Administrator’s Guide for SIP-T2xP IP Phones
470
To configure SRTP feature via web user interface:
1.
Click
on Account.
2.
Select the desired account from the pull-down list of Account.
3.
Click on Advanced.
4.
Select the desired value from the pull-down list of RTP Encryption (SRTP).
5.
Select the desired key type from the pull-down list of SRTP Auth-tag.
6.
Click Confirm to accept the change.
Encrypted configuration files can be downloaded from the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink supplies a configuration encryption tool for
encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using a fixed key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000000_Security.enc
for y000000000000.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
Summary of Contents for SIP-T2XP
Page 1: ......
Page 28: ...Administrator s Guide for SIP T2xP IP Phones 10 ...
Page 66: ...Administrator s Guide for SIP T2xP IP Phones 48 ...
Page 280: ...Administrator s Guide for SIP T2xP IP Phones 262 ...
Page 456: ...Administrator s Guide for SIP T2xP IP Phones 438 ...
Page 494: ...Administrator s Guide for SIP T2xP IP Phones 476 ...
Page 524: ...Administrator s Guide for SIP T2xP IP Phones 506 ...