht mehr reagiert, müssen Sie sie möglicherweise auf die Werkseinstellungen zurücksetzen.
Wichtig: Durch das Zurücksetzen Ihrer Time Capsule, werden alle aktuellen Einstellungen gelöscht und die Originaleinstellungen der Time Capsule-Basisstation
wiederhergestellt.
Gehen Sie wie folgt vor, um die Werkseinstellungen der Time Capsule-Basisstation
wiederherzustellen:
m Drücken Sie mit einem spitzen Gegenstand (etwa einem Kugelschreiber) auf die ResetTaste und halten Sie die Taste gedrückt, bis die Statusanzeige rasch hintereinander
blinkt (etwa 5 Sekunden).
Ihre Time Capsule-Basisstation wird auf die folgenden Einstellungen zurückgesetzt:
 Die Time Capsule-Basisstation empfängt die IP-Adresse über DHCP.
 Der Netzwerkname wird auf „Apple Network XXXXXX“ zurückgesetzt (wobei XXXXXX
durch die letzten sechs Stellen der AirPort-ID ersetzt wird).
 Das Time Capsule-Kennwort wird auf public zurückgesetzt.
Reagiert die Time Capsule-Basisstation auch weiterhin nicht, versuchen Sie
Folgendes:
1 Trennen Sie die Time Capsule-Basisstation vom Stromnetz.
2 Drücken Sie mit einem spitzen Gegenstand auf die Reset-Taste und halten Sie die Taste
gedrückt, während Sie die Time Capsule-Basisstation mit dem Stromnetz verbinden.32 Kapitel 3 Tipps zur Fehlerbeseitigung
Die Statusanzeige der Time Capsule-Basisstation blinkt gelb
Möglicherweise ist das Ethernetkabel nicht korrekt angeschlossen, die Time CapsuleBasisstation befindet sich nicht in Reichweite eines AirPort-Netzwerks oder es besteht
ein Problem bei Ihrem Internetanbieter. Wenn Sie über ein DSL- oder Kabelmodem mit
dem Internet verbunden sind, wurde die Verbindung des Modems mit dem Netzwerk
oder dem Internet möglicherweise unterbrochen. Trennen Sie das Modem vom Stromnetz, auch wenn es korrekt zu arbeiten scheint. Warten Sie einige Sekunden und schlie-
ßen Sie es dann erneut an. Vergewissern Sie sich, dass die Time Capsule-Basisstation via
Ethernet direkt mit dem Modem verbunden ist, bevor Sie die Stromversorgung des
Modems wiederherstellen.
Weitere Informationen zu den Gründen für das Blinken der Statusanzeige erhalten Sie,
indem Sie das AirPort-Dienstprogramm öffnen, Ihre Time Capsule-Basisstation auswählen und dann „Manuelle Konfiguration“ aus dem Menü „Basisstation“ auswählen.
Klicken Sie auf „Basisstation-Status“, um Informationen über die blinkende Statusanzeige einzublenden.
Sie können auch die Option „Basisstation überwachen – Probleme melden“ in den
AirPort-Einstellungen auswählen. Tritt an der Basisstation ein Problem auf, wird das
AirPort-Dienstprogramm geöffnet und zeigt ausführliche Anleitungen zur Fehlerbeseitigung an.Kapitel 3 Tipps zur Fehlerbeseitigung 33
Ihr Drucker reagiert nicht
Wenn Sie einen Drucker an den USB-Anschluss der Time Capsule-Basisstation angeschlossen haben und die Computer im AirPort-Netzwerk nicht drucken können, versuchen Sie, das Problem wie folgt zu beheben:
1 Vergewissern Sie sich, dass der Drucker am Stromnetz angeschlossen und eingeschaltet ist.
2 Vergewissern Sie sich, dass die Kabel korrekt am Drucker und am USB-Anschluss
der Time Capsule-Basisstation angeschlossen sind.
3 Vergewissern Sie sich, dass der Drucker im Wartelistenfenster auf den ClientComputern ausgewählt ist.
Macintosh-Computer mit Mac OS X 10.5 oder neuer:
 Wählen Sie „Apple“ > „Systemeinstellungen“ und klicken Sie dann auf
„Drucken & Faxen“.
 Klicken Sie auf „Hinzufügen“ (+) und wählen Sie Ihren Drucker aus der Liste aus.
Klicken Sie dann auf die Taste „Hinzufügen“.
Macintosh-Computer mit Mac OS X 10.2.7 oder neuer:
 Öffnen Sie das Drucker-Dienstprogramm (im Ordner „Dienstprogramme“ innerhalb
des Ordners „Programme“).
 Klicken Sie auf „Hinzufügen“, wenn der Drucker nicht in der Liste angezeigt wird.
 Wählen Sie „Bonjour“ aus dem Einblendmenü aus. Wählen Sie den Drucker aus und
klicken Sie auf „Hinzufügen“ (+).34 Kapitel 3 Tipps zur Fehlerbeseitigung
Computer mit Windows XP:
 Wählen Sie „Einstellungen“ > „Drucker und Faxgeräte“ aus dem Menü „Start“.
 Wählen Sie den Drucker aus. Ist der Drucker nicht in der Liste enthalten, klicken Sie
auf „Drucker hinzufügen“ und folgen Sie den Anweisungen auf dem Bildschirm.
4 Schalten Sie den Drucker aus, warten Sie einige Sekunden und schalten Sie den
Drucker dann erneut ein.
Aktualisieren der AirPort-Software
Die AirPort-Software wird von Apple regelmäßig aktualisiert. Es wird empfohlen,
die Time Capsule-Basisstation regelmäßig zu aktualisieren, damit sie immer mit
der neusten Software arbeitet.
Sie können das Feld „Beim Öffnen des AirPort-Dienstprogramms nach Updates suchen“
oder „Nach Updates suchen“ in den AirPort-Einstellungen markieren. Wenn Sie das Feld
„Nach Updates suchen“ markieren, wählen Sie ein Zeitintervall wie „wöchentlich“ aus
dem Einblendmenü aus, damit automatisch nach Aktualisierungen gesucht wird.Kapitel 3 Tipps zur Fehlerbeseitigung 35
Überlegungen zur Platzierung der Time Capsule-Basisstation
Die folgenden Empfehlungen sollen Ihnen helfen, die maximale Reichweite und eine
optimale Netzwerkabdeckung mit Time Capsule zu erreichen.
 Platzieren Sie Ihre Time Capsule-Basisstation in einem offenen Bereich, in dem keine
Hindernisse wie Möbel oder Wände die Signalübertragung stören können. Das Gerät
sollte wenn möglich nicht in der Nähe von Metallflächen platziert werden.
 Wenn Sie die Time Capsule-Basisstation hinter Möbelstücken platzieren, halten Sie
einen Abstand von mindestens 2,5 cm zwischen der Time Capsule-Basisstation und
dem Möbelstück ein.
 Vermeiden Sie es, Ihre Time Capsule-Basisstation an einem Standort zu platzieren, der
auf drei oder mehr Seiten von Metallflächen umgeben ist.
 Wenn Sie die Time Capsule-Basisstation zusammen mit Ihrer Stereoanlage als
Multimedia-Center nutzen wollen, achten Sie darauf, dass die Time Capsule-Basisstation nicht von Audio-, Video- oder Netzkabeln umgeben ist. Positionieren Sie Ihre
Time Capsule-Basisstation so, dass die Kabel nur auf einer Seite liegen. Halten Sie
einen möglichst großen Abstand zwischen der Time Capsule-Basisstation und den
Kabeln ein.
 Platzieren Sie Ihre Time Capsule-Basisstation wenn möglich mindestens 7,6 Meter
entfernt von einem Mikrowellenherd, einem schnurlosen 2,4- oder 5-GHz-Telefon
oder anderen Störquellen.
 Platzieren Sie oben auf der Time Capsule keine anderen Objekte (Bücher, Papiere,
kleine Tiere etc.). Diese können die Kühlung der Time Capsule beeinträchtigen.36 Kapitel 3 Tipps zur Fehlerbeseitigung
Mögliche Störquellen, die Interferenzen mit AirPort
verursachen können
Je weiter eine Interferenzquelle entfernt ist, desto unwahrscheinlicher ist es, dass sie
Probleme verursacht. Folgende Komponenten bzw. Vorkommnisse können Störungen
mit der AirPort-Kommunikation verursachen:
 Mikrowellenherde
 DSS- (Direct Satellite Service) Funkfrequenzverlust
 Original-Koaxialkabel, das mit bestimmten Typen von Satellitenschüsseln geliefert
wird. Erkundigen Sie sich beim Hersteller des Geräts nach neueren Kabeln.
 Bestimmte elektrische Komponenten wie Stromleitungen, Leitungen von elektrischen Bahnen und Kraftwerke
 Schnurlose Telefone, die im 2,4- oder 5-GHz-Bereich arbeiten. Wenn es zu Problemen
mit Ihrer Telefon- oder AirPort-Kommunikation kommt, wechseln Sie den Kanal Ihrer
Basisstation bzw. Ihres Time Capsule-Netzwerks oder verwenden Sie einen anderen
Kanal für Ihr Telefon.
 Nebeneinander platzierte Basisstationen, die benachbarte Kanäle verwenden.
Verwendet beispielsweise Basisstation A Kanal 1, so sollte für Basisstation B
Kanal 6 oder 11 angegeben werden.4
37
4 Weitere Informationen,
Service und Support
Im Internet und in der Online-Hilfe finden Sie weitere Informationen zur Verwendung der Time Capsule-Basisstation.
Online verfügbare Ressourcen
Die neusten Informationen zu Time Capsule finden Sie unter:
www.apple.com/de/airport.
Wenn Sie die Time Capsule-Basisstation nicht bereits bei der Installation der Software
von der Time Capsule-CD registriert haben, besuchen Sie zum Registrieren die
folgende Website: www.apple.com/de/register.
AirPort-Support-Informationen, Foren mit produktspezifischen Informationen und
Feedback sowie die neuste Apple-Software zum Laden finden Sie unter dieser
Adresse: www.apple.com/de/support/airport.
Wenn Sie allgemeine Support-Informationen wünschen, besuchen Sie die Website
www.apple.com/de/support und wählen Sie dann ggf. Ihr Land aus.38 Kapitel 4 Weitere Informationen, Service und Support
Online-Hilfe
Wenn Sie mehr über die Verwendung des AirPort-Dienstprogramms mit Time Capsule
erfahren möchten, öffnen Sie das AirPort-Diensprogramm und wählen Sie „Hilfe“ >
„AirPort-Dienstprogramm-Hilfe“.
Hinweise zur Garantie
Wenn die Time Capsule-Basisstation beschädigt wurde oder nicht ordnungsgemäß
funktioniert, beachten Sie bitte zunächst die Tipps und Informationen zur Fehlerbeseitigung in diesem Handbuch, in der Online-Hilfe sowie in den Online-Ressourcen.
Funktioniert die Time Capsule-Basisstation auch weiterhin nicht, informieren Sie
sich auf der Webseite www.apple.com/de/support über die Inanspruchnahme
von Garantieleistungen.
Seriennummer Ihrer Time Capsule-Basisstation
Die Seriennummer befindet sich auf der Unterseite Ihrer Time Capsule-Basisstation.39
Anhang
Time Capsule – Technische Daten
und Sicherheitsinformationen
Spezifikationen der Time Capsule-Basisstation
 Frequenzbereich: 2,4 und 5 GHz
 Funkausgangsleistung: bis zu 23 dBm (nominal)
 Standards: Der Standard 802.11 DSSS mit 1 und 2 MBit/Sek., die Standards 802.11a,
802.11b, 802.11g und eine Entwurfsversion der 802.11n-Spezifikation
Schnittstellen
 1 RJ-45 10/100/1000BASE-T Gigabit Ethernet-WAN (<)
 3 RJ-45 10/100/1000BASE-T Gigabit Ethernet-LAN (G)
 Universal Serial Bus (USB d) 2.0
 802.11 a/b/g/n AirPort Extreme-Funktechnologie
Umgebungsbedingungen
 Betriebstemperatur: 0 °C bis 35 °C
 Lagertemperatur: –25 °C bis 60 °C
 Relative Luftfeuchtigkeit (Betrieb): 20 % bis 80 %, nicht kondensierend
 Relative Luftfeuchtigkeit (Lagerung): 10 % bis 90 %, nicht kondensierend40 Anhang Time Capsule – Technische Daten und Sicherheitsinformationen
Abmessungen und Gewicht
 Länge: 197,0 mm
 Breite: 197,0 mm
 Höhe: 36,33 mm
 Gewicht: 1,6 Kilogramm
Hardware-MAC-Adressen (Media Access Control)
Auf der Unterseite des Gehäuses der Time Capsule-Basisstation sind drei Hardwareadressen aufgedruckt:
 AirPort-ID: Die zwei Adressen, die zur Identifizierung der Time Capsule-Basisstation in
einem drahtlosen Netzwerk verwendet werden.
 Ethernet-ID: Diese Adresse wird möglicherweise von Ihrem Internetanbieter benötigt,
um den Internetzugang über die Time Capsule-Basisstation herzustellen.
Sicherer Umgang mit der Time Capsule-Basisstation
 Die einzige Möglichkeit, die Stromzufuhr vollständig zu unterbrechen, besteht darin,
die Time Capsule-Basisstation vom Stromnetz zu trennen.
 Halten Sie den Stecker stets an den Seiten, wenn Sie die Time Capsule-Basisstation an
die Netzsteckdose anschließen bzw. davon trennen. Achten Sie darauf, die Metallstifte des Steckers nicht zu berühren.
 Die Time Capsule-Basisstation darf niemals geöffnet werden, auch dann nicht,
wenn sie nicht am Stromnetz angeschlossen ist. Wenn Ihre Time Capsule-Basisstation gewartet werden muss, lesen Sie Kapitel 4 „Weitere Informationen,
Service und Support“ auf Seite 37. Anhang Time Capsule – Technische Daten und Sicherheitsinformationen 41
 Versuchen Sie niemals, einen Stecker mit Gewalt in einen Anschluss zu stecken.
Lässt sich der Stecker nicht problemlos anschließen, passt er vermutlich nicht in den
Anschluss. Vergewissern Sie sich, dass Stecker und Anschluss übereinstimmen und
dass Sie den Stecker korrekt mit dem Anschluss ausgerichtet haben.
Hinweise zu Betriebs- und Lagertemperatur
 Wenn Ihre Time Capsule-Basisstation in Betrieb ist, wird das Gehäuse warm. Das
Time Capsule-Gehäuse fungiert als Wärmeableiter, der die Wärme aus dem Inneren
des Geräts nach außen an die kühlere Luft abgibt.
Meiden von Feuchtigkeitsquellen
 Platzieren Sie die Time Capsule-Basisstation nicht in der Nähe von Getränken, Waschbecken, Badewannen, Duschen und anderen Feuchtigkeitsquellen.
 Schützen Sie die Time Capsule-Basisstation vor direkter Sonneneinstrahlung, Nässe,
Feuchtigkeit und Witterungseinflüssen aller Art.
 Achten Sie darauf, dass keine Flüssigkeiten in Ihre Time Capsule-Basisstation gelangen. Ist dies dennoch einmal der Fall, trennen Sie die das Gerät vom Stromnetz,
bevor Sie es reinigen.
 Verwenden Sie die Time Capsule-Basisstation nicht im Freien. Die Time CapsuleBasisstation ist zur Verwendung in Innenräumen konzipiert.
ACHTUNG: Verwenden Sie Ihre Time Capsule-Basisstation niemals in der Nähe von
Feuchtigkeitsquellen, um Kurzschlüsse oder Verletzungen zu vermeiden.42 Anhang Time Capsule – Technische Daten und Sicherheitsinformationen
Nehmen Sie Reparaturen nicht selbst vor
Hinweise zur Handhabung
Ihre Time Capsule-Basisstation kann durch unsachgemäße Handhabung oder Lagerung beschädigt werden. Achten Sie darauf, die Time Capsule-Basisstation beim Transport nicht fallen zu lassen.
ACHTUNG: Versuchen Sie nicht, Ihre Time Capsule-Basisstation zu öffnen oder Teile
auszubauen. Dies kann einen Kurzschluss verursachen und Sie riskieren den Verlust
des Garantieanspruchs. Im Innern des Gerätes befinden sich keine Komponenten, die
vom Benutzer gewartet werden können.43
Regulatory Compliance Information
Wireless Radio Use
This device is restricted to indoor use due to its
operation in the 5.15 to 5.25 GHz frequency range to
reduce the potential for harmful interference to cochannel Mobile Satellite systems.
Cet appareil doit être utilisé à l’intérieur.
Exposure to Radio Frequency Energy
The radiated output power of this device is well below
the FCC and EU radio frequency exposure limits.
However, this device should be operated with a
minimum distance of at least 20 cm between its
antennas and a person’s body and the antennas used
with this transmitter must not be colocated or operated
in conjunction with any other antenna or transmitter
subject to the conditions of the FCC Grant.
FCC Declaration of Conformity
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions:(1)
This device may not cause harmful interference, and (2)
this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio or
television reception is suspected.
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference to
radio or television reception, try to correct the
interference by using one or more of the following
measures:
 Turn the television or radio antenna until the
interference stops.
 Move the computer to one side or the other of the
television or radio.
 Move the computer farther away from the television or
radio.
 Plug the computer into an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are on
circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product. Or,
consult an experienced radio/television technician for
additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc. could void the EMC
compliance and negate your authority to operate the
product.44
This product was tested for FCC compliance under
conditions that included the use of Apple peripheral
devices and Apple shielded cables and connectors
between system components. It is important that you
use Apple peripheral devices and shielded cables and
connectors between system components to reduce the
possibility of causing interference to radios, television
sets, and other electronic devices. You can obtain Apple
peripheral devices and the proper shielded cables and
connectors through an Apple-authorized dealer. For
non-Apple peripheral devices, contact the manufacturer
or dealer for assistance.
Responsible party (contact for FCC matters only)
Apple Inc., Corporate Compliance, 1 Infinite Loop M/S 26-A,
Cupertino, CA 95014-2084
Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de la Class B respecte toutes les
exigences du Règlement sur le matériel brouilleur du
Canada.
VCCI Class B Statement
Europe—EU Declaration of Conformity
For more information, see www.apple.com/euro/
compliance.
Europäische Union – Informationen zur
Entsorgung
Dieses Symbol weist darauf hin, dass dieses Produkt entsprechend den geltenden gesetzlichen Vorschriften und
getrennt vom Hausmüll entsorgt werden muss. Geben
Sie dieses Produkt zur Entsorgung bei einer offiziellen
Sammelstelle ab. Bei einigen Sammelstellen können
Produkte zur Entsorgung unentgeltlich abgegeben
werden. Durch getrenntes Sammeln und Recycling
werden die Rohstoff-Reserven geschont, und es ist
sichergestellt, dass beim Recycling des Produkts alle
Bestimmungen zum Schutz von Gesundheit und
Umwelt eingehalten werden.
Hinweise zur Entsorgung und zum Recycling
Dieses Produkt besitzt eine interne Batterie. Bitte entsorgen Sie die Batterie entsprechend den geltenden gesetzlichen und umweltrechtlichen Vorschriften. Informationen über das Recycling-Programm von Apple finden
Sie auf der Website: www.apple.com/de/environment.
California: The coin cell battery in your product
contains perchlorates. Special handling and disposal
may apply. Refer to www.dtsc.ca.gov/hazardouswaste/
perchlorate.45
Deutschland: Dieses Gerät enthält Batterien. Bitte nicht
in den Hausmüll werfen. Entsorgen Sie dieses Gerät am
Ende seines Lebenszyklus den maßgeblichen gesetzlichen Regelungen entsprechend.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca) worden
gedeponeerd.
Taiwan:
Singapore Wireless Certification46
Taiwan Warning Statements
Korea Warning Statements
© 2009 Apple Inc. Alle Rechte vorbehalten.
Apple, das Apple-Logo, AirPort, AirPort Express, AirPort
Extreme, Apple TV, Bonjour, iPod, Leopard, Macintosh,
Mac OS und Time Capsule sind Marken der Apple Inc.,
die in den USA und weiteren Ländern eingetragen sind.
Finder, iPhone und Time Machine sind Marken der
Apple Inc.
Andere hier genannte Produkt- und Herstellernamen
sind Marken ihrer jeweiligen Rechtsinhaber.www.apple.com/airport
www.apple.com/support/airport
D019-1384-A
Mac OS X Server
Administration de QuickTime
Streaming et Broadcasting
Pour Leopard version 10.5K Apple Inc.
© 2007 Apple Inc. Tous droits réservés.
Le propriétaire ou l’utilisateur autorisé d’une copie valide
du logiciel Serveur Enchaînement QuickTime peut reproduire cette publication à des fins d’apprentissage de l’utilisation de ce logiciel. Aucune partie de cette publication
ne peut être reproduite ou transmise à des fins commerciales, telles que la vente de copies ou la fourniture de
services d’assistance payants.
Tous les efforts ont été déployés pour garantir la précision des informations contenues dans ce manuel.
Apple, Inc. n’est pas responsable des erreurs d’impression ou de frappe.
Le logo Apple est une marque d’Apple Inc. déposée
aux États-Unis et dans d’autres pays. L’utilisation de
ce logo à des fins commerciales via le clavier (Option + 1)
pourra constituer un acte de contrefaçon et/ou de
concurrence déloyale.
Apple, le logo Apple, AirPort, AppleScript, FireWire, iMac,
iMovie, iTunes, Mac, le logo Mac, Macintosh, Mac OS,
QuickTime, Xgrid et Xserve sont des marques d’Apple
Inc., déposées aux États-Unis et dans d’autres pays.
Finder est une marque d’Apple Inc.
Adobe et PostScript sont des marques d’Adobe Systems
Incorporated.
Tous les autres noms de produits sont des marques
de leurs propriétaires respectifs. Les produits commercialisés par des entreprises tierces ne sont mentionnés
qu’à titre d’information, sans aucune intention de préconisation ni de recommandation. Apple ne se porte pas
garant de ces produits et décline toute responsabilité
quant à leur fonctionnement.
F019-0930/01-09-2007 3
1 Table des matières
Préface 7 À propos de ce guide
7 Nouveautés de QTSS (QuickTime Streaming Server) pour Mac OS X Server 10.5
9 La suite de produits QuickTime
9 Contenu de ce guide
10 Utilisation de l’aide à l’écran
11 Guides d’administration de Mac OS X Server
12 Affichage des guides PDF à l’écran
12 Impression de guides PDF
13 Obtention de mises à jour de documentation
13 Obtention d’informations supplémentaires
Chapitre 1 15 Vue d’ensemble de QuickTime Streaming
15 Qu’est-ce que la diffusion en continu ?
16 Comparaison entre diffusion en direct et diffusion à la demande
16 Comparaison entre le téléchargement progressif (HTTP) et le téléchargement par
enchaînement (RTP/RTSP)
17 Enchaînement Lecture instantanée
17 Configuration simplifiée pour la vidéo en direct
18 Comment recevoir des flux de données multimédias
19 Comparaison entre multidiffusion et monodiffusion
20 Relais
Chapitre 2 21 Configuration de votre serveur Enchaînement QuickTime
21 Configurations matérielle et logicielle requises pour l’enchaînement QuickTime
21 Configuration requise pour l’ordinateur de visualisation
21 Configuration requise pour la diffusion en direct
22 Considérations relatives à la bande passante
22 Configuration de votre serveur de diffusion
23 Test de votre configuration
24 Accès aux données multimédia diffusées par votre serveur
Chapitre 3 25 Gestion de votre serveur Enchaînement QuickTime
25 Utilisation de l’application basée sur le Web pour gérer l’enchaînement QuickTime
26 Utilisation d’Admin Serveur pour gérer l’enchaînement QuickTime4 Table des matières
26 Démarrage ou arrêt du service de diffusion
26 Modification du nombre maximum de connexions de diffusion
27 Modification du débit de diffusion maximum
27 Changement du répertoire réservé aux flux de données multimédias
27 Association de l’ordinateur d’administration du serveur de diffusion à une adresse IP
28 Hébergement de flux provenant de plusieurs répertoires multimédia utilisateur
28 Configuration de flux de relais
29 Modification des réglages d’historique de diffusion QuickTime
30 Lecture des historiques de diffusion QuickTime
30 Sécurité et accès
31 Diffusion de flux à travers des coupe-feu via le port 80
32 Diffusion à travers des coupe-feu ou des réseaux avec traduction d’adresses
32 Changement du mot de passe requis pour envoyer un flux de diffusion MP3
32 Utilisation de la monodiffusion automatique (Annonce) à l’aide de QTSS sur un
ordinateur distinct
33 Tâches de gestion avancées
33 Contrôle de l’accès aux flux de données multimédias
37 Configuration d’un relais multidiffusion
Chapitre 4 39 Dépannage et informations techniques
39 Utilisation de fichiers d’historique pour surveiller la diffusion de listes de lecture
39 Les fichiers multimédia ne sont pas diffusés correctement
40 Les utilisateurs ne peuvent pas se connecter à votre diffusion
40 Les utilisateurs reçoivent des messages d’erreur lors de la diffusion de données
Chapitre 5 43 Utilisation de QuickTime Broadcaster
43 Quand utiliser un serveur de diffusion
44 Configuration de votre premier flux
44 Configuration de QuickTime Broadcaster
46 Choix d’une méthode de diffusion
46 Sélection des réglages de compression
47 Création de préréglages
47 Qu’est-ce qu’un fichier SDP ?
48 Sélection des réglages réseau
48 Utilisation de la méthode Monodiffusion automatique (Annonce)
49 Utilisation de la méthode Monodiffusion manuelle
49 Utilisation de la méthode Multidiffusion
50 Aperçu de votre diffusion
51 Configuration d’une diffusion audio uniquement
51 Changement de source audio
52 Ajout de notes à votre diffusion
52 Ajout d’indices à un fichier de séquence
53 Enregistrement de réglages à l’aide de préréglagesTable des matières 5
53 Modification de la taille de l’image de diffusion
53 Changement de source vidéo
54 Choix de l’assembleur de paquets
54 Enregistrement de réglages de diffusion
55 Diffusion vers des téléphones portables
55 À propos des coupe-feu
55 Limitation de l’accès à votre diffusion
56 Conseils et dépannage
56 Je suis invité à saisir un mot de passe
56 Utilisation optimisée de la bande passante disponible
56 Conseils pour le choix des réglages de compression vidéo
57 Conseils pour le choix des réglages de compression audio
57 Si la vidéo devient floue, hachée ou figée
58 Automatisation de QuickTime Broadcaster avec AppleScript
Chapitre 6 59 Exemple de configuration
59 Enchaînement de présentations, en direct et à la demande
61 Configuration
69 Création d’une page Web pour simplifier l’accès
70 Prise de vue de la présentation en direct
71 Archivage de la présentation en direct
Glossaire 73
Index 81 7
Préface
À propos de ce guide
Découvrez la suite de produits QuickTime ainsi que les
nouveautés de cette version de QuickTime Streaming Server.
La suite de services de Mac OS X Server 10.5 inclut QuickTime Streaming Server (QTSS).
QTSS est préinstallé sur le matériel serveur Apple.
En termes de conception et de configuration, QTSS est semblable à Apache, le logiciel
serveur Web populaire également inclus avec Mac OS X Server. Si vous êtes expérimenté dans l’utilisation d’Apache, QTSS vous semblera familier.
Si vous avez administré un serveur de diffusion QuickTime à l’aide d’Admin Web, une
application basée sur le Web, vous pouvez poursuivre de cette manière. Admin Web
est utile pour administrer un serveur de diffusion à distance ou depuis des ordinateurs
non Macintosh. Pour plus d’informations, consultez la section « Utilisation de l’application
basée sur le Web pour gérer l’enchaînement QuickTime » à la page 25. Admin Serveur
pour Mac OS X Server inclut des options permettant d’effectuer les opérations que vous
réalisiez avec Admin Web.
Nouveautés de QTSS (QuickTime Streaming Server)
pour Mac OS X Server 10.5
Intégré à Mac OS X Server 10.5, QuickTime Streaming Server 6 est le serveur de diffusion Apple normalisé le plus puissant du marché et dont la diffusion mobile, l’intégration avec Mac OS X Server et la prise en charge des standards ont été améliorées.
QTSS 6 offre les améliorations suivantes :
 Prise en charge de la norme 3GPP version 6 : QuickTime Streaming Server 6 a été
mis à jour pour inclure la prise en charge de la dernière version de la spécification
3GPP (version 6), offrant une meilleure compatibilité avec les appareils mobiles
du monde entier.
 Adaptation au débit de la norme 3GPP version 6 : QuickTime Streaming Server 6
permet la prise en charge de l’adaptation au débit 3GPP version 6 pour une expé-
rience de diffusion en continu plus fluide sur les appareils mobiles, même lors
de surcharges de réseau. 8 Préface À propos de ce guide
 Prise en charge Open Directory : QuickTime Streaming Server 6 vous permet
de limiter l’accès au contenu diffusé en continu aux utilisateurs et groupes enregistrés dans le Gestionnaire de groupe de travail de Mac OS X Server.
 Exécution à 64 bits : QuickTime Streaming Server 6 prend en charge l’exécution
à 64 bits en natif.
Les autres fonctionnalités de QTSS sont les suivantes :
 3GPP natif : diffusez des fichiers 3GPP vers tout lecteur compatible avec le format 3GPP.
 Diffusion de MPEG-4 natif : diffusez des fichiers MPEG-4 à indices conformes à la norme
ISO vers tout lecteur ou périphérique MPEG-4 également conforme à la norme ISO.
 Diffusion de fichiers audio MP3 : créez votre station de radio sur Internet. Vous pouvez distribuer des fichiers MP3 standard à l’aide de protocoles compatibles Icecast via
HTTP. Créez une liste de lecture de fichiers MP3 et distribuez-les vers des clients MP3
tels qu’iTunes et WinAmp pour une expérience de direct simulé.
 Protection contre les coupures : la technologie Apple de protection contre les coupures, un ensemble de fonctionnalités offrant une qualité de service, utilise la bande passante disponible pour garantir la lecture la plus nette possible.
 Lecture instantanée : les utilisateurs dotés d’une connexion haut débit et qui visualisent
un flux de données vidéo à l’aide de QuickTime 6 ou ultérieur bénéficient de la fonction
de lecture instantanée. Cette fonction améliore la mise des données en mémoire tampon en réduisant considérablement la durée de cette opération. La lecture instantanée
permet également aux utilisateurs équipés d’une connexion haut débit d’utiliser le curseur de durée pour faire défiler un flux de données à la demande en avant ou en arrière,
la lecture étant mise à jour instantanément.
 Authentification : l’authentification Digest et Basic, ainsi que l’authentification par
les services d’annuaire vous permettent de contrôler l’accès aux données multimé-
dia protégées.
 Prise en charge de la diffusion de films HD : QTSS est en mesure de diffuser simultanément des milliers de films encodés à 1280 x 720, 24p, 5 mbps à partir d’un seul
serveur Xserve.
 Prise en charge de la diffusion au format H.264 : QTSS prend en charge la diffusion
de contenu en direct et à la demande encodé avec le codec vidéo H.264, fourni avec
QuickTime.
 QuickTime Broadcaster : inclus dans Mac OS X Server, QuickTime Broadcaster fournit
une prise en charge intégrale de la diffusion de contenu au format MPEG-4 sur Internet.
 Listes de lecture côté serveur : vous pouvez diffuser un ensemble de fichiers multimédias comme s’il s’agissait d’une diffusion en direct. Cela peut s’avérer idéal pour
la création et la gestion d’une station de radio ou de télévision virtuelle.
 Prise en charge de relais : vous pouvez facilement configurer plusieurs couches
de serveurs afin de diffuser des flux de données vers un nombre quasi illimité de clients.Préface À propos de ce guide 9
La suite de produits QuickTime
La suite de produits QuickTime est unique en ce sens qu’elle inclut tous les logiciels
dont vous avez besoin pour produire, transmettre et recevoir des flux de données.
Chaque produit est entièrement conçu pour une compatibilité maximale avec tous
les autres composants de la suite.
La suite QuickTime est constituée des produits suivants :
 QuickTime Player : l’application gratuite QuickTime Player est simple à utiliser
et conçue pour lire, manipuler et visualiser des fichiers vidéo, audio, de réalité
virtuelle (VR) ou graphiques compatibles avec QuickTime.
 QuickTime Pro : la puissante version pro de QuickTime Player offre de nombreuses
fonctions de création multimédia. Vous pouvez capturer des séquences audio et vidéo,
créer des diaporamas, coder des séquences vidéo et audio, éditer des pistes de films,
créer des pistes d’indices, générer des présentations et regrouper des centaines
de types de données multimédias en un seul fichier de film.
 QTSS (QuickTime Streaming Server) : inclus avec Mac OS X Server, le logiciel QTSS
vous permet de diffuser, via Internet, des données multimédia en temps réel ou
à la demande à l’aide des protocoles standard du marché, sans avoir à payer de licence
par flux. Les utilisateurs voient les données dès qu’elles parviennent à l’ordinateur ;
ils n’ont pas à attendre le téléchargement des fichiers.
 Darwin Streaming Server : (DSS) cette version gratuite et open source de QTSS prend
en charge des plate-formes d’entreprise courantes telles que Linux, Windows Server
2003 et Solaris. Téléchargeable en code source, elle peut être compilée sur diverses
plates-formes en modifiant certains fichiers source spécifiques.
Contenu de ce guide
Le présent guide contient les chapitres suivants :
 Le chapitre 1, « Vue d’ensemble de QuickTime Streaming » décrit les concepts
et les termes propres à la diffusion en continu.
 Le chapitre 2, « Configuration de votre serveur Enchaînement QuickTime » décrit
le matériel et les logiciels requis et fournit des instructions pour configurer et tester
votre serveur de diffusion.
 Le chapitre 3, « Gestion de votre serveur Enchaînement QuickTime » fournit des
instructions pas à pas pour utiliser l’application Admin Serveur en vue d’administrer
et de contrôler un serveur de diffusion localement ou à distance.
 Le chapitre 4, « Dépannage et informations techniques » décrit les problèmes courants
et apporte des informations sur la marche à suivre en cas d’incidents lors de la diffusion
de données multimédias.
 Le chapitre 5, « Utilisation de QuickTime Broadcaster » fournit des informations
sur l’utilisation du logiciel Apple maintes fois récompensé pour la diffusion professionnelle d’événements en direct.10 Préface À propos de ce guide
 Le chapitre 6, « Exemple de configuration » fournit des informations sur les composants clés nécessaires à la configuration de la diffusion générique sur le web.
De plus, le glossaire propose de brèves définitions des termes utilisés dans QuickTime
Streaming et dans ce guide.
Remarque : étant donné qu’Apple publie régulièrement de nouvelles versions et mises
à jour de ses logiciels, les illustrations de ce document peuvent être différentes de celles
qui s’affichent à l’écran.
Utilisation de l’aide à l’écran
Vous pouvez obtenir des instructions à l’écran concernant chaque tâche dans l’application Visualisation Aide pour gérer Leopard Server. Vous pouvez visualiser l’aide sur un serveur ou sur un ordinateur administrateur. (Un ordinateur administrateur est un ordinateur
Mac OS X sur lequel est installé le logiciel d’administration de serveur Leopard Server.)
Pour obtenir de l’aide pour une configuration avancée de Leopard Server :
m Ouvrez Admin Serveur ou le Gestionnaire de groupe de travail, puis :
 Utilisez le menu Aide pour rechercher la tâche que vous voulez exécuter.
 Choisissez Aide > Aide Admin Serveur ou Aide > Aide Gestionnaire de groupe
de travail pour parcourir et rechercher des rubriques d’aide.
L’aide à l’écran contient des instructions extraites de Administration du serveur et d’autres
guides d’administration avancée cités dans « Guides d’administration de Mac OS X Server ».
Pour consulter les rubriques d’aide du serveur les plus récentes :
m Assurez-vous que le serveur ou l’ordinateur serveur est connecté à Internet lorsque
vous voulez obtenir de l’aide.
Visualisation Aide extrait et met en cache automatiquement les rubriques d’aide
les plus récentes concernant le serveur. Lorsque vous n’êtes pas connecté à Internet,
Visualisation Aide affiche les rubriques d’aide mises en cache.Préface À propos de ce guide 11
Guides d’administration de Mac OS X Server
Premiers contacts couvre l’installation et le paramétrage de configurations standard et de
groupes de travail de Mac OS X Server. Pour des configurations avancées, Administration
du serveur couvre la planification, l’installation, la configuration et l’administration
serveur en général. Une série de guides supplémentaires, énumérés ci-dessous,
couvre la planification, la configuration et la gestion avancées de chaque service.
Vous pouvez vous procurer ces guides au format PDF sur le site web de documentation
de Mac OS X Server : www.apple.com/fr/server/documentation
Ce guide ... explique comment :
Premiers contacts et
Feuille d’opération d’installation
et de configuration
Installer Mac OS X Server et le configurer pour la première fois.
Administration de ligne
de commande
Installer, configurer et gérer Mac OS X Server à l’aide des outils
de ligne de commande UNIX et des fichiers de configuration.
Administration des services
de fichier
Partager des volumes ou dossiers d’un certain serveur parmi les
clients de serveur à l’aide des protocoles AFP, NFS, FTP et SMB.
Administration du service iCal Configurer et gérer le service de calendrier partagé iCal.
Administration du service iChat Configurer et gérer le service de messagerie instantanée iChat.
Configuration de la sécurité
de Mac OS X
Rendre les ordinateurs (clients) Mac OS X plus sûrs, pour répondre
aux exigences des clients du secteur privé ou public.
Configuration de la sécurité
de Mac OS X Server
Rendre Mac OS X Server et l’ordinateur sur lequel il est installé
plus sûrs, pour répondre aux exigences des clients du secteur
privé ou public.
Administration du service
de messagerie
Configurer et gérer les services de messagerie IMAP, POP et SMTP
sur le serveur.
Administration des services
de réseau
Installer, configurer et administrer les services DHCP, DNS, VPN, NTP,
coupe-feu IP, NAT et RADIUS sur le serveur.
Administration d’Open Directory Configurer et gérer les services d’annuaire et d’authentification
et configurer des clients pour accéder aux services d’annuaire.
Administration de Podcast Producer Configurer et gérer le service Podcast Producer pour enregistrer,
traiter et distribuer des podcasts.
Administration du service
d’impression
Héberger les imprimantes partagées et gérer les files d’attente
et travaux d’impression associés.
Administration de QuickTime
Streaming et Broadcasting
Capturer et encoder du contenu QuickTime. Configurer et gérer
le service de diffusion QuickTime pour fournir des flux de données
multimédia en direct ou à la demande.
Administration du serveur Effectuer une installation et une configuration avancée du logiciel
serveur et gérer les options qui s’appliquent à plusieurs services
ou au serveur dans son intégralité.
Administration de Mise à jour
de logiciels et d’Imagerie système
Utiliser NetBoot, NetInstall et Mise à jour de logiciels pour automatiser la gestion du système d’exploitation et les autres logiciels utilisés par les ordinateurs client.12 Préface À propos de ce guide
Affichage des guides PDF à l’écran
Lorsque vous lisez la version PDF d’un guide à l’écran :
 Affichez les signets pour voir les grandes lignes du guide, puis cliquez sur un signet
pour accéder à la rubrique de votre choix.
 Recherchez un mot ou un groupe de mots pour afficher une liste des endroits où il apparaît dans le document. Cliquez sur l’une des occurrences pour afficher la page complète.
 Cliquez sur une référence croisée pour accéder directement à la rubrique référencée.
Cliquez sur un lien web pour visiter le site web dans votre navigateur.
Impression de guides PDF
Si vous souhaitez imprimer un guide, suivez ces instructions pour économiser du papier
et de l’encre :
 Économisez de l’encre ou du toner en n’imprimant pas la couverture.
 Économisez l’encre de couleur sur une imprimante couleur en activant dans les sousfenêtres de la zone de dialogue Imprimer une option permettant d’imprimer en niveaux
de gris ou en noir et blanc.
 Réduisez l’encombrement du document imprimé et économisez du papier en imprimant plusieurs pages du document par feuille de papier. Dans la zone de dialogue
Imprimer, passez l’échelle à 115 % (155 % pour Premiers contacts). Sélectionnez ensuite
Mise en page dans le menu local sans titre. Si votre imprimante prend en charge l’impression recto-verso (ou duplex), sélectionnez l’une des options Recto-verso. Sinon, choisissez 2 dans le menu local Pages par feuille, et choisissez éventuellement Simple extra
fine dans le menu Bordure. (Si vous utilisez Mac OS X 10.4 ou une version antérieure,
le réglage Échelle se trouve dans la zone de dialogue Format d’impression et les réglages
Mise en page dans la zone de dialogue Imprimer.)
Mise à niveau et migration Utiliser les réglages de données et de services d’une version
antérieure de Mac OS X Server ou de Windows NT.
Gestion des utilisateurs Créer et gérer les comptes utilisateur, les groupes et les ordinateurs.
Configurer les préférences gérées des clients Mac OS X.
Administration des
technologies web
Configurer et gérer les technologies web (web, blog, WebMail, wiki,
MySQL, PHP, Ruby on Rails et WebDAV).
Informatique à haute performance et administration Xgrid
Configurer et gérer les grappes de serveurs de calcul sur des systè-
mes Xserve et des ordinateurs Mac.
Glossaire Mac OS X Server Comprendre les termes utilisés pour les produits de serveur
et les produits de stockage.
Ce guide ... explique comment :Préface À propos de ce guide 13
Vous voudrez peut-être agrandir les pages imprimées même si vous n’imprimez pas
en recto-verso, car la taille des pages au format PDF est inférieure à celle du papier
d’imprimante standard. Dans la zone de dialogue Imprimer ou Format d’impression,
essayez de passer l’Échelle sur 115 % (155 % pour Premiers contacts, pour les pages
de la taille d’un CD).
Obtention de mises à jour de documentation
Régulièrement, Apple publie des pages d’aide révisées et de nouvelles éditions de guides.
Certaines pages d’aide révisées viennent mettre à jour les dernières éditions des guides.
 Pour afficher de nouvelles rubriques d’aide à l’écran pour une application de serveur,
assurez-vous que votre ordinateur serveur ou administrateur est connecté à Internet
et cliquez sur les liens disponibles pour télécharger les dernières rubriques d’aide
à jour et rester au courant des mises à jour, dans la page d’aide principale de l’application.
 Pour télécharger les guides les plus récents au format PDF, rendez-vous sur le site
web de documentation de Mac OS X Server :
www.apple.com/fr/server/documentation
Obtention d’informations supplémentaires
Pour plus d’informations, consultez les ressources suivantes :
 Documents Ouvrez-moi : mises à jour importantes et informations spécifiques.
Recherchez-les sur les disques du serveur.
 Site web de Mac OS X Server (www.apple.com/fr/server/macosx) : passerelle vers
des informations détaillées sur des produits et technologies.
 Site web de support de Mac OS X Server (www.apple.com/fr/support/macosxserver) :
accès à des centaines d’articles provenant de l’organisation d’assistance Apple.
 Site web de discussion Apple (discussions.apple.com) : un moyen de partager
des questions, des connaissances et des conseils avec d’autres administrateurs.
 Site web de listes de diffusion Apple (www.lists.apple.com) : abonnez-vous à des listes
de diffusion afin de pouvoir communiquer par courrier électronique avec d’autres
administrateurs.
 Site web des produits QuickTime Streaming Server : contient les informations les plus
récentes sur les principales fonctionnalités, les derniers téléchargements et la configuration minimale requise, ainsi que des liens vers d’autres pages de support.
www.apple.com/fr/quicktime/streamingserver
 QuickTime pour le web : excellent ouvrage de la série Apple QuickTime Developer
Series qui explique comment intégrer à un site web de la vidéo, du son enregistré,
des animations Flash, des séquences de réalité virtuelle, des séquences MIDI,
du texte, des images fixes, des flux en direct, des jeux et l’interactivité de l’utilisateur. 14 Préface À propos de ce guide
Le disque d’accompagnement inclut QuickTime Pro et un ensemble complet d’outils
de développement pour Windows et Macintosh. Vous trouverez ce livre primé, publié
par Morgan Kaufmann, ainsi que d’autres titres utiles sur le site web didactique
de QuickTime. www.apple.com/fr/quicktime/tools_tips/books.html.
 Site web des services QuickTime : fournit la liste des fournisseurs de service de diffusion.
www.apple.com/fr/quicktime/resources.
 Site web du groupe de travail IETF : documents RFC, mémorandums sur les standards
RTP et RTSP. www.ietf.org/rfc/rfc1889.txt (RTP) www.ietf.org/rfc/rfc2326.txt (RTSP)
(en anglais).
 Site web du code source : accès au code source de Darwin Streaming Server, informations pour les développeurs et FAQ. developer.apple.com/darwin/projects/streaming
(en anglais).1
15
1 Vue d’ensemble de
QuickTime Streaming
Pour pouvoir configurer votre QuickTime Streaming Server,
il est important de comprendre ce qu’est la diffusion
en continu.
Qu’est-ce que la diffusion en continu ?
La diffusion en continu est la distribution de contenu multimédia, tel que les films
et les présentations vidéo, sur un réseau en direct. Un ordinateur (serveur de diffusion
en continu) envoie les données multimédia à un autre ordinateur (client), lequel lit
les données au fur et à mesure de leur réception.
Avec la diffusion en continu, aucun fichier n’est téléchargé sur le disque dur de l’ordinateur destinataire. Vous pouvez enchaîner l’envoi des données selon différents débits,
d’une simple connexion par modem à une connexion à haut débit.
De la même façon que vous avez besoin d’un serveur web pour héberger un site web,
l’envoi de flux de données via Internet ou un réseau local nécessite un serveur de diffusion en continu qui transmet les flux audio et vidéo à la demande.
Lorsque les destinataires sont peu nombreux, le même ordinateur peut exécuter le logiciel de serveur Web, le logiciel de serveur de courrier et le logiciel de serveur de diffusion. En revanche, si les destinataires sont plus nombreux, un ou plusieurs ordinateurs
sont généralement dédiés aux serveurs de diffusion.
Lorsqu’un utilisateur demande un flux (à l’aide d’un logiciel client tel que QuickTime
Player), la demande est gérée à l’aide du protocole RTSP (Real-Time Streaming Protocol).
Les flux sont envoyés à l’aide du protocole RTP (Real-Time Transport Protocol). Un serveur
de diffusion peut soit créer des flux à partir de séquences QuickTime stockées sur disque
dur, soit transmettre des flux en direct auxquels il a accès.
Le logiciel QTSS (QuickTime Streaming Server) vous permet de diffuser :
 des émissions en direct,
 de la vidéo à la demande,
 des listes de lecture de contenu préenregistré.16 Chapitre 1 Vue d’ensemble de QuickTime Streaming
Comparaison entre diffusion en direct et diffusion à la demande
Les flux de données multimédia en temps réel sont transmis de deux façons : en direct
et à la demande. Le serveur Enchaînement QuickTime utilise les deux modes.
Les événements en direct tels que les concerts, les discours et les présentations sont
généralement diffusés via Internet au moment même où ils se déroulent, à l’aide de logiciels de diffusion tels que QuickTime Broadcaster. Ces logiciels de diffusion codent une
source en direct, telle que la vidéo provenant d’une caméra, en temps réel et envoient
le flux résultant vers le serveur. Le serveur envoie (ou “sert”) alors le flux en direct aux
clients. Quel que soit l’instant où un utilisateur se connecte au flux, tout le monde voit
la même portion de flux au même moment. Vous pouvez simuler une expérience en
direct à l’aide de contenus enregistrés, en diffusant à partir d’une source archivée (telle
qu’un magnétophone) ou en créant des listes de lecture sur le serveur.
Avec la diffusion à la demande, d’un film ou d’un discours archivé par exemple, chaque
client lit le flux depuis le début, de sorte que personne n’arrive en retard. Aucun logiciel
de diffusion n’est requis pour la diffusion à la demande.
Comparaison entre le téléchargement progressif (HTTP) et le téléchargement par enchaînement (RTP/RTSP)
Le téléchargement progressif (parfois appelé « Démarrage rapide ») est une méthode
qui consiste à distribuer un film via Internet de sorte que sa lecture puisse commencer
avant que le fichier ne soit complètement téléchargé. Avec le téléchargement progressif, toutes les données requises pour lire un film se trouvent en début de fichier, de sorte
que QuickTime peut commencer la lecture du film dès que la première partie du fichier
a été transférée. Contrairement à l’enchaînement, qui permet de visualiser des films sans
télécharger aucun fichier, les films à démarrage rapide sont réellement téléchargés sur
l’ordinateur destinataire.
Un tel film peut être autonome, auquel cas toutes les données sont stockées dans le
film proprement dit, ou inclure des pointeurs faisant référence à des données situées
sur Internet. Vous pouvez visualiser les films à téléchargement progressif dans un
navigateur web, à l’aide du module QuickTime, ou dans QuickTime Player.
Vous pouvez créer des films à téléchargement progressif pour des spectateurs ayant
des vitesses de connexion variables (appelés films de référence) et un film par enchaî-
nement pour les spectateurs utilisant les connexions les plus rapides.Chapitre 1 Vue d’ensemble de QuickTime Streaming 17
Enchaînement Lecture instantanée
Les utilisateurs qui regardent un flux vidéo à l’aide de QuickTime 6 ou ultérieur peuvent
bénéficier de la fonctionnalité Lecture instantanée. Cette dernière constitue un progrès
dans la technologie Apple de protection contre les coupures, qui permet de réduire
considérablement les temps de mise en mémoire tampon, procurant ainsi une expé-
rience de visualisation instantanée. Les utilisateurs peuvent faire défiler la vidéo
en cliquant, comme si elle se trouvait sur leur disque dur.
Les utilisateurs doivent disposer d’une connexion à haut débit pour bénéficier de la diffusion en lecture instantanée. La réactivité de la diffusion en Lecture instantanée dépend
du débit du contenu, de sa taille et de la bande passante disponible. Elle peut également
être affectée par le codec utilisé.
Configuration simplifiée pour la vidéo en direct
La figure ci-dessous illustre une configuration de diffusion vidéo et audio en continu.
(La plupart des caméras vidéo disposent d’un microphone intégré.) Vous pouvez diffuser les séquences audio en utilisant uniquement un microphone, une table de mixage
et tout autre équipement audio approprié.
Un ordinateur MacBook Pro équipé du logiciel QuickTime Broadcaster capture et encode
des données vidéo et audio. Le signal encodé est envoyé via un réseau IP (Internet Protocol) vers un serveur qui exécute le logiciel QTSS (QuickTime Streaming Server). QTSS sur
le serveur envoie le signal, via Internet ou un réseau local, aux ordinateurs client qui demandent le flux à l’aide de QuickTime Player.
Serveur de diffusion
Broadcaster18 Chapitre 1 Vue d’ensemble de QuickTime Streaming
Il est possible également d’exécuter QuickTime Broadcaster et QTSS sur le même ordinateur.
Si vous effectuez une diffusion à une large audience (disons, plus de 100 personnes), toutefois, il est préférable d’exécuter QuickTime Broadcaster et QTSS sur des ordinateurs séparés.
Comment recevoir des flux de données multimédias
Lorsque vous regardez et écoutez des transmissions aériennes ou par câble, à la télévision ou à la radio, les longueurs d’onde utilisées sont dédiées à cette transmission.
Ces transmissions sont le plus souvent non compressées et nécessitent de grandes
quantités de bande passante. Ce n’est pas un problème, car elles ne doivent pas
partager la bande de fréquence utilisée.
Lorsque vous envoyez ces mêmes données via Internet, la bande passante utilisée n’est
plus dédiée uniquement à ce flux de transmission. Les données doivent alors partager
une bande passante extrêmement limitée avec des milliers, voire des millions d’autres
transmissions transitant via Internet.
Par conséquent, les données multimédia sont encodées et compressées avant d’être
transmises via Internet. Les fichiers qui en résultent sont enregistrés dans un emplacement spécifique et le logiciel serveur de diffusion, tel que QTSS, envoie les données
multimédia via Internet aux ordinateurs client.
Les utilisateurs Macintosh et Windows peuvent visualiser les flux de données multimé-
dia à l’aide de QuickTime Player (disponible gratuitement sur le site web Apple) ou de
toute autre application gérant les fichiers QuickTime ou MPEG-4 standard.
Vous pouvez également configurer des flux que les utilisateurs peuvent visualiser à partir
d’un navigateur web, à condition que le module QuickTime soit installé. Lorsqu’un utilisateur commence la lecture de flux de données multimédias dans une page Web, le plug-in
QuickTime envoie une demande au serveur de diffusion et ce dernier répond en envoyant
le contenu multimédia à l’ordinateur client. Vous devez spécifier dans la page Web le
contenu à envoyer au client : un film QuickTime situé dans un répertoire spécifié, une
diffusion en direct ou une liste de lecture stockée sur le serveur de diffusion. Les flux 3GP
peuvent également être visualisés sur des téléphones portables compatibles avec la diffusion en continu.Chapitre 1 Vue d’ensemble de QuickTime Streaming 19
Comparaison entre multidiffusion et monodiffusion
QTSS gère le transport réseau multidiffusion et monodiffusion pour la distribution
des flux de données multimédia.
Lors d’une multidiffusion, un seul flux est partagé par les clients (voir illustration ci-dessous).
Chaque client se branche sur le flux comme une radio se branche sur une émission FM.
Cette technique réduit l’encombrement sur le réseau, mais nécessite un réseau qui ait
accès à la dorsale de multidiffusion (Mbone) pour le contenu distribué via Internet,
ou qui permette la multidiffusion de contenu distribué en réseau privé restreint.
En monodiffusion, chaque client lance son propre flux, entraînant la génération de nombreuses connexions un à un entre le client et le serveur (voir illustration ci-dessous). Le fait d’avoir
plusieurs clients connectés en monodiffusion à une diffusion en continu sur un réseau local
peut provoquer un trafic réseau élevé, mais cette technique est la plus fiable pour la distribution via Internet puisqu’aucune prise en charge de transport spéciale n’est requise.
Multidiffusion
Monodiffusion20 Chapitre 1 Vue d’ensemble de QuickTime Streaming
Relais
Les relais sont utiles dans le cas d’une diffusion à de nombreux spectateurs situés
à différents endroits. Le serveur QTSS dispose également d’une fonction de relais,
ce qui permet de répartir la charge des flux de données multimédia entre les serveurs
et d’utiliser au mieux la bande passante du réseau.
Utilisé en tant que serveur relais, QTSS réexpédie un flux à partir d’une source (par exemple
Live Broadcaster, QuickTime Streaming Server) vers un serveur de destination. Le plus souvent employés dans le cadre d’une diffusion en direct, les relais servent lorsque les spectateurs sont situés dans des endroits différents, tels que plusieurs bâtiments d’un campus
ou dans différents pays.
Le serveur source se trouve généralement à l’endroit de la diffusion en direct et réexpé-
die le flux aux serveurs situés aux différents emplacements.
Une entreprise peut par exemple diffuser la présentation d’un PDG en la relayant
du siège social vers les succursales.
Dans ce cas, seul un flux de données est diffusé sur Internet et les spectateurs des succursales se connectent aux serveurs de destination via le réseau local (LAN), ce qui réduit
la charge sur le serveur source et permet à tout le monde de profiter d’une diffusion
de meilleure qualité.
Pour des informations détaillées sur la configuration des relais, consultez la section
« Configuration de flux de relais » à la page 28.
Serveur relais
Source
Internet
Clients
Clients
Serveur de destination
Serveur de destination
Siège social de l’entreprise Succursales2
21
2 Configuration de votre serveur
Enchaînement QuickTime
L’objectif de ce chapitre est de vous permettre de configurer
et d’utiliser rapidement votre serveur de diffusion QuickTime.
Les instructions de ce chapitre supposent que vous avez installé et configuré Mac OS X
Server version 10.5. Pour savoir comment configurer Mac OS X Server, consultez
le document intitulé Mac OS X Server Premiers contacts avec la version 10.5 ou ultérieure,
inclus sur un disque d’installation de Mac OS X Server et téléchargeable à l’adresse
www.apple.com/fr/server/documentation.
Configurations matérielle et logicielle requises pour l’enchaî-
nement QuickTime
La configuration requise pour QTSS est décrite dans le guide Premiers contacts.
Configuration requise pour l’ordinateur de visualisation
Tout ordinateur sur lequel est installé QuickTime 4 ou ultérieur peut afficher les données
multimédias envoyées par le serveur de diffusion. Pour un résultat optimal, Apple recommande QuickTime 7 ou ultérieur.
Pour bénéficier de la fonctionnalité Lecture instantanée avec QuickTime Streaming
Server 4.1 ou ultérieur, QuickTime 6 ou un version ultérieure et une connexion Internet
haut débit sont nécessaires.
Tout lecteur MPEG-4 conforme à la norme ISO peut afficher des fichiers MPEG-4 et tout périphérique compatible 3GP des fichiers .3GP. Il est possible d’écouter des flux de listes de lecture MP3 à l’aide d’iTunes ou de tout autre lecteur compatible de flux MP3, tel que WinAmp.
Téléchargez QuickTime Player sur le site web QuickTime : www.apple.com/fr/quicktime.
Configuration requise pour la diffusion en direct
Pour diffuser du contenu en direct, vous pouvez utiliser QuickTime Broadcaster,
inclus et installé avec Mac OS X Server.22 Chapitre 2 Configuration de votre serveur Enchaînement QuickTime
Pour diffuser des données audio ou vidéo en direct, vous avez besoin du matériel suivant :
 Matériel source pour les données audio, vidéo ou les deux, par exemple un magné-
toscope, un caméscope et un microphone.
 Un ordinateur équipé de QuickTime Broadcaster ou de tout autre logiciel de diffusion (ordinateur G4 ou plus rapide recommandé pour la diffusion MPEG-4), ainsi
qu’une carte de capture vidéo ou audio.
Remarque : QuickTime Broadcaster gère la capture vidéo à partir de la plupart des sources à technologie FireWire (notamment les caméscopes numériques (DV), certaines webcams et les boîtiers de conversion DV) pour un processus de diffusion simple et rapide
avec des résultats de qualité professionnelle.
 128 Mo de RAM (256 Mo recommandé pour une diffusion professionnelle).
 QuickTime 6 ou ultérieur.
Considérations relatives à la bande passante
Il n’est généralement pas souhaitable de connecter un serveur de diffusion à Internet
ou à un réseau local (LAN) via un modem DSL (Digital Subscriber Line) ou un modem
câble. Le serveur serait en effet très limité par la bande passante relativement faible
de ces modems pour le téléchargement de données vers le serveur. Dans certains cas,
l’utilisation d’un serveur sur une connexion DSL peut entraîner la rupture d’un contrat
de service. Avant de configurer le serveur, consultez le fournisseur d’accès associé
à votre modem câble ou DSL.
Lors de la création de flux RTP (Real-Time Transport Protocol), vous obtiendrez les
meilleures performances si les flux ne dépassent pas 75 % de la bande passante client
prévue. Par exemple, n’utilisez pas un débit supérieur à 21 kilobits par seconde (Kbps)
pour une connexion par modem à 28 Kbps. Pour une connexion classique par modem
56 K, ne dépassez pas 40 Kbps. Pour une connexion client T1 (1500 Kbps), n’utilisez
pas un débit supérieur à 1125 Kbps.
Configuration de votre serveur de diffusion
Configurez le serveur de diffusion, testez votre configuration et accédez aux données
multimédia diffusées par votre serveur.
Pour configurer votre serveur de diffusion :
1 Ouvrez Admin Serveur.
2 Dans la liste Services, sélectionnez l’ordinateur que vous voulez configurer en tant
que serveur de diffusion en continu QuickTime.
3 Cliquez sur Réglages généraux dans la barre d’outils, puis cliquez sur l’onglet Services.
4 Dans la liste des services, sélectionnez QuickTime Streaming, puis cliquez sur Enregistrer.Chapitre 2 Configuration de votre serveur Enchaînement QuickTime 23
5 Sélectionnez QuickTime Streaming dans la liste Serveurs pour afficher et modifier
les réglages.
6 Pour démarrer le service QuickTime Streaming, cliquez sur le bouton de lecture dans
l’angle inférieur gauche de la fenêtre Admin Serveur.
Test de votre configuration
Des échantillons de séquences QuickTime sont inclus avec QTSS dans le dossier par défaut
des séquences, ce qui vous permet de tester la configuration du serveur. Ces échantillons
peuvent être visualisés à l’aide de QuickTime Player.
Remarque : l’échantillon de fichier MP3 inclus est uniquement destiné à une liste de
lecture MP3 de diffusion. Il ne peut pas être diffusé à la demande à l’aide du protocole
RTSP car il n’a pas été préparé pour la diffusion en continu, ce qui requiert un processus
dit d’optimisation.
Pour tester la configuration de votre serveur en visualisant un échantillon de film :
1 Sur un autre ordinateur, ouvrez QuickTime Player.
2 Cliquez sur Fichier > Ouvrir l’URL dans le nouveau lecteur.
3 Tapez l’URL suivante :
rtsp://nom_hôte/sample_300kbit.mov
Remplacez nom_hôte par le nom d’hôte ou l’adresse IP du serveur de diffusion en continu
QuickTime et choisissez une séquence ayant un débit adapté à votre bande passante.
4 Cliquez sur OK.
QuickTime Player se connecte au serveur et lit le film dans une nouvelle fenêtre.
Si un message de type « Fichier introuvable » s’affiche, vérifiez que vous avez correctement saisi l’URL, notamment en respectant la casse.
Si votre serveur de diffusion est un serveur multi-adressage (si l’ordinateur héberge également un serveur web, par exemple), il se peut que vous deviez spécifier une autre adresse
IP pour l’enchaînement. (Un serveur web utilise le port 80 ; dans certaines configurations
de clients QuickTime, QTSS utilise aussi le port 80.)
Vous pouvez choisir ou ajouter une adresse IP pour le serveur de diffusion dans la sousfenêtre QuickTime Streaming d’Admin Serveur. Cliquez sur Réglages, sur Liaisons IP,
puis cochez la case Liaison correspondant à l’adresse IP souhaitée.
La configuration initiale de votre logiciel QTSS est terminée. Les réglages complémentaires
dépendent de votre matériel et de vos logiciels, de vos connexions réseau, du nombre
prévu de spectateurs, ainsi que du type de données que vous souhaitez diffuser.
Pour plus d’informations sur la détermination de ces réglages et sur l’utilisation du serveur
de diffusion, consultez le chapitre 3, « Gestion de votre serveur Enchaînement QuickTime »,
le chapitre 6, « Exemple de configuration » et les ressources présentées à la page 13.24 Chapitre 2 Configuration de votre serveur Enchaînement QuickTime
Accès aux données multimédia diffusées par votre serveur
Pour lire des flux de données multimédia, les utilisateurs doivent disposer de QuickTime 4
ou ultérieur (ou d’un lecteur MP4). Vous trouverez ci-dessous les instructions à fournir
aux utilisateurs qui souhaitent visualiser les flux multimédias diffusés par votre serveur.
Pour visualiser des flux de données multimédias :
1 Ouvrez QuickTime Player.
2 Choisissez Fichier > Ouvrir l’URL.
3 Tapez l’URL du fichier multimédia.
Exemple : rtsp://monserveur.com/monfichier
Remplacez monserveur.com par le nom de domaine de l’ordinateur QTSS et monfichier
par le nom de la séquence ou du fichier multimédia.
Cette URL suppose que la séquence ou le fichier multimédia se trouve au niveau supé-
rieur du répertoire multimédia. Si des séquences se trouvent dans des sous-dossiers
du répertoire, ajoutez le dossier concerné au nom de chemin. Par exemple :
rtsp://monserveur.com/mondossier/monfichier.mov
Si vous souhaitez que les utilisateurs visualisent les flux de données multimédia à l’aide
d’un navigateur web, vous devez configurer une page web pour afficher les données
multimédia et fournir aux utilisateurs l’URL de cette page.
Remarque : il est déconseillé de taper une adresse URL RTSP directement dans le champ
d’adresse du navigateur web, certains navigateurs ne comprenant pas le terme « rtsp ».3
25
3 Gestion de votre serveur
Enchaînement QuickTime
Ce chapitre contient des informations sur la diffusion de flux
de données à travers des coupe-feu, la configuration de relais
et l’administration à distance d’un serveur Enchaînement
QuickTime.
Pour configurer et gérer QuickTime Streaming Server (QTSS), vous devez utiliser l’application Admin Serveur installée avec Mac OS X Server (version 10.5 ou ultérieure). Cette
application offre une interface utilisateur standard pour toutes les plates-formes compatibles et vous permet d’administrer le serveur de diffusion localement ou à distance.
Admin Serveur vous permet de modifier les réglages généraux, de surveiller les utilisateurs connectés, de visualiser les fichiers d’historique, de gérer l’utilisation de la bande
passante et de relayer des flux d’un serveur à un autre.
Utilisation de l’application basée sur le Web pour gérer
l’enchaînement QuickTime
Si vous avez précédemment administré un serveur de diffusion QuickTime à l’aide
de l’application d’administration web (Admin Web), vous pouvez continuer ainsi.
L’application Admin Web est utile pour administrer un serveur de diffusion à distance
ou depuis des ordinateurs autres que Mac.
Pour activer Admin Web :
1 Dans Admin Serveur, sélectionnez QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages.
3 Cliquez sur Accès.
4 Sélectionnez « Activer l’administration basée sur le Web », puis saisissez un nom
et un mot de passe à utiliser pour accéder au site web d’administration.
5 Cliquez sur Enregistrer.26 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime
Pour plus d’informations sur l’utilisation d’Admin Web, consultez le guide de l’administrateur QTSS/Darwin Streaming Server, disponible à l’adresse developer.apple.com/darwin/
(en anglais).
Remarque : si vous avez utilisé l’application Admin Web pour administrer un serveur
de diffusion QuickTime, vous trouverez les fonctionnalités d’administration dans l’application Admin Serveur de Mac OS X.
Utilisation d’Admin Serveur pour gérer l’enchaînement
QuickTime
Cette section contient des instructions pour l’utilisation d’Admin Serveur pour les tâches
telles que le démarrage ou l’arrêt du service de diffusion en continu, la configuration
d’un serveur multi-adressage et la modification de réglages tels que le nombre maximum de connexions et le débit maximum autorisé.
Démarrage ou arrêt du service de diffusion
Vous pouvez démarrer ou arrêter le service de diffusion à partir de la sous-fenêtre
QuickTime Streaming d’Admin Serveur.
Pour démarrer ou arrêter le service de diffusion :
1 Ouvrez Admin Serveur.
2 Dans la liste Serveurs, cliquez sur QuickTime Streaming pour le serveur.
3 En haut de la fenêtre, cliquez sur Démarrer le service ou sur Arrêter le service.
Modification du nombre maximum de connexions de diffusion
Lorsque le nombre maximum de connexions spécifié est atteint, un message indiquant
que le serveur est occupé ou que la bande passante est insuffisante (erreur 453) s’affiche pour les utilisateurs qui tentent de se connecter.
Pour modifier le nombre maximum de connexions :
1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages.
3 Tapez un nombre dans le champ Nombre de connexions max.
4 Cliquez sur Enregistrer.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 27
Modification du débit de diffusion maximum
Si le débit maximal est atteint, personne d’autre ne peut se connecter. Les utilisateurs
qui tentent de se connecter reçoivent un message indiquant que le serveur est occupé
(erreur 453).
Pour modifier le débit maximal :
1 Dans Admin Serveur, cliquez sur Enchaînement QuickTime sous le serveur dans la liste
Ordinateurs et services.
2 Cliquez sur Réglages.
3 Saisissez un chiffre dans la zone Débit maximal et choisissez mégabits par seconde
(Mbps) ou kilobits (Kbps) dans le menu local.
Vous pouvez choisir d’associer QTSS à toutes les adresses IP répertoriées ou uniquement aux adresses sélectionnées.
4 Cliquez sur Enregistrer.
Changement du répertoire réservé aux flux de données multimédias
QuickTime Streaming Server comporte un répertoire multimédia principal (/Library/
QuickTimeStreaming/Movies/). Si vous le souhaitez, vous pouvez spécifier un autre
répertoire pour vos données multimédia. Par exemple, vous voulez basculer sur un
répertoire d’un autre disque dur. Assurez-vous que le propriétaire du nouveau répertoire est bien l’utilisateur système « qtss ». Le propriétaire peut être modifié à partir
du Gestionnaire de groupe de travail, du Finder ou de la ligne de commande.
Pour spécifier un autre répertoire multimédia :
1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages.
3 Tapez un chemin d’accès dans le champ texte Répertoire multimédia ou cliquez
sur le bouton en regard du champ afin de choisir un dossier.
4 Cliquez sur Enregistrer.
Association de l’ordinateur d’administration du serveur de diffusion
à une adresse IP
Si votre ordinateur d’administration du serveur de diffusion est de type multi-adressage
(si vous hébergez également un serveur web, par exemple), vous pouvez indiquer
l’adresse IP à associer à QTSS.
Pour spécifier une adresse IP :
1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages, puis sur Associations IP.
3 Cochez la case Liaison pour l’adresse IP souhaitée.
4 Cliquez sur Enregistrer.28 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime
Hébergement de flux provenant de plusieurs répertoires multimédia
utilisateur
QTSS ne peut comporter qu’un seul répertoire multimédia principal. Cependant, en
activant la prise en charge des répertoires de départ, les utilisateurs peuvent diffuser
des fichiers ou des listes de lecture à la demande, à partir de leur répertoire de départ.
Pour configurer QTSS afin qu’il diffuse des séquences provenant des répertoires
de départ des utilisateurs :
1 Dans Admin Serveur, cliquez sur Enchaînement QuickTime.
2 Cliquez sur Réglages, puis sur Accès.
3 Sélectionnez “Activer la diffusion depuis le répertoire de départ”.
4 Cliquez sur Enregistrer.
5 Demandez aux utilisateurs de placer leurs films QuickTime dans le dossier créé dans leur
répertoire de départ (//Sites/Streaming).
Pour visualiser une séquence dans un répertoire privé, tapez l’URL suivante :
rtsp://nom_hôte.com/~utilisateur1/exemple.mov
Remarque : pour diffuser un flux en direct à partir d’un répertoire autre que le répertoire
multimédia, vous devez créer un fichier qtaccess. Pour plus d’informations, consultez le Guide
de l’administrateur de QTSS disponible à l’adresse developer.apple.com/darwin/ (en anglais).
Configuration de flux de relais
Vous devez utiliser des relais pour accepter un flux provenant d’un serveur de diffusion
et le transférer, ou le relayer, vers un autre serveur de diffusion. Chaque relais est constitué d’une source et d’une ou plusieurs destinations.
Pour configurer un relais :
1 Dans le volet Réglages du service Enchaînement QuickTime, cliquez sur Relais.
2 Cliquez sur le bouton Ajouter (+) en regard de la liste Relais.
3 Tapez un nom pour le relais dans le champ Nom du relais.
4 Choisissez une option dans le menu local Type de relais.
Le type de relais définit la source du relais. Il existe trois options :
 L’option Demander une diffusion entrante ordonne au serveur de diffusion d’envoyer
à l’ordinateur source une demande pour le flux entrant avant qu’il ne soit relayé. Vous
pouvez utiliser cette fonctionnalité pour relayer une diffusion en direct (à partir d’un
autre serveur) ou pour demander un fichier stocké et le convertir en un flux sortant en
direct. L’option « Demander une diffusion entrante » est couramment utilisée dans le cas
de flux UDP non annoncés diffusés par QuickTime Broadcaster ou tout autre encodeur.
 L’option UDP non annoncé permet de relayer depuis le serveur des flux sur une adresse
IP et des numéros de ports spécifiques.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 29
 L’option UDP annoncé ordonne au serveur d’attendre le flux entrant, puis de le relayer.
Les relais configurés pour attendre des flux annoncés ne peuvent accepter que les flux
multimédias utilisant le protocole d’annonce RTSP. L’option UDP annoncé s’utilise dans
le cas d’une diffusion automatique (annoncée) via QuickTime Broadcaster ou tout autre
encodeur prenant en charge le protocole d’annonce RTSP.
5 Si vous choisissez « Demander une diffusion entrante » ou « UDP annoncé », saisissez
le nom d’hôte DNS ou l’adresse IP de l’ordinateur source dans le champ IP source.
6 Si vous choisissez « Demander une diffusion entrante » ou « UDP annoncé », saisissez
le chemin d’accès au flux dans le champ Chemin.
7 Si vous choisissez « Demander une diffusion entrante » ou « UDP annoncé » et que l’ordinateur source requiert l’authentification des diffusions automatiques, saisissez un nom
d’utilisateur et un mot de passe.
8 Assurez-vous que l’option Activer le relais est sélectionnée et cliquez sur le bouton
Précédent.
9 Cliquez sur le bouton Ajouter (+) en regard de la liste Destinations.
Il existe deux types de destinations :
 L’option UDP non annoncé permet de relayer depuis le serveur des flux sur une adresse
IP spécifique et des numéros de ports. Il faut alors créer manuellement un fichier SDP
 L’option UDP annoncé permet de relayer et d’annoncer le flux à l’adresse IP de destination depuis le serveur. Le fichier SDP est alors automatiquement généré à la destination.
10 Tapez les informations demandées et cliquez sur le bouton Précédent.
11 Répétez les étapes 9 et 10 pour chaque destination, puis cliquez sur Enregistrer.
Pour activer ou désactiver un relais, cochez ou décochez la case Activer en regard
du relais dans la liste. Pour supprimer un relais, sélectionnez-le, puis cliquez sur
le bouton Supprimer (–).
Modification des réglages d’historique de diffusion QuickTime
Vous pouvez spécifier que chaque historique soit réinitialisé après un certain nombre
de jours.
Pour modifier les réglages d’historique :
1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages.
3 Cliquez sur Consignation.
L’historique des accès est mis à jour uniquement lorsque les connexions client sont interrompues. Un client connecté au moment d’une panne de courant ou d’une défaillance
du serveur n’est pas consigné et n’apparaît pas dans l’historique des accès lorsque le serveur est relancé.30 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime
Les fichiers d’historique sont stockés dans le répertoire
/Bibliothèque/QuickTimeStreaming/Logs/.
Lecture des historiques de diffusion QuickTime
QTSS fournit les fichiers d’historique suivants :
 Historiques des erreurs. Ces fichiers regroupent des erreurs telles que les problèmes
de configuration. Par exemple, si une adresse IP spécifique est introuvable ou que
certains des fichiers de diffusion ont été supprimés.
 Historiques des accès. Lorsque quelqu’un lit un film diffusé à partir de votre serveur,
l’historique fournit des informations telles que la date, l’heure et l’adresse IP de l’ordinateur utilisé.
Les fichiers d’historiques de QTSS sont stockés dans Library/QuickTimeStreaming/Logs.
Les historiques de QTSS sont au format W3C standard, ce qui vous permet d’utiliser
certains outils d’analyse standard pour analyser les données.
Sécurité et accès
Il existe un certain niveau de sécurité inhérent à la diffusion en temps réel, dans la mesure
où le contenu n’est transmis que si le client en a besoin et où aucun fichier n’est conservé.
Toutefois, d’autres problèmes de sécurité peuvent néanmoins se présenter.
Le serveur de diffusion utilise les protocoles RTSP/RTP IETF standard. Le protocole RTSP
fonctionne sur TCP, le protocole RTP sur UDP. De nombreux coupe-feu sont configurés
pour limiter les paquets TCP par numéro de port et filtrer le port UDP.
Il existe trois options permettant de diffuser des flux en présence de coupe-feu via QTSS.
Ces options ne s’excluent pas mutuellement. Généralement, une ou plusieurs options sont
employées afin d’obtenir la configuration la plus souple possible. Les trois configurations
ci-dessous sont destinées aux clients derrière un coupe-feu.
 Diffusion sur le port 80. Cette option permet au serveur de diffusion d’encapsuler
l’ensemble du trafic RTSP et RTP dans des paquets TCP sur le port 80. Ce port étant
utilisé par défaut pour le trafic web HTTP, le contenu diffusé en continu est filtré par
la plupart des coupe-feu. L’inconvénient de cette encapsulation est qu’elle diminue
les performances réseau et que des connexions client plus rapides sont nécessaires
pour éviter d’interrompre la diffusion. Elle augmente également la charge sur le serveur.
 Option Ouvrir les ports adaptés sur le coupe-feu. Avec cette option, il est possible
d’accéder au serveur de diffusion via RTSP/RTP sur les ports par défaut ; elle permet
également de mieux exploiter les ressources réseau, ne requiert pas de connexions
client plus rapides et n’impose pas de charge importante au serveur. Les ports qui
doivent être ouverts incluent :
 Port TCP 80 : utilisé pour signaler et diffuser des flux de données par RTSP/HTTP (si
activé sur le serveur)Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 31
 Port TCP 554 : utilisé pour RTSP
 Ports UDP 6970-9999 : utilisé pour la diffusion de flux de données UDP. Une plage
inférieure de ports UDP, généralement entre 6970 et 6999, peut être utilisée.
 Port TCP 7070 : utilisé éventuellement pour RTSP. (Real Server utilise ce port ;
QTSS/Darwin peut également être configuré pour y recourir).
 Ports UDP 8000 et 8001 : peut être ouvert pour la diffusion Icecast MP3.
 Configuration d’un serveur proxy de diffusion en continu. Le serveur proxy est placé
dans la zone DMZ du réseau, une zone située entre un coupe-feu externe relié à Internet
et un coupe-feu interne entre la zone DMZ et le réseau interne. Avec des règles de coupefeu, les paquets avec les ports indiqués ci-dessus sont autorisés à passer entre le serveur
proxy et les clients via le coupe-feu interne, ainsi qu’entre le serveur proxy et Internet via
le coupe-feu externe. Cependant, les clients ne sont pas autorisés à se connecter directement à des ressources externes sur ces ports. De cette façon, tous les paquets destinés
à être envoyés sur le réseau interne sont transmis via le serveur proxy, d’où une sécurité
accrue du réseau.
Diffusion de flux à travers des coupe-feu via le port 80
Si vous configurez un serveur de diffusion sur Internet et que certains de vos clients
se trouvent derrière des coupe-feu qui n’autorisent que le trafic web, activez la diffusion sur le port 80.
Avec cette option, le serveur de diffusion accepte les connexions sur le port 80, le port
par défaut pour le trafic web, et les clients QuickTime peuvent se connecter à votre serveur
de diffusion même s’ils se trouvent derrière un coupe-feu destiné uniquement au web.
Si vous activez l’enchaînement sur le port 80, veillez à désactiver tout serveur Web
possédant la même adresse IP, afin d’éviter les conflits avec votre serveur de diffusion.
Pour diffuser des flux QuickTime via le port HTTP 80 :
1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages.
3 Cliquez sur Associations IP.
4 Sélectionnez l’option “Activer la diffusion sur le port 80”.
Important : si vous activez la diffusion sur le port 80, assurez-vous que votre serveur n’exé-
cute pas également un serveur web tel qu’Apache. L’exécution de QTSS et d’un serveur Web
avec diffusion sur le port 80 peut provoquer un conflit de port entraînant le comportement
anormal de l’un ou des deux serveurs.32 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime
Diffusion à travers des coupe-feu ou des réseaux avec traduction
d’adresses
Le serveur de diffusion envoie des données à l’aide de paquets UDP. Les coupe-feu conçus
pour protéger les informations d’un réseau bloquent souvent les paquets UDP. Les ordinateurs client situés derrière un coupe-feu qui bloque les paquets UDP ne peuvent recevoir
les flux de données multimédia.
Cependant, le serveur de diffusion autorise également la diffusion via des connexions HTTP,
ce qui permet la visualisation des données multimédias, même à travers des coupe-feu
configurés de manière très restrictive.
Certains ordinateurs client situés sur des réseaux qui utilisent la traduction d’adresses
peuvent également s’avérer incapables de recevoir des paquets UDP, mais ils peuvent
recevoir les données multimédia diffusées via des connexions HTTP.
Si les utilisateurs rencontrent des problèmes pour visualiser les données multimédia
à travers un coupe-feu ou sur un réseau qui utilise la traduction d’adresses, ils doivent procéder à la mise à niveau de leur logiciel client avec QuickTime 5 ou une version ultérieure.
Si les problèmes persistent, leur administrateur réseau doit leur fournir les réglages appropriés pour le serveur proxy de diffusion et le transport de diffusion sur leur ordinateur.
Les administrateurs réseau peuvent également configurer leur logiciel coupe-feu afin
d’autoriser les diffusions RTP et RTSP.
Changement du mot de passe requis pour envoyer un flux de
diffusion MP3
La diffusion de données MP3 vers un autre serveur nécessite une authentification.
Pour changer le mot de passe de diffusion MP3 :
1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages, puis sur Accès.
3 Tapez un nouveau mot de passe dans la zone « Mot de passe de diffusion MP3 ».
4 Cliquez sur Enregistrer.
Utilisation de la monodiffusion automatique (Annonce) à l’aide
de QTSS sur un ordinateur distinct
Vous pouvez réaliser une diffusion de QuickTime Broadcaster vers QTSS. Ce réglage peut
également permettre de recevoir des flux UDP annoncés d’un autre serveur QuickTime
Streaming Server via un relais à l’aide de la méthode de transmission Monodiffusion automatique (Annonce). Pour cela, vous devez créer un nom d’utilisateur et un mot de passe
de diffusion sur le serveur de diffusion en continu.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 33
Pour créer un nom d’utilisateur et un mot de passe de diffusion sur le serveur de diffusion :
1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs.
2 Cliquez sur Réglages, puis sur Accès.
3 Cochez la case « Accepter les diffusions entrantes ».
4 Cliquez sur Définir le mot de passe et tapez le nom et le mot de passe.
5 Cliquez sur Enregistrer.
Tâches de gestion avancées
En plus des fonctions disponibles via Admin Serveur, QTSS inclut également des fonctionnalités avancées qui permettent une plus grande personnalisation du serveur depuis
la ligne de commande. Il s’agit entre autres de la création d’utilisateurs et de groupes
QTSS avec des fichiers qtaccess, du contrôle de l’accès au contenu et de la configuration
de relais multidiffusion.
Contrôle de l’accès aux flux de données multimédias
Vous pouvez configurer l’authentification pour contrôler l’accès client aux fichiers de
données multimédia. Vous pouvez utiliser le Gestionnaire de groupe de travail pour spé-
cifier qui peut accéder aux fichiers multimédia ou vous pouvez utiliser un fichier d’accès.
Pour contrôler l’accès à l’aide d’Open Directory :
m Autorisez chaque utilisateur dans le Gestionnaire de groupe de travail. Pour en savoir
plus, reportez-vous au Guide d’administration d’Open Directory.
Pour contrôler l’accès à l’aide d’un fichier d’accès :
Deux schémas d’authentification sont pris en charge : basic et digest. Par défaut, le serveur
utilise la méthode d’authentification digest la plus sûre.
Il est également possible de contrôler l’accès à la liste de lecture et l’accès de l’administrateur à votre serveur de diffusion. L’authentification ne permet pas de contrôler l’accès aux
données diffusées à partir d’un serveur relais. L’administrateur du serveur relais doit configurer une d’authentification spécifique aux données relayées.
La fonctionnalité de gestion de l’accès utilisateur étant intégrée au serveur de diffusion,
elle est activée en permanence.
Pour que le contrôle d’accès fonctionne, vous devez disposer d’un fichier d’accès dans
le répertoire sélectionné comme répertoire multimédia. Si aucun fichier d’accès ne
figure dans le répertoire multimédia du serveur de diffusion, tous les clients ont accès
aux données du répertoire.
1 Servez-vous de l’utilitaire de ligne de commande qtpasswd pour créer des comptes
utilisateur avec mots de passe.
2 Créez un fichier d’accès et placez-le dans le répertoire multimédia à protéger.34 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime
3 Si vous souhaitez désactiver l’authentification d’un répertoire multimédia, supprimez
le fichier d’accès (qtaccess) ou renommez-le (par exemple, qtaccess.désactivé).
Création d’un fichier d’accès
Un fichier d’accès est un fichier texte appelé qtaccess et contenant des informations
sur les utilisateurs et les groupes autorisés à visualiser les données multimédia du
répertoire dans lequel le fichier d’accès est stocké.
Le répertoire que vous utilisez pour stocker les flux de données multimédias peut
contenir d’autres répertoires et chacun peut disposer de son propre fichier d’accès.
Lorsqu’un utilisateur tente de visualiser un fichier multimédia, le serveur interroge
un fichier d’accès qui lui indique si l’utilisateur est autorisé à visualiser les données
multimédias. Le serveur examine tout d’abord le répertoire contenant le fichier
multimédia. Si aucun fichier d’accès n’est trouvé, il examine le répertoire parent.
Le premier fichier d’accès trouvé est utilisé pour déterminer si l’utilisateur est autorisé
à visualiser le fichier multimédia.
Le fichier d’accès du serveur de diffusion fonctionne comme celui du serveur Web Apache.
Il est possible de créer un fichier d’accès avec n’importe quel éditeur de texte. Le nom du
fichier doit être qtaccess et le fichier peut contenir tout ou partie des informations suivantes :
AuthName
AuthUserFile
AuthGroupFile < nom de fichier de groupe>
require user
require group
require valid-user
require any-user
Les termes qui ne sont pas entre crochets pointus sont des mots-clés. Les informations
entre crochets pointus sont les informations que vous fournissez.
Enregistrez le fichier d’accès en texte brut (et non au format .rtf ou autre).
Voici une brève explication de chaque mot-clé :
 message est le texte que vos utilisateurs voient lorsque la fenêtre d’ouverture de session
apparaît. Le message est facultatif. Si votre message contient des espaces vides (par
exemple, l’espace entre les termes), placez l’intégralité du message entre guillemets.
 nom de fichier d’utilisateur est le chemin et le nom du fichier d’utilisateur.
Sous Mac OS X, le chemin par défaut est /Library/QuickTimeStreaming/Config/qtusers.
 nom de fichier de groupe est le chemin et le nom du fichier de groupe. Sous
Mac OS X, le chemin par défaut est /Library/QuickTimeStreaming/Config/qtgroups.
Un fichier de groupe est facultatif. Si vos utilisateurs sont nombreux, il est peut-être
plus commode de configurer un ou plusieurs groupes et d’en saisir les noms plutôt
que de dresser la liste des utilisateurs.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 35
 nom d’utilisateur est un utilisateur autorisé à ouvrir une session et à consulter
le fichier multimédia. Le nom d’utilisateur doit se trouver dans le fichier d’utilisateur
spécifié. Vous pouvez également spécifier valid-user, qui désigne tout utilisateur valide.
 nom de groupe est un groupe dont les membres sont autorisés à ouvrir une session
et à consulter le fichier multimédia. Le groupe et ses membres doivent apparaître
dans le fichier de groupe spécifié.
Vous pouvez également utiliser les balises d’utilisateur suivantes :
 valid-user désigne tout utilisateur défini dans le fichier qtusers. L’instruction “require
valid-user” indique que tout utilisateur authentifié dans le fichier qtusers a accès aux
fichiers multimédias. Si cette balise est utilisée, le serveur invite l’utilisateur à saisir
un nom d’utilisateur et un mot de passe.
 any-user permet à tout utilisateur de visualiser des données sans saisir de nom
ou de mot de passe.
 AuthScheme est un mot-clé avec les valeurs « basic » ou « digest » à un fichier
qtaccess. Le réglage d’authentification est alors remplacé répertoire par répertoire.
Si vous avez apporté des modifications personnalisées au fichier d’accès qtaccess
par défaut, sachez que tout changement des réglages utilisateur de diffusion dans
Admin Serveur affecte le fichier qtaccess par défaut à la racine du répertoire des
séquences. Par conséquent, les modifications personnalisées que vous avez apportées
ne seront pas conservées.
Éléments indispensables à l’accès aux données multimédia protégées
Les utilisateurs doivent disposer de QuickTime 5 ou ultérieur pour avoir accès à un fichier
multimédia pour lequel l’authentification digest est activée. Si votre serveur de diffusion
est configuré pour utiliser l’authentification basic, les utilisateurs doivent disposer de
QuickTime 4.1 ou ultérieur. Les utilisateurs doivent saisir leur nom d’utilisateur et leur
mot de passe pour visualiser le fichier. Les utilisateurs qui disposent d’une version anté-
rieure de QuickTime et tentent d’accéder à un fichier multimédia verront apparaître
le message d’erreur suivant “401 : Non autorisé”.
Ajout de comptes d’utilisateur et de mots de passe
Il est possible d’ajouter un compte d’utilisateur et un mot de passe en ouvrant
une session sur l’ordinateur serveur.
Pour ajouter un compte d’utilisateur :
1 Connectez-vous au serveur en tant qu’utilisateur root, ouvrez une fenêtre Terminal
et saisissez :
qtpasswd
Vous pouvez aussi utiliser sudo pour exécuter la commande comme root.
2 Saisissez un mot de passe pour l’utilisateur et tapez-le à nouveau lorsque vous y êtes invité.36 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime
Ajout ou suppression de groupes
Vous pouvez modifier le fichier /Library/QuickTimeStreaming/Config/qtgroups
dans n’importe quel éditeur de texte, du moment qu’il respecte ce format :
:
Pour Windows, le chemin est c:\Program Files\Darwin Streaming Server\qtgroups.
Pour les autres plate-formes prises en charge, le chemin est /etc/streaming/qtgroups.
Pour ajouter ou supprimer un groupe, il suffit de modifier le fichier de groupe configuré.
Apport de modifications au fichier d’utilisateur ou de groupe
Vous pouvez modifier le fichier d’utilisateur ou de groupe en ouvrant une session
sur l’ordinateur serveur.
Pour supprimer un utilisateur d’un fichier d’utilisateur ou de groupe :
1 Ouvrez une session sur l’ordinateur serveur en tant qu’administrateur et utilisez un éditeur
de texte pour ouvrir le fichier d’utilisateur ou de groupe.
2 Supprimez la ligne du nom d’utilisateur et des mots de passe cryptés dans le fichier
d’utilisateur.
3 Supprimez le nom d’utilisateur dans le fichier de groupe.
Pour changer le mot de passe d’un utilisateur :
1 Connectez-vous à l’ordinateur serveur en tant qu’utilisateur root, ouvrez Terminal
et saisissez :
qtpasswd
Vous pouvez aussi utiliser sudo pour exécuter la commande comme root.
2 Saisissez un nouveau mot de passe pour les utilisateurs.
Le mot de passe saisi remplace le mot de passe du fichier. Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 37
Configuration d’un relais multidiffusion
La configuration d’un relais multidiffusion vous permet de recevoir un flux monodiffusion d’un serveur et de le relayer vers un réseau local (LAN) en multidiffusion. (Le réseau
doit être activé pour la multidiffusion pour que les utilisateurs puissent accéder au flux.)
Voici les étapes à suivre pour la configuration.
Pour relayer un flux entrant en tant que flux multidiffusion :
1 Configurez un relais multidiffusion sur le serveur de diffusion :
a Si la source de diffusion du relais est configurée en tant que Monodiffusion automatique (Annonce), choisissez UDP annoncé comme Type de relais. Si la source de diffusion du relais est configurée en tant que Monodiffusion manuelle, choisissez Demander
une diffusion entrante comme Type de relais.
b Réglez l’IP source du relais sur 127.0.0.1.
c Configurez le chemin d’accès au fichier sdp annoncé (spécifié à l’étape 2) ou non
annoncé (copié manuellement sur le serveur) comme chemin d’accès au relais.
Il s’agit du chemin d’accès au répertoire Séquences de votre serveur de diffusion.
N’oubliez pas d’inclure l’extension “.sdp”.
d Si vous utilisez Monodiffusion automatique sur le diffuseur/encodeur, choisissez
« UDP annoncé » comme Type de relais. Si la source est une monodiffusion manuelle,
sélectionnez Demander une diffusion entrante.
e Laissez vides les zones de nom d’utilisateur et de mot de passe. L’authentification
n’est pas requise si vous utilisez l’adresse de bouclage (127.0.0.1).
f Créez une destination pour le relais en cliquant sur l’icône « + », puis spécifiez une adresse
de multidiffusion valide pour l’adresse IP de destination. Choisissez UDP non annoncé
comme Type de destination. Prenez un chiffre pair comme numéro de port de base UDP
(par exemple, entre 9000 et 9996). Le TTL multidiffusion est le nombre de routeurs par
lesquels la multidiffusion va passer, selon la typologie du réseau sur lequel vous travaillez.
g Cliquez sur Enregistrer.
2 Configurez QuickTime Broadcaster de façon à ce qu’il envoie une Monodiffusion
automatique (Annonce) ou une Monodiffusion manuelle au serveur.
Pour la Monodiffusion automatique, le nom de fichier spécifié dans Broadcaster est créé
sur le serveur (l’extension .sdp est ajoutée par défaut). Vous trouverez plus d’informations
sur la Monodiffusion automatique à la page 32. Pour la Monodiffusion manuelle, le fichier
.sdp doit être exporté de Broadcaster et copié manuellement dans le répertoire Séquences du serveur de diffusion en continu.
3 Une fois la diffusion démarrée, testez le flux tel qu’il apparaît depuis le serveur dans
QuickTime Player en ouvrant l’URL suivante : rtsp:///.38 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime
4 Pour permettre aux clients d’accéder au relais multidiffusion, faites une copie du fichier
SDP et modifiez celle-ci comme suit :
a Allez à la ligne qui commence par c=IN IP4 et remplacez l’adresse IP par celle
de multidiffusion indiquée à l’étape 1.
b Allez à la première ligne commençant par m= (généralement, m=audio) et remplacez
le 0 par le port de base spécifié à l’étape 1 (par exemple, 9000).
c Allez à la deuxième ligne commençant par m= (généralement, m=video), et remplacez
le 0 par le port de base plus 2 (9002).
5 Enregistrez le fichier à un emplacement accessible par les clients :
 Si vous placez le fichier sur un serveur HTTP ou FTP, les clients peuvent accéder
à la multidiffusion dans QuickTime Player en ouvrant l’une de ces URL :
 http:///
 ftp:///
 Si vous placez le fichier SDP de multidiffusion sur un serveur Web ou l’envoyez
par mail aux clients, ceux-ci peuvent l’ouvrir dans QuickTime Player.
 Si vous placez le fichier SDP de multidiffusion sur un serveur Web, le type MIME
doit être correctement configuré sur le serveur en tapant :
mime type extension application/sdp sdp
Vous pouvez de même ouvrir le fichier SDP ou l’URL dans QuickTime Pro, enregistrer
le fichier en tant que séquence autonome .mov et l’envoyer aux clients ou l’intégrer
à une page web, etc.
Vous pouvez arrêter une diffusion et en démarrer une nouvelle sous le même nom,
du moment que le nom du fichier SDP de diffusion n’est pas modifié. Cependant,
si vous modifiez un paramètre du fichier SDP, vous devez répéter les étapes 4 et 5
à chaque nouvelle diffusion.4
39
4 Dépannage et informations
techniques
Ce chapitre contient des informations sur les opérations
à effectuer si vous rencontrez des problèmes lors de
la diffusion de données.
Utilisation de fichiers d’historique pour surveiller la diffusion
de listes de lecture
Si vous activez la consignation, vous pouvez utiliser le fichier d’historique pour résoudre les problèmes qui se produisent au cours d’une diffusion. Voici quelques conseils
pour résoudre des problèmes pouvant survenir :
 Si les données de la liste de lecture ne sont pas diffusées, utilisez Admin Serveur
pour vous assurer que le serveur de diffusion est en cours d’exécution.
 Si le serveur de diffusion est en cours d’exécution, assurez-vous qu’un processus nommé
PlaylistBroadcaster est exécuté sur l’ordinateur serveur. Si tel est le cas, arrêtez la diffusion, supprimez du répertoire de données du serveur de diffusion le fichier SDP relatif
à la diffusion, puis redémarrez cette dernière. Un nouveau fichier SDP est généré lorsque vous redémarrez la diffusion.
Les fichiers multimédia ne sont pas diffusés correctement
Essayez de diffuser un échantillon de séquence afin de déterminer si le serveur
y parvient. Des échantillons sont fournis avec le serveur.
Si le serveur diffuse l’échantillon, le problème provient peut-être de la préparation
de votre fichier de film. Recréez le film.
Si l’échantillon n’est pas diffusé, le problème provient peut-être de l’ordinateur serveur
ou du réseau. Vérifiez les éléments suivants :
 Vérifiez l’activité du serveur de diffusion et, si nécessaire, réduisez le nombre maximal
de connexions ou le débit.40 Chapitre 4 Dépannage et informations techniques
 Si le problème se produit sur un ordinateur client, assurez-vous que l’utilisateur dispose
des réglages Proxy et Transport de diffusion en continu appropriés. L’administrateur
du réseau de l’ordinateur client doit pouvoir fournir les réglages corrects.
 Assurez-vous que le logiciel client gère le format de fichier diffusé.
 Vérifiez la structure de l’URL.
 Vérifiez la liste de lecture. Si vous avez créé une liste de lecture en boucle contenant
des fichiers MPEG-1 QuickTime à indices, les clients QuickTime risquent de rencontrer
des problèmes pour visualiser le flux.
Les utilisateurs ne peuvent pas se connecter à votre diffusion
Assurez-vous que QuickTime 4 (ou une version ultérieure) est installé sur l’ordinateur
client. Si les utilisateurs se connectent via un navigateur Web, assurez-vous que le plugin QuickTime 4 est installé correctement. Considérez également les éléments suivants :
 Assurez-vous que les utilisateurs disposent de l’URL correcte.
 Si les utilisateurs tentent de se connecter à votre diffusion via HTTP, veillez à désactiver tout serveur Web susceptible d’entrer en conflit avec votre serveur de diffusion.
Par ailleurs, assurez-vous que la diffusion en continu sur le port 80 est activée dans
la sous-fenêtre Réglages généraux d’Admin Serveur QTSS.
Les utilisateurs reçoivent des messages d’erreur lors
de la diffusion de données
Voici la signification des messages :
 Code d’erreur 401 : l’utilisateur a tenté d’accéder à un fichier protégé. La mise à niveau
vers QuickTime 5 ou une version ultérieure peut s’avérer nécessaire.
 Code d’erreur 404 : le serveur ne peut pas localiser l’URL saisie par l’utilisateur. Assurez-vous
que les utilisateurs saisissent l’URL appropriée pour la diffusion. Conseillez aux utilisateurs de
ne pas saisir une URL RTSP dans l’adresse d’emplacement du navigateur web. Les URL RTSP
sont utilisées uniquement avec la commande Ouvrir l’URL de QuickTime Player.
 Code d’erreur 415 : le fichier de film ne comporte pas d’indications ou dispose d’une
ressource compressée. Vous devez réaffecter des indications au film à l’aide de la version
Pro de QuickTime Player. Vous pouvez également essayer de diffuser de façon native des
fichiers MP3 à la demande (c’est-à-dire sous forme de téléchargement HTTP). La gestion
QTSS des flux MP3 concerne les flux en direct compatibles Shoutcast/Icecast (tels que
ceux créés par une liste de lecture MP3) ou les flux en direct d’autres diffuseurs en direct
compatibles MP3. Pour diffuser des fichiers MP3 individuels à la demande (plutôt que
sous forme de flux en direct), hébergez simplement ces fichiers sur un serveur web.Chapitre 4 Dépannage et informations techniques 41
 Code d’erreur 453 : le serveur est trop occupé pour que les utilisateurs puissent
visualiser le flux. Les utilisateurs doivent réessayer plus tard. Vous pouvez augmenter
le nombre maximal de connexions dans la sous-fenêtre Réglages généraux d’Admin
Serveur QTSS.
 Code d’erreur 454 : la connexion au serveur a été interrompue. Les utilisateurs doivent relancer la visualisation du flux. Vérifiez si le serveur se trouve derrière un coupefeu ou si le client utilise un logiciel de traduction d’adresses réseau (NAT). Consultez
« Diffusion de flux à travers des coupe-feu via le port 80 » à la page 31 et « Diffusion
à travers des coupe-feu ou des réseaux avec traduction d’adresses » à la page 32.
 Code d’erreur 5420 : le serveur n’est peut-être pas en cours d’exécution. Vérifiez-le
puis redémarrez-le si nécessaire. Vérifiez si le serveur se trouve derrière un coupe-feu
ou si le client utilise un logiciel de traduction d’adresses réseau (NAT). Consultez
les sections « Diffusion de flux à travers des coupe-feu via le port 80 » à la page 31
et « Diffusion à travers des coupe-feu ou des réseaux avec traduction d’adresses »
à la page 32.5
43
5 Utilisation de
QuickTime Broadcaster
Ce chapitre explique le fonctionnement de QuickTime
Broadcaster, le logiciel d’encodage en direct maintes
fois récompensé d’Apple pour la diffusion d’événements
en direct de qualité professionnelle.
QuickTime Broadcaster tire pleinement parti de QuickTime, la plus puissante technologie
multimédia numérique sur Internet. QuickTime Broadcaster, QuickTime Streaming Server
(QTSS) et QuickTime composent le premier système de diffusion Internet intégral basé
sur le format MPEG-4 du marché, ce qui vous permet d’atteindre le nombre sans cesse croissant des utilisateurs de QuickTime Player, mais aussi tout lecteur MPEG-4 compatible ISO.
QuickTime Broadcaster fournit une présentation basique incluant des préréglages pour
les configurations de diffusion les plus courantes, qui permet de démarrer la diffusion
en quelques clics. Vous pouvez aussi personnaliser vos propres réglages dans la vue
développée, puis les enregistrer et les partager avec d’autres.
Quand utiliser un serveur de diffusion
Pour envoyer votre contenu sur Internet ou à plusieurs personnes sur un réseau local
sur lequel la multidiffusion n’a pas été activée, vous avez besoin d’un serveur de diffusion. Le serveur de diffusion réplique le flux unique à partir de QuickTime Broadcaster
et autorise plusieurs lecteurs QuickTime Player à se connecter à la diffusion.
Vous pouvez utiliser QuickTime Broadcaster sans serveur de diffusion pour envoyer
votre contenu vers un seul spectateur (équipé de QuickTime Player), ou vers plusieurs
spectateurs à l’aide du mode de transmission en multidiffusion.44 Chapitre 5 Utilisation de QuickTime Broadcaster
Configuration de votre premier flux
Vous pouvez configurer votre premier flux et le diffuser en moins de cinq minutes.
Les instructions suivantes permettent de configurer une connexion directe un à un
(sans utiliser QTSS ni aucun autre logiciel de diffusion en continu) vers un ordinateur
doté de QuickTime Player.
Vous devez connaître l’adresse IP de l’ordinateur destinataire.
1 Connectez un caméscope ou un autre appareil d’entrée vidéo à votre ordinateur.
2 Ouvrez QuickTime Broadcaster et, si la fenêtre développée est ouverte, cliquez sur Masquer
les détails.
3 Choisissez les options dans les menus locaux Audio et Vidéo les plus proches de votre
situation.
4 Cliquez sur Afficher les détails, sur Réseau, puis choisissez Monodiffusion manuelle
dans le menu local Transmission.
5 Dans le champ Adresse, saisissez l’adresse IP de l’ordinateur destinataire.
Pour les autres réglages, conservez les valeurs par défaut.
6 Dans QuickTime Broadcaster, choisissez Fichier > Exporter SDP.
Le fichier enregistré dans cette étape est le fichier SDP (Session Description Protocol),
qui contient des informations dont votre public aura besoin pour regarder votre diffusion.
7 Envoyez ou copiez le fichier SDP vers l’ordinateur qui sera utilisé pour visualiser votre
contenu.
8 Sur l’ordinateur expéditeur, démarrez la diffusion en cliquant sur Diffuser dans la fenêtre
QuickTime Broadcaster.
Pour visualiser le contenu, double-cliquez sur le fichier SDP sur l’ordinateur destinataire.
Configuration de QuickTime Broadcaster
Dans cet exemple, QuickTime Broadcaster est installé sur un ordinateur portable.
Connectez un caméscope FireWire à l’ordinateur portable, mettez le caméscope
sous tension et vérifiez que QuickTime Broadcaster le reconnaît.
1 Ouvrez QuickTime Broadcaster et cliquez sur Afficher les détails.
2 Cliquez sur Vidéo et sélectionnez une source vidéo dans le menu local Source.
Si le caméscope est reconnu, il apparaît dans le menu Source. Les réglages vidéo doivent
être actifs également (non estompés).Chapitre 5 Utilisation de QuickTime Broadcaster 45
Si le caméscope n’apparaît pas dans le menu Source, quittez QuickTime Broadcaster,
assurez-vous que le caméscope est connecté et sous tension, puis ouvrez de nouveau
QuickTime Broadcaster. Si votre caméscope n’apparaît toujours pas, consultez le site
web de QuickTime ou le site web d’assistance et de support AppleCare pour en savoir
plus sur la compatibilité et les autres problèmes.
En cas de diffusion vers QTSS situé sur un autre ordinateur, comme dans notre exemple, il est recommandé d’utiliser la méthode de transmission Monodiffusion automatique (Annonce). Elle est simple à configurer.
3 Dans QuickTime Broadcaster, cliquez sur Afficher les détails, sur Réseau, puis choisissez
Monodiffusion automatique (Annonce) dans le menu local Transmission.
4 Dans la sous-fenêtre Réseau, tapez l’adresse IP ou le nom d’hôte de l’ordinateur destinataire, un nom pour le fichier diffusé, le nom d’utilisateur et le mot de passe de l’utilisateur de QuickTime Broadcaster, ainsi que la durée de mise en mémoire tampon
(ou acceptez la valeur par défaut).
Remarque : la durée de mise en mémoire tampon fixe le nombre de secondes
pendant lesquelles QuickTime place la diffusion en mémoire tampon avant la lecture.
Pour les connexions haut débit, QuickTime Player 6 (ou ultérieur) remplit la mémoire
tampon plus rapidement que le temps réel, ce qui permet la visualisation en mode
Lecture instantanée.
5 Cliquez sur Diffusion et démarrez QTSS (s’il n’est pas déjà en cours d’exécution) en sélectionnant l’ordinateur dans Admin Serveur, en cliquant sur Enchaînement QuickTime,
puis en cliquant sur Démarrer le service.
Pour déterminer si le flux en direct peut être visualisé sur un client, ouvrez QuickTime Player
sur un ordinateur client et choisissez Fichier > Ouvrir l’URL dans un nouveau lecteur.
6 Tapez l’URL RTSP (Real-Time Streaming Protocol) affichée dans la section Emplacement
de la fenêtre QuickTime Broadcaster (par exemple, rtsp://monserveur.com/monflux.sdp).
Remarque : l’URL reconnaît les majuscules et minuscules et doit être saisie exactement
comme dans la fenêtre de QuickTime Broadcaster.
La lecture du flux en direct doit alors commencer dans QuickTime Player.
7 Testez la configuration.
Ce test doit être le plus réaliste possible. Testez les éléments suivants :
 Configurez votre équipement tel qu’il sera utilisé pour la présentation réelle, si possible
au même emplacement.
 Demandez à un collègue de jouer le rôle du présentateur, ou mieux, demandez
au présentateur de participer au test, afin d’en faire une répétition.
 Vérifiez l’image vidéo et le son.
 Vérifiez que les clients du réseau local et d’Internet peuvent se connecter au flux
en direct.46 Chapitre 5 Utilisation de QuickTime Broadcaster
 Ajustez si nécessaire la position du caméscope et du microphone, ainsi que l’éclairage,
et résolvez les autres problèmes éventuels.
Choix d’une méthode de diffusion
La méthode de diffusion que vous choisissez dépend de la taille de l’audience prévue :
 Lorsque vous diffusez un événement en direct vers un seul spectateur, vous pouvez
utiliser QuickTime Broadcaster sur Mac OS X ; vous n’avez pas besoin d’un logiciel
serveur. L’envoi de contenu vers un seul destinataire est appelé monodiffusion.
La monodiffusion est la méthode de diffusion générale sur Internet la plus courante.
Le destinataire de la monodiffusion doit être équipé d’un ordinateur sur lequel
QuickTime Player, QuickTime Streaming Server (QTSS) ou Darwin Streaming Server
est installé. Si le destinataire est doté d’un logiciel serveur, le serveur peut transfé-
rer votre diffusion vers plusieurs spectateurs.
 Pour un public de quelques centaines d’utilisateurs connectés, un seul ordinateur
Mac peut exécuter à la fois QuickTime Broadcaster et QTSS. QuickTime Broadcaster
envoie le flux vers QTSS, qui renvoie ensuite le flux vers un groupe de clients.
Le nombre de clients pouvant se connecter à la diffusion dépend de la bande passante disponible et de la capacité du processeur. Une configuration Mac Pro classique prend en charge au moins 200 connexions DSL ou 400 connexions commutées.
Cette configuration convient bien aux cours en ligne, aux conférences ou à d’autres
événements dont l’audience est limitée.
 Si votre contenu doit être visualisé par un grand nombre de personnes, utilisez deux
ordinateurs, l’un avec QuickTime Broadcaster pour diffuser le flux, l’autre avec QTSS
pour diffuser le flux à de multiples spectateurs.
 Si vous êtes sur un réseau sur lequel la multidiffusion est activée, vous pouvez atteindre plusieurs spectateurs via une multidiffusion de votre contenu. La multidiffusion
est une méthode de diffusion sur un réseau local (et non sur Internet) utilisant un seul
flux qui est partagé entre tous les spectateurs de la diffusion. Chaque spectateur se
branche sur la diffusion comme une radio se branche sur une bande d’émission FM.
Sélection des réglages de compression
QuickTime Broadcaster fournit une large gamme de codecs audio et vidéo pour la
compression et la diffusion en continu en temps réel. Cette section vous aide à sélectionner les codecs les mieux adaptés à votre situation.
En général, il est préférable de définir les options audio avant les réglages vidéo.
Dans QuickTime Broadcaster, vous pouvez choisir n’importe quel compresseur parmi
ceux fournis avec QuickTime. Cela vous permet de sélectionner le codec le mieux
adapté au type de contenu en cours de diffusion et aux connexions de vos spectateurs.Chapitre 5 Utilisation de QuickTime Broadcaster 47
Pour les débutants, QuickTime Broadcaster inclut des réglages par défaut (des préréglages)
optimisés pour les types de contenu et de connexions les plus courants. Par exemple,
le réglage par défaut pour la parole est l’audio MPEG-4 (AAC) à 8 kHz mono. Si l’audio
MPEG-4 est généralement considéré comme un codec destiné à la musique, il fonctionne
également bien pour le contenu parlé.
Vous pouvez également créer vos propres réglages dans la sous-fenêtre Audio de
QuickTime Broadcaster. (Si vous ne voyez pas le bouton Audio, cliquez sur Afficher
les détails.) Les réglages que vous créez peuvent être enregistrés pour une utilisation ultérieure et partagés avec d’autres pour les utiliser avec leurs diffusions.
Pour de nombreux types de diffusion, choisissez les réglages vidéo après avoir déterminé
la compression audio. La qualité vidéo est généralement moins importante que celle de
l’audio, car un son haché ou confus est très difficile à comprendre et provoquera rapidement la frustration de votre public.
Les réglages de compression vidéo pour une diffusion dépendent du type d’animation
diffusée et de la bande passante disponible du côté des spectateurs. QuickTime Broadcaster
fournit des réglages par défaut (préréglages) pour les situations les plus courantes.
Par exemple, un contenu vidéo pour des clients situés sur un réseau local (LAN) utilise
le codec H.264 avec une taille d’image de 480 x 360 à la fréquence de 30 images par
seconde (ips), limitant ainsi le débit de données à 1 372 kilobits par seconde (kbps).
Un contenu vidéo pour des clients sur des connexions commutées utilise le codec
H.264 avec une taille d’image de 160 x 120 à la fréquence de 6 ips, limitant le débit
de données à 30 Kbps.
Création de préréglages
Après avoir sélectionné un compresseur à utiliser pour l’audio ou la vidéo, vous pouvez
affiner vos résultats en sélectionnant des options supplémentaires. Pour la plupart des
compresseurs audio, vous pouvez ajuster la fréquence d’échantillonnage ou opter pour
un son mono ou stéréo. Bon nombre de compresseurs vidéo vous permettent de définir des fréquences d’images et des réglages d’images clés.
Pour déterminer si vous pouvez personnaliser des réglages de codec :
m Dans la sous-fenêtre Vidéo de QuickTime Broadcaster, cliquez sur le bouton Options
à côté du nom du compresseur.
Si le bouton est estompé, aucun autre réglage n’est disponible.
Qu’est-ce qu’un fichier SDP ?
Un fichier SDP (Session Description Protocol) décrit les paramètres et les réglages
d’une diffusion, activant ainsi la réception du contenu par QuickTime Player.
Pour visionner une diffusion, ouvrez le fichier SDP à l’aide de QuickTime Player.48 Chapitre 5 Utilisation de QuickTime Broadcaster
Vous pouvez créer un fichier SDP pour n’importe laquelle des trois options
de transport suivantes :
 Monodiffusion automatique (Annonce) : le fichier SDP peut être créé automatiquement sur un serveur QuickTime Streaming Server spécifié. L’adresse de l’emplacement
apparaît uniquement dans ce cas.
 Monodiffusion manuelle : le fichier SDP est placé sur un serveur de diffusion
ou est ouvert directement dans QuickTime Player.
 Multidiffusion : le fichier SDP est ouvert manuellement dans QuickTime Player.
Pour créer un fichier SDP :
m Dans QuickTime Broadcaster, choisissez Fichier > Exporter > SDP.
Vous pouvez envoyer le fichier SDP vers un seul spectateur ou vers un serveur
de diffusion permettant à plusieurs spectateurs de se connecter à la diffusion.
Sélection des réglages réseau
Une diffusion en continu réussie requiert une bonne coordination entre les réglages
de codec et les réglages réseau. Si vous choisissez un codec haut débit pour être utilisé
sur une connexion lente, vous risquez de rencontrer des problèmes de visualisation.
Utilisez cette section pour vous aider à choisir les réglages réseau de votre diffusion
et comme point de départ pour le réglage des paramètres selon vos besoins.
Utilisation de la méthode Monodiffusion automatique
(Annonce)
Vous pouvez utiliser QuickTime Broadcaster pour diffuser vers QTSS à l’aide de la méthode
de transmission Monodiffusion automatique (Annonce). Pour cela, vous avez besoin
des éléments suivants :
 Un compte utilisateur QuickTime Broadcaster. QuickTime Broadcaster vous demande
le nom d’utilisateur et le mot de passe du compte, pour autoriser la création d’un fichier
SDP sur le serveur de diffusion. Si vous utilisez QuickTime Broadcaster et QTSS sur le
même ordinateur, vous n’avez pas besoin de compte utilisateur QuickTime Broadcaster.
 QTSS 4.0 (ou une version ultérieure) installé sur le serveur de diffusion.
Pour démarrer une diffusion de type Monodiffusion automatique :
1 Dans QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre développée
n’est pas ouverte) puis cliquez sur Réseau.
2 Choisissez Monodiffusion automatique (Annonce) dans le menu local Transmission.
3 Saisissez l’adresse IP ou le nom d’hôte du serveur destinataire, le nom du fichier diffusé,
le nom d’utilisateur et le mot de passe du compte utilisateur du serveur de diffusion (le
cas échéant) et la durée de mise en mémoire tampon (ou acceptez les réglages par défaut).Chapitre 5 Utilisation de QuickTime Broadcaster 49
4 Cliquez sur Diffuser.
Toutes les informations sont envoyées vers le serveur. Vous n’avez pas besoin de créer
de fichier SDP.
Utilisation de la méthode Monodiffusion manuelle
La monodiffusion manuelle est une méthode de diffusion qui requiert que vous exportiez
un fichier SDP de QuickTime Broadcaster vers un ordinateur destinataire identifié par son
adresse IP. L’application destinataire peut être un simple lecteur QuickTime Player, QTSS
ou Darwin Streaming Server (DSS). Si l’application destinataire est QTSS ou DSS, la diffusion est répétée et n’est plus limitée à une seule adresse IP.
Pour une diffusion via la méthode Monodiffusion manuelle :
1 Dans QuickTime Broadcaster, si la fenêtre développée n’est pas ouverte, cliquez
sur Afficher les détails.
2 Cliquez sur Réseau.
3 Choisissez une option dans le menu local Préréglage.
4 Choisissez Monodiffusion manuelle dans le menu local Transmission.
5 Saisissez l’adresse IP de l’ordinateur destinataire.
Pour afficher l’adresse IP d’un ordinateur sous Mac OS X, ouvrez Préférences Système,
cliquez sur Réseau, puis choisissez une option dans le menu local Afficher. Sur un ordinateur Windows, ouvrez le Panneau de configuration, puis ouvrez Connexions réseau.
6 Saisissez les numéros du port audio et du port vidéo (ou acceptez les numéros par défaut
si vous effectuez une diffusion de un à un) et la durée de mise en mémoire tampon
(ou acceptez la durée par défaut).
7 Si vous le souhaitez, saisissez des informations dans la rubrique Notes.
8 Cliquez sur Diffuser.
9 Choisissez Fichier > Exporter > SDP ou Fichier > Exporter > Film.
10 Spécifiez un nom pour le fichier SDP ou le film et cliquez sur Exporter.
Si le fichier est exporté vers QuickTime Player, l’utilisateur ouvre le fichier en choisissant
Fichier > Ouverture de fichiers.
Si le fichier est exporté vers QTSS ou DSS, l’utilisateur choisit Fichier > Ouvrir l’URL.
Consultez votre administrateur QTSS ou DSS pour connaître l’adresse URL correcte.
Utilisation de la méthode Multidiffusion
La multidiffusion est une méthode de diffusion sur un réseau local (et non sur Internet)
utilisant un seul flux qui est partagé entre tous les spectateurs de la diffusion. Chaque spectateur se branche sur la diffusion comme une radio se branche sur une bande d’émission FM.50 Chapitre 5 Utilisation de QuickTime Broadcaster
La multidiffusion requiert un réseau ayant accès à une dorsale de multidiffusion
(MBone) ou sur lequel la multidiffusion est activée.
Vous pouvez effectuer une multidiffusion sur un réseau local si la multidiffusion
y est activée. Contactez votre administrateur réseau pour savoir si votre réseau
prend en charge la multidiffusion.
Pour diffuser sur un réseau local à l’aide de la méthode de multidiffusion :
1 Dans QuickTime Broadcaster, si la fenêtre développée n’est pas ouverte, cliquez
sur Afficher les détails.
2 Cliquez sur Réseau.
3 Choisissez Multidiffusion dans le menu local Transmission.
4 Cliquez sur Créer une adresse IP.
Ainsi, l’adresse IP que vous utilisez pour envoyer la multidiffusion est saisie. Une adresse est
créée dans une plage réservée aux multidiffusions. Si votre administrateur réseau a affecté
des adresses de multidiffusion spécifiques, vous pouvez saisir une adresse manuellement.
5 Spécifiez un réglage de durée de vie (TTL) ou acceptez le réglage par défaut.
Ce réglage spécifie le nombre de fois qu’un flux multimédia peut être transféré d’un routeur
vers un autre, avant que le flux ne cesse d’être transmis. La valeur peut être n’importe quel
nombre compris entre 1 et 255. Une valeur de 1 atteint les ordinateurs client du réseau local.
Plus le nombre est grand, plus la destination des paquets en multidiffusion est lointaine.
6 Choisissez Fichier > Exporter > SPD ou Fichier > Exporter > Film.
Ainsi, vous créez un fichier SDP (session description protocol) ou un fichier de séquence
QuickTime, que vous pouvez envoyer à d’autres personnes. Pour visualiser la diffusion, double-cliquez sur le fichier SDP ou utilisez QuickTime Player pour ouvrir le fichier de séquence.
Aperçu de votre diffusion
Vous pouvez afficher un aperçu de votre diffusion dans la fenêtre de QuickTime Broadcaster,
avec ou sans compression. Vous pouvez également désactiver la fonction d’aperçu. Choisissez parmi les options suivantes :
 Pour afficher un aperçu de votre diffusion depuis la source, choisissez Source dans
le menu local Aperçu (au-dessus de la zone d’aperçu vidéo).
 Pour afficher un aperçu de votre diffusion avec compression, choisissez Compresser
dans le menu local Aperçu, puis faites votre sélection parmi les préréglages proposés
dans les menus locaux Audio et Vidéo. (Si aucun menu local n’apparaît sous la zone
d’aperçu, cliquez sur Masquer les détails.)
Sinon, cliquez sur Afficher les détails. Dans les sous-fenêtres Audio et Vidéo, choisissez
les préréglages des menus locaux Préréglage ou spécifiez des réglages de compression personnalisés. Dans la sous-fenêtre Vidéo, réglez le curseur Qualité pour obtenir
une meilleure image.Chapitre 5 Utilisation de QuickTime Broadcaster 51
 Pour désactiver la fonction d’aperçu, choisissez Aucun dans le menu local Aperçu.
L’aperçu vous montre la façon dont la diffusion apparaît dans des conditions idéales.
Il ne prend pas en compte les temps d’attente éventuels du réseau ou les limites
de bande passante.
Configuration d’une diffusion audio uniquement
Vous pouvez utiliser QuickTime Broadcaster pour diffuser du contenu audio tel
qu’un concert, un discours ou une réunion.
QuickTime Broadcaster fonctionne avec :
 le son issu de votre caméscope DV ou d’un autre appareil FireWire ;
 un lecteur CD externe (pas interne) ;
 un microphone ou une autre source audio analogique connectée aux ports d’entrée
audio de votre ordinateur ou à un appareil d’entrée audio USB, comme le Griffin iMic.
Pour configurer une diffusion audio :
1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre
développée n’est pas ouverte) et cliquez sur Audio.
2 Choisissez une source audio dans le menu local Source.
Si votre source audio n’apparaît pas dans le menu, quittez QuickTime Broadcaster,
assurez-vous que votre équipement est connecté et sous tension, puis réessayez.
3 Choisissez un réglage de compression adapté dans le menu local Préréglage ou spécifiez
des réglages personnalisés.
4 Cliquez sur Vidéo et assurez-vous que l’option « Activer le flux vidéo » n’est pas sélectionnée (ce qui désactive le flux vidéo).
Si l’audio comporte des commentaires ou que vous ne souhaitez pas les écouter, vous
pouvez les désactiver en décochant la case « Haut-parleur » dans la sous-fenêtre Audio.
Changement de source audio
QuickTime Broadcaster fonctionne avec l’audio d’un caméscope DV ou d’une webcam
iSight d’Apple, les ports d’entrée audio de votre ordinateur et les appareils d’entrée
audio USB tels que le Griffin iMic.
Pour choisir une source audio :
1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre
développée n’est pas ouverte) et cliquez sur Audio.
2 Choisissez une source audio dans le menu local Source.52 Chapitre 5 Utilisation de QuickTime Broadcaster
Si une source audio est branchée et fournit une entrée, vous devriez entendre du son via
l’ordinateur (si l’option « Haut-parleur » de la sous-fenêtre Audio est cochée) et les réglages audio devraient être disponibles (non estompés).
Si votre source audio n’apparaît pas dans le menu local Source, quittez QuickTime
Broadcaster, assurez-vous que votre équipement est connecté et sous tension,
puis réessayez.
Ajout de notes à votre diffusion
Vous pouvez ajouter un titre, une note de droits d’auteur et d’autres annotations
à votre diffusion.
Pour ajouter des notes :
1 Dans QuickTime Broadcaster, cliquez sur Réseau.
Si vous ne voyez pas le bouton Réseau, cliquez sur Afficher les détails.
2 Sous Notes, remplissez les champs souhaités.
Votre public peut consulter ces informations en choisissant Fenêtre > Afficher les informations de la séquence dans QuickTime Player. (Les spectateurs qui ne possèdent pas
QuickTime Pro ne voient que les trois premières annotations.)
Ajout d’indices à un fichier de séquence
Vous pouvez enregistrer une copie compressée avec indices de votre diffusion sous
la forme d’un fichier de séquence. La séquence est enregistrée sur l’ordinateur à partir
duquel vous effectuez la diffusion et est prête à être envoyée vers un serveur de diffusion QuickTime pour que les spectateurs puissent voir une rediffusion de l’événement.
Pour enregistrer votre diffusion et ajouter des indices à un fichier de séquence :
1 Choisissez QuickTime Broadcaster > Préférences.
2 Dans le champ Enregistrement, spécifiez un chemin (ou cliquez sur Choisir pour choisir
un emplacement) vers lequel stocker votre fichier de diffusion.
3 Sélectionnez « Indice pour le serveur de diffusion ».
Cette option ajoute une piste d’indices contenant des informations nécessaires pour
diffuser votre séquence.
4 Saisissez un nom pour votre séquence et cliquez sur OK.
5 Dans la fenêtre de QuickTime Broadcaster, sélectionnez « Enreg. sur le disque ».
6 Cliquez sur Diffuser.
Remarque : l’archive d’une diffusion peut utiliser une grande quantité d’espace disque.
Si la diffusion dure plusieurs heures, plusieurs fichiers .mov seront créés. Si tel est le cas, les
fichiers sont numérotés en ordre séquentiel (monfilm.mov, monfilm2.mov, etc. par exemple).Chapitre 5 Utilisation de QuickTime Broadcaster 53
Enregistrement de réglages à l’aide de préréglages
Vous pouvez enregistrer vos réglages audio, vidéo et réseau afin de les réutiliser
ultérieurement.
Pour créer un préréglage :
1 Dans QuickTime Broadcaster, choisissez les réglages dans les sous-fenêtres Audio,
Vidéo et Réseau.
Si vous ne voyez pas ces sous-fenêtres, cliquez sur Afficher les détails.
2 Choisissez Enregistrer ce préréglage dans le menu local Préréglage.
3 Pour réutiliser ces réglages, choisissez votre préréglage dans le menu local Préréglage
de chaque sous-fenêtre (Audio, Vidéo ou Réseau).
4 Pour transférer vos préréglages vers un autre ordinateur, choisissez QuickTime Broadcaster >
Préférences et saisissez un chemin dans le champ Répertoire des préréglages (ou cliquez
sur Choisir et sélectionnez une destination).
Remarque : les préréglages doivent être situés dans ~/Library/QuickTime Broadcaster.
Les autres personnes utilisant vos préréglages doivent placer leurs fichiers au même
emplacement sur leurs ordinateurs.
Modification de la taille de l’image de diffusion
Vous pouvez modifier la taille de l’image visualisée par votre public. Les grandes
tailles d’images sont souvent souhaitables mais elles requièrent plus de bande passante t peuvent être trop exigeantes pour des ordinateurs plus lents (expéditeurs
de la diffusion et destinataires). Si le son est plus important que la vidéo dans votre
diffusion (diffusion d’un concert ou d’une conférence, par exemple), pensez à réduire
la taille d’image pour allouer plus de bande passante à l’audio.
Pour modifier la taille de l’image vidéo, votre public reçoit :
1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre
développée n’est pas ouverte) et cliquez sur Vidéo.
2 Dans la zone Compression, saisissez des nouvelles valeurs dans les champs Largeur
et Hauteur.
Cette procédure n’affecte pas la taille de l’image Aperçu dans QuickTime Broadcaster.
Changement de source vidéo
QuickTime Broadcaster fonctionne avec les caméscopes DV, les webcams iSight Apple,
les caméscopes IIDC (pris en charge uniquement dans Mac OS X 10.2 et versions ulté-
rieures) et d’autres sources DV (telles que les boîtiers de conversion analogique/DV)
que vous pouvez connecter à votre ordinateur via l’interface FireWire.54 Chapitre 5 Utilisation de QuickTime Broadcaster
Pour choisir la source vidéo :
1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre
développée n’est pas ouverte) et cliquez sur Vidéo.
2 Choisissez une option dans le menu local Source.
Si une source vidéo est connectée et fournit une entrée, elle devrait apparaître dans
le menu Source et une image d’aperçu devrait s’afficher (si la fonction d’aperçu est
activée). Les réglages vidéo devraient également être disponibles (non estompés).
Si votre appareil d’entrée n’apparaît pas dans le menu Source, quittez QuickTime
Broadcaster, vérifiez que votre appareil d’entrée est connecté et sous tension,
puis ouvrez QuickTime Broadcaster à nouveau. Si votre appareil d’entrée n’apparaît
toujours pas, il se peut qu’il soit incompatible avec QuickTime Broadcaster.
Choix de l’assembleur de paquets
Dans la plupart des cas, les réglages de l’assembleur de paquets par défaut pour chaque compresseur n’ont pas besoin d’être modifiés. Si vous connaissez le protocole RTP
et souhaitez affiner les réglages de l’assembleur de paquets, vous pouvez modifier
les réglages en cliquant sur le bouton Assembleur de paquets dans les sous-fenêtres
Audio et Vidéo et en saisissant des valeurs dans les zones de dialogue qui apparaissent
:
 Dans le cas d’une diffusion AAC vers des téléphones portables, changez l’assembleur
de paquets sur MPEG-4 LATM Audio.
 Pour une diffusion H.263 vers des téléphones portables, changez l’assembleur
de paquets vidéo sur H.263 3GPP.
Enregistrement de réglages de diffusion
Avec QuickTime Broadcaster, vous pouvez créer vos réglages de diffusion personnalisés
et les enregistrer sous des documents pour les utiliser ultérieurement ou les partager
avec d’autres personnes.
Pour enregistrer un réglage de diffusion personnalisé :
1 Choisissez vos réglages audio, vidéo et réseau.
2 Choisissez Fichier > Enregistrer les réglages de diffusion sous.
3 Spécifiez un nom de fichier et un emplacement.
Le fichier que vous enregistrez aura pour extension .qtbr.
Une fois le fichier enregistré, double-cliquez sur son icône pour ouvrir QuickTime
Broadcaster (si l’application est installée) avec les réglages personnalisés en place.
Vous pouvez ensuite cliquer sur Diffuser pour commencer la diffusion.Chapitre 5 Utilisation de QuickTime Broadcaster 55
Diffusion vers des téléphones portables
QuickTime Broadcaster inclut la prise en charge de la diffusion vers des téléphones
portables compatibles. Il inclut également des préréglages pour les réglages classiques
utilisés lors de la diffusion vers des téléphones portables.
Pour créer des réglages personnalisés pour une diffusion en continu vers des téléphones
portables, contactez le fabricant du téléphone pour déterminer le codec audio et vidéo
pris en charge. Généralement, les téléphones multimédia prennent en charge la vidéo
MPEG-4 et H.263 et l’audio AAC, AMR ou QCELP.
À propos des coupe-feu
Les coupe-feu de réseau, qui protègent les réseaux internes d’attaques extérieures,
peuvent interférer avec votre capacité à envoyer et à recevoir des diffusions.
Si vous effectuez une diffusion, contactez votre administrateur réseau pour vous assurer que les ports sortants sont ouverts pour votre diffusion. De nombreux fournisseurs
d’accès à Internet et réseaux d’entreprise bloquent ces ports pour limiter l’utilisation
de bande passante et renforcer la sécurité.
Lorsque vous envoyez une diffusion, QuickTime Broadcaster utilise les ports suivants
par défaut :
 Monodiffusion automatique (Annonce) : 554.
 Monodiffusion manuelle : saisissez les informations de port dans la sous-fenêtre
Réseau.
Pour modifier un numéro de port, ajoutez deux points et le numéro de port
à la fin de l’adresse IP. 127.0.0.1:7070, par exemple.
Les personnes situées derrière un coupe-feu sont susceptibles de visualiser votre diffusion en ajustant les réglages réseau dans les préférences de QuickTime ou en configurant l’utilisation d’un serveur proxy dans les préférences Réseau.
Limitation de l’accès à votre diffusion
Pour limiter le nombre de spectateurs de votre diffusion, vous pouvez intégrer le film
de diffusion dans une page web et contrôler l’accès à la page HTML à l’aide des réglages de sécurité de votre serveur web.
Si vous distribuez le fichier SDP ou le film d’annonce de diffusion, toute personne
qui obtient le fichier peut visualiser le flux, à moins que vous ne diffusiez derrière
un coupe-feu. Si la diffusion est une monodiffusion manuelle, seul l’ordinateur avec
l’adresse IP spécifiée peut se connecter.56 Chapitre 5 Utilisation de QuickTime Broadcaster
Conseils et dépannage
Les conseils qui suivent vous aideront à tirer le meilleur parti de QuickTime Broadcaster.
Je suis invité à saisir un mot de passe
Lorsque vous diffusez vers QTSS ou DSS via la méthode Monodiffusion automatique
(Annonce), vous devez fournir un nom d’utilisateur et un mot de passe pour qu’un compte
utilisateur et un fichier de diffusion puissent être créés sur l’ordinateur serveur de diffusion.
Pour savoir comment créer un compte utilisateur spécial, consultez l’Aide de QTSS ou de DSS.
Le nom d’utilisateur et le mot de passe requis pour une monodiffusion automatique
ne sont pas les mêmes que ceux utilisés pour l’utilitaire d’administration web du serveur
de diffusion.
Utilisation optimisée de la bande passante disponible
Lorsque vous configurez votre diffusion, prenez en compte les éléments suivants :
 La vitesse de chargement lors d’une diffusion. La plupart des fournisseurs d’accès
à Internet limitent la vitesse de chargement entre 128 kilobits par seconde et 256 Kbps.
Ce qui signifie que le débit de données total pour votre diffusion (audio et vidéo) ne
doit pas dépasser votre vitesse de chargement. En réalité, définissez-la sur une valeur
largement inférieure à votre vitesse de chargement pour éviter tout risque de congestion du réseau.
 La vitesse de connexions réseau de vos spectateurs. Par exemple, si les spectateurs
se connectent à l’aide de modems 56K, vous aurez certainement intérêt à limiter le débit
de données total de votre diffusion à 33 Kbps. Les spectateurs bénéficiant de connexions
plus rapides peuvent gérer des débits supérieurs, mais même pour ceux disposant d’un
accès à Internet de type T1, il est préférable de limiter le débit de données de votre diffusion à 410 Kbps. (Ces chiffres sont des estimations.)
 La façon dont l’ordinateur serveur de diffusion ou de diffusion en continu est connecté
au réseau et le nombre attendu de spectateurs. Si l’ordinateur serveur de diffusion
en continu est sur une ligne T1, un maximum d’environ 25 spectateurs peuvent
se connecter à votre diffusion en utilisant des modems commutés 56K.
Conseils pour le choix des réglages de compression vidéo
Pour de nombreux types de diffusion, choisissez les réglages vidéo après avoir déterminé la compression audio. La qualité vidéo est généralement moins importante que
celle de l’audio, car un son haché ou confus est très difficile à comprendre et provoquera rapidement la frustration de votre public.
Les réglages de compression vidéo pour une diffusion dépendent largement du type
de vidéo diffusée et de la bande passante disponible du côté des spectateurs. QuickTime
Broadcaster fournit des réglages par défaut (préréglages) pour les situations les plus
courantes.Chapitre 5 Utilisation de QuickTime Broadcaster 57
Par exemple, un contenu vidéo pour des clients situés sur un réseau local (LAN) utilise le
codec H.264 avec une taille d’image de 480 x 360 à la fréquence de 30 images par seconde
(ips), limitant ainsi le débit de données à 1 372 kilobits par seconde. Un contenu vidéo pour
des clients sur des connexions commutées utilise le codec H.264 avec une taille d’image
de 160 x 120 à la fréquence de 6 ips, limitant le débit de données à 30 Kbps.
Conseils pour le choix des réglages de compression audio
En général, il est préférable de définir les options audio avant les réglages vidéo. Dans
QuickTime Broadcaster, vous pouvez choisir n’importe quel codec fourni avec QuickTime.
Cela vous permet de sélectionner le codec le mieux adapté au type de contenu en cours
de diffusion et aux connexions de vos spectateurs.
Pour les débutants, QuickTime Broadcaster inclut des réglages par défaut (préréglages)
optimisés pour les types de contenu et de connexions les plus courants. Par exemple,
le réglage par défaut pour la parole est l’audio MPEG-4 (AAC) à 8 kHz mono. (Même
si l’audio MPEG-4 est généralement considéré comme un codec destiné à la musique,
il fonctionne également bien pour le contenu parlé.)
Pour de l’audio contenant de la musique, le réglage par défaut est le format audio MPEG-4
(AAC) à 20 kilobits par seconde (Kbps) pour les utilisateurs avec une connexion commutée
et 128 Kbps pour les utilisateurs d’un réseau local.
Si la vidéo devient floue, hachée ou figée
Si l’image de votre diffusion apparaît floue, hachée ou figée, il peut s’agir d’une prise
de vue avec un caméscope sans mise au point, d’une congestion réseau ou de réglages
de compression inadaptés.
Pour améliorer la qualité de diffusion, essayez l’une ou plusieurs des opérations suivantes :
 Effectuez la mise au point sur le caméscope.
 Réduisez le nombre de spectateurs simultanés (à l’aide de la sous-fenêtre QTSS
d’Admin Serveur).
 Si un destinataire rencontre des problèmes d’images hachées en cours de lecture,
ajustez le débit de données de diffusion.
 Vérifiez que votre diffusion utilise un codec vidéo optimisé pour la diffusion, comme
le codec H.264 ou MPEG-4.
 Réduisez la fréquence d’images ou la taille d’image de la vidéo.
Le meilleur moyen d’obtenir une diffusion de bonne qualité est de tester différents
réglages avant la diffusion. Vous pourrez ainsi déterminer la combinaison de réglages
optimale pour votre contenu spécifique et les vitesses de connexion de vos utilisateurs.58 Chapitre 5 Utilisation de QuickTime Broadcaster
Automatisation de QuickTime Broadcaster avec AppleScript
Vous pouvez utiliser AppleScript pour contrôler QuickTime Broadcaster. Par exemple,
vous pouvez utiliser un script pour sélectionner les réglages à utiliser, pour déterminer
l’état d’une diffusion et pour démarrer, arrêter ou mettre en pause un flux.
Pour des informations détaillées sur les fonctionnalités d’AppleScript prises en charge
par QuickTime Broadcaster, faites glisser l’icône de QuickTime Broadcaster sur celle
de l’Éditeur de script dans /Applications/AppleScript/.6
59
6 Exemple de configuration
Ce chapitre décrit les principaux composants requis pour
une configuration générique de diffusion sur le Web, ainsi
que la façon dont ils sont interconnectés.
Les instructions de configuration qui suivent prennent en considération une configuration
de type éducative (campus universitaire, par exemple), mais l’exemple peut s’adapter
à plusieurs utilisations :
 L’enseignement à distance.
 Les communications d’entreprise à l’intention des employés, clients, fournisseurs
ou actionnaires.
 Un concert ou une présentation ponctuels.
 La diffusion dans une crèche à l’intention des parents.
Enchaînement de présentations, en direct et à la demande
L’exemple de l’illustration suivante montre comment l’administrateur réseau d’une université peut configurer un serveur de diffusion et d’autres composants pour diffuser des pré-
sentations, en direct et à la demande, aux étudiants qui utilisent des ordinateurs client
connectés au réseau du campus et à Internet.60 Chapitre 6 Exemple de configuration
Cette configuration permet aux étudiants qui ne peuvent pas se déplacer pour assister
au cours de le visualiser en ligne. Elle permet également aux étudiants de revoir ulté-
rieurement une partie du cours en visualisant une version archivée sur leur ordinateur.
La configuration de cet exemple, illustrée ci-dessus, présente les caractéristiques suivantes :
 Un réseau local existant doté de connexions Ethernet aux salles de cours et aux
amphithéâtres à partir desquels les présentations en direct doivent être diffusées.
 Un caméscope numérique DV et un microphone installés dans une salle de cours
ou un amphithéâtre pour convertir la présentation en direct au format numérique.
Le caméscope effectue un enregistrement DV haute qualité de la présentation
et fournit le signal numérique qui sera codé pour la diffusion en direct.
 Le caméscope numérique DV est connecté par l’intermédiaire d’un port FireWire à un
ordinateur portable qui exécute QuickTime Broadcaster, lequel encode la présentation
en direct numérisée et transmet le signal via une connexion Ethernet au serveur de diffusion sur le réseau du campus.
 Un serveur de diffusion, tel qu’un serveur Xserve monté en rack, fonctionnant sans
moniteur ni clavier. Le serveur exécute Mac OS X Server avec QTSS configuré pour
transmettre la présentation encodée en direct sous forme de flux monodiffusion vers
chaque ordinateur client (sur le réseau du campus ou sur Internet) qui se connecte
à la diffusion. Le serveur Xserve est livré avec Mac OS X Server et QTSS préinstallés.
Serveur
de diffusion
Broadcaster
Internet
Clients sur Internet
Clients sur
le réseau localChapitre 6 Exemple de configuration 61
 Différents types d’ordinateur client disposant de QuickTime Player ou de tout autre
logiciel compatible MPEG-4 pour accéder au serveur de diffusion Xserve via le réseau
du campus. D’autres ordinateurs client peuvent accéder au serveur de diffusion
via Internet.
 L’ordinateur portable de diffusion qui exécute iMovie est utilisé pour produire
des versions à la demande haute qualité de la présentation en direct une fois
celle-ci terminée. La présentation numérisée enregistrée est transférée, via la
connexion FireWire, du caméscope DV vers l’ordinateur afin d’y être compressée.
Remarque : QuickTime Broadcaster peut être configuré pour enregistrer sur disque
le flux en direct encodé en vue de son archivage. Pour un résultat optimal, il est cependant préférable que la séquence soit encodée séparément.
 L’ordinateur portable de diffusion est également utilisé pour contrôler le serveur
Xserve à distance via l’application Admin Serveur (ou via Admin Web, l’application
d’administration QTSS basée sur le Web).
Remarque : l’ordinateur portable peut également être connecté sans fil au réseau local
via une borne d’accès AirPort pour une portabilité accrue. La borne d’accès AirPort est
compatible avec la norme 802.11 et fonctionne bien avec QTSS. Sa bande passante est
largement suffisante pour notre exemple de configuration, tant que d’autres clients
n’imposent pas de charge importante sur la même borne d’accès.
Configuration
Les étapes ci-après montrent comment configurer le serveur QTSS et les autres composants requis pour la diffusion en direct et à la demande dans notre environnement
universitaire hypothétique.
Étape 1 : Préparation des lieux
Une salle de cours standard n’offre pas un environnement de diffusion et d’enregistrement comparable à celui d’un studio professionnel de télévision ou d’enregistrement.
Toutefois, les mesures suivantes permettent d’obtenir des résultats satisfaisants :
 Rendez-vous dans la salle de classe que vous souhaitez utiliser pour la diffusion
en direct, fermez les portes et essayez de détecter tout bruit qui risquerait d’interfé-
rer avec une diffusion. Si vous remarquez du bruit provenant d’une pièce, d’une salle
de jeu vidéo, du trafic dans la rue ou de toute autre source et que vous ne pouvez
pas l’éliminer, trouvez une autre pièce.
 S’il n’y a pas de problème de bruit, placez-vous au centre de la pièce, tapez dans
vos mains ou criez, et déterminez la présence éventuelle d’un écho. La présence
d’un écho risque de nuire à la qualité sonore de la diffusion en direct. Vous pouvez
réduire ou supprimer l’écho en posant d’épais rideaux sur les murs nus ou en disposant des panneaux acoustiques en damier sur chaque mur.62 Chapitre 6 Exemple de configuration
 Examinez ensuite les sols et les meubles. Les sols recouverts de tapis et les chaises
rembourrées constituent un environnement idéal. Le pupitre doit être recouvert
d’un tissu ou d’une surface rembourrée pour éviter tout bruit provoqué, par exemple,
par un verre que l’orateur pose sur la surface.
 Considérez les problèmes d’éclairage. Pour un meilleur contrôle, vous devez pouvoir
tirer les stores et compléter l’éclairage de la pièce par un kit d’éclairage portatif pouvant être rapidement installé.
Étape 2 : Préparation du réseau
Vérifiez que la pièce où doit avoir lieu la diffusion en direct est équipée d’une connexion
Ethernet. Si nécessaire, installez, réparez ou remplacez les câbles et les connecteurs
à l’aide de composants de haute qualité.
N’oubliez pas que la diffusion, surtout en direct, peut solliciter fortement les ressources
réseau, en particulier la bande passante disponible. Pour vous assurer que le réseau peut
gérer la charge supplémentaire, il peut être nécessaire d’effectuer l’une ou l’ensemble des
opérations suivantes :
 Déterminez la capacité du réseau existant et calculez le trafic supplémentaire
prévisible qui sera généré par la diffusion en direct et à la demande.
 Tracez la carte des segments de bande passante de votre réseau, en indiquant
la capacité entre tous les points.
 Déterminez les applications utilisées dans votre réseau, leur mode d’utilisation,
l’emplacement où elles sont hébergées, ainsi que la bande passante qu’elles utilisent
normalement pendant les périodes de forte utilisation et de faible utilisation.
 En fonction de la configuration et de la capacité de votre réseau, sélectionnez
l’emplacement approprié pour installer votre serveur de diffusion, en évitant
les goulets d’étranglement potentiels.
 Si nécessaire, augmentez la capacité du réseau (ajout de lignes T1, routeurs, commutateurs, etc.) afin de gérer le nombre maximum prévu de spectateurs simultanés
en direct, en plus du trafic réseau maximal habituel.
Remarque : un réseau local typique fournit en interne une bande passante
de 10 à 100 Mbps, une ligne T1 une bande passante de seulement 1,5 Mbps.
Les lignes T1 fonctionnent correctement avec les protocoles HTTP et FTP, car les demandes sont alors brèves ou peu urgentes, tandis que l’enchaînement est beaucoup plus
exigeant. Ce dernier ne supporte aucun ralentissement : pour garantir la diffusion,
les données doivent être transférées au moins aussi rapidement que le débit original.
Dans cet exemple, nous supposons un maximum de 10 spectateurs simultanés, pour
moitié via le réseau local et pour moitié via Internet, et un débit d’environ 256 Kbps
pour chaque flux de monodiffusion. La bande passante maximale complémentaire
requise est alors d’environ 3,2 à 3,3 Mbps. Chapitre 6 Exemple de configuration 63
Cette estimation inclut une marge complémentaire de 25 à 30 pour cent pour
l’encombrement réseau non planifié et les pics de transmission de flux susceptibles
de survenir pour diverses raisons.
Étape 3 : Configuration de votre serveur de diffusion
Un ordinateur administrateur doit être configuré avant que vous puissiez configurer et gérer
votre serveur de diffusion si, comme dans cet exemple, le serveur de diffusion est exécuté
en mode headless, soit sans moniteur. Pour plus d’informations sur la configuration
d’un ordinateur administrateur, consultez le manuel Mac OS X Server Premiers contacts
avec la version 10.5 ou ultérieure (inclus sur le disque d’installation de Mac OS X Server).
Pour configurer et gérer QTSS, vous devez utiliser l’application Admin Serveur, installée
avec Mac OS X Server. Après la configuration de Mac OS X Server, vous pouvez également
utiliser l’application d’administration basée sur le Web, Admin Web, pour administrer QTSS
à distance à partir de n’importe quel ordinateur connecté directement au réseau local
ou à Internet. Dans cet exemple, nous supposons que l’ordinateur portable de diffusion
du système de diffusion illustré est également utilisé à cet effet.
Bien que le serveur Xserve soit livré avec Mac OS X Server et QTSS préinstallés, ces logiciels
doivent être configurés pour le réseau particulier auquel ils sont ajoutés et pour les utilisations spécifiques pour lesquelles ils sont prévus. Pour plus d’informations sur la configuration de Mac OS X Server, consultez le guide Premiers contacts.
Voici quelques-unes des questions auxquelles il est nécessaire de répondre lors
de la configuration d’un serveur de diffusion :
 L’ordinateur serveur peut-il être dédié uniquement à l’enchaînement ?
Il est préférable que votre serveur de diffusion ne soit pas également chargé du service
Web, du service de courrier ou de tout autre service. Notre exemple concerne un serveur
de diffusion dédié.
 Quelle est la quantité de mémoire vive (RAM) nécessaire ?
La quantité minimale de mémoire requise pour exécuter QTSS est de 128 mégaoctets (Mo). Prévoyez environ 256 Mo de RAM pour chaque tranche de 50 Mo de débit
prévu. Cette configuration suppose 256 Mo de RAM.
 Quelle est la quantité d’espace disque requise ?
Les fichiers vidéo peuvent être très volumineux. Une présentation d’une heure avec
indications, codée à 300 Kbps (non optimisée pour un serveur), nécessite environ
135 Mo d’espace sur disque dur. Un disque dur de 60 Go peut ainsi stocker plus
de 400 présentations à ce format.
Voici une formule pour calculer la taille des fichiers de diffusion :
débitEnBits / 8 bits * duréeEnSecondes = taille du fichier64 Chapitre 6 Exemple de configuration
Exemple pour un flux d’une heure à 300 Kbps :
300 000 / 8 bits * 3 600 = 135 000 000 octets = 135 Mo
De nombreux réseaux locaux incluent des systèmes de stockage RAID (Redundant
Array of Independent Disks) qui procurent des quantités beaucoup plus importantes
d’espace disque.
Si vous stockez les fichiers de diffusion ailleurs que dans l’emplacement QTSS par défaut
(à savoir /Bibliothèque/QuickTimeStreaming/Movies), vous devrez saisir le chemin dans
la sous-fenêtre Réglages de QuickTime Streaming, dans Admin Serveur. Consultez la section « Changement du répertoire réservé aux flux de données multimédias » à la page 27.
Placez tout fichier SDP (Session Description Protocol) faisant référence à des diffusions
Web en direct dans le même emplacement, afin qu’ils puissent être reconnus par QTSS.
Dans cet exemple, tous les fichiers de diffusion archivés et les fichiers de référence SDP
résident dans le dossier Movies par défaut sur le serveur de diffusion.
 Le serveur de diffusion est-il équipé d’une carte réseau appropriée ?
La carte réseau est un composant essentiel de votre serveur de diffusion, dans la mesure
où elle permet la connectivité Ethernet entre le serveur et votre public. Une carte Ethernet doit fournir un débit minimum de 100 mégaoctets (environ 0,1 gigabit) par seconde.
 Où sera placé le serveur de diffusion sur le réseau ? Un coupe-feu sera-t-il utilisé ?
Le serveur de diffusion doit se trouver dans un emplacement accessible par les utilisateurs (les étudiants, dans notre exemple) qui se connectent à la fois via le réseau
local et via Internet. Il doit également être protégé par un coupe-feu contre l’accès
non autorisé au serveur et aux fichiers multimédia archivés.
Mac OS X Server inclut le service Coupe-feu IP, qui analyse les paquets IP entrants
et les rejette ou les accepte en fonction d’un ensemble de filtres que vous créez.
Pour plus d’informations sur la configuration de ce service, consultez le guide
d’administration des services réseau.Chapitre 6 Exemple de configuration 65
Des ports spécifiques doivent être ouverts dans le coupe-feu pour autoriser les demandes RTSP (Real-Time Streaming Protocol) provenant des utilisateurs, les séquences vidéo
et audio codées provenant du diffuseur, ainsi que les flux sortants transmis aux clients
via le réseau local et Internet. Le tableau ci-après répertorie les ports utilisés par QTSS
pour les demandes entrantes et sortantes(pour en savoir plus sur l’activation de diffusion QuickTime en présence d’un coupe-feu, consultez la section « Sécurité et accès »
à la page 30).
Dans cet exemple de configuration, nous supposons que les étudiants qui se connectent
au serveur de diffusion via Internet ne se trouvent pas derrière leur propre coupe-feu.
Dans ce cas, il n’est pas possible d’activer la diffusion sur le port 80, port généralement
destiné au transport du trafic Internet HTTP et autorisé par la plupart des coupe-feu.
Utilisation Ports
Protocoles Remarques
Répondre aux
messages des
clients (comme
Lecture et Pause)
TCP (le client démarre -> QTSS)
554, 7070, 8000, 8001, 80
RTSP, RTP,
RTCP,
MP3
Le port principal est 554. Le port
80 est pris en charge par le client
QT en tant qu’autre port TCP
possible. Ces ports envoient également des données aux clients.
Envoi de données multimé-
dias et réception
de l’état du client
 Données UDP (QTSS -> client) :
6970–6999, nombres pairs
 État UDP (QTSS <-> client) :
6971–6999, nombres impairs
 Données et état TCP (QTSS <->
client): 554, 7070, 8000, 8001, 80
RTP
RTCP
RTSP, RTP,
RTCP
L’état est nécessaire à la connexion ;
s’il est bloqué, le serveur déconnecte le client. Les mêmes ports
sont utilisés pour répondre
aux messages.
Réception
de diffusions
 Données UDP (diffuseur -> QTSS) :
6972–65535, nombres pairs
 État UDP RTCP (diffuseur <->
QTSS) : 6973–65535, nombres
impairs
 TCP (le diffuseur démarre ->
QTSS) : 554, 7070, 8000, 8001, 80
RTP
RTCP
RTSP, RTP,
RTCP
Les ports dépendent de la configuration du diffuseur.
L’état est nécessaire à la connexion ;
s’il est bloqué, le serveur déconnecte le diffuseur.
Les diffuseurs peuvent diffuser
via leur connexion TCP au serveur
au lieu d’utiliser les ports UDP.
Enchaînement
via serveur
TCP (le client démarre -> QTSS) :
554, 7070, 8000, 8001, 80
RTSP, RTP,
RTCP,
MP3
Les mêmes ports sont utilisés pour
répondre aux messages et pour
recevoir les diffusions via TCP.
Diffusions MP3
(par défaut)
TCP (client -> QTSS) : 8000
Gestion de QTSS
à distance avec
Admin Serveur
TCP (le client admin démarre ->
serveur) : 311
Gestion de QTSS
à distance avec
Admin Web
TCP (le client du navigateur Web
démarre -> serveur) : 122066 Chapitre 6 Exemple de configuration
Si certains clients se trouvent derrière des coupe-feu, il peut être préférable d’activer
la diffusion en continu sur le port 80 pour que ces clients puissent accéder aux flux.
Pour obtenir des instructions, consultez la section « Diffusion de flux à travers des
coupe-feu via le port 80 » à la page 31.
Sera-t-il nécessaire de configurer un compte utilisateur sur le serveur de diffusion ?
Dans cet exemple de configuration, vous devez créer un nom d’utilisateur et un mot de
passe de diffusion, car le logiciel d’encodage et QTSS résident sur des ordinateurs distincts.
La création d’un utilisateur de diffusion permet la création sur le serveur d’un fichier SDP
qui fournit des informations sur le format, l’heure et l’auteur d’un flux diffusé en direct.
Après avoir spécifié un nom et un mot de passe, vous entrez dans QuickTime Broadcaster.
Pour des instructions sur la création ou la modification du nom d’utilisateur et du mot
de passe de diffusion, consultez la section « Utilisation de la monodiffusion automatique (Annonce) à l’aide de QTSS sur un ordinateur distinct » à la page 32. Vous devrez
utiliser le compte d’administrateur précédemment configuré.
Les utilisateurs nécessiteront-ils une authentification pour accéder aux présentations en direct ou archivées ?
Dans notre exemple de configuration, aucune authentification n’est nécessaire. Cependant,
si vous souhaitez limiter l’accès à vos flux, vous devrez définir des noms d’utilisateur et des
mots de passe de diffusion individuels ou de groupe. Pour plus d’informations sur la configuration et la gestion de ce type de compte, consultez les rubriques appropriées de la section « Sécurité et accès » à la page 30.
Étape 4 : Configuration pour une diffusion Web en direct
Pour notre exemple de configuration, les éléments suivants sont requis :
 Un caméscope numérique DV de bonne qualité
 Un microphone placé près de l’orateur (sur un pied ou accroché à sa chemise)
et connecté à l’entrée audio du caméscope via un câble audio de bonne qualité
 Un trépied robuste sur lequel le caméscope sera monté.
 Kit d’éclairage portatif
Le caméscope est le premier maillon
Le caméscope est un élément essentiel car il constitue le premier maillon de la chaîne
du signal vidéo. Deux composants principaux déterminent la qualité d’image d’un caméscope numérique DV :
 La qualité de la lentille. Plus la qualité de la lentille est élevée, meilleure est l’image.
 Le mécanisme de capture d’image. Les caméscopes numériques DV utilisent des capteurs CCD (Charge-Coupled Devices) pour convertir l’image en signaux électroniques.
Le nombre et la taille des capteurs CCD affectent la qualité de l’image.
Le zoom optique offre une qualité supérieure à celle du zoom numérique, mais l’utilisation du zoom doit être évitée ou réduite au minimum lors d’une présentation diffusée en direct afin d’éviter toute dégradation du flux.Chapitre 6 Exemple de configuration 67
Les caméscopes numériques bas de gamme utilisent un capteur CCD unique pour
capturer toute l’image, tandis que les caméscopes haut de gamme utilisent trois
capteurs CCD distincts pour balayer le contenu rouge, bleu et vert de l’image, permettant ainsi une qualité supérieure. La taille des capteurs CCD varie de 1/4 à 2/3
de pouce ; les capteurs CCD de plus grande taille offrent une meilleure résolution.
Voici d’autres fonctionnalités intéressantes :
 Vous devez pouvoir modifier les réglages automatiques du caméscope.
 Il est recommandé d’utiliser un microphone séparé pouvant être branché sur le caméscope afin d’obtenir une prise de son optimale. Le microphone intégré du caméscope
est inadapté à la plupart des situations.
 Le caméscope doit accepter les connecteurs XLR professionnels (plutôt que les connecteurs mini-jack 1/8 de pouce). Il doit également comporter une prise jack de casque
d’écoute, permettant de contrôler l’entrée audio.
 Enfin, une sortie FireWire permet le transfert numérique et la capture automatisée,
ce qui permettra de gagner du temps par la suite.
Parlez près du microphone
Le microphone constitue le premier maillon de la chaîne du signal audio et est donc
également très important. Les microphones dynamiques constituent un bon choix
global et vous pouvez en trouver pour environ 100 ı.
Le meilleur moyen d’améliorer la qualité audio lorsque l’acoustique de la pièce est de mauvaise qualité consiste à placer le microphone le plus près possible de la personne qui parle.
Utilisez un petit micro-cravate attaché à la chemise de l’orateur, juste sous la bouche, ou
un microphone à main.
Dans le cas d’une conférence à plusieurs intervenants, utilisez plusieurs microphones,
si possible fixés sur des pieds solides, ainsi qu’une petite table de mixage. Connectez
la sortie stéréo mixée de la table de mixage à l’entrée ligne du caméscope.
Si vous utilisez une table de mixage ou un microphone externe, assurez-vous que tous
les connecteurs sont fermement branchés, afin de garantir la fiabilité du signal audio.
Connectez un casque à la sortie casque du caméscope afin de vous assurer que vous
pouvez entendre le signal audio et qu’il ne présente aucune distorsion.
Un trépied est essentiel
Il est important d’utiliser un caméscope sur trépied lors d’une présentation en direct
et d’éviter les panoramiques, inclinaisons, zooms et autres mouvements de caméra.
Tout déplacement du caméscope, ne serait-ce que d’un degré, entraîne le changement
de chaque pixel de l’image, augmentant ainsi la difficulté de codage du flux. Une scène
simple à coder devient soudainement beaucoup plus complexe.
Le trépied doit être léger, tout en offrant un support stable pour le poids du caméscope.68 Chapitre 6 Exemple de configuration
Procurez-vous un kit d’éclairage simple
L’éclairage est un vaste sujet qui n’entre pas dans le cadre de ce guide, mais voici
cependant quelques suggestions.
Même un caméscope de haute qualité donnera des résultats médiocres si l’éclairage
est inadapté. Il est peu probable que l’éclairage standard d’une salle de classe soit
adapté à la prise de vue d’une présentation en direct. Il est recommandé d’ajouter
au moins un éclairage d’arrière-plan afin de faire ressortir l’orateur. Un kit d’éclairage
portatif à trois points, ainsi qu’un ou deux réflecteurs si vous prévoyez des prises
de vue extérieures, peuvent améliorer considérablement les résultats.
Étape 5 : Configurez Broadcaster pour une monodiffusion automatique (Annonce)
En cas de diffusion vers QTSS situé sur un autre ordinateur, comme dans notre exemple, il est recommandé d’utiliser la méthode de transmission Monodiffusion automatique (Annonce). Elle est simple à configurer.
Dans cet exemple, QuickTime Broadcaster est installé sur un ordinateur portable.
Ce logiciel de codage est inclus sur le CD-ROM de Mac OS X Server et peut également
être téléchargé gratuitement à partir du site web QuickTime Broadcaster à l’adresse
www.apple.com/fr/quicktime/broadcaster/.
Une fois le logiciel de codage installé, connectez le caméscope au portable via le port
FireWire, allumez le caméscope et voyez s’il est reconnu par QuickTime Broadcaster.
1 Ouvrez QuickTime Broadcaster et cliquez sur Afficher les détails.
2 Cliquez sur Vidéo et sélectionnez une source vidéo dans le menu local Source.
Si le caméscope est reconnu, il apparaît dans le menu Source. Les réglages vidéo
doivent être actifs également (non estompés).
Si le caméscope n’apparaît pas dans le menu Source, quittez QuickTime Broadcaster,
assurez-vous que le caméscope est connecté et sous tension, puis ouvrez de nouveau
QuickTime Broadcaster. Si votre caméscope n’apparaît toujours pas, consultez le site
web de QuickTime ou le site web d’assistance et de support AppleCare pour en savoir
plus sur la compatibilité et les autres problèmes.
3 Dans QuickTime Broadcaster, cliquez sur Afficher les détails, sur Réseau, puis choisissez
Monodiffusion automatique (Annonce) dans le menu local Transmission.
4 Dans le volet Réseau, tapez l’adresse IP ou le nom d’hôte du serveur destinataire (Xserve
dans cet exemple), un nom pour le fichier diffusé, le nom d’utilisateur et le mot de passe
de l’utilisateur de diffusion créé à l’étape 3, ainsi que la durée de mise en mémoire
tampon (ou acceptez la valeur par défaut).
Remarque : la durée de mise en mémoire tampon fixe le nombre de secondes pendant
lesquelles QuickTime place la diffusion en mémoire tampon avant la lecture. Pour les
connexions haut débit, QuickTime Player 6 (ou ultérieur) remplit la mémoire tampon plus
rapidement que le temps réel, ce qui permet la visualisation en mode “Lecture instantanée”.Chapitre 6 Exemple de configuration 69
5 Cliquez sur Diffusion et démarrez QTSS (s’il n’est pas déjà en cours d’exécution) en sélectionnant l’ordinateur dans Admin Serveur, en cliquant sur Enchaînement QuickTime,
puis en cliquant sur Démarrer le service.
Pour déterminer si le flux en direct peut être visualisé sur un client, ouvrez QuickTime Player
sur l’un des ordinateurs client et effectuez les opérations suivantes :
6 Cliquez sur Fichier > Ouvrir l’URL dans le nouveau lecteur.
7 Tapez l’URL RTSP (Real-Time Streaming Protocol) affichée dans la section Emplacement
de la fenêtre QuickTime Broadcaster (par exemple, rtsp://monserveur.com/monflux.sdp).
Remarque : l’URL reconnaît les majuscules et minuscules et doit être saisie exactement
comme dans la fenêtre QuickTime Broadcaster.
La lecture du flux en direct doit alors commencer dans QuickTime Player.
Étape 6 : Test de votre configuration
La dernière étape consiste à tester la configuration. Ce test doit être le plus réaliste possible.
 Configurez votre équipement tel qu’il sera utilisé pour la présentation réelle, si possible
dans le même lieu.
 Demandez à un collègue de jouer le rôle du présentateur, ou mieux, demandez
au présentateur de participer au test, afin d’en faire une “répétition”.
 Vérifiez l’image vidéo et le son.
 Vérifiez si les clients du réseau local et d’Internet peuvent se connecter au flux en direct.
 Ajustez si nécessaire la position du caméscope et du microphone, ainsi que l’éclairage, et résolvez les autres problèmes éventuels.
Création d’une page Web pour simplifier l’accès
L’accès à partir d’une page Web permet d’éviter aux étudiants d’avoir à mémoriser
l’URL RTSP ainsi que le nom du serveur de diffusion et des fichiers SDP.
Dans notre exemple, la page Web peut être ajoutée au site web de l’université, mais elle peut
également résider sur n’importe quel serveur Web. Les étudiants peuvent accéder à la pré-
sentation en direct (ainsi qu’aux archives) en cliquant sur les liens dans leur navigateur.
Pour créer un lien vers le flux en direct d’une page web, vous devez incorporer une
séquence de diffusion. Pour cela, vous pouvez par exemple créer un film de référence.
Il existe plusieurs méthodes pour créer des films de référence, lesquels dirigent
un lecteur vers le fichier multimédia en cours). La méthode la plus simple consiste
à créer ce film avec QuickTime Pro :
1 Ouvrez QuickTime Player Pro.
2 Dans le menu Fichier, sélectionnez Ouvrir l’URL...
3 Ouvrez l’URL de votre film de diffusion à l’aide de URL RTSP.70 Chapitre 6 Exemple de configuration
4 Enregistrez le film lu sous Séquence autonome.
5 Placez le film enregistré sur votre site web.
6 Faites en sorte que le film de référence soit le premier attribut spécifié dans l’appel
de méthode QT WriteObject.
Si vous ne disposez pas de QuickTime Pro, vous pouvez créer un film de référence simple
avec n’importe quel éditeur de texte. Il suffit de créer un fichier texte contenant une ligne
au format suivant :
RTSPtextRTSP:///
Enregistrez le fichier au format .mov et placez-le sur votre serveur Web. Pour incorporer
le film dans une page Web, utilisez la balise Object/Embed dans le code HTML de la page
Web. Par exemple, si le film de référence s’appelle “live.mov” et se trouve dans le même
répertoire que la page HTML, la balise suivante incorpore le flux en direct :
Nombre de ressources apportent des informations sur la création de pages Web avec
des données QuickTime. Voici quelques excellentes références :
Quicktime for the Web, de Steven Gulie, est le livre définitif sur la création de pages
Web au format QuickTime (avec des clés d’enregistrement de QuickTime Pro).
Le site web d’Apple contient des documents relatifs à la balise Object/Embed :
www.apple.com/fr/quicktime/authoring/embed.html
Prise de vue de la présentation en direct
Si tout le travail préparatoire a été effectué selon la procédure décrite ci-dessus
et que l’équipement et les connexions ont été testés, la prise de vue devrait être simple.
Voici quelques conseils qui permettront d’éviter les problèmes survenant pendant
l’événement :
 Le jour de la diffusion en direct de l’événement, installez votre matériel suffisamment
tôt, afin de pouvoir vérifier une nouvelle fois que tous les composants fonctionnent
comme prévu.
 Si un public est présent, faites-leur savoir à l’avance que vous allez diffuser la présentation en direct sur le Web et sollicitez leur coopération.
 Fixez bien tous les câbles au sol de façon à limiter les risques de trébuchement.Chapitre 6 Exemple de configuration 71
 Utilisez un micro directionnel ou, si possible, une connexion audio en direct.
 Recherchez les sources potentielles de bruit et prenez si possible les mesures appropriées.
Archivage de la présentation en direct
Dans notre exemple, l’application iMovie, fournie avec Mac OS X, est installée sur l’ordinateur portable. Cette application permet d’importer le métrage DV enregistré depuis
la bande, puis d’encoder et d’archiver les présentations.
Pour archiver une présentation en direct, commencez par importer le métrage DV
enregistré :
1 Connectez le caméscope numérique DV à l’ordinateur portable via le port FireWire
et mettez-le sous tension.
2 Insérez la bande contenant la séquence vidéo à archiver et passez en mode VTR.
3 Sur l’ordinateur portable, ouvrez iMovie et réglez le commutateur de mode situé sous
le moniteur iMovie sur le mode Caméra (faites glisser le curseur bleu vers l’icône repré-
sentant un caméscope).
4 Utilisez les commandes de lecture afin d’afficher une partie de la bande dans le moniteur iMovie. Si la lecture de la bande ne démarre pas, vérifiez les connexions et assurezvous que le caméscope est sous tension.
5 Rembobinez la bande jusqu’à quelques secondes avant le point où vous souhaitez
démarrer l’importation.
6 Cliquez sur Lire sous le moniteur iMovie.
7 Cliquez sur Importer dès que vous voyez le point de la présentation à partir duquel
vous souhaitez commencer l’importation.
8 Cliquez de nouveau sur Importer lorsque vous souhaitez arrêter l’importation.
9 Pour éviter que certaines séquences soient incluses dans votre présentation archivée,
vous pouvez éditer cette dernière plus tard à l’aide d’iMovie.
Important : surveillez l’espace disponible sur disque dur pendant l’importation des données vidéo et la création de votre film iMovie. Une minute de vidéo numérique utilise environ 220 Mo d’espace disque, de sorte qu’une présentation d’une heure peut utiliser plus
de 13 gigaoctets d’espace disque. La barre d’état Espace libre, située sous le clip, montre
à tout moment la quantité d’espace disque disponible pendant le processus d’importation.72 Chapitre 6 Exemple de configuration
Utilisez ensuite iMovie pour compresser et encoder le métrage DV pour la diffusion :
1 Dans iMovie, choisissez Fichier > Exporter le film.
2 Sélectionnez Vers QuickTime dans le menu local Exporter le film.
3 Sélectionnez un format de film dans le menu local Formats.
Vous pouvez soit choisir l’un des formats QuickTime optimisés pour différentes utilisations, soit choisir Expert, une option qui offre des réglages QuickTime personnalisés
tels que Vidéo MPEG-4.
4 Cliquez sur Exporter.
5 Attribuez un nom à votre film, sélectionnez une destination pour le fichier, puis cliquez
sur Enregistrer.
Le temps nécessaire à l’enregistrement du film dépend de sa longueur et du format choisi.
Remarque : il est recommandé d’enregistrer plusieurs fichiers de diffusion, chacun
compressé pour une vitesse de connexion différente. Vous pouvez par exemple choisir
des réglages de compression plus faibles pour les clients du réseau du campus et des
réglages de compression plus élevés pour les clients qui se connectent via Internet.
6 Une fois que vous avez enregistré le ou les fichiers codés, assurez-vous que chaque
fichier est diffusé correctement. 73
Glossaire
Glossaire
administrateur Utilisateur disposant d’autorisations d’administration de serveur
ou de domaine de répertoires. Les administrateurs sont toujours membres
du groupe “admin” prédéfini.
Adresse IP Adresse numérique unique qui identifie un ordinateur sur Internet.
AppleScript Langage de pilotage par script dont la syntaxe est semblable à celle
de l’anglais, utilisé pour écrire des fichiers de script permettant le contrôle de votre
ordinateur. AppleScript fait partie du système d’exploitation Mac et est donc inclus
sur chaque ordinateur Macintosh.
autorisations Droit d’accéder à des zones restreintes d’un système ou d’effectuer
certaines tâches (telles que des tâches de gestion) dans le système.
AVI Audio Visual Interleave. Format de fichier vidéo Windows.
bande passante Capacité d’une connexion réseau, mesurée en bits ou octets par seconde,
à transporter des données.
bit Unité d’information, dont la valeur peut être 0 ou 1.
client Ordinateur (ou utilisateur de l’ordinateur) nécessitant les données ou les services
d’un autre ordinateur ou serveur.
codec Technologie de compression et de décompression de données. Les codecs
peuvent être implémentés dans le logiciel, le matériel ou une combinaison des deux.
compression temporelle Compression d’images effectuée entre les images d’une
séquence. Cette technique de compression tire parti de la redondance entre images
adjacentes d’une séquence pour réduire la quantité de données requises à la représentation précise de chaque image de la séquence. Les séquences soumises à une compression temporelle contiennent généralement des images clé placées à intervalles réguliers.
connecteur XLR Connecteur audio à trois broches, qui peut être utilisé avec des câbles
équilibrés à trois fils, ce qui permet d’éliminer les interférences électromagnétiques. 74 Glossaire
couche Mécanisme d’affectation de priorités aux pistes d’un film ou de chevauchement de sprites. Lorsque QuickTime lit un film, il affiche les images en fonction de leur
couche ; les images dont le numéro de couche est inférieur sont affichées au-dessus,
celles dont le numéro de couche est supérieur peuvent être masquées par les premières.
coupe-feu Logiciel destiné à protéger les applications réseau exécutées sur votre
serveur. Le service de coupe-feu IP, qui fait partie du logiciel Mac OS X Server, analyse
les paquets IP entrants et rejette ou accepte ces paquets en fonction d’un ensemble
de filtres que vous créez.
débit Vitesse à laquelle les bits sont transmis sur un réseau, généralement exprimée
en bits par seconde.
débit de données Quantité d’informations transmises par seconde.
diffusion Dans un réseau, transmission d’un message ou de données pouvant être lues par
tout client du réseau. La diffusion peut être réalisée en monodiffusion (envoi d’un message
à un ordinateur spécifique) ou en multidiffusion (envoi d’un message à une sous-ensemble
d’ordinateurs). Dans QuickTime Streaming Server, processus de transmission d’une copie
de flux de données sur l’ensemble d’un réseau.
diffusion annoncée Méthode, telle que Monodiffusion automatique (Annonce),
permettant à un diffuseur de négocier avec un serveur l’acceptation d’une diffusion.
diffusion Web Diffusion de séquences vidéo ou audio en direct sur Internet.
DNS Domain Name System. Base de données distribuée qui fait correspondre des adresses IP à des noms de domaines. Un serveur DNS, appelé également “serveur de noms”,
conserve une liste des noms et des adresses IP associées à chaque nom.
DSL Digital subscriber line. Technologie de transmission de données à haut débit
fonctionnant sur les lignes téléphoniques.
DV Vidéo numérique. Format numérique d’enregistrement sur bandes, utilisant une
compression d’environ 5:1 pour générer une qualité Betacam sur une cassette de très
petite taille.
enchaînement Distribution en temps réel de données vidéo ou audio via un réseau,
sous la forme d’un flux de paquets plutôt que par téléchargement d’un fichier unique.
FAI Fournisseur d’accès à Internet. Entreprise qui commercialise un accès à Internet
et propose généralement l’hébergement Web d’applications de commerce électronique et de services de courrier.
fichier d’accès Fichier texte nommé qtaccess et contenant des informations sur les
utilisateurs et les groupes autorisés à visualiser les données multimédias du répertoire
dans lequel le fichier d’accès est stocké. Glossaire 75
fichier M3U Métafichier audio créé à l’aide d’un éditeur de texte et enregistré sur un serveur Web. Le fichier dirige le navigateur Web de l’utilisateur vers une liste de lecture MP3
résidant sur le même serveur Web et ouvre le lecteur MP3 de l’utilisateur.
film Structure de données temporelles gérée par QuickTime. Un film QuickTime peut
contenir du son, de la vidéo, des animations ou une combinaison de ces différents types
de données. Un film QuickTime contient une ou plusieurs pistes, chacune représentant
un flux de données unique du film.
film de référence Fichier .mov créé à l’aide d’un utilitaire tel que MakeRefMovie, disponible gratuitement auprès d’Apple pour les ordinateurs Macintosh et Windows. Le fichier
contient l’emplacement d’un fichier multimédia de diffusion et peut également contenir
l’emplacement de plusieurs fichiers de diffusion. Un fichier de référence inclus sous forme
de lien dans une page Web, par exemple, peut diriger un lecteur client vers la présentation à la demande codée en fonction de sa vitesse de connexion particulière.
FireWire Technologie matérielle pour l’échange de données avec des périphériques,
définie par la norme IEEE 1394.
flux réfléchi Diffusion en direct distribuée en tant que flux monodiffusion. Les listes
de lecture de film et MP4 génèrent également des flux réfléchis.
flux relayé Flux transmis d’un serveur à un ou plusieurs autres. Les relais peuvent également être utilisés pour générer un flux multidiffusion. QTSS ne gère pas le relais de flux MP3.
fréquence d’échantillonnage Nombre d’échantillons par seconde utilisé pour les données
audio. Plus la fréquence est élevée, meilleure est la qualité audio.
fréquence d’images clé Fréquence à laquelle les images clé sont placées dans
des séquences de données temporellement compressées.
FTP File Transfer Protocol. Protocole permettant aux ordinateurs de transférer des fichiers
sur un réseau. Les clients FTP dont le système d’exploitation gère le protocole FTP peuvent
se connecter à un serveur de fichiers et télécharger des fichiers, en fonction des autorisations d’accès dont ils bénéficient. La plupart des navigateurs Internet et bon nombre
d’applications gratuites (“freeware”) peuvent être utilisés pour accéder à un serveur FTP.
HTML Hypertext Markup Language. Ensemble de symboles ou de codes insérés
dans un fichier à afficher par un navigateur Web. Le balisage indique au navigateur
Web comment afficher les mots et images d’une page Web pour l’utilisateur.
HTTP Hypertext Transfer Protocol. Protocole client/serveur utilisé pour le World Wide
Web. Le protocole HTTP permet à un navigateur Web d’accéder à un serveur Web
et de demander des documents multimédias créés en code HTML.
IEEE Institute of Electrical and Electronics Engineers, Inc. Organisation dédiée
à la promotion des normes de l’ingénierie informatique et électrique.76 Glossaire
image Dans Enchaînement QuickTime, image dans un film ou une séquence d’images.
image clé Échantillon provenant d’une séquence d’échantillons temporellement
compressés, dont les informations sont indépendantes de celles des autres échantillons de la séquence. Les images clé sont placées dans des séquences temporellement compressées, selon une fréquence déterminée par la fréquence d’images clé.
indices Processus qui crée une piste pour chaque piste de données diffusable du
fichier, afin d’indiquer au serveur Enchaînement QuickTime comment et quand diffuser
chaque trame de données. Le processus d’insertion d’indications effectue à l’avance
les calculs nécessaires, ce qui permet à QTSS de diffuser un plus grand nombre de flux.
Il permet également l’utilisation de nouveaux codecs sans qu’il soit nécessaire de mettre le serveur à niveau.
IP Internet Protocol. Également appelé IPv4. Méthode utilisée conjointement avec le protocole TCP (Transmission Control Protocol) pour envoyer des données d’un ordinateur à un
autre via un réseau local ou via Internet. Le protocole IP distribue les paquets de données,
tandis que le protocole TCP effectue le suivi des paquets.
JavaScript Langage de pilotage par script utilisé pour ajouter une certaine interactivité aux pages Web.
LAN Réseau local. Réseau établi au sein d’un même bâtiment, par opposition à un réseau
étendu (WAN) qui relie des installations géographiquement disséminées.
Lecture instantanée Dans Enchaînement QuickTime, avancée dans la technologie
Apple de protection contre les coupures (en attente de brevet) pour réduire considérablement les temps de mise en mémoire tampon : la visualisation est instantanée pour
la diffusion de flux vidéo à travers des connexions haut débit.
liste de lecture Ensemble de fichiers multimédias du dossier de données QTSS, dont
la lecture s’effectue de manière séquentielle ou aléatoire.
Mac OS X Version la plus récente du système d’exploitation Apple. Mac OS X associe
la fiabilité d’UNIX à la simplicité d’utilisation de Macintosh.
Mac OS X Server Plate-forme de serveur puissante, capable de gérer immédiatement
les clients Mac, Windows, UNIX et Linux et offrant un ensemble de services de réseau
et de groupes de travail extensible, ainsi que des outils perfectionnés de gestion à distance.
MBONE Infrastructure de multidiffusion. Réseau virtuel gérant la multidiffusion IP. Un réseau
MBONE utilise le même support physique qu’Internet, mais est conçu pour réassembler
les paquets de données de multidiffusion afin qu’ils aient l’aspect de paquets de données
de diffusion individuelle. Glossaire 77
MIDI Musical Instrument Digital Interface. Format standard d’échange de données
audio et d’envoi d’instructions à des ordinateurs, des synthés et tout autre périphérique de musique électronique.
monodiffusion Transmission de données vers un destinataire ou client unique. Si un film
est diffusé en monodiffusion à un utilisateur employant RSTP, celui-ci peut parcourir librement un film à la demande.
Monodiffusion automatique (Annonce) Méthode de distribution d’une diffusion
sur un serveur de diffusion, dans laquelle un fichier SDP est automatiquement copié
et tenu à jour sur le serveur. Un mot de passe et un nom d’utilisateur de diffusion
doivent être créés avant le démarrage d’une telle diffusion.
Monodiffusion manuelle Méthode de transmission en direct d’un flux de données vers
un client QuickTime Player unique ou vers un ordinateur qui exécute QTSS. Un fichier SDP
est généralement créé par l’application de diffusion et doit ensuite être envoyé manuellement au spectateur ou au serveur de diffusion.
mov Extension de fichier des films QuickTime d’Apple, utilisée pour nommer à la fois
les fichiers de redirection de film et les fichiers multimédias QuickTime proprement dits.
MP3 MPEG layer 3. Format de compression audio.
MPEG-4 Norme ISO basée sur le format de fichier QuickTime et qui définit des formats
de compression et des fichiers multimédias.
multi-adressage Capacité à gérer plusieurs connexions réseau. Lorsque plusieurs
connexions sont disponibles, Mac OS X sélectionne la meilleure connexion en fonction
de l’ordre indiqué dans les préférences réseau.
multidiffusion Généralement, transmission simultanée d’un message à un sous-ensemble d’ordinateurs sur un réseau. Voir aussi diffusion, monodiffusion. Dans QuickTime
Streaming, mode efficace de diffusion, de type 1 à n. Les utilisateurs peuvent se joindre
à une multidiffusion ou la quitter, mais ils ne peuvent pas interagir avec elle.
NAT Network Address Translation. Méthode de connexion de plusieurs ordinateurs
à Internet (ou à tout autre réseau IP) à l’aide d’une adresse IP unique. NAT convertit
les différentes adresses IP attribuées aux ordinateurs sur le réseau privé interne en
une adresse IP commune pour les communications Internet.
octet Unité de mesure élémentaire de données ; équivaut à huit bits (ou chiffres binaires).
open-source Terme désignant le développement coopératif de logiciels par la communauté Internet. Le principe de base consiste à impliquer le plus grand nombre possible
de personnes dans l’écriture et le débogage du code, en publiant le code source et en
encourageant la constitution d’une large communauté de développeurs qui peuvent
proposer des modifications et des améliorations. 78 Glossaire
ordinateur administrateur Ordinateur Mac OS X sur lequel vous avez installé
les applications de serveur situées sur le CD Serveur Mac OS X Server Admin.
paquet Unité d’informations constituée d’un en-tête, d’informations, d’un élément
de détection d’erreurs et d’enregistrements complémentaires. QTSS utilise des paquets
TCP, UDP et IP pour communiquer avec les clients.
piste Structure de données QuickTime qui représente un flux de données unique
dans un film QuickTime. Un film peut contenir une ou plusieurs pistes. Chaque piste
est indépendante des autres pistes du film et représente son propre flux de données.
piste de modification Piste d’un film qui modifie les données ou la présentation
d’autres pistes. Par exemple, une piste “tween” est une piste de modification.
piste tween Piste qui modifie l’affichage d’autres pistes.
pixel Point unique d’une image, dotée d’une couleur et d’une valeur de luminosité données.
plug-in de navigateur Logiciels que vous intégrez à un navigateur afin de permettre
l’affichage de formats de données spécifiques.
point de montage Dans le domaine de la diffusion en continu, chaîne utilisée pour identifier un flux en direct, qu’il soit de film relayé, de film non relayé ou MP3. Les points de montage qui décrivent les flux de film en direct se terminent toujours par une extension .sdp.
port Sorte de fente virtuelle de boîte aux lettres. Un serveur utilise des numéros de port
pour déterminer l’application qui doit recevoir les paquets de données. Les coupe-feu utilisent les numéros de port pour déterminer si les paquets de données sont autorisés à traverser un réseau local. Le terme “port” fait généralement référence à un port TCP ou UDP.
protocole Ensemble de règles qui détermine la façon dont les données sont échangées entre deux applications.
QTSS QuickTime Streaming Server. Technologie permettant de diffuser des données
en temps réel sur Internet.
QuickTime Ensemble d’extensions système Macintosh ou bibliothèque de liens dynamiques Windows gérant la composition et la lecture de films.
QuickTime Player Application incluse dans le logiciel système QuickTime et permettant la lecture des films QuickTime.
QuickTime Pro Version de QuickTime Player dotée de fonctionnalités avancées, de montage essentiellement. Glossaire 79
RAID Redundant Array of Independent (ou Inexpensive) Disks. Regroupement de plusieurs disques durs physiques en une matrice, ce qui permet d’accéder rapidement aux
données stockées et/ou de créer une image des données pour les récupérer en cas de
défaillance du disque. La matrice RAID apparaît sous forme d’unité unique de stockage.
Voir aussi Matrice RAID, Niveau RAID.
relais Dans QuickTime Streaming Server, un relais reçoit un flux entrant puis le transfère
à un ou plusieurs serveurs de diffusion. Les relais permettent de réduire la consommation
de bande passante Internet et sont utiles diffuser vers de nombreux spectateurs situés
dans des emplacements différents. En matière de messagerie électronique, un relais est
un serveur de messagerie SMTP qui envoie les courriers entrants à un autre serveur SMTP,
mais non à sa destination finale.
RTP Real-Time Transport Protocol. Protocole de transport réseau “point à point” adapté
aux applications qui transmettent des données en temps réel (audio, vidéo ou simulation) par l’intermédiaire de services de réseau en multi ou en monodiffusion.
RTSP Real Time Streaming Protocol. Protocole de couche applicative servant à contrôler
la transmission des données ayant des propriétés de temps réel. Ce protocole RTSP propose une structure extensible qui permet de transmettre les données en temps réel sous
contrôle et sur demande, des données audio ou vidéo par exemple. Les sources de données peuvent inclure aussi bien des données en temps réel que des clips enregistrés.
SDP Session Description Protocol. Fichier texte utilisé avec le serveur Enchaînement
QuickTime, qui fournit des informations sur le format, l’heure et l’auteur d’une diffusion
en direct et transmet à l’ordinateur de l’utilisateur les instructions de connexion.
serveur proxy Serveur placé entre une application client, telle qu’un navigateur Web,
et un serveur réel. Le serveur proxy intercepte toutes les requêtes destinées au serveur
réel pour vérifier s’il ne peut y répondre lui-même. Si ce n’est pas le cas, il fait suivre
la requête au serveur réel.
SMTP Simple Mail Transfer Protocol. Protocole utilisé pour envoyer et transférer le courrier.
Sa capacité à placer les messages entrants en file d’attente étant limitée, il n’est généralement utilisé que pour envoyer des messages, POP ou IMAP étant utilisés pour les recevoir.
sous-réseau IP Partie d’un réseau IP, qui peut être un segment de réseau physiquement indépendant, partageant une adresse réseau avec d’autres parties du réseau
et identifiée par un numéro de sous-réseau.
sprite Image animée gérée par QuickTime. Une telle image est définie une seule fois,
puis elle est animée par des commandes qui en modifient la position ou l’apparence.
SSL Secure Sockets Layer. Protocole permettant d’envoyer sur Internet des informations cryptées et authentifiées. Les versions plus récentes de SSL sont appelées TLS
(Transport Level Security).80 Glossaire
TCP Transmission Control Protocol. Méthode utilisée avec le protocole IP (Internet Protocol)
pour envoyer, via Internet, des données sous forme d’unités de messages entre ordinateurs.
Le protocole IP se charge de gérer le transfert des données, alors que le protocole TCP effectue le suivi individuel des unités de données (appelées “paquets”). Chaque message est fractionné en plusieurs unités afin d’assurer un routage efficace via Internet.
téléchargement progressif Données d’un film transmises vers le client via le protocole HTTP. Le film peut être visualisé par l’utilisateur pendant le transfert. Il ne s’agit
pas d’un mode de diffusion de flux de données.
TTL Time-to-live. Durée spécifiée pendant laquelle les informations DNS sont stockées
dans la mémoire cache. Lorsqu’une paire nom de domaine/adresse IP se trouve en
mémoire cache depuis plus longtemps que la durée TTL spécifiée, l’entrée est supprimée du cache du serveur de noms (mais pas du serveur DNS principal).
UDP User Datagram Protocol. Méthode de communication utilisant le protocole IP pour
envoyer une unité de données (appelée datagramme) d’un ordinateur à un autre sur un
réseau. Les applications réseau qui ont de toutes petites unités de données à échanger
peuvent utiliser le protocole UDP à la place du protocole TCP.
utilisateur de diffusion Utilisateur ayant l’autorisation de diffuser vers le serveur de
diffusion. Le nom d’utilisateur et le mot de passe de diffusion sont définis dans le volet
Réglages généraux d’Admin Serveur Enchaînement et sont utilisés conjointement avec
les diffusions annoncées. Il n’est pas nécessaire de créer un utilisateur de diffusion pour
les diffusions UDP.
valide Uniform Resource Locator. Adresse d’un ordinateur, d’un fichier ou d’une
ressource accessible sur un réseau local ou sur Internet. L’adresse URL se compose
du nom du protocole utilisé pour accéder à la ressource, du nom de domaine qui identifie un ordinateur spécifique sur Internet et de la description hiérarchique de l’emplacement du fichier sur l’ordinateur.
VBR Variable bit rate. Méthode de compression de données qui tire parti des changements de débit des données.
vitesse de défilement Dans un film, il s’agit du nombre d’images par seconde.
wav Format Windows de fichier audio.
XML Langage de balisage extensible, semblable au HTML, mais plus formel et plus souple.
81
Index
Index
A
accès
administrateur 40
fichier 33, 34
listes de lecture 28, 33
mots de passe 32, 35
QTSS 22, 24, 30, 31, 32, 34
QuickTime Broadcaster 55, 56
utilisateur 32, 33, 35, 48, 64, 66
acoustique du lieu de diffusion 61
Admin Serveur 25, 26, 27, 63
Admin Web 7, 25, 63
adresses. Voir adresses IP
adresses IP 27
Annonce. Voir Monodiffusion automatique
any-user balise 35
appareils photo
configuration pour la vidéo 17, 68
AppleScript 58
archivage des présentations en direct 71
assembleur de paquets, QuickTime Broadcaster 54
attribut de durée de vie (TTL) 50
audio
allocation de bande passante 53
diffusion audio uniquement 51
équipement pour 17, 22, 67
préréglages 47
réglage de source 51
réglages de compression 56, 57
authentification
digest 33
QTSS 8, 32, 33, 35, 66
QuickTime Broadcaster 56
AuthScheme mot-clé 35
B
bande passante
lecture instantanée 17
nombre maximum de connexions 26
recommandations 22, 56, 62
relais 20
taille d’image 53
vue d’ensemble 18
borne d’accès AirPort 61
C
caméscopes
archivage des présentations 71
configuration pour la vidéo 60
dépannage 57
qualité d’image 66
capacité de disque dur pour la diffusion 63
CCD (Charge-Coupled Devices) 66
clients
contrôle de l’accès 32, 33
dépannage 40
groupes 36
Voir aussi utilisateurs
codecs 47
comptes
authentification 33
groupe 36
utilisateur 35, 36, 48, 66
configuration
diffusion en continu et en direct de données
multimédia 22, 23, 62, 63, 69
Monodiffusion automatique 48, 68
QTSS 22, 23
QuickTime Broadcaster 44
relais 28
connexions large bande 17, 21, 22
coupe-feu 30, 31, 32, 55, 64
D
Darwin Streaming Server. Voir DSS
débit, modification du maximum 26, 27
débits, connexion 21, 22
dépannage 30, 39, 40, 57
diffusion
considérations acoustiques 61
éclairage du lieu 62, 68
en direct 17, 70
MP3 32
serveur de diffusion 43, 60, 63
sur sites web 55, 6982 Index
Voir aussi QuickTime Broadcaster
diffusion de données multimédia Fast Start 16
diffusion en continu de données multimédia
accès 22, 24, 30, 31, 32, 34
diffusion à la demande de 59, 61
Lecture instantanée 8, 17
méthodes de réception 18
multidiffusion ou monodiffusion 19
ou téléchargement progressif 16
processus pour 16, 18
relais de 8, 20
vue d’ensemble 15, 16
diffusion en continu et en direct de données
multimédia
archivage 71
audio 67
configuration de site web 69
configuration du serveur 63
configuration réseau 22, 23, 62
diffusion de 16, 61, 70
environnement 61
ou à la demande 59, 61
vidéo 17, 66, 68
diffusion sur téléphone portable 55
distribution à la demande 59, 61
domaines, annuaire 8
dossiers de départ 28
dossiers multimédia 27, 28
DSL (Digital Subscriber Line) 22
DSS (Darwin Streaming Server) 9
duplication de réglages. Voir préréglages
durée de mise en mémoire tampon 45
DV (Digital Video) 60, 66, 71
E
éclairage du lieu de diffusion 62, 68
F
fichiers
contrôle d’accès 34
contrôle de l’accès 33
MP3 21, 23, 32
MPEG-1 40
MPEG-4 18, 21, 22, 43, 47, 57
qtacess 34
qtgroups 34
qtusers 34
SDP 47
Voir aussi fichiers compressés
fichiers compressés
aperçu et 50
assembleur de paquets 54
audio 56, 57
préréglages 47
vidéo 47, 53, 56, 57, 72
vue d’ensemble 18
films
à indices 52
dépannage 39
notes 52
référence 16, 69
téléchargement progressif 16
vue d’ensemble 8
FireWire 44
G
Gestionnaire de groupe de travail,
authentification 33
H
historiques 29, 30, 39
HTTP (Hypertext Transfer Protocol) 16, 30, 32
I
IETF (Internet Engineering Task Force) standard 30
iMovie 72
infrastructure de multidiffusion. Voir MBONE
Internet Engineering Task Force. Voir IETF
L
liaison, serveur de diffusion 27
ligne T1 56, 62
listes de lecture
accès 28, 33
côté serveur 8
dépannage 39
historiques 39
M
MBONE (dorsale de multidiffusion) 19, 50
mémoire, QTSS 63
message mot-clé 34
messages d’erreur. Voir dépannage
microphones 17, 51, 67, 71
modems câble 22
monodiffusion 19, 46, 48, 49
Monodiffusion automatique
configuration 48, 68
contrôle de l’accès 32, 56
fichier SDP 48
ports pour 55
relais multidiffusion et 37
vue d’ensemble 45
Monodiffusion manuelle 48, 49
mots de passe 32, 35, 56
multi-adressage 27
multidiffusion 19, 37, 46, 48, 49
musique. Voir audio; fichiers MP3; diffusion en
continu de données multimédiaIndex 83
N
NIC (network interface card) 64
nom d’utilisateur mot-clé 35
nom de fichier utilisateur mot-clé 34
nom de groupe mot-clé 35
nom du fichier de groupe mot-clé 34
notes, film 52
O
Open Directory 8, 33
options d’interface en ligne de commande 33, 34
ordinateur administrateur 63
P
plug-in QuickTime 18
ports 30, 31, 65
préférences Son. Voir audio
préréglages 47, 53
problèmes. Voir dépannage
procédures de configuration. Voir configuration
processus PlaylistBroadcaster 39
protocoles 30
Voir aussi protocoles spécifiques
Q
QTSS (QuickTime Streaming Server)
configuration requise 21
QuickTime Broadcaster
aperçu 50
AppleScript pour l’automatisation 58
assembleur de paquets 54
capacité de disque dur 63
capture vidéo 22
configuration 44
contrôle de l’accès 55, 56
coupe-feu 55
dépannage 56, 57
diffusion en direct 16, 61, 70
diffusion sur téléphone portable 55
enregistrement des réglages 54
fichier SDP 47
introduction 8, 17, 43
méthodes de diffusion 46, 56
Monodiffusion automatique 48
Monodiffusion manuelle 49
multidiffusion 49
notes 52
préréglages 47, 53
présentations 60, 66, 68
réglages audio 51, 56
réglages de compression 47, 54, 56, 57
réglages réseau 48
réglages vidéo 53, 57
séquences à indices 52
site Web 55
QuickTime Player 9
QuickTime Pro 9
QuickTime Streaming Server (QTSS)
accès 22, 24, 30, 31, 32, 34
Admin Serveur 25
Admin Web 7, 25
arrêt 26
authentification 8, 32, 33, 35, 66
configuration 22, 23
connexions 26, 39
considérations de mémoire 63
débit maximum 26, 27
démarrage 26
dépannage 39, 40
dossiers multimédia 27, 28
gestion de 25, 26
historiques 29, 30, 39
outils en ligne de commande 34
préparation d’une pr 63
préparation de présentation 60
réglages réseau 19, 27, 32, 62
relais 20, 28, 37
sécurité 30, 31, 32
utilisation du port 30, 31, 65
vue d’ensemble 7, 9
R
RAM (random-access memory) 63
Real-Time Streaming Protocol. Voir RTSP
Real-Time Transport Protocol. Voir RTP
réglages du serveur proxy 31
réglages réseau
adresses IP 27
configuration de la diffusion en continu et en
direct 62
considérations de coupe-feu 32
diffusion en continu et en direct de données
multimédia 22, 23
NIC 64
QuickTime Broadcaster 48
transport QTSS 19
relais
configuration 28
contrôle de l’accès 33
multidiffusion 37
QTSS et 20
vue d’ensemble 8, 20
répertoires. Voir dossiers
RTP (Real-Time Transport Protocol) 15, 16, 22, 30, 65
RTSP (Real-Time Streaming Protocol) 15, 16, 23, 30,
65
S
SDP (Session Description Protocol) 47, 49
sécurité84 Index
coupe-feu 30, 31, 32, 55, 64
mots de passe 32, 35, 56
QTSS 30, 31, 32
Voir aussi accès; authentification
séquences
à indices 52
dépannage 40
diffusion à plusieurs utilisateurs 28
serveurs
Apache 7
diffuser 43, 60
diffusion 63
DSS 9
proxy 31
service coupe-feu IP 64
service sans fil 61
Session Description Protocol. Voir SDP
sites web, diffusion sur 55, 69
T
TCP (Transmission Control Protocol) 30, 65
technologie de protection contre les coupures 8, 17
téléchargement de données 16
téléchargement progressif 16
traduction d’adresses 32
Transmission Control Protocol. Voir TCP
trépied, caméscope 67
spécification 3GPP 7
U
UDP (User Datagram Protocol) 28, 30, 32, 65
URL (Uniform Resource Locators) 24, 40
utilisateurs
connexion 39, 46
contrôle de l’accès 32, 33, 35, 48, 64, 66
dépannage 40
dossiers de départ 28
problèmes de bande passante 26, 56
V
valid-user balise 35
vidéo
capture vidéo 22
configuration 60, 66
numérique. Voir DV
QuickTime Broadcaster 53, 57
réglages de compression 47, 53, 56, 57, 72
Voir aussi appareils photo; films
Time Capsule
Opstillingsvejledning3
Indholdsfortegnelse
5 Kapitel 1: Introduktion
7 Om Time Capsule
8 Om AirPort-softwaren
9 Hvad du har brug for
11 Statuslampen på Time Capsule
13 Kapitel 2: Indstille Time Capsule
14 Bruge Time Capsule til at indstille et trådløst netværk
17 Bruge AirPort-værktøj
19 Oprettelse af et nyt trådløst netværk
19 Konfigurere og dele Internetadgang
21 Angivelse af avancerede indstillinger
22 Give trådløse klienter adgang til dit netværk uden en adgangskode
23 Bruge Time Machine med Time Capsule
25 Kapitel 3: Tip og fejlfinding
25 Hvis du ikke kan oprette forbindelse til Internet
25 Hvis du har glemt adgangskoden til netværket eller
Time Capsule
26 Hvis Time Capsule ikke svarer4 Indholdsfortegnelse
27 Hvis statuslampen på Time Capsule blinker orange
28 Hvis printeren ikke svarer
29 Opdatere AirPort-software
29 Anbefalinger til placering af Time Capsule
30 Forhold, der kan skabe forstyrrelser for AirPort
31 Kapitel 4: Yderligere oplysninger, service og support
33 Appendiks: Specifikationer og retningslinjer for sikkerhed for Time Capsule
36 Regulatory Compliance Information1
5
1 Introduktion
Tillykke med Time Capsule. Læs denne introduktion for
at komme i gang.
Den nye Time Capsule tilbyder enkelheden ved helt automatisk sikkerhedskopiering på
dit Wi-Fi-netværk. Med programmet Time Machine i Mac OS X v10.5.2 Leopard og nyere
versioner kan du automatisk sikkerhedskopiere alle computerne på netværket til en
enkelt Time Capsule.
Time Capsule er derudover en komplet AirPort Extreme-base, som gør det muligt for
flere at bruge trådløst “dual-band”-netværk samtidig. Når du indstiller din Time Capsule,
opretter den to hurtige Wi-Fi-netværk:
 Et 2,4 GHz netværk til 802.11b-, 802.11g- og 802.11n-enheder, f.eks. iPhone, iPod touch
og ældre computere
 Et 5 GHz netværk til 802.11n- og 802.11a-enheder, f.eks. nyere computere og Apple TV
Trådløse enheder opretter forbindelse til det netværk, som har den bedste ydeevne
og kompatibilitet, og Time Capsule deler din bredbåndsforbindelse til Internet med
computere og enheder på netværket.6 Kapitel 1 Introduktion
Med Time Capsule kan du:
 Bruge programmet Time Machine i Mac OS X v10.5.2 (og nyere version) til at
sikkerhedskopiere alle computerne på dit trådløse netværk samt computere,
der er sluttet til Time Capsule via Ethernet.
Bemærk: Den første sikkerhedskopiering med Time Capsule og Time Machine
kan vare en hel nat eller endnu længere, afhængigt af hvor mange data du
sikkerhedskopierer. Du kan gøre den første sikkerhedskopiering hurtigere ved at
bruge et Ethernet-kabel til at forbinde computeren med LAN-porten på Time
Capsule. Der findes flere oplysninger om brug af Time Machine i “Bruge Time
Machine med Time Capsule” på side 23.
 Oprette et trådløst hjemmenetværk, som er beskyttet af en adgangskode, oprette
forbindelse til Internet og dele forbindelsen med andre computere eller Wi-Fienheder som iPhone, iPod touch og Apple TV. Du kan også dele arkiver mellem
computere, som er tilsluttet netværket.
 Oprette et gæstenetværk med eller uden adgangskodebeskyttelse, så du kan nøjes
med at give trådløse enheder som f.eks. computere, iPhone, iPod touch og Apple TV
adgang til Internet.
 Slutte Time Capsule til et Ethernet-netværk. Macintosh-, Windows XP- og Windows
Vista-computere med trådløse funktioner får derefter adgang til et helt netværk uden
at være tilsluttet med et kabel.
 Slutte en understøttet USB-printer til Time Capsule. Kompatible computere på
AirPort-netværket – både trådløse og kabelforbundne – kan udskrive til printeren.Kapitel 1 Introduktion 7
 Slutte en ekstra USB-harddisk til Time Capsule. Kompatible computere på AirPortnetværket – både trådløse og kabelforbundne – kan få adgang til oplysningerne
på harddisken.
 Slutte et USB-samlingspunkt til Time Capsule og derefter tilslutte flere USB-enheder,
f.eks. printere eller harddiske. Alle computere på netværket har adgang til disse
enheder.
Vigtigt: Installer AirPort-værktøj 5.4 fra den cd, der fulgte med Time Capsule, eller hent
det vha. Softwareopdatering. Tidligere versioner af AirPort-indstillingsassistent og
AirPort-administrationsværktøj er ikke kompatible med denne Time Capsule.
Om Time Capsule
Der er fem porte på bagsiden af Time Capsule:
 En 10/100/1000Base-T Gigabit Ethernet WAN-port (Wide Area Network) til tilslutning
af et DSL- eller kabelmodem eller til tilslutning til et eksisterende Ethernet-netværk
 Tre 10/100/1000Base-T Gigabit Ethernet LAN-porte (Local Area Network) til tilslutning
af Ethernet-enheder som printere og computere eller til tilslutning til et eksisterende
Ethernet-netværk 8 Kapitel 1 Introduktion
 En USB-port til tilslutning af en kompatibel USB-printer, -harddisk eller et
-samlingspunkt til tilslutning af flere enheder
Nulstillingsknappen ud for portene bruges til fejlsøgning af Time Capsule.
Statuslampen på forsiden viser den aktuelle status.
Om AirPort-softwaren
Time Capsule kan arbejde med AirPort-værktøj, som findes på cd'en til Time Capsule.
Installer AirPort-værktøj, og følg instruktionerne på de følgende sider for at opstille
Time Capsule og det trådløse AirPort-netværk.
Statuslampe Internet WAN-port
Netstik
Netledning
Nulstillingsknap
USB-port
Ethernet-porte
Plads til
sikkerhedslås
Ethernet–
aktivitetslampeKapitel 1 Introduktion 9
Bemærk: Du skal bruge AirPort-værktøj v5.4 til at indstille Time Capsule. Denne Time
Capsule er ikke kompatibel med tidligere versioner af AirPort-software.
Hvad du har brug for
Når du vil bruge Time Capsule, skal du have en computer med trådløse funktioner,
der overholder IEEE 802.11a-, 802.11b- eller 802.11g-standarder eller et udkast til IEEE
802.11n-specifikationen. Hvis du vil indstille Time Capsule, skal computeren opfylde
de krav, der er anført herunder.
Bemærk: Hvis du vil bruge Time Capsule med Time Machine i Mac OS X Leopard,
skal du bruge Mac OS X v10.5.2 eller en nyere version.
AirPort-værktøj
Brug AirPort-værktøj til at indstille Time Capsule, så du kan oprette et trådløst netværk,
oprette forbindelse til Internet og dele kompatible USB-printere og -harddiske. Du kan
også slutte Time Capsule til et eksisterende trådløst AirPort Extreme-netværk.
AirPort-værktøj er også et avanceret værktøj til indstilling og administration af Time
Capsule, AirPort Extreme- og AirPort Express-baser. Brug det, når du skal justere
netværks-, routing-, sikkerheds- og andre avancerede indstillinger.
Z AirPort-statusmenu
Brug AirPort-statusmenuen på menulinjen til hurtigt at skifte mellem AirPort-netværk,
overvåge signalstyrken på det valgte netværk, oprette et computer til computernetværk og slå AirPort til og fra. Statusmenuen er tilgængelig på computere, der
bruger Mac OS X. 10 Kapitel 1 Introduktion
Du skal bruge følgende for at indstille Time Capsule med en Macintosh:
 En Macintosh-computer med et installeret AirPort- eller AirPort Extreme-kort, så den
kan indstilles til trådløs brug, eller en Macintosh-computer, der er sluttet til Time
Capsule med et Ethernet-kabel, så den kan indstilles vha. Ethernet
 Mac OS X v10.4 eller en nyere version
 AirPort-værktøj v5.4 eller en nyere version
Du skal bruge følgende for at indstille Time Capsule med en Windows-computer:
 En Windows-computer med 300 MHz eller højere processorhastighed og et
kompatibelt trådløst 802.11a-, 802.11b- eller 802.11g-kort eller et trådløst kort, der
overholder et udkast til IEEE 802.11n-specifikationen
 Windows XP Home eller Professional (med Service Pack 2 installeret) eller
Windows Vista
 AirPort-værktøj v5.4 eller en nyere version
Slutte Time Capsule til elnettet
Før du slutter Time Capsule til en stikkontakt, skal du sætte de relevante kabler i de
porte, du vil bruge:
 Slut det Ethernet-kabel, der er sluttet til dit DSL- eller kabelmodem (hvis du vil
oprette forbindelse til Internet), til Ethernet WAN-porten (<).
 Slut et USB-kabel, der er sluttet til USB-porten (d) på Time Capsule, til en kompatibel
USB-printer (hvis du vil udskrive til en USB-printer), en -harddisk eller et -samlingspunkt.
 Slut et Ethernet-kabel fra en Ethernet-enhed til Ethernet LAN-portene (G).
Når du har sluttet kablerne til alle de enheder, du vil bruge, skal du sætte netledningen
i netstikket og slutte Time Capsule til en stikkontakt. Der er ingen afbryderknap.Kapitel 1 Introduktion 11
Vigtigt: Brug kun den netledning, der fulgte med Time Capsule.
Når du slutter Time Capsule til en stikkontakt, blinker statusindikatoren grønt i et
sekund, hvorefter den lyser orange, mens Time Capsule starter. Når Time Capsule er
startet, blinker statusindikatoren orange, indtil Time Capsule er opdateret med de
korrekte indstillinger. Statusindikatoren lyser konstant grønt, når Time Capsule er
korrekt indstillet og forbundet med Internet eller et netværk.
Når du slutter Ethernet-kabler til Ethernet-portene, lyser lamperne over portene grønt.
Statuslampen på Time Capsule
I følgende tabel forklares rækkefølgen af indikatorerne på Time Capsule og deres
betydning.
Indikator Status/beskrivelse
Slukket Time Capsule er ikke sluttet til en stikkontakt.
Lyser orange Time Capsule er ved at færdiggøre startsekvensen.
Blinker orange Time Capsule kan ikke oprette forbindelse til netværket eller
Internet, eller der er opstået et problem. Kontroller, at du har
installeret AirPort-værktøj, og brug det til at få oplysninger om,
hvad årsagen til de blinkende statusindikatorer kan være. Se
“Hvis statuslampen på Time Capsule blinker orange” på side 27.
Lyser grønt Time Capsule er tændt og fungerer korrekt. Hvis du vælger Blink
ved aktivitet på lokalmenuen Statusindikator (i vinduet Base
i AirPort-indstillinger i AirPort-værktøj), blinker statusindikatoren
måske grønt for at vise normal aktivitet.12 Kapitel 1 Introduktion
Hvad er det næste?
Når du har tilsluttet Time Capsule , skal du bruge AirPort-værktøj til at indstille den til
at bruge Internetforbindelsen, USB-printeren eller -harddisken eller et eksisterende
netværk. AirPort-værktøj ligger i mappen Hjælpeprogrammer i mappen Programmer
på en computer med Mac OS X og i Start > Alle programmer > AirPort på en computer
med Windows XP eller Windows Vista.
Blinker orange og grønt Måske er der et problem med at starte. Time Capsule genstarter
og prøver igen.
Lyser blåt Time Capsule er klar til at give en trådløs klient adgang til
netværket. Se “Give trådløse klienter adgang til dit netværk uden
en adgangskode” på side 22.
Indikator Status/beskrivelse2
13
2 Indstille Time Capsule
Dette kapitel indeholder oplysninger om og instruktioner i,
hvordan du forbinder Time Capsule med Internet, og hvordan
du bruger AirPort-værktøj til at indstille eller oprette
forbindelse til et trådløst netværk.
Dette kapitel indeholder en oversigt over, hvordan du forbinder Time Capsule med
Internet, og hvordan du bruger indstillingsassistenten i AirPort-værktøj til at indstille
netværket samt andre funktioner på Time Capsule. Hvis du ønsker flere oplysninger om
trådløse netværk og de avancerede funktioner i AirPort-værktøj, henvises du til
dokumentet “Design af AirPort-netværk vha. AirPort-værktøj (Mac OS X v10.5
+ Windows)”, der findes på www.apple.com/dk/support/airport.
Når du har installeret AirPort-værktøj fra den cd, der fulgte med Time Capsule, kan du
udføre de fleste indstillinger af netværket og konfigurationsopgaver vha.
indstillingsassistenten i AirPort-værktøj. Hvis du vil foretage avancerede indstillinger,
skal du vælge Manuel indstilling på Basemenuen i AirPort-værktøj. Se “Angivelse af
avancerede indstillinger” på side 21.14 Kapitel 2 Indstille Time Capsule
Bruge Time Capsule til at indstille et trådløst netværk
Når du indstiller Time Capsule til at levere netværks- og Internetadgang, kan følgende
computere og enheder bruge det trådløse AirPort-netværk til at dele arkiver, spille og
benytte Internetprogrammer som f.eks. webbrowsere og e-postprogrammer:
 Macintosh-computere med AirPort- eller AirPort Extreme-kort
 Trådløse computere, som opfylder kravene til 802.11a-, 802.11b-, 802.11g- og udkastet
til IEEE 802.11n-specifikationerne
 Andre Wi-Fi-enheder
Computere, der er sluttet til Time Capsule vha. Ethernet, kan også få adgang til
netværket for at dele arkiver og oprette forbindelse til Internet.
Med Mac OS X v10.5.2 og nyere versioner kan du indstille Time Machine til at
sikkerhedskopiere alle computerne på netværket til Time Capsule. Se “Bruge Time
Machine med Time Capsule” på side 23, hvis du ønsker yderligere oplysninger.
Hvis du slutter en kompatibel USB-printer til Time Capsule, kan understøttede
computere på netværket (kabelforbundne og trådløse) udskrive til den.Kapitel 2 Indstille Time Capsule 15
Bruge Time Capsule til at oprette et trådløst netværk
Den indstilles på følgende måde:
1 Slut DSL- eller kabelmodemmet til Time Capsule vha. Ethernet WAN-porten (<).
2 Hvis du planlægger at dele en USB-printer på netværket, skal du slutte den til Time
Capsules USB-port (d) eller til et USB-samlingspunkt med et USB-kabel.
til Internet
DSL- eller kabelmodem
< Internet WAN-port
Fælles printer
Time Capsule
til USB-porte
2,4 eller 5 GHz 2,4 GHz
2,4 eller 5 GHz16 Kapitel 2 Indstille Time Capsule
3 Åbn AirPort-værktøj (ligger i mappen Hjælpeprogrammer i mappen Programmer på en
computer med Mac OS X og i Start > Alle programmer > AirPort på en computer med
Windows), vælg Time Capsule, og klik derefter på Fortsæt.
4 Følg vejledningen på skærmen, hvis du vil oprette et nyt netværk.
Du udskriver fra en computer, der bruger Mac OS X v10.5, på følgende måde:
1 Vælg Apple > Systemindstillinger, og klik på Udskriv & fax.
2 Klik på Tilføj (+), og vælg printeren på listen.
3 Klik på knappen Tilføj.
Hvis printeren ikke er på listen, kan du bruge knapperne på værktøjslinjen til at søge
efter den.
Du udskriver fra en computer, der bruger Mac OS X v10.3 eller 10.4, på følgende måde:
1 Åbn Printerværktøj (ligger i mappen Hjælpeprogrammer i mappen Programmer).
2 Vælg printeren på listen.
Hvis printeren ikke står på listen, skal du klikke på Tilføj og vælge Bonjour på
lokalmenuen. Vælg derefter printeren på listen.
Du udskriver fra en computer, der bruger Windows XP eller Windows Vista,
på følgende måde:
1 Installer Bonjour til Windows fra den cd, der fulgte med Time Capsule.
2 Tilslut printeren som beskrevet i instruktionerne på skærmen.
Computere, der bruger AirPort, og computere, der bruger andre trådløse kort eller
moduler, opretter forbindelse til Internet gennem Time Capsule. Computere der er
sluttet til Time Capsules Ethernet-porte, kan også få adgang til netværket og oprette
forbindelse til Internet.Kapitel 2 Indstille Time Capsule 17
Trådløse computere og computere sluttet til Ethernet-portene kan også kommunikere
med hinanden via Time Capsule.
Bruge AirPort-værktøj
Du indstiller og konfigurerer Time Capsule med indstillingsassistenten i AirPort-værktøj.
AirPort-værktøj installeres på din computer, når du installerer software fra cd'en med
Time Capsule.
På en Macintosh-computer med Mac OS X v10.4 eller en nyere version:
1 Åbn AirPort-værktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer.
2 Vælg Time Capsule, og klik på Fortsæt.
Hvis du ikke kan se den Time Capsule, du vil konfigurere, skal du klikke på Søg igen
for at søge efter tilgængelige trådløse enheder og derefter vælge din Time Capsule
på listen.
3 Følg vejledningen på skærmen for at indstille Time Capsule og det trådløse netværk.
På en computer med Windows XP (med Service Pack 2) eller Windows Vista:
1 Åbn AirPort-værktøj, som ligger i Start > Alle programmer > AirPort.
2 Vælg Time Capsule, og klik på Fortsæt.18 Kapitel 2 Indstille Time Capsule
3 Følg vejledningen på skærmen for at indstille Time Capsule og det trådløse netværk.
Indstillingsassistenten i AirPort-værktøj stiller en række spørgsmål om den type
netværk, du vil bruge, og de tjenester, du vil indstille, og hjælper dig med at indtaste
de korrekte indstillinger.
Hvis du bruger Time Capsule til at oprette forbindelse til Internet, skal du have
en bredbåndsforbindelse (med DSL- eller kabelmodem) og en konto hos en
Internetudbyder eller en Internetforbindelse via et eksisterende Ethernet-netværk.
Hvis du har modtaget bestemte oplysninger fra din Internetudbyder (f.eks. en fast
IP-adresse eller en id til DHCP-klient), skal du måske angive dem i AirPort-værktøj.
Hav oplysningerne parat, når du indstiller Time Capsule.Kapitel 2 Indstille Time Capsule 19
Oprettelse af et nyt trådløst netværk
Du kan bruge indstillingsassistenten i AirPort-værktøj til at oprette et nyt trådløst
netværk. Indstillingsassistenten fører dig gennem de trin, der er nødvendige for
at navngive netværket, beskytte netværket med en adgangskode og angive
andre indstillinger.
Hvis du planlægger at dele en USB-printer eller USB-harddisk på netværket:
1 Slut printeren eller harddisken til USB-porten på Time Capsule (d).
2 Åbn AirPort-værktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer
på en Macintosh og i Start > Alle programmer > AirPort på en computer med
Windows XP.
3 Vælg Time Capsule, og klik på Fortsæt.
Hvis du ikke kan se den Time Capsule, du vil konfigurere, skal du klikke på Søg igen
for at søge efter tilgængelige trådløse enheder og derefter vælge din Time Capsule
på listen.
4 Følg vejledningen på skærmen, hvis du vil oprette et nyt netværk.
Konfigurere og dele Internetadgang
Hvis du planlægger at dele Internetforbindelsen med trådløse computere på netværket
eller med computere sluttet til Ethernet-porte, skal Time Capsule indstilles som en
AirPort-base. Når Time Capsule er indstillet, kan computere oprette forbindelse til
Internet via AirPort-netværket. Time Capsule opretter forbindelse til Internet og sender
oplysninger til computere over det trådløse netværk.20 Kapitel 2 Indstille Time Capsule
Før du bruger AirPort-værktøj til at indstille Time Capsule, skal du slutte DSL- eller
kabelmodemmet til Time Capsules Ethernet WAN-port (<). Hvis du slutter Time
Capsule til et Ethernet-netværk med Internetadgang, skal du slutte den til Ethernetnetværket.
Brug indstillingsassistenten i AirPort-værktøj til at angive Internetudbyderens
indstillinger og til at konfigurere, hvordan Time Capsule skal dele indstillingerne med
andre computere.
1 Åbn AirPort-værktøj, som ligger i mappen Hjælpeprogrammer i mappen Programmer
på en computer med Mac OS X og i Start > Alle programmer > AirPort på en computer
med Windows XP.
2 Vælg Time Capsule, og klik på Fortsæt.
Hvis du foretager ændringer i en Time Capsule, der er indstillet, kan det være
nødvendigt at oprette forbindelse til det netværk, den har oprettet, før du foretager
ændringer i Time Capsule.
Du vælger det trådløse netværk, du vil ændre, vha. AirPort-statusmenuen på
menulinjen på Macintosh. På en computer, der bruger Windows XP, skal du holde
markøren over symbolet for den trådløse forbindelse, indtil du kan se netværkets navn
(SSID) og derefter vælge det på listen, hvis der er flere tilgængelige netværk.
3 Følg instruktionerne på skærmen for at konfigurere og dele Internetadgang
på Time Capsule.
Det er hurtigt og nemt at indstille Time Capsule og netværket med AirPort-værktøj.
Hvis du vil foretage yderligere indstillinger til netværket, f.eks. begrænse adgangen
eller foretage avancerede DHCP-indstillinger, kan du vælge Manuel indstilling på
Basemenuen i AirPort-værktøj. Kapitel 2 Indstille Time Capsule 21
Angivelse af avancerede indstillinger
Brug AirPort-værktøj til at indstille Time Capsule manuelt, hvis du vil foretage
avancerede indstillinger af Time Capsule, f.eks. avancerede sikkerhedsindstillinger,
lukkede netværk, længde på DHCP lease, adgangskontrol, energibesparelser,
brugerkonti m.m.
Du foretager avancerede indstillinger på følgende måde:
1 Åbn AirPort-værktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer
på en Macintosh og i Start > Alle programmer > AirPort på en computer med
Windows XP.
2 Hvis der er mere end en trådløs enhed på listen, skal du vælge den, du vil ændre. Hvis
du ikke kan se den Time Capsule, du vil konfigurere, skal du klikke på Søg igen for at
søge efter tilgængelige trådløse enheder og derefter vælge din Time Capsule på listen.
Hvis du foretager ændringer i en Time Capsule, der er indstillet, kan du det være
nødvendigt at oprette forbindelse til det netværk, den har oprettet, før du foretager
ændringer i Time Capsule.
Du vælger det trådløse netværk, du vil ændre, vha. AirPort-statusmenuen på menulinjen
på Macintosh. På en computer, der bruger Windows XP, skal du holde markøren over
symbolet for den trådløse forbindelse, indtil du kan se netværkets navn (SSID) og derefter
vælge det på listen, hvis der er flere tilgængelige netværk.
3 Vælg Manuel indstilling på Basemenuen. Indtast adgangskoden, hvis du bliver bedt
om det.
Du kan finde flere oplysninger om manuel indstilling i AirPort-værktøj i “Design
af AirPort-netværk vha. AirPort-værktøj (Mac OS X v10.5 + Windows)” på
www.apple.com/dk/support/airport.22 Kapitel 2 Indstille Time Capsule
Give trådløse klienter adgang til dit netværk uden
en adgangskode
Hvis dit netværk er beskyttet med en adgangskode vha. WPA Personal eller WPA/WPA2
Personal, kan du give trådløse klienter adgang til netværket, uden at de behøver skrive
adgangskoden til netværket.
Når du giver en klient adgang til dit netværk, opbevares klientens navn og trådløse
MAC-adresse (eller AirPort-id) i adgangskontrollisten i AirPort-værktøj, indtil du fjerner
klienten fra listen. Du kan også give adgang, der er begrænset til 24 timer, hvorefter
klienten ikke længere kan oprette adgang til dit netværk.
Når du giver en klient adgang til dit trådløse netværk, behøver klienten ikke at skrive
adgangskoden til netværket.
Du giver en klient adgang til dit netværk uden at skulle indtaste
netværksadgangskoden på følgende måde:
1 Åbn AirPort-værktøj, vælg din Time Capsule, og vælg Manuel indstilling på
Basemenuen. Skriv evt. adgangskoden.
2 Vælg Tilføj trådløs klient på Basemenuen.
3 Vælg, hvordan klienten skal have adgang til netværket:
 Vælg PIN for at skrive det ottecifrede tal, der leveres af den klient, som anmoder om
adgang til netværket.
 Vælg “Første forsøg” for at give den første klient, der forsøger at oprette forbindelse,
adgang til netværket.
Når Time Capsule venter på, at en klient opretter forbindelse til netværket, blinker
lysdioden blåt.Kapitel 2 Indstille Time Capsule 23
Vælg “Begræns klienters adgang til 24 timer”, hvis du kun vil give adgang til netværket
i et døgn. Hvis du ikke vælger denne mulighed, har klienten adgang til netværket,
indtil du fjerner den fra listen.
Bruge Time Machine med Time Capsule
Med programmet Time Machine i Mac OS X Leopard kan du sikkerhedskopiere alt på
din computer, inkl. fotografier, musik, film og dokumenter.
Når du har indstillet Time Machine, sikkerhedskopierer det automatisk din computer
med regelmæssige mellemrum.
Hvis du bruger Mac OS X v10.5.2 eller en nyere version, vil Time Machine, første gang
du opretter forbindelse til Time Capsule, spørge dig, om du vil bruge programmet til
at sikkerhedskopiere dine arkiver. Klik på “Brug som disk til sikkerhedskopi”, hvorefter
Time Machine sørger for resten.
Brug vinduet Time Machine i Systemindstillinger i Mac OS X Leopard til at indstille
automatisk sikkerhedskopiering, vælge en anden disk til sikkerhedskopier eller justere
andre indstillinger.
Du indstiller eller justerer Time Machine på en computer, der bruger
Mac OS X Leopard, på følgende måde:
1 Vælg Apple > Systemindstillinger, og klik derefter på Time Machine.
2 Skub kontakten til TIL.
3 Klik på Skift disk.
4 Vælg Time Capsule, og klik på “Brug til sikkerhedskopi”.24 Kapitel 2 Indstille Time Capsule
Den første sikkerhedskopiering med Time Capsule og Time Machine kan vare en hel nat
eller endnu længere, afhængigt af hvor mange data du sikkerhedskopierer. Du kan gøre
den første sikkerhedskopiering hurtigere ved at slutte Time Capsule til computeren via
Ethernet. Ved efterfølgende sikkerhedskopiering kopierer Time Machine kun de arkiver,
der er ændret siden den forrige sikkerhedskopiering, så derfor tager
sikkerhedskopieringen ikke lige så lang tid.
Time Capsule er en fantastisk, trådløs løsning til sikkerhedskopiering af bærbare
computere. Da den første sikkerhedskopiering kan vare temmelig længe, skal du slutte
din bærbare computer til strømforsyningen – på den måde sparer du på batteriet og
sikrer, at sikkerhedskopieringen ikke afbrydes. Du opnår desuden den bedste trådløse
ydeevne, hvis du anbringer den bærbare computer i samme lokale som Time Capsule.
Hvis du lukker din Mac ned eller sætter den på vågeblus under sikkerhedskopieringen,
stopper Time Machine sikkerhedskopieringen og fortsætter derefter på samme sted,
når din Mac er startet igen.
Du kan få flere oplysninger om Time Machine, hvis du vælger Hjælp > Mac-hjælp på
Hjælpemenuen på en computer, der bruger Mac OS X Leopard, og derefter skriver
Time Machine i søgefeltet.3
25
3 Tip og fejlfinding
Du kan hurtigt løse de fleste problemer med Time Capsule ved
at følge de råd, der findes i dette kapitel.
Hvis du ikke kan oprette forbindelse til Internet
 Prøv at oprette forbindelse til Internet direkte fra computeren. Hvis du ikke kan
oprette forbindelse, skal du sikre dig, at dine netværksindstillinger er korrekte.
Hvis de ser ud til at være korrekte, og du stadig ikke kan oprette forbindelse,
skal du kontakte Internetudbyderen.
 Sørg for, at du opretter forbindelse til det rigtige trådløse netværk.
Hvis du har glemt adgangskoden til netværket eller
Time Capsule
Du kan slette adgangskoden til AirPort-netværket og Time Capsule ved at nulstille
Time Capsule.
Du nulstiller adgangskoden til Time Capsule på følgende måde:
1 Brug en spids genstand (f.eks. en kuglepen) til at trykke på og holde nulstillingsknappen
inde i et sekund. 26 Kapitel 3 Tip og fejlfinding
Vigtigt: Hvis du holder nulstillingsknappen inde i mere end et sekund, kan du miste
dine netværksindstillinger.
2 Vælg dit AirPort-netværk.
 På en Macintosh skal du bruge AirPort-statusmenuen på menulinjen til at vælge det
netværk, der er oprettet af Time Capsule (navnet på netværket ændres ikke).
 På en computer, der bruger Windows XP, skal du holde markøren over symbolet for den
trådløse forbindelse, indtil du kan se AirPort-netværkets navn (SSID) og derefter
vælge det på listen, hvis der er flere tilgængelige netværk.
3 Åbn AirPort-værktøj (ligger i mappen Hjælpeprogrammer i mappen Programmer på en
Macintosh og i Start > Alle programmer > AirPort på en computer med Windows XP).
4 Vælg Time Capsule, og vælg derefter Manuel indstilling på Basemenuen.
5 Klik på AirPort på værktøjslinjen, og klik derefter på Base.
6 Skriv en ny adgangskode til Time Capsule.
7 Klik på Trådløs, og vælg en krypteringsmetode på lokalmenuen Trådløs sikkerhed for at
slå kryptering til og aktivere og aktivere adgangskodebeskyttelse på AirPort-netværket.
Hvis du slår kryptering til, skal du skrive en ny adgangskode til AirPort-netværket.
8 Klik på Opdater for at genstarte Time Capsule og indlæse de nye indstillinger.
Hvis Time Capsule ikke svarer
Prøv at afmontere den og tilslutte den igen.
Hvis Time Capsule holder helt op med at svare, skal du måske nulstille den.Kapitel 3 Tip og fejlfinding 27
Vigtigt: Når du nulstiller Time Capsule, slettes alle de aktuelle indstillinger,
og fabriksindstillingerne til Time Capsule gendannes.
Du nulstiller Time Capsule til fabriksindstillingerne på følgende måde:
m Brug en spids genstand (f.eks. en kuglepen) til at trykke på og holde
nulstillingsknappen inde, indtil statusindikatoren blinker hurtigt (omkring 5 sekunder).
Time Capsule nulstilles med følgende indstillinger:
 Time Capsule modtager IP-adressen vha. DHCP.
 Netværkets navn nulstilles til Apple Network XXXXXX (hvor XXXXXX erstattes med de
sidste seks cifre i AirPort-id'en).
 Adgangskoden til Time Capsule nulstilles til public.
Hvis Time Capsule stadig ikke reagerer, kan du prøve følgende:
1 Afmonter Time Capsule.
2 Brug en spids genstand til at trykke på og holde nulstillingsknappen inde, mens du
tilslutter Time Capsule.
Hvis statuslampen på Time Capsule blinker orange
Ethernet-kablet er måske ikke tilsluttet korrekt, Time Capsule er måske uden for et
AirPort-netværks rækkevidde, eller der kan være et problem hos Internetudbyderen.
Hvis du har oprettet forbindelse til Internet via et DSL- eller kabelmodem, har
modemmet måske tabt forbindelsen til netværket eller Internet. Selvom modemmet
tilsyneladende fungerer korrekt, kan du prøve at afmontere modemmets strømforsyning,
vente et par sekunder og derefter tilslutte det igen. Sørg for, at Time Capsule er sluttet
direkte til modemmet via Ethernet, før du tilslutter modemmets strømforsyning igen.28 Kapitel 3 Tip og fejlfinding
Hvis du vil vide mere om, hvorfor lampen blinker orange, kan du åbne AirPort-værktøj,
vælge Time Capsule og derefter vælge Manuel indstilling på Basemenuen. Klik på
Status for base for at se oplysninger om den blinkende lampe.
Du kan også vælge “Overvåg baser” i AirPort-indstillinger. Hvis der er et problem
i basen, åbner AirPort-værktøj og hjælper dig med at løse problemet.
Hvis printeren ikke svarer
Hvis du har sluttet en printer til USB-porten på Time Capsule, og computerne på
AirPort-netværket ikke kan udskrive, kan du prøve at gøre følgende:
1 Sørg for, at printeren er tilsluttet og tændt.
2 Kontroller, at kablerne er sluttet korrekt til printeren og til USB-porten på Time Capsule.
3 Sørg for, at printeren er valgt på printerlisten på klientcomputerne.
På en Macintosh-computer med Mac OS X v10.5 eller en nyere version:
 Vælg Apple > Systemindstillinger, og klik på Udskriv & fax.
 Klik på Tilføj (+), vælg printeren på listen, og klik derefter på Tilføj (+).
På en Macintosh-computer med Mac OS X v10.2.7 eller en nyere version:
 Åbn Printerværktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer.
 Klik på Tilføj, hvis printeren ikke står på listen.
 Vælg Bonjour på lokalmenuen, vælg printeren, og klik derefter på Tilføj (+).
På en computer, der bruger Windows XP:
 Åbn “Printere og faxenheder” på menuen Start.Kapitel 3 Tip og fejlfinding 29
 Vælg printeren. Hvis printeren ikke står på listen, skal du klikke på Tilføj printer og
derefter følge vejledningen på skærmen.
4 Sluk for printeren, vent nogle sekunder, og tænd den derefter igen.
Opdatere AirPort-software
Apple frigiver regelmæssigt opdateringer til AirPort-softwaren. Det anbefales, at du
opdaterer Time Capsule, så den bruger den nyeste software.
Du kan vælge “Søg efter opdateringer, når AirPort-værktøj starter” eller “Søg efter
opdateringer” i AirPort-indstillinger. Hvis du vælger “Søg efter opdateringer”, skal du
vælge en tidsangivelse, f.eks. ugentligt, på lokalmenuen for automatisk at søge
efter opdateringer.
Anbefalinger til placering af Time Capsule
Følgende anbefalinger kan hjælpe med til, at Time Capsule opnår den maksimale
trådløse rækkevidde og den optimale netværksdækning.
 Placer Time Capsule i et åbent område, hvor der er få forhindringer, som f.eks. store
møbler eller vægge. Anbring den ikke i nærheden af metalliske overflader.
 Hvis du anbringer Time Capsule bag møbler, skal der mindst være 2,5 cm afstand
mellem Time Capsule og kanten af møblet.
 Undgå at anbringe Time Capsule på steder, der er omgivet af metaloverflader på tre
eller flere sider. 30 Kapitel 3 Tip og fejlfinding
 Hvis du anbringer Time Capsule i et underholdningscenter med dit stereoudstyr, skal
du undgå at omgive Time Capsule fuldstændigt med lyd-, video- og strømkabler.
Anbring Time Capsule, så kablerne er på den ene side. Sørg for, at der er så meget
afstand som muligt mellem Time Capsule og kablerne.
 Forsøg at anbringe Time Capsule mindst 8 m fra mikrobølgeovne og trådløse 2,4 eller
5 GHz telefoner eller andre kilder til forstyrrelse.
 Anbring ikke andre genstande (bøger, aviser, små kæledyr osv.) oven på Time
Capsule. De kan måske forhindre kølingen af Time Capsule.
Forhold, der kan skabe forstyrrelser for AirPort
Jo længere væk kilden til forstyrrelse er, desto mindre sandsynligt er det, at den skaber
problemer. Følgende kan forstørre AirPort-kommunikationen:
 Mikrobølgeovne.
 DSS-radiosignaler (Direct Satellite Service)
 Det originale koaksiale kabel, der følger med visse typer parabolantenner. Kontakt
producenten af udstyret for at få nogle nyere kabler.
 Visse elektriske enheder som højspændingsledninger, elektriske jernbanespor
og elværker
 Trådløse telefoner, der virker inden for 2,4 og 5 GHz båndet. Hvis du har problemer
med din telefon eller AirPort-kommunikation, kan du skifte den kanal, som basen
eller Time Capsule bruger, eller skifte kanal på telefonen.
 Tilstødende baser, der bruger kanaler i nærheden. Hvis f.eks. base A er indstillet til
kanal 1, bør base B indstilles til kanal 6 eller 11.4
31
4 Yderligere oplysninger,
service og support
Du kan finde flere oplysninger om brugen af Time Capsule
på Internet og i hjælpen på skærmen.
Kilder på Internet
Du kan se de nyeste oplysninger om Time Capsule på www.apple.com/dk/airport.
Hvis du vil registrere Time Capsule (hvis du ikke gjorde det, da du installerede software
på cd'en med Time Capsule), skal du gå til www.apple.com/register.
Oplysninger om service og support til AirPort, forskellige fora med produktoplysninger
og feedback samt den nyeste software fra Apple findes på
www.apple.com/dk/support/airport.
Du kan få support uden for USA ved at gå ind på www.apple.com/dk/support og
derefter vælge dit land.32 Kapitel 4 Yderligere oplysninger, service og support
Hjælp på skærmen
Hvis du vil vide mere om brugen af AirPort-værktøj sammen med Time Capsule, skal du
åbne AirPort-værktøj og vælge Hjælp > Hjælp til AirPort-værktøj.
Garantiservice
Hvis Time Capsule er beskadiget eller ikke fungerer korrekt, skal du følge vejledningen
i dette hæfte, i hjælpen på skærmen og i ressourcerne på Internet.
Hvis Time Capsule stadig ikke virker, skal du gå til www.apple.com/dk/support for at få
oplysninger om, hvordan du får garantiservice.
Finde serienummeret på Time Capsule
Serienummeret er trykt i bunden af Time Capsule.33
Appendiks
Specifikationer og retningslinjer
for sikkerhed for Time Capsule
Specifikationer for Time Capsule
 Frekvens: 2,4 og 5 GHz
 Sendestyrke: Op til 23 dBm (nominelt)
 Standarder: 802.11 DSSS 1 og 2 Mbps, 802.11a-, 802.11b-, 802.11g-specifikationer og
udkast til 802.11n-specifikation
Grænseflader
 1 RJ-45 10/100/1000Base-T Gigabit Ethernet WAN (<)
 3 RJ-45 10/100/1000Base-T Gigabit Ethernet LAN (G)
 USB 2.0 (Universal Serial Bus) (d)
 Trådløs 802.11 a/b/g/n AirPort Extreme
Specifikationer for omgivelser
 Driftstemperatur: 0° C til 35° C
 Opbevaringstemperatur: –25° C til 60° C
 Relativ luftfugtighed (drift): 20% til 80%
 Relativ luftfugtighed (opbevaring): 10% til 90%, ikke kondenserende34 Appendiks Specifikationer og retningslinjer for sikkerhed for Time Capsule
Størrelse og vægt
 Længde: 197,0 mm
 Bredde: 197,0 mm
 Højde: 36,33 mm
 Vægt: 1,6 kg
MAC-adresser (Media Access Control) på hardware
Time Capsule har tre hardwareadresser trykt i bunden af kabinettet:
 AirPort-id: De to adresser bruges til at identificere Time Capsule på et trådløst netværk.
 Ethernet-id: Det kan være nødvendigt at opgive denne adresse til din Internetudbyder
for at slutte Time Capsule til Internet.
Sikker brug af Time Capsule
 Du kan kun afbryde strømmen til Time Capsule ved at tage ledningen ud
af stikkontakten.
 Når du tænder eller slukker for Time Capsule, skal du altid holde den i siderne.
Sørg for, at du ikke rører ved metalbenene på stikket.
 Time Capsule må under ingen omstændigheder åbnes, heller ikke når den er
afmonteret. Hvis Time Capsule har brug for service, skal du læse “Yderligere
oplysninger, service og support” på side 31.
 Tving aldrig et stik ind i en port. Hvis stikket ikke kan sættes i porten uden besvær,
passer det sikkert ikke til porten. Sørg for, at du bruger det rigtige stik, og hold stikket
korrekt i forhold til porten.Appendiks Specifikationer og retningslinjer for sikkerhed for Time Capsule 35
Om drifts- og opbevaringstemperaturer
 Når du bruger Time Capsule, vil kabinettet normalt blive varmt. Time Capsulekabinettet fungerer som en kølende overflade, der overfører varme fra enhedens
inderside til den køligere luft udenfor.
Undgå våde steder
 Hold Time Capsule væk fra væsker som f.eks. drikkevarer, håndvaske, badekar,
brusekabiner osv.
 Beskyt Time Capsule mod direkte sollys og regn eller anden fugt.
 Pas på ikke at spilde mad eller væske på Time Capsule. Hvis du gør det, skal du tage
ledningen ud af stikkontakten, før du fjerner det spildte.
 Brug ikke Time Capsule udendørs. Time Capsule er beregnet til indendørs brug.
Foretag ikke selv reparationer
Om håndtering
Time Capsule kan blive beskadiget, hvis den ikke opbevares og håndteres korrekt.
Vær omhyggelig med ikke at tabe Time Capsule, når du transporterer den.
ADVARSEL: Reducer risikoen for elektrisk stød eller beskadigelse ved at undlade at
bruge Time Capsule i eller i nærheden af vand eller våde områder.
ADVARSEL: Forsøg ikke at åbne Time Capsule eller skille enheden ad. Du risikerer at få
elektrisk stød, og at den begrænsede garanti ikke længere gælder. Udstyret indeholder
ingen komponenter, som brugeren selv kan reparere eller udskifte.36
Regulatory Compliance Information
Wireless Radio Use
This device is restricted to indoor use due to its
operation in the 5.15 to 5.25 GHz frequency range to
reduce the potential for harmful interference to cochannel Mobile Satellite systems.
Cet appareil doit être utilisé à l’intérieur.
Exposure to Radio Frequency Energy
The radiated output power of this device is well below
the FCC and EU radio frequency exposure limits.
However, this device should be operated with a
minimum distance of at least 20 cm between its
antennas and a person’s body and the antennas used
with this transmitter must not be colocated or operated
in conjunction with any other antenna or transmitter
subject to the conditions of the FCC Grant.
FCC Declaration of Conformity
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received,
including interference that may cause undesired
operation. See instructions if interference to radio
or television reception is suspected
Radio and Television Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed and
used properly—that is, in strict accordance with Apple’s
instructions—it may cause interference with radio and
television reception.
This equipment has been tested and found to comply
with the limits for a Class B digital device in accordance
with the specifications in Part 15 of FCC rules. These
specifications are designed to provide reasonable
protection against such interference in a residential
installation. However, there is no guarantee that
interference will not occur in a particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the interference
stops, it was probably caused by the computer or one of
the peripheral devices.
If your computer system does cause interference to
radio or television reception, try to correct the
interference by using one or more of the following
measures:
 Turn the television or radio antenna until the
interference stops.
 Move the computer to one side or the other of the
television or radio.
 Move the computer farther away from the television
or radio.
 Plug the computer into an outlet that is on a different
circuit from the television or radio. (That is, make
certain the computer and the television or radio are
on circuits controlled by different circuit breakers
or fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product.
Or, consult an experienced radio/television technician
for additional suggestions.
Important: Changes or modifications to this product not
authorized by Apple Inc. could void the EMC compliance
and negate your authority to operate the product.37
This product was tested for FCC compliance under
conditions that included the use of Apple peripheral
devices and Apple shielded cables and connectors
between system components. It is important that you
use Apple peripheral devices and shielded cables and
connectors between system components to reduce the
possibility of causing interference to radios, television
sets, and other electronic devices. You can obtain Apple
peripheral devices and the proper shielded cables and
connectors through an Apple-authorized dealer. For
non-Apple peripheral devices, contact the manufacturer
or dealer for assistance.
Responsible party (contact for FCC matters only) Apple Inc.,
Corporate Compliance, 1 Infinite Loop M/S 26-A, Cupertino,
CA 95014-2084
Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment regulations.
Cet appareil numérique de la Class B respecte toutes
les exigences du Règlement sur le matériel brouilleur
du Canada.
VCCI Class B Statement
Europa – erklæring om opfyldelse af EU-krav
Du kan læse mere på webstedet
www.apple.com/euro/compliance.
Den Europæiske Union – oplysninger om
bortskaffelse
Dette symbol betyder, at dit produkt bør bortskaffes
adskilt fra husholdningsaffald i henhold til nationale
love og regulativer. Når dette produkts livscyklus er
forbi, skal du aflevere det på en genbrugsplads, som er
godkendt af de lokale myndigheder. På nogle
genbrugspladser er det gratis at aflevere produkter.
Den indsamling og genbrug af dit produkt, som sker
i forbindelse med bortskaffelsen, hjælper med at bevare
naturens ressourcer, og sikrer, at produktet genbruges
på en måde, som beskytter vores sundhed og miljø.
Oplysninger om bortskaffelse og genbrug
Produktet har et internt batteri. Brugte batterier skal
genbruges eller destrueres i henhold til gældende
regler. Der findes oplysninger om Apples
genbrugsprogram på www.apple.com/environment.
California: The coin cell battery in your product contains
perchlorates. Special handling and disposal may apply.
Refer to www.dtsc.ca.gov/hazardouswaste/perchlorate.
Deutschland: Dieses Gerät enthält Batterien. Bitte nicht
in den Hausmüll werfen. Entsorgen Sie dieses Gerätes
am Ende seines Lebenszyklus entsprechend der
maßgeblichen gesetzlichen Regelungen.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca)
worden gedeponeerd.38
Taiwan:
Singapore Wireless Certification
Taiwan Warning Statements
Korea Warning Statements
© 2009 Apple Inc. Alle rettigheder forbeholdes.
Apple, Apple-logoet, AirPort, AirPort Express, AirPort
Extreme, Apple TV, Bonjour, iPod, Leopard, Macintosh,
Mac OS og Time Capsule er varemærker tilhørende
Apple Inc. og er registreret i USA og andre lande. Finder,
iPhone og Time Machine er varemærker tilhørende
Apple Inc.
Andre nævnte produkt- og firmanavne kan være
varemærker tilhørende deres respektive ejere.www.apple.com/airport
www.apple.com/support/airport
DK019-1384
iPod nano
Benutzerhandbuch2
2 Inhalt
Kapitel 1 4 iPod nano-Grundlagen
4 Der iPod nano im Überblick
5 Verwenden der Bedienelemente des iPod nano
10 Verwenden der Menüs des iPod nano
13 Der interne Lautsprecher des iPod nano
14 Verbinden und Trennen des iPod nano
17 Die Batterie des iPod nano
Kapitel 2 21 Einrichten des iPod nano
22 Einrichten Ihrer iTunes-Mediathek
22 Importieren von Musik in iTunes
24 Hinzufügen weiterer Details zu Ihrer iTunes-Mediathek
24 Verwalten Ihrer Musik
26 Importieren von Videos in iTunes
27 Hinzufügen von Musik, Videos und anderen Inhalten zum iPod nano
27 Erstmaliges Verbinden des iPod nano mit einem Computer
29 Automatisches Synchronisieren von Musik
31 Automatisches Synchronisieren von Videos
33 Hinzufügen von Podcasts zum iPod nano
33 Hinzufügen von iTunes U-Inhalten zum iPod nano
34 Hinzufügen von Hörbüchern zum iPod nano
35 Hinzufügen weiterer Inhalte zum iPod nano
35 Manuelles Verwalten des iPod nano
37 Einrichten von VoiceOver
Kapitel 3 38 Anhören von Musik
38 Abspielen von Musik und anderem Audiomaterial
45 Verwenden der Funktion „Genius“ auf dem iPod nano
56 Abspielen von Podcasts
56 Abspielen von iTunes U-Inhalten
57 Anhören von HörbüchernInhalt 3
Kapitel 4 58 Ansehen von Videos
58 Ansehen von Videos auf dem iPod nano
59 Ansehen von Videos auf einem an den iPod nano angeschlossenen Fernsehgerät
Kapitel 5 62 Verwenden der Videokamera
63 Aufnehmen von Video
64 Abspielen aufgenommener Videos
65 Löschen aufgenommener Videos
65 Importieren aufgenommener Videos auf Ihren Computer
Kapitel 6 69 Anhören von FM-Radiosendungen
71 Einstellen des FM-Radios
72 Stoppen von Live-Radiosendungen
75 Kennzeichnen von Titeln für die Synchronisierung mit iTunes
76 Verwenden des Menüs „Radio“
Kapitel 7 78 Fotofunktionen
81 Anzeigen von Fotos
84 Hinzufügen von Fotos vom iPod nano zu einem Computer
Kapitel 8 85 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
85 Verwenden des iPod nano als Schrittzähler
88 Aufzeichnen von Sprachmemos
91 Verwenden zusätzlicher Einstellungen
96 Synchronisieren von Kontakten, Kalendern und Aufgabenlisten
98 Mono Audio
98 Verwenden der Sprachausgabe für Menüs als Bedienungshilfe
99 Verwenden des iPod nano als externes Volume
100 Sichern und Lesen von Textnotizen
101 iPod nano-Zubehör
Kapitel 9 103 Tipps und Fehlerbeseitigung
103 Allgemeine Vorschläge
110 Aktualisieren und Wiederherstellen der iPod-Software
Kapitel 10 111 Sicherheit und Pflege
111 Wichtige Sicherheitsinformationen
115 Wichtige Informationen zur Handhabung
Kapitel 11 116 Weitere Informationen, Service und Support1
4
1 iPod nano-Grundlagen
Lesen Sie in diesem Kapitel, welche Funktionen Ihr iPod nano
bietet, wie Sie seine Bedienelemente benutzen und vieles
mehr.
Der iPod nano im Überblick
Lernen Sie die Bedienelemente des iPod nano kennen:
30-poliger Anschluss
Click Wheel
Vor/Schneller Vorlauf
Mitteltaste
Kopfhöreranschluss
Taste „Menu“
Zurück/Schneller
Rücklauf
Start/Pause
Schalter „Hold“
Mikrofon
ObjektivKapitel 1 iPod nano-Grundlagen 5
Neue Merkmale und Funktionen des iPod nano
 Größerer 2,2"-Bildschirm
 Gehäuse aus poliertem Aluminium
 Integrierte Videokamera für die Aufnahme von Videos mit Spezialeffekten
 FM-Radio mit Pausenfunktion für Live-Sendungen und Kennzeichnung von Titeln
für den Kauf im iTunes Store (Kennzeichnung möglicherweise nicht in allen Ländern
möglich)
 Lautsprecher und Mikrofon integriert
 Schrittzähler zur Aufzeichnung von Trainingserfolgen
Verwenden der Bedienelemente des iPod nano
Die Bedienelemente des iPod nano sind einfach zu finden und zu verwenden. Drücken
Sie eine beliebige Taste, um den iPod nano einzuschalten.
Wenn Sie den iPod nano das erste Mal einschalten, wird das Sprachmenü angezeigt.
Blättern Sie mit dem Click Wheel zu Ihrer Sprache und drücken Sie dann die Mitteltaste,
um die Sprache auszuwählen. Nun wird das Hauptmenü in Ihrer Sprache angezeigt.
Verwenden Sie das Click Wheel und die Mitteltaste, um durch die Menüs auf dem Bildschirm zu navigieren und um Musiktitel abzuspielen, Einstellungen zu ändern und
Informationen abzurufen.
Bewegen Sie den Daumen leicht über das Click Wheel, um eine Menüoption hervorzuheben. Drücken Sie die Mitteltaste, um die Option auszuwählen.
Drücken Sie die Taste „Menu“, um zum vorherigen Menü zurückzuwechseln.6 Kapitel 1 iPod nano-Grundlagen
Für folgende Funktionen verwenden Sie die iPod nano-Bedienelemente:
Funktion Aktion
Einschalten des iPod nano Drücken Sie eine beliebige Taste.
Ausschalten des iPod nano Drücken Sie die Taste „Start/Pause“ (’) und halten Sie diese
gedrückt.
Einschalten der
Hintergrundbeleuchtung
Drücken Sie eine beliebige Taste oder verwenden Sie das
Click Wheel.
Deaktivieren der iPod nanoBedienelemente
(damit die Tasten nicht aus
Versehen gedrückt werden)
Schieben Sie den Schalter „Hold“ auf „Hold“ (ein orangefarbenes
Feld wird angezeigt).
Zurücksetzen des iPod nano
(wenn er nicht reagiert)
Schieben Sie den Schalter „Hold“ auf „Hold“ und wieder in die vorherige Position. Drücken Sie die Taste „Menu“ und die Mitteltaste
gleichzeitig etwa 6 Sekunden lang, bis das Apple-Logo zu sehen ist.
Auswählen eines Menüobjekts Blättern Sie mit dem Click Wheel zum gewünschten Objekt und
drücken Sie die Mitteltaste, um das Objekt auszuwählen.
Zurückkehren zum vorherigen
Menü
Drücken Sie die Taste „Menu“.
Zurückkehren direkt zum
Hauptmenü
Drücken und halten Sie die Taste „Menu“.
Zugreifen auf weitere Optionen Drücken und halten Sie die Mitteltaste, bis ein Menü
angezeigt wird.
Suchen nach einem Titel Wählen Sie „Musik“ aus dem Hauptmenü.
Suchen nach einem Video Wählen Sie „Videos“ aus dem Hauptmenü.
Abspielen eines Musiktitels
oder Videos
Wählen Sie den Musiktitel oder das Video aus und drücken Sie die
Mitteltaste oder die Taste „Start/Pause“ (’). Der iPod nano muss
auf dem Computer ausgeworfen werden, damit Musiktitel und
Videos abgespielt werden können.
Anhalten eines Musiktitels oder
Videos
Drücken Sie die Taste „Start/Pause“ (’) oder ziehen Sie den
Stecker der Ohrhörer aus dem Anschluss.
Ändern der Lautstärke Wenn der Bildschirm „Sie hören“ zu sehen ist, können Sie hierzu das
Click Wheel verwenden.
Abspielen aller Musiktitel in
einer Wiedergabeliste oder
einem Album
Wählen Sie eine Wiedergabeliste oder ein Album aus und drücken
Sie die Taste „Start/Pause“ (’).
Zufällige Wiedergabe Wählen Sie „Zufällige Titel“ aus dem Hauptmenü.
Wechseln zu einem zufällig
gewählten Titel
Schütteln Sie den iPod nano.
Aktivieren oder Deaktivieren
der Option „Schütteln“ für die
Zufallswiedergabe
Wählen Sie „Einstellungen“ > „Wiedergabe“, wählen Sie „Schütteln“
und wählen Sie dann „Zufällig“ oder „Aus“.Kapitel 1 iPod nano-Grundlagen 7
Wechseln zu einer beliebigen
Stelle in einem Musiktitel
oder Video
Drücken Sie, wenn der Bildschirm „Sie hören“ zu sehen ist, die
Mitteltaste, um den Navigationsbalken einzublenden (die Abspielposition auf dem Balken gibt die aktuelle Position im Titel an) und
navigieren Sie dann zu einem beliebigen Punkt im Musiktitel
oder Video.
Springen zum nächsten Musiktitel oder Kapitel in einem
Hörbuch oder Podcast
Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘).
Erneutes Abspielen eines
Musiktitels oder Videos von
Anfang an
Drücken Sie die Taste „Zurück/Schneller Rücklauf“ (]).
Vor- oder Zurückspulen eines
Titels, eines Videos oder einer
gestoppten Radiosendung
Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) bzw. „Zurück/
Schneller Rücklauf“ (]) und halten Sie diese gedrückt.
Hinzufügen eines Titels zur
„On-The-Go“-Wiedergabeliste
Spielen Sie einen Musiktitel ab oder wählen Sie ihn aus. Drücken
Sie dann die Mitteltaste und halten Sie diese gedrückt, bis ein
Menü angezeigt wird. Wählen Sie „Zu On-the-Go hinzufügen“
und drücken Sie die Mitteltaste.
Abspielen des vorherigen
Musiktitels oder Kapitels in
einem Hörbuch oder Podcast
Drücken Sie zweimal die Taste „Zurück/Schneller Rücklauf“ (]).
Erstellen einer GeniusWiedergabeliste
Spielen Sie einen Musiktitel ab oder wählen Sie ihn aus. Drücken
Sie dann die Mitteltaste und halten Sie diese gedrückt, bis ein
Menü angezeigt wird. Wählen Sie „Genius starten“ und drücken Sie
dann die Mitteltaste (die Option „Genius starten“ wird nur dann auf
dem Bildschirm „Sie hören“ angezeigt, wenn für den ausgewählten
Titel Genius-Daten vorliegen).
Sichern einer GeniusWiedergabeliste
Erstellen Sie eine Genius-Wiedergabeliste, wählen Sie „Liste sichern“
und drücken Sie dann die Mitteltaste.
Abspielen einer gesicherten
Genius-Wiedergabeliste
Wählen Sie aus dem Menü „Wiedergabelisten“ eine Genius-Wiedergabeliste aus und drücken Sie dann die Taste „Start/Pause“ (’).
Abspielen einer GeniusMischung (Genius-Mix)
Wählen Sie „Genius-Mixe“ aus dem Menü „Musik“. Wählen Sie eine
Mischung und drücken Sie dann die Taste „Start/Pause“ (’).
Aufnehmen von Videos Wählen Sie „Videokamera“ aus dem Hauptmenü. Drücken Sie die
Mitteltaste, um die Aufnahme zu starten oder zu stoppen.
Aufnehmen von Videos mit
Spezialeffekten
Drücken Sie vor der Aufnahme die Mitteltaste und halten Sie sie
gedrückt, um Effekte anzuzeigen. Blättern Sie dann mit dem Click
Wheel durch die Effekte und wählen Sie mit der Mitteltaste den
gewünschten Effekt aus. Drücken Sie erneut die Mitteltaste, um die
Aufnahme zu starten.
Wiedergeben aufgenommener
Videos
Drücken Sie die Mitteltaste, um die Aufnahme zu beenden. Drükken Sie dann die Taste „Menu“, um den Bildschirm „Film“ zu öffnen.
Wählen Sie ein Video aus und spielen Sie es durch Drücken der Mitteltaste ab.
Funktion Aktion8 Kapitel 1 iPod nano-Grundlagen
Ansehen aufgenommener
Videos
Wählen Sie aus dem Menü „Videos“ die Option „Filme“ aus. Wählen
Sie dann ein Video aus und drücken Sie die Taste „Start/Pause“ (’).
Anhören von
FM-Radiosendungen
Wählen Sie „Radio“ aus dem Hauptmenü.
Auswählen eines
FM-Radiosenders
Verwenden Sie das Click Wheel, um den gewünschten Sender einzustellen.
Wechseln zwischen
FM-Radiosendern
Wenn die Radiosenderauswahl angezeigt wird, drücken Sie die
Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“
(]), um zum nächsten oder vorherigen Radiosender zu wechseln.
Nicht verfügbar, wenn Radiosender als Favoriten gesichert werden.
Suchen nach FM-Radiosendern Wenn die Radiosenderauswahl angezeigt wird, drücken und halten
Sie die Taste „Vor/Schneller Vorlauf“ (‘). Drücken Sie die Mitteltaste, um die Sendersuche zu stoppen.
Sichern eines FM-Radiosenders
als Favoriten
Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt
wird. Wählen Sie dann „Voreinstellung hinzufügen“.
Stoppen und Fortsetzen von
Live-Radiosendungen
Drücken Sie in einem beliebigen Bildschirm die Taste „Start/Pause“
(’), während Sie Radio hören. Drücken Sie erneut die Taste „Start/
Pause“ (’), um die Wiedergabe fortzusetzen. Bei einer Änderung
des Radiosenders werden gestoppte Radiosendungen gelöscht.
Wechseln zwischen Radiosenderauswahl und dem Bildschirm „Live-Pause“
Drücken Sie die Mitteltaste.
Kennzeichnen eines Titels
im Radio
Drücken Sie die Mitteltaste und halten Sie sie gedrückt, um Titel zu
kennzeichnen, die über ein entsprechendes Symbol verfügen. Synchronisieren Sie Ihren iPod mit iTunes, um eine Hörprobe gekennzeichneter Titel abzuspielen und sie zu kaufen.
Verwenden des Schrittzählers
(Pedometer)
Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und
anschließend „Pedometer“ aus. Drücken Sie die Mitteltaste, um die
Erfassung der Trainingsdaten zu starten oder zu stoppen.
Aufnehmen eines
Sprachmemos
Wählen Sie aus dem Menüs „Extras“ die Option „Sprachmemos“.
Drücken Sie die Taste „Start/Pause“ (’), um die Aufnahme zu starten oder zu stoppen. Drücken Sie die Mitteltaste, um Kapitelmarkierungen hinzuzufügen.
Ermitteln der Seriennummer
des iPod nano
Wählen Sie aus dem Hauptmenü „Einstellungen“ > „Über“ und
drücken Sie die Mitteltaste, bis die Seriennummer angezeigt wird.
Alternativ können Sie auf der Rückseite des iPod nano nachsehen.
Funktion AktionKapitel 1 iPod nano-Grundlagen 9
Deaktivieren der Bedienelemente des iPod nano
Wenn Sie vermeiden möchten, versehentlich den iPod nano einzuschalten oder
Bedienelemente zu aktivieren, können Sie diese mit dem Schalter „Hold“ deaktivieren.
Mit dem Schalter „Hold“ wird das Click Wheel deaktiviert, ebenso wie Funktionen, die
durch Bewegung aktiviert werden, etwa das Schütteln für die Zufallswiedergabe und
das Drehen zum Starten oder Beenden von Cover Flow.
Gehen Sie wie folgt vor, um die Bedienelemente des iPod nano zu deaktivieren:
m Schieben Sie den Schalter „Hold“ auf „Hold“ (ein orangefarbenes Feld wird angezeigt).
Wenn Sie die Bedienelemente deaktivieren, während Sie den iPod nano verwenden,
wird das gerade abgespielte Objekt (Titel, Wiedergabeliste, Podcast oder Video) weiterhin abgespielt. Auch der Schrittzähler zählt weiterhin die Schritte, wenn er aktiviert ist.
Möchten Sie die Wiedergabe anhalten oder unterbrechen, schieben Sie den Schalter
„Hold“ zurück, um die Bedienelemente wieder zu aktivieren.10 Kapitel 1 iPod nano-Grundlagen
Verwenden der Menüs des iPod nano
Nach dem Einschalten des iPod nano wird das Hauptmenü angezeigt. Wählen Sie
Menüoptionen aus, um Funktionen auszuführen oder zu anderen Menüs zu wechseln.
Symbole am oberen Rand des Bildschirms zeigen den Status des iPod nano an.
Angezeigtes Objekt Funktion
Menütitel Zeigt den Titel des aktuellen Menüs an. Der Titel des Menüs wird
nicht angezeigt, wenn das Schlosssymbol zu sehen ist.
Schrittzählersymbol Wird eingeblendet, wenn der Schrittzähler aktiviert ist.
Wiedergabesymbol Das Symbol für „Wiedergabe“ (“) wird angezeigt, wenn ein Musiktitel, ein Video oder ein sonstiges Objekt abgespielt wird. Das Symbol für „Pause“ (1) wird angezeigt, wenn das Objekt angehalten
wurde.
Batteriesymbol Das Batteriesymbol zeigt den ungefähren Ladezustand der
Batterie an.
Schlosssymbol Das Schlosssymbol wird angezeigt, wenn der Schalter „Hold“ auf
„Hold“ gesetzt ist. Dieses Symbol weist darauf hin, dass die Bedienelemente des iPod nano deaktiviert sind. Das Schlosssymbol
ersetzt dann den Menütitel.
Menüoptionen Mit dem Click Wheel können Sie durch die Menüoptionen blättern.
Drücken Sie die Mitteltaste, um eine Option auszuwählen. Ein Pfeil
neben einer Menüoption zeigt an, dass die Option zu einem weiteren Menü oder einem weiteren Bildschirm führt.
Vorschaubereich Zeigt Albumcover, Fotos und andere Informationen zum gewählten Menüobjekt an.
Menütitel
Schrittzählersymbol Batteriesymbol
Menüoptionen
Vorschaubereich
Wiedergabesymbol
SchlosssymbolKapitel 1 iPod nano-Grundlagen 11
Hinzufügen oder Löschen von Menüoptionen im Hauptmenü
Sie können, falls gewünscht, häufig verwendete Optionen zum iPod nano-Hauptmenü
hinzufügen. Sie können beispielsweise die Menüoption „Titel“ zum Hauptmenü hinzufügen, sodass Sie nicht mehr „Musik“ wählen müssen, bevor Sie „Titel“ auswählen
können.
Gehen Sie wie folgt vor, um Optionen im Hauptmenü hinzuzufügen oder zu löschen:
1 Wählen Sie „Einstellungen“ > „Allgemein“ > „Hauptmenü“.
2 Wählen Sie alle Objekte aus, die im Hauptmenü angezeigt werden sollen. Ein Häkchen
weist darauf hin, welche Objekte hinzugefügt wurden.
Deaktivieren des Vorschaubereichs
Im Vorschaubereich unten im Hauptmenü werden Albumcover, Fotominiaturen,
der verfügbare Speicherplatz und weitere Informationen angezeigt. Sie können den
Vorschaubereich deaktivieren, um mehr Platz für die Anzeige von Menüobjekten
zu erhalten.
Gehen Sie wie folgt vor, um den Vorschaubereich zu aktivieren oder zu deaktivieren:
m Wählen Sie „Einstellungen“ > „Allgemein“ > „Hauptmenü“ > „Vorschau“ und drücken Sie
dann die Mitteltaste, um „Ein“ oder „Aus“ auszuwählen.
Im Vorschaubereich werden Albumcover zu einer bestimmten Kategorie nur dann
angezeigt, wenn auf dem iPod nano in der entsprechenden Kategorie mindestens
fünf Objekte mit Covern vorhanden sind.
Festlegen der Schriftgröße in Menüs
Der iPod nano kann Text in zwei verschiedenen Größen anzeigen: Standard und Groß.
Gehen Sie wie folgt vor, um die Schriftgröße festzulegen:
m Wählen Sie „Einstellungen“ > „Allgemein“ > „Schriftgröße“ und wählen Sie dann durch
Drücken der Mitteltaste „Standard“ oder „Groß“ aus.
Einstellen der Sprache
Der iPod nano bietet verschiedene Sprachen zur Auswahl.
Gehen Sie wie folgt vor, um die Sprache festzulegen:
m Wählen Sie „Einstellungen“ > „Sprache“ und wählen Sie dann eine Sprache aus.12 Kapitel 1 iPod nano-Grundlagen
Einstellen des Timers für die Hintergrundbeleuchtung
Sie können festlegen, dass die Hintergrundbeleuchtung den Bildschirm für eine
bestimmte Dauer beleuchtet, wenn Sie eine Taste drücken oder das Click Wheel
verwenden. Die Standardeinstellung hierfür ist 10 Sekunden.
Gehen Sie wie folgt vor, um den Timer für die Hintergrundbeleuchtung einzustellen:
m Wählen Sie „Einstellungen“ > „Allgemein“ > „Beleuchtung“ und wählen Sie dann die
gewünschte Zeitspanne aus. Wählen Sie „Immer ein“, um zu verhindern, dass die Hintergrundbeleuchtung ausgeschaltet wird (bei Auswahl dieser Option verringert sich die
Batterieleistung).
Einstellen der Helligkeit des Bildschirms
Sie können die Helligkeit des iPod nano-Bildschirms anpassen.
Gehen Sie wie folgt vor, um die Helligkeit des Bildschirms festzulegen:
m Wählen Sie „Einstellungen“ > „Allgemein“ > „Helligkeit“ und passen Sie die Helligkeit mit
dem Click Wheel an.
Sie können die Helligkeit einstellen, während eine Diashow oder ein Video wiedergegeben wird. Drücken Sie die Mitteltaste, bis der Helligkeitsregler angezeigt wird. Passen
Sie die Helligkeit dann mit dem Click Wheel an.
Deaktivieren des Click Wheel-Klicktons
Beim Blättern durch Menüobjekte kann über die Ohrhörer oder Kopfhörer und den
internen Lautsprecher des iPod nano ein Klickton ausgegeben werden. Der Klickton des
Click Wheel lässt sich deaktivieren.
Gehen Sie wie folgt vor, um den Click Wheel-Klickton zu deaktivieren:
m Wählen Sie „Einstellungen“ > „Allgemein“ und setzen Sie die Option „Klicken“ auf „Aus“.
Setzen Sie die Option „Klicken“ auf „Ein“, um den Klickton wieder zu aktivieren.
Schnelles Blättern durch lange Listen
Sie können schnell durch eine lange Liste blättern, indem Sie den Daumen schnell auf
dem Click Wheel bewegen.
Hinweis: Es werden nicht alle Sprachen unterstützt.
Gehen Sie wie folgt vor, um schnell durch Objekte zu blättern:
1 Bewegen Sie Ihren Daumen schnell auf dem Click Wheel, um einen Buchstaben des
Alphabets auf dem Bildschirm anzuzeigen.
2 Navigieren Sie mit dem Click Wheel im Alphabet zum ersten Buchstaben des Objekts,
das Sie suchen.
Objekte, deren erstes Zeichen ein Symbol oder eine Zahl ist, werden nach dem Buchstaben „Z“ aufgeführt.Kapitel 1 iPod nano-Grundlagen 13
3 Nehmen Sie den Daumen kurz vom Click Wheel, um mit normaler Geschwindigkeit
zu blättern.
4 Navigieren Sie mit dem Click Wheel zu dem gewünschten Objekt.
Informationen zu Ihrem iPod nano
Sie können Informationen zu Ihrem iPod nano abrufen, etwa die Größe des verfügbaren Speicherplatzes, die Anzahl der Musiktitel, Videos, Fotos und sonstigen gespeicherten Objekte sowie die Seriennummer, das Modell und die Softwareversion.
Gehen Sie wie folgt vor, um Informationen zu Ihrem iPod nano abzurufen:
m Wählen Sie „Einstellungen“ > „Über“ und drücken Sie die Mitteltaste, um nacheinander
alle Informationsbildschirme einzublenden.
Zurücksetzen aller Einstellungen
Sie können alle Objekte im Menü „Einstellungen“ auf ihre Standardeinstellung
zurücksetzen.
Gehen Sie wie folgt vor, um alle Einstellungen zurückzusetzen:
m Wählen Sie „Einstellungen“ > „Einstellungen zurücksetzen“ und wählen Sie dann
„Zurücksetzen“.
Der interne Lautsprecher des iPod nano
Mit dem internen Lautsprecher des iPod nano können Sie beliebiges Audiomaterial auf
dem iPod nano ohne Ohr- oder Kopfhörer anhören. Eine Ausnahme stellen Sendungen
des integrierten FM-Radios dar, das das Kabel von Ohr- oder Kopfhörer als Antenne
nutzt.
Durch den Anschluss von Ohr- oder Kopfhörern an den iPod nano wird der interne
Lautsprecher deaktiviert. Das gerade wiedergegebene Audiomaterial wird weiterhin
abgespielt, allerdings nur über die Ohr- oder Kopfhörer.
Wenn Sie die Ohr- oder Kopfhörer trennen, während das Audiomaterial wiedergegeben wird, wird die Wiedergabe unterbrochen. Drücken Sie die Taste „Start/Pause“ (’),
um das Audiomaterial wieder über den internen Lautsprecher anzuhören. Wenn Sie die
Ohr- oder Kopfhörer trennen, während das Radio läuft oder angehalten ist, stoppt die
Wiedergabe und eine evtl. angehaltene Radiosendung wird gelöscht.
Wenn Sie „Videokamera“ oder „Sprachmemos“ wählen, während Audiomaterial abgespielt wird, wird die Wiedergabe gestoppt.14 Kapitel 1 iPod nano-Grundlagen
Verbinden und Trennen des iPod nano
Sie verbinden den iPod nano mit Ihrem Computer, um Musik, Videos, Fotos und
Dateien zum iPod nano hinzuzufügen, um aufgenommene Videos und Sprachmemos
auf den Computer zu importieren und um die Batterie zu laden. Trennen Sie den
iPod nano wieder, wenn Sie damit fertig sind.
Wichtig: Die Batterie wird nicht aufgeladen, wenn sich Ihr Computer im Ruhezustand
befindet.
Verbinden des iPod nano
Gehen Sie wie folgt vor, um den iPod nano mit Ihrem Computer zu verbinden:
m Schließen Sie das mitgelieferte Dock Connector-auf-USB-Kabel an einen HighPower-USB 2.0-Anschluss Ihres Computers und das andere Ende des Kabels an
den iPod nano an.
Wenn Sie ein iPod Dock verwenden, schließen Sie das Kabel an einen USB 2.0-
Anschluss Ihres Computers und das andere Ende an das Dock an. Setzen Sie den
iPod nano dann in das Dock.
Hinweis: Der USB-Anschluss der meisten Tastaturen liefert nicht ausreichend Strom, um
den iPod nano zu laden. Schließen Sie den iPod nano an einen USB 2.0-Anschluss Ihres
Computers an.
Standardmäßig synchronisiert iTunes Musiktitel auf dem iPod nano automatisch, wenn
Sie ihn mit dem Computer verbinden. Sobald die Synchronisierung abgeschlossen ist,
können Sie den iPod nano vom Computer trennen. Sie können Musiktitel synchronisieren, während die iPod nano-Batterie aufgeladen wird.
Wenn der iPod nano für das automatische Synchronisieren von Musiktiteln konfiguriert
ist und Sie ihn an einen anderen Computer anschließen, werden Sie von iTunes vor
dem Synchronisieren von Musik aufgefordert, den Vorgang zu bestätigen. Wenn Sie auf
„Ja“ klicken, werden die Musiktitel und anderen Audiodateien auf Ihrem iPod nano
gelöscht und durch Titel und andere Audiodateien ersetzt, die sich auf dem Computer
befinden, mit dem der iPod nano verbunden ist. Informationen zum Hinzufügen von
Musik zum iPod nano und Verwenden des iPod nano mit mehreren Computern finden
Sie in Kapitel 2 „Einrichten des iPod nano“ auf Seite 21.Kapitel 1 iPod nano-Grundlagen 15
Trennen des iPod nano
Trennen Sie den iPod nano keinesfalls während der Synchronisierung. Dem Bildschirm
Ihres iPod nano können Sie entnehmen, ob Sie den iPod nano vom Computer trennen
können. Trennen Sie den iPod nano nicht, während die Meldung „Verbunden“ oder
„Synchronisieren“ angezeigt wird, da ansonsten Dateien auf dem iPod nano beschädigt
werden können.
Wird eine dieser Meldungen eingeblendet, müssen Sie den iPod nano auswerfen, bevor
Sie ihn vom Computer trennen.
Wenn das Hauptmenü oder ein großes Batteriesymbol angezeigt wird, können Sie den
iPod nano vom Computer trennen.
Wenn Sie den iPod nano für eine manuelle Verwaltung von Musiktiteln konfiguriert
haben (vgl. „Manuelles Verwalten des iPod nano“ auf Seite 35) oder wenn der
iPod nano als Festplatte aktiviert ist (vgl. „Verwenden des iPod nano als externes
Volume“ auf Seite 99), müssen Sie den iPod nano immer auswerfen, bevor Sie ihn
vom Computer trennen.
Falls Sie den iPod nano versehentlich vom Computer trennen, ohne ihn auszuwerfen,
verbinden Sie ihn wieder mit Ihrem Computer und synchronisieren Sie ihn erneut.16 Kapitel 1 iPod nano-Grundlagen
Gehen Sie wie folgt vor, um den iPod nano auszuwerfen:
m Klicken Sie in iTunes auf die Taste „Auswerfen“ (C) neben dem iPod nano in der Geräteliste auf der linken Seite des iTunes-Fensters.
Sie können den iPod nano unbesorgt vom Computer trennen, wenn eine dieser beiden
Meldungen angezeigt wird:
Wenn Sie einen Mac verwenden, können Sie den iPod nano auch auswerfen, indem Sie
das iPod nano-Symbol vom Schreibtisch in den Papierkorb bewegen.
Wenn Sie einen Windows-PC verwenden, können Sie den iPod nano im Bildschirm „Mein
Computer“ auch auswerfen, indem Sie auf das Symbol für das sichere Entfernen von
Hardware im Windows-Infobereich klicken und den iPod nano auswählen.
Gehen Sie wie folgt vor, um den iPod nano zu trennen:
1 Trennen Sie die Ohr- oder Kopfhörer, wenn diese angeschlossen sind.
2 Trennen Sie das Kabel vom iPod nano. Befindet sich der iPod nano im Dock, nehmen
Sie ihn einfach heraus. Kapitel 1 iPod nano-Grundlagen 17
Die Batterie des iPod nano
Der iPod nano hat eine interne Batterie, die vom Benutzer nicht entfernt oder ausgetauscht werden kann. Optimale Ergebnisse erzielen Sie, wenn Sie die Batterie beim
erstmaligen Verwenden des iPod nano mindestens drei Stunden lang aufladen bzw. so
lange aufladen, bis das Batteriesymbol im Statusbereich des Bildschirms anzeigt, dass
die Batterie vollständig aufgeladen ist. Wenn der iPod nano längere Zeit nicht verwendet wurde, muss die Batterie möglicherweise aufgeladen werden.
Hinweis: Der iPod nano verbraucht auch nach dem Ausschalten Batteriestrom.
Die Batterie des iPod nano ist nach ungefähr eineinhalb Stunden zu 80 Prozent und
nach ungefähr drei Stunden vollständig aufgeladen. Wenn Sie den iPod nano aufladen,
während Sie Dateien hinzufügen, Musik abspielen, Videos ansehen oder eine Diashow
vorführen, dauert der Ladevorgang u. U. länger.
Aufladen der Batterie des iPod nano
Sie haben zwei Möglichkeiten zum Aufladen der Batterie des iPod nano:
 Verbinden Sie den iPod nano mit Ihrem Computer.
 Verwenden Sie den separat erhältlichen Apple USB Power Adapter (Netzteil).
Gehen Sie wie folgt vor, um die Batterie über Ihren Computer aufzuladen:
m Schließen Sie den iPod nano an einen USB 2.0-Anschluss Ihres Computers an. Der
Computer muss eingeschaltet sein und darf sich nicht im Ruhezustand befinden.
Wenn auf dem iPod nano-Bildschirm „Wird geladen“ ein Batteriesymbol sichtbar ist,
wird die Batterie aufgeladen. Wird der Bildschirm „Geladen“ angezeigt, ist die Batterie
vollständig aufgeladen.
Wird keiner der beiden Bildschirme angezeigt, ist der iPod nano möglicherweise nicht
an einem High-Power USB-Anschluss angeschlossen. Probieren Sie einen anderen USBAnschluss an Ihrem Computer aus. 18 Kapitel 1 iPod nano-Grundlagen
Wichtig: Wenn die Meldung „Wird geladen, bitte warten“ oder „Bitten laden Sie die
Batterie auf“ auf dem Bildschirm des iPod nano angezeigt wird, muss erst die Batterie
geladen werden, bevor der iPod nano mit Ihrem Computer kommunizieren kann.
Beachten Sie hierzu den Abschnitt „Auf dem iPod nano wird die Meldung „Bitte laden
Sie die Batterie auf“ angezeigt“ auf Seite 106.
Wenn Sie den iPod nano aufladen möchten und Ihr Computer nicht in der Nähe ist,
können Sie hierzu den optional erhältlichen Apple USB Power Adapter (Netzteil) verwenden.
Gehen Sie wie folgt vor, um die Batterie mit dem Apple USB Power Adapter
(Netzteil) aufzuladen:
1 Verbinden Sie den Netzteilstecker mit dem Netzteil (möglicherweise ist dies bereits
geschehen).
2 Schließen Sie das Dock Connector-auf-USB-Kabel an das Netzteil und das andere Ende
des Kabels an den iPod nano an.
3 Schließen Sie das Netzteil an eine funktionierende Steckdose an.
Apple USB Power Adapter (Netzteil)
(Ihr Netzteil kann anders aussehen.)
iPod-USB-KabelKapitel 1 iPod nano-Grundlagen 19
Die verschiedenen Symbole für den Batteriestatus
Wenn der iPod nano nicht an eine Stromquelle angeschlossen ist, zeigt ein Batteriesymbol oben rechts im iPod nano-Bildschirm an, wie viel Batterieladung ungefähr
noch vorhanden ist.
Ist der iPod nano am Stromnetz angeschlossen, ändert sich das Batteriesymbol, wenn
die Batterie aufgeladen wird bzw. vollständig aufgeladen ist.
Es ist möglich, den iPod nano vom Computer zu trennen und ihn zu verwenden, bevor
die Batterie vollständig aufgeladen ist.
Hinweis: Die Anzahl der Ladezyklen bei wiederaufladbaren Batterien ist begrenzt.
Daher müssen diese Batterien irgendwann ersetzt werden. Die Batterielaufzeit und die
Anzahl der Ladezyklen hängt von der Nutzung und von den gewählten Einstellungen
ab. Informationen hierzu finden Sie auf der Website: www.apple.com/de/batteries.
Die Batterie ist weniger als 20 % aufgeladen.
Die Batterie ist etwa zur Hälfte aufgeladen.
Die Batterie ist vollständig aufgeladen.
Die Batterie wird aufgeladen (Blitzsymbol).
Die Batterie ist vollständig aufgeladen (Steckersymbol).20 Kapitel 1 iPod nano-Grundlagen
Verbessern der Batterieleistung mit der Option „Energie sparen“
Mithilfe der Option „Energie sparen“ lässt sich die Zeit zwischen den Ladezyklen der
Batterie verlängern, indem der Bildschirm des iPod nano ausgeschaltet wird, wenn Sie
die Bedienelemente nicht verwenden.
Die Option „Energie sparen“ ist standardmäßig aktiviert.
Gehen Sie wie folgt vor, um die Option „Energie sparen“ zu aktivieren oder
zu deaktivieren:
m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Energie sparen“ und wählen Sie dann
„Ein“ oder „Aus“.
Wenn Sie die Option „Energie sparen“ deaktivieren, zeigt der iPod nano nach dem
Ausschalten der Hintergrundbeleuchtung den folgenden Hinweis an:
Durch Deaktivieren der Option „Energie sparen“ wird der Stromverbrauch über die
Batterie erhöht.2
21
2 Einrichten des iPod nano
Mithilfe von iTunes auf Ihrem Computer richten Sie den
iPod nano für die Wiedergabe Ihrer Musik, Videos und anderer Medieninhalte ein. Zum Aufnehmen von Videos oder
Anhören von FM-Radiosendungen ist keine Konfiguration
erforderlich.
Verwenden von iTunes
iTunes ist ein kostenlos erhältliches Programm, das Sie zum Einrichten, Sortieren
und Verwalten Ihrer Inhalte auf dem iPod nano verwenden. Mit iTunes können Sie
Musik, Hörbücher, Podcasts und mehr mit dem iPod nano synchronisieren. Ist iTunes
noch nicht auf Ihrem Computer installiert, können Sie es unter folgender Adresse
laden: www.apple.com/de/downloads. Für den iPod nano ist iTunes 9 (oder neuer)
erforderlich.
iTunes ist als Mac- und Windows-Version verfügbar.
Verwenden Sie iTunes, um Musik von CDs und aus dem Internet zu importieren, Musiktitel und andere Audio- und Videoinhalte aus dem iTunes Store zu kaufen, persönliche
Sammlungen Ihrer Lieblingstitel (so genannte „Wiedergabelisten“) zu erstellen, diese
mit dem iPod nano zu synchronisieren und iPod nano-Einstellungen anzupassen.22 Kapitel 2 Einrichten des iPod nano
iTunes verfügt über die Funktion „Genius“, mit der Musiktitel aus Ihrer iTunes-Mediathek sofort in Wiedergabelisten und Mischungen mit aufeinander abgestimmten Titeln
gestellt werden. Sie können Genius-Wiedergabelisten, die Sie in iTunes erstellen, mit
dem iPod nano synchronisieren und auch direkt auf dem iPod nano Genius-Wiedergabelisten anlegen und Genius-Mischungen anhören. Sie benötigen einen iTunes StoreAccount, um die Funktion „Genius“ verwenden zu können.
iTunes bietet zahlreiche weitere Funktionen. Sie können eigene CDs brennen, die sich
mit standardmäßigen CD-Playern abspielen lassen (vorausgesetzt, Ihr Computer ist mit
einem CD-Brenner ausgestattet), per Streaming übertragene Internet-Radiosendungen
anhören, Videos und Fernsehsendungen ansehen, Musiktitel bewerten und vieles mehr.
Wenn Sie Informationen zur Verwendung dieser iTunes-Funktionen benötigen, öffnen
Sie iTunes und wählen Sie „Hilfe“ > „iTunes-Hilfe“.
Wenn auf Ihrem Computer bereits iTunes 9 (oder neuer) installiert ist und Sie die
iTunes-Mediathek eingerichtet haben, können Sie mit den Informationen unter „Hinzufügen von Musik, Videos und anderen Inhalten zum iPod nano“ auf Seite 27 fortfahren.
Möchten Sie gleich mit der Aufnahme von Videos beginnen oder FM-Radiosendungen
anhören, können Sie den iPod nano zu einem späteren Zeitpunkt einrichten. Informationen zum Aufnehmen von Videos finden Sie unter „Verwenden der Videokamera“ auf
Seite 62. Informationen über das FM-Radio finden Sie unter „Anhören von FM-Radiosendungen“ auf Seite 69.
Einrichten Ihrer iTunes-Mediathek
Damit Sie auf dem iPod nano Musik anhören und Videos ansehen können, müssen Sie
diese Musik und Videos erst in iTunes auf Ihrem Computer importieren.
Importieren von Musik in iTunes
Sie haben drei Möglichkeiten, Musiktitel und andere Audiodateien an iTunes
zu übertragen.Kapitel 2 Einrichten des iPod nano 23
Kaufen von Musiktiteln und Laden von Podcasts über den iTunes Store
Wenn Sie über eine Internetverbindung verfügen, können Sie Musiktitel, Alben und
Hörbücher ganz einfach online im iTunes Store kaufen und laden. Sie können auch
Podcasts abonnieren und laden und kostenlose bildungsrelevante Inhalte aus
iTunes U laden.
Wenn Sie Musik online über den iTunes Store erwerben möchten, richten Sie in iTunes
einen kostenlosen iTunes-Account ein, suchen Sie nach den gewünschten Titeln und
kaufen diese. Wenn Sie bereits einen iTunes-Account haben (auch „Apple ID“ genannt),
können Sie sich mit diesem Account beim iTunes Store anmelden und Musiktitel
kaufen.
Sie benötigen keinen iTunes Store-Account, um Podcasts zu laden oder zu abonnieren.
Sie greifen auf den iTunes Store zu, indem Sie iTunes öffnen und links im iTunes-Fenster
unter „Store“ auf „iTunes Store“ klicken.
Hinzufügen bereits auf dem Computer vorhandener Musiktitel zu
Ihrer iTunes-Mediathek
Wenn Musiktitel auf Ihrem Computer in Formaten vorliegen, die von iTunes unterstützt
werden, können Sie die Titel ganz einfach zu iTunes hinzufügen. Informationen zum
Übertragen von Titeln von Ihrem Computer an iTunes erhalten Sie, indem Sie iTunes
öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen.
Wenn Sie iTunes für Windows verwenden, können Sie nicht geschützte WMA-Dateien
in das AAC- oder MP3-Format konvertieren. Dies ist besonders dann von Vorteil, wenn
Sie eine Bibliothek mit Musik im WMA-Format haben. Weitere Informationen hierzu
erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ auswählen.
Importieren von Musik von Audio-CDs in iTunes
iTunes kann Musik und andere Audioinhalte von Ihren Audio-CDs importieren. Wenn
eine Internetverbindung besteht, lädt iTunes die Namen der Musiktitel auf der CD aus
dem Internet (falls verfügbar) und listet sie im iTunes-Fenster auf. Wenn Sie die Titel
zum iPod nano hinzufügen, sind die Titelinformationen ebenfalls enthalten. Informationen zum Importieren von Musik von Ihren CDs in iTunes erhalten Sie, indem Sie
iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen.24 Kapitel 2 Einrichten des iPod nano
Hinzufügen weiterer Details zu Ihrer iTunes-Mediathek
Nachdem Sie Ihre Musik in iTunes importiert haben, können Sie weitere Details zur
iTunes-Mediathek hinzufügen. Die meisten dieser Details werden auf dem iPod nano
angezeigt, wenn Sie Musiktitel hinzufügen.
Eingeben von Titelnamen und anderen Informationen
Wenn Sie keinen Internetzugang haben, für importierte Musik keine Titelinformationen
verfügbar sind oder Sie weitere Informationen (wie Namen von Komponisten) hinzufü-
gen möchten, können Sie diese Angaben manuell eingeben. Informationen zum Eingeben von Titelinformationen erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunesHilfe“ wählen.
Hinzufügen von Liedtexten
Sie können Liedtexte im Nur-Text-Format in iTunes eingeben, sodass Sie den Text während der Wiedergabe des Titels auf dem Bildschirm Ihres iPod nano anzeigen können.
Informationen zum Eingeben von Liedtexten erhalten Sie, indem Sie iTunes öffnen und
„Hilfe“ > „iTunes-Hilfe“ wählen.
Weitere Informationen hierzu finden Sie im Abschnitt „Anzeigen von Liedtexten auf
dem iPod nano“ auf Seite 42.
Hinzufügen von CD-Covern
Mit den im iTunes Store gekauften Musiktiteln erhalten Sie auch CD-Cover, die mit
dem iPod nano angezeigt werden können. Sie können Cover automatisch zu von CDs
importierten Titeln hinzufügen, sofern die CDs im iTunes Store verfügbar sind. Cover
können auch manuell hinzugefügt werden, wenn sie auf Ihrem Computer abgelegt
sind. Weitere Informationen zum Hinzufügen von CD-Covern erhalten Sie, indem Sie
iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen.
Weitere Informationen hierzu finden Sie im Abschnitt „Anzeigen von CD-Covern auf
dem iPod nano“ auf Seite 43.
Verwalten Ihrer Musik
In iTunes können Sie Musiktitel und andere Objekte in so genannten Wiedergabelisten
verwalten, die Sie beliebig anordnen können. Sie können beispielsweise Wiedergabelisten mit Titeln erstellen, die Sie beim Sport hören möchten oder die für eine besondere Stimmung geeignet sind.
Sie können intelligente Wiedergabelisten anlegen, die basierend auf von Ihnen festgelegten Kriterien automatisch aktualisiert werden. Wenn Sie Musiktitel zu iTunes hinzufügen, die Ihren Kriterien entsprechen, werden diese Titel automatisch zur intelligenten
Wiedergabeliste hinzugefügt. Kapitel 2 Einrichten des iPod nano 25
Sie können die Funktion „Genius“ aktivieren und Wiedergabelisten mit Titeln erstellen,
die gut zusammenpassen. Die Funktion „Genius“ kann Ihre Musiksammlung auch automatisch verwalten, indem Titel in so genannten „Genius-Mischungen“ sortiert und
gruppiert werden.
Sie können beliebig viele Wiedergabelisten erstellen und dabei beliebig viele Titel aus
Ihrer iTunes-Mediathek verwenden. Wird ein Musiktitel zu einer Wiedergabeliste hinzugefügt oder später daraus entfernt, wird er dadurch nicht aus Ihrer Mediathek entfernt.
Informationen zum Einrichten von Wiedergabelisten in iTunes erhalten Sie, indem Sie
iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen.
Hinweis: Informationen zum Erstellen von Wiedergabelisten auf dem iPod nano, wenn
der iPod nano nicht mit Ihrem Computer verbunden ist, finden Sie unter „Erstellen von
„On-The-Go“-Wiedergabelisten auf dem iPod nano“ auf Seite 48.
Aktivieren der Funktion „Genius“ in iTunes
Die Funktion „Genius“ sucht Musiktitel in Ihrer Mediathek, die gut zusammenpassen,
und erstellt damit Genius-Wiedergabelisten und Genius-Mischungen.
Basis einer Genius-Wiedergabeliste ist ein von Ihnen gewählter Musiktitel. iTunes legt
dann eine Sammlung von Titeln an, die gut zu dem gewählten Titel passen, und erstellt
daraus die Genius-Wiedergabeliste.
Bei Genius-Mischungen handelt es sich um vorab gewählte Sammlungen mit gut
zueinander passenden Titeln, die von iTunes mit Titeln aus Ihrer Mediathek erstellt
werden. Mit Genius-Mischungen genießen Sie Ihre Titel jedes Mal neu. iTunes erstellt
bis zu 12 Genius-Mischungen, abhängig von der Auswahl an Musiktiteln in Ihrer iTunesMediathek.
Damit Sie die Funktion „Genius“ auf dem iPod nano für die Erstellung von GeniusWiedergabelisten und Genius-Mischungen verwenden können, müssen Sie sie zuerst in
iTunes aktivieren. Informationen zum Aktivieren und Verwenden der Funktion „Genius“
in iTunes erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen.
In iTunes erstellte Genius-Wiedergabelisten und Genius-Mischungen lassen sich wie
jede andere iTunes-Wiedergabeliste mit dem iPod nano synchronisieren. Es ist nicht
möglich, Genius-Mischungen manuell zum iPod nano hinzuzufügen. Beachten Sie
hierzu den Abschnitt „Synchronisieren von Genius-Wiedergabelisten und GeniusMischungen mit dem iPod nano“ auf Seite 30.
Genius ist ein kostenfreier Dienst, für dessen Nutzung allerdings ein iTunes StoreAccount benötigt wird. (Haben Sie noch keinen Account, können Sie bei der Aktivierung von Genius einen solchen Account einrichten.)26 Kapitel 2 Einrichten des iPod nano
Importieren von Videos in iTunes
Nachfolgend werden verschiedene Möglichkeiten beschrieben, die für den Import von
Videos in iTunes zur Auswahl stehen.
Kaufen oder Ausleihen von Videos und Laden von Video-Podcasts aus
dem iTunes Store
Wenn Sie Videos (Filme, Fernsehsendungen und Musikvideos) online im iTunes Store
(gehört zu iTunes und ist nur in bestimmten Ländern verfügbar) erwerben oder ausleihen möchten, melden Sie sich bei Ihrem iTunes Store-Account an, suchen nach den
gewünschten Videos und kaufen oder leihen sie dann aus.
Die Leihfrist eines Leihfilms läuft 30 Tage nach dem Leihdatum oder 24 Stunden nach
der ersten Wiedergabe ab (48 Stunden außerhalb den USA), je nachdem, welches
Ereignis früher eintritt. Abgelaufene Leihfilme werden automatisch gelöscht. Diese
Bestimmungen gelten für Leihfilme in den USA. Die Leihbestimmungen sind von Land
zu Land unterschiedlich.
Sie greifen auf den iTunes Store zu, indem Sie iTunes öffnen und links im iTunes-Fenster
unter „Store“ auf „iTunes Store“ klicken.
Sie können Film-Trailer oder eine Vorschau von Fernsehsendungen anzeigen, indem Sie
neben dem jeweiligen Objekt auf die Taste „Vorschau“ klicken.
Gekaufte Videos werden eingeblendet, wenn Sie (unter „Mediathek“) auf „Filme“ oder
„Fernsehsendungen“ oder im Quellenbereich (unter „Store“) auf „Gekaufte Artikel“
klicken. Ausgeliehene Videos werden angezeigt, wenn Sie „Ausgeliehene Filme“ (unter
„Mediathek“) auswählen.
Bei einigen Objekten stehen weitere Optionen zur Auswahl, z. B. bei Fernsehsendungen, für die Sie eine Berechtigung zum Laden der gesamten Staffel erwerben können.
Video-Podcasts finden Sie zusammen mit anderen Podcasts im iTunes Store. Sie können sich bei Video-Podcasts anmelden und diese laden wie alle anderen Podcasts auch.
Sie benötigen keinen Benutzer-Account, um Podcasts aus dem iTunes Store zu laden.
Beachten Sie hierzu den Abschnitt „Kaufen von Musiktiteln und Laden von Podcasts
über den iTunes Store“ auf Seite 23.
Erstellen von Versionen eigener Videos für die Verwendung mit dem
iPod nano
Sie können auf dem iPod nano auch andere Videodateien ansehen, z. B. Videos, die Sie
mit iMovie auf einem Mac erstellen, oder Videos, die Sie aus dem Internet laden. Importieren Sie das Video in iTunes und konvertieren Sie es ggf. für die Verwendung auf dem
iPod nano. Laden Sie es anschließend auf den iPod nano.
iTunes unterstützt viele Videoformate, die auch von QuickTime unterstützt werden.
Weitere Informationen hierzu finden Sie im Abschnitt „Musiktitel oder andere Dateien
können nicht zum iPod nano hinzugefügt werden“ auf Seite 106.Kapitel 2 Einrichten des iPod nano 27
Einige Videos können möglicherweise direkt nach dem Import in iTunes auf dem iPod
nano verwendet werden. Wenn Sie ein Video auf den iPod nano laden wollen (vgl.
„Automatisches Synchronisieren von Videos“ auf Seite 31) und die Meldung angezeigt
wird, dass das Video auf Ihrem iPod nano nicht abgespielt werden kann, müssen Sie
das Video für die Verwendung mit dem iPod nano konvertieren.
Abhängig von Dauer und Inhalt eines Videos kann das Konvertieren für die Verwendung mit dem iPod nano mehrere Minuten oder Stunden dauern.
Wenn Sie eine Version eines Videos für die Verwendung mit dem iPod nano erstellen,
bleibt auch das Originalvideo in Ihrer iTunes-Mediathek.
Weitere Informationen zum Konvertieren von Videos für den iPod nano finden Sie in
der iTunes-Hilfe (öffnen Sie iTunes und wählen Sie „Hilfe“ > „iTunes-Hilfe“) oder unter
folgender Adresse: www.info.apple.com/kbnum/n302758.
Hinzufügen von Musik, Videos und anderen Inhalten zum
iPod nano
Nachdem Ihre Musik und Videos in iTunes importiert und sortiert wurden, können Sie
sie ganz leicht zum iPod nano hinzufügen.
Wenn Sie festlegen möchten, wie Musik, Videos, Fotos und andere Inhalte von Ihrem
Computer zum iPod nano hinzugefügt werden, verbinden Sie den iPod nano mit Ihrem
Computer und wählen dann mit iTunes die entsprechenden iPod nano-Einstellungen
aus.
Erstmaliges Verbinden des iPod nano mit einem Computer
Wenn Sie den iPod nano das erste Mal mit Ihrem Computer verbinden (nach der Installation von iTunes), wird iTunes automatisch geöffnet und der iPod nano-Assistent wird
angezeigt:28 Kapitel 2 Einrichten des iPod nano
Gehen Sie wie folgt vor, um den iPod nano-Assistenten zu verwenden:
1 Geben Sie einen Namen für den iPod nano ein. Dieser Name wird in der Geräteliste
links im iTunes-Fenster angezeigt.
2 Wählen Sie Ihre Einstellungen. Die automatische Synchronisierung und VoiceOver
werden standardmäßig ausgewählt.
Möchten Sie VoiceOver zu diesem Zeitpunkt nicht aktivieren, heben Sie die Auswahl
von „VoiceOver aktivieren“ auf. Sollten Sie Ihre Meinung ändern, können Sie VoiceOver
jederzeit aktivieren, wenn Sie den iPod nano an Ihren Computer anschließen. Beachten
Sie hierzu den Abschnitt „Einrichten von VoiceOver“ auf Seite 37.
3 Klicken Sie auf „Fertig“.
Haben Sie VoiceOver bei der Konfiguration aktiviert, befolgen Sie die angezeigten
Anleitungen zum Laden und Installieren des VoiceOver Kit. Weitere Informationen
hierzu finden Sie im Abschnitt „Verwenden von VoiceOver auf dem iPod nano“ auf
Seite 52. Informationen dazu, wie Sie VoiceOver auf dem iPod nano einrichten, finden
Sie unter „Einrichten von VoiceOver“ auf Seite 37.
Sie können den Gerätenamen und die Einstellungen jederzeit ändern, wenn Sie den
iPod nano an Ihren Computer anschließen.
Nach dem Klicken auf „Fertig“ wird der Bereich „Übersicht“ eingeblendet. Wenn Sie die
automatische Synchronisierung ausgewählt haben, beginnt der iPod nano jetzt mit der
Synchronisierung.
Automatisches oder manuelles Hinzufügen von Inhalten
Es gibt zwei Möglichkeiten, Inhalte zum iPod nano hinzuzufügen:
 Automatische Synchronisierung: Wenn Sie den iPod nano mit Ihrem Computer verbinden, wird er automatisch mit den Objekten in Ihrer iTunes-Mediathek aktualisiert. Sie
können alle Ihre Musiktitel, Wiedergabelisten, Videos und Podcasts synchronisieren.
Sollte nicht die gesamte iTunes-Mediathek auf den iPod nano passen, können Sie nur
ausgewählte Objekte synchronisieren. Der iPod nano kann mit nur jeweils einem
Computer automatisch synchronisiert werden.
 Manuelles Verwalten des iPod nano: Wenn Sie den iPod nano verbinden, können Sie
Objekte einzeln auf den iPod nano bewegen und einzeln vom iPod nano löschen. Sie
können Musiktitel von mehreren Computern hinzufügen, ohne dass dabei Titel vom
iPod nano gelöscht werden. Wenn Sie die Musiktitel selbst verwalten, müssen Sie
den iPod nano immer aus iTunes auswerfen, bevor Sie ihn vom Computer trennen.Kapitel 2 Einrichten des iPod nano 29
Automatisches Synchronisieren von Musik
Der iPod nano ist standardmäßig so konfiguriert, dass beim Anschließen an Ihren Computer alle Musiktitel und Wiedergabelisten synchronisiert werden. Dies ist die einfachste Möglichkeit, Musik zu Ihrem iPod nano hinzuzufügen. Schließen Sie einfach den
iPod nano an Ihren Computer an und die Musiktitel, Hörbücher, Videos und anderen
Dateien werden automatisch geladen. Trennen Sie dann den iPod vom Computer.
Wenn Sie Musiktitel zu iTunes hinzugefügt haben, seit Ihr iPod nano zuletzt mit dem
Computer verbunden war, werden diese Titel mit dem iPod nano synchronisiert. Haben
Sie Musiktitel aus iTunes gelöscht, werden diese auch vom iPod nano gelöscht.
Gehen Sie wie folgt vor, um Musik mit dem iPod nano zu synchronisieren:
m Verbinden Sie den iPod nano mit Ihrem Computer. Wenn der iPod nano für die automatische Synchronisierung konfiguriert ist, beginnt nun die Aktualisierung.
Wichtig: Wenn Sie den iPod nano mit einem Computer verbinden, mit dem er nicht
synchronisiert ist, werden Sie in einer Meldung gefragt, ob Sie Titel automatisch synchronisieren möchten. Wenn Sie dies bestätigen, werden alle Musiktitel, Hörbücher und
Videos auf dem iPod nano gelöscht und durch die Musiktitel und anderen Dateien dieses Computers ersetzt.
Beim Synchronisieren von Musik zwischen Ihrem Computer und dem iPod nano wird
der Verlauf im iTunes-Statusfenster angezeigt und neben dem iPod nano-Symbol in der
Geräteliste wird ein Synchronisierungssymbol angezeigt.
Nach Abschluss der Aktualisierung wird in iTunes die Meldung „iPod-Sync abgeschlossen“ angezeigt. Ein Balken unten im iTunes-Fenster gibt an, wie viel Festplattenplatz
von den verschiedenen Arten von Inhalten belegt wird.
Reicht der Platz auf dem iPod nano nicht für alle Ihre Musiktitel aus, können Sie in
iTunes festlegen, dass nur ausgewählte Titel und Wiedergabelisten synchronisiert
werden. In diesem Fall werden nur die angegebenen Musiktitel und Wiedergabelisten
mit dem iPod nano synchronisiert.
Synchronisieren von Musik ausgewählter Wiedergabelisten, Interpreten und Genres mit dem iPod nano
Sie können iTunes so einstellen, dass Titel ausgewählter Wiedergabelisten, Interpreten
und Genres (Musikrichtungen) mit dem iPod nano synchronisiert werden, wenn die
Musik in Ihrer iTunes-Mediathek nicht vollständig auf den iPod nano passt. In diesem
Fall wird nur die Musik der angegebenen Wiedergabelisten, Interpreten und Genres mit
dem iPod nano synchronisiert.30 Kapitel 2 Einrichten des iPod nano
Gehen Sie wie folgt vor, um iTunes so zu konfigurieren, dass Musik von ausgewählten Wiedergabelisten, Interpreten und Genres mit dem iPod nano synchronisiert
wird:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Musik“.
2 Wählen Sie „Musik synchronisieren“ und wählen Sie dann „Ausgewählte Wiedergabelisten, Interpreten und Genres“.
3 Wählen Sie die gewünschten Wiedergabelisten aus.
4 Möchten Sie auch Musikvideos hinzufügen, wählen Sie „Musikvideos einbeziehen“.
5 Soll iTunes verbleibenden Speicherplatz auf dem iPod nano automatisch füllen, wählen
Sie „Freien Speicherplatz automatisch mit Titeln füllen“.
6 Klicken Sie auf „Anwenden“.
Ist im Bereich „Übersicht“ das Feld „Nur markierte Objekte synchronisieren“ markiert,
synchronisiert iTunes nur Objekte, die mit einem Häkchen gekennzeichnet sind.
Synchronisieren von Genius-Wiedergabelisten und Genius-Mischungen mit dem iPod nano
Sie können iTunes so einstellen, dass Genius-Wiedergabelisten und Genius-Mischungen mit dem iPod nano synchronisiert werden.
Genius-Mischungen können nur automatisch synchronisiert werden. Sie können
Genius-Mischungen nicht zum iPod nano hinzufügen, wenn Sie dessen Inhalt manuell
verwalten. Genius-Wiedergabelisten lassen sich dagegen manuell zum iPod nano
hinzufügen.
Wenn Sie Genius-Mischungen für die Synchronisierung auswählen, wählt iTunes möglicherweise weitere Titel aus Ihrer Mediathek aus, die Sie nicht angegeben haben, und
synchronisiert diese.
Gehen Sie wie folgt vor, um iTunes so einzustellen, dass Genius-Wiedergabelisten
und ausgewählte Genius-Mixe mit dem iPod nano synchronisiert werden:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Musik“.
2 Wählen Sie „Musik synchronisieren“ und wählen Sie dann „Ausgewählte Wiedergabelisten, Interpreten und Genres“.
3 Wählen Sie unter „Wiedergabelisten“ die gewünschten Genius-Wiedergabelisten
und -Mischungen aus.
4 Klicken Sie auf „Anwenden“.Kapitel 2 Einrichten des iPod nano 31
Wenn Sie Ihre gesamte Musiksammlung synchronisieren, synchronisiert iTunes alle
Genius-Wiedergabelisten und Genius-Mischungen.
Ist im Bereich „Übersicht“ das Feld „Nur markierte Objekte synchronisieren“ markiert,
synchronisiert iTunes nur Objekte, mit einem Häkchen gekennzeichnet sind.
Hinzufügen von Videos zum iPod nano
Sie fügen Filme und Fernsehsendungen in derselben Weise zu Ihrem iPod nano hinzu,
wie Sie auch Musiktitel hinzufügen. Sie können iTunes so konfigurieren, dass alle Filme
und Fernsehsendungen automatisch mit dem iPod nano synchronisiert werden, wenn
Sie den iPod nano anschließen. Oder Sie konfigurieren iTunes so, dass nur ausgewählte
Wiedergabelisten synchronisiert werden. Alternativ können Sie Filme und Fernsehsendungen auch manuell verwalten. Mit dieser Option können Sie Videos von mehreren
Computern hinzufügen, ohne bereits vorhandene Videos vom iPod nano zu löschen.
Hinweis: Musikvideos werden in iTunes im Bereich „Musik“ mit den Musiktiteln zusammen verwaltet. Beachten Sie hierzu den Abschnitt „Hinzufügen von Musik, Videos und
anderen Inhalten zum iPod nano“ auf Seite 27.
Wichtig: Sie können einen ausgeliehenen Film nur auf jeweils einem Gerät ansehen.
Wenn Sie also beispielsweise einen Film im iTunes Store ausleihen und ihn auf den
iPod nano übertragen, können Sie diesen Film nur auf dem iPod nano ansehen. Wenn
Sie den Film nach iTunes zurückübertragen, können Sie ihn nur dort ansehen, aber
nicht mehr auf dem iPod nano. Für Leihfilme, die zum iPod nano hinzugefügt wurden,
gelten alle standardmäßigen Leihfristen.
Automatisches Synchronisieren von Videos
Der iPod nano ist standardmäßig so konfiguriert, dass beim Anschließen an Ihren
Computer alle Filme und Fernsehsendungen synchronisiert werden. Dies ist die einfachste Möglichkeit, Videos zu Ihrem iPod nano hinzuzufügen. Schließen Sie einfach
den iPod nano an Ihren Computer an, und die Videos und anderen Dateien werden
automatisch geladen. Trennen Sie dann den iPod vom Computer. Wenn Sie Videos zu
iTunes hinzugefügt haben, seit Ihr iPod nano zuletzt mit dem Computer verbunden
war, werden diese Videos mit dem iPod nano synchronisiert. Haben Sie Videos aus
iTunes gelöscht, werden sie auch vom iPod nano gelöscht.
Reicht der Platz auf dem iPod nano nicht für alle Ihre Videos aus, können Sie in iTunes
festlegen, dass nur ausgewählte Videos synchronisiert werden. Sie können ausgewählte
Videos synchronisieren oder ausgewählte Wiedergabelisten, die Videos enthalten.
Die Einstellungen für die Synchronisierung von Filmen und Fernsehsendungen sind
voneinander unabhängig. Einstellungen für Filme haben keinen Einfluss auf Einstellungen für Fernsehsendungen und umgekehrt.32 Kapitel 2 Einrichten des iPod nano
Gehen Sie wie folgt vor, um iTunes für die Synchronisierung von Filmen mit dem
iPod nano zu konfigurieren:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Filme“.
2 Wählen Sie „Filme synchronisieren“.
3 Wählen Sie die gewünschten Filme oder Wiedergabelisten aus.
Alle Filme, neue Filme oder nicht gesehene Filme: Wählen Sie „Automatisch einbeziehen:
Filme“ und wählen Sie die gewünschte Option aus dem Einblendmenü aus.
Ausgewählte Filme oder Wiedergabelisten: Wählen Sie die gewünschten Filme oder Wiedergabelisten aus.
4 Klicken Sie auf „Anwenden“.
Ist „Nur markierte Titel und Videos synchronisieren“ im Bereich „Übersicht“ ausgewählt,
synchronisiert iTunes nur Filme, die mit einem Häkchen markiert sind.
Gehen Sie wie folgt vor, um iTunes für die Synchronisierung von Fernsehsendungen
mit dem iPod nano zu konfigurieren:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Fernsehsendungen“.
2 Wählen Sie „Fernsehsendungen synchronisieren“.
3 Wählen Sie die gewünschten Sendungen, Folgen und Wiedergabelisten aus.
Alle Folgen, neue Folgen oder nicht gesehene Folgen: Wählen Sie „Automatisch einbeziehen: Folgen von“ und wählen Sie die gewünschten Optionen aus den Einblendmenüs
aus.
Folgen ausgewählter Wiedergabelisten: Wählen Sie die gewünschten Wiedergabelisten
aus.
4 Klicken Sie auf „Anwenden“.
Ist „Nur markierte Titel und Videos synchronisieren“ im Bereich „Übersicht“ ausgewählt,
synchronisiert iTunes nur Fernsehsendungen, die mit einem Häkchen markiert sind.Kapitel 2 Einrichten des iPod nano 33
Hinzufügen von Podcasts zum iPod nano
Die Einstellungen zum Hinzufügen von Podcasts zum iPod nano sind unabhängig von
den Einstellungen zum Hinzufügen von Musiktiteln und Videos. Die Einstellungen für
Podcasts haben keinen Einfluss auf die Einstellungen für Musiktitel oder Videos und
umgekehrt. Sie können in iTunes festlegen, dass alle oder ausgewählte Podcasts automatisch synchronisiert werden, oder Sie können Podcasts manuell zum iPod nano hinzufügen.
Gehen Sie wie folgt vor, um iTunes so einzustellen, dass die Podcasts auf dem
iPod nano automatisch aktualisiert werden:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Podcasts“.
2 Wählen Sie im Bereich „Podcasts“ die Option „Podcasts synchronisieren“ aus.
3 Wählen Sie die gewünschten Podcasts, Folgen und Wiedergabelisten aus und legen Sie
Ihre Synchronisierungsoptionen fest.
4 Klicken Sie auf „Anwenden“.
Wenn Sie iTunes so konfigurieren, dass Podcasts auf dem iPod nano automatisch
synchronisiert werden, wird der iPod nano jedes Mal aktualisiert, wenn Sie ihn an den
Computer anschließen.
Wenn Sie im Bereich „Übersicht“ das Feld „Nur markierte Titel und Videos synchronisieren“ auswählen, synchronisiert iTunes nur Objekte, die in Ihrer Podcast-Bibliothek und
anderen Bibliotheken markiert sind.
Hinzufügen von Video-Podcasts zum iPod nano
Video-Podcasts werden in derselben Weise zum iPod nano hinzugefügt wie andere
Podcasts (vgl. „Hinzufügen von Podcasts zum iPod nano“ auf Seite 33). Ist in einem
Podcast Videomaterial enthalten, wird das Video abgespielt, wenn Sie es im Menü
„Podcasts“ auswählen.
Hinzufügen von iTunes U-Inhalten zum iPod nano
Die Einstellungen zum Hinzufügen von iTunes U-Inhalten zum iPod nano haben nichts
mit den Einstellungen zum Hinzufügen anderer Inhalte zu tun. iTunes U-Einstellungen
haben keinen Einfluss auf andere Einstellungen und umgekehrt. Sie können in iTunes
festlegen, dass alle oder ausgewählte iTunes U-Inhalte automatisch synchronisiert werden, oder Sie können iTunes U-Inhalte manuell zum iPod nano hinzufügen.34 Kapitel 2 Einrichten des iPod nano
Gehen Sie wie folgt vor, um iTunes so einzustellen, dass der iTunes U-Inhalt auf dem
iPod nano automatisch aktualisiert wird:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „iTunes U“.
2 Wählen Sie im Bereich „iTunes U“ die Option „iTunes U synchronisieren“.
3 Wählen Sie die gewünschten Sammlungen, Objekte und Wiedergabelisten aus und
legen Sie Ihre Synchronisierungsoptionen fest.
4 Klicken Sie auf „Anwenden“.
Wenn Sie iTunes so konfigurieren, dass iTunes U-Inhalte automatisch synchronisiert
werden, wird der iPod nano jedes Mal aktualisiert, wenn Sie ihn an den Computer
anschließen.
Wenn Sie im Bereich „Übersicht“ das Feld „Nur markierte Titel und Videos synchronisieren“ auswählen, synchronisiert iTunes nur Objekte, die in Ihrer iTunes U-Bibliothek und
anderen Bibliotheken markiert sind.
Hinzufügen von Hörbüchern zum iPod nano
Sie können Hörbücher im iTunes Store oder bei audible.com kaufen und laden oder
von CDs importieren und auf dem iPod nano anhören.
Verwenden Sie iTunes, um Hörbücher zum iPod nano hinzuzufügen. Wenn Sie den
iPod nano automatisch synchronisieren, sind alle Hörbücher in Ihrer iTunes-Mediathek
in einer Wiedergabeliste mit der Bezeichnung „Hörbücher“ enthalten, die Sie mit dem
iPod nano synchronisieren können. Wenn Sie den Inhalt des iPod nano manuell verwalten, können Sie Hörbücher nacheinander hinzufügen.
Gehen Sie wie folgt vor, um Hörbücher mit dem iPod nano zu synchronisieren:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Musik“.
2 Wählen Sie „Musik synchronisieren“ und führen Sie dann einen der folgenden
Schritte aus:
 Wählen Sie „Die ganze Musikmediathek“.
 Wählen Sie „Ausgewählte Wiedergabelisten, Interpreten und Genres“ und wählen Sie
dann „Hörbücher“ (unter „Wiedergabelisten“).
3 Klicken Sie auf „Anwenden“.
Die Aktualisierung beginnt automatisch.Kapitel 2 Einrichten des iPod nano 35
Hinzufügen weiterer Inhalte zum iPod nano
Sie können mithilfe von iTunes auch Fotos, Spiele, Kontakte und mehr mit dem
iPod nano synchronisieren. Sie können iTunes so einstellen, dass die Inhalte automatisch synchronisiert werden, oder sie auf dem iPod nano manuell verwalten.
Weitere Informationen zum Hinzufügen anderer Arten von Inhalten zum iPod nano
finden Sie unter:
 „Hinzufügen von Fotos von Ihrem Computer zum iPod nano“ auf Seite 78
 „Gehen Sie wie folgt vor, um Spiele automatisch mit dem iPod nano zu synchronisieren:“ auf Seite 90
 „Synchronisieren von Kontakten, Kalendern und Aufgabenlisten“ auf Seite 96
 „Mono Audio“ auf Seite 98
Manuelles Verwalten des iPod nano
Wenn Sie den iPod nano manuell verwalten, können Sie einzelne Musiktitel (inklusive
Musikvideos) und Videos (inklusive Filme und Fernsehsendungen) hinzufügen und entfernen. Außerdem haben Sie die Möglichkeit, Musik und Videos von mehreren Computern zum iPod nano hinzuzufügen, ohne Objekte zu löschen, die bereits auf dem
iPod nano abgelegt sind.
Genius-Mischungen lassen sich nicht manuell zum iPod nano hinzufügen, GeniusWiedergabelisten dagegen schon.
Wird die manuelle Verwaltung von Musik und Videos mit dem iPod nano gewählt,
werden die Optionen für die automatische Synchronisierung in den Bereichen „Musik“,
„Filme“, „Fernsehsendungen“, „Podcasts“, „iTunes U“, „Fotos“, „Kontakte“ und „Spiele“
deaktiviert. Es ist nicht möglich, einige Kategorien manuell zu verwalten und gleichzeitig eine andere automatisch zu synchronisieren.
Wenn Sie iTunes für das manuelle Verwalten von Inhalten konfiguriert haben, können
Sie dies zu einem späteren Zeitpunkt ändern und die automatische Synchronisierung
einstellen.
Gehen Sie wie folgt vor, um iTunes für das manuelle Verwalten von Inhalten auf dem
iPod nano zu konfigurieren:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Übersicht“.
2 Wählen Sie „Musik und Videos manuell verwalten“ im Abschnitt „Optionen“ aus.
3 Klicken Sie auf „Anwenden“.36 Kapitel 2 Einrichten des iPod nano
Wenn Sie den Inhalt auf dem iPod nano manuell verwalten, müssen Sie den iPod nano
immer aus iTunes auswerfen, bevor Sie ihn vom Computer trennen.
Wenn Sie einen manuell verwalteten iPod nano mit einem Computer verbinden, wird
er in der Geräteliste links im iTunes-Fenster angezeigt.
Gehen Sie wie folgt vor, um einen Musiktitel, ein Video oder ein anderes Objekt zum
iPod nano hinzuzufügen:
1 Klicken Sie in iTunes auf „Musik“ oder auf ein anderes Objekt unter „Mediathek“ links im
iTunes-Fenster.
2 Bewegen Sie einen Musiktitel oder ein anderes Objekt auf den iPod nano in der
Geräteliste.
Gehen Sie wie folgt vor, um einen Musiktitel, ein Video oder ein anderes Objekt vom
iPod nano zu entfernen:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus.
2 Wählen Sie einen Musiktitel oder ein anderes Objekt auf dem iPod nano aus und
drücken Sie die Rückschritttaste oder die Taste „Entf.“ auf Ihrer Tastatur.
Wenn Sie einen Titel oder ein anderes Objekt vom iPod nano entfernen, wird er bzw. es
nicht aus der iTunes-Mediathek gelöscht.
Gehen Sie wie folgt vor, um eine neue Wiedergabeliste auf dem iPod nano
zu erstellen:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf die
Taste „Hinzufügen“ (+) oder wählen Sie „Ablage“ > „Neue Wiedergabeliste“.
2 Geben Sie einen Namen für die Wiedergabeliste ein.
3 Klicken Sie in der Liste „Mediathek“ auf ein Objekt, etwa „Musik“, und bewegen Sie dann
Musiktitel oder sonstige Objekte in die Wiedergabeliste.
Gehen Sie wie folgt vor, um Objekte in einer Wiedergabeliste auf dem iPod nano
hinzuzufügen oder zu entfernen:
m Bewegen Sie ein Objekt in eine Wiedergabeliste auf dem iPod nano, um es hinzuzufügen. Wählen Sie ein Objekt in einer Wiedergabeliste aus und drücken Sie die Rückschritttaste bzw. die Taste „Entf.“ auf Ihrer Tastatur, um das Objekt zu löschen.
Gehen Sie wie folgt vor, um iTunes zurückzusetzen, sodass Musik, Videos und
Podcasts automatisch synchronisiert werden:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Übersicht“.
2 Deaktivieren Sie „Musik und Videos manuell verwalten“.
3 Wählen Sie die Bereiche „Musik“, „Filme“, „Fernsehsendungen“ und „Podcasts“ und dann
die gewünschten Synchronisierungsoptionen aus.
4 Klicken Sie auf „Anwenden“.Kapitel 2 Einrichten des iPod nano 37
Die Aktualisierung beginnt automatisch.
Einrichten von VoiceOver
VoiceOver liest auf Wunsch den Namen und Interpreten des Musiktitels vor, den Sie
gerade anhören. Wenn Sie die Apple Earphones mit Fernbedienung und Mikrofon oder
die In-Ear Headphones mit Fernbedienung und Mikrofon verwenden, können Sie mithilfe von VoiceOver auch in Wiedergabelisten navigieren.
Hinweis: VoiceOver ist nicht in allen Sprachen verfügbar.
VoiceOver-Optionen werden im Bereich „Übersicht“ in iTunes festgelegt. Wenn Sie Ihren
iPod nano konfigurieren, wird VoiceOver standardmäßig aktiviert. Befolgen Sie die
angezeigten Anleitungen, um das VoiceOver Kit zu laden und zu installieren.
Soll VoiceOver bei der Konfiguration des iPod nano nicht aktiviert werden, deaktivieren
Sie die Option „VoiceOver aktivieren“ im Assistenten. Falls Sie Ihre Meinung ändern,
können Sie VoiceOver auch zu einem späteren Zeitpunkt aktivieren.
Gehen Sie wie folgt vor, um VoiceOver zu einem späteren Zeitpunkt zu aktivieren:
1 Verbinden Sie den iPod nano mit Ihrem Computer.
2 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Übersicht“.
3 Wählen Sie unter „Sprachausgabe“ die Option „VoiceOver aktivieren“ aus.
4 Klicken Sie auf „Anwenden“.
5 Befolgen Sie die angezeigten Anleitungen, um das VoiceOver Kit zu laden und zu
installieren.
6 Klicken Sie auf „Anwenden“.
Nach Abschluss der Synchronisierung wird VoiceOver aktiviert.
Wenn Sie anstelle der Standardstimme von VoiceOver eine Systemstimme Ihres Computers verwenden möchten, wählen Sie unter „Sprachausgabe“ im Bereich „Übersicht“
die Option „Systemstimme anstelle der integrierten Stimme verwenden“ aus.
Sie können VoiceOver jederzeit deaktivieren, wenn der iPod nano mit dem Computer
verbunden ist.
Gehen Sie wie folgt vor, um VoiceOver zu deaktivieren:
1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Übersicht“.
2 Heben Sie unter „Sprachausgabe“ die Auswahl der Option „VoiceOver aktivieren“ auf.
3 Klicken Sie auf „Anwenden“.
Nach Abschluss der Synchronisierung wird VoiceOver deaktiviert.3
38
3 Anhören von Musik
In diesem Kapitel erfahren Sie Näheres über die Wiedergabe
unterwegs.
Nachdem Sie den iPod nano eingerichtet haben, können Sie Musiktitel, Podcasts,
Hörbücher und mehr anhören.
Abspielen von Musik und anderem Audiomaterial
Beim Abspielen eines Musiktitels wird der Bildschirm „Sie hören“ angezeigt. In der
unten stehenden Tabelle werden die Elemente des Bildschirms „Sie hören“ beschrieben.
Objekt im Bildschirm Funktion
Symbol für „Zufällige Wiedergabe“
Dieses Symbol wird angezeigt, wenn der iPod nano für die Wiederholung von Musiktiteln oder Alben in zufälliger Reihenfolge eingestellt ist.
Symbol für Endloswiedergabe Dieses Symbol wird angezeigt, wenn der iPod nano für die Wiederholung aller Musiktitel eingestellt ist. Das Symbol für die einmalige
Wiederholung (!) wird angezeigt, wenn der iPod nano nur einen
Musiktitel wiederholen soll.
Statusbalken
Klicken Sie auf die Mitteltaste, um den
Navigationsbalken, den Schieberegler
für die Funktion „Genius“ oder die
Zufallswiedergabe, Wertungen und
Liedtexte einzublenden.
Cover
Symbol für „Zufällige
Wiedergabe“
Symbol für Endloswiedergabe Wiedergabesymbol
Batteriesymbol
TitelinformationenKapitel 3 Anhören von Musik 39
Drücken Sie die Mitteltaste, um im Bildschirm „Sie hören“ durch diese zusätzlichen Objekte
zu navigieren:
Verwenden Sie das Click Wheel und die Mitteltaste, um nach einem Musiktitel oder
einem Musikvideo zu suchen.
Wenn Sie Musikvideos aus dem Menü „Musik“ abspielen, hören Sie nur die Musik.
Wenn Sie sie aus dem Menü „Videos“ abspielen, sehen Sie auch das zugehörige Video.
Gehen Sie wie folgt vor, um einen Musiktitel auszusuchen und abzuspielen:
m Wählen Sie „Musik“, suchen Sie nach einem Musiktitel oder Musikvideo und drücken
Sie dann die Taste „Start/Pause“ (’).
Gehen Sie wie folgt vor, um die Wiedergabelautstärke zu ändern:
m Wird der Statusbalken angezeigt, ändern Sie die Lautstärke mit dem Click Wheel.
Wird der Statusbalken nicht angezeigt, drücken Sie so lange die Mitteltaste, bis
er verfügbar wird.
Wiedergabesymbol Wird angezeigt, wenn ein Titel abgespielt wird. Das Symbol für
„Pause“ (1) wird angezeigt, wenn der Titel angehalten wurde.
Batteriesymbol Zeigt den ungefähren Ladezustand der Batterie an.
Titelinformationen Zeigt Musiktitel, Interpreten und Albumtitel an.
Cover Zeigt das CD-Cover an, falls es verfügbar ist.
Statusbalken Zeigt die vergangene und die verbleibende Zeit für den gerade
abgespielten Titel an.
Objekt im Bildschirm Funktion
Objekt im Bildschirm Funktion
Navigationsbalken Ermöglicht das schnelle Navigieren zu einem anderen Teil des
Titels.
Schieberegler „Genius“ Erstellt eine Genius-Wiedergabeliste, die auf dem aktuellen Musiktitel basiert. Der Schieberegler wird nicht angezeigt, wenn zum
aktuellen Titel keine Genius-Informationen verfügbar sind.
Schieberegler „Zufall“ Ermöglicht die zufällige Wiedergabe von Titeln oder Alben direkt
über den Bildschirm „Sie hören“.
Wertung Ermöglicht die Bewertung des Titels.
Liedtexte Zeigt den Liedtext des gerade abgespielten Titels an. Liedtexte
werden nur angezeigt, wenn Sie sie in iTunes eingegeben haben.40 Kapitel 3 Anhören von Musik
Gehen Sie wie folgt vor, um einen anderen Teil eines Titels anzuhören:
1 Drücken Sie die Mitteltaste, bis der Navigationsbalken angezeigt wird.
2 Verwenden Sie das Click Wheel, um die Abspielposition im Navigationsbalken
zu bewegen.
Gehen Sie wie folgt vor, um basierend auf dem aktuellen Titel eine Genius-Wiedergabeliste zu erstellen:
1 Drücken Sie die Mitteltaste, bis der Navigationsbalken angezeigt wird.
2 Bewegen Sie den Schieberegler mit dem Click Wheel an die Startposition.
Der Schieberegler „Genius“ wird nicht angezeigt, wenn zum aktuellen Titel keine GeniusInformationen verfügbar sind.Kapitel 3 Anhören von Musik 41
Gehen Sie wie folgt vor, um Titel im Bildschirm „Sie hören“ in zufälliger Reihenfolge
abzuspielen:
1 Drücken Sie die Mitteltaste, bis der Schieberegler für die Zufallswiedergabe angezeigt
wird.
2 Bewegen Sie den Schieberegler mit dem Click Wheel zu „Titel“ oder „Alben“.
 Wählen Sie „Titel“, um alle Titel auf dem iPod nano in zufälliger Reihenfolge abzuspielen.
 Wählen Sie „Alben“, um alle Titel im aktuellen Album der Reihe nach abzuspielen.
Der iPod nano wählt dann nach dem Zufallsprinzip ein anderes Album aus und spielt
dieses der Reihenfolge nach ab.
Gehen Sie wie folgt vor, wenn nur der Ton eines Musikvideos ausgegeben
werden soll:
m Wählen Sie „Musik“ und suchen Sie nach einem Musikvideo.
Wenn Sie das Video abspielen, können Sie es hören, nicht jedoch sehen. Wenn Sie eine
Wiedergabeliste anhören, die Video-Podcasts enthält, hören Sie die Podcasts, sehen sie
aber nicht.
Gehen Sie wie folgt vor, um zum vorherigen Menü zurückzukehren:
m Drücken Sie in einem beliebigen Bildschirm die Taste „Menu“.42 Kapitel 3 Anhören von Musik
Bewerten von Musiktiteln
Sie können Musiktiteln eine Bewertung hinzufügen (von 1 bis zu 5 Sternen), um anzugeben, wie sehr Ihnen ein Titel gefällt. Diese Bewertungen helfen Ihnen dabei, automatisch intelligente Wiedergabelisten in iTunes zu erstellen.
Gehen Sie wie folgt vor, um einen Musiktitel zu bewerten:
1 Starten Sie die Wiedergabe des Musiktitels.
2 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis die
fünf Wertungspunkte angezeigt werden.
3 Verwenden Sie das Click Wheel, um eine Wertung zuzuweisen.
Die Wertungen, die Sie Musiktiteln auf dem iPod nano zuweisen, werden bei der
Synchronisierung an iTunes übertragen.
Hinweis: Video-Podcasts können keine Bewertungen erhalten.
Anzeigen von Liedtexten auf dem iPod nano
Wenn Sie den Liedtext zu einem Musiktitel in iTunes eingeben (vgl. „Hinzufügen von
Liedtexten“ auf Seite 24) und diesen Titel dann zum iPod nano hinzufügen, können Sie
den Liedtext auf dem iPod nano anzeigen. Liedtexte werden nur angezeigt, wenn Sie
sie zuvor eingegeben haben.
Gehen Sie wie folgt vor, um den Liedtext auf dem iPod nano anzuzeigen, während
ein Musiktitel abgespielt wird:
m Drücken Sie die Mitteltaste, wenn der Bildschirm „Sie hören“ zu sehen ist, bis der Liedtext angezeigt wird. Sie können durch den Liedtext blättern, während der Titel wiedergegeben wird.Kapitel 3 Anhören von Musik 43
Anzeigen von CD-Covern auf dem iPod nano
Sofern CD-Cover verfügbar sind, werden sie von iTunes auf dem iPod nano angezeigt.
Die Cover sind auf dem iPod nano in Cover Flow, in der Albumliste und beim Abspielen von Titel aus dem Album zu sehen.
Gehen Sie wie folgt vor, um CD-Cover auf dem iPod nano anzuzeigen:
m Halten Sie den iPod nano horizontal, um Cover Flow zu verwenden, oder spielen Sie
einen Titel mit einem verfügbaren Cover ab und zeigen Sie das Cover im Bildschirm „Sie
hören“ an.
Weitere Informationen zu CD-Covern erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ >
„iTunes-Hilfe“ wählen.
Blättern durch Musiktitel mithilfe der Cover Flow-Darstellung
Sie können durch Ihre Musiksammlung blättern, indem Sie die Cover Flow-Darstellung
verwenden, die eine visuelle Möglichkeit zum Durchsuchen Ihrer Mediathek bietet. Mit
Cover Flow werden Ihre Alben alphabetisch nach Name des Interpreten angezeigt.
Sie können Cover Flow über das Hauptmenü, ein beliebiges Musikmenü oder den
Bildschirm „Sie hören“ aktivieren.
Gehen Sie wie folgt vor, um die Cover Flow-Darstellung zu verwenden:
1 Drehen Sie den iPod nano um 90 Grad nach links oder rechts. Cover Flow wird
angezeigt.
2 Blättern Sie mit dem Click Wheel durch Ihre Albumcover.
3 Wählen Sie ein Album aus und drücken Sie die Mitteltaste.44 Kapitel 3 Anhören von Musik
4 Wählen Sie mit dem Click Wheel einen Musiktitel aus und drücken Sie dann die
Mitteltaste, um den Titel abzuspielen.
Sie können in Cover Flow auch rasch durch Ihre Alben blättern, indem Sie den Daumen schnell auf dem Click Wheel bewegen.
Hinweis: Es werden nicht alle Sprachen unterstützt.
Gehen Sie wie folgt vor, um mit Cover Flow schnell durch Inhalte zu blättern:
1 Bewegen Sie Ihren Daumen schnell auf dem Click Wheel, um einen Buchstaben des
Alphabets auf dem Bildschirm anzuzeigen.
2 Navigieren Sie mit dem Click Wheel im Alphabet zum ersten Buchstaben des Interpreten, den Sie suchen.
Alben von Interpreten, deren Namen mit einem Symbol oder einer Zahl beginnt,
werden nach dem Buchstaben „Z“ aufgeführt.
3 Nehmen Sie den Daumen kurz vom Click Wheel, um mit normaler Geschwindigkeit
zu blättern.
4 Wählen Sie ein Album aus und drücken Sie die Mitteltaste.
5 Wählen Sie mit dem Click Wheel einen Musiktitel aus und drücken Sie dann die Mitteltaste, um den Titel abzuspielen.
Gehen Sie wie folgt vor, um Cover Flow zu aktivieren oder zu deaktivieren:
1 Wählen Sie im Hauptmenü „Einstellungen“ > „Allgemein“ > „Drehen“.
2 Drücken Sie die Mitteltaste, um „Cover Flow“ oder „Aus“ zu wählen.Kapitel 3 Anhören von Musik 45
Zugreifen auf weitere Befehle
Einige weitere iPod nano-Befehle sind direkt über den Bildschirm „Sie hören“ und
bestimmte Menüs verfügbar.
Gehen Sie wie folgt vor, um auf weitere Befehle zuzugreifen:
m Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird. Wählen Sie einen
Befehl aus und drücken Sie dann erneut die Mitteltaste.
Wird ein Menü nicht angezeigt, sind keine weiteren Befehle verfügbar.
Verwenden der Funktion „Genius“ auf dem iPod nano
Auch wenn der iPod nano nicht mit Ihrem Computer verbunden ist, können Sie mit der
Funktion „Genius“ automatisch Ad-hoc-Wiedergabelisten mit Musiktiteln erstellen, die
gut zusammenpassen. Außerdem können Sie Genius-Mischungen abspielen, d. h.
vorab ausgewählte Sammlungen mit Titeln, die gut zusammenpassen. Damit Sie diese
Funktion nutzen können, müssen Sie Genius zuerst im iTunes Store konfigurieren und
dann den iPod nano mit iTunes synchronisieren. Sie haben auch die Möglichkeit, in
iTunes Genius-Wiedergabelisten zu erstellen und dann zum iPod nano hinzufügen und
Genius-Mischungen mit dem iPod nano zu synchronisieren.
Informationen zum Einrichten der Funktion „Genius“ in iTunes erhalten Sie, indem Sie
iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Genius ist ein kostenloser Dienst, zu
dessen Nutzung Sie lediglich einen iTunes Store-Account benötigen.46 Kapitel 3 Anhören von Musik
Gehen Sie wie folgt vor, um eine Genius-Wiedergabeliste auf dem iPod nano
zu erstellen:
1 Wählen Sie einen Musiktitel aus. Drücken und halten Sie dann die Mitteltaste, bis ein
Menü angezeigt wird.
Sie können einen Titel aus einem Menü oder einer Wiedergabeliste auswählen.
Sie können aber auch vom Bildschirm „Sie hören“ aus beginnen.
2 Wählen Sie „Genius starten“.
Der Befehl „Genius starten“ wird nicht im Menü mit den zusätzlichen Befehlen angezeigt, wenn eine der folgenden Bedingungen zutrifft:
 Sie haben Genius in iTunes nicht konfiguriert und den iPod nano nicht anschließend
mit iTunes synchronisiert.
 Genius erkennt den ausgewählten Musiktitel nicht.
 Genius erkennt den Musiktitel, aber in Ihrer Mediathek befinden sich nicht mindestens zehn ähnliche Titel.
3 Drücken Sie die Mitteltaste. Die neue Wiedergabeliste wird angezeigt.
4 Klicken Sie auf „Wiedergabeliste sichern“, um die Liste zu sichern.
Die Wiedergabeliste wird mit dem Namen und Interpreten des Titels gesichert, den Sie
zum Erstellen der Wiedergabeliste verwendet haben.
5 Wählen Sie „Aktualisieren“, um eine neue Wiedergabeliste auf Grundlage desselben
Musiktitels zu erstellen. Wenn Sie eine gesicherte Wiedergabeliste aktualisieren, ersetzt
die neue Liste die vorherige. Die vorherige Wiedergabeliste kann nicht wiederhergestellt werden.
Sie können Genius auch über den Bildschirm „Sie hören“ starten. Drücken Sie dazu die
Mitteltaste, bis der Schieberegler „Genius“ angezeigt wird, und bewegen Sie den Schieberegler dann mithilfe des Click Wheel nach rechts. Der Schieberegler „Genius“ wird
nicht angezeigt, wenn zum aktuellen Titel keine Genius-Informationen verfügbar sind.
Die auf dem iPod nano gesicherten Genius-Wiedergabelisten werden wieder mit
iTunes synchronisiert, wenn Sie den iPod nano an Ihren Computer anschließen.
Gehen Sie wie folgt vor, um eine Genius-Wiedergabeliste abzuspielen:
m Wählen Sie „Musik“ > „Wiedergabelisten“ und wählen Sie eine Wiedergabeliste aus.Kapitel 3 Anhören von Musik 47
Abspielen von Genius-Mischungen
Genius-Mischungen werden von iTunes erstellt und enthalten Titel aus Ihrer Mediathek, die gut zusammenpassen. Mit Genius-Mischungen genießen Sie Ihre Titel jedes
Mal neu. iTunes erstellt bis zu 12 Genius-Mischungen, abhängig von der Auswahl an
Musiktiteln in Ihrer iTunes-Mediathek.
Informationen zum Synchronisieren von Genius-Mischungen mit dem iPod nano finden Sie unter „Synchronisieren von Genius-Wiedergabelisten und Genius-Mischungen
mit dem iPod nano“ auf Seite 30.
Gehen Sie wie folgt vor, um eine Genius-Mischung (Genius-Mix) abzuspielen:
1 Wählen Sie „Musik“ > „Genius-Mixe“.
2 Blättern Sie mit den Tasten „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“
(]) durch die Genius-Mischungen. Die Punkte unten auf dem Bildschirm geben an, wie
viele Genius-Mischungen mit dem iPod nano synchronisiert sind.
3 Drücken Sie, wenn der Bildschirm einer Genius-Mischung angezeigt wird, die Mitteltaste oder die Taste „Start/Pause“ (’), um die Wiedergabe einer Genius-Mischung
zu starten.
Wird die gewählte Genius-Mischung abgespielt, ist das Lautsprechersymbol ( )
zu sehen.48 Kapitel 3 Anhören von Musik
Erstellen von „On-The-Go“-Wiedergabelisten auf dem iPod nano
Sie können „On-The-Go“-Wiedergabelisten auf dem iPod nano erstellen, wenn der
iPod nano nicht mit Ihrem Computer verbunden ist.
Gehen Sie wie folgt vor, um eine „On-The-Go“- Wiedergabeliste zu erstellen:
1 Wählen Sie einen Musiktitel aus. Drücken und halten Sie dann die Mitteltaste, bis ein
Menü angezeigt wird.
2 Wählen Sie „Zu On-The-Go hinzufügen“.
3 Wiederholen Sie die Schritte 1 und 2, um weitere Musiktitel hinzuzufügen.
4 Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“, um Ihre Liste der Musiktitel zu
durchsuchen und abzuspielen.
Sie können auch eine Gruppe mit Musiktiteln hinzufügen. Möchten Sie beispielsweise
ein Album hinzufügen, markieren Sie den Albumtitel, drücken und halten Sie die
Mitteltaste, bis ein Menü angezeigt wird, und wählen Sie dann „Zu On-The-Go
hinzufügen“.
Gehen Sie wie folgt vor, um die Musiktitel in der „On-The-Go“-Wiedergabeliste
abzuspielen:
m Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“ und wählen Sie anschließend
einen Musiktitel aus.
Gehen Sie wie folgt vor, um einen Musiktitel aus der „On-The-Go“-Wiedergabeliste
zu entfernen:
1 Wählen Sie einen Musiktitel in der Wiedergabeliste aus. Drücken Sie dann die Mitteltaste und halten Sie diese gedrückt, bis ein Menü angezeigt wird.
2 Wählen Sie „Aus On-the-Go entfernen“ und drücken Sie die Mitteltaste.
Gehen Sie wie folgt vor, um die gesamte „On-The-Go“-Wiedergabeliste zu löschen:
m Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“ > „Wiedergabeliste löschen“
und klicken Sie auf „Löschen“.
Gehen Sie wie folgt vor, um die „On-The-Go“-Wiedergabelisten auf dem iPod nano
zu sichern:
m Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“ und sichern Sie die Wiedergabeliste.
Die erste Wiedergabeliste wird als „Neue Wiedergabeliste 1” im Menü „Wiedergabelisten“ gesichert. Die „On-The-Go“-Wiedergabeliste wird gelöscht und kann erneut
verwendet werden. Sie können eine beliebige Anzahl von Wiedergabelisten sichern.
Nachdem Sie eine Wiedergabeliste gesichert haben, können Sie keine Musiktitel mehr
aus ihr entfernen.Kapitel 3 Anhören von Musik 49
Gehen Sie wie folgt vor, um die „On-The-Go“-Wiedergabelisten vom iPod nano auf
Ihren Computer zu kopieren:
m Wenn Ihr iPod nano so konfiguriert ist, dass Musiktitel automatisch aktualisiert werden
(vgl. „Automatisches Synchronisieren von Musik“ auf Seite 29) und Sie eine „On-TheGo“-Wiedergabeliste erstellen, wird die Wiedergabeliste automatisch mit iTunes synchronisiert, sobald Sie den iPod nano an den Computer anschließen. Die neue „On-TheGo“-Wiedergabeliste wird in iTunes in der Liste der Wiedergabelisten angezeigt. Sie
können die neue Wiedergabeliste genau wie jede andere Wiedergabeliste umbenennen, bearbeiten oder löschen.
Durchsuchen von Musiktiteln nach Album oder Interpret
Wenn Sie einen Musiktitel hören, können Sie nach weiteren Titeln desselben Interpreten suchen oder alle Titel des aktuellen Albums anzeigen.
Gehen Sie wie folgt vor, um Musiktitel nach Album zu suchen:
1 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis ein
Menü angezeigt wird.
2 Wählen Sie „Album suchen“ und drücken Sie die Mitteltaste.
Die anderen Titel des aktuellen Albums, die sich auf Ihrem iPod nano befinden, werden
angezeigt. Sie können einen anderen Titel auswählen oder zum Bildschirm „Sie hören“
zurückkehren.
Gehen Sie wie folgt vor, um Musiktitel nach Interpret zu suchen:
1 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis ein
Menü angezeigt wird.
2 Wählen Sie „Interpret suchen“ und drücken Sie die Mitteltaste.
Alle anderen Titel dieses Interpreten, die sich auf Ihrem iPod nano befinden, werden
aufgelistet. Sie können einen anderen Titel auswählen oder zum Bildschirm „Sie hören“
zurückkehren.50 Kapitel 3 Anhören von Musik
Konfigurieren des iPod nano für die zufällige Wiedergabe
Sie können den iPod nano so einstellen, dass er Musiktitel, Alben oder Ihre gesamte
Mediathek in einer zufälligen Reihenfolge abspielt.
Gehen Sie wie folgt vor, um Ihren iPod nano für die Wiedergabe aller Musiktitel in
zufälliger Reihenfolge einzustellen:
m Wählen Sie „Zufällige Titel“ aus dem Hauptmenü des iPod nano.
Der iPod nano spielt nun die Musiktitel aus Ihrer gesamten Musikbibliothek in zufälliger Reihenfolge ab. Hörbücher und Podcasts werden dabei übersprungen.
Gehen Sie wie folgt vor, um den iPod nano so einzustellen, dass Musiktitel oder
Alben immer in zufälliger Reihenfolge wiedergegeben werden:
1 Wählen Sie „Einstellungen“ aus dem Hauptmenü des iPod nano.
2 Wählen Sie für die Einstellung „Zufall“ die Option „Titel“ oder „Alben“.
Wenn Sie den iPod nano für die Zufallswiedergabe konfiguriert haben, spielt der
iPod nano Titel in jeder zur Wiedergabe ausgewählten Liste (z. B. einem Album oder
einer Wiedergabeliste) in zufälliger Reihenfolge ab.
Wenn Sie den iPod nano so einstellen, dass Alben in zufälliger Reihenfolge wiedergegeben werden, spielt der iPod die Titel eines Albums der Reihe nach ab und wählt dann
zufällig ein anderes Album aus, dessen Titel dann wiederum der Reihe nach abgespielt
werden.
Sie können den iPod nano auch so einstellen, dass Musiktitel direkt über den Bildschirm „Sie hören“ in zufälliger Reihenfolge wiedergegeben werden.
Gehen Sie wie folgt vor, um den iPod nano so einzustellen, dass Musiktitel über den
Bildschirm „Sie hören“ in zufälliger Reihenfolge wiedergegeben werden:
1 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis der
Schieberegler für die Zufallswiedergabe angezeigt wird.
2 Verwenden Sie das Click Wheel, um den iPod nano für die Zufallswiedergabe von Titeln
oder Alben zu konfigurieren.
Sie können vorwärts zu einem zufällig gewählten Titel wechseln, indem Sie den
iPod nano schütteln.Kapitel 3 Anhören von Musik 51
Gehen Sie wie folgt vor, um die Zufallswiedergabe zu verwenden, während ein Titel
abgespielt oder angehalten wird:
m Schütteln Sie den iPod nano hin und her. Ein neuer Titel wird abgespielt.
Die Verwendung der Schüttelfunktion hat keine Auswirkungen auf Ihre Einstellungen
für die Zufallswiedergabe.
Gehen Sie wie folgt vor, um die Schüttelfunktion zu deaktivieren:
m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Schütteln“ und wählen Sie „Aus“.
Möchten Sie die Schüttelfunktion wieder aktivieren, wählen Sie „Einstellungen“ >
„Wiedergabe“ > „Schütteln“ und wählen Sie dann „Zufällig“.
Wenn der Schalter „Hold“ auf „HOLD“ gesetzt, das integrierte Radio des iPod nano eingeschaltet oder der Bildschirm deaktiviert ist, ist die Schüttelfunktion ebenfalls deaktiviert. Ist der iPod nano ausgeschaltet, lässt er sich nicht durch Schütteln aktivieren.
Konfigurieren des iPod nano für wiederholtes Abspielen
Sie können den iPod nano so einstellen, dass ein bestimmter Titel immer wieder wiederholt wird oder dass Titel in einer gewählten Liste wiederholt abgespielt werden.
Gehen Sie wie folgt vor, um den iPod nano für das wiederholte Abspielen von Musiktiteln zu konfigurieren:
m Wählen Sie „Einstellungen“ aus dem Hauptmenü des iPod nano.
 Wenn Sie alle Titel in einer Liste wiederholen möchten, wählen Sie „Wiederholen: Alle“.
 Wenn Sie einen Titel wiederholen möchten, wählen Sie „Wiederholen: Ein“.52 Kapitel 3 Anhören von Musik
Verwenden von VoiceOver auf dem iPod nano
Mithilfe von VoiceOver kann der iPod nano Name und Interpreten des Musiktitels angeben, den Sie gerade hören. VoiceOver steht in verschiedenen Sprachen zur Verfügung.
Wenn Sie VoiceOver verwenden möchten, installieren Sie das VoiceOver Kit und aktivieren Sie die Funktion „VoiceOver“ in iTunes. Weitere Informationen hierzu finden Sie im
Abschnitt „Einrichten von VoiceOver“ auf Seite 37.
Gehen Sie wie folgt vor, um eine Ankündigung des aktuellen Titels zu hören:
m Wenn der Bildschirm „Sie hören“ zu sehen ist, drücken Sie die Mitteltaste.
Daraufhin hören Sie den Namen und Interpreten des aktuellen Musiktitels. Wenn Sie
gerade ein Hörbuch abspielen, werden der Titel des Buchs und der Name des Autors
genannt.
Wenn Sie die Apple Earphones mit Fernbedienung und Mikrofon oder die In-Ear Headphones mit Fernbedienung und Mikrofon verwenden (verfügbar unter store.apple.com
oder bei Ihrem Apple Store vor Ort), können Sie mithilfe von VoiceOver auch durch
Wiedergabelisten navigieren. Weitere Informationen hierzu finden Sie in der Dokumentation zu diesem Zubehörprodukten.
Suchen nach Musik
Sie können Ihren iPod nano nach Musiktiteln, Wiedergabelisten, Albumtiteln, Interpretennamen, Audio-Podcasts und Hörbüchern durchsuchen. Die Suchfunktion sucht
nicht in Videos, Notizen, Kalendereinträgen, Kontakten oder Liedtexten.
Hinweis: Es werden nicht alle Sprachen unterstützt.
Gehen Sie wie folgt vor, um nach Musiktiteln zu suchen:
1 Wählen Sie „Suchen“ aus dem Menü „Musik“.
2 Geben Sie einen Suchbegriff ein, indem Sie mit dem Click Wheel durch das Alphabet
navigieren und die Mitteltaste drücken, um die einzelnen Zeichen einzugeben.
Der iPod nano beginnt nach der Eingabe des ersten Zeichens mit der Suche und zeigt
die Ergebnisse im Suchbildschirm an. Wenn Sie beispielsweise den Buchstaben „b“ eingeben, zeigt der iPod nano alle Titel an, die den Buchstaben „b“ enthalten. Bei Eingabe
von „ab“ zeigt der iPod nano alle Objekte mit dieser Buchstabenfolge an.
Drücken Sie die Taste „Vor/Schneller Vorlauf“, um ein Leerzeichen einzugeben (‘).
Drücken Sie die Taste „Zurück/Schneller Rücklauf“, um das vorherige Zeichen zu löschen
(]).
3 Drücken Sie die Taste „Menu“, um die Ergebnisliste anzuzeigen, durch die Sie mithilfe
des Click Wheel navigieren können.
Die Objekte in der Liste der Suchergebnisse sind mit einem Symbol gekennzeichnet,
das ihren Typ angibt: Musiktitel, Video, Interpret, Album, Hörbuch oder Podcast. Kapitel 3 Anhören von Musik 53
Drücken Sie die Mitteltaste, um zum Suchbildschirm zurückzukehren (wenn „Suchen“
im Menü hervorgehoben ist).
Anpassen des Menüs „Musik“
Wie im Hauptmenü können Sie auch im Menü „Musik“ Objekte hinzufügen oder entfernen. Sie können beispielsweise eine Sammlung (Compilation) zum Menü „Musik“ hinzufügen, sodass Sie Sammlungen, die aus verschiedenen Quellen zusammengestellt
wurden, ganz einfach auswählen können.
Gehen Sie wie folgt vor, um Objekte zum Menü „Musik“ hinzuzufügen oder daraus
zu entfernen:
1 Wählen Sie „Einstellungen“ > „Allgemein“ > „Musikmenü“.
2 Wählen Sie alle Objekte aus, die im Menü „Musik“ angezeigt werden sollen. Ein Häkchen
weist darauf hin, welche Objekte hinzugefügt wurden. Wählen Sie „Menü zurücksetzen“,
um die ursprünglichen Einstellungen des Menüs „Musik“ wiederherzustellen.
Einstellen der Obergrenze für die Lautstärke
Sie können auf Ihrem iPod nano eine Obergrenze für die Lautstärke festlegen und dieser eine Zahlenkombination zuweisen, mit der verhindert wird, dass die Einstellung
geändert werden kann.
Gehen Sie wie folgt vor, um für den iPod nano eine Obergrenze für die Lautstärke
einzustellen:
1 Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Max. Lautstärke“.
Der Lautstärkebalken zeigt die aktuelle Lautstärke an.
2 Verwenden Sie das Click Wheel, um eine Obergrenze für die Lautstärke auszuwählen.
3 Drücken Sie die Mitteltaste, um die maximale Lautstärke festzulegen.
4 Wählen Sie „Fertig“, wenn zum Ändern der maximalen Lautstärke keine Zahlenkombination erforderlich sein soll.
Gehen Sie wie folgt vor, um festzulegen, dass zum Ändern der maximalen Lautstärke eine Zahlenkombination eingegeben werden muss:
1 Legen Sie die maximale Lautstärke fest und wählen Sie anschließend „Sperren“.
2 Geben Sie im angezeigten Bildschirm eine Zahlenkombination ein.
Gehen Sie wie folgt vor, um eine Kombination einzugeben:
 Wählen Sie mit dem Click Wheel die erste Zahl für Ihre Zahlenkombination aus.
Drücken Sie zur Bestätigung die Mitteltaste und wählen Sie dann die nächste
Zahl aus.
 Wiederholen Sie diesen Vorgang, um die anderen Ziffern der Zahlenkombination
anzugeben. Mithilfe der Taste „Vor/Schneller Vorlauf“ (‘) gelangen Sie zur nächsten
Zahl und mit der Taste „Zurück/Schneller Rücklauf“ (]) zur vorherigen Zahl. Drücken
Sie die Mitteltaste nach Eingabe der letzten Zahl, um den Zahlencode zu bestätigen.54 Kapitel 3 Anhören von Musik
Die Lautstärke von Musiktiteln und anderem Tonmaterial kann je nach Art der Aufnahme und Codierung variieren. Nähere Angaben zum Einstellen einer konstanten
Lautstärke in iTunes und auf dem iPod nano finden Sie im Abschnitt „Einstellen einer
konstanten Lautstärke für alle Musiktitel“ auf Seite 55. Die Lautstärke kann auch abhängig von den verwendeten Ohr- und Kopfhörern unterschiedlich sein. Zubehörteile, die
über den Dock Connector angeschlossen werden, unterstützen keine Obergrenzen für
die Lautstärke.
Wenn Sie eine Zahlenkombination festgelegt haben, müssen Sie diese eingeben, damit
Sie die Obergrenze für die Lautstärke ändern oder löschen können.
Gehen Sie wie folgt vor, um die Grenze für die maximale Lautstärke zu ändern:
1 Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Max. Lautstärke“.
2 Wenn Sie eine Zahlenkombination festgelegt haben, geben Sie diese ein. Verwenden
Sie das Click Wheel, um die Ziffern auszuwählen, und drücken Sie zur Bestätigung die
Mitteltaste.
Ein Dreieck im Lautstärkebalken zeigt die aktuelle maximale Lautstärke an.
3 Ändern Sie mit dem Click Wheel die für die Lautstärke angegebene Obergrenze.
4 Drücken Sie die Taste „Start/Pause“ (’), um die Änderung zu bestätigen.
Gehen Sie wie folgt vor, um die Obergrenze für die Lautstärke zu löschen:
1 Wenn Sie gerade Inhalte mit dem iPod nano anhören, drücken Sie die Taste „Start/
Pause“ (’).
2 Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Max. Lautstärke“.
3 Wenn Sie eine Zahlenkombination festgelegt haben, geben Sie diese ein. Verwenden
Sie das Click Wheel, um die Ziffern auszuwählen, und drücken Sie zur Bestätigung jeder
Ziffer die Mitteltaste.
4 Verwenden Sie das Click Wheel, um die Obergrenze für die Lautstärke auf den höchsten Wert festzulegen. Hierdurch werden alle für die Lautstärke angegebenen Einschränkungen gelöscht.
5 Drücken Sie die Taste „Start/Pause“ (’), um die Änderung zu bestätigen.
Wenn Sie die Zahlenkombination vergessen haben, können Sie Ihren iPod nano zurücksetzen. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der
iPod-Software“ auf Seite 110.Kapitel 3 Anhören von Musik 55
Einstellen einer konstanten Lautstärke für alle Musiktitel
iTunes kann die Lautstärke der Titel automatisch anpassen, sodass sie alle mit derselben relativen Lautstärke abgespielt werden. Sie können den iPod nano für die Übernahme der iTunes-Lautstärkeeinstellungen konfigurieren.
Gehen Sie wie folgt vor, um iTunes so einzustellen, dass Musiktitel mit der gleichen
Lautstärke wiedergegeben werden:
1 Öffnen Sie iTunes und wählen Sie „iTunes“ > „Einstellungen“, wenn Sie einen Mac verwenden, oder „Bearbeiten“ > „Einstellungen“, wenn Sie mit einem Windows-PC arbeiten.
2 Klicken Sie auf „Wiedergabe“ und wählen Sie „Lautstärke anpassen“. Klicken Sie dann
auf „OK“
Gehen Sie wie folgt vor, um für den iPod nano die Lautstärkeeinstellungen aus
iTunes zu übernehmen:
m Wählen Sie „Einstellungen“ > „Wiedergabe“ und aktivieren Sie die Option „Lautstärke
anpassen“.
Wenn Sie die Option „Lautstärke anpassen“ in iTunes nicht aktiviert haben, hat das Einstellen dieser Option auf dem iPod nano keine Auswirkung.
Verwenden des Equalizers
Sie können die Voreinstellungen des Equalizers anpassen, um den Klang des iPod nano
so zu ändern, dass dieser einer bestimmten Musikrichtung entspricht. Wenn Sie beispielsweise den Klang von Rockmusik verbessern möchten, verwenden Sie die
Equalizer-Einstellung „Rock“.
Gehen Sie wie folgt vor, um mit dem Equalizer den Klang des iPod nano zu ändern:
m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „EQ“ und wählen Sie dann eine EqualizerVoreinstellung aus.
Wenn Sie in iTunes einem Musiktitel eine Equalizer-Einstellung zugewiesen haben und
der iPod nano Equalizer deaktiviert ist, wird für die Wiedergabe des Titels die iTunesEinstellung verwendet. Weitere Informationen hierzu finden Sie in der iTunes-Hilfe.
Überblenden zwischen Musiktiteln
Sie können festlegen, dass der iPod nano das Ende jedes Titels ausblendet und den
Anfang des jeweils folgenden Titels einblendet.
Gehen Sie wie folgt vor, um die Überblendung zu aktivieren:
m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Audioüberblendung“ und wählen
Sie „Ein“.
Hinweis: Titel, die für eine Wiedergabe ohne Pause zwischen den Titeln gruppiert sind,
werden auch bei aktivierter Überblendung ohne Pause abgespielt.56 Kapitel 3 Anhören von Musik
Abspielen von Podcasts
Bei Podcasts handelt es sich um kostenlose, ladbare Sendungen, die im iTunes Store
verfügbar sind. Podcasts sind unterteilt nach Sendungen, Folgen innerhalb der Sendungen und Kapiteln innerhalb der Folgen. Wenn Sie die Wiedergabe eines Podcasts
stoppen und später fortsetzen, wird die Wiedergabe an der Stelle fortgesetzt, an der Sie
unterbrochen haben.
Gehen Sie wie folgt vor, um einen Podcast abzuspielen:
1 Wählen Sie aus dem Hauptmenü „Einstellungen“ > „Podcasts“ und wählen Sie eine
Podcast-Sendung aus.
Podcast-Sendungen werden in umgekehrter chronologischer Reihenfolge angezeigt,
sodass Sie die neuste Sendung zuerst abspielen können. Neben den Sendungen und
Folgen, die Sie noch nicht abgespielt haben, wird ein blauer Punkt angezeigt.
2 Wählen Sie eine Folge aus, die abgespielt werden soll.
Im Bildschirm „Sie hören“ werden jetzt die Sendung, die Folgen, Datumsangaben sowie
die bereits abgelaufene Zeit und die Restzeit angezeigt. Drücken Sie die Mitteltaste, um
weitere Informationen über den Podcast anzuzeigen.
Ist der Podcast in Kapitel eingeteilt, können Sie durch Drücken der Taste „Vor/Schneller
Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) zum nächsten Kapitel oder zum
Anfang des aktuellen Kapitels im Podcast springen.
Wenn ein Podcast Folgenbilder enthält, sehen Sie außerdem ein Bild. Podcast-Cover
können sich im Laufe einer Folge ändern.
Weitere Informationen zu Podcasts erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ >
„iTunes-Hilfe“ wählen. Suchen Sie dann nach „Podcasts“.
Abspielen von iTunes U-Inhalten
iTunes U gehört zum iTunes Store und bietet kostenlose Vorlesungen, Sprachkurse,
Hörbücher und mehr, die Sie laden und mit dem iPod nano abspielen können. Die
iTunes U-Inhalte sind nach Sammlungen, Objekten innerhalb von Sammlungen, Autoren und Anbietern sortiert.
Wenn Sie die Wiedergabe von iTunes U-Inhalten unterbrechen und später fortsetzen,
beginnt die Wiedergabe genau an dieser Stelle.
Gehen Sie wie folgt vor, um iTunes U-Inhalt abzuspielen:
1 Wählen Sie aus dem Hauptmenü „iTunes U“ und dann eine Sammlung aus.Kapitel 3 Anhören von Musik 57
Die Objekte in einer Sammlung werden in umgekehrter chronologischer Reihenfolge
angezeigt, sodass Sie die jeweils neuste Sendung zuerst hören können. Neben Sammlungen und Objekten, die Sie noch nicht angehört oder angesehen haben, wird ein
blauer Punkt angezeigt.
2 Wählen Sie ein Objekt aus, das abgespielt werden soll.
Weitere Informationen zu iTunes U erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ >
„iTunes-Hilfe“ wählen. Suchen Sie dann nach „iTunes U“.
Anhören von Hörbüchern
Wenn Sie Hörbücher auf dem iPod nano anhören möchten, wählen Sie „Hörbücher“ aus
dem Menü „Musik“. Wählen Sie ein Hörbuch aus und drücken Sie dann die Taste „Start/
Pause“ (’).
Wenn Sie die Wiedergabe eines Hörbuchs auf Ihrem iPod nano unterbrechen, können
Sie sie später genau an dieser Stelle fortsetzen. Der iPod nano überspringt Hörbücher,
wenn die Zufallswiedergabe aktiviert ist.
Ist das gerade wiedergegebene Hörbuch in Kapitel eingeteilt, können Sie durch
Drücken der Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (])
zum nächsten Kapitel oder zum Anfang des aktuellen Kapitels springen. Sie können das
Hörbuch auch aus dem Menü „Hörbücher“ auswählen und dann ein Kapitel auswählen.
Oder Sie wählen „Fortsetzen“, um die Wiedergabe nahtlos fortzusetzen.
Sie können Hörbücher schneller oder langsamer als mit der Normalgeschwindigkeit
abspielen. Das Festlegen der Wiedergabegeschwindigkeit wirkt sich nur auf Hörbücher
aus, die im iTunes Store oder bei audible.de erworben wurden.
Gehen Sie wie folgt vor, um die Wiedergabegeschwindigkeit für ein Hörbuch
festzulegen:
m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Hörbücher“ und wählen Sie eine
Geschwindigkeit aus. Alternativ können Sie im Bildschirm „Sie hören“ die Mitteltaste
drücken und gedrückt halten und dann eine Geschwindigkeit auswählen.4
58
4 Ansehen von Videos
Sie können mit dem iPod nano Fernsehsendungen, Filme,
Video-Podcasts und mehr ansehen. In diesem Kapitel erfahren Sie, wie Sie Videos mit dem iPod nano und Ihrem Fernsehgerät ansehen.
Sie können Videos auf dem iPod nano ansehen und anhören. Mit einem kompatiblen
AV-Kabel (separat erhältlich unter: www.apple.com/de/ipodstore) können Sie Videos,
die sich auf dem iPod nano befinden, auf Ihrem Fernsehgerät ansehen.
Ansehen von Videos auf dem iPod nano
Auf den iPod nano geladene Videos sind in den Videomenüs verfügbar. Musikvideos
erscheinen außerdem in Musikmenüs. Videos, die mit der integrierten Videokamera des
iPod nano aufgenommen wurden, werden im Menü „Videos“ unter „Filme“ angezeigt.
Gehen Sie wie folgt vor, um ein Video auf dem iPod nano anzusehen:
1 Wählen Sie „Videos“ und suchen Sie nach einem Video. Wählen Sie „Filme“, um nach
einem Video zu suchen, das mit der integrierten Videokamera des iPod nano aufgenommen wurde.
2 Wählen Sie ein Video aus und drücken Sie dann die Taste „Start/Pause“ (’).Kapitel 4 Ansehen von Videos 59
Drehen Sie den iPod nano um 90 Grad, um das Video anzusehen. Sie können den
iPod nano nach links oder nach rechts drehen.
Möchten Sie Videos ansehen, die mit der integrierten Videokamera im Hochformat
(vertikal) aufgenommen wurden, halten Sie den iPod nano vertikal.
Ansehen von Video-Podcasts
Gehen Sie wie folgt vor, um ein Video-Podcast anzusehen:
m Wählen Sie aus dem Hauptmenü „Podcasts“ und wählen Sie dann einen Video-Podcast
aus.
Weitere Informationen hierzu finden Sie im Abschnitt „Abspielen von Podcasts“ auf
Seite 56.
Ansehen von aus iTunes U geladenen Videos
Gehen Sie wie folgt vor, um ein iTunes U-Video anzusehen:
m Wählen Sie aus dem Hauptmenü „iTunes U“ und dann ein Video aus.
Weitere Informationen hierzu finden Sie im Abschnitt „Abspielen von iTunes U-Inhalten“ auf Seite 56.
Ansehen von Videos auf einem an den iPod nano angeschlossenen Fernsehgerät
Mit einem iPod-AV-Kabel können Sie Videos auf einem an Ihren iPod nano angeschlossenen Fernsehgerät anzeigen. Konfigurieren Sie den iPod nano zunächst so, dass er
Videos auf einem Fernsehgerät anzeigen kann. Schließen Sie dann den iPod nano an
Ihr Fernsehgerät an und spielen Sie das Video ab.
Verwenden Sie das Apple Component AV-Kabel, das Apple Composite AV-Kabel oder
das Apple AV Connection Kit. Andere ähnliche Kabel mit Cinch-Stecker funktionieren
u. U. nicht. Sie können die Kabel unter der Adresse www.apple.com/de/ipodstore oder
in Ihrem Apple Store vor Ort kaufen.60 Kapitel 4 Ansehen von Videos
Gehen Sie wie folgt vor, um den iPod nano für das Anzeigen von Videos auf einem
Fernsehgerät zu konfigurieren:
m Wählen Sie „Videos“ > „Video-Einstellungen“ und setzen Sie „TV-Ausgang“ auf „Fragen“
oder „Ein“.
Wenn Sie für „TV-Ausgang“ die Option „Fragen“ festlegen, können Sie bei jedem Starten
eines Videos auf dem iPod nano entscheiden, ob Sie das Video auf einem Fernsehgerät
oder auf dem iPod nano ansehen möchten. Wenn Sie für „TV-Ausgang“ die Option „Ein“
festlegen, zeigt der iPod nano Videos nur auf dem Fernsehgerät an. Möchten Sie ein
Video abspielen, während der iPod nano nicht mit einem Fernsehgerät verbunden ist,
zeigt der iPod nano eine Meldung an, in der Sie aufgefordert werden, die Verbindung
zu einem Fernsehgerät herzustellen.
Sie können außerdem festlegen, ob ein Video bildschirmfüllend im Vollbildmodus oder
im Breitbildformat und ob es auf einem PAL- oder NTSC-Fernsehgerät angezeigt werden soll.
Gehen Sie wie folgt vor, um die Einstellungen für das Fernsehgerät festzulegen:
m Wählen Sie „Videos“ > „Video-Einstellungen“ und befolgen Sie die unten stehenden
Anweisungen.
Einstellung Aktion
Video auf einem Fernsehgerät
anzeigen
Setzen Sie „TV-Ausgang“ auf „Fragen“ oder „Ein“.
Video auf einem PAL- oder
NTSC-Fernsehgerät anzeigen
Setzen Sie das TV-Signal auf PAL oder NTSC. PAL und NTSC beziehen sich auf die Standards zur Fernsehübertragung. Welchen Standard Ihr Fernsehgerät verwendet, hängt davon ab, in welchem
Land Sie Ihr das Gerät erworben haben. Sehen Sie ggf. in der Dokumentation zu Ihrem Fernsehgerät nach, welchen Standard das
Gerät verwendet.
Das Format Ihres Fernsehgeräts Wählen Sie für „TV-Bildschirm“ die Option „Widescreen (Breitbild)“
für das 16:9-Format oder „Standard“ für das 4:3-Format.
Video im Vollbildmodus
anzeigen
Wählen Sie für die Option „Bildschirmfüllend“ die Einstellung „Ein“.
Wenn Sie für diese Option „Aus“ wählen, werden Breitformatfilme
auf dem iPod nano oder auf standardmäßigen (4:3) Fernsehbildschirmen im Letterbox-Format mit schwarzen Balken angezeigt.
Alternatives Audiomaterial
abspielen
Setzen Sie „Alternatives Audio“ auf „Ein“.
Erweiterte Untertitel anzeigen Legen Sie für „Erweiterte Untertitel“ die Option „Ein“ fest.
Untertitel anzeigen Legen Sie für „Untertitel“ die Option „Ein“ fest.Kapitel 4 Ansehen von Videos 61
Gehen Sie wie folgt vor, um das Apple Component AV-Kabel mit dem iPod nano und
Ihrem Fernsehgerät zu verbinden:
1 Verbinden Sie den grünen, blauen und roten Videostecker mit den Component-Videoeingängen (Y, Pb und Pr) des Fernsehgeräts.
Wenn Sie das Apple Composite AV-Kabel verwenden, verbinden Sie den gelben Videostecker mit dem Videoeingang des Fernsehgeräts. Ihr Fernsehgerät muss über CinchVideo- und Audioanschlüsse verfügen.
2 Verbinden Sie den weißen und den roten Audiostecker mit dem linken und rechten
analogen Audioeingang Ihres Fernsehgeräts.
3 Verbinden Sie 30-poligen Stecker mit Ihrem iPod nano oder Universal Dock.
4 Verbinden Sie den USB-Stecker mit dem Apple USB Power Adapter oder dem Computer, damit die Batterie des iPod nano nicht entladen wird.
5 Schalten Sie den iPod nano und Ihr Fernsehgerät oder den Empfänger ein, um die Wiedergabe zu starten. Stellen Sie sicher, dass auf dem iPod nano die Option „TV-Ausgang“
auf „Ein“ oder „Fragen“ gesetzt ist.
Die Anschlüsse an Ihrem Fernsehgerät oder Empfänger unterscheiden sich möglicherweise etwas von den hier
abgebildeten.
Gehen Sie wie folgt vor, um ein Video auf Ihrem Fernsehgerät anzusehen:
1 Verbinden Sie den iPod nano mit dem Fernsehgerät (vgl. oben).
2 Schalten Sie Ihr Fernsehgerät ein und stellen Sie es so ein, dass die Anzeige über die
Eingänge erfolgt, an denen der iPod nano angeschlossen ist. Weitere Informationen
hierzu finden Sie in der Dokumentation zu Ihrem Fernsehgerät.
3 Wählen Sie auf dem iPod nano „Videos“ und suchen Sie nach einem Video.
USB Power
Adapter
(Netzteil)
iPod
Audioeingang
links (weiß)
30-poliger Stecker
Fernsehgerät
Videoeingang (Y, Pb, Pr)
Audioeingang
rechts (rot)
USB-Stecker5
62
5 Verwenden der Videokamera
Mit der integrierten Videokamera des iPod nano können Sie
hochwertige Videos mit Ton aufnehmen, egal, wo Sie gerade
sind. Sogar die Aufnahme von Videos mit Spezialeffekten ist
möglich. Sie können Ihre aufgenommenen Videos auf dem
iPod nano ansehen und auf Ihren Computer übertragen, um
sie zu bearbeiten und weiterzugeben.
Möchten Sie den iPod nano als Videokamera verwenden, wählen Sie „Videokamera“ aus
dem Hauptmenü. Der Bildschirm wird zum Bildsucher.
Sie können Videos im Quer- oder Hochformat aufnehmen. In beiden Modi wird Ihre
aktuelle Aufnahmedauer oben rechts auf dem Bildschirm angezeigt.Kapitel 5 Verwenden der Videokamera 63
Linse und Mikrofon befinden sich auf der Rückseite des iPod nano, sodass Sie auf dem
Bildschirm Ihr aufgenommenes Video sehen können. Achten Sie darauf, Linse oder
Mikrofon nicht zu verdecken.
Aufnehmen von Video
Gehen Sie wie folgt vor, um Video aufzunehmen:
1 Wählen Sie „Videokamera“ aus dem Hauptmenü.
2 Wenn Sie mit der Aufnahme beginnen möchten, drücken Sie die Mitteltaste. Drücken
Sie erneut die Mitteltaste, um die Aufnahme zu stoppen.
Während der Aufnahme ist oben rechts auf dem Bildschirm neben der Aufnahmedauer ein rotes blinkendes Licht zu sehen.
Die Aufnahmedauer wird durch den verfügbaren Speicherplatz und den Ladestand der
Batterie begrenzt.
Ein aufgenommenes Video kann bis zu 2 GB groß sein. Wird die Größe von 2 GB
erreicht, wird die Videoaufnahme gestoppt. Drücken Sie die Mitteltaste, um die
Aufnahme fortzusetzen.
Aufnehmen von Videos mit Spezialeffekten
Sie können Videos mit einer Vielzahl an Spezialeffekten mit dem iPod nano aufnehmen.
Hinweis: Videoeffekte können nur vor der Aufnahme ausgewählt werden. Der
iPod nano kann keine Effekte zu aufgenommenen Videos hinzufügen bzw. davon
entfernen. Das Ändern von Einstellungen für Videoeffekte während der Aufnahme
ist nicht möglich.64 Kapitel 5 Verwenden der Videokamera
Gehen Sie wie folgt vor, um Videos mit Spezialeffekten aufzunehmen:
1 Wählen Sie „Videokamera“ aus dem Hauptmenü.
2 Drücken und halten Sie die Mitteltaste, um die Palette der Videoeffekte anzuzeigen.
3 Blättern Sie mit dem Click Wheel durch die Effekte und drücken Sie die Mitteltaste, um
einen Effekt auszuwählen.
Der Sucherbildschirm mit dem ausgewählten Effekt wird angezeigt.
4 Drücken Sie erneut die Mitteltaste, um mit der Aufnahme mit Videoeffekten
zu beginnen.
5 Drücken Sie die Mitteltaste, um die Aufnahme zu stoppen.
Wenn Sie den Bildschirm „Videokamera“ schließen, um Ihr Video abzuspielen, werden
die Videoeffekte deaktiviert. Wiederholen Sie die Schritte 2 bis 4, um die Aufnahme mit
einem Videoeffekt fortzusetzen.
Abspielen aufgenommener Videos
Der iPod nano sichert Ihre aufgenommenen Videos unter „Film“. Sie zeigen den
Bildschirm „Film“ an, indem Sie im Sucherbildschirm „Videokamera“ die Taste „Menu“
drücken.
Mit dem iPod nano können Sie im Bildschirm „Film“ auf Ihre aufgenommenen Videos
zugreifen, sodass Sie gerade aufgenommenes Material ansehen können, ohne die
Videokamera zu deaktivieren. Ihre aufgenommenen Videos lassen sich auch über das
Menü „Videos“ abspielen.
Gehen Sie wie folgt vor, um ein gerade aufgenommenes Video abzuspielen:
1 Drücken Sie die Mitteltaste, um die Aufnahme zu stoppen.
2 Drücken Sie die Taste „Menu“, um den Bildschirm „Film“ zu öffnen.
3 Wählen Sie die Aufnahme aus und drücken Sie die Mitteltaste, um sie abzuspielen.
Im Menü „Videos“ können Sie auch auf eine vollständige Liste der aufgenommenen
Videos auf dem iPod nano zugreifen.Kapitel 5 Verwenden der Videokamera 65
Gehen Sie wie folgt vor, um ein aufgenommenes Video aus dem Menü „Videos“
abzuspielen:
1 Wählen Sie „Videos“ aus dem Hauptmenü.
2 Wählen Sie „Aufnahmen“, um eine Liste aufgenommener Videos anzuzeigen.
3 Blättern Sie mit dem Click Wheel zu dem Video, das Sie abspielen möchten. Drücken
Sie dann die Taste „Start/Pause“ (’), um die Wiedergabe zu starten und zu stoppen.
Am Ende des Videos wird die Wiedergabe automatisch gestoppt.
Löschen aufgenommener Videos
Durch das Entfernen nicht benötigter Videos geben Sie Speicherplatz für neue Inhalte
frei. Aufgenommene Videos können nacheinander oder gleichzeitig gelöscht werden.
Gehen Sie wie folgt vor, um ein aufgenommenes Video zu löschen:
1 Wählen Sie „Videos“ > „Aufnahmen“ und wählen Sie ein Video aus der Liste aus oder
wählen Sie ein Video im Bildschirm „Film“ aus.
2 Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird.
3 Wählen Sie „Löschen“ oder „Alle löschen“.
Importieren aufgenommener Videos auf Ihren Computer
Sie können Ihre aufgenommenen Videos auf Ihren Computer importieren. Wenn Sie
einen Mac mit iPhoto verwenden, können Sie die Videos ganz einfach für andere
bereitstellen und Hintergrundmusik ergänzen.
Der iPod nano formatiert aufgenommene Videos als H.264 w/AAC-VGA-Videodateien
mit 30 fps.
Damit die Videos auf Ihren Computer importiert werden können, muss der iPod nano
für die Verwendung als Festplatte aktiviert sein.
Gehen Sie wie folgt vor, um den iPod nano für die Verwendung als Festplatte
zu aktivieren:
1 Verbinden Sie den iPod nano mit Ihrem Computer.
2 Klicken Sie in iTunes auf den iPod nano in der Geräteliste und klicken Sie dann auf den
Titel „Übersicht“.
3 Wählen Sie „Verwendung als Volume aktivieren“.
Der iPod nano wird nicht nur in iTunes, sondern auch als externe Festplatte auf Ihrem
Computer angezeigt, und zwar mit dem bei der Erstkonfiguration gewählten Namen.
Auf einem Mac wird der iPod nano im Finder und auf dem Schreibtisch angezeigt.
Auf einem PC wird der iPod nano im Windows Explorer und unter „Mein Computer“
angezeigt.66 Kapitel 5 Verwenden der Videokamera
Ihre aufgenommenen Videos sind im Ordner „DCIM“ auf dem iPod nano gespeichert
und können auf den Computer kopiert werden, wenn der iPod nano damit verbunden
ist. Weitere Informationen zum Kopieren von Dateien finden Sie in der mit Ihrem Computer gelieferten Dokumentation.
Nachdem Sie Ihr aufgenommenes Video auf Ihren Computer kopiert haben, können Sie
es auf dem Mac mithilfe des QuickTime-Player ansehen. Auf einem PC verwenden Sie
hierzu QuickTime oder den Windows Media Player.
Möchten Sie Speicherplatz auf dem iPod nano freigeben, nachdem Sie Ihre Videos auf
den Computer kopiert haben, löschen Sie sie aus dem Ordner „DCIM“.
Importieren aufgenommener Videos auf einen Mac mit iPhoto
Wenn Sie einen Mac verwenden, auf dem iPhoto 6.0.6 installiert ist, können Sie Ihre
aufgenommenen Videos mit iPhoto vom iPod nano auf den Mac importieren und über
MobileMe veröffentlichen. Außerdem können Sie Musik hinzufügen, indem Sie Ihre aufgenommenen Videos mit dem QuickTime-Player bearbeiten. Damit die Videos mit
iPhoto importiert werden können, muss der iPod nano für die Verwendung als Festplatte aktiviert sein.
Gehen Sie wie folgt vor, um Videos mithilfe von iPhoto auf einen Mac
zu importieren:
1 Verbinden Sie den iPod nano mit Ihrem Computer.
2 Öffnen Sie iPhoto, sofern es nicht automatisch geöffnet wird.
3 Klicken Sie in der iPhoto-Geräteliste auf den iPod nano.
4 Wählen Sie die zu importierenden Videos aus und klicken Sie dann auf „Ausgewählt“
oder „Alle importieren“.
5 Wählen Sie „Fotos löschen“ oder „Fotos behalten“.
Ihre aufgenommenen Videos werden in der iPhoto-Mediathek unter „Ereignisse“ und
„Fotos“ sowie in der Liste der letzten Importe aufgeführt.
Gehen Sie wie folgt vor, um aufgenommene Videos mithilfe von iPhoto
bereitzustellen:
1 Befolgen Sie die Anleitungen zum Importieren Ihrer aufgenommenen Videos in iPhoto.
2 Wählen Sie in iPhoto ein Video aus.
3 Klicken Sie unten im iPhoto-Fenster auf „MobileMe“.
4 Befolgen Sie die angezeigten Anleitungen.
Sie benötigen einen MobileMe-Account, um Ihre aufgenommenen Videos über
MobileMe bereitzustellen. Außerdem müssen Sie iPhoto für die Veröffentlichung über
Ihren Account konfigurieren. Weitere Informationen zur Online-Bereitstellung erhalten
Sie, indem Sie iPhoto öffnen und „Hilfe“ > „iPhoto-Hilfe“ wählen.Kapitel 5 Verwenden der Videokamera 67
Bereitstellen aufgenommener Videos mit einem Mac oder PC
Nachdem Sie Ihre aufgenommenen Videos auf Ihrem Computer importiert haben,
können Sie sie vom Mac oder PC aus auf YouTube veröffentlichen.
Gehen Sie wie folgt vor, um aufgenommene Videos auf Facebook zu veröffentlichen:
1 Besuchen Sie die Website www.facebook.com/de und melden Sie sich falls
erforderlich an.
2 Klicken Sie auf das Videosymbol links neben der Taste für die Freigabe oben auf Ihrer
Facebook-Startseite. Klicken Sie dann auf die Option zum Laden von Videos.
3 Befolgen Sie die angezeigten Anleitungen zum Auswählen und Laden Ihres Videos.
Gehen Sie wie folgt vor, um aufgenommene Videos auf YouTube zu veröffentlichen:
1 Besuchen Sie die Website www.youtube.com/de und melden Sie sich falls
erforderlich an.
2 Klicken Sie auf die Taste zum Laden oben rechts auf Ihrer YouTube-Startseite.
3 Befolgen Sie die angezeigten Anleitungen zum Auswählen und Laden Ihres Videos.
Wenn Sie einen Mac mit iPhoto 8.1 (oder neuer) und Mac OS X 10.6.1 (oder neuer)
besitzen, können Sie Ihre aufgenommenen Videos direkt an YouTube exportieren.
Gehen Sie wie folgt vor, um aufgenommene Videos mithilfe von iPhoto 8.1 oder
neuer und Mac OS X v10.6.1 oder neuer auf YouTube zu veröffentlichen:
1 Wählen Sie in iPhoto durch Doppelklicken das Video aus, das veröffentlicht werden soll.
Das Video wird im QuickTime-Player geöffnet.
2 Wählen Sie im QuickTime-Player „Freigeben“ > „YouTube“.
3 Geben Sie Ihren YouTube-Namen und Ihr Kennwort ein und klicken Sie dann auf
„Anmelden“.
4 Geben Sie eine Beschreibung und Tags ein. Wenn Sie den Zugriff auf Ihr Video einschränken wollen, wählen Sie „Film als privat festlegen“.
5 Klicken Sie auf „Weiter“ und dann auf „Freigeben“.
Wenn der Export abgeschlossen ist, klicken Sie auf den angezeigten Link, um auf Ihre
Videoseite in YouTube zu gelangen.
Für das Laden von Video auf Facebook oder YouTube sind Accounts erforderlich.
Besuchen Sie die entsprechenden Websites, wenn Sie weitere Informationen
hierzu benötigen.68 Kapitel 5 Verwenden der Videokamera
Hinzufügen von Musik zu Ihren aufgenommenen Videos
Mit dem QuickTime-Player können Sie Musik zu Ihren aufgenommenen Videos hinzufü-
gen. Wählen Sie ein aufgenommenes Video in iPhoto aus und klicken Sie dann unten
im iPhoto-Fenster auf die Taste „Bearbeiten“. Das Video wird im QuickTime-Player geöffnet und Sie können eine Musikspur hinzufügen.
Informationen zum Hinzufügen von Musik zu Ihren aufgenommenen Videos mit dem
QuickTime-Player erhalten Sie, indem Sie „Hilfe“ > „QuickTime-Player-Hilfe“ wählen und
die Anleitungen zum Extrahieren, Hinzufügen von Bewegen von Spuren lesen.
Möchten Sie auf einem Windows-PC Musik zu Ihren Videos hinzufügen, lesen Sie die
mit Ihrem Computer oder Fotoprogramm gelieferte Dokumentation.6
69
6 Anhören von FM-Radiosendungen
Der iPod nano ist mit einem integrierten FM-Radio ausgestattet, das Informationen zum Radiosender und gespielten Titel
anzeigt, eine Funktion zum Stoppen von Live-Radiosendungen bietet und Titel kennzeichnet, die Sie in iTunes vorab
anhören und kaufen können.
Wenn Sie FM-Radio hören möchten, verbinden Sie Ohr- oder Kopfhörer mit dem
iPod nano und wählen Sie dann „Radio“ aus dem Hauptmenü.
Das Kabel der Ohr- oder Kopfhörer des iPod nano dient als Radioantenne. Sie müssen
Ohr- oder Kopfhörer an den iPod nano anschließen, um ein Funksignal empfangen
zu können. Über den Lautsprecher des iPod nano werden Radiosendungen nicht
ausgegeben.
Nach der Auswahl von „Radio“ aus dem Hauptmenü wird der Radiobildschirm
angezeigt.
Wenn die Radiosenderauswahl angezeigt wird, können Sie mit dem Click Wheel oder
durch Drücken der Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (])
einen Radiosender wählen.70 Kapitel 6 Anhören von FM-Radiosendungen
Wichtig: Die in diesem Kapitel angegebenen Funkfrequenzen dienen nur zur Veranschaulichung und sind nur in bestimmten Regionen verfügbar.
Wenn Sie einen Sender mit Unterstützung für RDS (Radio Data System) einstellen, werden auf dem Bildschirm Informationen zu Titel, Interpret und Sender angezeigt. Nach
der Einstellung eines Senders wird die Senderauswahl durch den Statusbalken ersetzt.
Der Statusbalken bewegt sich entsprechend, wenn Sie den Sender weiterhin anhören.
Angezeigtes Objekt Funktion
RDS-Daten Zeigt aktuelle Informationen zu Sender, Titel und Interpret an.
Radiosenderauswahl Wird zum Einstellen des Senders verwendet.
Markierungen für
Lieblingssender
Weisen darauf hin, dass sich der aktuelle Sender in der Liste der
Favoriten befindet.
Symbol für das Funksignal Wird angezeigt, wenn das Radio eingeschaltet ist und ein Signal
empfängt.
Sendefrequenz Zeigt die Sendefrequenz des ausgewählten Radiosenders an.
Symbol für Kennzeichnungen Wird angezeigt, wenn der aktuelle Titel die iTunes-Kennzeichnungsfunktion unterstützt.
Statusbalken Zeigt die Länge des Radiopuffers an.
Symbol für das Funksignal
Statusbalken
Radiosenderauswahl
RDS-Daten
Sendefrequenz
Markierung für Lieblingssender
Markierung für
Lieblingssender
RDS-Daten
Symbol für KennzeichnungenKapitel 6 Anhören von FM-Radiosendungen 71
Einstellen des FM-Radios
Sie können das FM-Radio einstellen, indem Sie durch Sender blättern, zwischen verfügbaren Sendern wechseln oder diese suchen oder Ihre Lieblingssender sichern und
direkt auswählen.
Gehen Sie wie folgt vor, um durch Radiosender zu blättern:
1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird.
2 Verwenden Sie das Click Wheel, um den gewünschten Sender einzustellen.
Gehen Sie wie folgt vor, um zwischen verfügbaren Sendern zu wechseln:
1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird.
2 Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]),
um zum nächsten oder vorherigen verfügbaren Sender zu wechseln. Wiederholen Sie
diesen Schritt nach Belieben.
Wurden Lieblingssender eingestellt, ist die Funktion für den Senderwechsel nicht verfügbar. In diesem Fall werden durch Drücken der Taste „Vor/Schneller Vorlauf“ (‘) oder
„Zurück/Schneller Rücklauf“ (]) die Lieblingssender eingestellt.
Gehen Sie wie folgt vor, um nach verfügbaren Sendern zu suchen:
1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird.
2 Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) bzw. „Zurück/Schneller Rücklauf“ (]),
um nach verfügbaren Sendern zu suchen.
Sie hören eine fünfsekündige Hörprobe jedes Senders, bevor zum nächsten Sender
gewechselt wird.
3 Möchten Sie den Suchlauf beenden und den aktuellen Sender auswählen, drücken Sie
die Mitteltaste.
103.5FM
100 106 102 10472 Kapitel 6 Anhören von FM-Radiosendungen
Gehen Sie wie folgt vor, um Ihre Lieblingssender zu sichern:
1 Stellen Sie einen Sender ein, den Sie sichern möchten.
2 Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird.
3 Wählen Sie „Voreinstellung hinzufügen“ und drücken Sie dann die Mitteltaste.
Gehen Sie wie folgt vor, um einen Lieblingssender einzustellen:
1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird.
2 Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]),
um den nächsten oder vorherigen Lieblingssender einzustellen. Wiederholen Sie diesen Schritt nach Belieben.
Stoppen von Live-Radiosendungen
Sie können eine Radiosendung stoppen und innerhalb von 15 Minuten nahtlos
weiter abspielen.
Gehen Sie wie folgt vor, um eine Live-Radiosendung zu stoppen:
m Drücken Sie, während das Radio läuft, in einem beliebigen Bildschirm die Taste „Start/
Pause“ (’).
103.5FMKapitel 6 Anhören von FM-Radiosendungen 73
Das Symbol „Pause“ (1) wird angezeigt und die Uhrzeit, zu der Sie die Wiedergabe
gestoppt haben, wird über dem Statusbalken eingeblendet.
Während der Live-Pause gibt ein gelbes Dreieck die Stelle an, an der die Radiosendung
gestoppt wurde. Der Statusbalken bewegt sich und zeigt an, wie viel Zeit seit dem
Stopp vergangen ist.74 Kapitel 6 Anhören von FM-Radiosendungen
Wenn Sie die Taste „Start/Pause“ (’) erneut drücken, wird die Sendung nahtlos
fortgesetzt.
Sie können entlang des Statusbalkens auch vor oder zurück navigieren. Drücken Sie die
Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) und halten Sie sie
gedrückt oder verwenden Sie das Click Wheel, um schnell vor oder zurück zu navigieren. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“
(]), um in Intervallen von einer Minute vor oder zurück zu navigieren.
Sie können nur dann durch eine gestoppte Radiosendung navigieren, wenn der Statusbalken zu sehen ist. Bei Anzeige der Radiosenderauswahl ist das nicht möglich.
Gehen Sie wie folgt vor, um zwischen Statusbalken und Radiosenderauswahl
zu wechseln:
m Drücken Sie die Mitteltaste.
Der Statusbalken ist vollständig ausgefüllt, wenn die maximale Pausendauer von
15 Minuten erreicht ist. Sofern Sie den Radiosender nicht löschen, können Sie durch die
15 letzten Minuten der Sendung navigieren, die Sie anhören. Inhalte, die älter als
15 Minuten sind, werden gelöscht, um Platz für die weitere Sendung zu schaffen.
Wenn Sie die Sendung stoppen und nicht innerhalb von 15 Minuten fortsetzen, wird
der Ruhezustand des iPod nano aktiviert und die gestoppte Radiosendung gelöscht.
Eine gestoppte Radiosendung wird gelöscht, wenn eine der folgenden Situationen
eintritt:
 Sie wählen einen anderen Sender. Wenn Sie während einer gestoppten Radiosendung den Sender wechseln, wird eine Warnung angezeigt und Sie können den
Vorgang abbrechen.
 Sie schalten den iPod nano aus.
 Sie schalten das Radio aus, um andere Inhalte abzuspielen, die Videokamera zu verwenden oder ein Sprachmemo aufzuzeichnen.
 Die Batterieladung ist sehr niedrig und die Batterie muss geladen werden.Kapitel 6 Anhören von FM-Radiosendungen 75
 Sie setzen die Wiedergabe der Sendung nach einer Pause von 15 Minuten nicht fort.
Sie können die Funktion „Live-Pause“ im Menü „Radio“ deaktivieren, um Batteriestrom
zu sparen.
Gehen Sie wie folgt vor, um die Funktion „Live-Pause“ zu deaktivieren:
1 Drücken Sie im Bildschirm „Radio“ die Taste „Menu“.
2 Wählen Sie „Live-Pause“ und drücken Sie die Mitteltaste. Wählen Sie dann „Aus“. Wählen Sie „Ein“, um die Funktion „Live-Pause“ wieder zu aktivieren.
Kennzeichnen von Titeln für die Synchronisierung mit iTunes
Wenn Sie einen Radiosender mit Unterstützung für die iTunes-Kennzeichnungsfunktion eingestellt haben, können Sie eine Liste mit Titeln sichern, die Sie später im iTunes
Store als Hörprobe anhören und anschließend kaufen können. Titel, die gekennzeichnet werden können, sind neben dem Namen mit einem entsprechenden Symbol für
Kennzeichnungen versehen.
Gehen Sie wie folgt vor, um einen Musiktitel zu kennzeichnen:
1 Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird.
Symbol für Kennzeichnungen76 Kapitel 6 Anhören von FM-Radiosendungen
2 Wählen Sie „Kennzeichnen“ und drücken Sie dann die Mitteltaste.
Ihre gekennzeichneten Musiktitel werden im Menü „Radio“ unter „Gekennzeichnete Titel“
angezeigt. Wenn Sie den iPod nano das nächste Mal mit iTunes synchronisieren, werden
Ihre gekennzeichneten Titel synchronisiert und vom iPod nano gelöscht. Sie werden in
iTunes angezeigt. Im iTunes Store können Sie dann eine Hörprobe davon abspielen und
sie kaufen.
Hinweis: Diese Funktion steht möglicherweise nicht für alle Radiosender zur
Verfügung.
Gehen Sie wie folgt vor, um gekennzeichnete Titel in iTunes vorab anzuhören und
zu kaufen:
1 Klicken Sie links im iTunes-Fenster unter „Store“ auf „Gekennzeichnet“.
2 Klicken Sie für den gewünschten Titel auf die Taste „Darstellung“.
3 Möchten Sie die Hörprobe des Titels abspielen, wählen Sie ihn durch Doppelklicken aus
oder klicken Sie auf die Taste „Hörprobe“. Möchten Sie den Titel kaufen, klicken Sie auf
die Taste „Kaufen“.
Verwenden des Menüs „Radio“
Drücken Sie im Radiobildschirm auf die Taste „Menu“, um zum Menü „Radio“
zu wechseln.
Das Menü „Radio“ enthält die folgenden Objekte.
Menüobjekt Funktion
Radiowiedergabe Schaltet das Radio ein und zeigt wieder den Radiobildschirm an.
Radio beenden Schaltet das Radio aus und löscht gestoppte Radiosendungen
(wird nur angezeigt, wenn das Radio eingeschaltet ist).Kapitel 6 Anhören von FM-Radiosendungen 77
Radioregionen
Mit dem iPod nano können in vielen Ländern FM-Funksignale empfangen werden. Fünf
Signalregionen sind bereits definiert: Nord-, Mittel- und Südamerika, Asien, Australien,
Europa und Japan.
Gehen Sie wie folgt vor, um eine Radioregion auszuwählen:
m Wählen Sie „Radio-Regionen“ aus dem Menü „Einstellungen“ und wählen Sie dann Ihre
Region.
Das Menü „Radio-Regionen“ wird auch im Menü „Radio“ angezeigt.
Die definierten Regionen richten sich dabei nach internationalen Radiostandards und
nicht nach tatsächlichen geografischen Regionen. Wenn Sie in einem Land leben, das
im Menü „Radio-Regionen“ nicht aufgelistet wird, wählen Sie die Region, deren Angaben über die Funkfrequenz am ehesten mit denen Ihres Landes übereinstimmen.
In der folgenden Tabelle wird der Funkfrequenzbereich jeder Region im Menü „RadioRegionen“ genannt, ergänzt durch die jeweiligen Unterschiede zwischen einzelnen
Radiosendern (durch das Zeichen „±“ angegeben).
Wichtig: Der iPod nano ist nur für den Empfang öffentlicher Radiosendungen konzipiert. Das Anhören von Übertragungen, die nicht für die Öffentlichkeit bestimmt sind,
ist in einigen Ländern illegal und kann strafrechtliche Folgen nach sich ziehen. Informieren Sie sich über die regional geltenden Gesetze und Vorschriften und halten Sie
diese bei Verwendung des iPod nano ein.
Favoriten Zeigt eine Liste der Sender an, die Sie als Favoriten gesichert
haben. Wählen Sie einen Sender aus und drücken Sie die Mitteltaste, um die Wiedergabe zu starten.
Gekennzeichnete Titel Zeigt eine Liste mit Titeln an, die Sie seit der letzten Synchronisierung mit iTunes gekennzeichnet haben, um eine Hörprobe davon
abzuspielen und sie zu kaufen.
Letzte Titel Zeigt eine Liste der zuletzt abgespielten Titel an.
Radio-Regionen Hiermit können Sie die Radiosender für Ihre aktuelle Region
einstellen.
Live-Pause Aktiviert oder deaktiviert die Funktion „Live-Pause“.
Menüobjekt Funktion
Radio-Region Angaben zur Funkfrequenz
Nord-, Mittel- und Südamerika 87,5 – 107,9 MHz / ± 200 kHz
Asien 87,5 – 108,0 MHz / ± 100 kHz
Australien 87,5 – 107,9 MHz / ± 200 kHz
Europa 87,5 – 108,0 MHz / ± 100 kHz
Japan 76,0 – 90,0 MHz / ± 100 kHz7
78
7 Fotofunktionen
Lesen Sie dieses Kapitel, um mehr über das Importieren und
Anzeigen von Fotos zu erfahren.
Sie können digitale Fotos auf Ihren Computer importieren und zum iPod nano hinzufügen. Sie können Ihre Fotos auf dem iPod nano oder in einer Diashow auf einem
Fernsehgerät anzeigen.
Importieren von Fotos
Wenn Sie mit einem Mac arbeiten, können Sie Fotos mithilfe von iPhoto von einer
Digitalkamera auf Ihren Computer importieren. Sie können auch andere digitale Bilder
in iPhoto importieren, beispielsweise Bilder aus dem Internet. Weitere Informationen
zum Importieren, Verwalten und Bearbeiten Ihrer Fotos erhalten Sie, indem Sie iPhoto
öffnen und „Hilfe“ > „iPhoto-Hilfe“ wählen.
iPhoto ist Bestandteil des iLife-Softwarepakets, das Sie unter www.apple.com/de/ilife
oder in Ihrem Apple Store vor Ort erwerben können. Möglicherweise ist iPhoto auch
bereits auf Ihrem Mac-Computer im Ordner „Programme“ installiert.
Wenn Sie Fotos auf einen Windows-PC importieren möchten, befolgen Sie die Anleitungen, die Sie mit Ihrer Digitalkamera oder dem Fotoprogramm erhalten haben.
Hinzufügen von Fotos von Ihrem Computer zum iPod nano
Wenn Sie einen Mac und iPhoto 7.1.5 (oder neuer) verwenden, können Sie iPhoto-Alben
automatisch synchronisieren (für Mac OS X 10.4.11, iPhoto 6.0.6 oder neuer ist erforderlich). Wenn Sie einen PC oder Mac verwenden, können Sie aus einem Ordner auf Ihrer
Festplatte Fotos zum iPod nano hinzufügen.
Das erste Hinzufügen von Fotos zum iPod nano dauert evtl. einige Zeit, je nachdem,
wie viele Fotos in Ihrer Mediathek enthalten sind.Kapitel 7 Fotofunktionen 79
Gehen Sie wie folgt vor, um Fotos von einem Mac mithilfe von iPhoto zum iPod nano
hinzuzufügen:
1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Fotos“.
2 Wählen Sie „Fotos synchronisieren von“ und wählen Sie „iPhoto“ aus dem Einblendmenü aus.
3 Wählen Sie Ihre Synchronisierungsoptionen aus:
 Möchten Sie alle Ihre Fotos hinzufügen, wählen Sie „Alle Fotos, Alben, Ereignisse und
Gesichter“.
 Möchten Sie ausgewählte Fotos hinzufügen, wählen Sie „Ausgewählte Alben, Ereignisse und Gesichter. Automatisch mit einbeziehen:“ und wählen Sie dann eine
Option aus dem Einblendmenü aus. Wählen Sie anschließend die Alben, Ereignisse
und Gesichter aus, die Sie hinzufügen möchten. (Die Funktion „Gesichter“ wird nur
von iPhoto 8.1 oder neuer unterstützt.)
 Möchten Sie Videos aus iPhoto hinzufügen, wählen Sie „Videos einbeziehen“.
4 Klicken Sie auf „Anwenden“.
Ihre Fotos werden bei jedem Anschließen des iPod nano an Ihren Computer automatisch synchronisiert.
Gehen Sie wie folgt vor, um Fotos aus einem Ordner auf Ihrer Festplatte zum
iPod nano hinzuzufügen:
1 Bewegen Sie die Bilder in einen Ordner auf Ihrem Computer.
Sollen Bilder in verschiedenen Fotoalben auf dem iPod nano abgelegt werden, erstellen Sie innerhalb des Hauptordners für Ihre Bilder weitere Ordner und bewegen Sie die
Bilder in die neuen Ordner.
2 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Fotos“.
3 Wählen Sie „Fotos synchronisieren von“.
4 Wählen Sie „Ordner auswählen“ aus dem Einblendmenü aus und wählen Sie dann den
Ordner mit Ihren Bildern.
5 Klicken Sie auf „Anwenden“.80 Kapitel 7 Fotofunktionen
Hinzufügen von Bilddateien mit voller Auflösung zum iPod nano
Wenn Sie Fotos zum iPod nano hinzufügen, optimiert iTunes die Fotos für die Anzeige.
Dabei werden die Bilddateien nicht standardmäßig mit der vollen Auflösung übertragen. Das Hinzufügen von Bilddateien mit voller Auflösung ist beispielsweise dann nützlich, wenn Sie Ihre Bilder von einem Computer auf einen anderen bewegen möchten.
Zur Anzeige der Bilder in höchster Qualität auf dem iPod nano ist die volle Auflösung
dagegen nicht erforderlich.
Gehen Sie wie folgt vor, um Bilddateien in voller Auflösung zum iPod nano hinzuzufügen:
1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Fotos“.
2 Wählen Sie „Inklusive Fotos mit voller Auflösung“.
3 Klicken Sie auf „Anwenden“.
iTunes kopiert die Versionen der Fotos mit voller Auflösung in den Ordner „Photos“ auf
Ihrem iPod nano.
Gehen Sie wie folgt vor, um Fotos vom iPod nano zu löschen:
1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Fotos“.
2 Wählen Sie „Fotos synchronisieren von“.
 Wählen Sie auf einem Mac „iPhoto“ aus dem Einblendmenü aus.
 Wählen Sie auf einem Windows-PC „Photoshop Album“ oder „Photoshop Elements“ aus
dem Einblendmenü aus.
3 Wählen Sie „Ausgewählte Alben“ und deaktivieren Sie die Alben, die Sie auf dem
iPod nano nicht mehr benötigen.
4 Klicken Sie auf „Anwenden“.Kapitel 7 Fotofunktionen 81
Anzeigen von Fotos
Auf dem iPod nano können Sie Fotos entweder manuell oder in einer Diashow
anzeigen. Wenn Sie ein optionales AV-Kabel von Apple (z. B. das Apple Component
AV-Kabel) haben, können Sie den iPod nano mit Ihrem Fernsehgerät verbinden und
Fotos zusammen mit passender Musikuntermalung als Diashow anzeigen.
Anzeigen von Fotos auf dem iPod nano
Gehen Sie wie folgt vor, um Fotos auf dem iPod nano anzuzeigen:
1 Wählen Sie auf dem iPod nano „Fotos“ > „Alle Fotos“. Sie können auch das Menü „Fotos“
und dann ein Fotoalbum auswählen, wenn Sie sich nur die Fotos aus diesem Album
ansehen möchten. Bei Miniaturbildern dauert es u. U. einen Augenblick, bis sie angezeigt werden.
2 Wählen Sie das gewünschte Foto aus und drücken Sie die Mitteltaste.
3 Halten Sie den iPod nano beim Anzeigen von Fotos im Hochformat vertikal und beim
Anzeigen von Fotos im Querformat horizontal.
Blättern Sie in einer beliebigen Fotoanzeige mit dem Click Wheel durch Fotos (wenn Sie
eine Diashow anzeigen, wird mit dem Click Wheel nur die Lautstärke der Musik gesteuert). Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“
(]), um zur nächsten oder vorherigen Fotoanzeige zu wechseln. Drücken und halten
Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um zum
letzten oder ersten Foto in der Mediathek oder dem Album zu blättern.82 Kapitel 7 Fotofunktionen
Anzeigen von Diashows
Sie können eine Diashow – auf Wunsch mit Musik und Übergängen – auf dem
iPod nano anzeigen. Mit einem optionalen AV-Kabel von Apple können Sie die
Diashow auch auf Ihrem Fernsehgerät ansehen.
Gehen Sie wie folgt vor, um die Einstellungen für die Diashow festzulegen:
m Wählen Sie „Fotos“ > „Einstellungen“ und befolgen Sie diese Anweisungen:
Gehen Sie wie folgt vor, um eine Diashow auf dem iPod nano anzuzeigen:
m Wählen Sie ein Foto, ein Album oder einen Film aus und drücken Sie die Taste „Start/
Pause“ (’). Oder wählen Sie ein Foto im Vollbildmodus und drücken Sie Mitteltaste.
Drücken Sie die Taste „Start/Pause“ (’), um die Diashow anzuhalten. Drücken Sie die
Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um zum nächsten oder vorherigen Foto zu wechseln.
Wenn Sie eine Diashow anzeigen, können Sie mit dem Click Wheel die Lautstärke der
Begleitmusik steuern und die Helligkeit anpassen. Während einer Diashow ist es nicht
möglich, mit dem Click Wheel durch Fotos zu blättern.
Einstellung Aktion
Anzeigedauer pro Bild Wählen Sie „Dauer pro Dia“ und wählen Sie eine Dauer aus.
Die während der Diashows
abgespielte Musik
Wählen Sie „Musik“ und wählen Sie eine Wiedergabeliste oder „Sie
hören“ aus. Wenn Sie iPhoto verwenden, können Sie „Von iPhoto“
auswählen, um die Musikeinstellungen von iPhoto zu kopieren. Es
werden nur die Musiktitel abgespielt, die Sie zum iPod nano hinzugefügt haben.
Zu wiederholende Dias Legen Sie für „Wiederholen“ die Einstellung „Ein“ fest.
Zufällig anzuzeigende Dias Legen Sie für „Zufällige Fotos“ die Einstellung „Ein“ fest.
Mit Übergängen anzuzeigende
Dias
Wählen Sie „Übergänge“ und wählen Sie einen Übergangstyp aus.
„Zufall“ umfasst alle Übergangstypen abgesehen von „Ken Burns“.
Auf dem iPod nano anzuzeigende Diashows
Setzen Sie „TV-Ausgang“ auf „Fragen“ oder „Aus“.
Auf einem Fernsehgerät anzuzeigende Diashows
Setzen Sie „TV-Ausgang“ auf „Fragen“ oder „Ein“.
Wenn Sie für „TV-Ausgang“ die Option „Fragen“ festlegen, können
Sie bei jedem Starten einer Diashow entscheiden, ob Sie die Diashow auf einem Fernsehgerät oder auf dem iPod nano ansehen
wollen.
Auf PAL- oder NTSC-Fernsehgeräten anzuzeigende Dias
Setzen Sie das TV-Signal auf PAL oder NTSC.
PAL und NTSC beziehen sich auf die Standards zur Fernsehübertragung. Welchen Standard Ihr Fernsehgerät verwendet, hängt davon
ab, in welchem Land Sie Ihr das Gerät erworben haben. Sehen Sie
ggf. in der Dokumentation zu Ihrem Fernsehgerät nach, welchen
Standard das Gerät verwendet.Kapitel 7 Fotofunktionen 83
Wenn Sie eine Diashow eines Albums anzeigen, das Videos enthält, wird die Diashow
angehalten, wenn das nächste Element ein Video ist. Begleitmusik wird weiterhin wiedergegeben. Wenn Sie das Video abspielen, wird die Musik währenddessen angehalten
und danach fortgesetzt. Drücken Sie die Taste „Start/Pause“ (’), um das Video abzuspielen. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘), um die Diashow fortzusetzen.
Gehen Sie wie folgt vor, um die Helligkeit während einer Diashow anzupassen:
1 Drücken Sie die Mitteltaste, bis die Helligkeitsanzeige zu sehen ist.
2 Verwenden Sie das Click Wheel, um die Helligkeit anzupassen.
Gehen Sie wie folgt vor, um den iPod nano an Ihr Fernsehgerät anzuschließen:
1 Schließen Sie das optionale Apple Component bzw. Composite AV-Kabel an den
iPod nano an.
Verwenden Sie das Apple Component AV-Kabel, Apple Composite AV-Kabel oder Apple
AV Connection Kit. Andere ähnliche Kabel mit Cinch-Stecker funktionieren u. U. nicht.
Sie können die Kabel unter www.apple.com/de/ipodstore erwerben.
2 Verbinden Sie die Audiostecker mit den Anschlüssen am Fernsehgerät.
Stellen Sie sicher, dass auf dem iPod nano die Option „TV-Ausgang“ auf „Fragen“ oder
„Ein“ gesetzt ist.
Ihr Fernsehgerät muss über Cinch-Video- und Audioanschlüsse verfügen. Die
Anschlüsse an Ihrem Fernsehgerät oder Empfänger unterscheiden sich möglicherweise etwas von den hier abgebildeten.
Gehen Sie wie folgt vor, um eine Diashow auf Ihrem Fernsehgerät anzuzeigen:
1 Verbinden Sie den iPod nano mit Ihrem Fernsehgerät (vgl. Seite 61).
2 Schalten Sie Ihr Fernsehgerät ein und stellen Sie es so ein, dass die Anzeige über die
Eingänge erfolgt, an denen der iPod nano angeschlossen ist. Weitere Informationen
hierzu finden Sie in der Dokumentation zu Ihrem Fernsehgerät.
3 Verwenden Sie den iPod nano, um die Diashow abzuspielen und zu steuern.84 Kapitel 7 Fotofunktionen
Hinzufügen von Fotos vom iPod nano zu einem Computer
Wenn Sie wie in den vorhergehenden Schritten beschrieben Fotos mit voller Auflö-
sung von Ihrem Computer zum iPod nano hinzufügen, werden sie auf dem iPod nano
im Ordner „Photos“ abgelegt. Sie können den iPod nano an einen Computer anschlie-
ßen und diese Fotos auf dem Computer ablegen. Der iPod nano muss für die Verwendung als Festplatte aktiviert sein (vgl. „Verwenden des iPod nano als externes Volume“
auf Seite 99).
Gehen Sie wie folgt vor, um Fotos vom iPod nano auf einen Computer
zu übertragen:
1 Schließen Sie den iPod nano an Ihren Computer an.
2 Bewegen Sie die Bilddateien aus dem Ordner „Photos“ oder „DCIM“ Ihres iPod nano
auf den Schreibtisch oder in ein Programm zur Fotobearbeitung auf Ihrem Computer.
Sie können auch ein Fotobearbeitungsprogramm wie iPhoto verwenden, um die im
Ordner „Photos“ abgelegten Fotos hinzuzufügen. Weitere Informationen hierzu finden
Sie in der Dokumentation zum Programm.
Gehen Sie wie folgt vor, um Fotos aus dem Ordner „Photos“ auf Ihrem iPod nano
zu löschen:
1 Schließen Sie den iPod nano an Ihren Computer an.
2 Navigieren Sie im Finder zum Ordner „Photos“ auf dem iPod nano und löschen Sie die
Fotos, die Sie nicht mehr benötigen.8
85
8 Weitere Einstellungen, zusätzliche
Funktionen und Zubehör
Der iPod nano kann nicht nur Musiktitel wiedergeben.
Und Sie können ihn nicht nur zum Anhören von Musik
verwenden.
Lesen Sie dieses Kapitel, um Näheres über die weiteren Funktionen Ihres iPod nano zu
erfahren, z. B. wie Sie ihn als Schrittzähler nutzen, Spachmemos damit aufzeichnen, als
externes Volume oder als Wecker verwenden, wie Sie den Timer für den Ruhezustand
einstellen, die Uhrzeit in anderen Ländern anzeigen, wie Sie den iPod nano zum Spielen verwenden und Notizen anzeigen und wie Sie Kontakte, Kalender und Aufgabenlisten synchronisieren. Hier erfahren Sie außerdem, wie Sie den iPod nano als Stoppuhr
verwenden und die Bildschirmanzeige sperren können. Zudem erhalten Sie Informationen dazu, welches Zubehör für den iPod nano angeboten wird.
Verwenden des iPod nano als Schrittzähler
Sie können den iPod nano als Schrittzähler (Pedometer) verwenden, der Ihre Schritte
und Trainingsleistungen erfasst.
Damit Sie möglichst genaue Ergebnisse erhalten, tragen Sie den iPod nano bei
Verwendung des Schrittzähler in der Hosentasche oder verwenden Sie das iPod nano
Armband.86 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Gehen Sie wie folgt vor, um den iPod nano als Schrittzähler (Pedometer)
zu verwenden:
1 Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und anschließend „Pedometer“.
2 Wenn Sie den Schrittzähler das erste Mal verwenden, geben Sie mit dem Click Wheel
Ihr Gewicht ein und drücken Sie dann die Mitteltaste, um die Erfassung zu starten.
3 Drücken Sie erneut die Mitteltaste, wenn Sie die Erfassung beenden möchten.
Gehen Sie wie folgt vor, um die Einstellungen des Schrittzählers anzupassen:
1 Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und anschließend
„Einstellungen“.
2 Wählen Sie eine der folgenden Optionen aus:
Gehen Sie wie folgt vor, um Ihre Trainingsübersicht anzuzeigen:
1 Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und anschließend „Übersicht“.
2 Wählen Sie ein Datum aus dem Kalender aus. Wählen Sie mit dem Click Wheel einen
Tag aus. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um durch die Monate zu blättern.
3 Drücken Sie die Mitteltaste, um Ihre Trainingsübersicht für das gewählte Datum anzuzeigen. Wenn Sie am gewählten Tag mehrere Trainingseinheiten absolviert haben,
wählen Sie die gewünschte aus.
Der iPod nano zeigt Ihr Schrittziel, die Trainingsdauer, Start- und Endzeiten, verbrannte
Kalorien und Gesamtwerte für die jeweilige Woche und den Monat an.
Möchten Sie ein Balkendiagramm für eine Ihrer Trainingseinheiten anzeigen, wählen
Sie eine Trainingseinheit aus und drehen Sie den iPod nano dann ins Querformat.
Ist der Schrittzähler aktiviert, wird im Hauptmenü der Eintrag „Pedometer“ angezeigt,
über den Sie die Erfassung schnell beenden können. Der Vorschaubereich unter dem
Hauptmenü zeigt Ihre Schrittzahl an, wenn Sie zum Menüobjekt „Pedometer“ blättern.
Funktion Aktion
Schrittzählermodus auswählen Wählen Sie „Pedometer“ und drücken Sie dann die Mitteltaste, um
zwischen „Manuell“ und „Immer eingeschaltet“ zu wechseln.
Trainingsziel festlegen Wählen Sie „Tägliches Schrittziel“ und wählen Sie dann ein Ziel aus
der Liste aus. Wählen Sie alternativ „Anpassen“ und legen Sie dann
mit dem Click Wheel ein Ziel fest.
Gewicht angeben Wählen Sie „Gewicht“, stellen Sie mit dem Click Wheel Ihr Gewicht
ein und drücken Sie dann die Mitteltaste.
Ausrichtung des Schrittzählers
angeben
Wählen Sie „Bildschirmausrichtung“ und wählen Sie dann „Vertikal“,
„Links“ oder „Rechts“.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 87
Soll der iPod nano Ihre Schritte im Laufe eines Tages zählen, wählen Sie „Pedometer“
aus dem Menü „Einstellungen“ und dann „Immer eingeschaltet“. Der Schrittzähler speichert Ihre Gesamtschrittzahl pro Tag, sodass Sie einen Überblick erhalten können, ohne
den Schrittzähler am Tagesende auszuschalten. In diesem Fall wird das Menüobjekt
„Pedometer“ fortlaufend im Hauptmenü angezeigt.
Sie können das Menüobjekt „Pedometer“ auch manuell zum Hauptmenü hinzufügen,
um die Schritterfassung schnell starten zu können. Beachten Sie hierzu den Abschnitt
„Hinzufügen oder Löschen von Menüoptionen im Hauptmenü“ auf Seite 11.
Mithilfe des Nike + iPod Sport Kit (separat erhältlich) kann der iPod nano auch Ihre
Geschwindigkeit, die zurückgelegte Strecke und vergangene Zeit sowie die verbrannten Kalorien erfassen und Ihre Trainingseinheiten an Nike + iPod-kompatiblen Studiogeräten speichern.
Wenn Sie den iPod nano mit iTunes synchronisieren, können Sie Ihre Schrittzähler- und
andere Trainingsdaten auf die Nike+-Website laden, über die Sie Ihre Trainingserfolge
anzeigen und mit denen von Freunden vergleichen können und mehr. Sie benötigen
einen Nike+-Account, den Sie bei der Synchronisierung einrichten können.
Gehen Sie wie folgt vor, um Ihre Trainingsinformationen auf die Nike+-Website
zu laden:
1 Verbinden Sie den iPod nano mit Ihrem Computer und öffnen Sie iTunes (sofern es
nicht automatisch geöffnet wird). Wenn Sie Ihre Trainingsdaten das erste Mal synchronisieren, wird folgende Meldung angezeigt:
2 Klicken Sie auf „Senden“ und befolgen Sie die angezeigten Anleitungen, um Ihren
Nike+-Account einzurichten.
Nachdem Sie Ihren Account eingerichtet haben, wird ein neuer Titel im iTunes-Fenster
angezeigt:
3 Klicken Sie auf den Titel „Nike + iPod“ und wählen Sie „Trainingsdaten automatisch an
Nike+ senden“, sofern diese Option nicht bereits ausgewählt ist.
4 Klicken Sie auf „Anwenden“.88 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Möchten Sie Ihre Informationen auf der Nike+-Website anzeigen und bereitstellen, klikken Sie im Bereich „Nike + iPod“ auf „Nike+ besuchen“, wenn der iPod nano mit Ihrem
Computer verbunden ist, oder öffnen Sie die Seite www.nike.com und melden Sie sich
dann bei Ihrem Account an.
Aufzeichnen von Sprachmemos
Mit dem integrierten Mikrofon des iPod nano oder einem optionalen iPod nano-kompatiblen Mikrofon (erhältlich unter www.apple.com/de/ipodstore) können Sie Sprachmemos aufzeichnen. Sie haben die Möglichkeit, während der Aufnahme
Kapitelmarkierungen zu setzen, Sprachmemos auf dem iPod nano zu speichern und
mit Ihrem Computer zu synchronisieren und sie mit Bezeichnungen zu versehen.
Sprachmemos können bis zu zwei Stunden lang sein. Wenn Sie Material mit einer
Länge von über zwei Stunden aufnehmen, beginnt der iPod nano automatisch ein
neues Sprachmemo, um die Aufnahme fortzusetzen.
Gehen Sie wie folgt vor, um ein Sprachmemo aufzuzeichnen:
1 Wählen Sie aus dem Menüs „Extras“ die Option „Sprachmemos“. Der Bildschirm für die
Sprachaufzeichnung wird angezeigt.
2 Drücken Sie die Taste „Start/Pause“ (’) oder die Mitteltaste, um mit der Aufnahme
zu beginnen. Achten Sie darauf, das Mikrofon an der Rückseite des iPod nano nicht
zu verdecken.
3 Drücken Sie die Taste „Start/Pause“ (’), um die Aufnahme anzuhalten.
Wählen Sie „Weiter“, um die Aufnahme fortzusetzen, oder drücken Sie erneut die Taste
„Start/Pause“ (’).
4 Wenn Sie fertig sind, drücken Sie die Taste „Menu“ und wählen Sie dann „Stoppen und
sichern“. Ihre gesicherte Aufnahme wird mit Datum und Uhrzeit aufgelistet.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 89
Gehen Sie wie folgt vor, um Kapitelmarkierungen zu sichern:
m Drücken Sie während der Aufnahme die Mitteltaste, um eine Kapitelmarkierung
zu setzen.
Beim Abspielen der Aufnahme können Sie durch Drücken der Taste „Vor/Schneller
Vorlauf“ direkt zum nächsten Kapitel wechseln. Drücken Sie einmal die Taste „Zurück/
Schneller Rücklauf“ (]), um zum Anfang des aktuellen Kapitels zu wechseln. Drücken
Sie die Taste zweimal, um zum Anfang des vorherigen Kapitels zu gelangen.
Gehen Sie wie folgt vor, um eine Aufnahme mit einer Bezeichnung zu versehen:
1 Wählen Sie aus dem Menü „Extras“ die Option „Sprachmemos“ und drücken Sie dann
die Taste „Menu“.
2 Wählen Sie „Aufnahmen“ und wählen Sie dann eine Aufnahme.
3 Wählen Sie „Bezeichnung“ und wählen Sie dann eine Bezeichnung für die
Aufnahme aus.
Zur Auswahl stehen „Podcast“, „Interview“, „Vortrag“, „Idee“, „Meeting“ oder „Memo“.
Wählen Sie „Ohne“, um eine Bezeichnung von einer Aufnahme zu entfernen.
Gehen Sie wie folgt vor, um eine Aufnahme abzuspielen:
1 Wählen Sie aus dem Menü „Extras“ die Option „Sprachmemos“ und drücken Sie dann
die Taste „Menu“.
2 Wählen Sie „Aufnahmen“ und wählen Sie dann eine Aufnahme.
3 Wählen Sie „Wiedergabe“ und drücken Sie dann die Mitteltaste.
Gehen Sie wie folgt vor, um eine Aufnahme zu löschen:
1 Wählen Sie aus dem Menü „Extras“ die Option „Sprachmemos“ und drücken Sie dann
die Taste „Menu“.
2 Wählen Sie „Aufnahmen“ und wählen Sie dann eine Aufnahme.
3 Wählen Sie „Löschen“ und drücken Sie dann die Mitteltaste.
Gehen Sie wie folgt vor, um Sprachmemos auf Ihren Computer zu synchronisieren:
Die Aufnahmen werden im WAV-Dateiformat im Ordner „Recordings“ auf dem iPod
gesichert. Wenn Sie den iPod nano für die Verwendung als Festplatte aktivieren,
können Sie Sprachmemos aus dem Ordner bewegen, um sie auf Ihren Computer
zu übertragen.
Wenn der iPod nano für die automatische Synchronisierung von Musiktiteln eingestellt
ist (vgl. „Automatisches Synchronisieren von Musik“ auf Seite 29), werden die Sprachmemos auf dem iPod nano automatisch mit einer Wiedergabeliste mit der Bezeichnung „Sprachmemos“ in iTunes synchronisiert (und vom iPod nano entfernt), wenn Sie
den iPod nano anschließen. Die Wiedergabeliste „Sprachmemos“ wird unter „Wiedergabelisten“ links im iTunes-Fenster angezeigt.90 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Spielen von iPod-Spielen
Der iPod nano wird mit drei Spielen geliefert: Klondike, Maze und Vortex.
Gehen Sie wie folgt vor, um ein Spiel zu spielen:
m Wählen Sie „Extras“ > „Spiele“ und dann das gewünschte Spiel.
Wenn Sie ein für ältere iPod nano-Versionen entwickeltes Spiel spielen, erhalten Sie
zuerst Informationen zu den Funktionen der iPod nano-Bedienelemente im ausgewählten Spiel.
Im iTunes Store (nur in bestimmten Ländern) können Sie weitere Spiele für den
iPod nano kaufen. Nach dem Kauf von Spielen in iTunes fügen Sie diese durch eine
automatische Synchronisierung oder manuell zum iPod nano hinzu.
Viele Spiele können im Hoch- und im Querformat gespielt werden.
Gehen Sie wie folgt vor, um ein Spiel zu kaufen:
1 Wählen Sie in iTunes „iTunes Store“ unter „Store“ links im iTunes-Fenster aus.
2 Wählen Sie „iPod Spiele“ im iTunes Store aus.
3 Wählen Sie das gewünschte Spiel aus und klicken Sie dann auf „Spiel kaufen“.
Gehen Sie wie folgt vor, um Spiele automatisch mit dem iPod nano
zu synchronisieren:
1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Spiele“.
2 Wählen Sie „Spiele synchronisieren“.
3 Klicken Sie auf „Alle Spiele“ oder „Ausgewählte Spiele“. Wählen Sie bei Auswahl von
„Ausgewählte Spiele“ auch die Spiele aus, die synchronisiert werden sollen.
4 Klicken Sie auf „Anwenden“.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 91
Verwenden zusätzlicher Einstellungen
Auf Ihrem iPod nano können Sie Datum und Uhrzeit, Uhren für verschiedene Zeitzonen sowie Funktionen für den Wecker und den Ruhezustand einstellen. Sie können den
iPod nano als Stoppuhr verwenden und damit Spiele spielen und Sie können die Bildschirmanzeige des iPod nano sperren.
Einstellen und Anzeigen von Datum und Uhrzeit
Datum und Uhrzeit werden automatisch eingestellt, sobald Sie den iPod nano an Ihren
Computer anschließen. Sie können diese Einstellungen aber auch manuell ändern.
Gehen Sie wie folgt vor, um die Optionen für Datum und Uhrzeit einzustellen:
1 Wählen Sie „Einstellungen“ > „Datum & Uhrzeit“.
2 Wählen Sie eine oder mehrere der folgenden Optionen:
Hinzufügen von Uhren für andere Zeitzonen
Gehen Sie wie folgt vor, um Uhren für andere Zeitzonen hinzuzufügen:
1 Wählen Sie „Extras“ > „Weltuhr“.
2 Drücken Sie im Bildschirm „Weltuhr“ die Mitteltaste und wählen Sie „Hinzufügen“.
3 Wählen Sie ein Land und dann eine Stadt.
Die Uhren, die Sie hinzufügen, werden in einer Liste angezeigt. Die zuletzt hinzugefügte Uhr erscheint an letzter Stelle.
Gehen Sie wie folgt vor, um eine Uhr zu entfernen:
1 Wählen Sie „Extras“ > „Weltuhr“.
2 Wählen Sie die gewünschte Uhr aus.
3 Drücken Sie die Mitteltaste.
4 Wählen Sie „Löschen“.
Funktion Aktion
Festlegen des Datums Wählen Sie „Datum“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um
zum nächsten Wert zu wechseln.
Festlegen der Uhrzeit Wählen Sie „Uhrzeit“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um
zum nächsten Wert zu wechseln.
Bestimmen der Zeitzone Wählen Sie „Zeitzone“ und wählen Sie mit dem Click Wheel eine
Stadt in einer anderen Zeitzone aus.
Anzeigen der Uhrzeit im
24-Stunden-Format
Wählen Sie „24-Stunden-Uhr“ und drücken Sie die Mitteltaste, um
das 24-Stunden-Format zu aktivieren oder zu deaktivieren.
Anzeigen der Uhrzeit in der
Titelleiste
Wählen Sie „Uhr im Titel“ und drücken Sie die Mitteltaste, die
Option zu aktivieren oder zu deaktivieren. 92 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Einstellen einer Weckzeit
Sie können für jede Uhr auf dem iPod nano eine Weckzeit einstellen.
Gehen Sie wie folgt vor, um den iPod nano als Wecker zu verwenden:
1 Wählen Sie „Extras“ > „Wecker“.
2 Wählen Sie „Wecker stellen“ und legen Sie eine oder mehrere der folgenden Optionen
fest:
Wenn Sie Kalenderereignisse mit Signaltönen mit dem iPod nano synchronisieren,
werden die Ereignisse im Menü „Wecker“ angezeigt.
Gehen Sie wie folgt vor, um ein Wecksignal zu löschen:
1 Wählen Sie „Extras“ > „Wecker“.
2 Wählen Sie das Wecksignal aus und wählen Sie dann „Löschen“.
Einstellen des Timers für den Ruhezustand
Sie können den iPod nano so einstellen, dass er nach dem Abspielen von Musik oder
anderen Inhalten nach einer gewissen Zeitspanne automatisch ausgeschaltet wird.
Gehen Sie wie folgt vor, um den Timer für den Ruhezustand einzustellen:
1 Wählen Sie „Extras“ > „Wecker“.
2 Wählen Sie „Ruhezustand“ und wählen Sie aus, wie lange der iPod nano Musik
abspielen soll.
Funktion Aktion
Aktivieren der Weckfunktion Wählen Sie „Wecker“ und setzen Sie den Regler auf „Ein“.
Festlegen des Datums Wählen Sie „Datum“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um
zum nächsten Wert zu wechseln.
Festlegen der Uhrzeit Wählen Sie „Uhrzeit“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um
zum nächsten Wert zu wechseln.
Festlegen einer Wiederholoption
Wählen Sie „Wiederholen“ und wählen Sie eine Option (z. B. „An
Werktagen“).
Auswählen eines Signaltons Wählen Sie „Warnhinweise“ oder eine Wiedergabeliste aus. Wenn
Sie „Warnhinweise“ wählen, wählen Sie anschließend „Signalton“,
damit das Wecksignal über den internen Lautsprecher ausgegeben
wird. Wenn Sie eine Wiedergabeliste wählen, verbinden Sie den
iPod nano mit Lautsprechern, Ohr- oder Kopfhörern, damit Sie das
Wecksignal hören können.
Benennen des Wecksignals Wählen Sie „Bezeichnung“ und wählen Sie eine Option (z. B. „Aufstehen“).Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 93
Verwenden der Stoppuhr
Sie können die Stoppuhr beim Sport verwenden, um Ihre Trainingszeiten zu protokollieren oder um Teilabschnitte zu messen, wenn Sie Strecken laufen. Während Sie die
Stoppuhr verwenden, können Sie Musik hören.
Gehen Sie wie folgt vor, um die Stoppuhr zu verwenden:
1 Wählen Sie „Extras“ > „Stoppuhr“.
2 Drücken Sie die Taste „Start/Pause“ (’), um die Stoppuhr zu starten.
3 Drücken Sie die Mitteltaste, um Streckenzeiten festzuhalten. Die zwei aktuellsten
Streckenzeiten werden über der Gesamtzeit angezeigt. Alle Streckenzeiten werden im
Protokoll aufgezeichnet.
4 Drücken Sie die Taste „Start/Pause“ (’), um die Stoppuhr anzuhalten. Drücken Sie nochmals
die Taste „Start/Pause“ (’), um die Stoppuhr wieder zu starten.
Drücken Sie die Taste „Menu“ und wählen Sie dann „Neue Stoppuhr“, um die Zeiterfassung mit der Stoppuhr erneut zu starten.
Gehen Sie wie folgt vor, um die Übersicht einer mit der Stoppuhr vorgenommenen
Zeitmessung anzusehen oder zu löschen:
1 Wählen Sie „Extras“ > „Stoppuhr“.
Die aktuelle Übersicht und eine Liste gesicherter Zeitmessungen wird angezeigt.
2 Wählen Sie eine Übersicht aus, um die Informationen der Zeitmessung anzuzeigen.
Der iPod nano speichert die Zeitmessungen mit Datum, Uhrzeit und Rundenstatistik.
Sie sehen Startdatum und -uhrzeit der Zeitmessung, die kürzeste, längste und durchschnittliche Rundenzeit und die letzten Rundenzeiten.
3 Drücken Sie die Mitteltaste und wählen Sie „Übersicht löschen“, um die gewählte Übersicht zu löschen. Wählen Sie alternativ „Alle Übersichten löschen“, um alle aktuellen
Übersichten zu löschen.94 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Sperren des iPod nano-Bildschirms
Sie können eine Zahlenkombination festlegen, die verhindert, dass Ihr iPod nano von
Unbefugten verwendet wird. Wenn Sie den iPod nano sperren, während er nicht an
einen Computer angeschlossen ist, müssen Sie eine Zahlenkombination zum Deaktivieren der Sperre eingeben, um ihn wieder verwenden zu können.
Diese Kombination ist nicht mit der Taste „Hold“ identisch, die einfach dazu dient, ein
versehentliches Drücken der Tasten des iPod nano zu verhindern. Die Zahlenkombination verhindert dagegen, dass Unbefugte den iPod nano verwenden.
Gehen Sie wie folgt vor, um eine Zahlenkombination für Ihren iPod nano inzustellen:
1 Wählen Sie „Extras“ > „Anzeigensperre“.
2 Geben Sie im Bildschirm „Neuer Code“ eine Zahlenkombination ein:
 Wählen Sie mit dem Click Wheel die erste Zahl für Ihre Zahlenkombination aus.
Drücken Sie zur Bestätigung die Mitteltaste und wählen Sie dann die nächste
Zahl aus.
 Wiederholen Sie diesen Vorgang, um die anderen Ziffern der Zahlenkombination
anzugeben. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘), um zur nächsten Ziffer
zu gelangen, oder die Taste „Zurück/Schneller Rücklauf“ (]), um zur vorherigen Ziffer
zu wechseln. Drücken Sie die Mitteltaste nach Eingabe der letzten Zahl.
3 Geben Sie im Bildschirm „Code bestätigen“ die Zahlenkombination ein oder drücken
Sie die Taste „Menu“, um die Sperre der Bildschirmanzeige nicht zu aktivieren.
Kehren Sie anschließend zum Bildschirm „Anzeigensperre“ zurück. Hier können Sie den
Bildschirm sperren oder die Zahlenkombination zurücksetzen. Drücken Sie die Taste
„Menu“, um zum vorherigen Bildschirm zurückzukehren, ohne die Sperre zu aktivieren.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 95
Gehen Sie wie folgt vor, um den Bildschirm des iPod nano zu sperren:
m Wählen Sie „Extras“ > „Anzeigensperre“ > „Sperren“.
Wenn Sie soeben die Zahlenkombination eingegeben haben, ist „Sperren“ bereits ausgewählt. Drücken Sie einfach die Mitteltaste, um den iPod zu sperren.
Wenn die Bildschirmanzeige gesperrt ist, wird das Symbol eines Schlosses angezeigt.
Es empfiehlt sich, die Menüoption „Anzeigensperre“ zum Hauptmenü hinzuzufügen,
damit Sie den Bildschirm Ihres iPod nano schneller sperren können. Beachten Sie hierzu
den Abschnitt „Hinzufügen oder Löschen von Menüoptionen im Hauptmenü“ auf
Seite 11.
Wird das Schlosssymbol angezeigt, haben Sie zwei Möglichkeiten, die Sperre der
iPod nano-Bildschirmanzeige aufzuheben:
 Drücken Sie die Mitteltaste, um die Zahlenkombination auf dem iPod nano einzugeben. Wählen Sie mit dem Click Wheel die Zahlen aus und drücken Sie dann die Mitteltaste, um sie zu bestätigen. Wenn Sie die falsche Kombination eingegeben haben,
bleibt der Bildschirm gesperrt. Versuchen Sie es erneut.
 Schließen Sie Ihren iPod nano an den Computer an, den Sie hauptsächlich damit
benutzen, und der Bildschirm des iPod nano wird automatisch wieder freigegeben.
Wenn Sie diese Vorgehensweisen ausprobieren, aber der Bildschirm des iPod nano dennoch weiterhin gesperrt bleibt, besteht die Möglichkeit, den Originalzustand des
iPod nano wiederherzustellen. Beachten Sie hierzu den Abschnitt „Aktualisieren und
Wiederherstellen der iPod-Software“ auf Seite 110.
Gehen Sie wie folgt vor, um eine bereits festgelegten Zahlenkombination zu ändern:
1 Wählen Sie „Extras“ > „Anzeigensperre“ > „Kombination zurücksetzen“.
2 Geben Sie im Bildschirm „Code eingeben“ die aktuelle Zahlenkombination ein.
3 Geben Sie im Bildschirm „Neuer Code“ eine neue Zahlenkombination ein und bestätigen Sie diese.
Wenn Sie sich nicht an die aktuelle Zahlenkombination erinnern können, haben Sie nur
die Möglichkeit, die Software des iPod nano wiederherzustellen, um die Kombination
zu löschen und eine neue einzugeben. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110.96 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Synchronisieren von Kontakten, Kalendern und
Aufgabenlisten
Der iPod nano kann Kontaktinformationen, Kalenderereignisse und Aufgabenlisten
sichern, sodass Sie diese jederzeit abrufen können.
Mithilfe von iTunes können Sie die Kontakt- und Kalenderinformationen auf dem
iPod nano mit dem Adressbuch und iCal synchronisieren.
Wenn Sie mit Windows XP arbeiten und das Windows-Adressbuch oder Microsoft Outlook 2003 (oder neuer) zum Speichern Ihrer Kontaktdaten verwenden, können Sie mit
iTunes die Kontaktinformationen auf dem iPod nano synchronisieren. Falls Sie die
Kalenderfunktion von Microsoft Outlook 2003 (oder neuer) verwenden, können Sie
auch Kalenderinformationen synchronisieren.
Gehen Sie wie folgt vor, um Kontakte oder Kalenderinformationen mit Mac OS X
zu synchronisieren:
1 Schließen Sie den iPod nano an Ihren Computer an.
2 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Kontakte“.
3 Führen Sie einen der folgenden Schritte aus:
 Wenn Sie Kontakte synchronisieren möchten, wählen Sie „Adressbuchkontakte
synchronisieren“ im Bereich „Kontakte“ und anschließend eine Option aus:
 Zum automatischen Synchronisieren aller Kontakte wählen Sie „Alle Kontakte“.
 Zum automatischen Synchronisieren ausgewählter Kontaktgruppen wählen Sie
„Ausgewählte Gruppen“ und wählen die zu synchronisierenden Gruppen aus.
 Zum Kopieren der Fotos von Kontakten (falls verfügbar) auf den iPod nano wählen
Sie „Fotos der Kontakte einbeziehen“.
Nach Klicken auf „Anwenden“ aktualisiert iTunes den iPod nano mit den Kontaktinformationen des von Ihnen angegebenen Adressbuchs.
 Wenn Sie Kalender synchronisieren möchten, wählen Sie „iCal-Kalender synchronisieren“ im Bereich „Kalender“ und anschließend eine Option aus:
 Zum automatischen Synchronisieren aller Kalender wählen Sie „Alle Kalender“.
 Zum automatischen Synchronisieren ausgewählter Kalender wählen Sie „Ausgewählte Kalender“ und wählen die zu synchronisierenden Kalender aus.
Wenn Sie auf „Anwenden“ klicken, aktualisiert iTunes den iPod nano mit den ausgewählten Kalenderinformationen. Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 97
Gehen Sie wie folgt vor, um Kontakt- und Kalenderinformationen zu synchronisieren (mit dem Windows-Adressbuch oder Microsoft Outlook für Windows):
1 Schließen Sie den iPod nano an Ihren Computer an.
2 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Kontakte“.
3 Führen Sie einen der folgenden Schritte aus:
 Zum Synchronisieren von Kontaktinformationen wählen Sie „Kontakte synchronisieren“ im Bereich „Kontakte“ und anschließend „Windows-Adressbuch“ oder „Microsoft
Outlook“ aus dem Einblendmenü aus. Wählen Sie dann aus, welche Kontaktinformationen Sie synchronisieren möchten.
 Zum Synchronisieren von Kalenderinformationen von Microsoft Outlook wählen Sie
„Kalender synchronisieren von Microsoft Outlook“ im Bereich „Kalender“ aus.
4 Klicken Sie auf „Anwenden“.
Sie können Kontakt- und Kalenderinformationen auch manuell zum iPod nano hinzufü-
gen. Hierfür muss der iPod nano als externes Volume aktiviert sein (vgl. „Verwenden
des iPod nano als externes Volume“ auf Seite 99).
Gehen Sie wie folgt vor, um Kontaktinformationen manuell hinzuzufügen:
1 Schließen Sie den iPod nano an Ihren Computer an und öffnen Sie das von Ihnen verwendete Programm für E-Mail oder Kontaktverwaltung. Sie können Kontaktinformationen mit Programmen wie Palm Desktop, Microsoft Outlook, Microsoft Entourage,
Eudora u. a. hinzufügen.
2 Bewegen Sie Kontakte aus dem Adressbuch des von Ihnen verwendeten Programms in
den Ordner „Contacts“ auf dem iPod nano.
In einigen Fällen müssen Sie die Kontakte exportieren und dann die exportierte
Datei bzw. die exportierten Dateien in den Ordner „Contacts“ bewegen. Weitere
Informationen hierzu finden Sie in der Dokumentation zu Ihrem E-Mail- oder
Kontaktverwaltungsprogramm.
Gehen Sie wie folgt vor, um Termine und andere Kalenderereignisse manuell
hinzuzufügen:
1 Exportieren Sie Kalenderereignisse aus jedem beliebigen Kalenderprogramm, das mit
dem standardmäßigen iCal-Format (Dateinamen mit der Endung .ics) oder vCal-Format
(Dateinamen mit der Endung .vcs) arbeitet.
2 Bewegen Sie die Dateien in den Ordner „Calendars“ auf dem iPod nano.
Wenn Sie Aufgabenlisten manuell zum iPod nano hinzufügen möchten, sichern Sie sie
in einer Kalenderdatei mit der Erweiterung „.ics“ oder „.vcs“.
Gehen Sie wie folgt vor, um Kontaktinformationen auf dem iPod nano anzuzeigen:
m Wählen Sie „Extras“ > „Kontakte“.98 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Gehen Sie wie folgt vor, um Kontakte nach Vor- oder Nachnamen zu sortieren:
m Wählen Sie „Einstellungen“ > „Allgemein“, wählen Sie die Option zum Sortieren von
Kontakten und anschließend „Vornamen“ oder „Nachnamen“.
Gehen Sie wie folgt vor, um Kalenderereignisse anzuzeigen:
m Wählen Sie „Extras“ > „Kalender“ > „Alle Kalender“ und wählen Sie dann einen Kalender
aus.
Gehen Sie wie folgt vor, um Aufgabenlisten anzuzeigen:
m Wählen Sie „Extras“ > „Kalender“ > „Aufgaben“.
Mono Audio
Die Funktion „Mono Audio“ kombiniert den Ton des linken und rechten Kanals zu
einem monoauralen Signal, das über beide Kanäle wiedergegeben wird. Hierdurch
können Benutzer mit einer Hörbehinderung auf einem Ohr beide Kanäle mit dem
anderen Ohr hören.
Gehen Sie wie folgt vor, um die Funktion „Mono Audio“ zu aktivieren bzw. zu deaktivieren:
m Wählen Sie „Einstellungen“ > „Wiedergabe“> „Mono Audio“ und dann „Ein“ oder „Aus“.
Verwenden der Sprachausgabe für Menüs als
Bedienungshilfe
Der iPod nano bietet optional eine Sprachausgabe für Menüs, mit deren Hilfe Benutzer
mit Sehbehinderungen einfacher durch den Inhalt ihres iPod nano blättern können.
iTunes generiert die Sprachausgabe mit Stimmen, die im Lieferumfang des Betriebssystems Ihres Computers enthalten sind oder die Sie ggf. von Drittanbietern erworben
haben. Nicht alle Stimmen von Betriebssystemen oder Drittanbietern sind mit der
Sprachausgabe für Menüs kompatibel und nicht alle Sprachen werden unterstützt.
Damit Sie die Sprachausgabe für Menüs nutzen können, muss VoiceOver auf dem
iPod nano aktiviert sein. Weitere Informationen hierzu finden Sie im Abschnitt „Einrichten von VoiceOver“ auf Seite 37.
Sie müssen die Sprachausgabe für Menüs in iTunes aktivieren, damit Sie sie auf dem
iPod nano aktivieren können.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 99
Gehen Sie wie folgt vor, um die Sprachausgabe für Menüs in iTunes zu aktivieren:
1 Verbinden Sie den iPod nano mit Ihrem Computer.
2 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den
Titel „Übersicht“.
3 Wählen Sie „Gesprochene Menüs aktivieren“.
Unter Mac OS X ist diese Option standardmäßig ausgewählt, wenn VoiceOver in der
Systemeinstellung „Bedienungshilfen“ aktiviert ist.
4 Klicken Sie auf „Anwenden“.
Nachdem der iPod nano mit iTunes synchronisiert wurde, wird die Sprachausgabe für
Menüs auf Ihrem iPod nano aktiviert. Die Synchronisierung des iPod nano dauert länger, wenn die Sprachausgabe aktiviert ist.
Gehen Sie wie folgt vor, um die Sprachausgabe für Menüs auf dem iPod nano zu
deaktivieren:
m Wählen Sie „Einstellungen“ > „Allgemein“ > „Gesprochene Menüs“ und wählen Sie
dann „Aus“.
Möchten Sie die Sprachausgabe für Menüs wieder aktivieren, wählen Sie
„Einstellungen“ > „Allgemein“ und setzen Sie dann die Option für die Sprachausgabe
auf „Ein“.
Ist VoiceOver aktiviert, wird es durch die Deaktivierung der Sprachausgabe für Menüs
nicht deaktiviert.
Hinweis: Die Option für die Sprachausgabe für Menüs wird im Menü „Einstellungen“
des iPod nano nur angezeigt, wenn die entsprechende Option in iTunes aktiviert
wurde.
Verwenden des iPod nano als externes Volume
Der iPod nano kann auch als externes Volume zum Ablegen von Datendateien verwendet werden.
Musiktitel, die Sie mit iTunes hinzufügen, werden nicht im Mac-Finder oder Windows
Explorer angezeigt. Wenn Sie Musikdateien im Mac-Finder oder Windows Explorer auf
den iPod nano kopieren, können Sie die Musiktitel auf dem iPod nano nicht abspielen.
Wichtig: Damit Fotos und aufgenommene Videos vom iPod nano auf Ihren Computer
importiert werden können, muss der iPod nano für die Verwendung als externe Festplatte aktiviert sein.100 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Gehen Sie wie folgt vor, um den iPod nano als externes Volume zu aktivieren:
1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Übersicht“.
2 Wählen Sie „Verwendung als Volume aktivieren“ im Abschnitt „Optionen“ aus.
3 Klicken Sie auf „Anwenden“.
Wenn Sie den iPod nano als externes Volume verwenden, wird das iPod nano-Volumesymbol auf dem Schreibtisch des Mac angezeigt. Bei einem Windows-PC wird er unter
dem nächsten verfügbaren Laufwerksbuchstaben im Windows Explorer angezeigt.
Wenn Sie Dateien kopieren wollen, bewegen Sie diese auf den oder vom iPod nano.
Sie können auch auf „Übersicht“ und dann auf „Musik und Videos manuell verwalten“
im Abschnitt „Optionen“ klicken, um den iPod nano als externes Volume zu verwenden.
Wenn Sie den iPod nano vornehmlich als externes Volume verwenden, empfiehlt es
sich festzulegen, dass iTunes nicht automatisch geöffnet wird, wenn Sie den iPod nano
an Ihren Computer anschließen.
Gehen Sie wie folgt vor, um zu verhindern, dass iTunes beim Anschließen des
iPod nano an Ihren Computer automatisch geöffnet wird:
1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Übersicht“.
2 Deaktivieren Sie die Option „iTunes öffnen, wenn dieser iPod angeschlossen wird“ im
Abschnitt „Optionen“.
3 Klicken Sie auf „Anwenden“.
Sichern und Lesen von Textnotizen
Sie können Textnotizen auf dem iPod sichern und lesen, sofern der iPod nano für die
Nutzung als externes Volume aktiviert ist (vgl. „Verwenden des iPod nano als externes
Volume“ auf Seite 99).
1 Sichern Sie ein Dokument in einem beliebigen Textverarbeitungsprogramm als
Textdatei (.txt).
2 Bewegen Sie die Datei in den Ordner „Notes“ auf dem iPod nano.
Gehen Sie wie folgt vor, um Notizen anzuzeigen:
m Wählen Sie „Extras“ > „Notizen“.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 101
iPod nano-Zubehör
Im Lieferumfang des iPod nano sind bereits verschiedene Zubehörprodukte
enthalten. Zahlreiches weiteres Zubehör kann separat erworben werden. Wenn
Sie weiteres Zubehör zum iPod nano kaufen möchten, öffnen Sie die Website
www.apple.com/de/ipodstore.
Zu den verfügbaren Zubehöroptionen gehören:
 iPod nano Armband
 Apple Earphones mit Fernbedienung und Mikrofon
 Apple In-Ear Headphones mit Fernbedienung und Mikrofon
 Apple USB Power Adapter (Netzteil)
 Apple Component AV-Kabel
 Apple Composite AV-Kabel
 Apple Universal Dock
 Nike + iPod Sport Kit
 iPod-Socken102 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör
Gehen Sie wie folgt vor, um die mit Ihrem iPod nano gelieferten Ohrhörer
zu verwenden:
m Schließen Sie Ihre Ohrhörer an den Kopfhöreranschluss an. Setzen Sie dann die Ohrhörer
wie abgebildet in Ihre Ohren.
ACHTUNG: Das Verwenden von Ohrhörern oder Kopfhörern bei hoher Lautstärke
kann eine dauerhafte Schädigung des Gehörs zur Folge haben. Sie gewöhnen sich mit
der Zeit zwar an höhere Lautstärken, sodass diese für Sie normal erscheinen mögen,
Ihre Hörfähigkeit kann jedoch beeinträchtigt werden. Falls Sie in Ihren Ohren ein Klingeln wahrnehmen oder Gesprochenes gedämpft hören, sollten Sie nicht weiter Musik
hören und ggf. einen Ohrenarzt aufsuchen. Je höher Sie die Lautstärke einstellen,
desto schneller kann Ihr Gehör geschädigt werden. Experten empfehlen, das Gehör
wie folgt zu schützen:
 Benutzen Sie Ohrhörer und Kopfhörer bei hohen Lautstärken nur für eine begrenzte
Dauer.
 Vermeiden Sie es, die Lautstärke hochzustellen, um Umgebungsgeräusche
zu übertönen.
 Reduzieren Sie die Lautstärke, wenn Sie nicht hören können, was Personen in Ihrer
Nähe sprechen.
Informationen zum Einstellen einer maximalen Lautstärke auf dem iPod finden Sie im
Abschnitt „Einstellen der Obergrenze für die Lautstärke“ auf Seite 53.
Das Kabel der
Ohrhörer lässt
sich verstellen.9
103
9 Tipps und Fehlerbeseitigung
Die meisten Probleme mit dem iPod nano können Sie anhand
der Informationen in diesem Kapitel im Regelfall schnell
selbst lösen.
Allgemeine Vorschläge
Die meisten Probleme mit dem iPod nano lassen sich durch Zurücksetzen des Geräts
beheben. Vergewissern Sie sich zuerst, dass der iPod nano aufgeladen ist.
Gehen Sie wie folgt vor, um den iPod nano zurückzusetzen:
1 Schieben Sie den Schalter „Hold“ hin und her (schieben Sie ihn auf „Hold“ und dann
wieder zurück).
2 Drücken Sie die Taste „Menu“ und die Mitteltaste und halten Sie diese mindestens
6 Sekunden lang gedrückt, bis das Apple-Logo angezeigt wird.
Schritte zur Selbsthilfe
Sollten Sie ein Problem mit Ihrem iPod nano haben, beachten Sie bitte die folgenden
fünf einfachen Schritte zur Selbsthilfe. Führen Sie diese Schritte nacheinander aus, bis
Ihr Problem gelöst ist. Sollten diese Maßnahmen nicht den gewünschte Erfolg bringen, finden Sie im Folgenden Lösungsvorschläge für spezifische Probleme.
 Zurücksetzen des iPod nano. Vgl. „Allgemeine Vorschläge“ weiter unten.
 Noch einmal versuchen und einen anderen USB-Anschluss verwenden, wenn Sie
den iPod nano nicht in iTunes sehen.
 Neustarten Ihres Computers und sicherstellen, dass Sie die neusten Softwareaktualisierungen installiert haben.
 Neuinstallieren der iTunes-Software. Laden Sie hierzu die neuste Version aus dem
Internet.
 Wiederherstellen des iPod nano. Beachten Sie hierzu den Abschnitt „Aktualisieren
und Wiederherstellen der iPod-Software“ auf Seite 110.104 Kapitel 9 Tipps und Fehlerbeseitigung
Ihr iPod nano lässt sich nicht einschalten bzw. reagiert nicht
 Stellen Sie sicher, dass der Schalter „Hold“ nicht auf „Hold“ gesetzt ist.
 Möglicherweise muss die Batterie des iPod nano aufgeladen werden. Verbinden Sie
den iPod nano mit Ihrem Computer oder einem Apple USB Power Adapter (Netzteil)
und laden Sie die Batterie. Überprüfen Sie, ob auf dem Bildschirm des iPod nano das
Blitzsymbol zu sehen ist, das anzeigt, dass die iPod nano-Batterie aufgeladen wird.
Verbinden Sie den iPod nano zum Aufladen der Batterie mit einem USB 2.0-Anschluss
Ihres Computers.
 Führen Sie die oben genannten fünf Schritte nacheinander aus, bis Ihr iPod nano
reagiert.
Sie möchten die Verbindung zum iPod nano trennen, es wird jedoch die Meldung
„Verbunden“ oder „Synchronisieren“ angezeigt.
 Wenn der iPod nano gerade Musik synchronisiert, warten Sie, bis der Ladevorgang
beendet ist.
 Wählen Sie den iPod nano in der iTunes-Geräteliste aus und klicken Sie auf die Taste
„Auswerfen“ (C).
 Wenn der iPod nano in der Geräteliste in iTunes nicht mehr angezeigt wird, auf dem
Bildschirm des iPod nano aber immer noch die Meldung „Verbunden“ oder „Synchronisieren“ zu sehen ist, können Sie den iPod nano vom Computer trennen.
 Wenn der iPod nano weiterhin in der Geräteliste in iTunes angezeigt wird, bewegen
Sie das iPod nano-Symbol vom Schreibtisch in den Papierkorb (wenn Sie mit einem
Mac arbeiten). Wenn Sie einen Windows-PC verwenden, werfen Sie das Gerät über
„Arbeitsplatz“ aus oder klicken Sie auf das Symbol zum sicheren Entfernen von Hardware in der Systemsteuerung und wählen Sie den iPod nano aus. Wird die Meldung
„Verbunden“ oder „Synchronisieren“ weiterhin angezeigt, starten Sie Ihren Computer
neu und werfen Sie dann den iPod nano nochmals aus.
Der iPod nano spielt keine Musik ab
 Stellen Sie sicher, dass der Schalter „Hold“ nicht auf „Hold“ gesetzt ist.
 Vergewissern Sie sich, dass der Stecker der Ohrhörer fest im Anschluss sitzt.
 Stellen Sie sicher, dass die Lautstärke korrekt eingestellt ist. Möglicherweise wurde
eine Obergrenze für die maximale Lautstärke festgelegt. Sie können diese Einstellung ändern oder löschen, wenn Sie „Einstellungen“ > „Maximale Lautstärke“ wählen.
Beachten Sie hierzu den Abschnitt „Einstellen der Obergrenze für die Lautstärke“ auf
Seite 53.
 Möglicherweise wurde die Wiedergabe des iPod nano angehalten. Drücken Sie die
Taste „Start/Pause“ (’).
 Vergewissern Sie sich, dass Sie iTunes 9.0 (oder neuer) verwenden (verfügbar unter
www.apple.com/de/downloads). Musiktitel, die im iTunes Store mit früheren Versionen von iTunes erworben wurden, können auf dem iPod nano erst nach der Aktualisierung von iTunes wiedergegeben werden.Kapitel 9 Tipps und Fehlerbeseitigung 105
 Wenn Sie das Apple Universal Dock verwenden, vergewissern Sie sich, dass der
iPod nano fest im Dock eingesetzt ist und dass alle Kabel korrekt angeschlossen sind.
Der interne Lautsprecher spielt weiterhin Audiomaterial ab, nachdem Sie Ohr- oder
Kopfhörer mit dem iPod nano verbunden haben
 Trennen und verbinden Sie dann die Ohr- oder Kopfhörer erneut.
Der interne Lautsprecher gibt kein Audiomaterial aus, nachdem Sie die Ohr- oder
Kopfhörer vom iPod nano getrennt haben
 Die Wiedergabe von Audiomaterial wird automatisch angehalten, wenn Sie Ohr-
oder Kopfhörer vom iPod nano trennen. Drücken Sie die Taste „Start/Pause“ (’), um
die Wiedergabe fortzusetzen.
 FM-Radiosendungen werden nicht über den internen Lautsprecher wiedergegeben,
da der iPod nano das Ohr- oder Kopfhörerkabel als Radioantenne nutzt.
Der iPod nano reagiert nicht, wenn Sie ihn an Ihren Computer anschließen
 Stellen Sie sicher, dass die aktuelle iTunes-Software installiert ist, die auf der Seite
www.apple.com/de/downloads verfügbar ist.
 Schließen Sie den iPod an einen anderen USB-Anschluss Ihres Computers an.
Hinweis: Es wird empfohlen, einen USB 2.0-Anschluss zu verwenden, um den
iPod nano anzuschließen. USB 1.1 ist deutlich langsamer als USB 2.0. Wenn Ihr
Windows-PC keinen USB 2.0-Anschluss besitzt, können Sie möglicherweise eine
USB 2.0-Karte erwerben und installieren. Weitere Informationen hierzu finden Sie
auf der Website: www.apple.com/de/ipod.
 Ihr iPod nano muss unter Umständen zurückgesetzt werden (vgl. Seite 103).
 Wenn Sie den iPod nano mit dem Apple Dock Connector-auf-USB 2.0-Kabel an einen
Mobilcomputer anschließen, achten Sie darauf, zuerst den Computer mit einer Steckdose zu verbinden, bevor Sie den iPod nano anschließen.
 Vergewissern Sie sich, dass Sie den erforderlichen Computer und die erforderliche
Software verwenden. Beachten Sie hierzu den Abschnitt „Sie möchten die Systemvoraussetzungen nochmals überprüfen“ auf Seite 108.
 Überprüfen Sie die Kabelverbindungen. Ziehen Sie das Kabel aus beiden Anschlüssen
heraus. Stellen Sie sicher, dass sich in den USB-Anschlüssen keine Fremdkörper befinden. Schließen Sie dann das Kabel erneut an und achten Sie darauf, dass es fest in den
Anschlüssen sitzt. Achten Sie darauf, dass die Kabelstecker korrekt ausgerichtet sind.
Die Stecker können nur in einer bestimmten Ausrichtung eingesetzt werden.
 Starten Sie Ihren Computer neu.
 Können die Probleme mit keiner der genannten Maßnahmen behoben werden,
müssen Sie die iPod nano-Software möglicherweise wiederherstellen. Beachten Sie
hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf
Seite 110.106 Kapitel 9 Tipps und Fehlerbeseitigung
Auf dem iPod nano wird die Meldung „Bitte laden Sie die Batterie auf“ angezeigt
Diese Meldung wird ggf. angezeigt, wenn der Ladestand der Batterie des iPod nano
sehr niedrig ist und die Batterie geladen werden muss, bevor der iPod nano Daten mit
dem Computer austauschen kann. Verbinden Sie den iPod nano zum Aufladen der
Batterie mit einem USB 2.0-Anschluss Ihres Computers.
Lassen Sie den iPod nano am Computer angeschlossen, bis die Meldung nicht mehr
angezeigt wird und der iPod nano in iTunes oder dem Finder zu sehen ist. Abhängig
davon, wie stark die Batterie entladen ist, müssen Sie den iPod nano bis zu 30 Minuten
aufladen, bevor er wieder startet.
Verwenden Sie den optionalen Apple USB Power Adapter, um den iPod nano schneller
aufzuladen.
Der iPod nano zeigt die Meldung an, dass iTunes zur Wiederherstellung verwendet
werden soll
 Vergewissern Sie sich, dass auf Ihrem Computer die aktuellste iTunes-Version installiert ist. (Sie können diese von der Seite www.apple.com/de/downloads laden.)
 Schließen Sie den iPod nano an Ihren Computer an. Befolgen Sie nach dem
Öffnen von iTunes die Aufforderungen auf dem Bildschirm, um den iPod nano
wiederherzustellen.
 Wenn der Fehler durch eine Wiederherstellung des iPod nano nicht beseitigt wird,
muss der iPod nano u. U. repariert werden. Auf der iPod Service & Support-Website
können Sie eine Reparatur in die Wege leiten: www.apple.com/de/support/ipod
Musiktitel oder Daten werden über eine USB 2.0-Verbindung langsamer geladen
 Wenn Sie über eine USB 2.0-Verbindung eine große Anzahl von Musiktiteln oder
große Dateien laden und der Batterieladezustand des iPod nano niedrig ist, synchronisiert der iPod nano die Daten mit verringerter Geschwindigkeit, um Batteriestrom
zu sparen.
 Wenn Sie mit höheren Übertragungsgeschwindigkeiten arbeiten möchten, können
Sie die Synchronisierung abbrechen und den iPod nano angeschlossen lassen, damit
er wieder aufgeladen wird. Oder Sie schließen ihn an den optionalen iPod USB 2.0
Power Adapter an. Laden Sie den iPod nano ca. eine Stunde lang auf und setzen Sie
dann die Synchronisierung von Musik oder Daten fort.
Musiktitel oder andere Dateien können nicht zum iPod nano hinzugefügt werden
Der Musiktitel liegt möglicherweise in einem Format vor, das der iPod nano nicht unterstützt. Die folgenden Audiodatei-Formate werden vom iPod nano unterstützt. Diese
beinhalten Formate für Hörbücher und Podcasts:
 AAC (M4A, M4B, M4P, bis zu 320 KBit/Sek.)
 Apple Lossless (komprimiertes Format von hoher Qualität)
 MP3 (bis zu 320 KBit/Sek.)
 MP3 Variable Bit-Rate (VBR)Kapitel 9 Tipps und Fehlerbeseitigung 107
 WAV
 AA (audible.com-Formate 2, 3 und 4 für gesprochenen Text)
 AIFF
Ein im Apple Lossless-Format codierter Musiktitel weist CD-Audioqualität auf, belegt
auf dem iPod aber nur halb so viel Speicherplatz wie ein im AIFF- oder WAV-Format
codierter Musiktitel. Derselbe Titel im AAC- oder MP3-Format benötigt sogar noch
weniger Speicherplatz. Wenn Sie mit iTunes Musik von einer CD importieren, wird diese
standardmäßig in das AAC-Format konvertiert.
Wenn Sie iTunes für Windows verwenden, können Sie nicht geschützte WMA-Dateien
in das AAC- oder MP3-Format konvertieren. Dies ist besonders dann von Vorteil, wenn
Sie eine Bibliothek mit Musik im WMA-Format haben.
Der iPod nano unterstützt weder Audiodateien im Format WMA, MPEG Layer 1, MPEG
Layer 2 noch das audible.com Format 1.
Wenn sich in Ihrer iTunes-Mediathek ein Musiktitel befindet, der vom iPod nano nicht
unterstützt wird, können Sie ihn in ein unterstütztes Format umwandeln. Informationen hierzu finden Sie in der iTunes-Hilfe.
Auf dem iPod nano wird die Meldung „Stellen Sie die Verbindung mit iTunes her, um
Genius zu aktivieren“ angezeigt
Sie haben die Funktion „Genius“ noch nicht in iTunes aktiviert oder Ihren iPod nano seit
der Aktivierung der Funktion in iTunes noch nicht synchronisiert. Beachten Sie hierzu
den Abschnitt „Aktivieren der Funktion „Genius“ in iTunes“ auf Seite 25.
Der iPod nano meldet „Genius ist für den ausgewählten Musiktitel nicht verfügbar“
Die Funktion „Genius“ ist aktiviert, mit dem gewählten Musiktitel kann aber keine
Genius-Wiedergabeliste erstellt werden. Zur iTunes Store Genius-Datenbank werden
ständig neue Musiktitel hinzugefügt. Versuchen Sie es daher zu einem späteren Zeitpunkt nochmals.
Der iPod nano kann kein Funksignal empfangen
Sie haben keine Ohr- oder Kopfhörer angeschlossen. Vergewissern Sie sich, dass der
Stecker korrekt angeschlossen ist und bewegen Sie das Kabel der Ohr- oder Kopfhörer.
Sie haben den iPod nano versehentlich für eine Sprache konfiguriert, die Sie nicht
verstehen
Sie können die Spracheinstellung zurücksetzen.
1 Drücken und halten Sie die Taste „Menu“ gedrückt, bis das Hauptmenü angezeigt wird.
2 Verwenden Sie das Click Wheel, um das Menüobjekt anzuzeigen, mit dem der Gerätename des iPod nano im Vorschaubereich eingeblendet wird, und wählen Sie dieses aus.
Hierbei handelt es sich um das Menü „Einstellungen“.
3 Wählen Sie die letzte Menüoption (Einstellungen zurücksetzen).108 Kapitel 9 Tipps und Fehlerbeseitigung
4 Wählen Sie das erste Objekt (Zurücksetzen) und eine Sprache aus.
Andere Einstellungen des iPod nano, wie z. B. das Wiederholen von Musiktiteln, werden
ebenfalls zurückgesetzt. Ihr synchronisierter Inhalt wird weder gelöscht noch geändert.
Wenn Sie die Menüoption „Einstellungen zurücksetzen“ nicht finden können, ist es
möglich, den Originalzustand Ihres iPod nano wiederherzustellen und dann eine
Sprache auszuwählen. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110.
Videos und Fotos können nicht auf Ihrem Fernsehgerät angezeigt werden
 Verwenden Sie Kabel mit Cinch-Stecker, die speziell für den iPod nano angefertigt
wurden, z. B. das Apple Component oder Apple Composite AV-Kabel, um den
iPod nano an Ihr Fernsehgerät anzuschließen. Andere ähnliche Kabel mit CinchStecker funktionieren nicht.
 Stellen Sie sicher, dass Ihr Fernsehgerät so eingestellt ist, dass die korrekte Eingabequelle für die Wiedergabe von Bildern verwendet wird. (Informationen hierzu finden
Sie in der Dokumentation zu Ihrem Fernsehgerät.)
 Vergewissern Sie sich, dass alle Kabel korrekt angeschlossen sind (vgl. „Ansehen von
Videos auf einem an den iPod nano angeschlossenen Fernsehgerät“ auf Seite 59).
 Vergewissern Sie sich, dass das gelbe Ende des Apple Composite AV-Kabel am Videoanschluss Ihres Fernsehgeräts angeschlossen ist.
 Wenn Sie ein Video ansehen möchten, wählen Sie „Videos“ > „Einstellungen“, legen
Sie für „TV-Ausgang“ die Option „Ein“ fest und versuchen Sie es dann erneut. Wenn
Sie eine Diashow ansehen möchten, wählen Sie „Fotos“ > „Einstellungen“ (für Diashows), legen Sie für „TV-Ausgang“ die Option „Ein“ fest und versuchen Sie es dann
erneut.
 Sollte es weiterhin nicht funktionieren, wählen Sie „Videos“ > „Einstellungen“ (für
Video) oder „Fotos“ > „Einstellungen“ (für Diashows) und setzen Sie die Option „TVSignal“ auf „PAL“ oder „NTSC“, je nachdem, welchen Standard Ihr Fernsehgerät unterstützt. Probieren Sie beide Einstellungen aus.
Sie möchten die Systemvoraussetzungen nochmals überprüfen
Für die Verwendung des iPod nano sind folgende Komponenten erforderlich:
 Eine der folgenden Computerkonfigurationen:
 Ein Mac mit einem USB 2.0-Anschluss
 Ein Windows-PC mit einem USB 2.0-Anschluss oder einer installierten USB 2.0-
Karte
 Eines der folgenden Betriebssysteme:
 Mac OS X 10.4.11 (oder neuer)
 Windows Vista
 Windows XP Home oder Professional mit Service Pack 3 (oder neuer)Kapitel 9 Tipps und Fehlerbeseitigung 109
 iTunes 9 (oder neuer) (iTunes kann von der Website www.apple.com/de/downloads
geladen werden)
Wenn Ihr Windows-PC nicht mit einem USB 2.0-Anschluss ausgestattet ist, können Sie eine
USB 2.0-Karte kaufen und installieren. Weitere Informationen über Kabel und kompatible USB-Karten finden Sie auf folgender Website: www.apple.com/de/ipod.
Für einen Mac wird iPhoto 7.1.5 (oder neuer) empfohlen, um Fotos und Alben zum
iPod nano hinzuzufügen. iPhoto 8.1 (oder neuer) ist erforderlich, um alle Fotofunktionen des iPod nano nutzen zu können. Diese Software ist optional. iPhoto ist möglicherweise bereits auf Ihrem Mac installiert. Überprüfen Sie dies durch Öffnen des Ordners
„Programme“.
Der iPod nano kann digitale Fotos aus Ordnern sowohl auf Mac- als auch Windows PCFestplatten synchronisieren.
Sie wollen den iPod nano mit einem Mac-Computer und einem Windows-PC
verwenden
Wenn Sie den iPod nano bislang mit einem Mac verwenden und ihn nun mit einem
Windows PC nutzen wollen, müssen Sie die iPod-Software wiederherstellen, damit Sie
den iPod nano mit dem PC verwenden können (vgl. „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110). Durch das Wiederherstellen der iPod-Software
werden alle Daten einschließlich aller Musiktitel von Ihrem iPod nano gelöscht.
Es ist nicht möglich, den iPod nano mit einem Mac und dann mit einem Windows-PC
zu verwenden, ohne dass alle Daten vom iPod nano gelöscht werden.
Der Bildschirm Ihres iPod nano ist gesperrt und kann nicht wieder freigegeben
werden
Wenn Sie Ihren iPod nano an den Computer anschließen können, der für diesen iPod
aktiviert wurde, wird die Sperre der Bildschirmanzeige des iPod nano normalerweise
automatisch deaktiviert. Falls der Computer, der für den iPod nano aktiviert wurde,
gerade nicht verfügbar ist, können Sie den iPod nano an einen anderen Computer
anschließen und die iPod-Software mithilfe von iTunes wiederherstellen. Weitere
Informationen finden Sie im nächsten Abschnitt.
Wenn Sie die Zahlenkombination für die Sperre der Bildschirmanzeige ändern wollen
und sich nicht an die aktuelle Kombination erinnern können, müssen Sie die iPodSoftware wiederherstellen und eine neue Zahlenkombination festlegen.110 Kapitel 9 Tipps und Fehlerbeseitigung
Aktualisieren und Wiederherstellen der iPod-Software
Mithilfe von iTunes können Sie die iPod-Software aktualisieren oder wiederherstellen.
Es wird empfohlen, den iPod nano immer mit der neusten Software zu aktualisieren. Sie
können die Software auch wiederherstellen und den iPod nano in den Originalzustand
zurücksetzen.
 Wenn Sie die Software aktualisieren, hat dies keine Auswirkungen auf Ihre Einstellungen und Musiktitel.
 Wenn Sie die Software wiederherstellen, werden alle Daten auf dem iPod nano
gelöscht, einschließlich Musiktitel, Videos, Dateien, Fotos, Kontakt- und Kalenderinformationen sowie alle weiteren vorhandenen Daten. Alle Einstellungen des
iPod nano werden in den Originalzustand zurückgesetzt.
Gehen Sie wie folgt vor, um den iPod nano zu aktualisieren oder wiederherzustellen:
1 Vergewissern Sie sich, dass eine Internetverbindung besteht und die aktuellste iTunesVersion installiert ist (Sie können diese von der Seite www.apple.com/de/downloads
laden).
2 Schließen Sie den iPod nano an Ihren Computer an.
3 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel
„Übersicht“.
Im Bereich „Version“ werden Sie darüber informiert, ob der iPod nano auf dem neusten
Stand ist oder ob eine neuere Version der Software installiert werden muss.
4 Klicken Sie auf „Aktualisieren“, um die aktuellste Version der Software zu installieren.
5 Klicken Sie falls erforderlich auf „Wiederherstellen“, um die Originaleinstellungen des
iPod nano wiederherzustellen (damit werden alle Daten vom iPod nano gelöscht).
Befolgen Sie die Anweisungen auf dem Bildschirm, um den Wiederherstellungsprozess
abzuschließen.10
111
10 Sicherheit und Pflege
Lesen Sie vor der Verwendung des iPod nano die folgenden
Informationen zu Sicherheit und Umgang mit dem Gerät, um
Verletzungen zu vermeiden.
Bewahren Sie diese Sicherheitsinformationen und das iPod nano-Benutzerhandbuch
stets griffbereit auf. Ladbare Versionen des iPod nano-Benutzerhandbuchs und der
aktuellen Sicherheitsinformationen finden Sie unter folgender Adresse:
support.apple.com/manuals/ipod.
Wichtige Sicherheitsinformationen
Umgang mit dem iPod nano Lassen Sie den iPod nano nicht fallen, bauen Sie ihn
nicht auseinander, öffnen, zerbrechen, verbiegen, verformen, durchbohren, zerkleinern,
verbrennen oder bemalen Sie ihn nicht, erwärmen Sie ihn nicht in der Mikrowelle und
führen Sie keine Fremdkörper in das Gerät ein.
± Lesen Sie die unten genannten Sicherheitsinformationen und Anweisungen
zur Inbetriebnahme, bevor Sie den iPod verwenden, um Verletzungen zu
vermeiden.
ACHTUNG: Bei Nichtbeachtung dieser Sicherheitsinformationen kann es zu einem
Brand, zu elektrischen Schlägen oder anderen Verletzungen oder zur Beschädigung
von Systemkomponenten kommen.112 Kapitel 10 Sicherheit und Pflege
Keine Verwendung bei Regen oder in der Nähe von Flüssigkeitsbehältern Schützen
Sie den iPod nano vor Witterungseinflüssen wie Regen und verwenden Sie ihn nicht in
der Nähe von Waschbecken oder anderen Behältern mit Flüssigkeit. Achten Sie darauf,
dass keine Flüssigkeit in Ihren iPod nano gelangt. Sollte Flüssigkeit in den iPod nano
gelangen, ziehen Sie alle Kabel ab, schalten Sie den iPod nano aus und schieben Sie
den Schalter „Hold“ auf „Hold“, bevor Sie den iPod reinigen. Warten Sie, bis er vollständig getrocknet ist, bevor Sie ihn wieder einschalten. Versuchen Sie nicht, den iPod nano
mit einer externen Wärmequelle wie einem Mikrowellengerät oder einem Haarföhn zu
trocknen. Ein iPod nano, der durch den Kontakt mit Flüssigkeit beschädigt wurde, kann
nicht gewartet werden.
Reparieren des iPod nano Versuchen Sie niemals, den iPod nano selbst zu reparieren.
Der iPod nano enthält keine vom Benutzer zu wartenden Komponenten. Wurde der
iPod nano in Flüssigkeit getaucht, durchbohrt oder aus großer Höhe fallen gelassen,
bringen Sie ihn vor der nächsten Verwendung zu einem Apple Autorisierten ServicePartner. Wenn Sie Informationen zur Wartung benötigen, wählen Sie in iTunes „Hilfe“ >
„iPod-Hilfe“ oder besuchen Sie die Seite www.apple.com/de/support/ipod. Die wiederaufladbare Batterie des iPod nano sollte nur von einem Apple Autorisierten ServicePartner ersetzt werden. Weitere Informationen zu Batterien finden Sie auf dieser Website: www.apple.com/de/batteries.
Aufladen des iPod nano Verwenden Sie zum Aufladen des iPod nano nur das mitgelieferte Apple Dock Connector-auf-USB-Kabel mit einem Apple USB Power Adapter (Netzteil) oder einen High-Power-USB-Anschluss eines anderen Geräts, der mit dem USB 2.0-
Standard kompatibel ist. Ebenfalls verwendet werden kann ein anderes Apple-Produkt
oder -Zubehörteil, das für den iPod konzipiert wurde, bzw. Zubehörprodukte von Drittanbietern, die mit dem Logo „Made for iPod“ gekennzeichnet sind.
Lesen Sie vor der Verwendung anderer Produkte und Zubehörteile mit dem iPod nano
alle Sicherheitshinweise. Apple übernimmt keine Verantwortung für die Verwendung
von Zubehörprodukten von Drittanbietern oder deren Kompatibilität mit den geltenden Sicherheitsstandards.
Wenn Sie den Apple USB Power Adapter (Netzteil, erhältlich unter www.apple.com/de/
ipodstore) zum Laden des iPod nano verwenden, vergewissern Sie sich, dass das Netzteil vollständig zusammengesetzt ist, bevor Sie es mit einer Steckdose verbinden.
Stecken Sie den Apple USB Power Adapter dann so in die Steckdose ein, dass er fest
sitzt. Fassen Sie den Apple USB Power Adapter nicht mit nassen Händen, um ihn ans
Stromnetz anzuschließen oder die Verbindung zu trennen. Verwenden Sie zum Laden
Ihres iPod nur ein Apple iPod-Netzteil und keine sonstigen Netzteile.
Der Apple USB Power Adapter wird möglicherweise während des normalen Gebrauchs
warm. Achten Sie stets auf eine ausreichende Luftzufuhr um den Apple USB Power
Adapter und gehen Sie vorsichtig damit um.Kapitel 10 Sicherheit und Pflege 113
Trennen Sie den Apple USB Power Adapter in folgenden Fällen von Stromnetz
und iPod:
 Am Netzkabel oder Netzstecker sind Drähte zu sehen oder Kabel bzw. Stecker
wurden beschädigt.
 Das Netzteil war Regen, Flüssigkeit oder starker Feuchtigkeit ausgesetzt.
 Das Gehäuse des Netzteils wurde beschädigt.
 Sie sind der Meinung, dass das Netzteil gewartet oder repariert werden muss.
 Sie möchten den Adapter reinigen.
Vermeiden von Hörschäden Das Verwenden der Lautsprecher, Ohrhörer oder Kopfhörern mit hoher Lautstärke kann eine dauerhafte Schädigung des Gehörs zur Folge
haben. Stellen Sie die Lautstärke nicht zu hoch ein. Sie gewöhnen sich mit der Zeit
zwar an höhere Lautstärken, sodass diese für Sie normal erscheinen mögen, Ihre Hörfähigkeit kann jedoch beeinträchtigt werden. Falls Sie in Ihren Ohren ein Klingeln
wahrnehmen oder Gesprochenes gedämpft hören, sollten Sie nicht weiter Musik
hören und ggf. einen Ohrenarzt aufsuchen. Je höher Sie die Lautstärke einstellen,
desto schneller kann Ihr Gehör geschädigt werden. Experten empfehlen, das Gehör
wie folgt zu schützen:
 Benutzen Sie Ohrhörer und Kopfhörer bei hohen Lautstärken nur für eine begrenzte
Dauer.
 Vermeiden Sie es, die Lautstärke hochzustellen, um Umgebungsgeräusche
zu übertönen.
 Reduzieren Sie die Lautstärke, wenn Sie nicht hören können, was Personen in Ihrer
Nähe sprechen.
Informationen zum Einstellungen einer maximalen Lautstärke auf dem iPod nano
finden Sie unter „Einstellen der Obergrenze für die Lautstärke“ auf Seite 53.
Sicherheit im Straßenverkehr Die Verwendung des iPod nano mit oder ohne Kopfhörer
(auch nur für ein Ohr) beim Steuern eines Kraftfahrzeugs wird nicht empfohlen und ist
in einigen Ländern verboten. Informieren Sie sich über die lokal geltenden Gesetze und
Vorschriften zur Verwendung mobiler Geräte wie dem iPod nano im Straßenverkehr.
Fahren Sie stets vorsichtig und konzentriert. Beenden Sie die Verwendung Ihres iPod
nano, wenn Sie hierdurch beim Steuern eines Fahrzeugs oder bei anderen Tätigkeiten,
die Ihre volle Aufmerksamkeit erfordern, abgelenkt oder gestört werden.114 Kapitel 10 Sicherheit und Pflege
Anfälle, Ohnmacht und Augenreizungen Manche Menschen erleiden Ohnmachtsanfälle oder sonstigen Anfälle, wenn sie blinkendes Licht oder Lichtmuster wahrnehmen,
die bei Spielen oder Videos auftreten. (Diese Symptome können unvermittelt auch bei
Menschen auftreten, die bislang noch nie solche Anfälle hatten.) Wenn Sie gelegentlich unter Ohnmachtsanfällen oder sonstigen Anfällen leiden oder dies in Ihrer Familie
häufiger auftritt, wenden Sie sich bitte an einen Arzt, bevor Sie mit dem iPod nano
Spiele spielen (sofern diese Funktion verfügbar ist) oder Videos ansehen. Beenden Sie
die Verwendung und wenden Sie sich an einen Arzt, wenn Sie Folgendes feststellen:
Kopfschmerzen, Ohnmacht, Anfälle, Krämpfe, Augen- oder Muskelzuckungen, Wahrnehmungsstörungen, unkontrollierbare Bewegungen oder Orientierungslosigkeit. Das
Risiko für Kopfschmerzen, Ohnmacht, Anfälle und Augenreizungen lässt sich verringern, indem Sie darauf achten, den iPod nano nicht zu lange zu verwenden, ausreichend Abstand zu den Augen einzuhalten, für eine gute Umgebungsbeleuchtung zu
sorgen und regelmäßig Pausen einzulegen.
Teile aus Glas Die äußere Bildschirmabdeckung des iPod nano besteht aus Glas. Dieses Glas kann brechen, wenn der iPod nano auf eine harte Oberfläche fallen gelassen
oder starken Stößen ausgesetzt wird. Splittert oder bricht das Glas, berühren Sie es
nicht und versuchen Sie nicht, das beschädigte Glas zu entfernen. Verwenden Sie den
iPod nano erst wieder, nachdem die Glasabdeckung von einem Apple Autorisierten
Service-Partner ausgetauscht wurde. Glasschäden, die aufgrund einer falschen oder
unsachgemäßen Verwendung entstehen, sind nicht durch die Garantie abgedeckt.
Sich wiederholende Bewegungen Wenn Sie sich wiederholende Aktivitäten ausführen, etwa beim Spielen mit dem iPod nano, treten möglicherweise gelegentlich
Beschwerden in Händen, Armen, Schulter, Nachen oder anderen Körperteilen auf.
Legen Sie regelmäßig Pausen ein und wenden Sie sich an einen Arzt, wenn Sie währen
oder nach solchen Aktivitäten Beschwerden wahrnehmen.
Training Lassen Sie sich vor dem Start eines Trainingsprogramms vollständig von
Ihrem Arzt untersuchen. Machen Sie zu Beginn Aufwärm- oder Dehnübungen. Trainieren Sie vorsichtig und achten Sie auf die Signale Ihres Körpers. Verlangsamen Sie ggf.
Ihr Tempo, wenn Sie beim Laufen Einstellungen des Geräts anpassen möchten. Beenden Sie das Training sofort, wenn Sie Schmerzen haben, sich schwach, benommen oder
erschöpft fühlen oder außer Atem sind. Beim Trainieren tragen Sie alle Risiken, die mit
körperlicher Betätigung einhergehen, u. a. dabei entstehende Verletzungen.Kapitel 10 Sicherheit und Pflege 115
Wichtige Informationen zur Handhabung
Tragen des iPod nano Der iPod nano enthält empfindliche Komponenten, u. a. eine
Festplatte (je nach Modell). Verbiegen oder zerbrechen Sie den iPod nano nicht und
lassen Sie ihn nicht fallen. Wenn Sie ein Verkratzen des Gehäuses des iPod nano vermeiden möchten, empfiehlt es sich, eine der separat erhältlichen Taschen zu verwenden.
Verwenden von Steckern und Anschlüssen Versuchen Sie niemals, einen Stecker mit
Gewalt in einen Anschluss zu stecken. Überprüfen Sie, ob der Anschluss blockiert ist.
Lässt sich der Stecker nicht problemlos anschließen, passt er vermutlich nicht in den
Anschluss. Vergewissern Sie sich, dass Stecker und Anschluss zueinander passen und
dass Sie den Stecker korrekt mit dem Anschluss ausgerichtet haben.
Verwenden des iPod nano bei angemessenen Temperaturen Verwenden Sie den
iPod nano nur in einem Temperaturbereich zwischen 0 ºC und 35 ºC. Bei niedrigen
Temperaturen kann die Spieldauer des iPod nano vorübergehend verkürzt und die Aufladedauer der Batterie verlängert werden.
Lagern Sie den iPod nano in einem Temperaturbereich zwischen -20 ºC und 45 ºC.
Lassen Sie Ihren iPod nano nicht im Auto liegen, denn in parkenden Autos kann dieser
Temperaturbereich leicht überschritten werden.
Wenn Sie den iPod nano verwenden oder die Batterie aufladen, erwärmt sich der
iPod nano. Das ist ein normaler Vorgang Die Außenseite des iPod nano fungiert als
Wärmeableiter, der die Wärme aus dem Inneren des Gehäuses nach außen in die kühlere Luft ableitet.
Reinigen des Gehäuses des iPod nano Ziehen Sie zum Reinigen des iPod nano alle
Kabel ab, schalten Sie den iPod nano aus und schieben Sie den Schalter „Hold“ auf
„Hold“. Verwenden Sie dann ein weiches, angefeuchtetes und fusselfreies Tuch. Achten
Sie darauf, dass keine Feuchtigkeit in das Gehäuse eindringt. Verwenden Sie keine Fensterreiniger, Haushaltsreiniger, Sprays, Lösungsmittel, alkoholhaltige Reiniger, Ammoniaklösungen oder Scheuermittel für die Reinigung des iPod nano.
Umweltgerechtes Entsorgen des iPod nano Informationen zur umweltgerechten Entsorgung des iPod nano sowie weitere wichtige Informationen zu FCC-Richtlinien und
Prüfsiegeln finden Sie weiter hinten in diesem Handbuch im Abschnitt „Regulatory
Compliance Information“ auf Seite 117.
BITTE BEACHTEN: Bei Nichtbeachtung dieser Informationen zur Handhabung des
iPod nano kann es zu Schäden am iPod oder anderen Gegenständen kommen.11
116
11 Weitere Informationen,
Service und Support
Weitere Informationen über die Verwendung des iPod nano
finden Sie in der Online-Hilfe sowie im Internet.
In der nachfolgenden Tabelle erfahren Sie, wo Sie zusätzliche Software und ServiceInformationen für den iPod erhalten.
Näheres über Aktion
Service und Support, Diskussionsforen, Online-Einführungen
und Apple-Software zum Laden
Besuchen Sie die folgende Seite:
www.apple.com/de/support/ipodnano
Verwenden von iTunes Öffnen Sie iTunes und wählen Sie „Hilfe“ > „iTunes-Hilfe“.
Eine Online-Einführung zu iTunes (nur in bestimmten Regionen
verfügbar) finden Sie unter: www.apple.com/de/support/itunes
Verwenden von iPhoto
(mit Mac OS X)
Öffnen Sie iPhoto und wählen Sie „Hilfe“ > „iPhoto-Hilfe“.
Verwenden von iCal
(mit Mac OS X)
Öffnen Sie iCal und wählen Sie „Hilfe“ > „iCal-Hilfe“.
Die neusten Informationen
zum iPod nano
Besuchen Sie die folgende Seite: www.apple.com/de/ipodnano
Registrieren des iPod nano Wenn Sie den iPod nano registrieren möchten, installieren Sie
iTunes auf Ihrem Computer und verbinden Sie den iPod nano dann
mit dem Computer.
Auffinden der iPod nanoSeriennummer
Sehen Sie auf der Rückseite des iPod nano nach oder wählen Sie
„Einstellungen“ > „Über“ und drücken Sie dann die Mitteltaste.
Wählen Sie in iTunes (während der iPod nano an Ihrem Computer
angeschlossen ist) deniPod nano in der Liste der Geräte aus und
klicken Sie auf „Einstellungen“.
Garantieleistungen Befolgen Sie zuerst die Tipps in diesem Handbuch, in der OnlineHilfe und in den Online-Ressourcen. Besuchen Sie dann falls erforderlich folgende Seite: www.apple.com/de/support/ipodnano 117
Regulatory Compliance Information
FCC Compliance Statement
This device complies with part 15 of the FCC rules.
Operation is subject to the following two conditions:
(1) This device may not cause harmful interference,
and (2) this device must accept any interference
received, including interference that may cause
undesired operation. See instructions if interference
to radio or TV reception is suspected.
Radio and TV Interference
This computer equipment generates, uses, and can
radiate radio-frequency energy. If it is not installed
and used properly—that is, in strict accordance with
Apple’s instructions—it may cause interference with
radio and TV reception.
This equipment has been tested and found to
comply with the limits for a Class B digital device in
accordance with the specifications in Part 15 of FCC
rules. These specifications are designed to provide
reasonable protection against such interference in a
residential installation. However, there is no
guarantee that interference will not occur in a
particular installation.
You can determine whether your computer system is
causing interference by turning it off. If the
interference stops, it was probably caused by the
computer or one of the peripheral devices.
If your computer system does cause interference to
radio or TV reception, try to correct the interference
by using one or more of the following measures:
 Turn the TV or radio antenna until the interference
stops.
 Move the computer to one side or the other of the
TV or radio.
 Move the computer farther away from the TV or
radio.
 Plug the computer in to an outlet that is on a
different circuit from the TV or radio. (That is, make
certain the computer and the TV or radio are on
circuits controlled by different circuit breakers or
fuses.)
If necessary, consult an Apple Authorized Service
Provider or Apple. See the service and support
information that came with your Apple product. Or,
consult an experienced radio/TV technician for
additional suggestions.
Important: Changes or modifications to this product
not authorized by Apple Inc. could void the EMC
compliance and negate your authority to operate
the product.
This product was tested for EMC compliance under
conditions that included the use of Apple peripheral
devices and Apple shielded cables and connectors
between system components.
It is important that you use Apple peripheral devices
and shielded cables and connectors between system
components to reduce the possibility of causing
interference to radios, TV sets, and other electronic
devices. You can obtain Apple peripheral devices and
the proper shielded cables and connectors through
an Apple Authorized Reseller. For non-Apple
peripheral devices, contact the manufacturer or
dealer for assistance.
Responsible party (contact for FCC matters only):
Apple Inc. Corporate Compliance
1 Infinite Loop, MS 26-A
Cupertino, CA 95014
Industry Canada Statement
This Class B device meets all requirements of the
Canadian interference-causing equipment
regulations.
Cet appareil numérique de la classe B respecte
toutes les exigences du Règlement sur le matériel
brouilleur du Canada.
VCCI Class B Statement
Korea Class B Statement
Russia
( ૺૺဧ ઠધබ118
Europäische Gemeinschaft
Austausch der Batterie
Die wiederaufladbare Batterie des iPod nano
darf nur von einem Apple Autorisierten ServicePartner ersetzt werden. Näheres hierzu finden
Sie auf folgender Website:
www.apple.com/de/support/ipod/service/battery
Informationen zur Entsorgung und zum
Recycling
Entsorgen Sie Ihren iPod gemäß den geltenden
umweltrechtlichen Bestimmungen. Da dieses
Produkt eine Batterie enthält, muss es separat vom
Hausmüll entsorgt werden. Wenden Sie sich bitte an
Apple oder Ihr Ordnungsamt und erkundigen Sie
sich nach Möglichkeiten zum Recyceln.
Informationen zum Recycling-Programm
von Apple finden Sie im Internet unter:
www.apple.com/de/environment/recycling
Deutschland: Dieses Gerät enthält Batterien. Bitte
nicht in den Hausmüll werfen. Entsorgen Sie dieses
Gerät am Ende seines Lebenszyklus entsprechend
den maßgeblichen gesetzlichen Regelungen.
Nederlands: Gebruikte batterijen kunnen worden
ingeleverd bij de chemokar of in een speciale
batterijcontainer voor klein chemisch afval (kca)
worden gedeponeerd.
China:
Taiwan:
Europäische Union – Informationen zur Entsorgung
Dieses Symbol weist darauf hin, dass dieses Produkt
entsprechend den geltenden gesetzlichen
Vorschriften und getrennt vom Hausmüll entsorgt
werden muss. Geben Sie dieses Produkt zur
Entsorgung bei einer offiziellen Sammelstelle ab. Bei
einigen Sammelstellen können Produkte zur
Entsorgung unentgeltlich abgegeben werden. Durch
getrenntes Sammeln und Recycling werden die
Rohstoff-Reserven geschont, und es ist sichergestellt,
dass beim Recycling des Produkts alle
Bestimmungen zum Schutz von Gesundheit und
Umwelt eingehalten werden.
Apple und der Umweltschutz
Apple Inc. ist ständig darum bemüht, die
Belastungen, die sich aus der Verwendung von
Apple-Systemen und -Produkten für die Umwelt
ergeben können, auf einem möglichst niedrigen
Niveau zu halten.
Weitere Informationen hierzu finden Sie unter:
www.apple.com/de/environment
© 2009 Apple Inc. Alle Rechte vorbehalten. Apple, das Apple-Logo,
iCal, iLife, iPhoto, iPod, iPod nano, iPod Socks, iTunes, Mac, Macintosh
und Mac OS sind Marken der Apple Inc., die in den USA und weiteren
Ländern eingetragen sind. Finder, das FireWire-Logo und Shuffle sind
Marken der Apple Inc. iTunes Store ist eine Dienstleistungsmarke der
Apple Inc., die in den USA und weiteren Ländern eingetragen ist. NIKE
ist eine Marke der NIKE, Inc. und ihrer Tochterunternehmen und wird
in Lizenz verwendet. Namen anderer hier genannter Firmen und
Produkte sind Marken ihrer jeweiligen Rechtsinhaber.
Die Nennung von Produkten, die nicht von Apple sind, dient
ausschließlich Informationszwecken und stellt keine Werbung dar.
Apple übernimmt hinsichtlich der Auswahl, Leistung oder
Verwendbarkeit dieser Produkte keine Gewähr. Alle Vereinbarungen,
Verträge oder Garantieansprüche, so vorhanden, gelten direkt
zwischen dem jeweiligen Hersteller und den jeweiligen Benutzern. Es
wurden alle Anstrengungen unternommen, um sicherzustellen, dass
die in diesem Handbuch aufgeführten Informationen korrekt sind.
Apple übernimmt jedoch keine Gewähr für die Richtigkeit des Inhalts
dieses Handbuchs.
D019-1716 / November2009
iPhone et iPad en entreprise
Scénarios de déploiement
Octobre 2011
Découvrez comment iPhone et iPad s’intègrent naturellement aux environnements
d’entreprise grâce à ces scénarios de déploiement.
• Microsoft Exchange ActiveSync
• Services fondés sur des normes
• Réseaux privés virtuels
• Wi-Fi
• Certificats numériques
• Aperçu des fonctions de sécurité
• Gestion d’appareils mobilesDéploiement d’iPhone et d’iPad
Exchange ActiveSync
iPhone et iPad peuvent communiquer directement avec votre serveur Microsoft Exchange
par l’intermédiaire de Microsoft Exchange ActiveSync (EAS), permettant ainsi l’utilisation
du courriel, du calendrier, des contacts et des tâches en temps réel. En outre, Exchange
ActiveSync permet aux utilisateurs d’accéder à la liste de contacts globale (GAL) et donne
aux administrateurs la possibilité d’imposer l’utilisation d’un code de sécurité et d’effectuer
l’effacement à distance. iOS prend en charge l’authentification de base et l’authentification
par certificat pour Exchange ActiveSync. Si votre entreprise utilise actuellement Exchange
ActiveSync, vous disposez déjà des services nécessaires à l’utilisation d’iPhone et d’iPad;
aucune autre configuration n’est requise. Si votre entreprise utilise Exchange Server 2003,
2007 ou 2010, mais n’a jamais utilisé Exchange ActiveSync, consultez les étapes qui suivent.
Configuration d’Exchange ActiveSync
Aperçu de la configuration du réseau
• Assurez-vous que le port 443 est ouvert dans les réglages du coupe-feu. Si votre entreprise
permet l’utilisation d’Outlook Web Access, le port 443 est probablement déjà ouvert.
• Sur le serveur frontal, assurez-vous qu’un certificat de serveur est installé et activez
le protocole SSL pour le répertoire virtuel d’Exchange ActiveSync dans IIS.
• Si vous utilisez un serveur Microsoft Internet Security and Acceleration (ISA), assurez-vous
qu’un certificat de serveur est installé et mettez à jour le DNS public de manière à résoudre
les connexions entrantes.
• Assurez-vous que le DNS de votre réseau renvoie une adresse unique routable à l’externe au
serveur Exchange ActiveSync pour les clients intranet et Internet. Ce réglage est nécessaire
pour permettre à l’appareil d’utiliser la même adresse IP lors des communications avec le
serveur lorsque les deux types de connexions sont actives.
• Si vous utilisez un serveur Microsoft ISA, créez un port d’écoute Web ainsi qu’une règle
de publication d’accès de client Web Exchange. Pour de plus amples détails, consultez
la documentation de Microsoft.
• Pour tous les coupe-feu et les appareils réseau, réglez le délai d’expiration de la session
inactive à 30 minutes. Pour obtenir des renseignements sur les intervalles d’interrogation et
de délai d’expiration, reportez-vous à la documentation concernant Microsoft Exchange à
l’adresse suivante : http://technet.microsoft.com/en-us/library/cc182270.aspx (en anglais).
• Configurez les fonctionnalités mobiles, les politiques et les réglages de sécurité des
appareils au moyen du Gestionnaire système Exchange. Pour Exchange Server 2007 et 2010,
cette configuration s’effectue grâce à la Console de gestion Exchange.
• Téléchargez et installez l’outil Web Microsoft Exchange ActiveSync Mobile Administration,
qui est nécessaire à l’exécution d’un effacement à distance. Pour Exchange Server 2007 et
2010, l’effacement à distance peut également être exécuté par l’intermédiaire d’Outlook Web
Access ou de la Console de gestion Exchange.
Politiques de sécurité Exchange ActiveSync
prises en charge
• Effacement à distance
• Mot de passe obligatoire sur l’appareil
• Longueur minimale de mot de passe
• Nombre maximal de tentatives de saisie
du mot de passe (avant l’effacement local)
• Utilisation obligatoire de chiffres et de lettres
• Délai d’inactivité en minutes (de 1 à
60 minutes)
Autres politiques Exchange ActiveSync
(pour Exchange 2007 et 2010 seulement)
• Autorisation ou interdiction des mots de
passe simples
• Expiration des mots de passe
• Historique des mots de passe
• Intervalle d’actualisation de la politique
• Nombre minimal de caractères complexes
dans le mot de passe
• Synchronisation manuelle obligatoire en
itinérance
• Utilisation de l’appareil photo permise
• Navigation sur le Web permiseCahier de spécifications 3
Produit
Authentification de base (nom d’utilisateur et mot de passe)
• Activez Exchange ActiveSync pour certains utilisateurs ou groupes en particulier au moyen
du service Active Directory. La fonctionnalité est activée par défaut pour tous les appareils
mobiles de l’ensemble de l’organisation dans Exchange Server 2003, 2007 et 2010. Dans le
cas d’Exchange Server 2007 et 2010, reportez-vous à la Configuration du destinataire dans
la Console de gestion Exchange.
• Par défaut, le protocole Exchange ActiveSync est configuré de manière à employer
l’authentification de base des utilisateurs. Nous vous recommandons d’activer le protocole
SSL pour l’authentification de base de manière à assurer que les données de connexion
soient chiffrées pendant l’authentification.
Authentification par certificat
• Installez des services de certificat d’entreprise sur un serveur membre ou un contrôleur de
domaine dans votre domaine (celui-ci deviendra votre serveur d’autorité de certification).
• Configurez le logiciel IIS sur votre serveur frontal Exchange ou sur le serveur d’accès client
de manière à accepter l’authentification par certificat pour le répertoire virtuel d’Exchange
ActiveSync.
• Pour autoriser ou exiger le certificat pour tous les utilisateurs, désactivez la fonction
« Authentification de base » et sélectionnez « Accepter les certificats clients » ou « Exiger les
certificats clients ».
• Générez des certificats clients au moyen de votre serveur d’autorité de certification.
Exportez la clé publique et configurez le logiciel IIS afin qu’il utilise cette clé. Exportez
la clé privée et utilisez un profil de configuration pour transmettre cette clé à iPhone et
iPad. L’authentification par certificat ne peut être configurée qu’au moyen d’un profil de
configuration.
Pour de plus amples renseignements sur les services de certificats, consultez les ressources
offertes par Microsoft.
Autres services Exchange ActiveSync
• Recherche dans la liste de contacts globale
• Possibilité d’accepter et de créer des
invitations dans le calendrier
• Synchronisation des tâches
• Ajout d’indicateurs aux courriels
• Synchronisation des indicateurs de réponse et
de transfert avec Exchange Server 2010
• Recherche de courriels sur serveurs Exchange
2007 et 2010
• Gestion de plusieurs comptes Exchange
ActiveSync
• Authentification par certificat
• Courriels poussés vers les dossiers
sélectionnés
• Découverte automatiqueiPhone et iPad demandent l’accès aux services Exchange ActiveSync par l’intermédiaire du port 443 (HTTPS). (Il s’agit du même port employé pour
Outlook Web Access et d’autres services Web sécurisés; par conséquent, dans bon nombre de déploiements, ce port est déjà ouvert et configuré pour
permettre le trafic HTTPS chiffré selon le protocole SSL.)
La solution ISA donne accès au serveur frontal ou au serveur d’accès client Exchange. La solution ISA est configurée comme un serveur mandataire ou,
dans bien des cas, un serveur mandataire inverse, afin d’acheminer le trafic vers le serveur Exchange.
Le serveur Exchange procède à l’authentification de l’utilisateur entrant par l’intermédiaire du service Active Directory et du serveur de certificats (si
l’authentification par certificat est utilisée).
Si l’utilisateur fournit les données de connexion correctes et a accès aux services Exchange ActiveSync, le serveur frontal établit une connexion à la boîte
aux lettres appropriée sur le serveur principal (par l’intermédiaire du catalogue global Active Directory).
La connexion Exchange ActiveSync est établie. Les mises à jour et les modifications sont poussées par connexion sans fil et toutes les modifications
apportées sur iPhone ou iPad sont reflétées sur le serveur Exchange.
Les courriels envoyés sont également synchronisés avec le serveur Exchange par l’intermédiaire d’Exchange ActiveSync (étape 5). L’acheminement des
courriels sortants aux destinataires externes s’effectue habituellement d’un serveur Bridgehead (ou serveur de transport Hub) vers une passerelle de
messagerie externe (ou serveur de transport Edge) par SMTP. Selon la configuration du réseau, la passerelle de messagerie externe ou le serveur de
transport Edge peuvent se trouver à l’intérieur des limites du réseau ou à l’extérieur du coupe-feu.
© 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. Les autres produits et
dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent document n’est
fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419822B
Scénario de déploiement de Microsoft Exchange ActiveSync
Cet exemple illustre comment iPhone et iPad se connectent à la plupart des déploiements de serveurs Microsoft Exchange 2003, 2007 ou 2010.
4
Coupe-feu Coupe-feu
Serveur mandataire
Internet
Serveur frontal ou serveur
d’accès client Exchange
Serveur de certificats
Active Directory
Clé privée (certificat)
Clé publique
(certificat)
*Selon la configuration du réseau, la passerelle de messagerie ou le serveur de transport Edge peuvent se trouver à l’intérieur des limites du réseau (DMZ).
Serveur de boîte aux lettres
Exchange ou serveur principal
Passerelle de messagerie ou
serveur de transport Edge*
Profil de configuration
Serveur Bridgehead ou
serveur de transport Hub
443
1
4
6 5
2
3
4
5
6
1
3
2Déploiement d’iPhone et d’iPad
Services fondés sur des normes
Grâce à la prise en charge du protocole de messagerie IMAP, des services de répertoire
LDAP et des protocoles de calendriers CalDAV et de contacts CardDAV, iOS peut s’intégrer
à pratiquement tous les environnements de messagerie, de calendriers et de contacts
fondés sur des normes. Et si votre environnement réseau est configuré de manière à exiger
l’authentification de l’utilisateur et l’utilisation du protocole SSL, iPhone et iPad offrent une
approche sécurisée en matière d’accès au courriel, au calendrier, aux tâches et aux contacts
d’entreprise.
Lors de la plupart des déploiements, iPhone et iPad établissent un accès direct aux serveurs de
messagerie IMAP et SMTP afin de recevoir et d’envoyer les courriels à distance, et ils peuvent
également effectuer la synchronisation sans fil de notes avec les serveurs IMAP. Les appareils
iOS peuvent se connecter aux répertoires d’entreprise LDAPv3 de votre société, permettant aux
utilisateurs d’accéder aux contacts d’entreprise dans les applications Mail, Contacts et Messages.
La synchronisation avec votre serveur CalDAV permet aux utilisateurs de créer et d’accepter à
distance des invitations dans leur calendrier, de recevoir des mises à jour de calendrier et de
synchroniser des tâches avec l’application Rappels. Par ailleurs, la prise en charge du protocole
CardDAV permet à vos utilisateurs de conserver un ensemble de contacts synchronisés avec
votre serveur CardDAV suivant le format vCard. Tous les serveurs du réseau peuvent se trouver
à l’intérieur d’un sous-réseau DMZ, derrière un coupe-feu d’entreprise, ou les deux. Avec le
protocole SSL, iOS prend en charge le chiffrement à 128 bits et les certificats racine X.509 émis
par les principales autorités de certification.
Configuration du réseau
Votre administrateur des TI ou du réseau devra exécuter les étapes clés suivantes pour
permettre l’accès aux services IMAP, LDAP, CalDAV et CardDAV à partir d’iPhone et d’iPad :
• Ouvrez les ports appropriés dans les réglages du coupe-feu. Les ports les plus courants
comprennent le port 993 pour la messagerie IMAP, 587 pour la messagerie SMTP, 636 pour
les services de répertoire LDAP, 8443 pour les services de calendrier CalDAV et 8843 pour
les contacts CardDAV. Il est également recommandé que la communication entre le serveur
mandataire et les serveurs principaux IMAP, LDAP, CalDAV et CardDAV soit configurée de
manière à utiliser le protocole SSL et que les certificats numériques, sur les serveurs du réseau,
soient signés par une autorité de certification de confiance telle que VeriSign. Cette étape
importante fait en sorte qu’iPhone et iPad reconnaissent votre serveur mandataire en tant
qu’entité de confiance au sein de votre infrastructure d’entreprise.
• Pour la messagerie SMTP sortante, les ports 587, 465 ou 25 doivent être ouverts pour
permettre l’envoi des courriels. iOS recherche automatiquement le port 587, puis le port 465
et enfin le port 25. Le port 587 est le port le plus fiable et le mieux sécurisé, car il requiert
l’authentification de l’utilisateur. Le port 25 ne requiert pas l’authentification de l’utilisateur
et certains fournisseurs de services Internet bloquent ce port par défaut afin d’éliminer les
pourriels.
Ports courants
• IMAP/SSL : 993
• SMTP/SSL : 587
• LDAP/SSL : 636
• CalDAV/SSL : 8443, 443
• CardDAV/SSL : 8843, 443
Solutions de messagerie IMAP ou POP
iOS prend en charge les protocoles standard
des serveurs IMAP4 et POP3 sur toute une
gamme de plateformes serveur, y compris
Windows, UNIX, Linux et Mac OS X.
Standards CalDAV et CardDAV
iOS prend en charge les protocoles de
calendrier CalDAV et de contacts CardDAV.
Les deux protocoles ont été standardisés par
l’IETF. Pour de plus amples renseignements
à ce sujet, reportez-vous au consortium
CalConnect, aux adresses (en anglais)
http://caldav.calconnect.org/ et
http://carddav.calconnect.org/.Scénario de déploiement
Cet exemple illustre comment iPhone et iPad se connectent à la plupart des déploiements de serveurs IMAP, LDAP, CalDAV et CardDAV.
© 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. UNIX est une marque
déposée de The Open Group. Les autres produits et dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent
changer sans préavis. Le présent document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419827B
iPhone et iPad demandent l’accès aux services réseau par l’intermédiaire des ports indiqués.
En fonction du service, les utilisateurs doivent être authentifiés par le serveur mandataire inverse ou par le serveur directement afin
d’obtenir l’accès aux données d’entreprise. Dans tous les cas, les connexions sont acheminées par le serveur mandataire inverse,
qui remplit le rôle d’une passerelle sécurisée, habituellement à l’abri du coupe-feu Internet de l’entreprise. Une fois authentifiés,
les utilisateurs peuvent accéder à leurs données d’entreprise sur les serveurs principaux.
iPhone et iPad offrent des services de recherche dans les répertoires LDAP, permettant aux utilisateurs de rechercher des contacts
et d’autres données du carnet d’adresses sur le serveur LDAP.
Dans le cas des calendriers CalDAV, les utilisateurs peuvent accéder aux calendriers et les mettre à jour.
Les contacts CardDAV sont stockés sur le serveur, et il est également possible d’y accéder localement sur iPhone et iPad.
Les modifications apportées aux champs dans les contacts CardDAV sont synchronisés avec le serveur CardDAV.
Dans le cas des services de messagerie IMAP, les messages existants et les nouveaux messages peuvent être lus sur iPhone et iPad
grâce à la connexion au serveur mandataire de messagerie. Les messages sortants sont envoyés au serveur SMTP, et des copies sont
conservées dans le dossier Éléments envoyés de l’utilisateur.
1
2
3
4
5
6
Coupe-feu Coupe-feu
Serveur mandataire inverse
Internet
Serveur de messagerie
Serveur de répertoire LDAP
3
6
Serveur CalDAV
Serveur CardDAV
2
4
5
1
636
(LDAP)
8843
(CardDAV)
993 (IMAP)
587 (SMTP)
8443
(CalDAV)
6Déploiement d’iPhone et d’iPad
Réseaux privés virtuels
L’accès sécurisé aux réseaux d’entreprise privés est possible sur iPhone et iPad grâce aux
protocoles standard établis en matière de réseaux privés virtuels (RPV). Les utilisateurs
peuvent facilement se connecter aux systèmes d’entreprise par l’intermédiaire du client de
RPV d’iOS ou au moyen d’une application tierce fournie par Juniper, Cisco et F5 Networks.
Dès le départ, iOS prend en charge Cisco IPSec, L2TP sur IPSec et PPTP. Si votre entreprise
utilise l’un de ces protocoles, aucune autre configuration réseau ni aucune autre application
tierce ne sont nécessaires pour relier iPhone et iPad à votre réseau privé virtuel.
En outre, iOS prend en charge les RPV SSL, permettant l’accès aux serveurs de réseaux privés
virtuels SSL Juniper série SA, Cisco ASA et F5 BIG-IP Edge Gateway. Il suffit aux utilisateurs
de télécharger une application client de RPV développée par Juniper, Cisco ou F5 à partir
de l’App Store pour commencer. Comme les autres protocoles de RPV pris en charge par iOS,
les RPV SSL peuvent être configurés manuellement sur l’appareil ou par l’intermédiaire du
Profil de configuration.
iOS prend en charge les technologies standard telles que IPv6, les serveurs mandataires et
la tunnellisation fractionnée, permettant d’obtenir une expérience de RPV riche lors de la
connexion aux réseaux d’entreprise. De plus, iOS est compatible avec différentes méthodes
d’authentification, y compris les mots de passe, les jetons à deux facteurs et les certificats
numériques. Afin de simplifier la connexion dans les environnements où l’authentification
par certificat est utilisée, iOS est doté de la technologie VPN On Demand, qui démarre une
session de RPV de façon dynamique lors de la connexion aux domaines indiqués.
Méthodes d’authentification et protocoles pris en charge
RPV SSL
Prend en charge l’authentification de l’utilisateur par mot de passe, par jeton à deux facteurs
et par certificat.
Cisco IPSec
Prend en charge l’authentification de l’utilisateur par mot de passe et par jeton à deux
facteurs ainsi que l’authentification de l’ordinateur par secret partagé et certificat.
L2TP sur IPSec
Prend en charge l’authentification de l’utilisateur par mot de passe MS-CHAP v2 et par jeton à
deux facteurs ainsi que l’authentification de l’ordinateur par secret partagé et certificat.
PPTP
Prend en charge l’authentification de l’utilisateur par mot de passe MS-CHAP v2 et par jeton
à deux facteurs.Cahier de spécifications 8
Produit
VPN On Demand
Dans le cas des configurations utilisant l’authentification par certificat, iOS prend en charge
la technologie VPN On Demand. VPN On Demand établit automatiquement une connexion
lors de l’accès aux domaines prédéfinis, permettant aux utilisateurs de se connecter aux RPV
de façon transparente.
Cette fonctionnalité d’iOS ne nécessite aucune autre configuration du serveur. La configuration
de la technologie VPN On Demand s’effectue par l’intermédiaire d’un profil de configuration
ou peut être effectuée manuellement sur l’appareil.
Options de VPN On Demand :
Toujours
Établit une connexion à un RPV pour toute adresse correspondant au domaine indiqué.
Jamais
N’établit pas de connexion à un RPV pour les adresses qui correspondent au domaine
indiqué, mais si le RPV est déjà actif, il peut être utilisé.
Au besoin
Établit une connexion à un RPV pour les adresses correspondant au domaine indiqué
uniquement si la recherche d’un DNS n’a donné aucun résultat.
Configuration du RPV
• Une configuration minimale permet à iOS de s’intégrer à de nombreux réseaux RPV
existants. Le meilleur moyen de préparer le déploiement consiste à vérifier si iOS prend en
charge les protocoles et les méthodes d’authentification du RPV actuel de votre entreprise.
• Nous vous recommandons de passer en revue le chemin d’authentification menant à votre
serveur d’authentification afin de vérifier que les standards pris en charge par iOS sont
activés au sein de votre déploiement.
• Si vous avez l’intention d’utiliser l’authentification par certificat, assurez-vous que votre
infrastructure de clé publique est configurée de manière à prendre en charge les certificats
appareil et utilisateur avec le processus de distribution de clé correspondant.
• Pour configurer des réglages de serveur mandataire en fonction d’une URL en particulier,
placez un fichier PAC sur un serveur Web auquel il est possible d’accéder en utilisant
les réglages de RPV de base et assurez-vous qu’il est hébergé avec le type MIME
application/x-ns-proxy-autoconfig.
Configuration du serveur mandataire
Pour toutes les configurations, vous pouvez également définir un serveur mandataire
de RPV. Pour configurer un serveur mandataire unique pour toutes les connexions, utilisez le
réglage manuel et indiquez l’adresse, le port et l’authentification si nécessaire. Pour fournir
un fichier de configuration automatique du serveur mandataire à l’appareil en utilisant un
protocole PAC ou WPAD, utilisez la configuration automatique. Dans le cas des éléments
PAC, indiquez l’URL du fichier PAC. Si le protocole WPAD est employé, iPhone et iPad
recherchent les réglages appropriés dans le DHCP et le DNS.9
1
2
3
4
5
6
Coupe-feu Coupe-feu
Serveur de RPV-concentrateur
Internet public
Réseau privé
Authentification
certificat ou jeton
Serveur mandataire
Serveur d’authentification du RPV
Génération de jeton ou authentification par certificat
1 4
3a 3b
2
5
Service de
répertoire
© 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. App Store est une
marque de service d’Apple Inc. Les autres produits et dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits
peuvent changer sans préavis. Le présent document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419828B
Scénario de déploiement
Cet exemple décrit un déploiement classique avec serveur de RPV-concentrateur et serveur d’authentification contrôlant l’accès aux services
réseau de l’entreprise.
iPhone et iPad demandent l’accès aux services réseau.
Le serveur de RPV-concentrateur reçoit la demande et la transmet au serveur d’authentification.
Dans un environnement à deux facteurs, le serveur d’authentification gère alors la génération synchronisée d’un jeton clé avec le serveur de clés.
Si une méthode d’authentification par certificat est déployée, un certificat de clé publique doit être distribué avant l’authentification. Si une méthode
d’authentification par mot de passe est déployée, l’authentification passe à la validation de l’utilisateur.
Une fois l’utilisateur authentifié, le serveur d’authentification valide les politiques d’utilisateur et de groupe.
Une fois les politiques d’utilisateur et de groupe validées, le serveur de RPV établit l’accès par tunnel chiffré aux services réseau.
Si un serveur mandataire est actif, iPhone et iPad se connectent par l’intermédiaire du serveur mandataire pour accéder aux données à l’extérieur
du coupe-feu.Déploiement d’iPhone et d’iPad
Wi-Fi
Protocoles de sécurité sans fil
• WEP
• WPA personnel
• WPA entreprise
• WPA2 personnel
• WPA2 entreprise
Méthodes d’authentification 802.1X
• EAP-TLS
• EAP-TTLS
• EAP-FAST
• EAP-SIM
• PEAPv0 (EAP-MS-CHAP v2)
• PEAPv1 (EAP-GTC)
• LEAP
Dès leur première utilisation, iPhone et iPad peuvent se connecter de façon sécurisée
aux réseaux Wi-Fi d’entreprise ou d’invité, de sorte que la connexion aux réseaux sans
fil disponibles s’effectue rapidement et facilement, que vous soyez sur le campus ou en
déplacement.
iOS prend en charge les protocoles de réseau sans fil standard, y compris WPA2 entreprise,
de sorte qu’il est possible de configurer rapidement les réseaux sans fil d’entreprise et d’y
accéder de façon sécurisée. Le protocole WPA2 entreprise emploie le chiffrement AES à
128 bits, une méthode de chiffrement par blocs éprouvée, donnant aux utilisateurs l’assurance
que leurs données sont protégées.
Grâce à la prise en charge du standard 802.1X, iOS peut être intégré à une vaste gamme
d’environnements à authentification RADIUS. Les méthodes d’authentification sans fil 802.1X
prises en charge sur iPhone et iPad comprennent EAP-TLS, EAP-TTLS, EAP-FAST, EAP-SIM,
PEAPv0, PEAPv1 et LEAP.
Les utilisateurs peuvent configurer iPhone et iPad de manière à établir automatiquement
la connexion aux réseaux Wi-Fi disponibles. Il est possible d’accéder aux réseaux Wi-Fi
nécessitant des données de connexion ou d’autres renseignements rapidement et sans
ouvrir une autre session de navigateur, à partir des réglages Wi-Fi ou par l’intermédiaire
d’applications telles que Mail. Et la connectivité Wi-Fi permanente à faible puissance permet
aux applications d’utiliser les réseaux Wi-Fi pour acheminer des notifications en mode Push.
Les réglages de réseau sans fil, de sécurité, de serveur mandataire et d’authentification
peuvent être configurés grâce aux profils de configuration, de manière à effectuer
rapidement la configuration et le déploiement.
Configuration du protocole WPA2 entreprise
• Vérifiez la compatibilité des appareils réseau et sélectionnez un type d’authentification (type
EAP) pris en charge par iOS.
• Assurez-vous que la prise en charge du standard 802.1X est activée sur le serveur
d’authentification et, s’il y a lieu, installez un certificat de serveur et attribuez des
autorisations d’accès aux utilisateurs et aux groupes.
• Configurez les points d’accès pour l’authentification 802.1X et entrez les données
correspondantes concernant le serveur RADIUS.
• Si vous avez l’intention d’utiliser l’authentification par certificat, configurez votre infrastructure
de clé publique de manière à prendre en charge les certificats appareil et utilisateur avec le
processus de distribution de clé correspondant.
• Vérifiez la compatibilité du format du certificat et du serveur d’authentification. iOS prend en
charge les systèmes cryptographiques à clé publique 1 (.cer, .crt, .der) et 12.
• Pour de plus amples renseignements concernant les standards en matière de réseaux sans fil
et l’accès Wi-Fi protégé (WPA), consultez le site www.wi-fi.org (en anglais).Scénario de déploiement WPA2 entreprise/802.1X
Cet exemple décrit un déploiement de réseau sans fil sécurisé classique tirant parti de l’authentification RADIUS.
iPhone et iPad demandent l’accès au réseau. La tentative de connexion est effectuée en réponse à la sélection d’un réseau sans fil disponible par
l’utilisateur ou est effectuée automatiquement lorsqu’un réseau préalablement configuré est détecté.
Une fois que le point d’accès a reçu la demande, celle-ci est transmise au serveur RADIUS pour l’authentification.
Le serveur RADIUS valide le compte utilisateur au moyen du service de répertoire.
Une fois l’utilisateur authentifié, le point d’accès donne accès au réseau selon les politiques et les autorisations définies par les instructions du serveur
RADIUS.
© 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. Les autres produits et
dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent document n’est
fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419830B
11
1
2
3
4
Point d’accès sans fil
avec prise en charge
du standard 802.1X
Services de répertoire
Services réseau
Serveur d’authentification avec prise
en charge du standard 802.1X (RADIUS)
Type EAP, par
certificat ou mot
de passe
1
2
3
4
Coupe-feuiOS prend en charge les certificats numériques, permettant aux utilisateurs d’entreprise
d’accéder de façon sécurisée et simplifiée aux services d’entreprise. Un certificat numérique
est formé des éléments suivants : une clé publique, des données au sujet de l’utilisateur et
l’autorité de certification ayant émis le certificat. Les certificats numériques sont une forme
d’identification permettant la simplification de l’authentification, l’intégrité des données et
le chiffrement.
Sur iPhone et iPad, les certificats peuvent être utilisés de différentes façons. Apposer une
signature sur des données au moyen d’un certificat numérique contribue à assurer que
les données ne puissent être altérées. Les certificats peuvent également être utilisés pour
garantir l’identité de l’auteur ou de la personne apposant sa signature. En outre, ils peuvent
être utilisés pour chiffrer les profils de configuration et les communications réseau afin de
protéger encore davantage les données privées ou confidentielles.
Utilisation des certificats dans iOS
Certificats numériques
Les certificats numériques peuvent être utilisés pour authentifier de façon sécurisée les
utilisateurs des services d’entreprise sans qu’il soit nécessaire d’employer un nom d’utilisateur,
un mot de passe ou un jeton logiciel. Dans iOS, l’authentification par certificat est prise en
charge pour l’accès à Microsoft Exchange ActiveSync, aux RPV et aux réseaux Wi-Fi.
Services d’entreprise
intranet, courriel, RPV, Wi-Fi
Autorité de
certification
Service de
répertoire
Demande
d’authentification
Certificats de serveur
Les certificats numériques peuvent également être utilisés pour valider et chiffrer les
communications réseau. Il est ainsi possible de communiquer de façon sécurisée avec les
sites Web internes et externes. Le navigateur Safari peut vérifier la validité d’un certificat
numérique X.509 et configurer une session sécurisée avec chiffrement AES atteignant
256 bits. L’identité du site est ainsi vérifiée et la communication avec le site est protégée
de manière à empêcher l’interception des données personnelles ou confidentielles.
Demande de Services réseau
connexion HTTPS
Autorité de
certification
Déploiement d’iPhone et d’iPad
Certificats numériques
Formats de certificat et d’authentification
pris en charge :
• iOS prend en charge les certificats X.509 avec
clés RSA.
• Les extensions de fichier .cer, .crt, .der, .p12 et
.pfx sont reconnues.
Certificats racine
Un certain nombre de certificats racine sont
préinstallés dans iOS. Pour consulter la liste
des racines du système préinstallées, reportezvous à l’article d’assistance Apple à l’adresse
suivante : http://support.apple.com/kb/HT4415
(en anglais). Si vous utilisez un certificat
racine qui n’est pas préinstallé, par exemple
un certificat racine autosigné créé par votre
entreprise, vous pouvez le distribuer en
utilisant l’une des méthodes décrites dans
la section « Distribution et installation des
certificats » du présent document.© 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc.,
enregistrées aux États-Unis et dans d’autres pays. Les autres produits et dénominations sociales mentionnés ici peuvent être des
marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent
document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011
L419821B
Distribution et installation des certificats
La distribution et l’installation des certificats sur iPhone et iPad s’effectue simplement.
Lorsqu’ils reçoivent un certificat, les utilisateurs peuvent passer en revue son contenu et
l’ajouter à leur appareil en deux touchers. Lorsqu’un certificat de clé publique est installé,
les utilisateurs doivent entrer le mot de passe qui sert à le protéger. Si l’authenticité d’un
certificat ne peut être vérifiée, un avertissement s’affiche avant l’ajout du certificat à l’appareil.
Installation de certificats par l’intermédiaire des profils de configuration
Si les profils de configuration sont utilisés pour distribuer les réglages des services
d’entreprise tels que Exchange, les RPV ou un réseau Wi-Fi, les certificats peuvent être
ajoutés au profil afin de simplifier le déploiement.
Installation de certificats par l’intermédiaire de Mail ou de Safari
Si un certificat est envoyé par courriel, il s’affiche comme pièce jointe. Safari peut être utilisé
pour télécharger des certificats à partir d’une page Web. Vous pouvez héberger un certificat
sur un site Web sécurisé et fournir aux utilisateurs l’URL à partir de laquelle ils peuvent
télécharger le certificat sur leur appareil.
Installation de certificats au moyen du protocole d’inscription du certificat
simple (SCEP)
Le protocole SCEP vise à simplifier la distribution des certificats dans le cas des déploiements
à grande échelle. Il permet l’inscription sans fil, sur iPhone et iPad, de certificats numériques
qui peuvent ensuite être utilisés pour l’authentification requise par les services d’entreprise
et pour l’inscription auprès d’un serveur de gestion d’appareils mobiles.
Pour de plus amples renseignements sur le protocole SCEP et l’inscription sans fil, consultez
le site www.apple.com/ca/fr/iphone/business/resources.
Retrait et révocation de certificats
Pour retirer manuellement un certificat qui a été installé, sélectionnez Réglages > Général >
Profils. Si vous retirez un certificat nécessaire à l’accès à un compte ou à un réseau, l’appareil
ne pourra plus établir la connexion à ces services.
Pour retirer les certificats au moyen d’une connexion sans fil, vous pouvez vous servir
d’un serveur de gestion d’appareils mobiles. Ce serveur peut afficher tous les certificats
d’un appareil et retirer ceux qu’il a installés.
En outre, le protocole OCSP est pris en charge afin de permettre la vérification de l’état des
certificats. Lorsqu’un certificat respectant le protocole OSCP est utilisé, iOS valide le certificat
pour vérifier que celui-ci n’a pas été révoqué avant d’exécuter la tâche demandée.
13Cahier de spécifications 14
Produit
Déploiement d’iPhone et d’iPad
Aperçu des fonctions de sécurité
iOS, le système d’exploitation d’iPhone et d’iPad, comporte plusieurs niveaux de sécurité.
iPhone et iPad peuvent ainsi accéder aux services d’entreprise de façon sécurisée et protéger
les données importantes. iOS offre un puissant chiffrement pour la transmission de données,
des méthodes d’authentification éprouvées pour l’accès aux services d’entreprise et le
chiffrement matériel pour toutes les données au repos. iOS permet également de sécuriser
et de protéger les données grâce à l’utilisation de politiques de code de sécurité pouvant
être transmises et appliquées par connexion sans fil. Et si l’appareil se retrouve entre de
mauvaises mains, les utilisateurs et les administrateurs des TI peuvent exécuter une commande
d’effacement à distance pour supprimer les données privées.
Lorsque vous évaluez la sécurité du système d’exploitation iOS pour l’utilisation en entreprise,
il importe de comprendre les éléments suivants :
• Sécurité de l’appareil : les méthodes qui servent à prévenir l’utilisation non autorisée
de l’appareil
• Sécurité des données : la protection des données au repos, même si l’appareil est perdu ou volé
• Sécurité du réseau : les protocoles de réseau et le chiffrement des données lors de la
transmission
• Sécurité des applications : la plateforme sécurisée sur laquelle repose iOS
Ces caractéristiques fonctionnent de concert pour créer une plateforme informatique mobile
sécurisée.
Sécurité de l’appareil
L’établissement de politiques d’accès à iPhone et iPad rigoureuses est une étape essentielle en
matière de protection des données de l’entreprise. Les codes de sécurité des appareils forment
la première ligne de défense contre l’accès non autorisé; ils peuvent être configurés sans fil et
leur utilisation peut être imposée de la même façon. Les appareils exécutant iOS utilisent le code
de sécurité unique établi par chaque utilisateur pour générer une clé de chiffrement puissante
afin de protéger encore davantage les courriels et les données d’application confidentielles sur
l’appareil. En outre, iOS offre des méthodes de configuration de l’appareil en environnement
d’entreprise sécurisées et rendant obligatoire la mise en place de réglages, de politiques et
de restrictions précises. Ces méthodes permettent de bénéficier d’options flexibles en matière
d’établissement d’un niveau de protection standard pour les utilisateurs autorisés.
Politiques concernant les codes de sécurité
Le code de sécurité d’un appareil empêche les utilisateurs non autorisés d’accéder aux
données ou à l’appareil de quelque façon que ce soit. iOS vous permet de faire une sélection
parmi un ensemble complet d’exigences relatives au code de sécurité afin de répondre à vos
besoins en matière de sécurité, y compris des délais d’inactivité, la complexité du code de
sécurité et la fréquence de modification du code de sécurité.
Les politiques de code de sécurité suivantes sont prises en charge :
• Code de sécurité requis sur l’appareil
• Valeur simple permise
• Valeur alphanumérique requise
• Longueur minimale du code de sécurité
• Nombre minimal de caractères complexes
• Période de validité maximale du code de sécurité
• Délai précédant le verrouillage automatique
• Historique des codes de sécurité
• Délai de verrouillage de l’appareil
• Nombre maximal de tentatives infructueuses
Sécurité de l’appareil
• Codes de sécurité forts
• Expiration du code de sécurité
• Historique de réutilisation des codes de sécurité
• Nombre maximal de tentatives infructueuses
• Application à distance de la contrainte d’utilisation
du code de sécurité
• Temporisation progressive de la saisie du code
de sécuritéApplication des politiques