Ap 5131 Firmware Update

Apple periodically offers software updates (called firmware updates) that improve AirPort performance, security, and functionality. Here's how to make sure that your base station is up to date.

Update

Before you begin

  • Make sure that your base station and Mac or iOS device (iPhone, iPad, or iPod touch) are connected to the Internet.
  • If your base station is performing a Time Machine backup or sharing a hard drive on your network, make sure that none of your devices are currently using that drive. Updating an AirPort base station causes it and its network services to be temporarily unavailable.

11 Update Firmware. 4 AP-5131 Product Reference For detailed information. When you run the EXE file, you will first see if you need to use patches on the system. Then a new wooden panel window opens, each with patch and restore buttons. SAFETY SHEET AP-5131 Access Point Cost-effective, secure, high-performance, wired and wireless connection Designed for small offices and retailers. AP-5131 Access Point: Voice-centric features and capabilities The AP-5131. Symbol AP-5131 Manual Online: Firmware Update Commands. I have purchased 3 (2 new in a box) AP-5131 AP wireless AP's. That update doesnt apply to the R750W yet, currently the latest version for that model is Android 2.2.1.3 = R750WVLU1BNJ7. When the A07 firmware is available for that watch, then you can update. The latest A07 firmware is currently only available for the R750T (Tmobile) and the R750 from certain countries, not the R750A or the R750W.

Restart your base station

Open AirPort Utility on your Mac or iOS device, then follow these steps to restart your base station. If you have more than one base station, restart your primary base station last.


AirPort Utility shows a graphical overview of your Wi-Fi network and any base stations connected to it. The primary base station (Home, in this example) is connected to the Internet via your modem or router.

  1. Select your base station in AirPort Utility, then enter the base station password, if prompted.
  2. On Mac, choose Base Station > Restart from the menu bar.
  3. On iOS devices, tap the base station in AirPort Utility, then tap Edit > Advanced > Restart Base Station.

If you can't restart using AirPort Utility, just unplug the base station for a few seconds, then plug it back in.

Check for a firmware update

  1. After restarting your base station, select the base station in AirPort Utility to see details about it. If you have more than one base station, start with the one farthest from your primary base station.
  2. On Mac, the details pop-up shows an Update button when an update is available. Click the Update button to install the update.
  3. On iOS devices, the details screen shows a numbered badge next to Version when an update is available. Tap Version, then tap Download and Install.
  4. Your base station automatically restarts after the update is installed. Repeat these steps for any other base stations you're using. Update your primary base station last.

Latest updates

Base stationLatest firmware*How to download and install this firmware

AirPort Time Capsule 802.11ac

AirPort Extreme 802.11ac

Version 7.9.1
  • Mac: Use AirPort Utility 6.3.2 or later, which is in the Utilities folder of your Applications folder.**
  • iOS devices: Use Airport Utility 1.3.4 or later for iOS 7.1 or later.

AirPort Time Capsule 802.11n

AirPort Extreme 802.11n

Version 7.8.1
  • Mac: Use AirPort Utility 6.3.2 or later, which is in the Utilities folder of your Applications folder.**
  • iOS devices: Use Airport Utility 1.3.4 or later for iOS 7.1 or later.
  • PC: Use AirPort Utility 5.6.1 for Windows 7.
AirPort Express 802.11nVersion 7.8
  • Mac: Use AirPort Utility 6.3.2 or later, which is in the Utilities folder of your Applications folder.**
  • iOS devices: Use Airport Utility 1.3.4 or later for iOS 7.1 or later.

AirPort Express
(original)

  • Mac: Use AirPort Utility 5.6.1, for Mac OS X Leopard and Snow Leopard.
  • PC: Use AirPort Utility 5.6.1 for Windows 7.

* Information only. To download and install firmware, use AirPort Utility.
** On Mac computers with OS X Mountain Lion or Lion, use AirPort Utility 6.3.1. On computers with Snow Leopard or Leopard, use Airport Utility 5.6.1, which supports 802.11n models and the original AirPort Express.

Learn more

  • Learn how to check for Wi-Fi issues from your Mac or iOS device.
  • Some base station features are available only while administering your Wi-Fi network from the latest operating system for your Mac or iOS device.
  • If one of your network devices isn't compatible with the updated firmware, you might be able to reinstall older firmware. On Mac, click the base station in AirPort Utility, then Option-click the firmware version number. On iOS devices, tap the base station in AirPort Utility, then go to Version > Older Versions.

This repository contains the firmware updater (chromeos-firmwareupdate) that will update firmware images related to verified boot, usually AP (also known as BIOS or MAIN) and EC.

Introduction

Auto update is one of the most important feature in Chrome OS. Updating firmware is one of the most complicated process, since all Chromebooks come with firmware that implemented verified boot and must be able to update in background silently.

Using Firmware Updater

The firmware updater was made as a “shellball”, a self-executable file containing updater logic (shell scripts), utility programs, and firmware images.

In all modes, updater will try to preserve few firmware data, for example the VPD sections (RO_VPD, RW_VPD), HWID and GBB flags (in GBB section).

Update manually

Usually you can find the updater in /usr/sbin/chromeos-firmwareupdate on a ChromeOS device (or the rootfs partition of a disk image).

Ap 5131 Firmware Update Windows 10

To look at its contents (firmware images and versions):

Usually for people who wants to “update all my firmware to right states”, do:

The recovery mode will try to update RO+RW if your write protection is not enabled, otherwise only RW.

If your are not sure about write protection status but you only want RW to be updated, run:

The --wp argument will override you real write protection status.

Simulating ChromeOS Auto Update

The ChromeOS Auto Update (update_engine) runs updater in a different way - a two-step trial process.

If you want to simulate and test that, do:

Building Firmware Updater

The updater is provided by the virtual/chromeos-firmware package in Chromium OS source tree, which will be replaced and includes the chromeos-base/chromeos-firmware-${BOARD} package in private board overlays.

To build an updater locally, in chroot run:

If your board overlay has defined USE flags bootimage or cros_ec, chromeos-firwmare-${BOARD} package will add dependency to firmware and EC source packages (chromeos-bootimage and chromeos-ec), and have the firmware images in /build/${BOARD}/firmware/{image,ec}.bin. A “local” updater will be also generated in /build/${BOARD}/firmware/updater.sh so you can run it to test the locally built firmware images.

In other words, you can remove bootimage and cros_ec in branches that you don't need firmware from source, for example the factory branches or ToT, especially if there are external partners who only has access to particular board private overlays. To do that, find the make.conf in board overlay and add USE='-bootimage -cros_ec'.

Manipulating Firmware Updater Packages

The firmware updater packages lives in private board overlays: src/private-overlays/overlay-${BOARD}-private/chromeos-base/chromeos-firmware-${BOARD}/chromeos-firmware-${BOARD}-9999.ebuild. Find a template here in chromiumos-base/chromeos-firmware-null.

Usually there are few fields you have to fill:

CROS_FIRMWARE_MAIN_IMAGE

A reference to the Main (AP) firmware image, which usually comes from emerge-${BOARD} chromeos-booimage then /build/${BOARD}/firmware/image.bin.

Usually this implies both RO and RW. See CROS_FIRMWARE_MAIN_RW_IMAGE below for more information.

You have to run ebuild-${BOARD} chromeos-firmware-${BOARD}.ebuild manifest whenever you've changed the image files (CROS_FIRMWARE_*_IMAGE).

CROS_FIRMWARE_MAIN_RW_IMAGE

A reference to the Main (AP) firmware image and only used for RW sections.

If this value is set, CROS_FIRMWARE_MAIN_IMAGE will be used for RO and this will be used for RW.

CROS_FIRMWARE_EC_IMAGE

Motorola Ap-5131 Firmware Update

A reference to the Embedded Controller (EC) firmware image, which usually comes from emerge-${BOARD} chromeos-ec then /build/${BOARD}/firmware/ec.bin.

Technical Details

CROS_FIRMWARE_SCRIPT and packaging

The firmware updater is built by running pack_firmware.py, which collects firmware image and extra files, all files under pack_dist folder, archived by running shar, with a special bootstrap stub pack_stub.

Ap 5131 Firmware Update Download

Since the verified boot has been evolved with so much differences, we put the updating logic in different files according to the generation of firmware: pack_dist/updater*.sh. Most Chromebooks today should use updater4.sh.

Usually we will increase a “logic version” when the verified boot has been changed so much that the updater code for previous versions would almost won't work. Currently we have defined these versions (Use Developer Info page to find the mapping from board names to product names):

  • Version 1: (EOL) mario (CR48), using H2C BIOS.
  • Version 2: (EOL) alex and zgb.
  • Version 3: lumpy, stumpy, butterfly, stout, parrot.
  • Version 4: Everything after version 3 until now.
  • Version 5: Was created for vboot2, but now it's merged back to Version 4.

This will be mapped to what you should set in the CROS_FIRMWARE_SCRIPT value in ebuild files.

Updater logic

Here's a detailed list of how each updater mode works:

Ap-5131 Firmware Update

  • --mode=autoupdate: Invoked by update_engine when a payload is installed.

    1. Check if WP is enabled.
    2. If WP is enabled, update RW / inactive and exit. After system reboot. The update_engine will invoke chromeos-setgoodfirmware after 60 secs, which will update or mark booted RW firmware to active.
    3. If WP is disabled, check if the RO section is same as CROS_FIRMWARE_MAIN_IMAGE. If yes, go 2. Otherwise, do --mode=recovery.
  • --mode=recovery: Invoked by recovery shim after installed.

    1. Check if WP is enabled.
    2. If WP is enabled, update both RW/A, RW/B and exit.
    3. If WP is disabled, update whole image except reserved sections (GBB, VPD). This includes RO, RW/A, and RW/B.
  • --mode=factory_install: Used for factory initial imaging.

    1. Check if WP is enabled, and exit with failure if enabled.
    2. Update whole image except reserved sections (GBB, VPD). This includes RO, RW/A, and RW/B.