How do WLAN devices force low-rate STAs to log out

15

For details about how to configure an AC to force low-rate STAs to log out, see:

V200R005:

Restricting Access from Weak-Signal or Low-Rate STAs

V200R006:

Configuring Smart Roaming

Other related questions:
How do WLAN devices force weak-signal STAs to log out
For details about how to configure an AC to force weak-signal STAs to log out, see: V200R005: Restricting Access from Weak-Signal or Low-Rate STAs V200R006: Configuring Smart Roaming

How do WLAN devices restrict access from low-rate STAs
For details about how to configure an AC to restrict access from low-rate STAs, see: V200R005: Restricting Access from Weak-Signal or Low-Rate STAs V200R006: Configuring Smart Roaming

Why is the association rate displayed on the STA low
The possible causes for the low association rate displayed on the STA include: - If the STA is far away from the AP, signals are weak, and the negotiated association rate of the STA is low. - If the 802.11n APs use WEP or TKIP encryption, the association rate of STAs may only be 54 Mbit/s (that is the rate of 802.11b/g). Because WEP and TKIP are not defined in the 802.11n protocol, the STA associates with the AP in 802.11g mode if TKIP encryption is used. - If the network adapter supporting only the 802.11b/g mode is associated with the 802.11n AP, the maximum associated rate is 54 Mbit/s. Alternatively, the radio type configured on the 802.11n AP is in 802.11b/g mode, so the AP supports only the radios in 802.11b/g mode. Try the following methods to resolve the problem: 1. Place the STA closer to the AP. 2. Change the encryption mode to CCMP in the security profile.

Does an online 802.11b/g STA affect the rate of another online 802.11n STA
Yes. 802.11b/g STAs have a low rate and occupy the air interface for a longer time when forwarding the same traffic as 802.11n STAs. This lowers the rate of an online 802.11n STA.

How to configure the STA blacklist on WLAN devices
A STA blacklist contains MAC addresses of STAs that are not allowed to connect to the WLAN. To forbid some STAs from connecting to the WLAN, you can configure a STA blacklist. You can configure a global STA blacklist for APs, and the blacklist takes effect on all VAPs. You can also configure a STA blacklist for specified VAPs. If an AP and a VAP are configured with the blacklist or whitelist function, a STA can connect to the WLAN only when it is permitted by both the configuration on the AP and VAP. - For V200R003 and V200R005, you can perform the following steps to configure a STA blacklist for specified APs on an AC or a Fat AP: 1. Run the sta-blacklist mac-address command in the WLAN view to add specified MAC addresses to the STA blacklist. The variable mac-address specifies the MAC addresses in the STA blacklist. 2. For ACs: run the sta-access-mode ap { { start-id [ to end-id ] } &<1-10> | all } blacklist command in the WLAN view to set the access control mode to the STA blacklist for a specified AP. The variable start-id and end-id specify the AP ID range. For Fat APs: Run the sta-access-mode blacklist command in the WLAN view to set the access control mode to the STA blacklist. 3. Run the commit { all | ap ap-id } command in the WLAN view to deliver configurations to the APs (applicable only to the AC). The variable ap-id specifies the AP ID. - For V200R003 and V200R005, you can perform the following steps to configure a STA blacklist for specified VAPs on an AC or a Fat AP: 1. Run the sta-blacklist-profile { name list-name | id list-id } command in the WLAN view to create a STA blacklist profile and display the STA blacklist profile view. The variable list-name specifies the STA blacklist profile name, and list-id specifies the STA blacklist profile ID. 2. Run the sta-mac mac-address command in the STA blacklist profile view to add the MAC address of a STA to the STA blacklist profile. The variable mac-address specifies the MAC addresses in the STA blacklist. 3. Run the service-set { id profile-id | name profile-name } * command in the WLAN view to display the service set view. The variable profile-id specifies the service set ID, and profile-name specifies the service set name. 4. Run the sta-access-mode blacklist command in the service set view to set the access control mode for VAPs to the STA blacklist. 5. Run the set view sta-blacklist-profile { name list-name | id list-id } command in the service set view to bind a STA blacklist profile for the service set. The variable list-name specifies the STA blacklist profile name, and list-id specifies the STA blacklist profile ID. 6. Run the commit { all | ap ap-id } command in the WLAN view to deliver configurations to the APs (applicable only to the AC). The variable ap-id specifies the AP ID.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top