<
From version < 29.4 >
edited by Xiaoling
on 2022/05/31 15:51
To version < 31.1 >
edited by Xiaoling
on 2022/07/14 11:16
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -1,4 +1,4 @@
1 -**Contents:**
1 +**Table of Contents:**
2 2  
3 3  {{toc/}}
4 4  
... ... @@ -5,17 +5,20 @@
5 5  
6 6  
7 7  
8 -= **1. Monitor Gateway** =
8 += **1.  Monitor Gateway** =
9 9  
10 -== **1.1 Introduction** ==
10 +== **1.1  Introduction** ==
11 11  
12 +
12 12  This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
13 13  
14 14  [[image:image-20220531155018-18.png]]
15 15  
16 16  
17 -== **1.2 Steps** ==
18 18  
19 +== **1.2  Steps** ==
20 +
21 +
19 19  * Create account in ThingsSpeak and creat channel.
20 20  * Download script from dragino site and move it to properly directory
21 21  
... ... @@ -64,10 +64,9 @@
64 64  
65 65  * Reboot device.
66 66  
70 +== **1.3  Monitor Public IP** ==
67 67  
68 68  
69 -== **1.3 Monitor Public IP** ==
70 -
71 71  The monitor_gateway.sh has been updated to upload the public ip of the device as well.
72 72  
73 73  User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
... ... @@ -78,21 +78,23 @@
78 78  
79 79  
80 80  
81 -= **2. Remote Access** =
83 += **2.  Remote Access** =
82 82  
83 -== **2.1 Remote Access via Remote.it.** ==
85 +== **2.1  Remote Access via Remote.it.** ==
84 84  
87 +
85 85  Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
86 86  
87 -Important Notice:
88 88  
91 +(% style="color:red" %)**Important Notice:**
92 +
89 89  * Remote.it access will give full control of your device to remote support.
90 90  * The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
91 91  
92 -For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
96 +For how to use remoteit, please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
93 93  
94 94  
95 -== **2.2 RSSH Introduction** ==
99 +== **2.2  RSSH Introduction** ==
96 96  
97 97  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
98 98  
... ... @@ -115,8 +115,8 @@
115 115  * MS14 series if installed with the same firmware.
116 116  
117 117  
122 +=== **2.2.1  End User Guide to use SSH access** ===
118 118  
119 -=== **2.2.1 End User Guide to use SSH access** ===
120 120  
121 121  Go to this the Reverse SSH page as below:
122 122  
... ... @@ -131,28 +131,32 @@
131 131  Connection OK.
132 132  
133 133  
134 -* (% style="color:#037691" %)**Login ID**(%%): Input sshuser
135 -* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com
136 -* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port.
138 +* (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
139 +* (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
140 +* (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
137 137  * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
138 -* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
142 +* (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
139 139  
140 140  After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
141 141  
142 142  
143 -=== **2.2.2 Set Up RSSH Server** ===
144 144  
148 +=== **2.2.2  Set Up RSSH Server** ===
149 +
145 145  Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
146 146  
147 147  
148 -==== **2.2.2.1 Step 1 : Download the SSH service code** ====
149 149  
150 -1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
154 +==== **2.2.2.1  Step 1 : Download the SSH service code** ====
151 151  
156 +
157 +**1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
158 +
152 152  [[image:image-20220531150750-5.png]]
153 153  
154 -2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
155 155  
162 +**2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
163 +
156 156  [[image:image-20220531150811-6.png]]
157 157  
158 158  
... ... @@ -182,25 +182,31 @@
182 182  [[image:image-20220531151628-8.png]]
183 183  
184 184  
185 -**How to install Sqlit3**
193 +(% style="color:blue" %)**How to install Sqlit3**
186 186  
187 187  (% class="box infomessage" %)
188 188  (((
189 - Step1:Download the SQLit3 installation package
190 - sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
197 +**~ Step1:** Download the SQLit3 installation package
198 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
191 191  
192 -Step2:tar the SQLit3 installation package
200 +
201 +**Step2: **tar the SQLit3 installation package
193 193   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
194 -Step3:Generate the makefile
203 +
204 +**Step3:** Generate the makefile
195 195   cd sqlite-autoconf-3350300/;./configure
196 -Step4:Compile makefile
206 +
207 +**Step4:** Compile makefile
197 197   sudo make
198 -Step5:Install makefile
209 +
210 +**Step5:** Install makefile
199 199   sudo make install
200 -Check:
212 +
213 +**Check:**
201 201   cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
202 202   cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
203 -debug:
216 +
217 +**debug:**
204 204   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
205 205   Please execute the command /sbin/ldconfig.
206 206   After that execute the command ./sqlite3 test.db again.
... ... @@ -207,10 +207,12 @@
207 207  )))
208 208  
209 209  
210 -==== **2.2.2.2 Step 2 : Install and run the RSS service** ====
211 211  
212 -1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
225 +==== **2.2.2.2  Step 2 : Install and run the RSS service** ====
213 213  
227 +
228 +**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
229 +
214 214  user must enter the root account and run the following commands
215 215  
216 216  (% class="box infomessage" %)
... ... @@ -235,26 +235,28 @@
235 235  
236 236  
237 237  
238 -==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
254 +==== **2.2.2.3  Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
239 239  
256 +
240 240  (% class="box infomessage" %)
241 241  (((
242 -1):sudo useradd XXXXX (custom user name)
243 -2):sudo passwd xxxxxx
244 -3):cp /bin/bash /bin/rbash
245 -4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
246 -5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
247 -6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
259 +**1):**  sudo useradd XXXXX (custom user name)
260 +**2):**  sudo passwd xxxxxx
261 +**3):**  cp /bin/bash /bin/rbash
262 +**4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
263 +**5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
264 +**6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
248 248  )))
249 249  
250 -**Now user "XXXXX" is the user with limited permissions of the current system**
267 +(% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
251 251  
252 252  
253 253  
254 -==== **2.2.2.4 Step 4 : Create an authorization key file** ====
271 +==== **2.2.2.4  Step 4 : Create an authorization key file** ====
255 255  
256 -1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
257 257  
274 +**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
275 +
258 258  **Debug:**
259 259  
260 260  {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
... ... @@ -261,25 +261,30 @@
261 261  
262 262  
263 263  
264 -=== **2.2.3 How does user get the gateway to connect to a user's private server** ===
282 +=== **2.2.3  How does user get the gateway to connect to a user's private server** ===
265 265  
266 266  
267 -==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ====
285 +==== **2.2.3.1  Step 1 : Come back the gateway web UI to get the gateway Public key** ====
268 268  
269 -1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
270 270  
288 +**1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
289 +
271 271  [[image:image-20220531152419-11.png]]
272 272  
273 273  
274 -==== **2.2.3.2 Step 2 : Authorization server** ====
275 275  
294 +==== **2.2.3.2  Step 2 : Authorization server** ====
295 +
296 +
276 276  Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
277 277  
278 278  [[image:image-20220531152549-12.png]]
279 279  
280 280  
281 -==== **2.2.3.3 Step 3 : Connect private server** ====
282 282  
303 +==== **2.2.3.3  Step 3 : Connect private server** ====
304 +
305 +
283 283  This is same as connect Dragino Support Server but just change the server address to customize server address.
284 284  
285 285  [[image:image-20220531152633-13.png]]
... ... @@ -286,8 +286,9 @@
286 286  
287 287  
288 288  
289 -==== **2.2.3.4 Step 4 : Check Connection** ====
312 +==== **2.2.3.4  Step 4 : Check Connection** ====
290 290  
314 +
291 291  Rssh Host connection Ok
292 292  
293 293  [[image:image-20220531152815-14.png]]
... ... @@ -298,8 +298,10 @@
298 298  [[image:image-20220531152840-15.png]]
299 299  
300 300  
301 -==== **2.2.3.5 Step 5 : Access the gateway from customized server** ====
302 302  
326 +==== **2.2.3.5  Step 5 : Access the gateway from customized server** ====
327 +
328 +
303 303  Check what gateways link to server.
304 304  
305 305  (% class="box infomessage" %)
... ... @@ -319,3 +319,5 @@
319 319  )))
320 320  
321 321  [[image:image-20220531153219-17.png]]
348 +
349 +
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0