41-001160-00, Release 2.1 Rev 04 ixContentsChapter 6Configuring Advanced Operational Features.About this chapter ...........................................................................................................6-1.Advanced Operational Features .....................................................................................6-3.Description ...............................................................................................................6-3.MAC Address/Line Number in REGISTER Messages .............................................6-5.SIP Message Sequence for Blind Transfer ..............................................................6-7.Update Caller ID During a Call .................................................................................6-8.Boot Sequence Recovery Mode ..............................................................................6-9.Auto-discovery Using mDNS ..................................................................................6-10.Single Call Restriction (57i CT only) ......................................................................6-11.Missed Call Summary Subscription .......................................................................6-13.Blacklist Duration (Broadsoft Servers) ...................................................................6-17.Whitelist Proxy .......................................................................................................6-19.Transport Layer Security (TLS) ..............................................................................6-21.Symmetric UDP Signaling ......................................................................................6-27.Removing UserAgent and Server SIP Headers .....................................................6-28.Multi-Stage Digit Collection (Billing Codes) Support (for Sylantro Servers) ...........6-29.Chapter 7Encrypted Files on the IP Phone.About this chapter ...........................................................................................................7-1.Encrypted Files on the IP Phone ....................................................................................7-2.Configuration File Encryption Method ......................................................................7-2.Procedure to Encrypt/Decrypt Configuration Files ...................................................7-3.Chapter 8Upgrading the Firmware.About this chapter ...........................................................................................................8-1.Upgrading the Firmware .................................................................................................8-2.Manual Firmware Update (TFTP only) .....................................................................8-2.Manual Firmware and Configuration File Update .....................................................8-4.Automatic Update (auto-resync) ..............................................................................8-6.......................................................................................................................................8-10.