User Manual
Page 4
...with RESTRICTED RIGHTS. Portions © Copyright International Business Machines Corporation 2006. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is subject to accept this ... in Appendix D, "Notices," on page 81. First Edition (January 2006) © Copyright Lenovo 2006. GOVERNMENT USERS - Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then ...
...with RESTRICTED RIGHTS. Portions © Copyright International Business Machines Corporation 2006. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is subject to accept this ... in Appendix D, "Notices," on page 81. First Edition (January 2006) © Copyright Lenovo 2006. GOVERNMENT USERS - Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then ...
User Manual
Page 10
...com/us /think /support Go to this Web page for access to download the latest Access Connections software and documentation. ThinkVantage Personal Computing Support - ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech/accessconnections.html Go to this Web page for understanding, using, and troubleshooting Access Connections and other systems-management... are underlined. ThinkVantage Access Connections home page http://www.pc.ibm.com/us /think/thinkvantagetech.html Consult this Web page to the ThinkVantage Personal Computing Support Web site.
...com/us /think /support Go to this Web page for access to download the latest Access Connections software and documentation. ThinkVantage Personal Computing Support - ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech/accessconnections.html Go to this Web page for understanding, using, and troubleshooting Access Connections and other systems-management... are underlined. ThinkVantage Access Connections home page http://www.pc.ibm.com/us /think/thinkvantagetech.html Consult this Web page to the ThinkVantage Personal Computing Support Web site.
User Manual
Page 11
...selecting a location profile. New features in Access Connections v.4.1 Access Connections v.4.1 includes the following is to manually reconfigure settings or restart the computer each time. You can be made using a modem, a wired network adapter (Ethernet), a broadband device (Digital Subscriber Line (DSL... for Internet Explorer and the Firefox Browser, security settings for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Access Connections also enables the user to view and connect to Bluetooth devices, and to create. Supported operating systems ...
...selecting a location profile. New features in Access Connections v.4.1 Access Connections v.4.1 includes the following is to manually reconfigure settings or restart the computer each time. You can be made using a modem, a wired network adapter (Ethernet), a broadband device (Digital Subscriber Line (DSL... for Internet Explorer and the Firefox Browser, security settings for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Access Connections also enables the user to view and connect to Bluetooth devices, and to create. Supported operating systems ...
User Manual
Page 13
...settings. Figure 2. A location profile stores the network configuration required to connect to a desired network, along with other settings that manages your computer from place to place, Access Connections can quickly and easily connect to a network with location-specific settings such as you move your network ... By switching between location profiles as your first time to access Access Connections, the Welcome to Access Connections window © Lenovo 2006. Start Access Connections. To create a new location profile, do the following: 1. If this is displayed.
...settings. Figure 2. A location profile stores the network configuration required to connect to a desired network, along with other settings that manages your computer from place to place, Access Connections can quickly and easily connect to a network with location-specific settings such as you move your network ... By switching between location profiles as your first time to access Access Connections, the Welcome to Access Connections window © Lenovo 2006. Start Access Connections. To create a new location profile, do the following: 1. If this is displayed.
User Manual
Page 19
This capability is useful when you want to use. To change the priorities for instance, between a wired connection at your computer support this type of network connection to create a profile that will attempt to a network at this location, Access Connections will automatically select either a wired Ethernet ...
This capability is useful when you want to use. To change the priorities for instance, between a wired connection at your computer support this type of network connection to create a profile that will attempt to a network at this location, Access Connections will automatically select either a wired Ethernet ...
User Manual
Page 20
Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Figure 11. Access Connections will be used only to connect to a Wired LAN (Ethernet). Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Figure 11. Access Connections will be used only to connect to a Wired LAN (Ethernet). Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 21
Create New Profile-Wireless LAN (802.11) Chapter 2. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Figure 12. You can configure the settings for authentication and encryption. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Using location profiles 11
Create New Profile-Wireless LAN (802.11) Chapter 2. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. Figure 12. You can configure the settings for authentication and encryption. Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Using location profiles 11
User Manual
Page 22
... the profile will connect to the broadband network through an Ethernet adapter. Choose the one you also must select Configure my DSL settings. If your computer support this type of network connection, and show them in your broadband connection is DSL, you want to use. Access Connections will automatically determine which...
... the profile will connect to the broadband network through an Ethernet adapter. Choose the one you also must select Configure my DSL settings. If your computer support this type of network connection, and show them in your broadband connection is DSL, you want to use. Access Connections will automatically determine which...
User Manual
Page 23
Using location profiles 13 Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2. Examples of network connection if the profile will automatically determine which adapters in the table. Access Connections will be used only to connect to a cellular phone. Figure 14. Creating New Profile-Dial-up .
Using location profiles 13 Dial-up (modem or cellular phone) Choose this type of network connection, and show them in your computer support this type of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up (modem or cellular phone) Chapter 2. Examples of network connection if the profile will automatically determine which adapters in the table. Access Connections will be used only to connect to a cellular phone. Figure 14. Creating New Profile-Dial-up .
User Manual
Page 24
... connect to a wireless WAN (wide area network). Wireless WAN Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you can enable optional IEEE 802.1x authentication (EAP over LAN...
... connect to a wireless WAN (wide area network). Wireless WAN Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you can enable optional IEEE 802.1x authentication (EAP over LAN...
User Manual
Page 26
... for wireless networks within range of your network administrator. Click OK. 12. Figure 17. Click Authentication Properties; then enter the authentication settings provided by your computer and display the names of the wireless network to which you are attempting to a different location. 16. Enter the name of those being broadcasted by...
... for wireless networks within range of your network administrator. Click OK. 12. Figure 17. Click Authentication Properties; then enter the authentication settings provided by your computer and display the names of the wireless network to which you are attempting to a different location. 16. Enter the name of those being broadcasted by...
User Manual
Page 27
...each time the adapter is disabled) Select this profile to Windows. Chapter 2. Wireless security types None (encryption is inserted or your computer will automatically run in -range access points. To do so, select Use this profile to connect. Use Static WEP Keys A...to connect during Windows logon. Use IEEEE 802.1x Authentication Wireless networks that implement this connection type to communicate directly with another computer without connecting to authenticate with different standards. Pre-Shared Key (WPA-PSK) Wireless networks that implement IEEE 802.1x Extensible ...
...each time the adapter is disabled) Select this profile to Windows. Chapter 2. Wireless security types None (encryption is inserted or your computer will automatically run in -range access points. To do so, select Use this profile to connect. Use Static WEP Keys A...to connect during Windows logon. Use IEEEE 802.1x Authentication Wireless networks that implement this connection type to communicate directly with another computer without connecting to authenticate with different standards. Pre-Shared Key (WPA-PSK) Wireless networks that implement IEEE 802.1x Extensible ...
User Manual
Page 35
... panel appears. 40. Additional settings To apply additional categories of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your files and printers. Network Security On the Security Settings window, select one or...the profile is active, do not select the corresponding check box. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your computer as appropriate. 39. Using location profiles 25 The Additional settings window appears. 38. You can skip...
... panel appears. 40. Additional settings To apply additional categories of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your files and printers. Network Security On the Security Settings window, select one or...the profile is active, do not select the corresponding check box. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your computer as appropriate. 39. Using location profiles 25 The Additional settings window appears. 38. You can skip...
User Manual
Page 36
... network connection of the registered program. 26 ThinkVantage Access Connections 4.1: User's Guide You cannot establish the VPN connection when this setting is enabled; to your computer from the network. Figure 27. This option is to the left of the profile becomes active. You can select programs that should be launched automatically...
... network connection of the registered program. 26 ThinkVantage Access Connections 4.1: User's Guide You cannot establish the VPN connection when this setting is enabled; to your computer from the network. Figure 27. This option is to the left of the profile becomes active. You can select programs that should be launched automatically...
User Manual
Page 37
Your computer will connect to the network only after this application on page 40. TCP/IP Settings Enable VPN Connection Choose whether to use at this printer ...
Your computer will connect to the network only after this application on page 40. TCP/IP Settings Enable VPN Connection Choose whether to use at this printer ...
User Manual
Page 38
... check box if you want to connect to Windows. 28 ThinkVantage Access Connections 4.1: User's Guide Static WEP Settings window Here you first power on your computer, without logging on to the network by use of characters, see "Data encryption."
... check box if you want to connect to Windows. 28 ThinkVantage Access Connections 4.1: User's Guide Static WEP Settings window Here you first power on your computer, without logging on to the network by use of characters, see "Data encryption."
User Manual
Page 39
... type, the WPA-PSK Settings window opens. The mode should match the settings of this profile when you first power on your computer is installed on to the network by selecting either alphanumeric or hexadecimal characters; Enter the same key as a package. You can use...29 if you want to connect to Windows. Using Wi-Fi Protected Access - Using Windows standard features to configure 802.1x If your computer, without logging on your network administrator for encrypting the actual transmission. For more information about distributing location profiles, see Appendix A, "Frequently ...
... type, the WPA-PSK Settings window opens. The mode should match the settings of this profile when you first power on your computer is installed on to the network by selecting either alphanumeric or hexadecimal characters; Enter the same key as a package. You can use...29 if you want to connect to Windows. Using Wi-Fi Protected Access - Using Windows standard features to configure 802.1x If your computer, without logging on your network administrator for encrypting the actual transmission. For more information about distributing location profiles, see Appendix A, "Frequently ...
User Manual
Page 40
... configure 802.1x by use this mode, make note that: v Depending on the wireless LAN adapter installed on your computer, reconnecting to the access point or 802.1x authentication when your computer returns from suspend mode may take longer. v If you will not handle the configuration of Windows standard features may take...
... configure 802.1x by use this mode, make note that: v Depending on the wireless LAN adapter installed on your computer, reconnecting to the access point or 802.1x authentication when your computer returns from suspend mode may take longer. v If you will not handle the configuration of Windows standard features may take...
User Manual
Page 41
... you are available on the wireless LAN card, such as authentication type and encryption type, may not activate properly. If you select WPA as computer when computer information is available Select this button, and configure the settings that are using machine authentication. Properties Click this check box if you use of the...
... you are available on the wireless LAN card, such as authentication type and encryption type, may not activate properly. If you select WPA as computer when computer information is available Select this button, and configure the settings that are using machine authentication. Properties Click this check box if you use of the...
User Manual
Page 43
...start. This should be verified, leave the Validate server certificate check box blank. To enable this , select the Authenticate as computer when computer information is already registered on Func Software Odyssey Server. After you can use of the user ID and password for Windows logon....are using an IBM wireless adapter, you enter the necessary information, the authentication will be processed simultaneously. Chapter 2. Authenticate as computer when computer information is valid for activating the Single sign-on the certificate is used for the user name, enter the same name as...
...start. This should be verified, leave the Validate server certificate check box blank. To enable this , select the Authenticate as computer when computer information is already registered on Func Software Odyssey Server. After you can use of the user ID and password for Windows logon....are using an IBM wireless adapter, you enter the necessary information, the authentication will be processed simultaneously. Chapter 2. Authenticate as computer when computer information is valid for activating the Single sign-on the certificate is used for the user name, enter the same name as...