Encrypted Files on the IP Phone
41-001160-04 Rev 02, Release 2.5
7-3
Encrypted Files on the IP Phone
To make changes to the configuration files, the System Administrator must save
the original files.
The security feature described above prevents unauthorized parties from
reading
or
writing
the contents of the
<MAC>.tuz
file. It also provides the following:
•
Prevents users from using the
<MAC>.tuz
file that does not match the user’s
phone MAC address.
•
Renders the
<MAC>.tuz
file invalid if the user renames the file.
•
Works with IP phone releases prior to Release 2.2.
•
Provides compatibility between the previous encryption routine and the new
decryption routine.
Note:
If the use of encrypted configuration files is enabled (via
security.tuz
or pre-provisioned on the IP phone) the
aastra.cfg
and
<mac>.cfg
files are ignored, and only the encrypted equivalent files
aastra.tuz
and
<mac>.tuz
are read.
Summary of Contents for 67 Series
Page 4: ......
Page 16: ......
Page 20: ......
Page 72: ......
Page 92: ......
Page 306: ......
Page 686: ...Operational Features 5 380 41 001160 04 Rev 02 Release 2 5 IP Phone Administrator Guide ...
Page 746: ......
Page 758: ......
Page 1062: ...Troubleshooting Parameters A 276 41 001160 04 Rev 02 Release 2 5 IP Phone Administrator Guide ...
Page 1066: ......
Page 1100: ...Sample Configuration Files C 34 nnn nnnn nnn IP Phone Administrator Guide ...
Page 1102: ...Sample Configuration Files C 36 nnn nnnn nnn IP Phone Administrator Guide ...
Page 1108: ......
Page 1112: ......
Page 1116: ......
Page 1130: ......
Page 1138: ......
Page 1139: ......