User's Manual

Table Of Contents
BTW Configuration & User’s Guide Configuration Panel
April 5, 2002 WIDCOMM
22
(Continued from the previous page)
To report only a specific a type of device within a class
1. Configure BTW to report the class of device that the type of device belongs to
(follow the steps in "Report only a specific class of device," above, but do NOT
click the OK button ).
2. In the Discoverable devices... dialog box, from the Type drop-down menu select
the specific type of device to be reported.
3. Click the OK button.
To remove a device from the list of devices to be discovered: in the Bluetooth
Configuration Panel, from the Discovery tab, select the device to be removed and click
the Delete button.
If "Report only selected Bluetooth devices" is not selected the Delete button will not be
available.
To temporarily override the discovery of specific devices: in the Bluetooth Configuration
Panel, from the Discovery tab, select "Report all Bluetooth devices." The specifically
selected devices will be discovered along with all other devices.
To re-enable specific device discovery re-select "Report only selected Bluetooth
devices."
When all devices are deleted, an error message will appear if “Report all Bluetooth
devices” is not selected.
5.3 GENERAL CONFIGURATION SETTINGS
The settings on the General tab of the Bluetooth Configuration Panel determine device
properties and basic system security settings.
Identity section:
Computer Name-enter a unique name to identify this computer to other
Bluetooth devices in the vicinity; this field cannot be left blank.
Computer type-select either Desktop or Laptop from the drop-down menu to
help identify this computer to other Bluetooth devices in the vicinity.
Bluetooth Security Section:
High-requires Bluetooth devices to authenticate (enter a Personal Identification
Number (PIN)) before allowing a connection to be established. Your computer
and the connected Bluetooth device will exchange data using encrypted links.
Medium-the default setting—security is configured at the service-level. Service
level security means that each individual service must have its security settings
(Authentication, Authorization and Encryption) set independently.
If the security mode is “Medium” and service-level security is not configured, any
Bluetooth device will be able to discover your computer and use it’s services.