IP Phone Release Notes 2.3
New Features in Release 2.3
Security Features
Configuration File Encryption
Some vendors can have specific methods to encrypt files on their configuration servers. For each phone, the configuration server can generate a random hex string (encryption key) that is used to encrypt the phone’s
The encryption key is placed in a plain text
This method of encryption does not affect the implementation of the Aastra method of file encryption.
Note: The aastra.cfg file is not encrypted with this feature.
You can set the
For more information about configuration file encryption, contact Aastra Technical Support.
Configuring Configuration File Encryption
Use the following parameter to configure configuration file encryption on the IP Phones.
Parameter– | Configuration Files | aastra.cfg, <mac>.cfg |
config encryption key |
|
|
|
| |
Description | Specifies the | |
| uses to encrypt in a | |
|
|
|
Format | String |
|
|
|
|
Default Value | Not applicable |
|
|
| |
Range | String length of 4 to 32 alphanumeric characters | |
|
| |
Example | config encryption key: 123abcd | |
|
|
|
22 |