Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = 1.  Monitor Gateway =
9
10 == 1.1  Introduction ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15
16 [[image:image-20220531155018-18.png]]
17
18
19 == 1.2  Steps ==
20
21
22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
38
39
40 * change the script monitor_gateway.sh with properly users setting:
41
42 (% class="box infomessage" %)
43 (((
44 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
45 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
46 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
47 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
48 )))
49
50
51
52 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
53
54 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
55
56 (% class="box infomessage" %)
57 (((
58 # For details see man 4 crontabs
59 # Example of job definition:
60 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
61 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
62 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
63 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
64 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
65 # | | | | |
66 # * * * * * user-name command to be executed
67 #*/10 * * * *  checklog
68 ~* 23 * * *  /etc/init.d/auto_update start
69 */20 * * * *  /usr/bin/monitor_gateway.sh     
70 )))
71
72 * Reboot device.
73
74
75
76 == 1.3  Monitor Public IP ==
77
78
79 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
80
81 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
82
83
84 [[image:image-20220531145559-2.png]]
85
86 Find Public IP
87
88
89 = 2.  Remote Access =
90
91 = 2.1  Remote Access via Remote.it. =
92
93
94 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
95
96
97 (% style="color:red" %)**Important Notice:**
98
99 * Remote.it access will give full control of your device to remote support.
100 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
101 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
102 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
103
104 (% style="color:blue" %)**1. Install the Remote.it software**
105
106 Users can directly click** "Install"** on the Web UI to install Remote. it.
107
108
109 [[image:image-20220725134300-1.png||height="438" width="905"]]
110
111
112
113 (% style="color:blue" %)**2. Enter the license key**
114
115 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
116
117 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
118
119
120 (% class="box infomessage" %)
121 (((
122 **57F60715-606F-510D-A3D2-739860EBDB98**
123 )))
124
125 [[image:image-20220725113010-1.png||height="455" width="899"]]
126
127
128
129 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
130
131 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
132
133
134 [[image:image-20220725115720-2.png||height="658" width="900"]]
135
136
137
138 == 2.1.1  How to save the registered remote after the gateway's firmware update. ==
139
140
141 Before version [[lgw~~-~~-build-v5.4.1668240318-20221112-1606>>http://repo.dragino.com/release/miscellaneous/remoteit/dragino-lgw--v5.4.1668240318-squashfs-sysupgrade.bin]], once the gateway firmware is upgraded the remote configuration is gone.
142
143 This issue is now corrected:
144
145
146
147 === **The gateway version is lower than** **lgw~-~-build-v5.4.1668240318-20221112-1606:** ===
148
149
150 **~1. upload the [[backup file>>http://repo.dragino.com/release/miscellaneous/remoteit/backup.tar.gz]] to update the configuration.**
151
152 [[image:image-20221112162644-4.png]]
153
154
155
156 **2. Check the 'Preserver Settings' check box when you upgrade the gateway with the firmware. **
157
158 [[image:image-20221112162543-2.png]]
159
160
161
162 === **The gateway version is greater or equal to**  **lgw~-~-build-v5.4.1668240318-20221112-1606:** ===
163
164
165
166 **~1. Only to do: Check the 'Preserver Settings' check box when you upgrade the gateway with the firmware. **
167
168 [[image:image-20221112162547-3.png]]
169
170
171 == 2.1.2  How to register hp0d with Remote.it ==
172
173
174 **Prerequisites:**
175
176 Users must have an account and APP for remote.it
177
178 **[[https:~~/~~/app.remote.it>>https://app.remote.it]]**
179
180
181 === (% style="color:blue" %)**1.  Click "+" in the APP to add a device**(%%) ===
182
183
184 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
185
186
187 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
188
189
190
191 === (% style="color:blue" %)**2.  Copy the register device command**(%%) ===
192
193
194 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
195
196
197
198 === (% style="color:blue" %)**3.  Enter the command copied from the previous step on the HP0D Linux command line**(%%) ===
199
200
201 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
202
203
204
205 === (% style="color:blue" %)**4.  Check whether the device is successfully registered on the Remote.it APP**(%%) ===
206
207
208 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
209
210
211 == 2.1.3  How to register the gateway with Remote.it via SSH Access for Linux console ==
212
213
214 **Prerequisites:**
215
216 Users must have an account and APP for remote.it
217
218 **[[https:~~/~~/app.remote.it>>https://app.remote.it]]**
219
220 For detailed examples, please see: **[[OpenWrt How to Connect Guide (remote.it)>>url:https://www.remote.it/getting-started/openwrt]]**
221
222
223 === (% style="color:blue" %)**1.  Click "+" in the APP to add a device**(%%) ===
224
225
226 Then click Add "OpenWrt" and the APP will generate a command to register the device.
227
228 [[image:image-20230320110123-4.png||height="657" width="1191"]]
229
230
231 === (% style="color:blue" %)**2.  Copy the register device command**(%%) ===
232
233
234 [[image:image-20230320110309-5.png||height="635" width="1197"]]
235
236
237 === (% style="color:blue" %)**3.  Enter the command copied from the previous step on the gateway Linux command line**(%%) ===
238
239 === [[image:image-20230320105212-1.png||height="758" width="820"]] ===
240
241
242 === (% style="color:blue" %)**4.  Check whether the device is successfully registered on the Remote.it APP**(%%) ===
243
244
245 [[image:image-20230320112057-6.png||height="603" width="1135"]]
246
247
248 == 2.1.4  Trouble Shooting ==
249
250
251 === **1. What should users do when gateway Remote.it installation fails** ===
252
253
254 [[image:image-20220907162028-4.png||height="564" width="1148"]]
255
256
257 (% style="color:blue" %)**Step 1:  **(%%)Users can download the archive and upload it to the gateway:** [[attach:backup.tar.gz||target="_blank"]]**
258
259 [[image:image-20220907161050-2.png]]
260
261
262
263 (% style="color:blue" %)**Step 2:  **(%%)Back to the Remote.it screen, and click **"Install"** again.
264
265 [[image:image-20220907161352-3.png]]
266
267
268 (% style="color:blue" %)**Step 3:**(%%) Follow the [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]] steps to reconfigure
269
270
271
272 = 2.2  RSSH Introduction =
273
274
275 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
276
277 (% style="color:red" %)**Important Notice:**
278
279 (% class="box warningmessage" %)
280 (((
281 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
282 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
283 )))
284
285
286 **Below gateway support reverse SSH access:**
287
288 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
289 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
290 * LG02, OLG02
291 * LG308, DLOS8
292 * LPS8
293 * LIG16
294 * MS14 series if installed with the same firmware.
295
296
297
298 === 2.2.1  End User Guide to use SSH access ===
299
300
301 Go to this the Reverse SSH page as below:
302
303
304 [[image:image-20220531150151-3.png]]
305
306 Get the RSSH configure page
307
308
309
310 [[image:image-20220531150338-4.png]]
311
312 Connection OK.
313
314
315 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
316 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
317 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
318 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
319 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
320
321 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
322
323
324
325 === 2.2.2  Set Up RSSH Server ===
326
327
328 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
329
330
331
332 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
333
334
335 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
336
337 [[image:image-20220531150750-5.png]]
338
339
340 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
341
342 [[image:image-20220531150811-6.png]]
343
344
345 **Debug** :
346
347 (((
348 (% class="box" %)
349 (((
350 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
351 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
352 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
353 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
354 )))
355 )))
356
357 [[image:image-20220531151516-7.png]]
358
359
360 (((
361 (% class="box" %)
362 (((
363 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
364 please insatell sqlite3.
365 )))
366 )))
367
368 [[image:image-20220531151628-8.png]]
369
370
371 (% style="color:blue" %)**How to install Sqlit3:**
372
373 (% class="box infomessage" %)
374 (((
375 **~ Step 1:** Download the SQLit3 installation package
376 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
377
378 **Step 2: **tar the SQLit3 installation package
379 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
380
381 **Step 3:** Generate the makefile
382 cd sqlite-autoconf-3350300/;./configure
383
384 **Step 4:** Compile makefile
385 sudo make
386
387 **Step 5:** Install makefile
388 sudo make install
389
390 **Check:**
391 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
392 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
393
394 **debug:**
395 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
396 Please execute the command /sbin/ldconfig.
397 After that execute the command ./sqlite3 test.db again.
398 )))
399
400
401
402 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
403
404
405 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
406
407 user must enter the root account and run the following commands
408
409 (% class="box infomessage" %)
410 (((
411 **$ ./create_sqlite3_db.sh
412 $ ./rssh_serv -p  3721 2>&1 &
413 $ ps -ef | grep rssh_serv check 3721 port**
414 )))
415
416 [[image:image-20220531151958-10.png]]
417
418
419 **Debug:**
420
421 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
422 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
423 }}}
424
425 {{{ if fail to open dpvlry or to bind to it
426 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
427 }}}
428
429
430
431 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
432
433
434 (% class="box infomessage" %)
435 (((
436 **1):**  sudo useradd XXXXX (custom user name)
437 **2):**  sudo passwd xxxxxx
438 **3):**  cp /bin/bash /bin/rbash
439 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
440 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
441 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
442 )))
443
444 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
445
446
447
448 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
449
450
451 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
452
453
454 **Debug:**
455
456 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
457
458
459 === 2.2.3  How does user get the gateway to connect to a user's private server ===
460
461
462
463 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
464
465
466 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
467
468 [[image:image-20220531152419-11.png]]
469
470
471
472 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
473
474
475 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
476
477 [[image:image-20220531152549-12.png]]
478
479
480
481 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
482
483
484 This is same as connect Dragino Support Server but just change the server address to customize server address.
485
486 [[image:image-20220531152633-13.png]]
487
488
489
490 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
491
492
493 Rssh Host connection Ok
494
495 [[image:image-20220531152815-14.png]]
496
497
498 User can use common ps | grep ssh to check it in the gateway.
499
500 [[image:image-20220531152840-15.png]]
501
502
503
504 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
505
506
507 Check what gateways link to server.
508
509 (% class="box infomessage" %)
510 (((
511 **$ ./connect-gw.sh -l**
512 )))
513
514 [[image:image-20220531153016-16.png]]
515
516
517
518 Access the gateway
519
520 (% class="box infomessage" %)
521 (((
522 **$ ./connect-gw.sh <GWID>**
523 )))
524
525 [[image:image-20220531153219-17.png]]
526
527
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0