summaryrefslogtreecommitdiffstats
path: root/_ont/ont-huawei-useful-command.md
diff options
context:
space:
mode:
authorGiammarco Marzano <stich86@gmail.com>2023-03-23 20:54:25 +0100
committerGitHub <noreply@github.com>2023-03-23 20:54:25 +0100
commitf59ef9482d62c621254f51c8ac230f791db51bbf (patch)
tree14ef8545a3682291e9bd4b4e75e98cb40b1cc273 /_ont/ont-huawei-useful-command.md
parentTool: GPON OMCI VLAN Table parser (#164) (diff)
downloadhack-gpon.github.io-featr.tar
hack-gpon.github.io-featr.tar.gz
hack-gpon.github.io-featr.tar.bz2
hack-gpon.github.io-featr.tar.lz
hack-gpon.github.io-featr.tar.xz
hack-gpon.github.io-featr.tar.zst
hack-gpon.github.io-featr.zip
Diffstat (limited to '_ont/ont-huawei-useful-command.md')
-rw-r--r--_ont/ont-huawei-useful-command.md121
1 files changed, 121 insertions, 0 deletions
diff --git a/_ont/ont-huawei-useful-command.md b/_ont/ont-huawei-useful-command.md
new file mode 100644
index 0000000..d664b16
--- /dev/null
+++ b/_ont/ont-huawei-useful-command.md
@@ -0,0 +1,121 @@
+## Enabling telnet
+
+We need access to a specific shell and in order to get it we have to enable telnet. On the unit, the telnet server accepts connections but doesn't read any input, nor does it send anything.
+
+To enable telnet we’ll use one of the web interface’s features: the configuration backup and restore page. The configuration can be downloaded as an XML, which contains a lot more options than the web interface and a couple of them can be modified to enable telnet access: under the `X_HW_CLITelnetAccess` node, set the `Access` attribute to `1` and in `AclServices`, `TELNETLanEnable` should also be set to `1`. I had to set both but your mileage may vary.
+
+It is possible that this won't work/has been fixed in more recent versions.
+
+Now that this is done, the modified configuration file can be uploaded via the web interface, the ONT will restart and telnet should be accessible on port 23.
+
+
+# General Settings and Useful Commands
+
+{% include alert.html content="All results need to be converted from HEX to ASCII. You can use our [Converter](/ascii-hex), taking care to add 0x in front and remove the spaces every 8 hex digits." alert="Warning" icon="svg-info" color="blue" %}
+
+## Getting the OLT vendor
+
+```
+WAP>omcicmd mib show meid 131 instid 0
+
+ -------------------------------------------------------
+ Me(OLT-G), instance(0x0), instance size is 54
+ -------------------------------------------------------
+ Att1, AttSize = 0x4, AttContent: 48575443
+ Att2, AttSize = 0x14, AttContent: 00000000 00000000 00000000 00000000 00000000
+ Att3, AttSize = 0xe, AttContent: 31300000 00000000 00000000 0000
+ Att4, AttSize = 0xe, AttContent: 00000000 00000000 00000000 0000
+ -------------------------------------------------------
+
+success!
+```
+*0x48575443* → *HWTC* (Huawei)
+
+## Getting the ONT SW Version 0 and 1
+
+```
+WAP>omcicmd mib show meid 7 instid 0
+
+ -------------------------------------------------------
+ Me(Software Image), instance(0x0), instance size is 19
+ -------------------------------------------------------
+ Att1, AttSize = 0xe, AttContent: 56355230 32304331 30533131 3500
+ Att2, AttSize = 0x1, AttContent: 00
+ Att3, AttSize = 0x1, AttContent: 00
+ Att4, AttSize = 0x1, AttContent: 01
+ -------------------------------------------------------
+
+success!
+WAP>omcicmd mib show meid 7 instid 1
+
+ -------------------------------------------------------
+ Me(Software Image), instance(0x1), instance size is 19
+ -------------------------------------------------------
+ Att1, AttSize = 0xe, AttContent: 56355230 32304331 30533131 3500
+ Att2, AttSize = 0x1, AttContent: 01
+ Att3, AttSize = 0x1, AttContent: 01
+ Att4, AttSize = 0x1, AttContent: 01
+ -------------------------------------------------------
+
+success!
+```
+*0x56355230 32304331 30533131 3500* → *V5R020C10S115*
+
+## Getting the ONT Vendor ID and HW Version:
+
+```
+WAP>omcicmd mib show meid 256 instid 0
+
+ -------------------------------------------------------
+ Me(ONT-G), instance(0x0), instance size is 73
+ -------------------------------------------------------
+ Att1, AttSize = 0x4, AttContent: 48575443
+ Att2, AttSize = 0xe, AttContent: 32343046 2e410000 00000000 0000
+ Att3, AttSize = 0x8, AttContent: 2a2a2a2a 2a2a2a2a
+ Att4, AttSize = 0x1, AttContent: 00
+ Att5, AttSize = 0x1, AttContent: 00
+ Att6, AttSize = 0x1, AttContent: 00
+ Att7, AttSize = 0x1, AttContent: 00
+ Att8, AttSize = 0x1, AttContent: 00
+ Att9, AttSize = 0x1, AttContent: 00
+ Att10, AttSize = 0x18, AttContent: 2a2a2a2a 2a2a2a2a 2a2a2a2a 2a2a2a2a 2a2a2a2a 2a2a2a2a
+ Att11, AttSize = 0xc, AttContent: 2a2a2a2a 2a2a2a2a 2a2a2a2a
+ Att12, AttSize = 0x1, AttContent: 00
+ Att13, AttSize = 0x2, AttContent: 0001
+ -------------------------------------------------------
+
+success!
+```
+
+*0x48575443* → *HWTC*
+*0x32343046 2e41* → *240F.A*
+
+## Getting the ONT Equipment ID
+
+```
+WAP>omcicmd mib show meid 257 instid 0
+
+ -------------------------------------------------------
+ Me(ONT2-G), instance(0x0), instance size is 44
+ -------------------------------------------------------
+ Att1, AttSize = 0x14, AttContent: 48473830 31304876 36000000 00000000 00000000
+ Att2, AttSize = 0x1, AttContent: b0
+ Att3, AttSize = 0x2, AttContent: 0240
+ Att4, AttSize = 0x1, AttContent: 01
+ Att5, AttSize = 0x1, AttContent: 01
+ Att6, AttSize = 0x2, AttContent: 0040
+ Att7, AttSize = 0x1, AttContent: 02
+ Att8, AttSize = 0x1, AttContent: 01
+ Att9, AttSize = 0x2, AttContent: 0020
+ Att10, AttSize = 0x4, AttContent: 00000000
+ Att11, AttSize = 0x2, AttContent: 007d
+ Att12, AttSize = 0x1, AttContent: 00
+ Att13, AttSize = 0x2, AttContent: 0018
+ Att14, AttSize = 0x2, AttContent: 0001
+ -------------------------------------------------------
+
+success!
+```
+
+*0x48473830 31304876 36* → *HG8010Hv6*
+