Configuring Security Features
219
using random AES key. The AES keys of configuration files are different.
Note
5.
Click
Encrypt to encrypt the configuration file(s).
6.
Click OK.
The target directory will be automatically opened. You can find the encrypted
configuration file(s), encrypted key file(s) and an Aeskey.txt file storing plaintext AES
key(s).
Procedure
Encryption method and AES keys can be configured using the configuration files or
locally.
Configuration File
<y0000000000xx>.cfg
Configure the decryption
method and AES keys.
For more information, refer to
Configuring Decryption Method
AES keys must be 16 characters and the supported characters contain: 0 ~ 9, A ~ Z, a ~
z.
Summary of Contents for SIP-T4X
Page 1: ......
Page 10: ...Administrator s Guide for SIP T4X IP Phones x ...
Page 144: ...Administrator s Guide for SIP T4X IP Phones 128 ...
Page 212: ...Administrator s Guide for SIP T4X IP Phones 196 ...
Page 224: ...Administrator s Guide for SIP T4X IP Phones 208 ...
Page 240: ...Administrator s Guide for SIP T4X IP Phones 224 ...
Page 252: ...Administrator s Guide for SIP T4X IP Phones 236 ...
Page 264: ...Administrator s Guide for SIP T4X IP Phones 248 ...
Page 472: ...Administrator s Guide for SIP T4X IP Phones 456 ...