Changes for page Dragino NB device connection to AWS platform instructions
Last modified by Mengting Qiu on 2025/03/06 13:42
Summary
-
Page properties (2 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 2 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. kai1 +XWiki.Xiaoling - Content
-
... ... @@ -34,9 +34,9 @@ 34 34 35 35 c. After clicking to enter the policy configuration page, follow the clicking sequence below to go to the json configuration interface, and then fill in the following fields in the "statement" keyword: 36 36 37 +(% data-sider-select-id="7bc0f6db-481d-435a-ad0c-92cf0ede3ea4" %) 38 +(% data-sider-select-id="8026a4d9-df91-4895-b9c5-3d6ac9b46012" %)**{** 37 37 38 -**{** 39 - 40 40 **~ "Version": "2012-10-17",** 41 41 42 42 **~ "Statement": [** ... ... @@ -99,9 +99,9 @@ 99 99 100 100 (% style="color:blue" %)**5. When you click to create things, the certificate download page will pop up** 101 101 102 +(% data-sider-select-id="398c8d35-75ff-4077-85bb-9e0377efa186" %) 103 +(% data-sider-select-id="087aa6c7-c542-4afc-9ce6-291538c31764" %)**This certificate is very important.**(%%) After creating the device, you must download the certificate of the device so that our NB device can connect normally. 102 102 103 -**This certificate is very important.** After creating the device, you must download the certificate of the device so that our NB device can connect normally. 104 - 105 105 Please download all the following certificates and put them in a folder. 106 106 107 107 [[image:image-20240528173926-10.png]] ... ... @@ -114,16 +114,9 @@ 114 114 115 115 = 4. Connect to AWS using Dragino-NB device = 116 116 117 +== 4.1 Upgrade the firmware to configure TTS firmware to set the certificate == 117 117 118 -(% id="cke_bm_37736S" style="color: red; display: none" %)** **(% style="color:red" %)**Note: **(%%)In order to avoid problems with certificate writing, you need to set the serial port assistant to automatically add a newline character when sending commands, if there is no such newline character, the certificate written will be invalid.(Using the serial port assistant as an example) 119 119 120 -[[image:image-20240814155410-1.png||height="328" width="563"]] 121 - 122 -== 4.1 For -NB /-NS model == 123 - 124 -=== 4.1.1 Upgrade the firmware to configure TTS firmware to set the certificate === 125 - 126 - 127 127 User can change device firmware to:: 128 128 129 129 * Update with new features. ... ... @@ -130,7 +130,7 @@ 130 130 131 131 * Fix bugs. 132 132 133 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/s cl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**126 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>url:https://www.dropbox.com/sh/sxrgszkac4ips0q/AAA7xVIHen982Nc0edNPaB-Wa/NB-IoT/Set%20up%20TLS%20certificate?dl=0&subfolder_nav_tracking=1||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]** 134 134 135 135 Methods to Update Firmware: 136 136 ... ... @@ -138,227 +138,19 @@ 138 138 139 139 * Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 140 140 141 -=== 4.1.2 Configure certificate === 142 142 143 143 144 - Afterupgradethefirmware,theserial portdisplays as follows:136 +== 4.2 Configure certificate == 145 145 146 -[[image:image-20240528174330-13.png||height="286" width="568"]] 147 147 148 - 149 -==== 4.1.2.1 Configure CA certificate ==== 150 - 151 - 152 -Please input the certificate in PEM format for the user. 153 - 154 -Use the AT command AT+CACERT as follows: 155 - 156 -AT+CACERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~-- 157 - 158 -MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF 159 - 160 -ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 161 - 162 -b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL 163 - 164 -MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv 165 - 166 -b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj 167 - 168 -ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM 169 - 170 -9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw 171 - 172 -IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 173 - 174 -VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L 175 - 176 -93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm 177 - 178 -jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC 179 - 180 -AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA 181 - 182 -A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI 183 - 184 -U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs 185 - 186 -N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv 187 - 188 -o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU 189 - 190 -5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy 191 - 192 -rqXRfboQnoZsG4q5WTP468SQvvG5 193 - 194 -~-~-~-~--END CERTIFICATE~-~-~-~--} 195 - 196 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.** 197 - 198 -[[image:image-20240528174408-14.png]] 199 - 200 - 201 -After successful execution, as shown in the following figure. 202 - 203 -[[image:image-20240528174502-15.png]] 204 - 205 -Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 206 - 207 - 208 -==== 4.1.2.2 Configure client certificate ==== 209 - 210 - 211 -Use the AT command AT+CLICERT as follows: 212 - 213 -AT+CLICERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~-- 214 - 215 -MIIDWTCCAkGgAwIBAgIUYSpJUzfb4NTa76JJxd2th0fZA8swDQYJKoZIhvcNAQEL 216 - 217 -BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g 218 - 219 -SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTI0MDUyNDA4MDI0 220 - 221 -NVoXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0 222 - 223 -ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMTdc1GQLVBohAeCJD6n 224 - 225 -6WTFAFrygTch90a5wUr2bhlVuDxvEhEKNcmu5vOCo5agmfLWb2VCxgezgvQOBYQ8 226 - 227 -1oTqXJNdl4tS0DICfqb/ogVHWGHRao67XyhbPNBS0j/nCPTIIk6+/NBeYPOjaG+p 228 - 229 -utfXE7SGIEcc3RevkYkUJx6y+WH7MLjj1mufuXBVWIL1RrfrIRPw6auVk7dhS5rU 230 - 231 -NvYcJa7Qd6gpAh1DzPj7ZECrv7fEIIBDEsSYOy6ToWtzqGIVcIAHBDfORB0Hcm+N 232 - 233 -7wG3KDf61P4aWkLlkP5pRUaUIQdVblxginmx2K3n8t/WP7QcfITa191rjEVVBXmk 234 - 235 -ROsCAwEAAaNgMF4wHwYDVR0jBBgwFoAUs8Caohh1ZGP8kjSn3rtxJiJJ9IswHQYD 236 - 237 -VR0OBBYEFCjwGwqD7FG9UCNm3wjFQX4HixzfMAwGA1UdEwEB/wQCMAAwDgYDVR0P 238 - 239 -AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQBgqI49a4PBQZYrFM63TX3EHgdd 240 - 241 -N6Pj7AytjO+SrKNMCSo/OtIvhDTxOocr1vKrux1Tw5qmrllrIXLtlGtbmln5DS6a 242 - 243 -DTCLrjwcIFIabLxpx5DPY1WSMYvL04SW7d4Y+3SxOFNRotDSiomr8eIIac0d3HE2 244 - 245 -B5b0SnWZgWbrhjNUgvwo8l8tA9DOGIr2MeQ5kPjudOOiYSR3HC0v+jviBMV6VX8M 246 - 247 -LHVH3CRshHDKBGpV1NZ1RAm9EY/oRGtSiMsyjRh6hegC0vehwVxaC4w9qG0ASkzz 248 - 249 -42OOGfNqhYnYDiKTEIkazaoAFpTKDejWBaL7W5VpthUkQOl67IyX+ohuUKTo 250 - 251 -~-~-~-~--END CERTIFICATE~-~-~-~--} 252 - 253 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.** 254 - 255 -[[image:image-20240528174630-16.png||height="553" width="747"]] 256 - 257 -Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed. 258 - 259 - 260 -==== 4.1.2.3 Configure client private key ==== 261 - 262 - 263 -Use the AT command AT+CLIKEY, as shown below 264 - 265 -AT+CLIKEY=~-~-~-~--BEGIN RSA PRIVATE KEY~-~-~-~-- 266 - 267 -MIIEpAIBAAKCAQEAxN1zUZAtUGiEB4IkPqfpZMUAWvKBNyH3RrnBSvZuGVW4PG8S 268 - 269 -EQo1ya7m84KjlqCZ8tZvZULGB7OC9A4FhDzWhOpck12Xi1LQMgJ+pv+iBUdYYdFq 270 - 271 -jrtfKFs80FLSP+cI9MgiTr780F5g86Nob6m619cTtIYgRxzdF6+RiRQnHrL5Yfsw 272 - 273 -uOPWa5+5cFVYgvVGt+shE/Dpq5WTt2FLmtQ29hwlrtB3qCkCHUPM+PtkQKu/t8Qg 274 - 275 -gEMSxJg7LpOha3OoYhVwgAcEN85EHQdyb43vAbcoN/rU/hpaQuWQ/mlFRpQhB1Vu 276 - 277 -XGCKebHYrefy39Y/tBx8hNrX3WuMRVUFeaRE6wIDAQABAoIBAFhAOcjvjBDGuaEw 278 - 279 -CxV3al49HfqnSZuwg0xWSztSm2qKDcwxsnSnEhO2b1vsTW9h0YGV9Vv8gg/Dvkmv 280 - 281 -23M7XqM4+IUraJsRZbl1etdcM4KQSCOZoF4Zyv+pXuq4pf31kQNCkHaikWzLUkUG 282 - 283 -FPQxr0vA49mCYwfd/ZL3ppM/0IWmxRwloV1Gb9q8iDBUcJGSDokZnT7diUxzzOcd 284 - 285 -+UJ6xUhFq1v46Y7vO+73XROLv34JEBC0bIw2ErL6+AbzhHwb2mkuSccG9Ks37g3Z 286 - 287 -dyyjjj8hm1wvHWepuWqEssaiS3HD5zAsI0v85xS8RwNj3zLfd8o1WC666n3CO+ij 288 - 289 -VdRmR4kCgYEA+/sEFxpfaRomqcLwJebZcZH06U1RfJFfnbH2/Q6fANf8zNxwWs9A 290 - 291 -O+jyk/CLhHYRIk6VIOMQmWwEYgJ2eAHfw2Diwj4/0eqkGu+yZOS6KTCewxSV73vc 292 - 293 -SvACramJy4y6yEgDN5onwR1XqfVMfA0LzTcSupHR/xvrpf/gCsNFPxUCgYEAyAFd 294 - 295 -nMUhJFSq3pOogxA43aJSkA8YuDS3jpBkKQ6vx81APpIMabQauOxFDt488TZGP3Yy 296 - 297 -lhpa/lfFIgu2K7CgV4dUp+JtJJoZ/F+ExxUUzdqB4zxzWywAcc3RebfwP6qASwFT 298 - 299 -G3mXYci4tgNWR+k5CSsuLXDk/OT5uo5GeGAEc/8CgYEAk6V8uxDP8STKnNRFpN/E 300 - 301 -b6CHciDE64m/DgbWY2cq0fK9BUjxaLRhvfj8EqVzCrWnyoNjLHcAJfW+B7PLuPvY 302 - 303 -IoJlvE1/Vb/4UnQ7ApVnY3VCwaoRRNc9uIcz+pAJ1sRqOarAf9cLDkPkNwktvM5k 304 - 305 -KOXpSnrhIms4w/bPT18l9xUCgYBsAMDKbXEuK0JyGw5+Z/4tQQCQpnZU0rLkm3ha 306 - 307 -64FkxaORplBprEZZ4cyQ8NW78/EPSAadI/JLMp5TejuPcDvFyGCgoBcMEuNBc1tC 308 - 309 -HlIzr3FAgl5Qt3wt+FTMA9YKq0nINxjn10s2FKwaLccj4f9YwiaXh0VAg22PnlDT 310 - 311 -pBYDhQKBgQCMwyKXJ4zYiDRdvLvgKzeuKaU4KNQItHE4KORPfkecjPoENt4bKxDw 312 - 313 -2EdNFQLIoqBHL1s+/8+SzhCI31V7pkTs1AqCxDExJS7+8Z5NQFQIo/jooUo0N80E 314 - 315 -y3ZZS6OLOXXscEqhMogf1grfbabXM9OkgTIq43cPQHtMGQiFAtIJkg== 316 - 317 -~-~-~-~--END RSA PRIVATE KEY~-~-~-~--} 318 - 319 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.** 320 - 321 -[[image:image-20240528174702-17.png]] 322 - 323 -Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 324 - 325 - 326 -==== 4.1.2.4 Re-upgrade the firmware ==== 327 - 328 - 329 -After the certificate configuration is completed, Re-upgrade to the firmware you originally used. 330 - 331 - 332 -== 4.2 For -CB /-CS model == 333 - 334 -=== 4.2.1 Upgrade the firmware to configure TTS firmware to set the certificate === 335 - 336 - 337 -User can change device firmware to:: 338 - 339 -* Update with new features. 340 - 341 -* Fix bugs. 342 - 343 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/mk9u5ux3cfo94ke0s67ik/ADOIOdwIQfCO2WUZt0MxXyU?rlkey=7o6uaywrebbnsvuj4r0r694x6&st=smrmjj7t&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]** 344 - 345 -Methods to Update Firmware: 346 - 347 -* (Recommended way) OTA firmware update via BLE: [[**Instruction**>>url:http://wiki.dragino.com/xwiki/bin/view/Main/BLE_Firmware_Update_NB_Sensors_BC660K-GL/]]. 348 - 349 -* Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**. 350 - 351 -=== 4.2.2 Configure certificate === 352 - 353 - 354 354 After upgrade the firmware, the serial port displays as follows: 355 355 141 +(% data-sider-select-id="8b6a9e23-dec0-476c-acd4-098aa19fe1f3" %) 356 356 [[image:image-20240528174330-13.png||height="286" width="568"]] 357 357 358 358 359 -=== =4.2.2.1 Configure CA certificate ====145 +=== 4.2.1 Configure CA certificate === 360 360 361 -(% style="color:red" %)**Note:You should select one of the certificates.Either CA1 or CA3 can be used** 362 362 363 363 Please input the certificate in PEM format for the user. 364 364 ... ... @@ -416,7 +416,7 @@ 416 416 Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 417 417 418 418 419 -=== =4.2.2.2Configure client certificate ====204 +=== 4.2.2 Configure client certificate === 420 420 421 421 422 422 Use the AT command AT+CLICERT as follows: ... ... @@ -468,7 +468,7 @@ 468 468 Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed. 469 469 470 470 471 -=== =4.2.2.3 Configure client private key ====256 +=== 4.2.3 Configure client private key === 472 472 473 473 474 474 Use the AT command AT+CLIKEY, as shown below ... ... @@ -534,25 +534,14 @@ 534 534 Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure. 535 535 536 536 537 -=== =4.2.2.4 For -CB /-CS model Certificatesetting error/changecertificate ====322 +=== 4.3.3 Re-upgrade the firmware === 538 538 539 539 540 -(% data-sider-select-id="7c5a8abc-e707-467b-ac02-db0a89098320" %)When you set the wrong certificate or you need to re-set another certificate. 541 -Please use the following three commands: 325 +After the certificate configuration is completed, Re-upgrade to the firmware you originally used. 542 542 543 -(% style="color:blue" %)**AT+DELCLIKEY}** 544 544 545 - (% style="color:blue"%)**AT+DELCLICERT}**328 += 5. Configure draginoNB-device = 546 546 547 -(% style="color:blue" %)**AT+DELCACERT}**(%%) 548 -(% style="color:blue" %) 549 - 550 -(% style="color:red" %)**Note: 1.When there is no certificate on the device, a deletion error will be displayed. 551 - 2.When the device already has a certificate, using the command to configure the certificate again will display a configuration error.** 552 - 553 - 554 -= (% data-sider-select-id="6b5deb69-539b-42e1-a7bc-a300eb1fea73" %)5. Configure draginoNB-device(%%) = 555 - 556 556 == 5.1 Configure the data format sent by the device == 557 557 558 558 ... ... @@ -578,7 +578,7 @@ 578 578 == 5.4 Set the TLS mode == 579 579 580 580 581 -(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**AT+TLSMOD=1,2**355 +(% style="color:blue" %)**AT+TLSMOD=1,2** 582 582 583 583 To use the TLS mode certificate function, users need to configure the (% style="color:blue" %)**AT+TLSMOD**(%%) command. 584 584 ... ... @@ -589,21 +589,9 @@ 589 589 (% style="color:blue" %)**AT+TLSMOD=1,2** (%%) ~/~/ Perform server and client authentication if requested by the remote server.(In AWS we recommend using this mode) 590 590 591 591 592 -(% data-sider-select-id="f443b9bc-1195-4fe2-965d-7de84f78747f" %) 593 -== 5.5 Set the MQOS == 366 +Restart the device 594 594 595 595 596 -(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue; font-weight:bold" %)**AT+MQOS**(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**=XX (Depends on your server configuration)** 597 - 598 -Please find it in AWS's MQTT test client 599 - 600 -[[image:image-20240529164339-1.png||height="480" width="927"]] 601 - 602 - 603 -(% data-sider-select-id="fef22158-6e5e-46e4-b59e-fe457e562376" %) 604 -== 5.6 Restart the device == 605 - 606 - 607 607 = 6. View data on AWS = 608 608 609 609 == 6.1 Find MQTT test client in test == ... ... @@ -624,3 +624,5 @@ 624 624 [[image:image-20240528175133-19.png||height="563" width="1022"]] 625 625 626 626 [[image:image-20240528175154-20.png||height="752" width="1042"]] 389 + 390 +
- image-20240529164339-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Bei - Size
-
... ... @@ -1,1 +1,0 @@ 1 -116.5 KB - Content
- image-20240814155410-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.kai - Size
-
... ... @@ -1,1 +1,0 @@ 1 -77.8 KB - Content