Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Xiaoling1 +XWiki.Kilight - Content
-
... ... @@ -7,17 +7,15 @@ 7 7 = **1. Use Remote.it service** = 8 8 9 9 10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end 10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand. 11 11 12 12 (% style="color:red" %)**Important Notice:** 13 13 14 -* (% style="color:red" %)**Remote.it access will give full control of your device to remote support.** 15 -* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.** 16 - 14 +* (% style="color:red" %)Remote.it access will give full control of your device to remote support. 15 +* (% style="color:red" %)The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 17 17 For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 18 18 19 19 20 - 21 21 = **2. RSSH Introduction** = 22 22 23 23 ... ... @@ -38,9 +38,6 @@ 38 38 * LIG16 39 39 * MS14 series if installed with the same firmware. 40 40 41 - 42 - 43 - 44 44 == **2.1 For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** == 45 45 46 46 ... ... @@ -58,6 +58,7 @@ 58 58 59 59 Connection OK. 60 60 56 + 61 61 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 62 62 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 63 63 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -83,7 +83,7 @@ 83 83 84 84 (% class="box" %) 85 85 ((( 86 -$ ssh -p <End User Host Port> root@<Host Address> 82 +**$ ssh -p <End User Host Port> root@<Host Address>** 87 87 ))) 88 88 89 89 ((( ... ... @@ -92,36 +92,40 @@ 92 92 93 93 94 94 95 -==== ** 2.1.2.1Note for set up RSSH server** ====91 +==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ==== 96 96 93 + 97 97 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 98 98 99 99 (% class="box" %) 100 100 ((( 101 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 98 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 102 102 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 103 103 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 104 104 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 105 105 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 106 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 103 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#** 107 107 ))) 108 108 109 109 107 + 110 110 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 111 111 110 + 112 112 Below gateway support reverse SSH access: 113 113 114 114 (% class="box" %) 115 115 ((( 116 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 115 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 117 117 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 118 118 LG02, OLG02 119 119 LG308, DLOS8 120 120 LPS8 121 -LIG16 120 +LIG16** 122 122 ))) 123 123 124 124 124 + 125 125 === **2.2.1 End User Guide to use SSH access** === 126 126 127 127 ... ... @@ -149,14 +149,14 @@ 149 149 150 150 (% class="box" %) 151 151 ((( 152 -if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 153 -please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 152 +**if you git fail. ~-~->** (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 153 +**please install git. ~-~->** (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 154 154 ))) 155 155 156 156 (% class="box" %) 157 157 ((( 158 -if you make error 127,it **(% style="color:#4f81bd" %)lack of gcc.(%%)**159 -please install gcc. ~-~->(% style="color:#4f81bd" %) **yum install gcc.**158 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)** 159 +**please install gcc. ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)** 160 160 ))) 161 161 162 162 [[image:image-20220527105856-3.png]] ... ... @@ -163,10 +163,11 @@ 163 163 164 164 lack of gcc 165 165 166 + 166 166 (% class="box" %) 167 167 ((( 168 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 169 -please insatell (% style="color:#4f81bd" %) **sqlite3**.169 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 170 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %). 170 170 ))) 171 171 172 172 [[image:image-20220527105918-4.png]] ... ... @@ -234,8 +234,8 @@ 234 234 235 235 (% class="box" %) 236 236 ((( 237 - if** fail to open dpvlry or to bind to it**238 -please kill rssh_serv,and run (% style="color:#4f81bd" %) **./rssh_serv -p 3721 2>&1 &** (%%) again238 +**if fail to open dpvlry or to bind to it** 239 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again** 239 239 ))) 240 240 241 241 ... ... @@ -243,13 +243,13 @@ 243 243 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 244 244 245 245 246 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 247 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)** 247 247 248 248 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 249 249 250 250 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 251 251 252 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 253 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ** ~-~-> Change /bin/bash to /bin/rbash** 253 253 254 254 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 255 255 ... ... @@ -266,7 +266,7 @@ 266 266 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 267 267 268 268 269 -**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**270 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt** 270 270 271 271 [[image:image-20220527110531-7.png]] 272 272 ... ... @@ -297,12 +297,12 @@ 297 297 298 298 (% class="box" %) 299 299 ((( 300 -(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 301 +(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%) 301 301 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 302 -(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 303 -(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 304 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 305 -Click Save and then Connect 303 +(% style="color:#4f81bd" %)**Login ID**(%%) : ** Input user name "eg : "XXXXX"** 304 +(% style="color:#4f81bd" %)**Host Address**(%%) : ** Input user's private server address** 305 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%): ** Choose to enable connect once device is powered.** 306 +**Click Save and then Connect** 306 306 ))) 307 307 308 308 ... ... @@ -328,8 +328,9 @@ 328 328 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 329 329 330 330 331 -**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 332 +**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey** 332 332 334 + 333 333 **Debug:** 334 334 335 335 (% class="box" %) ... ... @@ -338,6 +338,7 @@ 338 338 ))) 339 339 340 340 343 + 341 341 === **2.2.3 How to Ser up a Reverse SSH access** === 342 342 343 343