EasyManua.ls Logo

KeeNetic Lite KN-1310 - User Manual

KeeNetic Lite KN-1310
320 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
N300 Smart Wi-Fi Router with Power
Ampliers, Managed Switch, and Mode
Selector
Command Reference Guide
Model Keenetic Lite (KN-1310)
OS Version 2.10
Edition 1.17 18.01.2018
help.keenetic.net
© Keenetic Limited, 2018

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the KeeNetic Lite KN-1310 and is the answer not in the manual?

Summary

Preface

1 Readership

Guide for networking/computer technicians responsible for configuring and maintaining the Keenetic Lite.

2 Organization

Overview of the manual's structure and topics covered.

3 Document Conventions

Explanation of formatting conventions used in command descriptions.

1 Product Overview

1.1 Hardware Configuration

Details about the CPU, RAM, Flash, Ethernet ports, and Wi-Fi chipset.

2 Introduction to the CLI

2.1 Enter commands in the CLI

Instructions on navigating and entering commands in the Command Line Interface.

2.2 Getting Help and auto-completion

How to use the CLI's help features and auto-completion.

2.3 Prefix no

Usage of the 'no' prefix to negate or remove commands.

2.4 Multiple input

Explanation of how commands handle multiple inputs or records.

2.5 Saving to startup settings

Procedure for saving current configuration to non-volatile memory.

2.6 Delayed restart

Using 'system reboot' for safe remote configuration changes.

3 Command Reference

3.1 Core commands

Basic commands for managing files on the device.

3.2 access-list

Commands for configuring packet filtering rules (ACLs).

3.6 components

Commands for managing firmware components.

3.7 crypto ike key

Commands for managing IKE keys for IPsec connections.

3.13 crypto map

Commands for configuring IPsec crypto maps.

3.16 interface

Commands for configuring network interfaces.

3.20 ip dhcp pool

Commands for configuring DHCP server pools.

3.25 ip hotspot

Commands for configuring the Hotspot feature.

3.34 ip route

Commands for managing static routes in the routing table.

3.36 ip static

Commands for defining static NAT/PAT translation rules.

3.56 ping-check profile

Commands for configuring Ping Check profiles for network diagnostics.

3.66 service ipsec

Commands for enabling or disabling the IPsec service.

3.74 show

Commands to display system status and diagnostic information.

3.78 system

Commands for configuring global system parameters.

3.79 tools

Commands for performing network tests and diagnostics.

Glossary

Appendix A Interface Hierarchy

Appendix B HTTP API

B.1 REST Core Interface

Overview of the REST API for accessing Keenetic Lite settings.

B.1.1 Resource Location

Mapping of device settings to RCI resources and URL structure.

B.1.2 Methods

Semantics of HTTP methods (GET, POST, DELETE) for different resource types.

B.1.3 Data Format

Structure of JSON data for requests and responses.

B.2 XML Core Interface

Deprecated HTTP XML API for POSTing XML requests.

B.2.1 Command Request

How to execute specific commands using XML requests.

Appendix C SNMP MIB

C.1 SNMPv2-MIB

Supported data elements for SNMPv2 MIB.

C.2 IF-MIB

Supported data elements for the IF-MIB.

C.3 IP-MIB

Supported data elements for the IP-MIB.

C.4 UDP-MIB

Supported data elements for the UDP-MIB.

C.5 HOST-RESOURCES-MIB

Supported data elements for the HOST-RESOURCES-MIB.

C.6 UCD-SNMP-MIB

Supported data elements for the UCD-SNMP-MIB.

Appendix D IPsec Encryption Levels

D.1 weak

List of IKE and IPsec SA algorithms for the 'weak' encryption level.

D.2 normal

List of IKE and IPsec SA algorithms for the 'normal' encryption level.

D.3 normal-3 des

List of IKE and IPsec SA algorithms for the 'normal-3des' encryption level.

D.4 strong

List of IKE and IPsec SA algorithms for the 'strong' encryption level.

D.5 weak-pfs

List of IKE and IPsec SA algorithms for the 'weak-pfs' encryption level.

D.6 normal-pfs

List of IKE and IPsec SA algorithms for the 'normal-pfs' encryption level.

D.7 normal-3 des-pfs

List of IKE and IPsec SA algorithms for the 'normal-3des-pfs' encryption level.

Summary

Preface

1 Readership

Guide for networking/computer technicians responsible for configuring and maintaining the Keenetic Lite.

2 Organization

Overview of the manual's structure and topics covered.

3 Document Conventions

Explanation of formatting conventions used in command descriptions.

1 Product Overview

1.1 Hardware Configuration

Details about the CPU, RAM, Flash, Ethernet ports, and Wi-Fi chipset.

2 Introduction to the CLI

2.1 Enter commands in the CLI

Instructions on navigating and entering commands in the Command Line Interface.

2.2 Getting Help and auto-completion

How to use the CLI's help features and auto-completion.

2.3 Prefix no

Usage of the 'no' prefix to negate or remove commands.

2.4 Multiple input

Explanation of how commands handle multiple inputs or records.

2.5 Saving to startup settings

Procedure for saving current configuration to non-volatile memory.

2.6 Delayed restart

Using 'system reboot' for safe remote configuration changes.

3 Command Reference

3.1 Core commands

Basic commands for managing files on the device.

3.2 access-list

Commands for configuring packet filtering rules (ACLs).

3.6 components

Commands for managing firmware components.

3.7 crypto ike key

Commands for managing IKE keys for IPsec connections.

3.13 crypto map

Commands for configuring IPsec crypto maps.

3.16 interface

Commands for configuring network interfaces.

3.20 ip dhcp pool

Commands for configuring DHCP server pools.

3.25 ip hotspot

Commands for configuring the Hotspot feature.

3.34 ip route

Commands for managing static routes in the routing table.

3.36 ip static

Commands for defining static NAT/PAT translation rules.

3.56 ping-check profile

Commands for configuring Ping Check profiles for network diagnostics.

3.66 service ipsec

Commands for enabling or disabling the IPsec service.

3.74 show

Commands to display system status and diagnostic information.

3.78 system

Commands for configuring global system parameters.

3.79 tools

Commands for performing network tests and diagnostics.

Glossary

Appendix A Interface Hierarchy

Appendix B HTTP API

B.1 REST Core Interface

Overview of the REST API for accessing Keenetic Lite settings.

B.1.1 Resource Location

Mapping of device settings to RCI resources and URL structure.

B.1.2 Methods

Semantics of HTTP methods (GET, POST, DELETE) for different resource types.

B.1.3 Data Format

Structure of JSON data for requests and responses.

B.2 XML Core Interface

Deprecated HTTP XML API for POSTing XML requests.

B.2.1 Command Request

How to execute specific commands using XML requests.

Appendix C SNMP MIB

C.1 SNMPv2-MIB

Supported data elements for SNMPv2 MIB.

C.2 IF-MIB

Supported data elements for the IF-MIB.

C.3 IP-MIB

Supported data elements for the IP-MIB.

C.4 UDP-MIB

Supported data elements for the UDP-MIB.

C.5 HOST-RESOURCES-MIB

Supported data elements for the HOST-RESOURCES-MIB.

C.6 UCD-SNMP-MIB

Supported data elements for the UCD-SNMP-MIB.

Appendix D IPsec Encryption Levels

D.1 weak

List of IKE and IPsec SA algorithms for the 'weak' encryption level.

D.2 normal

List of IKE and IPsec SA algorithms for the 'normal' encryption level.

D.3 normal-3 des

List of IKE and IPsec SA algorithms for the 'normal-3des' encryption level.

D.4 strong

List of IKE and IPsec SA algorithms for the 'strong' encryption level.

D.5 weak-pfs

List of IKE and IPsec SA algorithms for the 'weak-pfs' encryption level.

D.6 normal-pfs

List of IKE and IPsec SA algorithms for the 'normal-pfs' encryption level.

D.7 normal-3 des-pfs

List of IKE and IPsec SA algorithms for the 'normal-3des-pfs' encryption level.

KeeNetic Lite KN-1310 Specifications

General IconGeneral
BrandKeeNetic
ModelLite KN-1310
CategoryNetwork Router
LanguageEnglish

Related product manuals