openwrt/target/linux/ath79
David Lutz 2d465fbf57 ath79: Add support for Sophos AP15C
The Sophos AP15C uses the same hardware as the AP15, but has a reset button.

Based on:
commit 6f1efb2898 ("ath79: add support for Sophos AP100/AP55 family")
author    Andrew Powers-Holmes <andrew@omnom.net>
          Fri, 3 Sep 2021 15:53:57 +0200 (23:53 +1000)
committer Hauke Mehrtens <hauke@hauke-m.de>
          Sat, 16 Apr 2022 16:59:29 +0200 (16:59 +0200)

Unique to AP15C:
 - Reset button
 - External RJ45 serial console port

Flashing instructions:

This firmware can be flashed either via a compatible Sophos SG or XG
firewall appliance, which does not require disassembling the device, or via
the U-Boot console available on the internal UART header.

To flash via XG appliance:
 - Register on Sophos' website for a no-cost Home Use XG firewall license
 - Download and install the XG software on a compatible PC or virtual
   machine, complete initial appliance setup, and enable SSH console access
 - Connect the target AP device to the XG appliance's LAN interface
 - Approve the AP from the XG Web UI and wait until it shows as Active
   (this can take 3-5 minutes)
 - Connect to the XG appliance over SSH and access the Advanced Console
   (Menu option 5, then menu option 3)
 - Run `sudo awetool` and select the menu option to connect to an AP via
   SSH. When prompted to enable SSH on the target AP, select Yes.
 - Wait 2-3 minutes, then select the AP from the awetool menu again. This
   will connect you to a root shell on the target AP.
 - Copy the firmware to /tmp/openwrt.bin on the target AP via SCP/TFTP/etc
 - Run `mtd -r write /tmp/openwrt.bin astaro_image`
 - When complete, the access point will reboot to OpenWRT.

To flash via U-Boot serial console:
 - Configure a TFTP server on your PC, and set IP address 192.168.99.8 with
   netmask 255.255.255.0
 - Copy the firmware .bin to the TFTP server and rename to 'uImage_AP15C'
 - Open the target AP's enclosure and locate the 4-pin 3.3V UART header [4]
 - Connect the AP ethernet to your PC's ethernet port
 - Connect a terminal to the UART at 115200 8/N/1 as usual
 - Power on the AP and press a key to cancel autoboot when prompted
 - Run the following commands at the U-Boot console:
    - `tftpboot`
    - `cp.b $fileaddr 0x9f070000 $filesize`
    - `boot`
 - The access point will boot to OpenWRT.

Signed-off-by: David Lutz <kpanic@hirnduenger.de>
(cherry picked from commit a7abc7ec3b)
2024-11-16 21:03:52 +01:00
..
base-files/etc/hotplug.d/ieee80211 ath79: migrate Archer C5 5GHz radio device paths 2022-03-31 18:07:29 +02:00
dts ath79: Add support for Sophos AP15C 2024-11-16 21:03:52 +01:00
files treewide: remove platform_get_resoruce 2024-10-22 00:44:33 +02:00
generic ath79: Add support for Sophos AP15C 2024-11-16 21:03:52 +01:00
image ath79: Add support for Sophos AP15C 2024-11-16 21:03:52 +01:00
mikrotik generic: platform/mikrotik: add wlan lz77 decompress 2024-10-08 10:45:58 +02:00
nand ath79: linksys_ea4500-v3: take over the space for user data 2024-11-07 14:57:37 +01:00
patches-6.6 kernel: bump 6.6 to 6.6.57 2024-10-19 16:21:32 +02:00
tiny ath79: disable ath79 USB phy drivers by default 2024-09-22 23:58:47 +02:00
config-6.6 ath79: disable ath79 USB phy drivers by default 2024-09-22 23:58:47 +02:00
Makefile ath79: switch default kernel to 6.6 2024-06-14 17:38:09 +02:00
modules.mk