Capitalizing On New Profile-Deployment Capabilities To Ease Administration - Lenovo ThinkPad G41 Deployment Manual

Deployment guide for ibm access connections
Hide thumbs Also See for ThinkPad G41:
Table of Contents

Advertisement

Capitalizing on new profile-deployment capabilities to ease
administration
Access Connections has a feature to make location profile deployment centrally
manageable. Prior to having this capability, all client users were required to set up
their own location profiles. Although Access Connections software leads you
through the steps needed to create a profile, the entry of settings, especially
settings associated with security, can still be cumbersome. Now an IT administrator
can do the following:
v Create location profiles and distribute them as part of a hard disk image or send
v Control policies—such as whether a distributed profile can be modified or
v Establish rules to limit users who can import various deployment packages
v Create secure profile deployment packages that are encrypted and password
A standard installation of Access Connections software does not include the profile
distribution capability. The feature must be enabled using a separate software tool.
This enabler utility is available to IBM customers from a dedicated Web site for
registration and download. The enabler creates an additional menu item in the
Access Connections user interface called Profile Distribution. It is from this profile
distribution menu item that the IT administrator creates profiles to be distributed
and establishes appropriate user-access policy. If a selected profile contains a
wireless profile with encryption enabled, the administrator will be prompted to
re-enter the wireless security settings to be deployed, thus ensuring that the
administrator knows the security settings such as the WEP encryption key. If the
wrong WEP key is entered, that WEP key will be deployed but not usable.
With the profile deployment capability, Access Connections software provides a
significant benefit to IT administrators in terms of wireless security manageability.
Many organizations that use WEP security leave their WEP encryption keys static
simply because the updating of WEP keys across the entire client user base is a
daunting task. This practice can put an organization at risk because static WEP key
encryption can be broken. The Access Connections profile-deployment feature
enables system administrators to remotely change and deploy new security settings
including WEP keys. By frequently changing WEP keys, system administrators can
dramatically reduce the possibility of security breaches in a WLAN environment.
IBM Access Connections software facilitates fast, easy network connections by
using profiles to define the network adapter and associated networking parameters
for different locations. Easy to use and manage, Access Connections software
delivers a comprehensive network connectivity solution to help you improve total
cost of ownership and employee productivity. And with the Access Connections
software profile deployment feature, a system administrator can centrally create
profiles and remotely deploy them to the client user base—as opposed to setting
the profile files to client systems that have already been deployed, thereby
saving users from spending time individually setting up profiles.
deleted—for all profiles in the system, which could prevent users from
inadvertently modifying or deleting a profile and then needing help-desk
support.
using distribution control lists (selectively distribute the profiles based on
ThinkPad serial numbers).
protected so only authorized individuals can import the location profiles. This
feature is important because profiles may contain wireless security content such
as a WEP key or WPA TKIP PSK (Wi-Fi Protected Access Temporal Key Integrity
Protocol Pre Shared Key).
Chapter 2. Using Access Connections
7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents