<
From version < 30.2 >
edited by Xiaoling
on 2022/07/14 11:08
To version < 32.1 >
edited by Xiaoling
on 2022/07/14 11:29
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -69,6 +69,7 @@
69 69  
70 70  
71 71  
72 +
72 72  == **1.3  Monitor Public IP** ==
73 73  
74 74  
... ... @@ -100,6 +100,7 @@
100 100  
101 101  == **2.2  RSSH Introduction** ==
102 102  
104 +
103 103  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
104 104  
105 105  Important Notice:
... ... @@ -120,8 +120,12 @@
120 120  * LIG16
121 121  * MS14 series if installed with the same firmware.
122 122  
123 -=== **2.2.1 End User Guide to use SSH access** ===
124 124  
126 +
127 +
128 +=== **2.2.1  End User Guide to use SSH access** ===
129 +
130 +
125 125  Go to this the Reverse SSH page as below:
126 126  
127 127  [[image:image-20220531150151-3.png]]
... ... @@ -135,28 +135,32 @@
135 135  Connection OK.
136 136  
137 137  
138 -* (% style="color:#037691" %)**Login ID**(%%): Input sshuser
139 -* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com
140 -* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port.
144 +* (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
145 +* (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
146 +* (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
141 141  * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
142 -* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
148 +* (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
143 143  
144 144  After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
145 145  
146 146  
147 -=== **2.2.2 Set Up RSSH Server** ===
148 148  
154 +=== **2.2.2  Set Up RSSH Server** ===
155 +
149 149  Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
150 150  
151 151  
152 -==== **2.2.2.1 Step 1 : Download the SSH service code** ====
153 153  
154 -1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
160 +==== **2.2.2.1  Step 1 : Download the SSH service code** ====
155 155  
162 +
163 +**1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
164 +
156 156  [[image:image-20220531150750-5.png]]
157 157  
158 -2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
159 159  
168 +**2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
169 +
160 160  [[image:image-20220531150811-6.png]]
161 161  
162 162  
... ... @@ -186,25 +186,31 @@
186 186  [[image:image-20220531151628-8.png]]
187 187  
188 188  
189 -**How to install Sqlit3**
199 +(% style="color:blue" %)**How to install Sqlit3**
190 190  
191 191  (% class="box infomessage" %)
192 192  (((
193 - Step1:Download the SQLit3 installation package
194 - sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
203 +**~ Step1:** Download the SQLit3 installation package
204 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
195 195  
196 -Step2:tar the SQLit3 installation package
206 +
207 +**Step2: **tar the SQLit3 installation package
197 197   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
198 -Step3:Generate the makefile
209 +
210 +**Step3:** Generate the makefile
199 199   cd sqlite-autoconf-3350300/;./configure
200 -Step4:Compile makefile
212 +
213 +**Step4:** Compile makefile
201 201   sudo make
202 -Step5:Install makefile
215 +
216 +**Step5:** Install makefile
203 203   sudo make install
204 -Check:
218 +
219 +**Check:**
205 205   cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
206 206   cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
207 -debug:
222 +
223 +**debug:**
208 208   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
209 209   Please execute the command /sbin/ldconfig.
210 210   After that execute the command ./sqlite3 test.db again.
... ... @@ -211,10 +211,12 @@
211 211  )))
212 212  
213 213  
214 -==== **2.2.2.2 Step 2 : Install and run the RSS service** ====
215 215  
216 -1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
231 +==== **2.2.2.2  Step 2 : Install and run the RSS service** ====
217 217  
233 +
234 +**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
235 +
218 218  user must enter the root account and run the following commands
219 219  
220 220  (% class="box infomessage" %)
... ... @@ -239,26 +239,28 @@
239 239  
240 240  
241 241  
242 -==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
260 +==== **2.2.2.3  Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
243 243  
262 +
244 244  (% class="box infomessage" %)
245 245  (((
246 -1):sudo useradd XXXXX (custom user name)
247 -2):sudo passwd xxxxxx
248 -3):cp /bin/bash /bin/rbash
249 -4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
250 -5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
251 -6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
265 +**1):**  sudo useradd XXXXX (custom user name)
266 +**2):**  sudo passwd xxxxxx
267 +**3):**  cp /bin/bash /bin/rbash
268 +**4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
269 +**5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
270 +**6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
252 252  )))
253 253  
254 -**Now user "XXXXX" is the user with limited permissions of the current system**
273 +(% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
255 255  
256 256  
257 257  
258 -==== **2.2.2.4 Step 4 : Create an authorization key file** ====
277 +==== **2.2.2.4  Step 4 : Create an authorization key file** ====
259 259  
260 -1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
261 261  
280 +**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
281 +
262 262  **Debug:**
263 263  
264 264  {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
... ... @@ -265,25 +265,30 @@
265 265  
266 266  
267 267  
268 -=== **2.2.3 How does user get the gateway to connect to a user's private server** ===
288 +=== **2.2.3  How does user get the gateway to connect to a user's private server** ===
269 269  
270 270  
271 -==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ====
291 +==== **2.2.3.1  Step 1 : Come back the gateway web UI to get the gateway Public key** ====
272 272  
273 -1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
274 274  
294 +**1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
295 +
275 275  [[image:image-20220531152419-11.png]]
276 276  
277 277  
278 -==== **2.2.3.2 Step 2 : Authorization server** ====
279 279  
300 +==== **2.2.3.2  Step 2 : Authorization server** ====
301 +
302 +
280 280  Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
281 281  
282 282  [[image:image-20220531152549-12.png]]
283 283  
284 284  
285 -==== **2.2.3.3 Step 3 : Connect private server** ====
286 286  
309 +==== **2.2.3.3  Step 3 : Connect private server** ====
310 +
311 +
287 287  This is same as connect Dragino Support Server but just change the server address to customize server address.
288 288  
289 289  [[image:image-20220531152633-13.png]]
... ... @@ -290,8 +290,9 @@
290 290  
291 291  
292 292  
293 -==== **2.2.3.4 Step 4 : Check Connection** ====
318 +==== **2.2.3.4  Step 4 : Check Connection** ====
294 294  
320 +
295 295  Rssh Host connection Ok
296 296  
297 297  [[image:image-20220531152815-14.png]]
... ... @@ -302,8 +302,10 @@
302 302  [[image:image-20220531152840-15.png]]
303 303  
304 304  
305 -==== **2.2.3.5 Step 5 : Access the gateway from customized server** ====
306 306  
332 +==== **2.2.3.5  Step 5 : Access the gateway from customized server** ====
333 +
334 +
307 307  Check what gateways link to server.
308 308  
309 309  (% class="box infomessage" %)
... ... @@ -323,3 +323,5 @@
323 323  )))
324 324  
325 325  [[image:image-20220531153219-17.png]]
354 +
355 +
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0