I have managed to "solve" a problem that we experienced with a hacker that "stole" our clients' sessions with hacker tools such as Netcut. I combined various methods and also used tips from various posts in the forums to finally get to a configuration that works well for us so far except for one problem that I'll detail later in this post. Below the detail of what I have done:
1. Enabled AP isolation on all AP's
2. Allow only 1 mac-address per IP in the hotspot
3. Added firewall rules to prevent traffic between devices on the same interface (i.e. hotspot)
4. Changed ARP to reply-only on hotspot interface. However, importantly you need to change the default ARP setting for DHCP scope to dynamic (add dynamic ARP entry) otherwise clients experience problems.
5. Set the netmask to /32 on the DHCP scope. The hotspot interface addres remains 10.5.50.1/24, but the netmask provided to DHCP clients are: 255.255.255.255. The result is that hotspot clients are treated like Point to Point links and as such are no longer affected by arp poisoning.
The above have stopped the hacker problem and all cleints works 100% except for my Nokia E71. The E71 is on the latest firmware release. If I try to access the Internet I get the error: "Gateway no reply". The momemt I change my subnet mask to the default /24 The Nokia works 100%. The problem is therefore that the Nokia does not seem to "understand" the /32 netmask. Does anybody have any suggestions to resolve this problem?