Changes for page Dragino NB device connection to AWS platform instructions
Last modified by Mengting Qiu on 2025/03/06 13:42
Summary
-
Page properties (2 modified, 0 added, 0 removed)
-
Attachments (0 modified, 2 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Xiaoling1 +XWiki.kai - Content
-
... ... @@ -34,9 +34,9 @@ 34 34 35 35 c. After clicking to enter the policy configuration page, follow the clicking sequence below to go to the json configuration interface, and then fill in the following fields in the "statement" keyword: 36 36 37 -(% data-sider-select-id="7bc0f6db-481d-435a-ad0c-92cf0ede3ea4" %) 38 -(% data-sider-select-id="8026a4d9-df91-4895-b9c5-3d6ac9b46012" %)**{** 39 39 38 +**{** 39 + 40 40 **~ "Version": "2012-10-17",** 41 41 42 42 **~ "Statement": [** ... ... @@ -99,9 +99,9 @@ 99 99 100 100 (% style="color:blue" %)**5. When you click to create things, the certificate download page will pop up** 101 101 102 -(% data-sider-select-id="398c8d35-75ff-4077-85bb-9e0377efa186" %) 103 -(% data-sider-select-id="087aa6c7-c542-4afc-9ce6-291538c31764" %)**This certificate is very important.**(%%) After creating the device, you must download the certificate of the device so that our NB device can connect normally. 104 104 103 +**This certificate is very important.** After creating the device, you must download the certificate of the device so that our NB device can connect normally. 104 + 105 105 Please download all the following certificates and put them in a folder. 106 106 107 107 [[image:image-20240528173926-10.png]] ... ... @@ -114,9 +114,16 @@ 114 114 115 115 = 4. Connect to AWS using Dragino-NB device = 116 116 117 -== 4.1 Upgrade the firmware to configure TTS firmware to set the certificate == 118 118 118 +(% id="cke_bm_37736S" style="color: red; display: none" %)** **(% style="color:red" %)**Note: **(%%)In order to avoid problems with certificate writing, you need to set the serial port assistant to automatically add a newline character when sending commands, if there is no such newline character, the certificate written will be invalid.(Using the serial port assistant as an example) 119 119 120 +[[image:image-20240814155410-1.png||height="328" width="563"]] 121 + 122 +== 4.1 For -NB /-NS model == 123 + 124 +=== 4.1.1 Upgrade the firmware to configure TTS firmware to set the certificate === 125 + 126 + 120 120 User can change device firmware to:: 121 121 122 122 * Update with new features. ... ... @@ -123,7 +123,7 @@ 123 123 124 124 * Fix bugs. 125 125 126 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>> url:https://www.dropbox.com/sh/sxrgszkac4ips0q/AAA7xVIHen982Nc0edNPaB-Wa/NB-IoT/Set%20up%20TLS%20certificate?dl=0&subfolder_nav_tracking=1||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**133 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]** 127 127 128 128 Methods to Update Firmware: 129 129 ... ... @@ -131,19 +131,227 @@ 131 131 132 132 * Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 133 133 141 +=== 4.1.2 Configure certificate === 134 134 135 135 136 - ==4.2Configurecertificate==144 +After upgrade the firmware, the serial port displays as follows: 137 137 146 +[[image:image-20240528174330-13.png||height="286" width="568"]] 138 138 148 + 149 +==== 4.1.2.1 Configure CA certificate ==== 150 + 151 + 152 +Please input the certificate in PEM format for the user. 153 + 154 +Use the AT command AT+CACERT as follows: 155 + 156 +AT+CACERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~-- 157 + 158 +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF 159 + 160 +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 161 + 162 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL 163 + 164 +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv 165 + 166 +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj 167 + 168 +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM 169 + 170 +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw 171 + 172 +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 173 + 174 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L 175 + 176 +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm 177 + 178 +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC 179 + 180 +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA 181 + 182 +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI 183 + 184 +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs 185 + 186 +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv 187 + 188 +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU 189 + 190 +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy 191 + 192 +rqXRfboQnoZsG4q5WTP468SQvvG5 193 + 194 +~-~-~-~--END CERTIFICATE~-~-~-~--} 195 + 196 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.** 197 + 198 +[[image:image-20240528174408-14.png]] 199 + 200 + 201 +After successful execution, as shown in the following figure. 202 + 203 +[[image:image-20240528174502-15.png]] 204 + 205 +Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 206 + 207 + 208 +==== 4.1.2.2 Configure client certificate ==== 209 + 210 + 211 +Use the AT command AT+CLICERT as follows: 212 + 213 +AT+CLICERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~-- 214 + 215 +MIIDWTCCAkGgAwIBAgIUYSpJUzfb4NTa76JJxd2th0fZA8swDQYJKoZIhvcNAQEL 216 + 217 +BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g 218 + 219 +SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTI0MDUyNDA4MDI0 220 + 221 +NVoXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0 222 + 223 +ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMTdc1GQLVBohAeCJD6n 224 + 225 +6WTFAFrygTch90a5wUr2bhlVuDxvEhEKNcmu5vOCo5agmfLWb2VCxgezgvQOBYQ8 226 + 227 +1oTqXJNdl4tS0DICfqb/ogVHWGHRao67XyhbPNBS0j/nCPTIIk6+/NBeYPOjaG+p 228 + 229 +utfXE7SGIEcc3RevkYkUJx6y+WH7MLjj1mufuXBVWIL1RrfrIRPw6auVk7dhS5rU 230 + 231 +NvYcJa7Qd6gpAh1DzPj7ZECrv7fEIIBDEsSYOy6ToWtzqGIVcIAHBDfORB0Hcm+N 232 + 233 +7wG3KDf61P4aWkLlkP5pRUaUIQdVblxginmx2K3n8t/WP7QcfITa191rjEVVBXmk 234 + 235 +ROsCAwEAAaNgMF4wHwYDVR0jBBgwFoAUs8Caohh1ZGP8kjSn3rtxJiJJ9IswHQYD 236 + 237 +VR0OBBYEFCjwGwqD7FG9UCNm3wjFQX4HixzfMAwGA1UdEwEB/wQCMAAwDgYDVR0P 238 + 239 +AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQBgqI49a4PBQZYrFM63TX3EHgdd 240 + 241 +N6Pj7AytjO+SrKNMCSo/OtIvhDTxOocr1vKrux1Tw5qmrllrIXLtlGtbmln5DS6a 242 + 243 +DTCLrjwcIFIabLxpx5DPY1WSMYvL04SW7d4Y+3SxOFNRotDSiomr8eIIac0d3HE2 244 + 245 +B5b0SnWZgWbrhjNUgvwo8l8tA9DOGIr2MeQ5kPjudOOiYSR3HC0v+jviBMV6VX8M 246 + 247 +LHVH3CRshHDKBGpV1NZ1RAm9EY/oRGtSiMsyjRh6hegC0vehwVxaC4w9qG0ASkzz 248 + 249 +42OOGfNqhYnYDiKTEIkazaoAFpTKDejWBaL7W5VpthUkQOl67IyX+ohuUKTo 250 + 251 +~-~-~-~--END CERTIFICATE~-~-~-~--} 252 + 253 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.** 254 + 255 +[[image:image-20240528174630-16.png||height="553" width="747"]] 256 + 257 +Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed. 258 + 259 + 260 +==== 4.1.2.3 Configure client private key ==== 261 + 262 + 263 +Use the AT command AT+CLIKEY, as shown below 264 + 265 +AT+CLIKEY=~-~-~-~--BEGIN RSA PRIVATE KEY~-~-~-~-- 266 + 267 +MIIEpAIBAAKCAQEAxN1zUZAtUGiEB4IkPqfpZMUAWvKBNyH3RrnBSvZuGVW4PG8S 268 + 269 +EQo1ya7m84KjlqCZ8tZvZULGB7OC9A4FhDzWhOpck12Xi1LQMgJ+pv+iBUdYYdFq 270 + 271 +jrtfKFs80FLSP+cI9MgiTr780F5g86Nob6m619cTtIYgRxzdF6+RiRQnHrL5Yfsw 272 + 273 +uOPWa5+5cFVYgvVGt+shE/Dpq5WTt2FLmtQ29hwlrtB3qCkCHUPM+PtkQKu/t8Qg 274 + 275 +gEMSxJg7LpOha3OoYhVwgAcEN85EHQdyb43vAbcoN/rU/hpaQuWQ/mlFRpQhB1Vu 276 + 277 +XGCKebHYrefy39Y/tBx8hNrX3WuMRVUFeaRE6wIDAQABAoIBAFhAOcjvjBDGuaEw 278 + 279 +CxV3al49HfqnSZuwg0xWSztSm2qKDcwxsnSnEhO2b1vsTW9h0YGV9Vv8gg/Dvkmv 280 + 281 +23M7XqM4+IUraJsRZbl1etdcM4KQSCOZoF4Zyv+pXuq4pf31kQNCkHaikWzLUkUG 282 + 283 +FPQxr0vA49mCYwfd/ZL3ppM/0IWmxRwloV1Gb9q8iDBUcJGSDokZnT7diUxzzOcd 284 + 285 ++UJ6xUhFq1v46Y7vO+73XROLv34JEBC0bIw2ErL6+AbzhHwb2mkuSccG9Ks37g3Z 286 + 287 +dyyjjj8hm1wvHWepuWqEssaiS3HD5zAsI0v85xS8RwNj3zLfd8o1WC666n3CO+ij 288 + 289 +VdRmR4kCgYEA+/sEFxpfaRomqcLwJebZcZH06U1RfJFfnbH2/Q6fANf8zNxwWs9A 290 + 291 +O+jyk/CLhHYRIk6VIOMQmWwEYgJ2eAHfw2Diwj4/0eqkGu+yZOS6KTCewxSV73vc 292 + 293 +SvACramJy4y6yEgDN5onwR1XqfVMfA0LzTcSupHR/xvrpf/gCsNFPxUCgYEAyAFd 294 + 295 +nMUhJFSq3pOogxA43aJSkA8YuDS3jpBkKQ6vx81APpIMabQauOxFDt488TZGP3Yy 296 + 297 +lhpa/lfFIgu2K7CgV4dUp+JtJJoZ/F+ExxUUzdqB4zxzWywAcc3RebfwP6qASwFT 298 + 299 +G3mXYci4tgNWR+k5CSsuLXDk/OT5uo5GeGAEc/8CgYEAk6V8uxDP8STKnNRFpN/E 300 + 301 +b6CHciDE64m/DgbWY2cq0fK9BUjxaLRhvfj8EqVzCrWnyoNjLHcAJfW+B7PLuPvY 302 + 303 +IoJlvE1/Vb/4UnQ7ApVnY3VCwaoRRNc9uIcz+pAJ1sRqOarAf9cLDkPkNwktvM5k 304 + 305 +KOXpSnrhIms4w/bPT18l9xUCgYBsAMDKbXEuK0JyGw5+Z/4tQQCQpnZU0rLkm3ha 306 + 307 +64FkxaORplBprEZZ4cyQ8NW78/EPSAadI/JLMp5TejuPcDvFyGCgoBcMEuNBc1tC 308 + 309 +HlIzr3FAgl5Qt3wt+FTMA9YKq0nINxjn10s2FKwaLccj4f9YwiaXh0VAg22PnlDT 310 + 311 +pBYDhQKBgQCMwyKXJ4zYiDRdvLvgKzeuKaU4KNQItHE4KORPfkecjPoENt4bKxDw 312 + 313 +2EdNFQLIoqBHL1s+/8+SzhCI31V7pkTs1AqCxDExJS7+8Z5NQFQIo/jooUo0N80E 314 + 315 +y3ZZS6OLOXXscEqhMogf1grfbabXM9OkgTIq43cPQHtMGQiFAtIJkg== 316 + 317 +~-~-~-~--END RSA PRIVATE KEY~-~-~-~--} 318 + 319 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.** 320 + 321 +[[image:image-20240528174702-17.png]] 322 + 323 +Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 324 + 325 + 326 +==== 4.1.2.4 Re-upgrade the firmware ==== 327 + 328 + 329 +After the certificate configuration is completed, Re-upgrade to the firmware you originally used. 330 + 331 + 332 +== 4.2 For -CB /-CS model == 333 + 334 +=== 4.2.1 Upgrade the firmware to configure TTS firmware to set the certificate === 335 + 336 + 337 +User can change device firmware to:: 338 + 339 +* Update with new features. 340 + 341 +* Fix bugs. 342 + 343 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/mk9u5ux3cfo94ke0s67ik/ADOIOdwIQfCO2WUZt0MxXyU?rlkey=7o6uaywrebbnsvuj4r0r694x6&st=smrmjj7t&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]** 344 + 345 +Methods to Update Firmware: 346 + 347 +* (Recommended way) OTA firmware update via BLE: [[**Instruction**>>url:http://wiki.dragino.com/xwiki/bin/view/Main/BLE_Firmware_Update_NB_Sensors_BC660K-GL/]]. 348 + 349 +* Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 350 + 351 +=== 4.2.2 Configure certificate === 352 + 353 + 139 139 After upgrade the firmware, the serial port displays as follows: 140 140 141 -(% data-sider-select-id="8b6a9e23-dec0-476c-acd4-098aa19fe1f3" %) 142 142 [[image:image-20240528174330-13.png||height="286" width="568"]] 143 143 144 144 145 -=== 4.2.1 Configure CA certificate === 359 +==== 4.2.2.1 Configure CA certificate ==== 146 146 361 +(% style="color:red" %)**Note:You should select one of the certificates.Either CA1 or CA3 can be used** 147 147 148 148 Please input the certificate in PEM format for the user. 149 149 ... ... @@ -201,7 +201,7 @@ 201 201 Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 202 202 203 203 204 -=== 4.2.2 Configure client certificate === 419 +==== 4.2.2.2 Configure client certificate ==== 205 205 206 206 207 207 Use the AT command AT+CLICERT as follows: ... ... @@ -253,7 +253,7 @@ 253 253 Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed. 254 254 255 255 256 -=== 4.2.3 Configure client private key === 471 +==== 4.2.2.3 Configure client private key ==== 257 257 258 258 259 259 Use the AT command AT+CLIKEY, as shown below ... ... @@ -319,14 +319,25 @@ 319 319 Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 320 320 321 321 322 -=== 4. 3.3 Re-upgrade the firmware ===537 +==== 4.2.2.4 For -CB /-CS model Certificate setting error/change certificate ==== 323 323 324 324 325 -After the certificate configuration is completed, Re-upgrade to the firmware you originally used. 540 +(% data-sider-select-id="7c5a8abc-e707-467b-ac02-db0a89098320" %)When you set the wrong certificate or you need to re-set another certificate. 541 +Please use the following three commands: 326 326 543 +(% style="color:blue" %)**AT+DELCLIKEY}** 327 327 328 - =5. ConfiguredraginoNB-device =545 +(% style="color:blue" %)**AT+DELCLICERT}** 329 329 547 +(% style="color:blue" %)**AT+DELCACERT}**(%%) 548 +(% style="color:blue" %) 549 + 550 +(% style="color:red" %)**Note: 1.When there is no certificate on the device, a deletion error will be displayed. 551 + 2.When the device already has a certificate, using the command to configure the certificate again will display a configuration error.** 552 + 553 + 554 += (% data-sider-select-id="6b5deb69-539b-42e1-a7bc-a300eb1fea73" %)5. Configure draginoNB-device(%%) = 555 + 330 330 == 5.1 Configure the data format sent by the device == 331 331 332 332 ... ... @@ -352,7 +352,7 @@ 352 352 == 5.4 Set the TLS mode == 353 353 354 354 355 -(% style="color:blue" %)**AT+TLSMOD=1,2** 581 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**AT+TLSMOD=1,2** 356 356 357 357 To use the TLS mode certificate function, users need to configure the (% style="color:blue" %)**AT+TLSMOD**(%%) command. 358 358 ... ... @@ -363,9 +363,21 @@ 363 363 (% style="color:blue" %)**AT+TLSMOD=1,2** (%%) ~/~/ Perform server and client authentication if requested by the remote server.(In AWS we recommend using this mode) 364 364 365 365 366 -Restart the device 592 +(% data-sider-select-id="f443b9bc-1195-4fe2-965d-7de84f78747f" %) 593 +== 5.5 Set the MQOS == 367 367 368 368 596 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue; font-weight:bold" %)**AT+MQOS**(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**=XX (Depends on your server configuration)** 597 + 598 +Please find it in AWS's MQTT test client 599 + 600 +[[image:image-20240529164339-1.png||height="480" width="927"]] 601 + 602 + 603 +(% data-sider-select-id="fef22158-6e5e-46e4-b59e-fe457e562376" %) 604 +== 5.6 Restart the device == 605 + 606 + 369 369 = 6. View data on AWS = 370 370 371 371 == 6.1 Find MQTT test client in test == ... ... @@ -386,5 +386,3 @@ 386 386 [[image:image-20240528175133-19.png||height="563" width="1022"]] 387 387 388 388 [[image:image-20240528175154-20.png||height="752" width="1042"]] 389 - 390 -
- image-20240529164339-1.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.Bei - Size
-
... ... @@ -1,0 +1,1 @@ 1 +116.5 KB - Content
- image-20240814155410-1.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.kai - Size
-
... ... @@ -1,0 +1,1 @@ 1 +77.8 KB - Content