summaryrefslogtreecommitdiffstats
path: root/_ont/ont-zte-f6005.md
diff options
context:
space:
mode:
Diffstat (limited to '_ont/ont-zte-f6005.md')
-rw-r--r--_ont/ont-zte-f6005.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/_ont/ont-zte-f6005.md b/_ont/ont-zte-f6005.md
index 8a06777..1552e80 100644
--- a/_ont/ont-zte-f6005.md
+++ b/_ont/ont-zte-f6005.md
@@ -45,14 +45,14 @@ The ONT has a TTL 3.3v UART console (configured as 115200 8-N-1) that can be acc
- V6.0.10P2N18 (OpenFiber)
- V6.0.10P2N19 (OpenFiber)
-{% include_relative ont-nokia-use.md disableEnablePassword=true %}
+{% include_relative ont-nokia-use.md disableEnablePassword=true alertUsage="The following commands need to be executed on GponCLI via a terminal (serial, telnet or SSH). The models currently distributed in Italy by TIM and OpenFiber have no way to enter GponCLI via serial, only via telnet after flashing a custom firmware." %}
{% include_relative ont-nokia-useful-command.md %}
# Advanced settings
-## Unlock serial and TELNET
+## Unlock serial to flash another firmware
-This ONT is the twin brother of [CIG G97-CP](/ont-cig-g-97cp), if you can find its bootloader (named `CIG_bu.en_V3.09.15`), you can easly repack the firmware and enable its serial port.
+This ONT is the twin brother of [CIG G97-CP](/ont-cig-g-97cp), if you can find its bootloader (named `CIG_bu.en_V3.09.15`), you can easly repack the firmware and enable its serial port limited to bootloader.
You need a 3.3V SPI programmer (like a modded CH341a) to read and write back the flash.
{% include alert.html content="This was tested only on a TIM V6.0.10N20 firmware!" alert="Note" icon="svg-info" color="blue" %}
@@ -156,7 +156,7 @@ And flash image with the `upgdimage`.
This way both slots will have the same firmware version and will avoid any swap by the OLT.
-After these steps, power-cycle ONT and login via TELNET with `root\admin` credentials. From this moment you can simply spoof your ONT with the usual commands.
+After these steps, power-cycle ONT and login via Telnet with `root\admin` credentials. From this moment you can simply spoof your ONT with the usual commands.
# Known Bugs