Configuring Security Features
213
using random AES key. The AES keys of configuration files are different.
Note
5.
Click
Encrypt to encrypt the configuration file(s).
6.
Click OK.
The target directory will be automatically opened. You can find the encrypted
configuration file(s), encrypted key file(s) and an Aeskey.txt file storing plaintext AES
key(s).
Procedure
Encryption method and AES keys can be configured using the configuration files or
locally.
Configuration File
<y0000000000xx>.cfg
Configure the decryption
method and AES keys.
For more information, refer to
Configuring Decryption Method
AES keys must be 16 characters and the supported characters contain: 0 ~ 9, A ~ Z, a ~
z.
Summary of Contents for SIP-T4X
Page 1: ...T 4 XI PP h o n e A d mi n i s t r a t o r G u i d e...
Page 2: ......
Page 15: ...Administrator s Guide for SIP T4X IP Phones xiv...
Page 23: ...Administrator s Guide for SIP T4X IP Phones 8...
Page 217: ...Administrator s Guide for SIP T4X IP Phones 202...
Page 233: ...Administrator s Guide for SIP T4X IP Phones 218...
Page 245: ...Administrator s Guide for SIP T4X IP Phones 230...
Page 257: ...Administrator s Guide for SIP T4X IP Phones 242...