RESTRICTED RIGHTS. Use, duplication or disclosure by the Government is subject to the GSA ADP Schedule contract with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is unable to accept this Program under these terms, then we provide this Program under the provisions set forth in Commercial Computer Software–Restricted Rights at FAR 52.227-19, when applicable, or under Rights in...
ThinkVantage Personal Computing Support - ThinkVantage Technologies page http://www.pc.ibm.com/us/think/thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Personal Computing Support page http://www.lenovo.com/think/support Go to this Web page for access to the ThinkVantage Personal Computing Support Web site. viii...
– Intel Pro/Wireless 3945 ABG Wireless LAN adapter – Broadcomm 4318/4311 Wireless LAN Adapter Notes on use of Access Connections when using Broadcomm 4318/4311 Wireless LAN adapter: 1. Limited support is offered on Windows XP. For access to it, enable Windows Zero Configuration Service.
To display more details about the copyright statement, press More Information. Figure 3. More Information window 2. Press OK. The main window opens. Figure 4. Access Connections main window—main menu ThinkVantage Access Connections 4.1: User’s Guide...
3. On the toolbar, click Locations. Figure 5. Main menu—Locations On the popup, click Create New Profile. The profile wizard starts. Figure 6. Profile wizard window Chapter 2. Using location profiles...
4. Insert the profile name. It may be the physical location of the network or any other easily recognizable name. Figure 7. Profile wizard—Insert Profile Name ThinkVantage Access Connections 4.1: User’s Guide...
For any profile created, you can also select one of the location icons that Access Connections provides for home, office, airport, hotspot, hotel , train, or meeting area. Figure 8. Pull-down menu for Location icon Chapter 2. Using location profiles...
5. Select the type of network connection. You can select any of the types listed on the screen below: Figure 9. Pull-down menu for the type of network connection ThinkVantage Access Connections 4.1: User’s Guide...
Best Available Network Choose this type of network connection to create a profile that will automatically select either a wired Ethernet network or a wireless 802.11 networks at the same location. This capability is useful when you move frequently within a location - for instance, between a wired connection at your desk and a wireless LAN connection elsewhere in the same building.
Wired LAN (Ethernet) Choose this type of network connection if the profile will be used only to connect to a Wired LAN (Ethernet). Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Figure 11.
Wireless LAN (802.11) Choose this type of network connection if the profile will be used to connect to an 802.11 a, b, or g wireless LAN only. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table. You can configure the settings for authentication and encryption.
Wired Broadband (DSL or Cable Modem) Choose this type of network connection if the profile will be used only to connect to wired broadband. The broadband connections are DSL, cable modem, and ISDN. Typically, your computer will connect to the broadband network through an Ethernet adapter.
Dial-up (modem or cellular phone) Choose this type of network connection if the profile will be used only to connect to dial-up. Examples of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to a cellular phone. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
Wireless WAN Choose this type of network connection if the profile will be used only to connect to a wireless WAN (wide area network). Wireless WAN connections require a service subscription to connect successfully. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
b. Click Authentication Properties; then enter the authentication settings provided by your network administrator. Figure 16. Authentication Properties window c. Click OK. 7. You can prevent multiple simultaneous connections, and thus conserve battery life, by selecting Disconnect from the network and power off any wireless radio associated with this profile when switching to a different location.
b. Click Authentication Properties; then enter the authentication settings provided by your network administrator. c. Click OK. 12. To disconnect from the network when you switch to a different location profile, select Disconnect from the network when switching to a different location.
18. Next, select the connection type. Two types are available: Infrastructure Use this connection type when your computer will be communicating with wireless access points. Adhoc Use this connection type to communicate directly with another computer without connecting to a wireless access point first. 19.
Use 802.1x - EAP Cisco (LEAP) This version of EAP is available only when a Cisco or Cisco-compatible wireless adapter is installed in your system. It uses authentication and dynamic encryption keys to secure the wireless network. Use 802.1x - EAP Cisco (EAP-FAST) This version of EAP is available only when a Cisco or Cisco-compatible wireless adapter is installed in your system.
The following settings are available: Transmit Power Level Choose a transmitting power level, from the minimum 10%, to the maximum, 100%. Use it to transmit at the lower level. The value is set automatically in response to a notice from the access point. 802.11b Preamble The default setting is Short&long.
26. Click Next. The phonebook settings page is displayed. Figure 20. Phonebook settings window 27. Choose or create a phonebook entry. To enter the details of the DSL account, click Properties. ThinkVantage Access Connections 4.1: User’s Guide...
28. The Enter Your DSL Account Details window is displayed. Figure 21. Enter Your DSL Account Details window Enter the necessary information; then click OK. 29. Click Next. 30. Go to step 38 on page 25. 31. If you selected Dial-up (Modem or Cellular Phone) in step 5 on page 8, click Next.
To use a dialer application provided by your service provider, select Find my dialer program. Figure 22. Find my dialer program window ThinkVantage Access Connections 4.1: User’s Guide...
Enter the path by clicking Select my Dialer Program. Figure 23. Choose Custom Dialer window Chapter 2. Using location profiles...
To use the dialer application provided by Windows, select Manual dialer setup. Then either select an existing phonebook entry or add a new one. Figure 24. Manual dialer setup window 33. Click Next. 34. Go to step 38 on page 25. 35.
38. The Additional settings window appears. Figure 25. Additional settings window Change the additional settings as appropriate. 39. Click Finish. The confirmation panel appears. 40. Click Save. 41. To add the newly created profile to a list of the automatically switched profiles, select Add this location profile to the Automatic Location Switching list.
Enable Windows firewall Prevents unauthorized access to your computer from the network. This option is available only in Windows XP. For Windows XP Service Pack 2, this setting is selected by default. To disable the default OS setting, clear this check box. You cannot establish the VPN connection when this setting is enabled;...
To close the program automatically before connecting to a network, enter the name of this application on the Special settings panel. Your computer will connect to the network only after this program is closed. Set Default Printer Choose the printer that will be used by default. All print jobs will be sent to this printer unless otherwise specified.
Wireless security settings Using static WEP key If you selected Use Static WEP keys for the wireless security type, the Static WEP Settings window opens. Figure 29. Static WEP Settings window Here you must configure the following settings: Data encryption Select 64bit (WEP-64 bits) or 128bit (WEP-128bits) for the WEP key length.
Using Wi-Fi Protected Access - Pre-Shared Key (WPA-PSK) If you selected Use WPA-PSK key as the wireless security type, the WPA-PSK Settings window opens. Figure 30. Wi-Fi Settings window You can configure the following settings: Data encryption The popup lists the data encryption modes available for the wireless LAN card that is installed on your system.
If you select this mode, Access Connections will not handle the configuration of wireless LAN. Select this mode to configure adapters that cannot be directly configured by use of Access Connections. When you use this mode, make note that: v Depending on the wireless LAN adapter installed on your computer, reconnecting to the access point or 802.1x authentication when your computer returns from suspend mode may take longer.
Authenticate as computer when computer information is available Select this check box if you are using machine authentication. Properties Click this button, and configure the settings that depend on the authentication you use. You must also enter the Certificate issuer setting.
Access point authentication setting, Data encryption must be set to either TKIP or AES. If you select WPA2, AES is selected by default. Validate server authentication You may have to enter the subdomain name of the Radius server (ibm.com etc.). Use client certificate Click Select.
established. If the selected certificate is valid, the logon ID that appears on the certificate is entered automatically in the Logon name field. Authenticate as computer when computer information is available If you are using an IBM wireless adapter, you can use machine certification for the authentication.
Use saved user ID and password The user ID and password for the tunnel authentication are set in advance. If using the Windows logon user name and password for wireless network authentication is enabled, the available user ID and password will be used for tunnel authentication at Windows logon, and the computer will log on to the Windows domain server.
log on to the Windows domain server. To enable this setting, go to Option, and select the check box for Use Windows logon user name and password to authenticate the wireless network. When tunnel authentication is set to GTC, you can configure the following settings. Use one-time token Under GTC tunnel authentication, the connection is established after a temporary password for tunnel authentication, called a token, specified by...
Using 802.1x - EAP Cisco (LEAP) If you have selected EAP Cisco (LEAP) mode, you can configure the settings for user ID and password necessary for use of Cisco LEAP. The LEAP Settings window is displayed: Figure 34. LEAP Settings window Configure the following settings.
Automatically display user name and password prompt for LEAP To display the prompt asking you to enter the user name and password that are to be displayed when the location profile is deployed (if they have not already been entered), choose this setting. After you enter the user name and password, the authentication process starts.
Using 802.1- Cisco (EAP-FAST) If you have selected EAP Cisco (EAP-FAST) mode, you can set a user ID and password for use of this security mode. The EAP-FAST Settings window is displayed as follows: Figure 35. EAP-FAST Settings window Configure the following settings: Data encryption Select one of the following options: v WEP...
For Thinkpad computers that support the use of a fingerprint reader to log on to Windows, the wireless network authentication will be processed automatically. Automatically display user name and password prompt for EAP-FAST To display the prompt asking you to enter the user name and password displayed when the location profile is deployed (if they have not already been entered), choose this setting.
points when you move your computer; this is the fast roaming feature. You will then be able to roam quickly between access points without having to authenticate repeatedly. Editing VPN settings If you selected the optional setting Enable Virtual Private Network (VPN) connection in the process of creating a profile, the VPN settings window is displayed.
To use the VPN program provided by Windows, select Manually set up a VPN connection, and then either select an existing phonebook entry or add a new one. Figure 37. VPN settings—Manually set up a VPN connection window If you select Manually set up my VPN connection using Microsoft Windows network connection Wizard, proceed to create the VPN connection by clicking the Add button.
Managing location profiles To create or delete a location profile, or edit the settings for an existing profile, go to Locations on the main toolbar, and press Manage Profiles on the pull-down menu. The Manage Location Profiles panel, with a list of available profiles, is displayed. Figure 38.
Delete: Permanently remove the selected location profile. Location Switching: Switch location profiles automatically. By default, all existing location profiles are shown in the Manage Location Profiles window. To hide a profile from the Locations list and the Fn+F5 on-screen menu, and to remove the profile from automatic location switching, clear the check box to the left of the name of that profile.
Connecting to a network To connect to a network, choose and apply its location profile. You can connect or switch between existing location profiles from the main window, the on-screen menu that is displayed after pressing Fn+F5, or the system tray icon. To connect from the main window, select the location profile, that matches where you are from the Locations pull-down menu, and then click Connect.
Connecting to a wireless network To find the wireless network available at your location, on the main menu click Tools, and then select Find wireless networks from the pull-down list. The list of available access points is displayed. Figure 41. Find Wireless Networks window An access point for an available network is indicated as follows: The following four icons indicate the type of wireless connection: v Secured wireless LAN network...
To display the access point list in the AC3.x format, select the Show Details check box. Figure 42. Find Wireless Networks window—detailed view If the access point found is currently associated with your ThinkPad, its antenna is marked with a red circle. If it is encrypted, it is marked with a blue security icon. To connect to any of the found networks, select the network and click Connect.
Switching location profiles automatically As you move your computer from place to place, Access Connections can automatically detect available wireless LAN (802.11) and Ethernet networks and apply the location profile of one of them for you. Figure 43. Automatic Location Switching window To configure automatic switching between location profiles, do as follows: 1.
Viewing the connection status You can use Access Connections to monitor the status of your network connections. For more information, click one of the following: AC main window When Access Connections is launched, the Location Profiles tab of the main window is selected by default. The window associated with this tab graphically depicts the status for the location profile selected in the Locations pull-down menu.
v Connected to DSL network device v Connected to DSL network device with VPN enabled v Secured (encrypted) wired network communication in progress v Open (non-secured) wireless network communication in progress v Secured (encrypted) wireless network communication in progress v Disconnected from DSL network device v Connected to wireless access point Chapter 2.
v Connected to wireless access point with VPN enabled v Disconnected from wireless access point v Connected to Ethernet network v Connected to Ethernet network with VPN enabled v Disconnected from Ethernet network v Connected to wireless WAN network v Connected to wireless WAN network with VPN enabled ThinkVantage Access Connections 4.1: User’s Guide...
v Disconnected from wireless WAN network v Connected to remote device or network through a modem v Connected to remote device or network using a modem with VPN enabled v Disconnected from modem Task tray icons Access Connections provides two task tray icons. One is for general connection status;...
Icons for status of wireless LAN v Power to the wireless radio is off. v Power to the wireless radio is on. The signal strength of the wireless connection is excellent. v Power to the wireless radio is on. The signal strength of the wireless connection is marginal.
Diagnostics Access Connections provides a set of tools to check status of a network connection and solve any problems found. Click Tools on the main toolbar, and select Diagnostics from the pull-down menu. The Diagnostic Tools window is displayed. Figure 44. Diagnostic Tools Click one of the following tabs to check the status of a connection and the network settings: v Connection status...
Diagnostic Tools panel; the displayed information is saved as a text file that can be used by a support center to diagnose a problem. When an attempt to connect to a network fails, the causes of problems, and possible solutions for them, are displayed, along with the current settings of the network.
The following window opens: Figure 45. Global Settings—Network tab 4. Make the necessary changes, and click OK. Network global settings apply to all users of this computer. The following network global settings can be configured: Allow Windows users without administrator privileges to create and apply location profiles Select this option to enable users to create and apply location profiles regardless of the windows logon privilege they have—administrator or...
can enable this option. Even if this option is selected, Windows security protection by default does not allow a limited user to modify or create TCP/IP settings, security settings for the local drive sharing, or firewall settings. Allow wireless connection at Windows logon (requires system restart) Select this option to use the user name and password applied at Windows logon as the credentials for connecting to a wireless network.
The following window opens: Figure 46. Global Settings—Notification tab 4. Make the necessary changes, and click OK. Notification global settings apply to all users of this computer. The following global settings can be configured: Show Access Connections status icon in task tray If you select this option, the Windows task tray will show an icon that displays the status of Access Connections.
Show wireless status icon in task tray If you select this option, the Windows task tray will show an icon that displays the status of your wireless network connection. Display the progress indicator window when a profile is being applied Select this option to display the progress indicator window while a profile is being applied.
Preferences apply only for the current user. The following preferences can be configured for Access Connections: Enable sound effects Select this option to turn on sound effects in Access Connections when the status of a connection changes. Enable animations Select this option to turn on animation of graphics in Access Connections. Do not show balloon tips from the Access Connections system tray icon Select this option to turn off balloon tip information coming from the Access Connections system tray icon.
4. To change the order of buttons on the toolbar, select a button from the list of current toolbar buttons, and click Higher to move it to the left for higher priority, or Lower to move it to the right for lower priority. 5.
The detailed information contains the following data specific to the WAN connection: Wireless signal condition Strength of the signal, presented graphically. Transmit /Receive Byte counts The counts of bytes transmitted and received during a connection are displayed on the main window in real time. The duration of the connection is also displayed in real time, both in the main window and in the WAN status information window on the task tray.
The Windows Firewall window opens. Figure 52. Windows Firewall window 3. Select the Exception tab, and click the Add Program button. ThinkVantage Access Connections 4.1: User’s Guide...
4. From the list, select Access Connections; then click OK. Figure 53. Add a Program window 5. The Exception tab opens. There, push the Add Program button again. 6. Click the Browse button, choose C:\Program Files\NetMeeting\conf.exe, and click Open. 7. On the Add a Program window, click OK. On the Windows Firewall dialog box, click OK again.
Table 1. Preparing the peer-to-peer connection (continued) Application Protocol Port Default Path 5353 C:\Program Files\ThinkPad\ConnectUtilities\ Access ACMainGUI.exe Connections 49443 IPSec TCP/UDP C:\Windows\system32\lsass.exe (lsass.exe) Creating the peer-to-peer connection To create a peer-to-peer connection, follow the steps below: Note: Peer-to-peer connection may be blocked by a firewall. Temporarily disable the firewall program or add NetMeeting and Access Connections to exception rules.
The ThinkPad Community starts, and the initial peer-to-peer window is displayed. Figure 55. Peer to Peer Community tab—Join button 3. Enter a passphrase specific to the community being established. It must contain at least eight characters in UNICODE code, including quotation marks, spaces, and underscores.
This process may take some time. During this process, a progress indicator is displayed. To stop applying the Adhoc setup, press the Stop button next to the progress indicator. ThinkPad Community restores the previous wireless adapter configurations. Note: The Close button closes only the progress indicator dialog box. If this is the first use of Peer to Peer Community and NetMeeting, the NetMeeting initialization dialog appears.
6. When NetMeeting starts, the progress indicator dialog box disappears, and the color of the ThinkPad icon at the left changes. The application buttons remain disabled until another member is found in the neighborhood. Figure 57. Peer to Peer community tab—Leave button 7.
The whiteboard is shared by all members. For a detailed explanation of how to use these applets, see NetMeeting Help. To open it, click Help on the menu bar of each applet. Change the configuration options To change the following options, go to the Configure menu: Note: After joining the group, you cannot change the settings.
10. If I log on to Windows with a different user ID, are there any differences in the operations of Access Connections? The differences are listed in the table: Table 2. Differences in the operations of Access Connections when different user IDs are used Abilities Administrator...
13. Why am I prompted to enter a comment when I am using an Ethernet connection? You are prompted to type a comment because Access Connections has found a new network device for an automatic network connection. Access Connections recognizes this network as the most suitable one for the current location profile.
Appendix C. Getting help and technical assistance If you need help, service, or technical assistance or just want more information about Lenovo products, you will find a wide variety of sources available from Lenovo to assist you. This appendix contains information about where to go for additional information about Lenovo and Lenovo products, what to do if you experience a problem, and whom to call for service, if it is necessary.
Consult your local Lenovo representative for information on the products and services currently available in your area. Any reference to a Lenovo product, program, or service is not intended to state or imply that only that Lenovo product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any Lenovo intellectual property right may be used instead.
estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. ThinkVantage Access Connections 4.1: User’s Guide...
Appendix E. Trademarks The following terms are trademarks of Lenovo in the United States, other countries, or both: Lenovo ThinkPad ThinkVantage The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: IBM (used under license)