Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Xiaoling1 +XWiki.Kilight - Content
-
... ... @@ -7,17 +7,16 @@ 7 7 = **1. Use Remote.it service** = 8 8 9 9 10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end 10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand. 11 11 12 12 (% style="color:red" %)**Important Notice:** 13 13 14 -* (% style="color:red" %)**Remote.it access will give full control of your device to remote support.** 15 -* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.** 14 +* Remote.it access will give full control of your device to remote support. 15 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 16 +* For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 16 16 17 -For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 18 18 19 19 20 - 21 21 = **2. RSSH Introduction** = 22 22 23 23 ... ... @@ -25,8 +25,8 @@ 25 25 26 26 (% style="color:red" %)**Important Notice:** 27 27 28 -(% style="color:red" %)* *RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**29 - ~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**27 +* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this** 28 +* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.** 30 30 31 31 Below gateway support reverse SSH access: 32 32 ... ... @@ -55,6 +55,7 @@ 55 55 56 56 Connection OK. 57 57 57 + 58 58 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 59 59 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 60 60 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -80,7 +80,7 @@ 80 80 81 81 (% class="box" %) 82 82 ((( 83 -$ ssh -p <End User Host Port> root@<Host Address> 83 +**$ ssh -p <End User Host Port> root@<Host Address>** 84 84 ))) 85 85 86 86 ((( ... ... @@ -89,36 +89,40 @@ 89 89 90 90 91 91 92 -==== ** 2.1.2.1Note for set up RSSH server** ====92 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ==== 93 93 94 + 94 94 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 95 95 96 96 (% class="box" %) 97 97 ((( 98 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 99 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 99 99 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 100 100 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 101 101 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 102 102 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 103 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 104 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#** 104 104 ))) 105 105 106 106 108 + 107 107 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 108 108 111 + 109 109 Below gateway support reverse SSH access: 110 110 111 111 (% class="box" %) 112 112 ((( 113 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 116 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 114 114 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 115 115 LG02, OLG02 116 116 LG308, DLOS8 117 117 LPS8 118 -LIG16 121 +LIG16** 119 119 ))) 120 120 121 121 125 + 122 122 === **2.2.1 End User Guide to use SSH access** === 123 123 124 124 ... ... @@ -146,14 +146,14 @@ 146 146 147 147 (% class="box" %) 148 148 ((( 149 -if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 150 -please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 153 +**if you git fail. ~-~->** (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 154 +**please install git. ~-~->** (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 151 151 ))) 152 152 153 153 (% class="box" %) 154 154 ((( 155 -if you make error 127,it **(% style="color:#4f81bd" %)lack of gcc.(%%)**156 -please install gcc. ~-~->(% style="color:#4f81bd" %) **yum install gcc.**159 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)** 160 +**please install gcc. ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)** 157 157 ))) 158 158 159 159 [[image:image-20220527105856-3.png]] ... ... @@ -160,10 +160,11 @@ 160 160 161 161 lack of gcc 162 162 167 + 163 163 (% class="box" %) 164 164 ((( 165 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 166 -please insatell (% style="color:#4f81bd" %) **sqlite3**.170 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 171 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %). 167 167 ))) 168 168 169 169 [[image:image-20220527105918-4.png]] ... ... @@ -231,8 +231,8 @@ 231 231 232 232 (% class="box" %) 233 233 ((( 234 - if** fail to open dpvlry or to bind to it**235 -please kill rssh_serv,and run (% style="color:#4f81bd" %) **./rssh_serv -p 3721 2>&1 &** (%%) again239 +**if fail to open dpvlry or to bind to it** 240 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again** 236 236 ))) 237 237 238 238 ... ... @@ -240,13 +240,13 @@ 240 240 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 241 241 242 242 243 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 248 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)** 244 244 245 245 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 246 246 247 247 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 248 248 249 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 254 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ** ~-~-> Change /bin/bash to /bin/rbash** 250 250 251 251 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 252 252 ... ... @@ -263,7 +263,7 @@ 263 263 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 264 264 265 265 266 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**271 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt** 267 267 268 268 [[image:image-20220527110531-7.png]] 269 269 ... ... @@ -294,12 +294,12 @@ 294 294 295 295 (% class="box" %) 296 296 ((( 297 -(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 302 +(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%) 298 298 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 299 -(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 300 -(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 301 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 302 -Click Save and then Connect 304 +(% style="color:#4f81bd" %)**Login ID**(%%) : ** Input user name "eg : "XXXXX"** 305 +(% style="color:#4f81bd" %)**Host Address**(%%) : ** Input user's private server address** 306 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%): ** Choose to enable connect once device is powered.** 307 +**Click Save and then Connect** 303 303 ))) 304 304 305 305 ... ... @@ -325,8 +325,9 @@ 325 325 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 326 326 327 327 328 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 333 +**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey** 329 329 335 + 330 330 **Debug:** 331 331 332 332 (% class="box" %) ... ... @@ -335,6 +335,7 @@ 335 335 ))) 336 336 337 337 344 + 338 338 === **2.2.3 How to Ser up a Reverse SSH access** === 339 339 340 340