I noticed when one client’s radio is enabled, he brings down all other 7 clients causing timeouts. I’ve set AP TX and Client TX limits, but it doesn’t seem make much difference.
Looking at the 15 second snapshot of clients traffic, there are 215 destinations with loads of small packets.
What else can I do to limit this client from timing out rest of the clients?
I was using RB333/XR2 with v3.2 but tried 4.2 without any improvement.
With firewall rules, it doesn’t seem to help at all. I’ve also tried Simple Queues on WiKi, but all those packets are still there in IP Traffic Accounting, and still timeout the other clients. Anyone has any suggestion?
I already commented on the above referenced post but let me do so here again.
If you are running Nstream with polling you don’t need/want RTS. If you are not running Nstream than you need to use RTS. Set it ONLY on the CPE side. NOT on the AP side. You do not need to run 3.30 on the AP for it to support RTS.
The clients are UBNT 3.4, and they have “RTS Threshold” and “Fragmentation Threshold” set default. I’ve set RB333 “Hw. Protection Mode: rts cts” and set NS2’s “RTS Threshold=512” and “Fragmentation Threshold=1173”, and now I cannot access the client to make changes will have to visit him and do it onsite. What would you recommend for starting off RTS values?
Also trying connection-limit=150,32 as suggested, but don’t see any dropped packets. And still timing out…
He’s not xfering much data, seems more of lots of packets. Plus I have his bandwidth capped to 1M/256K from both AP side and client side.
If I am not mistaken the RTS/CTS is off by default.
Uncheck the off box.
This will enable the client to request to send data.
The problem you are encountering is due to the fact that this client continues to broadcast, ultimately deafening the AP to the other clients.
Yes, I’ve even visited the client side and had them scan all the PC’s. They seem to be clean. Looking at the packets, it’s mostly port 80, all-p2p, and communication services such as VoIP, Messengers, etc.
With it being off, the default value for RTS 2346. What would you recommend for it’s value? I tried 512 and although it’s connected to the AP, it locked me out. I’m gonna have to make a visit onsite to reset it. This was prior to enabling on AP side “Hw Protection Mode=rts cts”, enabling on AP side didn’t allow me to access the client’s radio.
Doesn’t the smaller packet size for RTS causes the client to get AP’s attention more often? So do you put higher RTS Threshold and Fragmentation Threshold values for the clients with high P2P uses and lower values for rest of the clients?
As much as i have experienced using Mikrotik it is only because of Virus/Trojan which sometimes go undetected. Secondly a client can bring down your entire sector if it has Torrents uploading data. If u are talking about multiple computers on the client side and quite a few use Torrents and simultaneously browsing data. there is nothing u can do. switch over to a PtP link instead of giving connection thru ur Mikrotik. Nano is an excellent client hence no issues with that. See my earlier posts, I faced similar problems but none cld give me a solution. I tried to look for reasons myself and came up with this conclusion, because so far no one cld suggest a positive working solution.