Changes for page Why can't the password access AT command after upgrade(-NB)?
Last modified by Mengting Qiu on 2024/08/27 18:17
Change comment:
Uploaded new attachment "image-20240827181447-4.png", version {1}
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 2 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -70,12 +70,11 @@ 70 70 71 71 Users can query passwords only using the UART interface via the STM32CubeProgrammer. 72 72 73 -See [[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]]. 73 +See **[[UART Connection>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART%20Access%20for%20LoRa%20ST%20v4%20base%20model/#H2.3UARTConnectionforSN50v3basemotherboard]]**. 74 74 75 +update firmware through UART TTL interface :** [[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 75 75 76 -update firmware through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 77 77 78 - 79 79 == 4.2 query the password via STM32CubeProgrammer == 80 80 81 81 ... ... @@ -99,7 +99,7 @@ 99 99 100 100 **Procedure for querying the password(new firmware):** 101 101 102 -Refer to the old and new firmware division above, and run the firmware first after updating the firmware. 101 +Refer to [[the old and new firmware division>>http://wiki.dragino.com/xwiki/bin/view/Why%20can%27t%20the%20password%20access%20AT%20command%20after%20upgrade%28-NB%29%3F/#H3.A0VersionConfirmation]] above, and run the firmware first after updating the firmware. 103 103 104 104 * After the firmware upgrade is complete, switch back to the FLASH and reset the node to run the new firmware once. 105 105 * Then place the switch at the ISP and connect to the STM32CubeProgrammer (same as when burning the firmware). ... ... @@ -106,7 +106,6 @@ 106 106 * Click "Device memory", enter **0x08019000** in "Address", and click "Read" 107 107 * Find the 0x08019000 address field and then read the current password as shown in the screenshot below. 108 108 109 - 110 110 [[image:image-20240827180414-1.png||height="527" width="910"]] 111 111 112 112
- image-20240827181431-3.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ting - Size
-
... ... @@ -1,0 +1,1 @@ 1 +331.6 KB - Content
- image-20240827181447-4.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ting - Size
-
... ... @@ -1,0 +1,1 @@ 1 +302.2 KB - Content