<
From version < 24.1 >
edited by Bei Jinggeng
on 2024/05/29 16:43
To version < 24.7 >
edited by Xiaoling
on 2024/05/30 10:27
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Bei
1 +XWiki.Xiaoling
Content
... ... @@ -34,9 +34,9 @@
34 34  
35 35  c. After clicking to enter the policy configuration page, follow the clicking sequence below to go to the json configuration interface, and then fill in the following fields in the "statement" keyword:
36 36  
37 -(% data-sider-select-id="7bc0f6db-481d-435a-ad0c-92cf0ede3ea4" %)
38 -(% data-sider-select-id="8026a4d9-df91-4895-b9c5-3d6ac9b46012" %)**{**
39 39  
38 +**{**
39 +
40 40  **~ "Version": "2012-10-17",**
41 41  
42 42  **~ "Statement": [**
... ... @@ -99,9 +99,9 @@
99 99  
100 100  (% style="color:blue" %)**5. When you click to create things, the certificate download page will pop up**
101 101  
102 -(% data-sider-select-id="398c8d35-75ff-4077-85bb-9e0377efa186" %)
103 -(% data-sider-select-id="087aa6c7-c542-4afc-9ce6-291538c31764" %)**This certificate is very important.**(%%) After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 104  
103 +**This certificate is very important.** After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 +
105 105  Please download all the following certificates and put them in a folder.
106 106  
107 107  [[image:image-20240528173926-10.png]]
... ... @@ -114,9 +114,11 @@
114 114  
115 115  = 4. Connect to AWS using Dragino-NB device =
116 116  
117 -== 4.1 Upgrade the firmware to configure TTS firmware to set the certificate ==
117 +== 4.1 For -NB /-NS model ==
118 118  
119 +=== 4.1.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
119 119  
121 +
120 120  User can change device firmware to::
121 121  
122 122  * Update with new features.
... ... @@ -123,7 +123,7 @@
123 123  
124 124  * Fix bugs.
125 125  
126 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>url:https://www.dropbox.com/sh/sxrgszkac4ips0q/AAA7xVIHen982Nc0edNPaB-Wa/NB-IoT/Set%20up%20TLS%20certificate?dl=0&subfolder_nav_tracking=1||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
128 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
127 127  
128 128  Methods to Update Firmware:
129 129  
... ... @@ -133,16 +133,15 @@
133 133  
134 134  
135 135  
136 -== 4.2 Configure certificate ==
138 +=== 4.1.2 Configure certificate ===
137 137  
138 138  
139 139  After upgrade the firmware, the serial port displays as follows:
140 140  
141 -(% data-sider-select-id="8b6a9e23-dec0-476c-acd4-098aa19fe1f3" %)
142 142  [[image:image-20240528174330-13.png||height="286" width="568"]]
143 143  
144 144  
145 -=== 4.2.1 Configure CA certificate ===
146 +==== 4.1.2.1  Configure CA certificate ====
146 146  
147 147  
148 148  Please input the certificate in PEM format for the user.
... ... @@ -201,7 +201,7 @@
201 201  Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
202 202  
203 203  
204 -=== 4.2.2 Configure client certificate ===
205 +==== 4.1.2.2 Configure client certificate ====
205 205  
206 206  
207 207  Use the AT command AT+CLICERT as follows:
... ... @@ -253,7 +253,7 @@
253 253  Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
254 254  
255 255  
256 -=== 4.2.3 Configure client private key ===
257 +==== 4.1.2.3 Configure client private key ====
257 257  
258 258  
259 259  Use the AT command AT+CLIKEY, as shown below
... ... @@ -319,14 +319,236 @@
319 319  Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
320 320  
321 321  
322 -=== 4.3.3 Re-upgrade the firmware ===
323 +==== 4.1.2.4 Re-upgrade the firmware ====
323 323  
324 324  
325 325  After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
326 326  
327 327  
328 -= 5. Configure draginoNB-device =
329 +== 4.2  For -CB /-CS model ==
329 329  
331 +=== 4.2.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
332 +
333 +
334 +User can change device firmware to::
335 +
336 +* Update with new features.
337 +
338 +* Fix bugs.
339 +
340 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/mk9u5ux3cfo94ke0s67ik/ADOIOdwIQfCO2WUZt0MxXyU?rlkey=7o6uaywrebbnsvuj4r0r694x6&st=smrmjj7t&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
341 +
342 +Methods to Update Firmware:
343 +
344 +* (Recommended way) OTA firmware update via BLE: [[**Instruction**>>url:http://wiki.dragino.com/xwiki/bin/view/Main/BLE_Firmware_Update_NB_Sensors_BC660K-GL/]].
345 +
346 +* Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
347 +
348 +
349 +=== 4.2.2 Configure certificate ===
350 +
351 +
352 +After upgrade the firmware, the serial port displays as follows:
353 +
354 +[[image:image-20240528174330-13.png||height="286" width="568"]]
355 +
356 +
357 +==== 4.2.2.1 Configure CA certificate ====
358 +
359 +
360 +Please input the certificate in PEM format for the user.
361 +
362 +Use the AT command AT+CACERT as follows:
363 +
364 +AT+CACERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
365 +
366 +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
367 +
368 +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
369 +
370 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
371 +
372 +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
373 +
374 +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
375 +
376 +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
377 +
378 +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
379 +
380 +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
381 +
382 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L
383 +
384 +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
385 +
386 +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
387 +
388 +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA
389 +
390 +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
391 +
392 +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs
393 +
394 +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
395 +
396 +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
397 +
398 +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy
399 +
400 +rqXRfboQnoZsG4q5WTP468SQvvG5
401 +
402 +~-~-~-~--END CERTIFICATE~-~-~-~--}
403 +
404 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
405 +
406 +[[image:image-20240528174408-14.png]]
407 +
408 +
409 +After successful execution, as shown in the following figure.
410 +
411 +[[image:image-20240528174502-15.png]]
412 +
413 +Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
414 +
415 +
416 +==== 4.2.2.2 Configure client certificate ====
417 +
418 +
419 +Use the AT command AT+CLICERT as follows:
420 +
421 +AT+CLICERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
422 +
423 +MIIDWTCCAkGgAwIBAgIUYSpJUzfb4NTa76JJxd2th0fZA8swDQYJKoZIhvcNAQEL
424 +
425 +BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g
426 +
427 +SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTI0MDUyNDA4MDI0
428 +
429 +NVoXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0
430 +
431 +ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMTdc1GQLVBohAeCJD6n
432 +
433 +6WTFAFrygTch90a5wUr2bhlVuDxvEhEKNcmu5vOCo5agmfLWb2VCxgezgvQOBYQ8
434 +
435 +1oTqXJNdl4tS0DICfqb/ogVHWGHRao67XyhbPNBS0j/nCPTIIk6+/NBeYPOjaG+p
436 +
437 +utfXE7SGIEcc3RevkYkUJx6y+WH7MLjj1mufuXBVWIL1RrfrIRPw6auVk7dhS5rU
438 +
439 +NvYcJa7Qd6gpAh1DzPj7ZECrv7fEIIBDEsSYOy6ToWtzqGIVcIAHBDfORB0Hcm+N
440 +
441 +7wG3KDf61P4aWkLlkP5pRUaUIQdVblxginmx2K3n8t/WP7QcfITa191rjEVVBXmk
442 +
443 +ROsCAwEAAaNgMF4wHwYDVR0jBBgwFoAUs8Caohh1ZGP8kjSn3rtxJiJJ9IswHQYD
444 +
445 +VR0OBBYEFCjwGwqD7FG9UCNm3wjFQX4HixzfMAwGA1UdEwEB/wQCMAAwDgYDVR0P
446 +
447 +AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQBgqI49a4PBQZYrFM63TX3EHgdd
448 +
449 +N6Pj7AytjO+SrKNMCSo/OtIvhDTxOocr1vKrux1Tw5qmrllrIXLtlGtbmln5DS6a
450 +
451 +DTCLrjwcIFIabLxpx5DPY1WSMYvL04SW7d4Y+3SxOFNRotDSiomr8eIIac0d3HE2
452 +
453 +B5b0SnWZgWbrhjNUgvwo8l8tA9DOGIr2MeQ5kPjudOOiYSR3HC0v+jviBMV6VX8M
454 +
455 +LHVH3CRshHDKBGpV1NZ1RAm9EY/oRGtSiMsyjRh6hegC0vehwVxaC4w9qG0ASkzz
456 +
457 +42OOGfNqhYnYDiKTEIkazaoAFpTKDejWBaL7W5VpthUkQOl67IyX+ohuUKTo
458 +
459 +~-~-~-~--END CERTIFICATE~-~-~-~--}
460 +
461 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
462 +
463 +[[image:image-20240528174630-16.png||height="553" width="747"]]
464 +
465 +Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
466 +
467 +
468 +==== 4.2.2.3 Configure client private key ====
469 +
470 +
471 +Use the AT command AT+CLIKEY, as shown below
472 +
473 +AT+CLIKEY=~-~-~-~--BEGIN RSA PRIVATE KEY~-~-~-~--
474 +
475 +MIIEpAIBAAKCAQEAxN1zUZAtUGiEB4IkPqfpZMUAWvKBNyH3RrnBSvZuGVW4PG8S
476 +
477 +EQo1ya7m84KjlqCZ8tZvZULGB7OC9A4FhDzWhOpck12Xi1LQMgJ+pv+iBUdYYdFq
478 +
479 +jrtfKFs80FLSP+cI9MgiTr780F5g86Nob6m619cTtIYgRxzdF6+RiRQnHrL5Yfsw
480 +
481 +uOPWa5+5cFVYgvVGt+shE/Dpq5WTt2FLmtQ29hwlrtB3qCkCHUPM+PtkQKu/t8Qg
482 +
483 +gEMSxJg7LpOha3OoYhVwgAcEN85EHQdyb43vAbcoN/rU/hpaQuWQ/mlFRpQhB1Vu
484 +
485 +XGCKebHYrefy39Y/tBx8hNrX3WuMRVUFeaRE6wIDAQABAoIBAFhAOcjvjBDGuaEw
486 +
487 +CxV3al49HfqnSZuwg0xWSztSm2qKDcwxsnSnEhO2b1vsTW9h0YGV9Vv8gg/Dvkmv
488 +
489 +23M7XqM4+IUraJsRZbl1etdcM4KQSCOZoF4Zyv+pXuq4pf31kQNCkHaikWzLUkUG
490 +
491 +FPQxr0vA49mCYwfd/ZL3ppM/0IWmxRwloV1Gb9q8iDBUcJGSDokZnT7diUxzzOcd
492 +
493 ++UJ6xUhFq1v46Y7vO+73XROLv34JEBC0bIw2ErL6+AbzhHwb2mkuSccG9Ks37g3Z
494 +
495 +dyyjjj8hm1wvHWepuWqEssaiS3HD5zAsI0v85xS8RwNj3zLfd8o1WC666n3CO+ij
496 +
497 +VdRmR4kCgYEA+/sEFxpfaRomqcLwJebZcZH06U1RfJFfnbH2/Q6fANf8zNxwWs9A
498 +
499 +O+jyk/CLhHYRIk6VIOMQmWwEYgJ2eAHfw2Diwj4/0eqkGu+yZOS6KTCewxSV73vc
500 +
501 +SvACramJy4y6yEgDN5onwR1XqfVMfA0LzTcSupHR/xvrpf/gCsNFPxUCgYEAyAFd
502 +
503 +nMUhJFSq3pOogxA43aJSkA8YuDS3jpBkKQ6vx81APpIMabQauOxFDt488TZGP3Yy
504 +
505 +lhpa/lfFIgu2K7CgV4dUp+JtJJoZ/F+ExxUUzdqB4zxzWywAcc3RebfwP6qASwFT
506 +
507 +G3mXYci4tgNWR+k5CSsuLXDk/OT5uo5GeGAEc/8CgYEAk6V8uxDP8STKnNRFpN/E
508 +
509 +b6CHciDE64m/DgbWY2cq0fK9BUjxaLRhvfj8EqVzCrWnyoNjLHcAJfW+B7PLuPvY
510 +
511 +IoJlvE1/Vb/4UnQ7ApVnY3VCwaoRRNc9uIcz+pAJ1sRqOarAf9cLDkPkNwktvM5k
512 +
513 +KOXpSnrhIms4w/bPT18l9xUCgYBsAMDKbXEuK0JyGw5+Z/4tQQCQpnZU0rLkm3ha
514 +
515 +64FkxaORplBprEZZ4cyQ8NW78/EPSAadI/JLMp5TejuPcDvFyGCgoBcMEuNBc1tC
516 +
517 +HlIzr3FAgl5Qt3wt+FTMA9YKq0nINxjn10s2FKwaLccj4f9YwiaXh0VAg22PnlDT
518 +
519 +pBYDhQKBgQCMwyKXJ4zYiDRdvLvgKzeuKaU4KNQItHE4KORPfkecjPoENt4bKxDw
520 +
521 +2EdNFQLIoqBHL1s+/8+SzhCI31V7pkTs1AqCxDExJS7+8Z5NQFQIo/jooUo0N80E
522 +
523 +y3ZZS6OLOXXscEqhMogf1grfbabXM9OkgTIq43cPQHtMGQiFAtIJkg==
524 +
525 +~-~-~-~--END RSA PRIVATE KEY~-~-~-~--}
526 +
527 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
528 +
529 +[[image:image-20240528174702-17.png]]
530 +
531 +Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
532 +
533 +
534 +==== 4.2.2.4 For -CB /-CS model Certificate setting error/change certificate ====
535 +
536 +
537 +(% data-sider-select-id="7c5a8abc-e707-467b-ac02-db0a89098320" %)When you set the wrong certificate or you need to re-set another certificate.
538 +Please use the following three commands:
539 +
540 +(% style="color:blue" %)**AT+DELCLIKEY}**
541 +
542 +(% style="color:blue" %)**AT+DELCLICERT}**
543 +
544 +(% style="color:blue" %)**AT+DELCACERT}**(%%)
545 +(% style="color:blue" %)
546 +
547 +(% style="color:red" %)**Note: 1.When there is no certificate on the device, a deletion error will be displayed.
548 + 2.When the device already has a certificate, using the command to configure the certificate again will display a configuration error.**
549 +
550 +
551 += (% data-sider-select-id="6b5deb69-539b-42e1-a7bc-a300eb1fea73" %)5. Configure draginoNB-device(%%) =
552 +
330 330  == 5.1 Configure the data format sent by the device ==
331 331  
332 332  
... ... @@ -352,7 +352,7 @@
352 352  == 5.4 Set the TLS mode ==
353 353  
354 354  
355 -(% style="color:blue" %)**AT+TLSMOD=1,2**
578 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**AT+TLSMOD=1,2**
356 356  
357 357  To use the TLS mode certificate function, users need to configure the (% style="color:blue" %)**AT+TLSMOD**(%%) command.
358 358  
... ... @@ -363,9 +363,21 @@
363 363  (% style="color:blue" %)**AT+TLSMOD=1,2** (%%) ~/~/ Perform server and client authentication if requested by the remote server.(In AWS we recommend using this mode)
364 364  
365 365  
366 -Restart the device
589 +(% data-sider-select-id="f443b9bc-1195-4fe2-965d-7de84f78747f" %)
590 +== 5.5 Set the MQOS ==
367 367  
368 368  
593 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue; font-weight:bold" %)**AT+MQOS**(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**=XX (Depends on your server configuration)**
594 +
595 +Please find it in AWS's MQTT test client
596 +
597 +[[image:image-20240529164339-1.png||height="480" width="927"]]
598 +
599 +
600 +(% data-sider-select-id="fef22158-6e5e-46e4-b59e-fe457e562376" %)
601 +== 5.6 Restart the device ==
602 +
603 +
369 369  = 6. View data on AWS =
370 370  
371 371  == 6.1 Find MQTT test client in test ==
... ... @@ -386,5 +386,3 @@
386 386  [[image:image-20240528175133-19.png||height="563" width="1022"]]
387 387  
388 388  [[image:image-20240528175154-20.png||height="752" width="1042"]]
389 -
390 -
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0