<
From version < 49.1 >
edited by Kilight Cao
on 2022/08/15 18:00
To version < 29.3 >
edited by Xiaoling
on 2022/05/31 15:51
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Kilight
1 +XWiki.Xiaoling
Content
... ... @@ -1,4 +1,4 @@
1 -**Table of Contents:**
1 +**Contents:**
2 2  
3 3  {{toc/}}
4 4  
... ... @@ -5,20 +5,17 @@
5 5  
6 6  
7 7  
8 -= **1.  Monitor Gateway** =
8 += **1. Monitor Gateway** =
9 9  
10 -== **1.1  Introduction** ==
10 +== **1.1 Introduction** ==
11 11  
12 -
13 13  This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14 14  
15 15  [[image:image-20220531155018-18.png]]
16 16  
17 17  
17 +== **1.2 Steps** ==
18 18  
19 -== **1.2  Steps** ==
20 -
21 -
22 22  * Create account in ThingsSpeak and creat channel.
23 23  * Download script from dragino site and move it to properly directory
24 24  
... ... @@ -35,7 +35,6 @@
35 35  root@dragino-1baf44:~~#
36 36  )))
37 37  
38 -
39 39  * change the script monitor_gateway.sh with properly users setting:
40 40  
41 41  (% class="box infomessage" %)
... ... @@ -46,11 +46,10 @@
46 46  CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
47 47  )))
48 48  
45 +* run **/usr/bin/monitor_gateway.sh** to test if upload is good.
49 49  
50 -* run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
47 +* Add monitor_gateway.sh to cron work **/etc/crontabs/root** to make this script runs perdiocally, below is an example to update every 20 minutes
51 51  
52 -* Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
53 -
54 54  (% class="box infomessage" %)
55 55  (((
56 56  # For details see man 4 crontabs
... ... @@ -71,14 +71,12 @@
71 71  
72 72  
73 73  
74 -== **1.3  Monitor Public IP** ==
69 +== **1.3 Monitor Public IP** ==
75 75  
76 -
77 77  The monitor_gateway.sh has been updated to upload the public ip of the device as well.
78 78  
79 79  User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
80 80  
81 -
82 82  [[image:image-20220531145559-2.png]]
83 83  
84 84  Find Public IP
... ... @@ -85,97 +85,25 @@
85 85  
86 86  
87 87  
88 -= **2.  Remote Access** =
81 += **2. Remote Access** =
89 89  
90 -== **2.1  Remote Access via Remote.it.** ==
83 +== **2.1 Remote Access via Remote.it.** ==
91 91  
92 -
93 93  Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
94 94  
87 +Important Notice:
95 95  
96 -(% style="color:red" %)**Important Notice:**
97 -
98 98  * Remote.it access will give full control of your device to remote support.
99 -* The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
90 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
100 100  
101 -* For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
102 -* For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
92 +For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
103 103  
104 104  
105 -(% style="color:blue" %)**1. Install the Remote.it software**
95 +== **2.2 RSSH Introduction** ==
106 106  
107 -Users can directly click** "Install"** on the Web UI to install Remote. it.
108 -
109 -
110 -[[image:image-20220725134300-1.png||height="438" width="905"]]
111 -
112 -
113 -
114 -(% style="color:blue" %)**2. Enter the license key**
115 -
116 -Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
117 -
118 -(% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
119 -
120 -
121 -(% class="box infomessage" %)
122 -(((
123 -**57F60715-606F-510D-A3D2-739860EBDB98**
124 -)))
125 -
126 -[[image:image-20220725113010-1.png||height="455" width="899"]]
127 -
128 -
129 -
130 -(% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
131 -
132 -Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
133 -
134 -
135 -[[image:image-20220725115720-2.png||height="658" width="900"]]
136 -
137 -
138 -=== **How to register hp0d with AWS** ===
139 -
140 -
141 -**Prerequisites:**
142 -
143 -Users must have an account and APP for remote.it
144 -
145 -[[https:~~/~~/app.remote.it>>https://app.remote.it]]
146 -
147 -
148 -(% style="color:blue" %)**1. Click "+" in the APP to add a device**
149 -
150 -Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
151 -
152 -
153 -[[image:image-20220815173938-1.jpeg||height="574" width="919"]]
154 -
155 -
156 -(% style="color:blue" %)**2.Copy the register device command**
157 -
158 -
159 -[[image:image-20220815173944-2.jpeg||height="556" width="923"]]
160 -
161 -
162 -(% style="color:blue" %)**3.Enter the command copied from the previous step on the HP0D Linux command line**
163 -
164 -[[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
165 -
166 -
167 -(% style="color:blue" %)**4.Check whether the device is successfully registered on the Remote.it APP**
168 -
169 -
170 -[[image:image-20220815173958-4.jpeg||height="580" width="964"]]
171 -
172 -
173 -== **2.2  RSSH Introduction** ==
174 -
175 -
176 176  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
177 177  
178 -(% style="color:red" %)**Important Notice:**
99 +Important Notice:
179 179  
180 180  (% class="box warningmessage" %)
181 181  (((
... ... @@ -183,9 +183,8 @@
183 183  This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
184 184  )))
185 185  
107 +Below gateway support reverse SSH access:
186 186  
187 -**Below gateway support reverse SSH access:**
188 -
189 189  * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
190 190  * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
191 191  * LG02, OLG02
... ... @@ -194,15 +194,10 @@
194 194  * LIG16
195 195  * MS14 series if installed with the same firmware.
196 196  
117 +=== **2.2.1 End User Guide to use SSH access** ===
197 197  
198 -
199 -
200 -=== **2.2.1  End User Guide to use SSH access** ===
201 -
202 -
203 203  Go to this the Reverse SSH page as below:
204 204  
205 -
206 206  [[image:image-20220531150151-3.png]]
207 207  
208 208  Get the RSSH configure page
... ... @@ -214,33 +214,28 @@
214 214  Connection OK.
215 215  
216 216  
217 -* (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
218 -* (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
219 -* (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
132 +* (% style="color:#037691" %)**Login ID**(%%): Input sshuser
133 +* (% style="color:#037691" %)**Host Address**(%%): Input support.dragino.com
134 +* (% style="color:#037691" %)**Host Port** (%%): Please email to support @ dragino.com to get a valid host port.
220 220  * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
221 -* (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
136 +* (% style="color:#037691" %)**Network Keys**(%%): Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
222 222  
223 223  After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
224 224  
225 225  
141 +=== **2.2.2 Set Up RSSH Server** ===
226 226  
227 -=== **2.2.2  Set Up RSSH Server** ===
228 -
229 -
230 230  Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
231 231  
232 232  
146 +==== **2.2.2.1 Step 1 : Download the SSH service code** ====
233 233  
234 -==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
148 +1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
235 235  
236 -
237 -**1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
238 -
239 239  [[image:image-20220531150750-5.png]]
240 240  
152 +2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
241 241  
242 -**2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
243 -
244 244  [[image:image-20220531150811-6.png]]
245 245  
246 246  
... ... @@ -270,30 +270,25 @@
270 270  [[image:image-20220531151628-8.png]]
271 271  
272 272  
273 -(% style="color:blue" %)**How to install Sqlit3:**
183 +**How to install Sqlit3**
274 274  
275 275  (% class="box infomessage" %)
276 276  (((
277 -**~ Step 1:** Download the SQLit3 installation package
278 - sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
187 + Step1:Download the SQLit3 installation package
188 + sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
279 279  
280 -**Step 2: **tar the SQLit3 installation package
190 +Step2:tar the SQLit3 installation package
281 281   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
282 -
283 -**Step 3:** Generate the makefile
192 +Step3:Generate the makefile
284 284   cd sqlite-autoconf-3350300/;./configure
285 -
286 -**Step 4:** Compile makefile
194 +Step4:Compile makefile
287 287   sudo make
288 -
289 -**Step 5:** Install makefile
196 +Step5:Install makefile
290 290   sudo make install
291 -
292 -**Check:**
293 - cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
198 +Check:
199 + cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
294 294   cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
295 -
296 -**debug:**
201 +debug:
297 297   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
298 298   Please execute the command /sbin/ldconfig.
299 299   After that execute the command ./sqlite3 test.db again.
... ... @@ -300,19 +300,17 @@
300 300  )))
301 301  
302 302  
208 +==== **2.2.2.2 Step 2 : Install and run the RSS service** ====
303 303  
304 -==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
210 +1):install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
305 305  
306 -
307 -**1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
308 -
309 309  user must enter the root account and run the following commands
310 310  
311 311  (% class="box infomessage" %)
312 312  (((
313 -**$ ./create_sqlite3_db.sh
216 +$ ./create_sqlite3_db.sh
314 314  $ ./rssh_serv -p  3721 2>&1 &
315 -$ ps -ef | grep rssh_serv check 3721 port**
218 +$ ps -ef | grep rssh_serv check 3721 port
316 316  )))
317 317  
318 318  [[image:image-20220531151958-10.png]]
... ... @@ -330,29 +330,26 @@
330 330  
331 331  
332 332  
333 -==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
236 +==== **2.2.2.3 Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)** ====
334 334  
335 -
336 336  (% class="box infomessage" %)
337 337  (((
338 -**1):**  sudo useradd XXXXX (custom user name)
339 -**2):**  sudo passwd xxxxxx
340 -**3):**  cp /bin/bash /bin/rbash
341 -**4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
342 -**5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
343 -**6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
240 +1):sudo useradd XXXXX (custom user name)
241 +2):sudo passwd xxxxxx
242 +3):cp /bin/bash /bin/rbash
243 +4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
244 +5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
245 +6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
344 344  )))
345 345  
346 -(% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
248 +**Now user "XXXXX" is the user with limited permissions of the current system**
347 347  
348 348  
349 349  
350 -==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
252 +==== **2.2.2.4 Step 4 : Create an authorization key file** ====
351 351  
254 +1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
352 352  
353 -**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
354 -
355 -
356 356  **Debug:**
357 357  
358 358  {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
... ... @@ -359,31 +359,25 @@
359 359  
360 360  
361 361  
362 -=== **2.2.3  How does user get the gateway to connect to a user's private server** ===
262 +=== **2.2.3 How does user get the gateway to connect to a user's private server** ===
363 363  
364 364  
265 +==== **2.2.3.1 Step 1 : Come back the gateway web UI to get the gateway Public key** ====
365 365  
366 -==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
267 +1)in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
367 367  
368 -
369 -**1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
370 -
371 371  [[image:image-20220531152419-11.png]]
372 372  
373 373  
272 +==== **2.2.3.2 Step 2 : Authorization server** ====
374 374  
375 -==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
376 -
377 -
378 378  Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
379 379  
380 380  [[image:image-20220531152549-12.png]]
381 381  
382 382  
279 +==== **2.2.3.3 Step 3 : Connect private server** ====
383 383  
384 -==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
385 -
386 -
387 387  This is same as connect Dragino Support Server but just change the server address to customize server address.
388 388  
389 389  [[image:image-20220531152633-13.png]]
... ... @@ -390,9 +390,8 @@
390 390  
391 391  
392 392  
393 -==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
287 +==== **2.2.3.4 Step 4 : Check Connection** ====
394 394  
395 -
396 396  Rssh Host connection Ok
397 397  
398 398  [[image:image-20220531152815-14.png]]
... ... @@ -403,15 +403,13 @@
403 403  [[image:image-20220531152840-15.png]]
404 404  
405 405  
299 +==== **2.2.3.5 Step 5 : Access the gateway from customized server** ====
406 406  
407 -==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
408 -
409 -
410 410  Check what gateways link to server.
411 411  
412 412  (% class="box infomessage" %)
413 413  (((
414 -**$ ./connect-gw.sh -l**
305 +$ ./connect-gw.sh -l
415 415  )))
416 416  
417 417  [[image:image-20220531153016-16.png]]
... ... @@ -422,9 +422,7 @@
422 422  
423 423  (% class="box infomessage" %)
424 424  (((
425 -**$ ./connect-gw.sh <GWID>**
316 +$ ./connect-gw.sh <GWID>
426 426  )))
427 427  
428 428  [[image:image-20220531153219-17.png]]
429 -
430 -
image-20220725113010-1.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -58.9 KB
Content
image-20220725115720-2.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -81.7 KB
Content
image-20220725134300-1.png
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -53.5 KB
Content
image-20220815173938-1.jpeg
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -56.6 KB
Content
image-20220815173944-2.jpeg
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -40.6 KB
Content
image-20220815173951-3.jpeg
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -75.4 KB
Content
image-20220815173958-4.jpeg
Author
... ... @@ -1,1 +1,0 @@
1 -XWiki.Kilight
Size
... ... @@ -1,1 +1,0 @@
1 -54.2 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0