Changes for page Monitor & Remote Access Gateway
Last modified by Kilight Cao on 2025/01/14 10:25
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 3 removed)
Details
- Page properties
-
- Content
-
... ... @@ -35,7 +35,6 @@ 35 35 root@dragino-1baf44:~~# 36 36 ))) 37 37 38 - 39 39 * change the script monitor_gateway.sh with properly users setting: 40 40 41 41 (% class="box infomessage" %) ... ... @@ -46,11 +46,10 @@ 46 46 CHAN_KEY='xxxxx' #Channel Write API of the channel for this gateway 47 47 ))) 48 48 48 +* run **/usr/bin/monitor_gateway.sh** to test if upload is good. 49 49 50 -* run(% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%)to test ifuploadisgood.50 +* Add monitor_gateway.sh to cron work **/etc/crontabs/root** to make this script runs perdiocally, below is an example to update every 20 minutes 51 51 52 -* Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes 53 - 54 54 (% class="box infomessage" %) 55 55 ((( 56 56 # For details see man 4 crontabs ... ... @@ -71,7 +71,6 @@ 71 71 72 72 73 73 74 - 75 75 == **1.3 Monitor Public IP** == 76 76 77 77 ... ... @@ -79,7 +79,6 @@ 79 79 80 80 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export. 81 81 82 - 83 83 [[image:image-20220531145559-2.png]] 84 84 85 85 Find Public IP ... ... @@ -97,53 +97,16 @@ 97 97 (% style="color:red" %)**Important Notice:** 98 98 99 99 * Remote.it access will give full control of your device to remote support. 100 -* The Remote.it allow sDragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.96 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 101 101 102 -* For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 103 -* For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below: 98 +For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 104 104 105 105 106 - 107 -(% style="color:blue" %)**1. Install the Remote.it software** 108 - 109 -Users can directly click "Install" on the Web UI to install Remote. it. 110 - 111 - 112 -[[image:image-20220725134300-1.png||height="438" width="905"]] 113 - 114 - 115 - 116 -(% style="color:blue" %)**2. Enter the license key** 117 - 118 -Users need to enter the license key in the box under "2. Register" section and click the "Save" button and "Register" button. 119 - 120 -(% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.** 121 - 122 - 123 -(% class="box infomessage" %) 124 -((( 125 -**57F60715-606F-510D-A3D2-739860EBDB98** 126 -))) 127 - 128 -[[image:image-20220725113010-1.png||height="455" width="899"]] 129 - 130 - 131 - 132 -(% style="color:blue" %)**3. Connect and tell us your device ID or Hostname** 133 - 134 -Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac 135 - 136 - 137 -[[image:image-20220725115720-2.png||height="658" width="900"]] 138 - 139 - 140 - 141 141 == **2.2 RSSH Introduction** == 142 142 143 - 144 144 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand. 145 145 146 - (% style="color:red" %)**Important Notice:**105 +Important Notice: 147 147 148 148 (% class="box warningmessage" %) 149 149 ((( ... ... @@ -162,12 +162,13 @@ 162 162 * MS14 series if installed with the same firmware. 163 163 164 164 124 + 125 + 165 165 === **2.2.1 End User Guide to use SSH access** === 166 166 167 167 168 168 Go to this the Reverse SSH page as below: 169 169 170 - 171 171 [[image:image-20220531150151-3.png]] 172 172 173 173 Get the RSSH configure page ... ... @@ -188,24 +188,19 @@ 188 188 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway. 189 189 190 190 151 +=== **2.2.2 Set Up RSSH Server** === 191 191 192 -=== **2.2.2 Set Up RSSH Server** === 193 - 194 - 195 195 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below 196 196 197 197 156 +==== **2.2.2.1 Step 1 : Download the SSH service code** ==== 198 198 199 - ==== (% style="color:blue"%)**Step1:Download the SSHservice code**(%%)====158 +1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 200 200 201 - 202 -**1).** git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 203 - 204 204 [[image:image-20220531150750-5.png]] 205 205 162 +2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 206 206 207 -**2).** cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 208 - 209 209 [[image:image-20220531150811-6.png]] 210 210 211 211 ... ... @@ -235,31 +235,25 @@ 235 235 [[image:image-20220531151628-8.png]] 236 236 237 237 238 - (% style="color:blue" %)**How to install Sqlit3**193 +**How to install Sqlit3** 239 239 240 240 (% class="box infomessage" %) 241 241 ((( 242 - **~Step**Download the SQLit3 installation package243 - 197 + Step1:Download the SQLit3 installation package 198 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]** 244 244 245 - 246 -**Step 2: **tar the SQLit3 installation package 200 +Step2:tar the SQLit3 installation package 247 247 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz 248 - 249 -**Step 3:** Generate the makefile 202 +Step3:Generate the makefile 250 250 cd sqlite-autoconf-3350300/;./configure 251 - 252 -**Step 4:** Compile makefile 204 +Step4:Compile makefile 253 253 sudo make 254 - 255 -**Step 5:** Install makefile 206 +Step5:Install makefile 256 256 sudo make install 257 - 258 -**Check:** 259 - cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 208 +Check: 209 + cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 260 260 cd sqlite-autoconf-3350300/;./sqlite3 test.db ~-~-> Test whether the sqlite3 was installed successfully 261 - 262 -**debug:** 211 +debug: 263 263 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db. 264 264 Please execute the command /sbin/ldconfig. 265 265 After that execute the command ./sqlite3 test.db again. ... ... @@ -266,12 +266,10 @@ 266 266 ))) 267 267 268 268 218 +==== **2.2.2.2 Step 2 : Install and run the RSS service** ==== 269 269 270 - ==== (%style="color:blue"%)**Step2 :Installand run theRSS service**(%%)====220 +1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 271 271 272 - 273 -**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 274 - 275 275 user must enter the root account and run the following commands 276 276 277 277 (% class="box infomessage" %) ... ... @@ -296,28 +296,26 @@ 296 296 297 297 298 298 299 -==== (% style="color:blue" %)**Step 3 :(%%)====246 +==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ==== 300 300 301 - 302 302 (% class="box infomessage" %) 303 303 ((( 304 - **1):**sudo useradd XXXXX (custom user name)305 - **2):**sudo passwd xxxxxx306 - **3):**cp /bin/bash /bin/rbash307 - **4):**sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash308 - **5):**sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**309 - **6):**sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**250 +1):sudo useradd XXXXX (custom user name) 251 +2):sudo passwd xxxxxx 252 +3):cp /bin/bash /bin/rbash 253 +4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash 254 +5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin** 255 +6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin** 310 310 ))) 311 311 312 - (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**258 +**Now user "XXXXX" is the user with limited permissions of the current system** 313 313 314 314 315 315 316 -==== (% style="color:blue" %)**Step 4 :(%%)====262 +==== **2.2.2.4 Step 4 : Create an authorization key file** ==== 317 317 264 +1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 318 318 319 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 320 - 321 321 **Debug:** 322 322 323 323 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}} ... ... @@ -324,31 +324,25 @@ 324 324 325 325 326 326 327 -=== **2.2.3 272 +=== **2.2.3 How does user get the gateway to connect to a user's private server** === 328 328 329 329 275 +==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ==== 330 330 331 - ====(% style="color:blue" %)**Step 1 : Come back the gateway web UI togetthe gateway Public key**(%%) ====277 +1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 332 332 333 - 334 -**1)** in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 335 - 336 336 [[image:image-20220531152419-11.png]] 337 337 338 338 282 +==== **2.2.3.2 Step 2 : Authorization server** ==== 339 339 340 -==== (% style="color:blue" %)**Step 2 : Authorization server**(%%) ==== 341 - 342 - 343 343 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file. 344 344 345 345 [[image:image-20220531152549-12.png]] 346 346 347 347 289 +==== **2.2.3.3 Step 3 : Connect private server** ==== 348 348 349 -==== (% style="color:blue" %)**Step 3 : Connect private server**(%%) ==== 350 - 351 - 352 352 This is same as connect Dragino Support Server but just change the server address to customize server address. 353 353 354 354 [[image:image-20220531152633-13.png]] ... ... @@ -355,9 +355,8 @@ 355 355 356 356 357 357 358 -==== (% style="color:blue" %)**Step 4 :(%%)====297 +==== **2.2.3.4 Step 4 : Check Connection** ==== 359 359 360 - 361 361 Rssh Host connection Ok 362 362 363 363 [[image:image-20220531152815-14.png]] ... ... @@ -368,15 +368,13 @@ 368 368 [[image:image-20220531152840-15.png]] 369 369 370 370 309 +==== **2.2.3.5 Step 5 : Access the gateway from customized server** ==== 371 371 372 -==== (% style="color:blue" %)**Step 5 : Access the gateway from customized server**(%%) ==== 373 - 374 - 375 375 Check what gateways link to server. 376 376 377 377 (% class="box infomessage" %) 378 378 ((( 379 - **$ ./connect-gw.sh -l**315 +$ ./connect-gw.sh -l 380 380 ))) 381 381 382 382 [[image:image-20220531153016-16.png]] ... ... @@ -387,9 +387,7 @@ 387 387 388 388 (% class="box infomessage" %) 389 389 ((( 390 - **$ ./connect-gw.sh <GWID>**326 +$ ./connect-gw.sh <GWID> 391 391 ))) 392 392 393 393 [[image:image-20220531153219-17.png]] 394 - 395 -
- image-20220725113010-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -58.9 KB - Content
- image-20220725115720-2.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -81.7 KB - Content
- image-20220725134300-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -53.5 KB - Content