Change The System Key; Capture Wireshark Trace Using Flash File To Usb Flash Drive - Polycom CX5100 Administrator's Manual

Unified conference station for skype for business
Hide thumbs Also See for CX5100:
Table of Contents

Advertisement

Polycom CX5100 Unified Conference Station for Microsoft Skype for Business - Administrator Guide
The device.set, device.sec.configEncryption.key, and device.sec.configEncryption.key.set
configuration file parameters are used to set the key on the system.
If the system doesn't have a key, it must be downloaded to the system in plain text (a potential security
concern if not using HTTPS). If the system already has a key, a new key can be downloaded to the system
encrypted using the old key.
Polycom recommends that you give each key a unique descriptive string in order to identify which key was
used to encrypt a file. This makes provisioning server management easier.
After encrypting a configuration file, it is useful to rename the file to avoid confusing it with the original
version, for example rename site.cfg to site.enc. However, the directory and override filenames cannot be
changed in this manner.

Change the System Key

For security purposes, you can change the key on the systems and the server from time to time.
To change a key on the system:
1 Put all encrypted configuration files on the provisioning server to use the new key.
The system may reboot multiple times.
The files on the server must be updated to the new key or they must be made available in
unencrypted format. Updating to the new key requires decrypting the file with the old key, then
encrypting it with the new key.
2 Put the new key into a configuration file that is in the list of files downloaded by the system, specified
in 000000000000.cfg or <MACaddress>.cfg.
3 Use the device.sec.configEncryption.key parameter to specify the new key.
4 Provision the system again so that it downloads the new key. The system automatically reboots a
second time to use the new key.
Note that configuration files, contact directory files and configuration override files may all need to be
updated if they were already encrypted. In the case of configuration override files, they can be deleted
from the provisioning server so that the system replaces them when it successfully boots.
To check whether an encrypted file is the same as an unencrypted file:
1 Run the configFileEncrypt utility, available from Polycom Support, on the unencrypted file with the
"-d" option. This shows the "digest" field.
2 Look at the encrypted file using a text editor, and check the first line that shows a "Digest=...." field.
If the two fields are the same, then the encrypted and unencrypted file are the same.
Capture Wireshark Trace using Flash File to USB Flash
Drive
The CX5100 unified conference station allows you to the capture the Wireshark trace to a USB flash drive.
You must connect the USB flash drive to the CX5100 system. Ensure that the USB flash drive is FAT32
formatted.
Polycom, Inc.
36

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents