1725-86984-000_P.docx
September 2016
291
Chapter 13:
Miscellaneous Maintenance
Tasks
This chapter shows you how to maintain the Spectralink Software. This includes:
Trusted Certificate Authority List
Encrypting Configuration Files
Product, Model, and Part Number Mapping
Capturing the Phone’s Current Screen
Encrypting Configuration Files
For security reasons, an administrator may wish to encrypt configuration files sent to the phone
from a provisioning server and files uploaded by the phone to the provisioning server. Setting up
dynamic encryption involves generating a key, downloading it to the phone, encrypting all config
files used by the phone and making these files available to the phone by referencing them in the
master config file which itself is not encrypted.
Note: Not all config files can be encrypted
Note that the master configuration file or the bootrom.ld or sip.ld software files cannot
be encrypted.
All exe files referred to in this section can be found on the 84-Series webpage under the
Downloads tab in the ConfigFileEncryption_v[x].zip. Our config file examples use the
configuration templates provided with the software.
Ensure that you securely store all files generated by this procedure.
Admin Tip: Using Cygwin or Unix?
The configuration steps and examples below assume you are using DOS. If you
are using Cygwin or Unix, make the appropriate adjustments to the code.
Configuration steps
1
Generate a key.