Aastra Telecom 9480i Telephone User Manual


 
New Features in Release 2.3
22 RN-001029-02, Release 2.3, Rev 00
IP Phone Release Notes 2.3
Configuration File Encryption
Some vendors can have specific methods to encrypt files on their configuration servers. For each
phone, the configuration server can generate a random hex string (encryption key) that is used to
encrypt the phone’s MAC-specific configuration file.
The encryption key is placed in a plain text MAC-specific configuration file that the server
downloads to the phone. After the phone receives the file, it updates the encryption key.
This method of encryption does not affect the implementation of the Aastra method of file
encryption.
You can set the phone-specific encryption key using the configuration files only.
For more information about configuration file encryption, contact Aastra Technical Support.
Configuring Configuration File Encryption
Use the following parameter to configure configuration file encryption on the IP Phones.
Security Features
Note: The aastra.cfg file is not encrypted with this feature.
Parameter
config encryption key
Configuration Files aastra.cfg, <mac>.cfg
Description Specifies the phone-specific encryption key that the configuration server
uses to encrypt in a MAC-specific configuration file.
Format String
Default Value Not applicable
Range String length of 4 to 32 alphanumeric characters
Example config encryption key: 123abcd