Specifications

Configuring Security Features
215
4. Select the desired value from the pull-down list of RTP Encryption (SRTP).
5. Click Confirm to accept the change.
Encrypting Configuration Files
Encrypted configuration files can be downloaded from the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink provides configuration encryption tool for
encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using built-in key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000000_Security.enc
for y000000000000.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
For a Microsoft Windows platform, you can use Yealink-supplied encryption tool
"Config_Encrypt_Tool.exe" to encrypt the <y0000000000xx>.cfg and <MAC>.cfg files
respectively.
Note
Yealink also supplies a configuration encryption tool (yealinkencrypt) for Linux platform if
applicable. For more information, refer to Yealink Configuration Encryption Tool User
Guide.