To decrypt configuration files, the unit uses the encryption key registered to it beforehand. The unit determinesthe encryption status by checking the extension of the downloaded configuration file.For details about encrypting configuration files, contact the appropriate person in your organization.Extension of ConfigurationFile Configuration File Parameters Used for Decrypting".e2c" CFG_FILE_KEY2".e3c" CFG_FILE_KEY3Other than ".e2c", and ".e3c" Processed as unencrypted configuration files.The extension ".cfg" should be used for unencrypted configuration files.Comparison of the 2 MethodsThe following table compares the characteristics for the 2 transfer methods.Transferring EncryptedConfiguration FilesTransferring Configuration FilesUsing HTTPSProvisioning server load Light Heavy(The server encrypts data for eachtransmission.)Operation load Necessary to encrypt databeforehand.Unnecessary to encrypt databeforehand.Management ofconfiguration filesFiles must be decrypted andre-encrypted for maintenance.It is easy to manage files becausethey are not encrypted on the server.Security of data on theserver when operatingHigh Low(Configuration files are readable byanyone with access to the server.)Moreover, there is another method: configuration files are not encrypted while stored on the server, and then,using the encryption key registered to the unit beforehand, they are encrypted when they are transferred. Thismethod is particularly useful when several units are configured to download a common configuration file usingdifferent encryption keys. However, as when downloading an unencrypted configuration file using HTTPS, theserver will be heavily burdened when transferring configuration files.2.3 Priority of Setting MethodsThe same settings can be configured by different configuration methods: provisioning, Web user interfaceprogramming, etc. This section explains which value is applied when the same setting is specified by multiplemethods.The following table shows the priority with which settings from each method are applied (lower numbers indicatehigher priority):Priority Setting Method3 The factory default settings for the unit2 Pre-provisioning with the configuration file48 Administrator Guide Document Version 2015-022.3 Priority of Setting Methods