eruditek.comUse this guide to configure IoT gateways (MOKO, KKM, Taguard) to connect to the Mosquitto MQTT broker running on eruditek.com. The broker supports plain MQTT, MQTT over TLS, WebSockets and WSS.
| Protocol | Hostname | Port | Security | Notes |
|---|---|---|---|---|
| MQTT (non-SSL) | eruditek.com | 1883 | None | Standard MQTT |
| MQTT (non-SSL, extra) | eruditek.com | 1884 | None | Extra plain TCP port |
| MQTT (non-SSL, extra) | eruditek.com | 8884 | None | Extra plain TCP port |
| MQTT (TLS) | eruditek.com | 8883 | TLS/SSL | Requires CA certificate |
| WebSocket (non-SSL) | eruditek.com | 1885 | None | For browser-based clients |
| WebSocket Secure (WSS) | eruditek.com | 8885 | TLS/SSL | Requires CA certificate |
For secure connections (ports 8883 and 8885), gateways must use the CA certificate that signed the broker certificate.
https://eruditek.com/ca.crt
Host: eruditek.com
Port: 8883 # recommended (TLS)
Client ID: MOKO-GW01
Username/Password: (leave empty if allow_anonymous = true)
TLS Enable: ✔ (if using 8883)
CA Certificate: Upload ca.crt
Save & reboot the gateway. Check gateway logs for a successful connection message.
Server: eruditek.com
Port: 8883 # secure or 1883 for non-secure
Protocol: MQTT (or WSS for websocket-based clients)
Client ID: KKM-GW01
TLS/SSL: Enable for 8883
CA Certificate: Upload ca.crt
Broker Address: eruditek.com
MQTT Port: 8883 # preferred
Client ID: TAGUARD-GW01
Authentication: Disabled (unless you enable username/password later)
Enable TLS: ✔ (for 8883)
Upload CA Cert: ca.crt
Run these from a machine with mosquitto-clients installed:
# Non-SSL test
mosquitto_sub -h eruditek.com -p 1883 -t "test/topic" -v
# TLS test
mosquitto_sub -h eruditek.com -p 8883 --cafile ca.crt -t "test/topic" -v
1883,1884,8884,8883,1885,8885.ping eruditek.com or dig eruditek.com.ca.crt and ensure the gateway trusts it.sudo journalctl -xeu mosquitto.service | tail -50
bind_address per listener in /etc/mosquitto/mosquitto.conf.