Configuring Security Features
959
6.
Click
OK
.
The target directory will be automatically opened. You can find the encrypted CFG file(s),
encrypted key file(s) and an Aeskey.txt file storing plaintext AES key(s).
Encrypting and Decrypting Contact Files
Encrypted contact files can be used to protect against unauthorized access and tampering of
private information (e.g., contact number). It is helpful for protecting trade secrets.
You can configure the contact files to be automatically encrypted using 16-character symmetric
keys (configured by the parameter “static.auto_provision.aes_key_16.mac”) when uploading to
the server (by setting the value of the parameter “static.auto_provision.encryption.directory” to
1). The encrypted contact files have the same file names as before. The encrypted contact files
can be downloaded from the server and decrypted using 16-character symmetric keys during
auto provisioning. If the parameter “static.auto_provision.aes_key_16.mac” is left blank, the
value of the parameter “static.auto_provision.aes_key_16.com” will be used.
If the downloaded contact files is encrypted, the IP phone will try to decrypt <MAC>-
contact.xml file using the plaintext AES key. After decryption, the IP phone resolves contact files
and updates contact information onto the IP phone system.
Summary of Contents for CP860 SERIES
Page 1: ...63 ...
Page 51: ...Getting Started 25 For SIP T46G S Desk Mount Method Wall Mount Method Optional ...
Page 53: ...Getting Started 27 For SIP T42S T41S Desk Mount Method Wall Mount Method Optional ...
Page 55: ...Getting Started 29 For SIP T23P T23G Desk Mount Method Wall Mount Method Optional ...
Page 70: ...Administrator s Guide for SIP T2 Series T19 P E2 T4 Series T5 Series CP860 CP920 IP Phones 44 ...