Vendor configuration file encryption, Configuring vendor configuration file encryption, Vendor configuration file encryption -5 – AASTRA 6700i series, 9143, 9480i, 9480i CT SIP Administrator Guide EN User Manual

Page 692

Advertising
background image

41-001343-01 Rev 03, Release 3.2.2

7-5

Vendor Configuration File Encryption

Some vendors can have specific methods to encrypt files on their configuration servers. For each

phone, the configuration server can generate a random hex string (encryption key) that is used to

encrypt the phone’s MAC-specific configuration file.

The encryption key is placed in a plain text MAC-specific configuration file that the server

downloads to the phone. After the phone receives the file, it updates the encryption key.

This method of encryption does not affect the implementation of the Aastra method of file

encryption.

You can set the phone-specific encryption key using the configuration files only.

For more information about configuration file encryption, contact Aastra Technical Support.

Configuring Vendor Configuration File Encryption

Use the following procedure to configure vendor configuration file encryption on the IP Phones.

Note:

The aastra.cfg file is not encrypted with this feature.

Configuration Files

For specific parameters you can set in the configuration files for automatic update, see Appendix A, the
section,

“Configuration Encryption Setting”

on

page A-249.

Advertising