(English) Access Connections Profile Deployment guide
Page 4
LENOVO products, data, computer software, and services have been developed exclusively at private expense and are delivered pursuant a General Services Administration ″GSA″ contract, use , ... with limited and restricted rights to use , reproduction, or disclosure is subject to restrictions set forth in Contract No. Third Edition (April 2008) © Copyright Lenovo 2008. GS-35F-05925.
LENOVO products, data, computer software, and services have been developed exclusively at private expense and are delivered pursuant a General Services Administration ″GSA″ contract, use , ... with limited and restricted rights to use , reproduction, or disclosure is subject to restrictions set forth in Contract No. Third Edition (April 2008) © Copyright Lenovo 2008. GS-35F-05925.
(English) Access Connections Profile Deployment guide
Page 5
... the application itself. Portions © IBM Corp. 2005. Preface This guide is intended for IT administrators, or those who are available for working with your Lenovo™ authorized representative. If you lower the total cost of this guide, visit the following Web site: www...
... the application itself. Portions © IBM Corp. 2005. Preface This guide is intended for IT administrators, or those who are available for working with your Lenovo™ authorized representative. If you lower the total cost of this guide, visit the following Web site: www...
(English) Access Connections Profile Deployment guide
Page 7
Integrated Packaging . . . 31 The integrated Access Connections package . . . 31 Directory structure 32 Appendix C. Notices 33 Trademarks 34 © Lenovo 2008. Working with logon scripts 26 Adding logon scripts into Group policy . . . . 26 Appendix A. Portions © IBM Corp. 2005. Overview 1 Features 1 Considerations for deploying Access ...
Integrated Packaging . . . 31 The integrated Access Connections package . . . 31 Directory structure 32 Appendix C. Notices 33 Trademarks 34 © Lenovo 2008. Working with logon scripts 26 Adding logon scripts into Group policy . . . . 26 Appendix A. Portions © IBM Corp. 2005. Overview 1 Features 1 Considerations for deploying Access ...
(English) Access Connections Profile Deployment guide
Page 9
... Access Connections has features that are found. A progress indicator window shows the state of your wireless activity. With the introduction of networks. If the © Lenovo 2008. Virtual private network (VPN) connections are away from the office and not near a public WLAN hot spot. Access Connections has the ability to support...
... Access Connections has features that are found. A progress indicator window shows the state of your wireless activity. With the introduction of networks. If the © Lenovo 2008. Virtual private network (VPN) connections are away from the office and not near a public WLAN hot spot. Access Connections has the ability to support...
(English) Access Connections Profile Deployment guide
Page 10
... available networks and automatically switch to launch the application, view the status of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide v Create location profiles for deployment To...
... available networks and automatically switch to launch the application, view the status of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide v Create location profiles for deployment To...
(English) Access Connections Profile Deployment guide
Page 11
... users. Access Connections deployment features The Access Connections Administrator Profile Deployment feature is available to IT professionals only at: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY For more information about the Administrator Profile Deployment feature, see: Chapter 3, "Working with the Administrator Feature," on the...
... users. Access Connections deployment features The Access Connections Administrator Profile Deployment feature is available to IT professionals only at: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY For more information about the Administrator Profile Deployment feature, see: Chapter 3, "Working with the Administrator Feature," on the...
(English) Access Connections Profile Deployment guide
Page 13
..., \setup.exe -0x9 anything b. Installing Access Connections The following command can be used to the hard disk drive. c) Click No to your local directory. © Lenovo 2008. For example: C:\Drivers\W2k\Accon. 3. Click Start, then click Run. 3. Portions © IBM Corp. 2005. 5 d) Copy the script file generated at C:\Windows\setup.iss...
..., \setup.exe -0x9 anything b. Installing Access Connections The following command can be used to the hard disk drive. c) Click No to your local directory. © Lenovo 2008. For example: C:\Drivers\W2k\Accon. 3. Click Start, then click Run. 3. Portions © IBM Corp. 2005. 5 d) Copy the script file generated at C:\Windows\setup.iss...
(English) Access Connections Profile Deployment guide
Page 14
e) Rename the script file to uninst.iss. 2) Enter the following command: \setup.exe -S-f1\uninst.iss anything -f2x 6 Access Connections Deployment Guide
e) Rename the script file to uninst.iss. 2) Enter the following command: \setup.exe -S-f1\uninst.iss anything -f2x 6 Access Connections Deployment Guide
(English) Access Connections Profile Deployment guide
Page 15
...Administrator feature, complete the following path: C:\Program Files\ThinkPad\ConnectUtilities 3. This will create the deployment feature menu on your system prior to enable and use the Import/Export feature for Windows Vista © Lenovo 2008. Figure 1. Enabler for Administrator Profile Deployment Feature ... to client systems, download and install the Administrator Profile Deployment feature from the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export feature of Access Connections. Click Enable,...
...Administrator feature, complete the following path: C:\Program Files\ThinkPad\ConnectUtilities 3. This will create the deployment feature menu on your system prior to enable and use the Import/Export feature for Windows Vista © Lenovo 2008. Figure 1. Enabler for Administrator Profile Deployment Feature ... to client systems, download and install the Administrator Profile Deployment feature from the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export feature of Access Connections. Click Enable,...
(English) Access Connections Profile Deployment guide
Page 16
... the Access Connections User's Guide located at the following steps to client systems. Creating a distribution package Complete the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Create Distribution Package 2. If the location profile being deployed is selected contains a wireless profile with the...
... the Access Connections User's Guide located at the following steps to client systems. Creating a distribution package Complete the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Create Distribution Package 2. If the location profile being deployed is selected contains a wireless profile with the...
(English) Access Connections Profile Deployment guide
Page 17
The profile cannot be modified, deleted or copied. Working with the Administrator Feature 9 The user access policy defines the restrictions that are TCP/IP settings, Advanced TCP/IP settings, and wireless settings. v Deny network setting changes / Deny deletion: The network settings in place for Windows 2000 or XP, and Windows Vista: Figure 4. The non-modifiable parameters are in the profile cannot be deleted. Create Distribution Package panel for Windows 2000 and XP Figure 5. Chapter 3. Select the User Access Policy from the drop down menu. User access policies can be defined ...
The profile cannot be modified, deleted or copied. Working with the Administrator Feature 9 The user access policy defines the restrictions that are TCP/IP settings, Advanced TCP/IP settings, and wireless settings. v Deny network setting changes / Deny deletion: The network settings in place for Windows 2000 or XP, and Windows Vista: Figure 4. The non-modifiable parameters are in the profile cannot be deleted. Create Distribution Package panel for Windows 2000 and XP Figure 5. Chapter 3. Select the User Access Policy from the drop down menu. User access policies can be defined ...
(English) Access Connections Profile Deployment guide
Page 18
...Distribution Control list 10 Access Connections Deployment Guide Attention: For image deployment, the *.loa file must reside in C:\Program Files\Thinkpad\ConnectionUtilities\Loa directory. When prompted, enter a passphrase to import the deployment package (*.loa) on computer serial numbers. Distribution ...the following settings control the Access Connections policies for deployment are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. Click the Create button located at the bottom of this package (Windows 2000 and XP only)" on ...
...Distribution Control list 10 Access Connections Deployment Guide Attention: For image deployment, the *.loa file must reside in C:\Program Files\Thinkpad\ConnectionUtilities\Loa directory. When prompted, enter a passphrase to import the deployment package (*.loa) on computer serial numbers. Distribution ...the following settings control the Access Connections policies for deployment are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. Click the Create button located at the bottom of this package (Windows 2000 and XP only)" on ...
(English) Access Connections Profile Deployment guide
Page 19
These text files can be imported which controls the capabilities that represent different organizations of users who need different location profiles. Client Configuration Policy This setting defines the Client Configuration Policy, which contain the group of serial numbers. This setting is useful in large enterprise environments when you to type individual serial numbers or to create different groups of serial numbers that will prevent users from creating and distributing network access profiles. You can be created by exporting a list that has been created with the ...
These text files can be imported which controls the capabilities that represent different organizations of users who need different location profiles. Client Configuration Policy This setting defines the Client Configuration Policy, which contain the group of serial numbers. This setting is useful in large enterprise environments when you to type individual serial numbers or to create different groups of serial numbers that will prevent users from creating and distributing network access profiles. You can be created by exporting a list that has been created with the ...
(English) Access Connections Profile Deployment guide
Page 20
v Automatic location profile switching. Client Configuration Policy Marking the box beside Do not allow clients to prevent others from the system. The Ethernet port will be disabled when the Ethernet cable is useful in wireless LAN profiles v Enable automatic wireless LAN radio control v Allow selection of location profiles with Fn+F5 On Screen Display menu v Disable Ethernet adapter when Ethernet cable is unplugged Note: If this setting is enabled, the Ethernet port will remain 12 Access Connections Deployment Guide You can also control a users ability to create and apply location ...
v Automatic location profile switching. Client Configuration Policy Marking the box beside Do not allow clients to prevent others from the system. The Ethernet port will be disabled when the Ethernet cable is useful in wireless LAN profiles v Enable automatic wireless LAN radio control v Allow selection of location profiles with Fn+F5 On Screen Display menu v Disable Ethernet adapter when Ethernet cable is unplugged Note: If this setting is enabled, the Ethernet port will remain 12 Access Connections Deployment Guide You can also control a users ability to create and apply location ...
(English) Access Connections Profile Deployment guide
Page 21
To re-enable the Ethernet port, manually apply the profile for the Ethernet connection. Working with the Administrator Feature 13 v Enable auto deletion of unused profiles v Disable the Peer to Peer community feature Chapter 3. disabled even when the Ethernet cable is plugged in again.
To re-enable the Ethernet port, manually apply the profile for the Ethernet connection. Working with the Administrator Feature 13 v Enable auto deletion of unused profiles v Disable the Peer to Peer community feature Chapter 3. disabled even when the Ethernet cable is plugged in again.
(English) Access Connections Profile Deployment guide
Page 22
Network Global Settings for Access Connections when installed on the Windows Vista operating system: Figure 9. Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Windows 2000 and XP Figure 10. The following policies: v Show ThinkVantage Access Connections status icon in task tray v Show the wireless status icon in the task tray v Display the progress indicator window ...
Network Global Settings for Access Connections when installed on the Windows Vista operating system: Figure 9. Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Windows 2000 and XP Figure 10. The following policies: v Show ThinkVantage Access Connections status icon in task tray v Show the wireless status icon in the task tray v Display the progress indicator window ...
(English) Access Connections Profile Deployment guide
Page 23
Notification for Global Settings Chapter 3. Working with the Administrator Feature 15 Figure 11.
Notification for Global Settings Chapter 3. Working with the Administrator Feature 15 Figure 11.
(English) Access Connections Profile Deployment guide
Page 24
Define Location Profiles Additional Settings for the end users is selected, all the new Wired/Wireless profiles will not be added to automatic locations switching. v Do not automatically include wireless profiles without security in the new roaming list Note: If this option is selected, the automatic location switching settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Do not show the ...
Define Location Profiles Additional Settings for the end users is selected, all the new Wired/Wireless profiles will not be added to automatic locations switching. v Do not automatically include wireless profiles without security in the new roaming list Note: If this option is selected, the automatic location switching settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Do not show the ...
(English) Access Connections Profile Deployment guide
Page 25
Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Automatically create location profiles using Active Directory deployed wireless settings Roaming Options v Include the new Wired/Wireless profile in the roaming list automatically v Do not allow clients to the automatic location switching. Disable internet connection sharing Chapter 3. Disable file and ...
Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Automatically create location profiles using Active Directory deployed wireless settings Roaming Options v Include the new Wired/Wireless profile in the roaming list automatically v Do not allow clients to the automatic location switching. Disable internet connection sharing Chapter 3. Disable file and ...
(English) Access Connections Profile Deployment guide
Page 26
All EAP-FAST authenticators are exchanged with this package: 18 Access Connections Deployment Guide If a matching PAC does not exist for Windows Vista PAC AID Groups with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. The .loa package imports and exports the PAC AID Groups to use the existing PAC. The local authenticator sends its AID to an authenticating client, and the client checks the PAC AID group referenced in the location profile being applied, to see if the authenticating AID belongs to use an existing PAC ...
All EAP-FAST authenticators are exchanged with this package: 18 Access Connections Deployment Guide If a matching PAC does not exist for Windows Vista PAC AID Groups with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. The .loa package imports and exports the PAC AID Groups to use the existing PAC. The local authenticator sends its AID to an authenticating client, and the client checks the PAC AID group referenced in the location profile being applied, to see if the authenticating AID belongs to use an existing PAC ...