Changes for page Dragino -NB/-CB device connection to AWS platform instructions
Last modified by Mengting Qiu on 2025/07/29 15:24
From version 49.9
edited by Mengting Qiu
on 2025/07/29 14:15
on 2025/07/29 14:15
Change comment:
There is no comment for this version
To version 52.3
edited by Mengting Qiu
on 2025/07/29 15:22
on 2025/07/29 15:22
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 1 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -322,23 +322,21 @@ 322 322 After completing the certificate configuration, Burn the [[bootloader>>https://www.dropbox.com/sh/u0uzvvnn58yrie4/AAAvvF_KRveNgmDejzp23ziLa/NB-IoT/Bootloader?dl=0&subfolder_nav_tracking=1]] firmware first, then re-burn the original working [[firmware>>https://www.dropbox.com/sh/u0uzvvnn58yrie4/AACREHllkTe0rATD4ZOqddyga/NB-IoT?dl=0]]. 323 323 324 324 325 -==== 4.1.2.5 Certificate Managementfor -NB/-NS Models ====325 +==== 4.1.2.5 Clear Certificates by Overwriting (For -NB/-NS Modules) ==== 326 326 327 327 328 328 The -NB/-NS modules (BC660K) do not support clearing certificates via AT commands or firmware updates. 329 329 330 -To effectively remove existing certificates or test certificate upload functionality, users may overwrite them with dummy data.330 +To effectively remove existing certificates, users may overwrite them with dummy data. 331 331 332 + 332 332 To effectively "clear" existing certificates, users may overwrite them with arbitrary data by following these steps: 333 333 334 334 **Scenario A:** Clearing Existing Certificates 335 335 336 - If users wanttoremoveoldficates:337 +1.Flash the certificate-provisioning firmware: **[[Set up TLS certificate - Dropbox>>https://www.dropbox.com/scl/fo/1ykfsesmr3702tj3kp663/AOOyH1GiVEOGR41gASuiDk0?rlkey=1q7a1b5yvjgt87d16w8tt0cum&st=vdy765ut&dl=0||data-sider-select-id="830d1b64-cb24-48b3-91e4-49da5c3f0783"]]** 337 337 338 - 339 - 340 - 341 -Use the standard AT commands (AT+CACERT, AT+CLICERT, AT+CLIKEY) to write non-certificate data (e.g., random strings like 123456). 339 +2. Use the standard AT commands (AT+CACERT, AT+CLICERT, AT+CLIKEY) to write non-certificate data (e.g., random strings like 123456). 342 342 Example: 343 343 344 344 AT+CACERT=123456} ... ... @@ -347,11 +347,17 @@ 347 347 348 348 AT+CLIKEY=123456} 349 349 350 -2. Upload Valid Certificates (Optional): 351 351 352 -After overwriting, users may proceed to upload new valid certificates if needed. 353 353 350 +2. Check for success responses after each command: 354 354 352 +[[image:1753772253801-330.png||height="495" width="620"]] 353 + 354 +* If you get "Failure", retry or check module connectivity. 355 + 356 +3. Later, when you have real certificates, overwrite the dummy data with actual certificates. 357 + 358 + 355 355 == 4.2 For -CB /-CS model == 356 356 357 357 === 4.2.1 Upgrade the firmware to configure TLS firmware to set the certificate ===
- 1753772253801-330.png
-
- Author
-
... ... @@ -1,0 +1,1 @@ 1 +XWiki.ting - Size
-
... ... @@ -1,0 +1,1 @@ 1 +88.7 KB - Content