[. . . ] Nokia E60 User Guide 9241264 Issue 4 DECLARATION OF CONFORMITY We, NOKIA CORPORATION declare under our sole responsibility that the product RM-49 is in conformity with the provisions of the following Council Directive: 1999/5/EC. A copy of the Declaration of Conformity can be found from http://www. nokia. com/phones/declaration_of_conformity/. The crossed-out wheeled bin means that within the European Union the product must be taken to separate collection at the product end-of-life. This applies to your device but also to any enhancements marked with this symbol. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission of Nokia is prohibited. [. . . ] · VPN policy servers -- Edit the connection settings of VPN policy servers from which you can install and update VPN policies. · VPN log -- View the log for your VPN policy installations, updates and synchronizations, and other VPN connections. Manage VPN policies To manage VPN policies, select VPN management > VPN policy > Options and from the following options: Copyright © 2006 Nokia. point -- Create a VPN access point that pairs a VPN policy with an Internet access point. If you delete a VPN policy, it is reinstalled when you synchronize your device with the VPN policy server the next time unless it has also been deleted from the server. Similarly, if a VPN policy has been deleted from the server, it is deleted also from your device upon synchronization. To manage VPN policy servers, select VPN policy servers > Options > Open and from the following options: · New server -- Add a VPN policy server. · Synchronise server -- Install new or update the selected VPN policy. · Delete server -- Delete the selected VPN policy server. To manage VPN policy server settings, select Options > Open > New server or Edit server and from the following options: · Policy server name -- Enter a new name for the server, up to 30 characters. The policy server address cannot be edited after you connect to the server to install or update VPN policies. -- Select the Internet access point to connect to the VPN policy server. · Key store password -- Change the password of the private key store. The password is created automatically when it is needed for the first time. View the VPN log Select VPN management > VPN log > Open. A VPN log records your visits to VPN servers to install, update, and synchronize VPN policies and your VPN connections. Error, warning, and information entries are indicated by an icon on the left-hand side of the entry. Report the reason codes visible in the detailed view to your system administrators as the codes help to look for causes of possible problems you may have with VPN. When the log size reaches 20 KB, the oldest log entries are deleted to make space for new entries. Select Options and from the following options: · Refresh log -- Update the log. · Clear log -- Delete the log entries. Email data roaming Select Menu > Tools > Settings > Connection > Access point groups. Your device allows roaming between wireless access technologies, such as WLAN and GPRS, for e-mail. For example, you can start an e-mail session at home and continue the session on your way to work. While your session continues uninterrupted, your handheld device switches from WLAN to GPRS and back to WLAN when you arrive at your workplace. Access point groups 1. To create an access point group, select Access point groups > Options > New group. [. . . ] Areas with a potentially explosive atmosphere are often, but not always, clearly marked. They include below deck on boats, chemical transfer or storage facilities, vehicles using liquefied Potentially explosive environments Copyright © 2006 Nokia. All Rights Reserved. 93 Additional safety information petroleum gas (such as propane or butane), and areas where the air contains chemicals or particles such as grain, dust, or metal powders. Emergency calls To make an emergency call: Important: Wireless phones, including this device, operate using radio signals, wireless networks, landline networks, and user-programmed functions. You should never rely solely on any wireless device for essential communications like medical emergencies. 1. [. . . ]