background image

When

 

the

 

user

 

returns

 

to

 

work,

 

these

 

parameters

 

must

 

be

 

redefined.

 

Network

 

properties

 

must

 

be

 

returned

 

to

 

fixed

 

IP

 

address

 

and

 

explicit

 

DNS

 

settings.

 

This

 

will

 

include

 

typing

 

long

 

strings

 

of

 

numbers—IP

 

addresses—into

 

associated

 

fields.

 

Proxy

 

server

 

parameters

 

including

 

the

 

name

 

of

 

the

 

proxy

 

must

 

also

 

be

 

reentered

 

in

 

Internet

 

Explorer

 

(

Tools

Options

)

 

to

 

enable

 

Internet

 

browsing.

 

Network

 

settings

 

like

 

these

 

generally

 

require

 

a

 

level

 

of

 

technical

 

knowledge

 

beyond

 

that

 

of

 

the

 

average

 

PC

 

user.

 

Manually

 

changing

 

these

 

settings

 

with

 

every

 

location

 

change

 

can

 

be

 

an

 

error-prone

 

and

 

tedious

 

process

 

that

 

can

 

result

 

in

 

help-desk

 

calls

 

and

 

recurrent

 

frustration

 

for

 

the

 

user.

 

With

 

Access

 

Connections

 

software,

 

the

 

same

 

telecommuter

 

would

 

establish

 

one

 

profile

 

for

 

home

 

and

 

another

 

for

 

the

 

office.

 

With

 

the

 

click

 

of

 

the

 

mouse,

 

key

 

settings

 

and

 

parameters

 

can

 

be

 

changed,

 

allowing

 

the

 

user

 

to

 

quickly

 

get

 

back

 

to

 

work

 

without

 

manipulating

 

settings.

 

The

 

transition

 

is

 

seamless:

 

This

 

user

 

can

 

easily

 

move

 

the

 

notebook

 

PC

 

between

 

work

 

and

 

home

 

and

 

easily

 

reestablish

 

a

 

network

 

connection.

 

Access

 

Connections

 

software

 

makes

 

this

 

possible

 

because

 

it

 

uses

 

location

 

profiles,

 

which

 

not

 

only

 

include

 

hardware

 

adapter

 

settings

 

but

 

also

 

myriad

 

associated

 

networking

 

or

 

Internet

 

settings.

 

The

 

result:

 

improved

 

productivity

 

and

 

less

 

frustration

 

for

 

the

 

user,

 

as

 

well

 

as

 

potentially

 

lower

 

costs

 

from

 

the

 

reduced

 

number

 

and

 

length

 

of

 

help-desk

 

calls

 

and

 

other

 

technical

 

support.

 

Enabling

 

effortless

 

wireless

 

LAN

 

connectivity

 

for

 

mobile

 

users

 

Wireless

 

connectivity

 

is

 

an

 

essential

 

component

 

of

 

mobility

 

for

 

notebook

 

PC

 

users.

 

Access

 

Connections

 

has

 

a

 

number

 

of

 

capabilities

 

that

 

are

 

designed

 

to

 

make

 

wireless

 

LAN

 

connections

 

fast

 

and

 

simple.

 

For

 

example,

 

there

 

is

 

a

 

button

 

on

 

the

 

user

 

interface,

 

Find

 

Wireless

 

Network

,

 

which

 

enables

 

users

 

to

 

manually

 

initiate

 

a

 

search

 

for

 

a

 

WLAN

 

network.

 

When

 

users

 

select

 

this

 

button,

 

Access

 

Connections

 

software

 

finds

 

and

 

lists

 

all

 

of

 

the

 

active

 

wireless

 

access

 

points

 

in

 

range.

 

If

 

an

 

open

 

or

 

unencrypted

 

connection

 

is

 

available,

 

you

 

can

 

quickly

 

create

 

a

 

location

 

profile

 

based

 

on

 

the

 

newly

 

found

 

access

 

point

 

and

 

connect.

 

This

 

capability

 

enables

 

mobile

 

PC

 

users

 

to

 

find

 

a

 

public

 

WLAN

 

connection

 

in

 

places

 

like

 

airports,

 

hotels

 

or

 

coffee

 

shops

 

and

 

get

 

connected

 

wirelessly.

 

In

 

addition

 

to

 

supporting

 

an

 

extensive

 

array

 

of

 

WLAN

 

adapters

 

and

 

being

 

able

 

to

 

find

 

new

 

wireless

 

LAN

 

networks,

 

Access

 

Connections

 

software

 

performs

 

the

 

following:

 

v

   

Controls

 

the

 

settings

 

for

 

wireless

 

LAN

 

security,

 

including

 

WEP,

 

IEEE

 

802.1x,

 

Cisco

 

LEAP

 

and

 

Wi-Fi

 

protected

 

access

 

(WPA).

 

It

 

can

 

also

 

associate

 

a

 

VPN

 

client

 

with

 

a

 

location

 

profile.

 

All

 

of

 

these

 

provide

 

alternative

 

mechanisms

 

for

 

securing

 

the

 

wireless

 

link

 

between

 

your

 

PC

 

and

 

the

 

wireless

 

access

 

point

 

you

 

are

 

associated

 

with.

 

They

 

are

 

used

 

to

 

control

 

access

 

to

 

the

 

WLAN

 

and

 

after

 

the

 

data

 

is

 

flowing,

 

they

 

protect

 

the

 

data

 

using

 

encryption

 

for

 

privacy.

 

v

   

Enables

 

multi-adapter

 

profiles—profiles

 

with

 

settings

 

for

 

a

 

wired

 

and

 

a

 

wireless

 

adapter—so

 

users

 

can

 

switch

 

from

 

a

 

high-speed

 

wired

 

network

 

connection

 

to

 

a

 

wireless

 

connection

 

at

 

the

 

same

 

location.

 

For

 

instance,

 

at

 

work,

 

you

 

may

 

have

 

a

 

100

 

Mbps

 

Ethernet

 

(wired)

 

connection

 

at

 

your

 

desk.

 

When

 

you

 

attend

 

a

 

meeting

 

away

 

from

 

your

 

desk,

 

you

 

disconnect

 

the

 

Ethernet

 

cable.

 

Your

 

notebook

 

computer

 

can

 

then

 

be

 

taken

 

to

 

a

 

conference

 

room

 

with

 

wireless

 

coverage,

 

where

 

Access

 

Connections

 

software

 

automatically

 

detects

 

the

 

absence

 

of

 

the

 

Ethernet

 

connection

 

and

 

senses

 

and

 

enables

 

the

 

wireless

 

connection.

 

When

 

you

 

return

 

to

 

your

 

office

 

and

 

reconnect

 

the

 

Ethernet

 

cable,

 

Access

 

Connections

 

software

 

returns

 

you

 

to

 

your

 

correct

 

wired

 

network

 

settings.

 

With

 

Access

 

Connections,

 

this

 

multi-adapter

 

capability

 

has

 

been

 

extended

 

to

 

include

 

not

 

only

 

Ethernet-to-wireless

 

switching,

 

but

 

Ethernet-to-Ethernet

 

switching

 

as

 

well.

 

Ethernet-to-Ethernet

 

switching

 

is

 

useful,

 

for

 

example,

 

when

 

you

 

need

 

to

 

use

 

a

 

 

 

Chapter

 

2.

 

Using

 

Access

 

Connections

 

5

Содержание IBM Access Connections 3.3.0

Страница 1: ...IBM Access Connections Deployment Guide Version 3 3 0 Date October 11 2004 ...

Страница 2: ... October 2004 Copyright International Business Machines Corporation 2004 All rights reserved US Government Users Restricted Rights Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp ...

Страница 3: ...s application help which administrators and users can consult for information about using the application itself IBM ThinkVantage Technologies and the deployment guides that accompany them are developed with IT professionals and the unique challenges that they encounter in mind If you have suggestions or comments communicate with your IBM authorized representative To learn more about the technolog...

Страница 4: ...iv IBM Access Connections Deployment Guide Version 3 3 0 ...

Страница 5: ...y problems 8 Chapter 3 Considerations for deploying Access Connections 9 Requirements and specifications for deployment 9 Chapter 4 Deploying Access Connections 11 Access Connections deployment features 11 Installing IBM Access Connections 11 Installing the integrated IBM Access Connections package 11 Installing the standalone IBM Access Connections 12 Enabling the Administrator Feature 12 Using t...

Страница 6: ...vi IBM Access Connections Deployment Guide Version 3 3 0 ...

Страница 7: ...profile and connection status The Connection Status window allows you to view the status of the network connection associated with each location profile defined in Access Connections and allows you to switch between location profiles When you open the window status is shown for the network connection and for the components used by the currently applied location profile v Switch between location pr...

Страница 8: ...you to easily share location profiles between different computers You can also import location profiles that are created by the network adminstrator v Use the system tray icon Access Connections provides an icon in the system tray which allows you to launch the application view the status of the current location profile and switch between profiles v Create location profiles for remote deployment a...

Страница 9: ...o the administrators can diagnose and correct problems One window offers you and users accessible essential information about connections and helps them get and stay connected 1 Current location in use 2 Location selector 3 Client computer 4 Manage locations button 5 Find Wireless Network button 6 Network connection device 7 Links 8 Network server Gateway 9 Internet 10 Signal strength indicator 11...

Страница 10: ...ing hardware provides a key benefit Access Connections software eliminates the need for administrators to learn and manage multiple client configuration utilities All WLAN configuration utilities as well as the built in capability in Microsoft Windows XP enable you to create profiles with settings for network name SSID and security setup including the definition of a wired equivalent privacy WEP k...

Страница 11: ...rk When users select this button Access Connections software finds and lists all of the active wireless access points in range If an open or unencrypted connection is available you can quickly create a location profile based on the newly found access point and connect This capability enables mobile PC users to find a public WLAN connection in places like airports hotels or coffee shops and get con...

Страница 12: ...cellular based network provides a wireless alternative to WLAN that is both fast and often available where WLAN connectivity is not to be found To help manage Bluetooth wireless connections Access Connections offers a Bluetooth menu bar that offers an easy way to turn off the Bluetooth radio and to set the Bluetooth security level It also provides capability to create the location profile using th...

Страница 13: ... download The enabler creates an additional menu item in the Access Connections user interface called Profile Distribution It is from this profile distribution menu item that the IT administrator creates profiles to be distributed and establishes appropriate user access policy If a selected profile contains a wireless profile with encryption enabled the administrator will be prompted to re enter t...

Страница 14: ...BM Access Connections supports a new feature of network diagnostics when users are unable to make network connections It shows detailed progress of connection status and finds suspected reasons of failure and recommended actions Access Connections also offers an automatic repair button to recover the network connection in some cases 8 IBM Access Connections Deployment Guide Version 3 3 0 ...

Страница 15: ...nistrator Feature is available with version 2 7 or later of Access Connections This feature simplifies the task of deploying location profiles global settings and control policies to individuals or groups of individuals running Access Connections in a corporate environment The deployment of these profiles and settings can be accomplished during the initial system deployment as part of the preload ...

Страница 16: ...10 IBM Access Connections Deployment Guide Version 3 3 0 ...

Страница 17: ...Connections on the client computer v Deployment packages are encrypted and password protected to be sure that only authorized individuals can import the location profiles that may contain wireless security information such as WEP or static password for example Installing IBM Access Connections IBM Access connections can be installed with using either a bundled package that includes IBM Access Conn...

Страница 18: ...nnections 3 0 or later installed on a donor computer When deploying location profiles that provide a wireless network connection the donor and recipient computers must contain wireless adapters which support the capabilities defined in the location profile For instance if the location profile being deployed is configured for LEAP authentication the adapters on the recipient systems must support LE...

Страница 19: ...eds as you create the profiles a Office building connections b Home connections c Branch office connections d Connections while traveling e Hot spot connections 2 After you have created the location profiles click Profile Distribution Create Distribution Package 3 Select the location profiles that you want to deploy For each location profile selected choose the appropriate user access policy as sh...

Страница 20: ...dify copy and delete the profile Limitation The above control policies can be applied to local users with Administrator level privileges If the local users are configured as Limited Users stricter restrictions are imparted by the operating system Limited Users can only create dial up connection type profiles and can not modify or copy or delete profiles created by the administrator A global settin...

Страница 21: ...le LOA when it is being sent to remote users for manual importing Distribution control lists ensure that individuals install appropriate network connection profiles only They can help reduce unauthorized network access When creating groups of serial numbers flat text files can be imported which contain the group of serial numbers The file must be formatted such that each line contains a single ser...

Страница 22: ...strators want to prevent others from creating and distributing network access profiles The Client Configuration Policy panel also enables the administrator to set the Global Settings for Access Connections If the end user logs onto a computer with a Limited User account then the administrator must enable the Allow all users of this system to switch to any existing location profile setting under Gl...

Страница 23: ... user 8 Give the LOA file a name and location Attention For image deployment LOA file must reside in the Access Connections install directory C PROGRAM FILES THINKPAD CONNECTUTILITIES Preparing for a new image installation To deploy the Access Connections software do the following 1 Install Access Connections on a sample system from the group of systems being deployed 2 Start the Administrator Fea...

Страница 24: ...oa and sig files which were saved in step 6 v Add a new DWORD value under HKLM SOFTWARE Microsoft Windows CurrentVersion RunOnce in the registry v Name the value ACinstall and set it to Path where Access Connection setup files exist setup exe s 8 Upon the first boot of the client computers Access Connections will silently install and automatically launch Access Connections will import the loa file...

Страница 25: ...p down selection for Files of type select Profile Distribution files loa f Browse to the location where you saved the loa file that you detached in step 4a g Select the saved loa file and then click Open h Access Connections will check the serial number of your computer to make sure that the loa file matches your computer If a message is displayed that the serial number in the loa file and your co...

Страница 26: ...20 IBM Access Connections Deployment Guide Version 3 3 0 ...

Страница 27: ...in transactions therefore this statement may not apply to you This information could include technical inaccuracies or typographical errors Changes are periodically made to the information herein these changes will be incorporated in new editions of the publication IBM may make improvements and or changes in the product s and or the program s described in this publication at any time without notic...

Страница 28: ...osoft Windows and Windows NT are trademarks of Microsoft Corporation in the United States other countries or both Intel Intel Inside logos MMX and Pentium are trademarks of Intel Corporation in the United States other countries or both Other company product or service names may be trademarks or service marks of others 22 IBM Access Connections Deployment Guide Version 3 3 0 ...

Отзывы: