It had to happen. We have 200+ UBNT and 20+ mimosa devices in the field, held together (rather well!) by around 30 netonix devices.
One of the UBNT's came up with the 'Error A-12' where the firmware thinks it's been compromised. UBNT support read their scripts and basically told me to run TFTP firmware restore. Which is fine - I've done it tens of times in the past.
Problem is, this device is mounted on top of a three storey Scottish Baronial castle, and involves a scramble up a slate lined roof. Which in this weather (Scotland is in danger of being washed away this week- even more rain than normal) is not a safe or healthy thing.
So - wondering if anyone had successfully managed to put a netonix switch connected UBNT device into TFTP mode?
It's a long shot, but I figured if anyone had - the people in this forum would have.
Many thanks in advance,
---* Bill
Getting a UBNT device into TFTP firmware mode - remotely...
-
billbuchan - Member
- Posts: 85
- Joined: Fri Dec 19, 2014 11:52 pm
- Location: United Kingdom
- Has thanked: 42 times
- Been thanked: 34 times
-
sirhc - Employee
- Posts: 7415
- Joined: Tue Apr 08, 2014 3:48 pm
- Location: Lancaster, PA
- Has thanked: 1608 times
- Been thanked: 1325 times
Re: Getting a UBNT device into TFTP firmware mode - remotely
You have to unplug the device from the switch then use a POE brick that has a reset/default button.
I know, I am being Captain Obvious.
I know, I am being Captain Obvious.
Support is handled on the Forums not in Emails and PMs.
Before you ask a question use the Search function to see it has been answered before.
To do an Advanced Search click the magnifying glass in the Search Box.
To upload pictures click the Upload attachment link below the BLUE SUBMIT BUTTON.
Before you ask a question use the Search function to see it has been answered before.
To do an Advanced Search click the magnifying glass in the Search Box.
To upload pictures click the Upload attachment link below the BLUE SUBMIT BUTTON.
2 posts
Page 1 of 1
Who is online
Users browsing this forum: Google [Bot] and 19 guests