Category:ZyXEL VMG3925 B10B: Difference between revisions
Appearance
Content deleted Content added
mNo edit summary |
|||
| (7 intermediate revisions by 2 users not shown) | |||
| Line 24: | Line 24: | ||
*4x 10/100M/1000M ports. |
*4x 10/100M/1000M ports. |
||
*Modem supports VDSL (FTTC) and ADSL/ADSL2+. |
*Modem supports VDSL (FTTC) and ADSL/ADSL2+. |
||
*WiFi is 2.4GHz and |
*WiFi is 2.4GHz and 5GHz, 802.11b/g/n, 802.11a/n/ac |
||
*Broadcom 63168 chipset |
|||
*MTU 1500 when in bridge mode not possible yet, but we are working with ZyXEL on this. (2018-03) |
*MTU 1500 when in bridge mode not possible yet, but we are working with ZyXEL on this. (2018-03) |
||
===Suitable for:=== |
===Suitable for:=== |
||
*ADSL1, ADSL2+ |
*ADSL1, ADSL2+ |
||
*VDSL (FTTC), G.Fast |
*VDSL (FTTC), G.Fast (Modem doesn't support G.Fast, so you'd need a separate G.Fast modem) |
||
*FTTP, FTTPoD |
*FTTP, FTTPoD |
||
| Line 36: | Line 37: | ||
*an Ethernet (PPPoE) router plugged in to a separate VDSL or ADSL modem or a FTTP or FTTPoD ONT |
*an Ethernet (PPPoE) router plugged in to a separate VDSL or ADSL modem or a FTTP or FTTPoD ONT |
||
*a bridging modem to a third-party PPPoE router (e.g. FireBrick, Mikrotik etc) |
*a bridging modem to a third-party PPPoE router (e.g. FireBrick, Mikrotik etc) |
||
=== Security Advisories === |
|||
ZyXEL have a page with their Security Advisories: https://www.zyxel.com/support/security_advisories.shtml |
|||
==='Consumer' grade=== |
==='Consumer' grade=== |
||
| Line 57: | Line 62: | ||
Supervisor password: |
Supervisor password: |
||
The B10B has an autogenerated supervisor password (hashed from the serial number). Earlier models left a md5crypt type hash in /etc/passwd, however firmware AAVF.10 |
The B10B has an autogenerated supervisor password (hashed from the serial number). Earlier models left a md5crypt type hash in /etc/passwd, however firmware AAVF.10 changed to a SHA-512 type hash stored in /etc/shadow. Prior to firmware AAVF.10 you will be able to read /etc/passwd by logging into the router as the "admin" user via SSH or Telnet. With firmware AAVF.10 and later you would have to log in as the supervisor user - but you'd need to know the password.... You would need to crack the hash (e.g. with hashcat), the password will be 8 characters long using characters 0-9,a-f (lower case) |
||
[[Category:AA Routers]] |
[[Category:AA Routers]] |
||