User Manual
Page 4
U.S. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is ...-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then we provide this information and the product it supports, read the general information in Data-General, FAR 52.227.14 (Alternate III). All rights reserved. Portions © Copyright International ... accept this Program under Rights in Appendix D, "Notices," on page 81. First Edition (January 2006) © Copyright Lenovo 2006.
U.S. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is ...-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then we provide this information and the product it supports, read the general information in Data-General, FAR 52.227.14 (Alternate III). All rights reserved. Portions © Copyright International ... accept this Program under Rights in Appendix D, "Notices," on page 81. First Edition (January 2006) © Copyright Lenovo 2006.
User Manual
Page 5
... global settings 57 User preferences 59 Toolbar options 60 Peer-to -peer connection 71 Appendix A. Notices 81 © Lenovo 2006. Frequently asked questions 73 Appendix B. viii Chapter 1. Using a wireless WAN connection 63 Creating and applying a wireless ...peer options 61 Chapter 4. Command line interface 77 Appendix C. Portions © IBM Corp. 2006. Introducing Access Connections 1 System requirements 1 Supported operating systems 1 New features in this book vii ThinkVantage Access Connections resources on the World Wide Web . . . . Using location profiles ...
... global settings 57 User preferences 59 Toolbar options 60 Peer-to -peer connection 71 Appendix A. Notices 81 © Lenovo 2006. Frequently asked questions 73 Appendix B. viii Chapter 1. Using a wireless WAN connection 63 Creating and applying a wireless ...peer options 61 Chapter 4. Command line interface 77 Appendix C. Portions © IBM Corp. 2006. Introducing Access Connections 1 System requirements 1 Supported operating systems 1 New features in this book vii ThinkVantage Access Connections resources on the World Wide Web . . . . Using location profiles ...
User Manual
Page 9
...explained immediately afterward. How this book This book contains the following conventions: v Commands are separated by vertical bars. © Lenovo 2006. Chapter 3, "Configuration options," on page 77 contains a list of the Access Connections application and its features. Appendix ...contains product notices and trademarks. Chapter 5, "Introducing a peer-to-peer connection," on page 79 contains information about accessing ThinkVantage Support Web sites for configuring various options. v Important: These notices provide information or advice that can be entered from the command ...
...explained immediately afterward. How this book This book contains the following conventions: v Commands are separated by vertical bars. © Lenovo 2006. Chapter 3, "Configuration options," on page 77 contains a list of the Access Connections application and its features. Appendix ...contains product notices and trademarks. Chapter 5, "Introducing a peer-to-peer connection," on page 79 contains information about accessing ThinkVantage Support Web sites for configuring various options. v Important: These notices provide information or advice that can be entered from the command ...
User Manual
Page 10
...com/us /think/thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech/accessconnections.html Go to this Web page for understanding, using, and troubleshooting Access ...the latest Access Connections software and documentation. ThinkVantage Personal Computing Support - ThinkVantage Technologies page http://www.pc.ibm.com/us /think /support Go to this Web page to the ThinkVantage Personal Computing Support Web site. v Default values are enclosed in braces....
...com/us /think/thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech/accessconnections.html Go to this Web page for understanding, using, and troubleshooting Access ...the latest Access Connections software and documentation. ThinkVantage Personal Computing Support - ThinkVantage Technologies page http://www.pc.ibm.com/us /think /support Go to this Web page to the ThinkVantage Personal Computing Support Web site. v Default values are enclosed in braces....
User Manual
Page 11
... that enables you must be installed and what network profiles you will be considered before installing Access Connections. Supported operating systems Operating systems supported: v Windows 2000 v Windows XP Access Connections is a list of the network and Internet configuration settings ... Connections is a connectivity assistant program for your ThinkPad® computer that is to -peer connection v Support for Sierra Wireless 1xEV-DO Network Adapter for Verizon Wireless WAN service v Support for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Chapter 1.
... that enables you must be installed and what network profiles you will be considered before installing Access Connections. Supported operating systems Operating systems supported: v Windows 2000 v Windows XP Access Connections is a list of the network and Internet configuration settings ... Connections is a connectivity assistant program for your ThinkPad® computer that is to -peer connection v Support for Sierra Wireless 1xEV-DO Network Adapter for Verizon Wireless WAN service v Support for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Chapter 1.
User Manual
Page 12
...main tool bar and select Help. On the pop-up menu click Check for Updates. v Updated easy-to Peer Community features are not supported. 3. Figure 1. Broadcomm 4318/4311 Wireless LAN Adapter Notes on Windows XP. To configure wireless connection go to the Windows XP wireless network... setup menu. 4. Intel Pro/Wireless 3945 ABG Wireless LAN adapter - Limited support is offered on use graphic user interface Updating Access Connections Access Connections can check whether a version later than the one you have is...
...main tool bar and select Help. On the pop-up menu click Check for Updates. v Updated easy-to Peer Community features are not supported. 3. Figure 1. Broadcomm 4318/4311 Wireless LAN Adapter Notes on Windows XP. To configure wireless connection go to the Windows XP wireless network... setup menu. 4. Intel Pro/Wireless 3945 ABG Wireless LAN adapter - Limited support is offered on use graphic user interface Updating Access Connections Access Connections can check whether a version later than the one you have is...
User Manual
Page 19
... adapter has access to a network at this location, Access Connections will automatically select either a wired Ethernet network or a wireless 802.11 networks at your computer support this type of network connection, and show them in the list first. Best Available Network Chapter 2. To change the priorities for instance, between a wired connection...
... adapter has access to a network at this location, Access Connections will automatically select either a wired Ethernet network or a wireless 802.11 networks at your computer support this type of network connection, and show them in the list first. Best Available Network Chapter 2. To change the priorities for instance, between a wired connection...
User Manual
Page 20
Access Connections will be used only to connect to a Wired LAN (Ethernet). Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Figure 11. Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide
Access Connections will be used only to connect to a Wired LAN (Ethernet). Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Figure 11. Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide
User Manual
Page 21
You can configure the settings for authentication and encryption. Wireless LAN (802.11) Choose this type of network connection if the profile will be used to connect to an 802.11 a, b, or g wireless LAN only. Create New Profile-Wireless LAN (802.11) Chapter 2. Using location profiles 11 Figure 12. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
You can configure the settings for authentication and encryption. Wireless LAN (802.11) Choose this type of network connection if the profile will be used to connect to an 802.11 a, b, or g wireless LAN only. Create New Profile-Wireless LAN (802.11) Chapter 2. Using location profiles 11 Figure 12. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 22
If your computer support this type of network connection, and show them in your broadband connection is DSL, you want to the broadband network through an Ethernet adapter. Create ...
If your computer support this type of network connection, and show them in your broadband connection is DSL, you want to the broadband network through an Ethernet adapter. Create ...
User Manual
Page 23
Using location profiles 13 Access Connections will automatically determine which adapters in the table. Creating New Profile-Dial-up . Figure 14. Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of network connection if the profile will be used only to connect to a cellular phone. Examples of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2.
Using location profiles 13 Access Connections will automatically determine which adapters in the table. Creating New Profile-Dial-up . Figure 14. Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of network connection if the profile will be used only to connect to a cellular phone. Examples of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2.
User Manual
Page 24
Wireless WAN Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you can enable optional IEEE 802.1x authentication (EAP over LAN). If you ...
Wireless WAN Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you can enable optional IEEE 802.1x authentication (EAP over LAN). If you ...
User Manual
Page 40
... can switch to a different location profile. The 802.1x Settings windows opens; Figure 31. 802.1x Settings window The Windows Authentication Properties window is not supported. Data encryption If data encryption is necessary, select Key is no longer valid-for example, if you have other location profiles configured by use of...
... can switch to a different location profile. The 802.1x Settings windows opens; Figure 31. 802.1x Settings window The Windows Authentication Properties window is not supported. Data encryption If data encryption is necessary, select Key is no longer valid-for example, if you have other location profiles configured by use of...
User Manual
Page 43
... fingerprint reader to log on Func Software Odyssey Server. The application will be authenticated. Tunnel authentication MS-CHAP-V2 is valid, the logon ID that support the use of the server, and the connection will be processed simultaneously. This setting is available check box; This option is used for tunnel authentication...
... fingerprint reader to log on Func Software Odyssey Server. The application will be authenticated. Tunnel authentication MS-CHAP-V2 is valid, the logon ID that support the use of the server, and the connection will be processed simultaneously. This setting is available check box; This option is used for tunnel authentication...
User Manual
Page 44
..., and select the check box for Use Windows logon user name and password to MS-CHAP-V2, you can configure the following protocols are supported for tunnel authentication: v MS-CHAP-V2 v GTC (Generic Token Card) When tunnel authentication is set to authenticate the wireless network. For Thinkpad ...computers that support logging on to a specific domain, specify the domain name in the server name field. After you to the domain server will be the one ...
..., and select the check box for Use Windows logon user name and password to MS-CHAP-V2, you can configure the following protocols are supported for tunnel authentication: v MS-CHAP-V2 v GTC (Generic Token Card) When tunnel authentication is set to authenticate the wireless network. For Thinkpad ...computers that support logging on to a specific domain, specify the domain name in the server name field. After you to the domain server will be the one ...
User Manual
Page 46
... one of the user ID and password for activating the Single sign-on to Windows. This setting is displayed: Figure 34. For Thinkpad computers that support logging on function, which processes LEAP authentication by use of Cisco LEAP. EAP Cisco (LEAP) If you have selected EAP Cisco (LEAP) mode, you can...
... one of the user ID and password for activating the Single sign-on to Windows. This setting is displayed: Figure 34. For Thinkpad computers that support logging on function, which processes LEAP authentication by use of Cisco LEAP. EAP Cisco (LEAP) If you have selected EAP Cisco (LEAP) mode, you can...
User Manual
Page 49
...to disconnect from the list. The authentication starts as soon as you enter the user name and password, the authentication process starts. These adapters support the importing of a PAC file. If you want to use of the Logon option button. For some wireless LAN adapters, this check ...configure the following settings by selecting the PAC file from network when the user logs off or restart your computer; For Thinkpad computers that support the use of a fingerprint reader to log on to Windows, the wireless network authentication will log on to the Windows domain server. ...
...to disconnect from the list. The authentication starts as soon as you enter the user name and password, the authentication process starts. These adapters support the importing of a PAC file. If you want to use of the Logon option button. For some wireless LAN adapters, this check ...configure the following settings by selecting the PAC file from network when the user logs off or restart your computer; For Thinkpad computers that support the use of a fingerprint reader to log on to Windows, the wireless network authentication will log on to the Windows domain server. ...
User Manual
Page 57
... to wireless LAN networks) when switching automatically, select Include Ethernet connections in which you connect, and then prompt you to restore connectivity. If your computer supports wireless WAN connections, you can change the order of Access Connections, click Configure. 2. Click OK. Using location profiles 47
... to wireless LAN networks) when switching automatically, select Include Ethernet connections in which you connect, and then prompt you to restore connectivity. If your computer supports wireless WAN connections, you can change the order of Access Connections, click Configure. 2. Click OK. Using location profiles 47
User Manual
Page 63
... causes. To save the data, press Save as on the main toolbar, and select Diagnostics from the pull-down menu. You can be used by a support center to check the status of a connection and the network settings: v Connection status v Ping v Trace Route v IP Configuration The Event Log tab is displayed. Click...
... causes. To save the data, press Save as on the main toolbar, and select Diagnostics from the pull-down menu. You can be used by a support center to check the status of a connection and the network settings: v Connection status v Ping v Trace Route v IP Configuration The Event Log tab is displayed. Click...
User Manual
Page 64
Diagnostic Tools panel; the displayed information is saved as a text file that can be used by a support center to a network fails, the causes of problems, and possible solutions for them, are displayed, along with the current settings of the network. 54 ThinkVantage Access Connections 4.1: User's Guide When an attempt to connect to diagnose a problem.
Diagnostic Tools panel; the displayed information is saved as a text file that can be used by a support center to a network fails, the causes of problems, and possible solutions for them, are displayed, along with the current settings of the network. 54 ThinkVantage Access Connections 4.1: User's Guide When an attempt to connect to diagnose a problem.