Version 51.1 by Edwin Chen on 2022/08/23 11:27

Hide last authors
Xiaoling 30.2 1 **Table of Contents:**
Xiaoling 25.6 2
Edwin Chen 1.1 3 {{toc/}}
4
Xiaoling 25.6 5
6
Xiaoling 25.7 7
Xiaoling 30.2 8 = **1.  Monitor Gateway** =
Edwin Chen 1.1 9
Xiaoling 30.2 10 == **1.1  Introduction** ==
Edwin Chen 1.1 11
Xiaoling 30.2 12
Edwin Chen 1.1 13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
Xiaoling 29.2 15 [[image:image-20220531155018-18.png]]
Edwin Chen 1.1 16
Xiaoling 8.3 17
Edwin Chen 1.1 18
Xiaoling 30.2 19 == **1.2  Steps** ==
20
21
Edwin Chen 1.1 22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
Xiaoling 44.2 38
Edwin Chen 1.1 39 * change the script monitor_gateway.sh with properly users setting:
40
41 (% class="box infomessage" %)
42 (((
43 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
44 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
45 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
46 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
47 )))
48
49
Xiaoling 44.2 50 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
Edwin Chen 1.1 51
Xiaoling 44.2 52 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
53
Edwin Chen 1.1 54 (% class="box infomessage" %)
55 (((
Edwin Chen 7.1 56 # For details see man 4 crontabs
Edwin Chen 1.1 57 # Example of job definition:
58 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
59 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
60 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
61 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
62 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
63 # | | | | |
64 # * * * * * user-name command to be executed
65 #*/10 * * * *  checklog
66 ~* 23 * * *  /etc/init.d/auto_update start
Edwin Chen 2.1 67 */20 * * * *  /usr/bin/monitor_gateway.sh     
Edwin Chen 1.1 68 )))
69
70 * Reboot device.
71
Xiaoling 30.2 72 == **1.3  Monitor Public IP** ==
Xiaoling 8.2 73
Xiaoling 30.2 74
Edwin Chen 1.1 75 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
76
77 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
78
Xiaoling 44.2 79
Xiaoling 10.2 80 [[image:image-20220531145559-2.png]]
Edwin Chen 1.1 81
82 Find Public IP
83
84
85
Xiaoling 30.2 86 = **2.  Remote Access** =
Edwin Chen 1.1 87
Xiaoling 30.2 88 == **2.1  Remote Access via Remote.it.** ==
Edwin Chen 1.1 89
Xiaoling 30.2 90
Edwin Chen 1.1 91 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
92
93
Xiaoling 30.2 94 (% style="color:red" %)**Important Notice:**
95
Edwin Chen 1.1 96 * Remote.it access will give full control of your device to remote support.
Kilight Cao 37.1 97 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
Edwin Chen 1.1 98
Edwin Chen 51.1 99 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
Xiaoling 44.2 100 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
Edwin Chen 1.1 101
Xiaoling 44.2 102 (% style="color:blue" %)**1. Install the Remote.it software**
Edwin Chen 33.1 103
Xiaoling 44.10 104 Users can directly click** "Install"** on the Web UI to install Remote. it.
Edwin Chen 34.1 105
Xiaoling 44.2 106
Kilight Cao 41.1 107 [[image:image-20220725134300-1.png||height="438" width="905"]]
108
Kilight Cao 42.1 109
Kilight Cao 37.1 110
Xiaoling 44.2 111 (% style="color:blue" %)**2. Enter the license key**
112
Xiaoling 44.6 113 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
Kilight Cao 37.1 114
Kilight Cao 44.1 115 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
Kilight Cao 39.1 116
Xiaoling 44.2 117
Kilight Cao 37.1 118 (% class="box infomessage" %)
119 (((
Xiaoling 44.2 120 **57F60715-606F-510D-A3D2-739860EBDB98**
Kilight Cao 37.1 121 )))
122
123 [[image:image-20220725113010-1.png||height="455" width="899"]]
124
125
126
Xiaoling 44.2 127 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
Kilight Cao 37.1 128
Xiaoling 44.2 129 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
130
131
Kilight Cao 37.1 132 [[image:image-20220725115720-2.png||height="658" width="900"]]
133
134
Kilight Cao 50.1 135 === **How to register hp0d with Remote.it** ===
Xiaoling 44.2 136
Kilight Cao 49.1 137
138 **Prerequisites:**
139
140 Users must have an account and APP for remote.it
141
142 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
143
144
145 (% style="color:blue" %)**1. Click "+" in the APP to add a device**
146
147 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
148
149
150 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
151
152
153 (% style="color:blue" %)**2.Copy the register device command**
154
155
156 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
157
158
159 (% style="color:blue" %)**3.Enter the command copied from the previous step on the HP0D Linux command line**
160
161 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
162
163
164 (% style="color:blue" %)**4.Check whether the device is successfully registered on the Remote.it APP**
165
166
167 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
168
169
Xiaoling 30.2 170 == **2.2  RSSH Introduction** ==
Edwin Chen 1.1 171
Xiaoling 31.3 172
Edwin Chen 2.1 173 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
Edwin Chen 1.1 174
Xiaoling 44.2 175 (% style="color:red" %)**Important Notice:**
Edwin Chen 1.1 176
Edwin Chen 2.2 177 (% class="box warningmessage" %)
Edwin Chen 2.1 178 (((
179 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
180 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
181 )))
182
183
Xiaoling 44.6 184 **Below gateway support reverse SSH access:**
185
Edwin Chen 4.1 186 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
Edwin Chen 2.1 187 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
188 * LG02, OLG02
189 * LG308, DLOS8
190 * LPS8
191 * LIG16
192 * MS14 series if installed with the same firmware.
193
Xiaoling 44.2 194
Xiaoling 30.4 195 === **2.2.1  End User Guide to use SSH access** ===
Xiaoling 9.5 196
Xiaoling 30.4 197
Edwin Chen 4.1 198 Go to this the Reverse SSH page as below:
Edwin Chen 1.1 199
Xiaoling 44.3 200
Xiaoling 11.2 201 [[image:image-20220531150151-3.png]]
Edwin Chen 1.1 202
Edwin Chen 4.1 203 Get the RSSH configure page
Edwin Chen 1.1 204
Xiaoling 11.3 205
206
Xiaoling 12.2 207 [[image:image-20220531150338-4.png]]
Edwin Chen 1.1 208
Edwin Chen 4.1 209 Connection OK.
210
Xiaoling 12.2 211
Xiaoling 30.4 212 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
213 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
214 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
Xiaoling 12.3 215 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
Xiaoling 30.4 216 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
Edwin Chen 4.1 217
218 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
219
Edwin Chen 5.1 220
221
Xiaoling 30.5 222 === **2.2.2  Set Up RSSH Server** ===
223
Xiaoling 44.3 224
Edwin Chen 5.2 225 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
Edwin Chen 5.1 226
227
Xiaoling 9.7 228
Xiaoling 44.3 229 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
Edwin Chen 5.1 230
Xiaoling 30.5 231
232 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
233
Xiaoling 13.2 234 [[image:image-20220531150750-5.png]]
Edwin Chen 5.1 235
236
Xiaoling 30.5 237 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
238
Xiaoling 14.2 239 [[image:image-20220531150811-6.png]]
Edwin Chen 5.1 240
241
242 **Debug** :
243
Xiaoling 14.3 244 (((
245 (% class="box" %)
246 (((
247 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
248 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
249 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
250 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
251 )))
252 )))
Edwin Chen 5.1 253
Xiaoling 15.2 254 [[image:image-20220531151516-7.png]]
Edwin Chen 5.1 255
256
Xiaoling 15.2 257 (((
258 (% class="box" %)
259 (((
260 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
261 please insatell sqlite3.
262 )))
263 )))
Edwin Chen 5.1 264
Xiaoling 16.2 265 [[image:image-20220531151628-8.png]]
Edwin Chen 5.1 266
267
Xiaoling 44.8 268 (% style="color:blue" %)**How to install Sqlit3:**
Edwin Chen 5.1 269
Edwin Chen 5.2 270 (% class="box infomessage" %)
271 (((
Xiaoling 44.3 272 **~ Step 1:** Download the SQLit3 installation package
Xiaoling 30.5 273 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
Xiaoling 16.4 274
Xiaoling 44.3 275 **Step 2: **tar the SQLit3 installation package
Edwin Chen 5.1 276 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
Xiaoling 30.5 277
Xiaoling 44.3 278 **Step 3:** Generate the makefile
Edwin Chen 5.1 279 cd sqlite-autoconf-3350300/;./configure
Xiaoling 30.5 280
Xiaoling 44.3 281 **Step 4:** Compile makefile
Edwin Chen 5.1 282 sudo make
Xiaoling 30.5 283
Xiaoling 44.3 284 **Step 5:** Install makefile
Edwin Chen 5.1 285 sudo make install
Xiaoling 30.5 286
287 **Check:**
Xiaoling 44.3 288 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
Edwin Chen 5.2 289 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
Xiaoling 30.5 290
291 **debug:**
Edwin Chen 5.1 292 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
293 Please execute the command /sbin/ldconfig.
294 After that execute the command ./sqlite3 test.db again.
Edwin Chen 5.2 295 )))
296
297
298
Xiaoling 44.3 299 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
Edwin Chen 5.2 300
Xiaoling 30.5 301
302 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
303
Edwin Chen 5.2 304 user must enter the root account and run the following commands
305
306 (% class="box infomessage" %)
307 (((
Xiaoling 44.9 308 **$ ./create_sqlite3_db.sh
Edwin Chen 5.2 309 $ ./rssh_serv -p  3721 2>&1 &
Xiaoling 44.9 310 $ ps -ef | grep rssh_serv check 3721 port**
Edwin Chen 5.2 311 )))
312
Xiaoling 18.2 313 [[image:image-20220531151958-10.png]]
Edwin Chen 5.2 314
315
316 **Debug:**
317
318 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
319 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
Edwin Chen 5.1 320 }}}
321
Edwin Chen 5.2 322 {{{ if fail to open dpvlry or to bind to it
323 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
324 }}}
Edwin Chen 5.1 325
Edwin Chen 5.2 326
327
Xiaoling 44.3 328 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
Edwin Chen 5.2 329
Xiaoling 30.5 330
Edwin Chen 5.2 331 (% class="box infomessage" %)
332 (((
Xiaoling 30.5 333 **1):**  sudo useradd XXXXX (custom user name)
334 **2):**  sudo passwd xxxxxx
335 **3):**  cp /bin/bash /bin/rbash
336 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
337 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
338 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
Edwin Chen 5.2 339 )))
340
Xiaoling 30.5 341 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
Edwin Chen 5.2 342
Edwin Chen 7.1 343
Xiaoling 18.3 344
Xiaoling 44.3 345 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
Edwin Chen 7.1 346
347
Xiaoling 30.5 348 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
349
Xiaoling 44.12 350
Edwin Chen 7.1 351 **Debug:**
352
353 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
354
355
356
Xiaoling 30.5 357 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
Edwin Chen 5.2 358
359
Xiaoling 9.9 360
Xiaoling 44.3 361 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
Edwin Chen 5.2 362
Xiaoling 44.3 363
Xiaoling 30.5 364 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
365
Xiaoling 19.2 366 [[image:image-20220531152419-11.png]]
Edwin Chen 5.2 367
368
369
Xiaoling 44.3 370 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
Xiaoling 30.5 371
372
Edwin Chen 7.1 373 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
Edwin Chen 5.2 374
Xiaoling 20.2 375 [[image:image-20220531152549-12.png]]
Edwin Chen 5.2 376
377
378
Xiaoling 44.3 379 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
Xiaoling 30.5 380
381
Edwin Chen 7.1 382 This is same as connect Dragino Support Server but just change the server address to customize server address.
Edwin Chen 5.2 383
Xiaoling 21.2 384 [[image:image-20220531152633-13.png]]
Edwin Chen 5.2 385
386
387
Xiaoling 44.3 388 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
Edwin Chen 5.2 389
Xiaoling 30.5 390
Edwin Chen 5.2 391 Rssh Host connection Ok
392
Xiaoling 22.2 393 [[image:image-20220531152815-14.png]]
Edwin Chen 5.2 394
395
Edwin Chen 7.1 396 User can use common ps | grep ssh to check it in the gateway.
Edwin Chen 5.2 397
Xiaoling 23.2 398 [[image:image-20220531152840-15.png]]
Edwin Chen 5.2 399
400
401
Xiaoling 44.3 402 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
Xiaoling 30.5 403
404
Edwin Chen 7.1 405 Check what gateways link to server.
Edwin Chen 5.2 406
Xiaoling 24.2 407 (% class="box infomessage" %)
408 (((
Xiaoling 44.3 409 **$ ./connect-gw.sh -l**
Xiaoling 24.2 410 )))
Edwin Chen 5.2 411
Xiaoling 24.2 412 [[image:image-20220531153016-16.png]]
Edwin Chen 5.2 413
414
415
Edwin Chen 7.1 416 Access the gateway
Edwin Chen 5.2 417
Xiaoling 25.2 418 (% class="box infomessage" %)
419 (((
Xiaoling 44.3 420 **$ ./connect-gw.sh <GWID>**
Xiaoling 25.2 421 )))
Edwin Chen 5.2 422
Xiaoling 25.2 423 [[image:image-20220531153219-17.png]]
Xiaoling 30.5 424
425