<
From version < 20.1 >
edited by Xiaoling
on 2022/07/14 15:06
To version < 19.20 >
edited by Xiaoling
on 2022/07/14 14:59
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -58,7 +58,6 @@
58 58  
59 59  Connection OK.
60 60  
61 -
62 62  * (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
63 63  * (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
64 64  * (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
... ... @@ -84,7 +84,7 @@
84 84  
85 85  (% class="box" %)
86 86  (((
87 -**$ ssh   -p <End User Host Port>   root@<Host Address>**
86 +$ ssh   -p <End User Host Port>   root@<Host Address>
88 88  )))
89 89  
90 90  (((
... ... @@ -99,32 +99,30 @@
99 99  
100 100  (% class="box" %)
101 101  (((
102 -**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
101 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
103 103  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
104 104  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
105 105  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
106 106  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
107 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
106 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
108 108  )))
109 109  
110 110  
111 111  == **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
112 112  
113 -
114 114  Below gateway support reverse SSH access:
115 115  
116 116  (% class="box" %)
117 117  (((
118 -**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
116 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
119 119  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
120 120  LG02, OLG02
121 121  LG308, DLOS8
122 122  LPS8
123 -LIG16**
121 +LIG16
124 124  )))
125 125  
126 126  
127 -
128 128  === **2.2.1  End User Guide to use SSH access** ===
129 129  
130 130  
... ... @@ -152,14 +152,14 @@
152 152  
153 153  (% class="box" %)
154 154  (((
155 -**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
156 -**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
152 +if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
153 +please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
157 157  )))
158 158  
159 159  (% class="box" %)
160 160  (((
161 -**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
162 -**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
158 +if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
159 +please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
163 163  )))
164 164  
165 165  [[image:image-20220527105856-3.png]]
... ... @@ -166,11 +166,10 @@
166 166  
167 167  lack of gcc
168 168  
169 -
170 170  (% class="box" %)
171 171  (((
172 -**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
173 -**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
168 +if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
169 +please insatell (% style="color:#4f81bd" %)**sqlite3**.
174 174  )))
175 175  
176 176  [[image:image-20220527105918-4.png]]
... ... @@ -238,8 +238,8 @@
238 238  
239 239  (% class="box" %)
240 240  (((
241 -**if fail to open dpvlry or to bind to it**
242 -**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
237 +if** fail to open dpvlry or to bind to it**
238 +please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
243 243  )))
244 244  
245 245  
... ... @@ -247,13 +247,13 @@
247 247  ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
248 248  
249 249  
250 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
246 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
251 251  
252 252  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
253 253  
254 254  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
255 255  
256 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
252 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ~-~-> Change /bin/bash to /bin/rbash
257 257  
258 258  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
259 259  
... ... @@ -270,7 +270,7 @@
270 270  ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
271 271  
272 272  
273 -**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
269 +**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**
274 274  
275 275  [[image:image-20220527110531-7.png]]
276 276  
... ... @@ -301,12 +301,12 @@
301 301  
302 302  (% class="box" %)
303 303  (((
304 -(% style="color:#4f81bd" %)**Connection Type **(%%) :  **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
300 +(% style="color:#4f81bd" %)**Connection Type **(%%) :  If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
305 305  (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
306 -(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
307 -(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
308 -(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
309 -**Click Save and then Connect**
302 +(% style="color:#4f81bd" %)**Login ID**(%%) :  Input user name "eg : "XXXXX"
303 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  Input user's private server address
304 +(% style="color:#4f81bd" %)**Connect at Startupt**(%%):  Choose to enable connect once device is powered.
305 +Click Save and then Connect
310 310  )))
311 311  
312 312  
... ... @@ -332,9 +332,8 @@
332 332  ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
333 333  
334 334  
335 -**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
331 +**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
336 336  
337 -
338 338  **Debug:**
339 339  
340 340  (% class="box" %)
... ... @@ -343,7 +343,6 @@
343 343  )))
344 344  
345 345  
346 -
347 347  === **2.2.3  How to Ser up a Reverse SSH access** ===
348 348  
349 349  
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0