<
From version < 19.18 >
edited by Xiaoling
on 2022/07/14 14:22
To version < 26.1 >
edited by Kilight Cao
on 2022/07/25 10:45
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Xiaoling
1 +XWiki.Kilight
Content
... ... @@ -7,16 +7,14 @@
7 7  = **1.  Use Remote.it service** =
8 8  
9 9  
10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand.
11 11  
12 12  (% style="color:red" %)**Important Notice:**
13 13  
14 -(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
15 -~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
14 +* (% style="color:red" %)**Remote.it access will give full control of your device to remote support.**
15 +* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**(%%)
16 +**For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].**
16 16  
17 -For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
18 -
19 -
20 20  = **2.  RSSH Introduction** =
21 21  
22 22  
... ... @@ -24,8 +24,8 @@
24 24  
25 25  (% style="color:red" %)**Important Notice:**
26 26  
27 -(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
28 -~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
25 +* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
26 +* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
29 29  
30 30  Below gateway support reverse SSH access:
31 31  
... ... @@ -54,6 +54,7 @@
54 54  
55 55  Connection OK.
56 56  
55 +
57 57  * (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
58 58  * (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
59 59  * (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
... ... @@ -79,7 +79,7 @@
79 79  
80 80  (% class="box" %)
81 81  (((
82 -$ ssh   -p <End User Host Port>   root@<Host Address>
81 +**$ ssh   -p <End User Host Port>   root@<Host Address>**
83 83  )))
84 84  
85 85  (((
... ... @@ -88,36 +88,40 @@
88 88  
89 89  
90 90  
91 -==== **2.1.2.1  Note for set up RSSH server** ====
90 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ====
92 92  
92 +
93 93  If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
94 94  
95 95  (% class="box" %)
96 96  (((
97 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
97 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
98 98  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
99 99  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
100 100  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
101 101  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
102 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
102 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
103 103  )))
104 104  
105 105  
106 +
106 106  == **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
107 107  
109 +
108 108  Below gateway support reverse SSH access:
109 109  
110 110  (% class="box" %)
111 111  (((
112 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
114 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
113 113  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
114 114  LG02, OLG02
115 115  LG308, DLOS8
116 116  LPS8
117 -LIG16
119 +LIG16**
118 118  )))
119 119  
120 120  
123 +
121 121  === **2.2.1  End User Guide to use SSH access** ===
122 122  
123 123  
... ... @@ -145,14 +145,14 @@
145 145  
146 146  (% class="box" %)
147 147  (((
148 -if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
149 -please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
151 +**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
152 +**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
150 150  )))
151 151  
152 152  (% class="box" %)
153 153  (((
154 -if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
155 -please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
157 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
158 +**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
156 156  )))
157 157  
158 158  [[image:image-20220527105856-3.png]]
... ... @@ -159,10 +159,11 @@
159 159  
160 160  lack of gcc
161 161  
165 +
162 162  (% class="box" %)
163 163  (((
164 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
165 -please insatell (% style="color:#4f81bd" %)**sqlite3**.
168 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
169 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
166 166  )))
167 167  
168 168  [[image:image-20220527105918-4.png]]
... ... @@ -230,8 +230,8 @@
230 230  
231 231  (% class="box" %)
232 232  (((
233 -if** fail to open dpvlry or to bind to it**
234 -please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
237 +**if fail to open dpvlry or to bind to it**
238 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
235 235  )))
236 236  
237 237  
... ... @@ -239,13 +239,13 @@
239 239  ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
240 240  
241 241  
242 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
246 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
243 243  
244 244  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
245 245  
246 246  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
247 247  
248 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ~-~-> Change /bin/bash to /bin/rbash
252 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
249 249  
250 250  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
251 251  
... ... @@ -262,7 +262,7 @@
262 262  ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
263 263  
264 264  
265 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**
269 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
266 266  
267 267  [[image:image-20220527110531-7.png]]
268 268  
... ... @@ -293,12 +293,12 @@
293 293  
294 294  (% class="box" %)
295 295  (((
296 -(% style="color:#4f81bd" %)**Connection Type **(%%) :  If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
300 +(% style="color:#4f81bd" %)**Connection Type **(%%) :  **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
297 297  (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
298 -(% style="color:#4f81bd" %)**Login ID**(%%) :  Input user name "eg : "XXXXX"
299 -(% style="color:#4f81bd" %)**Host Address**(%%)  :  Input user's private server address
300 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%):  Choose to enable connect once device is powered.
301 -Click Save and then Connect
302 +(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
303 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
304 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
305 +**Click Save and then Connect**
302 302  )))
303 303  
304 304  
... ... @@ -324,8 +324,9 @@
324 324  ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
325 325  
326 326  
327 -**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
331 +**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
328 328  
333 +
329 329  **Debug:**
330 330  
331 331  (% class="box" %)
... ... @@ -334,6 +334,7 @@
334 334  )))
335 335  
336 336  
342 +
337 337  === **2.2.3  How to Ser up a Reverse SSH access** ===
338 338  
339 339  
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0