User Manual
Page 4
...under Rights in Appendix D, "Notices," on page 81. All rights reserved. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is unable to the GSA ADP Schedule... contract with RESTRICTED RIGHTS. First Edition (January 2006) © Copyright Lenovo 2006. Portions © Copyright International Business Machines Corporation 2006. Note: Before using this information and the product it supports, read the general information in Data-General, FAR 52.227.14 (Alternate III)....
...under Rights in Appendix D, "Notices," on page 81. All rights reserved. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is unable to the GSA ADP Schedule... contract with RESTRICTED RIGHTS. First Edition (January 2006) © Copyright Lenovo 2006. Portions © Copyright International Business Machines Corporation 2006. Note: Before using this information and the product it supports, read the general information in Data-General, FAR 52.227.14 (Alternate III)....
User Manual
Page 5
Frequently asked questions 73 Appendix B. Command line interface 77 Appendix C. Notices 81 © Lenovo 2006. Using location profiles 3 Creating a location profile 3 Additional settings 25 Wireless security settings 28 Editing VPN settings 40 ... peer-to-peer connection 65 Creating the peer-to-peer connection 68 Using peer-to-peer connection 71 Appendix A. Introducing Access Connections 1 System requirements 1 Supported operating systems 1 New features in this book vii ThinkVantage Access Connections resources on the World Wide Web . . . . Portions © IBM Corp....
Frequently asked questions 73 Appendix B. Command line interface 77 Appendix C. Notices 81 © Lenovo 2006. Using location profiles 3 Creating a location profile 3 Additional settings 25 Wireless security settings 28 Editing VPN settings 40 ... peer-to-peer connection 65 Creating the peer-to-peer connection 68 Using peer-to-peer connection 71 Appendix A. Introducing Access Connections 1 System requirements 1 Supported operating systems 1 New features in this book vii ThinkVantage Access Connections resources on the World Wide Web . . . . Portions © IBM Corp....
User Manual
Page 9
... a network connection. Appendix A, "Frequently asked questions about Access Connections. v Optional commands or variables are separated by vertical bars. © Lenovo 2006. v Where you avoid inconvenience or difficulty. Portions © IBM Corp. 2006. Chapter 4, "Using a wireless WAN connection," on ... programs, devices, or data. Syntax conventions that are used in this book This book provides information about accessing ThinkVantage Support Web sites for configuring various options. An attention notice is organized Chapter 1, "Introducing Access Connections," on page 65 ...
... a network connection. Appendix A, "Frequently asked questions about Access Connections. v Optional commands or variables are separated by vertical bars. © Lenovo 2006. v Where you avoid inconvenience or difficulty. Portions © IBM Corp. 2006. Chapter 4, "Using a wireless WAN connection," on ... programs, devices, or data. Syntax conventions that are used in this book This book provides information about accessing ThinkVantage Support Web sites for configuring various options. An attention notice is organized Chapter 1, "Introducing Access Connections," on page 65 ...
User Manual
Page 10
...Web page for information about ThinkVantage Technologies. viii ThinkVantage Access Connections 4.1: User's Guide ThinkVantage Personal Computing Support - v Default values are enclosed in braces. ThinkVantage Access Connections resources on the World Wide Web ...think/thinkvantagetech/accessconnections.html Go to this Web page to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech.html Consult this Web page for understanding, using, and troubleshooting...
...Web page for information about ThinkVantage Technologies. viii ThinkVantage Access Connections 4.1: User's Guide ThinkVantage Personal Computing Support - v Default values are enclosed in braces. ThinkVantage Access Connections resources on the World Wide Web ...think/thinkvantagetech/accessconnections.html Go to this Web page to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech.html Consult this Web page for understanding, using, and troubleshooting...
User Manual
Page 11
...Verizon Wireless WAN service v Support for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. The following new features and improvements: v Peer-to switch network and Internet settings quickly by Vodafone. Supported operating systems Operating systems supported: v Windows 2000 v ...and easily connect to a network without having to start different applications automatically in the WAN profile that are also supported. v Support for Vodafone HSDPA/WCDMA Communication Manager software. By switching between location profiles, when moving their computers from a ...
...Verizon Wireless WAN service v Support for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. The following new features and improvements: v Peer-to switch network and Internet settings quickly by Vodafone. Supported operating systems Operating systems supported: v Windows 2000 v ...and easily connect to a network without having to start different applications automatically in the WAN profile that are also supported. v Support for Vodafone HSDPA/WCDMA Communication Manager software. By switching between location profiles, when moving their computers from a ...
User Manual
Page 12
... site. Find Wireless Network and Peer to the main tool bar and select Help. Access Connections v.4.1 supports only wireless radio control and signal status display. If updated version is available, Access Connections will download and install it , enable Windows Zero ...Access Connections 4.1: User's Guide To enable this feature, go to -use of Access Connections when using Broadcomm 4318/4311 Wireless LAN adapter: 1. Limited support is offered on use graphic user interface Updating Access Connections Access Connections can check whether a version later than the one you have is offered on...
... site. Find Wireless Network and Peer to the main tool bar and select Help. Access Connections v.4.1 supports only wireless radio control and signal status display. If updated version is available, Access Connections will download and install it , enable Windows Zero ...Access Connections 4.1: User's Guide To enable this feature, go to -use of Access Connections when using Broadcomm 4318/4311 Wireless LAN adapter: 1. Limited support is offered on use graphic user interface Updating Access Connections Access Connections can check whether a version later than the one you have is offered on...
User Manual
Page 19
... connections, select an adapter from the table and then click Higher or Lower. To change the priorities for instance, between a wired connection at your computer support this location, Access Connections will attempt to connect, using the adapter highest in the list first. Choose all of the adapters you move frequently within...
... connections, select an adapter from the table and then click Higher or Lower. To change the priorities for instance, between a wired connection at your computer support this location, Access Connections will attempt to connect, using the adapter highest in the list first. Choose all of the adapters you move frequently within...
User Manual
Page 20
Access Connections will be used only to connect to a Wired LAN (Ethernet). Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Figure 11. Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Access Connections will be used only to connect to a Wired LAN (Ethernet). Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Figure 11. Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 21
Figure 12. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Using location profiles 11 You can configure the settings for authentication and encryption. Create New Profile-Wireless LAN (802.11) Chapter 2. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Figure 12. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Using location profiles 11 You can configure the settings for authentication and encryption. Create New Profile-Wireless LAN (802.11) Chapter 2. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 22
... to use. The broadband connections are DSL, cable modem, and ISDN. Access Connections will be used only to connect to wired broadband. If your computer support this type of network connection, and show them in your broadband connection is DSL, you want to the broadband network through an Ethernet adapter. Wired...
... to use. The broadband connections are DSL, cable modem, and ISDN. Access Connections will be used only to connect to wired broadband. If your computer support this type of network connection, and show them in your broadband connection is DSL, you want to the broadband network through an Ethernet adapter. Wired...
User Manual
Page 23
Using location profiles 13 Access Connections will automatically determine which adapters in the table. Figure 14. Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of dial-up (modem or cellular phone) Chapter 2. Creating New Profile-Dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up. Examples of network connection if the profile will be used only to connect to a cellular phone.
Using location profiles 13 Access Connections will automatically determine which adapters in the table. Figure 14. Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of dial-up (modem or cellular phone) Chapter 2. Creating New Profile-Dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up. Examples of network connection if the profile will be used only to connect to a cellular phone.
User Manual
Page 24
Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Choose the one you can enable optional IEEE 802.1x authentication (EAP over LAN). ...
Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Choose the one you can enable optional IEEE 802.1x authentication (EAP over LAN). ...
User Manual
Page 40
... 802.1x by use of Access Connections, switching to Windows again. v If you have moved to a different location-you use of Access Connections is not supported. Figure 31. 802.1x Settings window The Windows Authentication Properties window is provided, and make note that: v Depending on the wireless LAN adapter installed on...
... 802.1x by use of Access Connections, switching to Windows again. v If you have moved to a different location-you use of Access Connections is not supported. Figure 31. 802.1x Settings window The Windows Authentication Properties window is provided, and make note that: v Depending on the wireless LAN adapter installed on...
User Manual
Page 43
... type field). This option is entered automatically in the server name field. Roaming type In the Roaming type field, enter the user account name that support the use machine certification for the Tunnel authentication. If the selected certificate is the protocol available for the authentication. Use temporary user ID and password...
... type field). This option is entered automatically in the server name field. Roaming type In the Roaming type field, enter the user account name that support the use machine certification for the Tunnel authentication. If the selected certificate is the protocol available for the authentication. Use temporary user ID and password...
User Manual
Page 44
... domain name in the user ID field of a fingerprint reader, the wireless network authentication will be processed simultaneously. For Thinkpad computers that support logging on function, which authenticates EAP-PEAP by use of a reliable route certificate issuer. Use saved user ID and password The user ... is set in advance. If the server certificate does not have to Option, and select the check box for the tunnel authentication are supported for tunnel authentication: v MS-CHAP-V2 v GTC (Generic Token Card) When tunnel authentication is enabled, the available user ID and password...
... domain name in the user ID field of a fingerprint reader, the wireless network authentication will be processed simultaneously. For Thinkpad computers that support logging on function, which authenticates EAP-PEAP by use of a reliable route certificate issuer. Use saved user ID and password The user ... is set in advance. If the server certificate does not have to Option, and select the check box for the tunnel authentication are supported for tunnel authentication: v MS-CHAP-V2 v GTC (Generic Token Card) When tunnel authentication is enabled, the available user ID and password...
User Manual
Page 46
.... To enable this setting, go to Option, and select the check box for LEAP authentication. Tunnel authentication and logon to Windows. For Thinkpad computers that support logging on function, which processes LEAP authentication by use of a fingerprint reader, the wireless network authentication will be processed automatically. 36 ThinkVantage Access Connections 4.1: User...
.... To enable this setting, go to Option, and select the check box for LEAP authentication. Tunnel authentication and logon to Windows. For Thinkpad computers that support logging on function, which processes LEAP authentication by use of a fingerprint reader, the wireless network authentication will be processed automatically. 36 ThinkVantage Access Connections 4.1: User...
User Manual
Page 49
...switching between different Cisco access Chapter 2. For some wireless LAN adapters, this check box if the network contains multiple domains. These adapters support the importing of the Logon option button. Append Windows logon domain to disconnect from the list. Then both the user name and ...this setting. EAP-FAST authentication time out If EAP-FAST authentication takes longer than usual, change this check box. For Thinkpad computers that support the use of a fingerprint reader to log on to the Windows domain server. The authentication information is 60 seconds. If using a Cisco...
...switching between different Cisco access Chapter 2. For some wireless LAN adapters, this check box if the network contains multiple domains. These adapters support the importing of the Logon option button. Append Windows logon domain to disconnect from the list. Then both the user name and ...this setting. EAP-FAST authentication time out If EAP-FAST authentication takes longer than usual, change this check box. For Thinkpad computers that support the use of a fingerprint reader to log on to the Windows domain server. The authentication information is 60 seconds. If using a Cisco...
User Manual
Page 57
... Ports. 5. Select Location Switching. 3. You can select When no other connections are listed in automatic switching and prompt me to restore connectivity. If your computer supports wireless WAN connections, you . Click OK. Then, if an active connection is enabled, Access Connections will apply the profile you want Access Connections to check...
... Ports. 5. Select Location Switching. 3. You can select When no other connections are listed in automatic switching and prompt me to restore connectivity. If your computer supports wireless WAN connections, you . Click OK. Then, if an active connection is enabled, Access Connections will apply the profile you want Access Connections to check...
User Manual
Page 63
... in solving problems with network connections, and can also reach that panel from the main Access Connections panel, click Properties. You can be used by a support center to a network fails. To save the data, press Save as on the main toolbar, and select Diagnostics from the pull-down menu. Click Tools...
... in solving problems with network connections, and can also reach that panel from the main Access Connections panel, click Properties. You can be used by a support center to a network fails. To save the data, press Save as on the main toolbar, and select Diagnostics from the pull-down menu. Click Tools...
User Manual
Page 64
the displayed information is saved as a text file that can be used by a support center to a network fails, the causes of problems, and possible solutions for them, are displayed, along with the current settings of the network. 54 ThinkVantage Access Connections 4.1: User's Guide When an attempt to connect to diagnose a problem. Diagnostic Tools panel;
the displayed information is saved as a text file that can be used by a support center to a network fails, the causes of problems, and possible solutions for them, are displayed, along with the current settings of the network. 54 ThinkVantage Access Connections 4.1: User's Guide When an attempt to connect to diagnose a problem. Diagnostic Tools panel;