EasyManua.ls Logo

Xerox WORKCENTRE 5745

Xerox WORKCENTRE 5745
362 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
User Data Encryption
WorkCentre™ 5735/5740/5745/5755/5765/5775/5790
System Administrator Guide
188
f. Select the preferred option from the [Perfect Forward Secrecy] drop-down menu. Default is
None
g. Check the required checkboxes for [Hash] and [Encryption].
Hash refers to the authentication mode, which calculates an Integrity Check Value (ICV) over
the packet's contents. This is built on top of a cryptographic hash (MD5 or SHA1).
Encryption uses a secret key to encrypt the data before transmission. This hides the contents
of the packet from eavesdroppers. Algorithm choices are AES and 3DES
Note: Encryption will not be shown if [IPsec Security] is set to AH.
3. Click on the [Save] button to return to the IPSec - Action page.

Table of Contents

Other manuals for Xerox WORKCENTRE 5745

Related product manuals