<
From version < 23.1 >
edited by Kilight Cao
on 2022/07/25 10:40
To version < 19.18 >
edited by Xiaoling
on 2022/07/14 14:22
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.Kilight
1 +XWiki.Xiaoling
Content
... ... @@ -7,12 +7,13 @@
7 7  = **1.  Use Remote.it service** =
8 8  
9 9  
10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concerns, the remote.it only available base on end-user demand.
10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
11 11  
12 12  (% style="color:red" %)**Important Notice:**
13 13  
14 -* (% style="color:red" %)Remote.it access will give full control of your device to remote support.
15 -* (% style="color:red" %)The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.
14 +(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
15 +~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
16 +
16 16  For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
17 17  
18 18  
... ... @@ -23,8 +23,8 @@
23 23  
24 24  (% style="color:red" %)**Important Notice:**
25 25  
26 -* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
27 -* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
27 +(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
28 +~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
28 28  
29 29  Below gateway support reverse SSH access:
30 30  
... ... @@ -53,7 +53,6 @@
53 53  
54 54  Connection OK.
55 55  
56 -
57 57  * (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
58 58  * (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
59 59  * (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
... ... @@ -79,7 +79,7 @@
79 79  
80 80  (% class="box" %)
81 81  (((
82 -**$ ssh   -p <End User Host Port>   root@<Host Address>**
82 +$ ssh   -p <End User Host Port>   root@<Host Address>
83 83  )))
84 84  
85 85  (((
... ... @@ -88,40 +88,36 @@
88 88  
89 89  
90 90  
91 -==== (% style="color:blue" %)**Note for set up RSSH server**(%%) ====
91 +==== **2.1.2.1  Note for set up RSSH server** ====
92 92  
93 -
94 94  If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
95 95  
96 96  (% class="box" %)
97 97  (((
98 -**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
97 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
99 99  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
100 100  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
101 101  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
102 102  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
103 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
102 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
104 104  )))
105 105  
106 106  
107 -
108 108  == **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
109 109  
110 -
111 111  Below gateway support reverse SSH access:
112 112  
113 113  (% class="box" %)
114 114  (((
115 -**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
112 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
116 116  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
117 117  LG02, OLG02
118 118  LG308, DLOS8
119 119  LPS8
120 -LIG16**
117 +LIG16
121 121  )))
122 122  
123 123  
124 -
125 125  === **2.2.1  End User Guide to use SSH access** ===
126 126  
127 127  
... ... @@ -149,14 +149,14 @@
149 149  
150 150  (% class="box" %)
151 151  (((
152 -**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
153 -**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
148 +if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
149 +please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
154 154  )))
155 155  
156 156  (% class="box" %)
157 157  (((
158 -**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
159 -**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
154 +if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
155 +please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
160 160  )))
161 161  
162 162  [[image:image-20220527105856-3.png]]
... ... @@ -163,11 +163,10 @@
163 163  
164 164  lack of gcc
165 165  
166 -
167 167  (% class="box" %)
168 168  (((
169 -**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
170 -**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
164 +if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
165 +please insatell (% style="color:#4f81bd" %)**sqlite3**.
171 171  )))
172 172  
173 173  [[image:image-20220527105918-4.png]]
... ... @@ -235,8 +235,8 @@
235 235  
236 236  (% class="box" %)
237 237  (((
238 -**if fail to open dpvlry or to bind to it**
239 -**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
233 +if** fail to open dpvlry or to bind to it**
234 +please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
240 240  )))
241 241  
242 242  
... ... @@ -244,13 +244,13 @@
244 244  ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
245 245  
246 246  
247 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
242 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
248 248  
249 249  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
250 250  
251 251  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
252 252  
253 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
248 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ~-~-> Change /bin/bash to /bin/rbash
254 254  
255 255  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
256 256  
... ... @@ -267,7 +267,7 @@
267 267  ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
268 268  
269 269  
270 -**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
265 +**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt**
271 271  
272 272  [[image:image-20220527110531-7.png]]
273 273  
... ... @@ -298,12 +298,12 @@
298 298  
299 299  (% class="box" %)
300 300  (((
301 -(% style="color:#4f81bd" %)**Connection Type **(%%) :  **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
296 +(% style="color:#4f81bd" %)**Connection Type **(%%) :  If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
302 302  (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
303 -(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
304 -(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
305 -(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
306 -**Click Save and then Connect**
298 +(% style="color:#4f81bd" %)**Login ID**(%%) :  Input user name "eg : "XXXXX"
299 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  Input user's private server address
300 +(% style="color:#4f81bd" %)**Connect at Startupt**(%%):  Choose to enable connect once device is powered.
301 +Click Save and then Connect
307 307  )))
308 308  
309 309  
... ... @@ -329,9 +329,8 @@
329 329  ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
330 330  
331 331  
332 -**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
327 +**1):**  sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
333 333  
334 -
335 335  **Debug:**
336 336  
337 337  (% class="box" %)
... ... @@ -340,7 +340,6 @@
340 340  )))
341 341  
342 342  
343 -
344 344  === **2.2.3  How to Ser up a Reverse SSH access** ===
345 345  
346 346  
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0