Spectralink 84-Series Series Wireless Telephones Administration Guide
1725-86984-000_P.docx
September 2016
295
6
Load the encrypted config files into your master configuration file. See the next example.
A master configuration file with encrypted config files referenced:
7
The phones are now ready to deploy.
Comparing encrypted and unencrypted files
8
Run
configFileEncrypt.exe
on the unencrypted file with the "-d" option. This shows
the "digest" field. E.g.:
> configFileEncrypt.exe -i site.cfg -d
The command has these components:
○
-i [the un-encrypted filename]
○
-d [the digest field request]
9
View the
Digest=
line in the resulting file.
10
Look at the encrypted file using text editor and check the "
Digest=….
" field.
11
If the two fields are the same, then the encrypted and un-encrypted file are the same.
Decrypting existing configuration files
The
configFileDecrypt.exe
program can be used to decrypt an encrypted file as long as
the key filename is included in the command. Use the following format:
> configFileDecrypt.exe -i site-cfg.enc1 -o site.cfg -k key1.key