Changes for page Remote Access Gateway
Last modified by Kilight Cao on 2022/07/25 10:47
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. Kilight1 +XWiki.Xiaoling - Content
-
... ... @@ -7,15 +7,17 @@ 7 7 = **1. Use Remote.it service** = 8 8 9 9 10 -Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern s, the remote.it only available base on end-user demand.10 +Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand. 11 11 12 12 (% style="color:red" %)**Important Notice:** 13 13 14 -* (% style="color:red" %)Remote.it access will give full control of your device to remote support. 15 -* (% style="color:red" %)The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account. 14 +* (% style="color:red" %)**Remote.it access will give full control of your device to remote support.** 15 +* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.** 16 + 16 16 For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]]. 17 17 18 18 20 + 19 19 = **2. RSSH Introduction** = 20 20 21 21 ... ... @@ -36,6 +36,9 @@ 36 36 * LIG16 37 37 * MS14 series if installed with the same firmware. 38 38 41 + 42 + 43 + 39 39 == **2.1 For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** == 40 40 41 41 ... ... @@ -53,7 +53,6 @@ 53 53 54 54 Connection OK. 55 55 56 - 57 57 * (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser** 58 58 * (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)** 59 59 * (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port. ... ... @@ -79,7 +79,7 @@ 79 79 80 80 (% class="box" %) 81 81 ((( 82 - **$ ssh -p <End User Host Port> root@<Host Address>**86 +$ ssh -p <End User Host Port> root@<Host Address> 83 83 ))) 84 84 85 85 ((( ... ... @@ -88,40 +88,36 @@ 88 88 89 89 90 90 91 -==== (% style="color:blue" %)**Note for set up RSSH server**(%%)====95 +==== **2.1.2.1 Note for set up RSSH server** ==== 92 92 93 - 94 94 If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port. 95 95 96 96 (% class="box" %) 97 97 ((( 98 - **[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.101 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway. 99 99 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME 100 100 sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN) 101 101 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430 ~-~-> Kill PID of this process. 102 102 [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 103 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# **106 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# 104 104 ))) 105 105 106 106 107 - 108 108 == **2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** == 109 109 110 - 111 111 Below gateway support reverse SSH access: 112 112 113 113 (% class="box" %) 114 114 ((( 115 - **Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download116 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download 116 116 LG01N, OLG01N (Note: LG01-P LG01-S doesn't support) 117 117 LG02, OLG02 118 118 LG308, DLOS8 119 119 LPS8 120 -LIG16 **121 +LIG16 121 121 ))) 122 122 123 123 124 - 125 125 === **2.2.1 End User Guide to use SSH access** === 126 126 127 127 ... ... @@ -149,14 +149,14 @@ 149 149 150 150 (% class="box" %) 151 151 ((( 152 - **if you git fail.**(% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)153 - **please install git. ~-~->**(% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.**152 +if you git fail. ~-~-> (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%) 153 +please install git. ~-~-> (% style="color:#4f81bd" %)**yum install git -y or apt-get install git -y.** 154 154 ))) 155 155 156 156 (% class="box" %) 157 157 ((( 158 - **if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**159 - **please install gcc. ~-~->(%%)**158 +if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)** 159 +please install gcc. ~-~->(% style="color:#4f81bd" %)**yum install gcc.** 160 160 ))) 161 161 162 162 [[image:image-20220527105856-3.png]] ... ... @@ -163,11 +163,10 @@ 163 163 164 164 lack of gcc 165 165 166 - 167 167 (% class="box" %) 168 168 ((( 169 - **if you make a fatal error : sqlite3.h,it**(% style="color:#4f81bd" %)**lack of sqlite3.**(%%)170 - **please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).168 +if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%) 169 +please insatell (% style="color:#4f81bd" %)**sqlite3**. 171 171 ))) 172 172 173 173 [[image:image-20220527105918-4.png]] ... ... @@ -235,8 +235,8 @@ 235 235 236 236 (% class="box" %) 237 237 ((( 238 - **if fail to open dpvlry or to bind to it**239 - **please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p 3721 2>&1 &(%%)**(%style="color:#4f81bd" %)(%%)**again**237 +if** fail to open dpvlry or to bind to it** 238 +please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p 3721 2>&1 &** (%%) again 240 240 ))) 241 241 242 242 ... ... @@ -244,13 +244,13 @@ 244 244 ===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) ===== 245 245 246 246 247 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**246 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name) 248 248 249 249 **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx** 250 250 251 251 **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash** 252 252 253 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) **~-~-> Change /bin/bash to /bin/rbash**252 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash 254 254 255 255 **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin** 256 256 ... ... @@ -267,7 +267,7 @@ 267 267 ===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) ===== 268 268 269 269 270 -**1) **(% style="color:#4f81bd" %)**Remote Mgmt**269 +**1) **in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt** 271 271 272 272 [[image:image-20220527110531-7.png]] 273 273 ... ... @@ -298,12 +298,12 @@ 298 298 299 299 (% class="box" %) 300 300 ((( 301 -(% style="color:#4f81bd" %)**Connection Type **(%%) : **If user's least privileged user with private server uses a password, select**(% style="color:#4f81bd" %)**Public Key**(%%)300 +(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%) 302 302 (% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%) 303 -(% style="color:#4f81bd" %)**Login ID**(%%) : **Input user name "eg : "XXXXX"**304 -(% style="color:#4f81bd" %)**Host Address**(%%) : **Input user's private server address**305 -(% style="color:#4f81bd" %)**Connect at Startupt **Choose to enable connect once device is powered.**306 - **Click Save and then Connect**302 +(% style="color:#4f81bd" %)**Login ID**(%%) : Input user name "eg : "XXXXX" 303 +(% style="color:#4f81bd" %)**Host Address**(%%) : Input user's private server address 304 +(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered. 305 +Click Save and then Connect 307 307 ))) 308 308 309 309 ... ... @@ -329,9 +329,8 @@ 329 329 ===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) ===== 330 330 331 331 332 -**1):** **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**331 +**1):** sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey 333 333 334 - 335 335 **Debug:** 336 336 337 337 (% class="box" %) ... ... @@ -340,7 +340,6 @@ 340 340 ))) 341 341 342 342 343 - 344 344 === **2.2.3 How to Ser up a Reverse SSH access** === 345 345 346 346