ContentsFigures . . . . . . . . . . . . . . . . . . . . . . . . . . . . vAbout this book . . . . . . . . . . . . . . . . . . . . . . . . viiHow this book is organized . . . . . . . . . . . . . . . . . . . . viiNotices used in this book . . . . . . . . . . . . . . . . . . . . . viiSyntax conventions that are used in this book . . . . . . . . . . . . . viiThinkVantage Access Connections resources on the World Wide Web . . . . viiiChapter 1. Introducing Access Connections . . . . . . . . . . . . . 1System requirements . . . . . . . . . . . . . . . . . . . . . . . 1Supported operating systems . . . . . . . . . . . . . . . . . . . 1New features in Access Connections v.4.1 . . . . . . . . . . . . . . . 1Updating Access Connections . . . . . . . . . . . . . . . . . . . 2Chapter 2. Using location profiles . . . . . . . . . . . . . . . . . 3Creating a location profile . . . . . . . . . . . . . . . . . . . . . 3Additional settings . . . . . . . . . . . . . . . . . . . . . . . 25Wireless security settings . . . . . . . . . . . . . . . . . . . . 28Editing VPN settings . . . . . . . . . . . . . . . . . . . . . . 40Managing location profiles . . . . . . . . . . . . . . . . . . . . . 42Using shortcut icons . . . . . . . . . . . . . . . . . . . . . . 43Connecting to a network . . . . . . . . . . . . . . . . . . . . . 44Connecting to a wireless network . . . . . . . . . . . . . . . . . 45Switching location profiles automatically . . . . . . . . . . . . . . . . 47Viewing the connection status . . . . . . . . . . . . . . . . . . . 48Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . 53Chapter 3. Configuration options . . . . . . . . . . . . . . . . . 55Network global settings . . . . . . . . . . . . . . . . . . . . . . 55Notification global settings . . . . . . . . . . . . . . . . . . . . . 57User preferences . . . . . . . . . . . . . . . . . . . . . . . . 59Toolbar options . . . . . . . . . . . . . . . . . . . . . . . . . 60Peer-to-peer options . . . . . . . . . . . . . . . . . . . . . . . 61Chapter 4. Using a wireless WAN connection . . . . . . . . . . . . 63Creating and applying a wireless WAN profile . . . . . . . . . . . . . 63Using Short Message Service (SMS) interface . . . . . . . . . . . . . 64Chapter 5. Introducing a peer-to-peer connection . . . . . . . . . . . 65Preparing the peer-to-peer connection . . . . . . . . . . . . . . . . 65Creating the peer-to-peer connection . . . . . . . . . . . . . . . . . 68Using peer-to-peer connection . . . . . . . . . . . . . . . . . . . 71Appendix A. Frequently asked questions . . . . . . . . . . . . . . 73Appendix B. Command line interface . . . . . . . . . . . . . . . . 77Appendix C. Getting help and technical assistance . . . . . . . . . . 79Before you call . . . . . . . . . . . . . . . . . . . . . . . . . 79Using the documentation . . . . . . . . . . . . . . . . . . . . . 79Getting help and information from the World Wide Web . . . . . . . . . . 79Appendix D. Notices . . . . . . . . . . . . . . . . . . . . . . 81© Lenovo 2006. Portions © IBM Corp. 2006. iii