0% found this document useful (0 votes)
409 views

Firmware Upgrade From Redboot-Console

This document provides instructions for performing a firmware upgrade on various Engenius network devices from a TFTP server. It describes preparing the TFTP server, loading the firmware image from TFTP using the "load" command, and writing the image to flash using the "fis write" command. Address and length parameters differ for each device model. The process involves setting IP addresses, loading and verifying the image, and rebooting the device for the new firmware to take effect.

Uploaded by

donibai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
409 views

Firmware Upgrade From Redboot-Console

This document provides instructions for performing a firmware upgrade on various Engenius network devices from a TFTP server. It describes preparing the TFTP server, loading the firmware image from TFTP using the "load" command, and writing the image to flash using the "fis write" command. Address and length parameters differ for each device model. The process involves setting IP addresses, loading and verifying the image, and rebooting the device for the new firmware to take effect.

Uploaded by

donibai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Firmware upgrade from redboot

1. Preparation
A. Telnet: suggest putty
B. Tftp: suggest tftpd32.323
C. Firmware upgrade image by product: For example, EOA3630-engenius-1.2.0.img, EAP-
3660-engenius-1.2.0.img,, and so on.
2. Environment Setup
A. Setup putty:

B. Setup tftp: please make sure the image you want to upgrade is in the directory of tftp
server and the ipaddress of tftp server.
3. Starting firmware upgrade:
A. Connect Console line in DUT and open putty:
A-1, set Serial line as your configure (COM4 in my environment), Speed 9600, click
Open bottom.

B. Power On your DUT, such like EAP-3660, EOC-1650, , and so on. Presses send Ctrl +
C immediately.

C. Type fis list to get board information, screen like:


Be noted that the Flash addr of rootfs is 0xBE030000. The value depends on device.
Please check it carefully.
D. Set DUT and TFTP Server IP Address.

ip_address l DUT_IP_ADDRESS h TFTP_SERVER_IP_ADDRESS

E. Load image from tftp server:


type load r v b 0x80060000 EOC5611P-engenius-1.3.1.3-1.img h 192.168.1.50

F. After load, your screen will be something like:


The format of the command is:
load r v b 0x80060000 <image_name> -h <tftp_server_ip>
G. Write image file into flash:
type fis write -f 0xBE030000 -b 0x8006000A -l 0x5B0000
A prompt will request confirm, type Y to continue.

Command reset for reboot system

The format of the command is:


fis write f <FLASH_address> b <Memory_Address> l <image_length>
The <address> get at 3C, the <image_length> get at 5, the <Memory_Address> is assigned by
you. By the way, we have to shift 10 bytes, therefore at load command we type 0x80060000,
and at write command we have to add 10 bytes 0x8006000A.
H. After prompted, reboot the device. You will get web screen.
4. The process will not destroy bootcode, therefore if system do not up after upgrade, do it again.

5. Current address information table for each product:

Model FLASH_address Image_length


EAP3660 0xBFC30000 0x380000
EOC1650 0xA8030000 0x490000
EOC2610 0xA8030000 0x490000
EOA3630 0xA8030000 0x490000
ECB3500 0xA8030000 0x490000
EOC2611P 0xA8030000 0x5B0000
EOC5610 0xBE030000 0x490000
EOC5611P 0xBE030000 0x5B0000

6. Reference command for each model:


A. load command:
load r v b 0x80060000 <image_name> -h <tftp_server_ip>
B. fis write command:
i. EAP3630:
fis write f 0xBFC30000 b 0x8006000A l 0x380000
ii. EOC1650/EOC2610/ECB3500/EOA3636:
fis write f 0xa8030000 b 0x8006000A l 0x490000
iii. EOC2611P:
fis write f 0xA8030000 b 0x8006000A l 0x5B0000
iv. EOC5610:
fis write f 0xBE030000 b 0x8006000A l 0x490000
v. EOC5611P
fis write f 0xBE030000 b 0x8006000A l 0x5B0000

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy