EasyManua.ls Logo

Yealink T58A

Yealink T58A
65 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Managing Configuration Files
21
Encrypting Configuration Files
To protect against unauthorized access and tampering of sensitive information, you can encrypt
configuration files using Yealink Configuration Encryption Tool. AES keys must be 16 characters
and the supported characters contain: 0 ~ 9, A ~ Z, a ~ z and the following special characters
are also supported: # $ % * + , - . : = ? @ [ ] ^ _ { } ~. For more information on how to encrypt
configuration files, refer to
Yealink Configuration Encryption Tool User Guide
.
We recommend you do not edit the MAC-local CFG file. If you really want to edit MAC-local
CFG file, you can export and then edit it.
For more information on how to export CFG files, refer to
the latest Administrator Guide for
your phone on Yealink Technical Support.

Table of Contents

Other manuals for Yealink T58A

Related product manuals