<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.xmission.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tahigh</id>
	<title>XMission Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.xmission.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tahigh"/>
	<link rel="alternate" type="text/html" href="https://wiki.xmission.com/Special:Contributions/Tahigh"/>
	<updated>2026-05-19T15:29:43Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=SPF_and_DKIM&amp;diff=11476</id>
		<title>SPF and DKIM</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=SPF_and_DKIM&amp;diff=11476"/>
		<updated>2023-03-05T17:17:25Z</updated>

		<summary type="html">&lt;p&gt;Tahigh: /* SPF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SPF and DKIM are two important security methods domain owners have of &amp;quot;authorizing&amp;quot; specific email servers to send mail on their behalf. Besides providing greater deliverability of your messages, these mechanisms prevent fraudsters from sending spoofing emails as your domain. &lt;br /&gt;
&lt;br /&gt;
These TXT records are entered by the domain owner wherever the domain&#039;s DNS record is managed, which may be with the registrar or hosting provider. DKIM (Domain Key Identified Mail) also adds public key cryptography for deeper validation.&lt;br /&gt;
&lt;br /&gt;
XMission advises all [https://xmission.com/zimbra Zimbra clients] to configure SPF &amp;amp; DKIM. It may sound a bit daunting but is really not very complicated. This document will walk you through it. &lt;br /&gt;
&lt;br /&gt;
IMPORTANT NOTE ABOUT TXT RECORD ENTRY: Depending on the syntax requirements of your DNS system you may have to include or omit the quotation marks for the record to be properly enabled. Other DNS entries on your domain should provide quick visual guidance on protocol. XMission DNS systems do &#039;&#039;not&#039;&#039; use quotation marks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= SPF =&lt;br /&gt;
The following is the  most commonly applied SPF (Sender Policy Framework) record for XMission email customers but it is imperative you understand how and why this is applied. IMPORTANT: It is critical that you read and understand all SPF information below before applying the record to your domain as you could break email delivery.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| @ (base domain) || TXT || &amp;quot;v=spf1 a mx include:_spf.xmission.com ~all&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== How It Works ==&lt;br /&gt;
Any SPF record is a string of one more more potential mail sources, prefixed by a character indicating the policy for mail source. An example of a common SPF record:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Example Syntax&lt;br /&gt;
|-&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| @ (base domain) || TXT || &amp;quot;v=spf a mx ~all&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
In this case, it says that the A and MX records for the domain are allowed to send, and all other mail fails (but with a &amp;quot;softfail&amp;quot;, so that mail isn&#039;t actually rejected). &amp;quot;a&amp;quot;, &amp;quot;mx&amp;quot; and &amp;quot;all&amp;quot;, are all individual mail sources. The &amp;quot;~&amp;quot; prefixed to the &amp;quot;all&amp;quot; source is a policy denoting that mail from the source should be considered a &amp;quot;SoftFail&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The sources are:&lt;br /&gt;
&lt;br /&gt;
* a - A DNS A record&lt;br /&gt;
* mx - An MX record&lt;br /&gt;
* ptr - A PTR record&lt;br /&gt;
* ip4 - An ipv4 address or subnet&lt;br /&gt;
* ip6 - An ipv6 address or subnet&lt;br /&gt;
* include - The contents of another domain&#039;s SPF record&lt;br /&gt;
* all - Any mail source (generally used at the end to provide a default policy)&lt;br /&gt;
&lt;br /&gt;
The prefix characters are:&lt;br /&gt;
&lt;br /&gt;
* + - Pass (Valid for SPF)&lt;br /&gt;
* - - Fail (Invalid, and reject mail)&lt;br /&gt;
* ~ - SoftFail (Invalid, but still accept)&lt;br /&gt;
* ? - Neutral (...whatever...)&lt;br /&gt;
&lt;br /&gt;
XMission shared hosting clients can [https://wiki.xmission.com/Adding/Managing_DNS_Records learn to manage DNS records here.]&lt;br /&gt;
&lt;br /&gt;
== Valid SPF for XMission ==&lt;br /&gt;
Any SPF record for a domain sending through XMission should contain &amp;quot;include:_spf.xmission.com&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
If you prefer a less identifiable entry then a minimum inclusion would have the following two sources:&lt;br /&gt;
&lt;br /&gt;
* ip4:166.70.13.0/24&lt;br /&gt;
* ip4:198.60.22.0/24&lt;br /&gt;
&lt;br /&gt;
Note that the SPF record policy is a decision of the domain owner&#039;s. If they want to Fail or SoftFail on all, add other sources, etc., is up to them. We don&#039;t have a singular recommendation or requirement for SPF. If the customer &#039;&#039;&#039;only&#039;&#039;&#039; sends via XMission, the following SPF record is relatively safe:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| @ (base domain) || TXT || &amp;quot;v=spf1 a mx include:_spf.xmission.com ~all&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valid SPF for XMission with additional sending services&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SPF Record Merging&lt;br /&gt;
&lt;br /&gt;
Some customers have mailing list or other email sending requirement that require a number of  records be strung together in the SPF record. Fortunately the fairly lenient syntax of SPF records makes this easy to do, here is our default record compared to some merged records:&lt;br /&gt;
&lt;br /&gt;
Default XMission: v=spf1 a mx include:_spf.xmission.com ~all&lt;br /&gt;
&lt;br /&gt;
XMission plus Mailchimp: v=spf1 include:_spf.xmission.com include:servers.mcsv.net ~all&lt;br /&gt;
&lt;br /&gt;
XMission plus Gmail, plus Constant Contact: &amp;quot;v=spf1 include:_spf.xmission.com include:_spf.google.com include:spf.constantcontact.com -all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Forwarding ==&lt;br /&gt;
&#039;&#039;&#039;Important note&#039;&#039;&#039; about forwarding (ie automatically redirecting mail from one email address to another, not hitting the forward button):&lt;br /&gt;
&lt;br /&gt;
Forwarding (under most circumstances) &amp;lt;em&amp;gt;BREAKS&amp;lt;/em&amp;gt; SPF. If a domain has a &amp;quot;-all&amp;quot; (&amp;quot;reject all other mail&amp;quot; aka &amp;quot;Fail&amp;quot;) policy in their SPF record, mail will be rejected by any servers respecting SPF after the server performing the forward. Users should keep this in mind when choosing a policy. This is why we suggest &amp;quot;~all&amp;quot; (&amp;quot;SoftFail&amp;quot;) when you initially configure SPF.&lt;br /&gt;
&lt;br /&gt;
== Alias Domains ==&lt;br /&gt;
Domain aliases that are used for sending email with &amp;quot;From:&amp;quot; addresses will need SPF &amp;amp; DKIM records configured. &lt;br /&gt;
&lt;br /&gt;
All customers are strongly encouraged to configure SPF &amp;amp; DKIM records for all alias domains and parked domains to prevent possible abuse.&lt;br /&gt;
&lt;br /&gt;
= DKIM = &lt;br /&gt;
&lt;br /&gt;
== How DKIM Works ==&lt;br /&gt;
DKIM is similar to SPF in that it uses a TXT record on the domain to define a sending policy for that domain. Where it differs is that it uses public key cryptography with this sending policy. A public key is added to that TXT record and any message that is signed with the private key (and thus validates with the public key) is then considered valid.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;DKIM will break automatic responders, like &#039;&#039;Out of Office&#039;&#039; or &#039;&#039;Vacation&#039;&#039; replies.&#039;&#039;&#039; This is due to how DKIM verifies the sender, and how automated replies are generated and sent.  This is intentional, and is a consideration that needs to be made when limiting sending from your domain via DKIM.&lt;br /&gt;
&lt;br /&gt;
== Adding DKIM to an XMission Domain ==&lt;br /&gt;
We have a single private key for XMission DKIM signing. We can sign DKIM with this key on any domain sending out through XMission. It works for Zimbra domains, virtmail, and SMTP relay. To enable this feature for a domain, two things need to happen:&lt;br /&gt;
&lt;br /&gt;
* The domain needs proper DNS for our domainkey key (see below)&lt;br /&gt;
* The domain needs to be added to XMission routing config as one with DKIM signing.&lt;br /&gt;
&lt;br /&gt;
== DKIM DNS ==&lt;br /&gt;
Add the following two TXT records to the domain. Once added you must [https://xmission.com/contact contact] [mailto:support@xmission.com support@xmission.com] to add your domain to XMission&#039;s DKIM routing file and complete the process:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| xmission._domainkey || TXT || &amp;quot;v=DKIM1; t=y; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCzWmoe0tzQkSUzMqliwcQQ5zY1HKk4z+Wgp+dRCRe7MmSBPftE9r5Lx1QfTfF/J8gl4k9tFsUvUBap0fk1VGMYUG/2LynVuzpkCI4JlUKF5fbx+MDNZrVi0aX73Edjd9trU6NKldVnhNg1RixDLa4aB04XJviy6+3P1h3IHNaZ0QIDAQAB&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| _domainkey || TXT || &amp;quot;t=y; o=~;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Reminder: XMission DNS systems do not require entry of the quotation marks on the records above. External DNS system may require quotation marks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multiple Email Hosts with DKIM&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It is possible to use more than one host with DKIM, though this is only possible if the DNS records used to announce the public key for the security handshake don&#039;t share subdomains with each other.&lt;br /&gt;
&lt;br /&gt;
[[Category: Email]]&lt;/div&gt;</summary>
		<author><name>Tahigh</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=SPF_and_DKIM&amp;diff=11475</id>
		<title>SPF and DKIM</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=SPF_and_DKIM&amp;diff=11475"/>
		<updated>2023-03-05T17:16:38Z</updated>

		<summary type="html">&lt;p&gt;Tahigh: /* SPF */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SPF and DKIM are two important security methods domain owners have of &amp;quot;authorizing&amp;quot; specific email servers to send mail on their behalf. Besides providing greater deliverability of your messages, these mechanisms prevent fraudsters from sending spoofing emails as your domain. &lt;br /&gt;
&lt;br /&gt;
These TXT records are entered by the domain owner wherever the domain&#039;s DNS record is managed, which may be with the registrar or hosting provider. DKIM (Domain Key Identified Mail) also adds public key cryptography for deeper validation.&lt;br /&gt;
&lt;br /&gt;
XMission advises all [https://xmission.com/zimbra Zimbra clients] to configure SPF &amp;amp; DKIM. It may sound a bit daunting but is really not very complicated. This document will walk you through it. &lt;br /&gt;
&lt;br /&gt;
IMPORTANT NOTE ABOUT TXT RECORD ENTRY: Depending on the syntax requirements of your DNS system you may have to include or omit the quotation marks for the record to be properly enabled. Other DNS entries on your domain should provide quick visual guidance on protocol. XMission DNS systems do &#039;&#039;not&#039;&#039; use quotation marks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= SPF =&lt;br /&gt;
The following is the  most commonly applied SPF (Sender Policy Framework) record for XMission email customers but it is imperative you understand how and why this is applied. IMPORTANT: It is critical that you read and understand all SPF information below before applying the record to your domain as you could break email delivery.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| @ (base domain) || TXT || v=spf1 a mx include:_spf.xmission.com ~all&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== How It Works ==&lt;br /&gt;
Any SPF record is a string of one more more potential mail sources, prefixed by a character indicating the policy for mail source. An example of a common SPF record:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+ Example Syntax&lt;br /&gt;
|-&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| @ (base domain) || TXT || v=spf a mx ~all&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
In this case, it says that the A and MX records for the domain are allowed to send, and all other mail fails (but with a &amp;quot;softfail&amp;quot;, so that mail isn&#039;t actually rejected). &amp;quot;a&amp;quot;, &amp;quot;mx&amp;quot; and &amp;quot;all&amp;quot;, are all individual mail sources. The &amp;quot;~&amp;quot; prefixed to the &amp;quot;all&amp;quot; source is a policy denoting that mail from the source should be considered a &amp;quot;SoftFail&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
The sources are:&lt;br /&gt;
&lt;br /&gt;
* a - A DNS A record&lt;br /&gt;
* mx - An MX record&lt;br /&gt;
* ptr - A PTR record&lt;br /&gt;
* ip4 - An ipv4 address or subnet&lt;br /&gt;
* ip6 - An ipv6 address or subnet&lt;br /&gt;
* include - The contents of another domain&#039;s SPF record&lt;br /&gt;
* all - Any mail source (generally used at the end to provide a default policy)&lt;br /&gt;
&lt;br /&gt;
The prefix characters are:&lt;br /&gt;
&lt;br /&gt;
* + - Pass (Valid for SPF)&lt;br /&gt;
* - - Fail (Invalid, and reject mail)&lt;br /&gt;
* ~ - SoftFail (Invalid, but still accept)&lt;br /&gt;
* ? - Neutral (...whatever...)&lt;br /&gt;
&lt;br /&gt;
XMission shared hosting clients can [https://wiki.xmission.com/Adding/Managing_DNS_Records learn to manage DNS records here.]&lt;br /&gt;
&lt;br /&gt;
== Valid SPF for XMission ==&lt;br /&gt;
Any SPF record for a domain sending through XMission should contain &amp;quot;include:_spf.xmission.com&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
If you prefer a less identifiable entry then a minimum inclusion would have the following two sources:&lt;br /&gt;
&lt;br /&gt;
* ip4:166.70.13.0/24&lt;br /&gt;
* ip4:198.60.22.0/24&lt;br /&gt;
&lt;br /&gt;
Note that the SPF record policy is a decision of the domain owner&#039;s. If they want to Fail or SoftFail on all, add other sources, etc., is up to them. We don&#039;t have a singular recommendation or requirement for SPF. If the customer &#039;&#039;&#039;only&#039;&#039;&#039; sends via XMission, the following SPF record is relatively safe:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| @ (base domain) || TXT || v=spf1 a mx include:_spf.xmission.com ~all&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Valid SPF for XMission with additional sending services&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
SPF Record Merging&lt;br /&gt;
&lt;br /&gt;
Some customers have mailing list or other email sending requirement that require a number of  records be strung together in the SPF record. Fortunately the fairly lenient syntax of SPF records makes this easy to do, here is our default record compared to some merged records:&lt;br /&gt;
&lt;br /&gt;
Default XMission: v=spf1 a mx include:_spf.xmission.com ~all&lt;br /&gt;
&lt;br /&gt;
XMission plus Mailchimp: v=spf1 include:_spf.xmission.com include:servers.mcsv.net ~all&lt;br /&gt;
&lt;br /&gt;
XMission plus Gmail, plus Constant Contact: &amp;quot;v=spf1 include:_spf.xmission.com include:_spf.google.com include:spf.constantcontact.com -all&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Forwarding ==&lt;br /&gt;
&#039;&#039;&#039;Important note&#039;&#039;&#039; about forwarding (ie automatically redirecting mail from one email address to another, not hitting the forward button):&lt;br /&gt;
&lt;br /&gt;
Forwarding (under most circumstances) &amp;lt;em&amp;gt;BREAKS&amp;lt;/em&amp;gt; SPF. If a domain has a &amp;quot;-all&amp;quot; (&amp;quot;reject all other mail&amp;quot; aka &amp;quot;Fail&amp;quot;) policy in their SPF record, mail will be rejected by any servers respecting SPF after the server performing the forward. Users should keep this in mind when choosing a policy. This is why we suggest &amp;quot;~all&amp;quot; (&amp;quot;SoftFail&amp;quot;) when you initially configure SPF.&lt;br /&gt;
&lt;br /&gt;
== Alias Domains ==&lt;br /&gt;
Domain aliases that are used for sending email with &amp;quot;From:&amp;quot; addresses will need SPF &amp;amp; DKIM records configured. &lt;br /&gt;
&lt;br /&gt;
All customers are strongly encouraged to configure SPF &amp;amp; DKIM records for all alias domains and parked domains to prevent possible abuse.&lt;br /&gt;
&lt;br /&gt;
= DKIM = &lt;br /&gt;
&lt;br /&gt;
== How DKIM Works ==&lt;br /&gt;
DKIM is similar to SPF in that it uses a TXT record on the domain to define a sending policy for that domain. Where it differs is that it uses public key cryptography with this sending policy. A public key is added to that TXT record and any message that is signed with the private key (and thus validates with the public key) is then considered valid.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;DKIM will break automatic responders, like &#039;&#039;Out of Office&#039;&#039; or &#039;&#039;Vacation&#039;&#039; replies.&#039;&#039;&#039; This is due to how DKIM verifies the sender, and how automated replies are generated and sent.  This is intentional, and is a consideration that needs to be made when limiting sending from your domain via DKIM.&lt;br /&gt;
&lt;br /&gt;
== Adding DKIM to an XMission Domain ==&lt;br /&gt;
We have a single private key for XMission DKIM signing. We can sign DKIM with this key on any domain sending out through XMission. It works for Zimbra domains, virtmail, and SMTP relay. To enable this feature for a domain, two things need to happen:&lt;br /&gt;
&lt;br /&gt;
* The domain needs proper DNS for our domainkey key (see below)&lt;br /&gt;
* The domain needs to be added to XMission routing config as one with DKIM signing.&lt;br /&gt;
&lt;br /&gt;
== DKIM DNS ==&lt;br /&gt;
Add the following two TXT records to the domain. Once added you must [https://xmission.com/contact contact] [mailto:support@xmission.com support@xmission.com] to add your domain to XMission&#039;s DKIM routing file and complete the process:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Host !! Record Type !! Value&lt;br /&gt;
|-&lt;br /&gt;
| xmission._domainkey || TXT || &amp;quot;v=DKIM1; t=y; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCzWmoe0tzQkSUzMqliwcQQ5zY1HKk4z+Wgp+dRCRe7MmSBPftE9r5Lx1QfTfF/J8gl4k9tFsUvUBap0fk1VGMYUG/2LynVuzpkCI4JlUKF5fbx+MDNZrVi0aX73Edjd9trU6NKldVnhNg1RixDLa4aB04XJviy6+3P1h3IHNaZ0QIDAQAB&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| _domainkey || TXT || &amp;quot;t=y; o=~;&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Reminder: XMission DNS systems do not require entry of the quotation marks on the records above. External DNS system may require quotation marks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Multiple Email Hosts with DKIM&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It is possible to use more than one host with DKIM, though this is only possible if the DNS records used to announce the public key for the security handshake don&#039;t share subdomains with each other.&lt;br /&gt;
&lt;br /&gt;
[[Category: Email]]&lt;/div&gt;</summary>
		<author><name>Tahigh</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Recommended_Routers/eero&amp;diff=10912</id>
		<title>Recommended Routers/eero</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Recommended_Routers/eero&amp;diff=10912"/>
		<updated>2021-08-17T23:20:03Z</updated>

		<summary type="html">&lt;p&gt;Tahigh: /* Updating Firmware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Updating Firmware ==&lt;br /&gt;
&lt;br /&gt;
Here are some screenshots:&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|[[File:Eero1.png|300px]] || [[File:Eero2.png|300px]] || [[File:Eero3.png|300px]] &lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;width: 300px|1: Open eero app, select the eero station that is connected directly to the internet source&lt;br /&gt;
|style=&amp;quot;width: 300px|2: Scroll down a bit to find and tap on the &amp;quot;Software&amp;quot; option, between the &amp;quot;IP address&amp;quot; and &amp;quot;Advanced&amp;quot; options near the bottom of the screen.&lt;br /&gt;
|style=&amp;quot;width: 300px|3: If the eero isn&#039;t using the most recent firmware version, the app will automatically prompt them to Install the newest available version.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once that&#039;s updated, the eero can be moved back to XMission DHCP. Some notes:&lt;br /&gt;
&lt;br /&gt;
* UTOPIA still has ~100 or so of our eero customers on their wholesale vlan. NOC has kept track of which eero-having XMission customers are on their wholesale vlan. I suggest we ask for that list and contact those customers first, and personally guide them through the process of upgrading the firmware upgrade and moving them back to XMission&#039;s DHCP vlan.&lt;br /&gt;
&lt;br /&gt;
* Most eeros are sold in sets of two or three. Customers can upgrade the firmware on one or all of their eeros -- if they upgrade only one of their eeros, it has to be the one that connects directly to the ONT. After that eero is upgraded, it can then connect to XMission, and help the other eero satellite upgrade their firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bottom line: eero asks for the same IP twice. If the eero doesn&#039;t get stuck requesting the IP every 45-60 seconds, and the eero has a solid white LED light, then the firmware upgrade worked.&lt;/div&gt;</summary>
		<author><name>Tahigh</name></author>
	</entry>
	<entry>
		<id>https://wiki.xmission.com/index.php?title=Recommended_Routers/eero&amp;diff=10911</id>
		<title>Recommended Routers/eero</title>
		<link rel="alternate" type="text/html" href="https://wiki.xmission.com/index.php?title=Recommended_Routers/eero&amp;diff=10911"/>
		<updated>2021-08-17T23:14:54Z</updated>

		<summary type="html">&lt;p&gt;Tahigh: /* Updating Firmware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Updating Firmware ==&lt;br /&gt;
&lt;br /&gt;
Here are some screen shots&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
|[[File:Eero1.png|300px]] || [[File:Eero2.png|300px]] || [[File:Eero3.png|300px]] &lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;width: 300px|1: Open eero app, select the eero station that is connected directly to the internet source&lt;br /&gt;
|style=&amp;quot;width: 300px|2: Scroll down a bit to find and tap on the &amp;quot;Software&amp;quot; option, between the &amp;quot;IP address&amp;quot; and &amp;quot;Advanced&amp;quot; options near the bottom of the screen.&lt;br /&gt;
|style=&amp;quot;width: 300px|3: If the eero isn&#039;t using the most recent firmware version, the app will automatically prompt them to Install the newest available version.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Once that&#039;s updated, the eero can be moved back to XMission DHCP. Some notes:&lt;br /&gt;
&lt;br /&gt;
* UTOPIA still has ~100 or so of our eero customers on their wholesale vlan. NOC has kept track of which eero-having XMission customers are on their wholesale vlan. I suggest we ask for that list and contact those customers first, and personally guide them through the process of upgrading the firmware upgrade and moving them back to XMission&#039;s DHCP vlan.&lt;br /&gt;
&lt;br /&gt;
* Most eeros are sold in sets of two or three. Customers can upgrade the firmware on one or all of their eeros -- if they upgrade only one of their eeros, it has to be the one that connects directly to the ONT. After that eero is upgraded, it can then connect to XMission, and help the other eero satellite upgrade their firmware.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bottom line: eero asks for the same IP twice. If the eero doesn&#039;t get stuck requesting the IP every 45-60 seconds, and the eero has a solid white LED light, then the firmware upgrade worked.&lt;/div&gt;</summary>
		<author><name>Tahigh</name></author>
	</entry>
</feed>