Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Xiaoling1 +XWiki.Kilight - Content
-
... ... @@ -7,17 +7,15 @@ 7 7 = **1. Use Remote.it service** = 8 8 9 9 10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end 10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand. 11 11 12 12 (% style="color:red" %)**Important Notice:** 13 13 14 -* (% style="color:red" %)**Remote.it access will give full control of your device to remote support.** 15 -* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.** 16 - 14 +* (% style="color:red" %)Remote.it access will give full control of your device to remote support. 15 +* (% style="color:red" %)The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 17 17 For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 18 18 19 19 20 - 21 21 = **2. RSSH Introduction** = 22 22 23 23 ... ... @@ -25,8 +25,8 @@ 25 25 26 26 (% style="color:red" %)**Important Notice:** 27 27 28 -(% style="color:red" %)* *RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**29 - ~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**26 +* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this** 27 +* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.** 30 30 31 31 Below gateway support reverse SSH access: 32 32 ... ... @@ -55,6 +55,7 @@ 55 55 56 56 Connection OK. 57 57 56 + 58 58 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 59 59 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 60 60 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -80,7 +80,7 @@ 80 80 81 81 (% class="box" %) 82 82 ((( 83 -$ ssh -p <End User Host Port> root@<Host Address> 82 +**$ ssh -p <End User Host Port> root@<Host Address>** 84 84 ))) 85 85 86 86 ((( ... ... @@ -89,36 +89,40 @@ 89 89 90 90 91 91 92 -==== ** 2.1.2.1Note for set up RSSH server** ====91 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ==== 93 93 93 + 94 94 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 95 95 96 96 (% class="box" %) 97 97 ((( 98 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 98 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 99 99 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 100 100 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 101 101 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 102 102 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 103 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 103 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#** 104 104 ))) 105 105 106 106 107 + 107 107 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 108 108 110 + 109 109 Below gateway support reverse SSH access: 110 110 111 111 (% class="box" %) 112 112 ((( 113 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 115 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 114 114 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 115 115 LG02, OLG02 116 116 LG308, DLOS8 117 117 LPS8 118 -LIG16 120 +LIG16** 119 119 ))) 120 120 121 121 124 + 122 122 === **2.2.1 End User Guide to use SSH access** === 123 123 124 124 ... ... @@ -146,14 +146,14 @@ 146 146 147 147 (% class="box" %) 148 148 ((( 149 -if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 150 -please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 152 +**if you git fail. ~-~->** (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 153 +**please install git. ~-~->** (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 151 151 ))) 152 152 153 153 (% class="box" %) 154 154 ((( 155 -if you make error 127,it **(% style="color:#4f81bd" %)lack of gcc.(%%)**156 -please install gcc. ~-~->(% style="color:#4f81bd" %) **yum install gcc.**158 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)** 159 +**please install gcc. ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)** 157 157 ))) 158 158 159 159 [[image:image-20220527105856-3.png]] ... ... @@ -160,10 +160,11 @@ 160 160 161 161 lack of gcc 162 162 166 + 163 163 (% class="box" %) 164 164 ((( 165 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 166 -please insatell (% style="color:#4f81bd" %) **sqlite3**.169 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 170 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %). 167 167 ))) 168 168 169 169 [[image:image-20220527105918-4.png]] ... ... @@ -231,8 +231,8 @@ 231 231 232 232 (% class="box" %) 233 233 ((( 234 - if** fail to open dpvlry or to bind to it**235 -please kill rssh_serv,and run (% style="color:#4f81bd" %) **./rssh_serv -p 3721 2>&1 &** (%%) again238 +**if fail to open dpvlry or to bind to it** 239 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again** 236 236 ))) 237 237 238 238 ... ... @@ -240,13 +240,13 @@ 240 240 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 241 241 242 242 243 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 247 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)** 244 244 245 245 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 246 246 247 247 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 248 248 249 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 253 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ** ~-~-> Change /bin/bash to /bin/rbash** 250 250 251 251 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 252 252 ... ... @@ -263,7 +263,7 @@ 263 263 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 264 264 265 265 266 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**270 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt** 267 267 268 268 [[image:image-20220527110531-7.png]] 269 269 ... ... @@ -294,12 +294,12 @@ 294 294 295 295 (% class="box" %) 296 296 ((( 297 -(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 301 +(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%) 298 298 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 299 -(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 300 -(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 301 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 302 -Click Save and then Connect 303 +(% style="color:#4f81bd" %)**Login ID**(%%) : ** Input user name "eg : "XXXXX"** 304 +(% style="color:#4f81bd" %)**Host Address**(%%) : ** Input user's private server address** 305 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%): ** Choose to enable connect once device is powered.** 306 +**Click Save and then Connect** 303 303 ))) 304 304 305 305 ... ... @@ -325,8 +325,9 @@ 325 325 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 326 326 327 327 328 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 332 +**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey** 329 329 334 + 330 330 **Debug:** 331 331 332 332 (% class="box" %) ... ... @@ -335,6 +335,7 @@ 335 335 ))) 336 336 337 337 343 + 338 338 === **2.2.3 How to Ser up a Reverse SSH access** === 339 339 340 340