Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:hw:025-gate:01-first-steps [2021/01/25 13:06]
avsetula
en:hw:025-gate:01-first-steps [2021/08/09 13:07]
avsetula
Line 1: Line 1:
 ====== First steps ====== ====== First steps ======
-The Unipi Gate is delivered with Linux Debian OS that already includes the [[en:​sw:​03-3rd-party:​nodered|Node-RED]] open-source SW platform - a programming tool for interconnecting hardware devices, various APIs or online services. This article assumes Unipi Gate is in factory settings and uses the OS with Node-RED. ​+<WRAP group> 
 +<WRAP half column 81%> 
 +The Unipi Gate is delivered with Linux Debian OS that already includes the [[en:​sw:​03-3rd-party:​nodered|Node-RED]] open-source SW platform - a programming tool for interconnecting hardware devices, various APIs or online services. This article assumes Unipi Gate is in factory settings and uses the OS with Node-RED. 
 +</​WRAP>​ 
 +<WRAP half column 15%> 
 +;;# 
 +<​html><​span class="​dev-tag dev-gate">​Gate</​span></​html>​ 
 +;;# 
 +</​WRAP>​ 
 +</​WRAP>​
  
 {{ :​en:​sw:​03-3rd-party:​node-red-icon-2.png?​250 |}} {{ :​en:​sw:​03-3rd-party:​node-red-icon-2.png?​250 |}}
Line 12: Line 21:
 {{page>​en:​sw:​03-3rd-party:​nodered:​connection-to-gate-hidden}} {{page>​en:​sw:​03-3rd-party:​nodered:​connection-to-gate-hidden}}
  
-{{page>​en:​sw:​03-3rd-party:​nodered:​securing-os-ssh-hidden}}+{{page>​en:​automation:​securing-os-ssh-hidden}}
  
 ===== Security in Node-RED ===== ===== Security in Node-RED =====
-Securing access to the programming and user interface in Node-RED is as important as securing the OS. If the SW is not secured, unauthorized personnel may gain access to the Unipi controller ​- this can lead to the same consequences as using an OS that was not secured according to [[#​securing_the_os_ssh|the description mentioned above]].+Securing access to the programming and user interface in Node-RED is as important as securing the OS. If the SW is not secured, unauthorized personnel may gain access to the Unipi unit - this can lead to the same consequences as using an OS that was not secured according to [[#​securing_the_os_ssh|the description mentioned above]].
  
 It is thus crucial to **have the Node-RED SW properly secured** each time a new project is created. ​ It is thus crucial to **have the Node-RED SW properly secured** each time a new project is created. ​
Line 21: Line 30:
 ---- ----
  
-As the connection to the device is provided by the **SSH** ​protocol, it is necessary ​to [[en:​files:​software:​tools:​advanced-ip-scan-hidden|know an IP address]] or [[#​mdns_log|mDNS address]] of the device and to have SSH client installed on the user's PC or tablet. One of the most widely used clients for Windows OS is the PuTTY application - [[en:​files:​software:​tools:​putty-hidden|here,​ you can find a user guide and the default passwords]]. +Use the **SSH** ​connection ​to access ​the device and continue with [[https://​nodered.org/​docs/​user-guide/​runtime/​securing-node-red#​editor--admin-api-security|this guide]] on the Node-RED official webpage.
- +
-Further steps are available ​[[https://​nodered.org/​docs/​user-guide/​runtime/​securing-node-red#​editor--admin-api-security|in this guide]] on the Node-RED official webpage.+
  
 ===== Node-RED guides ===== ===== Node-RED guides =====