<
From version < 28.1 >
edited by kai
on 2024/08/14 15:57
To version < 24.1 >
edited by Bei Jinggeng
on 2024/05/29 16:43
>
Change comment: Uploaded new attachment "image-20240529164339-1.png", version {1}

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.kai
1 +XWiki.Bei
Content
... ... @@ -34,9 +34,9 @@
34 34  
35 35  c. After clicking to enter the policy configuration page, follow the clicking sequence below to go to the json configuration interface, and then fill in the following fields in the "statement" keyword:
36 36  
37 +(% data-sider-select-id="7bc0f6db-481d-435a-ad0c-92cf0ede3ea4" %)
38 +(% data-sider-select-id="8026a4d9-df91-4895-b9c5-3d6ac9b46012" %)**{**
37 37  
38 -**{**
39 -
40 40  **~ "Version": "2012-10-17",**
41 41  
42 42  **~ "Statement": [**
... ... @@ -99,9 +99,9 @@
99 99  
100 100  (% style="color:blue" %)**5. When you click to create things, the certificate download page will pop up**
101 101  
102 +(% data-sider-select-id="398c8d35-75ff-4077-85bb-9e0377efa186" %)
103 +(% data-sider-select-id="087aa6c7-c542-4afc-9ce6-291538c31764" %)**This certificate is very important.**(%%) After creating the device, you must download the certificate of the device so that our NB device can connect normally.
102 102  
103 -**This certificate is very important.** After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 -
105 105  Please download all the following certificates and put them in a folder.
106 106  
107 107  [[image:image-20240528173926-10.png]]
... ... @@ -114,16 +114,9 @@
114 114  
115 115  = 4. Connect to AWS using Dragino-NB device =
116 116  
117 +== 4.1 Upgrade the firmware to configure TTS firmware to set the certificate ==
117 117  
118 -(% id="cke_bm_37736S" style="color: red; display: none" %)** **(% style="color:red" %)**Note: **(%%)In order to avoid problems with certificate writing, you need to set the serial port assistant to automatically add a newline character when sending commands, if there is no such newline character, the certificate written will be invalid.(Using the serial port assistant as an example)
119 119  
120 -[[image:image-20240814155410-1.png||height="328" width="563"]]
121 -
122 -== 4.1 For -NB /-NS model ==
123 -
124 -=== 4.1.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
125 -
126 -
127 127  User can change device firmware to::
128 128  
129 129  * Update with new features.
... ... @@ -130,7 +130,7 @@
130 130  
131 131  * Fix bugs.
132 132  
133 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
126 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>url:https://www.dropbox.com/sh/sxrgszkac4ips0q/AAA7xVIHen982Nc0edNPaB-Wa/NB-IoT/Set%20up%20TLS%20certificate?dl=0&subfolder_nav_tracking=1||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
134 134  
135 135  Methods to Update Firmware:
136 136  
... ... @@ -138,227 +138,19 @@
138 138  
139 139  * Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
140 140  
141 -=== 4.1.2 Configure certificate ===
142 142  
143 143  
144 -After upgrade the firmware, the serial port displays as follows:
136 +== 4.2 Configure certificate ==
145 145  
146 -[[image:image-20240528174330-13.png||height="286" width="568"]]
147 147  
148 -
149 -==== 4.1.2.1  Configure CA certificate ====
150 -
151 -
152 -Please input the certificate in PEM format for the user.
153 -
154 -Use the AT command AT+CACERT as follows:
155 -
156 -AT+CACERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
157 -
158 -MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
159 -
160 -ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
161 -
162 -b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
163 -
164 -MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
165 -
166 -b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
167 -
168 -ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
169 -
170 -9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
171 -
172 -IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
173 -
174 -VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L
175 -
176 -93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
177 -
178 -jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
179 -
180 -AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA
181 -
182 -A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
183 -
184 -U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs
185 -
186 -N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
187 -
188 -o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
189 -
190 -5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy
191 -
192 -rqXRfboQnoZsG4q5WTP468SQvvG5
193 -
194 -~-~-~-~--END CERTIFICATE~-~-~-~--}
195 -
196 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
197 -
198 -[[image:image-20240528174408-14.png]]
199 -
200 -
201 -After successful execution, as shown in the following figure.
202 -
203 -[[image:image-20240528174502-15.png]]
204 -
205 -Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
206 -
207 -
208 -==== 4.1.2.2 Configure client certificate ====
209 -
210 -
211 -Use the AT command AT+CLICERT as follows:
212 -
213 -AT+CLICERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
214 -
215 -MIIDWTCCAkGgAwIBAgIUYSpJUzfb4NTa76JJxd2th0fZA8swDQYJKoZIhvcNAQEL
216 -
217 -BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g
218 -
219 -SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTI0MDUyNDA4MDI0
220 -
221 -NVoXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0
222 -
223 -ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMTdc1GQLVBohAeCJD6n
224 -
225 -6WTFAFrygTch90a5wUr2bhlVuDxvEhEKNcmu5vOCo5agmfLWb2VCxgezgvQOBYQ8
226 -
227 -1oTqXJNdl4tS0DICfqb/ogVHWGHRao67XyhbPNBS0j/nCPTIIk6+/NBeYPOjaG+p
228 -
229 -utfXE7SGIEcc3RevkYkUJx6y+WH7MLjj1mufuXBVWIL1RrfrIRPw6auVk7dhS5rU
230 -
231 -NvYcJa7Qd6gpAh1DzPj7ZECrv7fEIIBDEsSYOy6ToWtzqGIVcIAHBDfORB0Hcm+N
232 -
233 -7wG3KDf61P4aWkLlkP5pRUaUIQdVblxginmx2K3n8t/WP7QcfITa191rjEVVBXmk
234 -
235 -ROsCAwEAAaNgMF4wHwYDVR0jBBgwFoAUs8Caohh1ZGP8kjSn3rtxJiJJ9IswHQYD
236 -
237 -VR0OBBYEFCjwGwqD7FG9UCNm3wjFQX4HixzfMAwGA1UdEwEB/wQCMAAwDgYDVR0P
238 -
239 -AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQBgqI49a4PBQZYrFM63TX3EHgdd
240 -
241 -N6Pj7AytjO+SrKNMCSo/OtIvhDTxOocr1vKrux1Tw5qmrllrIXLtlGtbmln5DS6a
242 -
243 -DTCLrjwcIFIabLxpx5DPY1WSMYvL04SW7d4Y+3SxOFNRotDSiomr8eIIac0d3HE2
244 -
245 -B5b0SnWZgWbrhjNUgvwo8l8tA9DOGIr2MeQ5kPjudOOiYSR3HC0v+jviBMV6VX8M
246 -
247 -LHVH3CRshHDKBGpV1NZ1RAm9EY/oRGtSiMsyjRh6hegC0vehwVxaC4w9qG0ASkzz
248 -
249 -42OOGfNqhYnYDiKTEIkazaoAFpTKDejWBaL7W5VpthUkQOl67IyX+ohuUKTo
250 -
251 -~-~-~-~--END CERTIFICATE~-~-~-~--}
252 -
253 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
254 -
255 -[[image:image-20240528174630-16.png||height="553" width="747"]]
256 -
257 -Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
258 -
259 -
260 -==== 4.1.2.3 Configure client private key ====
261 -
262 -
263 -Use the AT command AT+CLIKEY, as shown below
264 -
265 -AT+CLIKEY=~-~-~-~--BEGIN RSA PRIVATE KEY~-~-~-~--
266 -
267 -MIIEpAIBAAKCAQEAxN1zUZAtUGiEB4IkPqfpZMUAWvKBNyH3RrnBSvZuGVW4PG8S
268 -
269 -EQo1ya7m84KjlqCZ8tZvZULGB7OC9A4FhDzWhOpck12Xi1LQMgJ+pv+iBUdYYdFq
270 -
271 -jrtfKFs80FLSP+cI9MgiTr780F5g86Nob6m619cTtIYgRxzdF6+RiRQnHrL5Yfsw
272 -
273 -uOPWa5+5cFVYgvVGt+shE/Dpq5WTt2FLmtQ29hwlrtB3qCkCHUPM+PtkQKu/t8Qg
274 -
275 -gEMSxJg7LpOha3OoYhVwgAcEN85EHQdyb43vAbcoN/rU/hpaQuWQ/mlFRpQhB1Vu
276 -
277 -XGCKebHYrefy39Y/tBx8hNrX3WuMRVUFeaRE6wIDAQABAoIBAFhAOcjvjBDGuaEw
278 -
279 -CxV3al49HfqnSZuwg0xWSztSm2qKDcwxsnSnEhO2b1vsTW9h0YGV9Vv8gg/Dvkmv
280 -
281 -23M7XqM4+IUraJsRZbl1etdcM4KQSCOZoF4Zyv+pXuq4pf31kQNCkHaikWzLUkUG
282 -
283 -FPQxr0vA49mCYwfd/ZL3ppM/0IWmxRwloV1Gb9q8iDBUcJGSDokZnT7diUxzzOcd
284 -
285 -+UJ6xUhFq1v46Y7vO+73XROLv34JEBC0bIw2ErL6+AbzhHwb2mkuSccG9Ks37g3Z
286 -
287 -dyyjjj8hm1wvHWepuWqEssaiS3HD5zAsI0v85xS8RwNj3zLfd8o1WC666n3CO+ij
288 -
289 -VdRmR4kCgYEA+/sEFxpfaRomqcLwJebZcZH06U1RfJFfnbH2/Q6fANf8zNxwWs9A
290 -
291 -O+jyk/CLhHYRIk6VIOMQmWwEYgJ2eAHfw2Diwj4/0eqkGu+yZOS6KTCewxSV73vc
292 -
293 -SvACramJy4y6yEgDN5onwR1XqfVMfA0LzTcSupHR/xvrpf/gCsNFPxUCgYEAyAFd
294 -
295 -nMUhJFSq3pOogxA43aJSkA8YuDS3jpBkKQ6vx81APpIMabQauOxFDt488TZGP3Yy
296 -
297 -lhpa/lfFIgu2K7CgV4dUp+JtJJoZ/F+ExxUUzdqB4zxzWywAcc3RebfwP6qASwFT
298 -
299 -G3mXYci4tgNWR+k5CSsuLXDk/OT5uo5GeGAEc/8CgYEAk6V8uxDP8STKnNRFpN/E
300 -
301 -b6CHciDE64m/DgbWY2cq0fK9BUjxaLRhvfj8EqVzCrWnyoNjLHcAJfW+B7PLuPvY
302 -
303 -IoJlvE1/Vb/4UnQ7ApVnY3VCwaoRRNc9uIcz+pAJ1sRqOarAf9cLDkPkNwktvM5k
304 -
305 -KOXpSnrhIms4w/bPT18l9xUCgYBsAMDKbXEuK0JyGw5+Z/4tQQCQpnZU0rLkm3ha
306 -
307 -64FkxaORplBprEZZ4cyQ8NW78/EPSAadI/JLMp5TejuPcDvFyGCgoBcMEuNBc1tC
308 -
309 -HlIzr3FAgl5Qt3wt+FTMA9YKq0nINxjn10s2FKwaLccj4f9YwiaXh0VAg22PnlDT
310 -
311 -pBYDhQKBgQCMwyKXJ4zYiDRdvLvgKzeuKaU4KNQItHE4KORPfkecjPoENt4bKxDw
312 -
313 -2EdNFQLIoqBHL1s+/8+SzhCI31V7pkTs1AqCxDExJS7+8Z5NQFQIo/jooUo0N80E
314 -
315 -y3ZZS6OLOXXscEqhMogf1grfbabXM9OkgTIq43cPQHtMGQiFAtIJkg==
316 -
317 -~-~-~-~--END RSA PRIVATE KEY~-~-~-~--}
318 -
319 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
320 -
321 -[[image:image-20240528174702-17.png]]
322 -
323 -Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
324 -
325 -
326 -==== 4.1.2.4 Re-upgrade the firmware ====
327 -
328 -
329 -After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
330 -
331 -
332 -== 4.2  For -CB /-CS model ==
333 -
334 -=== 4.2.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
335 -
336 -
337 -User can change device firmware to::
338 -
339 -* Update with new features.
340 -
341 -* Fix bugs.
342 -
343 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/mk9u5ux3cfo94ke0s67ik/ADOIOdwIQfCO2WUZt0MxXyU?rlkey=7o6uaywrebbnsvuj4r0r694x6&st=smrmjj7t&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
344 -
345 -Methods to Update Firmware:
346 -
347 -* (Recommended way) OTA firmware update via BLE: [[**Instruction**>>url:http://wiki.dragino.com/xwiki/bin/view/Main/BLE_Firmware_Update_NB_Sensors_BC660K-GL/]].
348 -
349 -* Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
350 -
351 -=== 4.2.2 Configure certificate ===
352 -
353 -
354 354  After upgrade the firmware, the serial port displays as follows:
355 355  
141 +(% data-sider-select-id="8b6a9e23-dec0-476c-acd4-098aa19fe1f3" %)
356 356  [[image:image-20240528174330-13.png||height="286" width="568"]]
357 357  
358 358  
359 -==== 4.2.2.1 Configure CA certificate ====
145 +=== 4.2.1 Configure CA certificate ===
360 360  
361 -(% style="color:red" %)**Note:You should select one of the certificates.Either CA1 or CA3 can be used**
362 362  
363 363  Please input the certificate in PEM format for the user.
364 364  
... ... @@ -416,7 +416,7 @@
416 416  Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
417 417  
418 418  
419 -==== 4.2.2.2 Configure client certificate ====
204 +=== 4.2.2 Configure client certificate ===
420 420  
421 421  
422 422  Use the AT command AT+CLICERT as follows:
... ... @@ -468,7 +468,7 @@
468 468  Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
469 469  
470 470  
471 -==== 4.2.2.3 Configure client private key ====
256 +=== 4.2.3 Configure client private key ===
472 472  
473 473  
474 474  Use the AT command AT+CLIKEY, as shown below
... ... @@ -534,25 +534,14 @@
534 534  Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
535 535  
536 536  
537 -==== 4.2.2.4 For -CB /-CS model Certificate setting error/change certificate ====
322 +=== 4.3.3 Re-upgrade the firmware ===
538 538  
539 539  
540 -(% data-sider-select-id="7c5a8abc-e707-467b-ac02-db0a89098320" %)When you set the wrong certificate or you need to re-set another certificate.
541 -Please use the following three commands:
325 +After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
542 542  
543 -(% style="color:blue" %)**AT+DELCLIKEY}**
544 544  
545 -(% style="color:blue" %)**AT+DELCLICERT}**
328 += 5. Configure draginoNB-device =
546 546  
547 -(% style="color:blue" %)**AT+DELCACERT}**(%%)
548 -(% style="color:blue" %)
549 -
550 -(% style="color:red" %)**Note: 1.When there is no certificate on the device, a deletion error will be displayed.
551 - 2.When the device already has a certificate, using the command to configure the certificate again will display a configuration error.**
552 -
553 -
554 -= (% data-sider-select-id="6b5deb69-539b-42e1-a7bc-a300eb1fea73" %)5. Configure draginoNB-device(%%) =
555 -
556 556  == 5.1 Configure the data format sent by the device ==
557 557  
558 558  
... ... @@ -578,7 +578,7 @@
578 578  == 5.4 Set the TLS mode ==
579 579  
580 580  
581 -(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**AT+TLSMOD=1,2**
355 +(% style="color:blue" %)**AT+TLSMOD=1,2**
582 582  
583 583  To use the TLS mode certificate function, users need to configure the (% style="color:blue" %)**AT+TLSMOD**(%%) command.
584 584  
... ... @@ -589,21 +589,9 @@
589 589  (% style="color:blue" %)**AT+TLSMOD=1,2** (%%) ~/~/ Perform server and client authentication if requested by the remote server.(In AWS we recommend using this mode)
590 590  
591 591  
592 -(% data-sider-select-id="f443b9bc-1195-4fe2-965d-7de84f78747f" %)
593 -== 5.5 Set the MQOS ==
366 +Restart the device
594 594  
595 595  
596 -(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue; font-weight:bold" %)**AT+MQOS**(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**=XX (Depends on your server configuration)**
597 -
598 -Please find it in AWS's MQTT test client
599 -
600 -[[image:image-20240529164339-1.png||height="480" width="927"]]
601 -
602 -
603 -(% data-sider-select-id="fef22158-6e5e-46e4-b59e-fe457e562376" %)
604 -== 5.6 Restart the device ==
605 -
606 -
607 607  = 6. View data on AWS =
608 608  
609 609  == 6.1 Find MQTT test client in test ==
... ... @@ -624,3 +624,5 @@
624 624  [[image:image-20240528175133-19.png||height="563" width="1022"]]
625 625  
626 626  [[image:image-20240528175154-20.png||height="752" width="1042"]]
389 +
390 +
image-20240814155410-1.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.kai
Size
... ... @@ -1,1 +1,0 @@
1 -77.8 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0