By default, Kenstel Access point are configured with the following login credentials:
You should try the following steps:
Try pinging the IP after connecting to the SSID. Then, check the WAN cable—if it is loose, reconnect it properly. Ensure the cable connection is secure and in good condition. If the WAN is connected properly but the issue persists, go to the Cloud and make sure the captive portal is disabled. If the issue still persists, contact the support team.
Standalone mode means the device operates independently without relying on a cloud management system.
To enable cloud management for your access point, follow these steps:
Ensure the device is online while configuring these settings. If the device is offline, try the following steps:
By default, Kenstel Access point are configured with the following login credentials:
Ensure the APN configuration is correct. If it is correct, try using the CONNECT/DISCONNECT button. If the issue persists, reboot the device.
This may be because the selected bands are not available in your area, preventing the device from communicating with them. Set the configuration to RESTORE DEFAULT BAND and submit it.
Try it for 2-3 times. If still not working then contact the support team.
It is may be due to:
It is may be due to you are connected to 2.4ghz network try to connect 5Ghz.
By default, Kenstel Router are configured with the following login credentials:
To switch ports between LAN and WAN, follow these steps:
Checking VLAN on LAN
Note that,
Checking VLAN on WAN
Note that,
To check the Network status, log in to the cloud platform and navigate to Network → Devices. Then, click on the information icon next to your device name and go to the Network section to view detailed information about your device.
SDN provides a more flexible, programmable, and centralized approach to network management, which can lead to better performance, easier management, and the ability to quickly adapt to changing needs.
Members within the policy with a lower metric have precedence over higher metric members and used first.
Members with the same metric will load-balance. Load-balancing members (with same metric) will distribute load based on assigned weights values. Load-balanced members distribute more traffic out those with higher weights.
Example : Member m1(wan1) with metric 1 and weight 3, and member m2(wan2) with metric 1 and weight 2 will load balance and traffic distribution over the members will be 60% on member m1 and 40% on member m2.
To configure SDN, go to cloud and navigate to Configuration --> Network --> SDN --> Add. Now enter a name for identification and Select the Rule Type as either 'By Group' or 'By Name,' then choose the Policy as Load-Balancer based on your network requirements and select the interfaces from the dropdown menu. Next, provide the Metric and Weight for the WANs, up to a maximum of 5. Before configuring SDN Load-Balancer, ensure that the wan ports should be set more than one .
If you lost all the port setup configuration on your router, you need to reconfigure everything from scratch except cellular setting.
To test SDN, start by configuring SDN rules on the device. Then, connect to the device via LAN or network. Run a speed test to check the network performance. With SDN, the network can dynamically adjust based on the traffic patterns, which can potentially improve the speed by optimizing the flow of data. If you have multiple WAN connections, SDN can balance traffic across them, leading to better overall speed by aggregating the bandwidth from different links.
Testing SDN via Traceroute : Navigate to the detailed information section of the network devices, go to the Tools section, and run a traceroute to Google (google.com). The traceroute will display the WANs selected in the load-balancing rules, showing the internet traffic path based on the IPs associated with each WAN.
To check the SDN data, log in to the cloud and navigate to Network → Devices. Then, click on the device name or on the information icon next to your device name and go to the SDN section to view detailed information about SDN.
If your load balancer is not working, follow these debugging/troubleshooting steps to identify and fix the issue:
Verify WAN Connectivity
Check Load Balancing Rules
Perform a Traceroute
Verify Firewall Rules
A user group is a feature through which we can control the speed limit ( download/upload) for any client using their mac address. To test User Group follow the steps bellow:
Connect a Client to the Network
Create a User Group Rule
Apply the User Group Rule to the Network
Reconnect and Perform a Speed Test
Verify Results
Airtime Fairness is a feature in Wi-Fi networks that ensures all connected devices get an equal share of transmission time rather than equal bandwidth. This prevents slower devices from hogging network resources, improving overall network performance.
To test Airtime Fairness follow the steps below:
Example Client A - 10%, Client B - 90%. (remember, for this rule sum of all the clients percentage should not excided over 100%) In this case both the clients should connect with same network, and when they starts speed testing on their device. Then client A will get very less speed as the rule has been set for 10% and client B will get competitively very high speed than client A as the rule has been set for 90%.
WMM (Wi-Fi Multimedia) is a feature defined by the Wi-Fi Alliance that provides Quality of Service (QoS) to prioritize certain types of network traffic. It is especially useful for applications that require real-time or low-latency transmission, such as voice, video, and gaming.
To test WMM follow the step below:
Management Frame Protocol (MFP) is a security feature in wireless networks that helps protect management frames from being spoofed or tampered with. It secure communication between a Wi-Fi device and client devices.
To test MFP ( Management Frame Protocol), follow the steps below:
Rogue AP (Access Point) detection is a security measure used to identify unauthorized or malicious wireless access points in a network. Since rogue APs can be used for MITM (Man-in-the-Middle) attacks, data interception, and unauthorized network access, detecting them is crucial for network security.
To test Rogue AP Detection, follow the steps below:
This may happen due to:
This may be because:
This happens because mobile phones automatically close the authenticated browser once they connect to the internet.