Encrypted Files on the IP Phone
41-001160-03, Rev 00, Releaes 2.4
7-3
Encrypted Files on the IP Phone
To make changes to the configuration files, the System Administrator must save
the original files.
The security feature described above prevents unauthorized parties from
reading
or
writing
the contents of the
<MAC>.tuz
file. It also provides the following:
•
Prevents users from using the
<MAC>.tuz
file that does not match the user’s
phone MAC address.
•
Renders the
<MAC>.tuz
file invalid if the user renames the file.
•
Works with IP phone releases prior to Release 2.2.
•
Provides compatibility between the previous encryption routine and the new
decryption routine.
Note:
If the use of encrypted configuration files is enabled (via
security.tuz
or pre-provisioned on the IP phone) the
aastra.cfg
and
<mac>.cfg
files are ignored, and only the encrypted equivalent files
aastra.tuz
and
<mac>.tuz
are read.
Draft 1
Summary of Contents for 675i Series
Page 4: ...D r a f t 1 ...
Page 26: ...Non Blocking HTTP Connections F 90 XML SIP Notify F 91 Limited Warranty D r a f t 1 ...
Page 30: ...D r a f t 1 ...
Page 70: ...D r a f t 1 ...
Page 90: ...D r a f t 1 ...
Page 745: ...D r a f t 1 ...
Page 1026: ...D r a f t 1 ...
Page 1068: ...D r a f t 1 ...
Page 1072: ...D r a f t 1 ...
Page 1076: ...D r a f t 1 ...
Page 1182: ...Index 12 41 001160 00 Release 2 2 Rev 05 Index D r a f t 1 ...
Page 1183: ...D r a f t 1 ...