Show last authors
1 **Table of Contents:**
2
3 {{toc/}}
4
5
6
7
8 = **1.  Monitor Gateway** =
9
10 == **1.1  Introduction** ==
11
12
13 This introduction shows how to use a script to monitor the gateway. The video link for this instruction is: [[https:~~/~~/youtu.be/8PieIwfSF_g>>url:https://youtu.be/8PieIwfSF_g]]
14
15
16 [[image:image-20220531155018-18.png]]
17
18
19
20 == **1.2  Steps** ==
21
22
23 * Create account in ThingsSpeak and creat channel.
24 * Download script from dragino site and move it to properly directory
25
26
27
28 (% class="box infomessage" %)
29 (((
30 root@dragino-1baf44:~~# wget [[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh]]
31 Downloading '[[http:~~/~~/www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh'>>url:http://www.dragino.com/downloads/downloads/LoRa_Gateway/LPS8/Firmware/customized_script/monitor_gateway.sh']]
32 Connecting to 162.241.22.11:80
33 Writing to 'monitor_gateway.sh'
34 monitor_gateway.sh   100% |~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~**|  1860   0:00:00 ETA
35 Download completed (1860 bytes)
36 root@dragino-1baf44:~~# chmod +x monitor_gateway.sh;mv monitor_gateway.sh /usr/bin/
37 root@dragino-1baf44:~~#
38 root@dragino-1baf44:~~#
39 )))
40
41
42
43 * change the script monitor_gateway.sh with properly users setting:
44
45
46
47 (% class="box infomessage" %)
48 (((
49 USER='xxxxx'             # user name in your thinkspeak ~-~-> Profile
50 PASS='xxxxx'     #MQTT_API_KEY in your thinkspeak ~-~-> Profile
51 CHAN_ID='xxxx'    #Channel ID   of the channel for this gateway
52 CHAN_KEY='xxxxx'   #Channel Write API  of the channel for this gateway
53 )))
54
55
56
57 * run (% style="color:blue" %)**/usr/bin/monitor_gateway.sh**(%%) to test if upload is good.
58
59 * Add monitor_gateway.sh to cron work (% style="color:blue" %)**/etc/crontabs/root**(%%) to make this script runs perdiocally, below is an example to update every 20 minutes
60
61
62
63 (% class="box infomessage" %)
64 (((
65 # For details see man 4 crontabs
66 # Example of job definition:
67 # .~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~- minute (0 - 59)
68 # | .~-~-~-~-~-~-~-~-~-~-~-~-- hour (0 - 23)
69 # | | .~-~-~-~-~-~-~-~-~-~- day of month (1 - 31)
70 # | | | .~-~-~-~-~-~-- month (1 - 12) OR jan,feb,mar,apr ...
71 # | | | | .~-~-~-~- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
72 # | | | | |
73 # * * * * * user-name command to be executed
74 #*/10 * * * *  checklog
75 ~* 23 * * *  /etc/init.d/auto_update start
76 */20 * * * *  /usr/bin/monitor_gateway.sh     
77 )))
78
79 * Reboot device.
80
81
82
83
84
85 == **1.3  Monitor Public IP** ==
86
87
88 The monitor_gateway.sh has been updated to upload the public ip of the device as well.
89
90 User can find the public ip in field7, the chart is not able to show the complete public ip, user can check that in the export.
91
92
93 [[image:image-20220531145559-2.png]]
94
95 Find Public IP
96
97
98
99 = **2.  Remote Access** =
100
101 == **2.1  Remote Access via Remote.it.** ==
102
103
104 Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
105
106
107 (% style="color:red" %)**Important Notice:**
108
109 * Remote.it access will give full control of your device to remote support.
110 * The Remote.it allows Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
111
112 * For how to use remote.it for (% style="color:blue" %)**general remote control**(%%), please see :  [[Remoteit user instruction for Dragino Gateway>>https://www.remote.it/getting-started/dragino]].
113 * For Quick add remote.it to (% style="color:blue" %)**Dragino for remote debug**(%%), please see below:
114
115
116
117
118 (% style="color:blue" %)**1. Install the Remote.it software**
119
120 Users can directly click** "Install"** on the Web UI to install Remote. it.
121
122
123 [[image:image-20220725134300-1.png||height="438" width="905"]]
124
125
126
127 (% style="color:blue" %)**2. Enter the license key**
128
129 Users need to enter the license key in the box under **"2. Register"** section and click the **"Save"** button and** "Register"** button.
130
131 (% style="color:red" %)**When the user enters this license key, Dragino support will have access to your gateway.**
132
133
134 (% class="box infomessage" %)
135 (((
136 **57F60715-606F-510D-A3D2-739860EBDB98**
137 )))
138
139 [[image:image-20220725113010-1.png||height="455" width="899"]]
140
141
142
143 (% style="color:blue" %)**3. Connect and tell us your device ID or Hostname**
144
145 Users can view the device ID or Hostname of the gateway on** (% style="color:red" %)System ~-~-> System Overview(%%)** interface.Such as : dragino-1ef9ac
146
147
148 [[image:image-20220725115720-2.png||height="658" width="900"]]
149
150
151 === **2.1.1  How to register hp0d with Remote.it** ===
152
153
154 **Prerequisites:**
155
156 Users must have an account and APP for remote.it
157
158 [[https:~~/~~/app.remote.it>>https://app.remote.it]]
159
160
161 (% style="color:blue" %)**1. Click "+" in the APP to add a device**
162
163 Then click Add "Linux & Raspberry Pi" and the APP will generate a command to register the device.
164
165
166 [[image:image-20220815173938-1.jpeg||height="574" width="919"]]
167
168
169
170 (% style="color:blue" %)**2.Copy the register device command**
171
172
173 [[image:image-20220815173944-2.jpeg||height="556" width="923"]]
174
175
176
177 (% style="color:blue" %)**3.Enter the command copied from the previous step on the HP0D Linux command line**
178
179
180 [[image:image-20220815173951-3.jpeg||height="424" width="1147"]]
181
182
183
184 (% style="color:blue" %)**4.Check whether the device is successfully registered on the Remote.it APP**
185
186
187 [[image:image-20220815173958-4.jpeg||height="580" width="964"]]
188
189
190 == **2.2  RSSH Introduction** ==
191
192
193 Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
194
195 (% style="color:red" %)**Important Notice:**
196
197 (% class="box warningmessage" %)
198 (((
199 RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this
200 This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.
201 )))
202
203
204 **Below gateway support reverse SSH access:**
205
206 * Firmware Version > lgw~-~-build-v5.4.1618196981-20210412-1111 [[Firmware Download>>url:http://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/LPS8/Firmware/Release/]]
207 * LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
208 * LG02, OLG02
209 * LG308, DLOS8
210 * LPS8
211 * LIG16
212 * MS14 series if installed with the same firmware.
213
214
215
216
217
218 === **2.2.1  End User Guide to use SSH access** ===
219
220
221 Go to this the Reverse SSH page as below:
222
223
224 [[image:image-20220531150151-3.png]]
225
226 Get the RSSH configure page
227
228
229
230 [[image:image-20220531150338-4.png]]
231
232 Connection OK.
233
234
235 * (% style="color:#037691" %)**Login ID**(%%):  Input sshuser
236 * (% style="color:#037691" %)**Host Address**(%%):  Input support.dragino.com
237 * (% style="color:#037691" %)**Host Port** (%%):  Please email to support @ dragino.com to get a valid host port.
238 * (% style="color:#037691" %)**Connect at Startup**(%%) : Choose to enable connect once the device is powered.
239 * (% style="color:#037691" %)**Network Keys**(%%):  Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
240
241 After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
242
243
244
245 === **2.2.2  Set Up RSSH Server** ===
246
247
248 Advance administrator can config a SSH server to provide support their end user themselves., Steps as below
249
250
251
252 ==== (% style="color:blue" %)**Step 1 :  Download the SSH service code**(%%) ====
253
254
255 **1).**  git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
256
257 [[image:image-20220531150750-5.png]]
258
259
260 **2).**  cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
261
262 [[image:image-20220531150811-6.png]]
263
264
265 **Debug** :
266
267 (((
268 (% class="box" %)
269 (((
270 if you git fail.  ~-~->  (% style="color:#037691" %)**sudo: git: command not found**(%%).
271 please install git.  ~-~->    (% style="color:#037691" %)**yum install git -y  or  apt-get install git -y**(%%).
272 if you make error 127,it** (% style="color:#037691" %)lack of gcc(%%)**.
273 please install gcc.  ~-~->  (% style="color:#037691" %)**yum install gcc**(%%).
274 )))
275 )))
276
277 [[image:image-20220531151516-7.png]]
278
279
280 (((
281 (% class="box" %)
282 (((
283 if you make a fatal error : sqlite3.h,it (% style="color:#037691" %)**lack of sqlite3**(%%).
284 please insatell sqlite3.
285 )))
286 )))
287
288 [[image:image-20220531151628-8.png]]
289
290
291 (% style="color:blue" %)**How to install Sqlit3:**
292
293 (% class="box infomessage" %)
294 (((
295 **~ Step 1:** Download the SQLit3 installation package
296 sudo wget **[[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]**
297
298 **Step 2: **tar the SQLit3 installation package
299 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
300
301 **Step 3:** Generate the makefile
302 cd sqlite-autoconf-3350300/;./configure
303
304 **Step 4:** Compile makefile
305 sudo make
306
307 **Step 5:** Install makefile
308 sudo make install
309
310 **Check:**
311 cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
312 cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
313
314 **debug:**
315 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
316 Please execute the command /sbin/ldconfig.
317 After that execute the command ./sqlite3 test.db again.
318 )))
319
320
321
322 ==== (% style="color:blue" %)**Step 2 :  Install and run the RSS service**(%%) ====
323
324
325 **1). ** install database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
326
327 user must enter the root account and run the following commands
328
329 (% class="box infomessage" %)
330 (((
331 **$ ./create_sqlite3_db.sh
332 $ ./rssh_serv -p  3721 2>&1 &
333 $ ps -ef | grep rssh_serv check 3721 port**
334 )))
335
336 [[image:image-20220531151958-10.png]]
337
338
339 **Debug:**
340
341 {{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
342 Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
343 }}}
344
345 {{{ if fail to open dpvlry or to bind to it
346 please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
347 }}}
348
349
350
351 ==== (% style="color:blue" %)**Step 3 :  Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ====
352
353
354 (% class="box infomessage" %)
355 (((
356 **1):**  sudo useradd XXXXX (custom user name)
357 **2):**  sudo passwd xxxxxx
358 **3):**  cp /bin/bash /bin/rbash
359 **4):**  sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
360 **5):**  sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
361 **6):**  sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
362 )))
363
364 (% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
365
366
367
368 ==== (% style="color:blue" %)**Step 4 :  Create an authorization key file**(%%) ====
369
370
371 **1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
372
373
374 **Debug:**
375
376 {{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey}}}
377
378
379
380 === **2.2.3  How does user get the gateway to connect to a user's private server** ===
381
382
383
384 ==== (% style="color:blue" %)**Step 1 :  Come back the gateway web UI to get the gateway Public key**(%%) ====
385
386
387 **1)**  in the system ~-~-> (% style="color:#037691" %)**Remote Mgmt/span**
388
389 [[image:image-20220531152419-11.png]]
390
391
392
393 ==== (% style="color:blue" %)**Step 2 :  Authorization server**(%%) ====
394
395
396 Input the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
397
398 [[image:image-20220531152549-12.png]]
399
400
401
402 ==== (% style="color:blue" %)**Step 3 :  Connect private server**(%%) ====
403
404
405 This is same as connect Dragino Support Server but just change the server address to customize server address.
406
407 [[image:image-20220531152633-13.png]]
408
409
410
411 ==== (% style="color:blue" %)**Step 4 :  Check Connection**(%%) ====
412
413
414 Rssh Host connection Ok
415
416 [[image:image-20220531152815-14.png]]
417
418
419 User can use common ps | grep ssh to check it in the gateway.
420
421 [[image:image-20220531152840-15.png]]
422
423
424
425 ==== (% style="color:blue" %)**Step 5 :  Access the gateway from customized server**(%%) ====
426
427
428 Check what gateways link to server.
429
430 (% class="box infomessage" %)
431 (((
432 **$ ./connect-gw.sh -l**
433 )))
434
435 [[image:image-20220531153016-16.png]]
436
437
438
439 Access the gateway
440
441 (% class="box infomessage" %)
442 (((
443 **$ ./connect-gw.sh <GWID>**
444 )))
445
446 [[image:image-20220531153219-17.png]]
447
448
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0