E8110.book Page 92 Tuesday, February 28, 2006 2:59 PM

L i f e B o o k E S e r i e s N o t e b o o k - A p p e n d i x A

Configuration of the WLAN Device

The WLAN device can be configured to establish wire- less network connectivity using the Intel PROSet for Wireless utility. The Intel PROSet for Wireless utility allows for multiple profile setup and supports automatic profile switching. Support for most industry standard security solutions is contained in this software.

FLOW OF OPERATIONS

1.Activate the WLAN Device (See Activating the WLAN Device on page 91 for more information).

2.Configure the Wireless Network parameters (See Configuration Using Intel PROSet for Wireless Utility, below).

Enter the network name (SSID)

Choose the appropriate WLAN architecture (Ad Hoc or Infrastructure)

Choose Authentication method: Open, Shared, WPA-Enterprise, WPA2-Enterprise, WPA- Personal, or WPA2-Personal.

If using static WEP keys, enter static WEP key and choose key index.

3.Configure network settings

TCP/IP settings

Workgroup or Domain settings.

CONFIGURATION USING

INTEL PROSET FOR WIRELESS UTILITY

This section explains the procedure to properly configure the WLAN device using the Intel PROSet for Wireless utility. Pre-defined parameters will be required for this procedure. Please consult with your network administrator for these parameters:

Network Name - Also known as the SSID

Network Key (WEP) - Required if using static WEP keys.

Authentication Type - Open, Shared, WPA, WPA-PSK

Procedure

1.Activate the WLAN device using either the Wireless On/Off Switch or the Intel PROSet for Wireless utility.

2.Click the [Start] button first and then [All Pro- grams].

3.Click the icon [Intel PROSet Wireless] to execute the Intel PROSet for Wireless utility.

4.Click the [Add] button. The General Settings dialog displays.

5.Enter a profile name in the Profile Name field.

6.Enter the network SSID, in the Network Name (SSID) field.

7.Click Infrastructure or Ad Hoc for the operating mode.

8.Click [Advanced].

9.The Mandatory Access Point option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point. Enter the MAC address for the access point. Click OK to save the setting and return to the General Settings page.

10.Click [Next].

11.If you wish to enable Cisco Compatible Extensions, click Cisco Options and check the “Enable Cisco Compatible Extensions” box.

12.To enable LEAP support, check the 802.1x option and choose LEAP from the pull down list.

13.Click [OK].

14.Click Next.

15.Select Open, Shared, WPA-Enterprise, WPA2- Enterprise, WPA-Personal, or WPA2-Personal in the Network Authentication options.

16.Select either None, WEP, CKIP, or TKIP for the data encryption.

17.If WEP is selected, select either 64 or 128-bit for the Encryption Level.

18.Select the appropriate key index for your WLAN. The key index must be identical to the WEP key index used by the Access Point.

19.Enter the WEP key if required. If your network does not employ a 802.1x/EAP security mechanism, please skip to step 24.

20.Click the Enable 802.1x checkbox to enable the 802.1x security option. Please contact your network administrator if configuration of this setting is required.

21.Select the appropriate Authentication Type. Please contact your network administrator if configura- tion of this setting is required.

22.After selecting authentication type, enter the name, domain, and password of the user you have created on the authentication server. The user name and

92

Page 102
Image 102
Fujitsu E8110 Configuration of the Wlan Device, Flow of Operations, Configuration Using Intel Proset for Wireless Utility

E8110 specifications

The Fujitsu E8110 is a versatile and robust business laptop designed to meet the demands of modern enterprises. It is part of Fujitsu's Lifebook series, known for their reliability, portability, and performance. With a sleek design and a focus on functionality, the E8110 caters to professionals who require a dependable device for daily tasks.

One of the standout features of the E8110 is its powerful Intel Core processor, which provides ample computing power for multitasking and demanding applications. The laptop supports various configurations, allowing users to choose from different processor options to best suit their work requirements. This flexibility ensures that users can find a configuration that balances performance and cost-effectiveness.

The E8110 also boasts a generous amount of RAM and storage options, enabling users to run multiple applications simultaneously without experiencing slowdowns. With support for solid-state drives (SSD), users benefit from faster boot times and improved data access speeds, which can significantly enhance productivity.

In terms of display, the E8110 features a sharp and vibrant screen that provides excellent visibility in various lighting conditions. The display also supports a wide viewing angle, making it easier for teams to collaborate on projects while sharing the screen.

Security is a paramount consideration for business users, and the Fujitsu E8110 addresses this with multiple security features. The laptop includes a biometric fingerprint scanner and smart card reader, which help safeguard sensitive information and prevent unauthorized access. Additionally, Fujitsu’s software solutions offer robust data protection measures, including encryption and secure boot options.

The E8110 is designed with connectivity in mind, offering a range of ports including USB 3.0, HDMI, and even a legacy VGA port for compatibility with older projectors and displays. This versatility allows users to connect to various peripherals and external devices effortlessly.

Moreover, portability is a key characteristic of the E8110. Weighing in at just a few pounds, it is lightweight enough to carry around without causing fatigue, making it an ideal choice for professionals who travel frequently.

In summary, the Fujitsu E8110 combines powerful performance, security features, and portability, making it a strong contender in the business laptop market. Its thoughtful design and focus on user needs make it an excellent choice for professionals seeking a reliable and efficient computing solution.