![KeeNetic Lite KN-1310 Command Reference Manual Download Page 8](http://html1.mh-extra.com/html/keenetic/lite-kn-1310/lite-kn-1310_command-reference-manual_3863741008.webp)
3.6.4 components preset ............................................................................................ 40
3.6.5 components preview ......................................................................................... 40
3.6.6 components remove .......................................................................................... 41
3.6.7 components validity-period .............................................................................. 41
3.7 crypto ike key ............................................................................................................... 42
3.8 crypto ike nat-keepalive .............................................................................................. 43
3.9 crypto ike policy ........................................................................................................... 43
3.9.1 crypto ike policy lifetime ................................................................................... 44
3.9.2 crypto ike policy mode ...................................................................................... 45
3.9.3 crypto ike policy negotiation-mode .................................................................. 45
3.9.4 crypto ike policy proposal ................................................................................. 46
3.10.1 crypto ike proposal dh-group .......................................................................... 47
3.10.2 crypto ike proposal encryption ....................................................................... 48
3.10.3 crypto ike proposal integrity .......................................................................... 49
3.11.1 crypto ipsec transform-set cypher .................................................................. 50
3.11.2 crypto ipsec transform-set dh-group .............................................................. 51
3.11.3 crypto ipsec transform-set hmac .................................................................... 52
3.11.4 crypto ipsec transform-set lifetime ................................................................ 53
3.12.1 crypto ipsec profile authentication-local ....................................................... 54
3.12.2 crypto ipsec profile authentication-remote ................................................... 54
3.12.3 crypto ipsec profile dpd-interval ..................................................................... 55
3.12.4 crypto ipsec profile identity-local ................................................................... 56
3.12.5 crypto ipsec profile match-identity-remote ................................................... 57
3.12.6 crypto ipsec profile mode ................................................................................ 57
3.12.7 crypto ipsec profile policy ............................................................................... 58
3.12.8 crypto ipsec profile preshared-key ................................................................. 59
3.12.9 crypto ipsec profile xauth ............................................................................... 59
3.12.10 crypto ipsec profile xauth-identity ............................................................... 60
3.12.11 crypto ipsec profile xauth-password ............................................................. 60
3.13.1 crypto map connect ......................................................................................... 62
3.13.2 crypto map enable ........................................................................................... 62
3.13.3 crypto map fallback-check-interval ................................................................ 63
3.13.4 crypto map force-encaps ................................................................................. 63
3.13.5 crypto map match-address ............................................................................. 64
3.13.6 crypto map nail-up ........................................................................................... 64
3.13.7 crypto map set-peer ........................................................................................ 65
3.13.8 crypto map set-peer-fallback .......................................................................... 66
3.13.9 crypto map set-profile ..................................................................................... 66
3.13.10 crypto map set-tcpmss .................................................................................. 67
Command Reference Guide — Keenetic Lite (KN-1310)
8
Table of Contents
Summary of Contents for Lite KN-1310
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Lite KN 1310 6 Contents Overview...
Page 18: ...Command Reference Guide Keenetic Lite KN 1310 18 Table of Contents...
Page 20: ...Command Reference Guide Keenetic Lite KN 1310 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Lite KN 1310 26 Chapter 2 Introduction to the CLI...
Page 314: ...Command Reference Guide Keenetic Lite KN 1310 314 Appendix C SNMP MIB...