IP Phone Release Notes 2.2

Features in Release 2.2

Improved Configuration File Encryption

The IP phones have an encryption feature that allows Service Providers the capability of storing encrypted files on their server to protect against unauthorized access and tampering of sensitive information (i.e., user accounts, login passwords, registration information). Service Providers also have the capability of locking a phone to use a specific server-provided configuration only.

Only an System Administrator can encrypt the configurations files for an IP Phone. System Administrators use a password distribution scheme to manually pre-configure or automatically configure the phones to use the encrypted configuration with a unique key. From a Microsoft Windows command line, the System Administrator uses an Aastra-supplied encryption tool called "anacrypt.exe" to encrypt the <MAC>.tuz file.

The security feature described above prevents unauthorized parties from reading or writing the contents of the <MAC>.tuz file.

In Release 2.2, the IP phones include an improved encryption mechanism that:

Prevents users from using the <MAC>.tuz file that does not match the user’s phone MAC address.

Renders the <MAC>.tuz file invalid if the user renames the file.

Works with IP phone releases prior to Release 2.2.

Provides compatibility between the previous encryption routine and the new decryption routine.

90

RN-001029-00, Rev 06, Release 2.2

Page 94
Image 94
Aastra Telecom RN-001029-00, REV 06 manual Improved Configuration File Encryption