Changes for page Monitor & Remote Access Gateway
Last modified by Kilight Cao on 2025/01/14 10:25
Summary
-
Page properties (1 modified, 0 added, 0 removed)
-
Attachments (0 modified, 0 added, 3 removed)
Details
- Page properties
-
- Content
-
... ... @@ -1,4 +1,4 @@ 1 -** Table ofContents:**1 +**Contents:** 2 2 3 3 {{toc/}} 4 4 ... ... @@ -5,20 +5,17 @@ 5 5 6 6 7 7 8 -= **1. 8 += **1. Monitor Gateway** = 9 9 10 -== **1.1 10 +== **1.1 Introduction** == 11 11 12 - 13 13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]] 14 14 15 15 [[image:image-20220531155018-18.png]] 16 16 17 17 17 +== **1.2 Steps** == 18 18 19 -== **1.2 Steps** == 20 - 21 - 22 22 * Create account in ThingsSpeak and creat channel. 23 23 * Download script from dragino site and move it to properly directory 24 24 ... ... @@ -35,7 +35,6 @@ 35 35 root@dragino-1baf44:~~# 36 36 ))) 37 37 38 - 39 39 * change the script monitor_gateway.sh with properly users setting: 40 40 41 41 (% class="box infomessage" %) ... ... @@ -46,11 +46,10 @@ 46 46 CHAN_KEY='xxxxx' #Channel Write API of the channel for this gateway 47 47 ))) 48 48 45 +* run **/usr/bin/monitor_gateway.sh** to test if upload is good. 49 49 50 -* run(% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%)to test ifuploadisgood.47 +* Add monitor_gateway.sh to cron work **/etc/crontabs/root** to make this script runs perdiocally, below is an example to update every 20 minutes 51 51 52 -* Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes 53 - 54 54 (% class="box infomessage" %) 55 55 ((( 56 56 # For details see man 4 crontabs ... ... @@ -71,14 +71,12 @@ 71 71 72 72 73 73 74 -== **1.3 69 +== **1.3 Monitor Public IP** == 75 75 76 - 77 77 The monitor_gateway.sh has been updated to upload the public ip of the device as well. 78 78 79 79 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export. 80 80 81 - 82 82 [[image:image-20220531145559-2.png]] 83 83 84 84 Find Public IP ... ... @@ -85,63 +85,25 @@ 85 85 86 86 87 87 88 -= **2. 81 += **2. Remote Access** = 89 89 90 -== **2.1 83 +== **2.1 Remote Access via Remote.it.** == 91 91 92 - 93 93 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand. 94 94 87 +Important Notice: 95 95 96 -(% style="color:red" %)**Important Notice:** 97 - 98 98 * Remote.it access will give full control of your device to remote support. 99 -* The Remote.it allow sDragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.90 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 100 100 101 -* For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 102 -* For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below: 92 +For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 103 103 104 104 105 - (% style="color:blue"%)**1. Install the Remote.it software**95 +== **2.2 RSSH Introduction** == 106 106 107 -Users can directly click** "Install"** on the Web UI to install Remote. it. 108 - 109 - 110 -[[image:image-20220725134300-1.png||height="438" width="905"]] 111 - 112 - 113 - 114 -(% style="color:blue" %)**2. Enter the license key** 115 - 116 -Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button. 117 - 118 -(% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.** 119 - 120 - 121 -(% class="box infomessage" %) 122 -((( 123 -**57F60715-606F-510D-A3D2-739860EBDB98** 124 -))) 125 - 126 -[[image:image-20220725113010-1.png||height="455" width="899"]] 127 - 128 - 129 - 130 -(% style="color:blue" %)**3. Connect and tell us your device ID or Hostname** 131 - 132 -Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac 133 - 134 - 135 -[[image:image-20220725115720-2.png||height="658" width="900"]] 136 - 137 - 138 - 139 -== **2.2 RSSH Introduction** == 140 - 141 - 142 142 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand. 143 143 144 - (% style="color:red" %)**Important Notice:**99 +Important Notice: 145 145 146 146 (% class="box warningmessage" %) 147 147 ((( ... ... @@ -149,9 +149,8 @@ 149 149 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself. 150 150 ))) 151 151 107 +Below gateway support reverse SSH access: 152 152 153 -**Below gateway support reverse SSH access:** 154 - 155 155 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]] 156 156 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 157 157 * LG02, OLG02 ... ... @@ -162,13 +162,10 @@ 162 162 163 163 164 164 119 +=== **2.2.1 End User Guide to use SSH access** === 165 165 166 -=== **2.2.1 End User Guide to use SSH access** === 167 - 168 - 169 169 Go to this the Reverse SSH page as below: 170 170 171 - 172 172 [[image:image-20220531150151-3.png]] 173 173 174 174 Get the RSSH configure page ... ... @@ -180,35 +180,28 @@ 180 180 Connection OK. 181 181 182 182 183 -* (% style="color:#037691" %)**Login ID**(%%): 184 -* (% style="color:#037691" %)**Host Address**(%%): 185 -* (% style="color:#037691" %)**Host Port** (%%): 134 +* (% style="color:#037691" %)**Login ID**(%%): Input sshuser 135 +* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com 136 +* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port. 186 186 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered. 187 -* (% style="color:#037691" %)**Network Keys**(%%): 138 +* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to 188 188 189 - 190 - 191 191 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway. 192 192 193 193 143 +=== **2.2.2 Set Up RSSH Server** === 194 194 195 -=== **2.2.2 Set Up RSSH Server** === 196 - 197 - 198 198 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below 199 199 200 200 148 +==== **2.2.2.1 Step 1 : Download the SSH service code** ==== 201 201 202 - ==== (% style="color:blue"%)**Step1:Download the SSHservice code**(%%)====150 +1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 203 203 204 - 205 -**1).** git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server 206 - 207 207 [[image:image-20220531150750-5.png]] 208 208 154 +2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 209 209 210 -**2).** cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv 211 - 212 212 [[image:image-20220531150811-6.png]] 213 213 214 214 ... ... @@ -238,30 +238,25 @@ 238 238 [[image:image-20220531151628-8.png]] 239 239 240 240 241 - (% style="color:blue" %)**How to install Sqlit3:**185 +**How to install Sqlit3** 242 242 243 243 (% class="box infomessage" %) 244 244 ((( 245 - **~Step**Download the SQLit3 installation package246 - 189 + Step1:Download the SQLit3 installation package 190 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]** 247 247 248 - **Step**tar the SQLit3 installation package192 +Step2:tar the SQLit3 installation package 249 249 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz 250 - 251 -**Step 3:** Generate the makefile 194 +Step3:Generate the makefile 252 252 cd sqlite-autoconf-3350300/;./configure 253 - 254 -**Step 4:** Compile makefile 196 +Step4:Compile makefile 255 255 sudo make 256 - 257 -**Step 5:** Install makefile 198 +Step5:Install makefile 258 258 sudo make install 259 - 260 -**Check:** 261 - cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 200 +Check: 201 + cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 262 262 cd sqlite-autoconf-3350300/;./sqlite3 test.db ~-~-> Test whether the sqlite3 was installed successfully 263 - 264 -**debug:** 203 +debug: 265 265 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db. 266 266 Please execute the command /sbin/ldconfig. 267 267 After that execute the command ./sqlite3 test.db again. ... ... @@ -268,19 +268,17 @@ 268 268 ))) 269 269 270 270 210 +==== **2.2.2.2 Step 2 : Install and run the RSS service** ==== 271 271 272 - ==== (%style="color:blue"%)**Step2 :Installand run theRSS service**(%%)====212 +1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 273 273 274 - 275 -**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721) 276 - 277 277 user must enter the root account and run the following commands 278 278 279 279 (% class="box infomessage" %) 280 280 ((( 281 - **$ ./create_sqlite3_db.sh218 +$ ./create_sqlite3_db.sh 282 282 $ ./rssh_serv -p 3721 2>&1 & 283 -$ ps -ef | grep rssh_serv check 3721 port **220 +$ ps -ef | grep rssh_serv check 3721 port 284 284 ))) 285 285 286 286 [[image:image-20220531151958-10.png]] ... ... @@ -298,28 +298,26 @@ 298 298 299 299 300 300 301 -==== (% style="color:blue" %)**Step 3 :(%%)====238 +==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ==== 302 302 303 - 304 304 (% class="box infomessage" %) 305 305 ((( 306 - **1):**sudo useradd XXXXX (custom user name)307 - **2):**sudo passwd xxxxxx308 - **3):**cp /bin/bash /bin/rbash309 - **4):**sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash310 - **5):**sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**311 - **6):**sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**242 +1):sudo useradd XXXXX (custom user name) 243 +2):sudo passwd xxxxxx 244 +3):cp /bin/bash /bin/rbash 245 +4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash 246 +5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin** 247 +6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin** 312 312 ))) 313 313 314 - (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**250 +**Now user "XXXXX" is the user with limited permissions of the current system** 315 315 316 316 317 317 318 -==== (% style="color:blue" %)**Step 4 :(%%)====254 +==== **2.2.2.4 Step 4 : Create an authorization key file** ==== 319 319 256 +1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 320 320 321 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 322 - 323 323 **Debug:** 324 324 325 325 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}} ... ... @@ -326,31 +326,25 @@ 326 326 327 327 328 328 329 -=== **2.2.3 264 +=== **2.2.3 How does user get the gateway to connect to a user's private server** === 330 330 331 331 267 +==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ==== 332 332 333 - ====(% style="color:blue" %)**Step 1 : Come back the gateway web UI togetthe gateway Public key**(%%) ====269 +1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 334 334 335 - 336 -**1)** in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span** 337 - 338 338 [[image:image-20220531152419-11.png]] 339 339 340 340 274 +==== **2.2.3.2 Step 2 : Authorization server** ==== 341 341 342 -==== (% style="color:blue" %)**Step 2 : Authorization server**(%%) ==== 343 - 344 - 345 345 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file. 346 346 347 347 [[image:image-20220531152549-12.png]] 348 348 349 349 281 +==== **2.2.3.3 Step 3 : Connect private server** ==== 350 350 351 -==== (% style="color:blue" %)**Step 3 : Connect private server**(%%) ==== 352 - 353 - 354 354 This is same as connect Dragino Support Server but just change the server address to customize server address. 355 355 356 356 [[image:image-20220531152633-13.png]] ... ... @@ -357,9 +357,8 @@ 357 357 358 358 359 359 360 -==== (% style="color:blue" %)**Step 4 :(%%)====289 +==== **2.2.3.4 Step 4 : Check Connection** ==== 361 361 362 - 363 363 Rssh Host connection Ok 364 364 365 365 [[image:image-20220531152815-14.png]] ... ... @@ -370,15 +370,13 @@ 370 370 [[image:image-20220531152840-15.png]] 371 371 372 372 301 +==== **2.2.3.5 Step 5 : Access the gateway from customized server** ==== 373 373 374 -==== (% style="color:blue" %)**Step 5 : Access the gateway from customized server**(%%) ==== 375 - 376 - 377 377 Check what gateways link to server. 378 378 379 379 (% class="box infomessage" %) 380 380 ((( 381 - **$ ./connect-gw.sh -l**307 +$ ./connect-gw.sh -l 382 382 ))) 383 383 384 384 [[image:image-20220531153016-16.png]] ... ... @@ -389,9 +389,7 @@ 389 389 390 390 (% class="box infomessage" %) 391 391 ((( 392 - **$ ./connect-gw.sh <GWID>**318 +$ ./connect-gw.sh <GWID> 393 393 ))) 394 394 395 395 [[image:image-20220531153219-17.png]] 396 - 397 -
- image-20220725113010-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -58.9 KB - Content
- image-20220725115720-2.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -81.7 KB - Content
- image-20220725134300-1.png
-
- Author
-
... ... @@ -1,1 +1,0 @@ 1 -XWiki.Kilight - Size
-
... ... @@ -1,1 +1,0 @@ 1 -53.5 KB - Content