Encryption; Transferring Encrypted Configuration Files; Xml Provisioning - Panasonic KX-UT670 Administrator's Manual

Smart desk phone
Hide thumbs Also See for KX-UT670:
Table of Contents

Advertisement

Section 2 General Information on Programming
Example Provisioning Direction from the Server
The following figure shows an example NOTIFY message from the server, directing the units to perform
provisioning. The text "check-sync" is specified for "CFG_RESYNC_FROM_SIP".
NOTIFY sip:1234567890@sip.example.com SIP/2.0
Via: SIP/2.0/UDP xxx.xxx.xxx.xxx:5060;branch=abcdef-ghijkl
From: sip:prov@sip.example.com
To: sip:1234567890@sip.example.com
Date: Thu, 1 Jan 2009 01:01:01 GMT
Call-ID: 123456-1234567912345678
CSeq: 1 NOTIFY
Contact: sip:xxx.xxx.xxx.xxx:5060
Event: check-sync
Content-Length: 0

2.4.3.6 Encryption

Transferring Encrypted Configuration Files

Unencrypted
configuration
file
To use this method, an encryption key is required to encrypt and decrypt the configuration files. A preset
encryption key unique to each unit, an encryption key set by your phone system dealer, etc., is used for the
encryption. When the unit downloads an encrypted configuration file, it will decrypt the file using the same
encryption key, and then configure the settings automatically.
To decrypt configuration files, the unit uses the encryption key registered to it beforehand. The unit determines
the encryption status by checking the extension of the downloaded configuration file.
Extension of Configuration
File
".e1c"
".e2c"
".e3c"
Other than ".e1c", ".e2c", and
".e3c"

2.4.4 XML Provisioning

XML provisioning is a provisioning method that uses XML formatted configuration files. XML provisioning
consists of a configuration file (.xml) and a schema file (.xsd). The benefits of XML formatted configuration files
are as follows:
You can use an XML editor to edit configuration files, which prevents typos in the configuration parameters.
XML formatted configuration files integrate better with server applications than plain text configuration files.
32
Administrator Guide
CFG_FILE_KEY1
Configuration File Parameters Used for Decrypting
CFG_FILE_KEY1
CFG_FILE_KEY2
CFG_FILE_KEY3
Processed as unencrypted configuration files.
Encrypted
configuration
file
CFG_FILE_KEY1
Document Version 2012-07

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents