background image

3.

    

Create

 

the

 

location

 

profiles,

 

as

 

described

 

in

 

section

 

“Using

 

the

 

Administrator

 

Feature”

 

on

 

page

 

13.

 

4.

   

Create

 

the

 

deployment

 

package,

 

as

 

described

 

in

 

section

 

“Using

 

the

 

Administrator

 

Feature”

 

on

 

page

 

13.

 

5.

   

While

 

creating

 

the

 

location

 

deployment

 

package,

 

mark

 

the

 

check

 

box

 

beside

 

Do

 

not

 

allow

 

clients

 

to

 

become

 

administrator

 

in

 

the

 

Client

 

Configuration

 

Policy

 

window.

 

6.

   

Save

 

the

 

*.loa

 

and

 

the

 

*.sig

 

files,

 

which

 

were

 

created

 

in

 

“Using

 

the

 

Administrator

 

Feature”

 

on

 

page

 

13,

 

to

 

another

 

computer,

 

removable

 

media,

 

or

 

network

 

drive

 

to

 

generate

 

a

 

collection

 

of

 

deployment

 

packages.

 

Note:

 

The

 

*.sig

 

file

 

contains

 

the

 

signature

 

data

 

generated

 

from

 

the

 

password

 

used

 

in

 

generating

 

the

 

deployment

 

package.

 

This

 

file

 

will

 

be

 

located

 

in

 

the

 

install

 

directory

 

of

 

Access

 

Connections,

 

typically

 

C:\PROGRAM

 

FILES\THINKPAD\CONNECTUTILITIES

 

7.

    

Install

 

Access

 

Connections

 

on

 

the

 

image

 

building

 

system

 

according

 

to

 

your

 

process.

 

v

    

If

 

the

 

computer

 

that

 

you

 

are

 

using

 

to

 

create

 

the

 

build

 

image

 

is

 

the

 

same

 

as

 

a

 

computer

 

on

 

which

 

you

 

created

 

the

 

location

 

profiles,

 

uninstall

 

Access

 

Connections

 

from

 

the

 

build-image

 

computer

 

so

 

that

 

the

 

Administrator

 

Feature

 

is

 

removed.

 

Add

 

Access

 

Connections

 

to

 

the

 

image

 

in

 

an

 

uninstalled

 

state.

 

Simply

 

create

 

a

 

directory

 

that

 

contains

 

the

 

setup

 

files

 

plus

 

the

 

*.loa

 

and

 

*.sig

 

files,

 

which

 

were

 

saved

 

in

 

step

 

6.

 

v

    

Add

 

a

 

new

 

DWORD

 

value

 

under

 

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce

 

in

 

the

 

registry.

 

v

    

Name

 

the

 

value

 

ACinstall

 

and

 

set

 

it

 

to

 

<Path

 

where

 

Access

 

Connection

 

setup

 

files

 

exist>\setup.exe

 

-s

8.

    

Upon

 

the

 

first

 

boot

 

of

 

the

 

client

 

computers,

 

Access

 

Connections

 

will

 

silently

 

install

 

and

 

automatically

 

launch.

 

Access

 

Connections

 

will

 

import

 

the

 

*.loa

 

file

 

silently.

 

The

 

*.loa

 

and

 

*.sig

 

files

 

will

 

be

 

deleted

Deploying

 

Access

 

Connections

 

location

 

profiles

 

remotely

 

There

 

are

 

two

 

ways

 

to

 

deploy

 

Access

 

Connections

 

remotely:

 

unattended

 

deployment

 

and

 

attended

 

deployment.

 

The

 

following

 

sections

 

will

 

describe

 

each

 

remote

 

deployment

 

method.

 

Unattended

 

deployment

 

After

 

computers

 

have

 

been

 

deployed

 

in

 

the

 

manner

 

discussed

 

in

 

“Preparing

 

for

 

a

 

new-image

 

installation”

 

on

 

page

 

17,

 

an

 

administrator

 

can

 

use

 

systems

 

management

 

applications

 

(such

 

as

 

SMS,

 

Tivoli

®

,

 

etc.)

 

to

 

push

 

updated

 

*.loa

 

files

 

to

 

the

 

client

 

and

 

have

 

Access

 

Connections

 

silently

 

import

 

them

 

if

 

the

 

following

 

conditions

 

are

 

met:

 

1.

    

The

 

*.loa

 

files

 

must

 

be

 

created

 

using

 

the

 

exact

 

password

 

which

 

was

 

used

 

originally

 

in

 

the

 

build

 

that

 

was

 

deployed

 

on

 

the

 

client

 

computer.

 

2.

   

The

 

*.loa

 

files

 

must

 

be

 

placed

 

in

 

the

 

Access

 

Connections

 

installation

 

directory.

Access

 

Connections

 

must

 

be

 

restarted,

 

either

 

by

 

restarting

 

the

 

computer

 

or

 

by

 

closing

 

the

 

System

 

Tray

 

icon

 

(QCTRAY.EXE),

 

and

 

then

 

launching

 

Access

 

Connections

 

again.

 

 

 

18

 

IBM

 

Access

 

Connections

 

Deployment

 

Guide

 

Version

 

3.3.0

Summary of Contents for IBM Access Connections 3.3.0

Page 1: ...IBM Access Connections Deployment Guide Version 3 3 0 Date October 11 2004 ...

Page 2: ... October 2004 Copyright International Business Machines Corporation 2004 All rights reserved US Government Users Restricted Rights Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp ...

Page 3: ...s application help which administrators and users can consult for information about using the application itself IBM ThinkVantage Technologies and the deployment guides that accompany them are developed with IT professionals and the unique challenges that they encounter in mind If you have suggestions or comments communicate with your IBM authorized representative To learn more about the technolog...

Page 4: ...iv IBM Access Connections Deployment Guide Version 3 3 0 ...

Page 5: ...y problems 8 Chapter 3 Considerations for deploying Access Connections 9 Requirements and specifications for deployment 9 Chapter 4 Deploying Access Connections 11 Access Connections deployment features 11 Installing IBM Access Connections 11 Installing the integrated IBM Access Connections package 11 Installing the standalone IBM Access Connections 12 Enabling the Administrator Feature 12 Using t...

Page 6: ...vi IBM Access Connections Deployment Guide Version 3 3 0 ...

Page 7: ...profile and connection status The Connection Status window allows you to view the status of the network connection associated with each location profile defined in Access Connections and allows you to switch between location profiles When you open the window status is shown for the network connection and for the components used by the currently applied location profile v Switch between location pr...

Page 8: ...you to easily share location profiles between different computers You can also import location profiles that are created by the network adminstrator v Use the system tray icon Access Connections provides an icon in the system tray which allows you to launch the application view the status of the current location profile and switch between profiles v Create location profiles for remote deployment a...

Page 9: ...o the administrators can diagnose and correct problems One window offers you and users accessible essential information about connections and helps them get and stay connected 1 Current location in use 2 Location selector 3 Client computer 4 Manage locations button 5 Find Wireless Network button 6 Network connection device 7 Links 8 Network server Gateway 9 Internet 10 Signal strength indicator 11...

Page 10: ...ing hardware provides a key benefit Access Connections software eliminates the need for administrators to learn and manage multiple client configuration utilities All WLAN configuration utilities as well as the built in capability in Microsoft Windows XP enable you to create profiles with settings for network name SSID and security setup including the definition of a wired equivalent privacy WEP k...

Page 11: ...rk When users select this button Access Connections software finds and lists all of the active wireless access points in range If an open or unencrypted connection is available you can quickly create a location profile based on the newly found access point and connect This capability enables mobile PC users to find a public WLAN connection in places like airports hotels or coffee shops and get con...

Page 12: ...cellular based network provides a wireless alternative to WLAN that is both fast and often available where WLAN connectivity is not to be found To help manage Bluetooth wireless connections Access Connections offers a Bluetooth menu bar that offers an easy way to turn off the Bluetooth radio and to set the Bluetooth security level It also provides capability to create the location profile using th...

Page 13: ... download The enabler creates an additional menu item in the Access Connections user interface called Profile Distribution It is from this profile distribution menu item that the IT administrator creates profiles to be distributed and establishes appropriate user access policy If a selected profile contains a wireless profile with encryption enabled the administrator will be prompted to re enter t...

Page 14: ...BM Access Connections supports a new feature of network diagnostics when users are unable to make network connections It shows detailed progress of connection status and finds suspected reasons of failure and recommended actions Access Connections also offers an automatic repair button to recover the network connection in some cases 8 IBM Access Connections Deployment Guide Version 3 3 0 ...

Page 15: ...nistrator Feature is available with version 2 7 or later of Access Connections This feature simplifies the task of deploying location profiles global settings and control policies to individuals or groups of individuals running Access Connections in a corporate environment The deployment of these profiles and settings can be accomplished during the initial system deployment as part of the preload ...

Page 16: ...10 IBM Access Connections Deployment Guide Version 3 3 0 ...

Page 17: ...Connections on the client computer v Deployment packages are encrypted and password protected to be sure that only authorized individuals can import the location profiles that may contain wireless security information such as WEP or static password for example Installing IBM Access Connections IBM Access connections can be installed with using either a bundled package that includes IBM Access Conn...

Page 18: ...nnections 3 0 or later installed on a donor computer When deploying location profiles that provide a wireless network connection the donor and recipient computers must contain wireless adapters which support the capabilities defined in the location profile For instance if the location profile being deployed is configured for LEAP authentication the adapters on the recipient systems must support LE...

Page 19: ...eds as you create the profiles a Office building connections b Home connections c Branch office connections d Connections while traveling e Hot spot connections 2 After you have created the location profiles click Profile Distribution Create Distribution Package 3 Select the location profiles that you want to deploy For each location profile selected choose the appropriate user access policy as sh...

Page 20: ...dify copy and delete the profile Limitation The above control policies can be applied to local users with Administrator level privileges If the local users are configured as Limited Users stricter restrictions are imparted by the operating system Limited Users can only create dial up connection type profiles and can not modify or copy or delete profiles created by the administrator A global settin...

Page 21: ...le LOA when it is being sent to remote users for manual importing Distribution control lists ensure that individuals install appropriate network connection profiles only They can help reduce unauthorized network access When creating groups of serial numbers flat text files can be imported which contain the group of serial numbers The file must be formatted such that each line contains a single ser...

Page 22: ...strators want to prevent others from creating and distributing network access profiles The Client Configuration Policy panel also enables the administrator to set the Global Settings for Access Connections If the end user logs onto a computer with a Limited User account then the administrator must enable the Allow all users of this system to switch to any existing location profile setting under Gl...

Page 23: ... user 8 Give the LOA file a name and location Attention For image deployment LOA file must reside in the Access Connections install directory C PROGRAM FILES THINKPAD CONNECTUTILITIES Preparing for a new image installation To deploy the Access Connections software do the following 1 Install Access Connections on a sample system from the group of systems being deployed 2 Start the Administrator Fea...

Page 24: ...oa and sig files which were saved in step 6 v Add a new DWORD value under HKLM SOFTWARE Microsoft Windows CurrentVersion RunOnce in the registry v Name the value ACinstall and set it to Path where Access Connection setup files exist setup exe s 8 Upon the first boot of the client computers Access Connections will silently install and automatically launch Access Connections will import the loa file...

Page 25: ...p down selection for Files of type select Profile Distribution files loa f Browse to the location where you saved the loa file that you detached in step 4a g Select the saved loa file and then click Open h Access Connections will check the serial number of your computer to make sure that the loa file matches your computer If a message is displayed that the serial number in the loa file and your co...

Page 26: ...20 IBM Access Connections Deployment Guide Version 3 3 0 ...

Page 27: ...in transactions therefore this statement may not apply to you This information could include technical inaccuracies or typographical errors Changes are periodically made to the information herein these changes will be incorporated in new editions of the publication IBM may make improvements and or changes in the product s and or the program s described in this publication at any time without notic...

Page 28: ...osoft Windows and Windows NT are trademarks of Microsoft Corporation in the United States other countries or both Intel Intel Inside logos MMX and Pentium are trademarks of Intel Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others 22 IBM Access Connections Deployment Guide Version 3 3 0 ...

Reviews: