<
From version < 23.1 >
edited by Kilight Cao
on 2022/07/25 10:40
To version < 19.17 >
edited by Xiaoling
on 2022/07/14 14:16
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Kilight
1 +XWiki.Xiaoling
Content
... ... @@ -7,12 +7,13 @@
7 7  = **1.  Use Remote.it service** =
8 8  
9 9  
10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand.
10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
11 11  
12 12  (% style="color:red" %)**Important Notice:**
13 13  
14 -* (% style="color:red" %)Remote.it access will give full control of your device to remote support.
15 -* (% style="color:red" %)The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
14 +(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
15 +~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
16 +
16 16  For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
17 17  
18 18  
... ... @@ -23,8 +23,8 @@
23 23  
24 24  (% style="color:red" %)**Important Notice:**
25 25  
26 -* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
27 -* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
27 +(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
28 +~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
28 28  
29 29  Below gateway support reverse SSH access:
30 30  
... ... @@ -36,6 +36,7 @@
36 36  * LIG16
37 37  * MS14 series if installed with the same firmware.
38 38  
40 +
39 39  == **2.1  For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** ==
40 40  
41 41  
... ... @@ -53,7 +53,6 @@
53 53  
54 54  Connection OK.
55 55  
56 -
57 57  * (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
58 58  * (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
59 59  * (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
... ... @@ -79,7 +79,7 @@
79 79  
80 80  (% class="box" %)
81 81  (((
82 -**$ ssh   -p <End User Host Port>   root@<Host Address>**
83 +$ ssh   -p <End User Host Port>   root@<Host Address>
83 83  )))
84 84  
85 85  (((
... ... @@ -88,40 +88,36 @@
88 88  
89 89  
90 90  
91 -==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ====
92 +==== **2.1.2.1  Note for set up RSSH server** ====
92 92  
93 -
94 94  If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
95 95  
96 96  (% class="box" %)
97 97  (((
98 -**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
98 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
99 99  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
100 100  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
101 101  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
102 102  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
103 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
103 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
104 104  )))
105 105  
106 106  
107 -
108 108  == **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
109 109  
110 -
111 111  Below gateway support reverse SSH access:
112 112  
113 113  (% class="box" %)
114 114  (((
115 -**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
113 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
116 116  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
117 117  LG02, OLG02
118 118  LG308, DLOS8
119 119  LPS8
120 -LIG16**
118 +LIG16
121 121  )))
122 122  
123 123  
124 -
125 125  === **2.2.1  End User Guide to use SSH access** ===
126 126  
127 127  
... ... @@ -149,14 +149,14 @@
149 149  
150 150  (% class="box" %)
151 151  (((
152 -**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
153 -**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
149 +if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
150 +please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
154 154  )))
155 155  
156 156  (% class="box" %)
157 157  (((
158 -**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
159 -**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
155 +if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
156 +please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
160 160  )))
161 161  
162 162  [[image:image-20220527105856-3.png]]
... ... @@ -163,11 +163,10 @@
163 163  
164 164  lack of gcc
165 165  
166 -
167 167  (% class="box" %)
168 168  (((
169 -**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
170 -**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
165 +if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
166 +please insatell (% style="color:#4f81bd" %)**sqlite3**.
171 171  )))
172 172  
173 173  [[image:image-20220527105918-4.png]]
... ... @@ -179,26 +179,26 @@
179 179  
180 180  (% class="box" %)
181 181  (((
182 -(% style="color:#037691" %)**Step1:**(%%) Download the SQLit3 installation package
178 +**Step1:** Download the SQLit3 installation package
183 183   sudo wget [[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]
184 184  
185 -(% style="color:#037691" %)**Step2:**(%%) tar the SQLit3 installation package
181 +**Step2:** tar the SQLit3 installation package
186 186   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
187 187  
188 -(% style="color:#037691" %)**Step3:**(%%) Generate the makefile
184 +**Step3:** Generate the makefile
189 189   cd sqlite-autoconf-3350300/;./configure
190 190  
191 -(% style="color:#037691" %)**Step4:**(%%) Compile makefile
187 +**Step4:** Compile makefile
192 192   sudo make
193 193  
194 -(% style="color:#037691" %)**Step5: **(%%)Install makefile
190 +**Step5: **Install makefile
195 195   sudo make install
196 196  
197 -(% style="color:#037691" %)**Check:**(%%)
198 - cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
199 - cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->  Test whether the sqlite3 was installed successfully
193 +**Check:**
194 + cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
195 + cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
200 200  
201 -(% style="color:#037691" %)**debug:**(%%)
197 +**debug:**
202 202   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
203 203   Please execute the command /sbin/ldconfig.
204 204   After that execute the command ./sqlite3 test.db again.
... ... @@ -215,9 +215,9 @@
215 215  
216 216  (% class="box" %)
217 217  (((
218 -**~ $ ./create_sqlite3_db.sh
214 + $ ./create_sqlite3_db.sh
219 219   $ ./rssh_serv -p  3721 2>&1 &
220 - $ ps -ef | grep rssh_serv check 3721 port**
216 + $ ps -ef | grep rssh_serv check 3721 port
221 221  )))
222 222  
223 223  [[image:image-20220527110436-6.png]]
... ... @@ -229,14 +229,14 @@
229 229  
230 230  (% class="box" %)
231 231  (((
232 -**Check /var/rsshdb.sqlite3  ~-~->(% style="color:#4f81bd" %)  ls /var/rsshdb.sqlite3(%%)**
233 -**Check ls /var/rsshdb.sqlite3 ~-~->**  (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
228 +Check /var/rsshdb.sqlite3 ~-~->(% style="color:#4f81bd" %)** ls /var/rsshdb.sqlite3**(%%)
229 +Check ls /var/rsshdb.sqlite3 ~-~-> (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
234 234  )))
235 235  
236 236  (% class="box" %)
237 237  (((
238 -**if fail to open dpvlry or to bind to it**
239 -**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
234 +if** fail to open dpvlry or to bind to it**
235 +please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
240 240  )))
241 241  
242 242  
... ... @@ -244,13 +244,13 @@
244 244  ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
245 245  
246 246  
247 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
243 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
248 248  
249 249  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
250 250  
251 251  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
252 252  
253 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
249 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash
254 254  
255 255  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
256 256  
... ... @@ -267,7 +267,7 @@
267 267  ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
268 268  
269 269  
270 -**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
266 +**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**
271 271  
272 272  [[image:image-20220527110531-7.png]]
273 273  
... ... @@ -298,12 +298,12 @@
298 298  
299 299  (% class="box" %)
300 300  (((
301 -(% style="color:#4f81bd" %)**Connection Type **(%%) :  **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
297 +(% style="color:#4f81bd" %)**Connection Type **(%%) :  If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
302 302  (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
303 -(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
304 -(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
305 -(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
306 -**Click Save and then Connect**
299 +(% style="color:#4f81bd" %)**Login ID**(%%) :  Input user name "eg : "XXXXX"
300 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  Input user's private server address
301 +(% style="color:#4f81bd" %)**Connect at Startupt**(%%):  Choose to enable connect once device is powered.
302 +Click Save and then Connect
307 307  )))
308 308  
309 309  
... ... @@ -329,9 +329,8 @@
329 329  ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
330 330  
331 331  
332 -**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
328 +**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
333 333  
334 -
335 335  **Debug:**
336 336  
337 337  (% class="box" %)
... ... @@ -340,7 +340,6 @@
340 340  )))
341 341  
342 342  
343 -
344 344  === **2.2.3  How to Ser up a Reverse SSH access** ===
345 345  
346 346  
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0