Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -39,8 +39,6 @@ 39 39 * MS14 series if installed with the same firmware. 40 40 41 41 42 - 43 - 44 44 == **2.1 For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** == 45 45 46 46 ... ... @@ -58,6 +58,7 @@ 58 58 59 59 Connection OK. 60 60 59 + 61 61 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 62 62 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 63 63 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -83,7 +83,7 @@ 83 83 84 84 (% class="box" %) 85 85 ((( 86 -$ ssh -p <End User Host Port> root@<Host Address> 85 +**$ ssh -p <End User Host Port> root@<Host Address>** 87 87 ))) 88 88 89 89 ((( ... ... @@ -92,36 +92,40 @@ 92 92 93 93 94 94 95 -==== ** 2.1.2.1Note for set up RSSH server** ====94 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ==== 96 96 96 + 97 97 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 98 98 99 99 (% class="box" %) 100 100 ((( 101 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 101 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 102 102 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 103 103 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 104 104 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 105 105 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 106 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 106 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#** 107 107 ))) 108 108 109 109 110 + 110 110 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 111 111 113 + 112 112 Below gateway support reverse SSH access: 113 113 114 114 (% class="box" %) 115 115 ((( 116 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 118 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 117 117 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 118 118 LG02, OLG02 119 119 LG308, DLOS8 120 120 LPS8 121 -LIG16 123 +LIG16** 122 122 ))) 123 123 124 124 127 + 125 125 === **2.2.1 End User Guide to use SSH access** === 126 126 127 127 ... ... @@ -149,14 +149,14 @@ 149 149 150 150 (% class="box" %) 151 151 ((( 152 -if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 153 -please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 155 +**if you git fail. ~-~->** (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 156 +**please install git. ~-~->** (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 154 154 ))) 155 155 156 156 (% class="box" %) 157 157 ((( 158 -if you make error 127,it **(% style="color:#4f81bd" %)lack of gcc.(%%)**159 -please install gcc. ~-~->(% style="color:#4f81bd" %) **yum install gcc.**161 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)** 162 +**please install gcc. ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)** 160 160 ))) 161 161 162 162 [[image:image-20220527105856-3.png]] ... ... @@ -163,10 +163,11 @@ 163 163 164 164 lack of gcc 165 165 169 + 166 166 (% class="box" %) 167 167 ((( 168 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 169 -please insatell (% style="color:#4f81bd" %) **sqlite3**.172 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 173 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %). 170 170 ))) 171 171 172 172 [[image:image-20220527105918-4.png]] ... ... @@ -234,8 +234,8 @@ 234 234 235 235 (% class="box" %) 236 236 ((( 237 - if** fail to open dpvlry or to bind to it**238 -please kill rssh_serv,and run (% style="color:#4f81bd" %) **./rssh_serv -p 3721 2>&1 &** (%%) again241 +**if fail to open dpvlry or to bind to it** 242 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again** 239 239 ))) 240 240 241 241 ... ... @@ -243,13 +243,13 @@ 243 243 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 244 244 245 245 246 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 250 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)** 247 247 248 248 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 249 249 250 250 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 251 251 252 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 256 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ** ~-~-> Change /bin/bash to /bin/rbash** 253 253 254 254 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 255 255 ... ... @@ -266,7 +266,7 @@ 266 266 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 267 267 268 268 269 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**273 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt** 270 270 271 271 [[image:image-20220527110531-7.png]] 272 272 ... ... @@ -297,12 +297,12 @@ 297 297 298 298 (% class="box" %) 299 299 ((( 300 -(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 304 +(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%) 301 301 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 302 -(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 303 -(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 304 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 305 -Click Save and then Connect 306 +(% style="color:#4f81bd" %)**Login ID**(%%) : ** Input user name "eg : "XXXXX"** 307 +(% style="color:#4f81bd" %)**Host Address**(%%) : ** Input user's private server address** 308 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%): ** Choose to enable connect once device is powered.** 309 +**Click Save and then Connect** 306 306 ))) 307 307 308 308 ... ... @@ -328,8 +328,9 @@ 328 328 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 329 329 330 330 331 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 335 +**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey** 332 332 337 + 333 333 **Debug:** 334 334 335 335 (% class="box" %) ... ... @@ -338,6 +338,7 @@ 338 338 ))) 339 339 340 340 346 + 341 341 === **2.2.3 How to Ser up a Reverse SSH access** === 342 342 343 343