<
From version < 24.1 >
edited by Bei Jinggeng
on 2024/05/29 16:43
To version < 31.1 >
edited by Mengting Qiu
on 2024/08/22 09:06
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Bei
1 +XWiki.ting
Content
... ... @@ -34,9 +34,9 @@
34 34  
35 35  c. After clicking to enter the policy configuration page, follow the clicking sequence below to go to the json configuration interface, and then fill in the following fields in the "statement" keyword:
36 36  
37 -(% data-sider-select-id="7bc0f6db-481d-435a-ad0c-92cf0ede3ea4" %)
38 -(% data-sider-select-id="8026a4d9-df91-4895-b9c5-3d6ac9b46012" %)**{**
39 39  
38 +**{**
39 +
40 40  **~ "Version": "2012-10-17",**
41 41  
42 42  **~ "Statement": [**
... ... @@ -99,9 +99,9 @@
99 99  
100 100  (% style="color:blue" %)**5. When you click to create things, the certificate download page will pop up**
101 101  
102 -(% data-sider-select-id="398c8d35-75ff-4077-85bb-9e0377efa186" %)
103 -(% data-sider-select-id="087aa6c7-c542-4afc-9ce6-291538c31764" %)**This certificate is very important.**(%%) After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 104  
103 +**This certificate is very important.** After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 +
105 105  Please download all the following certificates and put them in a folder.
106 106  
107 107  [[image:image-20240528173926-10.png]]
... ... @@ -114,9 +114,17 @@
114 114  
115 115  = 4. Connect to AWS using Dragino-NB device =
116 116  
117 -== 4.1 Upgrade the firmware to configure TTS firmware to set the certificate ==
118 118  
118 +(% id="cke_bm_37736S" style="color:red; display:none" %)** **(% style="color:red" %)**Note: **(%%)In order to avoid problems with certificate writing, you need to set the serial port assistant to automatically add a newline character when sending commands, if there is no such newline character, the certificate written will be invalid.(Using the serial port assistant as an example)
119 119  
120 +[[image:image-20240822090554-1.png||height="501" width="656"]]
121 +
122 +
123 +== 4.1 For -NB /-NS model ==
124 +
125 +=== 4.1.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
126 +
127 +
120 120  User can change device firmware to::
121 121  
122 122  * Update with new features.
... ... @@ -123,7 +123,7 @@
123 123  
124 124  * Fix bugs.
125 125  
126 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>url:https://www.dropbox.com/sh/sxrgszkac4ips0q/AAA7xVIHen982Nc0edNPaB-Wa/NB-IoT/Set%20up%20TLS%20certificate?dl=0&subfolder_nav_tracking=1||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
134 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
127 127  
128 128  Methods to Update Firmware:
129 129  
... ... @@ -131,19 +131,227 @@
131 131  
132 132  * Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
133 133  
142 +=== 4.1.2 Configure certificate ===
134 134  
135 135  
136 -== 4.2 Configure certificate ==
145 +After upgrade the firmware, the serial port displays as follows:
137 137  
147 +[[image:image-20240528174330-13.png||height="286" width="568"]]
138 138  
149 +
150 +==== 4.1.2.1  Configure CA certificate ====
151 +
152 +
153 +Please input the certificate in PEM format for the user.
154 +
155 +Use the AT command AT+CACERT as follows:
156 +
157 +AT+CACERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
158 +
159 +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
160 +
161 +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
162 +
163 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
164 +
165 +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
166 +
167 +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
168 +
169 +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
170 +
171 +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
172 +
173 +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
174 +
175 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L
176 +
177 +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
178 +
179 +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
180 +
181 +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA
182 +
183 +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
184 +
185 +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs
186 +
187 +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
188 +
189 +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
190 +
191 +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy
192 +
193 +rqXRfboQnoZsG4q5WTP468SQvvG5
194 +
195 +~-~-~-~--END CERTIFICATE~-~-~-~--}
196 +
197 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
198 +
199 +[[image:image-20240528174408-14.png]]
200 +
201 +
202 +After successful execution, as shown in the following figure.
203 +
204 +[[image:image-20240528174502-15.png]]
205 +
206 +Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
207 +
208 +
209 +==== 4.1.2.2 Configure client certificate ====
210 +
211 +
212 +Use the AT command AT+CLICERT as follows:
213 +
214 +AT+CLICERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
215 +
216 +MIIDWTCCAkGgAwIBAgIUYSpJUzfb4NTa76JJxd2th0fZA8swDQYJKoZIhvcNAQEL
217 +
218 +BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g
219 +
220 +SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTI0MDUyNDA4MDI0
221 +
222 +NVoXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0
223 +
224 +ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMTdc1GQLVBohAeCJD6n
225 +
226 +6WTFAFrygTch90a5wUr2bhlVuDxvEhEKNcmu5vOCo5agmfLWb2VCxgezgvQOBYQ8
227 +
228 +1oTqXJNdl4tS0DICfqb/ogVHWGHRao67XyhbPNBS0j/nCPTIIk6+/NBeYPOjaG+p
229 +
230 +utfXE7SGIEcc3RevkYkUJx6y+WH7MLjj1mufuXBVWIL1RrfrIRPw6auVk7dhS5rU
231 +
232 +NvYcJa7Qd6gpAh1DzPj7ZECrv7fEIIBDEsSYOy6ToWtzqGIVcIAHBDfORB0Hcm+N
233 +
234 +7wG3KDf61P4aWkLlkP5pRUaUIQdVblxginmx2K3n8t/WP7QcfITa191rjEVVBXmk
235 +
236 +ROsCAwEAAaNgMF4wHwYDVR0jBBgwFoAUs8Caohh1ZGP8kjSn3rtxJiJJ9IswHQYD
237 +
238 +VR0OBBYEFCjwGwqD7FG9UCNm3wjFQX4HixzfMAwGA1UdEwEB/wQCMAAwDgYDVR0P
239 +
240 +AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQBgqI49a4PBQZYrFM63TX3EHgdd
241 +
242 +N6Pj7AytjO+SrKNMCSo/OtIvhDTxOocr1vKrux1Tw5qmrllrIXLtlGtbmln5DS6a
243 +
244 +DTCLrjwcIFIabLxpx5DPY1WSMYvL04SW7d4Y+3SxOFNRotDSiomr8eIIac0d3HE2
245 +
246 +B5b0SnWZgWbrhjNUgvwo8l8tA9DOGIr2MeQ5kPjudOOiYSR3HC0v+jviBMV6VX8M
247 +
248 +LHVH3CRshHDKBGpV1NZ1RAm9EY/oRGtSiMsyjRh6hegC0vehwVxaC4w9qG0ASkzz
249 +
250 +42OOGfNqhYnYDiKTEIkazaoAFpTKDejWBaL7W5VpthUkQOl67IyX+ohuUKTo
251 +
252 +~-~-~-~--END CERTIFICATE~-~-~-~--}
253 +
254 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
255 +
256 +[[image:image-20240528174630-16.png||height="553" width="747"]]
257 +
258 +Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
259 +
260 +
261 +==== 4.1.2.3 Configure client private key ====
262 +
263 +
264 +Use the AT command AT+CLIKEY, as shown below
265 +
266 +AT+CLIKEY=~-~-~-~--BEGIN RSA PRIVATE KEY~-~-~-~--
267 +
268 +MIIEpAIBAAKCAQEAxN1zUZAtUGiEB4IkPqfpZMUAWvKBNyH3RrnBSvZuGVW4PG8S
269 +
270 +EQo1ya7m84KjlqCZ8tZvZULGB7OC9A4FhDzWhOpck12Xi1LQMgJ+pv+iBUdYYdFq
271 +
272 +jrtfKFs80FLSP+cI9MgiTr780F5g86Nob6m619cTtIYgRxzdF6+RiRQnHrL5Yfsw
273 +
274 +uOPWa5+5cFVYgvVGt+shE/Dpq5WTt2FLmtQ29hwlrtB3qCkCHUPM+PtkQKu/t8Qg
275 +
276 +gEMSxJg7LpOha3OoYhVwgAcEN85EHQdyb43vAbcoN/rU/hpaQuWQ/mlFRpQhB1Vu
277 +
278 +XGCKebHYrefy39Y/tBx8hNrX3WuMRVUFeaRE6wIDAQABAoIBAFhAOcjvjBDGuaEw
279 +
280 +CxV3al49HfqnSZuwg0xWSztSm2qKDcwxsnSnEhO2b1vsTW9h0YGV9Vv8gg/Dvkmv
281 +
282 +23M7XqM4+IUraJsRZbl1etdcM4KQSCOZoF4Zyv+pXuq4pf31kQNCkHaikWzLUkUG
283 +
284 +FPQxr0vA49mCYwfd/ZL3ppM/0IWmxRwloV1Gb9q8iDBUcJGSDokZnT7diUxzzOcd
285 +
286 ++UJ6xUhFq1v46Y7vO+73XROLv34JEBC0bIw2ErL6+AbzhHwb2mkuSccG9Ks37g3Z
287 +
288 +dyyjjj8hm1wvHWepuWqEssaiS3HD5zAsI0v85xS8RwNj3zLfd8o1WC666n3CO+ij
289 +
290 +VdRmR4kCgYEA+/sEFxpfaRomqcLwJebZcZH06U1RfJFfnbH2/Q6fANf8zNxwWs9A
291 +
292 +O+jyk/CLhHYRIk6VIOMQmWwEYgJ2eAHfw2Diwj4/0eqkGu+yZOS6KTCewxSV73vc
293 +
294 +SvACramJy4y6yEgDN5onwR1XqfVMfA0LzTcSupHR/xvrpf/gCsNFPxUCgYEAyAFd
295 +
296 +nMUhJFSq3pOogxA43aJSkA8YuDS3jpBkKQ6vx81APpIMabQauOxFDt488TZGP3Yy
297 +
298 +lhpa/lfFIgu2K7CgV4dUp+JtJJoZ/F+ExxUUzdqB4zxzWywAcc3RebfwP6qASwFT
299 +
300 +G3mXYci4tgNWR+k5CSsuLXDk/OT5uo5GeGAEc/8CgYEAk6V8uxDP8STKnNRFpN/E
301 +
302 +b6CHciDE64m/DgbWY2cq0fK9BUjxaLRhvfj8EqVzCrWnyoNjLHcAJfW+B7PLuPvY
303 +
304 +IoJlvE1/Vb/4UnQ7ApVnY3VCwaoRRNc9uIcz+pAJ1sRqOarAf9cLDkPkNwktvM5k
305 +
306 +KOXpSnrhIms4w/bPT18l9xUCgYBsAMDKbXEuK0JyGw5+Z/4tQQCQpnZU0rLkm3ha
307 +
308 +64FkxaORplBprEZZ4cyQ8NW78/EPSAadI/JLMp5TejuPcDvFyGCgoBcMEuNBc1tC
309 +
310 +HlIzr3FAgl5Qt3wt+FTMA9YKq0nINxjn10s2FKwaLccj4f9YwiaXh0VAg22PnlDT
311 +
312 +pBYDhQKBgQCMwyKXJ4zYiDRdvLvgKzeuKaU4KNQItHE4KORPfkecjPoENt4bKxDw
313 +
314 +2EdNFQLIoqBHL1s+/8+SzhCI31V7pkTs1AqCxDExJS7+8Z5NQFQIo/jooUo0N80E
315 +
316 +y3ZZS6OLOXXscEqhMogf1grfbabXM9OkgTIq43cPQHtMGQiFAtIJkg==
317 +
318 +~-~-~-~--END RSA PRIVATE KEY~-~-~-~--}
319 +
320 +(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
321 +
322 +[[image:image-20240528174702-17.png]]
323 +
324 +Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
325 +
326 +
327 +==== 4.1.2.4 Re-upgrade the firmware ====
328 +
329 +
330 +After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
331 +
332 +
333 +== 4.2  For -CB /-CS model ==
334 +
335 +=== 4.2.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
336 +
337 +
338 +User can change device firmware to::
339 +
340 +* Update with new features.
341 +
342 +* Fix bugs.
343 +
344 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/mk9u5ux3cfo94ke0s67ik/ADOIOdwIQfCO2WUZt0MxXyU?rlkey=7o6uaywrebbnsvuj4r0r694x6&st=smrmjj7t&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
345 +
346 +Methods to Update Firmware:
347 +
348 +* (Recommended way) OTA firmware update via BLE: [[**Instruction**>>url:http://wiki.dragino.com/xwiki/bin/view/Main/BLE_Firmware_Update_NB_Sensors_BC660K-GL/]].
349 +
350 +* Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
351 +
352 +=== 4.2.2 Configure certificate ===
353 +
354 +
139 139  After upgrade the firmware, the serial port displays as follows:
140 140  
141 -(% data-sider-select-id="8b6a9e23-dec0-476c-acd4-098aa19fe1f3" %)
142 142  [[image:image-20240528174330-13.png||height="286" width="568"]]
143 143  
144 144  
145 -=== 4.2.1 Configure CA certificate ===
360 +==== 4.2.2.1 Configure CA certificate ====
146 146  
362 +(% style="color:red" %)**Note:You should select one of the certificates.Either CA1 or CA3 can be used**
147 147  
148 148  Please input the certificate in PEM format for the user.
149 149  
... ... @@ -201,7 +201,7 @@
201 201  Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
202 202  
203 203  
204 -=== 4.2.2 Configure client certificate ===
420 +==== 4.2.2.2 Configure client certificate ====
205 205  
206 206  
207 207  Use the AT command AT+CLICERT as follows:
... ... @@ -253,7 +253,7 @@
253 253  Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
254 254  
255 255  
256 -=== 4.2.3 Configure client private key ===
472 +==== 4.2.2.3 Configure client private key ====
257 257  
258 258  
259 259  Use the AT command AT+CLIKEY, as shown below
... ... @@ -319,14 +319,25 @@
319 319  Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
320 320  
321 321  
322 -=== 4.3.3 Re-upgrade the firmware ===
538 +==== 4.2.2.4 For -CB /-CS model Certificate setting error/change certificate ====
323 323  
324 324  
325 -After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
541 +(% data-sider-select-id="7c5a8abc-e707-467b-ac02-db0a89098320" %)When you set the wrong certificate or you need to re-set another certificate.
542 +Please use the following three commands:
326 326  
544 +(% style="color:blue" %)**AT+DELCLIKEY}**
327 327  
328 -= 5. Configure draginoNB-device =
546 +(% style="color:blue" %)**AT+DELCLICERT}**
329 329  
548 +(% style="color:blue" %)**AT+DELCACERT}**(%%)
549 +(% style="color:blue" %)
550 +
551 +(% style="color:red" %)**Note: 1.When there is no certificate on the device, a deletion error will be displayed.
552 + 2.When the device already has a certificate, using the command to configure the certificate again will display a configuration error.**
553 +
554 +
555 += (% data-sider-select-id="6b5deb69-539b-42e1-a7bc-a300eb1fea73" %)5. Configure draginoNB-device(%%) =
556 +
330 330  == 5.1 Configure the data format sent by the device ==
331 331  
332 332  
... ... @@ -352,7 +352,7 @@
352 352  == 5.4 Set the TLS mode ==
353 353  
354 354  
355 -(% style="color:blue" %)**AT+TLSMOD=1,2**
582 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**AT+TLSMOD=1,2**
356 356  
357 357  To use the TLS mode certificate function, users need to configure the (% style="color:blue" %)**AT+TLSMOD**(%%) command.
358 358  
... ... @@ -363,9 +363,21 @@
363 363  (% style="color:blue" %)**AT+TLSMOD=1,2** (%%) ~/~/ Perform server and client authentication if requested by the remote server.(In AWS we recommend using this mode)
364 364  
365 365  
366 -Restart the device
593 +(% data-sider-select-id="f443b9bc-1195-4fe2-965d-7de84f78747f" %)
594 +== 5.5 Set the MQOS ==
367 367  
368 368  
597 +(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue; font-weight:bold" %)**AT+MQOS**(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**=XX (Depends on your server configuration)**
598 +
599 +Please find it in AWS's MQTT test client
600 +
601 +[[image:image-20240529164339-1.png||height="480" width="927"]]
602 +
603 +
604 +(% data-sider-select-id="fef22158-6e5e-46e4-b59e-fe457e562376" %)
605 +== 5.6 Restart the device ==
606 +
607 +
369 369  = 6. View data on AWS =
370 370  
371 371  == 6.1 Find MQTT test client in test ==
image-20240814155410-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.kai
Size
... ... @@ -1,0 +1,1 @@
1 +77.8 KB
Content
image-20240822090554-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.ting
Size
... ... @@ -1,0 +1,1 @@
1 +75.4 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0