<
From version < 2.5 >
edited by Xiaoling
on 2022/05/12 14:42
To version < 4.3 >
edited by Xiaoling
on 2022/05/27 10:36
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -7,10 +7,10 @@
7 7  
8 8  Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
9 9  
10 -(% class="mark" %)**Important Notice:**
10 +(% style="color:red" %)**Important Notice:**
11 11  
12 -* (% class="mark" %)**Remote.it access will give full control of your device to remote support.**
13 -* (% class="mark" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
12 +(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
13 +~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
14 14  
15 15  For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
16 16  
... ... @@ -19,10 +19,10 @@
19 19  
20 20  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
21 21  
22 -(% class="mark" %)**Important Notice:**
22 +(% style="color:red" %)**Important Notice:**
23 23  
24 -* (% class="mark" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
25 -* (% class="mark" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
24 +(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
25 +~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
26 26  
27 27  Below gateway support reverse SSH access:
28 28  
... ... @@ -40,20 +40,20 @@
40 40  
41 41  Go to this the Reverse SSH page as below:
42 42  
43 -[[image:https://wiki.dragino.com/images/thumb/5/55/RSSH_Menu2.png/500px-RSSH_Menu2.png||height="256" width="500"]]
43 +[[image:image-20220527102348-1.png]]
44 44  
45 45  Get the RSSH configure page
46 46  
47 47  
48 -[[image:https://wiki.dragino.com/images/thumb/7/78/RSSH_Menu3.png/500px-RSSH_Menu3.png||height="313" width="500"]]
48 +[[image:image-20220527103251-2.png]]
49 49  
50 50  Connection OK.
51 51  
52 -* (% class="mark" %)**Login ID**(%%): Input (% class="mark" %)**sshuser**
53 -* (% class="mark" %)**Host Address**(%%): Input(% class="mark" %)** support.dragino.com**
54 -* (% class="mark" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port.
55 -* (% class="mark" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered.
56 -* (% class="mark" %)**Network Keys:**(%%)Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
52 +* (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser**
53 +* (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
54 +* (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port.
55 +* (% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered.
56 +* (% style="color:#4f81bd" %)**Network Keys:**(%%)Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
57 57  
58 58  (((
59 59  After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
... ... @@ -65,7 +65,7 @@
65 65  Advance administrator can config a SSH server to provide support their end user themselves. Instruction is as below:
66 66  
67 67  1. Prepare a Linux server with public IP. The gateways need to be able to create SSH connection to this server. We recommend to use a server that performs no other function than to support the RSSH access, and to have no additional accounts active, and no access from the Internet that uses ID/password authentication.
68 -1. In the gateway settings, The (% class="mark" %)**Login ID**(%%) will be the SSH user for this server and the (% class="mark" %)**Host Address**(%%) is the server address.
68 +1. In the gateway settings, The (% style="color:#4f81bd" %)**Login ID**(%%) will be the SSH user for this server and the (% style="color:#4f81bd" %)**Host Address**(%%) is the server address.
69 69  1. Ask your end user to send you the key generate in the gateway and put them in /home/<Login ID>/.ssh/authorized_key file.
70 70  1. Give a free port to the user and ask them to configure RSSH page in the gateway.
71 71  1. In your server or other machine, you will able to access to the end user device by below command:
... ... @@ -72,17 +72,17 @@
72 72  
73 73  (% class="box" %)
74 74  (((
75 - $ ssh   -p <End User Host Port>   root@<Host Address>
75 +$ ssh   -p <End User Host Port>   root@<Host Address>
76 76  )))
77 77  
78 78  (((
79 -(% class="mark" %)**Remote RSSH Access allow the gateway to connect to SSH server as well. This will create risk to the RSSH server. Please make sure the account use for Gateway Access has the lowest access right.**
79 +(% style="color:#4F81BD" %)**Remote RSSH Access allow the gateway to connect to SSH server as well. This will create risk to the RSSH server. Please make sure the account use for Gateway Access has the lowest access right.**
80 80  )))
81 81  
82 82  
83 83  ==== 2.1.2.1 Note for set up RSSH server ====
84 84  
85 -* If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
85 +If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
86 86  
87 87  (% class="box" %)
88 88  (((
... ... @@ -94,6 +94,7 @@
94 94  [root@iZt4n22vqvm7ajogrfiif6Z ~~]#
95 95  )))
96 96  
97 +
97 97  == 2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111 ==
98 98  
99 99  Below gateway support reverse SSH access:
... ... @@ -100,14 +100,15 @@
100 100  
101 101  (% class="box" %)
102 102  (((
103 - Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
104 - LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
105 - LG02, OLG02
106 - LG308, DLOS8
107 - LPS8
108 - LIG16
104 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
105 +LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
106 +LG02, OLG02
107 +LG308, DLOS8
108 +LPS8
109 +LIG16
109 109  )))
110 110  
112 +
111 111  === 2.2.1 End User Guide to use SSH access ===
112 112  
113 113  ==== 2.2.1.1 Install the SSH service for server ====
... ... @@ -131,13 +131,13 @@
131 131  
132 132  (% class="box" %)
133 133  (((
134 - if you git fail.  ~-~->    (% class="mark" %)**sudo: git: command not found.**(%%)
136 +if you git fail.  ~-~->    (% class="mark" %)**sudo: git: command not found.**(%%)
135 135  please install git.  ~-~->    (% class="mark" %)**yum install git -y  or  apt-get install git -y. **
136 136  )))
137 137  
138 138  (% class="box" %)
139 139  (((
140 - if you make error 127,it** (% class="mark" %)lack of gcc.(%%)**
142 +if you make error 127,it** (% class="mark" %)lack of gcc.(%%)**
141 141  please install gcc.    ~-~->(% class="mark" %)**yum install gcc.**
142 142  )))
143 143  
... ... @@ -147,7 +147,7 @@
147 147  
148 148  (% class="box" %)
149 149  (((
150 - if you make a fatal error : sqlite3.h,it (% class="mark" %)**lack of sqlite3.**(%%)
152 +if you make a fatal error : sqlite3.h,it (% class="mark" %)**lack of sqlite3.**(%%)
151 151  please insatell **sqlite3**.
152 152  )))
153 153  
... ... @@ -159,15 +159,15 @@
159 159  
160 160  (% class="box" %)
161 161  (((
162 -Step1:Download the SQLit3 installation package
164 +Step1: Download the SQLit3 installation package
163 163   sudo wget [[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]
164 -Step2:tar the SQLit3 installation package
166 +Step2: tar the SQLit3 installation package
165 165   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
166 -Step3:Generate the makefile
168 +Step3: Generate the makefile
167 167   cd sqlite-autoconf-3350300/;./configure
168 -Step4:Compile makefile
170 +Step4: Compile makefile
169 169   sudo make
170 -Step5:Install makefile
172 +Step5: Install makefile
171 171   sudo make install
172 172  Check:
173 173   cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
... ... @@ -187,9 +187,9 @@
187 187  
188 188  (% class="box" %)
189 189  (((
190 -$ ./create_sqlite3_db.sh
191 -$ ./rssh_serv -p  3721 2>&1 &
192 -$ ps -ef | grep rssh_serv check 3721 port
192 + $ ./create_sqlite3_db.sh
193 + $ ./rssh_serv -p  3721 2>&1 &
194 + $ ps -ef | grep rssh_serv check 3721 port
193 193  )))
194 194  
195 195  [[image:https://wiki.dragino.com/images/thumb/c/cb/Intall_database_and_server_development_port.png/500px-Intall_database_and_server_development_port.png||height="70" width="500"]]
... ... @@ -200,14 +200,14 @@
200 200  
201 201  (% class="box" %)
202 202  (((
203 -Check /var/rsshdb.sqlite3 ~-~->(% class="mark" %)** ls /var/rsshdb.sqlite3**(%%)
205 +Check /var/rsshdb.sqlite3 ~-~->(% class="mark" %)** ls /var/rsshdb.sqlite3**(%%)
204 204  Check ls /var/rsshdb.sqlite3 ~-~-> (% class="mark" %)**sudo chmod 777 rssh_serv**
205 205  )))
206 206  
207 207  (% class="box" %)
208 208  (((
209 -if** fail to open dpvlry or to bind to it**
210 -please kill rssh_serv,and run (% class="mark" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
211 +if** fail to open dpvlry or to bind to it**
212 +please kill rssh_serv,and run (% class="mark" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
211 211  )))
212 212  
213 213  
... ... @@ -238,6 +238,7 @@
238 238  
239 239  Remote Mgmt
240 240  
243 +
241 241  ===== 2.2.2.2 Step2: Authorization server =====
242 242  
243 243  copy the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
... ... @@ -246,6 +246,7 @@
246 246  
247 247  Publickey
248 248  
252 +
249 249  ===== 2.2.2.3 Step3: connecte private server =====
250 250  
251 251  in the gateway web UI
... ... @@ -254,14 +254,17 @@
254 254  
255 255  gateway web UI
256 256  
257 -{{{Connection Type : If user's least privileged user with private server uses a password, select Public Key
258 -Note:if user's least privileged user no uses a password,choose from both is fine
259 -Login ID : Input user name "eg : "XXXXX"
260 -Host Address : Input user's private server address
261 -Connect at Startupt: : Choose to enable connect once device is powered.
261 +(% class="box" %)
262 +(((
263 +(% class="mark" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% class="mark" %)**Public Key**(%%)
264 +**Note:if user's least privileged user no uses a password,choose from both is fine**
265 +(% class="mark" %)**Login ID**(%%)             : Input user name "eg : "XXXXX"
266 +(% class="mark" %)**Host Address**(%%)         : Input user's private server address
267 +(% class="mark" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered.
262 262  Click Save and then Connect
263 -}}}
269 +)))
264 264  
271 +
265 265  ===== 2.2.2.4 Step 4 :Cheak is fine =====
266 266  
267 267  Rssh Host connection Ok
... ... @@ -270,9 +270,10 @@
270 270  
271 271  Rssh Host connection Ok
272 272  
280 +
273 273  user can use common ps | grep ssh to check it in the gateway.
274 274  
275 -[[image:https://wiki.dragino.com/images/thumb/a/ad/Check_the_gateway.png/500px-Check_the_gateway.png||height="47" width="500"]]
283 +[[image:https://wiki.dragino.com/images/thumb/a/ad/Check_the_gateway.png/500px-Check_the_gateway.png]]
276 276  
277 277  Check the gateway
278 278  
... ... @@ -283,8 +283,10 @@
283 283  
284 284  **Debug:**
285 285  
286 -{{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey
287 -}}}
294 +(% class="box" %)
295 +(((
296 + check: sudo ls /home/xxxxx/.ssh/authorizedkey
297 +)))
288 288  
289 289  === 2.2.3 How to Ser up a Reverse SSH access ===
290 290  
... ... @@ -294,11 +294,11 @@
294 294  
295 295  Loging server
296 296  
307 +
297 297  ==== 2.2.3.2 Step2:access the gateway ====
298 298  
299 299  $ cd rssh-server/
300 300  
301 -
302 302  Check the gateway linking to the server $ ./connect-gw.sh -l
303 303  
304 304  [[image:https://wiki.dragino.com/images/thumb/e/ee/Check_gateway_link_server.png/500px-Check_gateway_link_server.png||height="157" width="500"]]
image-20220527102348-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +52.6 KB
Content
image-20220527103251-2.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +40.4 KB
Content
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0