Chapter 4. Deploying Access Connections
After creating the location profiles required for client users, you can also manage
and deploy new, updated, or revised location profiles to client computers.
Access Connections deployment features
The following is a list of features to help IT administrators deploy and manage
Access Connections:
v
v Administrators can create location profiles and distribute them as part of a
v
v
v A client configuration policy can be set to configure the operation of Access
v
Installing IBM Access Connections
IBM Access connections can be installed with using either a bundled package that
includes IBM Access Connections software and all the necessary drivers, or the
IBM Access Connections software alone, where you will install the necessary
drivers separately.
Installing the integrated IBM Access Connections package
To install IBM Access Connections 3.0 or later without user interaction, do the
following:
1. Start Windows 2000 or Windows XP, and then log on with administrative
2. Extract the Access Connections drivers to the hard disk drive.
3. Click Start, then click Run.
4. Type the following command:
You can download the software package along with the installation instructions
from the Web at:
http://www.pc.ibm.com/us/think/thinkvantagetech/downloads_support.html.
From that page, click Software download and User's Guide to download the
software package.
© Copyright IBM Corp. 2004
The IBM Access Connections Enabler for Administrator Profile Deployment
feature is required to deploy location profiles that you create for client users. The
Enabler is available to IT professionals only at http://www-
3.ibm.com/pc/support/site.wss/document.do?lndocid=ACON-DEPLOY.
preload image or install them after the client systems have been deployed.
Control policies can be set for each profile.
Distribution control lists can be created to limit who can import various
deployment packages.
Connections on the client computer.
Deployment packages are encrypted and password protected to be sure that
only authorized individuals can import the location profiles that may contain
wireless security information such as WEP or static password, for example.
privileges.
SETUP.EXE /S
11