Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -11,13 +11,12 @@ 11 11 12 12 (% style="color:red" %)**Important Notice:** 13 13 14 - *(% style="color:red" %)**Remote.it access will give full control of your device to remote support.**15 -* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**14 +(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.** 15 +~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.** 16 16 17 17 For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 18 18 19 19 20 - 21 21 = **2. RSSH Introduction** = 22 22 23 23 ... ... @@ -25,8 +25,8 @@ 25 25 26 26 (% style="color:red" %)**Important Notice:** 27 27 28 - *(% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**29 -* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**27 +(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this** 28 +~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.** 30 30 31 31 Below gateway support reverse SSH access: 32 32 ... ... @@ -38,7 +38,6 @@ 38 38 * LIG16 39 39 * MS14 series if installed with the same firmware. 40 40 41 - 42 42 == **2.1 For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** == 43 43 44 44 ... ... @@ -56,7 +56,6 @@ 56 56 57 57 Connection OK. 58 58 59 - 60 60 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 61 61 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 62 62 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -82,7 +82,7 @@ 82 82 83 83 (% class="box" %) 84 84 ((( 85 - **$ ssh -p <End User Host Port> root@<Host Address>**82 +$ ssh -p <End User Host Port> root@<Host Address> 86 86 ))) 87 87 88 88 ((( ... ... @@ -91,40 +91,36 @@ 91 91 92 92 93 93 94 -==== (% style="color:blue" %)**Note for set up RSSH server**(%%)====91 +==== **2.1.2.1 Note for set up RSSH server** ==== 95 95 96 - 97 97 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 98 98 99 99 (% class="box" %) 100 100 ((( 101 - **[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.97 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 102 102 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 103 103 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 104 104 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 105 105 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 106 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# **102 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 107 107 ))) 108 108 109 109 110 - 111 111 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 112 112 113 - 114 114 Below gateway support reverse SSH access: 115 115 116 116 (% class="box" %) 117 117 ((( 118 - **Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download112 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 119 119 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 120 120 LG02, OLG02 121 121 LG308, DLOS8 122 122 LPS8 123 -LIG16 **117 +LIG16 124 124 ))) 125 125 126 126 127 - 128 128 === **2.2.1 End User Guide to use SSH access** === 129 129 130 130 ... ... @@ -152,14 +152,14 @@ 152 152 153 153 (% class="box" %) 154 154 ((( 155 - **if you git fail.**(% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)156 - **please install git. ~-~->**(% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.**148 +if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 149 +please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 157 157 ))) 158 158 159 159 (% class="box" %) 160 160 ((( 161 - **if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**162 - **please install gcc. ~-~->(%%)**154 +if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)** 155 +please install gcc. ~-~->(% style="color:#4f81bd" %)**yum install gcc.** 163 163 ))) 164 164 165 165 [[image:image-20220527105856-3.png]] ... ... @@ -166,11 +166,10 @@ 166 166 167 167 lack of gcc 168 168 169 - 170 170 (% class="box" %) 171 171 ((( 172 - **if you make a fatal error : sqlite3.h,it**(% style="color:#4f81bd" %)**lack of sqlite3.**(%%)173 - **please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).164 +if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 165 +please insatell (% style="color:#4f81bd" %)**sqlite3**. 174 174 ))) 175 175 176 176 [[image:image-20220527105918-4.png]] ... ... @@ -238,8 +238,8 @@ 238 238 239 239 (% class="box" %) 240 240 ((( 241 - **if fail to open dpvlry or to bind to it**242 - **please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(%style="color:#4f81bd" %)(%%)**again**233 +if** fail to open dpvlry or to bind to it** 234 +please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p 3721 2>&1 &** (%%) again 243 243 ))) 244 244 245 245 ... ... @@ -247,13 +247,13 @@ 247 247 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 248 248 249 249 250 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**242 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 251 251 252 252 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 253 253 254 254 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 255 255 256 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) **~-~-> Change /bin/bash to /bin/rbash**248 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 257 257 258 258 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 259 259 ... ... @@ -270,7 +270,7 @@ 270 270 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 271 271 272 272 273 -**1) **(% style="color:#4f81bd" %)**Remote Mgmt**265 +**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt** 274 274 275 275 [[image:image-20220527110531-7.png]] 276 276 ... ... @@ -301,12 +301,12 @@ 301 301 302 302 (% class="box" %) 303 303 ((( 304 -(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select**(% style="color:#4f81bd" %)**Public Key**(%%)296 +(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 305 305 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 306 -(% style="color:#4f81bd" %)**Login ID**(%%) : **Input user name "eg : "XXXXX"**307 -(% style="color:#4f81bd" %)**Host Address**(%%) : **Input user's private server address**308 -(% style="color:#4f81bd" %)**Connect at Startupt **Choose to enable connect once device is powered.**309 - **Click Save and then Connect**298 +(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 299 +(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 300 +(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 301 +Click Save and then Connect 310 310 ))) 311 311 312 312 ... ... @@ -332,9 +332,8 @@ 332 332 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 333 333 334 334 335 -**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**327 +**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 336 336 337 - 338 338 **Debug:** 339 339 340 340 (% class="box" %) ... ... @@ -343,7 +343,6 @@ 343 343 ))) 344 344 345 345 346 - 347 347 === **2.2.3 How to Ser up a Reverse SSH access** === 348 348 349 349