Managing Configuration Files
21
Encrypting Configuration Files
To protect against unauthorized access and tampering of sensitive information, you can encrypt
configuration files using Yealink Configuration Encryption Tool. AES keys must be 16 characters
and the supported characters contain: 0 ~ 9, A ~ Z, a ~ z and the following special characters
are also supported: # $ % * + , - . : = ? @ [ ] ^ _ { } ~. For more information on how to encrypt
configuration files, refer to
Yealink Configuration Encryption Tool User Guide
We recommend you do not edit the MAC-local CFG file. If you really want to edit MAC-local
CFG file, you can export and then edit it.
For more information on how to export CFG files, refer to
the latest Administrator Guide for
your phone on
Summary of Contents for T58A Teams
Page 1: ...Table of Contents iii 11...
Page 2: ......
Page 6: ...Auto Provisioning Guide for Yealink Teams IP Phones 2...
Page 20: ...Auto Provisioning Guide for Yealink Teams IP Phones 16...
Page 26: ...Auto Provisioning Guide for Yealink Teams IP Phones 22...
Page 28: ...Auto Provisioning Guide for Yealink Teams IP Phones 24...
Page 32: ...Auto Provisioning Guide for Yealink Teams IP Phones 28...
Page 36: ...Auto Provisioning Guide for Yealink Teams IP Phones 32...
Page 48: ...Auto Provisioning Guide for Yealink Teams IP Phones 44...