Skip to content
Snippets Groups Projects
Select Git revision
  • 03d894f33a151d730801963bd328f67c2c02c73a
  • experimental default protected
  • v2023.2.5-ffs
  • nrb/ex400-remove-wps
  • nrb/airmax-test
  • v2023.2.4-ffs
  • nrb/ar9344-reset-sequence
  • autinerd/experimental-openwrt-24.10
  • v2023.2.3-ffs
  • v2023.2.2-ffs
  • v2023.2-ffs
  • v2023.1-ffs
  • v2022.1.4-ffs
  • feature/addMikrotikwAP
  • v2022.1.3-ffs
  • v2021.1.2-ffs
  • v2022.1.1-ffs
  • master protected
  • v2021.1.1-ffs
  • nrb/gluon-master-cpe510
  • v2021.1-ffs
  • experimental-2025-07-04
  • experimental-2025-07-04-base
  • experimental-2025-07-01
  • experimental-2025-07-01-base
  • experimental-2025-06-25
  • experimental-2025-06-25-base
  • experimental-2025-06-24
  • experimental-2025-06-24-base
  • experimental-2025-06-22
  • experimental-2025-06-22-base
  • v2023.2.5-ffs0.1
  • experimental-2025-06-08
  • experimental-2025-06-08-base
  • experimental-2025-06-06
  • experimental-2025-06-06-base
  • experimental-2025-05-27
  • experimental-2025-05-27-base
  • experimental-2025-05-18
  • experimental-2025-05-18-base
  • experimental-2025-05-15
41 results

ath79-generic

Blame
    • Sven Eckelmann's avatar
      03d894f3
      ath79-generic: Add support for OpenMesh OM2P-HS v4 · 03d894f3
      Sven Eckelmann authored
      Device specifications:
      ======================
      
      * Qualcomm/Atheros QCA9533 v2
      * 650/600/217 MHz (CPU/DDR/AHB)
      * 64 MB of RAM
      * 16 MB of SPI NOR flash
        - 2x 7 MB available; but one of the 7 MB regions is the recovery image
      * 2x 10/100 Mbps Ethernet
      * 2T2R 2.4 GHz Wi-Fi
      * 6x GPIO-LEDs (3x wifi, 2x ethernet, 1x power)
      * 1x GPIO-button (reset)
      * external h/w watchdog (enabled by default)
      * TTL pins are on board (arrow points to VCC, then follows: GND, TX, RX)
      * 2x fast ethernet
        - eth0
          + 24V passive POE (mode B)
          + used as WAN interface
        - eth1
          + 802.3af POE
          + builtin switch port 1
          + used as LAN interface
      * 12-24V 1A DC
      * internal antennas
      
      Flashing instructions:
      ======================
      
      Various methods can be used to install the actual image on the flash.
      Two easy ones are:
      
      ap51-flash
      ----------
      
      The tool ap51-flash (https://github.com/ap51-flash/ap51-flash) should be
      used to transfer the image to the u-boot when the device boots up.
      
      initramfs from TFTP
      -------------------
      
      The serial console must be used to access the u-boot shell during bootup.
      It can then be used to first boot up the initramfs image from a TFTP server
      (here with the IP 192.168.1.21):
      
          setenv serverip 192.168.1.21
          setenv ipaddr 192.168.1.1
          tftpboot 0c00000 <filename-of-initramfs-kernel>.bin && bootm $fileaddr
      
      The actual sysupgrade image can then be transferred (on the LAN port) to
      the device via
      
          scp <filename-of-squashfs-sysupgrade>.bin root@192.168.1.1:/tmp/
      
      On the device, the sysupgrade must then be started using
      
          sysupgrade -n /tmp/<filename-of-squashfs-sysupgrade>.bin
      
      Gluon image name change
      =======================
      
      The device had the image name "openmesh-om2phsv4" in older versions of Gluon.
      This had to be changed with the new name in the device trees of the ath79
      device tree.
      03d894f3
      History
      ath79-generic: Add support for OpenMesh OM2P-HS v4
      Sven Eckelmann authored
      Device specifications:
      ======================
      
      * Qualcomm/Atheros QCA9533 v2
      * 650/600/217 MHz (CPU/DDR/AHB)
      * 64 MB of RAM
      * 16 MB of SPI NOR flash
        - 2x 7 MB available; but one of the 7 MB regions is the recovery image
      * 2x 10/100 Mbps Ethernet
      * 2T2R 2.4 GHz Wi-Fi
      * 6x GPIO-LEDs (3x wifi, 2x ethernet, 1x power)
      * 1x GPIO-button (reset)
      * external h/w watchdog (enabled by default)
      * TTL pins are on board (arrow points to VCC, then follows: GND, TX, RX)
      * 2x fast ethernet
        - eth0
          + 24V passive POE (mode B)
          + used as WAN interface
        - eth1
          + 802.3af POE
          + builtin switch port 1
          + used as LAN interface
      * 12-24V 1A DC
      * internal antennas
      
      Flashing instructions:
      ======================
      
      Various methods can be used to install the actual image on the flash.
      Two easy ones are:
      
      ap51-flash
      ----------
      
      The tool ap51-flash (https://github.com/ap51-flash/ap51-flash) should be
      used to transfer the image to the u-boot when the device boots up.
      
      initramfs from TFTP
      -------------------
      
      The serial console must be used to access the u-boot shell during bootup.
      It can then be used to first boot up the initramfs image from a TFTP server
      (here with the IP 192.168.1.21):
      
          setenv serverip 192.168.1.21
          setenv ipaddr 192.168.1.1
          tftpboot 0c00000 <filename-of-initramfs-kernel>.bin && bootm $fileaddr
      
      The actual sysupgrade image can then be transferred (on the LAN port) to
      the device via
      
          scp <filename-of-squashfs-sysupgrade>.bin root@192.168.1.1:/tmp/
      
      On the device, the sysupgrade must then be started using
      
          sysupgrade -n /tmp/<filename-of-squashfs-sysupgrade>.bin
      
      Gluon image name change
      =======================
      
      The device had the image name "openmesh-om2phsv4" in older versions of Gluon.
      This had to be changed with the new name in the device trees of the ath79
      device tree.
    gluon-web-admin.pot 1.60 KiB
    msgid ""
    msgstr "Content-Type: text/plain; charset=UTF-8"
    
    msgid "%u characters min."
    msgstr ""
    
    msgid "(%s available)"
    msgstr ""
    
    msgid "Advanced settings"
    msgstr ""
    
    msgid ""
    "Alternatively, you can set a password to access your node. Please choose a "
    "secure password you don't use anywhere else.<br><br>If you set an empty "
    "password, login via password will be disabled. This is the default."
    msgstr ""
    
    msgid "Cancel"
    msgstr ""
    
    msgid "Confirmation"
    msgstr ""
    
    msgid "Continue"
    msgstr ""
    
    msgid "Don't switch off the device in any circumstance!"
    msgstr ""
    
    msgid "Firmware image"
    msgstr ""
    
    msgid "Information"
    msgstr ""
    
    msgid "Keep settings"
    msgstr ""
    
    msgid "Password"
    msgstr ""
    
    msgid "Password changed."
    msgstr ""
    
    msgid "Password removed."
    msgstr ""
    
    msgid "Remote access"
    msgstr ""
    
    msgid "SSH keys"
    msgstr ""
    
    msgid "Size"
    msgstr ""
    
    msgid ""
    "The firmware image has been transmitted. Please ensure the SHA-256 checksum "
    "and image size are correct and click \"continue\"."
    msgstr ""
    
    msgid "The firmware is currently being upgraded."
    msgstr ""
    
    msgid "The firmware is too big for your device's storage."
    msgstr ""
    
    msgid "The password and the confirmation differ."
    msgstr ""
    
    msgid "The provided firmware image is not valid for this device."
    msgstr ""
    
    msgid ""
    "The upgrade will take a few minutes. When it is finished, your node will "
    "reboot automatically."
    msgstr ""
    
    msgid "Unable to change the password."
    msgstr ""
    
    msgid "Upgrade firmware"
    msgstr ""
    
    msgid "Upload image"
    msgstr ""
    
    msgid "You can manually upgrade your firmware here."
    msgstr ""
    
    msgid "You can provide your SSH keys here (one per line):"
    msgstr ""