A system, method, and arrangement for controlling access to a wireless
communication network. When a User Equipment (UE) is denied access to the
network through a first access point, the UE stores the Location Area
Identity (LAI) utilized at the first access point on a list of forbidden
LAIs in the UE. If the LAI stored by the UE is utilized at another access
point where the UE is allowed access, the LAI at the other access point
is dynamically changed to a second LAI that is not on the UE's list of
forbidden LAIs. An access point database stores a table defining which
UEs are allowed to utilize each access point. The database also stores a
list of rejected LAIs for each UE. A radio network controller accesses
the database to determine an allowed LAI, and changes the LAI at the
other access points where the UE is allowed access.