ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Yealink W52P config files

    IT Discussion
    5
    18
    2.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • AdamFA
      AdamF
      last edited by

      Does anyone have a working copy of the configuration files needed to provision a Yealink W52P DECT phone. I'm having issues with provisioning the phone. I have my own provisioning server, and I can see the phone requesting the files. (both the y000000025.cfg file, as well as the MAC.cfg file.) The server responds and serves them to the phone, but none of config parameters are applying to the phone. I have a feeling the config files are messed up somehow, and not applying any of the parameters. I downloaded the blank templates from Yealink, so I wouldn't think there would be any issues, but in any case, it's not working.

      Does anyone have a copy of a working config ?

      1 Reply Last reply Reply Quote 0
      • gjacobseG
        gjacobse
        last edited by gjacobse

        Tagging:
        @art_of_shred, @Mike-Ralston and @JaredBusch

        1 Reply Last reply Reply Quote 0
        • AdamFA
          AdamF
          last edited by

          Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

          JaredBuschJ 1 Reply Last reply Reply Quote 0
          • JaredBuschJ
            JaredBusch @AdamF
            last edited by JaredBusch

            @fuznutz04 said in Yealink W52P config files:

            Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

            Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

            The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

            AdamFA 1 Reply Last reply Reply Quote 1
            • AdamFA
              AdamF @JaredBusch
              last edited by

              @JaredBusch said in Yealink W52P config files:

              @fuznutz04 said in Yealink W52P config files:

              Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

              Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

              The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

              Since we have cloud VPS servers, I wanted a secure way to send provisioning information to the phones. We achieve this by using HTTPS. We tried to use the build in EndPoint manager for provisiining via HTTPS, but it was lacking some features that we wanted. Plus, with a centralized provisioning server, we have a central point for the files and if we ever choose to move VPS providers, making changes to all config files and pointing to a new server would be quick and almost transparent to the client.

              Yes, the URL was correct. We direct every client to the central server, and then based on thier individual login, we direct them to their specific files. The code that does this operation on the web server does not play well with the Yealink phones for some reason. We cleaned it up and think we are almost out of the woods. Probably a good thing...eyes getting heavy.

              JaredBuschJ 1 Reply Last reply Reply Quote 0
              • JaredBuschJ
                JaredBusch @AdamF
                last edited by

                @fuznutz04 said in Yealink W52P config files:

                @JaredBusch said in Yealink W52P config files:

                @fuznutz04 said in Yealink W52P config files:

                Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

                Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

                The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

                Since we have cloud VPS servers, I wanted a secure way to send provisioning information to the phones. We achieve this by using HTTPS. We tried to use the build in EndPoint manager for provisiining via HTTPS, but it was lacking some features that we wanted. Plus, with a centralized provisioning server, we have a central point for the files and if we ever choose to move VPS providers, making changes to all config files and pointing to a new server would be quick and almost transparent to the client.

                Yes, the URL was correct. We direct every client to the central server, and then based on thier individual login, we direct them to their specific files. The code that does this operation on the web server does not play well with the Yealink phones for some reason. We cleaned it up and think we are almost out of the woods. Probably a good thing...eyes getting heavy.

                You left out some serious information in your initial post then. Notably HTTPS != "web server" as well as you are authenticating to the webserver somehow?

                That is all horribly complicating things and leads me to question the over all goal that led to this design. But you apparently have the developers working around the issues already.

                AdamFA 1 Reply Last reply Reply Quote 0
                • AdamFA
                  AdamF @JaredBusch
                  last edited by

                  @JaredBusch said in Yealink W52P config files:

                  @fuznutz04 said in Yealink W52P config files:

                  @JaredBusch said in Yealink W52P config files:

                  @fuznutz04 said in Yealink W52P config files:

                  Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

                  Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

                  The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

                  Since we have cloud VPS servers, I wanted a secure way to send provisioning information to the phones. We achieve this by using HTTPS. We tried to use the build in EndPoint manager for provisiining via HTTPS, but it was lacking some features that we wanted. Plus, with a centralized provisioning server, we have a central point for the files and if we ever choose to move VPS providers, making changes to all config files and pointing to a new server would be quick and almost transparent to the client.

                  Yes, the URL was correct. We direct every client to the central server, and then based on thier individual login, we direct them to their specific files. The code that does this operation on the web server does not play well with the Yealink phones for some reason. We cleaned it up and think we are almost out of the woods. Probably a good thing...eyes getting heavy.

                  You left out some serious information in your initial post then. Notably HTTPS != "web server" as well as you are authenticating to the webserver somehow?

                  That is all horribly complicating things and leads me to question the over all goal that led to this design. But you apparently have the developers working around the issues already.

                  In the original post, I was convinced it was the configuration files. It's only after I did some packet captures that I realized that the phone wasn't getting the configuration file completely.

                  This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                  travisdh1T JaredBuschJ 2 Replies Last reply Reply Quote 0
                  • travisdh1T
                    travisdh1 @AdamF
                    last edited by

                    @fuznutz04 said in Yealink W52P config files:

                    @JaredBusch said in Yealink W52P config files:

                    @fuznutz04 said in Yealink W52P config files:

                    @JaredBusch said in Yealink W52P config files:

                    @fuznutz04 said in Yealink W52P config files:

                    Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

                    Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

                    The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

                    Since we have cloud VPS servers, I wanted a secure way to send provisioning information to the phones. We achieve this by using HTTPS. We tried to use the build in EndPoint manager for provisiining via HTTPS, but it was lacking some features that we wanted. Plus, with a centralized provisioning server, we have a central point for the files and if we ever choose to move VPS providers, making changes to all config files and pointing to a new server would be quick and almost transparent to the client.

                    Yes, the URL was correct. We direct every client to the central server, and then based on thier individual login, we direct them to their specific files. The code that does this operation on the web server does not play well with the Yealink phones for some reason. We cleaned it up and think we are almost out of the woods. Probably a good thing...eyes getting heavy.

                    You left out some serious information in your initial post then. Notably HTTPS != "web server" as well as you are authenticating to the webserver somehow?

                    That is all horribly complicating things and leads me to question the over all goal that led to this design. But you apparently have the developers working around the issues already.

                    In the original post, I was convinced it was the configuration files. It's only after I did some packet captures that I realized that the phone wasn't getting the configuration file completely.

                    This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                    I'd be getting them on a VPN anyway. HTTPS is known to be broken at this point. Symantec just bought BlueCoat, if you're not sure why that's relevant, you should go read some tech news.

                    JaredBuschJ 1 Reply Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch @travisdh1
                      last edited by

                      @travisdh1 said in Yealink W52P config files:

                      @fuznutz04 said in Yealink W52P config files:

                      @JaredBusch said in Yealink W52P config files:

                      @fuznutz04 said in Yealink W52P config files:

                      @JaredBusch said in Yealink W52P config files:

                      @fuznutz04 said in Yealink W52P config files:

                      Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

                      Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

                      The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

                      Since we have cloud VPS servers, I wanted a secure way to send provisioning information to the phones. We achieve this by using HTTPS. We tried to use the build in EndPoint manager for provisiining via HTTPS, but it was lacking some features that we wanted. Plus, with a centralized provisioning server, we have a central point for the files and if we ever choose to move VPS providers, making changes to all config files and pointing to a new server would be quick and almost transparent to the client.

                      Yes, the URL was correct. We direct every client to the central server, and then based on thier individual login, we direct them to their specific files. The code that does this operation on the web server does not play well with the Yealink phones for some reason. We cleaned it up and think we are almost out of the woods. Probably a good thing...eyes getting heavy.

                      You left out some serious information in your initial post then. Notably HTTPS != "web server" as well as you are authenticating to the webserver somehow?

                      That is all horribly complicating things and leads me to question the over all goal that led to this design. But you apparently have the developers working around the issues already.

                      In the original post, I was convinced it was the configuration files. It's only after I did some packet captures that I realized that the phone wasn't getting the configuration file completely.

                      This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                      I'd be getting them on a VPN anyway. HTTPS is known to be broken at this point. Symantec just bought BlueCoat, if you're not sure why that's relevant, you should go read some tech news.

                      HTTPS is not broken. Older ciphers used for HTTPS are broken. Setting your webserver to only accept modern ciphers is just as encrytped and unbroken as always.

                      travisdh1T 1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch @AdamF
                        last edited by

                        @fuznutz04 said in Yealink W52P config files:

                        This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                        The answer there varies.
                        For most companies, I would used raw HTTP(S) with IP based whitelist as a first choice. Why? Because they have fixed IP blocks.
                        If you are dealing with roving users, then yeah, it is harder to decide what to do.

                        AdamFA 1 Reply Last reply Reply Quote 1
                        • travisdh1T
                          travisdh1 @JaredBusch
                          last edited by

                          @JaredBusch said in Yealink W52P config files:

                          @travisdh1 said in Yealink W52P config files:

                          @fuznutz04 said in Yealink W52P config files:

                          @JaredBusch said in Yealink W52P config files:

                          @fuznutz04 said in Yealink W52P config files:

                          @JaredBusch said in Yealink W52P config files:

                          @fuznutz04 said in Yealink W52P config files:

                          Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

                          Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

                          The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

                          Since we have cloud VPS servers, I wanted a secure way to send provisioning information to the phones. We achieve this by using HTTPS. We tried to use the build in EndPoint manager for provisiining via HTTPS, but it was lacking some features that we wanted. Plus, with a centralized provisioning server, we have a central point for the files and if we ever choose to move VPS providers, making changes to all config files and pointing to a new server would be quick and almost transparent to the client.

                          Yes, the URL was correct. We direct every client to the central server, and then based on thier individual login, we direct them to their specific files. The code that does this operation on the web server does not play well with the Yealink phones for some reason. We cleaned it up and think we are almost out of the woods. Probably a good thing...eyes getting heavy.

                          You left out some serious information in your initial post then. Notably HTTPS != "web server" as well as you are authenticating to the webserver somehow?

                          That is all horribly complicating things and leads me to question the over all goal that led to this design. But you apparently have the developers working around the issues already.

                          In the original post, I was convinced it was the configuration files. It's only after I did some packet captures that I realized that the phone wasn't getting the configuration file completely.

                          This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                          I'd be getting them on a VPN anyway. HTTPS is known to be broken at this point. Symantec just bought BlueCoat, if you're not sure why that's relevant, you should go read some tech news.

                          HTTPS is not broken. Older ciphers used for HTTPS are broken. Setting your webserver to only accept modern ciphers is just as encrytped and unbroken as always.

                          Ok, here goes. Symantec already owns VeriSign, and is buying BlueCoat. VeriSign was once the most prolific provider of SSL certificates. It turns out that BlueCoat already had an intermediate certificate from VeriSign. Which means that BlueCoat can produce totally valid certificates from VeriSign on the fly. Thus my assertion that HTTPS is known to be broken. Doesn't matter how good the ciphers are if someone is breaking the encryption mid-stream, which is what BlueCoat does.

                          AdamFA 1 Reply Last reply Reply Quote 0
                          • AdamFA
                            AdamF @JaredBusch
                            last edited by

                            @JaredBusch said in Yealink W52P config files:

                            @fuznutz04 said in Yealink W52P config files:

                            This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                            The answer there varies.
                            For most companies, I would used raw HTTP(S) with IP based whitelist as a first choice. Why? Because they have fixed IP blocks.
                            If you are dealing with roving users, then yeah, it is harder to decide what to do.

                            Yep, we use HTTPS with username/password, but not a whitelist currently. Once the phones are provisioned, the chances of them needing re-provisioned is fairly low, unless their is a configuration change that we want to push out. As of now, everyone would automatically get the new info. If I implement a whitelist, then it would become more difficult to push an update to roaming users, but certainly not a deal breaker, seeing as we could just update the whitelist as needed.

                            How often do you have your phones checking the provisioning server for changes?

                            JaredBuschJ 1 Reply Last reply Reply Quote 0
                            • AdamFA
                              AdamF @travisdh1
                              last edited by

                              @travisdh1 said in Yealink W52P config files:

                              @JaredBusch said in Yealink W52P config files:

                              @travisdh1 said in Yealink W52P config files:

                              @fuznutz04 said in Yealink W52P config files:

                              @JaredBusch said in Yealink W52P config files:

                              @fuznutz04 said in Yealink W52P config files:

                              @JaredBusch said in Yealink W52P config files:

                              @fuznutz04 said in Yealink W52P config files:

                              Well, after hours of troubleshooting, pizza, and analyzing Wireshark packet captures, I've come to the conclusion that something with our local provisioning server is causing the Yealink phones not to get their entire configuration files, and of course, can not properly apply any parameters to the phone. Our Developer who wrote the website code is reviewing it now. The strange thing is that the provisioning server works perfect with Grandstream phones, and Polycom phones...Yealink seems to dislike it however.

                              Why would your provisioning server be a webserver? Most of the time this is a TFTP server. I mean HTTP and HTTPS are supported, as well as FTP and TFTP, but TFTP is standard.

                              The Yealink admin guide shoes the examples in the appendix. Are you sure you put the URL correctly into the phone in the first place?

                              Since we have cloud VPS servers, I wanted a secure way to send provisioning information to the phones. We achieve this by using HTTPS. We tried to use the build in EndPoint manager for provisiining via HTTPS, but it was lacking some features that we wanted. Plus, with a centralized provisioning server, we have a central point for the files and if we ever choose to move VPS providers, making changes to all config files and pointing to a new server would be quick and almost transparent to the client.

                              Yes, the URL was correct. We direct every client to the central server, and then based on thier individual login, we direct them to their specific files. The code that does this operation on the web server does not play well with the Yealink phones for some reason. We cleaned it up and think we are almost out of the woods. Probably a good thing...eyes getting heavy.

                              You left out some serious information in your initial post then. Notably HTTPS != "web server" as well as you are authenticating to the webserver somehow?

                              That is all horribly complicating things and leads me to question the over all goal that led to this design. But you apparently have the developers working around the issues already.

                              In the original post, I was convinced it was the configuration files. It's only after I did some packet captures that I realized that the phone wasn't getting the configuration file completely.

                              This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                              I'd be getting them on a VPN anyway. HTTPS is known to be broken at this point. Symantec just bought BlueCoat, if you're not sure why that's relevant, you should go read some tech news.

                              HTTPS is not broken. Older ciphers used for HTTPS are broken. Setting your webserver to only accept modern ciphers is just as encrytped and unbroken as always.

                              Ok, here goes. Symantec already owns VeriSign, and is buying BlueCoat. VeriSign was once the most prolific provider of SSL certificates. It turns out that BlueCoat already had an intermediate certificate from VeriSign. Which means that BlueCoat can produce totally valid certificates from VeriSign on the fly. Thus my assertion that HTTPS is known to be broken. Doesn't matter how good the ciphers are if someone is breaking the encryption mid-stream, which is what BlueCoat does.

                              VPN is of course an option, but haven't gone down that route yet, as I see HTTPS being the best middle of the road option, and an easy experience for the client. Just look at some of the big players in the VoIP world. They certainly do not require their customer base to setup a VPN to provision their phones. I've typically seen HTTP or less often, HTTPS provisioning with those guys.

                              1 Reply Last reply Reply Quote 0
                              • momurdaM
                                momurda
                                last edited by

                                Sometimes our watchguard firewall will block the ports on our voip phones when they download the config, thinking it is a port scan attack since all the phones go out at once. This generally only happens after isp/power outage. Our phones get the config from a 3rd party during dhcp. The config file is hosted on an apache2 webserver run by our phone provider(I'd have probably done it differently if i was here when they transitioned from the awesome Mitel pbx powerhouse to this voip solution.
                                We only have 1 of the phones youre talking about, for the receptionist. All the others are T42G phones.

                                1 Reply Last reply Reply Quote 0
                                • JaredBuschJ
                                  JaredBusch @AdamF
                                  last edited by

                                  @fuznutz04 said in Yealink W52P config files:

                                  @JaredBusch said in Yealink W52P config files:

                                  @fuznutz04 said in Yealink W52P config files:

                                  This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                                  The answer there varies.
                                  For most companies, I would used raw HTTP(S) with IP based whitelist as a first choice. Why? Because they have fixed IP blocks.
                                  If you are dealing with roving users, then yeah, it is harder to decide what to do.

                                  Yep, we use HTTPS with username/password, but not a whitelist currently. Once the phones are provisioned, the chances of them needing re-provisioned is fairly low, unless their is a configuration change that we want to push out. As of now, everyone would automatically get the new info. If I implement a whitelist, then it would become more difficult to push an update to roaming users, but certainly not a deal breaker, seeing as we could just update the whitelist as needed.

                                  How often do you have your phones checking the provisioning server for changes?

                                  My phones check in on whatever default schedule they use. I think weekly.

                                  How are you sending username and password? To my knowledge the phone has no way to set a username and password for that?

                                  AdamFA 2 Replies Last reply Reply Quote 0
                                  • AdamFA
                                    AdamF @JaredBusch
                                    last edited by

                                    @JaredBusch said in Yealink W52P config files:

                                    @fuznutz04 said in Yealink W52P config files:

                                    @JaredBusch said in Yealink W52P config files:

                                    @fuznutz04 said in Yealink W52P config files:

                                    This was the most secure way that we could think of to securely provision remote phones. (aside from VPN that is.) I'd be interested to hear how you or others securely provision remote extensions. Is there a better way?

                                    The answer there varies.
                                    For most companies, I would used raw HTTP(S) with IP based whitelist as a first choice. Why? Because they have fixed IP blocks.
                                    If you are dealing with roving users, then yeah, it is harder to decide what to do.

                                    Yep, we use HTTPS with username/password, but not a whitelist currently. Once the phones are provisioned, the chances of them needing re-provisioned is fairly low, unless their is a configuration change that we want to push out. As of now, everyone would automatically get the new info. If I implement a whitelist, then it would become more difficult to push an update to roaming users, but certainly not a deal breaker, seeing as we could just update the whitelist as needed.

                                    How often do you have your phones checking the provisioning server for changes?

                                    My phones check in on whatever default schedule they use. I think weekly.

                                    How are you sending username and password? To my knowledge the phone has no way to set a username and password for that?

                                    On the Autoprovision page (on the W52P model), you set your provision server as well as a username and password.

                                    1 Reply Last reply Reply Quote 0
                                    • AdamFA
                                      AdamF @JaredBusch
                                      last edited by

                                      @JaredBusch

                                      In the config files, I set it here:

                                      auto_provision.server.url =
                                      auto_provision.server.username =
                                      auto_provision.server.password =

                                      JaredBuschJ 1 Reply Last reply Reply Quote 0
                                      • JaredBuschJ
                                        JaredBusch @AdamF
                                        last edited by

                                        This post is deleted!
                                        1 Reply Last reply Reply Quote 0
                                        • 1 / 1
                                        • First post
                                          Last post