Lenovo ThinkPad G41 Deployment Manual
Lenovo ThinkPad G41 Deployment Manual

Lenovo ThinkPad G41 Deployment Manual

Deployment guide for ibm access connections
Hide thumbs Also See for ThinkPad G41:

Advertisement

IBM Access
Connections Deployment Guide
Version 3.3.0
Date: October 11, 2004

Advertisement

Table of Contents
loading

Summary of Contents for Lenovo ThinkPad G41

  • Page 1 IBM Access Connections Deployment Guide Version 3.3.0 Date: October 11, 2004...
  • Page 2 Third Edition (October 2004) © Copyright International Business Machines Corporation 2004. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
  • Page 3 Preface This guide is intended for IT administrators, or those who are responsible for ® deploying IBM Access Connections on computers in their organizations. The guide is intended to provide the information required for installing IBM Access Connections on one or many computers, provided that licenses for the software are available for each target computer.
  • Page 4 IBM Access Connections Deployment Guide Version 3.3.0...
  • Page 5: Table Of Contents

    Contents Preface ....iii Requirements and specifications for deployment . Chapter 4. Deploying Access Chapter 1. Overview ..1 Connections .
  • Page 6 IBM Access Connections Deployment Guide Version 3.3.0...
  • Page 7: Chapter 1. Overview

    Chapter 1. Overview IBM Access Connections is a connectivity assistant program which helps to configure various network connections including wireless LANs. Users can create and manage location profiles which helps to store the network and Internet configuration settings that are needed to connect the client computer to a network from a specific location such as home or work.
  • Page 8 between wireless location profiles, and Ethernet location profiles. You can establish a wireless priority list which allows you to define which wireless location profile will be made active when your computer is in range of multiple wireless networks, or when more than one location profile uses the same wireless network name.
  • Page 9: Chapter 2. Using Access Connections

    Chapter 2. Using Access Connections This chapter shows you how to use the features of Access Connections. Viewing connection status With the Connection Status window, client users can see their network connections at every link. Furthermore, client users can offer reliable status information to administrators remotely, so the administrators can diagnose and correct problems.
  • Page 10: Saving Location Profiles, Settings, Time, And Reducing Help Desk Calls

    13. Connection status Saving location profiles, settings, time, and reducing help desk calls Create location profiles with nearly all the settings you need to connect almost anywhere that network connectivity is available. After profiles are set, Access Connections lets you easily switch between them. Profiles can be set for automatic switching between wireless and wired connections based on the highest available compatible connection speed.
  • Page 11: Enabling Effortless Wireless Lan Connectivity For Mobile Users

    When the user returns to work, these parameters must be redefined. Network properties must be returned to fixed IP address and explicit DNS settings. This will include typing long strings of numbers—IP addresses—into associated fields. Proxy server parameters including the name of the proxy must also be reentered in Internet Explorer (Tools→Options) to enable Internet browsing.
  • Page 12: Extending Wireless Connection Capabilities Beyond Wlan

    proxy server at work and a VPN client with no proxy server at home. In both locations the connection is Ethernet, but the settings are different. Access Connections software changes your network and Internet settings automatically. v Can prioritize the adapters used in the multi-adapter profile to help ensure that the adapter with the lower priority will be utilized only when higher priority adapters cannot establish or maintain a connection.
  • Page 13: Capitalizing On New Profile-Deployment Capabilities To Ease Administration

    Capitalizing on new profile-deployment capabilities to ease administration Access Connections has a feature to make location profile deployment centrally manageable. Prior to having this capability, all client users were required to set up their own location profiles. Although Access Connections software leads you through the steps needed to create a profile, the entry of settings, especially settings associated with security, can still be cumbersome.
  • Page 14: Diagnosing Network Connectivity Problems

    up profiles individually at each client—resulting in streamlined management of network connectivity and helping you achieve lower overall IT costs. Diagnosing network connectivity problems IBM Access Connections supports a new feature of network diagnostics when users are unable to make network connections. It shows detailed progress of connection status and finds suspected reasons of failure and recommended actions.
  • Page 15: Chapter 3. Considerations For Deploying Access Connections

    Chapter 3. Considerations for deploying Access Connections Collecting information about the various places where users might attempt to connect and the kinds of connections available in those locations will help you develop preconfigured profiles that users can import and use right away. By capturing working configurations in profiles which can be deployed with the initial image, support calls can be reduced and users can immediately take advantage of their network connections without intervention.
  • Page 16 IBM Access Connections Deployment Guide Version 3.3.0...
  • Page 17: Chapter 4. Deploying Access Connections

    Chapter 4. Deploying Access Connections After creating the location profiles required for client users, you can also manage and deploy new, updated, or revised location profiles to client computers. Access Connections deployment features The following is a list of features to help IT administrators deploy and manage Access Connections: The IBM Access Connections Enabler for Administrator Profile Deployment feature is required to deploy location profiles that you create for client users.
  • Page 18: Installing The Standalone Ibm Access Connections

    Installing the standalone IBM Access Connections To install IBM Access Connections 3.0 or later without user interaction, do the following: 1. Start Windows 2000 or Windows XP, and then log on with administrative privileges. 2. Extract the Access Connections drivers to the hard disk drive. 3.
  • Page 19: Using The Administrator Feature

    Figure 2. Enabler for Administrator Profile Deployment Feature window Select Enable Administrator Feature. Select Exit to close the Enabler. 8. Start Access Connections. If you have not previously created profiles on the computer, the initial window for the profile creation wizard will be displayed. After you have created at least one profile, you will be able to view the main window of Access Connections.
  • Page 20 Figure 4. Create Distribution Package window The access control policy defines the restrictions that are in place for a particular profile. Access control policies can be defined per profile and can have the following values: a. Deny all changes / Deny Deletion: Users cannot perform operations such as modify, copy, or delete on the profile.
  • Page 21 files) can be copied to the installation folder for Access Connections. The next time Access Connections runs, it will detect and import the package silently. 5. Optional: The administrator can define a Distribution Control List based on computer serial numbers. This method of distribution enables the administrator to type individual serial numbers or to create different groups of serial numbers that represent different organizations of users who need different location profiles.
  • Page 22 Figure 6. Create Group Optional: You can define the Client Configuration Policy, which will control the capabilities that will be available to the user after the *.LOA file is imported. Note: Marking the box beside Do not allow clients to become an administrator will prevent users from enabling the Administrator Feature on their installation of Access Connections.
  • Page 23: Preparing For A New-Image Installation

    Figure 7. Define Client Configuration Policy 7. After you have specified all the necessary settings in the Define Client Configuration Policy window, click Create. A passphrase prompt will be displayed. The passphrase is used to encrypt the *.LOA file so that the file can be imported only if the Access Connections application was installed as described in Section 4.4 or if you provide the passphrase to the user.
  • Page 24: Deploying Access Connections Location Profiles Remotely

    Create the location profiles, as described in section “Using the Administrator Feature” on page 13. 4. Create the deployment package, as described in section “Using the Administrator Feature” on page 13. 5. While creating the location deployment package, mark the check box beside Do not allow clients to become administrator in the Client Configuration Policy window.
  • Page 25: Attended Deployment

    Attended deployment To deploy Access Connections location profiles to remote users or to computers that have already been deployed, do the following: Using the Administrator Feature, create the *.loa file that contains the profiles that remote users need. During the export process, specify the serial numbers of the remote users’ computers and set a password to use in encrypting the *.loa file.
  • Page 26 IBM Access Connections Deployment Guide Version 3.3.0...
  • Page 27: Appendix. Notices

    Appendix. Notices IBM may not offer the products, services, or features discussed in this document in all countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used.
  • Page 28: Trademarks

    Trademarks The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: ThinkPad ThinkCentre Tivoli ® Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other countries, or both. Intel, Intel Inside (logos), MMX and Pentium are trademarks of Intel Corporation in the United States, other countries, or both.

Table of Contents