Cisco ATA188-I2-A Administration Guide - Page 48

Using Encryption With the cfgfmt Tool, Command Example, Command Output

Page 48 highlights

Configuring the Cisco ATA Using a TFTP Server Chapter 3 Configuring the Cisco ATA for H.323 The following command and output show an example of this command. Command Example atapname.exe 10.20.30.40.50.60 Command Output ata0a141e28323c Note The same functionality is available from the voice configuration menu (voice menu code 84#), which will announce the Cisco ATA profile name. Using Encryption With the cfgfmt Tool The EncryptKey or EncryptKeyEx parameter can be used to encrypt binary files that are transferred over TFTP. You can change encryption keys for each Cisco ATA so that only one specific Cisco ATA can decode the information. Cisco strongly recommends using the EncryptKeyEx parameter for encryption because this parameter provides a stronger encryption than the EncryptKey parameter that was used in Cisco ATA software releases prior to release 2.16. You must use version 2.3 of the cfgfmt configuration-file generation tool to use the new EncryptKeyEx parameter. This tools comes bundled with Cisco ATA software version 3.0. To verify that you have version 2.3 of the cfgfmt tool type the following command: cfgfmt The version number of the cfgfmt tool will be returned. You can configure the EncryptKeyEx parameter by using the Cisco ATA Web configuration page or by using the TFTP configuration method. (For more information, see the "EncryptKeyEx" section on page 5-7.) You can configure the EncryptKey parameter by using the Cisco ATA Web configuration page, the voice configuration menu, or by using the TFTP configuration method. (For more information, see the "EncryptKey" section on page 5-6.) By default, the Cisco ATA-specific ata configuration file(s) are not encrypted. If encryption is required, however, you must manually configure the EncryptKeyEx or EncryptKey parameter before you boot up the Cisco ATA so that the TFTP method is secure. The Cisco ATA uses the RC4 cipher algorithm for encryption. Note Because the factory-fresh ATA cannot accept encrypted configuration files, the first unencrypted file, if intercepted, can easily be read. (You would still have to know the data structure format in order to decode the binary information from the unencrypted file.) Therefore, the new encryption key in the unencrypted file can be compromised. Note For security reasons, Cisco recommends that you set the UIPassword parameter (if desired) in the configuration file and not by using one of the manual configuration methods. 3-12 Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator's Guide for H.323 (version 3.0) OL-4804-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

3-12
Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator’s Guide for H.323 (version 3.0)
OL-4804-01
Chapter 3
Configuring the Cisco ATA for H.323
Configuring the Cisco ATA Using a TFTP Server
The following command and output show an example of this command.
Command Example
atapname.exe 10.20.30.40.50.60
Command Output
ata0a141e28323c
Note
The same functionality is available from the voice configuration menu (voice menu code
84#)
, which
will announce the Cisco ATA profile name.
Using Encryption With the cfgfmt Tool
The EncryptKey or EncryptKeyEx parameter can be used to encrypt binary files that are transferred over
TFTP. You can change encryption keys for each Cisco ATA so that only one specific Cisco ATA can
decode the information.
Cisco strongly recommends using the EncryptKeyEx parameter for encryption because this parameter
provides a stronger encryption than the EncryptKey parameter that was used in Cisco ATA software
releases prior to release 2.16.
You must use version 2.3 of the
cfgfmt
configuration-file generation tool to use the new EncryptKeyEx
parameter. This tools comes bundled with Cisco ATA software version 3.0. To verify that you have
version 2.3 of the cfgfmt tool type the following command:
cfgfmt
The version number of the cfgfmt tool will be returned.
You can configure the EncryptKeyEx parameter by using the Cisco ATA Web configuration page or by
using the TFTP configuration method. (For more information, see the
“EncryptKeyEx” section on
page 5-7
.)
You can configure the EncryptKey parameter by using the Cisco ATA Web configuration page, the voice
configuration menu, or by using the TFTP configuration method. (For more information, see the
“EncryptKey” section on page 5-6
.)
By default, the Cisco ATA-specific ata<
macaddress>
configuration file(s) are not encrypted. If
encryption is required, however, you must manually configure the EncryptKeyEx or EncryptKey
parameter before you boot up the Cisco ATA so that the TFTP method is secure. The Cisco ATA uses
the RC4 cipher algorithm for encryption.
Note
Because the factory-fresh ATA cannot accept encrypted configuration files, the first unencrypted file, if
intercepted, can easily be read. (You would still have to know the data structure format in order to
decode the binary information from the unencrypted file.) Therefore, the new encryption key in the
unencrypted file can be compromised.
Note
For security reasons, Cisco recommends that you set the UIPassword parameter (if desired) in the
configuration file and not by using one of the manual configuration methods.