Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15 [[image:image-20220531155018-18.png]]
16
17
18
19 == **1.2  Steps** ==
20
21
22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
38 * change the script monitor_gateway.sh with properly users setting:
39
40 (% class="box infomessage" %)
41 (((
42 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
43 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
44 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
45 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
46 )))
47
48 * run **/usr/bin/monitor_gateway.sh** to test if upload is good.
49
50 * Add monitor_gateway.sh to cron work **/etc/crontabs/root** to make this script runs perdiocally, below is an example to update every 20 minutes
51
52 (% class="box infomessage" %)
53 (((
54 # For details see man 4 crontabs
55 # Example of job definition:
56 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
57 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
58 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
59 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
60 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
61 # | | | | |
62 # * * * * * user-name command to be executed
63 #*/10 * * * *  checklog
64 ~* 23 * * *  /etc/init.d/auto_update start
65 */20 * * * *  /usr/bin/monitor_gateway.sh     
66 )))
67
68 * Reboot device.
69
70 == **1.3  Monitor Public IP** ==
71
72
73 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
74
75 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
76
77 [[image:image-20220531145559-2.png]]
78
79 Find Public IP
80
81
82
83 = **2.  Remote Access** =
84
85 == **2.1  Remote Access via Remote.it.** ==
86
87
88 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
89
90
91 (% style="color:red" %)**Important Notice:**
92
93 * Remote.it access will give full control of your device to remote support.
94 * The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
95
96 For how to use remoteit, please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
97
98
99 == **2.2  RSSH Introduction** ==
100
101 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
102
103 Important Notice:
104
105 (% class="box warningmessage" %)
106 (((
107 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
108 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
109 )))
110
111 Below gateway support reverse SSH access:
112
113 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
114 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
115 * LG02, OLG02
116 * LG308, DLOS8
117 * LPS8
118 * LIG16
119 * MS14 series if installed with the same firmware.
120
121
122 === **2.2.1  End User Guide to use SSH access** ===
123
124
125 Go to this the Reverse SSH page as below:
126
127 [[image:image-20220531150151-3.png]]
128
129 Get the RSSH configure page
130
131
132
133 [[image:image-20220531150338-4.png]]
134
135 Connection OK.
136
137
138 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
139 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
140 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
141 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
142 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
143
144 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
145
146
147
148 === **2.2.2  Set Up RSSH Server** ===
149
150 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
151
152
153
154 ==== **2.2.2.1  Step 1 : Download the SSH service code** ====
155
156
157 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
158
159 [[image:image-20220531150750-5.png]]
160
161
162 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
163
164 [[image:image-20220531150811-6.png]]
165
166
167 **Debug** :
168
169 (((
170 (% class="box" %)
171 (((
172 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
173 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
174 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
175 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
176 )))
177 )))
178
179 [[image:image-20220531151516-7.png]]
180
181
182 (((
183 (% class="box" %)
184 (((
185 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
186 please insatell sqlite3.
187 )))
188 )))
189
190 [[image:image-20220531151628-8.png]]
191
192
193 (% style="color:blue" %)**How to install Sqlit3**
194
195 (% class="box infomessage" %)
196 (((
197 **~ Step1:** Download the SQLit3 installation package
198 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
199
200
201 **Step2: **tar the SQLit3 installation package
202 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
203
204 **Step3:** Generate the makefile
205 cd sqlite-autoconf-3350300/;./configure
206
207 **Step4:** Compile makefile
208 sudo make
209
210 **Step5:** Install makefile
211 sudo make install
212
213 **Check:**
214 cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
215 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
216
217 **debug:**
218 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
219 Please execute the command /sbin/ldconfig.
220 After that execute the command ./sqlite3 test.db again.
221 )))
222
223
224
225 ==== **2.2.2.2  Step 2 : Install and run the RSS service** ====
226
227
228 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
229
230 user must enter the root account and run the following commands
231
232 (% class="box infomessage" %)
233 (((
234 $ ./create_sqlite3_db.sh
235 $ ./rssh_serv -p  3721 2>&1 &
236 $ ps -ef | grep rssh_serv check 3721 port
237 )))
238
239 [[image:image-20220531151958-10.png]]
240
241
242 **Debug:**
243
244 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
245 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
246 }}}
247
248 {{{ if fail to open dpvlry or to bind to it
249 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
250 }}}
251
252
253
254 ==== **2.2.2.3  Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
255
256
257 (% class="box infomessage" %)
258 (((
259 **1):**  sudo useradd XXXXX (custom user name)
260 **2):**  sudo passwd xxxxxx
261 **3):**  cp /bin/bash /bin/rbash
262 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
263 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
264 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
265 )))
266
267 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
268
269
270
271 ==== **2.2.2.4  Step 4 : Create an authorization key file** ====
272
273
274 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
275
276 **Debug:**
277
278 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
279
280
281
282 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
283
284
285 ==== **2.2.3.1  Step 1 : Come back the gateway web UI to get the gateway Public key** ====
286
287
288 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
289
290 [[image:image-20220531152419-11.png]]
291
292
293
294 ==== **2.2.3.2  Step 2 : Authorization server** ====
295
296
297 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
298
299 [[image:image-20220531152549-12.png]]
300
301
302
303 ==== **2.2.3.3  Step 3 : Connect private server** ====
304
305
306 This is same as connect Dragino Support Server but just change the server address to customize server address.
307
308 [[image:image-20220531152633-13.png]]
309
310
311
312 ==== **2.2.3.4  Step 4 : Check Connection** ====
313
314
315 Rssh Host connection Ok
316
317 [[image:image-20220531152815-14.png]]
318
319
320 User can use common ps | grep ssh to check it in the gateway.
321
322 [[image:image-20220531152840-15.png]]
323
324
325
326 ==== **2.2.3.5  Step 5 : Access the gateway from customized server** ====
327
328
329 Check what gateways link to server.
330
331 (% class="box infomessage" %)
332 (((
333 $ ./connect-gw.sh -l
334 )))
335
336 [[image:image-20220531153016-16.png]]
337
338
339
340 Access the gateway
341
342 (% class="box infomessage" %)
343 (((
344 $ ./connect-gw.sh <GWID>
345 )))
346
347 [[image:image-20220531153219-17.png]]
348
349
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0