<
From version < 22.1 >
edited by Kilight Cao
on 2022/07/25 10:38
To version < 19.17 >
edited by Xiaoling
on 2022/07/14 14:16
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Kilight
1 +XWiki.Xiaoling
Content
... ... @@ -7,14 +7,14 @@
7 7  = **1.  Use Remote.it service** =
8 8  
9 9  
10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand.
10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
11 11  
12 12  (% style="color:red" %)**Important Notice:**
13 13  
14 -* Remote.it access will give full control of your device to remote support.
15 -* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
16 -* For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
14 +(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
15 +~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
17 17  
17 +For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
18 18  
19 19  
20 20  = **2.  RSSH Introduction** =
... ... @@ -24,8 +24,8 @@
24 24  
25 25  (% style="color:red" %)**Important Notice:**
26 26  
27 -* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
28 -* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
27 +(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
28 +~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
29 29  
30 30  Below gateway support reverse SSH access:
31 31  
... ... @@ -37,6 +37,7 @@
37 37  * LIG16
38 38  * MS14 series if installed with the same firmware.
39 39  
40 +
40 40  == **2.1  For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** ==
41 41  
42 42  
... ... @@ -54,7 +54,6 @@
54 54  
55 55  Connection OK.
56 56  
57 -
58 58  * (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
59 59  * (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
60 60  * (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
... ... @@ -80,7 +80,7 @@
80 80  
81 81  (% class="box" %)
82 82  (((
83 -**$ ssh   -p <End User Host Port>   root@<Host Address>**
83 +$ ssh   -p <End User Host Port>   root@<Host Address>
84 84  )))
85 85  
86 86  (((
... ... @@ -89,40 +89,36 @@
89 89  
90 90  
91 91  
92 -==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ====
92 +==== **2.1.2.1  Note for set up RSSH server** ====
93 93  
94 -
95 95  If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
96 96  
97 97  (% class="box" %)
98 98  (((
99 -**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
98 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
100 100  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
101 101  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
102 102  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
103 103  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
104 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
103 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
105 105  )))
106 106  
107 107  
108 -
109 109  == **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
110 110  
111 -
112 112  Below gateway support reverse SSH access:
113 113  
114 114  (% class="box" %)
115 115  (((
116 -**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
113 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
117 117  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
118 118  LG02, OLG02
119 119  LG308, DLOS8
120 120  LPS8
121 -LIG16**
118 +LIG16
122 122  )))
123 123  
124 124  
125 -
126 126  === **2.2.1  End User Guide to use SSH access** ===
127 127  
128 128  
... ... @@ -150,14 +150,14 @@
150 150  
151 151  (% class="box" %)
152 152  (((
153 -**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
154 -**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
149 +if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
150 +please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
155 155  )))
156 156  
157 157  (% class="box" %)
158 158  (((
159 -**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
160 -**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
155 +if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
156 +please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
161 161  )))
162 162  
163 163  [[image:image-20220527105856-3.png]]
... ... @@ -164,11 +164,10 @@
164 164  
165 165  lack of gcc
166 166  
167 -
168 168  (% class="box" %)
169 169  (((
170 -**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
171 -**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
165 +if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
166 +please insatell (% style="color:#4f81bd" %)**sqlite3**.
172 172  )))
173 173  
174 174  [[image:image-20220527105918-4.png]]
... ... @@ -180,26 +180,26 @@
180 180  
181 181  (% class="box" %)
182 182  (((
183 -(% style="color:#037691" %)**Step1:**(%%) Download the SQLit3 installation package
178 +**Step1:** Download the SQLit3 installation package
184 184   sudo wget [[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]
185 185  
186 -(% style="color:#037691" %)**Step2:**(%%) tar the SQLit3 installation package
181 +**Step2:** tar the SQLit3 installation package
187 187   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
188 188  
189 -(% style="color:#037691" %)**Step3:**(%%) Generate the makefile
184 +**Step3:** Generate the makefile
190 190   cd sqlite-autoconf-3350300/;./configure
191 191  
192 -(% style="color:#037691" %)**Step4:**(%%) Compile makefile
187 +**Step4:** Compile makefile
193 193   sudo make
194 194  
195 -(% style="color:#037691" %)**Step5: **(%%)Install makefile
190 +**Step5: **Install makefile
196 196   sudo make install
197 197  
198 -(% style="color:#037691" %)**Check:**(%%)
199 - cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
200 - cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->  Test whether the sqlite3 was installed successfully
193 +**Check:**
194 + cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
195 + cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
201 201  
202 -(% style="color:#037691" %)**debug:**(%%)
197 +**debug:**
203 203   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
204 204   Please execute the command /sbin/ldconfig.
205 205   After that execute the command ./sqlite3 test.db again.
... ... @@ -216,9 +216,9 @@
216 216  
217 217  (% class="box" %)
218 218  (((
219 -**~ $ ./create_sqlite3_db.sh
214 + $ ./create_sqlite3_db.sh
220 220   $ ./rssh_serv -p  3721 2>&1 &
221 - $ ps -ef | grep rssh_serv check 3721 port**
216 + $ ps -ef | grep rssh_serv check 3721 port
222 222  )))
223 223  
224 224  [[image:image-20220527110436-6.png]]
... ... @@ -230,14 +230,14 @@
230 230  
231 231  (% class="box" %)
232 232  (((
233 -**Check /var/rsshdb.sqlite3  ~-~->(% style="color:#4f81bd" %)  ls /var/rsshdb.sqlite3(%%)**
234 -**Check ls /var/rsshdb.sqlite3 ~-~->**  (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
228 +Check /var/rsshdb.sqlite3 ~-~->(% style="color:#4f81bd" %)** ls /var/rsshdb.sqlite3**(%%)
229 +Check ls /var/rsshdb.sqlite3 ~-~-> (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
235 235  )))
236 236  
237 237  (% class="box" %)
238 238  (((
239 -**if fail to open dpvlry or to bind to it**
240 -**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
234 +if** fail to open dpvlry or to bind to it**
235 +please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
241 241  )))
242 242  
243 243  
... ... @@ -245,13 +245,13 @@
245 245  ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
246 246  
247 247  
248 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
243 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
249 249  
250 250  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
251 251  
252 252  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
253 253  
254 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
249 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash
255 255  
256 256  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
257 257  
... ... @@ -268,7 +268,7 @@
268 268  ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
269 269  
270 270  
271 -**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
266 +**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**
272 272  
273 273  [[image:image-20220527110531-7.png]]
274 274  
... ... @@ -299,12 +299,12 @@
299 299  
300 300  (% class="box" %)
301 301  (((
302 -(% style="color:#4f81bd" %)**Connection Type **(%%) :  **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
297 +(% style="color:#4f81bd" %)**Connection Type **(%%) :  If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
303 303  (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
304 -(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
305 -(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
306 -(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
307 -**Click Save and then Connect**
299 +(% style="color:#4f81bd" %)**Login ID**(%%) :  Input user name "eg : "XXXXX"
300 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  Input user's private server address
301 +(% style="color:#4f81bd" %)**Connect at Startupt**(%%):  Choose to enable connect once device is powered.
302 +Click Save and then Connect
308 308  )))
309 309  
310 310  
... ... @@ -330,9 +330,8 @@
330 330  ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
331 331  
332 332  
333 -**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
328 +**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
334 334  
335 -
336 336  **Debug:**
337 337  
338 338  (% class="box" %)
... ... @@ -341,7 +341,6 @@
341 341  )))
342 342  
343 343  
344 -
345 345  === **2.2.3  How to Ser up a Reverse SSH access** ===
346 346  
347 347  
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0