Administrator’s Guide for SIP-T2xP and SIP-T19P IP Phones
232
1.
Click
on Account.
2.
Select the desired account from the pull-down list of Account.
3.
Click on Advanced.
4.
Select the desired value from the pull-down list of RTP Encryption (SRTP).
5.
Click Confirm to accept the change.
Encrypted configuration files can be downloaded from the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink supplies a configuration encryption tool for
encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using a fixed key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000000_Security.enc
for y000000000000.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
For a Microsoft Windows platform, you can use a Yealink-supplied encryption tool
"Config_Encrypt_Tool.exe" to encrypt the <y0000000000xx>.cfg and <MAC>.cfg files
Summary of Contents for Yealink SIP-T28P
Page 1: ......
Page 28: ...Administrator s Guide for SIP T2xP and SIP T19P IP Phones 12 ...
Page 76: ...Administrator s Guide for SIP T2xP and SIP T19P IP Phones 60 ...
Page 226: ...Administrator s Guide for SIP T2xP and SIP T19P IP Phones 210 ...
Page 238: ...Administrator s Guide for SIP T2xP and SIP T19P IP Phones 222 ...
Page 253: ...Configuring Security Features 237 ...
Page 265: ...Resource Files 249 ...
Page 279: ...Troubleshooting 263 ...