--- title: 中華電信更換貓棒 tags: GPON ONU description: 丟掉小烏龜,自己的 ONU 自己買 image: GA: --- # 更換 SFP GPON ONU (Hinet) #### #20251104 更新升速後側速結果 ## 設備 1. [CCR1009-7G-1C-1S+](https://mikrotik.com/product/CCR1009-7G-1C-1Splus) 2. dfp-34x-2c2 ![](https://i.imgur.com/5BiE7q9.png) ## 參考資料 [Hacking RTL960x](https://github.com/Anime4000/RTL960x) ## 步驟 1. 插入 SFP ONU ![](https://i.imgur.com/w6oMf53.png) 2. 設定 IP ![](https://i.imgur.com/Wvb0Oq6.png) 3. 設定路由 ![](https://i.imgur.com/7ZL5Dba.png) 4. 即可開啟 ONU 管理介面 http://192.168.1.1 ![](https://i.imgur.com/8fbnQYy.png) 5. 備份初始設定 ![](https://i.imgur.com/RNRsAv0.png) 6. ssh 連上 ONU 更改設定 直接 ssh admin@192.168.1.1 可能會遇到 ``` Unable to negotiate with 192.168.1.1 port 22: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 ``` ssh 要加上 ``` -oKexAlgorithms=+diffie-hellman-group1-sha1 -o Ciphers=3des-cbc ``` ![](https://i.imgur.com/YvzHb0P.png) 7. 修改設定 填入資訊可參考[Stock_ONU.md](https://github.com/Anime4000/RTL960x/blob/main/Docs/Stock_ONU.md) 最後更新:20260211 | `GPON_ONU_MODEL` | `GPON_SN` |`PON_VENDOR_ID` | `HW_HWVER` | `OMCI_SW_VER#` | Owner | ISP | |------------------|--------------|----------------|-----------------|------------------|-----------|-----| | RTF8207W | ASKY12345678 | ASKY | RTF8207W | R82XXR230308 | pccr10001 | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | RTF8217 | ASKY12345678 | ASKY | RTF8217 | R82XXR230308 | akw28888 | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | I040GW | GTHG12345678 | GTHG | 3FE99997HGW001 | I040GWR200110 | akw28888 | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | I040GB | GMTK12345678 | GMTK | 3FE99995AAAA01 | I040GBN131231 | akw28888 | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | H660WM | DSNW12345678 | DSNW | H660WM | H660WMR210825 | akw28888 | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | PMG4506-T20B | ZYXE12345678 | ZYXE | PMG4506-T20B | P4506R220712 | akw28888 | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | G040WQ | NOKW12345678 | GMTK | 3FE47772AAAA | G040WQR201207 | pccr10001 | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | H640GO | DSNW12345678 | DSNW | H640GO | 4.01p1-3090 | akw28888 | [TAIFO](https://www.taipeifiber.com.tw/) | | 500np | ZYXE12345678 | ZYXE | |5XXNPR251128| windasd | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | | 512np | ZYXE12345678 | ZYXE | | | windasd | [Hinet](https://broadband.hinet.net/Broadband/internetManagement/internet/internet/internet_02.do) | ```bash= flash set GPON_PLOAM_FORMAT 1 flash set GPON_PLOAM_PASSWD DEFAULT012(Hinet專線號碼即SLID) flash set GPON_ONU_MODEL I-040GW(Hinet設備型號) flash set GPON_SN GTHG12345678(Hinet設備Serial Number) flash set PON_VENDOR_ID GTHG flash set HW_HWVER 3FE99997HGW001(Hinet設備硬體版本) flash set OMCI_SW_VER1 I040GWR200110(Hinet設備韌體版本) flash set OMCI_SW_VER2 I040GWR200110(Hinet設備韌體版本) flash set OMCC_VER 128 flash set OMCI_TM_OPT 0 flash set OMCI_FAKE_OK 1 flash set OMCI_OLT_MODE 21 reboot ``` 重開機後在 PON Status 可能會看到 LOID Status 在 Initial Status ,這是正常的因為 Hinet 沒用到 LOID ![](https://i.imgur.com/BJ8CUyY.png) 8. 查看 vlan ```bash= omcicli mib get 84 ``` ![](https://i.imgur.com/39urAfw.png) 開啟[Hinet故障報修](https://my.cht.com.tw/Trouble) ![](https://i.imgur.com/iG8iTRq.png) * 可以兩個 Vlan 都分別先試看看 需先開啟瀏覽器開發人員工具(F12) 回到網頁選取所使用線路 ![](https://i.imgur.com/j6pQMww.png) ![](https://i.imgur.com/K1YCxKD.png) 待測試完成後找尋 getLineInfo 裡面的 vlan 即是所需 vlan ![](https://i.imgur.com/JHGntfE.png) 9. 設定 vlan ![](https://i.imgur.com/SqaLsWg.png) 10. 設定 PPPOE 使用上步驟 vlan ![](https://i.imgur.com/Cr04AIP.png) 11. Enjoy!! ![](https://i.imgur.com/A2t76NW.png) ![](https://i.imgur.com/XfoTibk.png) 升速 1000M/600M 很久了來補一下測速結果 ![image](https://hackmd.io/_uploads/H1OevfPkZe.png) ![image](https://hackmd.io/_uploads/H1cjDGDkbl.png)