Configure SWI Target
The following contains different methods on setting up and configuring a Sierra Wireless Module.
To connect to your device you must use either a USB or Serial cable and connect the device directly to your Dev Machine. All other interfaces are turned off by default for security reasons.
Connect using USB
Install a ssh client on your dev machine:
$ sudo apt-get install openssh-client
The default IP for Sierra Wireless devices over USB is 192.168.2.2.
$ ssh root@192.168.2.2
- Note
- Currently there is an outstanding issue in Ubuntu 15.10+ with the ECMUsb driver. This bug may cause Ubuntu Connection Manager to crash. The workaround is to uninstall modemManager on your dev machine.
$ sudo apt-get remove modemmanager
Connect using UART
To connect using the UART port connect a Serial to USB cable to your target and install a serial communications program like Minicom.
Install minicom on your dev machine:
$ sudo apt-get install minicom
Connect using Minicom to the USB Port that your device is plugged into:
$ minicom -D /dev/ttyUSB0
Press enter, and you should be prompted to log in.
- Note
- If ttyUSB0 does not work, try a different port such as ttyUSB1 or ttyUSB2. The port number will need to correspond to the USB port on your dev machine which your USB-to-serial cable is connected.
If the device can not be opened. You may need to add your user to the dialout group.
$ sudo usermod -a -G dialout $USER $ newgrp dialout # Updates the current shell
Setup Login Authentication
In Legato 16.10.0+ a menu will prompt you upon first connection to choose your method of Login Authentication.
It is strongly recommended to setup credentials for remote login. Please select one of the following options: 1) Setup ssh keys and disable passwords-based authentication via ssh (the most secure) 2) Setup password (better than nothing) 3) Do nothing
Setup SSH Keys
This is the method we strongly recommend!
1) On the target, choose 1
to setup ssh keys.
2) On the dev Machine, run configtargetssh (ensure you run bin/legs first to configure the Legato shell).
configtargetssh is a tool that will set your ssh-keys and copy those keys to your target device.
$ configtargetssh 192.168.2.2 # The target device IP
The ssh key pair is only authorized on the dev machine & target that you ran configtargetssh
on. If you need to use the target device on another PC, or set up a new target on the current PC you will have to run configtargetssh
for the new device(s).
- Note
- You can manually setup ssh keys using
ssh-keygen
, and copy the public key to the target's ssh directory for any dev machine.
3) After configtargetssh
finishes, choose 1
(Done), and answer the "are you sure" questions. The configure local console menu will then display:
1) Disable console access (the most secure) 2) Disable password-based authentication for root user account but leave the console for debug messages (less secure) WARNING: This will disable password-based authentication for root user account completely (even over ssh). 3) Enable password-based authentication for root user account
4) Choose 1
if local access through the serial console isn't needed, it's recommended to completely disable console access. Choose 2
if you are only connecting from the dev machine that configtargetssh
was just run. Choose 3
if you are still need to connect to the target from other dev machines that you have not set up ssh keys with. It is recommended to set a strong password if this option is chosen.
- Warning
- Please test your ssh keys and/or passwords in a separate terminal before logging off from all terminals to ensure you don't lose access to your target device.
Setup Password
If you choose to just set up a root password, the system will prompt you through the process, and then ask you if you would like to disable your console access.
Changing password for root Enter the new password (minimum of 5 characters) Please use a combination of upper and lower case letters and numbers. New password: Re-enter new password: passwd: password changed. Configure local console login. Disable console access [Y/n]? You are about to disable console access for all users. Are you sure [y/N]?
Do Nothing
If you choose the option to "Do Nothing", you will be presented the option to choose if you would like to go through this menu the next time you connect to the target.
- Note
- If you choose this option you always have the option of setting up ssh keys using
configtargetssh
, or setting a root password manually usingpasswd
.
Recover a Target
To recover a Sierra Wireless Target Device (e.g., mangOH or WP8545) you must use the proprietary Sierra Wireless flash tool. Instructions and the tool can be found on the Source.
Optional Configuration
To configure other network interfaces, install software or enable/disable Developer Mode:
Section | Description |
---|---|
Configure Ethernet Interface | Configure Ethernet interfaces |
Configure USB Interface | Configure USB interfaces |
Configure Cell Modems | Configure a Cell Modem |
Developer Mode | Manage Developer Mode |
Copyright (C) Sierra Wireless Inc.