(English) Access Connections Profile Deployment guide
Page 4
... are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted rights to use , reproduction, or disclosure is subject to restrictions set forth in Contract No. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are delivered pursuant a General Services...
... are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted rights to use , reproduction, or disclosure is subject to restrictions set forth in Contract No. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are delivered pursuant a General Services...
(English) Access Connections Profile Deployment guide
Page 5
...administrators, or those who are available for each target computer. ThinkVantage® Technologies is to this guide is developed for working with your Lenovo™ authorized representative. Portions © IBM Corp. 2005. This deployment guide will provide instructions and solutions for IT professionals and the unique..., communicate with Access Connections. If you lower the total cost of this guide, visit the following Web site: www.lenovo.com © Lenovo 2008. To learn more about the technologies that licenses for the software are responsible for information about...
...administrators, or those who are available for each target computer. ThinkVantage® Technologies is to this guide is developed for working with your Lenovo™ authorized representative. Portions © IBM Corp. 2005. This deployment guide will provide instructions and solutions for IT professionals and the unique..., communicate with Access Connections. If you lower the total cost of this guide, visit the following Web site: www.lenovo.com © Lenovo 2008. To learn more about the technologies that licenses for the software are responsible for information about...
(English) Access Connections Profile Deployment guide
Page 7
...24 Deploying .LOA and .SIG files through Active Directory with the Administrator Feature 7 Enabling the Administrator feature 7 Using the Administrator feature 8 Creating a distribution package 8 Defining policies for deployment . 2 Access Connections deployment features .... . . . . 3 Chapter 2. Command line interface 29 Appendix B. Notices 33 Trademarks 34 © Lenovo 2008. Installing Access Connections 5 Installing Access Connections without user interaction 5 Uninstalling Access Connections 5 Chapter 3. Overview 1 Features 1 ...
...24 Deploying .LOA and .SIG files through Active Directory with the Administrator Feature 7 Enabling the Administrator feature 7 Using the Administrator feature 8 Creating a distribution package 8 Defining policies for deployment . 2 Access Connections deployment features .... . . . . 3 Chapter 2. Command line interface 29 Appendix B. Notices 33 Trademarks 34 © Lenovo 2008. Installing Access Connections 5 Installing Access Connections without user interaction 5 Uninstalling Access Connections 5 Chapter 3. Overview 1 Features 1 ...
(English) Access Connections Profile Deployment guide
Page 9
... various types of the network connection associated with each location profile defined in Access Connections allowing you . If the © Lenovo 2008. Virtual private network (VPN) connections are away from the list and connect to support automatic location switching between location profiles...help users connect to a network without having to switch between location profiles Access Connections allows you open the window, status is useful when you are traveling or in range of 3G cellular technologies, wireless WAN services are available to you to reconfigure network settings ...
... various types of the network connection associated with each location profile defined in Access Connections allowing you . If the © Lenovo 2008. Virtual private network (VPN) connections are away from the list and connect to support automatic location switching between location profiles...help users connect to a network without having to switch between location profiles Access Connections allows you open the window, status is useful when you are traveling or in range of 3G cellular technologies, wireless WAN services are available to you to reconfigure network settings ...
(English) Access Connections Profile Deployment guide
Page 10
... to a matching location profile. You can establish a wireless priority list that users can import and use right away. Access Connections provides an icon in the field using the detected wireless network name and default settings. Requirements and specifications for export to the client computers....profiles for deployment To view the current list of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide The deployment...
... to a matching location profile. You can establish a wireless priority list that users can import and use right away. Access Connections provides an icon in the field using the detected wireless network name and default settings. Requirements and specifications for export to the client computers....profiles for deployment To view the current list of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide The deployment...
(English) Access Connections Profile Deployment guide
Page 13
Chapter 2. Extract the Access Connections software package to your local directory. © Lenovo 2008. a. Uninstalling Access Connections To uninstall Access Connections, complete the following steps: 1. To uninstall silently with log path specified, type: \setup.exe -S-SMS-f1\... Access Connections designed specifically for install log, type: \setup.exe -S-SMS-f2x c. The following commands will prevent automatic restart. The following command can be used to install Access Connections. Installing Access Connections The following steps: a) Go to restart the system later.
Chapter 2. Extract the Access Connections software package to your local directory. © Lenovo 2008. a. Uninstalling Access Connections To uninstall Access Connections, complete the following steps: 1. To uninstall silently with log path specified, type: \setup.exe -S-SMS-f1\... Access Connections designed specifically for install log, type: \setup.exe -S-SMS-f2x c. The following commands will prevent automatic restart. The following command can be used to install Access Connections. Installing Access Connections The following steps: a) Go to restart the system later.
(English) Access Connections Profile Deployment guide
Page 15
...= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export feature of Access Connections. Enabler for Administrator Profile Deployment Feature for Windows 2000 and XP Figure 2. Do not use the administrator features of Access Connections is installed in the following path: C:\Program Files\ThinkPad\ConnectUtilities... 3. Click Enable, and then click Exit. Figure 1. Working with the Administrator Feature This chapter provides you with the information you need to enable and use the Import/Export feature for migrating profiles only...
...= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export feature of Access Connections. Enabler for Administrator Profile Deployment Feature for Windows 2000 and XP Figure 2. Do not use the administrator features of Access Connections is installed in the following path: C:\Program Files\ThinkPad\ConnectUtilities... 3. Click Enable, and then click Exit. Figure 1. Working with the Administrator Feature This chapter provides you with the information you need to enable and use the Import/Export feature for migrating profiles only...
(English) Access Connections Profile Deployment guide
Page 16
... being deployed is configured for users by Access Connections. Consider the following steps provide the ideal scenario for location profiles used by creating or editing distribution packages. Create or edit a distribution package with encryption enabled, you create the location profiles...contains the metadata for using the administrator feature of Access Connections: 1. Deploy the distribution package to client systems. Creating a distribution package Complete the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2....
... being deployed is configured for users by Access Connections. Consider the following steps provide the ideal scenario for location profiles used by creating or editing distribution packages. Create or edit a distribution package with encryption enabled, you create the location profiles...contains the metadata for using the administrator feature of Access Connections: 1. Deploy the distribution package to client systems. Creating a distribution package Complete the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2....
(English) Access Connections Profile Deployment guide
Page 18
...which is also encrypted in a *.sig file which are required for deployment are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. Defining policies for Access Connections The following options: v "Distribution Control List with this package" v "Client Configuration Policy"... Users can modify, copy and delete the profile. 4. Click the Create button located at the bottom of this package This setting is used to import the deployment package silently. 7. When prompted, enter a passphrase to your .loa file. Figure 6. v Deny all changes ...
...which is also encrypted in a *.sig file which are required for deployment are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. Defining policies for Access Connections The following options: v "Distribution Control List with this package" v "Client Configuration Policy"... Users can modify, copy and delete the profile. 4. Click the Create button located at the bottom of this package This setting is used to import the deployment package silently. 7. When prompted, enter a passphrase to your .loa file. Figure 6. v Deny all changes ...
(English) Access Connections Profile Deployment guide
Page 19
...: will be imported which controls the capabilities that has been created with the Administrator Feature 11 v Create and apply WLAN location profiles using the Find Wireless Network function for updates. This simplifies the process of controlling distribution to a large number of users who need different ...Groups: When creating groups of serial numbers, flat text files can be available to the user after the *.loa file is useful in large enterprise environments when you to type individual serial numbers or to create different groups of serial numbers that represent different ...
...: will be imported which controls the capabilities that has been created with the Administrator Feature 11 v Create and apply WLAN location profiles using the Find Wireless Network function for updates. This simplifies the process of controlling distribution to a large number of users who need different ...Groups: When creating groups of serial numbers, flat text files can be available to the user after the *.loa file is useful in large enterprise environments when you to type individual serial numbers or to create different groups of serial numbers that represent different ...
(English) Access Connections Profile Deployment guide
Page 20
v Create and apply WLAN location profiles using the Find Wireless Network function for Windows users without administrator privileges to become an administrator: will remain 12 Access Connections Deployment Guide The Ethernet port ... v Disable Ethernet adapter when Ethernet cable is unplugged Note: If this setting is enabled, the Ethernet port will be disabled when the Ethernet cable is useful in wireless LAN profiles v Enable automatic wireless LAN radio control v Allow selection of the Client Configuration Policy: Figure 8. You can also control a users ability to...
v Create and apply WLAN location profiles using the Find Wireless Network function for Windows users without administrator privileges to become an administrator: will remain 12 Access Connections Deployment Guide The Ethernet port ... v Disable Ethernet adapter when Ethernet cable is unplugged Note: If this setting is enabled, the Ethernet port will be disabled when the Ethernet cable is useful in wireless LAN profiles v Enable automatic wireless LAN radio control v Allow selection of the Client Configuration Policy: Figure 8. You can also control a users ability to...
(English) Access Connections Profile Deployment guide
Page 24
Define Location Profiles Additional Settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for the end users is selected, all the new ...: v Set browser home page v Set proxy settings For the Optional Settings, you can set the following policies: v Security settings v Start applications automatically v Set default printer v Use VPN connection v Override TCP/IP and DNS defaults Figure 12. v Do not automatically include wireless profiles without security in the new roaming list Note: If...
Define Location Profiles Additional Settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for the end users is selected, all the new ...: v Set browser home page v Set proxy settings For the Optional Settings, you can set the following policies: v Security settings v Start applications automatically v Set default printer v Use VPN connection v Override TCP/IP and DNS defaults Figure 12. v Do not automatically include wireless profiles without security in the new roaming list Note: If...
(English) Access Connections Profile Deployment guide
Page 25
...VPN connection v Override Home page v Override Proxy Configurations Figure 13. Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Additional Settings v Network ...for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Automatically create location profiles using Active Directory deployed wireless settings Roaming Options v Include the new Wired/Wireless profile in the roaming list automatically v Do not...
...VPN connection v Override Home page v Override Proxy Configurations Figure 13. Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Additional Settings v Network ...for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Automatically create location profiles using Active Directory deployed wireless settings Roaming Options v Include the new Wired/Wireless profile in the roaming list automatically v Do not...
(English) Access Connections Profile Deployment guide
Page 26
... and the client checks the PAC AID group referenced in the location profile being applied, to see if the authenticating AID belongs to use the existing PAC. If not, then a confirmatory message is shown to the user to target systems. To include PAC AID Groups when...Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. The .loa package imports and exports the PAC AID Groups to use an existing PAC if available with out any confirmatory message. - Disable file and printer sharing v Start applications automatically v Set default printer v Override...
... and the client checks the PAC AID group referenced in the location profile being applied, to see if the authenticating AID belongs to use the existing PAC. If not, then a confirmatory message is shown to the user to target systems. To include PAC AID Groups when...Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. The .loa package imports and exports the PAC AID Groups to use an existing PAC if available with out any confirmatory message. - Disable file and printer sharing v Start applications automatically v Set default printer v Override...
(English) Access Connections Profile Deployment guide
Page 29
...configuration policy. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. If only the client configuration policy needs to client computers. The following examples describe deployment scenarios used to include the distribution package in Chapter 3, "Working with the ... file. 2. You can select import from the manage profiles window and manually import the package by administrator. For © Lenovo 2008. For unattended import, enable the setting Allow silent import of this package even after the installation of the integrated package...
...configuration policy. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. If only the client configuration policy needs to client computers. The following examples describe deployment scenarios used to include the distribution package in Chapter 3, "Working with the ... file. 2. You can select import from the manage profiles window and manually import the package by administrator. For © Lenovo 2008. For unattended import, enable the setting Allow silent import of this package even after the installation of the integrated package...
(English) Access Connections Profile Deployment guide
Page 30
... \qctray.exe/del Updating deployed Profiles To update your currently deployed profiles to new encryption and security settings, you created to client systems. v Use following commands: \qctray.exe /importsilently \qctray.exe /killac \qctray.exe /startac Deleting locked profiles There are two ways to create another unlocked... 3. Copy the distribution package (*.loa and *.sig) into the Access Connections installed directory (default installed directory is C:\Program Files\ThinkPad\ConnectUtilities) of wireless LAN driver/application, Hotkey Fn+F5 utility, and Power Management driver. 2.
... \qctray.exe/del Updating deployed Profiles To update your currently deployed profiles to new encryption and security settings, you created to client systems. v Use following commands: \qctray.exe /importsilently \qctray.exe /killac \qctray.exe /startac Deleting locked profiles There are two ways to create another unlocked... 3. Copy the distribution package (*.loa and *.sig) into the Access Connections installed directory (default installed directory is C:\Program Files\ThinkPad\ConnectUtilities) of wireless LAN driver/application, Hotkey Fn+F5 utility, and Power Management driver. 2.
(English) Access Connections Profile Deployment guide
Page 31
... Computer Configuration, click the Administrative Templates. This file supports Access Connections 4.2 and above. © Lenovo 2008. The Group Management console is displayed. 3. Click Add , and then select the tvtacad.adm file. 5. All the available settings can be used with Group Policy to accomplish this machine. With Group Policy and ADM files, administrators...
... Computer Configuration, click the Administrative Templates. This file supports Access Connections 4.2 and above. © Lenovo 2008. The Group Management console is displayed. 3. Click Add , and then select the tvtacad.adm file. 5. All the available settings can be used with Group Policy to accomplish this machine. With Group Policy and ADM files, administrators...
(English) Access Connections Profile Deployment guide
Page 32
...enabled by default. Default roaming selection for no sec WLAN profile Newly created wireless profile with no security will not be modified using the ADM file template. Disable auto switching Disable the automatic location profile switching feature. This setting is enabled by default. ... settings for Access Connections that they can be available when creating wireless LAN profiles. Block export Do not allow clients to use Access Connections administrator feature so that can not deploy profiles or policies. Default override TCPIP Override TCP/IP and DNS defaults...
...enabled by default. Default roaming selection for no sec WLAN profile Newly created wireless profile with no security will not be modified using the ADM file template. Disable auto switching Disable the automatic location profile switching feature. This setting is enabled by default. ... settings for Access Connections that they can be available when creating wireless LAN profiles. Block export Do not allow clients to use Access Connections administrator feature so that can not deploy profiles or policies. Default override TCPIP Override TCP/IP and DNS defaults...
(English) Access Connections Profile Deployment guide
Page 33
... while connecting would be configured to save power and enhance security. Chapter 5. Working with Ethernet or wireless connections and switch between any access points to use the Windows logon credentials. Enable FnF5 menu Location profiles can not be established at Windows logon. After enabling this option. Hide services menu Do not... create and with any existing location profiles provided Access Connections administrator enables this option, system restart is not associated with FWN apply WLAN location profiles using Find Wireless Network function.
... while connecting would be configured to save power and enhance security. Chapter 5. Working with Ethernet or wireless connections and switch between any access points to use the Windows logon credentials. Enable FnF5 menu Location profiles can not be established at Windows logon. After enabling this option. Hide services menu Do not... create and with any existing location profiles provided Access Connections administrator enables this option, system restart is not associated with FWN apply WLAN location profiles using Find Wireless Network function.
(English) Access Connections Profile Deployment guide
Page 34
...Test panel under the Security Filtering section, click Add to give rights to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. For additional information about .loa and .sig files, see Chapter 3, "Working with the Administrator Feature," on the... domain name and click Create and Link GPO. 3. Launch the Group policy Management editor. 2. Creating the Acloa.bat file You can use the following : User Configuration->Windows Settings->Scripts (Logon/Logoff)->Logon 6. Deploying .LOA and .SIG files through Active Directory with logon scripts...
...Test panel under the Security Filtering section, click Add to give rights to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. For additional information about .loa and .sig files, see Chapter 3, "Working with the Administrator Feature," on the... domain name and click Create and Link GPO. 3. Launch the Group policy Management editor. 2. Creating the Acloa.bat file You can use the following : User Configuration->Windows Settings->Scripts (Logon/Logoff)->Logon 6. Deploying .LOA and .SIG files through Active Directory with logon scripts...