New Features in Release 2.322 RN-001029-02, Release 2.3, Rev 00IP Phone Release Notes 2.3Configuration File EncryptionSome vendors can have specific methods to encrypt files on their configuration servers. For eachphone, the configuration server can generate a random hex string (encryption key) that is used toencrypt the phone’s MAC-specific configuration file.The encryption key is placed in a plain text MAC-specific configuration file that the serverdownloads to the phone. After the phone receives the file, it updates the encryption key.This method of encryption does not affect the implementation of the Aastra method of fileencryption.You can set the phone-specific encryption key using the configuration files only.For more information about configuration file encryption, contact Aastra Technical Support.Configuring Configuration File EncryptionUse the following parameter to configure configuration file encryption on the IP Phones.Security FeaturesNote: The aastra.cfg file is not encrypted with this feature.Parameter–config encryption keyConfiguration Files aastra.cfg, .cfgDescription Specifies the phone-specific encryption key that the configuration serveruses to encrypt in a MAC-specific configuration file.Format StringDefault Value Not applicableRange String length of 4 to 32 alphanumeric charactersExample config encryption key: 123abcd