Home
AML KDT750
Contents
1. CCD Linear Imager 2D Omni directional Imager with 2 Dimensional decoding KDT750 User s Guide m wp Part Number ACC 0750 KDT750 Pole Post Mount Kit ACC 0752 KDT750 Angled Wall Mount Kit ACC 0754 KDT750 Ram Mount Kit ACC 750MSR KDT750 Magnetic Stripe Reader Kit Top Mount ACC 750HID KDT750 HID ProxPoint Plus Reader kit Side Mount Description Warranty Information A one year warranty against material defects and workmanship from the date of shipment is guaranteed by AML Products are sold on the basis of specifications applicable at the time of manufacture AML shall have no obligation to modify or update products once sold At our option we will repair or replace at no charge any unit that proves to be defective providing the appropriate steps are taken to procure an RMA Return Materials Authorization number and shipping instructions from AML Agency Compliance FCC Declaration of Conformity Product Name Model KDT750 Price Verification System Model Number KDT750 This equipment complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This equipment may not cause harmful interference and 2 this equip ment must accept any interference received including interference that may cause unde sirable operation This equipment has been tested and found to comply with the li
2. List of 802 11 configuration parameters gt gt gt Multiple valid network blocks can be defined in the configuration file The unit will try all valid network blocks until the device is associated with an AP NOTE Care should be taken when defining multiple network blocks because in some configurations it is possible to associate with an AP but not be able to transmit or receive data In these cases the unit will not know to move on to the next network block because the radio sees a valid association with the AP Wireless Configuration Parameters Inside a network block of the configuration file will be all the necessary parameters to con figure the interface KDT750 User s Guide Parameter ssid Description Wireless Network Name ESSID Valid Values Use Example ssid MyNetwork key_mgmt Encryption key management method to use NONE No Dynamic Encryption No Encryp tion or WEP Encrpytion WPA PSK Use WPA WPA2 Pre shared Key WPA EAP Use WPA WPA2 Authentica tion and keying IEEE8021X Use 802 1x supplicant authentica tion Used for LEAP key mgrmt WPAPSK scan ssid Scan for hidden Networks APs not broadcasting Enable hidden scan Only allow networks that are broadcasting SSIDs scan_ssid 1 auth_alg WEP Authentication method OPEN Use open WEP system SHARED Use shared key WEP system auth_alg OPEN
3. wep_tx_keyidx WEP transmission key to use for encryption of outgoing data Use first key Use second key 1 Use third key wep_tx_keyidx 0 KDT750 User s Guide Parameter Description Valid Values Use Use fourth Example certificate file key 3 wep keyO WEP Encryption keys ASCII text wep key0 0a0b0cOd0e encoded keys wep_key1 MYTEXTWEPKEY1 wep_key should be wep_key2 1122334455 encompassed in wep_key3 MYOTHERWEPKEY wep_key2 s and hex encoded keys wep_key3 should not psk WPA WPA2 Pre ASCII text psk 123456789 shared key encoded keys should be encompassed in s and hex encoded keys should not eap WPA WAP2 EAP PEAP Use PEAP eap PEAP algorithm TLS Use TLS TILS Use TTLS phasel Outer EAP peaplabel 0 Existing PEAP phase1z peaplabel 0 authentication label peaplabel 1 Force new PEAP label phase2 Inner EAP auth MSCHAPV2 EAP PEAP phase2 auth MSCHAPV2 authentication autheap MSCHAP EAP TILS V2 autheapzMD5 identity WPA WPA2 identity MyUsername Username password WPA WPA2 password MyPassword Password or Passphrase ca_cert Local client ca certz mnt sd ca pem private key Local private encryption key file private keyz mnt sd cli ent p12 private key passwd Password to decode local private encryption key file private
4. 7755 40 275 70 Y a lt t Eri I 4 dd i i Ena B 1 i 275 70 H Amil CODES EN 22 3 3 _ 5 NM 5 mi CODE 24 15 5 mil EAN UPC 12 T T T l T T T Depth of Field 2D Omni Scanner Aiming System and Decode Zones The 2D Omni directional scanner will use a 650nm laser to draw an aiming pattern of the decoder s decode zone p in a The decoder is only capable of decoding symbols that are within its field of view Two focus modes are selectable for the 2D imager KDT750 User s Guide Far Focus Near Focus n em 85 3 H4 102 0 0 sm 4 102 65 475 M A25 15 gio Ir 203 10 mi POFA 575 1025 sj 13 mi doo UPC w 15 mil POF417 swam ance ERE 1978 Enade ando 20mi TM TT T TET YTTT ino 5 10 som dm cmo 122 254 381 508 6 amp 5 Dept of Feld 275 775 85 89 lisa dde 10 mi PDFAT7 sears S2 ame ce Ree WERTE S MON 225 875 15 mi POFAI7 15 20mi in no 2 4 8 10 2 cmo 51 102 152 203 284 305 Depth of Feld amp 2 4 o s a a e n 0 s a KDT750 User s Guide ge A Triggering The KDT750 s internal bar code scanners are designed to be used in presentation modes In these modes the scanner is always scanning and looking for bar codes to decode NOTE Some internal scanners have the
5. on even the most basic access points the intruder s work is much harder Much as a burglar will stray away from a house whose doors and windows are securely locked so too will an attacker tend to move past a wireless network when even ihe simplest security measures are enabled Wireless Configuration The optional 802 11b g n radio can be configured with the KDT750 Setup Utility under the Network menu KDT750 User s Guide manc Wireless Security AML WEP Open Plain Text 1 AML123 o access a menu or menu parameter tap the selection with n stylus c 2009 American Microsystems Ltd Some advanced features are not configurable with the utility and manual configuration of the settings may be necessary by editing the wifi conf configuration file This file is a stan dard ASCII encoded text file that is readable and writable by any text editor Empty lines and lines starting with a character will be ignored The file begins with two mandatory definition parameters that MUST be included in all wireless configuration files for the KDT750 ctrl interface var run wpa supplicant ap scan 1 This tells the wireless security supplicant how to set up the radio interface The file then includes a network block header that will be followed by all wireless network parameters and security settings that should be used by the connection A close brace will follow the parameters network
6. Wireless Reference Table Wireless Reference Table Remote Authentication Dial In User Service WEP was initially intended to provide a level of confidentiality on a wireless network that was comparable to a wired infrastructure WEP does not allow for any true authorization only encryption and does not protect users or devices from each other on the network There are two main WEP types WEP Open System Standard WEP All data transmissions are encrypted with the WEP key No attempt is made to authorize the Client device WEP Shared Key In Shared Key a very insecure attempt to autho rize the device is attempted The actual WEP encryption key is sent to the host usually the access point to verify the identity of the device This exposes the enciphering key to the network and should not be used In a WEP enabled environment each client holds the common network encryption keys which can be either a 40 bit key for 64 bit encryption or a 104 bit key for 128 bit encryption These keys are common to all devices on the network and are used to encrypt all data transmissions Because each network packet is encrypted with the same key and because of flaws in the actual cipher WEP is no longer considered secure and an attacker depending on network traffic could determine the network encryption keys by eavesdropping on the transmissions It has been demonstrated in a controlled environment that these attacks can take as little
7. ability to disable the illumination LEDs when no bar code is present under the scanner The scanner is still looking for bar codes but is saving power by only enabling the illumination when a new bar code symbol is present To manually trigger the bar code decoder use the Data Viewer tool under the System Tools folder Scanning Bar Codes NOTE Bar codes will only be scanned when software that is aware of the bar code inter face is running PCDemo KDT750 Demo Data Viewer etc Scanning with the Linear CCD KDT750 units equipped with the Linear CCD scan engine require proper alignment of the bar code under the scanner window The Linear CCD s ideal scanning range is between 2 5 inches and 8 inches 17400 11830 3 US 0771740011830 BEST OK KDT750 User s Guide ma c Scanning with the Omni Directional Imager The 2D Omni directional imager is capable of scanning bar codes at any orientation as long as the entire symbol is visible to the scanner and illuminated I p o 17400 11830 3 L 071740011830 3 zl Supported Symbologies Symbology Linear CCD 2D Imager UPC EAN Code 39 Code 93 Code 128 Interleaved 2 of 5 Discrete 2 of 5 MSI Plessy Codabar Code 11 GS1 Formerly RSS X Postal Codes Chinese Only Composite Codes PDF417 MicroPDF417 Maxicode Data Matrix QR Code x x
8. gt lt gt lt gt X lt gt lt gt lt gt lt gt lt Xx gt lt X gt lt gt lt X gt X lt x gt X lt ox X x gt lt gt lt gt lt gt lt Xx KDT750 User s Guide C Obtaining and Using Setup Bar Codes The internal bar code scanners can be configured with special setup bar code symbols These symbols are specific to the model of bar code scanner installed in the unit and are available from AML The default parameters and trigger mode bar codes are listed below NOTE The unit will NOT make an audible beep after scanning a setup bar code Parameter Linear CCD 2D Omni directional Imager Set All Defaults Parameters Default Parameters Default s Continuous Decoding Always On Continuous Decoding Always On Set Focus Focus Near Focus Far Smart Focus Alternate between near and far KDT750 User s Guide Installed Software This chapter describes the preinstalled software suite on the KDT750 KDT750 User s Guide PCDemo PCDemo is a versatile client application designed to run natively on the AML KDT750 price checking unit PCDemo handles data capture and processing network communication with a database server and all user interface and display attributes for data lookup and v
9. 0 User s Guide Software Keyboard Wedge A software keyboard wedge can be used to convert data coming from one or more exter nal hardware devices into a usable keyboard input Software Keyboard Wedge Internal Scanner JS RS 232 1 NO MSR No INO access a mena or mena parameter tup tho sccton witha stylus c 2009 American Microsystame Ld Pushbutton Input The KDT750 panel pushbuttons can emulate PC keyboard key presses Pushbuttons a cess u menu or menu parameter tap he selection with a tye American Microsystems Lid e2009 KDT750 User s Guide Wireless Networking This chapter describes the configuration of the optional internal 802 11 radio KDT750 User s Guide A Overview The KDT750 terminal can contain an optional 802 11b g n radio and internal antenna This radio is specifically designed to communicate with any 802 11b g or 802 11n Draft v2 0 Access Point KDT750 Terminals Wireless Access Points Database Servers Wired Infrastructure The range of the radio depends greatly on the quality of the Access Point and the RF com munications characteristic of the environment where the device is used The typical range for an 802 11 radio is 500 feet through free air Additional Access Points must be added to improve coverage in a larger area or in electri
10. 1 network ssid MySSID key_mgmt WPAPSK psk 123456789 Exact Configuration as Above but with raw Pre Shared Key PSK ctrl_interface var run wpa_supplicant ap_scan 1 network ssid MySSID key_mgmt WPAPSK psk 469100a17577fqd350ac9e09acd2399b56145e76a22b8183ff311f1c207c93d3a WPA WPA2 Enterprise with EAP PEAP MSCHAPv2 ctrl interface var run wpa supplicant ap scan 1 network ssid MySSID key mgmt WPAEAP eap PEAP phasel peaplabel 0 phase2 auth MSCHAPV2 identity MyUsername password MyPassword WPA WPA2 Enterprise with EAP TLS and local certificates ctrl interface var run wpa supplicant ap scan 1 network KDT750 User s Guide na n urssm ssid MySSID key_mgmt WPAEAP eap TLS identity MyUsername ca_cert mnt sd ca pem private_key mnt sd client p12 private_key_passwd MyKeyPassword WPA WPA2 Enterprise with EAP TTLS Tunneled TLS no local certificates ctrl_interface var run wpa_supplicant ap_scan 1 network ssid MySSID key_mgmt WPAEAP eap TTLS phasel peaplabel 0 phase2 auth MSCHAPV2 identity MyUsername password MyPassword Cisco Lightweight EAP LEAP with dynamic WEP keys ctrl_interface var run wpa_supplicant ap_scan 1 network ssid MySSID key_mgmt IEEE8021X eap LEAP identity MyUsername password MyPassword KDT750 User s Guide Integrated B
11. Door Strikers Sirens Stationary Scanners The internal relays are designed for low voltage applications To use the relays in high volt age situations an additional external rely should be implemented KDT750 User s Guide Relay Wiring Diagrams Internal Connections Internal Micro Relay Ei Terminal D D D Block lo NC Internal Connections Internal Micro Relay External Connections External Low Low Voltage Lamp Voltage Power E Supply External Connections External Low 120V AC 120V AC Lamp Voltage Power Power Supply Supply External 120v Relay H KDT750 User s Guide mmc Q a Digital Inputs Opto Isolators The KDT750 s internal digital inputs can be used to signal events and actions from an exter nal source Possible uses for the isolated input are External Pushbutton Switches Door Sensors Proximity Sensors Digital Input Wiring Diagram Internal Connections External Connections External 5V External Internal Input Power Supply Pushbutton or Isolator H MESE ii j Switch Weigand Interface The Weigand interface is used to connect proximity card and smart card readers to the KDT750 Weigand is a simple two wire interface used to transmit unidirectional data from a peripheral device to a host KDT75
12. Navigate the KDT750 software Mount the unit using optional accessories Chapter Descriptions Chapter 1 gives a brief overview of the KDT750 its product warranty and agency compliance Chapter 2 gives a quick start introduction to the KDT750 unit Chapter 3 describes the KDT750 terminal hardware and details internal and external cable connections Chapter 4 describes the communication and user input capabilities of the KDT750 Chapter 5 describes the use and configuration of the optional 802 11 wireless LAN radio Chapter 6 describes the use of the optional internal bar code scanner Chapter 7 describes the KDT750 s preinstalled software suite Chapter 8 describes methods to mount the KDT750 unit in a variety of environments KDT750 User s Guide ae m c T Related Documents KDT750 APL AML Price Lookup Protocol Revision 20081106BMC KDT750 User s Guide Introduction This chapter gives a brief overview of the KDT750 it s product warranty and agency compliance KDT750 User s Guide E S Introducing the KDT750 The KDT750 is an industrially rated kiosk style data terminal designed for use in retail price checking retail data collection real time work in process industrial data collection con sumer lookup and time and attendance The terminal is designed around a 5 6 Full VGA high color LCD with integrated touch screen that provides an unsurpassed viewi
13. User s Guide Effective date April 2009 KDT750 User s Guide manc Revision History November 11 2008 Initial version November 25 2008 Merge Integration Guide and Users Manual December 1 2008 Minor punctuation fixes and additions better unit introduction add wireless network diagram remove MT7570 reference in Appendix B April 9 2009 Updated to include KDT750 Setup Utility Remove references to manual set tings file editing Add information on updated boot procedure and User Applications PRE 1 KDT750 User s Guide m 2009 American Microsystems Ltd All rights reserved American Microsystems Ltd reserves the right to make changes in specifications and other information contained in this document without prior notice and the reader should in all cases consult American Microsystems Ltd to determine whether any such changes have been made The information in this publication does not represent a commitment on the part of American Microsystems Ltd American Microsystems Ltd shall not be liable for technical or editorial errors or omissions contained herein nor for incidental or consequential damages resulting from the furnishing performance or use of this material This document contains proprietary information which is protected by copyright All rights are reserved No part of this docu
14. a Once setup is complete the Save amp Reboot option must be selected to write the configu ration settings to the system memory Changing the User Boot Application To change the boot application enter the User menu and adjust the Boot Application option to the desired program User Configuration Boot Application PESSOJ lt lt Back v20030402 le access n menu or menu parameter tap the selection with a stylus c 2009 American Microsystems Ltd Selection Description Desktop PC Style Desktop APL PCDemo PCDemo price checking application via APL PCT2 UniComp PCT2 emulation application AMLVT220 VT100 220 Terminal Emulator Links2 WWW Web Browser Custom Custom command X KDT Demo KDT750 Stand alone Price Checking Demo pi A custom application can be executed by selecting the Custom option and entering the ull path to the program with the touchscreen keypad User Configuration Boot Application So Custom mnt sd links lt lt Back freno 0 MA wm eal m nf ofp KDT750 User s Guide mam A A Terminal Overview This chapter describes the KDT750 terminal hardware and details internal and external cable connections KDT750 User s Guide Outer Case Description LCD Display and Touchscreen Label Bu
15. all standard options and actions KDT750 User s Guide On Screen Keyboard The unit includes a simple on screen keyboard for use when no other input is available VT100 220 Terminal Emulator The KDT750 contains a simple telnet client capable of emulating VT100 and VT220 terminals KDT750 User s Guide mam A A Mechanical Integration and Mounting This chapter describes methods to mount the KDT750 unit in a variety of environments KDT750 User s Guide Rear Panel Mount Points The KDT750 base unit is backed by a stainless steel rear panel with a variety of mounting patterns Each pattern is indicated by the rear label A sharp punch or knife can be used to punch through the label at the desired locations and only the necessary holes should be knocked out to keep the unit environmentally sealed WARNING THE REAR PANEL SHOULD BE REMOVED FROM THE OUTER CASE BEFORE PUNCHING ANY HOLES IN THE LABEL 3X AELATSE Angled Column Mount ACTA RAM Mount Bracket Flush Mount Keyholes ACCO752 Angled Wall Mount be D Acc 7st O eadersractet 4 accrue Magnetic Supe drcet x x x x x x e e e AML KDT750 BAR CODE GOES HERE Price Verification System CERE AMD emm KDT750 User s Guide Flush Wall Mounting The KDT750 base unit can be flush mounted with four screws via four holes in the rear p
16. anel two key hole two round The rear panel s cable inlet is recessed allowing for flush mounting in certain situations w KDT750 User s Guide nanc A H a Tn Angled Wall Mounting The optional Angled Wall Bracket ACC 0752 hard mounts the KDT750 to any flat surface at a 20 degree angle ideal for price checking applications The bracket attaches to the KDT750 s rear panel via four stainless steel studs and nuts Nut UTC 9 Mounting Screws not furmished KDT750 Base aa Locking Screw not furnished Wall Mounting Brackel KDT750 User s Guide Column Post Mounting The KDT750 Pole Mount bracket ACC 0750 is a non destructive mounting solution for exist ing round structural or aesthetic posts and poles By utilizing nylon or steel straps the unit can be mounted to poles ranging in sizes from 4 to 24 inches in diameter The ideal pole diameter for the bracket ranges from 6 to 16 inches Nut 8 32 P Column _ Mounting rocket Column Strap mas ae column Strap KDT750 User s Guide mam A RAM Mounts The KDT750 can be mounted with the standard B size RAM Mounting system The rear panel of the base unit houses the standard 4 hole AMPS bolt pattern for attaching RAM ball and socket mounts The RAM mounting system includes fully adjustable mounts as well as locks bases ac
17. ar Code Scanner This chapter describes the use of the internal bar code reader KDT750 User s Guide Overview The KDT750 terminals can contain an integrated bar code reader for decoding bar code symbols in a variety of formats The terminal can be equipped with a linear CCD bar code decoder a 2 Dimensional Omni directional decoder or no bar code scan engine at all It is important to know what type of engine is installed in the unit to allow for correct cus tomization of the engine Determining Scanner Type he type of the internal scanner can be determined either by the KDT750 s model number reference chart at the beginning of this document or by observing the scanner s decode pattern f the KDT750 model number ends in a zero the unit contains no internal scan engine KDT750 xxxO f the KDT750 model number ends in a one the unit contains the Linear CCD laser KDT750 xxx1 f the KDT750 model number ends in a two the unit contains the 2D Omni directional imager KDT750 xxx2 f the KDT750 model number ends in a three the unit contains the 1D Laser engine KDT750 xxx3 f the KDT750 model number ends in a four the unit contains the External Omni directional engine KDT750 xxx4 KDT750 User s Guide Linear CCD Decode Zones The Linear CCD can only read symbols that are within its field of view ss
18. as 10 minutes to determine a 40 bit key Wifi Protected Access WPA was created in response to the weaknesses of WEP and while it implements the majority of the IEEE 802 11i standard it is not considered to be fully compliant WPA was only intended as a temporary measure to be used in place of WEP while the final 802 1 li standard was being drafted WPA was designed to work on all existing 802 11 hardware to provide a considerable amount of protection compared to WEP WPA was designed for use with an 802 1x commonly referred to as RADIUS server to provide authentication and to distribute encryp tion keys to the clients It is possible however to use WPA in Personal Pre shared key PSK mode which allows the benefits of WPA without the need of the external 802 1x server but this is Wireless Reference Table considered to be less secure Each client in a PSK environment holds a common passphrase that is used to generate the keys Weak passphrases is the major concern when using PSK One major improvement in WPA over WEP is the Temporal Key Integrity Protocol TKIP which dynamically changes keys as the system is used The more often that the encryption key changes the less data a potential attacker can get on the key and even if they were to determine the current key once a new key was rotated in they would de authenticated again WPA also defined the use of EAP for authentication of users however it does not
19. ase contains three slots that the matching tabs of ihe rear panel should slide into Rear Panel Description The rear panel of the unit is made from high quality 1 16 stainless steel The panel secures ihe internal connections seals the unit from dust and debris and prevents vandalism and unauthorized access KDT750 User s Guide Opening the KDT750 Outer Case In order to open the KDT750 remove the two screws on the left side and slightly rotate the outer case to the right Once the unit is opened approximately one inch the outer case can be slid off of the mounting tabs All mounting brackets will remain with the rear panel and the electronics and wiring will stay attached to the outer case Rotate Up Slightly Slide Off Tabs e Remove 2 Screws KDT750 User s Guide Ee Se n Internal Connections Connections to the KDT750 unit are housed internally to prevent vandalism and to secure the device WEIGAND MSR N UsB Speaker Connector Y j SD CARD WS RS 232 LCD Connector pu ExT USB 7 2v DC J PS ETHERNET POE Speaker x Power Safety Switch Exernal USB scan Engine Internal Connector Pinouts Weigand J3 4 Pin Male Header Description Ground Data 1 Data 0 5V Max 0 5A KDT750 User s G
20. cally noisy RF environments 802 11 Fallback Wireless LAN technology is designed to make maintaining a connection between two devices as reliable and consistent as possible Since the speed of the connection between wireless devices will vary as range and signal quality varies the wireless devices will inten tionally sacrifice throughput data rate or connection speed as measured in bits per sec ond in exchange for maintaining a reliable connection In other words a reliable connec tion at a lower speed is preferred over an unreliable connection at a higher speed i e it is easier to maintain the connection if data rate is deliberately reduced or put another way lower data rates will tolerate a higher range and or worse signal quality This characteristic is known as fallback As example an 802 11b system will fallback from 11 Mbps to 5 5 Mbps as range increases or signal quality decreases Subsequent fallbacks from 5 5 Mbps to 2 Mbps and 1 Mbps are also supported KDT750 User s Guide Interference and Coexistence 802 11 operates in a range of radio frequencies known as an unlicensed band i e the FCC does NOT require the use of a license in order to operate a radio transmitter in this range This means that commercially available radio devices other than wireless LAN devices are permitted to use the same frequency band as 802 11 Consequently these co existing radio d
21. cessory mounts and extensions Nut 88 32 KDI750 Base Plate RAM Mount KDT750 User s Guide Appendix A Technical Specifications KDT750 User s Guide man E Y General Specifications Dimensions 14 6 cm Lx 7 2 cm W x 5 0 cm D 5 750 L x 6 625 W x 2 000 D Weight 0 81 1bs 363g Display 5 6 VGA 640x480 16 bit Color TFT LCD Touchscreen Integrated Resistive Touch Panel Keypad 4 x Integrated momentary push button Power Supply Power over Ethernet 48V 802 3af Compliant 12V DC 2 1 mm Barrel Jack 7 AV 2 Cell 2200 mAh Lithium ion 1 hour runtime Optional 3 x USB 1 1 Full Speed Host Ports 2 x RS 232 1 x RJ 45 1 x Expansion Header 1 x Wiegand Interface Header 2 x Isolated Digital Inputs Screw Terminal Block 2 x Isolated Micro Relay Outputs Screw Terminal Block 2 x Internal Bar Code Decoder Connector 12 amp 14 Pin FPC Flex 10 100Base TX Fast Ethernet 802 11b g n Wireless Radio Optional Internal USB Type Integrated Speaker and Amplifier tonal Integrated Linear CCD Decoder Optional Integrated Omni Directional 2D Optional Magnetic Stripe Reader Optional HID ProxPoint Proximity Card Reader Optional Internal UPS Battery I O Ports Networking Audio Bar Code Decoding Card Reading Performance Specifications Processor Samsung S3C2410 202 MHz Architecture 32 bit RISC ARM9 w
22. define all of the EAP types that are employed in WPA2 Wifi Protected Access Version 2 WPA2 contains the following components 802 1x for authentication entailing the use of EAP and an authentication server RSN Robust Security Network for keeping track of associations and AES based CCMP encryption to provide confidentiality integrity and origin authentication The CCMP algorithm is the heart of WPA2 and is what sets it apart from WPA CCMP was designed to replace both TKIP and WEP and handles message integrity encryption and authentication Most if not all of the capabilities of WPA can be implemented in WPA2 with CCMP which is considered the state of the art 802 111 IEEE 802 111 Standard The IEEE standard Commonly called WPA2 TKIP Temporal Key Integrity Protocol Dynamic key rotation algorithm often used in WPA environments CCMP AES Counter Mode with Cipher Block Chaining Message Authentication Code Protocol Encipherment algorithm designed to replace TKIP and WEP in WPA2 802 11i CCMP is considered state of the art Extensible Authentication Protocol EAP is a general authentication method that can be used in many technologies but it is most commonly found in wireless LANs A large amount of documentation refers to WPA EAP as WPA Enter prise even though it is an ambiguous term There are many subtypes of EAP but only five have been described as standard The MT7570 suppor
23. eloped by Cisco Systems Inc It is considered less secure than other EAP types even by Cisco and is not recommended in new installations Pre shared Key Offen called WPA WPA2 Personal PSK allows the use of common passphrases for authentication PSK is often used in smaller networks that wish to use the high security of WPA WPA2 but do not wish to employ an 802 1x authentication server IEEE 802 1X IEEE Standard for authentication Often in wireless documentation references to 802 1x are really meaning 802 1x Authentication Server or RADIUS server that provides authentication and encryp tion keys to the clients RADIUS Remote Authentication Dial In User Service Often administrators will call the 802 1x server the RADIUS server RADIUS is an authentication authorization and accounting protocol for applications such as network access or IP mobility In the wireless LAN environment RADIUS is commonly used to implement the 802 1x standard
24. erification applications Need Help I can call a Customer Service Representative to assist you Press for Service bd More information on PCDemo can be found by viewing the KDT750 APL Guide See the Related Documents section in Chapter 1 for more information KDT750 Demo The KDT750 Demo application is a standalone demo of the capabilities of the KDT750 It is based on the PCDemo software but requires no network or external database Internally it includes a small number of bar codes that can be scanned to simulate a database lookup KDT750 User s Guide Part Number 070074577128 Description Similac Go amp Grow n Soybased Formula Vn 24 oz 051500240908 Jif Creamy Peanut Butter n 40 oz 027000486061 Orville Redenbachers n Gourmet Popping Corn 021000658831 Kraft n Macaroni amp Cheese Dinner n 7 25 oz 024000162896 Del Monte n French Style Green Beans n 14 5 oz 051500253625 Crisco Pure n Vegetable Oil n 48 fl oz 017400118303 Minute Rice n 14 oz 070870001001 Mrs Baird s Extra Thin n Sliced White Bread 038000029707 Kellogg s Apple Jacks n 19 1 oz 024000013709 Del Monte n Tomato Sauce n 8 oz Bar Code Data Viewer The KDT750 contains a simple application called Data Viewer that demonstrates and verifies the configuration of various input devices Data Viewer is located in the System Tools folder Data Viewer displays a field f
25. evices can interfere or jam the wireless LAN and vice versa The most trou blesome devices are cordless telephones and microwave ovens Fortunately higher quality cordless phones tend to listen for a clear channel before becoming active and will thus avoid interfering with a wireless LAN i e the cordless phone seeks a clear channel for itself so naturally avoids being interfered with or being a source of interference Jamming from microwave ovens is more severe but is usually restricted to the upper frequency range for 802 11 it should be noted that 802 11b g divides the available frequency band into 11 channels US The higher numbered channels are most susceptible to microwave oven interference In each instance jamming occurs only when the cordless telephone or microwave oven is active Encryption and Authorization Much has been publicized in the mass media recently about security problems with wireless LANs Although it cannot be denied that some encryption algorithms currently used in 802 11 are flawed the fact is that security breaches of a wireless LAN require a deliberate attempt to access the network by an intruder The primary issue is that many current users of wireless LAN have opted NOT to turn on secu rity features If users were to enable the security features currently available including only allowing known systems access to the network and enabling WEP Wired Equivalent Privacy or WPA Wifi Protected Access
26. i enable 1 Enable 0 Disable Wireless DHCP wifi dhcp Set DHCP for radio 1 Enable wifi_dhcp 1 0 Disable Wireless Static IP wifi ip Radio static IP wifi ip2192 168 100 1 Address when wifi dhcp is set to O Wireless Subnet wifi subnet Radio Subnetwork wifi subnet 255 255 255 0 Mask Mask Wireless Gateway wifi gateway Radio default wifi gatewayz192 168 100 2 routing gateway Static Domain dns DNS Server to use dns 192 168 100 2 Name Server Example network settings Only using Ethernet with DHCP eth enable 1 eth dhcp 1 wifi enable 0 Example network settings Only using Ethernet with Static Addressing eth enable 1 eth dhcp 0 eth ip 192 168 100 101 eth subnet 255 255 255 0 eth gateway 192 168 100 1 wifi enable 0 dns 192 168 100 2 KDT750 User s Guide an c n Example network settings Only using 802 11 Radio with DHCP eth enable 0 wifi enable 1 wifi dhcp 1 Serial Communications The KDT750 contains two user accessible RS 232 ports and one bar code scanner port for serial communications with a PC or other peripheral devices Each port is capable of baud rates up to 115 2 Kbps Serial communication ports are used to communicate with devices such as Internal Bar Code Scanner External Bar Code Scanner External Magnetic Stripe Reader Serial Printer PC The serial settings file is used to configure the three RS 232 serial ports on the KDT750 Each po
27. ith AMBA Advanced Microcontroller BusArchitecture Memory RAM 64 MB 100MHz SDRAM Memory Flash storage 1024 MB 1 GB Storage SD Card 16 MB Integrated Flash ROM Operating System Memory Expansion 1 GB SD Card Included Operating System Linux AML GNU Linux Kernel 2 6 22 KDT750 User s Guide anam A Environmental Specifications Operating Temperature 20 to 50 C 4 to 122 F Storage Temperature 30 to 60 C 30 to 140 F Humidity 0 to 90 RH non condensing Electrostatic Discharge 15kVDC through air 8kVDC contact Sealing IP54 NEMA 12 Regulatory Specifications Certifications FCC CE Environmental RoHS Pb Free Optional Wireless Radio Specifications Radio IEEE 802 1 1n Draft v2 0 IEEE 802 1 1b IEEE 802 11g Frequency 2 4 GHz Range Signal Rates 11n 40MH2 up to 300Mbps 11n 20MH2 up to 144Mbps 11g up to 54Mbps 11b up to 11Mbps 802 11b 17x 1dBm 802 11g 17 1dBm 802 11n 15 1dBm 1T2R Internal Antenna 1 Transmit 2 Receiving 802 11g 70dBm 54Mbps 802 11b 83dBm 11Mbps 802 11n 88dBm 11Mbps None 64 128 Bit WEP WPA WPA2 Personal PSK WPA WPA2 Enterprise EAP 802 1x Authentication Supplicants Output Power Antenna Configuration Receive Sensitivity Security KDT750 User s Guide Appendix B
28. key passwd MyKey Password A KDT750 User s Guide mac Example Configurations The following are example text that could be entered into the wifi conf file These examples in the plain file format are available on the KDT750 product CD Plain text connection No Encryption No Authorization AP Broadcasting SSID ctrl interface var run wpa supplicant ap scan 1 network ssid MySSID key mgmt NONE Plain text connection with hidden SSID ctrl_interface var run wpa_supplicant ap_scan 1 network ssid MySSID key_mgmt NONE scan_ssid 1 Open WEP Encrypted with hidden SSID WEP Keys in Text Format ctrl_interface var run wpa_supplicant ap_scan 1 network ssid MySSID key_mgmt NONE scan_ssid 1 auth alg OPEN wep tx keyidx 0 wep_key0 MYTEXTWEPKEYO wep_key1 MYTEXTWEPKEY1 wep_key2 MYTEXTWEPKEY2 wep_key3 MYTEXTWEPKEY3 Exact Configuration as Above but with WEP Keys in Hex Format ctrl interface var run wpa supplicant ap scan 1 network ssid MySSID key mgmt NONE KDT750 User s Guide A xC a scan ssid 1 auth alg OPEN wep tx keyidx 0 wep_key0 4D59544558545745504B455930 wep_key1 4D59544558545745504B455931 wep_key2 4D59544558545745504B455932 wep_key3 4D59544558545745504B455933 WPA WPA2 with Pre Shared Key PSK ctrl_interface var run wpa_supplicant ap_scan
29. ment may be photocopied reproduced or trans lated into another language without the prior written consent of American Microsystems Ltd American Microsystems Ltd 2190 Regal Parkway Euless TX 76040 Phone 800 648 4452 Fax 817 685 6232 www amltd com KDT750 User s Guide manc Table of Contents About This Document Introduction What to Expect Chapter Descriptions Related Documents Chapter 1 Introduction Introducing the KDT750 Part Numbers and Model Information Warranty Information Agency Compliance Chapter 2 Getting Started KDT750 Startup Sequence Entering System Setup Navigating Setup Changing the User Boot Application Chapter 3 Terminal Overview Outer Case Description Rear Panel Description Opening the KDT750 Outer Case Internal Connections Internal Connector Pinouts External Connections Wiring Installation Power Requirements and Battery Information Main Power Switch and Power On Reset Secure Digital SD Card Chapter 4 Communications and Input Network Communications Serial Communications USB Communications Digital 1 0 Weigand Interface Software Keyboard Wedge Pushbutton Input PRE 3 KDT750 User s Guide Chapter 5 Wireless Networking Overview 802 11 Falloack Interference and Coexistence Encryption and Authorization Wireless Configuration Wireless Network Parameters Exam
30. mits for a Class A digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reason able protection against harmful interference when the equipment is operated in a residen tial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful inter ference to radio communications However there is no guarantee that interference will not occur in a particular installation If you determine the equipment does cause harmful inter ference to radio or television reception this may be determined by monitoring the interfer ence while turning the equipment off and on you are encouraged to try to correct the interference by one of the following measures KDT750 User s Guide Se Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio or TV technician for help KDT750 User s Guide Getting Started This chapter gives a quick start introduction to using the KDT750 KDT750 User s Guide mmm a a KDT750 Startup Sequence The KDT750 unit will begin booting the operating system once power is applied to the termi nal and the rear panel is completely closed NOTE The rear panel mus
31. ng experience The ultra bright LED backlight allows for viewing images and text on the screen in even the brightest of environments The KDT750 is designed to be connected to multiple external and internal data sources including bar code scanners magnetic stripe readers keyboards proximity card readers and other modern information collection devices Its primary wide area communication is through an integrated Power over Ethernet ready 10 100 BaseTX Ethernet port or an optional 802 11b g n radio With a dual port digital 1 O and 3 full soeed USB host ports the KDT750 can be adapted into any environment and provides a cost effective solution for any number of industrial and consumer installations Part Numbers and Model Information f Wirel B Power ovi Model Number P Wired Networking cam M Emene KDT750 0000 n a 0 100 BaseTX n a n a 802 3a KDT750 0001 CCD 0 100 BaseTX n a n a 802 3a KDT750 0002 2D 0 100 BaseTX n a n a 802 3af KDT750 0010 n a 0 100 BaseTX 802 11b g n a 802 3a KDT750 001 1 CCD 0 100 BaseTX 802 11b g n a 802 3a KDT750 0012 2D 0 100 BaseTX 802 11b g n a 802 3a KDT750 0100 n a 0 100 BaseTX n a 2200 mAh 802 3af KDT750 0101 CCD 0 100 BaseTX n a 2200 mAh 802 3a KDT750 0102 2D 0 100 BaseTX n a 2200 mAh 802 30 KDT750 0110 n a 0 100 BaseTX 802 11 b g 2200 mAh 802 30 KDT750 0111 CCD 0 100 BaseTX 802 11b g 2200 mAh 802 3a NKD 750 0112 2D 0 100 BaseTX 802 115 g 2200 mAh 802 3a E
32. opening of the divider wall in the case The cables should then exit the rear panel through the window at the bottom of the channel Wires must be routed through opening in case DETAIL A KDT750 User s Guide manc Wires should exit through window DETAIL A Power Requirements and Battery Information The KDT750 can utilize three power sources external DC power supply Power over Ethernet and an optional internal backup battery External DC Power Supply NOTE Using power supplies that are not approved by AML for use with the KDT750 unit can cause damage to the unit and will void all warranties Voltage 12V regulated A Current 15A Connector 2 1mm Barrel center positive Internal Power over Ethernet Supply The KDT750 contains a 802 3af compatible power supply The unit can be powered via cat egory 5 networking cable when used with an 802 3af compatible power injector Both net work data traffic and power can be sent via the same category 5 wire Standard IEEE 802 30f y Class 0 12 94 Watts KDT750 User s Guide Ethernet Switch with Integrated PoE Injector KDT750 Terminals rg Database Servers Wired Infrastructure Optional Backup Battery If the KDT750 unit is equipped with an optional internal backup batter
33. or each of the standard input devices Internal Bar Code Reader External Magnetic Stripe Reader External Proximity Card Reader T KDT750 User s Guide Web Browser The KDT750 includes Links2 a built in HTTP web browser for fetching and displaying web pages The application s icon is located under the Network folder Links2 capabilities include HTML 4 0 support without CSS HTIP 1 1 support HTTPS SSL support Text or graphical mode Tables and frames in both modes Bookmarks Background file downloads Graphics Mode AMD si COMPLICATED Simpler just got cheaper Now starting at 1 495 Tho NEW enser o uso AML M7220 v Atveriang Programs Business Solutions About Google C208 Privacy KDT750 User s Guide amc a a n Text Mode Google web 1EM aps News shopping Gmail more pt Video Groups Books Scholar Finance Blogs YouTube Calendar Photos Documents Reader Sites even more gt gt iGoogle Sign in Google I Google Search I m Feeling Lucky Advertising Programs Business Solutions About Google c 2008 Privacy Basic Usage When browsing Links2 displays a navigation bar at the top of the screen and a status bar at the bottom The navigation bar will show the current web page title on the right and give a Back but ton on the left Tapping a blank area of the navigation bar will switch the bar to a normal File menu with
34. ple Configurations Chapter 6 Integrated Bar Code Scanner Overview Determining Scanner Type Linear CCD Aiming System and Decode Zones 2D Omni Scanner Aiming System and Decode Zones Triggering the Scanner Scanning Bar Codes Supported Bar Code Symbologies Obtaining and Using Scan Engine Setup Bar Codes Chapter 7 Installed Software PCDemo KDT750 Demo Bar Code Data Viewer Links2 Web Browser On Screen Keyboard VT100 220 Terminal Emulator Chapter 8 Mechanical Integration and Mounting Rear Panel Mount Points Flush Wall Mounting Angled Wall Mounting Column Post Mounting RAM Mounts Appendix A Technical Specifications Appendix B Wireless Reference Table PRE 4 KDT750 User s Guide mnc About this Document Introduction This document describes the integration and general use of the AML KDT750 price verification terminal This document is provided as PRELIMINARY ONLY and is not intended as a complete product reference AML reserves the right to make changes to this document and to any hardware software or product it describes What to Expect This user s guide provides an overall physical description built in hardware functions techni cal specifications and performance capobilities of the KDT750 terminal In addition you will learn how to Open the tamper resistant case Connect communication cables Cold boot and warm reset the KDT750
35. rt is designed for a specific function and may or may not be used deepening on the KDT750 s hardware configuration Port Number Normal Function Linux Device Name Connector Internal Bar Code dev ttySACO J19 amp J20 12 Pin FPC Flex Decoder Connectors Debug Console and User dev ttySAC1 J9 8 Pin RJ 45 Type Jack RS 232 Magnetic Stripe Reader dev ttySAC2 JP1 6 Pin Male Header The serial ports can be configured from the Driver menu of setup The ports will be config ured with these settings on boot KDT750 User s Guide a o Option pelialse igs Description aas Use Example Internal Scanner portObaud Baud rate for 9600 Internal portObaud 9600 Baud Rate internal bar code Scanner scanner Port 1 Baud portlbaud Baud rate for RJ 45 9600 port baud 1 15200 Rate RS 232 19200 38400 57600 115200 Console on porticonsole Enable debug 1 Enabled portlconsole 1 Port 1 console on RS 232 0 Disabled port Data Bits port bits Set number of data Fe port bits 8 bits for port 1 8 Parity port parity Parity setting for port 1 N No Parity port parity N E Even Parity o Odd Parity Stop Bits portlstop Set number of stop 1 portlstopz1 bits for port 1 2 Port 2 Baud port2baud Baud rate for MSR 9600 port2baud 9600 Rate 19200 38400 57600 115200 Data Bits port2bits Set number of data Fi port2bits 8 bits for port 2 8 Parity port2parity Pari
36. t be in place before the unit will power up Once powered on the KDT750 will automatically start the configured boot application From the factory the unit will load default configuration settings and boot into the KDT750 home desktop Entering System Setup The KDT750 System Setup can be accessed by pressing the two outer pushbuttons A and D at the same time After a brief delay the unit will enter into setup mode pr Main Menu System Network Drivers User lt Save amp Reboot gt JT750 Setup v2003040z Te access a menu or menu parameter tap the selection wit a stylus c 2009 American Microsystems Ltd P NOTE When using the KDT750 home Desktop as the boot application the System Setup application can also be accessed through the Settings menu Navigating Setup The KDT750 Setup Utility uses a simple menu interface for all system configuration options To access a KDT750 configuration sub menu tap the name of the menu with a plastic stylus To modify a configuration value tap the option s name When in System Setup the KDT750 unit will automatically reboot if there is no user activity for 5 minutes This prevents unauthorized access into the configuration options in the event that the operator left the unit in setup mode KDT750 User s Guide marc uM M GR n
37. to a PC for configuration upgrades and file transfer but the device should not be powered on without it properly installed and secured All KDT750 configuration files are located on the SD card KDT750 User s Guide Communications amp Input This chapter describes the communication capabilities of the KDT750 KDT750 User s Guide Network Communications The KDT750 relies on either the built in 10 100 BaseTX Fast Ethernet network adapter or the optional 802 11b g n wireless radio for communicating with a host server General network set tings and device selection is made through the network settings file or tne KDT750 Setup Utility NOTE All wireless SECURITY settings are configured in the wifi conf file described in Chapter 5 KDT750 User s Guide m E Option network settings Description ate Use Example Wired Ethernet eth enable Enable 10 100 1 Enable eth enable 1 Enable BaseTX Ethernet Port 0 Disable Wired DHCP eth_dhcp Set DHCP for 1 Enable eth dhcpzl Ethernet Port 0 Disable Wired Static IP eth ip Ethernet Static IP eth_ip 192 168 100 101 Address when eth_dhcp is set to 0 Wired Static Subnet eth subnet Ethernet eth_subnet 255 255 255 0 Mask Subnetwork Mask Wired Static eth_gateway Ethernet default eth_gateway 192 168 100 1 Gateway routing gateway Wireless Radio wifi_enable Enable 802 11 radio 1 Enable wif
38. ts the following EAP types for authentication EAP TLS EAP Transport Layer Security is the original standard wireless LAN EAP authentication protocol Although it is rarely deployed it is still considered one of the most secure EAP standards available and Wireless Reference Table the most secure EAP standards available and is universally supported by all manufacturers of wireless LAN hardware and software The requirement for a client side certificate however unpopular it may be is what gives EAP TLS its authentication strength and illustrates the classic convenience vs security trade off EAP TILS Tunneled Transport Layer Security was co developed by Funk Software and Certicom and is widely supported across platforms It was never fully ratified only drafted the draft which has since expired but is still common due to its decent level of security and easy setup EAP PEAP Protected Extensible Authentication Protocol is widely available in products and provides very decent authentication security Its method is similar in design to EAP TTLS but requires only a server side certificate to create a secure tunnel to protect user authentication PEAPVO EAP MSCHAPv 2 is what most are referring to when the term PEAP is used Behind EAP TLS PEAPvO EAP MSCHAPV2 is the second most widely supported EAP standard in the world EAP LEAP The Lightweight Extensible Authentication Protocol LEAP is a proprietary EAP method dev
39. tton A Button B Button C Button D Speaker LCD Display and Touchscreen The unit features a 5 6 Full VGA 640x480 pixels color display with an ultra bright backlight for an unsurpassed level of viewability The LCD is bonded to an industrial rated resistive touch panel for user input Buttons A B C D The device has four programmable momentary pushbutton type switches on the front case ihat can be used for special features or user input Speaker A 1 5 inch half watt internal speaker is available for programmable tonal user feedback KDT750 User s Guide Mo USB Port The KDT750 contains an optional Linear CCD or 2 Dimensional Bar Code Decoder for decoding bar codes presented under the unit The decoder s illumination lights will shine through the scanner window at all times The clear protective lens should be kept clean and free of fingerprints and grime Scanner Window Scanner Window External USB Port A diagnostic administration USB port is available on the bottom of the unit to the right of the scanner window This port can be disabled internally KDT750 User s Guide Case Mounting Tabs Case Mounting Screws Case Mounting Tabs amp Case Mounting Screws The KDT750 main outer case is held closed on the left side by two 4 40 x 1 4 screws Longer screws should not be used as damage to the internal components of the KDT750 can result Then right side of the outer c
40. ty setting for port 2 N port2parityzN E o port2stop 1 Stop Bits port2stop Set number of stop 1 bits for port 2 2 KDT750 User s Guide m M Example serial settings Linear CCD Scan Engine Debug Console on Port 1 port0baud 9600 portlbaud 115200 portlconsole 1 portlbits 8 portlparity N portlstop 1 port2baud 9600 port2bits 8 port2parity N port2stop 1 Example serial settings 2D Omni directional Imager Scan Engine port0baud 9600 port 1lbaud 115200 portlconsole 0 portlbits 8 portlparity N portlstop 1 port2baud 9600 port2bits 8 port2parity N port2stop 1 USB Communications The unit contains three user accessible USB 1 1 Full speed host ports capable of data rates up to 12 Mbps Common USB devices that can be used with the KDT750 are External Bar Code Scanner External Magnetic Stripe Reader External Keyboard USB storage devices thumb or pen drives No configuration is necessary for USB devices that are compatible with the KDT750 KDT750 User s Guide m a Digital 1 0 The KDT750 base unit contains two electrically isolated digital inputs and two electrically iso lated digital outputs Digital Outputs Micro Relays The KDT750 digital outputs are controlled via internal micro relays driven by the micro processor These relays can be used to drive external devices such as Lights and Beacons
41. uide MSR JP1 6 Pin Male Header RS 232 J9 8 Pin RJ45 Description Ground Loop to Pin 4 RXD Loop to Pin 2 TXD OlO 45V Max 0 5A RJ 45 to DB9 Wiring Diagram Pin Description 1 0 1 RXD 2 TXD o 8 CIS o 4 Ground 5 N C RTS 7 N C 8 5V Max 0 5A J9 8PBC RJ 45 Female DB KAKKO OJOJO 12345678 n KDT750 User s Guide anam ea External USB Cable JP2 5 Pin Male Header Description 45V Max 0 5A D yo D yo Ground Shield Digital I O J14 J17 Screw Terminal Block Pin 1 Device i Description Contact Normally Closed Normally Open Contact Normally Closed Normally Open High Low Low High High Low Low High Ojo o o amp o N o KDT750 User s Guide mam m External Connections The KDT750 houses a single external USB host port In high security installations this port can be disabled by disconnecting the internal cable from the port header Wiring Installation To prevent vandalism and unauthorized use all major connections to the KDT750 base unit are internally housed All wires exiting the base unit should be routed into the recessed channel through the
42. y the unit will continue to operate when all other power sources are lost Depending on the configuration and usage the backup battery should enable the unit to operate for approximately one hour When power is applied to the unit the backup battery will be automatically charged After acomplete discharge the backup battery should be charged 48 hours before use NOTE The backup battery is permanently connected to the KDT750 motherboard Do not attempt to remove the battery The KDT750 unit must be properly disposed of and the bat tery recycled when it has reached the end of its usable life Type 2 Cell Li ion Voltage 7 AV Capacity 2200mAh KDT750 User s Guide man E Main Power Switch and Power On Reset The KDT750 unit contains a main power switch that disables the unit when the rear panel is removed during servicing and installation This switch is designed as a safety measure and it is not recommended that the switch be bypassed or modified in any way To reset the KDT750 unit with power enabled hold down the middle two pushbuttons for 10 seconds or until the LCD screen goes black When the buttons are released the unit will per form a warm boot O Hold down for 10 seconds Secure Digital SD Card The internal SD card is required for normal operation of the KDT750 unit The card can be removed and connected
Download Pdf Manuals
Related Search
Related Contents
取扱説明書 - yodobashi.com Instructions d`emploi GSP5500 STB 80 - Orgapack Strapex Group SRL-579A Blacklight User Manual 2011 Nissan Navigation System Owner`s Manual (370Z, Maxima 1xxxx SCRATCHLIVE SL 1 MODE D`EMPLOI 1.8.0 Notice d`instruction 同意する(PDF:742KB) Copyright © All rights reserved.
Failed to retrieve file