The La Fonera 2.0 (FON 2202) comes with
ssh enabled. This isn't a big surprise since it's still in beta and developers are encouraged to develop plugins for the Fonera platform.
Even with SSH enabled, the best way to
hack the Fonera, i.e., replace the current (very customized / propritary) linux distribution with some thing like DD-WRT or OPenWrt, accessing the bootloader is still the best way to.
Almost like in previous Fonera versions, the bootloader (RedBoot) waits for a few seconds to be interrupted, before moving on and booting the deployed kernel. For the Fonera 2.0, this wait currently happens on port 9000 at IP address 192.168.1.1. Meaning, if a host computer with an assigned IP of something like 192.168.1.254 is connected to the Fonara, issues this command:
echo -e "\0377\0364\0377\0375\0006" >break.bin; sudo nc -vvv 192.168.1.1 9000 < break.bin; telnet 192.168.1.1 9000
and the Fonera gets rebooted, RedBoot will pause the booting process and show
RedBoot> prompt.
If that for whatever reason doesn't work, there is still a way to access and interrupt the bootloader through the internal serial connector, like shown here: