This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Configuring a LoRaWAN gateway
Laird Connectivity Sentrius RG1xx is an 8-channel LoRaWAN gateway with +27 dBm maximum
transmit power, with support for multiple wireless and wired interfaces such as LoRaWAN,
802.11a/b/g/n, Bluetooth v4.0 and Ethernet. The gateway has been qualified by AWS, and is
available from the AWS Partner Device Catalog
Figure 3 – Laird Connectivity Sentrius RG1xx
Note
This guide uses firmware version 93.8.5.25. For
gateway firmware versions and update procedures, refer to the Laird Connectivity Sentrius RG1xx User Guide
Initial setup and configuration of the Sentrius RG1xx is not in scope of this document.
For the purposes of this guide, it is expected that you have followed the Quick
Start Guide
Figure 4 – Viewing the RG1xx dashboard after setup
With the gateway operational, you are now able to register it with the AWS IoT Core console, using the Extended Unique Identifier (EUI) assigned to the hardware.
Note
Before proceeding, follow the steps outlined in the AWS IoT Developer Guide to configure an IAM role that will allow the Configuration and Update Server (CUPS) to manage gateway credentials.
Once the role exists, you can successfully add the gateway using the console under Wireless connectivity > Gateways.
Figure 5 – Adding a gateway in the AWS IoT console
During the next step in the gateway registration, you will generate and download certificates that allow the gateway to securely communicate with the CUPS server, and to authenticate itself.
-
First, generate and download the
*.cert.pempersonal certificate and*.private.keypersonal private key files required to authenticate the gateway with the CUPS server running in AWS.
Figure 6 – Generating CUPS certificates
-
Download the certificate of the trusted certificate authority (CA) –
cups.trust– and note the assigned CUPS server endpoint for the gateway.
Figure 7 – Noting the CUPS endpoint
-
Back on the RG1xx gateway, choose the
Semtech Basics Stationmode under LoRa > Forwarder, and enter the HTTPS endpoint of the CUPS server endpoint which you noted earlier.You do not require any LoRaWAN Network Server (LNS) configuration, as the LNS WebSocket Secure endpoint details and the certificates required to secure the data plane are downloaded automatically by the gateway using the CUPS protocol.
Figure 8 – Configuring the gateway with a CUPS server
-
Upload the previously downloaded
*.cert.pempersonal certificate and*.private.keypersonal private key files, together with thecups.trustserver trust certificate, to the gateway to secure the CUPS communication.
Figure 9 – Configuring the gateway with CUPS certificates
After the gateway successfully communicates with the CUPS server running in AWS, it can retrieve LNS configurations and establish a secure WebSocket connection. This can be confirmed on the gateway under Dashboard.
Figure 10 – Confirming gateway connectivity to AWS IoT
In the AWS IoT Core for LoRaWAN console, the gateway now registers recent uplink activity from the gateway under Wireless connectivity > Gateways.
Figure 11 – Validating gateway connectivity in AWS IoT console
You are now ready to send LoRaWAN payloads to the gateway using the microprocessor.