<
From version < 44.6 >
edited by Xiaoling
on 2022/07/25 17:25
To version < 30.2 >
edited by Xiaoling
on 2022/07/14 11:08
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -35,7 +35,6 @@
35 35  root@dragino-1baf44:~~#
36 36  )))
37 37  
38 -
39 39  * change the script monitor_gateway.sh with properly users setting:
40 40  
41 41  (% class="box infomessage" %)
... ... @@ -46,11 +46,10 @@
46 46  CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
47 47  )))
48 48  
48 +* run **/usr/bin/monitor_gateway.sh** to test if upload is good.
49 49  
50 -* run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
50 +* Add monitor_gateway.sh to cron work **/etc/crontabs/root** to make this script runs perdiocally, below is an example to update every 20 minutes
51 51  
52 -* Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
53 -
54 54  (% class="box infomessage" %)
55 55  (((
56 56  # For details see man 4 crontabs
... ... @@ -78,7 +78,6 @@
78 78  
79 79  User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
80 80  
81 -
82 82  [[image:image-20220531145559-2.png]]
83 83  
84 84  Find Public IP
... ... @@ -96,52 +96,16 @@
96 96  (% style="color:red" %)**Important Notice:**
97 97  
98 98  * Remote.it access will give full control of your device to remote support.
99 -* The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
96 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
100 100  
101 -* For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
102 -* For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
98 +For how to use remoteit, please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
103 103  
104 104  
105 -(% style="color:blue" %)**1. Install the Remote.it software**
106 -
107 -Users can directly click** "Install"** on the Web UI to install Remote. it.
108 -
109 -
110 -[[image:image-20220725134300-1.png||height="438" width="905"]]
111 -
112 -
113 -
114 -(% style="color:blue" %)**2. Enter the license key**
115 -
116 -Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
117 -
118 -(% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
119 -
120 -
121 -(% class="box infomessage" %)
122 -(((
123 -**57F60715-606F-510D-A3D2-739860EBDB98**
124 -)))
125 -
126 -[[image:image-20220725113010-1.png||height="455" width="899"]]
127 -
128 -
129 -
130 -(% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
131 -
132 -Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
133 -
134 -
135 -[[image:image-20220725115720-2.png||height="658" width="900"]]
136 -
137 -
138 -
139 139  == **2.2  RSSH Introduction** ==
140 140  
141 -
142 142  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
143 143  
144 -(% style="color:red" %)**Important Notice:**
105 +Important Notice:
145 145  
146 146  (% class="box warningmessage" %)
147 147  (((
... ... @@ -149,9 +149,8 @@
149 149  This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
150 150  )))
151 151  
113 +Below gateway support reverse SSH access:
152 152  
153 -**Below gateway support reverse SSH access:**
154 -
155 155  * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
156 156  * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
157 157  * LG02, OLG02
... ... @@ -160,15 +160,10 @@
160 160  * LIG16
161 161  * MS14 series if installed with the same firmware.
162 162  
123 +=== **2.2.1 End User Guide to use SSH access** ===
163 163  
164 -
165 -
166 -=== **2.2.1  End User Guide to use SSH access** ===
167 -
168 -
169 169  Go to this the Reverse SSH page as below:
170 170  
171 -
172 172  [[image:image-20220531150151-3.png]]
173 173  
174 174  Get the RSSH configure page
... ... @@ -180,33 +180,28 @@
180 180  Connection OK.
181 181  
182 182  
183 -* (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
184 -* (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
185 -* (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
138 +* (% style="color:#037691" %)**Login ID**(%%): Input sshuser
139 +* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com
140 +* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port.
186 186  * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
187 -* (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
142 +* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
188 188  
189 189  After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
190 190  
191 191  
147 +=== **2.2.2 Set Up RSSH Server** ===
192 192  
193 -=== **2.2.2  Set Up RSSH Server** ===
194 -
195 -
196 196  Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
197 197  
198 198  
152 +==== **2.2.2.1 Step 1 : Download the SSH service code** ====
199 199  
200 -==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
154 +1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
201 201  
202 -
203 -**1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
204 -
205 205  [[image:image-20220531150750-5.png]]
206 206  
158 +2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
207 207  
208 -**2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
209 -
210 210  [[image:image-20220531150811-6.png]]
211 211  
212 212  
... ... @@ -236,31 +236,25 @@
236 236  [[image:image-20220531151628-8.png]]
237 237  
238 238  
239 -(% style="color:blue" %)**How to install Sqlit3**
189 +**How to install Sqlit3**
240 240  
241 241  (% class="box infomessage" %)
242 242  (((
243 -**~ Step 1:** Download the SQLit3 installation package
244 - sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
193 + Step1:Download the SQLit3 installation package
194 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
245 245  
246 -
247 -**Step 2: **tar the SQLit3 installation package
196 +Step2:tar the SQLit3 installation package
248 248   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
249 -
250 -**Step 3:** Generate the makefile
198 +Step3:Generate the makefile
251 251   cd sqlite-autoconf-3350300/;./configure
252 -
253 -**Step 4:** Compile makefile
200 +Step4:Compile makefile
254 254   sudo make
255 -
256 -**Step 5:** Install makefile
202 +Step5:Install makefile
257 257   sudo make install
258 -
259 -**Check:**
260 - cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
204 +Check:
205 + cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
261 261   cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
262 -
263 -**debug:**
207 +debug:
264 264   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
265 265   Please execute the command /sbin/ldconfig.
266 266   After that execute the command ./sqlite3 test.db again.
... ... @@ -267,12 +267,10 @@
267 267  )))
268 268  
269 269  
214 +==== **2.2.2.2 Step 2 : Install and run the RSS service** ====
270 270  
271 -==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
216 +1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
272 272  
273 -
274 -**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
275 -
276 276  user must enter the root account and run the following commands
277 277  
278 278  (% class="box infomessage" %)
... ... @@ -297,28 +297,26 @@
297 297  
298 298  
299 299  
300 -==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
242 +==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
301 301  
302 -
303 303  (% class="box infomessage" %)
304 304  (((
305 -**1):**  sudo useradd XXXXX (custom user name)
306 -**2):**  sudo passwd xxxxxx
307 -**3):**  cp /bin/bash /bin/rbash
308 -**4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
309 -**5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
310 -**6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
246 +1):sudo useradd XXXXX (custom user name)
247 +2):sudo passwd xxxxxx
248 +3):cp /bin/bash /bin/rbash
249 +4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
250 +5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
251 +6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
311 311  )))
312 312  
313 -(% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
254 +**Now user "XXXXX" is the user with limited permissions of the current system**
314 314  
315 315  
316 316  
317 -==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
258 +==== **2.2.2.4 Step 4 : Create an authorization key file** ====
318 318  
260 +1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
319 319  
320 -**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
321 -
322 322  **Debug:**
323 323  
324 324  {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
... ... @@ -325,31 +325,25 @@
325 325  
326 326  
327 327  
328 -=== **2.2.3  How does user get the gateway to connect to a user's private server** ===
268 +=== **2.2.3 How does user get the gateway to connect to a user's private server** ===
329 329  
330 330  
271 +==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ====
331 331  
332 -==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
273 +1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
333 333  
334 -
335 -**1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
336 -
337 337  [[image:image-20220531152419-11.png]]
338 338  
339 339  
278 +==== **2.2.3.2 Step 2 : Authorization server** ====
340 340  
341 -==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
342 -
343 -
344 344  Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
345 345  
346 346  [[image:image-20220531152549-12.png]]
347 347  
348 348  
285 +==== **2.2.3.3 Step 3 : Connect private server** ====
349 349  
350 -==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
351 -
352 -
353 353  This is same as connect Dragino Support Server but just change the server address to customize server address.
354 354  
355 355  [[image:image-20220531152633-13.png]]
... ... @@ -356,9 +356,8 @@
356 356  
357 357  
358 358  
359 -==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
293 +==== **2.2.3.4 Step 4 : Check Connection** ====
360 360  
361 -
362 362  Rssh Host connection Ok
363 363  
364 364  [[image:image-20220531152815-14.png]]
... ... @@ -369,15 +369,13 @@
369 369  [[image:image-20220531152840-15.png]]
370 370  
371 371  
305 +==== **2.2.3.5 Step 5 : Access the gateway from customized server** ====
372 372  
373 -==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
374 -
375 -
376 376  Check what gateways link to server.
377 377  
378 378  (% class="box infomessage" %)
379 379  (((
380 -**$ ./connect-gw.sh -l**
311 +$ ./connect-gw.sh -l
381 381  )))
382 382  
383 383  [[image:image-20220531153016-16.png]]
... ... @@ -388,9 +388,7 @@
388 388  
389 389  (% class="box infomessage" %)
390 390  (((
391 -**$ ./connect-gw.sh <GWID>**
322 +$ ./connect-gw.sh <GWID>
392 392  )))
393 393  
394 394  [[image:image-20220531153219-17.png]]
395 -
396 -
image-20220725113010-1.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -58.9 KB
Content
image-20220725115720-2.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -81.7 KB
Content
image-20220725134300-1.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -53.5 KB
Content
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0