04-21-2020 11:01 AM
Hi all.
I would like to submit a question, my access points are configured with two radio networks: one corporate and one dedicated to mobile devices.
These two radio networks are on different vlan.
Many users uses the corporate network for their own mobiles, so my question is: is it possible to create a rule how reject all Android/iOS devices (by MAC OUI/other) if a device tries to connect to that network?
If yes, how can I do?
I hope I was clear, if not, don't hesitate to ask.
Thanks for your time
Mauro
My setup is:
- VX9000 controller version 5.9.1.3-007R
- Access points: AP-8432, AP-7632, AP-7522
an hour ago
Hi Mauro,
Thanks for sharing the details—it’s pretty clear! 👍
Yes, it is possible to block specific devices from connecting to a particular SSID based on their MAC addresses or OUIs. Most enterprise controllers, including the VX9000, allow you to create MAC filtering policies or device access rules. You can configure a rule to deny all Android/iOS devices by specifying the MAC OUI ranges that correspond to those manufacturers. Once applied, any device matching those OUIs trying to connect to your corporate SSID would be rejected, while other devices remain unaffected.
A few tips:
Make sure your controller’s firmware is updated—sometimes these features improve in newer versions.
Test the rule with a small group before rolling it out network-wide.
Document the OUIs you’re blocking, as new devices may appear over time with different OUIs.
If you want, I can outline a step-by-step guide for the VX9000 to set up this filter so it’s easier to implement. Do you want me to do that?
10-23-2025 05:07 PM - edited 10-23-2025 05:10 PM
Hi everyone,
Lately, while testing mobile gaming traffic behavior, I noticed that some Android and iOS devices randomly get rejected from the Wi-Fi network — even though authentication looks fine and DHCP gives valid IPs.
It happened most often when running Null’s Brawl APK for connection stability tests. The device briefly disconnects, then reconnects with a delay of 5–10 seconds.
Could this rejection be linked to roaming settings or AP session timeout? Has anyone optimized Extreme APs to handle quick reconnects from mobile games without triggering a block?
Appreciate any insights from those who’ve tested gaming apps in managed Wi-Fi environments.
04-23-2020 03:06 PM
Sorry, I told it was the last question but I’ve another one.
Due to the large amount of MAC OUI to deny (every ACL max limit is 1000 elements), is it possible to create a group of ACL in order to associate more lists to a single group? GUI doesn’t premit to add more than one ACL but I’ve more than 2000 MAC.
04-22-2020 07:10 AM
First of all, thanks everybody for your help.
With some bash scripts and a lot of patience I start to develop my own “blacklist” (and, thanks to you all, it works!).
Last question: if I have a specific MAC address to allow, it should be inserted on the top or in the bottom of the list (before the allow all)?