<
From version < 23.7 >
edited by Xiaoling
on 2024/05/29 09:56
To version < 28.1 >
edited by kai
on 2024/08/14 15:57
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Xiaoling
1 +XWiki.kai
Content
... ... @@ -34,9 +34,9 @@
34 34  
35 35  c. After clicking to enter the policy configuration page, follow the clicking sequence below to go to the json configuration interface, and then fill in the following fields in the "statement" keyword:
36 36  
37 -(% data-sider-select-id="7bc0f6db-481d-435a-ad0c-92cf0ede3ea4" %)
38 -(% data-sider-select-id="8026a4d9-df91-4895-b9c5-3d6ac9b46012" %)**{**
39 39  
38 +**{**
39 +
40 40  **~ "Version": "2012-10-17",**
41 41  
42 42  **~ "Statement": [**
... ... @@ -99,9 +99,9 @@
99 99  
100 100  (% style="color:blue" %)**5. When you click to create things, the certificate download page will pop up**
101 101  
102 -(% data-sider-select-id="398c8d35-75ff-4077-85bb-9e0377efa186" %)
103 -(% data-sider-select-id="087aa6c7-c542-4afc-9ce6-291538c31764" %)**This certificate is very important.**(%%) After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 104  
103 +**This certificate is very important.** After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 +
105 105  Please download all the following certificates and put them in a folder.
106 106  
107 107  [[image:image-20240528173926-10.png]]
... ... @@ -114,9 +114,16 @@
114 114  
115 115  = 4. Connect to AWS using Dragino-NB device =
116 116  
117 -== 4.1 Upgrade the firmware to configure TTS firmware to set the certificate ==
118 118  
118 +(% id="cke_bm_37736S" style="color: red; display: none" %)** **(% style="color:red" %)**Note: **(%%)In order to avoid problems with certificate writing, you need to set the serial port assistant to automatically add a newline character when sending commands, if there is no such newline character, the certificate written will be invalid.(Using the serial port assistant as an example)
119 119  
120 +[[image:image-20240814155410-1.png||height="328" width="563"]]
121 +
122 +== 4.1 For -NB /-NS model ==
123 +
124 +=== 4.1.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
125 +
126 +
120 120  User can change device firmware to::
121 121  
122 122  * Update with new features.
... ... @@ -123,7 +123,7 @@
123 123  
124 124  * Fix bugs.
125 125  
126 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>url:https://www.dropbox.com/sh/sxrgszkac4ips0q/AAA7xVIHen982Nc0edNPaB-Wa/NB-IoT/Set%20up%20TLS%20certificate?dl=0&subfolder_nav_tracking=1||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
133 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
127 127  
128 128  Methods to Update Firmware:
129 129  
... ... @@ -131,19 +131,227 @@
131 131  
132 132  * Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
133 133  
141 +=== 4.1.2 Configure certificate ===
134 134  
135 135  
136 -== 4.2 Configure certificate ==
144 +After upgrade the firmware, the serial port displays as follows:
137 137  
146 +[[image:image-20240528174330-13.png||height="286" width="568"]]
138 138  
148 +
149 +==== 4.1.2.1  Configure CA certificate ====
150 +
151 +
152 +Please input the certificate in PEM format for the user.
153 +
154 +Use the AT command AT+CACERT as follows:
155 +
156 +AT+CACERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
157 +
158 +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
159 +
160 +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
161 +
162 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
163 +
164 +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
165 +
166 +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
167 +
168 +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
169 +
170 +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
171 +
172 +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
173 +
174 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L
175 +
176 +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
177 +
178 +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
179 +
180 +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA
181 +
182 +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
183 +
184 +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs
185 +
186 +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
187 +
188 +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
189 +
190 +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy
191 +
192 +rqXRfboQnoZsG4q5WTP468SQvvG5
193 +
194 +~-~-~-~--END CERTIFICATE~-~-~-~--}
195 +
196 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
197 +
198 +[[image:image-20240528174408-14.png]]
199 +
200 +
201 +After successful execution, as shown in the following figure.
202 +
203 +[[image:image-20240528174502-15.png]]
204 +
205 +Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
206 +
207 +
208 +==== 4.1.2.2 Configure client certificate ====
209 +
210 +
211 +Use the AT command AT+CLICERT as follows:
212 +
213 +AT+CLICERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
214 +
215 +MIIDWTCCAkGgAwIBAgIUYSpJUzfb4NTa76JJxd2th0fZA8swDQYJKoZIhvcNAQEL
216 +
217 +BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g
218 +
219 +SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTI0MDUyNDA4MDI0
220 +
221 +NVoXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0
222 +
223 +ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMTdc1GQLVBohAeCJD6n
224 +
225 +6WTFAFrygTch90a5wUr2bhlVuDxvEhEKNcmu5vOCo5agmfLWb2VCxgezgvQOBYQ8
226 +
227 +1oTqXJNdl4tS0DICfqb/ogVHWGHRao67XyhbPNBS0j/nCPTIIk6+/NBeYPOjaG+p
228 +
229 +utfXE7SGIEcc3RevkYkUJx6y+WH7MLjj1mufuXBVWIL1RrfrIRPw6auVk7dhS5rU
230 +
231 +NvYcJa7Qd6gpAh1DzPj7ZECrv7fEIIBDEsSYOy6ToWtzqGIVcIAHBDfORB0Hcm+N
232 +
233 +7wG3KDf61P4aWkLlkP5pRUaUIQdVblxginmx2K3n8t/WP7QcfITa191rjEVVBXmk
234 +
235 +ROsCAwEAAaNgMF4wHwYDVR0jBBgwFoAUs8Caohh1ZGP8kjSn3rtxJiJJ9IswHQYD
236 +
237 +VR0OBBYEFCjwGwqD7FG9UCNm3wjFQX4HixzfMAwGA1UdEwEB/wQCMAAwDgYDVR0P
238 +
239 +AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQBgqI49a4PBQZYrFM63TX3EHgdd
240 +
241 +N6Pj7AytjO+SrKNMCSo/OtIvhDTxOocr1vKrux1Tw5qmrllrIXLtlGtbmln5DS6a
242 +
243 +DTCLrjwcIFIabLxpx5DPY1WSMYvL04SW7d4Y+3SxOFNRotDSiomr8eIIac0d3HE2
244 +
245 +B5b0SnWZgWbrhjNUgvwo8l8tA9DOGIr2MeQ5kPjudOOiYSR3HC0v+jviBMV6VX8M
246 +
247 +LHVH3CRshHDKBGpV1NZ1RAm9EY/oRGtSiMsyjRh6hegC0vehwVxaC4w9qG0ASkzz
248 +
249 +42OOGfNqhYnYDiKTEIkazaoAFpTKDejWBaL7W5VpthUkQOl67IyX+ohuUKTo
250 +
251 +~-~-~-~--END CERTIFICATE~-~-~-~--}
252 +
253 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
254 +
255 +[[image:image-20240528174630-16.png||height="553" width="747"]]
256 +
257 +Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
258 +
259 +
260 +==== 4.1.2.3 Configure client private key ====
261 +
262 +
263 +Use the AT command AT+CLIKEY, as shown below
264 +
265 +AT+CLIKEY=~-~-~-~--BEGIN RSA PRIVATE KEY~-~-~-~--
266 +
267 +MIIEpAIBAAKCAQEAxN1zUZAtUGiEB4IkPqfpZMUAWvKBNyH3RrnBSvZuGVW4PG8S
268 +
269 +EQo1ya7m84KjlqCZ8tZvZULGB7OC9A4FhDzWhOpck12Xi1LQMgJ+pv+iBUdYYdFq
270 +
271 +jrtfKFs80FLSP+cI9MgiTr780F5g86Nob6m619cTtIYgRxzdF6+RiRQnHrL5Yfsw
272 +
273 +uOPWa5+5cFVYgvVGt+shE/Dpq5WTt2FLmtQ29hwlrtB3qCkCHUPM+PtkQKu/t8Qg
274 +
275 +gEMSxJg7LpOha3OoYhVwgAcEN85EHQdyb43vAbcoN/rU/hpaQuWQ/mlFRpQhB1Vu
276 +
277 +XGCKebHYrefy39Y/tBx8hNrX3WuMRVUFeaRE6wIDAQABAoIBAFhAOcjvjBDGuaEw
278 +
279 +CxV3al49HfqnSZuwg0xWSztSm2qKDcwxsnSnEhO2b1vsTW9h0YGV9Vv8gg/Dvkmv
280 +
281 +23M7XqM4+IUraJsRZbl1etdcM4KQSCOZoF4Zyv+pXuq4pf31kQNCkHaikWzLUkUG
282 +
283 +FPQxr0vA49mCYwfd/ZL3ppM/0IWmxRwloV1Gb9q8iDBUcJGSDokZnT7diUxzzOcd
284 +
285 ++UJ6xUhFq1v46Y7vO+73XROLv34JEBC0bIw2ErL6+AbzhHwb2mkuSccG9Ks37g3Z
286 +
287 +dyyjjj8hm1wvHWepuWqEssaiS3HD5zAsI0v85xS8RwNj3zLfd8o1WC666n3CO+ij
288 +
289 +VdRmR4kCgYEA+/sEFxpfaRomqcLwJebZcZH06U1RfJFfnbH2/Q6fANf8zNxwWs9A
290 +
291 +O+jyk/CLhHYRIk6VIOMQmWwEYgJ2eAHfw2Diwj4/0eqkGu+yZOS6KTCewxSV73vc
292 +
293 +SvACramJy4y6yEgDN5onwR1XqfVMfA0LzTcSupHR/xvrpf/gCsNFPxUCgYEAyAFd
294 +
295 +nMUhJFSq3pOogxA43aJSkA8YuDS3jpBkKQ6vx81APpIMabQauOxFDt488TZGP3Yy
296 +
297 +lhpa/lfFIgu2K7CgV4dUp+JtJJoZ/F+ExxUUzdqB4zxzWywAcc3RebfwP6qASwFT
298 +
299 +G3mXYci4tgNWR+k5CSsuLXDk/OT5uo5GeGAEc/8CgYEAk6V8uxDP8STKnNRFpN/E
300 +
301 +b6CHciDE64m/DgbWY2cq0fK9BUjxaLRhvfj8EqVzCrWnyoNjLHcAJfW+B7PLuPvY
302 +
303 +IoJlvE1/Vb/4UnQ7ApVnY3VCwaoRRNc9uIcz+pAJ1sRqOarAf9cLDkPkNwktvM5k
304 +
305 +KOXpSnrhIms4w/bPT18l9xUCgYBsAMDKbXEuK0JyGw5+Z/4tQQCQpnZU0rLkm3ha
306 +
307 +64FkxaORplBprEZZ4cyQ8NW78/EPSAadI/JLMp5TejuPcDvFyGCgoBcMEuNBc1tC
308 +
309 +HlIzr3FAgl5Qt3wt+FTMA9YKq0nINxjn10s2FKwaLccj4f9YwiaXh0VAg22PnlDT
310 +
311 +pBYDhQKBgQCMwyKXJ4zYiDRdvLvgKzeuKaU4KNQItHE4KORPfkecjPoENt4bKxDw
312 +
313 +2EdNFQLIoqBHL1s+/8+SzhCI31V7pkTs1AqCxDExJS7+8Z5NQFQIo/jooUo0N80E
314 +
315 +y3ZZS6OLOXXscEqhMogf1grfbabXM9OkgTIq43cPQHtMGQiFAtIJkg==
316 +
317 +~-~-~-~--END RSA PRIVATE KEY~-~-~-~--}
318 +
319 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
320 +
321 +[[image:image-20240528174702-17.png]]
322 +
323 +Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
324 +
325 +
326 +==== 4.1.2.4 Re-upgrade the firmware ====
327 +
328 +
329 +After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
330 +
331 +
332 +== 4.2  For -CB /-CS model ==
333 +
334 +=== 4.2.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
335 +
336 +
337 +User can change device firmware to::
338 +
339 +* Update with new features.
340 +
341 +* Fix bugs.
342 +
343 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/mk9u5ux3cfo94ke0s67ik/ADOIOdwIQfCO2WUZt0MxXyU?rlkey=7o6uaywrebbnsvuj4r0r694x6&st=smrmjj7t&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
344 +
345 +Methods to Update Firmware:
346 +
347 +* (Recommended way) OTA firmware update via BLE: [[**Instruction**>>url:http://wiki.dragino.com/xwiki/bin/view/Main/BLE_Firmware_Update_NB_Sensors_BC660K-GL/]].
348 +
349 +* Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
350 +
351 +=== 4.2.2 Configure certificate ===
352 +
353 +
139 139  After upgrade the firmware, the serial port displays as follows:
140 140  
141 -(% data-sider-select-id="8b6a9e23-dec0-476c-acd4-098aa19fe1f3" %)
142 142  [[image:image-20240528174330-13.png||height="286" width="568"]]
143 143  
144 144  
145 -=== 4.2.1 Configure CA certificate ===
359 +==== 4.2.2.1 Configure CA certificate ====
146 146  
361 +(% style="color:red" %)**Note:You should select one of the certificates.Either CA1 or CA3 can be used**
147 147  
148 148  Please input the certificate in PEM format for the user.
149 149  
... ... @@ -201,7 +201,7 @@
201 201  Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
202 202  
203 203  
204 -=== 4.2.2 Configure client certificate ===
419 +==== 4.2.2.2 Configure client certificate ====
205 205  
206 206  
207 207  Use the AT command AT+CLICERT as follows:
... ... @@ -253,7 +253,7 @@
253 253  Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
254 254  
255 255  
256 -=== 4.2.3 Configure client private key ===
471 +==== 4.2.2.3 Configure client private key ====
257 257  
258 258  
259 259  Use the AT command AT+CLIKEY, as shown below
... ... @@ -319,14 +319,25 @@
319 319  Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
320 320  
321 321  
322 -=== 4.3.3 Re-upgrade the firmware ===
537 +==== 4.2.2.4 For -CB /-CS model Certificate setting error/change certificate ====
323 323  
324 324  
325 -After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
540 +(% data-sider-select-id="7c5a8abc-e707-467b-ac02-db0a89098320" %)When you set the wrong certificate or you need to re-set another certificate.
541 +Please use the following three commands:
326 326  
543 +(% style="color:blue" %)**AT+DELCLIKEY}**
327 327  
328 -= 5. Configure draginoNB-device =
545 +(% style="color:blue" %)**AT+DELCLICERT}**
329 329  
547 +(% style="color:blue" %)**AT+DELCACERT}**(%%)
548 +(% style="color:blue" %)
549 +
550 +(% style="color:red" %)**Note: 1.When there is no certificate on the device, a deletion error will be displayed.
551 + 2.When the device already has a certificate, using the command to configure the certificate again will display a configuration error.**
552 +
553 +
554 += (% data-sider-select-id="6b5deb69-539b-42e1-a7bc-a300eb1fea73" %)5. Configure draginoNB-device(%%) =
555 +
330 330  == 5.1 Configure the data format sent by the device ==
331 331  
332 332  
... ... @@ -352,7 +352,7 @@
352 352  == 5.4 Set the TLS mode ==
353 353  
354 354  
355 -(% style="color:blue" %)**AT+TLSMOD=1,2**
581 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**AT+TLSMOD=1,2**
356 356  
357 357  To use the TLS mode certificate function, users need to configure the (% style="color:blue" %)**AT+TLSMOD**(%%) command.
358 358  
... ... @@ -363,9 +363,21 @@
363 363  (% style="color:blue" %)**AT+TLSMOD=1,2** (%%) ~/~/ Perform server and client authentication if requested by the remote server.(In AWS we recommend using this mode)
364 364  
365 365  
366 -Restart the device
592 +(% data-sider-select-id="f443b9bc-1195-4fe2-965d-7de84f78747f" %)
593 +== 5.5 Set the MQOS ==
367 367  
368 368  
596 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue; font-weight:bold" %)**AT+MQOS**(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**=XX (Depends on your server configuration)**
597 +
598 +Please find it in AWS's MQTT test client
599 +
600 +[[image:image-20240529164339-1.png||height="480" width="927"]]
601 +
602 +
603 +(% data-sider-select-id="fef22158-6e5e-46e4-b59e-fe457e562376" %)
604 +== 5.6 Restart the device ==
605 +
606 +
369 369  = 6. View data on AWS =
370 370  
371 371  == 6.1 Find MQTT test client in test ==
... ... @@ -386,5 +386,3 @@
386 386  [[image:image-20240528175133-19.png||height="563" width="1022"]]
387 387  
388 388  [[image:image-20240528175154-20.png||height="752" width="1042"]]
389 -
390 -
image-20240529164339-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Bei
Size
... ... @@ -1,0 +1,1 @@
1 +116.5 KB
Content
image-20240814155410-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.kai
Size
... ... @@ -1,0 +1,1 @@
1 +77.8 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0