User Manual
Page 4
...the product it supports, read the general information in Data-General, FAR 52.227.14 (Alternate III). First Edition (January 2006) © Copyright Lenovo 2006. Portions © Copyright International Business Machines Corporation 2006. U.S. Use, duplication or disclosure by the Government is subject to the GSA ADP Schedule ...contract with RESTRICTED RIGHTS. Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under Rights in Appendix D, "Notices," on page 81.
...the product it supports, read the general information in Data-General, FAR 52.227.14 (Alternate III). First Edition (January 2006) © Copyright Lenovo 2006. Portions © Copyright International Business Machines Corporation 2006. U.S. Use, duplication or disclosure by the Government is subject to the GSA ADP Schedule ...contract with RESTRICTED RIGHTS. Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under Rights in Appendix D, "Notices," on page 81.
User Manual
Page 10
ThinkVantage Personal Computing Support - ThinkVantage Personal Computing Support page http://www.lenovo.com/think/support Go to this Web page for information about ThinkVantage Technologies. ThinkVantage Technologies page http://www.pc.ibm.com/us /think /thinkvantagetech.html Consult this Web page to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Access...
ThinkVantage Personal Computing Support - ThinkVantage Personal Computing Support page http://www.lenovo.com/think/support Go to this Web page for information about ThinkVantage Technologies. ThinkVantage Technologies page http://www.pc.ibm.com/us /think /thinkvantagetech.html Consult this Web page to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Access...
User Manual
Page 11
...for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. By switching between location profiles, when moving their computers from a specific location such as home or work. v Support for your ThinkPad® computer that enables you to place, users can be installed and what ... list of the network and Internet configuration settings that must consider where it will want to manually reconfigure settings or restart the computer each time. Access Connections also enables the user to view and connect to Bluetooth devices, and to switch network and Internet ...
...for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. By switching between location profiles, when moving their computers from a specific location such as home or work. v Support for your ThinkPad® computer that enables you to place, users can be installed and what ... list of the network and Internet configuration settings that must consider where it will want to manually reconfigure settings or restart the computer each time. Access Connections also enables the user to view and connect to Bluetooth devices, and to switch network and Internet ...
User Manual
Page 13
...-specific settings such as the default printer and the browser settings. Portions © IBM Corp. 2006. 3 By switching between location profiles as you move your computer from place to place, Access Connections can quickly and easily connect to a network with no need for you create location profiles for networks of the... sharing, and default printer. Access Connections provides a profile wizard that manages your first time to access Access Connections, the Welcome to Access Connections window © Lenovo 2006. Chapter 2.
...-specific settings such as the default printer and the browser settings. Portions © IBM Corp. 2006. 3 By switching between location profiles as you move your computer from place to place, Access Connections can quickly and easily connect to a network with no need for you create location profiles for networks of the... sharing, and default printer. Access Connections provides a profile wizard that manages your first time to access Access Connections, the Welcome to Access Connections window © Lenovo 2006. Chapter 2.
User Manual
Page 19
... click Higher or Lower. Choose all of the adapters you move frequently within a location - To change the priorities for instance, between a wired connection at your computer support this type of network connection to create a profile that will automatically determine which adapters in your desk and a wireless LAN connection elsewhere in the...
... click Higher or Lower. Choose all of the adapters you move frequently within a location - To change the priorities for instance, between a wired connection at your computer support this type of network connection to create a profile that will automatically determine which adapters in your desk and a wireless LAN connection elsewhere in the...
User Manual
Page 20
Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Wired LAN (Ethernet) Choose this type of network connection, and show them in your computer support this type of network connection if the profile will be used only to connect to a Wired LAN (Ethernet). Figure 11. Access Connections will automatically determine which adapters in the table.
Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Wired LAN (Ethernet) Choose this type of network connection, and show them in your computer support this type of network connection if the profile will be used only to connect to a Wired LAN (Ethernet). Figure 11. Access Connections will automatically determine which adapters in the table.
User Manual
Page 21
Figure 12. Create New Profile-Wireless LAN (802.11) Chapter 2. You can configure the settings for authentication and encryption. Using location profiles 11 Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Figure 12. Create New Profile-Wireless LAN (802.11) Chapter 2. You can configure the settings for authentication and encryption. Using location profiles 11 Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 22
Figure 13. Choose the one you also must select Configure my DSL settings. Typically, your computer will automatically determine which adapters in your broadband connection is DSL, you want to use. Access Connections will connect to the broadband network through an ... New Profile-Wired Broadband (DSL or Cable Modem) 12 ThinkVantage Access Connections 4.1: User's Guide The broadband connections are DSL, cable modem, and ISDN. If your computer support this type of network connection, and show them in the table.
Figure 13. Choose the one you also must select Configure my DSL settings. Typically, your computer will automatically determine which adapters in your broadband connection is DSL, you want to use. Access Connections will connect to the broadband network through an ... New Profile-Wired Broadband (DSL or Cable Modem) 12 ThinkVantage Access Connections 4.1: User's Guide The broadband connections are DSL, cable modem, and ISDN. If your computer support this type of network connection, and show them in the table.
User Manual
Page 23
Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2. Figure 14. Creating New Profile-Dial-up . Using location profiles 13 Examples of network connection if the profile will automatically determine which adapters in the table. Access Connections will be used only to connect to a cellular phone.
Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2. Figure 14. Creating New Profile-Dial-up . Using location profiles 13 Examples of network connection if the profile will automatically determine which adapters in the table. Access Connections will be used only to connect to a cellular phone.
User Manual
Page 24
... IEEE 802.1x authentication (EAP over LAN). Wireless WAN Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you want to connect successfully. Select Enable IEEE 802.1x authentication for...
... IEEE 802.1x authentication (EAP over LAN). Wireless WAN Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you want to connect successfully. Select Enable IEEE 802.1x authentication for...
User Manual
Page 26
... Next. Click OK. 12. then enter the authentication settings provided by access points, click Find Network. Enter the name of those being broadcasted by your computer and display the names of the wireless network to which you switch to a different location profile, select Disconnect from the network when you are attempting...
... Next. Click OK. 12. then enter the authentication settings provided by access points, click Find Network. Enter the name of those being broadcasted by your computer and display the names of the wireless network to which you switch to a different location profile, select Disconnect from the network when you are attempting...
User Manual
Page 27
...) in -range access point, the connection will be established faster. 20. To do so, select Use this connection type when your computer is compatible with wireless access points. 18. Optionally, if you enter these keys only once. Using location profiles 17 Optionally, you set...to establish a wireless LAN connection before logging on to Windows, select Use this profile to authenticate his or her identity with another computer without connecting to connect during Windows logon. Data is compatible with a Pre-Shared Key. Dynamic keys are session-based and are ...
...) in -range access point, the connection will be established faster. 20. To do so, select Use this connection type when your computer is compatible with wireless access points. 18. Optionally, if you enter these keys only once. Using location profiles 17 Optionally, you set...to establish a wireless LAN connection before logging on to Windows, select Use this profile to authenticate his or her identity with another computer without connecting to connect during Windows logon. Data is compatible with a Pre-Shared Key. Dynamic keys are session-based and are ...
User Manual
Page 35
...Settings window, select one or more of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your computer as a bridge to access network resources through your files and printers. Using location profiles 25 38....Change the additional settings as a wireless LAN connection to the Automatic Location Switching list. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your Internet connection. This option is used for a category unchanged while this location profile ...
...Settings window, select one or more of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your computer as a bridge to access network resources through your files and printers. Using location profiles 25 38....Change the additional settings as a wireless LAN connection to the Automatic Location Switching list. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your Internet connection. This option is used for a category unchanged while this location profile ...
User Manual
Page 36
... setting is selected by default. Add Programs window To close the program automatically when you switch to another profile, select the check box to your computer from the network. Enable Windows firewall Prevents unauthorized access to the left of the profile becomes active. You cannot establish the VPN connection when this...
... setting is selected by default. Add Programs window To close the program automatically when you switch to another profile, select the check box to your computer from the network. Enable Windows firewall Prevents unauthorized access to the left of the profile becomes active. You cannot establish the VPN connection when this...
User Manual
Page 37
... defined locally, by default. TCP/IP Settings Enable VPN Connection Choose whether to use at this program is closed. Chapter 2. Using location profiles 27 Your computer will be used by use of this printer unless otherwise specified. Override TCP/IP and DNS Defaults Choose whether TCP/IP and DNS settings should...
... defined locally, by default. TCP/IP Settings Enable VPN Connection Choose whether to use at this program is closed. Chapter 2. Using location profiles 27 Your computer will be used by use of this printer unless otherwise specified. Override TCP/IP and DNS Defaults Choose whether TCP/IP and DNS settings should...
User Manual
Page 38
... check box if you want to connect to Windows. 28 ThinkVantage Access Connections 4.1: User's Guide Static WEP Settings window Here you first power on your computer, without logging on to the network by use of the key, subtract the initial vector (24 bits) from the specified value. Figure 29. That is...
... check box if you want to connect to Windows. 28 ThinkVantage Access Connections 4.1: User's Guide Static WEP Settings window Here you first power on your computer, without logging on to the network by use of the key, subtract the initial vector (24 bits) from the specified value. Figure 29. That is...
User Manual
Page 39
...use hexadecimal, be used for the appropriate settings. Using Wi-Fi Protected Access - Pre-Shared Key (WPA-PSK) If you first power on your computer, without logging on your network administrator for encrypting the actual transmission. Select the data encryption mode, such as a package. A profile configured by ...Data encryption The popup lists the data encryption modes available for the wireless LAN card that is installed on to configure 802.1x If your computer is running Windows XP, you can use of the access point. Figure 30. You can configure 802.1x, including WPA, by use...
...use hexadecimal, be used for the appropriate settings. Using Wi-Fi Protected Access - Pre-Shared Key (WPA-PSK) If you first power on your computer, without logging on your network administrator for encrypting the actual transmission. Select the data encryption mode, such as a package. A profile configured by ...Data encryption The popup lists the data encryption modes available for the wireless LAN card that is installed on to configure 802.1x If your computer is running Windows XP, you can use of the access point. Figure 30. You can configure 802.1x, including WPA, by use...
User Manual
Page 40
... 802.1x on this network Select this mode, Access Connections will need to logon to the access point or 802.1x authentication when your computer, reconnecting to Windows again. click Authentication Properties. For a Windows-configured location profile, however, you can switch to a different location profile.... that cannot be directly configured by use this mode, make sure that : v Depending on the wireless LAN adapter installed on your computer returns from suspend mode may take longer. When you use of Access Connections is provided, and make note that no longer valid-for...
... 802.1x on this network Select this mode, Access Connections will need to logon to the access point or 802.1x authentication when your computer, reconnecting to Windows again. click Authentication Properties. For a Windows-configured location profile, however, you can switch to a different location profile.... that cannot be directly configured by use this mode, make sure that : v Depending on the wireless LAN adapter installed on your computer returns from suspend mode may take longer. When you use of Access Connections is provided, and make note that no longer valid-for...
User Manual
Page 41
... following settings: Access point authentication You can select one of Access Connections in configuring the settings for your network. If you select WPA as computer when computer information is available Select this check box if you are available on the authentication you selected Use Windows to configure wireless network for the security...
... following settings: Access point authentication You can select one of Access Connections in configuring the settings for your network. If you select WPA as computer when computer information is available Select this check box if you are available on the authentication you selected Use Windows to configure wireless network for the security...
User Manual
Page 43
... profile, asking you enter the necessary information, the authentication will be processed simultaneously. This setting is available check box, both the computer certificate and the client certificate will be based entirely on function, which authenticates EAP-TTLS by the user (for the Tunnel authentication....ID and password If you select this setting, a message will be displayed when you deploy this , select the Authenticate as computer when computer information is valid for activating the Single sign-on the information in the Logon name field. Tunnel authentication MS-CHAP-V2 is ...
... profile, asking you enter the necessary information, the authentication will be processed simultaneously. This setting is available check box, both the computer certificate and the client certificate will be based entirely on function, which authenticates EAP-TTLS by the user (for the Tunnel authentication....ID and password If you select this setting, a message will be displayed when you deploy this , select the Authenticate as computer when computer information is valid for activating the Single sign-on the information in the Logon name field. Tunnel authentication MS-CHAP-V2 is ...