Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15
16 [[image:image-20220531155018-18.png]]
17
18
19
20 == **1.2  Steps** ==
21
22
23 * Create account in ThingsSpeak and creat channel.
24 * Download script from dragino site and move it to properly directory
25
26 (% class="box infomessage" %)
27 (((
28 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
29 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
30 Connecting to 162.241.22.11:80
31 Writing to 'monitor_gateway.sh'
32 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
33 Download completed (1860 bytes)
34 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
35 root@dragino-1baf44:~~#
36 root@dragino-1baf44:~~#
37 )))
38
39
40
41 * change the script monitor_gateway.sh with properly users setting:
42
43 (% class="box infomessage" %)
44 (((
45 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
46 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
47 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
48 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
49 )))
50
51
52
53 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
54
55 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
56
57 (% class="box infomessage" %)
58 (((
59 # For details see man 4 crontabs
60 # Example of job definition:
61 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
62 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
63 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
64 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
65 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
66 # | | | | |
67 # * * * * * user-name command to be executed
68 #*/10 * * * *  checklog
69 ~* 23 * * *  /etc/init.d/auto_update start
70 */20 * * * *  /usr/bin/monitor_gateway.sh     
71 )))
72
73 * Reboot device.
74
75
76
77 == **1.3  Monitor Public IP** ==
78
79
80 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
81
82 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
83
84
85 [[image:image-20220531145559-2.png]]
86
87 Find Public IP
88
89
90
91 = **2.  Remote Access** =
92
93 == **2.1  Remote Access via Remote.it.** ==
94
95
96 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
97
98
99 (% style="color:red" %)**Important Notice:**
100
101 * Remote.it access will give full control of your device to remote support.
102 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
103
104 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
105 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
106
107
108 (% style="color:blue" %)**1. Install the Remote.it software**
109
110 Users can directly click** "Install"** on the Web UI to install Remote. it.
111
112
113 [[image:image-20220725134300-1.png||height="438" width="905"]]
114
115
116
117 (% style="color:blue" %)**2. Enter the license key**
118
119 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
120
121 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
122
123
124 (% class="box infomessage" %)
125 (((
126 **57F60715-606F-510D-A3D2-739860EBDB98**
127 )))
128
129 [[image:image-20220725113010-1.png||height="455" width="899"]]
130
131
132
133 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
134
135 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
136
137
138 [[image:image-20220725115720-2.png||height="658" width="900"]]
139
140
141
142 === **2.1.1  How to register hp0d with Remote.it** ===
143
144
145 **Prerequisites:**
146
147 Users must have an account and APP for remote.it
148
149 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
150
151
152 (% style="color:blue" %)**1.  Click "+" in the APP to add a device**
153
154 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
155
156
157 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
158
159
160
161 (% style="color:blue" %)**2.  Copy the register device command**
162
163
164 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
165
166
167
168 (% style="color:blue" %)**3.  Enter the command copied from the previous step on the HP0D Linux command line**
169
170
171 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
172
173
174
175 (% style="color:blue" %)**4.  Check whether the device is successfully registered on the Remote.it APP**
176
177
178 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
179
180
181
182 === **2.1.2  Trouble Shooting** ===
183
184
185 ==== **What should users do when gateway Remote.it installation fails** ====
186
187 [[image:image-20220907162028-4.png||height="564" width="1148"]]
188
189
190 **(% style="color:blue" %)Step 1:  **(%%)Users can download the archive and upload it to the gateway:** [[attach:backup.tar.gz||target="_blank"]]**
191
192 [[image:image-20220907161050-2.png]]
193
194
195 **(% style="color:blue" %)Step 2:**(%%)Back to the Remote.it screen, and click **"Install"** again.
196
197 [[image:image-20220907161352-3.png]]
198
199
200 **(% style="color:blue" %)Step 3:**(%%) Follow the [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]] steps to reconfigure
201
202
203 == **2.2  RSSH Introduction** ==
204
205
206 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
207
208 (% style="color:red" %)**Important Notice:**
209
210 (% class="box warningmessage" %)
211 (((
212 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
213 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
214 )))
215
216
217 **Below gateway support reverse SSH access:**
218
219 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
220 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
221 * LG02, OLG02
222 * LG308, DLOS8
223 * LPS8
224 * LIG16
225 * MS14 series if installed with the same firmware.
226
227
228
229 === **2.2.1  End User Guide to use SSH access** ===
230
231
232 Go to this the Reverse SSH page as below:
233
234
235 [[image:image-20220531150151-3.png]]
236
237 Get the RSSH configure page
238
239
240
241 [[image:image-20220531150338-4.png]]
242
243 Connection OK.
244
245
246 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
247 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
248 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
249 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
250 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
251
252 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
253
254
255
256 === **2.2.2  Set Up RSSH Server** ===
257
258
259 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
260
261
262
263 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
264
265
266 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
267
268 [[image:image-20220531150750-5.png]]
269
270
271 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
272
273 [[image:image-20220531150811-6.png]]
274
275
276 **Debug** :
277
278 (((
279 (% class="box" %)
280 (((
281 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
282 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
283 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
284 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
285 )))
286 )))
287
288 [[image:image-20220531151516-7.png]]
289
290
291 (((
292 (% class="box" %)
293 (((
294 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
295 please insatell sqlite3.
296 )))
297 )))
298
299 [[image:image-20220531151628-8.png]]
300
301
302 (% style="color:blue" %)**How to install Sqlit3:**
303
304 (% class="box infomessage" %)
305 (((
306 **~ Step 1:** Download the SQLit3 installation package
307 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
308
309 **Step 2: **tar the SQLit3 installation package
310 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
311
312 **Step 3:** Generate the makefile
313 cd sqlite-autoconf-3350300/;./configure
314
315 **Step 4:** Compile makefile
316 sudo make
317
318 **Step 5:** Install makefile
319 sudo make install
320
321 **Check:**
322 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
323 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
324
325 **debug:**
326 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
327 Please execute the command /sbin/ldconfig.
328 After that execute the command ./sqlite3 test.db again.
329 )))
330
331
332
333 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
334
335
336 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
337
338 user must enter the root account and run the following commands
339
340 (% class="box infomessage" %)
341 (((
342 **$ ./create_sqlite3_db.sh
343 $ ./rssh_serv -p  3721 2>&1 &
344 $ ps -ef | grep rssh_serv check 3721 port**
345 )))
346
347 [[image:image-20220531151958-10.png]]
348
349
350 **Debug:**
351
352 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
353 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
354 }}}
355
356 {{{ if fail to open dpvlry or to bind to it
357 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
358 }}}
359
360
361
362 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
363
364
365 (% class="box infomessage" %)
366 (((
367 **1):**  sudo useradd XXXXX (custom user name)
368 **2):**  sudo passwd xxxxxx
369 **3):**  cp /bin/bash /bin/rbash
370 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
371 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
372 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
373 )))
374
375 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
376
377
378
379 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
380
381
382 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
383
384
385 **Debug:**
386
387 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
388
389
390
391 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
392
393
394
395 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
396
397
398 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
399
400 [[image:image-20220531152419-11.png]]
401
402
403
404 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
405
406
407 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
408
409 [[image:image-20220531152549-12.png]]
410
411
412
413 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
414
415
416 This is same as connect Dragino Support Server but just change the server address to customize server address.
417
418 [[image:image-20220531152633-13.png]]
419
420
421
422 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
423
424
425 Rssh Host connection Ok
426
427 [[image:image-20220531152815-14.png]]
428
429
430 User can use common ps | grep ssh to check it in the gateway.
431
432 [[image:image-20220531152840-15.png]]
433
434
435
436 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
437
438
439 Check what gateways link to server.
440
441 (% class="box infomessage" %)
442 (((
443 **$ ./connect-gw.sh -l**
444 )))
445
446 [[image:image-20220531153016-16.png]]
447
448
449
450 Access the gateway
451
452 (% class="box infomessage" %)
453 (((
454 **$ ./connect-gw.sh <GWID>**
455 )))
456
457 [[image:image-20220531153219-17.png]]
458
459
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0