Configuring Security Features
211
4.
Select the desired value from the pull-down list of RTP Encryption (SRTP).
5.
Click Confirm to accept the change.
Encrypted configuration files can be downloaded from the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink provides a configuration encryption tool
for encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using a fixed key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000028_Security.enc
for y000000000028.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
For a Microsoft Windows platform, you can use a Yealink-supplied encryption tool
"Config_Encrypt_Tool.exe" to encrypt the <y0000000000xx>.cfg and <MAC>.cfg files
respectively.
Note
Yealink also provides a configuration encryption tool (yealinkencrypt)
for Linux platform
if required. For more information, refer to
Yealink Configuration Encryption Tool User
Guide.
Summary of Contents for SIP-T4X
Page 1: ...T 4 XI PP h o n e A d mi n i s t r a t o r G u i d e...
Page 2: ......
Page 15: ...Administrator s Guide for SIP T4X IP Phones xiv...
Page 23: ...Administrator s Guide for SIP T4X IP Phones 8...
Page 217: ...Administrator s Guide for SIP T4X IP Phones 202...
Page 233: ...Administrator s Guide for SIP T4X IP Phones 218...
Page 245: ...Administrator s Guide for SIP T4X IP Phones 230...
Page 257: ...Administrator s Guide for SIP T4X IP Phones 242...