EasyManua.ls Logo

Ingenico i6780 - About this Manual; Conventions Used in this Manual

Ingenico i6780
119 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
1.3 About this Manual
Chapters 1 through 7 explain how to use the Extended Menu. Chapters 8 through 10 give
background information to help you understand downloading and key management, and
Chapters
11, 12, and 13 address downloading.
Chapter 1
, Introduction, gives an overview of the terminal, this manual, and kits that are
available.
Chapter 2,
Extended Menu Overview, explains how to navigate the Extended Menu and find
the unit’s current configuration settings. It also lists the options available within each menu.
Chapter 3,
System Configuration Menu, explains how to perform the functions in the system
configuration menu: change date and time, set display contrast, and adjust beep tones.
Chapter 4, System Info Menu, explains how to navigate through the system info menu to view
the following system information: check versions, check security info, and view parameters.
Chapter 5,
Supervisor Menu, gives the password to enter this menu, and explains how to
change the password. It explains how to check or erase the application file in the terminal, and
how to perform the following security functions: set key injection port, allow key injection,
check the key value, and allow the serial key to be injected.
Chapter 6,
System Parameters Menu, explains how to indicate the download method, set the
download port, setup the port, and configure the host port’s auto detect feature.
Chapter 7,
Diagnostic Menu, explains how to perform diagnostic tests on the display, keypad,
beeper, communications, MSR, smart card reader, SAMs, touch screen, and signature
capture.
Chapter 8,
Architecture, explains the system architecture, host communications, and terminal
architecture. It explains the components inside the terminal that are referred to in subsequent
chapters.
Chapter 9,
Key Architecture, explains the sponsor key (KTK), terminal based keys, application
based keys, and security options, such as MACing.
Chapter 10,
Secure Certificate, explains the securing process and the components of the
secure certificate.
Chapter 11,
IBMEFT Download, explains the prerequisites, preparation, timing, and steps
involved with the IBMEFT method of downloading.
Chapter 12,
Download Errors, explains how to resolve errors that might be encountered during
an IBMEFT download.
Chapter 13,
IBMEFT Troubleshooting, explains how to resolve error messages that may
appear on your Ingenico 6780 display if using IBMEFTDL.
1.4 Conventions Used in this Manual
The following table explains the conventions used in this manual.
2 Chapter 1 Introduction
Section 1.3 About this Manual

Table of Contents

Other manuals for Ingenico i6780

Related product manuals