User Manual
Page 4
.... U.S. Portions © Copyright International Business Machines Corporation 2006. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is subject to accept this Program ...under Rights in Appendix D, "Notices," on page 81. All rights reserved. Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then we provide this information and the product it supports, ...
.... U.S. Portions © Copyright International Business Machines Corporation 2006. RESTRICTED RIGHTS: Our products and/or services are provided with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is subject to accept this Program ...under Rights in Appendix D, "Notices," on page 81. All rights reserved. Note: Before using this Program under the provisions set forth in Commercial Computer Software-Restricted Rights at FAR 52.227-19, when applicable, or under these terms, then we provide this information and the product it supports, ...
User Manual
Page 10
ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Access Connections resources on the World Wide Web The following Web pages provide resources for access to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Personal Computing Support - ThinkVantage...
ThinkVantage Personal Computing Support page http://www.lenovo.com/think /thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Access Connections resources on the World Wide Web The following Web pages provide resources for access to the ThinkVantage Personal Computing Support Web site. v Repeatable parameters are underlined. ThinkVantage Personal Computing Support - ThinkVantage...
User Manual
Page 11
...application software is a connectivity assistant program for Vodafone HSDPA/WCDMA Communication Manager software. By switching between location profiles, when moving their computers from a specific location such as home or work. Note: For WAN connection service, Access Connections provides an integration with any...for Internet Explorer and the Firefox Browser, security settings for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Each location profile stores all of system considerations and limitations that must consider where it will be installed and what ...
...application software is a connectivity assistant program for Vodafone HSDPA/WCDMA Communication Manager software. By switching between location profiles, when moving their computers from a specific location such as home or work. Note: For WAN connection service, Access Connections provides an integration with any...for Internet Explorer and the Firefox Browser, security settings for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Each location profile stores all of system considerations and limitations that must consider where it will be installed and what ...
User Manual
Page 13
... profile stores the network configuration required to connect to reconfigure network settings manually. Figure 2. By switching between location profiles as you move your computer from place to place, Access Connections can quickly and easily connect to a network with no need for you create location profiles for networks ... a location profile A location profile defines all of different types. To create a new location profile, do the following: 1. Welcome to Access Connections window © Lenovo 2006. Using location profiles ThinkVantage Access Connections is displayed.
... profile stores the network configuration required to connect to reconfigure network settings manually. Figure 2. By switching between location profiles as you move your computer from place to place, Access Connections can quickly and easily connect to a network with no need for you create location profiles for networks ... a location profile A location profile defines all of different types. To create a new location profile, do the following: 1. Welcome to Access Connections window © Lenovo 2006. Using location profiles ThinkVantage Access Connections is displayed.
User Manual
Page 19
... a network at this type of network connection to create a profile that will automatically select either a wired Ethernet network or a wireless 802.11 networks at your computer support this type of the adapters you move frequently within a location - Create New Profile - Best Available Network Choose this location, Access Connections will attempt to...
... a network at this type of network connection to create a profile that will automatically select either a wired Ethernet network or a wireless 802.11 networks at your computer support this type of the adapters you move frequently within a location - Create New Profile - Best Available Network Choose this location, Access Connections will attempt to...
User Manual
Page 20
Access Connections will be used only to connect to a Wired LAN (Ethernet). Figure 11. Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Access Connections will be used only to connect to a Wired LAN (Ethernet). Figure 11. Create New Profile-Wired LAN (Ethernet) 10 ThinkVantage Access Connections 4.1: User's Guide Wired LAN (Ethernet) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 21
Create New Profile-Wireless LAN (802.11) Chapter 2. Figure 12. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. You can configure the settings for authentication and encryption. Using location profiles 11 Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Create New Profile-Wireless LAN (802.11) Chapter 2. Figure 12. Access Connections will be used to connect to an 802.11 a, b, or g wireless LAN only. You can configure the settings for authentication and encryption. Using location profiles 11 Wireless LAN (802.11) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
User Manual
Page 22
... the table. Create New Profile-Wired Broadband (DSL or Cable Modem) 12 ThinkVantage Access Connections 4.1: User's Guide Typically, your computer support this type of network connection, and show them in your computer will be used only to connect to wired broadband. Figure 13. Choose the one you also must select Configure my...
... the table. Create New Profile-Wired Broadband (DSL or Cable Modem) 12 ThinkVantage Access Connections 4.1: User's Guide Typically, your computer support this type of network connection, and show them in your computer will be used only to connect to wired broadband. Figure 13. Choose the one you also must select Configure my...
User Manual
Page 23
Using location profiles 13 Examples of network connection, and show them in the table. Access Connections will be used only to connect to a cellular phone. Figure 14. Creating New Profile-Dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up. Dial-up (modem or cellular phone) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of dial-up (modem or cellular phone) Chapter 2.
Using location profiles 13 Examples of network connection, and show them in the table. Access Connections will be used only to connect to a cellular phone. Figure 14. Creating New Profile-Dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to dial-up. Dial-up (modem or cellular phone) Choose this type of network connection if the profile will automatically determine which adapters in your computer support this type of dial-up (modem or cellular phone) Chapter 2.
User Manual
Page 24
... Enable IEEE 802.1x authentication for Ethernet. 14 ThinkVantage Access Connections 4.1: User's Guide Do as follows: a. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you want to use. Choose the one you can enable optional IEEE...
... Enable IEEE 802.1x authentication for Ethernet. 14 ThinkVantage Access Connections 4.1: User's Guide Do as follows: a. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in step 5 on page 8, you want to use. Choose the one you can enable optional IEEE...
User Manual
Page 26
..., select Disconnect from the network when you can conserve battery life by access points, click Find Network. then enter the authentication settings provided by your computer and display the names of those being broadcasted by preventing multiple simultaneous connections. If you selected Wireless LAN (802.11) in range, leave the SSID...
..., select Disconnect from the network when you can conserve battery life by access points, click Find Network. then enter the authentication settings provided by your computer and display the names of those being broadcasted by preventing multiple simultaneous connections. If you selected Wireless LAN (802.11) in range, leave the SSID...
User Manual
Page 27
... mode that implement IEEE 802.1x Extensible Authentication Protocol (EAP) security require each time an authentication attempt is inserted or your computer will be encrypted and decrypted by use of the wireless security types, listed in encrypting and decrypting data that implement this profile...adapter each time the adapter is made. Dynamic keys are session-based and are available: Infrastructure Use this connection type when your computer is disabled) Select this connection type to communicate directly with in-range access points. If you select Auto, the adapter will...
... mode that implement IEEE 802.1x Extensible Authentication Protocol (EAP) security require each time an authentication attempt is inserted or your computer will be encrypted and decrypted by use of the wireless security types, listed in encrypting and decrypting data that implement this profile...adapter each time the adapter is made. Dynamic keys are session-based and are available: Infrastructure Use this connection type when your computer is disabled) Select this connection type to communicate directly with in-range access points. If you select Auto, the adapter will...
User Manual
Page 35
...Network Security On the Security Settings window, select one or more of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your Internet connection. Chapter 2. Click Save. 41. To add the newly created profile to...for a temporary connection, such as appropriate. 39. 38. The confirmation panel appears. 40. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your files and printers. The Additional settings window appears. You can skip this profile is available ...
...Network Security On the Security Settings window, select one or more of the following options: Disable file and printer sharing Prevents other computers on a Microsoft-based network from using your Internet connection. Chapter 2. Click Save. 41. To add the newly created profile to...for a temporary connection, such as appropriate. 39. 38. The confirmation panel appears. 40. Disable Internet Connection Sharing Prevents other computers on the local network from accessing your files and printers. The Additional settings window appears. You can skip this profile is available ...
User Manual
Page 36
... VPN connection, clear this setting is enabled; To disable the default OS setting, clear this setting is selected by default. This option is to your computer from the network. Security Settings window Start Applications Automatically You can specify whether the program is available only in Windows XP. Figure 27.
... VPN connection, clear this setting is enabled; To disable the default OS setting, clear this setting is selected by default. This option is to your computer from the network. Security Settings window Start Applications Automatically You can specify whether the program is available only in Windows XP. Figure 27.
User Manual
Page 37
... from a DHCP network server or defined locally, by default. To close the program automatically before connecting to a network, enter the name of static addresses. Your computer will be used by use of this program is closed. Override Home Page Choose whether to switch the printer manually each time you can print...
... from a DHCP network server or defined locally, by default. To close the program automatically before connecting to a network, enter the name of static addresses. Your computer will be used by use of this program is closed. Override Home Page Choose whether to switch the printer manually each time you can print...
User Manual
Page 38
... keys for the wireless security type, the Static WEP Settings window opens. For the number of this check box if you first power on your computer, without logging on to the network by use of characters, see "Data encryption." Use this profile to connect during Windows logon Select this profile when...
... keys for the wireless security type, the Static WEP Settings window opens. For the number of this check box if you first power on your computer, without logging on to the network by use of characters, see "Data encryption." Use this profile to connect during Windows logon Select this profile when...
User Manual
Page 39
...following settings: Data encryption The popup lists the data encryption modes available for encrypting the actual transmission. if you first power on your computer, without logging on your system. Use this profile to connect during Windows logon Select this check box if you want to connect ..., see Appendix A, "Frequently asked questions," on page 73, question 9 on page 73 and question 10 on the access point. Consult your computer is installed on to configure 802.1x If your network administrator for the appropriate settings. Figure 30. Pre-Shared Key (WPA-PSK) If you...
...following settings: Data encryption The popup lists the data encryption modes available for encrypting the actual transmission. if you first power on your computer, without logging on your system. Use this profile to connect during Windows logon Select this check box if you want to connect ..., see Appendix A, "Frequently asked questions," on page 73, question 9 on page 73 and question 10 on the access point. Consult your computer is installed on to configure 802.1x If your network administrator for the appropriate settings. Figure 30. Pre-Shared Key (WPA-PSK) If you...
User Manual
Page 40
...location switching that cannot be directly configured by use this mode, make sure that : v Depending on the wireless LAN adapter installed on your computer, reconnecting to configure adapters that involves domain logon is displayed. click Authentication Properties. v Authentication tab Enable 802.1x on page 16. Select ...the one entered previously, in step 17 on this network Select this mode to the access point or 802.1x authentication when your computer returns from suspend mode may take longer. To configure 802.1x by use of Access Connections is provided, and make note that...
...location switching that cannot be directly configured by use this mode, make sure that : v Depending on the wireless LAN adapter installed on your computer, reconnecting to configure adapters that involves domain logon is displayed. click Authentication Properties. v Authentication tab Enable 802.1x on page 16. Select ...the one entered previously, in step 17 on this network Select this mode to the access point or 802.1x authentication when your computer returns from suspend mode may take longer. To configure 802.1x by use of Access Connections is provided, and make note that...
User Manual
Page 41
... profiles 31 The 802.1x Settings window opens. If you select WPA as authentication type and encryption type, may not activate properly. Authenticate as computer when computer information is available Select this check box if you are available on the authentication you use functions of Access Connections in configuring the settings for...
... profiles 31 The 802.1x Settings window opens. If you select WPA as authentication type and encryption type, may not activate properly. Authenticate as computer when computer information is available Select this check box if you are available on the authentication you use functions of Access Connections in configuring the settings for...
User Manual
Page 43
... for tunnel authentication. The application will not check the reliability of a reliable route certificate issuer. Chapter 2. established. Authenticate as computer when computer information is available If you are using an IBM wireless adapter, you enter the necessary information, the authentication will start. then ...is available check box; To do this setting, go to Option, and select the check box for tunnel authentication as computer when computer information is used for Use Windows logon user name and password to the network domain. This should be based entirely on...
... for tunnel authentication. The application will not check the reliability of a reliable route certificate issuer. Chapter 2. established. Authenticate as computer when computer information is available If you are using an IBM wireless adapter, you enter the necessary information, the authentication will start. then ...is available check box; To do this setting, go to Option, and select the check box for tunnel authentication as computer when computer information is used for Use Windows logon user name and password to the network domain. This should be based entirely on...