Lenovo 20074CU User Manual

Lenovo 20074CU User Manual

User manual
Hide thumbs Also See for 20074CU:
Table of Contents
ThinkVantage Access Connections 4.1
User's Guide
Table of Contents
loading

Summary of Contents for Lenovo 20074CU

  • Page 1 ThinkVantage Access Connections 4.1 User’s Guide...
  • Page 3 ThinkVantage Access Connections 4.1 User’s Guide...
  • Page 4 RESTRICTED RIGHTS. Use, duplication or disclosure by the Government is subject to the GSA ADP Schedule contract with Lenovo Group Limited, if any, or the standard terms of this commercial license, or if the agency is unable to accept this Program under these terms, then we provide this Program under the provisions set forth in Commercial Computer Software–Restricted Rights at FAR 52.227-19, when applicable, or under Rights in...
  • Page 5: Table Of Contents

    Getting help and information from the World Wide Web ..79 Appendix D. Notices ..... . 81 © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 6 Appendix E. Trademarks ..... 83 Index ......85 ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 7: Figures

    53. Add a Program window ......67 © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 8 54. Main AC window—Location Profile tab ..... . . 68 55. Peer to Peer Community tab—Join button ..... 69 56.
  • Page 9: About This Book

    Variables are shown in italics and explained immediately afterward. v Optional commands or variables are enclosed in brackets. v Where you must type one of two or more parameters, the parameters are separated by vertical bars. © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 10: Thinkvantage Access Connections Resources On The World Wide Web

    ThinkVantage Personal Computing Support - ThinkVantage Technologies page http://www.pc.ibm.com/us/think/thinkvantagetech.html Consult this Web page for information about ThinkVantage Technologies. ThinkVantage Personal Computing Support page http://www.lenovo.com/think/support Go to this Web page for access to the ThinkVantage Personal Computing Support Web site. viii...
  • Page 11: Chapter 1. Introducing Access Connections

    WAN communication software developed by Vodafone. You can specify in the WAN profile that this application software is to be launched. v Support for Firefox Internet browser v New Mini-PCI cards supported © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 12: Updating Access Connections

    – Intel Pro/Wireless 3945 ABG Wireless LAN adapter – Broadcomm 4318/4311 Wireless LAN Adapter Notes on use of Access Connections when using Broadcomm 4318/4311 Wireless LAN adapter: 1. Limited support is offered on Windows XP. For access to it, enable Windows Zero Configuration Service.
  • Page 13: Chapter 2. Using Location Profiles

    To create a new location profile, do the following: 1. Start Access Connections. If this is your first time to access Access Connections, the Welcome to Access Connections window is displayed. Figure 2. Welcome to Access Connections window © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 14: More Information Window

    To display more details about the copyright statement, press More Information. Figure 3. More Information window 2. Press OK. The main window opens. Figure 4. Access Connections main window—main menu ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 15: Profile Wizard Window

    3. On the toolbar, click Locations. Figure 5. Main menu—Locations On the popup, click Create New Profile. The profile wizard starts. Figure 6. Profile wizard window Chapter 2. Using location profiles...
  • Page 16: Profile Wizard-Insert Profile Name

    4. Insert the profile name. It may be the physical location of the network or any other easily recognizable name. Figure 7. Profile wizard—Insert Profile Name ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 17: Pull-Down Menu For Location Icon

    For any profile created, you can also select one of the location icons that Access Connections provides for home, office, airport, hotspot, hotel , train, or meeting area. Figure 8. Pull-down menu for Location icon Chapter 2. Using location profiles...
  • Page 18: Pull-Down Menu For The Type Of Network Connection

    5. Select the type of network connection. You can select any of the types listed on the screen below: Figure 9. Pull-down menu for the type of network connection ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 19: Create New Profile - Best Available Network

    Best Available Network Choose this type of network connection to create a profile that will automatically select either a wired Ethernet network or a wireless 802.11 networks at the same location. This capability is useful when you move frequently within a location - for instance, between a wired connection at your desk and a wireless LAN connection elsewhere in the same building.
  • Page 20: Create New Profile-Wired Lan (Ethernet)

    Wired LAN (Ethernet) Choose this type of network connection if the profile will be used only to connect to a Wired LAN (Ethernet). Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table. Figure 11.
  • Page 21: Create New Profile-Wireless Lan (802.11)

    Wireless LAN (802.11) Choose this type of network connection if the profile will be used to connect to an 802.11 a, b, or g wireless LAN only. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table. You can configure the settings for authentication and encryption.
  • Page 22: Create New Profile-Wired Broadband (Dsl Or Cable Modem)

    Wired Broadband (DSL or Cable Modem) Choose this type of network connection if the profile will be used only to connect to wired broadband. The broadband connections are DSL, cable modem, and ISDN. Typically, your computer will connect to the broadband network through an Ethernet adapter.
  • Page 23: Creating New Profile-Dial-Up (Modem Or Cellular Phone)

    Dial-up (modem or cellular phone) Choose this type of network connection if the profile will be used only to connect to dial-up. Examples of dial-up connections are a standard modem attached to a telephone line, and a Bluetooth modem wirelessly connected to a cellular phone. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
  • Page 24: Creating New Profile-Wireless Wan

    Wireless WAN Choose this type of network connection if the profile will be used only to connect to a wireless WAN (wide area network). Wireless WAN connections require a service subscription to connect successfully. Access Connections will automatically determine which adapters in your computer support this type of network connection, and show them in the table.
  • Page 25: Authentication Properties Window

    b. Click Authentication Properties; then enter the authentication settings provided by your network administrator. Figure 16. Authentication Properties window c. Click OK. 7. You can prevent multiple simultaneous connections, and thus conserve battery life, by selecting Disconnect from the network and power off any wireless radio associated with this profile when switching to a different location.
  • Page 26: Wireless Network Configuration Window

    b. Click Authentication Properties; then enter the authentication settings provided by your network administrator. c. Click OK. 12. To disconnect from the network when you switch to a different location profile, select Disconnect from the network when switching to a different location.
  • Page 27: Wireless Security Types

    18. Next, select the connection type. Two types are available: Infrastructure Use this connection type when your computer will be communicating with wireless access points. Adhoc Use this connection type to communicate directly with another computer without connecting to a wireless access point first. 19.
  • Page 28: Advanced Wireless Settings Window

    Use 802.1x - EAP Cisco (LEAP) This version of EAP is available only when a Cisco or Cisco-compatible wireless adapter is installed in your system. It uses authentication and dynamic encryption keys to secure the wireless network. Use 802.1x - EAP Cisco (EAP-FAST) This version of EAP is available only when a Cisco or Cisco-compatible wireless adapter is installed in your system.
  • Page 29 The following settings are available: Transmit Power Level Choose a transmitting power level, from the minimum 10%, to the maximum, 100%. Use it to transmit at the lower level. The value is set automatically in response to a notice from the access point. 802.11b Preamble The default setting is Short&long.
  • Page 30 26. Click Next. The phonebook settings page is displayed. Figure 20. Phonebook settings window 27. Choose or create a phonebook entry. To enter the details of the DSL account, click Properties. ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 31 28. The Enter Your DSL Account Details window is displayed. Figure 21. Enter Your DSL Account Details window Enter the necessary information; then click OK. 29. Click Next. 30. Go to step 38 on page 25. 31. If you selected Dial-up (Modem or Cellular Phone) in step 5 on page 8, click Next.
  • Page 32 To use a dialer application provided by your service provider, select Find my dialer program. Figure 22. Find my dialer program window ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 33 Enter the path by clicking Select my Dialer Program. Figure 23. Choose Custom Dialer window Chapter 2. Using location profiles...
  • Page 34 To use the dialer application provided by Windows, select Manual dialer setup. Then either select an existing phonebook entry or add a new one. Figure 24. Manual dialer setup window 33. Click Next. 34. Go to step 38 on page 25. 35.
  • Page 35: Additional Settings

    38. The Additional settings window appears. Figure 25. Additional settings window Change the additional settings as appropriate. 39. Click Finish. The confirmation panel appears. 40. Click Save. 41. To add the newly created profile to a list of the automatically switched profiles, select Add this location profile to the Automatic Location Switching list.
  • Page 36: Security Settings Window

    Enable Windows firewall Prevents unauthorized access to your computer from the network. This option is available only in Windows XP. For Windows XP Service Pack 2, this setting is selected by default. To disable the default OS setting, clear this check box. You cannot establish the VPN connection when this setting is enabled;...
  • Page 37: Tcp/Ip Settings

    To close the program automatically before connecting to a network, enter the name of this application on the Special settings panel. Your computer will connect to the network only after this program is closed. Set Default Printer Choose the printer that will be used by default. All print jobs will be sent to this printer unless otherwise specified.
  • Page 38: Wireless Security Settings

    Wireless security settings Using static WEP key If you selected Use Static WEP keys for the wireless security type, the Static WEP Settings window opens. Figure 29. Static WEP Settings window Here you must configure the following settings: Data encryption Select 64bit (WEP-64 bits) or 128bit (WEP-128bits) for the WEP key length.
  • Page 39 Using Wi-Fi Protected Access - Pre-Shared Key (WPA-PSK) If you selected Use WPA-PSK key as the wireless security type, the WPA-PSK Settings window opens. Figure 30. Wi-Fi Settings window You can configure the following settings: Data encryption The popup lists the data encryption modes available for the wireless LAN card that is installed on your system.
  • Page 40 If you select this mode, Access Connections will not handle the configuration of wireless LAN. Select this mode to configure adapters that cannot be directly configured by use of Access Connections. When you use this mode, make note that: v Depending on the wireless LAN adapter installed on your computer, reconnecting to the access point or 802.1x authentication when your computer returns from suspend mode may take longer.
  • Page 41 Authenticate as computer when computer information is available Select this check box if you are using machine authentication. Properties Click this button, and configure the settings that depend on the authentication you use. You must also enter the Certificate issuer setting.
  • Page 42 Access point authentication setting, Data encryption must be set to either TKIP or AES. If you select WPA2, AES is selected by default. Validate server authentication You may have to enter the subdomain name of the Radius server (ibm.com etc.). Use client certificate Click Select.
  • Page 43 established. If the selected certificate is valid, the logon ID that appears on the certificate is entered automatically in the Logon name field. Authenticate as computer when computer information is available If you are using an IBM wireless adapter, you can use machine certification for the authentication.
  • Page 44 Use saved user ID and password The user ID and password for the tunnel authentication are set in advance. If using the Windows logon user name and password for wireless network authentication is enabled, the available user ID and password will be used for tunnel authentication at Windows logon, and the computer will log on to the Windows domain server.
  • Page 45 log on to the Windows domain server. To enable this setting, go to Option, and select the check box for Use Windows logon user name and password to authenticate the wireless network. When tunnel authentication is set to GTC, you can configure the following settings. Use one-time token Under GTC tunnel authentication, the connection is established after a temporary password for tunnel authentication, called a token, specified by...
  • Page 46 Using 802.1x - EAP Cisco (LEAP) If you have selected EAP Cisco (LEAP) mode, you can configure the settings for user ID and password necessary for use of Cisco LEAP. The LEAP Settings window is displayed: Figure 34. LEAP Settings window Configure the following settings.
  • Page 47 Automatically display user name and password prompt for LEAP To display the prompt asking you to enter the user name and password that are to be displayed when the location profile is deployed (if they have not already been entered), choose this setting. After you enter the user name and password, the authentication process starts.
  • Page 48 Using 802.1- Cisco (EAP-FAST) If you have selected EAP Cisco (EAP-FAST) mode, you can set a user ID and password for use of this security mode. The EAP-FAST Settings window is displayed as follows: Figure 35. EAP-FAST Settings window Configure the following settings: Data encryption Select one of the following options: v WEP...
  • Page 49 For Thinkpad computers that support the use of a fingerprint reader to log on to Windows, the wireless network authentication will be processed automatically. Automatically display user name and password prompt for EAP-FAST To display the prompt asking you to enter the user name and password displayed when the location profile is deployed (if they have not already been entered), choose this setting.
  • Page 50: Editing Vpn Settings

    points when you move your computer; this is the fast roaming feature. You will then be able to roam quickly between access points without having to authenticate repeatedly. Editing VPN settings If you selected the optional setting Enable Virtual Private Network (VPN) connection in the process of creating a profile, the VPN settings window is displayed.
  • Page 51 To use the VPN program provided by Windows, select Manually set up a VPN connection, and then either select an existing phonebook entry or add a new one. Figure 37. VPN settings—Manually set up a VPN connection window If you select Manually set up my VPN connection using Microsoft Windows network connection Wizard, proceed to create the VPN connection by clicking the Add button.
  • Page 52: Managing Location Profiles

    Managing location profiles To create or delete a location profile, or edit the settings for an existing profile, go to Locations on the main toolbar, and press Manage Profiles on the pull-down menu. The Manage Location Profiles panel, with a list of available profiles, is displayed. Figure 38.
  • Page 53: Using Shortcut Icons

    Delete: Permanently remove the selected location profile. Location Switching: Switch location profiles automatically. By default, all existing location profiles are shown in the Manage Location Profiles window. To hide a profile from the Locations list and the Fn+F5 on-screen menu, and to remove the profile from automatic location switching, clear the check box to the left of the name of that profile.
  • Page 54: Connecting To A Network

    Connecting to a network To connect to a network, choose and apply its location profile. You can connect or switch between existing location profiles from the main window, the on-screen menu that is displayed after pressing Fn+F5, or the system tray icon. To connect from the main window, select the location profile, that matches where you are from the Locations pull-down menu, and then click Connect.
  • Page 55: Connecting To A Wireless Network

    Connecting to a wireless network To find the wireless network available at your location, on the main menu click Tools, and then select Find wireless networks from the pull-down list. The list of available access points is displayed. Figure 41. Find Wireless Networks window An access point for an available network is indicated as follows: The following four icons indicate the type of wireless connection: v Secured wireless LAN network...
  • Page 56: Find Wireless Networks Window-Detailed View

    To display the access point list in the AC3.x format, select the Show Details check box. Figure 42. Find Wireless Networks window—detailed view If the access point found is currently associated with your ThinkPad, its antenna is marked with a red circle. If it is encrypted, it is marked with a blue security icon. To connect to any of the found networks, select the network and click Connect.
  • Page 57: Switching Location Profiles Automatically

    Switching location profiles automatically As you move your computer from place to place, Access Connections can automatically detect available wireless LAN (802.11) and Ethernet networks and apply the location profile of one of them for you. Figure 43. Automatic Location Switching window To configure automatic switching between location profiles, do as follows: 1.
  • Page 58: Viewing The Connection Status

    Viewing the connection status You can use Access Connections to monitor the status of your network connections. For more information, click one of the following: AC main window When Access Connections is launched, the Location Profiles tab of the main window is selected by default. The window associated with this tab graphically depicts the status for the location profile selected in the Locations pull-down menu.
  • Page 59 v Connected to DSL network device v Connected to DSL network device with VPN enabled v Secured (encrypted) wired network communication in progress v Open (non-secured) wireless network communication in progress v Secured (encrypted) wireless network communication in progress v Disconnected from DSL network device v Connected to wireless access point Chapter 2.
  • Page 60 v Connected to wireless access point with VPN enabled v Disconnected from wireless access point v Connected to Ethernet network v Connected to Ethernet network with VPN enabled v Disconnected from Ethernet network v Connected to wireless WAN network v Connected to wireless WAN network with VPN enabled ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 61 v Disconnected from wireless WAN network v Connected to remote device or network through a modem v Connected to remote device or network using a modem with VPN enabled v Disconnected from modem Task tray icons Access Connections provides two task tray icons. One is for general connection status;...
  • Page 62 Icons for status of wireless LAN v Power to the wireless radio is off. v Power to the wireless radio is on. The signal strength of the wireless connection is excellent. v Power to the wireless radio is on. The signal strength of the wireless connection is marginal.
  • Page 63: Diagnostics

    Diagnostics Access Connections provides a set of tools to check status of a network connection and solve any problems found. Click Tools on the main toolbar, and select Diagnostics from the pull-down menu. The Diagnostic Tools window is displayed. Figure 44. Diagnostic Tools Click one of the following tabs to check the status of a connection and the network settings: v Connection status...
  • Page 64 Diagnostic Tools panel; the displayed information is saved as a text file that can be used by a support center to diagnose a problem. When an attempt to connect to a network fails, the causes of problems, and possible solutions for them, are displayed, along with the current settings of the network.
  • Page 65: Chapter 3. Configuration Options

    Network global settings To configure network global settings, do the following: 1. On the menu bar of the main window of Access Connections, select Configure. 2. Select Global Settings. 3. Click the Network tab. © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 66: Global Settings-Network Tab

    The following window opens: Figure 45. Global Settings—Network tab 4. Make the necessary changes, and click OK. Network global settings apply to all users of this computer. The following network global settings can be configured: Allow Windows users without administrator privileges to create and apply location profiles Select this option to enable users to create and apply location profiles regardless of the windows logon privilege they have—administrator or...
  • Page 67: Notification Global Settings

    can enable this option. Even if this option is selected, Windows security protection by default does not allow a limited user to modify or create TCP/IP settings, security settings for the local drive sharing, or firewall settings. Allow wireless connection at Windows logon (requires system restart) Select this option to use the user name and password applied at Windows logon as the credentials for connecting to a wireless network.
  • Page 68: Global Settings-Notification Tab

    The following window opens: Figure 46. Global Settings—Notification tab 4. Make the necessary changes, and click OK. Notification global settings apply to all users of this computer. The following global settings can be configured: Show Access Connections status icon in task tray If you select this option, the Windows task tray will show an icon that displays the status of Access Connections.
  • Page 69: User Preferences

    Show wireless status icon in task tray If you select this option, the Windows task tray will show an icon that displays the status of your wireless network connection. Display the progress indicator window when a profile is being applied Select this option to display the progress indicator window while a profile is being applied.
  • Page 70: Toolbar Options

    Preferences apply only for the current user. The following preferences can be configured for Access Connections: Enable sound effects Select this option to turn on sound effects in Access Connections when the status of a connection changes. Enable animations Select this option to turn on animation of graphics in Access Connections. Do not show balloon tips from the Access Connections system tray icon Select this option to turn off balloon tip information coming from the Access Connections system tray icon.
  • Page 71: Peer-To-Peer Options

    4. To change the order of buttons on the toolbar, select a button from the list of current toolbar buttons, and click Higher to move it to the left for higher priority, or Lower to move it to the right for lower priority. 5.
  • Page 72 ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 73: Chapter 4. Using A Wireless Wan Connection

    IP address to be assigned. As soon as the connection is established, details on the status of the profile are displayed, either in the main window of Access Connections or in the task tray if the related icon is clicked. © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 74: Using Short Message Service (Sms) Interface

    The detailed information contains the following data specific to the WAN connection: Wireless signal condition Strength of the signal, presented graphically. Transmit /Receive Byte counts The counts of bytes transmitted and received during a connection are displayed on the main window in real time. The duration of the connection is also displayed in real time, both in the main window and in the WAN status information window on the task tray.
  • Page 75: Chapter 5. Introducing A Peer-To-Peer Connection

    If you do not have this privilege, ask the computer administrator to change the firewall settings for you. Windows Firewall (for a computer running Windows XP SP2) 1. From the Control Panel open the Security Center. Figure 51. Windows Security 2. Click Windows Firewall. © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 76: Windows Firewall Window

    The Windows Firewall window opens. Figure 52. Windows Firewall window 3. Select the Exception tab, and click the Add Program button. ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 77 4. From the list, select Access Connections; then click OK. Figure 53. Add a Program window 5. The Exception tab opens. There, push the Add Program button again. 6. Click the Browse button, choose C:\Program Files\NetMeeting\conf.exe, and click Open. 7. On the Add a Program window, click OK. On the Windows Firewall dialog box, click OK again.
  • Page 78: Creating The Peer-To-Peer Connection

    Table 1. Preparing the peer-to-peer connection (continued) Application Protocol Port Default Path 5353 C:\Program Files\ThinkPad\ConnectUtilities\ Access ACMainGUI.exe Connections 49443 IPSec TCP/UDP C:\Windows\system32\lsass.exe (lsass.exe) Creating the peer-to-peer connection To create a peer-to-peer connection, follow the steps below: Note: Peer-to-peer connection may be blocked by a firewall. Temporarily disable the firewall program or add NetMeeting and Access Connections to exception rules.
  • Page 79 The ThinkPad Community starts, and the initial peer-to-peer window is displayed. Figure 55. Peer to Peer Community tab—Join button 3. Enter a passphrase specific to the community being established. It must contain at least eight characters in UNICODE code, including quotation marks, spaces, and underscores.
  • Page 80 This process may take some time. During this process, a progress indicator is displayed. To stop applying the Adhoc setup, press the Stop button next to the progress indicator. ThinkPad Community restores the previous wireless adapter configurations. Note: The Close button closes only the progress indicator dialog box. If this is the first use of Peer to Peer Community and NetMeeting, the NetMeeting initialization dialog appears.
  • Page 81: Using Peer-To-Peer Connection

    6. When NetMeeting starts, the progress indicator dialog box disappears, and the color of the ThinkPad icon at the left changes. The application buttons remain disabled until another member is found in the neighborhood. Figure 57. Peer to Peer community tab—Leave button 7.
  • Page 82 The whiteboard is shared by all members. For a detailed explanation of how to use these applets, see NetMeeting Help. To open it, click Help on the menu bar of each applet. Change the configuration options To change the following options, go to the Configure menu: Note: After joining the group, you cannot change the settings.
  • Page 83: Appendix A. Frequently Asked Questions

    You can also include the settings in the package which is convenient if you use many computers in the same network environment. To become an administrator, go to http://www.pc.ibm.com/us/think/thinkvantagetech/accessconnections.html, and download and install the needed files on your ThinkPad computer. © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 84 10. If I log on to Windows with a different user ID, are there any differences in the operations of Access Connections? The differences are listed in the table: Table 2. Differences in the operations of Access Connections when different user IDs are used Abilities Administrator...
  • Page 85 13. Why am I prompted to enter a comment when I am using an Ethernet connection? You are prompted to type a comment because Access Connections has found a new network device for an automatic network connection. Access Connections recognizes this network as the most suitable one for the current location profile.
  • Page 86 ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 87: Appendix B. Command Line Interface

    Restart all Access Connections processes. Since this requires administrative privileges, the command will be routed through AcPrfMgrSvc. \qctray.exe /startac Find Wireless networks. \qctray.exe /findwlnw Display QCTRAY help information. \qctray.exe /help © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 88 ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 89: Appendix C. Getting Help And Technical Assistance

    Appendix C. Getting help and technical assistance If you need help, service, or technical assistance or just want more information about Lenovo products, you will find a wide variety of sources available from Lenovo to assist you. This appendix contains information about where to go for additional information about Lenovo and Lenovo products, what to do if you experience a problem, and whom to call for service, if it is necessary.
  • Page 90 ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 91: Appendix D. Notices

    Consult your local Lenovo representative for information on the products and services currently available in your area. Any reference to a Lenovo product, program, or service is not intended to state or imply that only that Lenovo product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any Lenovo intellectual property right may be used instead.
  • Page 92 estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 93 Appendix E. Trademarks The following terms are trademarks of Lenovo in the United States, other countries, or both: Lenovo ThinkPad ThinkVantage The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: IBM (used under license)
  • Page 94 ThinkVantage Access Connections 4.1: User’s Guide...
  • Page 95 8 default printer 27 Location Switching 47 diagnostic tools 53 connections status 53 IP configuration 53 ping 53 MAC address 47 trace route 53 machine authentication 31 diagnostics 53 © Lenovo 2006. Portions © IBM Corp. 2006.
  • Page 96 NetMeeting 69 toolbar network connection adding icons 60 type of 8 customizing 60 Best Available Network 9 default settings 61 Dial-up (modem or cellular phone) 13 removing icons 60 Wired Broadband (DSL or Cable Modem) 12 toolbar options 60 Wired LAN (Ethernet) 10 Wireless LAN (802.11) 11 Wireless WAN 14 network global settings 55...
  • Page 97 wireless WAN card (continued) non-integrated 64 WPA-PSK 29 data encryption mode 29 pre-shared key 29 Index...
  • Page 98 ThinkVantage Access Connections 4.1: User’s Guide...

Table of Contents