Cisco ATA-186 Administration Guide - Page 45

Using the EncryptKey Parameter and cfgfmt Tool, Command Output, Syntax examples - factory default

Page 45 highlights

Chapter 3 Configuring the Cisco ATA for SIP Configuring the Cisco ATA Using a TFTP Server Command Output ata0a141e28323c Note The same functionality is available from the voice configuration menu (voice menu code 84#), which will announce the Cisco ATA profile name. Using the EncryptKey Parameter and cfgfmt Tool The EncryptKey parameter encrypts binary files being transferred over TFTP. You can change this key for each Cisco ATA, so that only one specific Cisco ATA can decode the information. By default, the Cisco ATA-specific ata configuration file is not encrypted. If encryption is required, however, you must manually configure the EncryptKey parameter before you boot up the Cisco ATA so that the TFTP method is secure. Use either the voice configuration menu (see the "Voice Configuration Menu" section on page 3-15) or the Cisco ATA web configuration page (see the "Cisco ATA Web Configuration Page" section on page 3-18) to configure the EncryptKey parameter. Note Because the factory-fresh ATA cannot accept encrypted configuration files, the first unencrypted file, if intercepted, can easily be read. (You would still have to know the data structure format in order to decode the binary information from the unencrypted file.) Therefore, the new encryption key in the unencrypted file can be compromised. Set the EncryptKey parameter to a nonzero value. When this value is nonzero, the Cisco ATA assumes that the binary configuration file on the TFTP server is to be encrypted with this key by means of the RC4 cipher algorithm. The Cisco ATA will use this key to decrypt the configuration file. The Cisco ATA EncryptKey parameter and the encryption key used in the cfgfmt tool command syntax must match. Note For security reasons, Cisco recommends that you set the UIPassword parameter (if desired) in the configuration file and not by using one of the manual configuration methods. The cfgfmt.exe syntax affects how the EncryptKey parameter is used, as shown in the following examples. In these examples, input_text is the ata.txt file that you will convert to binary to create the ata configuration file for the Cisco ATA; output_binary is that binary ata file, and Secret is the encryption key. Syntax examples • cfgfmt -tpTagFile input-text-file output-binary-file If input-text-file sets the Cisco ATA EncryptKey parameter to 0, then output-binary-file is not encrypted. If the input-text-file sets EncryptKey to a non-zero value, then output-binary-file is encrypted with that value. • cfgfmt -eSecret -tpTagFile input-text-file output-binary-file If the Cisco ATA EncryptKey parameter has the value of 0 or is not included in input-text-file, the Secret is used to encrypt the output-binary-file. If input-text-file sets the Cisco ATA EncryptKey parameter to a nonzero value and the -e option is used, then output-binary-file is encrypted with the EncryptKey parameter set in input-text-file and Secret is ignored. OL-3410-01 Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator's Guide (SIP) 3-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

3-11
Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator’s Guide (SIP)
OL-3410-01
Chapter 3
Configuring the Cisco ATA for SIP
Configuring the Cisco ATA Using a TFTP Server
Command Output
ata0a141e28323c
Note
The same functionality is available from the voice configuration menu (voice menu code
84#)
, which
will announce the Cisco ATA profile name.
Using the EncryptKey Parameter and cfgfmt Tool
The EncryptKey parameter encrypts binary files being transferred over TFTP. You can change this key
for each Cisco ATA, so that only one specific Cisco ATA can decode the information.
By default, the Cisco ATA-specific ata<
macaddress>
configuration file is not encrypted. If encryption
is required, however, you must manually configure the EncryptKey parameter before you boot up the
Cisco ATA so that the TFTP method is secure. Use either the voice configuration menu (see the
“Voice
Configuration Menu” section on page 3-15
) or the Cisco ATA web configuration page (see the
“Cisco ATA Web Configuration Page” section on page 3-18
) to configure the EncryptKey parameter.
Note
Because the factory-fresh ATA cannot accept encrypted configuration files, the first unencrypted file, if
intercepted, can easily be read. (You would still have to know the data structure format in order to
decode the binary information from the unencrypted file.) Therefore, the new encryption key in the
unencrypted file can be compromised.
Set the EncryptKey parameter to a nonzero value. When this value is nonzero, the Cisco ATA assumes
that the binary configuration file on the TFTP server is to be encrypted with this key by means of the
RC4 cipher algorithm. The Cisco ATA will use this key to decrypt the configuration file.
The Cisco ATA EncryptKey parameter and the encryption key used in the cfgfmt tool command syntax
must match.
Note
For security reasons, Cisco recommends that you set the UIPassword parameter (if desired) in the
configuration file and not by using one of the manual configuration methods.
The cfgfmt.exe syntax affects how the EncryptKey parameter is used, as shown in the following
examples. In these examples, input_text is the ata<
macaddress>.
txt
file that you will convert to binary
to create the ata<
macaddress>
configuration file for the Cisco ATA; output_binary is that binary
ata<
macaddress>
file, and
Secret
is the encryption key.
Syntax examples
cfgfmt
-tpTagFile
input-text-file output-binary-file
If input-text-file sets the Cisco ATA EncryptKey parameter to 0, then output-binary-file is not
encrypted. If the input-text-file sets EncryptKey to a non-zero value, then output-binary-file is
encrypted with that value.
cfgfmt -eSecret
-tpTagFile
input-text-file output-binary-file
If the Cisco ATA EncryptKey parameter has the value of 0 or is not included in input-text-file, the
Secret
is used to encrypt the output-binary-file. If input-text-file sets the Cisco ATA EncryptKey
parameter to a nonzero value and the -e option is used, then output-binary-file is encrypted with the
EncryptKey parameter set in input-text-file and
Secret
is ignored.