eruditek.com
Use this guide to configure IoT gateways (MOKO, KKM, Taguard) to connect to the Mosquitto MQTT broker running on eruditek.com. The broker supports plain MQTT, MQTT over TLS, WebSockets and WSS.
Protocol | Hostname | Port | Security | Notes |
---|---|---|---|---|
MQTT (non-SSL) | eruditek.com | 1883 | None | Standard MQTT |
MQTT (non-SSL, extra) | eruditek.com | 1884 | None | Extra plain TCP port |
MQTT (non-SSL, extra) | eruditek.com | 8884 | None | Extra plain TCP port |
MQTT (TLS) | eruditek.com | 8883 | TLS/SSL | Requires CA certificate |
WebSocket (non-SSL) | eruditek.com | 1885 | None | For browser-based clients |
WebSocket Secure (WSS) | eruditek.com | 8885 | TLS/SSL | Requires CA certificate |
For secure connections (ports 8883
and 8885
), gateways must use the CA certificate that signed the broker certificate.
https://eruditek.com/ca.crt
Host: eruditek.com Port: 8883 # recommended (TLS) Client ID: MOKO-GW01 Username/Password: (leave empty if allow_anonymous = true) TLS Enable: ✔ (if using 8883) CA Certificate: Upload ca.crt
Save & reboot the gateway. Check gateway logs for a successful connection message.
Server: eruditek.com Port: 8883 # secure or 1883 for non-secure Protocol: MQTT (or WSS for websocket-based clients) Client ID: KKM-GW01 TLS/SSL: Enable for 8883 CA Certificate: Upload ca.crt
Broker Address: eruditek.com MQTT Port: 8883 # preferred Client ID: TAGUARD-GW01 Authentication: Disabled (unless you enable username/password later) Enable TLS: ✔ (for 8883) Upload CA Cert: ca.crt
Run these from a machine with mosquitto-clients
installed:
# Non-SSL test mosquitto_sub -h eruditek.com -p 1883 -t "test/topic" -v # TLS test mosquitto_sub -h eruditek.com -p 8883 --cafile ca.crt -t "test/topic" -v
1883,1884,8884,8883,1885,8885
.ping eruditek.com
or dig eruditek.com
.ca.crt
and ensure the gateway trusts it.sudo journalctl -xeu mosquitto.service | tail -50
bind_address
per listener in /etc/mosquitto/mosquitto.conf
.