Administrative support

Using 802.1x Authenticating

802.1x port authentication allows the printer to join networks that require authentication before allowing access. 802.1x port authentication can be used with the WPA (Wi-Fi Protected Access) feature of an optional internal wireless print server to provide WPA-Enterprise security support.

Support for 802.1x requires the establishment of credentials for the printer. The printer must be known to the Authentication Server (AS). The AS will allow network access to devices presenting a valid set of credentials which typically involves a name/password combination and possibly a certificate. The AS will allow network access to printers presenting a valid set of credentials. You can manage the credentials by using the Embedded Web Server of the printer. To use certificates as part of the credentials:

1Open your Web browser. In the address line, enter the IP address of the printer you want to configure using the format: http://ip_address/.

2Click Configuration.

3Under Other Settings, click Network/Ports.

4Click Certificate Management.

To enable and configure 802.1x on the Embedded Web Server after installing the required certificates:

1Open your Web browser. In the address line, enter the IP address of the printer you want to configure using the format: http://ip_address/.

2Click Configuration.

3Under Other Settings, click Network/Ports.

4Click 802.1x Authentication.

Note: If an optional internal wireless print server is installed, click Wireless instead of 802.1x Authentication.

Locking the operator panel menus

Operator Panel Menu Lockout lets you create a PIN number and choose specific menus to lock. Each time a locked menu is selected, the user will be prompted to enter the correct PIN at the operator panel. The PIN does not affect any access through the EWS. To lock operator panel menus:

1Open your Web browser. In the address line, enter the IP address of the printer you want to configure using the format: http://ip_address/.

2Click Configuration.

3Under Other Settings, click Security.

4Click Menu Lockout Setup.

Setting security using the Embedded Web Server (EWS)

110

Page 112
Image 112
IBM 1585 (MT 4539) manual Using 802.1x Authenticating, Locking the operator panel menus, Click Certificate Management

1585 (MT 4539) specifications

The IBM 1585, also known as the MT 4539, is a significant model in the line of IBM's automatic data processing systems. Introduced in the early 1980s, the IBM 1585 was primarily designed for data management tasks, catering to businesses that required efficient solutions for their growing data needs.

At its core, the IBM 1585 incorporated robust features that made it highly effective for numerous applications. Primarily, it was designed for data entry and processing, significantly enhancing productivity through automation. Its advanced input/output capabilities supported various peripheral devices that were essential in data handling, allowing users to connect printers, scanners, and storage devices with ease.

One notable characteristic of the IBM 1585 was its architecture, which supported multitasking and real-time processing. This enabled users to run multiple applications simultaneously without a significant drop in performance. The system's processing power was driven by the IBM proprietary processor technology, which ensured fast computation and responsiveness, vital for time-sensitive operations.

Furthermore, the IBM 1585 showcased innovative technologies that were ahead of its time. It included support for a graphical user interface, making it more accessible for users who were transitioning from command-line interfaces. This feature not only enhanced user experience but also made training new employees more efficient.

Another key feature was its excellent compatibility with various software applications, especially those tailored for business management, accounting, and statistical analysis. The extensibility of the IBM 1585 allowed organizations to customize their setup to meet specific operational demands.

Additionally, the IBM 1585 emphasized security and data integrity, incorporating measures to protect sensitive information. This focus on security was particularly relevant for businesses managing confidential data, as robust access controls and encryption features were part of the system’s design.

In summary, the IBM 1585 (MT 4539) was a pioneering computing platform, featuring advanced data processing capabilities, multitasking architecture, user-friendly graphical interface, and strong compatibility with various applications. Its introduction marked a significant step in the evolution of business computing, reflecting IBM’s commitment to meeting the demands of a rapidly changing technological landscape.