hit counter script

Chapter 4. Deploying Access Connections; Access Connections Deployment Features; Installing Ibm Access Connections; Installing The Integrated Ibm Access Connections Package - Lenovo ThinkPad G41 Deployment Manual

Deployment guide for ibm access connections
Hide thumbs Also See for ThinkPad G41:
Table of Contents

Advertisement

Chapter 4. Deploying Access Connections

After creating the location profiles required for client users, you can also manage
and deploy new, updated, or revised location profiles to client computers.

Access Connections deployment features

The following is a list of features to help IT administrators deploy and manage
Access Connections:
v
v Administrators can create location profiles and distribute them as part of a
v
v
v A client configuration policy can be set to configure the operation of Access
v

Installing IBM Access Connections

IBM Access connections can be installed with using either a bundled package that
includes IBM Access Connections software and all the necessary drivers, or the
IBM Access Connections software alone, where you will install the necessary
drivers separately.

Installing the integrated IBM Access Connections package

To install IBM Access Connections 3.0 or later without user interaction, do the
following:
1. Start Windows 2000 or Windows XP, and then log on with administrative
2. Extract the Access Connections drivers to the hard disk drive.
3. Click Start, then click Run.
4. Type the following command:
You can download the software package along with the installation instructions
from the Web at:
http://www.pc.ibm.com/us/think/thinkvantagetech/downloads_support.html.
From that page, click Software download and User's Guide to download the
software package.
© Copyright IBM Corp. 2004
The IBM Access Connections Enabler for Administrator Profile Deployment
feature is required to deploy location profiles that you create for client users. The
Enabler is available to IT professionals only at http://www-
3.ibm.com/pc/support/site.wss/document.do?lndocid=ACON-DEPLOY.
preload image or install them after the client systems have been deployed.
Control policies can be set for each profile.
Distribution control lists can be created to limit who can import various
deployment packages.
Connections on the client computer.
Deployment packages are encrypted and password protected to be sure that
only authorized individuals can import the location profiles that may contain
wireless security information such as WEP or static password, for example.
privileges.
SETUP.EXE /S
11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents