Dear friends,
After surfing the Mikrotik forum I thought about trying the firmware from Chinese modules popular in Spain on the MA5671A insert. Speaking of CarlitoProxx(CPGOS03-0490) aka Hilnk(HL23446). The software is more open and has Luci web interface and many advantages compared to highly customized solutions from telecom vendors.
First of all, the optical calibration is preserved.
Furthermore, it is possible to change these OMCI parameters used during authentication with the OLT.
- GPON SN, GPON password, Vendor id, ONT Version, ONT model, Equipment id, LOID, LOID password(checkcode), firmware version, MAC address
It is also possible to change the EEPROM parameters of the SFP module that are displayed on the router screen.
- Vendor name, Part number, Part number revision, Serial number, Date
The entire procedure is covered here in considerable detail:
https://forum.mikrotik.com/viewtopic.php?f=3&t=116364#p751330
Image files
http://s000.tinyupload.com/index.php?file_id=39744640834338451129
CPGOS03-0490 HL23446 Image0
http://s000.tinyupload.com/index.php?file_id=51194170383576121597
CPGOS03-0490 HL23446 Image1
PROCEDURE FOR UNLOCKED MA5671A MODULE with ROOT SHELL
For a module with shell access, uploading a new firmware will not take long. To do this, login as usual to the SFP module at 192.168.1.10. Then simply move the image files from your PC to the SFP module's /tmp folder using the scp protocol. After image transfer:
root@SFP:/#
cd /tmp/
root@SFP:/#
cat /proc/mtd
root@SFP:/tmp#
mtd -e linux write mtd2.bin linux
Unlocking linux ...
Erasing linux ...
Writing from mtd2.bin to linux ...
root@SFP:/tmp#
root@SFP:/tmp#
mtd -e image1 write mtd5.bin image1
The module with the CPGOS03-0490 HL23446 firmware needs two new variables to work properly
root@SFP:/#
fw_setenv ont_serial HWTC11223344
root@SFP:/#
fw_setenv target oem-generic
root@SFP:/#
fw_setenv committed_image 0
Restart the module for the changes to take effect.
PROCEDURE FOR NEW MA5671A MODULE WITH UNLOCKED BOOTLOADER
In case of the factory module, it must first be unlocked using the procedures described above and a small amount of soldering. After unblocking the bootloader it is enough to upload image files using kermit protocol.
FALCON =>
loadb 0x80800000
Ready for binary (kermit) download to 0x80800000 at 115200 bps...
TeraTerm File->Transfer->Kermit->Send mtd2.bin
File transfer will take about 13-17 minutes.
FALCON =>
sf probe 0
FALCON =>
sf erase C0000 740000
FALCON =>
sf write 80800000 C0000 740000
A similar approach will apply to the image1
TeraTerm File->Transfer->Kermit->Send mtd5.bin
File transfer will take about 13-17 minutes
FALCON =>
sf probe 0
FALCON =>
sf erase 800000 800000
FALCON =>
sf write 80800000 800000 800000
The module with CPGOS03-0490 HL23446 firmware needs two new variables to work properly
FALCON =>
setenv ont_serial HWTC11223344
FALCON =>
setenv target oem-generic
FALCON =>
setenv committed_image 0
FALCON =>
saveenv
Disconnect, insert the module into the router and log into 192.168.1.10 to complete the customization.
EXAMPLE OF CONFIGURATION
Login to the SFP module with new firmware at 192.168.1.10. Apply the desirable GPON serial number and password.
root@SFP:/#
fw_setenv ont_serial ELTX11223344
root@SFP:/#
uci set gpon.ploam.nPassword="0xde 0xad 0x31 0x32 0x33 0x34 0x35 0x36 0xbe 0xef"
root@SFP:/#
uci commit
root@SFP:/#
reboot
A selection of optional parameters
root@SFP:/#
fw_setenv image0_version 9.0.0
root@SFP:/#
fw_setenv image1_version 9.0.0
root@SFP:/#
fw_setenv omci_loid someLOIDnumber
root@SFP:/#
fw_setenv omci_lpwd LOIDpassword
root@SFP:/#
uci set network.lct.macaddr="ac:9a:96:de:be:ef"
root@SFP:/#
uci set network.host.macaddr="ac:9a:96:de:be:ef"
root@SFP:/#
uci commit
root@SFP:/#
reboot
I decided that I should also test the eprom values. Everything works well. Values like these:Vendor Name(HUWAWEI), Vendor Part Number(MA5671A), Vendor Revision(0001),Vendor Serial(ELTX11223344), Manufacturing Date(191029),MAC OUI(AC9A96) are visible on the router
Reset all eprom values(optional)
root@SFP:/#
sfp_i2c -d yes
root@SFP:/#
sfp_i2c -i 0 -s "HUWAWEI"
root@SFP:/#
sfp_i2c -i 1 -s "MA5671A"
root@SFP:/#
sfp_i2c -i 2 -s "0001"
root@SFP:/#
sfp_i2c -i 3 -s "ELTX11223344"
root@SFP:/#
sfp_i2c -i 4 -s "191029"
root@SFP:/#
sfp_i2c -i 36 -w 0xac9a96 -4 -m 0x00FFFFFF
VERIFY GPON SN and GPON Password in real time
By using the onu
command we are able to view in real time the Serial Number and Password that is sent to the OLT
onu gtcpg
- onu gtc password get
onu gtcsng
- onu gtc serial number get
For some reason the version of onu included in this firmware displays these values in decimal format. This is still good enough for verification.
ELTX 11223344 - 69 76 84 88 17 34 51 68
0xde 0xad 0x31 0x32 0x33 0x34 0x35 0x36 0xbe 0xef - "222 173 49 50 51 52 53 54 190 239"
root@SFP:/#
onu gtcsng
errorcode=0 serial_number="69 76 84 88 17 34 51 68"
root@SFP:/#
onu gtcpg
errorcode=0 password="222 173 49 50 51 52 53 54 190 239"
So to remind you that the ONU successfully connected should be in the state O5
root@SFP:/#
onu ploamsg
errorcode=0 curr_state=5