Fujitsu GBR-222200-002 manual Close the Wireless Network window

Page 64

Osian_UG.book Page 52 Monday, October 9, 2006 1:24 PM

S t y l i s t i c S T 5 1 0 0 S e r i e s T a b l e t P C U s e r ’ s G u i d e – A p p e n d i x A

For ad hoc connection: Assign the same network name to all the personal computers to be connected.

For access point (infrastructure) connection:

Assign the appropriate SSID. The SSID must be identical to the SSID of the access point. Refer to the access point manual, or contact your network administrator.

b. For ad hoc connection, check the following field. For access point (infrastructure) connection,

clear the check mark for the following field:

[This is a computer-to-computer (ad hoc) net- work; wireless access points are not used.]

10.Choose the appropriate Network Authentication type. Options are Open, Shared, WPA, or WPA- PSK. Please contact your network administrator for the correct setting.

It is strongly recommended that you enter the network key for encoding communications data. If the network key is not entered, since the network can be accessed from all personal computers containing the wireless LAN function, there is the danger of your data being stolen or damaged by other users.

11.Choose the Data Encryption type. Options are WEP, TKIP, or AES. The latter two encryption methods are available only when the Network Authentication scheme is WPA or WPA-PSK. WEP, TKIP, and AES are different methods used to encrypt communications data. Proceed to Step 11a if using static WEP keys, otherwise proceed to step 12.

a.Clear the check mark from the [The key is provided for me automatically] check box.

b.Enter data in [Network Key]. Depending on the number of entered characters or digits, whether the key is an ASCII character code or a hexadec- imal code will be identified automatically.

Use five or thirteen characters to enter the key in the ASCII character code format. The characters that can be used as the “network key” are as fol- lows: 0 - 9, A - Z, _ (underscore), or,

Use 10 or 26 characters to enter the key in the hexadecimal character code format. The charac- ters that can be used as the “network key” in this case are as follows: 0- 9, A - Z, a - f

For ad hoc connection: Assign the same network key to all the personal computers to be con- nected.

For access point (infrastructure) connection:

52

Assign the identical network key that is pro- grammed into the access point. For this setting, refer to the access point manual or contact your network administrator.

c. Confirm the Network key by re-entering the same data in the [Confirm network key:] field.

d. Make sure that the key index used is identical to the key index used by the Access Point(s).

12.Click the [Authentication] tab and then verify the settings of [Enable network access control using IEEE 802.1x].

For internal use at an organization such as a com- pany, when access by wireless LAN clients is to be limited using IEEE 802.1x authentication, check the [Enable network access control using IEEE 802.1x] check box.

For home use, clear the check mark from [Enable network access control using IEEE 802.1x].

For the setting method relating to IEEE 802.1x authentication, refer to the manual of the access point which you are using.

13.After completion of setting operations, click the [OK] button. Processing will return to the [Wire- less Network Connection Properties] window.

14.Verify that the network name entered in step 7 above is added in [Preferred Networks], and then click the [OK] button.

In [Preferred Networks], register only the desired connection settings.

15. Close the [Wireless Network] window.

Image 64
Contents User’s Guide OsianUG.book Page ii Monday, October 9, 2006 124 PM Copyright and Trademark Information OmniPass is a trademark of Softex, IncImportant Safety Instructions AC Adapter output polarityFor Authorized Repair Technicians Only System DisposalTable of Contents Appendix B Security Device USER’S Guide Preface OsianUG.book Page vi Monday, October 9, 2006 124 PM Limited Warranty Information PrefaceAbout this Guide Fujitsu Contact InformationOsianUG.book Page viii Monday, October 9, 2006 124 PM Getting Started with Your Tablet PC OsianUG.book Page x Monday, October 9, 2006 124 PM Optional Accessories Getting Started with Your Stylistic Tablet PCStylistic Tablet PC Features Speaker Allows you to listen to mono audio filesBattery release latch Used to release the removable battery System to an optional Tablet DockTop Features Left-Side Features Right-Side Features Status Display Icon Mode/State LED State RemarksSystem Status Indicators Application Buttons Tablet IconFn + DescriptionApplication Buttons Primary and Secondary Functions Navigation Buttons Navigation ButtonsTertiary Functions of Application and Navigation Buttons Same as if you had tapped F2 on a keyboardPasswords Setting UP the Security PanelSecurity Functions of Application Buttons Using Your Security Panel PrecautionsUninstalling the Security Panel Application Reinstalling the Security Panel Application UserSupervisor Open Add or Remove Programs Properties in the Control PanelConnectors and Peripheral Interfaces Connector Tablet PC Purpose PeripheralPeripheral Connectors/Interfaces OsianUG.book Page 18 Monday, October 9, 2006 124 PM Using Your Stylistic Tablet PC OsianUG.book Page 20 Monday, October 9, 2006 124 PM Using the Stylistic ST5100 Series Tablet PC System StatesPowering UP the Tablet PC Power icon is blinking Standby modePower icon is not displayed Hibernate mode Shutting Down the SystemUsing the Shock Sensor Utility From Standby modeFrom Hibernate mode Resuming System OperationAdjusting the Display Brightness Using the PENInstalling a PEN Tether Calibrating the PENRemoving and Installing the Battery Charging the BatteryTo charge the battery Replacing the PEN TIPOperation of the Bridge Battery Tips for Conserving Battery PowerModem Connection Memory STICK/SD Card Slot PC Card SlotInstalling a Memory Module Removing and Installing MemoryRemoving a Memory Module 10. Removing a Dimm Module Care Maintenance OsianUG.book Page 32 Monday, October 9, 2006 124 PM Caring for Your Tablet PC Care and MaintenanceProtecting the Display Screen Storing the Tablet PC Avoiding OverheatingCleaning the Display Screen TroubleshootingRestoring the PRE-INSTALLED Software Configuring Peripheral InterfacesRe-Installing Individual Drivers and Applications Boot Priority ChangeAutomatically Downloading Driver Updates ProcedureCheck for updates now About Fujitsu Driver UpdateOsianUG.book Page 38 Monday, October 9, 2006 124 PM System Specifications OsianUG.book Page 40 Monday, October 9, 2006 124 PM Stylistic ST5100 Series Hardware Specifications Processing SpecificationsPower Specifications Regulatory Information FCC NoticesAvis Aux Utilisateurs Du Réseau Téléphonique Canadien Appendix a OsianUG.book Page 46 Monday, October 9, 2006 124 PM FCC Regulatory Information Before Using the Wireless LAN Wireless LAN Devices Covered by this DocumentCharacteristics of the Wlan Device Wireless LAN Modes Using this Wireless ModuleAccess Point Infrastructure Mode See Figure A-2 How to Handle This Wireless ModuleDeactivation using the wireless switch For Better CommunicationsDeactivation using Windows Intel PROSet Wireless LANAtheros Wireless LAN Starting TransmissionConnecting the Wlan Preparation for Wireless LAN ConnectionFlow of Operations Assigning parametersClose the Wireless Network window Setting the network Setting TCP/IPSetting the sharing function Connection to the NetworkSetting the Microsoft network-sharing service Setting the file-sharing functionSetting the printer-sharing function Click the Sharing tab Click Share this printerConfirming connection Confirming the status of the radioTransmit Power Level Power Save ModeIP Address CountryOther settings Setting of POWER-SAVING FunctionSetting of transmission power during ad hoc connection Setting of channels during ad hoc connectionTroubleshooting UnavailableNetwork ConnectionAccess point CommunicationIs disconnected Soon afterWireless LAN Glossary Open system authentication Shared key authenticationSsid Service Set Identifier Wi-FiIP address information Specifications SpecificationUsing the Bluetooth Device What is BLUETOOTH?Where to Find Information about Bluetooth WarrantyAppendix B OsianUG.book Page 66 Monday, October 9, 2006 124 PM Installing Omnipass Installing the OmniPass ApplicationIntroducing Fingerprint Sensor Device Getting StartedUninstalling OmniPass Master Password ConceptUser Enrollment Verifying Information about OmniPassUsing Omnipass Password ReplacementOmniPass Authentication Toolbar Remembering a PasswordPassword Management Logging in to a Remembered SiteConfiguring Omnipass Identities and Password ManagementOmniPass User Identities Exporting and Importing UsersOmnipass Control Center Exporting an OmniPass User ProfileImporting an OmniPass User Profile Things to Know Regarding Import/ExportSystem Settings User SettingsFirst option, Automatically log on to OmniPass as Set to Disabled Cannot add a User with a Blank Password to OmniPassCannot add Windows users to OmniPass Trusted Platform Module Installation Installing the TPM ApplicationsProcedure Enabling the Security Chip in BiosOsianUG.book Page 76 Monday, October 9, 2006 124 PM Adjusting the display brightness Air flow vents Battery powerUsed in Standby mode Battery release latch IndexPen tether Pen tether point Peripheral connectors Setting up Security Panel Shock Sensor UtilityMicrophone Microphone jack Navigation buttons Off state OmniPassStylistic ST5000 specifications System interface connectorWireless LAN/Bluetooth on/off switch . . . . . . . . . .3 Storing the system unit Stylistic ST5000OsianUG.book Page 80 Monday, October 9, 2006 124 PM OsianUG.book Page 81 Monday, October 9, 2006 124 PM OsianUG.book Page 82 Monday, October 9, 2006 124 PM OsianUG.book Page 83 Monday, October 9, 2006 124 PM OsianUG.book Page 84 Monday, October 9, 2006 124 PM