
Notice
•
To avoid redundant data transfer over the network, important data, such as the encryption key used
to encrypt the configuration files and the root certificate for SSL, should be configured through
pre-provisioning as much as possible.
•
It is recommended that you encrypt the data in order to keep the communication secure when
transferring configuration files.
However, if you are using the units within a secure environment, such as within an intranet, it is not
necessary to encrypt the data.
To decrypt configuration files, the unit uses the encryption key registered to it beforehand. The unit determines
the encryption status by checking the extension of the downloaded configuration file.
For details about encrypting configuration files, contact the appropriate person in your organization.
Extension of Configuration
File
Configuration File Parameters Used for Decrypting
".e1c"
CFG_FILE_KEY1
".e2c"
CFG_FILE_KEY2
".e3c"
CFG_FILE_KEY3
Other than ".e1c", ".e2c", and
".e3c"
Processed as unencrypted configuration files.
The extension ".cfg" should be used for unencrypted configuration files.
Comparison of the 2 Methods
The following table compares the characteristics for the 2 transfer methods.
Transferring Encrypted
Configuration Files
Transferring Configuration Files
Using HTTPS
Provisioning server load
Light
Heavy
(The server encrypts data for each
transmission.)
Operation load
Necessary to encrypt data
beforehand.
Unnecessary to encrypt data
beforehand.
Management of
configuration files
Files must be decrypted and
re-encrypted for maintenance.
It is easy to manage files because
they are not encrypted on the server.
Security of data on the
server when operating
High
Low
(Configuration files are readable by
anyone with access to the server.)
Moreover, there is another method: configuration files are not encrypted while stored on the server, and then,
using the encryption key registered to the unit beforehand, they are encrypted when they are transferred. This
method is particularly useful when several units are configured to download a common configuration file using
different encryption keys. However, as when downloading an unencrypted configuration file using HTTPS, the
server will be heavily burdened when transferring configuration files.
2.3 Priority of Setting Methods
The same settings can be configured by different configuration methods: provisioning, Web user interface
programming, etc. This section explains which value is applied when the same setting is specified by multiple
methods.
Document Version 2012-06
Administrator Guide
45
2.3 Priority of Setting Methods
Содержание KX-UT248-B
Страница 32: ...32 Administrator Guide Document Version 2012 06 1 2 2 Firmware Update ...
Страница 58: ...58 Administrator Guide Document Version 2012 06 3 1 5 Sound Quality KX UT113 KX UT123 KX UT133 KX UT136 only ...
Страница 282: ...282 Administrator Guide Document Version 2012 06 6 3 1 Flexible Button Settings ...
Страница 286: ...286 Administrator Guide Document Version 2012 06 7 4 Local Firmware Update ...
Страница 292: ...292 Administrator Guide Document Version 2012 06 8 1 Troubleshooting ...
Страница 293: ...Section 9 Appendix Document Version 2012 06 Administrator Guide 293 ...
Страница 297: ...Index Document Version 2012 06 Administrator Guide 297 ...
Страница 305: ...Document Version 2012 06 Administrator Guide 305 Notes ...