Enterprise Terminal Emulator (TE) User Guide for Honeywell

Total Page:16

File Type:pdf, Size:1020Kb

Enterprise Terminal Emulator (TE) User Guide for Honeywell Enterprise TE Enterprise Terminal Emulation User Guide Disclaimer Honeywell International Inc. (“HII”) reserves the right to make changes in specifications and other information contained in this document without prior notice, and the reader should in all cases consult HII to determine whether any such changes have been made. The information in this publication does not represent a commitment on the part of HII. HII shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing, performance, or use of this material. HII disclaims all responsibility for the selection and use of software and/or hardware to achieve intended results. This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated into another language without the prior written consent of HII. Patents For patent information, refer to www.hsmpats.com. Copyright © 2015 Honeywell International Inc. All rights reserved. ii Enterprise Terminal Emulation (TE) User Guide Document Change Record This page records changes to this document. The document was originally released as version -001. Version Number Date Description of Change 008 4/2015 Added support for the VM3 computer. Added support for Vietnamese code pages. Converted user guide to the Honeywell template. 007 3/2015 Changed name from ITE to Enterprise TE. Added support for the CV31 and MX7 Tecton computers. 006 6/2013 Revised to support ITE release 1.40. Added additional protocol and SSH options. Added keypad diagrams for CK3R and CK3X. Deleted information for unsupported computers (CK32, CK60, CV30). Added new information on creating and using SIPs with CV41 running Windows Embedded Standard. 005 5/2012 Revised to support ITE release 1.35. Added new configuration procedures using Intermec Settings throughout the manual. Added keypad layouts for the CV41 and CV61 computers. Added support and configuration information for the CV41 and CV61 computers. 004 9/2011 Revised to support ITE release 1.30. Added new information on SSH settings and installing SSL certificates. Added descriptions of the redesigned Toolbar and associated icons. Added information on using Intermec Settings from within Enterprise TE. 003 1/2011 Revised to support ITE release 1.25. Added new information on using the 70 Series, CN50, and CS40 computers, new SSL configuration options in the te_settings.ini file, and a procedure for enabling the phone on the CN50 and CS40 computers while ITE is running. 002 6/2010 Revised to support ITE release 1.20. Added new information on UDP Plus support and configuring SSH and SSL options, and tutorials for Fingerprint and ESC/P printing. Enterprise Terminal Emulation (TE) User Guide iii iv Enterprise Terminal Emulation (TE) User Guide Contents Contents Customer Support . .xii Product Service and Repair . .xii Limited Warranty . .xii Send Feedback . .xii 1 Getting Started . 1 About Enterprise Terminal Emulator . 2 Supported Computers . 2 About Enterprise TE Licensing. 3 Check Licenses Out with SmartSystems . 3 About Intermec License Manager. 3 Set Up the Computer and the Network . 4 About Enterprise TE and Network Protocols . 5 Install Enterprise TE on Your Computer. 5 Launch Enterprise TE . 6 Close Enterprise TE. 8 Communicate Through Your WWAN Connection. 8 Enable the Phone on the CN50 and CS40 Mobile Computers . 8 About Enterprise TE Applications . 9 About Annunciators . 9 About Alert Sounds . 10 3270 Alert Sounds . 11 5250 Alert Sounds . 11 VT/ANSI Alert Sounds . 11 Change Alert Sounds and Volume . 11 About 3270 Emulation Mode . 12 3278 SNA Keys . 12 AID-Generating Keys . 12 About 5250 Applications. 13 Special Function Keys . 13 Additional Functions . 15 System Messages . 16 About VT/ANSI Applications. 16 Main Keypad. 16 VT/ANSI Editing Keypad . 17 VT/ANSI Auxiliary Keys . 17 VT/ANSI Top-Row Function Keys . 18 Transmission Mode . 18 Local Edit Mode . 18 Print and Serial Scanning . 18 Enterprise Terminal Emulation (TE) User Guide v Contents 2 Configure and Manage Enterprise TE . 21 Manage Enterprise TE With SmartSystems . 22 Configure Enterprise TE with EZConfig . 23 Configure Enterprise TE With Enterprise Settings. 23 Start Intermec Settings Remotely with SmartSystems Foundation . 25 Configure Options for Each Session . 26 Configure a TCP/IP Connection . 28 About the Keyboard Type, Charset, and Code Page Options . 30 Configure Enterprise TE for SSL . 32 Install Certificate Files . 34 Configure Enterprise TE for SSH . 35 Use a Configuration File for SSH Settings . 36 Lock Down SSH Applications . 36 SSH Server Application Programming Hints . 36 About Session Persistence. 37 About the Telnet Gateway Appliance (TGAP). 38 About the KeyAlive Function. 38 Configure Bar Code Scanning Options . 38 Configure Bar Code Symbology Settings. 41 Additional Decode Settings . 42 Set Bar Code Lengths . 44 About EAN/UPC Drop Leading and Drop Trailing Values . 45 Configure Protocol Options . 46 About 5250 Options . 48 About 3270 Options . 50 About VT/ANSI Options . 52 About the Answerback Character String . 54 About UTF-8 Encoding . 55 About RS232 Setup Options . 55 Select Enterprise TE Fonts and Screen Behaviors . 56 About Code Page Options . 58 Configure Enterprise TE Screen Sizes and Colors . 59 About Screen Mode . 62 Move the Enterprise TE Viewport by Dragging Across the Screen . 63 Move the Cursor Location by Tapping the Screen . 63 About the Focus via Touch Panel Feature ..
Recommended publications
  • Freestyle-Pro-Manual.Pdf
    User Manual KB900 Mac/Windows/PC SmartSet™ Cherry Low-Force Switchable Programming Engine Mechanical Keyswitches 1 Kinesis Corporation 22030 20th Avenue SE, Suite 102 Bothell, Washington 98021 USA Keyboard models covered by this manual: [email protected], [email protected] KB900-brn www.kinesis.com April 20, 2018 Edition This manual covers features included through firmware version 1.0.0. To download the latest firmware and to access all support resources visit www.kinesis.com/support. To shop for accessories visit https://www.kinesis-ergo.com/products/: Palm Supports (AC903)- Detachable Palm Supports. VIP3 Pro (AC920)- Adjustable tenting accessory and Palm Supports (5°/10°/15°). Palm Supports required for tenting. V3 Pro (AC930)- Adjustable tenting accessory (5°/10°/15°) for use without Palm Supports. Palm Pads (AC700blk)- Cushioned palm pads for use with Palm Supports. © 2018 by Kinesis Corporation, all rights reserved. Kinesis and Freestyle are registered trademarks of Kinesis Corporation. Freestyle Pro, SmartSet, and v-Drive are trademarks of Kinesis Corporation. All other trademarks are property of their respective owners. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any commercial purpose, without the express written permission of Kinesis Corporation. FCC Radio Frequency Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential installation.
    [Show full text]
  • INTERSKILL MAINFRAME QUARTERLY December 2011
    INTERSKILL MAINFRAME QUARTERLY December 2011 Retaining Data Center Skills Inside This Issue and Knowledge Retaining Data Center Skills and Knowledge 1 Interskill Releases - December 2011 2 By Greg Hamlyn Vendor Briefs 3 This the final chapter of this four part series that briefly Taking Care of Storage 4 explains the data center skills crisis and the pros and cons of Learning Spotlight – Managing Projects 5 implementing a coaching or mentoring program. In this installment we will look at some of the steps to Tech-Head Knowledge Test – Utilizing ISPF 5 implementing a program such as this into your data center. OPINION: The Case for a Fresh Technical If you missed these earlier installments, click the links Opinion 6 below. TECHNICAL: Lost in Translation Part 1 - EBCDIC Code Pages 7 Part 1 – The Data Center Skills Crisis MAINFRAME – Weird and Unusual! 10 Part 2 – How Can I Prevent Skills Loss in My Data Center? Part 3 – Barriers to Implementing a Coaching or Mentoring Program should consider is the GROW model - Determine whether an external consultant should be Part Four – Implementing a Successful Coaching used (include pros and cons) - Create a basic timeline of the project or Mentoring Program - Identify how you will measure the effectiveness of the project The success of any project comes down to its planning. If - Provide some basic steps describing the coaching you already believe that your data center can benefit from and mentoring activities skills and knowledge transfer and that coaching and - Next phase if the pilot program is deemed successful mentoring will assist with this, then outlining a solid (i.e.
    [Show full text]
  • Xshell 6 User Guide Secure Terminal Emualtor
    Xshell 6 User Guide Secure Terminal Emualtor NetSarang Computer, Inc. Copyright © 2018 NetSarang Computer, Inc. All rights reserved. Xshell Manual This software and various documents have been produced by NetSarang Computer, Inc. and are protected by the Copyright Act. Consent from the copyright holder must be obtained when duplicating, distributing or citing all or part of this software and related data. This software and manual are subject to change without prior notice for product functions improvement. Xlpd and Xftp are trademarks of NetSarang Computer, Inc. Xmanager and Xshell are registered trademarks of NetSarang Computer, Inc. Microsoft Windows is a registered trademark of Microsoft. UNIX is a registered trademark of AT&T Bell Laboratories. SSH is a registered trademark of SSH Communications Security. Secure Shell is a trademark of SSH Communications Security. This software includes software products developed through the OpenSSL Project and used in OpenSSL Toolkit. NetSarang Computer, Inc. 4701 Patrick Henry Dr. BLDG 22 Suite 137 Santa Clara, CA 95054 http://www.netsarang.com/ Contents About Xshell ............................................................................................................................................... 1 Key Functions ........................................................................................................... 1 Minimum System Requirements .................................................................................. 3 Install and Uninstall ..................................................................................................
    [Show full text]
  • Bash Guide for Beginners
    Bash Guide for Beginners Machtelt Garrels Garrels BVBA <tille wants no spam _at_ garrels dot be> Version 1.11 Last updated 20081227 Edition Bash Guide for Beginners Table of Contents Introduction.........................................................................................................................................................1 1. Why this guide?...................................................................................................................................1 2. Who should read this book?.................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need?...............................................................................................................................4 9. Conventions used in this
    [Show full text]
  • JFP Reference Manual 5 : Standards, Environments, and Macros
    JFP Reference Manual 5 : Standards, Environments, and Macros Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817–0648–10 December 2002 Copyright 2002 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Windows NLS Considerations Version 2.1
    Windows NLS Considerations version 2.1 Radoslav Rusinov [email protected] Windows NLS Considerations Contents 1. Introduction ............................................................................................................................................... 3 1.1. Windows and Code Pages .................................................................................................................... 3 1.2. CharacterSet ........................................................................................................................................ 3 1.3. Encoding Scheme ................................................................................................................................ 3 1.4. Fonts ................................................................................................................................................... 4 1.5. So Why Are There Different Charactersets? ........................................................................................ 4 1.6. What are the Difference Between 7 bit, 8 bit and Unicode Charactersets? ........................................... 4 2. NLS_LANG .............................................................................................................................................. 4 2.1. Setting the Character Set in NLS_LANG ............................................................................................ 4 2.2. Where is the Character Conversion Done? .........................................................................................
    [Show full text]
  • Character Encodings
    Character encodings Andreas Fester June 26, 2005 Abstract This article is about the concepts of character encoding. Earlier there were only a few encodings like EBCDIC and ASCII, and everything was quite simple. Today, there are a lot of terms like UNICODE, Code- page, UTF8, UTF16 and the like. The goal of this article is to explain the concepts behind these terms and how these concepts are supported in programming languages, especially Java, C and C++. 1 Introduction Character encodings are necessary because the computer hardware can only handle (and only knows) about numbers. The first computers could handle eight bit numbers (lets take aside the very first micropro- cessors which could only handle 4 bits), which is a range from 0 to 255. Larger numbers must be handled by combining two or more eight bit values. Later, computers were enhanced so that they could handle 16-, 32- and meanwhile 64 bit numbers without having to combine smaller units. But - its still all numbers, i.e. a sequence of 0 and 1 bits. However, it soon became clear that interfacing with a computer system through sequences of 0 and 1 is very cumbersome and only possible for very simple communication. Usually an end user wants to read text like "Name:" and enter words like "Bill", so it was necessary to define some conventions how numbers correspond to letters. These conventions are generally called character encodings. 2 Single byte encoding The traditional way of assigning a code to a character is to represent each character as a byte or a part of a byte (for example six or seven bits).
    [Show full text]
  • Report Syntax Report Syntax
    Report Syntax Report Syntax Report Syntax This chapter describes the syntax and parameters of the ADAREP utility. Optional Parameters Examples Optional Parameters ADAREP can be specified alone to retrieve a database status report. You can optionally customize the report by added parameter values. ACODE: Identify Code Page for XML UTF-8 Output Use the ACODE parameter only if the UTF8 option is specified on the OUTPUT parameter. This parameter identifies the code page to which the database name, file names, and checkpoint names should be converted. This parameter is specified in three parts, in a specific order, and with each part separated by a comma from the others: ACODE=’database-name-codepage,file-name-codepage,checkpoint-name-codepage’ The database-name-codepage can either be the literal "GCB" or a valid code page number; the file-name-codepage can either be the literal "GCB", the literal "FCB", or a valid code page number; the checkpoint-name-codepage can either be the literal "GCB" or a valid code page number: A setting of "GCB" for any part indicates that the code page for that part should be acquired from the code page in the GCB (the GCB ACODE setting). 1 Report Syntax Optional Parameters A setting of "FCB" for the file-name-codepage indicates that the code page for converting file names in the XML document to UTF-8 should be acquired from the code page setting in the FCB (the FCB ACODE setting). If code pages for all three parts of the ACODE parameter are being specified, they must be specified in the order shown above.
    [Show full text]
  • Edge Manual- Sept 20.Pub
    User Manual KB950 Split Programmable Backlit Mechanical 1 Kinesis Corporation 22030 20th Avenue SE, Suite 102 Bothell, Washington 98021 USA Keyboard models covered by this manual: [email protected], [email protected] KB950-BLU www.KinesisGaming.com KB950-RED KB950-BRN September 20, 2017 Edition This manual covers features included through firmware version 1.0.0. To download the latest firmware and to access all support resources visit www.KinesisGaming.com/Support. To shop for accessories visit KinesisGaming.com/Accessories: Lift Kit (AC910)- Adjustable tenting accessory (5°/10°/15°) for use with Palm Supports V3 Pro (AC930)- Adjustable tenting accessory (5°/10°/15°) for use without Palm Supports (coming soon) Palm Pads (AC700blk)- Cushioned palm pads for use with Palm Supports © 2017 by Kinesis Corporation, all rights reserved. Kinesis and Freestyle are registered trademarks of Kinesis Corporation. Freestyle Edge, SmartSet, and v-Drive are trademarks of Kinesis Corporation. All other trademarks are property of their respective owners. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any commercial purpose, without the express written permission of Kinesis Corporation. FCC Radio Frequency Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
    [Show full text]
  • DB2 UDB for Z/OS V8 and UNICODE: It’S No Tower of Babel by Jim Schesvold
    DB2 UDB for z/OS V8 and UNICODE: It’s No Tower of Babel By Jim Schesvold INTRODUCTION DB2 UDB for z/OS Version 8 is the largest, most profound, highest impact version in the product’s history. Consider: There are more new lines of code in DB2 V8 than there were total lines of code in DB2 Version 1.1. Some individuals say migrating to DB2 V8 is a migration equivalent to DB2 V6 and V7 combined. The Quality Partnership Program—a beta program—lasted 14 months, the longest ever for DB2. There are more changes to the catalog than any other release or version of DB2. DB2 V8 requires 64-bit addressing. A DB2 V8 address space can be up to 16 exobytes, 8 billion times the storage available with V7 and prior. DB2 V8 entities have been increased by magnitudes. For example: Maximum table size has been increased from 16 terabytes to 128 terabytes. Table names can now be up to 128 bytes instead of 18 bytes. The number of partitions for a table has been increased from 254 to 4096. SQL statement length can now be up to 2 MB instead of 32KB. Archive logs have been increased to 10,000 from 1,000. And the list goes on and on. The installation methodology of DB2 has—optionally—been re-worked through the implemen- tation of msys for Setup as an installation technique. Yet for all these product changes and enhancements, one of the largest modifications in DB2 V8 is the implementation of Unicode. While earlier versions of DB2 had Unicode capability, DB2 V8 has extensively integrated character conversion into nearly every aspect of the product.
    [Show full text]
  • Softype 4.5 Manual
    SofType™ 4.5 International On-screen Keyboard For Windows 95/98/ME/NT/2000/XP User Manual SofType SofTypeÔ, DraggerÔ and AutoClickÔ are trademarks of Origin Instruments Corporation. HeadMouse® is a registered trademark of Origin Instruments Corporation. SofType 4.5 User Manual Published by: Origin Instruments Corp. 854 Greenview Drive Grand Prairie, TX 75050 Tel: 972-606-8740 Fax: 972-606-8741 email: [email protected] web: www.orin.com Ó 2000 Origin Instruments Corp. All rights reserved. No part of this publication may be reproduced or transmitted in whole or in part by any means without the written permission from the publisher. ii SofType Table of Contents Introduction _________________________________________________________ 2 Product Support ____________________________________________________ 2 Software Registration ________________________________________________ 2 Upgrading Note_____________________________________________________ 2 What’s New in SofType 4.5 ___________________________________________ 2 Installation__________________________________________________________ 4 Overview____________________________________________________________ 5 Chapter 1 The Keyboard ____________________________________________ 7 Appearance________________________________________________________ 7 Keyboard Layouts__________________________________________________ 12 Custom Keyboard Layouts ___________________________________________ 16 Moving & Sizing the Keyboard________________________________________ 18 Key Size _________________________________________________________
    [Show full text]
  • Data Loss Prevention R80.40 Administration Guide
    22 January 2020 DATA LOSS PREVENTION R80.40 Administration Guide ] Protected [Classification: Check Point Copyright Notice © 2020 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c) (1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page for a list of our trademarks. Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses. Data Loss Prevention R80.40 Administration Guide Important Information Latest Software We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks. Certifications For third party independent certification of Check Point products, see the Check Point Certifications page. Check Point R80.40 For more about this release, see the R80.40 home page. Latest Version of this Document Open the latest version of this document in a Web browser.
    [Show full text]