User Manual
Page 4
.... GOVERNMENT USERS - RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is unable to accept this Program under Rights in ... subject to the GSA ADP Schedule contract with RESTRICTED RIGHTS. All rights reserved. Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then we provide this information and the product it supports, read...
.... GOVERNMENT USERS - RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is unable to accept this Program under Rights in ... subject to the GSA ADP Schedule contract with RESTRICTED RIGHTS. All rights reserved. Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then we provide this information and the product it supports, read...
User Manual
Page 10
ThinkVantage Personal Computing Support page http://www.lenovo.com/think/support Go to this Web page to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Access Connections home page http://www.pc.ibm.com/us /think... page http://www.pc.ibm.com/us /think /thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Personal Computing Support - ThinkVantage Access Connections resources on the World Wide Web The following Web pages provide resources for access to download the latest...
ThinkVantage Personal Computing Support page http://www.lenovo.com/think/support Go to this Web page to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Access Connections home page http://www.pc.ibm.com/us /think... page http://www.pc.ibm.com/us /think /thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Personal Computing Support - ThinkVantage Access Connections resources on the World Wide Web The following Web pages provide resources for access to download the latest...
User Manual
Page 11
...specify in different locations. v Support for Vodafone HSDPA/WCDMA Communication Manager software. By switching between location profiles, when moving their computers from a specific location such as home or work. Note: For WAN connection service, Access Connections provides an integration with any ... 1xEV-DO Network Adapter for Verizon Wireless WAN service v Support for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Virtual Private Networking (VPN) connections are needed to connect to a network infrastructure from place to place, users can be...
...specify in different locations. v Support for Vodafone HSDPA/WCDMA Communication Manager software. By switching between location profiles, when moving their computers from a specific location such as home or work. Note: For WAN connection service, Access Connections provides an integration with any ... 1xEV-DO Network Adapter for Verizon Wireless WAN service v Support for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Virtual Private Networking (VPN) connections are needed to connect to a network infrastructure from place to place, users can be...
User Manual
Page 13
...the network configuration required to connect to a desired network, along with other settings that are location-specific, such as your computer from place to place, Access Connections can quickly and easily connect to Access Connections window is your network connectivity at multiple ...locations through location profiles. By switching between location profiles as you to Access Connections window © Lenovo 2006. Portions © IBM Corp. 2006. 3 Figure 2. To create a new location profile, do the following: 1. Chapter 2. ...
...the network configuration required to connect to a desired network, along with other settings that are location-specific, such as your computer from place to place, Access Connections can quickly and easily connect to Access Connections window is your network connectivity at multiple ...locations through location profiles. By switching between location profiles as you to Access Connections window © Lenovo 2006. Portions © IBM Corp. 2006. 3 Figure 2. To create a new location profile, do the following: 1. Chapter 2. ...
User Manual
Page 19
... adapter from the table and then click Higher or Lower. Using location profiles 9 When more than one network adapter has access to a network at your computer support this type of network connection to create a profile that will attempt to use. Best Available Network Choose this type of network connection, and show...
... adapter from the table and then click Higher or Lower. Using location profiles 9 When more than one network adapter has access to a network at your computer support this type of network connection to create a profile that will attempt to use. Best Available Network Choose this type of network connection, and show...
User Manual
Page 20
Access Connections will be used only to connect to a Wired LAN (Ethernet). Figure 11. Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide
Access Connections will be used only to connect to a Wired LAN (Ethernet). Figure 11. Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide
User Manual
Page 21
Using location profiles 11 You can configure the settings for authentication and encryption. Figure 12. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Create New Profile-Wireless LAN (802.11) Chapter 2. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Using location profiles 11 You can configure the settings for authentication and encryption. Figure 12. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Create New Profile-Wireless LAN (802.11) Chapter 2. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 22
... Broadband (DSL or Cable Modem) 12 ThinkVantage Access Connections 4.1: User's Guide Figure 13. Access Connections will automatically determine which adapters in the table. If your computer will be used only to connect to wired broadband. The broadband connections are DSL, cable modem, and ISDN. Typically, your broadband connection is DSL, you... to the broadband network through an Ethernet adapter. Wired Broadband (DSL or Cable Modem) Choose this type of network connection, and show them in your computer support this type of network connection if the profile will connect to use.
... Broadband (DSL or Cable Modem) 12 ThinkVantage Access Connections 4.1: User's Guide Figure 13. Access Connections will automatically determine which adapters in the table. If your computer will be used only to connect to wired broadband. The broadband connections are DSL, cable modem, and ISDN. Typically, your broadband connection is DSL, you... to the broadband network through an Ethernet adapter. Wired Broadband (DSL or Cable Modem) Choose this type of network connection, and show them in your computer support this type of network connection if the profile will connect to use.
User Manual
Page 23
Access Connections will be used only to connect to a cellular phone. Creating New Profile-Dial-up . Using location profiles 13 Dial-up (modem or cellular phone) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2. Examples of network connection, and show them in the table. Figure 14.
Access Connections will be used only to connect to a cellular phone. Creating New Profile-Dial-up . Using location profiles 13 Dial-up (modem or cellular phone) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2. Examples of network connection, and show them in the table. Figure 14.
User Manual
Page 24
... for Ethernet. 14 ThinkVantage Access Connections 4.1: User's Guide Wireless WAN connections require a service subscription to use. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you can enable optional IEEE 802.1x authentication (EAP over LAN). Creating...
... for Ethernet. 14 ThinkVantage Access Connections 4.1: User's Guide Wireless WAN connections require a service subscription to use. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you can enable optional IEEE 802.1x authentication (EAP over LAN). Creating...
User Manual
Page 26
Click OK. 12. The wireless network configuration window appears. then enter the authentication settings provided by your computer and display the names of those being broadcasted by preventing multiple simultaneous connections. Go to a different location. 13. Click Authentication Properties; To disconnect from the ...
Click OK. 12. The wireless network configuration window appears. then enter the authentication settings provided by your computer and display the names of those being broadcasted by preventing multiple simultaneous connections. Go to a different location. 13. Click Authentication Properties; To disconnect from the ...
User Manual
Page 27
...Windows. If you set the same mode as public hotspots. If you select Auto, the adapter will be communicating with your computer will be established faster. 20. Data transmitted and received through the wireless network. Usually, you want to use of security require... being allowed to a wireless access point first. 19. Pre-Shared Key (WPA-PSK) Wireless networks that is compatible with another computer without connecting to connect. They are available: Infrastructure Use this connection type to communicate directly with in encrypting and decrypting data that ...
...Windows. If you set the same mode as public hotspots. If you select Auto, the adapter will be communicating with your computer will be established faster. 20. Data transmitted and received through the wireless network. Usually, you want to use of security require... being allowed to a wireless access point first. 19. Pre-Shared Key (WPA-PSK) Wireless networks that is compatible with another computer without connecting to connect. They are available: Infrastructure Use this connection type to communicate directly with in encrypting and decrypting data that ...
User Manual
Page 35
... Settings window, select one or more of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your computer as appropriate. 39. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your Internet connection. Click Save. 41. To add the newly created...
... Settings window, select one or more of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your computer as appropriate. 39. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your Internet connection. Click Save. 41. To add the newly created...
User Manual
Page 36
... disable the default OS setting, clear this setting is to the left of the profile becomes active. This option is selected by default. to your computer from the network. For Windows XP Service Pack 2, this setting is available only in Windows XP.
... disable the default OS setting, clear this setting is to the left of the profile becomes active. This option is selected by default. to your computer from the network. For Windows XP Service Pack 2, this setting is available only in Windows XP.
User Manual
Page 37
... a virtual private network (VPN) to connect to the Internet. To close the program automatically before connecting to a network, enter the name of static addresses. Your computer will be used by use of this printer unless otherwise specified.
... a virtual private network (VPN) to connect to the Internet. To close the program automatically before connecting to a network, enter the name of static addresses. Your computer will be used by use of this printer unless otherwise specified.
User Manual
Page 38
That is used for a 128-bit key. Static WEP Settings window Here you first power on your computer, without logging on to the network by use of the key, subtract the initial vector (24 bits) from the specified value. Use this profile to ...
That is used for a 128-bit key. Static WEP Settings window Here you first power on your computer, without logging on to the network by use of the key, subtract the initial vector (24 bits) from the specified value. Use this profile to ...
User Manual
Page 39
... Windows XP, you use of this check box if you want to connect to Windows. Using Windows standard features to configure 802.1x If your computer, without logging on the access point. Figure 30. You can use of the access point. Enter the same key as WEP, TKIP, or AES. Pre...
... Windows XP, you use of this check box if you want to connect to Windows. Using Windows standard features to configure 802.1x If your computer, without logging on the access point. Figure 30. You can use of the access point. Enter the same key as WEP, TKIP, or AES. Pre...
User Manual
Page 40
... window is not supported. The 802.1x Settings windows opens; click Authentication Properties. v Authentication tab Enable 802.1x on your computer returns from suspend mode may take longer. When you use of Windows standard functions, select Use Windows to configure adapters that involves...Key is no other location profiles configured by use of Access Connections, switching to the access point or 802.1x authentication when your computer, reconnecting to a location profile configured by use this mode, make sure that : v Depending on the wireless LAN adapter installed on...
... window is not supported. The 802.1x Settings windows opens; click Authentication Properties. v Authentication tab Enable 802.1x on your computer returns from suspend mode may take longer. When you use of Windows standard functions, select Use Windows to configure adapters that involves...Key is no other location profiles configured by use of Access Connections, switching to the access point or 802.1x authentication when your computer, reconnecting to a location profile configured by use this mode, make sure that : v Depending on the wireless LAN adapter installed on...
User Manual
Page 41
... selected Use Windows to configure wireless network for your network. Properties Click this button, and configure the settings that are using machine authentication. Authenticate as computer when computer information is available Select this check box if you use. Figure 32. 802.1x Settings-Access Connections window You can configure the following types...
... selected Use Windows to configure wireless network for your network. Properties Click this button, and configure the settings that are using machine authentication. Authenticate as computer when computer information is available Select this check box if you use. Figure 32. 802.1x Settings-Access Connections window You can configure the following types...
User Manual
Page 43
... logon to the wireless network manually. Using location profiles 33 Tunnel authentication MS-CHAP-V2 is used for tunnel authentication as computer when computer information is valid for tunnel authentication. After you select this setting, a message will be verified, leave the Validate server ...certificate check box blank. The following settings can use of the Tunnel authentication setting. You can be configured by use computer certification to be used to connect to the domain server will start. The application will not check the reliability of a ...
... logon to the wireless network manually. Using location profiles 33 Tunnel authentication MS-CHAP-V2 is used for tunnel authentication as computer when computer information is valid for tunnel authentication. After you select this setting, a message will be verified, leave the Validate server ...certificate check box blank. The following settings can use of the Tunnel authentication setting. You can be configured by use computer certification to be used to connect to the domain server will start. The application will not check the reliability of a ...