EasyManuals Logo
Home>Yealink>IP Phone>SIP-T2 Series

Yealink SIP-T2 Series User Manual

Yealink SIP-T2 Series
1056 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #918 background imageLoading...
Page #918 background image
Administrators Guide for SIP-T2 Series/T19(P) E2/T4 Series IP Phones
894
configuration file.
For a Microsoft Windows platform, you can use a Yealink-supplied encryption tool
Config_Encrypt_Tool.exe to encrypt the configuration files respectively.
Note
For security reasons, administrator should upload encrypted configuration files,
<xx_Security>.enc files to the root directory of the provisioning server. During auto provisioning,
the IP phone requests to download the boot file first and then download the referenced
configuration files. For more information on boot file, refer to Boot Files on page 125. For
example, the IP phone downloads account.cfg file and it is encrypted. The IP phone will request
to download <account_Security>.enc file (if enabled) and decrypt it into the the plaintext key
(e.g., key2) using the built-in key (e.g., key1). Then the IP phone decrypts account.cfg file using
key2. After decryption, the IP phone resolves configuration files and updates configuration
settings onto the IP phone system.
The way the IP phone processes other configuration files is the same to that of the account.cfg
file.
Procedure to Encrypt Configuration Files
To encrypt the account.cfg file:
1. Double click Config_Encrypt_Tool.exe to start the application tool.
The screenshot of the main page is shown as below:
When you start the application tool, a file folder named Encrypted is created
automatically in the directory where the application tool is located.
2. Click Browse to locate configuration file(s) (e.g., account.cfg) from your local system in the
Select File(s) field.
To select multiple configuration files, you can select the first file and then press and hold
the Ctrl key and select other files.
Yealink also supplies a configuration encryption tool (yealinkencrypt) for Linux platform if
required. For more information, refer to
Yealink Configuration Encryption Tool User Guide
.

Table of Contents

Other manuals for Yealink SIP-T2 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Yealink SIP-T2 Series and is the answer not in the manual?

Yealink SIP-T2 Series Specifications

General IconGeneral
BrandYealink
ModelSIP-T2 Series
CategoryIP Phone
LanguageEnglish

Related product manuals