Security features, Configuration file encryption, Configuring configuration file encryption – Aastra Telecom CT9143i User Manual

Page 26

Advertising
background image

New Features in Release 2.3

22

RN-001029-02, Release 2.3, Rev 00

IP Phone Release Notes 2.3

Configuration File Encryption

Some vendors can have specific methods to encrypt files on their configuration servers. For each
phone, the configuration server can generate a random hex string (encryption key) that is used to
encrypt the phone’s MAC-specific configuration file.

The encryption key is placed in a plain text MAC-specific configuration file that the server
downloads to the phone. After the phone receives the file, it updates the encryption key.

This method of encryption does not affect the implementation of the Aastra method of file
encryption.

You can set the phone-specific encryption key using the configuration files only.

For more information about configuration file encryption, contact Aastra Technical Support.

Configuring Configuration File Encryption

Use the following parameter to configure configuration file encryption on the IP Phones.

Security Features

Note:

The aastra.cfg file is not encrypted with this feature.

Parameter
config encryption key

Configuration Files

aastra.cfg, <mac>.cfg

Description

Specifies the phone-specific encryption key that the configuration server
uses to encrypt in a MAC-specific configuration file.

Format

String

Default Value

Not applicable

Range

String length of 4 to 32 alphanumeric characters

Example

config encryption key: 123abcd

Advertising
This manual is related to the following products: