Notice• To avoid redundant data transfer over the network, important data, such as the encryption key usedto encrypt the configuration files and the root certificate for SSL, should be configured throughpre-provisioning as much as possible.• It is recommended that you encrypt the data in order to keep the communication secure whentransferring configuration files.However, if you are using the units within a secure environment, such as within an intranet, it is notnecessary to encrypt the data.To decrypt configuration files, the unit uses the encryption key registered to it beforehand. The unit determinesthe encryption status by checking the extension of the downloaded configuration file.For details about encrypting configuration files, contact the appropriate person in your organization.Extension of ConfigurationFile Configuration File Parameters Used for Decrypting".e1c" CFG_FILE_KEY1".e2c" CFG_FILE_KEY2".e3c" CFG_FILE_KEY3Other than ".e1c", ".e2c", and".e3c"Processed as unencrypted configuration files.The extension ".cfg" should be used for unencrypted configuration files.Comparison of the 2 MethodsThe following table compares the characteristics for the 2 transfer methods.Transferring EncryptedConfiguration FilesTransferring Configuration FilesUsing HTTPSProvisioning server load Light Heavy(The server encrypts data for eachtransmission.)Operation load Necessary to encrypt databeforehand.Unnecessary to encrypt databeforehand.Management ofconfiguration filesFiles must be decrypted andre-encrypted for maintenance.It is easy to manage files becausethey are not encrypted on the server.Security of data on theserver when operatingHigh Low(Configuration files are readable byanyone with access to the server.)Moreover, there is another method: configuration files are not encrypted while stored on the server, and then,using the encryption key registered to the unit beforehand, they are encrypted when they are transferred. Thismethod is particularly useful when several units are configured to download a common configuration file usingdifferent encryption keys. However, as when downloading an unencrypted configuration file using HTTPS, theserver will be heavily burdened when transferring configuration files.2.3 Priority of Setting MethodsThe same settings can be configured by different configuration methods: provisioning, Web user interfaceprogramming, etc. This section explains which value is applied when the same setting is specified by multiplemethods.Document Version 2012-02 Administrator Guide 452.3 Priority of Setting Methods