<
From version < 19.18 >
edited by Xiaoling
on 2022/07/14 14:22
To version < 23.1 >
edited by Kilight Cao
on 2022/07/25 10:40
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Xiaoling
1 +XWiki.Kilight
Content
... ... @@ -7,13 +7,12 @@
7 7  = **1.  Use Remote.it service** =
8 8  
9 9  
10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand.
11 11  
12 12  (% style="color:red" %)**Important Notice:**
13 13  
14 -(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
15 -~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
16 -
14 +* (% style="color:red" %)Remote.it access will give full control of your device to remote support.
15 +* (% style="color:red" %)The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
17 17  For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
18 18  
19 19  
... ... @@ -24,8 +24,8 @@
24 24  
25 25  (% style="color:red" %)**Important Notice:**
26 26  
27 -(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
28 -~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
26 +* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
27 +* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
29 29  
30 30  Below gateway support reverse SSH access:
31 31  
... ... @@ -54,6 +54,7 @@
54 54  
55 55  Connection OK.
56 56  
56 +
57 57  * (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
58 58  * (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
59 59  * (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
... ... @@ -79,7 +79,7 @@
79 79  
80 80  (% class="box" %)
81 81  (((
82 -$ ssh   -p <End User Host Port>   root@<Host Address>
82 +**$ ssh   -p <End User Host Port>   root@<Host Address>**
83 83  )))
84 84  
85 85  (((
... ... @@ -88,36 +88,40 @@
88 88  
89 89  
90 90  
91 -==== **2.1.2.1  Note for set up RSSH server** ====
91 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ====
92 92  
93 +
93 93  If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
94 94  
95 95  (% class="box" %)
96 96  (((
97 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
98 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
98 98  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
99 99  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
100 100  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
101 101  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
102 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
103 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
103 103  )))
104 104  
105 105  
107 +
106 106  == **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
107 107  
110 +
108 108  Below gateway support reverse SSH access:
109 109  
110 110  (% class="box" %)
111 111  (((
112 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
115 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
113 113  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
114 114  LG02, OLG02
115 115  LG308, DLOS8
116 116  LPS8
117 -LIG16
120 +LIG16**
118 118  )))
119 119  
120 120  
124 +
121 121  === **2.2.1  End User Guide to use SSH access** ===
122 122  
123 123  
... ... @@ -145,14 +145,14 @@
145 145  
146 146  (% class="box" %)
147 147  (((
148 -if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
149 -please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
152 +**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
153 +**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
150 150  )))
151 151  
152 152  (% class="box" %)
153 153  (((
154 -if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
155 -please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
158 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
159 +**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
156 156  )))
157 157  
158 158  [[image:image-20220527105856-3.png]]
... ... @@ -159,10 +159,11 @@
159 159  
160 160  lack of gcc
161 161  
166 +
162 162  (% class="box" %)
163 163  (((
164 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
165 -please insatell (% style="color:#4f81bd" %)**sqlite3**.
169 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
170 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
166 166  )))
167 167  
168 168  [[image:image-20220527105918-4.png]]
... ... @@ -230,8 +230,8 @@
230 230  
231 231  (% class="box" %)
232 232  (((
233 -if** fail to open dpvlry or to bind to it**
234 -please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
238 +**if fail to open dpvlry or to bind to it**
239 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
235 235  )))
236 236  
237 237  
... ... @@ -239,13 +239,13 @@
239 239  ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
240 240  
241 241  
242 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
247 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
243 243  
244 244  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
245 245  
246 246  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
247 247  
248 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ~-~-> Change /bin/bash to /bin/rbash
253 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
249 249  
250 250  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
251 251  
... ... @@ -262,7 +262,7 @@
262 262  ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
263 263  
264 264  
265 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**
270 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
266 266  
267 267  [[image:image-20220527110531-7.png]]
268 268  
... ... @@ -293,12 +293,12 @@
293 293  
294 294  (% class="box" %)
295 295  (((
296 -(% style="color:#4f81bd" %)**Connection Type **(%%) :  If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
301 +(% style="color:#4f81bd" %)**Connection Type **(%%) :  **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
297 297  (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
298 -(% style="color:#4f81bd" %)**Login ID**(%%) :  Input user name "eg : "XXXXX"
299 -(% style="color:#4f81bd" %)**Host Address**(%%)  :  Input user's private server address
300 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%):  Choose to enable connect once device is powered.
301 -Click Save and then Connect
303 +(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
304 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
305 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
306 +**Click Save and then Connect**
302 302  )))
303 303  
304 304  
... ... @@ -324,8 +324,9 @@
324 324  ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
325 325  
326 326  
327 -**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
332 +**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
328 328  
334 +
329 329  **Debug:**
330 330  
331 331  (% class="box" %)
... ... @@ -334,6 +334,7 @@
334 334  )))
335 335  
336 336  
343 +
337 337  === **2.2.3  How to Ser up a Reverse SSH access** ===
338 338  
339 339  
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0