59
YEALINK NETWORK TECHNOLOGY CO.,LTD.
www.yealink.com
built-in key (e.g., key1). The
IP DECT phone then
decrypts the encrypted
configuration files using
corresponding key (e.g.,
key2, key3).
If it is set to 0 (Disabled), the
IP DECT phone will decrypt
the encrypted configuration
files using plaintext AES keys
configured on the IP DECT
phone.
3-level
Permissio
ns
security.defa
ult_access_le
vel
0, 1 or 2
0
Add
It configures the default
access level to access the
handset user interface.
0-user
1-var
2-admin
Note: It works only if the
value of the parameter
“security.var_enable” is set
to 1 (Enabled).
common.
cfg
Features_
Others
phone_settin
g.ringing_tim
eout
Integer from
0 to 3600
180
Add
It configures the duration
time (in seconds) in the
ringing state.
If it is set to 180, the phone
will stop ringing if the call is
not answered within 180
seconds.
common.
cfg
Features_
Others
phone_settin
g.ringback_ti
meout
Integer from
0 to 3600
180
Add
It configures the duration
time (in seconds) in the
ringback state.
If it is set to 180, the phone
will cancel the dialing if the
call is not answered within
180 seconds.
common.
cfg
Autop_Ex
pired
Time
auto_provisio
n.attempt_ex
pired_time
Integer from
1 to 300
5
Add
It configures the time (in
seconds) to wait after a file
transfer fails before retrying
the transfer via auto
provisioning.
common.
cfg