Encrypted Files on the IP Phone
41-001160-03, Rev 00, Releaes 2.4 7-3
Encrypted Files on the IP Phone
To make changes to the configuration files, the System Administrator must save
the original files.
The security feature described above prevents unauthorized parties from reading
or writing the contents of the <MAC>.tuz file. It also provides the following:
• Prevents users from using the <MAC>.tuz file that does not match the user’s
phone MAC address.
• Renders the <MAC>.tuz file invalid if the user renames the file.
• Works with IP phone releases prior to Release 2.2.
• Provides compatibility between the previous encryption routine and the new
decryption routine.
Note: If the use of encrypted configuration files is enabled (via
security.tuz or pre-provisioned on the IP phone) the aastra.cfg and
<mac>.cfg files are ignored, and only the encrypted equivalent files
aastra.tuz and <mac>.tuz are read.
Draft 1