Configuring Security Features
157
The IP phone can download the encrypted configuration files from the provisioning
server to protect against unauthorized access and tampering of sensitive information
(i.e., login passwords, registration information). Configuration files can be encrypted
using a command line tool. The encryption algorithm is AES 128. From a Microsoft
Windows command line, you can use the Yealink-supplied encryption tool called
"EncryptUtilityWindows.exe" to encrypt the <y000000000023>.cfg and <MAC>.cfg files
respectively.
Note
The filename extension of the encrypted configuration files must be .cfg. The Common
AES key is used to encrypt and decrypt the <y000000000023>.cfg file and the
MAC-Oriented AES key is used to encrypt and decrypt the <MAC>.cfg file. The AES
keys must be 16 characters. The AES key should be configured on the IP phone for
decrypting before provisioning.
Procedure to Encrypt Configuration Files
To encrypt the <y000000000023>.cfg file:
1.
Place the “EncryptUtilityWindows.exe” tool and <y000000000023>.cfg file to the
same directory (i.e., D:\).
2.
Open a command line window application (i.e., DOS window).
3.
Enter the following command, and then press the <Enter> key.
D:EncryptUtilityWindows.exe 123456789abcdef0 e F:\y000000000023.cfg
D:\y000000000023.cfg
#D:EncryptUtilityWindows.exe <a 16-character secret key> e <a new
directory and file name of the encrypted configuration file> <the
directory and file name of the original configuration file>
4.
Place the encrypted configuration file to the root directory of the provisioning
server.
The way for encrypting the <MAC>.cfg file is the same as the <y000000000023>.cfg file.
After encrypting the configuration files, you need to configure the AES keys on the IP
phone.
Yealink also supplies an encryption tool (EncryptUtilityLinux.exe)
to support Linux
platforms if required.
You can also encrypt the configuration files using the Yealink Configuration Conversion
Tool. For more information, refer to the document “Yealink Configuration Conversion Tool
User Guide”.
Summary of Contents for VP530 IP
Page 1: ......
Page 4: ......
Page 12: ......
Page 111: ...Configuring Basic Features 99...
Page 153: ...Configuring Advanced Features 141...
Page 171: ...Configuring Security Features 159...
Page 182: ...Administrator s Guide for VP530 IP Video Phone 170 Phonebook on page 266...
Page 183: ...Resource Files 171...
Page 194: ...Administrator s Guide for VP530 IP Video Phone 182 3 Click OK to confirm the resetting...
Page 195: ...Troubleshooting 183...
Page 344: ...Administrator s Guide for VP530 IP Video Phone 332...