Cisco ATA186-I1 Administration Guide - Page 50

Configuration Files that the cfgfmt Tool Creates, Total Binary Output Size Less, Than or Equal to 2

Page 50 highlights

Configuring the Cisco ATA Using a TFTP Server Chapter 3 Configuring the Cisco ATA for SCCP Note Because the factory-fresh ATA cannot accept encrypted configuration files, the first unencrypted file, if intercepted, can easily be read. (You would still have to know the data structure format in order to decode the binary information from the unencrypted file.) Therefore, the new encryption key in the unencrypted file can be compromised. Note For security reasons, Cisco recommends that you set the UIPassword parameter (if desired) in the configuration file and not by using one of the manual configuration methods. This section contains the following topics: • Configuration Files that the cfgfmt Tool Creates, page 3-14 • cfgfmt Tool Syntax and Examples, page 3-15 Configuration Files that the cfgfmt Tool Creates The number of output binary configuration files that the Cisco ATA produces is dependent on two factors: • Which encryption key parameter is used-EncryptKey or EncryptKeyEx • The total size of the binary output Table 3-6 shows the names of the binary files that can be generated. One, two or four files can be generated. Note in Table 3-6 is the MAC address of the Cisco ATA. Note If you are creating an atadefault configuration file, the generated binary file name will be atadefault.cfg.x if you encrypt the text file with the EncryptKeyEx parameter; the binary file name will be atadefault.cfg if you do not use the EncryptKeyEx parameter to encrypt the text file. Table 3-6 Configuration Files that the Cisco ATA May Generate Value of EncryptKeyEx Parameter 0 Non-zero Total Binary Output Size Less Total Binary Output Size Than or Equal to 2,000 Bytes Greater Than 2,000 Bytes ata ata ata.x ata ata.ex ata ata.ex ata.x ata.xex 3-14 Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator's Guide for SCCP (version 3.0) OL-4652-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206

3-14
Cisco ATA 186 and Cisco ATA 188 Analog Telephone Adaptor Administrator’s Guide for SCCP (version 3.0)
OL-4652-01
Chapter 3
Configuring the Cisco ATA for SCCP
Configuring the Cisco ATA Using a TFTP Server
Note
Because the factory-fresh ATA cannot accept encrypted configuration files, the first unencrypted file, if
intercepted, can easily be read. (You would still have to know the data structure format in order to
decode the binary information from the unencrypted file.) Therefore, the new encryption key in the
unencrypted file can be compromised.
Note
For security reasons, Cisco recommends that you set the UIPassword parameter (if desired) in the
configuration file and not by using one of the manual configuration methods.
This section contains the following topics:
Configuration Files that the cfgfmt Tool Creates, page 3-14
cfgfmt Tool Syntax and Examples, page 3-15
Configuration Files that the cfgfmt Tool Creates
The number of output binary configuration files that the Cisco ATA produces is dependent on two
factors:
Which encryption key parameter is used—EncryptKey or EncryptKeyEx
The total size of the binary output
Table 3-6
shows the names of the binary files that can be generated. One, two or four files can be
generated.
Note
<
macaddress
> in
Table 3-6
is the MAC address of the Cisco ATA.
Note
If you are creating an
atadefault
configuration file, the generated binary file name will be
atadefault.cfg.x
if you encrypt the text file with the EncryptKeyEx parameter; the binary file name will
be
atadefault.cfg
if you do not use the EncryptKeyEx parameter to encrypt the text file.
Table 3-6
Configuration Files that the Cisco ATA May Generate
Total Binary Output Size Less
Than or Equal to 2,000 Bytes
Total Binary Output Size
Greater Than 2,000 Bytes
Value of
EncryptKeyEx
Parameter
0
ata<
macaddress
>
ata<
macaddress
>
ata<
macaddress
>.ex
Non-zero
ata<
macaddress
>
ata<
macaddress
>.x
ata<
macaddress
>
ata<
macaddress
>.ex
ata<
macaddress
>.x
ata<
macaddress
>.xex