Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Xiaoling1 +XWiki.Kilight - Content
-
... ... @@ -7,17 +7,16 @@ 7 7 = **1. Use Remote.it service** = 8 8 9 9 10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end 10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand. 11 11 12 12 (% style="color:red" %)**Important Notice:** 13 13 14 -* (% style="color:red" %)**Remote.it access will give full control of your device to remote support.** 15 -* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.** 14 +* Remote.it access will give full control of your device to remote support. 15 +* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 16 +* For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 16 16 17 -For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 18 18 19 19 20 - 21 21 = **2. RSSH Introduction** = 22 22 23 23 ... ... @@ -38,9 +38,6 @@ 38 38 * LIG16 39 39 * MS14 series if installed with the same firmware. 40 40 41 - 42 - 43 - 44 44 == **2.1 For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** == 45 45 46 46 ... ... @@ -58,6 +58,7 @@ 58 58 59 59 Connection OK. 60 60 57 + 61 61 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 62 62 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 63 63 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -83,7 +83,7 @@ 83 83 84 84 (% class="box" %) 85 85 ((( 86 -$ ssh -p <End User Host Port> root@<Host Address> 83 +**$ ssh -p <End User Host Port> root@<Host Address>** 87 87 ))) 88 88 89 89 ((( ... ... @@ -92,36 +92,40 @@ 92 92 93 93 94 94 95 -==== ** 2.1.2.1Note for set up RSSH server** ====92 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ==== 96 96 94 + 97 97 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 98 98 99 99 (% class="box" %) 100 100 ((( 101 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 99 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 102 102 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 103 103 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 104 104 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 105 105 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 106 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 104 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#** 107 107 ))) 108 108 109 109 108 + 110 110 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 111 111 111 + 112 112 Below gateway support reverse SSH access: 113 113 114 114 (% class="box" %) 115 115 ((( 116 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 116 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 117 117 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 118 118 LG02, OLG02 119 119 LG308, DLOS8 120 120 LPS8 121 -LIG16 121 +LIG16** 122 122 ))) 123 123 124 124 125 + 125 125 === **2.2.1 End User Guide to use SSH access** === 126 126 127 127 ... ... @@ -149,14 +149,14 @@ 149 149 150 150 (% class="box" %) 151 151 ((( 152 -if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 153 -please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 153 +**if you git fail. ~-~->** (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 154 +**please install git. ~-~->** (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 154 154 ))) 155 155 156 156 (% class="box" %) 157 157 ((( 158 -if you make error 127,it **(% style="color:#4f81bd" %)lack of gcc.(%%)**159 -please install gcc. ~-~->(% style="color:#4f81bd" %) **yum install gcc.**159 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)** 160 +**please install gcc. ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)** 160 160 ))) 161 161 162 162 [[image:image-20220527105856-3.png]] ... ... @@ -163,10 +163,11 @@ 163 163 164 164 lack of gcc 165 165 167 + 166 166 (% class="box" %) 167 167 ((( 168 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 169 -please insatell (% style="color:#4f81bd" %) **sqlite3**.170 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 171 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %). 170 170 ))) 171 171 172 172 [[image:image-20220527105918-4.png]] ... ... @@ -234,8 +234,8 @@ 234 234 235 235 (% class="box" %) 236 236 ((( 237 - if** fail to open dpvlry or to bind to it**238 -please kill rssh_serv,and run (% style="color:#4f81bd" %) **./rssh_serv -p 3721 2>&1 &** (%%) again239 +**if fail to open dpvlry or to bind to it** 240 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again** 239 239 ))) 240 240 241 241 ... ... @@ -243,13 +243,13 @@ 243 243 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 244 244 245 245 246 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 248 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)** 247 247 248 248 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 249 249 250 250 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 251 251 252 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 254 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ** ~-~-> Change /bin/bash to /bin/rbash** 253 253 254 254 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 255 255 ... ... @@ -266,7 +266,7 @@ 266 266 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 267 267 268 268 269 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**271 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt** 270 270 271 271 [[image:image-20220527110531-7.png]] 272 272 ... ... @@ -297,12 +297,12 @@ 297 297 298 298 (% class="box" %) 299 299 ((( 300 -(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 302 +(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%) 301 301 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 302 -(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 303 -(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 304 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 305 -Click Save and then Connect 304 +(% style="color:#4f81bd" %)**Login ID**(%%) : ** Input user name "eg : "XXXXX"** 305 +(% style="color:#4f81bd" %)**Host Address**(%%) : ** Input user's private server address** 306 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%): ** Choose to enable connect once device is powered.** 307 +**Click Save and then Connect** 306 306 ))) 307 307 308 308 ... ... @@ -328,8 +328,9 @@ 328 328 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 329 329 330 330 331 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 333 +**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey** 332 332 335 + 333 333 **Debug:** 334 334 335 335 (% class="box" %) ... ... @@ -338,6 +338,7 @@ 338 338 ))) 339 339 340 340 344 + 341 341 === **2.2.3 How to Ser up a Reverse SSH access** === 342 342 343 343