3.7 cloud control client session timeout ........................................................................... 39
3.8 components .................................................................................................................. 40
3.8.1 components commit .......................................................................................... 40
3.8.2 components install ............................................................................................ 41
3.8.3 components list ................................................................................................. 41
3.8.4 components preset ............................................................................................ 42
3.8.5 components preview ......................................................................................... 43
3.8.6 components remove .......................................................................................... 43
3.8.7 components validity-period .............................................................................. 44
3.9 crypto engine ................................................................................................................ 45
3.10 crypto ike key ............................................................................................................. 45
3.11 crypto ike nat-keepalive ............................................................................................. 46
3.12 crypto ike policy ......................................................................................................... 47
3.12.1 crypto ike policy lifetime ................................................................................. 47
3.12.2 crypto ike policy mode .................................................................................... 48
3.12.3 crypto ike policy negotiation-mode ................................................................ 48
3.12.4 crypto ike policy proposal ............................................................................... 49
3.13.1 crypto ike proposal dh-group .......................................................................... 50
3.13.2 crypto ike proposal encryption ....................................................................... 51
3.13.3 crypto ike proposal integrity .......................................................................... 52
3.14.1 crypto ipsec transform-set cypher .................................................................. 53
3.14.2 crypto ipsec transform-set dh-group .............................................................. 54
3.14.3 crypto ipsec transform-set hmac .................................................................... 55
3.14.4 crypto ipsec transform-set lifetime ................................................................ 56
3.15.1 crypto ipsec profile authentication-local ....................................................... 57
3.15.2 crypto ipsec profile authentication-remote ................................................... 58
3.15.3 crypto ipsec profile dpd-interval ..................................................................... 58
3.15.4 crypto ipsec profile identity-local ................................................................... 59
3.15.5 crypto ipsec profile match-identity-remote ................................................... 60
3.15.6 crypto ipsec profile mode ................................................................................ 60
3.15.7 crypto ipsec profile policy ............................................................................... 61
3.15.8 crypto ipsec profile preshared-key ................................................................. 62
3.15.9 crypto ipsec profile xauth ............................................................................... 62
3.15.10 crypto ipsec profile xauth-identity ............................................................... 63
3.15.11 crypto ipsec profile xauth-password ............................................................. 63
3.16.1 crypto map connect ......................................................................................... 65
3.16.2 crypto map enable ........................................................................................... 65
3.16.3 crypto map fallback-check-interval ................................................................ 66
3.16.4 crypto map force-encaps ................................................................................. 66
Command Reference Guide — Keenetic Extra (KN-1710)
8
Table of Contents
Summary of Contents for EXTRA KN-1710
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Extra KN 1710 6 Contents Overview...
Page 20: ...Command Reference Guide Keenetic Extra KN 1710 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Extra KN 1710 26 Chapter 2 Introduction to the CLI...
Page 322: ...Command Reference Guide Keenetic Extra KN 1710 322 Chapter 3 Command Reference...
Page 332: ...Command Reference Guide Keenetic Extra KN 1710 332 Glossary...
Page 348: ...Command Reference Guide Keenetic Extra KN 1710 348 Appendix C SNMP MIB...