Managing Configuration Files
21
Encrypting Configuration Files
To protect against unauthorized access and tampering of sensitive information, you can encrypt
configuration files using Yealink Configuration Encryption Tool. AES keys must be 16 characters
and the supported characters contain: 0 ~ 9, A ~ Z, a ~ z and the following special characters
are also supported: # $ % * + , - . : = ? @ [ ] ^ _ { } ~. For more information on how to encrypt
configuration files, refer to
Yealink Configuration Encryption Tool User Guide
We recommend you do not edit the MAC-local CFG file. If you really want to edit MAC-local
CFG file, you can export and then edit it.
For more information on how to export CFG files, refer to
the latest Administrator Guide for
your phone on
Содержание T58A Teams
Страница 1: ...Table of Contents iii 11...
Страница 2: ......
Страница 6: ...Auto Provisioning Guide for Yealink Teams IP Phones 2...
Страница 20: ...Auto Provisioning Guide for Yealink Teams IP Phones 16...
Страница 26: ...Auto Provisioning Guide for Yealink Teams IP Phones 22...
Страница 28: ...Auto Provisioning Guide for Yealink Teams IP Phones 24...
Страница 32: ...Auto Provisioning Guide for Yealink Teams IP Phones 28...
Страница 36: ...Auto Provisioning Guide for Yealink Teams IP Phones 32...
Страница 48: ...Auto Provisioning Guide for Yealink Teams IP Phones 44...