Novell LINUX ENTERPRISE DESKTOP 10 SP2 - DEPLOYMENT GUIDE 08-05-2008 Deployment Manual page 592

Table of Contents

Advertisement

Figure 29.2 YaST Bluetooth Configuration
In the first step of the configuration, determine whether Bluetooth services should be
started on your system. If you have enabled the Bluetooth services, two things can be
configured. First, the Device Name. This is the name other devices display when your
computer has been discovered. There are two placeholders available—%h stands for
the hostname of the system (useful, for example, if it is assigned dynamically by DHCP)
and %d inserts the interface number (only useful if you have more than one Bluetooth
adapter in your computer). For example, if you enter Laptop %h in the field and
DHCP assigns the name unit123 to your computer, other remote devices would know
your computer as Laptop unit123.
The Security Manager parameter is related to the behavior of the local system when a
remote device tries to connect. The difference is in the handling of the PIN number.
Either allow any device to connect without a PIN or determine how the correct PIN is
chosen if one is needed. You can enter a PIN (stored in a configuration file) in the ap-
propriate input field. If a device tries to connect, it first uses this PIN. If it fails, it falls
back to using no PIN. For maximum security, it is best to choose Always Ask User for
PIN. This option allows you to use different PINs for different (remote) devices.
Click Advanced Daemon Configuration to enter the dialog for selecting and configuring
the available services (called profiles in Bluetooth). All available services are displayed
in a list and can be enabled or disabled by clicking Activate or Deactivate. Click Edit
576
Deployment Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Linux enterprise desktop 10 sp2

Table of Contents