Changes for page Monitor & Remote Access Gateway
Last modified by Kilight Cao on 2025/01/14 10:25
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 3 removed)
Details
- Page properties
-
- Content
-
... ... @@ -35,7 +35,6 @@ 35 35 root@dragino-1baf44:~~# 36 36 ))) 37 37 38 - 39 39 * change the script monitor_gateway.sh with properly users setting: 40 40 41 41 (% class="box infomessage" %) ... ... @@ -46,11 +46,10 @@ 46 46 CHAN_KEY='xxxxx' #Channel Write API of the channel for this gateway 47 47 ))) 48 48 48 +* run **/usr/bin/monitor_gateway.sh** to test if upload is good. 49 49 50 -* run(% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%)to test ifuploadisgood.50 +* Add monitor_gateway.sh to cron work **/etc/crontabs/root** to make this script runs perdiocally, below is an example to update every 20 minutes 51 51 52 -* Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes 53 - 54 54 (% class="box infomessage" %) 55 55 ((( 56 56 # For details see man 4 crontabs ... ... @@ -69,6 +69,8 @@ 69 69 70 70 * Reboot device. 71 71 70 + 71 + 72 72 == **1.3 Monitor Public IP** == 73 73 74 74 ... ... @@ -76,7 +76,6 @@ 76 76 77 77 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export. 78 78 79 - 80 80 [[image:image-20220531145559-2.png]] 81 81 82 82 Find Public IP ... ... @@ -94,51 +94,16 @@ 94 94 (% style="color:red" %)**Important Notice:** 95 95 96 96 * Remote.it access will give full control of your device to remote support. 97 -* The Remote.it allow sDragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.96 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 98 98 99 -* For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 100 -* For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below: 98 +For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 101 101 102 -(% style="color:blue" %)**1. Install the Remote.it software** 103 103 104 -Users can directly click "Install" on the Web UI to install Remote. it. 105 - 106 - 107 -[[image:image-20220725134300-1.png||height="438" width="905"]] 108 - 109 - 110 - 111 -(% style="color:blue" %)**2. Enter the license key** 112 - 113 -Users need to enter the license key in the box under "2. Register" section and click the "Save" button and "Register" button. 114 - 115 -(% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.** 116 - 117 - 118 -(% class="box infomessage" %) 119 -((( 120 -**57F60715-606F-510D-A3D2-739860EBDB98** 121 -))) 122 - 123 -[[image:image-20220725113010-1.png||height="455" width="899"]] 124 - 125 - 126 - 127 -(% style="color:blue" %)**3. Connect and tell us your device ID or Hostname** 128 - 129 -Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac 130 - 131 - 132 -[[image:image-20220725115720-2.png||height="658" width="900"]] 133 - 134 - 135 - 136 136 == **2.2 RSSH Introduction** == 137 137 138 - 139 139 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand. 140 140 141 - (% style="color:red" %)**Important Notice:**105 +Important Notice: 142 142 143 143 (% class="box warningmessage" %) 144 144 ((( ... ... @@ -159,9 +159,8 @@ 159 159 160 160 161 161 162 -=== **2.2.1 126 +=== **2.2.1 End User Guide to use SSH access** === 163 163 164 - 165 165 Go to this the Reverse SSH page as below: 166 166 167 167 [[image:image-20220531150151-3.png]] ... ... @@ -175,32 +175,28 @@ 175 175 Connection OK. 176 176 177 177 178 -* (% style="color:#037691" %)**Login ID**(%%): 179 -* (% style="color:#037691" %)**Host Address**(%%): 180 -* (% style="color:#037691" %)**Host Port** (%%): 141 +* (% style="color:#037691" %)**Login ID**(%%): Input sshuser 142 +* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com 143 +* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port. 181 181 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered. 182 -* (% style="color:#037691" %)**Network Keys**(%%): 145 +* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to 183 183 184 184 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway. 185 185 186 186 150 +=== **2.2.2 Set Up RSSH Server** === 187 187 188 -=== **2.2.2 Set Up RSSH Server** === 189 - 190 190 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below 191 191 192 192 155 +==== **2.2.2.1 Step 1 : Download the SSH service code** ==== 193 193 194 - ==== **2.2.2.1Step1:Download the SSHservice code**====157 +1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 195 195 196 - 197 -**1).** git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 198 - 199 199 [[image:image-20220531150750-5.png]] 200 200 161 +2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 201 201 202 -**2).** cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 203 - 204 204 [[image:image-20220531150811-6.png]] 205 205 206 206 ... ... @@ -230,31 +230,25 @@ 230 230 [[image:image-20220531151628-8.png]] 231 231 232 232 233 - (% style="color:blue" %)**How to install Sqlit3**192 +**How to install Sqlit3** 234 234 235 235 (% class="box infomessage" %) 236 236 ((( 237 - **~Step1:**Download the SQLit3 installation package238 - 196 + Step1:Download the SQLit3 installation package 197 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]** 239 239 240 - 241 -**Step2: **tar the SQLit3 installation package 199 +Step2:tar the SQLit3 installation package 242 242 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz 243 - 244 -**Step3:** Generate the makefile 201 +Step3:Generate the makefile 245 245 cd sqlite-autoconf-3350300/;./configure 246 - 247 -**Step4:** Compile makefile 203 +Step4:Compile makefile 248 248 sudo make 249 - 250 -**Step5:** Install makefile 205 +Step5:Install makefile 251 251 sudo make install 252 - 253 -**Check:** 207 +Check: 254 254 cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 255 255 cd sqlite-autoconf-3350300/;./sqlite3 test.db ~-~-> Test whether the sqlite3 was installed successfully 256 - 257 -**debug:** 210 +debug: 258 258 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db. 259 259 Please execute the command /sbin/ldconfig. 260 260 After that execute the command ./sqlite3 test.db again. ... ... @@ -261,12 +261,10 @@ 261 261 ))) 262 262 263 263 217 +==== **2.2.2.2 Step 2 : Install and run the RSS service** ==== 264 264 265 - ==== **2.2.2.2 Step 2:Install and run theRSS service**====219 +1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 266 266 267 - 268 -**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 269 - 270 270 user must enter the root account and run the following commands 271 271 272 272 (% class="box infomessage" %) ... ... @@ -291,28 +291,26 @@ 291 291 292 292 293 293 294 -==== **2.2.2.3 245 +==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ==== 295 295 296 - 297 297 (% class="box infomessage" %) 298 298 ((( 299 - **1):**sudo useradd XXXXX (custom user name)300 - **2):**sudo passwd xxxxxx301 - **3):**cp /bin/bash /bin/rbash302 - **4):**sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash303 - **5):**sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**304 - **6):**sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**249 +1):sudo useradd XXXXX (custom user name) 250 +2):sudo passwd xxxxxx 251 +3):cp /bin/bash /bin/rbash 252 +4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash 253 +5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin** 254 +6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin** 305 305 ))) 306 306 307 - (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**257 +**Now user "XXXXX" is the user with limited permissions of the current system** 308 308 309 309 310 310 311 -==== **2.2.2.4 261 +==== **2.2.2.4 Step 4 : Create an authorization key file** ==== 312 312 263 +1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 313 313 314 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 315 - 316 316 **Debug:** 317 317 318 318 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}} ... ... @@ -319,30 +319,25 @@ 319 319 320 320 321 321 322 -=== **2.2.3 271 +=== **2.2.3 How does user get the gateway to connect to a user's private server** === 323 323 324 324 325 -==== **2.2.3.1 274 +==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ==== 326 326 276 +1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 327 327 328 -**1)** in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 329 - 330 330 [[image:image-20220531152419-11.png]] 331 331 332 332 281 +==== **2.2.3.2 Step 2 : Authorization server** ==== 333 333 334 -==== **2.2.3.2 Step 2 : Authorization server** ==== 335 - 336 - 337 337 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file. 338 338 339 339 [[image:image-20220531152549-12.png]] 340 340 341 341 288 +==== **2.2.3.3 Step 3 : Connect private server** ==== 342 342 343 -==== **2.2.3.3 Step 3 : Connect private server** ==== 344 - 345 - 346 346 This is same as connect Dragino Support Server but just change the server address to customize server address. 347 347 348 348 [[image:image-20220531152633-13.png]] ... ... @@ -349,9 +349,8 @@ 349 349 350 350 351 351 352 -==== **2.2.3.4 296 +==== **2.2.3.4 Step 4 : Check Connection** ==== 353 353 354 - 355 355 Rssh Host connection Ok 356 356 357 357 [[image:image-20220531152815-14.png]] ... ... @@ -362,10 +362,8 @@ 362 362 [[image:image-20220531152840-15.png]] 363 363 364 364 308 +==== **2.2.3.5 Step 5 : Access the gateway from customized server** ==== 365 365 366 -==== **2.2.3.5 Step 5 : Access the gateway from customized server** ==== 367 - 368 - 369 369 Check what gateways link to server. 370 370 371 371 (% class="box infomessage" %) ... ... @@ -385,5 +385,3 @@ 385 385 ))) 386 386 387 387 [[image:image-20220531153219-17.png]] 388 - 389 -
- image-20220725113010-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -58.9 KB - Content
- image-20220725115720-2.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -81.7 KB - Content
- image-20220725134300-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -53.5 KB - Content