User's Manual
Table Of Contents
- VX 675
- Contents
- Preface
- Terminal Overview
- Terminal Setup
- Selecting Terminal Location
- Unpacking the Shipping Carton
- Examining Terminal Features
- Examining Connection Ports
- Installing the Paper Roll
- Installing the SIM Card
- Installing the SD Card
- Using the Battery
- Battery Behavior (No Power Pack)
- Connecting the Terminal Power Pack
- Charging the Battery
- Using the VX 675 Base Stations
- Powering Up the Base
- Docking the Terminal on the Base
- Undocking the Terminal from the Base
- Conducting Wireless Transactions
- Conducting Smart Card Transactions
- Using the Magnetic Card Reader
- Connecting to USB Host
- VX 675 ECR (Fiscal Module) Support
- VX 675 3G and GPS Support
- Using the Terminal Keys
- Verix Terminal Manager
- File Authentication
- Performing Downloads
- Downloads and Uploads
- Download Methods
- Download Tools
- Download Content
- Full and Partial Downloads
- Support for Multiple Applications
- Use of I: drive and F: drive
- File Authentication Requirements
- Required Certificates and Signature Files
- The File Authentication Process During an Application Download
- File Group Permissions
- Download an Operating System Update Provided by VeriFone
- File Authentication for Back-to-Back Application Downloads
- Timing Considerations Due to the Authentication Process
- Support for File Compression
- Effect of Downloads on Existing Files and Data
- Direct Operating System Downloads
- Back-to-Back Application Downloads
- Specifications
- Maintenance
- VeriFone Service and Support
- System Messages
- Troubleshooting Guidelines
- Port Pinouts
- ASCII Table
- VX 675 Battery Information
- Glossary
- Application ID
- Application program
- Application prompt
- ASCII
- Back-to-back application download
- Baud
- Bit
- Block
- Boot loader
- Buffer
- Byte
- Calendar/clock chip
- Card reader
- Carrier
- Certificate
- Character
- CONFIG.SYS file
- CPU
- Data
- Data entry
- Data packet
- Default
- Delete
- Diagnostics
- Direct download
- Display
- Download
- File authentication
- Firmware
- Fixed prompt
- Flash memory
- Host computer
- Input
- Interface
- Keyed file character set
- Keyed file editor
- Keyed file record
- Keypad
- Local functions
- Manual transaction
- Memory
- Messages
- Non-volatile memory
- Normal Mode
- Packet
- Packet-switched networks
- Parameter
- Password
- PC
- Peripheral terminal
- Port
- POS terminal
- Power pack
- Prompt
- Protocol
- PTID
- RAM
- Remote host computer
- Scroll
- Search key
- Serial port
- Signature file
- mDRAM
- Subroutine
- Swipe
- Verix Terminal Manager
- Verix Terminal Manager password
- Terminal
- Terminal ID
- Terminal-to-terminal application upload
- Track 1, 2, or 3 data
- Transaction
- Variable
- Volatile memory
- Index
- Contact VeriFone
VERIX TERMINAL MANAGER
Verix Terminal Manager Menus
VX 675 R
EFERENCE GUIDE 65
Menu 2
In this menu, you can view the terminal configuration information, change system
passwords, perform remote diagnosis, view error and tamper logs, update time
and date, load IPP key and adjust display contrast. Some application program
downloads automatically reset the system password.
Edit Keyed Files A keyed file is a collection of individual records that contain ASCII data and are
identified by unique search keys. You can edit the ASCII data directly from the
terminal keypad using the terminal’s built-in keyed file editor by selecting option 2,
EDIT PARAMETERS, on the first VTM menu. Each record has two parts: a key name
and a key value. The search key is a variable-length string of up to 32 characters
in length, or key name, that identifies the record. The information assigned to the
search key is contained in a separate variable-length string from 1-128 characters
in length, or key value.
For example, in CONFIG.SYS, the key name for the application serial ID number
is *ZT. The value for the key is the actual application ID number. By entering *ZT
using the editor, the terminal can quickly locate the application serial ID number.
You can also use
ENTER to scroll through the search keys instead of entering the
characters *ZT through the keypad. The keys are displayed in the order in which it
has been entered, not in alphabetic order.
CONFIG.SYS: Protected and Non-protected Records
The concept of protected and non-protected records applies only to the
CONFIG.SYS files in your terminal. Protected records are those with search keys
beginning with an asterisk (*) or a pound/hash symbol (#).
Protected records in the file Group 1 CONFIG.SYS file are retained in a full
application download and when memory is cleared. Non-protected records are all
other CONFIG.SYS files, and records of other files. These records are deleted
when memory is cleared.
Editing CONFIG.SYS with an External Editor
You can create and edit the CONFIG.SYS files of VX 675 applications through an
IBM PC-compatible computer when you download files to the terminal. For more
information on editing an application’s CONFIG.SYS file, refer to the VeriCentre
Reference Manual and the Verix eVo Volume I: Operating System Programmers
Manual (VPN
DOC00301), or contact your local VeriFone representative.
NOTE
For a complete list of the ASCII characters supported by the VX 675 series, as
well as their decimal and hexadecimal equivalents, please refer to ASCII Table.