Administrative support

Supporting IPSec (Internet Protocol Security)

IP Security protocol provides authentication and encryption of communications at the network layer allowing all application and network communications over the IP protocol to be secure. IPSec can be set up between the printer and up to five hosts, using both IPv4 and IPv6. To configure IPSec through the Embedded Web Server:

1Open your Web browser. In the address line, enter the IP address of the printer you want to configure using the format: http://ip_address/.

2Click Configuration.

3Under Other Settings, click Network/Ports.

4Click IPSec.

Two types of authentication are supported for IPSec:

Shared Key Authentication—Any ASCII phrase shared among all the participating hosts. This is the easiest way to configure when only a few hosts on the network use IPSec.

Certificate Authentication—Allows any hosts or subnet of hosts to authenticate for IPSec. Each host must have a public/private key pair. Validate Peer Certificate is enabled by default, requiring each host to have a signed certificate and the authority certificate must be installed. Each host must have its identifier in the Subject Alternate Name of the signed certificate.

Note: After a device is configured for IPSec with a host, IPSec is required for any IP communication to take place.

Using Secure mode

You can configure the TCP and UDP ports to one of three modes:

Disabled—Never allows network connections to this port.

Secure and Unsecure—Allows the port to remain open, even in Secure mode.

Unsecured Only—Allows the port to only open when the printer is not in Secure mode

Note: A password must be set to enable Secure mode. Once enabled, only the ports set to Secure and Unsecure will be open.

To configure the Secure mode for TCP and UDP ports from the Embedded Web Server:

1Open your Web browser. In the address line, enter the IP address of the printer you want to configure using the format: http://ip_address/.

2Click Configuration.

3Under Other Settings, click Network/Ports.

4Click TCP/IP Port Access.

Note: Disabling ports will disable function on the printer.

Setting security using the Embedded Web Server (EWS)

109

Page 111
Image 111
IBM 1585 (MT 4539) manual Supporting IPSec Internet Protocol Security, Using Secure mode, Click TCP/IP Port Access

1585 (MT 4539) specifications

The IBM 1585, also known as the MT 4539, is a significant model in the line of IBM's automatic data processing systems. Introduced in the early 1980s, the IBM 1585 was primarily designed for data management tasks, catering to businesses that required efficient solutions for their growing data needs.

At its core, the IBM 1585 incorporated robust features that made it highly effective for numerous applications. Primarily, it was designed for data entry and processing, significantly enhancing productivity through automation. Its advanced input/output capabilities supported various peripheral devices that were essential in data handling, allowing users to connect printers, scanners, and storage devices with ease.

One notable characteristic of the IBM 1585 was its architecture, which supported multitasking and real-time processing. This enabled users to run multiple applications simultaneously without a significant drop in performance. The system's processing power was driven by the IBM proprietary processor technology, which ensured fast computation and responsiveness, vital for time-sensitive operations.

Furthermore, the IBM 1585 showcased innovative technologies that were ahead of its time. It included support for a graphical user interface, making it more accessible for users who were transitioning from command-line interfaces. This feature not only enhanced user experience but also made training new employees more efficient.

Another key feature was its excellent compatibility with various software applications, especially those tailored for business management, accounting, and statistical analysis. The extensibility of the IBM 1585 allowed organizations to customize their setup to meet specific operational demands.

Additionally, the IBM 1585 emphasized security and data integrity, incorporating measures to protect sensitive information. This focus on security was particularly relevant for businesses managing confidential data, as robust access controls and encryption features were part of the system’s design.

In summary, the IBM 1585 (MT 4539) was a pioneering computing platform, featuring advanced data processing capabilities, multitasking architecture, user-friendly graphical interface, and strong compatibility with various applications. Its introduction marked a significant step in the evolution of business computing, reflecting IBM’s commitment to meeting the demands of a rapidly changing technological landscape.