Administrator’s Guide for SIP-T2 Series/T19(P) E2/T4 Series/CP860 IP Phones
866
Encrypted configuration files can be downloaded from the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink supplies a configuration encryption tool for
encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using a fixed key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000044_Security.enc
for y000000000044.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
For a Microsoft Windows platform, you can use a Yealink-supplied encryption tool
"Config_Encrypt_Tool.exe" to encrypt the <y0000000000xx>.cfg and <MAC>.cfg files
respectively.
Note
For security reasons, administrator should upload encrypted configuration files,
<y0000000000xx_Security>.enc
and/or <MAC_Security>.enc files to the root directory
of the provisioning server. During auto provisioning, the IP phone requests to download
<y0000000000xx>.cfg file first. If the downloaded configuration file is encrypted, the IP
phone will request to download <y0000000000xx_Security>.enc file (if enabled) and
decrypt it into the plaintext key (e.g., key2) using the built-in key (e.g., key1). Then the IP
phone decrypts <y0000000000xx>.cfg file using key2. After decryption, the IP phone
resolves configuration files and updates configuration settings onto the IP phone
system.
The way the IP phone processes the <MAC>.cfg file is the same to that of
the<y0000000000xx>.cfg file.
Procedure to Encrypt Configuration Files
To encrypt the <y0000000000xx>.cfg file:
1.
Double click ―Config_Encrypt_Tool.exe‖ to start the application tool.
Yealink also supplies a configuration encryption tool (yealinkencrypt) for Linux platform if
required. For more information, refer to
Summary of Contents for CD860
Page 1: ......
Page 45: ...Getting Started 23 For SIP T42G T41P T40P Desk Mount Method Wall Mount Method Optional ...
Page 47: ...Getting Started 25 For SIP T23P T23G Desk Mount Method Wall Mount Method Optional ...
Page 122: ...Administrator s Guide for SIP T2 Series T19 P E2 T4 Series CP860 IP Phones 100 ...
Page 840: ...Administrator s Guide for SIP T2 Series T19 P E2 T4 Series CP860 IP Phones 818 ...
Page 995: ...Appendix 973 ...