41-001343-01 Rev 02, Release 3.2.2
7-5
Vendor Configuration File Encryption
Some vendors can have specific methods to encrypt files on their configuration servers. For each
phone, the configuration server can generate a random hex string (encryption key) that is used to
encrypt the phone’s MAC-specific configuration file.
The encryption key is placed in a plain text MAC-specific configuration file that the server
downloads to the phone. After the phone receives the file, it updates the encryption key.
This method of encryption does not affect the implementation of the Aastra method of file
encryption.
You can set the phone-specific encryption key using the configuration files only.
For more information about configuration file encryption, contact Aastra Technical Support.
Configuring Vendor Configuration File Encryption
Use the following procedure to configure vendor configuration file encryption on the IP Phones.
Note:
The
aastra.cfg
file is not encrypted with this feature.
Configuration Files
For specific parameters you can set in the configuration files for automatic update, see Appendix A, the
section,
“Configuration Encryption Setting”
on
page A-248.
Содержание 9000i Series
Страница 3: ......
Страница 17: ......
Страница 67: ......
Страница 163: ......
Страница 275: ...4 112 41 001343 01 Rev 02 Release 3 2 2 Aastra Web UI Step Action 1 Click on Advanced Settings Configuration Server...
Страница 334: ...41 001343 01 Rev 02 Release 3 2 2 5 57...
Страница 681: ......
Страница 687: ......
Страница 981: ......
Страница 985: ......
Страница 1016: ...41 001343 01 Rev 02 Release 3 2 2 C 31 prgkey5 line 1 list prgkey6 type list prgkey7 type list...
Страница 1017: ......
Страница 1021: ......
Страница 1025: ......
Страница 1037: ......