Version 44.12 by Xiaoling on 2022/07/25 17:47

Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15 [[image:image-20220531155018-18.png]]
16
17
18
19 == **1.2  Steps** ==
20
21
22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
38
39 * change the script monitor_gateway.sh with properly users setting:
40
41 (% class="box infomessage" %)
42 (((
43 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
44 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
45 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
46 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
47 )))
48
49
50 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
51
52 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
53
54 (% class="box infomessage" %)
55 (((
56 # For details see man 4 crontabs
57 # Example of job definition:
58 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
59 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
60 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
61 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
62 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
63 # | | | | |
64 # * * * * * user-name command to be executed
65 #*/10 * * * *  checklog
66 ~* 23 * * *  /etc/init.d/auto_update start
67 */20 * * * *  /usr/bin/monitor_gateway.sh     
68 )))
69
70 * Reboot device.
71
72
73
74
75
76 == **1.3  Monitor Public IP** ==
77
78
79 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
80
81 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
82
83
84 [[image:image-20220531145559-2.png]]
85
86 Find Public IP
87
88
89
90 = **2.  Remote Access** =
91
92 == **2.1  Remote Access via Remote.it.** ==
93
94
95 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
96
97
98 (% style="color:red" %)**Important Notice:**
99
100 * Remote.it access will give full control of your device to remote support.
101 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
102
103 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
104 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
105
106
107 (% style="color:blue" %)**1. Install the Remote.it software**
108
109 Users can directly click** "Install"** on the Web UI to install Remote. it.
110
111
112 [[image:image-20220725134300-1.png||height="438" width="905"]]
113
114
115
116 (% style="color:blue" %)**2. Enter the license key**
117
118 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
119
120 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
121
122
123 (% class="box infomessage" %)
124 (((
125 **57F60715-606F-510D-A3D2-739860EBDB98**
126 )))
127
128 [[image:image-20220725113010-1.png||height="455" width="899"]]
129
130
131
132 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
133
134 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
135
136
137 [[image:image-20220725115720-2.png||height="658" width="900"]]
138
139
140
141 == **2.2  RSSH Introduction** ==
142
143
144 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
145
146 (% style="color:red" %)**Important Notice:**
147
148 (% class="box warningmessage" %)
149 (((
150 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
151 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
152 )))
153
154
155 **Below gateway support reverse SSH access:**
156
157 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
158 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
159 * LG02, OLG02
160 * LG308, DLOS8
161 * LPS8
162 * LIG16
163 * MS14 series if installed with the same firmware.
164
165
166 === **2.2.1  End User Guide to use SSH access** ===
167
168
169 Go to this the Reverse SSH page as below:
170
171
172 [[image:image-20220531150151-3.png]]
173
174 Get the RSSH configure page
175
176
177
178 [[image:image-20220531150338-4.png]]
179
180 Connection OK.
181
182
183 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
184 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
185 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
186 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
187 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
188
189 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
190
191
192
193 === **2.2.2  Set Up RSSH Server** ===
194
195
196 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
197
198
199
200 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
201
202
203 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
204
205 [[image:image-20220531150750-5.png]]
206
207
208 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
209
210 [[image:image-20220531150811-6.png]]
211
212
213 **Debug** :
214
215 (((
216 (% class="box" %)
217 (((
218 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
219 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
220 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
221 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
222 )))
223 )))
224
225 [[image:image-20220531151516-7.png]]
226
227
228 (((
229 (% class="box" %)
230 (((
231 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
232 please insatell sqlite3.
233 )))
234 )))
235
236 [[image:image-20220531151628-8.png]]
237
238
239 (% style="color:blue" %)**How to install Sqlit3:**
240
241 (% class="box infomessage" %)
242 (((
243 **~ Step 1:** Download the SQLit3 installation package
244 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
245
246 **Step 2: **tar the SQLit3 installation package
247 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
248
249 **Step 3:** Generate the makefile
250 cd sqlite-autoconf-3350300/;./configure
251
252 **Step 4:** Compile makefile
253 sudo make
254
255 **Step 5:** Install makefile
256 sudo make install
257
258 **Check:**
259 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
260 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
261
262 **debug:**
263 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
264 Please execute the command /sbin/ldconfig.
265 After that execute the command ./sqlite3 test.db again.
266 )))
267
268
269
270 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
271
272
273 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
274
275 user must enter the root account and run the following commands
276
277 (% class="box infomessage" %)
278 (((
279 **$ ./create_sqlite3_db.sh
280 $ ./rssh_serv -p  3721 2>&1 &
281 $ ps -ef | grep rssh_serv check 3721 port**
282 )))
283
284 [[image:image-20220531151958-10.png]]
285
286
287 **Debug:**
288
289 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
290 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
291 }}}
292
293 {{{ if fail to open dpvlry or to bind to it
294 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
295 }}}
296
297
298
299 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
300
301
302 (% class="box infomessage" %)
303 (((
304 **1):**  sudo useradd XXXXX (custom user name)
305 **2):**  sudo passwd xxxxxx
306 **3):**  cp /bin/bash /bin/rbash
307 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
308 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
309 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
310 )))
311
312 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
313
314
315
316 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
317
318
319 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
320
321
322 **Debug:**
323
324 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
325
326
327
328 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
329
330
331
332 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
333
334
335 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
336
337 [[image:image-20220531152419-11.png]]
338
339
340
341 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
342
343
344 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
345
346 [[image:image-20220531152549-12.png]]
347
348
349
350 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
351
352
353 This is same as connect Dragino Support Server but just change the server address to customize server address.
354
355 [[image:image-20220531152633-13.png]]
356
357
358
359 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
360
361
362 Rssh Host connection Ok
363
364 [[image:image-20220531152815-14.png]]
365
366
367 User can use common ps | grep ssh to check it in the gateway.
368
369 [[image:image-20220531152840-15.png]]
370
371
372
373 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
374
375
376 Check what gateways link to server.
377
378 (% class="box infomessage" %)
379 (((
380 **$ ./connect-gw.sh -l**
381 )))
382
383 [[image:image-20220531153016-16.png]]
384
385
386
387 Access the gateway
388
389 (% class="box infomessage" %)
390 (((
391 **$ ./connect-gw.sh <GWID>**
392 )))
393
394 [[image:image-20220531153219-17.png]]
395
396