Changes for page Monitor & Remote Access Gateway
Last modified by Kilight Cao on 2025/01/14 10:25
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 3 removed)
Details
- Page properties
-
- Content
-
... ... @@ -35,7 +35,6 @@ 35 35 root@dragino-1baf44:~~# 36 36 ))) 37 37 38 - 39 39 * change the script monitor_gateway.sh with properly users setting: 40 40 41 41 (% class="box infomessage" %) ... ... @@ -46,11 +46,10 @@ 46 46 CHAN_KEY='xxxxx' #Channel Write API of the channel for this gateway 47 47 ))) 48 48 48 +* run **/usr/bin/monitor_gateway.sh** to test if upload is good. 49 49 50 -* run(% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%)to test ifuploadisgood.50 +* Add monitor_gateway.sh to cron work **/etc/crontabs/root** to make this script runs perdiocally, below is an example to update every 20 minutes 51 51 52 -* Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes 53 - 54 54 (% class="box infomessage" %) 55 55 ((( 56 56 # For details see man 4 crontabs ... ... @@ -78,7 +78,6 @@ 78 78 79 79 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export. 80 80 81 - 82 82 [[image:image-20220531145559-2.png]] 83 83 84 84 Find Public IP ... ... @@ -96,52 +96,16 @@ 96 96 (% style="color:red" %)**Important Notice:** 97 97 98 98 * Remote.it access will give full control of your device to remote support. 99 -* The Remote.it allow sDragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.96 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 100 100 101 -* For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 102 -* For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below: 98 +For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 103 103 104 104 105 -(% style="color:blue" %)**1. Install the Remote.it software** 106 - 107 -Users can directly click** "Install"** on the Web UI to install Remote. it. 108 - 109 - 110 -[[image:image-20220725134300-1.png||height="438" width="905"]] 111 - 112 - 113 - 114 -(% style="color:blue" %)**2. Enter the license key** 115 - 116 -Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button. 117 - 118 -(% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.** 119 - 120 - 121 -(% class="box infomessage" %) 122 -((( 123 -**57F60715-606F-510D-A3D2-739860EBDB98** 124 -))) 125 - 126 -[[image:image-20220725113010-1.png||height="455" width="899"]] 127 - 128 - 129 - 130 -(% style="color:blue" %)**3. Connect and tell us your device ID or Hostname** 131 - 132 -Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac 133 - 134 - 135 -[[image:image-20220725115720-2.png||height="658" width="900"]] 136 - 137 - 138 - 139 139 == **2.2 RSSH Introduction** == 140 140 141 - 142 142 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand. 143 143 144 - (% style="color:red" %)**Important Notice:**105 +Important Notice: 145 145 146 146 (% class="box warningmessage" %) 147 147 ((( ... ... @@ -149,9 +149,8 @@ 149 149 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself. 150 150 ))) 151 151 113 +Below gateway support reverse SSH access: 152 152 153 -**Below gateway support reverse SSH access:** 154 - 155 155 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]] 156 156 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 157 157 * LG02, OLG02 ... ... @@ -163,12 +163,10 @@ 163 163 164 164 165 165 166 -=== **2.2.1 126 +=== **2.2.1 End User Guide to use SSH access** === 167 167 168 - 169 169 Go to this the Reverse SSH page as below: 170 170 171 - 172 172 [[image:image-20220531150151-3.png]] 173 173 174 174 Get the RSSH configure page ... ... @@ -180,33 +180,28 @@ 180 180 Connection OK. 181 181 182 182 183 -* (% style="color:#037691" %)**Login ID**(%%): 184 -* (% style="color:#037691" %)**Host Address**(%%): 185 -* (% style="color:#037691" %)**Host Port** (%%): 141 +* (% style="color:#037691" %)**Login ID**(%%): Input sshuser 142 +* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com 143 +* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port. 186 186 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered. 187 -* (% style="color:#037691" %)**Network Keys**(%%): 145 +* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to 188 188 189 189 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway. 190 190 191 191 150 +=== **2.2.2 Set Up RSSH Server** === 192 192 193 -=== **2.2.2 Set Up RSSH Server** === 194 - 195 - 196 196 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below 197 197 198 198 155 +==== **2.2.2.1 Step 1 : Download the SSH service code** ==== 199 199 200 - ==== (% style="color:blue"%)**Step1:Download the SSHservice code**(%%)====157 +1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 201 201 202 - 203 -**1).** git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 204 - 205 205 [[image:image-20220531150750-5.png]] 206 206 161 +2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 207 207 208 -**2).** cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 209 - 210 210 [[image:image-20220531150811-6.png]] 211 211 212 212 ... ... @@ -236,31 +236,25 @@ 236 236 [[image:image-20220531151628-8.png]] 237 237 238 238 239 - (% style="color:blue" %)**How to install Sqlit3**192 +**How to install Sqlit3** 240 240 241 241 (% class="box infomessage" %) 242 242 ((( 243 - **~Step**Download the SQLit3 installation package244 - 196 + Step1:Download the SQLit3 installation package 197 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]** 245 245 246 - 247 -**Step 2: **tar the SQLit3 installation package 199 +Step2:tar the SQLit3 installation package 248 248 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz 249 - 250 -**Step 3:** Generate the makefile 201 +Step3:Generate the makefile 251 251 cd sqlite-autoconf-3350300/;./configure 252 - 253 -**Step 4:** Compile makefile 203 +Step4:Compile makefile 254 254 sudo make 255 - 256 -**Step 5:** Install makefile 205 +Step5:Install makefile 257 257 sudo make install 258 - 259 -**Check:** 260 - cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 207 +Check: 208 + cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 261 261 cd sqlite-autoconf-3350300/;./sqlite3 test.db ~-~-> Test whether the sqlite3 was installed successfully 262 - 263 -**debug:** 210 +debug: 264 264 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db. 265 265 Please execute the command /sbin/ldconfig. 266 266 After that execute the command ./sqlite3 test.db again. ... ... @@ -267,12 +267,10 @@ 267 267 ))) 268 268 269 269 217 +==== **2.2.2.2 Step 2 : Install and run the RSS service** ==== 270 270 271 - ==== (%style="color:blue"%)**Step2 :Installand run theRSS service**(%%)====219 +1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 272 272 273 - 274 -**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 275 - 276 276 user must enter the root account and run the following commands 277 277 278 278 (% class="box infomessage" %) ... ... @@ -297,28 +297,26 @@ 297 297 298 298 299 299 300 -==== (% style="color:blue" %)**Step 3 :(%%)====245 +==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ==== 301 301 302 - 303 303 (% class="box infomessage" %) 304 304 ((( 305 - **1):**sudo useradd XXXXX (custom user name)306 - **2):**sudo passwd xxxxxx307 - **3):**cp /bin/bash /bin/rbash308 - **4):**sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash309 - **5):**sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**310 - **6):**sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**249 +1):sudo useradd XXXXX (custom user name) 250 +2):sudo passwd xxxxxx 251 +3):cp /bin/bash /bin/rbash 252 +4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash 253 +5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin** 254 +6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin** 311 311 ))) 312 312 313 - (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**257 +**Now user "XXXXX" is the user with limited permissions of the current system** 314 314 315 315 316 316 317 -==== (% style="color:blue" %)**Step 4 :(%%)====261 +==== **2.2.2.4 Step 4 : Create an authorization key file** ==== 318 318 263 +1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 319 319 320 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 321 - 322 322 **Debug:** 323 323 324 324 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}} ... ... @@ -325,31 +325,25 @@ 325 325 326 326 327 327 328 -=== **2.2.3 271 +=== **2.2.3 How does user get the gateway to connect to a user's private server** === 329 329 330 330 274 +==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ==== 331 331 332 - ====(% style="color:blue" %)**Step 1 : Come back the gateway web UI togetthe gateway Public key**(%%) ====276 +1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 333 333 334 - 335 -**1)** in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 336 - 337 337 [[image:image-20220531152419-11.png]] 338 338 339 339 281 +==== **2.2.3.2 Step 2 : Authorization server** ==== 340 340 341 -==== (% style="color:blue" %)**Step 2 : Authorization server**(%%) ==== 342 - 343 - 344 344 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file. 345 345 346 346 [[image:image-20220531152549-12.png]] 347 347 348 348 288 +==== **2.2.3.3 Step 3 : Connect private server** ==== 349 349 350 -==== (% style="color:blue" %)**Step 3 : Connect private server**(%%) ==== 351 - 352 - 353 353 This is same as connect Dragino Support Server but just change the server address to customize server address. 354 354 355 355 [[image:image-20220531152633-13.png]] ... ... @@ -356,9 +356,8 @@ 356 356 357 357 358 358 359 -==== (% style="color:blue" %)**Step 4 :(%%)====296 +==== **2.2.3.4 Step 4 : Check Connection** ==== 360 360 361 - 362 362 Rssh Host connection Ok 363 363 364 364 [[image:image-20220531152815-14.png]] ... ... @@ -369,15 +369,13 @@ 369 369 [[image:image-20220531152840-15.png]] 370 370 371 371 308 +==== **2.2.3.5 Step 5 : Access the gateway from customized server** ==== 372 372 373 -==== (% style="color:blue" %)**Step 5 : Access the gateway from customized server**(%%) ==== 374 - 375 - 376 376 Check what gateways link to server. 377 377 378 378 (% class="box infomessage" %) 379 379 ((( 380 - **$ ./connect-gw.sh -l**314 +$ ./connect-gw.sh -l 381 381 ))) 382 382 383 383 [[image:image-20220531153016-16.png]] ... ... @@ -388,9 +388,7 @@ 388 388 389 389 (% class="box infomessage" %) 390 390 ((( 391 - **$ ./connect-gw.sh <GWID>**325 +$ ./connect-gw.sh <GWID> 392 392 ))) 393 393 394 394 [[image:image-20220531153219-17.png]] 395 - 396 -
- image-20220725113010-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -58.9 KB - Content
- image-20220725115720-2.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -81.7 KB - Content
- image-20220725134300-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -53.5 KB - Content