• fts4bt user manual

    fts4bt user manual

    Download Link: ➡ fts4bt user manual



    File Name: fts4bt user manual.pdf
    Size: 4899 KB
    Type: PDF, ePub, eBook
    Category: Book
    Uploaded: 13 May 2019, 23:52 PM
    Rating: 4.6/5 from 718 votes.


    Last checked: 11 Minutes ago!









    ⬆ LINK ⬆




















    In order to read or download fts4bt user manual ebook, you need to create a FREE account.

    eBook includes PDF, ePub and Kindle version



    ✔ Register a free 1 month Trial Account.
    ✔ Download as many books as you like (Personal use)
    ✔ Cancel the membership at any time if not satisfied.
    ✔ Join Over 80000 Happy Readers


    Book Descriptions:

    fts4bt user manual

    Bluetooth Device Use virtual sniffing instead of rudimentary hex dumps and traces. Your Bluetooth application FTS4BT Analyzer COM Interface 34 35 Scatternet Solution Low cost solution with multiple Bluetooth ComProbes. No restriction on sniffing additional Piconets. High Speed UART Option (EDR UART HCI sniffer hardware). Wi-Fi Option (WiFi hardware to monitor Bluetooth-WiFi co-existence). Bluetooth Low Energy Wireless Technology (separated device). ( Formally known as ULP). Unicast Connectionless Data (UCD). Enhanced Power Control. Numeric Data throughput readout for Average and Live (1 second window) payload. Wi-Fi and Bluetooth channels identified on a single display. Full, stand-alone Wi-Fi decoding and protocol analysis. Detachable antenna to enable conductive capture of Wi-Fi data. Data Throughput stats enable you to monitor Data Throughput activity (average or instantaneous) on Bluetooth and Wi-Fi simultaneously.COMBINING BlueZ AND THE MODERN VEHICLE.Pros and cons in wireless networks Embedded Wireless Hardware Its components must be recycled or disposed apart from each other. Otherwise contaminative Bluegiga Technologies assumes no responsibility for Technical Brief 20100202 from Missing Link Electronics: Harder when development-cycles of the connection partners significantly differ, Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07. For a Bluetooth sniffer, such as the ComProbe The requirements are expressed The stack has limited support for Bluetooth applications compared to other Windows-based Why is Wireless Security Different. There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, Introduction. Association vs. Security Host Stack Implementation.

    • fts4bt user manual, fts4bt user manual pdf, fts4bt user manual download, fts4bt user manual free, fts4bt user manual online.

    Bluetoothlow energy Time Page 110 and 111: Figure 51. Message Sequence Chart W Page 120 and 121: When you select Show all Layers, th Page 122 and 123: Figure 66. Set Condition Dialog in Page 170 and 171: The box on the right is the Named F Page 172 and 173: Figure 101. Save As Dialog 4. Enter Page 180 and 181: 6.4.2 Exporting a File with Event D Page 182 and 183: 7. If you select.csv as the file t Page 184 and 185: You can accept these values, or you Page 186 and 187: 7.1.1.5 Advanced System Options The Page 188 and 189: Figure 111.Thank you, for helping us keep this platform clean. The editors will have a look at it as soon as possible. Single Tab Protocol filtering. Protocol visibility in a selected frame. Includes Frontline s DecoderScript 13 14 Decode Pane Summary Pane Frame Display 14 15 User-defined Protocol Decoding Vendor Extensions are easily Decoded with Frontline s built-in DecoderScript. Enable CESL users to decode and debug IEEE level protocols that are run over CESL. CESL is more than 500 modules of member-written source code that is being completed by LNI. The latest release of the Continua Enabled Source Code Library (CESL), or Vendor Assisted Source code, is now available to the membership. Helps members accelerate their product production, decreasing the time to market and saving Continua member companies more than 400,000 in product development. Not dedicated to a specific device Can be downloaded by all Continua member companies. Simply select the USB device to be sniffed. Packet details available on Pop-up box when pointer slide over packet. 30 31 Packet Timeline Feature Colour Coded Packet Type Pop-up Box available when Pointer slid over packet 31 32 Filter for Decoded Fields Right Click on any Decoded Field to create Filter tab Or separate screen 32 33 Filter set up Filter conditions Rename Filter Tab. Set Filter Conditions Dialogue Box 33 34 Sniffs Virtually The Live Import feature permits any application to feed data into FTS4BT.

    Decodes and displays multiple protocol layers of multiple data frames simultaneously. Detects and displays protocol errors (in red) in real time. The Wi-Fi Option pin-points coexistence issues and payload efficiency. The Frontline Bluetooth protocol analyzer, even though it is also decoding the Baseband, is orientated to the software development of the higher layers. Baseband is of minor importance there, all efforts go to the software application around this chip and that s the field of main application and strength of Frontline s Bluetooth protocol analyzer. For application debugging, FTS4BT is used as a tool to figure out what is going on with the messaging in real time. FTS4BT is being used also for verification. Bluetooth SIG (Special Interest Group) designates specialized organisations as a BQB (Bluetooth Qualification Body). In order to qualify a Bluetooth product (this could be a chip, mobile phone, PDA etc.) the BQB will verify the received documentation (they call this evidence) that shows that the product functions and conforms to the Bluetooth spec. FTS4BT is used to produce this documentation by capturing the traffic and then prepare the evidence for the BQB. FTS4BT s architecture enables quick release of new decoders as protocols are announced by the Bluetooth SIG. The user can rapidly develop and seamlessly integrate Vendor Extension decoders using the built-in FrameDecoderTM feature. These two elements are connected by the HCI (host controller interface). The controller with the LMP (layer3 link manager protocol) incorporates the Baseband and Physical layer (Bluetooth -radio). Many Bluetooth devices give physical access to the HCI (three wires) e. g. via a serial interface. 3 4 Bluetooth device with access to serial Host controller Interface HCI Embedded Bluetooth Device Link Mgr. Host CPU HCI Controller RF Baseband Link Contr.

    White paper Host Stack Implementation White paper Ericsson Technology Licensing June 2004 Contents 1.Abstract 3 2. Introduction 4 3. Scatternet user case 5 4. Interoperability Bluetooth Air Interface Bluetooth March 2010 www.marvell.com Chaitanya Misal Vamsee Krishna Data Services Manual This installation guide describes how to install the USB driver included in the Icom product s CD. If All rights reserved. Kinivo is a trademark of Kinivo LLC. Bluetooth word mark and the Bluetooth logo are registered trademarks of Bluetooth February 2008 Valerio Moretto Slide 1 Is your mobile phone calling Russia. Many users don t know how easy it is for an attacker UMTS Diagnostic Monitor and Test Automation Tools Communicate to the UE device Two Products in one Complete Solution. White Paper Please read this installation guide before installing the USB driver into your PC that is connected to the USB (Universal Serial This manual applies to Local Playback software, please read it carefully for the better use of this software. The contents in this manual are subject By widely compatible with most popular telephony communication From consumer devices to industrial applications, there is a growing Chapter 9 Communications and Networks BlackBerry 10 devices managed by BES10 with Users s Guide It is located on the Portlock There were good reasons to use Bluetooth for this application. First, we've had customer requests for a way to locate the computer farther from the firearm, on the other side of To use this website, you must agree to our Privacy Policy, including cookie policy. Captures, decodes, displays, and filters in real time. Data is decoded at the frame, byte, and bit levels, which permits users to rapidly detect and isolate even the most minute and intermittent protocol-related problems. Continuous direct logging to disk with unlimited file size for data and speech (WAV file). Sniffs in the air and serial HCI simultaneously, with synchronized time stamping.

    ECDH provides a very high degree of strength against passive eavesdropping attacks. Active eavesdropping, also known as man-in-the-middle (MITM) attack, is protected with a 1 in chance with simple pairing. 5 6 Decryption process Version 2.0 FTS4BT must compute the same link key being used by the devices being sniffed. After FTS4BT has calculated the link key, it is capable to decrypt data successfully. Version 2.1 Secure simple pairing messages are captured but FTS4BT cannot compute the ECDH link key from the data in the messages. This means that any encrypted data will not be automatically decrypted. Bluetooth SIG recommends to the chip producer to implement a debug mode, which can be activated just for error checking.this is unsecure but allows FTS4BT and other equipment to decode the protocols. Alternatively, FTS4BT can decrypt messages if the link key is provided by the user during the capture process. Multiple Protocol Layers within multiple data frames Protocol Navigator Window: presents decodes of multiple protocol layers within multiple data frames. Simplifies the process of understanding the complex relationships between multiple data frames and the protocol layers that comprise the frames. 1. Protocol Selection Pane: enables you to view only data frames that contain selected Bluetooth protocols. 2. Protocol Suppression Pane: enables you to suppress selected protocols within the Bluetooth data frames. 3. Frame Filter Pane: enables you to select predefined filter conditions that include or exclude specific data frame types. 4. Protocol Decode Pane: displays one or more decoded data frames, with text-based explanations of the various protocol elements. 6 7 User Data, from the frame level to the bit level Frame Display Window: presents various views of user data, from the frame level to the bit level, including a detailed decode of a user-selected data frame using a layer-by-layer tree structure.

    Radio HCI Applications higher layer RFCOMM SDP L2CAP Serial HCI air sniffing via the USB dongle FTS4BT protocol analyzer software decoding simultaneously in real time FTS4BT can be connected to the HCI of the device via a RS232 port, via USB or virtually to analyze commands and events between these Bluetooth elements. At this point it can be checked if the application profiles and the serial emulation to the L2CAP (logical link control and adaption protocol) inside of one Bluetooth device is correct. In an active Piconet, where at least two Bluetooth devices (one master, one or more slaves) interact with each other, the USB dongle is air sniffing the communication between those. This analysis is required to check interoperability of Bluetooth devices from different vendors and to troubleshoot problems by detailed protocol decoding. 4 5 Pairing Bluetooth devices on an encrypted link share a common link key in order to exchange encrypted data. The pairing process is the sequence of events used to create this key, as shown in the Link Manager Protocol below. The slave acknowledges that it has accepted the number in frame 8. In frames 9 and 10, the combination keys are passed between master and slave. This is the random number that has been encrypted by using the calculated link key. When the encryption mode request is accepted, encrypted data can start to be sent. Simple Pairing in BT version 2.1 The goal of simple pairing is to simplify the pairing process for the user and at the same time ensure the security in Bluetooth wireless technology. The maximum security in version EDR or earlier is achieved when applying the 16 character alphanumeric PIN. The difficulty for an attacker to calculate the secret link key is the same for simple pairing but easier for the user as the protection with simple pairing is independent of the length of the PIN code. Simple pairing uses Elliptic Curve Diffie-Hellman (ECDH) public key cryptography.

    Error Detection Detects and displays protocol errors (in red) in realtime. Packet Timeline chart indicating packet type, retransmitted packets, error type and throughput over time. Search criteria include: Byte Level: timestamp, errors, and patterns (patterns include wildcard characters at the bit level, nibble level, and byte level); Frame Level: frame decodes can be searched on the text of the decode, with or without wildcards. Display Filters Display Filter parameters include protocol, data pattern, and an advanced mode for complex filters. Statistics Display Provides session totals for characters, frames, events, errors, characters per second, and percentage utilization. Data Transmission (serial HCI only) Data strings and files can be transmitted one time, multiple times, or continuously. Data transmission delays can be inserted in millisecond, second, or minute increments. Timestamping Sniffs data in three modes simultaneously, with synchronized timestamping. Provides both absolute and relative displays of event timing. Calculates time intervals between events (delta time) and data rate. Microsecond resolution. Supports user-definable protocol stacks. Help Comprehensive online help provides complete operating instructions. Quick Start Guide enables rapid product set-up and operation. FrameDecoder Quickly create custom decoders for proprietary protocols and Vendor Extensions. Air Sniffing Air interface is a small lightweight USB dongle. Any Windows PC (except NT and 95) with a USB port and 64 MB RAM. Virtual Sniffing Any Windows PC with 64 MB RAM. Serial HCI Sniffing Supports HCI UART (H4) and BCSP. Up to Kbps using any Windows PC with two serial ports and 64 MB RAM. FTS monitoring cables included. Up to 921 Kbps with optional PCI or PCMCIA card. Supports board-level (TTL) voltages with optional TTL to RS-232 converters. Timestamps are synchronized over all three operation modes.

    11 12 FTS4BT Wi-Fi option Data Throughput stats enable to monitor Data throughput activity on Bluetooth and Wi-Fi simultaneously. A common graph assures that the application is operating at its intended efficiency. Packets are displayed by channel, in real time, timestamped and color coded. Combined capture log with full WiFi decoding and protocol analysis. Order numbers: FTS for Bluetooth for a single user with twice hardware (ComProbe dongles) and software, warranty and one year software care (Premium maintenance) The main ComProbe can be used on any PC with the installed software. The secondary ComProbe only works in conjunction with the main ComProbe.Two Products in one Complete Solution. White Paper Pros and cons in wireless networks Embedded Wireless Hardware Bluegiga Technologies assumes no responsibility for It is universal, open and an easy to use protocol. Modbus has COMBINING BlueZ AND THE MODERN VEHICLE.Wide Area Network (WAN) emulation, by simulating Wireshark is a free opensource network protocol analyzer. Technical Brief 20100202 from Missing Link Electronics: Harder when development-cycles of the connection partners significantly differ, The requirements are expressed Default Login Details. Version 1.00 Edition 1, 4 2014 For a Bluetooth sniffer, such as the ComProbe Please read this manual before you install the In addition to programming and debugging support through Atmel The link between DVI This chapter contains the following topics: Topic Page Its components must be recycled or disposed apart from each other. Otherwise contaminative All rights reserved worldwide. No part of this document may be reproduced by any Major VoIP Protocols 15 The major VoIP protocols Quick Start Guide Version 3.62 (XD.0) May 2004 Troubleshooting WLAN Connectivity. Technical White paper Wireless LAN. Wireless LAN disadvantages.

    The protocol decode presents text-based descriptions of the protocol-related information resident in each data frame. 1. Summery Pane: displays a high level overview of each Bluetooth data frame, including all significant fields associated with the selected protocol layer. 2. Frame Display Decode Pane: displays a single decoded data frame at levels of detail ranging from the frame level to the bit level. 3. Data Panes: display Bluetooth data in various formats, including binary, hexadecimal, and characters. 4. Selected Data Detail Section: provides protocolrelated information pertaining to user-selected portions of the data frame. Window Duplication: the Duplicate Button creates a second window that is identical to the first. Duplication enables you to view two segments of the data stream simultaneously, or to compare identical data streams with different filter conditions applied. Data at the byte level Event Display Window: used to monitor and analyze data at the byte level, and to conduct searches for data patterns. 1. Byte Display Panes: display data flows among Bluetooth devices, in various formats, at the byte level. 2. Selected Data Detail Section: provides protocol-related information pertaining to userselected, multi-frame portions of the data stream. 7 8 Window Synchronization Window Synchronization: the Protocol Navigator, Frame display, and Event Display Windows are synchronized. Selecting information in any of these windows highlights the same information in the other two windows Packet Error Rate Analysis Graphically viewing the packet error rate on all 79 channels at the same time provides immediate insight into baseband performance. The graph on the right top corner shows the complete throughput and there the desired time slots can be selected, which are shown in detail on the main window. Master and slave packets are separated and in different colors according to the packet type ACL, SCO, esco, LMP, FHS, Null and Poll.

    Further details are also colour coded as retransmitted, decoding error, header error, payload CRC error and discontinuity. With a click on the packet of interest you see the decoded packet content for analysis. Channel Map From the FTS4BT Datasource window the view of the 79 Bluetooth channels can be selected. The used channels for the actual Bluetooth Connection are shown in blue; the other available channels are green. In a disturbed environment, caused e.g. by a microwave oven in the neighbourhood or WLAN occupation of certain channels, Bluetooth will avoid those frequencies in the hopping scheme. Those channels are unavailable and will be indicated in red. 9 10 Technical Description Data Capture Modes Sniffs data in three modes simultaneously, with synchronized timestamping: Through the air via an attached device called the Bluetooth ComProbe, which connects to the USB port on the host PC. From the serial HCI interface between a Bluetooth Host CPU and a Bluetooth Host Controller (Bluetooth Device). Piconet Synchronization Methods Master Inquiry. Slave Inquiry. Passive Slave Page. Data Capture Captures, decodes, displays, and filters in realtime. Supports full piconet data capture. Captures, decrypts, and analyzes encrypted data. Captured data includes data bytes and error conditions. Data can be captured to RAM or directly to disk. Capture buffer sizes are limited only by available memory or disk space. Data Displays Data can be analyzed in realtime using the Event Display, Frame Display, Signal Display, Protocol Navigator, and Statistics Windows. Data can be analyzed simultaneously in each of the product's three operating modes: air, serial HCI, and Live Import. Multiple synchronized windows can be viewed simultaneously. Byte level information is displayed in either a split-line format, or in a mixed format. Characters can be displayed in ASCII, EBCDIC, or Baudot. Nonprintable characters are displayed using hex and mnemonics.

    Wireless LAN disadvantages WLAN: The global goal is to replace office cabling and to introduce This course on Data Communication Network Side ADSL CPE. Transparent ADSL Data Recording. RS-232 Introduction BobCAD-CAM includes software for both sending and receiving and running The Gigabit Ethernet test module To carry out this Definitions! Implemented commands. Examples of commands or frames. Calculating the logical area. Reading a signed variable. Example of commands supported ACCESS meters are compatible with Modbus networks as both slaves and All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, User Guide Network Architecture. Protocols. Contents Introduce the OSI seven layer reference model. Introduce the concepts of internetworking LOG Storm is a high-speed digital data logger used for recording and analyzing the activity from embedded electronic systems digital bus and data lines. It The two different Bluetooth Air Interface Bluetooth To use this website, you must agree to our Privacy Policy, including cookie policy. Discover everything Scribd has to offer, including books and audiobooks from major publishers. Start Free Trial Cancel anytime. Report this Document Download Now Save Save FTS4BT Datasheet For Later 0 ratings 0% found this document useful (0 votes) 75 views 2 pages FTS4BT Datasheet Uploaded by ankitjain123456 Description: Full description Save Save FTS4BT Datasheet For Later 0% 0% found this document useful, Mark this document as useful 0% 0% found this document not useful, Mark this document as not useful Embed Share Print Download Now Jump to Page You are on page 1 of 2 Search inside document. Live ImportContents. Chapter 1 Introduction to Live ImportFigure 2.1 - Frontline ComProbe Development Tools DirectoryTable 1.1 - Live Import Development Kit Data Source SamplesChapter 1 Introduction to Live Import.

    The Live Import capability of the Frontline ComProbe software provides an open interface that allows anyFrame Display and Event Display. When used in conjunction with DecoderScript, the protocol decodingCommon data communications and protocol analyzers acquire their data from a specific piece of hardware. Live. Import is hardware independent—if a Windows application program, or device driver, can be written to acquireThe key to Live Import is having access to the data stream. Many embedded systems have “logging ports” that will. The logging device may be connected byA Windows application program could be written to act as the receiver forIn some cases there is no need for “sniffing” hardware at all. In a data communications system, various pieces ofLive ImportWhen used in this way, Live Import is referred to as “Virtual Sniffing.” Virtual Sniffing can be added to just aboutOnce added, the full power of the ComProbe protocol decodingMicrosoft Windows provides a number of different ways to tap into the flow of messages between applications,For example, at the device driver level, “filter drivers” can beThe filter driver passes everything that itWhile the driverVirtual Sniffing is also applied to areas beyond the realm of data communications. Many communicationsBecause Live Import is not tied to a specific piece of hardware, an applicationVirtual Sniffing could then be used to read the disk file and forward the data into ComProbeAt it’s simplest, Live Import can be added to an existing application by adding five function calls to the Live Import. API and one function call to the Windows API.Live Import APILoadInitializeSendCloseClean. Windows APIFreeBefore the Live Import API functions can be called, the API dll and functions need to be loaded.Before data can be sent to the ComProbe software, the client side of Live Import needs to be initializedLive Import provides a number of function calls for sending information into ComProbe software.

    The mostWhen done, the client side of Live Import disconnects allowing shared resources to be freed and other cleanup toAfter the API is released, the function pointers need to be reset to NULL. NullLiveImportFunctionPointers();Prior to exit from the data source, the global handle to LiveImportAPI.dll should be freed.Another commonly used Live Import API feature allows the application program to generate customized statisticalThe tables appear automatically on the ComProbe software Statistics View.There are five Live Import Samples provided with the Live Import Development Kit. Your Data Source will likely beThe easiest way to begin is to start with one of these samples andTable 1.1 - Live Import Development Kit Data Source Samples. Name. Language. Frame or Byte. GUI Sample. Frame with comments. GUI Sample Byte Oriented. Byte. Wrapper Sample. Frame. Straight C SampleStraight C Sample Byte OrientedThe Live Import Developer Kit is delivered with your ComProbe software that you installed on your computer. Installation of the developer kit is an automatic process. Figure 2.1 - Frontline ComProbe Development Tools Directory. Double click on the Live Import Developer Kit.exe file and the installation will begin. If you have multipleFigure 2.2 - Select Location to Install Live Import Developers Kit. Upon successful installation a notice will appear. Select No and the window will close. Installation is complete. Figure 2.3 - Successful Installation NoticeAs the writer of the Data Source you will have to perform the following steps. Additional details follow. The termImport Developer Kit directory.It is best not to move it. If for someLiveImportAPI.dll.Note: Redistribution of an application that uses Live Import to transmit data to ComProbe. Software requires LiveImportAPI.dll must be part of the distribution package. LiveImportAPI.dllSource. Figure 3.1 - Liveimport Component Relationships to ComProbe SoftwareLiveimport.

    ini is used to provide common connection and configuration information when using the Live Import. There are two sections of information. ComProbe software and a Live Import Data Source to find each other. This string is of your choosing but note that. Live Import Data Source. Details of this string appear in The Configuration String on page 9.Source. The Data Source should read the data from this file and convert the configuration string into the form you see in. Example on page 9. All of the samples in the Live Import Developers Kit do this and you may simply copy andThe configuration string is a long string of text containing lines of descriptive information that specifies theThe format is basically the Windows.INI file format.The string is in single-byte ASCII format.The format of the string is similar to a section in an INI file. That is, the first line may be a section headerAll numbers can be expressed either in decimal or in hex by using the prefix “0x”. All strings that contain a comma or a semicolon must be enclosed in double quotes. Double quote charactersSemi-colons separate all of the items in a list, and if there is more than one field in an item, the fields areUnrecognizable items will be assumed to be future expansions, so will be ignored. Be sure that the items youExample. List of ElementsIf a list of items is required, they must be separated by a semicolon.If there is a compound item requested, the item must be separated by a comma.If a string contains a semicolon or a comma, it must be enclosed in quotes.The configuration string elements in this section are required or highly recommended.For backwards compatibility, a version number is part of the configuration string. The version allows ComProbeIf the currentSource. If the configuration string does not begin with the version, it will be rejected. This is the only reason aOtherwise a section header is not needed.You can control two ComProbe software Control window elements.

    WindowTitle string is displayed at the topIf you skip these items, the Control window fields will be blank.Data may be received from more than one device at a time. This occurs, for example, in normal two-way serialIn addition, if you want ComProbe software to calculate and display utilization information, you need to tell it whatThere are two forms of the side statement. The first form sets each side to a maximum of 115200 bits per second. The second form indicates that ComProbeIf there is only one side,a logical name is not necessary. The statement must still be present, though, with anFor instance, a 10-megabit EthernetIf this statement is omitted, then ComProbe software will use one side, unnamed, with no throughput. If more than two sides are declared, only the first two will be used.The Configuration string optional elements provide the ability to set data units, flags, protocol stacks, and to createThe basic unit of data -- bytes, octets, etc -- is referred to in ComProbe software as a Single Data Event (SDE). ThisIf this statement is omitted, ComProbe software will default to “Chars”SourceEach data event can have up to 32 flags associated with it. These are called Data Related Flags (DRFs). The flags canIn serial communications, theFraming, etc. A handy use for DRFs is to communicate status or type information to ComProbe software without having toThe sample applications for example send the type of the message toThe DRFs are available to the protocol decoders; so, a decoder can be written to learnThe names you give the DRFs are used in the Event Display. They will appear in the Errors section of the statusIn order to see the flags, however, youThe DRFs are stored with each event as a low order justified bit map. That is, the first one defined is stored asThe default is to have no DRFs. In addition, ComProbe software needs to know whetherDisplay and can be searched for. This item is a bit maskThe default mask is 0x0.


  • Commentaires

    Aucun commentaire pour le moment

    Suivre le flux RSS des commentaires


    Ajouter un commentaire

    Nom / Pseudo :

    E-mail (facultatif) :

    Site Web (facultatif) :

    Commentaire :