Cisco ATA188-I2-A Administration Guide - Page 51

Examples of Upgrading to Stronger Encryption Key, Example 1

Page 51 highlights

Chapter 3 Configuring the Cisco ATA for H.323 Configuring the Cisco ATA Using a TFTP Server Syntax examples The cfgfmt.exe syntax affects how the EncryptKeyEx or EncryptKey parameters are used, as shown in the following examples. In these examples, input-text-file is the ata.txt file that you will convert to binary to create the ata configuration file(s) for the Cisco ATA; output-binary-file is that binary ata file, and Secret is the encryption key. • cfgfmt -h323 -tptag.dat input-text-file output-binary-file If input-text-file sets the Cisco ATA EncryptKey parameter to 0, then output-binary-file is not encrypted. If the input-text-file sets EncryptKey to a non-zero value, then output-binary-file is encrypted with that value. • cfgfmt -X -h323 -tptag.dat input-text-file output-binary-file This is an example of how you might perform encryption on a first-time Cisco ATA. The -X (uppercase) option means that any value specified for the Cisco ATA EncryptKeyEx parameter in input-text-file is ignored. However, because Secret is not specified in this example, output-binary-file is not encrypted. Nevertheless, the EncryptKeyEx parameter and its value, if specified in input-file-text, will be included in output-binary-file for possible encryption at a later time. The next time the Cisco ATA fetches the configuration file from the TFTP server, the file will be encrypted with Secret. • cfgfmt -X -xSecret -h323 -tptag.dat input-text-file output-binary-file This is an example of changing the encryption key from one key to another key. The -X (uppercase) option means that any value specified for the Cisco ATA EncryptKeyEx parameter in input-text-file is ignored and the output-binary-file is encrypted with the Secret key. However, the EncryptKeyEx parameter and its value, if specified in input-text-file, will be included in output-binary-file. Examples of Upgrading to Stronger Encryption Key This section contains two examples of how you would upgrade your Cisco ATA configuration to use the stronger encyrption method if the current Cisco ATA firmware version was a version earlier than version 2.16.2. Versions earlier than 2.16.2 do not support the stronger EncryptKeyEx parameter. Example 1 In this example, the Cisco ATA has not yet been deployed, but its firmware version is earlier than 2.16.2. Therefore, the Cisco ATA will upgrade to to firmware version 3.0 to use the EncryptKeyEx parameter as its encryption key. The Cisco ATA in this example has a MAC address of 102030405060. Perform the following steps: Procedure Step 1 Step 2 Create a file called ata102030405060.txt by using the applicable example.txt file provided with the Cisco ATA software. (For example, for H.323, the example.txt file is called h323_example.txt.) Modify the ata102030405060.txt file with desired parameter values. The value of the EncryptKey parameter should be 0. OL-4804-01 Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator's Guide for H.323 (version 3.0) 3-15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

3-15
Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator’s Guide for H.323 (version 3.0)
OL-4804-01
Chapter 3
Configuring the Cisco ATA for H.323
Configuring the Cisco ATA Using a TFTP Server
Syntax examples
The cfgfmt.exe syntax affects how the EncryptKeyEx or EncryptKey parameters are used, as shown in
the following examples. In these examples, input-text-file is the ata<
macaddress>.
txt
file that you will
convert to binary to create the ata<
macaddress>
configuration file(s) for the Cisco ATA;
output-binary-file is that binary ata<
macaddress>
file, and
Secret
is the encryption key.
cfgfmt -h323
-tptag.dat
input-text-file output-binary-file
If input-text-file sets the Cisco ATA EncryptKey parameter to 0, then output-binary-file is not
encrypted. If the input-text-file sets EncryptKey to a non-zero value, then output-binary-file is
encrypted with that value.
cfgfmt -X -h323
-tptag.dat
input-text-file output-binary-file
This is an example of how you might perform encryption on a first-time Cisco ATA.
The -X (uppercase) option means that any value specified for the Cisco ATA EncryptKeyEx
parameter in input-text-file is ignored. However, because
Secret
is not specified in this example,
output-binary-file is not encrypted. Nevertheless, the EncryptKeyEx parameter and its value, if
specified in input-file-text, will be included in output-binary-file for possible encryption at a later
time. The next time the Cisco ATA fetches the configuration file from the TFTP server, the file will
be encrypted with
Secret
.
cfgfmt -X -xSecret -h323
-tptag.dat
input-text-file
output-binary-file
This is an example of changing the encryption key from one key to another key.
The -X (uppercase) option means that any value specified for the Cisco ATA EncryptKeyEx
parameter in input-text-file is ignored and the output-binary-file is encrypted with the
Secret
key.
However, the EncryptKeyEx parameter and its value, if specified in input-text-file, will be included
in output-binary-file.
Examples of Upgrading to Stronger Encryption Key
This section contains two examples of how you would upgrade your Cisco ATA configuration to use the
stronger encyrption method if the current Cisco ATA firmware version was a version earlier than version
2.16.2. Versions earlier than 2.16.2 do not support the stronger EncryptKeyEx parameter.
Example 1
In this example, the Cisco ATA has not yet been deployed, but its firmware version is earlier than 2.16.2.
Therefore, the Cisco ATA will upgrade to to firmware version 3.0 to use the EncryptKeyEx parameter
as its encryption key.
The Cisco ATA in this example has a MAC address of 102030405060.
Perform the following steps:
Procedure
Step 1
Create a file called
ata102030405060.txt
by using the applicable
example.txt
file provided with the
Cisco ATA software. (For example, for H.323, the example.txt file is called h323_example.txt.)
Step 2
Modify the
ata102030405060.txt
file with desired parameter values. The value of the EncryptKey
parameter should be 0.