Yealink CP860 [329/417] Procedure to encrypt configuration files

Yealink CP860 [329/417] Procedure to encrypt configuration files
Configuring Security Features
317
same or different keys for configuration files) and generates encrypted configuration
files with the same file name as before. This tool also encrypts the plaintext 16-character
symmetric keys using a fixed key, which is the same as the one built in the IP phone, and
generates new files named as <xx_Security>.enc (xx indicates the name of the
configuration file, for example, y000000000037_Security.enc for y000000000037.cfg file).
This tool generates another new file named as Aeskey.txt to store the plaintext
16-character symmetric keys for each configuration file.
For a Microsoft Windows platform, you can use a Yealink-supplied encryption tool
"Config_Encrypt_Tool.exe" to encrypt the y000000000037.cfg and <MAC>.cfg files
respectively.
Note
For the security reasons, administrator should upload encrypted configuration files,
y000000000037_Security.enc and/or <MAC_Security>.enc files to the root directory of
the provisioning server. During auto provisioning, the IP phone requests to download
y000000000037.cfg file first. If the downloaded configuration file is encrypted, the IP
phone will request to download y000000000037_Security.enc file (if enabled) and
decrypt it into the plaintext key (e.g., key2) using the built-in key (e.g., key1). Then the IP
phone decrypts y000000000037.cfg file using key2. After decryption, the IP phone
resolves configuration files and updates configuration settings onto the IP phone
system.
The way the IP phone processes the <MAC>.cfg file is the same to that of the
y000000000037.cfg file.
Procedure to Encrypt Configuration Files
To encrypt the y000000000037.cfg file:
1. Double click Config_Encrypt_Tool.exe to start the application tool.
The screenshot of the main page is shown as below:
When you start the application tool, a file folder named Encrypted is created
Yealink also supplies a configuration encryption tool (yealinkencrypt) for Linux platform if
required. For more information, refer to
Yealink Configuration Encryption Tool User Guide
.

Содержание