|
本帖最后由 lhlx0010 于 2013-11-24 03:59 编辑 + B, O! t) e& w; o: T+ i+ \/ A
& O, W8 F5 T; M, O& R1 g
1、 把电脑IP设为 192.168.1.10 在操作电脑上安装 Cisco TFTP Server ,开启 TFTP服务# {0 B1 X2 S J4 ?0 l1 R7 Z7 W
+ l* L$ D! a- G# ~# m
2、下载putty,用 PUTTY 登陆 192.168.1.1 用户:admin 密码:admin 或是 空格
0 y' I2 u1 W1 U7 _ Y: |
& j* _/ d) Y0 w% ?3、在SSH模式下输入 tftp -p -f backupsettings.conf 192.168.1.10 (就是下载光猫上的backupsettings.conf文件) N9 E- a9 W3 Q2 g% _; T) F$ P
6 \+ w; N3 ~/ }: D# P4、用写字版(不是记事本)打开刚传到 TFTP 服务的那台电脑上的backupsettings.conf 找到 telecomadmin开头的这行,Password中间的那个就是密码(密码一般是telecomadmin+后面的数字)。超级用户名就是telecomadmin
3 V$ l) v: H- S: f( w0 Z* n1 {6 ?/ u% j7 Y/ Z0 w3 i0 ] g
& Z0 X& D- E4 {OK获取完超密下面进入去TR69; j4 H* T1 {! M
6 @, S8 ^! W7 t' k0 ]2 Q" U3 C/ B4 q* q
+ c0 |$ ~* o+ A+ @( x# h
1、用写字版打开backupsettings.conf* S$ m9 K' P7 v d% N
) W1 P% g/ z1 _$ @' ~6 K7 Y+ e
R1 F1 E! H6 W: Q8 `7 m8 t4 @2、找到下面这段代码并删除. c& i; l3 C9 _/ k
& P5 r3 n, H! `1 m
- <X_CT-COM_WANEponLinkConfig>
1 ?* T- a% G: l0 K - <VLANIDMark>46</VLANIDMark>3 ?/ @8 o9 j" R& {+ }* K+ J
- <802-1pMark>7</802-1pMark>
& j" y# M d9 D3 { - </X_CT-COM_WANEponLinkConfig>
/ w- X' ?# ~+ X - <WANIPConnection instance="1">
* ]0 j4 q" z* I @( f$ o - <Enable>TRUE</Enable>3 O, s' }7 a) C |
- <ConnectionType>IP_Routed</ConnectionType>
# B, z! L/ q" f% i2 u3 d - <Name>ipoe_epon0.46_1</Name>/ t0 H g7 x7 N6 }# K* w
- <NATEnabled>FALSE</NATEnabled>
5 @( N0 ~- n. B% a7 v U) @! n - <ExternalIPAddress>10.7.37.88</ExternalIPAddress>4 F3 {& ]% B! b3 o
- <SubnetMask>255.255.240.0</SubnetMask># |8 O1 `! T+ Y$ h, t! Y
- <DefaultGateway>10.7.47.254</DefaultGateway>
f/ R6 @& T" t5 E - <DNSServers>10.14.0.9,10.14.0.13</DNSServers>
/ v* _% }+ H7 R9 U# V7 D/ ` - <MACAddress>XX:XX:XX:XX:XX:XX</MACAddress>
4 F u# s* a: i) D - <X_BROADCOM_COM_IfName>epon0.46_1</X_BROADCOM_COM_IfName>" U! r: j: I% ^& l8 \1 T1 }. H
- <X_BROADCOM_COM_VlanMux8021p>7</X_BROADCOM_COM_VlanMux8021p>
) t1 Y9 @# G9 n/ a$ g0 G/ e - <X_BROADCOM_COM_VlanMuxID>46</X_BROADCOM_COM_VlanMuxID>
7 j7 R) i* Z q1 }% j" a - <PortMappingNumberOfEntries>0</PortMappingNumberOfEntries>. a7 R. L$ v$ E5 h
- <X_CT-COM_MulticastVlan>60</X_CT-COM_MulticastVlan># v6 t$ e4 ?5 S
- <X_CT-COM_ServiceList>TR069</X_CT-COM_ServiceList>3 A! G$ {0 ]& x! }+ e, x
- <X_CT-COM_LanInterface></X_CT-COM_LanInterface>
# r2 X: A$ c" W4 n) g* b2 L8 q) E - <X_CT-COM_DHCPOPTION60 instance="1">
0 W! Q6 G* r& B - </X_CT-COM_DHCPOPTION60>
) o- L N+ e8 t, q - <X_CT-COM_DHCPOPTION60 instance="2">' N% m! ]- E+ {
- </X_CT-COM_DHCPOPTION60>$ ?3 _. w& Z* [
- <X_CT-COM_DHCPOPTION60 instance="3">$ v5 z: @& G# C
- </X_CT-COM_DHCPOPTION60>
+ g% E4 h L( ~- B' ~5 ~ - <X_CT-COM_DHCPOPTION60 instance="4">
# u, B& ^1 X7 I i* r# n - </X_CT-COM_DHCPOPTION60>
% D9 H5 G+ {* y0 f$ w - <X_CT-COM_DHCPOPTION60 nextInstance="5" ></X_CT-COM_DHCPOPTION60>" Z" v% H+ |# m c2 A& X
- <X_CT-COM_DHCPOPTION125 instance="1">
' E" T/ ^ [7 s7 P) m" d$ q* L+ k' p - </X_CT-COM_DHCPOPTION125>4 m' e) ~, u( y2 e) ~" C
- <X_CT-COM_DHCPOPTION125 instance="2">
& G7 c, n. O' k: O/ e- T' u0 L - </X_CT-COM_DHCPOPTION125>1 [7 [; o) R1 A8 R
- <X_CT-COM_DHCPOPTION125 instance="3">* o( Q- ]0 j2 i/ Q
- </X_CT-COM_DHCPOPTION125>
: |. _5 Q4 Y1 ~! P. O1 v! {6 w# M - <X_CT-COM_DHCPOPTION125 instance="4">
( T% N- J o1 U% g) Z. e; L1 L - </X_CT-COM_DHCPOPTION125>
; `$ y% }/ [; M - <X_CT-COM_DHCPOPTION125 nextInstance="5" ></X_CT-COM_DHCPOPTION125>- M2 X' N" n$ A8 ~
- </WANIPConnection>. v" d# l" N: r- i! o0 J* z
- <WANIPConnection nextInstance="2" ></WANIPConnection>
T; B( k" e1 P) W8 P) J - </WANConnectionDevice>0 X7 j+ A$ c f' K
- <WANConnectionDevice instance="2">
7 v" E7 S" J+ h' Z- ~ - <WANIPConnectionNumberOfEntries>0</WANIPConnectionNumberOfEntries>
# e: g" o$ X3 x8 b: j1 P - <WANPPPConnectionNumberOfEntries>1</WANPPPConnectionNumberOfEntries>
复制代码 . j: M4 c( f3 @3 g3 S* G9 Y* G
: A/ N% r3 W- D: u* \5 J3、找到http://devacs.edatahome.com:9090/ACS-server/ACS并删除,在这个地址下面一行<Password>还有一个<ConnectionRequestPassword>把这里面的密码也给删了" Z6 t+ B: }: m1 K r" I; ]1 t
L$ K3 [" {# b' A4 N# m$ f
* A, ~& h' [+ h% d' [
4、保存
# v6 E+ X2 `2 n9 A
3 |: R4 W+ ^/ N
% M6 u; t% A, o. `$ a* ~7 W; b5、用超密登录设备后打开 192.168.1.1/updatesettings.html 这个地址上传刚刚保存的配制文件等待设备重启后再用超密进入设备看TR69是不是没了& f3 S a8 x* ]6 v; f6 n& k! E' h( ?% j
: k: P% p K7 [+ d8 V( A- [6 U4 y9 @9 r$ `& f
至此结束
" k* X5 [1 m3 D1 Z& J6 C6 @) h- g6 t. @" r. y @* H7 t# b
4 [) C0 Z& U3 g3 J, a
* R; z" q$ x) d2 h" B$ O0 Q |
|