Configuring Security Features
219
using random AES key. The AES keys of configuration files are different.
Note
5.
Click
Encrypt to encrypt the configuration file(s).
6.
Click OK.
The target directory will be automatically opened. You can find the encrypted
configuration file(s), encrypted key file(s) and an Aeskey.txt file storing plaintext AES
key(s).
Procedure
Encryption method and AES keys can be configured using the configuration files or
locally.
Configuration File
<y0000000000xx>.cfg
Configure the decryption
method and AES keys.
For more information, refer to
Configuring Decryption Method
AES keys must be 16 characters and the supported characters contain: 0 ~ 9, A ~ Z, a ~
z.
Содержание SIP-T4X
Страница 1: ......
Страница 10: ...Administrator s Guide for SIP T4X IP Phones x ...
Страница 16: ...Administrator s Guide for SIP T4X IP Phones xvi Appendix F Sample Configuration File 450 Index 457 ...
Страница 144: ...Administrator s Guide for SIP T4X IP Phones 128 ...
Страница 212: ...Administrator s Guide for SIP T4X IP Phones 196 ...
Страница 224: ...Administrator s Guide for SIP T4X IP Phones 208 ...
Страница 240: ...Administrator s Guide for SIP T4X IP Phones 224 ...
Страница 252: ...Administrator s Guide for SIP T4X IP Phones 236 ...
Страница 263: ...Troubleshooting 247 Factory reset can restore the original password All custom settings will be overwritten after reset ...
Страница 264: ...Administrator s Guide for SIP T4X IP Phones 248 ...
Страница 472: ...Administrator s Guide for SIP T4X IP Phones 456 ...