firmware/src/packages/fff/fff-network/mips
Adrian Schmutzler e39e986a59 fff-network: adapt support for TP-Link CPE210/510 v1
This migrates the support for the TP-Link CPE210 v1 and CPE510 v1
so they are recognized by the new two-port setup code.

Assignment of ports should be consistent to the ar71xx implementation,
i.e. primary port (PoE in) assigned to WAN and secondary port (PoE out)
assigned to CLIENT by default.
Note that this is the exact opposite of the default configuration of
what OpenWrt does (but both have been consistent in behavior).

Since they work again, also re-enable image transfer.

Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
Reviewed-by: Fabian Bläse <fabian@blaese.de>
2021-07-09 10:04:12 +02:00
..
network.glinet,gl-ar150 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.mode fff-network: Group network files by arch, not by target 2020-06-18 12:47:05 +02:00
network.tplink,archer-c7-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c7-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c25-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v1 fff-network: adapt support for TP-Link CPE210/510 v1 2021-07-09 10:04:12 +02:00
network.tplink,cpe210-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe510-v1 fff-network: adapt support for TP-Link CPE210/510 v1 2021-07-09 10:04:12 +02:00
network.tplink,tl-mr3020-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa850re-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa860re-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa901nd-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr3500-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr3600-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4300-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4310-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr710n-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr740n-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr741-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr741nd-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v7 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v8 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v9 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v10 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v11 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v12 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr842n-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043n-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,bullet-m-ar7240 ath79: implement both versions of ubnt,bullet-m 2021-06-08 20:15:30 +02:00
network.ubnt,bullet-m-ar7241 ath79: implement both versions of ubnt,bullet-m 2021-06-08 20:15:30 +02:00
network.ubnt,nanostation-loco-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,nanostation-loco-m-xw treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,nanostation-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,picostation-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifi treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifiac-mesh treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00