Air-Gap RPI-4 with Access Point

For a ready image please check Air-Gap RPI-4 Ready Image, also script is available at prepare-airgapped-server.sh

AP: DE_2025

PW: 1234567890

site: http://airgap.droneengage.com:8001/index.html

email: single@airgap.droneengage.com accesscode: test

Please refer to Authentication Server for more details on how to define users and password.

The following is how to prepare the above image using script.

Prerequisits

1- RPI-4 with RPI-4 with Raspberry OS bullseye-64. The computer should have a statis IP. The scripts assumes 192.168.1.161 put you can change this IP to any local IP you want. In case of RPI-4 you do not need to install the Desktop version. You only need to inslall the server with ssh enabled.

2- It is preferred to have a temporary wired connection on RPI to setup the script.

3- It is recommended to boot RPI-4 from a USB-3 flash memory to get advantage of higher throughtput speed.

Installation

Enter to your Raspberry-PI using ssh or open a terminal on your Ubuntu server.

cd ~

wget https://raw.githubusercontent.com/DroneEngage/DroneEngage_ScriptWiki/refs/heads/main/server_installation/prepare-airgapped-server_w_ap.sh

chmod +x prepare-airgapped-server_w_ap.sh

./prepare-airgapped-server_w_ap.sh

wget https://raw.githubusercontent.com/DroneEngage/DroneEngage_ScriptWiki/refs/heads/main/helper_scripts/create_ap.sh

chmod +x create_ap.sh

./create_ap.sh

The following folders are created on RPI

  1. dnsmasq a DNS server that is up running and configured in /etc/dnsmasq.conf

  2. a folder ~/droneengage_authenticator contains droneengage_authenticator

  3. a folder ~/droneengage_server contains droneengage_server

  4. a folder ~/droneengage_webclient contains droneengage_webclient

  5. a folder ~/map/cachedMap that is empty. This folder can be filled with cached images to be used as a local map server.

you can edit password in ./home/pi/droneengage_authenticator/server.config

Your Raspberry PI-4 now is fully ready

Access Local Domain

  1. Register CA Root

    When the script finishs successfully the following will be created:

    a folder ~/ssl with three files:

    • privkey.pem

    • fullchain.pem

    • root.crt

    you need to copy root.crt into any browser of mobile device that is part of this system. This is a root certificate that is used to tell those devices that fullchain.pem is trusted and hence the conection will be secure and accepted.

    The below images shows how to do that on Chrome .

    register root certificate in Authorities section in Chrome.

    register root certificate in Authorities section in Chrome.

    Similar procedures need to be done on Android phones to be able to connect Andruav.

    Important

    The above ssl is used when you want an local trusted ssl certificate. If you want your server to be exposed to Internet you can create a truely valid ssl certificate from a trusted provider. And you need to have a static IP address not a local one.

  2. Andruav FIX

    Because Andruav runs on a phone and the domain airgap.droneengage.com might not be recognized to it then you need to depend on ip to reach the server. On the RPI server you need to go to

    cd ~/droneengage_server
    nano ./server.config
    
    register root certificate in Authorities section in Chrome.

    and edit

    “public_host” : “airgap.droneengage.com”,

    to

    “public_host” : “192.168.1.161”, // or whateverr IP of RPI Airgap server

    and

    “allow_fake_SSL” : true, // should be TRUE

This public_host is used to by the mobile to access the Communication Server.

Important

You can download a full image from Air-Gap RPI-4 Ready Image