Checking DDR......OK
UBL Version: 1.46t(DM365)16:10:30 Aug 4 2017
Oscillator: 24MHZ
ARM Rate: 432 MHZ
DDR Rate: 340 MHZ
BootMode: SPI
Starting SPI Memory Copy...
DONE
U-Boot 1.3.6 (jerry) (May 23 2018 - 10:46:47)
DRAM: 128 MB
SF: Got idcode c2 20 18 c2 20
In: serial
Out: serial
Err: serial
Ethernet PHY: GENERIC @ 0x01,id:1cc816
total gio 2
gio[22]=1
gio[25]=1
TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1
Filename 'upgrade_info_7db780a713a4.txt'.
Load address: 0x80100000
Loading: *
Retry count exceeded; starting again
Fail to get info file!
Init error!
TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1
Filename 'failed.txt'.
Load address: 0x80200000
Loading: *
Retry count exceeded; starting again
==>use default images
.......
## Booting kernel from Legacy Image at 80007fc0 ...
Image Name: Linux-2.6.18_pro500-davinci_evm-
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 1771112 Bytes = 1.7 MB
Load Address: 80008000
Entry Point: 80008000
Verifying Checksum ... OK
XIP Kernel Image ... OK
OK
Starting kernel ...
Uncompressing Linux...................................................................................................................... done, booting the kernel.
bootcmd=fsload
bootdelay=3
baudrate=115200
eth1addr=00:01:5b:00:55:66
eth2addr=00:01:5b:00:77:88
netmask=255.255.255.0
bootfile="uImage"
dh_keyboard=1
single=0
da=protect off all;tftp 81a00000 dm365_ubl_boot_16M.bin.img;flwrite
dc=tftp 81a00000 custom-x.cramfs.img; flwrite
dr=tftp 81a00000 romfs-x.cramfs.img; flwrite
du=tftp 81a00000 user-x.cramfs.img; flwrite
dd=tftp 81a00000 data-x.cramfs.img; flwrite
dw=tftp 81a00000 web-x.cramfs.img; flwrite
dg=tftp 81a00000 gui-x.cramfs.img; flwrite
dk=tftp 81a00000 kernel-x.cramfs.img; flwrite
up=tftp 81a00000 update.img; flwrite
tk=tftp 80800000 uImage; bootm 80800000
gionum=22.25
gioval=1.1
dh_com=0
autosip=192.168.254.254
autolip=192.168.1.108
autogw=192.168.1.1
autonm=255.255.255.0
serverip=192.168.1.16
ipaddr=192.168.1.110
filesize=CACF1C
fileaddr=81A00000
HWID=VTO2111D:0:4:1:1d:5:0:1:9:3:3:0:1B0:0:2:0:0:0:0:0
bootargs=console=ttyS0,115200n8 root=/dev/mtdblock4 rootfstype=cramfs,nolock mem=90M newmem=96M video=davincifb:vid0=OFF:vid1=OFF:osd0=OFF:osd1=OFF
appauto=1
ID=3L04439PAN00022
wifiaddr=14:A7:8B:0C:BC:EE
ethaddr=14:A7:8B:0D:0C:1F
stdin=serial
stdout=serial
stderr=serial
ver=U-Boot 1.3.6 (jerry) (May 23 2018 - 10:46:47)
ver=U-Boot 1.3.6 (jerry) (May 23 2018 - 10:46:47)
accepting requests..
Open TFTP Server MultiThreaded Version 1.64 Windows Built 2001
starting TFTP...
alias / is mapped to root\
permitted clients: all
server port range: all
max blksize: 65464
default blksize: 512
default timeout: 60
file read allowed: Yes
file create allowed: No
file overwrite allowed: No
thread pool size: 1
Listening On: 192.168.254.254:69
Client 192.168.1.108:3100 root\failed.txt, 1 Blocks Served
Client 192.168.1.108:3100 root\failed.txt, 1 Blocks Served
Client 192.168.1.108:3100 root\failed.txt, 1 Blocks Served
Checking DDR......OK
UBL Version: 1.46t(DM365)16:10:30 Aug 4 2017
Oscillator: 24MHZ
ARM Rate: 432 MHZ
DDR Rate: 340 MHZ
BootMode: SPI
Starting SPI Memory Copy...
DONE
U-Boot 1.3.6 (jerry) (May 23 2018 - 10:46:47)
DRAM: 128 MB
SF: Got idcode c2 20 18 c2 20
In: serial
Out: serial
Err: serial
Ethernet PHY: GENERIC @ 0x01,id:1cc816
total gio 2
gio[22]=1
gio[25]=1
TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1
Filename 'upgrade_info_7db780a713a4.txt'.
Load address: 0x80100000
Loading: *
Retry count exceeded; starting again
Fail to get info file!
Init error!
TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1
Filename 'failed.txt'.
Load address: 0x80200000
Loading: *
Retry count exceeded; starting again
==>use default images
APP_OFFSET_NEW test
.......
## Booting kernel from Legacy Image at 80007fc0 ...
Image Name: Linux-2.6.18_pro500-davinci_evm-
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 1798424 Bytes = 1.7 MB
Load Address: 80008000
Entry Point: 80008000
Verifying Checksum ... OK
XIP Kernel Image ... OK
OK
Starting kernel ...
Uncompressing Linux........................................................................................................................ done, booting the kernel.
Checking DDR......OK
UBL Version: 1.46t(DM365)16:10:30 Aug 4 2017
Oscillator: 24MHZ
ARM Rate: 432 MHZ
DDR Rate: 340 MHZ
BootMode: SPI
Starting SPI Memory Copy...
DONE
U-Boot 1.3.6 (jerry) (May 23 2018 - 10:46:47)
DRAM: 128 MB
SF: Got idcode c2 20 18 c2 20
In: serial
Out: serial
Err: serial
Ethernet PHY: GENERIC @ 0x01,id:1cc816
total gio 2
gio[22]=1
gio[25]=1
TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1
Filename 'upgrade_info_7db780a713a4.txt'.
Load address: 0x80100000
Loading: *
Retry count exceeded; starting again
Fail to get info file!
Init error!
TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1
Filename 'failed.txt'.
Load address: 0x80200000
Loading: *
Retry count exceeded; starting again
==>use default images
APP_OFFSET_NEW test
.......
## Booting kernel from Legacy Image at 80007fc0 ...
Image Name: Linux-2.6.18_pro500-davinci_evm-
Image Type: ARM Linux Kernel Image (uncompressed)
Data Size: 1798424 Bytes = 1.7 MB
Load Address: 80008000
Entry Point: 80008000
Verifying Checksum ... OK
XIP Kernel Image ... OK
OK
Starting kernel ...
Uncompressing Linux........................................................................................................................ done, booting the kernel.
Uncompressing Linux........................................................................................................................ done, bootiUncompressing Linux........................................................................................................................ done, booting the kernel.
CRC:1393106523
MagicString:c016dcd6-cdeb-45df-9fd0-e821bf0e1e62
run dr
run dk
run du
run dw
run dd
run dc
tftp 0x82000000 pd-x.cramfs.img; flwrite
tftp 0x82000000 .FLASHING_DONE_STOP_TFTP_NOW
sleep 5
No. Time Source Destination Protocol Length Info Src Port Dst Port
1 0.000000 Zte_d4:f0:80 Broadcast ARP 42 Who has 192.168.1.133? Tell 192.168.1.1
2 4.608767 192.168.1.141 224.0.0.251 MDNS 289 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353
3 4.609658 fe80::62ab:67ff:fec0:5ff3 ff02::fb MDNS 309 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353
4 5.848288 192.168.1.1 224.0.0.1 IGMPv2 46 Membership Query, general
5 6.333145 192.168.254.254 239.255.255.250 IGMPv2 46 Membership Report group 239.255.255.250
6 7.535331 192.168.1.108 192.168.254.254 TFTP 84 Read Request, File: failed.txt, Transfer type: octet, timeout=1, blksize=1468 1212 69
7 7.535879 192.168.254.254 192.168.1.108 TFTP 67 Option Acknowledgement, timeout=1, blksize=1468 50866 1212
8 7.542671 192.168.1.108 192.168.254.254 TFTP 46 Acknowledgement, Block: 0 1212 50866
9 7.542747 192.168.254.254 192.168.1.108 TFTP 247 Data Packet, Block: 1 (last) 50866 1212
10 7.548154 192.168.1.108 192.168.254.254 TFTP 46 Acknowledgement, Block: 1 1212 50866
11 7.578793 Zhejiang_0c:8b:48 Broadcast ARP 60 Who has 192.168.1.1? Tell 192.168.1.108
12 8.333107 192.168.254.254 224.0.0.252 IGMPv2 46 Membership Report group 224.0.0.252
13 12.332994 Tp-LinkT_0a:0d:07 Zhejiang_0c:8b:48 ARP 42 Who has 192.168.1.108? Tell 192.168.254.254
14 12.801982 fe80::1 ff02::1:ffdc:cefa ICMPv6 86 Neighbor Solicitation for fe80::66cc:2eff:fedc:cefa from 50:78:b3:d4:f0:80
15 13.332993 Tp-LinkT_0a:0d:07 Zhejiang_0c:8b:48 ARP 42 Who has 192.168.1.108? Tell 192.168.254.254
16 13.333177 192.168.254.254 224.0.0.251 IGMPv2 46 Membership Report group 224.0.0.251
17 14.332993 Tp-LinkT_0a:0d:07 Zhejiang_0c:8b:48 ARP 42 Who has 192.168.1.108? Tell 192.168.254.254
18 15.362362 fe80::1 ff02::1 ICMPv6 102 Router Advertisement from 50:78:b3:d4:f0:80
19 15.567132 192.168.1.131 224.0.0.251 MDNS 131 Standard query response 0x0000 A, cache flush 192.168.1.131 AAAA, cache flush fe80::62ab:67ff:fee4:cb83 NSEC, cache flush Android.local 5353 5353
20 15.567133 fe80::62ab:67ff:fee4:cb83 ff02::fb MDNS 151 Standard query response 0x0000 A, cache flush 192.168.1.131 AAAA, cache flush fe80::62ab:67ff:fee4:cb83 NSEC, cache flush Android.local 5353 5353
21 16.284170 Zte_d4:f0:80 Broadcast ARP 42 Who has 192.168.1.131? Tell 192.168.1.1
22 20.790400 192.168.1.141 224.0.0.251 MDNS 289 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353
23 20.791417 fe80::62ab:67ff:fec0:5ff3 ff02::fb MDNS 309 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353
24 26.896453 92.122.45.168 192.168.254.254 TLSv1.2 85 Encrypted Alert 443 50057
25 26.896453 92.122.45.168 192.168.254.254 TCP 85 [TCP Retransmission] 443 → 50057 [PSH, ACK] Seq=1 Ack=1 Win=245 Len=31 443 50057
26 26.896454 92.122.45.168 192.168.254.254 TCP 54 443 → 50057 [FIN, ACK] Seq=32 Ack=1 Win=245 Len=0 443 50057
Hi there.Hello all
Let's see if anyone can help me with my bricked VTO2111D.
The thing is that it bricked while upgrading to "General_VTO2111D_Eng_P_16M_V3.120.0012000.0.R.20180731" firmware. Since then the VTO is continuously resetting. I followed the procedure posted here Dahua IPC EASY unbricking / recovery over TFTP with no luck and I´m not able to send any command because the device is continuously resetting.
I´ve executed the tftp server and this is the output:
Code:accepting requests.. Open TFTP Server MultiThreaded Version 1.64 Windows Built 2001 starting TFTP... alias / is mapped to root\ permitted clients: all server port range: all max blksize: 65464 default blksize: 512 default timeout: 60 file read allowed: Yes file create allowed: No file overwrite allowed: No thread pool size: 1 Listening On: 192.168.254.254:69 Client 192.168.1.108:3100 root\failed.txt, 1 Blocks Served Client 192.168.1.108:3100 root\failed.txt, 1 Blocks Served Client 192.168.1.108:3100 root\failed.txt, 1 Blocks Served
This is the output of the UART port:
Code:Checking DDR......OK UBL Version: 1.46t(DM365)16:10:30 Aug 4 2017 Oscillator: 24MHZ ARM Rate: 432 MHZ DDR Rate: 340 MHZ BootMode: SPI Starting SPI Memory Copy... DONE U-Boot 1.3.6 (jerry) (May 23 2018 - 10:46:47) DRAM: 128 MB SF: Got idcode c2 20 18 c2 20 In: serial Out: serial Err: serial Ethernet PHY: GENERIC @ 0x01,id:1cc816 total gio 2 gio[22]=1 gio[25]=1 TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1 Filename 'upgrade_info_7db780a713a4.txt'. Load address: 0x80100000 Loading: * Retry count exceeded; starting again Fail to get info file! Init error! TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1 Filename 'failed.txt'. Load address: 0x80200000 Loading: * Retry count exceeded; starting again ==>use default images APP_OFFSET_NEW test ....... ## Booting kernel from Legacy Image at 80007fc0 ... Image Name: Linux-2.6.18_pro500-davinci_evm- Image Type: ARM Linux Kernel Image (uncompressed) Data Size: 1798424 Bytes = 1.7 MB Load Address: 80008000 Entry Point: 80008000 Verifying Checksum ... OK XIP Kernel Image ... OK OK Starting kernel ... Uncompressing Linux........................................................................................................................ done, booting the kernel. Checking DDR......OK UBL Version: 1.46t(DM365)16:10:30 Aug 4 2017 Oscillator: 24MHZ ARM Rate: 432 MHZ DDR Rate: 340 MHZ BootMode: SPI Starting SPI Memory Copy... DONE U-Boot 1.3.6 (jerry) (May 23 2018 - 10:46:47) DRAM: 128 MB SF: Got idcode c2 20 18 c2 20 In: serial Out: serial Err: serial Ethernet PHY: GENERIC @ 0x01,id:1cc816 total gio 2 gio[22]=1 gio[25]=1 TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1 Filename 'upgrade_info_7db780a713a4.txt'. Load address: 0x80100000 Loading: * Retry count exceeded; starting again Fail to get info file! Init error! TFTP from server 192.168.254.254; our IP address is 192.168.1.108; sending through gateway 192.168.1.1 Filename 'failed.txt'. Load address: 0x80200000 Loading: * Retry count exceeded; starting again ==>use default images APP_OFFSET_NEW test ....... ## Booting kernel from Legacy Image at 80007fc0 ... Image Name: Linux-2.6.18_pro500-davinci_evm- Image Type: ARM Linux Kernel Image (uncompressed) Data Size: 1798424 Bytes = 1.7 MB Load Address: 80008000 Entry Point: 80008000 Verifying Checksum ... OK XIP Kernel Image ... OK OK Starting kernel ... Uncompressing Linux........................................................................................................................ done, booting the kernel. Uncompressing Linux........................................................................................................................ done, bootiUncompressing Linux........................................................................................................................ done, booting the kernel.
The file upgrade_info_7db780a713a4.txt is created in the root folder with the following content
Code:CRC:1393106523 MagicString:c016dcd6-cdeb-45df-9fd0-e821bf0e1e62 run dr run dk run du run dw run dd run dc tftp 0x82000000 pd-x.cramfs.img; flwrite tftp 0x82000000 .FLASHING_DONE_STOP_TFTP_NOW sleep 5
And with the wireshark this is what I get:
Code:No. Time Source Destination Protocol Length Info Src Port Dst Port 1 0.000000 Zte_d4:f0:80 Broadcast ARP 42 Who has 192.168.1.133? Tell 192.168.1.1 2 4.608767 192.168.1.141 224.0.0.251 MDNS 289 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353 3 4.609658 fe80::62ab:67ff:fec0:5ff3 ff02::fb MDNS 309 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353 4 5.848288 192.168.1.1 224.0.0.1 IGMPv2 46 Membership Query, general 5 6.333145 192.168.254.254 239.255.255.250 IGMPv2 46 Membership Report group 239.255.255.250 6 7.535331 192.168.1.108 192.168.254.254 TFTP 84 Read Request, File: failed.txt, Transfer type: octet, timeout=1, blksize=1468 1212 69 7 7.535879 192.168.254.254 192.168.1.108 TFTP 67 Option Acknowledgement, timeout=1, blksize=1468 50866 1212 8 7.542671 192.168.1.108 192.168.254.254 TFTP 46 Acknowledgement, Block: 0 1212 50866 9 7.542747 192.168.254.254 192.168.1.108 TFTP 247 Data Packet, Block: 1 (last) 50866 1212 10 7.548154 192.168.1.108 192.168.254.254 TFTP 46 Acknowledgement, Block: 1 1212 50866 11 7.578793 Zhejiang_0c:8b:48 Broadcast ARP 60 Who has 192.168.1.1? Tell 192.168.1.108 12 8.333107 192.168.254.254 224.0.0.252 IGMPv2 46 Membership Report group 224.0.0.252 13 12.332994 Tp-LinkT_0a:0d:07 Zhejiang_0c:8b:48 ARP 42 Who has 192.168.1.108? Tell 192.168.254.254 14 12.801982 fe80::1 ff02::1:ffdc:cefa ICMPv6 86 Neighbor Solicitation for fe80::66cc:2eff:fedc:cefa from 50:78:b3:d4:f0:80 15 13.332993 Tp-LinkT_0a:0d:07 Zhejiang_0c:8b:48 ARP 42 Who has 192.168.1.108? Tell 192.168.254.254 16 13.333177 192.168.254.254 224.0.0.251 IGMPv2 46 Membership Report group 224.0.0.251 17 14.332993 Tp-LinkT_0a:0d:07 Zhejiang_0c:8b:48 ARP 42 Who has 192.168.1.108? Tell 192.168.254.254 18 15.362362 fe80::1 ff02::1 ICMPv6 102 Router Advertisement from 50:78:b3:d4:f0:80 19 15.567132 192.168.1.131 224.0.0.251 MDNS 131 Standard query response 0x0000 A, cache flush 192.168.1.131 AAAA, cache flush fe80::62ab:67ff:fee4:cb83 NSEC, cache flush Android.local 5353 5353 20 15.567133 fe80::62ab:67ff:fee4:cb83 ff02::fb MDNS 151 Standard query response 0x0000 A, cache flush 192.168.1.131 AAAA, cache flush fe80::62ab:67ff:fee4:cb83 NSEC, cache flush Android.local 5353 5353 21 16.284170 Zte_d4:f0:80 Broadcast ARP 42 Who has 192.168.1.131? Tell 192.168.1.1 22 20.790400 192.168.1.141 224.0.0.251 MDNS 289 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353 23 20.791417 fe80::62ab:67ff:fec0:5ff3 ff02::fb MDNS 309 Standard query response 0x0000 PTR, cache flush Android.local PTR, cache flush Android.local A, cache flush 192.168.1.141 AAAA, cache flush fe80::62ab:67ff:fec0:5ff3 NSEC, cache flush 141.1.168.192.in-addr.arpa NSEC, cache flush 3.F.F.5.0.C.E.F.F.F.7.6.B.A.2.6.0.0.0.0.0.0.0.0.0.0.0.0.0.8.E.F.ip6.arpa NSEC, cache flush Android.local 5353 5353 24 26.896453 92.122.45.168 192.168.254.254 TLSv1.2 85 Encrypted Alert 443 50057 25 26.896453 92.122.45.168 192.168.254.254 TCP 85 [TCP Retransmission] 443 → 50057 [PSH, ACK] Seq=1 Ack=1 Win=245 Len=31 443 50057 26 26.896454 92.122.45.168 192.168.254.254 TCP 54 443 → 50057 [FIN, ACK] Seq=32 Ack=1 Win=245 Len=0 443 50057
It seems that the file "upgrade_info_7db780a713a4.txt" is not being requested by the VTO but the file "failed.txt" it is.
I´ve tried with firmwares "General_VTO2111D_Eng_P_16M_V3.120.0012000.0.R.20180731" and "General_VTO2111D_Eng_P_16M_V1.000.0000.0.R.20170414" but as no command is executed no firmware is transfered to the VTO.
I´ve also tried with different commands in the "upgrade_info_7db780a713a4.txt" file, but it is never transfered to the VTO.
Can anyone help me, please.
Thanks in advance
Hi there.
I had exact same issue.
I was missing pressing ********* (asterisk) on the keyboard while booting.
This will stop bootloop.
Then you will be able to do all other magic. I was able to recover mine vto with newest firmware.
Happy to help.Thank you for your indications. I did what you posted and now I have my VTO up un running.
Thank you very much and a happy new year.
Thank you for your indications. I did what you posted and now I have my VTO up un running.
Thank you very much and a happy new year.
Happy to help.
M