Administrator’s Guide for SIP-T2xP IP Phones
470
To configure SRTP feature via web user interface:
1.
Click
on Account.
2.
Select the desired account from the pull-down list of Account.
3.
Click on Advanced.
4.
Select the desired value from the pull-down list of RTP Encryption (SRTP).
5.
Select the desired key type from the pull-down list of SRTP Auth-tag.
6.
Click Confirm to accept the change.
Encrypted configuration files can be downloaded from the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink supplies a configuration encryption tool for
encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using a fixed key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000000_Security.enc
for y000000000000.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
Содержание SIP-T2XP
Страница 1: ......
Страница 28: ...Administrator s Guide for SIP T2xP IP Phones 10 ...
Страница 66: ...Administrator s Guide for SIP T2xP IP Phones 48 ...
Страница 118: ...Administrator s Guide for SIP T2xP IP Phones 100 The following shows a portion of the input method file ime txt ...
Страница 280: ...Administrator s Guide for SIP T2xP IP Phones 262 ...
Страница 456: ...Administrator s Guide for SIP T2xP IP Phones 438 ...
Страница 494: ...Administrator s Guide for SIP T2xP IP Phones 476 ...
Страница 524: ...Administrator s Guide for SIP T2xP IP Phones 506 ...