Configuring Security Features
191
4.
Select the desired value from the pull-down list of Voice Encryption (SRTP).
5.
Click Confirm to accept the change.
The IP phone can download the encrypted configuration files from the provisioning
server to protect against unauthorized access and tampering of sensitive information
(i.e., login passwords, registration information). Configuration files can be encrypted
using a command line tool. The encryption algorithm is AES 128. From a Microsoft
Windows command line, you can use the Yealink-supplied encryption tool called
"EncryptUtilityWindows.exe" to encrypt the <y0000000000xx>.cfg and <MAC>.cfg files
respectively.
Note
The filename extension of the encrypted configuration files must be .cfg. The Common
AES key is used to encrypt and decrypt the <y0000000000xx>.cfg file and the
MAC-Oriented AES key is used to encrypt and decrypt the <MAC>.cfg file. The AES
keys must be 16 characters. The AES key should be configured on the IP phone for
Yealink also supplies an encryption tool (EncryptUtilityLinux.exe)
to support Linux
platforms if required.
You can also encrypt the configuration files using the Yealink Configuration Conversion
Tool. For more information, refer to the document ―Yealink Configuration Conversion Tool
User Guide‖.
Summary of Contents for SIP-T38G
Page 1: ...T 3 x G A d mi n i s t r a t o r G u i d e...
Page 2: ......
Page 5: ......
Page 13: ......
Page 45: ...Administrator s Guide for SIP T3xG IP Phones 32...
Page 195: ...Administrator s Guide for SIP T3xG IP Phones 182...
Page 207: ...Administrator s Guide for SIP T3xG IP Phones 194...
Page 399: ...Administrator s Guide for SIP T3xG IP Phones 386...