<
From version < 29.1 >
edited by Xiaoling
on 2024/08/19 16:28
To version < 24.1 >
edited by Bei Jinggeng
on 2024/05/29 16:43
>
Change comment: Uploaded new attachment "image-20240529164339-1.png", version {1}

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Xiaoling
1 +XWiki.Bei
Content
... ... @@ -34,9 +34,9 @@
34 34  
35 35  c. After clicking to enter the policy configuration page, follow the clicking sequence below to go to the json configuration interface, and then fill in the following fields in the "statement" keyword:
36 36  
37 +(% data-sider-select-id="7bc0f6db-481d-435a-ad0c-92cf0ede3ea4" %)
38 +(% data-sider-select-id="8026a4d9-df91-4895-b9c5-3d6ac9b46012" %)**{**
37 37  
38 -**{**
39 -
40 40  **~ "Version": "2012-10-17",**
41 41  
42 42  **~ "Statement": [**
... ... @@ -99,9 +99,9 @@
99 99  
100 100  (% style="color:blue" %)**5. When you click to create things, the certificate download page will pop up**
101 101  
102 +(% data-sider-select-id="398c8d35-75ff-4077-85bb-9e0377efa186" %)
103 +(% data-sider-select-id="087aa6c7-c542-4afc-9ce6-291538c31764" %)**This certificate is very important.**(%%) After creating the device, you must download the certificate of the device so that our NB device can connect normally.
102 102  
103 -**This certificate is very important.** After creating the device, you must download the certificate of the device so that our NB device can connect normally.
104 -
105 105  Please download all the following certificates and put them in a folder.
106 106  
107 107  [[image:image-20240528173926-10.png]]
... ... @@ -114,17 +114,9 @@
114 114  
115 115  = 4. Connect to AWS using Dragino-NB device =
116 116  
117 +== 4.1 Upgrade the firmware to configure TTS firmware to set the certificate ==
117 117  
118 -(% id="cke_bm_37736S" style="color:red; display:none" %)** **(% style="color:red" %)**Note: **(%%)In order to avoid problems with certificate writing, you need to set the serial port assistant to automatically add a newline character when sending commands, if there is no such newline character, the certificate written will be invalid.(Using the serial port assistant as an example)
119 119  
120 -[[image:image-20240814155410-1.png||height="328" width="563"]]
121 -
122 -
123 -== 4.1 For -NB /-NS model ==
124 -
125 -=== 4.1.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
126 -
127 -
128 128  User can change device firmware to::
129 129  
130 130  * Update with new features.
... ... @@ -131,7 +131,7 @@
131 131  
132 132  * Fix bugs.
133 133  
134 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
126 +Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>url:https://www.dropbox.com/sh/sxrgszkac4ips0q/AAA7xVIHen982Nc0edNPaB-Wa/NB-IoT/Set%20up%20TLS%20certificate?dl=0&subfolder_nav_tracking=1||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
135 135  
136 136  Methods to Update Firmware:
137 137  
... ... @@ -139,227 +139,19 @@
139 139  
140 140  * Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
141 141  
142 -=== 4.1.2 Configure certificate ===
143 143  
144 144  
145 -After upgrade the firmware, the serial port displays as follows:
136 +== 4.2 Configure certificate ==
146 146  
147 -[[image:image-20240528174330-13.png||height="286" width="568"]]
148 148  
149 -
150 -==== 4.1.2.1  Configure CA certificate ====
151 -
152 -
153 -Please input the certificate in PEM format for the user.
154 -
155 -Use the AT command AT+CACERT as follows:
156 -
157 -AT+CACERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
158 -
159 -MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
160 -
161 -ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
162 -
163 -b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
164 -
165 -MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
166 -
167 -b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
168 -
169 -ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
170 -
171 -9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
172 -
173 -IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
174 -
175 -VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L
176 -
177 -93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
178 -
179 -jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
180 -
181 -AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA
182 -
183 -A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
184 -
185 -U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs
186 -
187 -N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
188 -
189 -o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
190 -
191 -5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy
192 -
193 -rqXRfboQnoZsG4q5WTP468SQvvG5
194 -
195 -~-~-~-~--END CERTIFICATE~-~-~-~--}
196 -
197 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
198 -
199 -[[image:image-20240528174408-14.png]]
200 -
201 -
202 -After successful execution, as shown in the following figure.
203 -
204 -[[image:image-20240528174502-15.png]]
205 -
206 -Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
207 -
208 -
209 -==== 4.1.2.2 Configure client certificate ====
210 -
211 -
212 -Use the AT command AT+CLICERT as follows:
213 -
214 -AT+CLICERT=~-~-~-~--BEGIN CERTIFICATE~-~-~-~--
215 -
216 -MIIDWTCCAkGgAwIBAgIUYSpJUzfb4NTa76JJxd2th0fZA8swDQYJKoZIhvcNAQEL
217 -
218 -BQAwTTFLMEkGA1UECwxCQW1hem9uIFdlYiBTZXJ2aWNlcyBPPUFtYXpvbi5jb20g
219 -
220 -SW5jLiBMPVNlYXR0bGUgU1Q9V2FzaGluZ3RvbiBDPVVTMB4XDTI0MDUyNDA4MDI0
221 -
222 -NVoXDTQ5MTIzMTIzNTk1OVowHjEcMBoGA1UEAwwTQVdTIElvVCBDZXJ0aWZpY2F0
223 -
224 -ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMTdc1GQLVBohAeCJD6n
225 -
226 -6WTFAFrygTch90a5wUr2bhlVuDxvEhEKNcmu5vOCo5agmfLWb2VCxgezgvQOBYQ8
227 -
228 -1oTqXJNdl4tS0DICfqb/ogVHWGHRao67XyhbPNBS0j/nCPTIIk6+/NBeYPOjaG+p
229 -
230 -utfXE7SGIEcc3RevkYkUJx6y+WH7MLjj1mufuXBVWIL1RrfrIRPw6auVk7dhS5rU
231 -
232 -NvYcJa7Qd6gpAh1DzPj7ZECrv7fEIIBDEsSYOy6ToWtzqGIVcIAHBDfORB0Hcm+N
233 -
234 -7wG3KDf61P4aWkLlkP5pRUaUIQdVblxginmx2K3n8t/WP7QcfITa191rjEVVBXmk
235 -
236 -ROsCAwEAAaNgMF4wHwYDVR0jBBgwFoAUs8Caohh1ZGP8kjSn3rtxJiJJ9IswHQYD
237 -
238 -VR0OBBYEFCjwGwqD7FG9UCNm3wjFQX4HixzfMAwGA1UdEwEB/wQCMAAwDgYDVR0P
239 -
240 -AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4IBAQBgqI49a4PBQZYrFM63TX3EHgdd
241 -
242 -N6Pj7AytjO+SrKNMCSo/OtIvhDTxOocr1vKrux1Tw5qmrllrIXLtlGtbmln5DS6a
243 -
244 -DTCLrjwcIFIabLxpx5DPY1WSMYvL04SW7d4Y+3SxOFNRotDSiomr8eIIac0d3HE2
245 -
246 -B5b0SnWZgWbrhjNUgvwo8l8tA9DOGIr2MeQ5kPjudOOiYSR3HC0v+jviBMV6VX8M
247 -
248 -LHVH3CRshHDKBGpV1NZ1RAm9EY/oRGtSiMsyjRh6hegC0vehwVxaC4w9qG0ASkzz
249 -
250 -42OOGfNqhYnYDiKTEIkazaoAFpTKDejWBaL7W5VpthUkQOl67IyX+ohuUKTo
251 -
252 -~-~-~-~--END CERTIFICATE~-~-~-~--}
253 -
254 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
255 -
256 -[[image:image-20240528174630-16.png||height="553" width="747"]]
257 -
258 -Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
259 -
260 -
261 -==== 4.1.2.3 Configure client private key ====
262 -
263 -
264 -Use the AT command AT+CLIKEY, as shown below
265 -
266 -AT+CLIKEY=~-~-~-~--BEGIN RSA PRIVATE KEY~-~-~-~--
267 -
268 -MIIEpAIBAAKCAQEAxN1zUZAtUGiEB4IkPqfpZMUAWvKBNyH3RrnBSvZuGVW4PG8S
269 -
270 -EQo1ya7m84KjlqCZ8tZvZULGB7OC9A4FhDzWhOpck12Xi1LQMgJ+pv+iBUdYYdFq
271 -
272 -jrtfKFs80FLSP+cI9MgiTr780F5g86Nob6m619cTtIYgRxzdF6+RiRQnHrL5Yfsw
273 -
274 -uOPWa5+5cFVYgvVGt+shE/Dpq5WTt2FLmtQ29hwlrtB3qCkCHUPM+PtkQKu/t8Qg
275 -
276 -gEMSxJg7LpOha3OoYhVwgAcEN85EHQdyb43vAbcoN/rU/hpaQuWQ/mlFRpQhB1Vu
277 -
278 -XGCKebHYrefy39Y/tBx8hNrX3WuMRVUFeaRE6wIDAQABAoIBAFhAOcjvjBDGuaEw
279 -
280 -CxV3al49HfqnSZuwg0xWSztSm2qKDcwxsnSnEhO2b1vsTW9h0YGV9Vv8gg/Dvkmv
281 -
282 -23M7XqM4+IUraJsRZbl1etdcM4KQSCOZoF4Zyv+pXuq4pf31kQNCkHaikWzLUkUG
283 -
284 -FPQxr0vA49mCYwfd/ZL3ppM/0IWmxRwloV1Gb9q8iDBUcJGSDokZnT7diUxzzOcd
285 -
286 -+UJ6xUhFq1v46Y7vO+73XROLv34JEBC0bIw2ErL6+AbzhHwb2mkuSccG9Ks37g3Z
287 -
288 -dyyjjj8hm1wvHWepuWqEssaiS3HD5zAsI0v85xS8RwNj3zLfd8o1WC666n3CO+ij
289 -
290 -VdRmR4kCgYEA+/sEFxpfaRomqcLwJebZcZH06U1RfJFfnbH2/Q6fANf8zNxwWs9A
291 -
292 -O+jyk/CLhHYRIk6VIOMQmWwEYgJ2eAHfw2Diwj4/0eqkGu+yZOS6KTCewxSV73vc
293 -
294 -SvACramJy4y6yEgDN5onwR1XqfVMfA0LzTcSupHR/xvrpf/gCsNFPxUCgYEAyAFd
295 -
296 -nMUhJFSq3pOogxA43aJSkA8YuDS3jpBkKQ6vx81APpIMabQauOxFDt488TZGP3Yy
297 -
298 -lhpa/lfFIgu2K7CgV4dUp+JtJJoZ/F+ExxUUzdqB4zxzWywAcc3RebfwP6qASwFT
299 -
300 -G3mXYci4tgNWR+k5CSsuLXDk/OT5uo5GeGAEc/8CgYEAk6V8uxDP8STKnNRFpN/E
301 -
302 -b6CHciDE64m/DgbWY2cq0fK9BUjxaLRhvfj8EqVzCrWnyoNjLHcAJfW+B7PLuPvY
303 -
304 -IoJlvE1/Vb/4UnQ7ApVnY3VCwaoRRNc9uIcz+pAJ1sRqOarAf9cLDkPkNwktvM5k
305 -
306 -KOXpSnrhIms4w/bPT18l9xUCgYBsAMDKbXEuK0JyGw5+Z/4tQQCQpnZU0rLkm3ha
307 -
308 -64FkxaORplBprEZZ4cyQ8NW78/EPSAadI/JLMp5TejuPcDvFyGCgoBcMEuNBc1tC
309 -
310 -HlIzr3FAgl5Qt3wt+FTMA9YKq0nINxjn10s2FKwaLccj4f9YwiaXh0VAg22PnlDT
311 -
312 -pBYDhQKBgQCMwyKXJ4zYiDRdvLvgKzeuKaU4KNQItHE4KORPfkecjPoENt4bKxDw
313 -
314 -2EdNFQLIoqBHL1s+/8+SzhCI31V7pkTs1AqCxDExJS7+8Z5NQFQIo/jooUo0N80E
315 -
316 -y3ZZS6OLOXXscEqhMogf1grfbabXM9OkgTIq43cPQHtMGQiFAtIJkg==
317 -
318 -~-~-~-~--END RSA PRIVATE KEY~-~-~-~--}
319 -
320 -(% style="color:red" %)**Note: Be sure to add a terminator "}" at the end of the command. Otherwise, the command will not execute successfully.**
321 -
322 -[[image:image-20240528174702-17.png]]
323 -
324 -Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
325 -
326 -
327 -==== 4.1.2.4 Re-upgrade the firmware ====
328 -
329 -
330 -After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
331 -
332 -
333 -== 4.2  For -CB /-CS model ==
334 -
335 -=== 4.2.1 Upgrade the firmware to configure TTS firmware to set the certificate ===
336 -
337 -
338 -User can change device firmware to::
339 -
340 -* Update with new features.
341 -
342 -* Fix bugs.
343 -
344 -Firmware and changelog can be downloaded from : **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/mk9u5ux3cfo94ke0s67ik/ADOIOdwIQfCO2WUZt0MxXyU?rlkey=7o6uaywrebbnsvuj4r0r694x6&st=smrmjj7t&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]**
345 -
346 -Methods to Update Firmware:
347 -
348 -* (Recommended way) OTA firmware update via BLE: [[**Instruction**>>url:http://wiki.dragino.com/xwiki/bin/view/Main/BLE_Firmware_Update_NB_Sensors_BC660K-GL/]].
349 -
350 -* Update through UART TTL interface : **[[Instruction>>url:http://wiki.dragino.com/xwiki/bin/view/Main/UART_Access_for_NB_ST_BC660K-GL/#H4.2UpdateFirmware28Assumethedevicealreadyhaveabootloader29]]**.
351 -
352 -=== 4.2.2 Configure certificate ===
353 -
354 -
355 355  After upgrade the firmware, the serial port displays as follows:
356 356  
141 +(% data-sider-select-id="8b6a9e23-dec0-476c-acd4-098aa19fe1f3" %)
357 357  [[image:image-20240528174330-13.png||height="286" width="568"]]
358 358  
359 359  
360 -==== 4.2.2.1 Configure CA certificate ====
145 +=== 4.2.1 Configure CA certificate ===
361 361  
362 -(% style="color:red" %)**Note:You should select one of the certificates.Either CA1 or CA3 can be used**
363 363  
364 364  Please input the certificate in PEM format for the user.
365 365  
... ... @@ -417,7 +417,7 @@
417 417  Display (% style="color:blue" %)**"Successfully configured CA certificate."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
418 418  
419 419  
420 -==== 4.2.2.2 Configure client certificate ====
204 +=== 4.2.2 Configure client certificate ===
421 421  
422 422  
423 423  Use the AT command AT+CLICERT as follows:
... ... @@ -469,7 +469,7 @@
469 469  Display (% style="color:blue" %)**"Successfully configured client certificate."**(%%) Configuration successful, otherwise configuration failed.
470 470  
471 471  
472 -==== 4.2.2.3 Configure client private key ====
256 +=== 4.2.3 Configure client private key ===
473 473  
474 474  
475 475  Use the AT command AT+CLIKEY, as shown below
... ... @@ -535,25 +535,14 @@
535 535  Display(% style="color:blue" %)** "Successfully configured client private key."**(%%) If the configuration is successful, otherwise it is considered configuration failure.
536 536  
537 537  
538 -==== 4.2.2.4 For -CB /-CS model Certificate setting error/change certificate ====
322 +=== 4.3.3 Re-upgrade the firmware ===
539 539  
540 540  
541 -(% data-sider-select-id="7c5a8abc-e707-467b-ac02-db0a89098320" %)When you set the wrong certificate or you need to re-set another certificate.
542 -Please use the following three commands:
325 +After the certificate configuration is completed, Re-upgrade to the firmware you originally used.
543 543  
544 -(% style="color:blue" %)**AT+DELCLIKEY}**
545 545  
546 -(% style="color:blue" %)**AT+DELCLICERT}**
328 += 5. Configure draginoNB-device =
547 547  
548 -(% style="color:blue" %)**AT+DELCACERT}**(%%)
549 -(% style="color:blue" %)
550 -
551 -(% style="color:red" %)**Note: 1.When there is no certificate on the device, a deletion error will be displayed.
552 - 2.When the device already has a certificate, using the command to configure the certificate again will display a configuration error.**
553 -
554 -
555 -= (% data-sider-select-id="6b5deb69-539b-42e1-a7bc-a300eb1fea73" %)5. Configure draginoNB-device(%%) =
556 -
557 557  == 5.1 Configure the data format sent by the device ==
558 558  
559 559  
... ... @@ -579,7 +579,7 @@
579 579  == 5.4 Set the TLS mode ==
580 580  
581 581  
582 -(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**AT+TLSMOD=1,2**
355 +(% style="color:blue" %)**AT+TLSMOD=1,2**
583 583  
584 584  To use the TLS mode certificate function, users need to configure the (% style="color:blue" %)**AT+TLSMOD**(%%) command.
585 585  
... ... @@ -590,21 +590,9 @@
590 590  (% style="color:blue" %)**AT+TLSMOD=1,2** (%%) ~/~/ Perform server and client authentication if requested by the remote server.(In AWS we recommend using this mode)
591 591  
592 592  
593 -(% data-sider-select-id="f443b9bc-1195-4fe2-965d-7de84f78747f" %)
594 -== 5.5 Set the MQOS ==
366 +Restart the device
595 595  
596 596  
597 -(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue; font-weight:bold" %)**AT+MQOS**(% data-sider-select-id="cf7bb573-8375-4479-9801-df8bb7dab3ba" style="color:blue" %)**=XX (Depends on your server configuration)**
598 -
599 -Please find it in AWS's MQTT test client
600 -
601 -[[image:image-20240529164339-1.png||height="480" width="927"]]
602 -
603 -
604 -(% data-sider-select-id="fef22158-6e5e-46e4-b59e-fe457e562376" %)
605 -== 5.6 Restart the device ==
606 -
607 -
608 608  = 6. View data on AWS =
609 609  
610 610  == 6.1 Find MQTT test client in test ==
image-20240814155410-1.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.kai
Size
... ... @@ -1,1 +1,0 @@
1 -77.8 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0