KeeNetic Lite KN-1310 Command Reference Manual

N300 Smart Wi-Fi Router with Power Ampliers, Managed Switch, and Mode Selector

Command Reference Guide

Model Keenetic Lite (KN-1310) OS Version 2.10 Edition 1.17 18.01.2018
help.keenetic.net
This guide contains Command-Line Interface (CLI) commands to maintain the Keenetic Lite device. This guide provides a complete listing of all possible commands. The other chapters provide examples of how to implement the most common of these commands, general information on the interrelationships between the commands and the conceptual background of how to use them.

1 Readership

This guide is for the networking or computer technician responsible for conguring and maintaining the Keenetic Lite on-site. It is also intended for the operator who manages the Keenetic Lite. This manual cover high-level technical support procedures available to Root administrators and Keenetic Lite technical support personnel.

Preface

Preface

2 Organization

This manual covers the following topics:
Introduction to the CLI Describes how to use the Keenetic Lite Command-Line
Interface (CLI), its hierarchical structure, authorization levels and its help features.
Command Reference Provides an alphabetical list of the available CLI commands
that you can use to congure the Keenetic Lite device.

3 Document Conventions

Command descriptions use the following conventions:
boldface font
italic font
[ optional ]
required
Commands and keywords are in boldface. Must be typed exactly as shown. Bold font is used as a user input in examples.
Arguments for which you supply values are in italics.
Elements in square brackets are optional.
Elements in angle brackets are required.
(x | y | z)
[x | y | z]
Keenetic Lite (KN-1310) — Command Reference Guide
Alternative keywords are grouped in round brackets and separated by vertical bars.
Optional alternative keywords are grouped in brackets and separated by vertical bars.
3
Preface
Each command description is broken down into the following sub-sections:
Description of what the command does.Description
The general format of the command.Synopsis
Prex no
Change settings
Group entry
Interface type
Arguments
Example
The possibility of using no prex with command.
The ability of command to change the settings.
The possibility of multiple input.Multiple input
Name of the group that owns the command. If there is no group, this section does not displayed.
Type of interface, which can be managed by the command. The section does not displayed, if this context has no meaning for the command.
Interfaces used in the system and the relationships between them are shown in the diagrams below.
List of arguments if they exists, and explanations to them.
An illustration of how the command looks when invoked. Because the interface is straightforward, some of the examples are obvious, but they are included for clarity.
Notes, cautionary statements, and safety warnings use these conventions.
Note: Means "reader take note". Notes contain helpful suggestions or
references to materials not contained in this manual.
Warning: Means "reader be careful". You are capable of doing something that
might result in equipment damage or loss of data.
4
Command Reference Guide — Keenetic Lite (KN-1310)
Contents Overview
Contents Overview
Preface ............................................................................................................................................ 3
Product Overview .......................................................................................................................... 19
Introduction to the CLI .................................................................................................................. 21
Command Reference ..................................................................................................................... 27
Glossary ....................................................................................................................................... 291
Interface Hierarchy ...................................................................................................................... 299
HTTP API ...................................................................................................................................... 301
SNMP MIB ................................................................................................................................... 309
IPsec Encryption Levels ................................................................................................................ 315
Keenetic Lite (KN-1310) — Command Reference Guide
5
Contents Overview
6
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
Table of Contents
Preface .................................................................................................................................... 3
1 Readership ........................................................................................................................... 3
2 Organization ......................................................................................................................... 3
3 Document Conventions ........................................................................................................ 3
Table of Contents .................................................................................................................. 5
Chapter 1
Product Overview ................................................................................................................ 19
1.1 Hardware Conguration .................................................................................................. 19
Chapter 2
Introduction to the CLI ....................................................................................................... 21
2.1 Enter commands in the CLI .............................................................................................. 21
2.1.1 Entering a group ................................................................................................... 22
2.2 Getting Help and auto-completion ................................................................................... 22
2.3 Prex no .......................................................................................................................... 23
2.4 Multiple input ................................................................................................................... 24
2.5 Saving to startup settings ................................................................................................ 24
2.6 Delayed restart ................................................................................................................ 25
Chapter 3
Command Reference .......................................................................................................... 27
3.1 Core commands ............................................................................................................... 27
3.1.1 copy .................................................................................................................... 27
3.1.2 erase ................................................................................................................... 27
3.1.3 exit ...................................................................................................................... 28
3.1.4 ls ......................................................................................................................... 28
3.1.5 more ................................................................................................................... 29
3.2 access-list ...................................................................................................................... 30
3.2.1 access-list deny .................................................................................................. 30
3.2.2 access-list permit ............................................................................................... 33
3.3 cloud control client connect ........................................................................................ 35
3.4 cloud control client name ............................................................................................ 36
3.5 cloud control client session timeout ........................................................................... 37
3.6 components .................................................................................................................. 37
3.6.1 components commit .......................................................................................... 38
3.6.2 components install ............................................................................................ 38
3.6.3 components list ................................................................................................. 39
Keenetic Lite (KN-1310) — Command Reference Guide
7
Table of Contents
3.6.4 components preset ............................................................................................ 40
3.6.5 components preview ......................................................................................... 40
3.6.6 components remove .......................................................................................... 41
3.6.7 components validity-period .............................................................................. 41
3.7 crypto ike key ............................................................................................................... 42
3.8 crypto ike nat-keepalive .............................................................................................. 43
3.9 crypto ike policy ........................................................................................................... 43
3.9.1 crypto ike policy lifetime ................................................................................... 44
3.9.2 crypto ike policy mode ...................................................................................... 45
3.9.3 crypto ike policy negotiation-mode .................................................................. 45
3.9.4 crypto ike policy proposal ................................................................................. 46
3.10 crypto ike proposal ..................................................................................................... 47
3.10.1 crypto ike proposal dh-group .......................................................................... 47
3.10.2 crypto ike proposal encryption ....................................................................... 48
3.10.3 crypto ike proposal integrity .......................................................................... 49
3.11 crypto ipsec transform-set ......................................................................................... 50
3.11.1 crypto ipsec transform-set cypher .................................................................. 50
3.11.2 crypto ipsec transform-set dh-group .............................................................. 51
3.11.3 crypto ipsec transform-set hmac .................................................................... 52
3.11.4 crypto ipsec transform-set lifetime ................................................................ 53
3.12 crypto ipsec prole ..................................................................................................... 53
3.12.1 crypto ipsec prole authentication-local ....................................................... 54
3.12.2 crypto ipsec prole authentication-remote ................................................... 54
3.12.3 crypto ipsec prole dpd-interval ..................................................................... 55
3.12.4 crypto ipsec prole identity-local ................................................................... 56
3.12.5 crypto ipsec prole match-identity-remote ................................................... 57
3.12.6 crypto ipsec prole mode ................................................................................ 57
3.12.7 crypto ipsec prole policy ............................................................................... 58
3.12.8 crypto ipsec prole preshared-key ................................................................. 59
3.12.9 crypto ipsec prole xauth ............................................................................... 59
3.12.10 crypto ipsec prole xauth-identity ............................................................... 60
3.12.11 crypto ipsec prole xauth-password ............................................................. 60
3.13 crypto map .................................................................................................................. 61
3.13.1 crypto map connect ......................................................................................... 62
3.13.2 crypto map enable ........................................................................................... 62
3.13.3 crypto map fallback-check-interval ................................................................ 63
3.13.4 crypto map force-encaps ................................................................................. 63
3.13.5 crypto map match-address ............................................................................. 64
3.13.6 crypto map nail-up ........................................................................................... 64
3.13.7 crypto map set-peer ........................................................................................ 65
3.13.8 crypto map set-peer-fallback .......................................................................... 66
3.13.9 crypto map set-prole ..................................................................................... 66
3.13.10 crypto map set-tcpmss .................................................................................. 67
8
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.13.11 crypto map set-transform ............................................................................. 68
3.13.12 crypto map virtual-ip dns-server ................................................................... 68
3.13.13 crypto map virtual-ip enable ......................................................................... 69
3.13.14 crypto map virtual-ip nat .............................................................................. 69
3.13.15 crypto map virtual-ip range .......................................................................... 70
3.14 dns-proxy .................................................................................................................... 71
3.14.1 dns-proxy bantime ........................................................................................... 71
3.14.2 dns-proxy max-ttl ............................................................................................ 72
3.14.3 dns-proxy proceed ........................................................................................... 72
3.14.4 dns-proxy threshold ........................................................................................ 73
3.15 dyndns prole ............................................................................................................. 74
3.15.1 dyndns prole domain .................................................................................... 74
3.15.2 dyndns prole password ................................................................................. 75
3.15.3 dyndns prole send-address ........................................................................... 75
3.15.4 dyndns prole type .......................................................................................... 76
3.15.5 dyndns prole update-interval ....................................................................... 77
3.15.6 dyndns prole url ............................................................................................ 77
3.15.7 dyndns prole username ................................................................................ 78
3.16 interface ...................................................................................................................... 78
3.16.1 interface authentication chap ........................................................................ 79
3.16.2 interface authentication eap-md5 .................................................................. 79
3.16.3 interface authentication eap-ttls .................................................................... 80
3.16.4 interface authentication identity ................................................................... 80
3.16.5 interface authentication mschap ................................................................... 81
3.16.6 interface authentication mschap-v2 .............................................................. 82
3.16.7 interface authentication pap .......................................................................... 82
3.16.8 interface authentication password ................................................................ 83
3.16.9 interface authentication shared ..................................................................... 83
3.16.10 interface authentication wpa-psk ................................................................ 84
3.16.11 interface bandwidth-limit ............................................................................. 84
3.16.12 interface ccp ................................................................................................... 85
3.16.13 interface channel ........................................................................................... 86
3.16.14 interface channel auto-rescan ...................................................................... 86
3.16.15 interface channel width ................................................................................ 87
3.16.16 interface compatibility .................................................................................. 88
3.16.17 interface connect ........................................................................................... 88
3.16.18 interface country-code .................................................................................. 89
3.16.19 interface debug .............................................................................................. 90
3.16.20 interface description ..................................................................................... 90
3.16.21 interface down ............................................................................................... 91
3.16.22 interface duplex ............................................................................................. 91
3.16.23 interface dyndns prole ................................................................................ 92
3.16.24 interface dyndns update ............................................................................... 92
Keenetic Lite (KN-1310) — Command Reference Guide
9
Table of Contents
3.16.25 interface encryption disable ......................................................................... 93
3.16.26 interface encryption enable .......................................................................... 93
3.16.27 interface encryption key ............................................................................... 94
3.16.28 interface encryption mppe ............................................................................ 95
3.16.29 interface encryption wpa .............................................................................. 95
3.16.30 interface encryption wpa2 ............................................................................ 96
3.16.31 interface owcontrol ..................................................................................... 96
3.16.32 interface hide-ssid ......................................................................................... 97
3.16.33 interface igmp downstream .......................................................................... 98
3.16.34 interface igmp fork ........................................................................................ 98
3.16.35 interface igmp upstream ............................................................................... 99
3.16.36 interface include ............................................................................................ 99
3.16.37 interface inherit ........................................................................................... 100
3.16.38 interface ip access-group ............................................................................ 101
3.16.39 interface ip address ..................................................................................... 101
3.16.40 interface ip address dhcp ............................................................................ 103
3.16.41 interface ip adjust-ttl ................................................................................... 103
3.16.42 interface ip adjust-ttl send .......................................................................... 104
3.16.43 interface ip alias .......................................................................................... 105
3.16.44 interface ip dhcp client class-id ................................................................... 105
3.16.45 interface ip dhcp client debug ..................................................................... 106
3.16.46 interface ip dhcp client displace ................................................................. 107
3.16.47 interface ip dhcp client dns-routes ............................................................. 107
3.16.48 interface ip dhcp client fallback .................................................................. 108
3.16.49 interface ip dhcp client hostname .............................................................. 108
3.16.50 interface ip dhcp client name-servers ........................................................ 109
3.16.51 interface ip dhcp client release ................................................................... 110
3.16.52 interface ip dhcp client renew ..................................................................... 110
3.16.53 interface ip dhcp client routes .................................................................... 111
3.16.54 interface ip global ........................................................................................ 111
3.16.55 interface ip mru ........................................................................................... 112
3.16.56 interface ip mtu ........................................................................................... 112
3.16.57 interface ip remote ...................................................................................... 113
3.16.58 interface ip tcp adjust-mss .......................................................................... 114
3.16.59 interface ipcp default-route ........................................................................ 114
3.16.60 interface ipcp dns-routes ............................................................................. 115
3.16.61 interface ipcp name-servers ........................................................................ 115
3.16.62 interface ipcp vj ........................................................................................... 116
3.16.63 interface ipsec encryption-level .................................................................. 117
3.16.64 interface ipsec ignore .................................................................................. 118
3.16.65 interface ipsec ikev2 .................................................................................... 118
3.16.66 interface ipsec preshared-key ..................................................................... 119
3.16.67 interface ipv6 address ................................................................................. 119
10
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.16.68 interface ipv6 force-default ......................................................................... 120
3.16.69 interface ipv6 name-servers ........................................................................ 120
3.16.70 interface ipv6 prex ..................................................................................... 121
3.16.71 interface ipv6cp ........................................................................................... 122
3.16.72 interface lcp acfc .......................................................................................... 122
3.16.73 interface lcp echo ......................................................................................... 123
3.16.74 interface lcp pfc ........................................................................................... 124
3.16.75 interface mac access-list address ................................................................ 124
3.16.76 interface mac access-list type ..................................................................... 125
3.16.77 interface mac address ................................................................................. 126
3.16.78 interface mac address factory ..................................................................... 126
3.16.79 interface mac clone ..................................................................................... 127
3.16.80 interface peer ............................................................................................... 127
3.16.81 interface ping-check prole ........................................................................ 128
3.16.82 interface power ............................................................................................ 129
3.16.83 interface pppoe service ............................................................................... 129
3.16.84 interface preamble-short ............................................................................ 130
3.16.85 interface rekey-interval ............................................................................... 130
3.16.86 interface rename ......................................................................................... 131
3.16.87 interface rf e2p set ....................................................................................... 131
3.16.88 interface security-level ................................................................................ 132
3.16.89 interface speed ............................................................................................ 133
3.16.90 interface speed nonegotiate ....................................................................... 134
3.16.91 interface ssid ................................................................................................ 134
3.16.92 interface switchport access ......................................................................... 135
3.16.93 interface switchport friend ......................................................................... 136
3.16.94 interface switchport mode .......................................................................... 137
3.16.95 interface switchport trunk .......................................................................... 138
3.16.96 interface trafc-shape ................................................................................. 138
3.16.97 interface tsp ................................................................................................. 139
3.16.98 interface tunnel destination ....................................................................... 141
3.16.99 interface tunnel eoip id ............................................................................... 142
3.16.100 interface tunnel source ............................................................................. 143
3.16.101 interface tx-burst ....................................................................................... 144
3.16.102 interface tx-queue ..................................................................................... 144
3.16.103 interface up ................................................................................................ 145
3.16.104 interface usb power-cycle .......................................................................... 145
3.16.105 interface wmm ........................................................................................... 146
3.16.106 interface wps .............................................................................................. 146
3.16.107 interface wps auto-self-pin ........................................................................ 147
3.16.108 interface wps button ................................................................................. 147
3.16.109 interface wps peer ..................................................................................... 148
3.16.110 interface wps self-pin ................................................................................ 148
Keenetic Lite (KN-1310) — Command Reference Guide
11
Table of Contents
3.17 ip arp ......................................................................................................................... 149
3.18 ip dhcp class .............................................................................................................. 150
3.18.1 ip dhcp class option ....................................................................................... 150
3.19 ip dhcp host ............................................................................................................... 151
3.20 ip dhcp pool ............................................................................................................... 152
3.20.1 ip dhcp pool bind ............................................................................................ 153
3.20.2 ip dhcp pool class ........................................................................................... 153
3.20.3 ip dhcp pool debug ......................................................................................... 155
3.20.4 ip dhcp pool default-router ........................................................................... 155
3.20.5 ip dhcp pool dns-server ................................................................................. 156
3.20.6 ip dhcp pool domain ...................................................................................... 156
3.20.7 ip dhcp pool enable ........................................................................................ 157
3.20.8 ip dhcp pool lease .......................................................................................... 157
3.20.9 ip dhcp pool range ......................................................................................... 158
3.20.10 ip dhcp pool update-dns .............................................................................. 159
3.20.11 ip dhcp pool wpad ........................................................................................ 159
3.21 ip dhcp relay lan ....................................................................................................... 160
3.22 ip dhcp relay server .................................................................................................. 160
3.23 ip dhcp relay wan ...................................................................................................... 161
3.24 ip host ........................................................................................................................ 162
3.25 ip hotspot .................................................................................................................. 162
3.25.1 ip hotspot auto-scan interface ...................................................................... 163
3.25.2 ip hotspot auto-scan interval ........................................................................ 163
3.25.3 ip hotspot auto-scan passive ......................................................................... 164
3.25.4 ip hotspot auto-scan timeout ........................................................................ 165
3.25.5 ip hotspot default-policy ............................................................................... 165
3.25.6 ip hotspot host ............................................................................................... 166
3.25.7 ip hotspot policy ............................................................................................ 167
3.25.8 ip hotspot wake ............................................................................................. 168
3.26 ip http lockout-policy ............................................................................................... 168
3.27 ip http port ................................................................................................................ 169
3.28 ip http proxy ............................................................................................................. 170
3.28.1 ip http proxy allow ......................................................................................... 170
3.28.2 ip http proxy domain ..................................................................................... 171
3.28.3 ip http proxy domain ndns ............................................................................ 172
3.28.4 ip http proxy upstream .................................................................................. 172
3.29 ip http security-level ................................................................................................. 173
3.30 ip http ssl enable ...................................................................................................... 173
3.31 ip name-server .......................................................................................................... 174
3.32 ip nat ......................................................................................................................... 175
3.33 ip nat vpn .................................................................................................................. 176
3.34 ip route ...................................................................................................................... 176
3.35 ip search-domain ...................................................................................................... 178
12
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.36 ip static ...................................................................................................................... 178
3.37 ip telnet ..................................................................................................................... 180
3.37.1 ip telnet lockout-policy .................................................................................. 180
3.37.2 ip telnet port .................................................................................................. 181
3.37.3 ip telnet security-level ................................................................................... 181
3.37.4 ip telnet session max-count .......................................................................... 182
3.37.5 ip telnet session timeout ............................................................................... 183
3.38 ip trafc-shape host ................................................................................................. 183
3.39 ipv6 rewall .............................................................................................................. 184
3.40 ipv6 local-prex ........................................................................................................ 184
3.41 ipv6 name-server ...................................................................................................... 185
3.42 ipv6 route .................................................................................................................. 186
3.43 ipv6 subnet ................................................................................................................ 186
3.43.1 ipv6 subnet bind ............................................................................................ 187
3.43.2 ipv6 subnet mode .......................................................................................... 188
3.43.3 ipv6 subnet number ....................................................................................... 188
3.43.4 ipv6 subnet stateless-dhcp ............................................................................ 189
3.44 isolate-private ........................................................................................................... 189
3.45 known host ............................................................................................................... 190
3.46 ndns ........................................................................................................................... 190
3.46.1 ndns book-name ............................................................................................ 190
3.46.2 ndns check-name ........................................................................................... 193
3.46.3 ndns drop-name ............................................................................................. 194
3.46.4 ndns get-booked ............................................................................................ 195
3.46.5 ndns get-update ............................................................................................. 196
3.47 ntce shaping ............................................................................................................. 198
3.48 ntp ............................................................................................................................. 198
3.49 ntp server .................................................................................................................. 199
3.50 ntp sync-period ......................................................................................................... 199
3.51 opkg chroot ............................................................................................................... 200
3.52 opkg disk ................................................................................................................... 200
3.53 opkg dns-override ..................................................................................................... 201
3.54 opkg initrc ................................................................................................................. 202
3.55 opkg timezone .......................................................................................................... 202
3.56 ping-check prole ..................................................................................................... 203
3.56.1 ping-check prole host .................................................................................. 204
3.56.2 ping-check prole max-fails .......................................................................... 204
3.56.3 ping-check prole min-success ..................................................................... 205
3.56.4 ping-check prole mode ................................................................................ 206
3.56.5 ping-check prole port .................................................................................. 206
3.56.6 ping-check prole power-cycle ..................................................................... 207
3.56.7 ping-check prole restart-interface ............................................................. 207
3.56.8 ping-check prole timeout ............................................................................ 208
Keenetic Lite (KN-1310) — Command Reference Guide
13
Table of Contents
3.56.9 ping-check prole update-interval ............................................................... 208
3.57 ppe ............................................................................................................................. 209
3.58 pppoe pass ................................................................................................................ 209
3.59 schedule .................................................................................................................... 210
3.59.1 schedule action .............................................................................................. 211
3.59.2 schedule description ...................................................................................... 211
3.60 service cloud-control ................................................................................................ 212
3.61 service dhcp .............................................................................................................. 212
3.62 service dhcp-relay ..................................................................................................... 213
3.63 service dns-proxy ...................................................................................................... 213
3.64 service http ............................................................................................................... 214
3.65 service igmp-proxy ................................................................................................... 214
3.66 service ipsec .............................................................................................................. 215
3.67 service ntce ............................................................................................................... 215
3.68 service ntp-client ...................................................................................................... 216
3.69 service snmp ............................................................................................................. 216
3.70 service telnet ............................................................................................................ 217
3.71 service udpxy ............................................................................................................ 217
3.72 service upnp .............................................................................................................. 218
3.73 service vpn-server ..................................................................................................... 218
3.74 show .......................................................................................................................... 219
3.74.1 show associations .......................................................................................... 219
3.74.2 show clock date ............................................................................................. 220
3.74.3 show clock timezone-list ............................................................................... 221
3.74.4 show crypto ike key ....................................................................................... 222
3.74.5 show crypto map ........................................................................................... 222
3.74.6 show dot1x ..................................................................................................... 224
3.74.7 show drivers ................................................................................................... 225
3.74.8 show interface ............................................................................................... 226
3.74.9 show interface bridge .................................................................................... 227
3.74.10 show interface channels .............................................................................. 228
3.74.11 show interface country-codes ..................................................................... 229
3.74.12 show interface mac ...................................................................................... 230
3.74.13 show interface rf e2p ................................................................................... 232
3.74.14 show interface stat ...................................................................................... 233
3.74.15 show interface wps pin ................................................................................ 233
3.74.16 show interface wps status ........................................................................... 234
3.74.17 show ip arp ................................................................................................... 235
3.74.18 show ip dhcp bindings ................................................................................. 236
3.74.19 show ip dhcp pool ........................................................................................ 236
3.74.20 show ip hotspot ............................................................................................ 237
3.74.21 show ip name-server .................................................................................... 239
3.74.22 show ip nat ................................................................................................... 239
14
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
3.74.23 show ip route ............................................................................................... 240
3.74.24 show ipsec .................................................................................................... 241
3.74.25 show ipv6 addresses .................................................................................... 242
3.74.26 show ipv6 prexes ....................................................................................... 243
3.74.27 show ipv6 routes .......................................................................................... 244
3.74.28 show last-change ......................................................................................... 244
3.74.29 show log ....................................................................................................... 245
3.74.30 show ndns .................................................................................................... 246
3.74.31 show netlter ............................................................................................... 246
3.74.32 show ntce hosts ........................................................................................... 247
3.74.33 show ntp status ............................................................................................ 247
3.74.34 show ping-check .......................................................................................... 248
3.74.35 show running-cong .................................................................................... 249
3.74.36 show self-test ............................................................................................... 252
3.74.37 show site-survey .......................................................................................... 252
3.74.38 show system ................................................................................................. 253
3.74.39 show tags ..................................................................................................... 253
3.74.40 show upnp redirect ...................................................................................... 254
3.74.41 show version ................................................................................................ 255
3.74.42 show vpn-server ........................................................................................... 256
3.75 snmp community ...................................................................................................... 256
3.76 snmp contact ............................................................................................................ 257
3.77 snmp location ........................................................................................................... 257
3.78 system ....................................................................................................................... 258
3.78.1 system button ................................................................................................ 258
3.78.2 system clock date .......................................................................................... 259
3.78.3 system clock timezone .................................................................................. 260
3.78.4 system conguration factory-reset .............................................................. 260
3.78.5 system conguration save ............................................................................ 261
3.78.6 system debug ................................................................................................. 261
3.78.7 system domainname ..................................................................................... 262
3.78.8 system hostname ........................................................................................... 262
3.78.9 system led shutdown ..................................................................................... 263
3.78.10 system log clear ........................................................................................... 264
3.78.11 system log reduction ................................................................................... 264
3.78.12 system log server ......................................................................................... 264
3.78.13 system log suppress ..................................................................................... 265
3.78.14 system mode ................................................................................................ 266
3.78.15 system reboot .............................................................................................. 266
3.78.16 system set .................................................................................................... 267
3.79 tools ........................................................................................................................... 268
3.79.1 tools arping .................................................................................................... 268
3.79.2 tools ping ........................................................................................................ 269
Keenetic Lite (KN-1310) — Command Reference Guide
15
Table of Contents
3.79.3 tools ping6 ...................................................................................................... 270
3.79.4 tools pppoe-discovery .................................................................................... 271
3.79.5 tools traceroute .............................................................................................. 272
3.80 udpxy ......................................................................................................................... 274
3.80.1 udpxy buffer-size ........................................................................................... 274
3.80.2 udpxy buffer-timeout .................................................................................... 275
3.80.3 udpxy interface .............................................................................................. 275
3.80.4 udpxy port ...................................................................................................... 276
3.80.5 udpxy renew-interval .................................................................................... 277
3.80.6 udpxy timeout ................................................................................................ 277
3.81 upnp forward ............................................................................................................ 278
3.82 upnp lan .................................................................................................................... 278
3.83 upnp redirect ............................................................................................................ 279
3.84 user ............................................................................................................................ 280
3.84.1 user password ................................................................................................ 281
3.84.2 user tag .......................................................................................................... 281
3.85 vpn-server ................................................................................................................. 282
3.85.1 vpn-server interface ...................................................................................... 283
3.85.2 vpn-server lcp echo ........................................................................................ 283
3.85.3 vpn-server mppe ............................................................................................ 284
3.85.4 vpn-server mppe-optional ............................................................................. 285
3.85.5 vpn-server mru .............................................................................................. 285
3.85.6 vpn-server mtu ............................................................................................... 286
3.85.7 vpn-server multi-login ................................................................................... 286
3.85.8 vpn-server pool-range ................................................................................... 287
3.85.9 vpn-server static-ip ........................................................................................ 287
3.86 yandexdns ................................................................................................................. 288
3.86.1 yandexdns assign ........................................................................................... 288
3.86.2 yandexdns check-availability ........................................................................ 289
3.86.3 yandexdns enable .......................................................................................... 289
Glossary .............................................................................................................................. 291
Appendix A
Interface Hierarchy ........................................................................................................... 299
Appendix B
HTTP API ............................................................................................................................. 301
B.1 REST Core Interface ....................................................................................................... 301
B.1.1 Resource Location ............................................................................................... 301
B.1.2 Methods .............................................................................................................. 301
B.1.3 Data Format ........................................................................................................ 302
B.2 XML Core Interface ........................................................................................................ 305
B.2.1 Command Request .............................................................................................. 306
B.2.2 Conguration Request ........................................................................................ 307
16
Command Reference Guide — Keenetic Lite (KN-1310)
Table of Contents
B.2.3 Request Packet .................................................................................................... 307
Appendix C
SNMP MIB ........................................................................................................................... 309
C.1 SNMPv2-MIB ................................................................................................................ 309
C.2 IF-MIB ............................................................................................................................ 309
C.3 IP-MIB ............................................................................................................................ 311
C.4 UDP-MIB ........................................................................................................................ 312
C.5 HOST-RESOURCES-MIB .................................................................................................. 312
C.6 UCD-SNMP-MIB ............................................................................................................. 312
Appendix D
IPsec Encryption Levels .................................................................................................... 315
D.1 weak .............................................................................................................................. 315
D.2 normal ........................................................................................................................... 316
D.3 normal-3des .................................................................................................................. 316
D.4 strong ............................................................................................................................ 317
D.5 weak-pfs ........................................................................................................................ 317
D.6 normal-pfs ..................................................................................................................... 319
D.7 normal-3des-pfs ............................................................................................................ 319
Keenetic Lite (KN-1310) — Command Reference Guide
17
Table of Contents
18
Command Reference Guide — Keenetic Lite (KN-1310)
Product Overview
1.1 Hardware Conguration
CPU MT7628NN MIPS® 24KEc 575 MHz
RAM Winbond W9751G6KB-25 64Mb DDR2
Flash Winbond W25Q128JVFQ 16Mb SPI
1
Ethernet
Wi-Fi
NotesChipsetPorts
Integrated5
NotesSpeedLabel
WAN port100 Mbps0
100 Mbps1
100 Mbps2
100 Mbps3
100 Mbps4
NotesChipsetBand
802.11bgn 2x2MediaTek MT76032.4 GHz
Keenetic Lite (KN-1310) — Command Reference Guide19Command Reference Guide — Keenetic Lite (KN-1310)
Chapter 1 Product Overview
20
2
Introduction to the CLI
This chapter describes how to use the Keenetic Lite Command-Line Interface (CLI), its hierarchical structure, authorization levels and its help features.
The primary tool for managing the Keenetic Lite router is the command line interface (CLI). System settings can be dened as a sequence of commands, which can be executed to bring the device to the specied condition.
Keenetic Lite has three types of settings:
Current settings running cong is a set of commands describing the current
status of the system. Current settings are stored in RAM and reect every change of the system settings. However, the content of RAM is lost when the device is turned off. To restore the settings after reboot, they must be saved in non-volatile memory.
Startup conguration startup cong is a sequence of commands, which is stored in
a specic partition of the non-volatile memory. It is used to initialize the system immediately after startup.
Default settings default cong contains factory default settings of Keenetic
Lite. RESET button is used to reset startup conguration to the factory default.
Files startup-config and running-config can be edited manually, without participation of the command line. It should be remembered that the lines with ! in the beginning are ignored by the parser and the arguments which contain spaces must be enclosed in double quotes (for example, ssid "Free Wi-Fi"). Quotes themselves are ignored by the parser.
Responsibility for the accuracy of the changes rests with their author.

2.1 Enter commands in the CLI

Command line interpreter in Keenetic Lite is designed for beginners as well as experts. All command names and options are clear and easy to remember.
Commands are divided into groups and arranged in a hierarchy. Thus, to do a setting, the operator needs to enter a sequence of nested command group names (node commands), and then enter the nal command with parameters.
For example, IP-address of the FastEthernet0/Vlan2 network interface is set using the address command, which is located in the interface ip group:
(config)>interface FastEthernet0/Vlan2 ip address 192.168.15.43/24 Network address saved.
Keenetic Lite (KN-1310) — Command Reference Guide
21
Chapter 2 Introduction to the CLI

2.1.1 Entering a group

Some of the node commands (containing a group of child commands) can be “entered” to allow direct executing of the child commands without typing the node name as prex. In this case the prompt is changed to indicate the entered group.
The exit command or [Ctrl]+[D] key combination can be used to exit a group.
For example, after entering the interface group the command line prompt is changed to
(config-if):
(config)>interface FastEthernet0/Vlan2 (config-if)>ip address 192.168.15.43/24 Network address saved. (config-if)>[Ctrl]+[D] (config)>

2.2 Getting Help and auto-completion

To make the conguring process as comfortable as possible, the CLI provides auto-completion of commands and parameters, hinting the operator, which commands are available at the current level of nesting. Auto-completion works by pressing [Tab]. Example:
(config)>in[Tab]
interface - network interface configuration
(config)> interface Fa[Tab]
Usage template: interface {name}
Variants: FastEthernet0 FastEthernet0/Vlan1 FastEthernet0/Vlan2
(config)> interface FastEthernet0[Tab]
Usage template: interface {name}
Variants: FastEthernet0/Vlan1 FastEthernet0/Vlan2
(config)> interface FastEthernet0[Enter] (config-if)> ip[Tab]
22
address - set interface IP address
alias - add interface IP alias
dhcp - enable dhcp client
Command Reference Guide — Keenetic Lite (KN-1310)
Chapter 2 Introduction to the CLI
mtu - set Maximum Transmit Unit size mru - set Maximum Receive Unit size
access-group - bind access-control rules
apn - set 3G access point name
(config-if)> ip ad[Tab]
address - set interface IP address
(config-if)> ip address[Tab]
Usage template: address {address} {mask}
(config-if)> ip address 192.168.15.43[Enter] Configurator error[852002]: address: argument parse error. (config-if)> ip address 192.168.15.43/24[Enter] Network address saved. (config-if)>
Hint for the current command can always be displayed by pressing [?]. Example:
(config)> interface FastEthernet0/Vlan2 [?]
description - set interface description
alias - add interface name alias
mac-address - set interface MAC address
dyndns - DynDns updates security-level - assign security level authentication - configure authentication
(config)> interface FastEthernet0/Vlan2
2.3 Prex no
Prex no is used to negate a command.
For example, the command interface is responsible for creating a network interface with the given name. When used with this command, prex no causes the opposite action — removing of the interface:
(config)> no interface PPPoE0
ip - set interface IP parameters
igmp - set interface IGMP parameters
up - enable interface
down - disable interface
If the command is composite, no can be placed in front of any member. For example, service dhcp enables the DHCP service. It consists of two parts: service — the group name
in the hierarchy of commands, and dhcp — the nal command. Prex no can be placed either at the beginning, or in the middle. The action is the same in both cases: stopping of the service.
Keenetic Lite (KN-1310) — Command Reference Guide
23
Chapter 2 Introduction to the CLI
(config)> no service dhcp (config)> service no dhcp

2.4 Multiple input

Many commands have the property of idempotence, which means that multiple input of a command has the same effect as as the single input. For example, entering service http adds a single line “service http” to the current settings, and re-entering does not change
anything.
However, some of the commands allow you to add not a single, but multiple records, if they are entered with different arguments. For example, static routing table entries ip
route or lters access-list are added sequentially and appear in the settings as a list:
Example 2.1. Using a command with multiple input
(config)> ip route 1.1.1.0/24 PPTP0 Network::RoutingTable: Added static route: 1.1.1.0/24 via PPTP0. (config)> ip route 1.1.2.0/24 PPTP0 Network::RoutingTable: Added static route: 1.1.2.0/24 via PPTP0. (config)> ip route 1.1.3.0/24 PPTP1 Network::RoutingTable: Added static route: 1.1.3.0/24 via PPTP1. (config)> show running-config ... ip route 1.1.1.0 255.255.255.0 PPTP0 ip route 1.1.2.0 255.255.255.0 PPTP0 ip route 1.1.3.0 255.255.255.0 PPTP1 ...
Records from such tables can be removed one by one, using prex no and arguments to identify the record you want to remove:
(config)> no ip route 1.1.2.0/24 Network::RoutingTable: Deleted static route: 1.1.2.0/24 via PPTP0. (config)> show running-config ... ip route 1.1.1.0 255.255.255.0 PPTP0 ip route 1.1.3.0 255.255.255.0 PPTP1 ...

2.5 Saving to startup settings

Current and startup settings are stored in the les running-cong and startup-cong, respectively. To save the current settings in the non-volatile memory, copy them as shown below:
(config)> copy running-config startup-config Copied: running-config -> startup-config
24
Command Reference Guide — Keenetic Lite (KN-1310)

2.6 Delayed restart

If Keenetic Lite device is located away from the operator and is managed remotely, there is a risk to lose control over it because of a misoperation. In this case it will be difcult to reboot and return to the saved settings.
The system reboot command lets you set a delayed restart timer, perform “risky” settings, then turn off the timer and save the changes. If connection to the device is lost during conguration, the operator will be enough to wait for automatic reboot and connect to the device again.
Chapter 2 Introduction to the CLI
Keenetic Lite (KN-1310) — Command Reference Guide
25
Chapter 2 Introduction to the CLI
26
Command Reference Guide — Keenetic Lite (KN-1310)
3
Command Reference

3.1 Core commands

Core commands are used to manage les on your device.

3.1.1 copy

Description Copy the contents of one le to another. Used for the rmware updating,
saving the current settings, resetting to factory, etc.
Prex no No
Change settings No
Multiple input No
Synopsis
Arguments
Example Current settings can be saved as follows:
History
(cong)> copy source› ‹destination
DescriptionValueArgument
Filenamesource
(config)> copy running-config startup-config
File names in this example are aliases. Full names of the conguration les are system:running-config and flash:startup-config, respectively.
Version Description
The copy command has been introduced.2.00
Full path to the le to be copied in <le system>:<path> format
Full path to the directory for the new le.Filenamedestination

3.1.2 erase

Description Delete a le from the Keenetic Lite device.
Prex no No
Change settings Yes
Keenetic Lite (KN-1310) — Command Reference Guide
27
Chapter 3 Command Reference
Multiple input Yes
Synopsis
Arguments
Example
History
(cong)> erase filename
(config)> erase FLASH:swap Erased FLASH:swap.
Version Description
The erase command has been introduced.2.00

3.1.3 exit

Description Leave the command node.
Prex no No
Change settings No
Multiple input No
DescriptionValueArgument
Species the le to be removed.Filenamefilename
Synopsis
Example
History
(cong)> exit
(config-dyndns)> exit (config)>
Version Description
The exit command has been introduced.2.00

3.1.4 ls

Description Display list of les from the specied directory.
Prex no No
Change settings No
Multiple input No
Synopsis
(cong)> ls [ directory ]
28
Command Reference Guide — Keenetic Lite (KN-1310)
Chapter 3 Command Reference
Arguments
Example
Stringdirectory
(config)> ls temp:
rel: temp:
entry, type = R:
entry, type = D:
entry, type = D:
entry, type = R:
entry, type = R:
entry, type = D:
entry, type = D:
entry, type = D:
entry, type = D:
entry, type = D:
entry, type = D:
DescriptionValueArgument
Path to the directory. Must contain the name of the le system and path to the folder directly in the following format <le system>:<path>. Examples of le systems — ash, temp, proc, usb. etc.
name: resolv.conf size: 107
name: db
name: dhcp6c
name: TZ size: 6
name: passwd size: 128
name: dnscache
name: mnt
name: tmp
name: ppp
name: lib
name: run
History
Version Description
The ls command has been introduced.2.00

3.1.5 more

Description Display the contents of a text le line by line.
Prex no No
Change settings No
Multiple input No
Keenetic Lite (KN-1310) — Command Reference Guide
29
Chapter 3 Command Reference
Synopsis
Arguments
Example
History
(cong)> more filename
DescriptionValueArgument
Full path to the le or alias.Filenamefilename
(config)> more temp:resolv.conf nameserver 82.138.7.15 nameserver 82.138.7.251 nameserver 82.138.7.130 options timeout:1 attempts:3 rotate
Version Description
The more command has been introduced.2.00

3.2 access-list

Description Access to a group of commands to congure the selected list of packet ltering
rules. If the list is not found, the command tries to create it. Such a list can be assigned to a network interface using interface ip access-group command.
Command with no prex removes the list of rules.
Prex no Yes
Change settings Yes
Multiple input Yes
Group entry (config-acl)
Synopsis
Arguments
History
(cong)> access-list name
(cong)> no access-list name
Version Description
DescriptionValueArgument
Stringname
The access-list command has been introduced.2.00
Filtering rules list name (Access Control List, ACL).

3.2.1 access-list deny

Description Add a packet ltering deny rule into a specied ACL.
30
Command Reference Guide — Keenetic Lite (KN-1310)
Loading...
+ 290 hidden pages