From 59fcc1404a9aea01fddf16a314442e3fb3ff33bd Mon Sep 17 00:00:00 2001 From: Pietro Ameruoso <42093926+pameruoso@users.noreply.github.com> Date: Mon, 24 Apr 2023 20:41:12 +0200 Subject: Update zyxel.md (#155) * Update zyxel.md Addeding debrand guidance * Update zyxel.md Added link to no-brand firmware compiled by me with some description. * Update zyxel.md Added GPL source code provided from Zyxel. * Update zyxel.md changing source code package repo to https://github.com/ErnyTech/zyxel-ex5601t0 --- _sfp_cage/zyxel.md | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/_sfp_cage/zyxel.md b/_sfp_cage/zyxel.md index ee08f91..f6c46f9 100644 --- a/_sfp_cage/zyxel.md +++ b/_sfp_cage/zyxel.md @@ -18,6 +18,35 @@ layout: default | SGMII | ✅ | | Type | Router | +# Flashing a no-brand firmware or firmware downgrade. + +1. access via ssh to the router with admin user (admin password is printed on the back of the router) +2. Disable firmware version and modelcheck by running the following commands +``` +zycli fwidcheck off +zycli modelcheck off +``` +3. You can close the ssh console, do not reboot the router +4. Open the router web interface and in the maintenance/firmware upgrade section select the "Restore Default Settings After Firmware Upgrade" option. +5. Select choose file to select the firmware file you want to upload and click Upload. +6. The router will automatically reboot and should get back up on 192.168.1.1 + +# FW No-Brand Version V5.70(ACDZ.0)C0 compiled from Zyxel provided OpenSource package. +The following is a firmware compiled starting from Zyxel provided OpenSource package under GPL license. + +- [source GPL package V5.70(ACDZ.0)C0](https://github.com/ErnyTech/zyxel-ex5601t0) + + +--- Use at your own risk!!!! --- + +- [Firmware image No-Brand Version V5.70(ACDZ.0)C0](https://mega.nz/file/7FZlWTzQ#F8Q_whoW4h1ETRUAzHe4PXIiK6TVj7uay_OtZxfmR6k) + +--- Use at your own risk!!!! --- + +The firmware contains the following modifications too: + +1. Added start-up script to reset and enable root access via ssh with password "passwd". Do not try to reset the root password because that will last until next reboot. +2. the /bin path contains sfp_wan.sh_wind and check_sfp_link.sh_wind scripts which are very similar to the standard sfp_wan.sh and check_sfp_link.sh scripts. If everything works with the original ones do not swap them. If you wan to allow 2.5gbit hsgmii with afm0003 and ma5671a you need to swap and enable the "_wind" scripts. # Miscellaneous Links -- cgit v1.2.3