touchpoint

In addition to terminal devices, all personnel, places, and things connected to the network should also be considered.

View Details

resource

Understand best practices, explore innovative solutions, and establish connections with other partners throughout the Baker community.

×

touchpoint

touchpoint

In addition to terminal devices, all personnel, places, and things connected to the network should also be considered.

Learn more

resource

resource

Understand best practices, explore innovative solutions, and establish connections with other partners throughout the Baker community.

Contact Us
SIP Phone Configuration File Encryption Introduction

Introduction

Overview

Due to the convenience of batch deployment, an increasing number of customers use this method to deploy IP phones. However, during batch deployment, configuration files are inevitably transmitted over the network. Configuration files contain a large amount of sensitive information, such as SIP accounts and passwords, phone admin passwords, network phonebook account credentials, and more.

To prevent information leakage, we can use an encryption tool to encrypt configuration files. This document mainly covers the following two parts:

  1. How to encrypt configuration files
  2. How to use encrypted configuration files in batch deployment

Applicable Models

This document applies to all series of IP phones from our company.

How to Encrypt Configuration Files

Encrypting Configuration Files on Windows

We can use the DSC tool to encrypt configuration files with AES256. The tool can be downloaded from: http://download.fanvil.com/tool/AES%20tool/encryption.7z. The following example explains how to encrypt a configuration file:

  1. After downloading the DSC tool, extract it and place the folder on the F drive.
  2. DSC Tool Download Configuration File
  3. Open key.txt, use the default 64-bit key or enter a new random 64-bit key, then save the file.
  4. Download the configuration file from the phone's web interface, modify the necessary information, rename the file to config.txt, and place it in the encryption directory on the F drive.
  5. Configuration File Download Interface from Phone Web
  6. Press Win + R, enter cmd to open the DOS command prompt, then navigate to the encryption directory using the command shown in the image below.
  7. CMD Execute DOS Command
  8. Use the following commands for encryption or decryption:

    Encryption Command:
           dsc.exe key.txt e config.txt encrypted.txt
           - dsc.exe: Tool executable
           - key.txt: Key file
           - e: Encryption flag
           - config.txt: Source configuration file
           - encrypted.txt: Output encrypted file (custom name)

    Decryption Command:
           dsc.exe key.txt d encrypted.txt original.txt
           - d: Decryption flag
           - encrypted.txt: Encrypted source file
           - original.txt: Output decrypted file (custom name)

  9. File Display Interface Before and After Decryption

Encrypting Configuration Files on Linux

  1. Download the source code from this link: https://1drv.ms/u/s!AhLXW_VNOC9LgR6TiW5931ydvEP5
  2. Extract the downloaded package on Linux, navigate to the directory, and run the compilation command to generate the DSC tool:    
    gcc dsc.c rijndael-alg-fst.c rijndael-api-fst.c -o dsc
  3. Download Configuration File and Decrypt
  4. After execution, the dsc tool will be generated in Linux (as shown below).
  5. DSC Tool Generated in Linux
  6. Place the files to be encrypted or decrypted in the same directory as the DSC tool.
  7. Place Files in DSC Directory
  8. Encryption Command Example:
           dsc key.txt e config.txt encryption.enc
           - dsc: Tool name
           - key.txt: Key file
           - e: Encryption
           - config.txt: File to encrypt
           - encryption.enc: Encrypted output file

  9. Decryption Command Example:
           dsc key.txt d encrypted.txt config_after.txt
           - d: Decryption
           - encrypted.txt: File to decrypt
           - config_after.txt: Decrypted output file

How to Use Encrypted Configuration Files in Batch Deployment

To deploy phones using encrypted configuration files, you must configure the encryption key on the phone's web interface as shown below:

Configure Encryption Key on Phone Web Interface

Finally, place the encrypted configuration file (generated in Section 2) on the provisioning server, and configure the correct server settings on the IP phones. For details, refer to the document Auto Provisioning Mechanism, Environment Setup, and Configuration File Guide.

catalogue
Professional industrial communication manufacturer, providing high reliability communication guarantee!
Cooperation Consultation
customer service Phone
We use cookie to improve your online experience. By continuing to browse this website, you agree to our use of cookie.

Cookies

This Cookie Policy explains how we use cookies and similar technologies when you access or use our website and related services. Please read this Policy together with our Terms and Conditions and Privacy Policy so that you understand how we collect, use, and protect information.

By continuing to access or use our Services, you acknowledge that cookies and similar technologies may be used as described in this Policy, subject to applicable law and your available choices.

Updates to This Cookie Policy

We may revise this Cookie Policy from time to time to reflect changes in legal requirements, technology, or our business practices. When we make updates, the revised version will be posted on this page and will become effective from the date of publication unless otherwise required by law.

Where required, we will provide additional notice or request your consent before applying material changes that affect your rights or choices.

What Are Cookies?

Cookies are small text files placed on your device when you visit a website or interact with certain online content. They help websites recognize your browser or device, remember your preferences, support essential functionality, and improve the overall user experience.

In this Cookie Policy, the term “cookies” also includes similar technologies such as pixels, tags, web beacons, and other tracking tools that perform comparable functions.

Why We Use Cookies

We use cookies to help our website function properly, remember user preferences, enhance website performance, understand how visitors interact with our pages, and support security, analytics, and marketing activities where permitted by law.

We use cookies to keep our website functional, secure, efficient, and more relevant to your browsing experience.

Categories of Cookies We Use

Strictly Necessary Cookies

These cookies are essential for the operation of the website and cannot be disabled in our systems where they are required to provide the service you request. They are typically set in response to actions such as setting privacy preferences, signing in, or submitting forms.

Without these cookies, certain parts of the website may not function correctly.

Functional Cookies

Functional cookies enable enhanced features and personalization, such as remembering your preferences, language settings, or previously selected options. These cookies may be set by us or by third-party providers whose services are integrated into our website.

If you disable these cookies, some services or features may not work as intended.

Performance and Analytics Cookies

These cookies help us understand how visitors use our website by collecting information such as traffic sources, page visits, navigation behavior, and general interaction patterns. In many cases, this information is aggregated and does not directly identify individual users.

We use this information to improve website performance, usability, and content relevance.

Targeting and Advertising Cookies

These cookies may be placed by our advertising or marketing partners to help deliver more relevant ads and measure the effectiveness of campaigns. They may use information about your browsing activity across different websites and services to build a profile of your interests.

These cookies generally do not store directly identifying personal information, but they may identify your browser or device.

First-Party and Third-Party Cookies

Some cookies are set directly by our website and are referred to as first-party cookies. Other cookies are set by third-party services, such as analytics providers, embedded content providers, or advertising partners, and are referred to as third-party cookies.

Third-party providers may use their own cookies in accordance with their own privacy and cookie policies.

Information Collected Through Cookies

Depending on the type of cookie used, the information collected may include browser type, device type, IP address, referring website, pages viewed, time spent on pages, clickstream behavior, and general usage patterns.

This information helps us maintain the website, improve performance, enhance security, and provide a better user experience.

Your Cookie Choices

You can control or disable cookies through your browser settings and, where available, through our cookie consent or preference management tools. Depending on your location, you may also have the right to accept or reject certain categories of cookies, especially those used for analytics, personalization, or advertising purposes.

Please note that blocking or deleting certain cookies may affect the availability, functionality, or performance of some parts of the website.

Restricting cookies may limit certain features and reduce the quality of your experience on the website.

Cookies in Mobile Applications

Where our mobile applications use cookie-like technologies, they are generally limited to those required for core functionality, security, and service delivery. Disabling these essential technologies may affect the normal operation of the application.

We do not use essential mobile application cookies to store unnecessary personal information.

How to Manage Cookies

Most web browsers allow you to manage cookies through browser settings. You can usually choose to block, delete, or receive alerts before cookies are stored. Because browser controls vary, please refer to your browser provider’s support documentation for details on how to manage cookie settings.

Contact Us

If you have any questions about this Cookie Policy or our use of cookies and similar technologies, please contact us at support@becke.cc .