Version 49.1 by Kilight Cao on 2022/08/15 18:00

Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15 [[image:image-20220531155018-18.png]]
16
17
18
19 == **1.2  Steps** ==
20
21
22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
38
39 * change the script monitor_gateway.sh with properly users setting:
40
41 (% class="box infomessage" %)
42 (((
43 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
44 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
45 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
46 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
47 )))
48
49
50 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
51
52 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
53
54 (% class="box infomessage" %)
55 (((
56 # For details see man 4 crontabs
57 # Example of job definition:
58 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
59 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
60 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
61 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
62 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
63 # | | | | |
64 # * * * * * user-name command to be executed
65 #*/10 * * * *  checklog
66 ~* 23 * * *  /etc/init.d/auto_update start
67 */20 * * * *  /usr/bin/monitor_gateway.sh     
68 )))
69
70 * Reboot device.
71
72
73
74 == **1.3  Monitor Public IP** ==
75
76
77 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
78
79 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
80
81
82 [[image:image-20220531145559-2.png]]
83
84 Find Public IP
85
86
87
88 = **2.  Remote Access** =
89
90 == **2.1  Remote Access via Remote.it.** ==
91
92
93 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
94
95
96 (% style="color:red" %)**Important Notice:**
97
98 * Remote.it access will give full control of your device to remote support.
99 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
100
101 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
102 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
103
104
105 (% style="color:blue" %)**1. Install the Remote.it software**
106
107 Users can directly click** "Install"** on the Web UI to install Remote. it.
108
109
110 [[image:image-20220725134300-1.png||height="438" width="905"]]
111
112
113
114 (% style="color:blue" %)**2. Enter the license key**
115
116 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
117
118 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
119
120
121 (% class="box infomessage" %)
122 (((
123 **57F60715-606F-510D-A3D2-739860EBDB98**
124 )))
125
126 [[image:image-20220725113010-1.png||height="455" width="899"]]
127
128
129
130 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
131
132 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
133
134
135 [[image:image-20220725115720-2.png||height="658" width="900"]]
136
137
138 === **How to register hp0d with AWS** ===
139
140
141 **Prerequisites:**
142
143 Users must have an account and APP for remote.it
144
145 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
146
147
148 (% style="color:blue" %)**1. Click "+" in the APP to add a device**
149
150 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
151
152
153 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
154
155
156 (% style="color:blue" %)**2.Copy the register device command**
157
158
159 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
160
161
162 (% style="color:blue" %)**3.Enter the command copied from the previous step on the HP0D Linux command line**
163
164 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
165
166
167 (% style="color:blue" %)**4.Check whether the device is successfully registered on the Remote.it APP**
168
169
170 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
171
172
173 == **2.2  RSSH Introduction** ==
174
175
176 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
177
178 (% style="color:red" %)**Important Notice:**
179
180 (% class="box warningmessage" %)
181 (((
182 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
183 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
184 )))
185
186
187 **Below gateway support reverse SSH access:**
188
189 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
190 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
191 * LG02, OLG02
192 * LG308, DLOS8
193 * LPS8
194 * LIG16
195 * MS14 series if installed with the same firmware.
196
197
198
199
200 === **2.2.1  End User Guide to use SSH access** ===
201
202
203 Go to this the Reverse SSH page as below:
204
205
206 [[image:image-20220531150151-3.png]]
207
208 Get the RSSH configure page
209
210
211
212 [[image:image-20220531150338-4.png]]
213
214 Connection OK.
215
216
217 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
218 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
219 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
220 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
221 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
222
223 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
224
225
226
227 === **2.2.2  Set Up RSSH Server** ===
228
229
230 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
231
232
233
234 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
235
236
237 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
238
239 [[image:image-20220531150750-5.png]]
240
241
242 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
243
244 [[image:image-20220531150811-6.png]]
245
246
247 **Debug** :
248
249 (((
250 (% class="box" %)
251 (((
252 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
253 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
254 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
255 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
256 )))
257 )))
258
259 [[image:image-20220531151516-7.png]]
260
261
262 (((
263 (% class="box" %)
264 (((
265 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
266 please insatell sqlite3.
267 )))
268 )))
269
270 [[image:image-20220531151628-8.png]]
271
272
273 (% style="color:blue" %)**How to install Sqlit3:**
274
275 (% class="box infomessage" %)
276 (((
277 **~ Step 1:** Download the SQLit3 installation package
278 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
279
280 **Step 2: **tar the SQLit3 installation package
281 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
282
283 **Step 3:** Generate the makefile
284 cd sqlite-autoconf-3350300/;./configure
285
286 **Step 4:** Compile makefile
287 sudo make
288
289 **Step 5:** Install makefile
290 sudo make install
291
292 **Check:**
293 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
294 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
295
296 **debug:**
297 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
298 Please execute the command /sbin/ldconfig.
299 After that execute the command ./sqlite3 test.db again.
300 )))
301
302
303
304 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
305
306
307 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
308
309 user must enter the root account and run the following commands
310
311 (% class="box infomessage" %)
312 (((
313 **$ ./create_sqlite3_db.sh
314 $ ./rssh_serv -p  3721 2>&1 &
315 $ ps -ef | grep rssh_serv check 3721 port**
316 )))
317
318 [[image:image-20220531151958-10.png]]
319
320
321 **Debug:**
322
323 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
324 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
325 }}}
326
327 {{{ if fail to open dpvlry or to bind to it
328 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
329 }}}
330
331
332
333 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
334
335
336 (% class="box infomessage" %)
337 (((
338 **1):**  sudo useradd XXXXX (custom user name)
339 **2):**  sudo passwd xxxxxx
340 **3):**  cp /bin/bash /bin/rbash
341 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
342 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
343 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
344 )))
345
346 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
347
348
349
350 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
351
352
353 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
354
355
356 **Debug:**
357
358 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
359
360
361
362 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
363
364
365
366 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
367
368
369 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
370
371 [[image:image-20220531152419-11.png]]
372
373
374
375 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
376
377
378 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
379
380 [[image:image-20220531152549-12.png]]
381
382
383
384 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
385
386
387 This is same as connect Dragino Support Server but just change the server address to customize server address.
388
389 [[image:image-20220531152633-13.png]]
390
391
392
393 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
394
395
396 Rssh Host connection Ok
397
398 [[image:image-20220531152815-14.png]]
399
400
401 User can use common ps | grep ssh to check it in the gateway.
402
403 [[image:image-20220531152840-15.png]]
404
405
406
407 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
408
409
410 Check what gateways link to server.
411
412 (% class="box infomessage" %)
413 (((
414 **$ ./connect-gw.sh -l**
415 )))
416
417 [[image:image-20220531153016-16.png]]
418
419
420
421 Access the gateway
422
423 (% class="box infomessage" %)
424 (((
425 **$ ./connect-gw.sh <GWID>**
426 )))
427
428 [[image:image-20220531153219-17.png]]
429
430