Fujitsu ST5000 warranty Close the Wireless Network window

Page 64

S t y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C U s e r ’ s G u i d e – A p p e n d i x A

For ad hoc connection: Assign the same network name to all the personal computers to be connected.

For access point (infrastructure) connection:

Assign the appropriate SSID. The SSID must be identical to the SSID of the access point. Refer to the access point manual, or contact your network administrator.

b. For ad hoc connection, check the following field. For access point (infrastructure) connection,

clear the check mark for the following field:

[This is a computer-to-computer (ad hoc) net- work; wireless access points are not used.]

10.Choose the appropriate Network Authentication type. Options are Open, Shared, WPA, or WPA- PSK. Please contact your network administrator for the correct setting.

It is strongly recommended that you enter the network key for encoding communications data. If the network key is not entered, since the network can be accessed from all personal computers containing the wireless LAN function, there is the danger of your data being stolen or damaged by other users.

11.Choose the Data Encryption type. Options are WEP, TKIP, or AES. The latter two encryption methods are available only when the Network Authentication scheme is WPA or WPA-PSK. WEP, TKIP, and AES are different methods used to encrypt communications data. Proceed to Step 11a if using static WEP keys, otherwise proceed to step 12.

a.Clear the check mark from the [The key is provided for me automatically] check box.

b.Enter data in [Network Key]. Depending on the number of entered characters or digits, whether the key is an ASCII character code or a hexadec- imal code will be identified automatically.

Use five or thirteen characters to enter the key in the ASCII character code format. The characters that can be used as the “network key” are as fol- lows: 0 - 9, A - Z, _ (underscore), or,

Use 10 or 26 characters to enter the key in the hexadecimal character code format. The charac- ters that can be used as the “network key” in this case are as follows: 0- 9, A - Z, a - f

For ad hoc connection: Assign the same network key to all the personal computers to be con- nected.

For access point (infrastructure) connection:

Assign the identical network key that is pro- grammed into the access point. For this setting, refer to the access point manual or contact your network administrator.

c. Confirm the Network key by re-entering the same data in the [Confirm network key:] field.

d. Make sure that the key index used is identical to the key index used by the Access Point(s).

12.Click the [Authentication] tab and then verify the settings of [Enable network access control using IEEE 802.1x].

For internal use at an organization such as a com- pany, when access by wireless LAN clients is to be limited using IEEE 802.1x authentication, check the [Enable network access control using IEEE 802.1x] check box.

For home use, clear the check mark from [Enable network access control using IEEE 802.1x].

For the setting method relating to IEEE 802.1x authentication, refer to the manual of the access point which you are using.

13.After completion of setting operations, click the [OK] button. Processing will return to the [Wire- less Network Connection Properties] window.

14.Verify that the network name entered in step 7 above is added in [Preferred Networks], and then click the [OK] button.

In [Preferred Networks], register only the desired connection settings.

15. Close the [Wireless Network] window.

54

Image 64
Contents Copyright and Trademark Information Declaration of ConformityPage Table of Contents Agency Notices Preface Page Warranty Information PrefaceAbout this Guide Fujitsu Contact InformationPage Getting Started with Your Stylistic ST5000 Series Tablet PC Page Getting Started with Your Stylistic Tablet PC IN-BOX Items for the Stylistic ST5000 Series Tablet PCOptional Accessories Stylistic Tablet PC Features Swipe SensorBack Features Top Features Left-Side Features Right-Side Features Status Display Icon Mode/State LED State RemarksAccess HDDTablet Button Settings Application ButtonsTablet Icon DescriptionApplication Buttons Primary and Secondary Functions Navigation Buttons Tertiary Functions of Application and Navigation Buttons Passwords Setting UP the Security PanelSecurity Functions of Application Buttons Precautions Using Your Security PanelUninstalling the Security Panel Application Reinstalling the Security Panel Application UserSupervisor Open Add or Remove Programs Properties in the Control PanelConnectors and Peripheral Interfaces Connector Tablet PC Purpose PeripheralPeripheral Connectors/Interfaces Using Your Stylistic ST5000 Series Tablet PC Page Using the Stylistic ST5000 Series Tablet PC System StatesPowering UP the Tablet PC Shutting Down the SystemSuspending System Operation Current State To Change StatePower icon is not displayed Hibernate Save-to-Diskmode Power icon is blinking Suspend-to-RAMmodeSystem operation is suspended Adjusting the Display Brightness Using the PENFrom Suspend-to-RAM mode From Hibernate Save-to-Disk modeInstalling a PEN Tether Charging the BatteryReplacing the PEN TIP Calibrating the PENRemoving and Installing the Battery Tips for Conserving Battery Power90% 100%Operation of the Bridge Battery Installing Memory Stick/SD CardsModem Connection Memory STICK/SD Card SlotRemoving and Installing Memory Modules PC Card SlotInstalling a Dimm Module Removing a Memory ModulePage Care and Maintenance Page Caring for Your Tablet PC Care and MaintenanceProtecting the Display Screen Cleaning the Display Screen TroubleshootingStoring the Tablet PC Avoiding OverheatingRestoring Your PRE-INSTALLED Software Procedure Boot Priority ChangeRestoring the Factory Image Specifications Page Stylistic ST5000 Series Hardware Specifications Stylistic ST5000 SpecificationsDisplay Specifications Physical SpecificationsAgency Approval Specifications Power SpecificationsAdditional Specifications Agency Notices Page Regulatory Information FCC NoticesAvis Aux Utilisateurs Du Réseau Téléphonique Canadien UL Notice AC Adapter output polarityFor Authorized Repair Technicians Only System DisposalPage Appendix a Page FCC Regulatory Information Before Using the Wireless LAN Types of Wireless LANs Covered by this DocumentCharacteristics of the Wireless Module Wireless LAN Modes Using this Wireless ModuleHow to Handle This Wireless Module Access Point Infrastructure Mode See Figure A-2For Better Communications Deactivation using the wireless switch Deactivation using WindowsStopping Transmission Starting TransmissionConnecting the Wlan Preparation for Wireless LAN ConnectionFlow of Operations Assigning parametersClose the Wireless Network window Setting the network Setting TCP/IPSetting the sharing function Connection to the NetworkSetting the file-sharing function Setting the Microsoft network-sharing serviceSetting the printer-sharing function Confirming connection Confirming the status of the radioTransmit Power Level Power Save ModeIP Address CountryOther settings Setting of POWER-SAVING FunctionSetting of transmission power during ad hoc connection Setting of channels during ad hoc connectionTroubleshooting UnavailableNetwork ConnectionAccess point CommunicationIs disconnected Soon afterWireless LAN Glossary Open system authentication Shared key authenticationSsid Service Set Identifier Wi-FiIP address information Specifications SpecificationUsing the Bluetooth Device What is BLUETOOTH?Where to Find Information About Bluetooth WarrantyAppendix B Page Installing Omnipass Installing the OmniPass ApplicationIntroducing the Optional Fingerprint Sensor Device Getting StartedUninstalling OmniPass Master Password ConceptUser Enrollment Verifying Information about OmniPassUsing Omnipass Password ReplacementOmniPass Authentication Toolbar Remembering a PasswordPassword Management Logging in to a Remembered SiteConfiguring Omnipass Identities and Password ManagementOmniPass User Identities Exporting and Importing UsersOmnipass Control Center Exporting an OmniPass User ProfileImporting an OmniPass User Profile Things to Know Regarding Import/ExportSystem Settings User SettingsFirst option, Automatically log on to OmniPass as Cannot add a User with a Blank Password to OmniPass Cannot add Windows users to OmniPassTrusted Platform Module Installation Installing the TPM ApplicationsProcedure Enabling the Security Chip in BiosPage Adjusting the display brightness Air flow vents IndexMicrophone Microphone jack Storing the system unit Stylistic ST5000 Y l i s t i c S T 5 0 0 0 S e r i e s T a b l e t P C