Skip to content

Commit 3eb0eba

Browse files
committed
Suggested fixes
1 parent 5040910 commit 3eb0eba

File tree

1 file changed

+43
-43
lines changed

1 file changed

+43
-43
lines changed

articles/iot-edge/how-to-create-transparent-gateway.md

Lines changed: 43 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ If you don't have a device ready, you can create one in an Azure virtual machine
7575
# [IoT Edge for Linux on Windows](#tab/eflow)
7676

7777
>[!WARNING]
78-
> Because the IoT Edge for Linux on Windows (EFLOW) virtual machine needs to be accessible from external devices, ensure to deploy EFLOW with an External virtual switch. For more information about EFLOW networking configurations, see [Networking configuration for Azure IoT Edge for Linux on Windows](./how-to-configure-iot-edge-for-linux-on-windows-networking.md).
78+
> Because the IoT Edge for Linux on Windows (EFLOW) virtual machine needs to be accessible from external devices, ensure to deploy EFLOW with an _external_ virtual switch. For more information about EFLOW networking configurations, see [Networking configuration for Azure IoT Edge for Linux on Windows](./how-to-configure-iot-edge-for-linux-on-windows-networking.md).
7979
8080
A Windows device with IoT Edge for Linux on Windows installed.
8181

@@ -117,42 +117,42 @@ If you created the certificates on a different machine, copy them over to your I
117117

118118
# [IoT Edge for Linux on Windows](#tab/eflow)
119119

120-
Now you need to copy the certificates to the Azure IoT Edge for Linux on Windows virtual machine to proceed with the next steps.
121-
122-
1. Open an elevated _PowerShell_ session by starting with **Run as Administrator**.
123-
1. Connect to the EFLOW virtual machine.
124-
```powershell
125-
Connect-EflowVm
126-
```
127-
128-
1. Create the certificates directory - You can select any of the writeable directories. For this tutorial, we'll use the _iotedge-user_ home folder.
129-
```bash
130-
cd ~
131-
mkdir certs
132-
cd certs
133-
mkdir certs
134-
mkdir private
135-
```
136-
137-
1. Exit the EFLOW VM connection.
138-
```bash
139-
exit
140-
```
141-
142-
1. Copy the certificates to the EFLOW virtual machine.
143-
```powershell
144-
# Copy the IoT Edge device CA certificates
145-
Copy-EflowVMFile -fromFile <path>\certs\iot-edge-device-ca-<cert name>-full-chain.cert.pem -toFile /home/iotedge-user/certs/certs/iot-edge-device-ca-<cert name>-full-chain.cert.pem -pushFile
146-
Copy-EflowVMFile -fromFile <path>\private\iot-edge-device-ca-<cert name>.key.pem -toFile /home/iotedge-user/certs/private/iot-edge-device-ca-<cert name>.key.pem -pushFile
147-
148-
# Copy the root CA certificate
149-
Copy-EflowVMFile -fromFile <path>\certs\azure-iot-test-only.root.ca.cert.pem -toFile /home/iotedge-user/certs/certs/azure-iot-test-only.root.ca.cert.pem -pushFile
150-
```
151-
152-
1. Connect to the EFLOW VM and change the permissions of the certificate files as the commands above copies the certificates with root only access permissions.
153-
```powershell
154-
Invoke-EflowVmCommand "sudo chown -R iotedge /home/iotedge-user/certs/"
155-
Invoke-EflowVmCommand "sudo chmod 0644 /home/iotedge-user/certs/"
120+
Now, you need to copy the certificates to the Azure IoT Edge for Linux on Windows virtual machine.
121+
122+
1. Open an elevated _PowerShell_ session by starting with **Run as Administrator**.
123+
1. Connect to the EFLOW virtual machine.
124+
```powershell
125+
Connect-EflowVm
126+
```
127+
128+
1. Create the certificates directory. You can select any writeable directory. For this tutorial, we'll use the _iotedge-user_ home folder.
129+
```bash
130+
cd ~
131+
mkdir certs
132+
cd certs
133+
mkdir certs
134+
mkdir private
135+
```
136+
137+
1. Exit the EFLOW VM connection.
138+
```bash
139+
exit
140+
```
141+
142+
1. Copy the certificates to the EFLOW virtual machine.
143+
```powershell
144+
# Copy the IoT Edge device CA certificates
145+
Copy-EflowVMFile -fromFile <path>\certs\iot-edge-device-ca-<cert name>-full-chain.cert.pem -toFile /home/iotedge-user/certs/certs/iot-edge-device-ca-<cert name>-full-chain.cert.pem -pushFile
146+
Copy-EflowVMFile -fromFile <path>\private\iot-edge-device-ca-<cert name>.key.pem -toFile /home/iotedge-user/certs/private/iot-edge-device-ca-<cert name>.key.pem -pushFile
147+
148+
# Copy the root CA certificate
149+
Copy-EflowVMFile -fromFile <path>\certs\azure-iot-test-only.root.ca.cert.pem -toFile /home/iotedge-user/certs/certs/azure-iot-test-only.root.ca.cert.pem -pushFile
150+
```
151+
152+
1. Invoke the following commands on the EFLOW VM to grant iotedge permissions to the certificate files since `Copy-EflowVMFile` copies files with root only access permissions.
153+
```powershell
154+
Invoke-EflowVmCommand "sudo chown -R iotedge /home/iotedge-user/certs/"
155+
Invoke-EflowVmCommand "sudo chmod 0644 /home/iotedge-user/certs/"
156156
```
157157
----
158158

@@ -165,8 +165,8 @@ Now you need to copy the certificates to the Azure IoT Edge for Linux on Windows
165165
* Linux: `/etc/iotedge/config.yaml`
166166
* IoT Edge for Linux on Windows: `/etc/iotedge/config.yaml`
167167

168-
>[!TIP]
169-
> If you are using IoT Edge for Linux on Windows (EFLOW) you'll have to connect to the EFLOW virtual machine and change the file inside the VM. You can connect to the EFLOW VM using the PowerShell cmdlet `Connect-EflowVm` and then use your preferred editor.
168+
>[!TIP]
169+
> If you are using IoT Edge for Linux on Windows (EFLOW) you'll have to connect to the EFLOW virtual machine and change the file inside the VM. You can connect to the EFLOW VM using the PowerShell cmdlet `Connect-EflowVm` and then use your preferred editor.
170170
171171
1. Find the **Certificate settings** section of the file. Uncomment the four lines starting with **certificates:** and provide the file URIs to your three files as values for the following properties:
172172
* **device_ca_cert**: device CA certificate
@@ -188,7 +188,7 @@ Now you need to copy the certificates to the Azure IoT Edge for Linux on Windows
188188
<!-- iotedge-2020-11 -->
189189
:::moniker range=">=iotedge-2020-11"
190190

191-
1.On your IoT Edge device, open the config file: `/etc/aziot/config.toml` - If you're using IoT Edge for Linux on Windows, you'll have to connect to the EFLOW virtual machine using the `Connect-EflowVm` PowerShell cmdlet.
191+
1. On your IoT Edge device, open the config file: `/etc/aziot/config.toml`. If you're using IoT Edge for Linux on Windows, you'll have to connect to the EFLOW virtual machine using the `Connect-EflowVm` PowerShell cmdlet.
192192

193193
>[!TIP]
194194
>If the config file doesn't exist on your device yet, then use `/etc/aziot/config.toml.edge.template` as a template to create one.
@@ -258,7 +258,7 @@ Standard IoT Edge devices don't need any inbound connectivity to function, becau
258258

259259
# [IoT Edge](#tab/iotedge)
260260

261-
For a gateway scenario to work, at least one of the IoT Edge hub's supported protocols must be open for inbound traffic from downstream devices. The supported protocols are MQTT, AMQP, HTTPS, MQTT over WebSockets, and AMQP over WebSockets.
261+
For a gateway scenario to work, at least one of the IoT Edge Hub's supported protocols must be open for inbound traffic from downstream devices. The supported protocols are MQTT, AMQP, HTTPS, MQTT over WebSockets, and AMQP over WebSockets.
262262

263263
| Port | Protocol |
264264
| ---- | -------- |
@@ -268,15 +268,15 @@ For a gateway scenario to work, at least one of the IoT Edge hub's supported pro
268268

269269
# [IoT Edge for Linux on Windows](#tab/eflow)
270270

271-
For a gateway scenario to work, at least one of the IoT Edge hub's supported protocols must be open for inbound traffic from downstream devices. The supported protocols are MQTT, AMQP, HTTPS, MQTT over WebSockets, and AMQP over WebSockets.
271+
For a gateway scenario to work, at least one of the IoT Edge Hub's supported protocols must be open for inbound traffic from downstream devices. The supported protocols are MQTT, AMQP, HTTPS, MQTT over WebSockets, and AMQP over WebSockets.
272272

273273
| Port | Protocol |
274274
| ---- | -------- |
275275
| 8883 | MQTT |
276276
| 5671 | AMQP |
277277
| 443 | HTTPS <br> MQTT+WS <br> AMQP+WS |
278278

279-
Finally, you must open the EFLOW virtual machine ports. You can open the three ports mentioned above using the following PowerShell cmdlet
279+
Finally, you must open the EFLOW virtual machine ports. You can open the three ports mentioned above using the following PowerShell cmdlets.
280280

281281
```powershell
282282
# Open MQTT port

0 commit comments

Comments
 (0)