N300 Smart Wi-Fi Router with Power
Ampliers, Managed Switch, and Mode
Selector
Command Reference Guide
Model Keenetic Lite (KN-1310)
OS Version 2.10
Edition 1.17 18.01.2018
help.keenetic.net
© Keenetic Limited, 2018
This guide contains Command-Line Interface (CLI) commands to maintain the Keenetic
Lite device. This guide provides a complete listing of all possible commands. The other
chapters provide examples of how to implement the most common of these commands,
general information on the interrelationships between the commands and the conceptual
background of how to use them.
1 Readership
This guide is for the networking or computer technician responsible for conguring and
maintaining the Keenetic Lite on-site. It is also intended for the operator who manages
the Keenetic Lite. This manual cover high-level technical support procedures available to
Root administrators and Keenetic Lite technical support personnel.
Preface
Preface
2 Organization
This manual covers the following topics:
Introduction to the CLI Describes how to use the Keenetic Lite Command-Line
Interface (CLI), its hierarchical structure, authorization
levels and its help features.
Command Reference Provides an alphabetical list of the available CLI commands
that you can use to congure the Keenetic Lite device.
3 Document Conventions
Command descriptions use the following conventions:
boldface font
italic font
[ optional ]
‹required ›
Commands and keywords are in boldface .
Must be typed exactly as shown. Bold font
is used as a user input in examples.
Arguments for which you supply values are
in italics .
Elements in square brackets are optional.
Elements in angle brackets are required.
(x | y | z)
[x | y | z]
Keenetic Lite (KN-1310) — Command Reference Guide
Alternative keywords are grouped in round
brackets and separated by vertical bars.
Optional alternative keywords are grouped
in brackets and separated by vertical bars.
3
Preface
Each command description is broken down into the following sub-sections:
Description of what the command does. Description
The general format of the command. Synopsis
Prex no
Change settings
Group entry
Interface type
Arguments
Example
The possibility of using no prex with
command.
The ability of command to change the
settings.
The possibility of multiple input. Multiple input
Name of the group that owns the command.
If there is no group, this section does not
displayed.
Type of interface, which can be managed by
the command. The section does not
displayed, if this context has no meaning for
the command.
Interfaces used in the system and the
relationships between them are shown in
the diagrams below.
List of arguments if they exists, and
explanations to them.
An illustration of how the command looks
when invoked. Because the interface is
straightforward, some of the examples are
obvious, but they are included for clarity.
Notes, cautionary statements, and safety warnings use these conventions.
Note: Means "reader take note". Notes contain helpful suggestions or
references to materials not contained in this manual.
Warning: Means "reader be careful". You are capable of doing something that
might result in equipment damage or loss of data.
4
Command Reference Guide — Keenetic Lite (KN-1310)
Contents Overview
Contents Overview
Preface ............................................................................................................................................ 3
Product Overview .......................................................................................................................... 19
Introduction to the CLI .................................................................................................................. 21
Command Reference ..................................................................................................................... 27
Glossary ....................................................................................................................................... 291
Interface Hierarchy ...................................................................................................................... 299
HTTP API ...................................................................................................................................... 301
SNMP MIB ................................................................................................................................... 309
IPsec Encryption Levels ................................................................................................................ 315
Keenetic Lite (KN-1310) — Command Reference Guide
5
Contents Overview
6
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
Table of Contents
Preface .................................................................................................................................... 3
1 Readership ........................................................................................................................... 3
2 Organization ......................................................................................................................... 3
3 Document Conventions ........................................................................................................ 3
Table of Contents .................................................................................................................. 5
Chapter 1
Product Overview ................................................................................................................ 19
1.1 Hardware Conguration .................................................................................................. 19
Chapter 2
Introduction to the CLI ....................................................................................................... 21
2.1 Enter commands in the CLI .............................................................................................. 21
2.1.1 Entering a group ................................................................................................... 22
2.2 Getting Help and auto-completion ................................................................................... 22
2.3 Prex no .......................................................................................................................... 23
2.4 Multiple input ................................................................................................................... 24
2.5 Saving to startup settings ................................................................................................ 24
2.6 Delayed restart ................................................................................................................ 25
Chapter 3
Command Reference .......................................................................................................... 27
3.1 Core commands ............................................................................................................... 27
3.1.1 copy .................................................................................................................... 27
3.1.2 erase ................................................................................................................... 27
3.1.3 exit ...................................................................................................................... 28
3.1.4 ls ......................................................................................................................... 28
3.1.5 more ................................................................................................................... 29
3.2 access-list ...................................................................................................................... 30
3.2.1 access-list deny .................................................................................................. 30
3.2.2 access-list permit ............................................................................................... 33
3.3 cloud control client connect ........................................................................................ 35
3.4 cloud control client name ............................................................................................ 36
3.5 cloud control client session timeout ........................................................................... 37
3.6 components .................................................................................................................. 37
3.6.1 components commit .......................................................................................... 38
3.6.2 components install ............................................................................................ 38
3.6.3 components list ................................................................................................. 39
Keenetic Lite (KN-1310) — Command Reference Guide
7
Table of Contents
3.6.4 components preset ............................................................................................ 40
3.6.5 components preview ......................................................................................... 40
3.6.6 components remove .......................................................................................... 41
3.6.7 components validity-period .............................................................................. 41
3.7 crypto ike key ............................................................................................................... 42
3.8 crypto ike nat-keepalive .............................................................................................. 43
3.9 crypto ike policy ........................................................................................................... 43
3.9.1 crypto ike policy lifetime ................................................................................... 44
3.9.2 crypto ike policy mode ...................................................................................... 45
3.9.3 crypto ike policy negotiation-mode .................................................................. 45
3.9.4 crypto ike policy proposal ................................................................................. 46
3.10 crypto ike proposal ..................................................................................................... 47
3.10.1 crypto ike proposal dh-group .......................................................................... 47
3.10.2 crypto ike proposal encryption ....................................................................... 48
3.10.3 crypto ike proposal integrity .......................................................................... 49
3.11 crypto ipsec transform-set ......................................................................................... 50
3.11.1 crypto ipsec transform-set cypher .................................................................. 50
3.11.2 crypto ipsec transform-set dh-group .............................................................. 51
3.11.3 crypto ipsec transform-set hmac .................................................................... 52
3.11.4 crypto ipsec transform-set lifetime ................................................................ 53
3.12 crypto ipsec prole ..................................................................................................... 53
3.12.1 crypto ipsec prole authentication-local ....................................................... 54
3.12.2 crypto ipsec prole authentication-remote ................................................... 54
3.12.3 crypto ipsec prole dpd-interval ..................................................................... 55
3.12.4 crypto ipsec prole identity-local ................................................................... 56
3.12.5 crypto ipsec prole match-identity-remote ................................................... 57
3.12.6 crypto ipsec prole mode ................................................................................ 57
3.12.7 crypto ipsec prole policy ............................................................................... 58
3.12.8 crypto ipsec prole preshared-key ................................................................. 59
3.12.9 crypto ipsec prole xauth ............................................................................... 59
3.12.10 crypto ipsec prole xauth-identity ............................................................... 60
3.12.11 crypto ipsec prole xauth-password ............................................................. 60
3.13 crypto map .................................................................................................................. 61
3.13.1 crypto map connect ......................................................................................... 62
3.13.2 crypto map enable ........................................................................................... 62
3.13.3 crypto map fallback-check-interval ................................................................ 63
3.13.4 crypto map force-encaps ................................................................................. 63
3.13.5 crypto map match-address ............................................................................. 64
3.13.6 crypto map nail-up ........................................................................................... 64
3.13.7 crypto map set-peer ........................................................................................ 65
3.13.8 crypto map set-peer-fallback .......................................................................... 66
3.13.9 crypto map set-prole ..................................................................................... 66
3.13.10 crypto map set-tcpmss .................................................................................. 67
8
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.13.11 crypto map set-transform ............................................................................. 68
3.13.12 crypto map virtual-ip dns-server ................................................................... 68
3.13.13 crypto map virtual-ip enable ......................................................................... 69
3.13.14 crypto map virtual-ip nat .............................................................................. 69
3.13.15 crypto map virtual-ip range .......................................................................... 70
3.14 dns-proxy .................................................................................................................... 71
3.14.1 dns-proxy bantime ........................................................................................... 71
3.14.2 dns-proxy max-ttl ............................................................................................ 72
3.14.3 dns-proxy proceed ........................................................................................... 72
3.14.4 dns-proxy threshold ........................................................................................ 73
3.15 dyndns prole ............................................................................................................. 74
3.15.1 dyndns prole domain .................................................................................... 74
3.15.2 dyndns prole password ................................................................................. 75
3.15.3 dyndns prole send-address ........................................................................... 75
3.15.4 dyndns prole type .......................................................................................... 76
3.15.5 dyndns prole update-interval ....................................................................... 77
3.15.6 dyndns prole url ............................................................................................ 77
3.15.7 dyndns prole username ................................................................................ 78
3.16 interface ...................................................................................................................... 78
3.16.1 interface authentication chap ........................................................................ 79
3.16.2 interface authentication eap-md5 .................................................................. 79
3.16.3 interface authentication eap-ttls .................................................................... 80
3.16.4 interface authentication identity ................................................................... 80
3.16.5 interface authentication mschap ................................................................... 81
3.16.6 interface authentication mschap-v2 .............................................................. 82
3.16.7 interface authentication pap .......................................................................... 82
3.16.8 interface authentication password ................................................................ 83
3.16.9 interface authentication shared ..................................................................... 83
3.16.10 interface authentication wpa-psk ................................................................ 84
3.16.11 interface bandwidth-limit ............................................................................. 84
3.16.12 interface ccp ................................................................................................... 85
3.16.13 interface channel ........................................................................................... 86
3.16.14 interface channel auto-rescan ...................................................................... 86
3.16.15 interface channel width ................................................................................ 87
3.16.16 interface compatibility .................................................................................. 88
3.16.17 interface connect ........................................................................................... 88
3.16.18 interface country-code .................................................................................. 89
3.16.19 interface debug .............................................................................................. 90
3.16.20 interface description ..................................................................................... 90
3.16.21 interface down ............................................................................................... 91
3.16.22 interface duplex ............................................................................................. 91
3.16.23 interface dyndns prole ................................................................................ 92
3.16.24 interface dyndns update ............................................................................... 92
Keenetic Lite (KN-1310) — Command Reference Guide
9
Table of Contents
3.16.25 interface encryption disable ......................................................................... 93
3.16.26 interface encryption enable .......................................................................... 93
3.16.27 interface encryption key ............................................................................... 94
3.16.28 interface encryption mppe ............................................................................ 95
3.16.29 interface encryption wpa .............................................................................. 95
3.16.30 interface encryption wpa2 ............................................................................ 96
3.16.31 interface owcontrol ..................................................................................... 96
3.16.32 interface hide-ssid ......................................................................................... 97
3.16.33 interface igmp downstream .......................................................................... 98
3.16.34 interface igmp fork ........................................................................................ 98
3.16.35 interface igmp upstream ............................................................................... 99
3.16.36 interface include ............................................................................................ 99
3.16.37 interface inherit ........................................................................................... 100
3.16.38 interface ip access-group ............................................................................ 101
3.16.39 interface ip address ..................................................................................... 101
3.16.40 interface ip address dhcp ............................................................................ 103
3.16.41 interface ip adjust-ttl ................................................................................... 103
3.16.42 interface ip adjust-ttl send .......................................................................... 104
3.16.43 interface ip alias .......................................................................................... 105
3.16.44 interface ip dhcp client class-id ................................................................... 105
3.16.45 interface ip dhcp client debug ..................................................................... 106
3.16.46 interface ip dhcp client displace ................................................................. 107
3.16.47 interface ip dhcp client dns-routes ............................................................. 107
3.16.48 interface ip dhcp client fallback .................................................................. 108
3.16.49 interface ip dhcp client hostname .............................................................. 108
3.16.50 interface ip dhcp client name-servers ........................................................ 109
3.16.51 interface ip dhcp client release ................................................................... 110
3.16.52 interface ip dhcp client renew ..................................................................... 110
3.16.53 interface ip dhcp client routes .................................................................... 111
3.16.54 interface ip global ........................................................................................ 111
3.16.55 interface ip mru ........................................................................................... 112
3.16.56 interface ip mtu ........................................................................................... 112
3.16.57 interface ip remote ...................................................................................... 113
3.16.58 interface ip tcp adjust-mss .......................................................................... 114
3.16.59 interface ipcp default-route ........................................................................ 114
3.16.60 interface ipcp dns-routes ............................................................................. 115
3.16.61 interface ipcp name-servers ........................................................................ 115
3.16.62 interface ipcp vj ........................................................................................... 116
3.16.63 interface ipsec encryption-level .................................................................. 117
3.16.64 interface ipsec ignore .................................................................................. 118
3.16.65 interface ipsec ikev2 .................................................................................... 118
3.16.66 interface ipsec preshared-key ..................................................................... 119
3.16.67 interface ipv6 address ................................................................................. 119
10
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.16.68 interface ipv6 force-default ......................................................................... 120
3.16.69 interface ipv6 name-servers ........................................................................ 120
3.16.70 interface ipv6 prex ..................................................................................... 121
3.16.71 interface ipv6cp ........................................................................................... 122
3.16.72 interface lcp acfc .......................................................................................... 122
3.16.73 interface lcp echo ......................................................................................... 123
3.16.74 interface lcp pfc ........................................................................................... 124
3.16.75 interface mac access-list address ................................................................ 124
3.16.76 interface mac access-list type ..................................................................... 125
3.16.77 interface mac address ................................................................................. 126
3.16.78 interface mac address factory ..................................................................... 126
3.16.79 interface mac clone ..................................................................................... 127
3.16.80 interface peer ............................................................................................... 127
3.16.81 interface ping-check prole ........................................................................ 128
3.16.82 interface power ............................................................................................ 129
3.16.83 interface pppoe service ............................................................................... 129
3.16.84 interface preamble-short ............................................................................ 130
3.16.85 interface rekey-interval ............................................................................... 130
3.16.86 interface rename ......................................................................................... 131
3.16.87 interface rf e2p set ....................................................................................... 131
3.16.88 interface security-level ................................................................................ 132
3.16.89 interface speed ............................................................................................ 133
3.16.90 interface speed nonegotiate ....................................................................... 134
3.16.91 interface ssid ................................................................................................ 134
3.16.92 interface switchport access ......................................................................... 135
3.16.93 interface switchport friend ......................................................................... 136
3.16.94 interface switchport mode .......................................................................... 137
3.16.95 interface switchport trunk .......................................................................... 138
3.16.96 interface trafc-shape ................................................................................. 138
3.16.97 interface tsp ................................................................................................. 139
3.16.98 interface tunnel destination ....................................................................... 141
3.16.99 interface tunnel eoip id ............................................................................... 142
3.16.100 interface tunnel source ............................................................................. 143
3.16.101 interface tx-burst ....................................................................................... 144
3.16.102 interface tx-queue ..................................................................................... 144
3.16.103 interface up ................................................................................................ 145
3.16.104 interface usb power-cycle .......................................................................... 145
3.16.105 interface wmm ........................................................................................... 146
3.16.106 interface wps .............................................................................................. 146
3.16.107 interface wps auto-self-pin ........................................................................ 147
3.16.108 interface wps button ................................................................................. 147
3.16.109 interface wps peer ..................................................................................... 148
3.16.110 interface wps self-pin ................................................................................ 148
Keenetic Lite (KN-1310) — Command Reference Guide
11
Table of Contents
3.17 ip arp ......................................................................................................................... 149
3.18 ip dhcp class .............................................................................................................. 150
3.18.1 ip dhcp class option ....................................................................................... 150
3.19 ip dhcp host ............................................................................................................... 151
3.20 ip dhcp pool ............................................................................................................... 152
3.20.1 ip dhcp pool bind ............................................................................................ 153
3.20.2 ip dhcp pool class ........................................................................................... 153
3.20.3 ip dhcp pool debug ......................................................................................... 155
3.20.4 ip dhcp pool default-router ........................................................................... 155
3.20.5 ip dhcp pool dns-server ................................................................................. 156
3.20.6 ip dhcp pool domain ...................................................................................... 156
3.20.7 ip dhcp pool enable ........................................................................................ 157
3.20.8 ip dhcp pool lease .......................................................................................... 157
3.20.9 ip dhcp pool range ......................................................................................... 158
3.20.10 ip dhcp pool update-dns .............................................................................. 159
3.20.11 ip dhcp pool wpad ........................................................................................ 159
3.21 ip dhcp relay lan ....................................................................................................... 160
3.22 ip dhcp relay server .................................................................................................. 160
3.23 ip dhcp relay wan ...................................................................................................... 161
3.24 ip host ........................................................................................................................ 162
3.25 ip hotspot .................................................................................................................. 162
3.25.1 ip hotspot auto-scan interface ...................................................................... 163
3.25.2 ip hotspot auto-scan interval ........................................................................ 163
3.25.3 ip hotspot auto-scan passive ......................................................................... 164
3.25.4 ip hotspot auto-scan timeout ........................................................................ 165
3.25.5 ip hotspot default-policy ............................................................................... 165
3.25.6 ip hotspot host ............................................................................................... 166
3.25.7 ip hotspot policy ............................................................................................ 167
3.25.8 ip hotspot wake ............................................................................................. 168
3.26 ip http lockout-policy ............................................................................................... 168
3.27 ip http port ................................................................................................................ 169
3.28 ip http proxy ............................................................................................................. 170
3.28.1 ip http proxy allow ......................................................................................... 170
3.28.2 ip http proxy domain ..................................................................................... 171
3.28.3 ip http proxy domain ndns ............................................................................ 172
3.28.4 ip http proxy upstream .................................................................................. 172
3.29 ip http security-level ................................................................................................. 173
3.30 ip http ssl enable ...................................................................................................... 173
3.31 ip name-server .......................................................................................................... 174
3.32 ip nat ......................................................................................................................... 175
3.33 ip nat vpn .................................................................................................................. 176
3.34 ip route ...................................................................................................................... 176
3.35 ip search-domain ...................................................................................................... 178
12
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.36 ip static ...................................................................................................................... 178
3.37 ip telnet ..................................................................................................................... 180
3.37.1 ip telnet lockout-policy .................................................................................. 180
3.37.2 ip telnet port .................................................................................................. 181
3.37.3 ip telnet security-level ................................................................................... 181
3.37.4 ip telnet session max-count .......................................................................... 182
3.37.5 ip telnet session timeout ............................................................................... 183
3.38 ip trafc-shape host ................................................................................................. 183
3.39 ipv6 rewall .............................................................................................................. 184
3.40 ipv6 local-prex ........................................................................................................ 184
3.41 ipv6 name-server ...................................................................................................... 185
3.42 ipv6 route .................................................................................................................. 186
3.43 ipv6 subnet ................................................................................................................ 186
3.43.1 ipv6 subnet bind ............................................................................................ 187
3.43.2 ipv6 subnet mode .......................................................................................... 188
3.43.3 ipv6 subnet number ....................................................................................... 188
3.43.4 ipv6 subnet stateless-dhcp ............................................................................ 189
3.44 isolate-private ........................................................................................................... 189
3.45 known host ............................................................................................................... 190
3.46 ndns ........................................................................................................................... 190
3.46.1 ndns book-name ............................................................................................ 190
3.46.2 ndns check-name ........................................................................................... 193
3.46.3 ndns drop-name ............................................................................................. 194
3.46.4 ndns get-booked ............................................................................................ 195
3.46.5 ndns get-update ............................................................................................. 196
3.47 ntce shaping ............................................................................................................. 198
3.48 ntp ............................................................................................................................. 198
3.49 ntp server .................................................................................................................. 199
3.50 ntp sync-period ......................................................................................................... 199
3.51 opkg chroot ............................................................................................................... 200
3.52 opkg disk ................................................................................................................... 200
3.53 opkg dns-override ..................................................................................................... 201
3.54 opkg initrc ................................................................................................................. 202
3.55 opkg timezone .......................................................................................................... 202
3.56 ping-check prole ..................................................................................................... 203
3.56.1 ping-check prole host .................................................................................. 204
3.56.2 ping-check prole max-fails .......................................................................... 204
3.56.3 ping-check prole min-success ..................................................................... 205
3.56.4 ping-check prole mode ................................................................................ 206
3.56.5 ping-check prole port .................................................................................. 206
3.56.6 ping-check prole power-cycle ..................................................................... 207
3.56.7 ping-check prole restart-interface ............................................................. 207
3.56.8 ping-check prole timeout ............................................................................ 208
Keenetic Lite (KN-1310) — Command Reference Guide
13
Table of Contents
3.56.9 ping-check prole update-interval ............................................................... 208
3.57 ppe ............................................................................................................................. 209
3.58 pppoe pass ................................................................................................................ 209
3.59 schedule .................................................................................................................... 210
3.59.1 schedule action .............................................................................................. 211
3.59.2 schedule description ...................................................................................... 211
3.60 service cloud-control ................................................................................................ 212
3.61 service dhcp .............................................................................................................. 212
3.62 service dhcp-relay ..................................................................................................... 213
3.63 service dns-proxy ...................................................................................................... 213
3.64 service http ............................................................................................................... 214
3.65 service igmp-proxy ................................................................................................... 214
3.66 service ipsec .............................................................................................................. 215
3.67 service ntce ............................................................................................................... 215
3.68 service ntp-client ...................................................................................................... 216
3.69 service snmp ............................................................................................................. 216
3.70 service telnet ............................................................................................................ 217
3.71 service udpxy ............................................................................................................ 217
3.72 service upnp .............................................................................................................. 218
3.73 service vpn-server ..................................................................................................... 218
3.74 show .......................................................................................................................... 219
3.74.1 show associations .......................................................................................... 219
3.74.2 show clock date ............................................................................................. 220
3.74.3 show clock timezone-list ............................................................................... 221
3.74.4 show crypto ike key ....................................................................................... 222
3.74.5 show crypto map ........................................................................................... 222
3.74.6 show dot1x ..................................................................................................... 224
3.74.7 show drivers ................................................................................................... 225
3.74.8 show interface ............................................................................................... 226
3.74.9 show interface bridge .................................................................................... 227
3.74.10 show interface channels .............................................................................. 228
3.74.11 show interface country-codes ..................................................................... 229
3.74.12 show interface mac ...................................................................................... 230
3.74.13 show interface rf e2p ................................................................................... 232
3.74.14 show interface stat ...................................................................................... 233
3.74.15 show interface wps pin ................................................................................ 233
3.74.16 show interface wps status ........................................................................... 234
3.74.17 show ip arp ................................................................................................... 235
3.74.18 show ip dhcp bindings ................................................................................. 236
3.74.19 show ip dhcp pool ........................................................................................ 236
3.74.20 show ip hotspot ............................................................................................ 237
3.74.21 show ip name-server .................................................................................... 239
3.74.22 show ip nat ................................................................................................... 239
14
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.74.23 show ip route ............................................................................................... 240
3.74.24 show ipsec .................................................................................................... 241
3.74.25 show ipv6 addresses .................................................................................... 242
3.74.26 show ipv6 prexes ....................................................................................... 243
3.74.27 show ipv6 routes .......................................................................................... 244
3.74.28 show last-change ......................................................................................... 244
3.74.29 show log ....................................................................................................... 245
3.74.30 show ndns .................................................................................................... 246
3.74.31 show netlter ............................................................................................... 246
3.74.32 show ntce hosts ........................................................................................... 247
3.74.33 show ntp status ............................................................................................ 247
3.74.34 show ping-check .......................................................................................... 248
3.74.35 show running-cong .................................................................................... 249
3.74.36 show self-test ............................................................................................... 252
3.74.37 show site-survey .......................................................................................... 252
3.74.38 show system ................................................................................................. 253
3.74.39 show tags ..................................................................................................... 253
3.74.40 show upnp redirect ...................................................................................... 254
3.74.41 show version ................................................................................................ 255
3.74.42 show vpn-server ........................................................................................... 256
3.75 snmp community ...................................................................................................... 256
3.76 snmp contact ............................................................................................................ 257
3.77 snmp location ........................................................................................................... 257
3.78 system ....................................................................................................................... 258
3.78.1 system button ................................................................................................ 258
3.78.2 system clock date .......................................................................................... 259
3.78.3 system clock timezone .................................................................................. 260
3.78.4 system conguration factory-reset .............................................................. 260
3.78.5 system conguration save ............................................................................ 261
3.78.6 system debug ................................................................................................. 261
3.78.7 system domainname ..................................................................................... 262
3.78.8 system hostname ........................................................................................... 262
3.78.9 system led shutdown ..................................................................................... 263
3.78.10 system log clear ........................................................................................... 264
3.78.11 system log reduction ................................................................................... 264
3.78.12 system log server ......................................................................................... 264
3.78.13 system log suppress ..................................................................................... 265
3.78.14 system mode ................................................................................................ 266
3.78.15 system reboot .............................................................................................. 266
3.78.16 system set .................................................................................................... 267
3.79 tools ........................................................................................................................... 268
3.79.1 tools arping .................................................................................................... 268
3.79.2 tools ping ........................................................................................................ 269
Keenetic Lite (KN-1310) — Command Reference Guide
15
Table of Contents
3.79.3 tools ping6 ...................................................................................................... 270
3.79.4 tools pppoe-discovery .................................................................................... 271
3.79.5 tools traceroute .............................................................................................. 272
3.80 udpxy ......................................................................................................................... 274
3.80.1 udpxy buffer-size ........................................................................................... 274
3.80.2 udpxy buffer-timeout .................................................................................... 275
3.80.3 udpxy interface .............................................................................................. 275
3.80.4 udpxy port ...................................................................................................... 276
3.80.5 udpxy renew-interval .................................................................................... 277
3.80.6 udpxy timeout ................................................................................................ 277
3.81 upnp forward ............................................................................................................ 278
3.82 upnp lan .................................................................................................................... 278
3.83 upnp redirect ............................................................................................................ 279
3.84 user ............................................................................................................................ 280
3.84.1 user password ................................................................................................ 281
3.84.2 user tag .......................................................................................................... 281
3.85 vpn-server ................................................................................................................. 282
3.85.1 vpn-server interface ...................................................................................... 283
3.85.2 vpn-server lcp echo ........................................................................................ 283
3.85.3 vpn-server mppe ............................................................................................ 284
3.85.4 vpn-server mppe-optional ............................................................................. 285
3.85.5 vpn-server mru .............................................................................................. 285
3.85.6 vpn-server mtu ............................................................................................... 286
3.85.7 vpn-server multi-login ................................................................................... 286
3.85.8 vpn-server pool-range ................................................................................... 287
3.85.9 vpn-server static-ip ........................................................................................ 287
3.86 yandexdns ................................................................................................................. 288
3.86.1 yandexdns assign ........................................................................................... 288
3.86.2 yandexdns check-availability ........................................................................ 289
3.86.3 yandexdns enable .......................................................................................... 289
Glossary .............................................................................................................................. 291
Appendix A
Interface Hierarchy ........................................................................................................... 299
Appendix B
HTTP API ............................................................................................................................. 301
B.1 REST Core Interface ....................................................................................................... 301
B.1.1 Resource Location ............................................................................................... 301
B.1.2 Methods .............................................................................................................. 301
B.1.3 Data Format ........................................................................................................ 302
B.2 XML Core Interface ........................................................................................................ 305
B.2.1 Command Request .............................................................................................. 306
B.2.2 Conguration Request ........................................................................................ 307
16
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
B.2.3 Request Packet .................................................................................................... 307
Appendix C
SNMP MIB ........................................................................................................................... 309
C.1 SNMPv2-MIB ................................................................................................................ 309
C.2 IF-MIB ............................................................................................................................ 309
C.3 IP-MIB ............................................................................................................................ 311
C.4 UDP-MIB ........................................................................................................................ 312
C.5 HOST-RESOURCES-MIB .................................................................................................. 312
C.6 UCD-SNMP-MIB ............................................................................................................. 312
Appendix D
IPsec Encryption Levels .................................................................................................... 315
D.1 weak .............................................................................................................................. 315
D.2 normal ........................................................................................................................... 316
D.3 normal-3des .................................................................................................................. 316
D.4 strong ............................................................................................................................ 317
D.5 weak-pfs ........................................................................................................................ 317
D.6 normal-pfs ..................................................................................................................... 319
D.7 normal-3des-pfs ............................................................................................................ 319
Keenetic Lite (KN-1310) — Command Reference Guide
17
Table of Contents
18
Command Reference Guide — Keenetic Lite (KN-1310)
Product Overview
1.1 Hardware Conguration
CPU MT7628NN MIPS® 24KEc 575 MHz
RAM Winbond W9751G6KB-25 64Mb DDR2
Flash Winbond W25Q128JVFQ 16Mb SPI
1
Ethernet
Wi-Fi
Notes Chipset Ports
Integrated 5
Notes Speed Label
WAN port 100 Mbps0
100 Mbps1
100 Mbps2
100 Mbps3
100 Mbps4
Notes Chipset Band
802.11bgn 2x2 MediaTek MT7603 2.4 GHz
Keenetic Lite (KN-1310) — Command Reference Guide19Command Reference Guide — Keenetic Lite (KN-1310)
Chapter 1 Product Overview
20
2
Introduction to the CLI
This chapter describes how to use the Keenetic Lite Command-Line Interface (CLI), its
hierarchical structure, authorization levels and its help features.
The primary tool for managing the Keenetic Lite router is the command line interface (CLI ).
System settings can be dened as a sequence of commands, which can be executed to
bring the device to the specied condition.
Keenetic Lite has three types of settings:
Current settings running cong is a set of commands describing the current
status of the system. Current settings are stored in RAM and
reect every change of the system settings. However, the
content of RAM is lost when the device is turned off. To
restore the settings after reboot, they must be saved in
non-volatile memory.
Startup conguration startup cong is a sequence of commands, which is stored in
a specic partition of the non-volatile memory. It is used to
initialize the system immediately after startup.
Default settings default cong contains factory default settings of Keenetic
Lite. RESET button is used to reset startup conguration to
the factory default.
Files startup-config and running-config can be edited manually, without participation
of the command line. It should be remembered that the lines with ! in the beginning are
ignored by the parser and the arguments which contain spaces must be enclosed in double
quotes (for example, ssid "Free Wi-Fi"). Quotes themselves are ignored by the parser.
Responsibility for the accuracy of the changes rests with their author.
2.1 Enter commands in the CLI
Command line interpreter in Keenetic Lite is designed for beginners as well as experts.
All command names and options are clear and easy to remember.
Commands are divided into groups and arranged in a hierarchy. Thus, to do a setting, the
operator needs to enter a sequence of nested command group names (node commands),
and then enter the nal command with parameters.
For example, IP-address of the FastEthernet0/Vlan2 network interface is set using the
address command, which is located in the interface → ip group:
(config)>interface FastEthernet0/Vlan2 ip address 192.168.15.43/24
Network address saved.
Keenetic Lite (KN-1310) — Command Reference Guide
21
Chapter 2 Introduction to the CLI
2.1.1 Entering a group
Some of the node commands (containing a group of child commands) can be “entered”
to allow direct executing of the child commands without typing the node name as prex.
In this case the prompt is changed to indicate the entered group.
The exit command or [Ctrl]+[D] key combination can be used to exit a group.
For example, after entering the interface group the command line prompt is changed to
(config-if):
(config)>interface FastEthernet0/Vlan2
(config-if)>ip address 192.168.15.43/24
Network address saved.
(config-if)>[Ctrl]+[D]
(config)>
2.2 Getting Help and auto-completion
To make the conguring process as comfortable as possible, the CLI provides
auto-completion of commands and parameters, hinting the operator, which commands
are available at the current level of nesting. Auto-completion works by pressing [Tab].
Example:
(config)>in[Tab]
interface - network interface configuration
(config)> interface Fa[Tab]
Usage template:
interface {name}
Variants:
FastEthernet0
FastEthernet0/Vlan1
FastEthernet0/Vlan2
(config)> interface FastEthernet0[Tab]
Usage template:
interface {name}
Variants:
FastEthernet0/Vlan1
FastEthernet0/Vlan2
(config)> interface FastEthernet0[Enter]
(config-if)> ip[Tab]
22
address - set interface IP address
alias - add interface IP alias
dhcp - enable dhcp client
Command Reference Guide — Keenetic Lite (KN-1310)
Chapter 2 Introduction to the CLI
mtu - set Maximum Transmit Unit size
mru - set Maximum Receive Unit size
access-group - bind access-control rules
apn - set 3G access point name
(config-if)> ip ad[Tab]
address - set interface IP address
(config-if)> ip address[Tab]
Usage template:
address {address} {mask}
(config-if)> ip address 192.168.15.43[Enter]
Configurator error[852002]: address: argument parse error.
(config-if)> ip address 192.168.15.43/24[Enter]
Network address saved.
(config-if)>
Hint for the current command can always be displayed by pressing [?]. Example:
(config)> interface FastEthernet0/Vlan2 [?]
description - set interface description
alias - add interface name alias
mac-address - set interface MAC address
dyndns - DynDns updates
security-level - assign security level
authentication - configure authentication
(config)> interface FastEthernet0/Vlan2
2.3 Prex no
Prex no is used to negate a command.
For example, the command interface is responsible for creating a network interface with
the given name. When used with this command, prex no causes the opposite action —
removing of the interface:
(config)> no interface PPPoE0
ip - set interface IP parameters
igmp - set interface IGMP parameters
up - enable interface
down - disable interface
If the command is composite, no can be placed in front of any member. For example,
service dhcp enables the DHCP service. It consists of two parts: service — the group name
in the hierarchy of commands, and dhcp — the nal command. Prex no can be placed
either at the beginning, or in the middle. The action is the same in both cases: stopping
of the service.
Keenetic Lite (KN-1310) — Command Reference Guide
23
Chapter 2 Introduction to the CLI
(config)> no service dhcp
(config)> service no dhcp
2.4 Multiple input
Many commands have the property of idempotence , which means that multiple input of a
command has the same effect as as the single input. For example, entering service http
adds a single line “service http ” to the current settings, and re-entering does not change
anything.
However, some of the commands allow you to add not a single, but multiple records, if
they are entered with different arguments. For example, static routing table entries ip
route or lters access-list are added sequentially and appear in the settings as a list:
Example 2.1. Using a command with multiple input
(config)> ip route 1.1.1.0/24 PPTP0
Network::RoutingTable: Added static route: 1.1.1.0/24 via PPTP0.
(config)> ip route 1.1.2.0/24 PPTP0
Network::RoutingTable: Added static route: 1.1.2.0/24 via PPTP0.
(config)> ip route 1.1.3.0/24 PPTP1
Network::RoutingTable: Added static route: 1.1.3.0/24 via PPTP1.
(config)> show running-config
...
ip route 1.1.1.0 255.255.255.0 PPTP0
ip route 1.1.2.0 255.255.255.0 PPTP0
ip route 1.1.3.0 255.255.255.0 PPTP1
...
Records from such tables can be removed one by one, using prex no and arguments to
identify the record you want to remove:
(config)> no ip route 1.1.2.0/24
Network::RoutingTable: Deleted static route: 1.1.2.0/24 via PPTP0.
(config)> show running-config
...
ip route 1.1.1.0 255.255.255.0 PPTP0
ip route 1.1.3.0 255.255.255.0 PPTP1
...
2.5 Saving to startup settings
Current and startup settings are stored in the les running-cong and startup-cong,
respectively. To save the current settings in the non-volatile memory, copy them as shown
below:
(config)> copy running-config startup-config
Copied: running-config -> startup-config
24
Command Reference Guide — Keenetic Lite (KN-1310)
2.6 Delayed restart
If Keenetic Lite device is located away from the operator and is managed remotely, there
is a risk to lose control over it because of a misoperation. In this case it will be difcult to
reboot and return to the saved settings.
The system reboot command lets you set a delayed restart timer, perform “risky” settings,
then turn off the timer and save the changes. If connection to the device is lost during
conguration, the operator will be enough to wait for automatic reboot and connect to
the device again.
Chapter 2 Introduction to the CLI
Keenetic Lite (KN-1310) — Command Reference Guide
25
Chapter 2 Introduction to the CLI
26
Command Reference Guide — Keenetic Lite (KN-1310)
3
Command Reference
3.1 Core commands
Core commands are used to manage les on your device.
3.1.1 copy
Description Copy the contents of one le to another. Used for the rmware updating,
saving the current settings, resetting to factory, etc.
Prex no No
Change settings No
Multiple input No
Synopsis
Arguments
Example Current settings can be saved as follows:
History
(cong)> copy ‹source › ‹destination ›
Description Value Argument
Filename source
(config)> copy running-config startup-config
File names in this example are aliases. Full names of the conguration les
are system:running-config and flash:startup-config , respectively.
Version Description
The copy command has been introduced. 2.00
Full path to the le to be copied in <le
system>:<path> format
Full path to the directory for the new le.Filenamedestination
3.1.2 erase
Description Delete a le from the Keenetic Lite device.
Prex no No
Change settings Yes
Keenetic Lite (KN-1310) — Command Reference Guide
27
Chapter 3 Command Reference
Multiple input Yes
Synopsis
Arguments
Example
History
(cong)> erase ‹filename ›
(config)> erase FLASH:swap
Erased FLASH:swap.
Version Description
The erase command has been introduced. 2.00
3.1.3 exit
Description Leave the command node.
Prex no No
Change settings No
Multiple input No
Description Value Argument
Species the le to be removed.Filenamefilename
Synopsis
Example
History
(cong)> exit
(config-dyndns)> exit
(config)>
Version Description
The exit command has been introduced. 2.00
3.1.4 ls
Description Display list of les from the specied directory.
Prex no No
Change settings No
Multiple input No
Synopsis
(cong)> ls [ directory ]
28
Command Reference Guide — Keenetic Lite (KN-1310)
Chapter 3 Command Reference
Arguments
Example
String directory
(config)> ls temp:
rel: temp:
entry, type = R:
entry, type = D:
entry, type = D:
entry, type = R:
entry, type = R:
entry, type = D:
entry, type = D:
entry, type = D:
entry, type = D:
entry, type = D:
entry, type = D:
Description Value Argument
Path to the directory. Must contain the
name of the le system and path to the
folder directly in the following format <le
system>:<path>. Examples of le systems
— ash, temp, proc, usb. etc.
name: resolv.conf
size: 107
name: db
name: dhcp6c
name: TZ
size: 6
name: passwd
size: 128
name: dnscache
name: mnt
name: tmp
name: ppp
name: lib
name: run
History
Version Description
The ls command has been introduced. 2.00
3.1.5 more
Description Display the contents of a text le line by line.
Prex no No
Change settings No
Multiple input No
Keenetic Lite (KN-1310) — Command Reference Guide
29
Chapter 3 Command Reference
Synopsis
Arguments
Example
History
(cong)> more ‹filename ›
Description Value Argument
Full path to the le or alias. Filename filename
(config)> more temp:resolv.conf
nameserver 82.138.7.15
nameserver 82.138.7.251
nameserver 82.138.7.130
options timeout:1 attempts:3 rotate
Version Description
The more command has been introduced. 2.00
3.2 access-list
Description Access to a group of commands to congure the selected list of packet ltering
rules. If the list is not found, the command tries to create it. Such a list can
be assigned to a network interface using interface ip access-group command.
Command with no prex removes the list of rules.
Prex no Yes
Change settings Yes
Multiple input Yes
Group entry (config-acl)
Synopsis
Arguments
History
(cong)> access-list ‹name ›
(cong)> no access-list ‹name ›
Version Description
Description Value Argument
Stringname
The access-list command has been introduced. 2.00
Filtering rules list name (Access Control List ,
ACL).
3.2.1 access-list deny
Description Add a packet ltering deny rule into a specied ACL .
30
Command Reference Guide — Keenetic Lite (KN-1310)