EasyManua.ls Logo

Yealink Teams Series

Yealink Teams Series
112 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
| Security Features | 82
Default Blank
Web UI Security > Server Certificates > Upload Server Certificate File
Parameter static.server_certificates.delete <y0000000000xx>.cfg
Description
It deletes all uploaded server certificates.
Example:
static.server_certificates.delete = http://localhost/all
Permitted Values http://localhost/all
Default Blank
Parameter static.phone_setting.reserve_certs_enable <y0000000000xx>.cfg
Description It enables or disables the phone to reserve custom certificates after it is reset to
factory defaults.
Permitted Values
0-Disabled
1-Enabled
Default 0
[1]If you change this parameter, the phone will reboot to make the change take effect.
Encrypting Configuration Files
Yealink Teams IP phones can download encrypted files from the server and encrypt files before/when uploading them
to the server.
You can encrypt the following configuration files: MAC-Oriented CFG file (<MAC>.cfg), Common CFG file
(y0000000000xx.cfg), MAC-local CFG file (<MAC>-local.cfg) or other custom CFG files (for example, sip.cfg,
account.cfg)
To encrypt/decrypt files, you may have to configure an AES key.
Note:
AES keys must be 16 characters. The supported characters contain: 0 ~ 9, A ~ Z, a ~ z and special characters:
# $ % * + , - . : = ? @ [ ] ^ _ { } ~.
Configuration Files Encryption Tools
Configuration Files Encryption and Decryption
Encryption and Decryption Configuration
Example: Encrypting Configuration Files
Configuration Files Encryption Tools
Yealink provides three encryption tools for configuration files:
Config_Encrypt_Tool.exe (via graphical tool for Windows platform)
Config_Encrypt.exe (via DOS command line for Windows platform)
yealinkencrypt (for Linux platform)
The encryption tools encrypt plaintext configuration files (for example, account.cfg, <y0000000000xx>.cfg,
<MAC>.cfg) (one by one or in batch) using 16-character symmetric keys (the same or different keys for configuration
files) and generate encrypted configuration files with the same file name as before.

Table of Contents

Related product manuals