Lenovo PC 300PL User guide for IBM PC300PL (type 6584, 6594) systems - Page 6

Using the Configuration/Setup Utility program, Installing options

Page 6 highlights

Alert on LAN 29 Remote Program Load or Dynamic Host Configuration Protocol . . 29 Remote Administration 29 LANClient Control Manager 29 System Migration Assistant (SMA 30 Desktop Management Interface 30 Using security features 30 Anti-intrusion features 30 Component protection 31 Asset ID capability 31 IBM security solutions 32 Data protection 32 Enhanced security 33 Locking the keyboard 33 Taking care of your computer 34 Basics 34 Cleaning your computer 34 Moving your computer 36 Chapter 4. Using the Configuration/Setup Utility program 37 Starting and using the Configuration/Setup Utility program 37 Viewing and changing settings 38 Exiting from the Configuration/Setup Utility program 39 Using passwords 40 Using a power-on password 40 Using an administrator password 43 Using Security Profile by Device 45 Using Enhanced Security 46 Other settings in the Configuration/Setup Utility program 47 Changing keyboard speed 47 Setting the startup sequence 48 Settings that affect the startup procedure 49 Setting Remote Administration 49 Interrupt and DMA resources 50 Power-management features 51 Quick reference for network-related settings 54 Enabling the Pentium III processor serial number feature 57 Chapter 5. Installing options 59 Preparing to install options 59 Handling static-sensitive devices 59 Available options 60 Tools required 60 Installing options in the desktop model 61 Removing the cover 61 Locating components 63 Identifying parts on the system board 64 iv PC 300PL User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194

Alert on LAN
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
29
Remote Program Load or Dynamic Host Configuration Protocol
.
.
29
Remote Administration
. . . . . . . . . . . . . . . . . . . . . . . . .
29
LANClient Control Manager
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
29
System Migration Assistant (SMA)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
Desktop Management Interface
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
Using security features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
Anti-intrusion features
. . . . . . . . . . . . . . . . . . . . . . . . .
30
Component protection
. . . . . . . . . . . . . . . . . . . . . . . . .
31
Asset ID capability
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
31
IBM security solutions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
32
Data protection
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
32
Enhanced security
. . . . . . . . . . . . . . . . . . . . . . . . . . .
33
Locking the keyboard
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
33
Taking care of your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
Basics
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
34
Cleaning your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
Moving your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
36
Chapter 4.
Using the Configuration/Setup Utility program
.
.
.
.
.
.
37
Starting and using the Configuration/Setup Utility program
.
.
.
.
.
.
37
Viewing and changing settings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
38
Exiting from the Configuration/Setup Utility program
.
.
.
.
.
.
.
39
Using passwords
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
Using a power-on password
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
40
Using an administrator password
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
43
Using Security Profile by Device
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
45
Using Enhanced Security
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
46
Other settings in the Configuration/Setup Utility program
.
.
.
.
.
.
.
47
Changing keyboard speed
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
47
Setting the startup sequence
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
48
Settings that affect the startup procedure
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
49
Setting Remote Administration
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
49
Interrupt and DMA resources
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
50
Power-management features
. . . . . . . . . . . . . . . . . . . . . .
51
Quick reference for network-related settings
.
.
.
.
.
.
.
.
.
.
.
.
.
54
Enabling the Pentium III processor serial number feature
.
.
.
.
.
.
.
.
57
Chapter 5.
Installing options
. . . . . . . . . . . . . . . . . . . . . .
59
Preparing to install options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
59
Handling static-sensitive devices
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
59
Available options
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
60
Tools required
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
60
Installing options in the desktop model
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
61
Removing the cover
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
61
Locating components
. . . . . . . . . . . . . . . . . . . . . . . . . .
63
Identifying parts on the system board
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
64
iv
PC 300PL User Guide