WorkCentreâ„¢ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide
169
8
Security
This chapter describes how to configure the following Security features for the device:
• Email Encryption and Signing on page 171
• FIPS 140-2 Encryption on page 172
• User Data Encryption on page 173
• User Information Database on page 173
• IP Filtering on page 176
• Audit Log on page 177
• Security Certificate Management on page 179
• IP Sec on page 183
• Security Certificates on page 189
• 802.1X on page 191
• System Timeout on page 194
• On Demand Overwrite on page 195
• Immediate Image Overwrite on page 199