Version 50.1 by Kilight Cao on 2022/08/15 18:01

Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15 [[image:image-20220531155018-18.png]]
16
17
18
19 == **1.2  Steps** ==
20
21
22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
38
39 * change the script monitor_gateway.sh with properly users setting:
40
41 (% class="box infomessage" %)
42 (((
43 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
44 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
45 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
46 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
47 )))
48
49
50 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
51
52 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
53
54 (% class="box infomessage" %)
55 (((
56 # For details see man 4 crontabs
57 # Example of job definition:
58 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
59 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
60 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
61 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
62 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
63 # | | | | |
64 # * * * * * user-name command to be executed
65 #*/10 * * * *  checklog
66 ~* 23 * * *  /etc/init.d/auto_update start
67 */20 * * * *  /usr/bin/monitor_gateway.sh     
68 )))
69
70 * Reboot device.
71
72
73 == **1.3  Monitor Public IP** ==
74
75
76 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
77
78 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
79
80
81 [[image:image-20220531145559-2.png]]
82
83 Find Public IP
84
85
86
87 = **2.  Remote Access** =
88
89 == **2.1  Remote Access via Remote.it.** ==
90
91
92 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
93
94
95 (% style="color:red" %)**Important Notice:**
96
97 * Remote.it access will give full control of your device to remote support.
98 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
99
100 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
101 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
102
103 (% style="color:blue" %)**1. Install the Remote.it software**
104
105 Users can directly click** "Install"** on the Web UI to install Remote. it.
106
107
108 [[image:image-20220725134300-1.png||height="438" width="905"]]
109
110
111
112 (% style="color:blue" %)**2. Enter the license key**
113
114 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
115
116 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
117
118
119 (% class="box infomessage" %)
120 (((
121 **57F60715-606F-510D-A3D2-739860EBDB98**
122 )))
123
124 [[image:image-20220725113010-1.png||height="455" width="899"]]
125
126
127
128 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
129
130 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
131
132
133 [[image:image-20220725115720-2.png||height="658" width="900"]]
134
135
136 === **How to register hp0d with Remote.it** ===
137
138
139 **Prerequisites:**
140
141 Users must have an account and APP for remote.it
142
143 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
144
145
146 (% style="color:blue" %)**1. Click "+" in the APP to add a device**
147
148 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
149
150
151 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
152
153
154 (% style="color:blue" %)**2.Copy the register device command**
155
156
157 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
158
159
160 (% style="color:blue" %)**3.Enter the command copied from the previous step on the HP0D Linux command line**
161
162 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
163
164
165 (% style="color:blue" %)**4.Check whether the device is successfully registered on the Remote.it APP**
166
167
168 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
169
170
171 == **2.2  RSSH Introduction** ==
172
173
174 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
175
176 (% style="color:red" %)**Important Notice:**
177
178 (% class="box warningmessage" %)
179 (((
180 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
181 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
182 )))
183
184
185 **Below gateway support reverse SSH access:**
186
187 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
188 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
189 * LG02, OLG02
190 * LG308, DLOS8
191 * LPS8
192 * LIG16
193 * MS14 series if installed with the same firmware.
194
195
196
197 === **2.2.1  End User Guide to use SSH access** ===
198
199
200 Go to this the Reverse SSH page as below:
201
202
203 [[image:image-20220531150151-3.png]]
204
205 Get the RSSH configure page
206
207
208
209 [[image:image-20220531150338-4.png]]
210
211 Connection OK.
212
213
214 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
215 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
216 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
217 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
218 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
219
220 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
221
222
223
224 === **2.2.2  Set Up RSSH Server** ===
225
226
227 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
228
229
230
231 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
232
233
234 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
235
236 [[image:image-20220531150750-5.png]]
237
238
239 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
240
241 [[image:image-20220531150811-6.png]]
242
243
244 **Debug** :
245
246 (((
247 (% class="box" %)
248 (((
249 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
250 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
251 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
252 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
253 )))
254 )))
255
256 [[image:image-20220531151516-7.png]]
257
258
259 (((
260 (% class="box" %)
261 (((
262 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
263 please insatell sqlite3.
264 )))
265 )))
266
267 [[image:image-20220531151628-8.png]]
268
269
270 (% style="color:blue" %)**How to install Sqlit3:**
271
272 (% class="box infomessage" %)
273 (((
274 **~ Step 1:** Download the SQLit3 installation package
275 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
276
277 **Step 2: **tar the SQLit3 installation package
278 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
279
280 **Step 3:** Generate the makefile
281 cd sqlite-autoconf-3350300/;./configure
282
283 **Step 4:** Compile makefile
284 sudo make
285
286 **Step 5:** Install makefile
287 sudo make install
288
289 **Check:**
290 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
291 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
292
293 **debug:**
294 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
295 Please execute the command /sbin/ldconfig.
296 After that execute the command ./sqlite3 test.db again.
297 )))
298
299
300
301 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
302
303
304 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
305
306 user must enter the root account and run the following commands
307
308 (% class="box infomessage" %)
309 (((
310 **$ ./create_sqlite3_db.sh
311 $ ./rssh_serv -p  3721 2>&1 &
312 $ ps -ef | grep rssh_serv check 3721 port**
313 )))
314
315 [[image:image-20220531151958-10.png]]
316
317
318 **Debug:**
319
320 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
321 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
322 }}}
323
324 {{{ if fail to open dpvlry or to bind to it
325 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
326 }}}
327
328
329
330 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
331
332
333 (% class="box infomessage" %)
334 (((
335 **1):**  sudo useradd XXXXX (custom user name)
336 **2):**  sudo passwd xxxxxx
337 **3):**  cp /bin/bash /bin/rbash
338 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
339 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
340 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
341 )))
342
343 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
344
345
346
347 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
348
349
350 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
351
352
353 **Debug:**
354
355 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
356
357
358
359 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
360
361
362
363 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
364
365
366 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
367
368 [[image:image-20220531152419-11.png]]
369
370
371
372 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
373
374
375 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
376
377 [[image:image-20220531152549-12.png]]
378
379
380
381 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
382
383
384 This is same as connect Dragino Support Server but just change the server address to customize server address.
385
386 [[image:image-20220531152633-13.png]]
387
388
389
390 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
391
392
393 Rssh Host connection Ok
394
395 [[image:image-20220531152815-14.png]]
396
397
398 User can use common ps | grep ssh to check it in the gateway.
399
400 [[image:image-20220531152840-15.png]]
401
402
403
404 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
405
406
407 Check what gateways link to server.
408
409 (% class="box infomessage" %)
410 (((
411 **$ ./connect-gw.sh -l**
412 )))
413
414 [[image:image-20220531153016-16.png]]
415
416
417
418 Access the gateway
419
420 (% class="box infomessage" %)
421 (((
422 **$ ./connect-gw.sh <GWID>**
423 )))
424
425 [[image:image-20220531153219-17.png]]
426
427