<
From version < 19.17 >
edited by Xiaoling
on 2022/07/14 14:16
To version < 23.1 >
edited by Kilight Cao
on 2022/07/25 10:40
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Xiaoling
1 +XWiki.Kilight
Content
... ... @@ -7,13 +7,12 @@
7 7  = **1.  Use Remote.it service** =
8 8  
9 9  
10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand.
11 11  
12 12  (% style="color:red" %)**Important Notice:**
13 13  
14 -(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
15 -~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
16 -
14 +* (% style="color:red" %)Remote.it access will give full control of your device to remote support.
15 +* (% style="color:red" %)The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
17 17  For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
18 18  
19 19  
... ... @@ -24,8 +24,8 @@
24 24  
25 25  (% style="color:red" %)**Important Notice:**
26 26  
27 -(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
28 -~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
26 +* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
27 +* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
29 29  
30 30  Below gateway support reverse SSH access:
31 31  
... ... @@ -37,7 +37,6 @@
37 37  * LIG16
38 38  * MS14 series if installed with the same firmware.
39 39  
40 -
41 41  == **2.1  For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** ==
42 42  
43 43  
... ... @@ -55,6 +55,7 @@
55 55  
56 56  Connection OK.
57 57  
56 +
58 58  * (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
59 59  * (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
60 60  * (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
... ... @@ -80,7 +80,7 @@
80 80  
81 81  (% class="box" %)
82 82  (((
83 -$ ssh   -p <End User Host Port>   root@<Host Address>
82 +**$ ssh   -p <End User Host Port>   root@<Host Address>**
84 84  )))
85 85  
86 86  (((
... ... @@ -89,36 +89,40 @@
89 89  
90 90  
91 91  
92 -==== **2.1.2.1  Note for set up RSSH server** ====
91 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ====
93 93  
93 +
94 94  If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
95 95  
96 96  (% class="box" %)
97 97  (((
98 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
98 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
99 99  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
100 100  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
101 101  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
102 102  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
103 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
103 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
104 104  )))
105 105  
106 106  
107 +
107 107  == **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
108 108  
110 +
109 109  Below gateway support reverse SSH access:
110 110  
111 111  (% class="box" %)
112 112  (((
113 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
115 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
114 114  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
115 115  LG02, OLG02
116 116  LG308, DLOS8
117 117  LPS8
118 -LIG16
120 +LIG16**
119 119  )))
120 120  
121 121  
124 +
122 122  === **2.2.1  End User Guide to use SSH access** ===
123 123  
124 124  
... ... @@ -146,14 +146,14 @@
146 146  
147 147  (% class="box" %)
148 148  (((
149 -if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
150 -please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
152 +**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
153 +**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
151 151  )))
152 152  
153 153  (% class="box" %)
154 154  (((
155 -if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
156 -please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
158 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
159 +**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
157 157  )))
158 158  
159 159  [[image:image-20220527105856-3.png]]
... ... @@ -160,10 +160,11 @@
160 160  
161 161  lack of gcc
162 162  
166 +
163 163  (% class="box" %)
164 164  (((
165 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
166 -please insatell (% style="color:#4f81bd" %)**sqlite3**.
169 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
170 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
167 167  )))
168 168  
169 169  [[image:image-20220527105918-4.png]]
... ... @@ -175,26 +175,26 @@
175 175  
176 176  (% class="box" %)
177 177  (((
178 -**Step1:** Download the SQLit3 installation package
182 +(% style="color:#037691" %)**Step1:**(%%) Download the SQLit3 installation package
179 179   sudo wget [[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]
180 180  
181 -**Step2:** tar the SQLit3 installation package
185 +(% style="color:#037691" %)**Step2:**(%%) tar the SQLit3 installation package
182 182   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
183 183  
184 -**Step3:** Generate the makefile
188 +(% style="color:#037691" %)**Step3:**(%%) Generate the makefile
185 185   cd sqlite-autoconf-3350300/;./configure
186 186  
187 -**Step4:** Compile makefile
191 +(% style="color:#037691" %)**Step4:**(%%) Compile makefile
188 188   sudo make
189 189  
190 -**Step5: **Install makefile
194 +(% style="color:#037691" %)**Step5: **(%%)Install makefile
191 191   sudo make install
192 192  
193 -**Check:**
194 - cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
195 - cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
197 +(% style="color:#037691" %)**Check:**(%%)
198 + cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
199 + cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->  Test whether the sqlite3 was installed successfully
196 196  
197 -**debug:**
201 +(% style="color:#037691" %)**debug:**(%%)
198 198   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
199 199   Please execute the command /sbin/ldconfig.
200 200   After that execute the command ./sqlite3 test.db again.
... ... @@ -211,9 +211,9 @@
211 211  
212 212  (% class="box" %)
213 213  (((
214 - $ ./create_sqlite3_db.sh
218 +**~ $ ./create_sqlite3_db.sh
215 215   $ ./rssh_serv -p  3721 2>&1 &
216 - $ ps -ef | grep rssh_serv check 3721 port
220 + $ ps -ef | grep rssh_serv check 3721 port**
217 217  )))
218 218  
219 219  [[image:image-20220527110436-6.png]]
... ... @@ -225,14 +225,14 @@
225 225  
226 226  (% class="box" %)
227 227  (((
228 -Check /var/rsshdb.sqlite3 ~-~->(% style="color:#4f81bd" %)** ls /var/rsshdb.sqlite3**(%%)
229 -Check ls /var/rsshdb.sqlite3 ~-~-> (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
232 +**Check /var/rsshdb.sqlite3  ~-~->(% style="color:#4f81bd" %)  ls /var/rsshdb.sqlite3(%%)**
233 +**Check ls /var/rsshdb.sqlite3 ~-~->**  (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
230 230  )))
231 231  
232 232  (% class="box" %)
233 233  (((
234 -if** fail to open dpvlry or to bind to it**
235 -please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
238 +**if fail to open dpvlry or to bind to it**
239 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
236 236  )))
237 237  
238 238  
... ... @@ -240,13 +240,13 @@
240 240  ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
241 241  
242 242  
243 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
247 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
244 244  
245 245  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
246 246  
247 247  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
248 248  
249 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash
253 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
250 250  
251 251  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
252 252  
... ... @@ -263,7 +263,7 @@
263 263  ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
264 264  
265 265  
266 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**
270 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
267 267  
268 268  [[image:image-20220527110531-7.png]]
269 269  
... ... @@ -294,12 +294,12 @@
294 294  
295 295  (% class="box" %)
296 296  (((
297 -(% style="color:#4f81bd" %)**Connection Type **(%%) :  If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
301 +(% style="color:#4f81bd" %)**Connection Type **(%%) :  **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
298 298  (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
299 -(% style="color:#4f81bd" %)**Login ID**(%%) :  Input user name "eg : "XXXXX"
300 -(% style="color:#4f81bd" %)**Host Address**(%%)  :  Input user's private server address
301 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%):  Choose to enable connect once device is powered.
302 -Click Save and then Connect
303 +(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
304 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
305 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
306 +**Click Save and then Connect**
303 303  )))
304 304  
305 305  
... ... @@ -325,8 +325,9 @@
325 325  ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
326 326  
327 327  
328 -**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
332 +**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
329 329  
334 +
330 330  **Debug:**
331 331  
332 332  (% class="box" %)
... ... @@ -335,6 +335,7 @@
335 335  )))
336 336  
337 337  
343 +
338 338  === **2.2.3  How to Ser up a Reverse SSH access** ===
339 339  
340 340  
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0