04-21-2020 11:01 AM
Hi all.
I would like to submit a question, my access points are configured with two radio networks: one corporate and one dedicated to mobile devices.
These two radio networks are on different vlan.
Many users uses the corporate network for their own mobiles, so my question is: is it possible to create a rule how reject all Android/iOS devices (by MAC OUI/other) if a device tries to connect to that network?
If yes, how can I do?
I hope I was clear, if not, don't hesitate to ask.
Thanks for your time
Mauro
My setup is:
- VX9000 controller version 5.9.1.3-007R
- Access points: AP-8432, AP-7632, AP-7522
yesterday - last edited yesterday
Hi everyone,
Lately, while testing mobile gaming traffic behavior, I noticed that some Android and iOS devices randomly get rejected from the Wi-Fi network — even though authentication looks fine and DHCP gives valid IPs.
It happened most often when running Null’s Brawl APK for connection stability tests. The device briefly disconnects, then reconnects with a delay of 5–10 seconds.
Could this rejection be linked to roaming settings or AP session timeout? Has anyone optimized Extreme APs to handle quick reconnects from mobile games without triggering a block?
Appreciate any insights from those who’ve tested gaming apps in managed Wi-Fi environments.
04-23-2020 03:06 PM
Sorry, I told it was the last question but I’ve another one.
Due to the large amount of MAC OUI to deny (every ACL max limit is 1000 elements), is it possible to create a group of ACL in order to associate more lists to a single group? GUI doesn’t premit to add more than one ACL but I’ve more than 2000 MAC.
04-22-2020 07:10 AM
First of all, thanks everybody for your help.
With some bash scripts and a lot of patience I start to develop my own “blacklist” (and, thanks to you all, it works!).
Last question: if I have a specific MAC address to allow, it should be inserted on the top or in the bottom of the list (before the allow all)?
04-21-2020 01:55 PM
HI Mauro,
In addition to what Alexandr suggested in regards to DHCP finger printing.
You need to use roles this should also be in the system ref guide.
This will allow better containment than a association ACL based soley on Mac address.
Please see link to find document regard role based firewall.
https://gtacknowledge.extremenetworks.com/articles/Q_A/Where-can-I-find-documentation-for-WiNG-Role-...