Preview only show first 10 pages with watermark. For full document please download

Ac27_ko

   EMBED


Share

Transcript

ii IBM® Access Connections 2.7 |3 !Le qw & 1 e ; !Le! |O) . . . . . . . . . 1 & 2 e Access Connections! |O) . . . . . 3 & 3 e |3 |! mAX_ R gW . . . . . . 5 |3& 'Q d8 gg . . . . . . . . . . . 5 & 4 e Access ConnectionsG |3 . . Access Connections |3 bI . . . . |.Z bI 0:- . . . . . . . . Administrator Feature(|.Z bI) gk. uNn LLv 3!& 'Q Xq . . © Copyright IBM Corp. 2003 . . . . . . . . . . . . . 7 . 7 . 7 . 8 . . . . 14 Access Connections Location Profile('! O)G x] |3 . . . . . . . . . . +N Z?(unattended) |3 . . . . . /N v?(attended) |3 . . . . . . AND . . . 15 . . . 15 . . . 15 & 5 e KAx .& W Xa f} . . . . . . 17 |3H +1 ANDOz |CH /vQ fl . . . 17 NO. O] gW! kQ H; . . . . . . . . 19 %gL. Lk! |Q VG gW . . . . . . . 20 nO s% . . . . . . . . . . . . . . . 20 iii iv IBM® Access Connections 2.7 |3 !Le & 1 e ; !Le! |O) ; !LeB IT |.Z GB 6w ;!- IBM(R) Access ConnectionsG |3 w+ & cgOB cgZ& 'Q MTOY. ANW%! kQ sL>: h`! {s " ks D;M!- ANW%; gkR v V5O c!Gn VB fl! QO), ; !LeB O * GB W LsG D;M! Access Connections& 3!OB% JdQ $8& &xU OY. Access Connections @k ANW%: ANW%G gk C, gkZ W |.Z! |6R v VB 5r;; &xUOY. © Copyright IBM Corp. 2003 1 2 IBM® Access Connections 2.7 |3 !Le & 2 e Access Connections! |O) Access ConnectionsB '! ANDO(Location Profile)G [: W |.& 'Q ,a 86 ANW%TOY. " '! ANDO!B } GB g+G nG /$ '!!- ,s Lp. D;M& W.v)! ,aOB% JdQ W.v) 3$ W NM] 3$L ze Gn V@OY. W.v) ,a!B p)L* /1 W.v) npM, $k* e!(DSL, ILm p), GB ISDN), GB +1 W.v) npM& gkR v V@OY. Access ConnectionsB !s 3N W.v)(VPN: Virtual private network) ,a GQ vxU OY. gkZ! D;M& L?Oi- '! ANDO; |/Oi, Access Connections ! gkZ& 5M v?8N W.v)& 3$R Jd xL |#m U1T W.v)! , aR v VT X ]OY. L [!5, " ANDO!B b; A0MM 8H 3$, W.m ANW% Z? G` 3$; zeR v V@OY. Access ConnectionsB W.v) [? sB W W.v) [w; (vOGN, )/ 3 $; Z?8N v`R v V@OY. ANW%; |3Ob |! YgQ ″b; 3$* (preset)″; [:X R8Na, IT |.ZB gkZiG .G |-& YLm, gkZiL .G GB vx xL5 ::N W.v)! ,aO5O R v V@OY. © Copyright IBM Corp. 2003 3 4 IBM® Access Connections 2.7 |3 !Le & 3 e |3 |! mAX_ R gW Access Connections& LkOi ,a ANDO; [:O) zeR v V@OY. L8 T [:H ,a ANDO: ks D;MN R/ i) gkR v V@OY. Access ConnectionsG O|Q 3!!B Oe~n! {% ANDOL FQ, '!! {% AN DOG [:L wTKOY. o, ,sLp. D;M& LkO) g+GL*, }!-, G B g+GL* }; 0* )` _! W.v)! "SOAB fl, YgQ ,a fD; LkO) < 3G '! ANDO(Lu] GB +1 ,a; gkOB g+Gk AND O, Lu] ,a8; gkOB ZC!-G ANDO, W.m ‘V:L’; LkOB +1 ,a W Lu] ,a; gkOB )`k ANDO); [:X_ UOY. Access ConnectionsB gk !IQ !e |% ,a fD; Z?8N (vO) {UQ 3$; {kUOY. gkZ! W.v)& gkOT I '!G W.v) 3$ $8 W L/Q eR!- gk !IQ ,a fD! kQ $8& kUOi gkZ! R/i)- oC gkR v VB Jb ANDO; [:OB% 5rL I MTOY. Access ConnectionsB Jb LLv M T2 |3H ANDO _!- gk !IQ 3$; gkOGN, L/Q f}8N g kZG .G |-& (RC0B ?z& < v V8g, GQ gkZB F+1 xENn [w xL oC W.v)& gkR v VT KOY. v| 2.7 LDG Access Connections!-B |.Z bI(Administrator Feature); g kR v V@OY. L bI: bw /f!- Access Connections& gkR ', '! ANDOz O] 3$, W.m 3N GB Wl! kQ |. $%G |3 [w; 8Y #mOT Ob 'Q MTOY. L/Q ANDOz 3$: Jb LLv |3 [wG O NN C:[G Jb |3 C! |3OE*, GB C:[L |3H D! %X x] |3 fD; LkO) |3R v V@OY. |3& 'Q d8 gg Access ConnectionsG |3!B Y=z 0: Oe~n W RA.~n ggL JdU OY: v Microsoft(R) Windows(R) 2000 GB Windows(R) XP Professional/Home Edition n5 <& v © Copyright IBM Corp. 2003 VR Q !vG gk !IQ ,a fD(Lu], d+ 5, +1 #) 5 6 IBM® Access Connections 2.7 |3 !Le & 4 e Access ConnectionsG |3 2003b 8y, Access Connections 2.7G bCM T2 8Y #mQ |3 W |.& ' Q bIiL _!Gz@OY. Access Connections |3 bI Y=: IT |.Z& 5M Access Connections& |3Om |.OB% gkGB bI G qOTOY: IBM Access Connections: Access ConnectionsG |3 bI; gkOAi v Administrator Profile Deployment Feature Enabler! JdUOY. Administrator Profile Deployment Feature EnablerB IT |. w+ cgZ8 gkR v V8g, Y= VR!- YnNe ^; v V@OY: http://www-3.ibm.com/pc/support/site. wss/document.do?lndocid=ACON-DEPLOY |.ZB '! ANDO(Location Profile); [:O) Jb 3! LLvG ONN v hwOE*, ,sLp. D;M! |3H D! _!N 3!R v V@OY. v " ANDO!B Control policy(|. $%)& 3$R v V@OY. v Distribution Control List(hw |. .:.)& [:Oi |3 P0v& R/iO v VB gkZ& &QR v V@OY. ,sLp. 3$ $%(Client configuration policy); 3$Oi ,sLp. D;M v !-G Access Connections [w; 3$R v V@OY. N!H gkZ8L WEP W WPA-PSK $8& wTOm VB '! ANDO; R v /iO v V5O Ob 'X, Deployment package(|3 P0v)B O#-Gn V 8g, GQ O#! GX 8#KOY. |.Z bI 0:Access ConnectionsG Administrator Feature(|.Z bI)& 0:-OAi Uz |. Z D;M! Access Connections 2.7 LD v|; 3!X_ UOY. +1 ,a! gkR '! ANDO; |3R '!B |.Z D;MM ,sLp. D; M gJ! Xg '! ANDO!- $GH bI; vxOB +1 npM! 3!Gn V n_ UOY. 9& in, |3R '! ANDOL LEAP NukLsi, ,sLp. D ;MG npM *C LEAP Nu; vxX_ UOY. Administrator Feature(|.Z bI)& 0:- OAi Y=z 0L OJC@: © Copyright IBM Corp. 2003 7 1. '! ANDO; [:R D;M! Administrator Feature Enabler& YnNe ^ 8JC@. (% gL. VRB Y=z 0@OY: http://www-3.ibm.com/pc/support/ site.wss/document.do?lndocid=ACON-DEPLOY) 2. C[ --> G`; ,/Q D, #F8b& ,/OJC@. \h 1!- YnNe ^: Z? P` X& DO; 1COJC@. 3. .N; ,/OJC@. P`L X&Gi- C:\Program Files\Thinkpad\ ConnectUtilities zuN ANW% DOL zeI MTOY. 4. Access Connections ANW%L G` _N fl, ANW%G ^N "; ]8JC @. 5. C[ --> G`; ,/Q D, TBu! C:\Program Files\Thinkpad\ ConnectUtilities\AdmEnblr.exe& TBOJC@. W2 1. Enabler for Administrator Profile Deployment Feature " 6. Enable Administrator Feature(|.Z bI 0:-)& 1COJC@. 7. Exit(>a)& ,/O) 0:- "; ]8JC@. 8. Access Connections& G`OJC@. v] gk _N D;M!- L|! '! ANDO; }:Q {L xYi, ANDO [ : 6}g Jb "L *8/ MTOY. O* LsG ANDO; [:Q D! Access Connections ^N "; < v V@OY. ″Profile Distribution(ANDO hw)″LsB WqL "G ^: Y! *8* V; MTOY. Administrator Feature(|.Z bI) gk Administrator Feature(|.Z bI)& gkOAi Y=z 0L OJC@: 1. gkZ!T JdQ pg '! ANDO; [:OJC@. ANDO [: C!B Y =; mAOJC@: a. g+GL* 8g G0!-G '! ANDO b. ZC!-G '! ANDO 8 IBM® Access Connections 2.7 |3 !Le c. vg(P!)!-G '! ANDO d. )` CG '! ANDO 2. '! ANDO; [:Q D!B Profile Distribution(ANDO hw) --> Create Distribution Package(hw P0v [:)& ,/OJC@. W2 2. Profile Distribution(ANDO hw) ^: 3. |3OAB '! ANDO; 1COJC@. 1CH " '! ANDO! kO) 10 dLvG W2 3! &CH YM 0L {}Q gkZ Lk $%; 1COJC@. 1 CH ANDO _, O# Nu fD(encryption); gkOB +1 ANDOL 8gO B fl, _d %LMG )b; fvOb 'O) +1 3$ %LM& YC TBOs B ARA.! *8/ MTOY. & 4 e Access ConnectionsG |3 9 W2 3. Create Distribution Package(hw P0v [:) " Lk |. $%(access control policy)!B /$ ANDO! kQ &Q gWL $ GGn V@OY. Lk |. $%: ""G ANDO! kO) $GR v V8g, Y=z 0: 3$*; !z v V@OY. a. Deny all changes / Deny Deletion(pg /f EN / h& EN): gkZ! GQ ANDOG v$L* 9& W h& [w; ckOv J@OY. b. Deny network setting changes / Deny deletion(W.v) 3$ /f EN / h& EN): ANDO ;G W.v) 3$! kQ v$L* 9& W h& [w ; ckOv J@OY. v$R v xB DsLMNB, TCP/IP 3$, TCP/IP m ^ 3$, W.m +1 3$L V@OY. Xg ANDO: h&R v x@OY. c. Deny all changes /Allow deletion(pg /f EN / h& ck): gkZ! GQ ANDOG v$ GB 9&& ckOv J@OY. \, gkZ! GQ AN DO h&B ckUOY. d. Allow all changes / Allow deletion(pg /f ck / h& ck): gkZ! GQ ANDOG v$L* 9& W h&& pN ckUOY. &Q gW: F!G |. $%: |.Z vXG GQ! GX NC gkZ!T {k KOY. NC gkZ! &QH h$ gkZ(Limited User)N 3$H fl, n5 < 10 IBM® Access Connections 2.7 |3 !Le &! GQ 8Y -BQ &`L !X}OY. &QH h$ gkZB |- "S ,a (dial-up connection) |DG ANDO8; [:R v V8g, |.Z! GX [: H ANDO; v$, 9&, GB h&R v x@OY. Access ConnectionsG O] 3$; LkOi &QH h$ gkZ! |.Z! GX [:H ANDO; 1CO) gkR v V5O 3$R v V@OY. 4. 1C gW: |.ZB D;MG OC x#! b]O) Distribution Control List(h w |. qO)& $GR v V@OY. L/Q hw fD; gkOi |.Z! "" G OC x#& TBO), -N Y% '! ANDO; JdN OB " 6wG gk Z OC x# Wl; [:R v V@OY. L 1C gW: x] gkZ! '! A NDO DO(*.LOA); ^F- v?8N R/i) gkOB flG '! ANDO 8H; 'Q MTOY. Distribution Control List(hw |. qO)& gkOi " gkZ! {}Q W.v) ,a8; gkO5O R v V@OY. W2 4. Define Distribution Control List(hw |. qO $G) " & 4 e Access ConnectionsG |3 11 OC x# Wl; [:R '!B OC x# WlL vOH O] X:. .-& R /i) gkR v V@OY. L ', .- DOG " `!B O*G OC x#8L bOGn Vn_ UOY. L/Q .- DO: Administrator Feature(|.Z bI) N [:Q qO; ]b(export)C0E*, Zj |. bI(Asset Management Capability); gkR v VB fl, L& LkO) }:R v V@OY. LB 9: vG D;M! kQ OC x#! {% hw |. [w; 8Y #mOT X ]OY. W2 5. Create Group(Wl [:) " 5. 1C gW: Client Configuration Policy(,sLp. 3$ $%)& $GO), gk Z! '! ANDO DO(*.LOA); R/i) n2 bI; gkR v V5O Rv & 3$R v V@OY. |m: Do not allow clients to become an Access Connections administrator(, sLp.! Access Connections |.Z! GB M; ckOv J=) 7G 1C s Z! 1C %C& Oi, gkZ! Access Connections& 3!R ' Administrator Feature(|.Z bI)& 0:-R v x5O UOY. L/Q 3$: kbw /f! - IT |.Z! |.Z L\G gkZ! GQ '! ANDO hw& 78AB fl ! /kUOY. 12 IBM® Access Connections 2.7 |3 !Le |.ZB Client Configuration Policy(,sLp. 3$ $%) PN; LkO) Access ConnectionsG Global Settings(O] 3$) GQ 3$R v V@OY. g kZ! &QH h$ gkZ(Limited User) h$8N D;M! NWBOB fl, | .Z! Global Setting(O] 3$)!- ″Allow all users of this system to switch to any existing location profile(L C:[G pg gkZ! pg '! ANDO #G ANDO |/ bI; gkR v V5O ck)″; 0:-X_ UOY. W8T Ov J; fl, gkZB |.Z! GX LL 3$Gn VB '! ANDO #G |/ bI; gkR v x@OY. W2 6. Define Client Configuration Policy(,sLp. 3$ $% $G) " 6. Define Client Configuration Policy(,sLp. 3$ $% $G) "!- pg J dQ 3$; 6# D, Create([:)& ,/OJC@. Passphrase TB ARA.! *8/ MTOY. PassphraseB '! ANDO DO(*.LOA); O#-Ob 'X g kKOY. '! ANDO; O#-Oi 4.4 W!- 3mQ YM 0L Access & 4 e Access ConnectionsG |3 13 Connections ANW%; 3!Q fl, GB |.Z! gkZ!T Passphrase& & xQ fl!8 '! ANDO; R/i) gkR v V@OY. *.LOA DOG L'z ze '!& $OJC@. 7. fm: LLv& |3Ob 'X-B *.LOA DOL Access ConnectionsG 3! p :d.(C:\PROGRAM FILES\THINKPAD\CONNECTUTILITIES)! '!X_ U OY. uNn LLv 3!& 'Q Xq Access Connections RA.~n& |3OAi Y=z 0L OJC@: 1. Access Connections 2.7 GB W LDG v|; |3R WlG %; C:[! 3 !OJC@. 2. 7 dLvG :|.Z bI 0:-;G 3m! {s Administrator Feature Enabler & G`OJC@. 3. 8 dLvG :Administrator Feature(|.Z bI) gk;G 3m! {s '! AN DO; [:OJC@. 4. 8 dLvG :Administrator Feature(|.Z bI) gk;G 3m! {s hw P0 v& [:OJC@. 5. '! ANDO |3 P0v& [:R ', Client Configuration(,sLp. 3$) " !- Do not allow clients to become an Access Connections administrator(, sLp.! Access Connections |.Z! GB M; ckOv J=) 7G 1C s Z! 1C %C& OJC@. 6. 8 dLvG :Administrator Feature(|.Z bI) gk;; kX [:Q *.loa W *.sig DO; Y% D;M* \e Lpn, GB W.v) esLj! zeO) |3 P0 v p=; }:OJC@. |m: *.sig DO!B |3 P0vG }:! gkGB O#NNM 8inx -mL wTGn V@OY. L DO: Access ConnectionsG 3! p:d.(k3 C:\PROGRAM FILES\THINKPAD\CONNECTUTILITIES)! '!UOY. [w h9! {s, LLv [: C:[! Access Connections& 3!OJC@. 7. v LLv [:! gkR C:[L vg '! ANDO [:! gkQ C:[z ? OQ fl, Administrator Feature(|.Z bI)& &EOb 'X Access Connections& &EOJC@. 3!Gv J: sBG Access Connections& L Lv! _!OJC@. 3! DOz \h 6!- zeH *.loa W *.sig DO; c m VB p:d.8 [:Oi KOY. v 9v:..G HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 0! uNn DWORD *; _!OJC@. v *G L'; ACinstallN Om, * %LM& \setup.exe -sN 3$OJC@. 14 IBM® Access Connections 2.7 |3 !Le ,sLp. D;M! 3=8N C[I ', Access ConnectionsB F+1 ^Cv 8. xL Z?8N 3!Gm G`KOY. L ', Access ConnectionsB F+1 ^Cv xL *.loa DO; R/iTOY. L z$L !*i *.loa W *.sig DOL h&I MTOY. Access Connections Location Profile('! ANDO)G x] |3 Access Connections '! ANDOG x] |3!B +N Z?(unattended) |3M / N v?(attended) |3G N !v f}; gkR v V@OY. Y=: ""G x] | 3 f}; 3mUOY. +N Z?(unattended) |3 Y=z 0: 6GL f7GB fl, |.ZB 14 dLvG :uNn LLv 3!& 'Q Xq;!-M 0L D;M! |3H D!, SMS, Tivoli® nz 0: C:[ |. nC .ILG; gkO) w%L.H *.loa DO; ,sLp. D;MN |[Om, Access Connections! F+1 ^Cv xL Z?8N u '! ANDO; R/iL5O R v V@OY: 1. '! ANDO(*.loa) DO: ]eC b8 ,sLp. D;M! |3Gn gkGm Vx ANDOz ?OQ O#& gkO) [:X_ UOY. 2. *.loa DO: ]eC Access Connections 3! p:d.! '!Om Vn_ UO Y. L ', D;M& YC C[OE* [w %CYG C:[ .9L FL\[System Tray icon (QCTRAY.EXE)]; >aQ D, Access Connections& YC C[X_ UOY. fm: L1 fD8N '! ANDO; |3Ob 'X-B V> gkZ! |.Z vX G h$; LkO) C:[! NWBX_ UOY. gkZ! &QH h$ gkZ(Limited User)N NWB Q fl, ANDO; R/iO v x@OY. /N v?(attended) |3 Access Connections '! ANDO; x] gkZ!T |3OE*, LL '! AND OL |3Gn VB C:[! |3OAi Y=z 0L OJC@: 1. Administrator Feature(|.Z bI)& LkO) x] gkZ! JdN OB '! ANDO; !x *.loa DO; [:OJC@. 2. ;8;b(Export) z$ _! x] gkZ! gkOB D;MG OC x#& TB Om, *.loa DOG O#-! gkR O#& 3$OJC@ 3. O#M *.loa DO; "" Y% 05G L^O ^CvN [:Q D, 8H bI; !x E<& LkO) gkZ!T |[OJC@. 4. gkZ& 'X Y=z 0: vC gW; [:OJC@: a. *.loa DO; Oe p:) esLj! YnNe ^8JC@. & 4 e Access ConnectionsG |3 15 b. Access Connections& G`OJC@. (C[ ^:! 3$H fD! {s, |. Z! Access Connections Wq; G`Ob 'Q fN& mCX_ R v5 V @OY.) c. Manage Location Profiles('! ANDO |.)& ,/Q D, Options(IG) --> Import/Export(R/@b/;8;b)& ,/OJC@. d. Import Location Profiles('! ANDO R/@b)& ,/OJC@. e. DO 8T 1C; 'Q .Yn ^:!- ANDO hw DO(*.loa); ,/OJ C@. f. #F8b(browse)& LkO) \h 4a!- zeX P *.loaG '!& v$OJ C@. g. zeH *.loa DO; 1CQ D, Open(-b); ,/OJC@. h. Access ConnectionsB D;MG OC x#& 68O) *.loa DOL gk _ N D;M! {UQ MNv& .NUOY. *.loa DO ;G OC x#M gk _ N D;MG OC x#! O!Ov JBYB ^Cv! *8*B fl, *.loa D O; _[Q |.Z!T ,tOJC@. '! ANDO; R/iLb 'X-B g k _N D;MG OC x#M ?OQ OC x#& wTOm VB v$H *.loa DOL JdUOY. i. OC x#! O!OB fl, |.Z! 05G L^O; kX [NQ Passphrase & TBOsB ARA.! *8/ MTOY. JdQ fl, k.ZM R.Z& 8 PO) VGmT $.Q O#& TBQ D! Enter 0& )#JC@. 5. gkZ! CY% O#& TBOm Enter 0& )% fl, Access ConnectionsB *.loa DOG O#-& X&Om O] 3$(global setting) W ,a |.(access control)M T2 '! ANDO; R/iO MTOY. L z$L v`H D! *.loa DO: Z?8N h&KOY. 16 IBM® Access Connections 2.7 |3 !Le & 5 e KAx .& W Xa f} &0z |CH .& W L! {% Xa f}L _!GB fl, ; .-B w%L.Gn % gL.! TCKOY. |3H +1 ANDOz |CH /vQ fl ,sLp. C:[G +1 npM! ANDO; [:Q |.ZG D;M! 3!H +1 npMM Y% fl, Access ConnectionsB Z?8N +1 ANDO; //O) ,s Lp. C:[! 3!Gn VB npM& gkO5O UOY. \, F!M 0L 9\N fl! V@OY: 1. WPA-PSK ANDO: IBM High-Rate +1 npM GB Cisco +1 npM& g kOB C:[!B |3R v x@OY. 2. WPA ANDO: IBM High-Rate +1 npM W Cisco +1 npM& gkOB C:[!B |3R v x@OY. 3. LEAP ANDO: Lucent W Intersil +1 npM& gkOB C:[!B |3R v x@OY. © Copyright IBM Corp. 2003 17 18 IBM® Access Connections 2.7 |3 !Le NO. O] gW! kQ H; 3m-! bgH LG IBMz IBMG &0, ANW%L* -q: n: LG IBMz IBM L 5w 0?; OB pg 9!!- LkR v V=; GLOv J@OY. &0z -q :! kQ $8B Xg 9! GB v*G LG IBM GB IBM k.!! .GOJC @. 3m-! LG IBM W IBMG &0, ANW%L* -q: nL p^GzY Rvs 5, LML @Nv LG IBM W IBMG &0, ANW%z -q:8; gkX_ T; G LOB M: FUOY. gkZB LG IBM W IBMG n0Q v{ gjG5 'XOv JB ?OQ bIG &0, ANW%L* -q:& LG IBM W IBMG &0, ANW% z -q: kE! gkR v V@OY. \, LG IBM W IBM!- mC{8N v$O v JB Q, Y% &0z ,hQ ?[! kQ r!M .N: gkZ!T %SL V@ OY. ; gk 3m-! vOH ;k W bz: LG IBML* IBMG /c(GB GkEH)L E* /c(GB GkEH) bx _O v V@OY. gk 3m-& &xOB ML gk Z!T L/Q /cGG gk; ckOB M; GLOB M: FUOY. L! kQ Z : W i& gW8N [kOv J@OY. ; .-! wTGn VB pg $8B /$ /f!- rnx MLg, 9C& 'X &x H MTOY. Y% ?[ /f!- rnx az*: ; .-! bgH ;kz Y& v V@OY. © Copyright IBM Corp. 2003 19 LG IBMz IBM: gkZ! kQ G. 'X& J!Ov JB {UQ f}8N gk Z! &xQ $8& gkOE* hwR v V@OY. %gL. Lk! |Q VG gW LG IBM W IBML FQ Y% %gL.! kQ ; &0G |m gW: \v gkZ G mG& 'O) &xH MTOY. LG IBM W IBM: 8gG %gL.! kQ n0 Q %S5 vv J@OY. 8g %gL.G ZaB LG IBM W IBM &0; 'Q Z aB FUOY. %gL. Lk! |Q %S: gkZ!T V@OY. nO s% Y=: IBMG nO s%TOY: IBM ThinkPad ThinkCentre Tivoli Microsoft, Windows, Windows NT®B MicrosoftG nO s%TOY. B LGG nO s%TOY. b8 8gm, &0m GB -q: m: Xg 8gG nO s%TOY. 20 IBM® Access Connections 2.7 |3 !Le