I encounter following problem on some routers:
A client (or his NAT router, some SMC devices are doing this) floods the hotspot with many IP addresses. The addresses are mostly public IP addresses, ranging from 4.X.X.X to 21X.X.X.X. There can appear dozens and hundreds IP addresses from a single client MAC address in minutes. In result, the Hosts page in Hotspot is flooded with addresses, which are translated by Hotspot to the assigned client IP range. Since I use pools with C-Class size, the pool runs out of space very quickly and it is impossible for a new client to get an IP address.
When I remove those entries from the Hosts list, everything works, until it gets filled by this crap again.
What rule in firewall would prevent ANY IP address other than from legitimate range to access the Hotspot, before it appears in the Hosts list?
Any suggestion is very welcome, thanks.