Technical data

Table Of Contents
Provisioning Process rules
105
Part Number UTSI-NJTC-200323150117
iAN-02EX
June 2005
Administrator Manual
Please note that this file needs to be encrypted before putting it on the
provisioning server.
UTStarcom provides an encryption engine (crypt.exe). The encryption key is
the MAC address of the specified device. This program is available for lab
testing only as it is limited to encrypting one file at a time.
After encryption the file name changes from .cfg to .enc. Rename this file as a
CFG file.
Encryption Engine
UTStarcom supplies the MD5 based encryption engine "Crypt.exe" which can
run in a windows environment. Other variants for different operating systems like
Linux or Sun Solaris are also available.
Provisioning mechanism with MD5 based crypto utility:
1
This is used only for the Mac-specific configuration files. The other .cfg files are
kept in .cfg format (plain- text format) on the provisioning server.
2
2. Use the ATA MAC as the secret key.
For example use "00028A59FF26" to encrypt the file.
Then create the filename as:
U53V005.00.00_UTSTARCOM-00028A59FF26.CFG
After encryption the file is called *.ENC
U53V005.00.00_UTSTARCOM -00028A59FF26.ENC
3
The ATA will then use its own MAC for decryption and will update the ATA with
the new configuration settings.
Usage of the Simple Crypt Utility on a Windows platform:
1
Only for test convenience and has the limitation of encrypting one file at a time.
2
Click File->Settings to determine whether creating new (en, de) crypted file or
just overwriting the source file.
Encryption tools
The encryption tools/kits are available on the Windows; Linux or Sun Solaris
platforms. Please contact your UTStarcom, Inc Network Consultant or Sales
representative for further details and files.
Sample configuration file <abconfig.cfg> for firmware version
"V1.8.2.19a".
bootcode_version=V1.6.7
device_mode=1
wan=1