Version 51.1 by Edwin Chen on 2022/08/23 11:27

Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15 [[image:image-20220531155018-18.png]]
16
17
18
19 == **1.2  Steps** ==
20
21
22 * Create account in ThingsSpeak and creat channel.
23 * Download script from dragino site and move it to properly directory
24
25 (% class="box infomessage" %)
26 (((
27 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
28 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
29 Connecting to 162.241.22.11:80
30 Writing to 'monitor_gateway.sh'
31 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
32 Download completed (1860 bytes)
33 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
34 root@dragino-1baf44:~~#
35 root@dragino-1baf44:~~#
36 )))
37
38
39 * change the script monitor_gateway.sh with properly users setting:
40
41 (% class="box infomessage" %)
42 (((
43 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
44 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
45 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
46 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
47 )))
48
49
50 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
51
52 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
53
54 (% class="box infomessage" %)
55 (((
56 # For details see man 4 crontabs
57 # Example of job definition:
58 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
59 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
60 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
61 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
62 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
63 # | | | | |
64 # * * * * * user-name command to be executed
65 #*/10 * * * *  checklog
66 ~* 23 * * *  /etc/init.d/auto_update start
67 */20 * * * *  /usr/bin/monitor_gateway.sh     
68 )))
69
70 * Reboot device.
71
72 == **1.3  Monitor Public IP** ==
73
74
75 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
76
77 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
78
79
80 [[image:image-20220531145559-2.png]]
81
82 Find Public IP
83
84
85
86 = **2.  Remote Access** =
87
88 == **2.1  Remote Access via Remote.it.** ==
89
90
91 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
92
93
94 (% style="color:red" %)**Important Notice:**
95
96 * Remote.it access will give full control of your device to remote support.
97 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
98
99 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
100 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
101
102 (% style="color:blue" %)**1. Install the Remote.it software**
103
104 Users can directly click** "Install"** on the Web UI to install Remote. it.
105
106
107 [[image:image-20220725134300-1.png||height="438" width="905"]]
108
109
110
111 (% style="color:blue" %)**2. Enter the license key**
112
113 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
114
115 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
116
117
118 (% class="box infomessage" %)
119 (((
120 **57F60715-606F-510D-A3D2-739860EBDB98**
121 )))
122
123 [[image:image-20220725113010-1.png||height="455" width="899"]]
124
125
126
127 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
128
129 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
130
131
132 [[image:image-20220725115720-2.png||height="658" width="900"]]
133
134
135 === **How to register hp0d with Remote.it** ===
136
137
138 **Prerequisites:**
139
140 Users must have an account and APP for remote.it
141
142 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
143
144
145 (% style="color:blue" %)**1. Click "+" in the APP to add a device**
146
147 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
148
149
150 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
151
152
153 (% style="color:blue" %)**2.Copy the register device command**
154
155
156 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
157
158
159 (% style="color:blue" %)**3.Enter the command copied from the previous step on the HP0D Linux command line**
160
161 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
162
163
164 (% style="color:blue" %)**4.Check whether the device is successfully registered on the Remote.it APP**
165
166
167 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
168
169
170 == **2.2  RSSH Introduction** ==
171
172
173 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
174
175 (% style="color:red" %)**Important Notice:**
176
177 (% class="box warningmessage" %)
178 (((
179 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
180 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
181 )))
182
183
184 **Below gateway support reverse SSH access:**
185
186 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
187 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
188 * LG02, OLG02
189 * LG308, DLOS8
190 * LPS8
191 * LIG16
192 * MS14 series if installed with the same firmware.
193
194
195 === **2.2.1  End User Guide to use SSH access** ===
196
197
198 Go to this the Reverse SSH page as below:
199
200
201 [[image:image-20220531150151-3.png]]
202
203 Get the RSSH configure page
204
205
206
207 [[image:image-20220531150338-4.png]]
208
209 Connection OK.
210
211
212 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
213 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
214 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
215 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
216 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
217
218 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
219
220
221
222 === **2.2.2  Set Up RSSH Server** ===
223
224
225 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
226
227
228
229 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
230
231
232 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
233
234 [[image:image-20220531150750-5.png]]
235
236
237 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
238
239 [[image:image-20220531150811-6.png]]
240
241
242 **Debug** :
243
244 (((
245 (% class="box" %)
246 (((
247 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
248 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
249 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
250 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
251 )))
252 )))
253
254 [[image:image-20220531151516-7.png]]
255
256
257 (((
258 (% class="box" %)
259 (((
260 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
261 please insatell sqlite3.
262 )))
263 )))
264
265 [[image:image-20220531151628-8.png]]
266
267
268 (% style="color:blue" %)**How to install Sqlit3:**
269
270 (% class="box infomessage" %)
271 (((
272 **~ Step 1:** Download the SQLit3 installation package
273 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
274
275 **Step 2: **tar the SQLit3 installation package
276 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
277
278 **Step 3:** Generate the makefile
279 cd sqlite-autoconf-3350300/;./configure
280
281 **Step 4:** Compile makefile
282 sudo make
283
284 **Step 5:** Install makefile
285 sudo make install
286
287 **Check:**
288 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
289 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
290
291 **debug:**
292 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
293 Please execute the command /sbin/ldconfig.
294 After that execute the command ./sqlite3 test.db again.
295 )))
296
297
298
299 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
300
301
302 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
303
304 user must enter the root account and run the following commands
305
306 (% class="box infomessage" %)
307 (((
308 **$ ./create_sqlite3_db.sh
309 $ ./rssh_serv -p  3721 2>&1 &
310 $ ps -ef | grep rssh_serv check 3721 port**
311 )))
312
313 [[image:image-20220531151958-10.png]]
314
315
316 **Debug:**
317
318 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
319 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
320 }}}
321
322 {{{ if fail to open dpvlry or to bind to it
323 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
324 }}}
325
326
327
328 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
329
330
331 (% class="box infomessage" %)
332 (((
333 **1):**  sudo useradd XXXXX (custom user name)
334 **2):**  sudo passwd xxxxxx
335 **3):**  cp /bin/bash /bin/rbash
336 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
337 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
338 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
339 )))
340
341 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
342
343
344
345 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
346
347
348 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
349
350
351 **Debug:**
352
353 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
354
355
356
357 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
358
359
360
361 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
362
363
364 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
365
366 [[image:image-20220531152419-11.png]]
367
368
369
370 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
371
372
373 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
374
375 [[image:image-20220531152549-12.png]]
376
377
378
379 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
380
381
382 This is same as connect Dragino Support Server but just change the server address to customize server address.
383
384 [[image:image-20220531152633-13.png]]
385
386
387
388 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
389
390
391 Rssh Host connection Ok
392
393 [[image:image-20220531152815-14.png]]
394
395
396 User can use common ps | grep ssh to check it in the gateway.
397
398 [[image:image-20220531152840-15.png]]
399
400
401
402 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
403
404
405 Check what gateways link to server.
406
407 (% class="box infomessage" %)
408 (((
409 **$ ./connect-gw.sh -l**
410 )))
411
412 [[image:image-20220531153016-16.png]]
413
414
415
416 Access the gateway
417
418 (% class="box infomessage" %)
419 (((
420 **$ ./connect-gw.sh <GWID>**
421 )))
422
423 [[image:image-20220531153219-17.png]]
424
425