![SpectraLink 8440 Administration Manual Download Page 293](http://html.mh-extra.com/html/spectralink/8440/8440_administration-manual_1343808293.webp)
Spectralink 84-Series Series Wireless Telephones Administration Guide
1725-86984-000_P.docx
September 2016
293
Example: config file (key1.cfg) for loading the key into the handsets
Caution: Use the entire string produced by the key generator
Ensure that you include the full string (including the
“
Crypt
” and “
KeyDesc
” fields)
rather than just the key. Also include the semicolon at the end of the key. The
phone will fail to read the key if you omit any part of the string.
3
Load the key in the phones. This should be done securely through a USB connection or
within a secure wireless lab. The assumption here is that this is part of the initial
deployment, all phones are available, config files are developed, and the SLIC
configuration is complete.
Whether connected through usb or through the secure LAN, the phone will find the
server and look for the master config file. Therefore the key file must be referenced in
the master config file, as shown below, and both the key.cfg and master config files must
be loaded on the provisioning server.
A master configuration file referencing the key1.cfg file