Priority Of Setting Methods - Panasonic KX-HDV130 Manual

Hide thumbs Also See for KX-HDV130:
Table of Contents

Advertisement

2.3 Priority of Setting Methods

It is recommended that you encrypt the data in order to keep the communication secure when
transferring configuration files.
However, if you are using the units within a secure environment, such as within an intranet, it is not
necessary to encrypt the data.
To decrypt configuration files, the unit uses the encryption key registered to it beforehand. The unit
determines the encryption status by checking the extension of the downloaded configuration file.
For details about encrypting configuration files, contact the appropriate person in your organization.
Extension of Configuration
File
".e2c"
".e3c"
Other than ".e2c", and ".e3c"
Comparison of the 2 Methods
The following table compares the characteristics for the 2 transfer methods.
Provisioning server load
Operation load
Management of
configuration files
Security of data on the
server when operating
Moreover, there is another method: configuration files are not encrypted while stored on the server, and
then, using the encryption key registered to the unit beforehand, they are encrypted when they are
transferred. This method is particularly useful when several units are configured to download a common
configuration file using different encryption keys. However, as when downloading an unencrypted
configuration file using HTTPS, the server will be heavily burdened when transferring configuration files.
2.3 Priority of Setting Methods
The same settings can be configured by different configuration methods: provisioning, Web user interface
programming, etc. This section explains which value is applied when the same setting is specified by
multiple methods.
The following table shows the priority with which settings from each method are applied (lower numbers
indicate higher priority):
Priority
3
2
40
Administrator Guide
Configuration File Parameters Used for Decrypting
CFG_FILE_KEY2
CFG_FILE_KEY3
Processed as unencrypted configuration files.
The extension ".cfg" should be used for unencrypted configuration files.
Transferring Encrypted
Configuration Files
Light
Necessary to encrypt data
beforehand.
Files must be decrypted and re-
encrypted for maintenance.
High
The factory default settings for the unit
Pre-provisioning with the configuration file
Transferring Configuration Files
Heavy
(The server encrypts data for each
transmission.)
Unnecessary to encrypt data
beforehand.
It is easy to manage files because
they are not encrypted on the server.
Low
(Configuration files are readable by
anyone with access to the server.)
Setting Method
Using HTTPS
Document Version: 2017-07

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

This manual is also suitable for:

Kx-hdv430Kx-hdv230Kx-hdv330

Table of Contents