Yealink SIP-T4X Administrator's Manual page 233

Ultra-elegant ip phone
Hide thumbs Also See for SIP-T4X:
Table of Contents

Advertisement

4.
Select the desired value from the pull-down list of RTP Encryption (SRTP).
5.
Click Confirm to accept the change.
Encrypted configuration files can be downloaded from the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink supplies a configuration encryption tool for
encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using a fixed key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000028_Security.enc
for y000000000028.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
For a Microsoft Windows platform, you can use a Yealink-supplied encryption tool
"Config_Encrypt_Tool.exe" to encrypt the <y0000000000xx>.cfg and <MAC>.cfg files
respectively.
Note
Yealink also supplies a configuration encryption tool (yealinkencrypt) for Linux platform if
required. For more information, refer to
Configuring Security Features
Yealink Configuration Encryption Tool User Guide
.
217

Advertisement

Table of Contents
loading

Table of Contents