![]() ![]() When you enable this feature, reset the phone, and download the configuration file, you receive a request for the file with a. This section describes the process that occurs when encrypted configuration phone files are used within the CUCM. For CUCM versions prior to Version 8.X, you must ensure that the cluster runs in Mixed mode if you desire to use this feature. ![]() Note: This is the default location for all of the CUCM Versions 8.X and later. You are not required to run the CUCM cluster in Mixed mode in order for this feature to function properly, as the Certificate Authority Proxy Function (CAPF) certificate information is contained within the Identity Trust List (ITL) file. The use of encrypted configuration files for phones is an optional security feature that is available in the CUCM. This document describes the use of encrypted configuration phone files on the Cisco Unified Communications Manager (CUCM). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |