<
From version < 29.3 >
edited by Xiaoling
on 2022/05/31 15:51
To version < 31.2 >
edited by Xiaoling
on 2022/07/14 11:19
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -1,4 +1,4 @@
1 -**Contents:**
1 +**Table of Contents:**
2 2  
3 3  {{toc/}}
4 4  
... ... @@ -5,17 +5,20 @@
5 5  
6 6  
7 7  
8 -= **1. Monitor Gateway** =
8 += **1.  Monitor Gateway** =
9 9  
10 -== **1.1 Introduction** ==
10 +== **1.1  Introduction** ==
11 11  
12 +
12 12  This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
13 13  
14 14  [[image:image-20220531155018-18.png]]
15 15  
16 16  
17 -== **1.2 Steps** ==
18 18  
19 +== **1.2  Steps** ==
20 +
21 +
19 19  * Create account in ThingsSpeak and creat channel.
20 20  * Download script from dragino site and move it to properly directory
21 21  
... ... @@ -66,8 +66,10 @@
66 66  
67 67  
68 68  
69 -== **1.3 Monitor Public IP** ==
70 70  
73 +== **1.3  Monitor Public IP** ==
74 +
75 +
71 71  The monitor_gateway.sh has been updated to upload the public ip of the device as well.
72 72  
73 73  User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
... ... @@ -78,21 +78,23 @@
78 78  
79 79  
80 80  
81 -= **2. Remote Access** =
86 += **2.  Remote Access** =
82 82  
83 -== **2.1 Remote Access via Remote.it.** ==
88 +== **2.1  Remote Access via Remote.it.** ==
84 84  
90 +
85 85  Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
86 86  
87 -Important Notice:
88 88  
94 +(% style="color:red" %)**Important Notice:**
95 +
89 89  * Remote.it access will give full control of your device to remote support.
90 90  * The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
91 91  
92 -For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
99 +For how to use remoteit, please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
93 93  
94 94  
95 -== **2.2 RSSH Introduction** ==
102 +== **2.2  RSSH Introduction** ==
96 96  
97 97  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
98 98  
... ... @@ -114,8 +114,9 @@
114 114  * LIG16
115 115  * MS14 series if installed with the same firmware.
116 116  
117 -=== **2.2.1 End User Guide to use SSH access** ===
124 +=== **2.2.1  End User Guide to use SSH access** ===
118 118  
126 +
119 119  Go to this the Reverse SSH page as below:
120 120  
121 121  [[image:image-20220531150151-3.png]]
... ... @@ -129,28 +129,32 @@
129 129  Connection OK.
130 130  
131 131  
132 -* (% style="color:#037691" %)**Login ID**(%%): Input sshuser
133 -* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com
134 -* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port.
140 +* (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
141 +* (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
142 +* (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
135 135  * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
136 -* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
144 +* (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
137 137  
138 138  After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
139 139  
140 140  
141 -=== **2.2.2 Set Up RSSH Server** ===
142 142  
150 +=== **2.2.2  Set Up RSSH Server** ===
151 +
143 143  Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
144 144  
145 145  
146 -==== **2.2.2.1 Step 1 : Download the SSH service code** ====
147 147  
148 -1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
156 +==== **2.2.2.1  Step 1 : Download the SSH service code** ====
149 149  
158 +
159 +**1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
160 +
150 150  [[image:image-20220531150750-5.png]]
151 151  
152 -2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
153 153  
164 +**2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
165 +
154 154  [[image:image-20220531150811-6.png]]
155 155  
156 156  
... ... @@ -180,25 +180,31 @@
180 180  [[image:image-20220531151628-8.png]]
181 181  
182 182  
183 -**How to install Sqlit3**
195 +(% style="color:blue" %)**How to install Sqlit3**
184 184  
185 185  (% class="box infomessage" %)
186 186  (((
187 - Step1:Download the SQLit3 installation package
188 - sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
199 +**~ Step1:** Download the SQLit3 installation package
200 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
189 189  
190 -Step2:tar the SQLit3 installation package
202 +
203 +**Step2: **tar the SQLit3 installation package
191 191   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
192 -Step3:Generate the makefile
205 +
206 +**Step3:** Generate the makefile
193 193   cd sqlite-autoconf-3350300/;./configure
194 -Step4:Compile makefile
208 +
209 +**Step4:** Compile makefile
195 195   sudo make
196 -Step5:Install makefile
211 +
212 +**Step5:** Install makefile
197 197   sudo make install
198 -Check:
214 +
215 +**Check:**
199 199   cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
200 200   cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
201 -debug:
218 +
219 +**debug:**
202 202   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
203 203   Please execute the command /sbin/ldconfig.
204 204   After that execute the command ./sqlite3 test.db again.
... ... @@ -205,10 +205,12 @@
205 205  )))
206 206  
207 207  
208 -==== **2.2.2.2 Step 2 : Install and run the RSS service** ====
209 209  
210 -1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
227 +==== **2.2.2.2  Step 2 : Install and run the RSS service** ====
211 211  
229 +
230 +**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
231 +
212 212  user must enter the root account and run the following commands
213 213  
214 214  (% class="box infomessage" %)
... ... @@ -233,26 +233,28 @@
233 233  
234 234  
235 235  
236 -==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
256 +==== **2.2.2.3  Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
237 237  
258 +
238 238  (% class="box infomessage" %)
239 239  (((
240 -1):sudo useradd XXXXX (custom user name)
241 -2):sudo passwd xxxxxx
242 -3):cp /bin/bash /bin/rbash
243 -4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
244 -5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
245 -6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
261 +**1):**  sudo useradd XXXXX (custom user name)
262 +**2):**  sudo passwd xxxxxx
263 +**3):**  cp /bin/bash /bin/rbash
264 +**4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
265 +**5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
266 +**6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
246 246  )))
247 247  
248 -**Now user "XXXXX" is the user with limited permissions of the current system**
269 +(% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
249 249  
250 250  
251 251  
252 -==== **2.2.2.4 Step 4 : Create an authorization key file** ====
273 +==== **2.2.2.4  Step 4 : Create an authorization key file** ====
253 253  
254 -1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
255 255  
276 +**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
277 +
256 256  **Debug:**
257 257  
258 258  {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
... ... @@ -259,25 +259,30 @@
259 259  
260 260  
261 261  
262 -=== **2.2.3 How does user get the gateway to connect to a user's private server** ===
284 +=== **2.2.3  How does user get the gateway to connect to a user's private server** ===
263 263  
264 264  
265 -==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ====
287 +==== **2.2.3.1  Step 1 : Come back the gateway web UI to get the gateway Public key** ====
266 266  
267 -1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
268 268  
290 +**1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
291 +
269 269  [[image:image-20220531152419-11.png]]
270 270  
271 271  
272 -==== **2.2.3.2 Step 2 : Authorization server** ====
273 273  
296 +==== **2.2.3.2  Step 2 : Authorization server** ====
297 +
298 +
274 274  Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
275 275  
276 276  [[image:image-20220531152549-12.png]]
277 277  
278 278  
279 -==== **2.2.3.3 Step 3 : Connect private server** ====
280 280  
305 +==== **2.2.3.3  Step 3 : Connect private server** ====
306 +
307 +
281 281  This is same as connect Dragino Support Server but just change the server address to customize server address.
282 282  
283 283  [[image:image-20220531152633-13.png]]
... ... @@ -284,8 +284,9 @@
284 284  
285 285  
286 286  
287 -==== **2.2.3.4 Step 4 : Check Connection** ====
314 +==== **2.2.3.4  Step 4 : Check Connection** ====
288 288  
316 +
289 289  Rssh Host connection Ok
290 290  
291 291  [[image:image-20220531152815-14.png]]
... ... @@ -296,8 +296,10 @@
296 296  [[image:image-20220531152840-15.png]]
297 297  
298 298  
299 -==== **2.2.3.5 Step 5 : Access the gateway from customized server** ====
300 300  
328 +==== **2.2.3.5  Step 5 : Access the gateway from customized server** ====
329 +
330 +
301 301  Check what gateways link to server.
302 302  
303 303  (% class="box infomessage" %)
... ... @@ -317,3 +317,5 @@
317 317  )))
318 318  
319 319  [[image:image-20220531153219-17.png]]
350 +
351 +
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0