Encrypted Files on the IP Phone
41-001160-01, Rev 00, Release 2.3
7-3
Encrypted Files on the IP Phone
To make changes to the configuration files, the System Administrator must save
the original files.
The security feature described above prevents unauthorized parties from
reading
or
writing
the contents of the
<MAC>.tuz
file. It also provides the following:
•
Prevents users from using the
<MAC>.tuz
file that does not match the user’s
phone MAC address.
•
Renders the
<MAC>.tuz
file invalid if the user renames the file.
•
Works with IP phone releases prior to Release 2.2.
•
Provides compatibility between the previous encryption routine and the new
decryption routine.
Note:
If the use of encrypted configuration files is enabled (via
security.tuz
or pre-provisioned on the IP phone) the
aastra.cfg
and
<mac>.cfg
files are ignored, and only the encrypted equivalent files
aastra.tuz
and
<mac>.tuz
are read.
Содержание 5i Series
Страница 4: ......
Страница 26: ......
Страница 30: ......
Страница 70: ......
Страница 179: ...Administrator Level Options 41 001160 01 Rev 00 Releaes 2 3 3 91 Administrator Options...
Страница 180: ......
Страница 292: ...Configuration Server Protocol 4 112 41 001160 01 Rev 00 Releaes 2 3 IP Phone Administrator Guide...
Страница 644: ...Operational Features 5 352 41 001160 01 Rev 00 Release 2 3 IP Phone Administrator Guide...
Страница 702: ...Encrypted Files on the IP Phone 7 8 41 001160 01 Rev 00 Release 2 3 IP Phone Administrator Guide...
Страница 712: ......
Страница 976: ......
Страница 980: ......
Страница 1014: ...Sample Configuration Files D 34 41 001160 01 Rev 00 Release 2 3 IP Phone Administrator Guide...
Страница 1016: ...Sample Configuration Files D 36 41 001160 01 Rev 00 Release 2 3 IP Phone Administrator Guide...
Страница 1022: ......
Страница 1026: ......
Страница 1030: ......
Страница 1133: ......