Configure Sierra Wireless Module

To connect to your device you must use either a USB or Serial cable and connect the device directly to your Dev Machine. All other interfaces are turned off by default for security reasons.

Connect using USB

Install a ssh client on your dev machine:

$ sudo apt-get install openssh-client

The default IP for Sierra Wireless devices over USB is 192.168.2.2.

$ ssh root@192.168.2.2
Note
Currently there is an outstanding issue in Ubuntu 15.10+ with the ECMUsb driver. This bug may cause Ubuntu Connection Manager to crash. The workaround is to uninstall modemManager on your dev machine. $ sudo apt-get remove modemmanager

Connect using UART

To connect using the UART port connect a Serial to USB cable to your target and install a serial communications program like Minicom.

Install minicom on your dev machine:

$ sudo apt-get install minicom

Connect using Minicom to the USB Port that your device is plugged into:

$ minicom -D /dev/ttyUSB0

Press enter, and you should be prompted to log in.

Note
If ttyUSB0 does not work, try a different port such as ttyUSB1 or ttyUSB2. The port number will need to correspond to the USB port on your dev machine which your USB-to-serial cable is connected.

If the device can not be opened. You may need to add your user to the dialout group.

$ sudo usermod -a -G dialout $USER
$ newgrp dialout # Updates the current shell

Setup Login Authentication

In Legato 16.10.0+ a menu will prompt you upon first connection to choose your method of Login Authentication.

It is strongly recommended to setup credentials for remote login.
  Please select one of the following options:
    1) Setup ssh keys and disable passwords-based authentication via ssh (the most secure)
    2) Setup password (better than nothing)
    3) Do nothing

Setup SSH Keys

This is the method we strongly recommend!

1) On the target, choose 1 to setup ssh keys.

2) On the dev Machine, run configtargetssh (ensure you run bin/legs first to configure the Legato shell).

configtargetssh is a tool that will set your ssh-keys and copy those keys to your target device.

$ configtargetssh 192.168.2.2   # The target device IP

The ssh key pair is only authorized on the dev machine & target that you ran configtargetssh on. If you need to use the target device on another PC, or set up a new target on the current PC you will have to run configtargetssh for the new device(s).

Note
You can manually setup ssh keys using ssh-keygen, and copy the public key to the target's ssh directory for any dev machine.

3) After configtargetssh finishes, choose 1 (Done), and answer the "are you sure" questions. The configure local console menu will then display:

1) Disable console access (the most secure)
2) Disable password-based authentication for root user account
       but leave the console for debug messages (less secure)
       WARNING: This will disable password-based authentication for
       root user account completely (even over ssh).
3) Enable password-based authentication for root user account

4) Choose 1 if local access through the serial console isn't needed, it's recommended to completely disable console access. Choose 2 if you are only connecting from the dev machine that configtargetssh was just run. Choose 3 if you are still need to connect to the target from other dev machines that you have not set up ssh keys with. It is recommended to set a strong password if this option is chosen.

Warning
Please test your ssh keys and/or passwords in a separate terminal before logging off from all terminals to ensure you don't lose access to your target device.

Setup Password

If you choose to just set up a root password, the system will prompt you through the process, and then ask you if you would like to disable your console access.

Changing password for root
Enter the new password (minimum of 5 characters)
Please use a combination of upper and lower case letters and numbers.
New password:
Re-enter new password:
passwd: password changed.

Configure local console login.
  Disable console access [Y/n]?


You are about to disable console access for all users.
Are you sure [y/N]?

Do Nothing

If you choose the option to "Do Nothing", you will be presented the option to choose if you would like to go through this menu the next time you connect to the target.

Note
If you choose this option you always have the option of setting up ssh keys using configtargetssh, or setting a root password manually using passwd.

Recover a Target

To recover a Sierra Wireless Target Device (e.g., mangOH or WP8545) you must use the proprietary Sierra Wireless flash tool. Instructions and the tool can be found on the Source.

Optional Configuration

To configure other network interfaces, install software or enable/disable Developer Mode:

Section Description
Configure Ethernet Interface Configure Ethernet interfaces
Configure USB Interface Configure USB interfaces
Configure Cell Modems Configure a Cell Modem
Developer Mode Manage Developer Mode