Specifications
PERFORMING DOWNLOADS
Back-to-Back Application Downloads
136 VX 520 REFERENCE GUIDE
Checklist for Effects
on Files and
Settings in the
Receiving Terminal
Back-to-Back
Application
Download
Procedure
The back-to-back application download process consists of two main phases:
1 Preparing a Gold VX 520 terminal (transfers application files to the Target VX
520 terminal).
2 Downloading application files from the Gold terminal to a properly configured
Target terminal.
Prepare Gold Terminal (PC-to-Terminal)
1 Configure the host PC for an application download operation to the Gold
terminal:
• Set the *FA variable (if present in the application) to 1.
• Ensure that all certificates, *p7s files, applications, and other required
files are present.
• Ensure that the download is exactly what you want your Target terminal to
receive.
2 Configure the Gold terminal to receive an application download from a PC:
• From VERIX TERMINAL MGR MENU 2, set Group 1 and COM1 as the port to
receive the download.
3 Connect a cable between the RS-232 serial ports of the PC and the Gold
terminal.
4 Initiate the file transfer on the PC.
5 From VERIX TERMINAL MGR MENU 2 on the Gold terminal, select either a full or a
partial download.
A back-to-back application download overwrites existing applications, libraries, or
any other files stored in the RAM of the receiving terminal.
All CONFIG.SYS records and settings on the receiving terminal—protected and
non-protected—are replaced by those of the sending terminal. Ensure that these
records and settings on the sending terminal are correct before initiating the
download.
Passwords on the receiving terminal are retained.
Certificates and signature files downloaded to the receiving terminal, together with
application files, must be processed by the file authentication module on the
receiving terminal on terminal restart after the back-to-back download completes.
The OS software on the receiving terminal is not affected by a back-to-back
application download.
Note: OS files cannot be downloaded in a back-to-back operation.
An application upload does not overwrite the existing certificate tree on the
receiving terminal. Any downloaded certificate files are authenticated and then
added to the tree.