Lenovo ThinkPad T41p (English) Deployment Guide for IBM Access Connections - Page 13

Capitalizing, profile-deployment, capabilities, administration

Page 13 highlights

Capitalizing on new profile-deployment capabilities to ease administration Access Connections has a feature to make location profile deployment centrally manageable. Prior to having this capability, all client users were required to set up their own location profiles. Although Access Connections software leads you through the steps needed to create a profile, the entry of settings, especially settings associated with security, can still be cumbersome. Now an IT administrator can do the following: v Create location profiles and distribute them as part of a hard disk image or send the profile files to client systems that have already been deployed, thereby saving users from spending time individually setting up profiles. v Control policies-such as whether a distributed profile can be modified or deleted-for all profiles in the system, which could prevent users from inadvertently modifying or deleting a profile and then needing help-desk support. v Establish rules to limit users who can import various deployment packages using distribution control lists (selectively distribute the profiles based on ThinkPad serial numbers). v Create secure profile deployment packages that are encrypted and password protected so only authorized individuals can import the location profiles. This feature is important because profiles may contain wireless security content such as a WEP key or WPA TKIP PSK (Wi-Fi Protected Access Temporal Key Integrity Protocol Pre Shared Key). A standard installation of Access Connections software does not include the profile distribution capability. The feature must be enabled using a separate software tool. This enabler utility is available to IBM customers from a dedicated Web site for registration and download. The enabler creates an additional menu item in the Access Connections user interface called Profile Distribution. It is from this profile distribution menu item that the IT administrator creates profiles to be distributed and establishes appropriate user-access policy. If a selected profile contains a wireless profile with encryption enabled, the administrator will be prompted to re-enter the wireless security settings to be deployed, thus ensuring that the administrator knows the security settings such as the WEP encryption key. If the wrong WEP key is entered, that WEP key will be deployed but not usable. With the profile deployment capability, Access Connections software provides a significant benefit to IT administrators in terms of wireless security manageability. Many organizations that use WEP security leave their WEP encryption keys static simply because the updating of WEP keys across the entire client user base is a daunting task. This practice can put an organization at risk because static WEP key encryption can be broken. The Access Connections profile-deployment feature enables system administrators to remotely change and deploy new security settings including WEP keys. By frequently changing WEP keys, system administrators can dramatically reduce the possibility of security breaches in a WLAN environment. IBM Access Connections software facilitates fast, easy network connections by using profiles to define the network adapter and associated networking parameters for different locations. Easy to use and manage, Access Connections software delivers a comprehensive network connectivity solution to help you improve total cost of ownership and employee productivity. And with the Access Connections software profile deployment feature, a system administrator can centrally create profiles and remotely deploy them to the client user base-as opposed to setting Chapter 2. Using Access Connections 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

Capitalizing
on
new
profile-deployment
capabilities
to
ease
administration
Access
Connections
has
a
feature
to
make
location
profile
deployment
centrally
manageable.
Prior
to
having
this
capability,
all
client
users
were
required
to
set
up
their
own
location
profiles.
Although
Access
Connections
software
leads
you
through
the
steps
needed
to
create
a
profile,
the
entry
of
settings,
especially
settings
associated
with
security,
can
still
be
cumbersome.
Now
an
IT
administrator
can
do
the
following:
v
Create
location
profiles
and
distribute
them
as
part
of
a
hard
disk
image
or
send
the
profile
files
to
client
systems
that
have
already
been
deployed,
thereby
saving
users
from
spending
time
individually
setting
up
profiles.
v
Control
policies—such
as
whether
a
distributed
profile
can
be
modified
or
deleted—for
all
profiles
in
the
system,
which
could
prevent
users
from
inadvertently
modifying
or
deleting
a
profile
and
then
needing
help-desk
support.
v
Establish
rules
to
limit
users
who
can
import
various
deployment
packages
using
distribution
control
lists
(selectively
distribute
the
profiles
based
on
ThinkPad
serial
numbers).
v
Create
secure
profile
deployment
packages
that
are
encrypted
and
password
protected
so
only
authorized
individuals
can
import
the
location
profiles.
This
feature
is
important
because
profiles
may
contain
wireless
security
content
such
as
a
WEP
key
or
WPA
TKIP
PSK
(Wi-Fi
Protected
Access
Temporal
Key
Integrity
Protocol
Pre
Shared
Key).
A
standard
installation
of
Access
Connections
software
does
not
include
the
profile
distribution
capability.
The
feature
must
be
enabled
using
a
separate
software
tool.
This
enabler
utility
is
available
to
IBM
customers
from
a
dedicated
Web
site
for
registration
and
download.
The
enabler
creates
an
additional
menu
item
in
the
Access
Connections
user
interface
called
Profile
Distribution.
It
is
from
this
profile
distribution
menu
item
that
the
IT
administrator
creates
profiles
to
be
distributed
and
establishes
appropriate
user-access
policy.
If
a
selected
profile
contains
a
wireless
profile
with
encryption
enabled,
the
administrator
will
be
prompted
to
re-enter
the
wireless
security
settings
to
be
deployed,
thus
ensuring
that
the
administrator
knows
the
security
settings
such
as
the
WEP
encryption
key.
If
the
wrong
WEP
key
is
entered,
that
WEP
key
will
be
deployed
but
not
usable.
With
the
profile
deployment
capability,
Access
Connections
software
provides
a
significant
benefit
to
IT
administrators
in
terms
of
wireless
security
manageability.
Many
organizations
that
use
WEP
security
leave
their
WEP
encryption
keys
static
simply
because
the
updating
of
WEP
keys
across
the
entire
client
user
base
is
a
daunting
task.
This
practice
can
put
an
organization
at
risk
because
static
WEP
key
encryption
can
be
broken.
The
Access
Connections
profile-deployment
feature
enables
system
administrators
to
remotely
change
and
deploy
new
security
settings
including
WEP
keys.
By
frequently
changing
WEP
keys,
system
administrators
can
dramatically
reduce
the
possibility
of
security
breaches
in
a
WLAN
environment.
IBM
Access
Connections
software
facilitates
fast,
easy
network
connections
by
using
profiles
to
define
the
network
adapter
and
associated
networking
parameters
for
different
locations.
Easy
to
use
and
manage,
Access
Connections
software
delivers
a
comprehensive
network
connectivity
solution
to
help
you
improve
total
cost
of
ownership
and
employee
productivity.
And
with
the
Access
Connections
software
profile
deployment
feature,
a
system
administrator
can
centrally
create
profiles
and
remotely
deploy
them
to
the
client
user
base—as
opposed
to
setting
Chapter
2.
Using
Access
Connections
7