Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Kilight1 +XWiki.Xiaoling - Content
-
... ... @@ -7,14 +7,14 @@ 7 7 = **1. Use Remote.it service** = 8 8 9 9 10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern s, the remote.it only available base on end-user demand.10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand. 11 11 12 12 (% style="color:red" %)**Important Notice:** 13 13 14 -* Remote.it access will give full control of your device to remote support. 15 -* The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 16 -* For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 14 +(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.** 15 +~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.** 17 17 17 +For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 18 18 19 19 20 20 = **2. RSSH Introduction** = ... ... @@ -24,8 +24,8 @@ 24 24 25 25 (% style="color:red" %)**Important Notice:** 26 26 27 - *(% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**28 -* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**27 +(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this** 28 +~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.** 29 29 30 30 Below gateway support reverse SSH access: 31 31 ... ... @@ -37,6 +37,7 @@ 37 37 * LIG16 38 38 * MS14 series if installed with the same firmware. 39 39 40 + 40 40 == **2.1 For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** == 41 41 42 42 ... ... @@ -54,7 +54,6 @@ 54 54 55 55 Connection OK. 56 56 57 - 58 58 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 59 59 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 60 60 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -80,7 +80,7 @@ 80 80 81 81 (% class="box" %) 82 82 ((( 83 - **$ ssh -p <End User Host Port> root@<Host Address>**83 +$ ssh -p <End User Host Port> root@<Host Address> 84 84 ))) 85 85 86 86 ((( ... ... @@ -89,40 +89,36 @@ 89 89 90 90 91 91 92 -==== (% style="color:blue" %)**Note for set up RSSH server**(%%)====92 +==== **2.1.2.1 Note for set up RSSH server** ==== 93 93 94 - 95 95 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 96 96 97 97 (% class="box" %) 98 98 ((( 99 - **[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.98 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 100 100 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 101 101 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 102 102 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 103 103 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 104 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# **103 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 105 105 ))) 106 106 107 107 108 - 109 109 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 110 110 111 - 112 112 Below gateway support reverse SSH access: 113 113 114 114 (% class="box" %) 115 115 ((( 116 - **Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download113 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 117 117 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 118 118 LG02, OLG02 119 119 LG308, DLOS8 120 120 LPS8 121 -LIG16 **118 +LIG16 122 122 ))) 123 123 124 124 125 - 126 126 === **2.2.1 End User Guide to use SSH access** === 127 127 128 128 ... ... @@ -150,14 +150,14 @@ 150 150 151 151 (% class="box" %) 152 152 ((( 153 - **if you git fail.**(% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)154 - **please install git. ~-~->**(% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.**149 +if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 150 +please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 155 155 ))) 156 156 157 157 (% class="box" %) 158 158 ((( 159 - **if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**160 - **please install gcc. ~-~->(%%)**155 +if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)** 156 +please install gcc. ~-~->(% style="color:#4f81bd" %)**yum install gcc.** 161 161 ))) 162 162 163 163 [[image:image-20220527105856-3.png]] ... ... @@ -164,11 +164,10 @@ 164 164 165 165 lack of gcc 166 166 167 - 168 168 (% class="box" %) 169 169 ((( 170 - **if you make a fatal error : sqlite3.h,it**(% style="color:#4f81bd" %)**lack of sqlite3.**(%%)171 - **please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).165 +if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 166 +please insatell (% style="color:#4f81bd" %)**sqlite3**. 172 172 ))) 173 173 174 174 [[image:image-20220527105918-4.png]] ... ... @@ -180,26 +180,26 @@ 180 180 181 181 (% class="box" %) 182 182 ((( 183 - (% style="color:#037691" %)**Step1:**(%%)Download the SQLit3 installation package178 +**Step1:** Download the SQLit3 installation package 184 184 sudo wget [[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]] 185 185 186 - (% style="color:#037691" %)**Step2:**(%%)tar the SQLit3 installation package181 +**Step2:** tar the SQLit3 installation package 187 187 sudo tar -zxvf sqlite-autoconf-3350300.tar.gz 188 188 189 - (% style="color:#037691" %)**Step3:**(%%)Generate the makefile184 +**Step3:** Generate the makefile 190 190 cd sqlite-autoconf-3350300/;./configure 191 191 192 - (% style="color:#037691" %)**Step4:**(%%)Compile makefile187 +**Step4:** Compile makefile 193 193 sudo make 194 194 195 - (% style="color:#037691" %)**Step5: **(%%)Install makefile190 +**Step5: **Install makefile 196 196 sudo make install 197 197 198 - (% style="color:#037691" %)**Check:**(%%)199 - cd /usr/local/bin;ls -al 200 - cd sqlite-autoconf-3350300/;./sqlite3 test.db ~-~-> 193 +**Check:** 194 + cd /usr/local/bin;ls -al ~-~-> Check to see if there is a file for sqlite3 195 + cd sqlite-autoconf-3350300/;./sqlite3 test.db ~-~-> Test whether the sqlite3 was installed successfully 201 201 202 - (% style="color:#037691" %)**debug:**(%%)197 +**debug:** 203 203 If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db. 204 204 Please execute the command /sbin/ldconfig. 205 205 After that execute the command ./sqlite3 test.db again. ... ... @@ -216,9 +216,9 @@ 216 216 217 217 (% class="box" %) 218 218 ((( 219 - **~$ ./create_sqlite3_db.sh214 + $ ./create_sqlite3_db.sh 220 220 $ ./rssh_serv -p 3721 2>&1 & 221 - $ ps -ef | grep rssh_serv check 3721 port **216 + $ ps -ef | grep rssh_serv check 3721 port 222 222 ))) 223 223 224 224 [[image:image-20220527110436-6.png]] ... ... @@ -230,14 +230,14 @@ 230 230 231 231 (% class="box" %) 232 232 ((( 233 - **Check /var/rsshdb.sqlite3**234 - **Check ls /var/rsshdb.sqlite3 ~-~->**228 +Check /var/rsshdb.sqlite3 ~-~->(% style="color:#4f81bd" %)** ls /var/rsshdb.sqlite3**(%%) 229 +Check ls /var/rsshdb.sqlite3 ~-~-> (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv** 235 235 ))) 236 236 237 237 (% class="box" %) 238 238 ((( 239 - **if fail to open dpvlry or to bind to it**240 - **please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(%style="color:#4f81bd" %)(%%)**again**234 +if** fail to open dpvlry or to bind to it** 235 +please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p 3721 2>&1 &** (%%) again 241 241 ))) 242 242 243 243 ... ... @@ -245,13 +245,13 @@ 245 245 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 246 246 247 247 248 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**243 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 249 249 250 250 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 251 251 252 252 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 253 253 254 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) **~-~-> Change /bin/bash to /bin/rbash**249 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 255 255 256 256 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 257 257 ... ... @@ -268,7 +268,7 @@ 268 268 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 269 269 270 270 271 -**1) **(% style="color:#4f81bd" %)**Remote Mgmt**266 +**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt** 272 272 273 273 [[image:image-20220527110531-7.png]] 274 274 ... ... @@ -299,12 +299,12 @@ 299 299 300 300 (% class="box" %) 301 301 ((( 302 -(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select**(% style="color:#4f81bd" %)**Public Key**(%%)297 +(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 303 303 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 304 -(% style="color:#4f81bd" %)**Login ID**(%%) : **Input user name "eg : "XXXXX"**305 -(% style="color:#4f81bd" %)**Host Address**(%%) : **Input user's private server address**306 -(% style="color:#4f81bd" %)**Connect at Startupt **Choose to enable connect once device is powered.**307 - **Click Save and then Connect**299 +(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 300 +(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 301 +(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 302 +Click Save and then Connect 308 308 ))) 309 309 310 310 ... ... @@ -330,9 +330,8 @@ 330 330 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 331 331 332 332 333 -**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**328 +**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 334 334 335 - 336 336 **Debug:** 337 337 338 338 (% class="box" %) ... ... @@ -341,7 +341,6 @@ 341 341 ))) 342 342 343 343 344 - 345 345 === **2.2.3 How to Ser up a Reverse SSH access** === 346 346 347 347