1. Packages
  2. Juniper Mist Provider
  3. API Docs
  4. site
  5. Wlan
Juniper Mist v0.3.1 published on Monday, Apr 14, 2025 by Pulumi

junipermist.site.Wlan

Explore with Pulumi AI

This resource manages the Site Wlans. The WLAN object contains all the required configuration to broadcast an SSID (Authentication, VLAN, …)

Example Usage

import * as pulumi from "@pulumi/pulumi";
import * as junipermist from "@pulumi/juniper-mist";

const wlanOne = new junipermist.site.Wlan("wlan_one", {
    ssid: "wlan_one",
    siteId: terraformTest.id,
    bands: [
        "5",
        "6",
    ],
    vlanEnabled: true,
    vlanId: "143",
    wlanLimitUp: "10000",
    wlanLimitDown: "20000",
    clientLimitUp: "512",
    clientLimitDown: "1000",
    auth: {
        type: "psk",
        psk: "secretpsk",
    },
    "interface": "all",
});
Copy
import pulumi
import pulumi_juniper_mist as junipermist

wlan_one = junipermist.site.Wlan("wlan_one",
    ssid="wlan_one",
    site_id=terraform_test["id"],
    bands=[
        "5",
        "6",
    ],
    vlan_enabled=True,
    vlan_id="143",
    wlan_limit_up="10000",
    wlan_limit_down="20000",
    client_limit_up="512",
    client_limit_down="1000",
    auth={
        "type": "psk",
        "psk": "secretpsk",
    },
    interface="all")
Copy
package main

import (
	"github.com/pulumi/pulumi-junipermist/sdk/go/junipermist/site"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := site.NewWlan(ctx, "wlan_one", &site.WlanArgs{
			Ssid:   pulumi.String("wlan_one"),
			SiteId: pulumi.Any(terraformTest.Id),
			Bands: pulumi.StringArray{
				pulumi.String("5"),
				pulumi.String("6"),
			},
			VlanEnabled:     pulumi.Bool(true),
			VlanId:          pulumi.String("143"),
			WlanLimitUp:     pulumi.String("10000"),
			WlanLimitDown:   pulumi.String("20000"),
			ClientLimitUp:   pulumi.String("512"),
			ClientLimitDown: pulumi.String("1000"),
			Auth: &site.WlanAuthArgs{
				Type: pulumi.String("psk"),
				Psk:  pulumi.String("secretpsk"),
			},
			Interface: pulumi.String("all"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using JuniperMist = Pulumi.JuniperMist;

return await Deployment.RunAsync(() => 
{
    var wlanOne = new JuniperMist.Site.Wlan("wlan_one", new()
    {
        Ssid = "wlan_one",
        SiteId = terraformTest.Id,
        Bands = new[]
        {
            "5",
            "6",
        },
        VlanEnabled = true,
        VlanId = "143",
        WlanLimitUp = "10000",
        WlanLimitDown = "20000",
        ClientLimitUp = "512",
        ClientLimitDown = "1000",
        Auth = new JuniperMist.Site.Inputs.WlanAuthArgs
        {
            Type = "psk",
            Psk = "secretpsk",
        },
        Interface = "all",
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.junipermist.site.Wlan;
import com.pulumi.junipermist.site.WlanArgs;
import com.pulumi.junipermist.site.inputs.WlanAuthArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var wlanOne = new Wlan("wlanOne", WlanArgs.builder()
            .ssid("wlan_one")
            .siteId(terraformTest.id())
            .bands(            
                "5",
                "6")
            .vlanEnabled(true)
            .vlanId("143")
            .wlanLimitUp("10000")
            .wlanLimitDown("20000")
            .clientLimitUp("512")
            .clientLimitDown("1000")
            .auth(WlanAuthArgs.builder()
                .type("psk")
                .psk("secretpsk")
                .build())
            .interface_("all")
            .build());

    }
}
Copy
resources:
  wlanOne:
    type: junipermist:site:Wlan
    name: wlan_one
    properties:
      ssid: wlan_one
      siteId: ${terraformTest.id}
      bands:
        - '5'
        - '6'
      vlanEnabled: true
      vlanId: 143
      wlanLimitUp: 10000
      wlanLimitDown: 20000
      clientLimitUp: 512
      clientLimitDown: 1000
      auth:
        type: psk
        psk: secretpsk
      interface: all
Copy

Create Wlan Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new Wlan(name: string, args: WlanArgs, opts?: CustomResourceOptions);
@overload
def Wlan(resource_name: str,
         args: WlanArgs,
         opts: Optional[ResourceOptions] = None)

@overload
def Wlan(resource_name: str,
         opts: Optional[ResourceOptions] = None,
         site_id: Optional[str] = None,
         ssid: Optional[str] = None,
         acct_immediate_update: Optional[bool] = None,
         acct_interim_interval: Optional[int] = None,
         acct_servers: Optional[Sequence[WlanAcctServerArgs]] = None,
         airwatch: Optional[WlanAirwatchArgs] = None,
         allow_ipv6_ndp: Optional[bool] = None,
         allow_mdns: Optional[bool] = None,
         allow_ssdp: Optional[bool] = None,
         ap_ids: Optional[Sequence[str]] = None,
         app_limit: Optional[WlanAppLimitArgs] = None,
         app_qos: Optional[WlanAppQosArgs] = None,
         apply_to: Optional[str] = None,
         arp_filter: Optional[bool] = None,
         auth: Optional[WlanAuthArgs] = None,
         auth_server_selection: Optional[str] = None,
         auth_servers: Optional[Sequence[WlanAuthServerArgs]] = None,
         auth_servers_nas_id: Optional[str] = None,
         auth_servers_nas_ip: Optional[str] = None,
         auth_servers_retries: Optional[int] = None,
         auth_servers_timeout: Optional[int] = None,
         band_steer: Optional[bool] = None,
         band_steer_force_band5: Optional[bool] = None,
         bands: Optional[Sequence[str]] = None,
         block_blacklist_clients: Optional[bool] = None,
         bonjour: Optional[WlanBonjourArgs] = None,
         cisco_cwa: Optional[WlanCiscoCwaArgs] = None,
         client_limit_down: Optional[str] = None,
         client_limit_down_enabled: Optional[bool] = None,
         client_limit_up: Optional[str] = None,
         client_limit_up_enabled: Optional[bool] = None,
         coa_servers: Optional[Sequence[WlanCoaServerArgs]] = None,
         disable11ax: Optional[bool] = None,
         disable11be: Optional[bool] = None,
         disable_ht_vht_rates: Optional[bool] = None,
         disable_uapsd: Optional[bool] = None,
         disable_v1_roam_notify: Optional[bool] = None,
         disable_v2_roam_notify: Optional[bool] = None,
         disable_when_gateway_unreachable: Optional[bool] = None,
         disable_when_mxtunnel_down: Optional[bool] = None,
         disable_wmm: Optional[bool] = None,
         dns_server_rewrite: Optional[WlanDnsServerRewriteArgs] = None,
         dtim: Optional[int] = None,
         dynamic_psk: Optional[WlanDynamicPskArgs] = None,
         dynamic_vlan: Optional[WlanDynamicVlanArgs] = None,
         enable_local_keycaching: Optional[bool] = None,
         enable_wireless_bridging: Optional[bool] = None,
         enable_wireless_bridging_dhcp_tracking: Optional[bool] = None,
         enabled: Optional[bool] = None,
         fast_dot1x_timers: Optional[bool] = None,
         hide_ssid: Optional[bool] = None,
         hostname_ie: Optional[bool] = None,
         hotspot20: Optional[WlanHotspot20Args] = None,
         inject_dhcp_option82: Optional[WlanInjectDhcpOption82Args] = None,
         interface: Optional[str] = None,
         isolation: Optional[bool] = None,
         l2_isolation: Optional[bool] = None,
         legacy_overds: Optional[bool] = None,
         limit_bcast: Optional[bool] = None,
         limit_probe_response: Optional[bool] = None,
         max_idletime: Optional[int] = None,
         max_num_clients: Optional[int] = None,
         mist_nac: Optional[WlanMistNacArgs] = None,
         mxtunnel_ids: Optional[Sequence[str]] = None,
         mxtunnel_names: Optional[Sequence[str]] = None,
         no_static_dns: Optional[bool] = None,
         no_static_ip: Optional[bool] = None,
         portal: Optional[WlanPortalArgs] = None,
         portal_allowed_hostnames: Optional[Sequence[str]] = None,
         portal_allowed_subnets: Optional[Sequence[str]] = None,
         portal_denied_hostnames: Optional[Sequence[str]] = None,
         qos: Optional[WlanQosArgs] = None,
         radsec: Optional[WlanRadsecArgs] = None,
         rateset: Optional[Mapping[str, WlanRatesetArgs]] = None,
         reconnect_clients_when_roaming_mxcluster: Optional[bool] = None,
         roam_mode: Optional[str] = None,
         schedule: Optional[WlanScheduleArgs] = None,
         sle_excluded: Optional[bool] = None,
         use_eapol_v1: Optional[bool] = None,
         vlan_enabled: Optional[bool] = None,
         vlan_id: Optional[str] = None,
         vlan_ids: Optional[Sequence[str]] = None,
         vlan_pooling: Optional[bool] = None,
         wlan_limit_down: Optional[str] = None,
         wlan_limit_down_enabled: Optional[bool] = None,
         wlan_limit_up: Optional[str] = None,
         wlan_limit_up_enabled: Optional[bool] = None,
         wxtag_ids: Optional[Sequence[str]] = None,
         wxtunnel_id: Optional[str] = None,
         wxtunnel_remote_id: Optional[str] = None)
func NewWlan(ctx *Context, name string, args WlanArgs, opts ...ResourceOption) (*Wlan, error)
public Wlan(string name, WlanArgs args, CustomResourceOptions? opts = null)
public Wlan(String name, WlanArgs args)
public Wlan(String name, WlanArgs args, CustomResourceOptions options)
type: junipermist:site:Wlan
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. WlanArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. WlanArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. WlanArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. WlanArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. WlanArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var junipermistWlanResource = new JuniperMist.Site.Wlan("junipermistWlanResource", new()
{
    SiteId = "string",
    Ssid = "string",
    AcctImmediateUpdate = false,
    AcctInterimInterval = 0,
    AcctServers = new[]
    {
        new JuniperMist.Site.Inputs.WlanAcctServerArgs
        {
            Host = "string",
            Secret = "string",
            KeywrapEnabled = false,
            KeywrapFormat = "string",
            KeywrapKek = "string",
            KeywrapMack = "string",
            Port = "string",
        },
    },
    Airwatch = new JuniperMist.Site.Inputs.WlanAirwatchArgs
    {
        ApiKey = "string",
        ConsoleUrl = "string",
        Enabled = false,
        Password = "string",
        Username = "string",
    },
    AllowIpv6Ndp = false,
    AllowMdns = false,
    AllowSsdp = false,
    ApIds = new[]
    {
        "string",
    },
    AppLimit = new JuniperMist.Site.Inputs.WlanAppLimitArgs
    {
        Apps = 
        {
            { "string", 0 },
        },
        Enabled = false,
        WxtagIds = 
        {
            { "string", 0 },
        },
    },
    AppQos = new JuniperMist.Site.Inputs.WlanAppQosArgs
    {
        Apps = 
        {
            { "string", new JuniperMist.Site.Inputs.WlanAppQosAppsArgs
            {
                Dscp = "string",
                DstSubnet = "string",
                SrcSubnet = "string",
            } },
        },
        Enabled = false,
        Others = new[]
        {
            new JuniperMist.Site.Inputs.WlanAppQosOtherArgs
            {
                Dscp = "string",
                DstSubnet = "string",
                PortRanges = "string",
                Protocol = "string",
                SrcSubnet = "string",
            },
        },
    },
    ApplyTo = "string",
    ArpFilter = false,
    Auth = new JuniperMist.Site.Inputs.WlanAuthArgs
    {
        AnticlogThreshold = 0,
        EapReauth = false,
        EnableMacAuth = false,
        KeyIdx = 0,
        Keys = new[]
        {
            "string",
        },
        MultiPskOnly = false,
        Owe = "string",
        Pairwises = new[]
        {
            "string",
        },
        PrivateWlan = false,
        Psk = "string",
        Type = "string",
        WepAsSecondaryAuth = false,
    },
    AuthServerSelection = "string",
    AuthServers = new[]
    {
        new JuniperMist.Site.Inputs.WlanAuthServerArgs
        {
            Host = "string",
            Secret = "string",
            KeywrapEnabled = false,
            KeywrapFormat = "string",
            KeywrapKek = "string",
            KeywrapMack = "string",
            Port = "string",
            RequireMessageAuthenticator = false,
        },
    },
    AuthServersNasId = "string",
    AuthServersNasIp = "string",
    AuthServersRetries = 0,
    AuthServersTimeout = 0,
    BandSteer = false,
    BandSteerForceBand5 = false,
    Bands = new[]
    {
        "string",
    },
    BlockBlacklistClients = false,
    Bonjour = new JuniperMist.Site.Inputs.WlanBonjourArgs
    {
        AdditionalVlanIds = new[]
        {
            "string",
        },
        Enabled = false,
        Services = 
        {
            { "string", new JuniperMist.Site.Inputs.WlanBonjourServicesArgs
            {
                DisableLocal = false,
                RadiusGroups = new[]
                {
                    "string",
                },
                Scope = "string",
            } },
        },
    },
    CiscoCwa = new JuniperMist.Site.Inputs.WlanCiscoCwaArgs
    {
        AllowedHostnames = new[]
        {
            "string",
        },
        AllowedSubnets = new[]
        {
            "string",
        },
        BlockedSubnets = new[]
        {
            "string",
        },
        Enabled = false,
    },
    ClientLimitDown = "string",
    ClientLimitDownEnabled = false,
    ClientLimitUp = "string",
    ClientLimitUpEnabled = false,
    CoaServers = new[]
    {
        new JuniperMist.Site.Inputs.WlanCoaServerArgs
        {
            Ip = "string",
            Secret = "string",
            DisableEventTimestampCheck = false,
            Enabled = false,
            Port = "string",
        },
    },
    Disable11ax = false,
    Disable11be = false,
    DisableHtVhtRates = false,
    DisableUapsd = false,
    DisableV1RoamNotify = false,
    DisableV2RoamNotify = false,
    DisableWhenGatewayUnreachable = false,
    DisableWhenMxtunnelDown = false,
    DisableWmm = false,
    DnsServerRewrite = new JuniperMist.Site.Inputs.WlanDnsServerRewriteArgs
    {
        Enabled = false,
        RadiusGroups = 
        {
            { "string", "string" },
        },
    },
    Dtim = 0,
    DynamicPsk = new JuniperMist.Site.Inputs.WlanDynamicPskArgs
    {
        DefaultPsk = "string",
        DefaultVlanId = "string",
        Enabled = false,
        ForceLookup = false,
        Source = "string",
    },
    DynamicVlan = new JuniperMist.Site.Inputs.WlanDynamicVlanArgs
    {
        DefaultVlanIds = new[]
        {
            "string",
        },
        Enabled = false,
        LocalVlanIds = new[]
        {
            "string",
        },
        Type = "string",
        Vlans = 
        {
            { "string", "string" },
        },
    },
    EnableLocalKeycaching = false,
    EnableWirelessBridging = false,
    EnableWirelessBridgingDhcpTracking = false,
    Enabled = false,
    FastDot1xTimers = false,
    HideSsid = false,
    HostnameIe = false,
    Hotspot20 = new JuniperMist.Site.Inputs.WlanHotspot20Args
    {
        DomainNames = new[]
        {
            "string",
        },
        Enabled = false,
        NaiRealms = new[]
        {
            "string",
        },
        Operators = new[]
        {
            "string",
        },
        Rcois = new[]
        {
            "string",
        },
        VenueName = "string",
    },
    InjectDhcpOption82 = new JuniperMist.Site.Inputs.WlanInjectDhcpOption82Args
    {
        CircuitId = "string",
        Enabled = false,
    },
    Interface = "string",
    Isolation = false,
    L2Isolation = false,
    LegacyOverds = false,
    LimitBcast = false,
    LimitProbeResponse = false,
    MaxIdletime = 0,
    MaxNumClients = 0,
    MistNac = new JuniperMist.Site.Inputs.WlanMistNacArgs
    {
        Enabled = false,
    },
    MxtunnelIds = new[]
    {
        "string",
    },
    MxtunnelNames = new[]
    {
        "string",
    },
    NoStaticDns = false,
    NoStaticIp = false,
    Portal = new JuniperMist.Site.Inputs.WlanPortalArgs
    {
        AllowWlanIdRoam = false,
        AmazonClientId = "string",
        AmazonClientSecret = "string",
        AmazonEmailDomains = new[]
        {
            "string",
        },
        AmazonEnabled = false,
        AmazonExpire = 0,
        Auth = "string",
        AzureClientId = "string",
        AzureClientSecret = "string",
        AzureEnabled = false,
        AzureExpire = 0,
        AzureTenantId = "string",
        BroadnetPassword = "string",
        BroadnetSid = "string",
        BroadnetUserId = "string",
        BypassWhenCloudDown = false,
        ClickatellApiKey = "string",
        CrossSite = false,
        EmailEnabled = false,
        Enabled = false,
        Expire = 0,
        ExternalPortalUrl = "string",
        FacebookClientId = "string",
        FacebookClientSecret = "string",
        FacebookEmailDomains = new[]
        {
            "string",
        },
        FacebookEnabled = false,
        FacebookExpire = 0,
        Forward = false,
        ForwardUrl = "string",
        GoogleClientId = "string",
        GoogleClientSecret = "string",
        GoogleEmailDomains = new[]
        {
            "string",
        },
        GoogleEnabled = false,
        GoogleExpire = 0,
        GupshupPassword = "string",
        GupshupUserid = "string",
        MicrosoftClientId = "string",
        MicrosoftClientSecret = "string",
        MicrosoftEmailDomains = new[]
        {
            "string",
        },
        MicrosoftEnabled = false,
        MicrosoftExpire = 0,
        PassphraseEnabled = false,
        PassphraseExpire = 0,
        Password = "string",
        PredefinedSponsorsEnabled = false,
        PredefinedSponsorsHideEmail = false,
        Privacy = false,
        PuzzelPassword = "string",
        PuzzelServiceId = "string",
        PuzzelUsername = "string",
        SmsEnabled = false,
        SmsExpire = 0,
        SmsMessageFormat = "string",
        SmsProvider = "string",
        SponsorAutoApprove = false,
        SponsorEmailDomains = new[]
        {
            "string",
        },
        SponsorEnabled = false,
        SponsorExpire = 0,
        SponsorLinkValidityDuration = "string",
        SponsorNotifyAll = false,
        SponsorStatusNotify = false,
        Sponsors = 
        {
            { "string", "string" },
        },
        SsoDefaultRole = "string",
        SsoForcedRole = "string",
        SsoIdpCert = "string",
        SsoIdpSignAlgo = "string",
        SsoIdpSsoUrl = "string",
        SsoIssuer = "string",
        SsoNameidFormat = "string",
        TelstraClientId = "string",
        TelstraClientSecret = "string",
        TwilioAuthToken = "string",
        TwilioPhoneNumber = "string",
        TwilioSid = "string",
    },
    PortalAllowedHostnames = new[]
    {
        "string",
    },
    PortalAllowedSubnets = new[]
    {
        "string",
    },
    PortalDeniedHostnames = new[]
    {
        "string",
    },
    Qos = new JuniperMist.Site.Inputs.WlanQosArgs
    {
        Class = "string",
        Overwrite = false,
    },
    Radsec = new JuniperMist.Site.Inputs.WlanRadsecArgs
    {
        CoaEnabled = false,
        Enabled = false,
        IdleTimeout = "string",
        MxclusterIds = new[]
        {
            "string",
        },
        ProxyHosts = new[]
        {
            "string",
        },
        ServerName = "string",
        Servers = new[]
        {
            new JuniperMist.Site.Inputs.WlanRadsecServerArgs
            {
                Host = "string",
                Port = 0,
            },
        },
        UseMxedge = false,
        UseSiteMxedge = false,
    },
    Rateset = 
    {
        { "string", new JuniperMist.Site.Inputs.WlanRatesetArgs
        {
            Eht = "string",
            He = "string",
            Ht = "string",
            Legacies = new[]
            {
                "string",
            },
            MinRssi = 0,
            Template = "string",
            Vht = "string",
        } },
    },
    ReconnectClientsWhenRoamingMxcluster = false,
    RoamMode = "string",
    Schedule = new JuniperMist.Site.Inputs.WlanScheduleArgs
    {
        Enabled = false,
        Hours = new JuniperMist.Site.Inputs.WlanScheduleHoursArgs
        {
            Fri = "string",
            Mon = "string",
            Sat = "string",
            Sun = "string",
            Thu = "string",
            Tue = "string",
            Wed = "string",
        },
    },
    SleExcluded = false,
    UseEapolV1 = false,
    VlanEnabled = false,
    VlanId = "string",
    VlanIds = new[]
    {
        "string",
    },
    VlanPooling = false,
    WlanLimitDown = "string",
    WlanLimitDownEnabled = false,
    WlanLimitUp = "string",
    WlanLimitUpEnabled = false,
    WxtagIds = new[]
    {
        "string",
    },
    WxtunnelId = "string",
    WxtunnelRemoteId = "string",
});
Copy
example, err := site.NewWlan(ctx, "junipermistWlanResource", &site.WlanArgs{
	SiteId:              pulumi.String("string"),
	Ssid:                pulumi.String("string"),
	AcctImmediateUpdate: pulumi.Bool(false),
	AcctInterimInterval: pulumi.Int(0),
	AcctServers: site.WlanAcctServerArray{
		&site.WlanAcctServerArgs{
			Host:           pulumi.String("string"),
			Secret:         pulumi.String("string"),
			KeywrapEnabled: pulumi.Bool(false),
			KeywrapFormat:  pulumi.String("string"),
			KeywrapKek:     pulumi.String("string"),
			KeywrapMack:    pulumi.String("string"),
			Port:           pulumi.String("string"),
		},
	},
	Airwatch: &site.WlanAirwatchArgs{
		ApiKey:     pulumi.String("string"),
		ConsoleUrl: pulumi.String("string"),
		Enabled:    pulumi.Bool(false),
		Password:   pulumi.String("string"),
		Username:   pulumi.String("string"),
	},
	AllowIpv6Ndp: pulumi.Bool(false),
	AllowMdns:    pulumi.Bool(false),
	AllowSsdp:    pulumi.Bool(false),
	ApIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	AppLimit: &site.WlanAppLimitArgs{
		Apps: pulumi.IntMap{
			"string": pulumi.Int(0),
		},
		Enabled: pulumi.Bool(false),
		WxtagIds: pulumi.IntMap{
			"string": pulumi.Int(0),
		},
	},
	AppQos: &site.WlanAppQosArgs{
		Apps: site.WlanAppQosAppsMap{
			"string": &site.WlanAppQosAppsArgs{
				Dscp:      pulumi.String("string"),
				DstSubnet: pulumi.String("string"),
				SrcSubnet: pulumi.String("string"),
			},
		},
		Enabled: pulumi.Bool(false),
		Others: site.WlanAppQosOtherArray{
			&site.WlanAppQosOtherArgs{
				Dscp:       pulumi.String("string"),
				DstSubnet:  pulumi.String("string"),
				PortRanges: pulumi.String("string"),
				Protocol:   pulumi.String("string"),
				SrcSubnet:  pulumi.String("string"),
			},
		},
	},
	ApplyTo:   pulumi.String("string"),
	ArpFilter: pulumi.Bool(false),
	Auth: &site.WlanAuthArgs{
		AnticlogThreshold: pulumi.Int(0),
		EapReauth:         pulumi.Bool(false),
		EnableMacAuth:     pulumi.Bool(false),
		KeyIdx:            pulumi.Int(0),
		Keys: pulumi.StringArray{
			pulumi.String("string"),
		},
		MultiPskOnly: pulumi.Bool(false),
		Owe:          pulumi.String("string"),
		Pairwises: pulumi.StringArray{
			pulumi.String("string"),
		},
		PrivateWlan:        pulumi.Bool(false),
		Psk:                pulumi.String("string"),
		Type:               pulumi.String("string"),
		WepAsSecondaryAuth: pulumi.Bool(false),
	},
	AuthServerSelection: pulumi.String("string"),
	AuthServers: site.WlanAuthServerArray{
		&site.WlanAuthServerArgs{
			Host:                        pulumi.String("string"),
			Secret:                      pulumi.String("string"),
			KeywrapEnabled:              pulumi.Bool(false),
			KeywrapFormat:               pulumi.String("string"),
			KeywrapKek:                  pulumi.String("string"),
			KeywrapMack:                 pulumi.String("string"),
			Port:                        pulumi.String("string"),
			RequireMessageAuthenticator: pulumi.Bool(false),
		},
	},
	AuthServersNasId:    pulumi.String("string"),
	AuthServersNasIp:    pulumi.String("string"),
	AuthServersRetries:  pulumi.Int(0),
	AuthServersTimeout:  pulumi.Int(0),
	BandSteer:           pulumi.Bool(false),
	BandSteerForceBand5: pulumi.Bool(false),
	Bands: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockBlacklistClients: pulumi.Bool(false),
	Bonjour: &site.WlanBonjourArgs{
		AdditionalVlanIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		Services: site.WlanBonjourServicesMap{
			"string": &site.WlanBonjourServicesArgs{
				DisableLocal: pulumi.Bool(false),
				RadiusGroups: pulumi.StringArray{
					pulumi.String("string"),
				},
				Scope: pulumi.String("string"),
			},
		},
	},
	CiscoCwa: &site.WlanCiscoCwaArgs{
		AllowedHostnames: pulumi.StringArray{
			pulumi.String("string"),
		},
		AllowedSubnets: pulumi.StringArray{
			pulumi.String("string"),
		},
		BlockedSubnets: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
	},
	ClientLimitDown:        pulumi.String("string"),
	ClientLimitDownEnabled: pulumi.Bool(false),
	ClientLimitUp:          pulumi.String("string"),
	ClientLimitUpEnabled:   pulumi.Bool(false),
	CoaServers: site.WlanCoaServerArray{
		&site.WlanCoaServerArgs{
			Ip:                         pulumi.String("string"),
			Secret:                     pulumi.String("string"),
			DisableEventTimestampCheck: pulumi.Bool(false),
			Enabled:                    pulumi.Bool(false),
			Port:                       pulumi.String("string"),
		},
	},
	Disable11ax:                   pulumi.Bool(false),
	Disable11be:                   pulumi.Bool(false),
	DisableHtVhtRates:             pulumi.Bool(false),
	DisableUapsd:                  pulumi.Bool(false),
	DisableV1RoamNotify:           pulumi.Bool(false),
	DisableV2RoamNotify:           pulumi.Bool(false),
	DisableWhenGatewayUnreachable: pulumi.Bool(false),
	DisableWhenMxtunnelDown:       pulumi.Bool(false),
	DisableWmm:                    pulumi.Bool(false),
	DnsServerRewrite: &site.WlanDnsServerRewriteArgs{
		Enabled: pulumi.Bool(false),
		RadiusGroups: pulumi.StringMap{
			"string": pulumi.String("string"),
		},
	},
	Dtim: pulumi.Int(0),
	DynamicPsk: &site.WlanDynamicPskArgs{
		DefaultPsk:    pulumi.String("string"),
		DefaultVlanId: pulumi.String("string"),
		Enabled:       pulumi.Bool(false),
		ForceLookup:   pulumi.Bool(false),
		Source:        pulumi.String("string"),
	},
	DynamicVlan: &site.WlanDynamicVlanArgs{
		DefaultVlanIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		LocalVlanIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		Type: pulumi.String("string"),
		Vlans: pulumi.StringMap{
			"string": pulumi.String("string"),
		},
	},
	EnableLocalKeycaching:              pulumi.Bool(false),
	EnableWirelessBridging:             pulumi.Bool(false),
	EnableWirelessBridgingDhcpTracking: pulumi.Bool(false),
	Enabled:                            pulumi.Bool(false),
	FastDot1xTimers:                    pulumi.Bool(false),
	HideSsid:                           pulumi.Bool(false),
	HostnameIe:                         pulumi.Bool(false),
	Hotspot20: &site.WlanHotspot20Args{
		DomainNames: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		NaiRealms: pulumi.StringArray{
			pulumi.String("string"),
		},
		Operators: pulumi.StringArray{
			pulumi.String("string"),
		},
		Rcois: pulumi.StringArray{
			pulumi.String("string"),
		},
		VenueName: pulumi.String("string"),
	},
	InjectDhcpOption82: &site.WlanInjectDhcpOption82Args{
		CircuitId: pulumi.String("string"),
		Enabled:   pulumi.Bool(false),
	},
	Interface:          pulumi.String("string"),
	Isolation:          pulumi.Bool(false),
	L2Isolation:        pulumi.Bool(false),
	LegacyOverds:       pulumi.Bool(false),
	LimitBcast:         pulumi.Bool(false),
	LimitProbeResponse: pulumi.Bool(false),
	MaxIdletime:        pulumi.Int(0),
	MaxNumClients:      pulumi.Int(0),
	MistNac: &site.WlanMistNacArgs{
		Enabled: pulumi.Bool(false),
	},
	MxtunnelIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	MxtunnelNames: pulumi.StringArray{
		pulumi.String("string"),
	},
	NoStaticDns: pulumi.Bool(false),
	NoStaticIp:  pulumi.Bool(false),
	Portal: &site.WlanPortalArgs{
		AllowWlanIdRoam:    pulumi.Bool(false),
		AmazonClientId:     pulumi.String("string"),
		AmazonClientSecret: pulumi.String("string"),
		AmazonEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		AmazonEnabled:        pulumi.Bool(false),
		AmazonExpire:         pulumi.Int(0),
		Auth:                 pulumi.String("string"),
		AzureClientId:        pulumi.String("string"),
		AzureClientSecret:    pulumi.String("string"),
		AzureEnabled:         pulumi.Bool(false),
		AzureExpire:          pulumi.Int(0),
		AzureTenantId:        pulumi.String("string"),
		BroadnetPassword:     pulumi.String("string"),
		BroadnetSid:          pulumi.String("string"),
		BroadnetUserId:       pulumi.String("string"),
		BypassWhenCloudDown:  pulumi.Bool(false),
		ClickatellApiKey:     pulumi.String("string"),
		CrossSite:            pulumi.Bool(false),
		EmailEnabled:         pulumi.Bool(false),
		Enabled:              pulumi.Bool(false),
		Expire:               pulumi.Int(0),
		ExternalPortalUrl:    pulumi.String("string"),
		FacebookClientId:     pulumi.String("string"),
		FacebookClientSecret: pulumi.String("string"),
		FacebookEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		FacebookEnabled:    pulumi.Bool(false),
		FacebookExpire:     pulumi.Int(0),
		Forward:            pulumi.Bool(false),
		ForwardUrl:         pulumi.String("string"),
		GoogleClientId:     pulumi.String("string"),
		GoogleClientSecret: pulumi.String("string"),
		GoogleEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		GoogleEnabled:         pulumi.Bool(false),
		GoogleExpire:          pulumi.Int(0),
		GupshupPassword:       pulumi.String("string"),
		GupshupUserid:         pulumi.String("string"),
		MicrosoftClientId:     pulumi.String("string"),
		MicrosoftClientSecret: pulumi.String("string"),
		MicrosoftEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		MicrosoftEnabled:            pulumi.Bool(false),
		MicrosoftExpire:             pulumi.Int(0),
		PassphraseEnabled:           pulumi.Bool(false),
		PassphraseExpire:            pulumi.Int(0),
		Password:                    pulumi.String("string"),
		PredefinedSponsorsEnabled:   pulumi.Bool(false),
		PredefinedSponsorsHideEmail: pulumi.Bool(false),
		Privacy:                     pulumi.Bool(false),
		PuzzelPassword:              pulumi.String("string"),
		PuzzelServiceId:             pulumi.String("string"),
		PuzzelUsername:              pulumi.String("string"),
		SmsEnabled:                  pulumi.Bool(false),
		SmsExpire:                   pulumi.Int(0),
		SmsMessageFormat:            pulumi.String("string"),
		SmsProvider:                 pulumi.String("string"),
		SponsorAutoApprove:          pulumi.Bool(false),
		SponsorEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		SponsorEnabled:              pulumi.Bool(false),
		SponsorExpire:               pulumi.Int(0),
		SponsorLinkValidityDuration: pulumi.String("string"),
		SponsorNotifyAll:            pulumi.Bool(false),
		SponsorStatusNotify:         pulumi.Bool(false),
		Sponsors: pulumi.StringMap{
			"string": pulumi.String("string"),
		},
		SsoDefaultRole:      pulumi.String("string"),
		SsoForcedRole:       pulumi.String("string"),
		SsoIdpCert:          pulumi.String("string"),
		SsoIdpSignAlgo:      pulumi.String("string"),
		SsoIdpSsoUrl:        pulumi.String("string"),
		SsoIssuer:           pulumi.String("string"),
		SsoNameidFormat:     pulumi.String("string"),
		TelstraClientId:     pulumi.String("string"),
		TelstraClientSecret: pulumi.String("string"),
		TwilioAuthToken:     pulumi.String("string"),
		TwilioPhoneNumber:   pulumi.String("string"),
		TwilioSid:           pulumi.String("string"),
	},
	PortalAllowedHostnames: pulumi.StringArray{
		pulumi.String("string"),
	},
	PortalAllowedSubnets: pulumi.StringArray{
		pulumi.String("string"),
	},
	PortalDeniedHostnames: pulumi.StringArray{
		pulumi.String("string"),
	},
	Qos: &site.WlanQosArgs{
		Class:     pulumi.String("string"),
		Overwrite: pulumi.Bool(false),
	},
	Radsec: &site.WlanRadsecArgs{
		CoaEnabled:  pulumi.Bool(false),
		Enabled:     pulumi.Bool(false),
		IdleTimeout: pulumi.String("string"),
		MxclusterIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		ProxyHosts: pulumi.StringArray{
			pulumi.String("string"),
		},
		ServerName: pulumi.String("string"),
		Servers: site.WlanRadsecServerArray{
			&site.WlanRadsecServerArgs{
				Host: pulumi.String("string"),
				Port: pulumi.Int(0),
			},
		},
		UseMxedge:     pulumi.Bool(false),
		UseSiteMxedge: pulumi.Bool(false),
	},
	Rateset: site.WlanRatesetMap{
		"string": &site.WlanRatesetArgs{
			Eht: pulumi.String("string"),
			He:  pulumi.String("string"),
			Ht:  pulumi.String("string"),
			Legacies: pulumi.StringArray{
				pulumi.String("string"),
			},
			MinRssi:  pulumi.Int(0),
			Template: pulumi.String("string"),
			Vht:      pulumi.String("string"),
		},
	},
	ReconnectClientsWhenRoamingMxcluster: pulumi.Bool(false),
	RoamMode:                             pulumi.String("string"),
	Schedule: &site.WlanScheduleArgs{
		Enabled: pulumi.Bool(false),
		Hours: &site.WlanScheduleHoursArgs{
			Fri: pulumi.String("string"),
			Mon: pulumi.String("string"),
			Sat: pulumi.String("string"),
			Sun: pulumi.String("string"),
			Thu: pulumi.String("string"),
			Tue: pulumi.String("string"),
			Wed: pulumi.String("string"),
		},
	},
	SleExcluded: pulumi.Bool(false),
	UseEapolV1:  pulumi.Bool(false),
	VlanEnabled: pulumi.Bool(false),
	VlanId:      pulumi.String("string"),
	VlanIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	VlanPooling:          pulumi.Bool(false),
	WlanLimitDown:        pulumi.String("string"),
	WlanLimitDownEnabled: pulumi.Bool(false),
	WlanLimitUp:          pulumi.String("string"),
	WlanLimitUpEnabled:   pulumi.Bool(false),
	WxtagIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	WxtunnelId:       pulumi.String("string"),
	WxtunnelRemoteId: pulumi.String("string"),
})
Copy
var junipermistWlanResource = new Wlan("junipermistWlanResource", WlanArgs.builder()
    .siteId("string")
    .ssid("string")
    .acctImmediateUpdate(false)
    .acctInterimInterval(0)
    .acctServers(WlanAcctServerArgs.builder()
        .host("string")
        .secret("string")
        .keywrapEnabled(false)
        .keywrapFormat("string")
        .keywrapKek("string")
        .keywrapMack("string")
        .port("string")
        .build())
    .airwatch(WlanAirwatchArgs.builder()
        .apiKey("string")
        .consoleUrl("string")
        .enabled(false)
        .password("string")
        .username("string")
        .build())
    .allowIpv6Ndp(false)
    .allowMdns(false)
    .allowSsdp(false)
    .apIds("string")
    .appLimit(WlanAppLimitArgs.builder()
        .apps(Map.of("string", 0))
        .enabled(false)
        .wxtagIds(Map.of("string", 0))
        .build())
    .appQos(WlanAppQosArgs.builder()
        .apps(Map.of("string", Map.ofEntries(
            Map.entry("dscp", "string"),
            Map.entry("dstSubnet", "string"),
            Map.entry("srcSubnet", "string")
        )))
        .enabled(false)
        .others(WlanAppQosOtherArgs.builder()
            .dscp("string")
            .dstSubnet("string")
            .portRanges("string")
            .protocol("string")
            .srcSubnet("string")
            .build())
        .build())
    .applyTo("string")
    .arpFilter(false)
    .auth(WlanAuthArgs.builder()
        .anticlogThreshold(0)
        .eapReauth(false)
        .enableMacAuth(false)
        .keyIdx(0)
        .keys("string")
        .multiPskOnly(false)
        .owe("string")
        .pairwises("string")
        .privateWlan(false)
        .psk("string")
        .type("string")
        .wepAsSecondaryAuth(false)
        .build())
    .authServerSelection("string")
    .authServers(WlanAuthServerArgs.builder()
        .host("string")
        .secret("string")
        .keywrapEnabled(false)
        .keywrapFormat("string")
        .keywrapKek("string")
        .keywrapMack("string")
        .port("string")
        .requireMessageAuthenticator(false)
        .build())
    .authServersNasId("string")
    .authServersNasIp("string")
    .authServersRetries(0)
    .authServersTimeout(0)
    .bandSteer(false)
    .bandSteerForceBand5(false)
    .bands("string")
    .blockBlacklistClients(false)
    .bonjour(WlanBonjourArgs.builder()
        .additionalVlanIds("string")
        .enabled(false)
        .services(Map.of("string", Map.ofEntries(
            Map.entry("disableLocal", false),
            Map.entry("radiusGroups", "string"),
            Map.entry("scope", "string")
        )))
        .build())
    .ciscoCwa(WlanCiscoCwaArgs.builder()
        .allowedHostnames("string")
        .allowedSubnets("string")
        .blockedSubnets("string")
        .enabled(false)
        .build())
    .clientLimitDown("string")
    .clientLimitDownEnabled(false)
    .clientLimitUp("string")
    .clientLimitUpEnabled(false)
    .coaServers(WlanCoaServerArgs.builder()
        .ip("string")
        .secret("string")
        .disableEventTimestampCheck(false)
        .enabled(false)
        .port("string")
        .build())
    .disable11ax(false)
    .disable11be(false)
    .disableHtVhtRates(false)
    .disableUapsd(false)
    .disableV1RoamNotify(false)
    .disableV2RoamNotify(false)
    .disableWhenGatewayUnreachable(false)
    .disableWhenMxtunnelDown(false)
    .disableWmm(false)
    .dnsServerRewrite(WlanDnsServerRewriteArgs.builder()
        .enabled(false)
        .radiusGroups(Map.of("string", "string"))
        .build())
    .dtim(0)
    .dynamicPsk(WlanDynamicPskArgs.builder()
        .defaultPsk("string")
        .defaultVlanId("string")
        .enabled(false)
        .forceLookup(false)
        .source("string")
        .build())
    .dynamicVlan(WlanDynamicVlanArgs.builder()
        .defaultVlanIds("string")
        .enabled(false)
        .localVlanIds("string")
        .type("string")
        .vlans(Map.of("string", "string"))
        .build())
    .enableLocalKeycaching(false)
    .enableWirelessBridging(false)
    .enableWirelessBridgingDhcpTracking(false)
    .enabled(false)
    .fastDot1xTimers(false)
    .hideSsid(false)
    .hostnameIe(false)
    .hotspot20(WlanHotspot20Args.builder()
        .domainNames("string")
        .enabled(false)
        .naiRealms("string")
        .operators("string")
        .rcois("string")
        .venueName("string")
        .build())
    .injectDhcpOption82(WlanInjectDhcpOption82Args.builder()
        .circuitId("string")
        .enabled(false)
        .build())
    .interface_("string")
    .isolation(false)
    .l2Isolation(false)
    .legacyOverds(false)
    .limitBcast(false)
    .limitProbeResponse(false)
    .maxIdletime(0)
    .maxNumClients(0)
    .mistNac(WlanMistNacArgs.builder()
        .enabled(false)
        .build())
    .mxtunnelIds("string")
    .mxtunnelNames("string")
    .noStaticDns(false)
    .noStaticIp(false)
    .portal(WlanPortalArgs.builder()
        .allowWlanIdRoam(false)
        .amazonClientId("string")
        .amazonClientSecret("string")
        .amazonEmailDomains("string")
        .amazonEnabled(false)
        .amazonExpire(0)
        .auth("string")
        .azureClientId("string")
        .azureClientSecret("string")
        .azureEnabled(false)
        .azureExpire(0)
        .azureTenantId("string")
        .broadnetPassword("string")
        .broadnetSid("string")
        .broadnetUserId("string")
        .bypassWhenCloudDown(false)
        .clickatellApiKey("string")
        .crossSite(false)
        .emailEnabled(false)
        .enabled(false)
        .expire(0)
        .externalPortalUrl("string")
        .facebookClientId("string")
        .facebookClientSecret("string")
        .facebookEmailDomains("string")
        .facebookEnabled(false)
        .facebookExpire(0)
        .forward(false)
        .forwardUrl("string")
        .googleClientId("string")
        .googleClientSecret("string")
        .googleEmailDomains("string")
        .googleEnabled(false)
        .googleExpire(0)
        .gupshupPassword("string")
        .gupshupUserid("string")
        .microsoftClientId("string")
        .microsoftClientSecret("string")
        .microsoftEmailDomains("string")
        .microsoftEnabled(false)
        .microsoftExpire(0)
        .passphraseEnabled(false)
        .passphraseExpire(0)
        .password("string")
        .predefinedSponsorsEnabled(false)
        .predefinedSponsorsHideEmail(false)
        .privacy(false)
        .puzzelPassword("string")
        .puzzelServiceId("string")
        .puzzelUsername("string")
        .smsEnabled(false)
        .smsExpire(0)
        .smsMessageFormat("string")
        .smsProvider("string")
        .sponsorAutoApprove(false)
        .sponsorEmailDomains("string")
        .sponsorEnabled(false)
        .sponsorExpire(0)
        .sponsorLinkValidityDuration("string")
        .sponsorNotifyAll(false)
        .sponsorStatusNotify(false)
        .sponsors(Map.of("string", "string"))
        .ssoDefaultRole("string")
        .ssoForcedRole("string")
        .ssoIdpCert("string")
        .ssoIdpSignAlgo("string")
        .ssoIdpSsoUrl("string")
        .ssoIssuer("string")
        .ssoNameidFormat("string")
        .telstraClientId("string")
        .telstraClientSecret("string")
        .twilioAuthToken("string")
        .twilioPhoneNumber("string")
        .twilioSid("string")
        .build())
    .portalAllowedHostnames("string")
    .portalAllowedSubnets("string")
    .portalDeniedHostnames("string")
    .qos(WlanQosArgs.builder()
        .class_("string")
        .overwrite(false)
        .build())
    .radsec(WlanRadsecArgs.builder()
        .coaEnabled(false)
        .enabled(false)
        .idleTimeout("string")
        .mxclusterIds("string")
        .proxyHosts("string")
        .serverName("string")
        .servers(WlanRadsecServerArgs.builder()
            .host("string")
            .port(0)
            .build())
        .useMxedge(false)
        .useSiteMxedge(false)
        .build())
    .rateset(Map.of("string", Map.ofEntries(
        Map.entry("eht", "string"),
        Map.entry("he", "string"),
        Map.entry("ht", "string"),
        Map.entry("legacies", "string"),
        Map.entry("minRssi", 0),
        Map.entry("template", "string"),
        Map.entry("vht", "string")
    )))
    .reconnectClientsWhenRoamingMxcluster(false)
    .roamMode("string")
    .schedule(WlanScheduleArgs.builder()
        .enabled(false)
        .hours(WlanScheduleHoursArgs.builder()
            .fri("string")
            .mon("string")
            .sat("string")
            .sun("string")
            .thu("string")
            .tue("string")
            .wed("string")
            .build())
        .build())
    .sleExcluded(false)
    .useEapolV1(false)
    .vlanEnabled(false)
    .vlanId("string")
    .vlanIds("string")
    .vlanPooling(false)
    .wlanLimitDown("string")
    .wlanLimitDownEnabled(false)
    .wlanLimitUp("string")
    .wlanLimitUpEnabled(false)
    .wxtagIds("string")
    .wxtunnelId("string")
    .wxtunnelRemoteId("string")
    .build());
Copy
junipermist_wlan_resource = junipermist.site.Wlan("junipermistWlanResource",
    site_id="string",
    ssid="string",
    acct_immediate_update=False,
    acct_interim_interval=0,
    acct_servers=[{
        "host": "string",
        "secret": "string",
        "keywrap_enabled": False,
        "keywrap_format": "string",
        "keywrap_kek": "string",
        "keywrap_mack": "string",
        "port": "string",
    }],
    airwatch={
        "api_key": "string",
        "console_url": "string",
        "enabled": False,
        "password": "string",
        "username": "string",
    },
    allow_ipv6_ndp=False,
    allow_mdns=False,
    allow_ssdp=False,
    ap_ids=["string"],
    app_limit={
        "apps": {
            "string": 0,
        },
        "enabled": False,
        "wxtag_ids": {
            "string": 0,
        },
    },
    app_qos={
        "apps": {
            "string": {
                "dscp": "string",
                "dst_subnet": "string",
                "src_subnet": "string",
            },
        },
        "enabled": False,
        "others": [{
            "dscp": "string",
            "dst_subnet": "string",
            "port_ranges": "string",
            "protocol": "string",
            "src_subnet": "string",
        }],
    },
    apply_to="string",
    arp_filter=False,
    auth={
        "anticlog_threshold": 0,
        "eap_reauth": False,
        "enable_mac_auth": False,
        "key_idx": 0,
        "keys": ["string"],
        "multi_psk_only": False,
        "owe": "string",
        "pairwises": ["string"],
        "private_wlan": False,
        "psk": "string",
        "type": "string",
        "wep_as_secondary_auth": False,
    },
    auth_server_selection="string",
    auth_servers=[{
        "host": "string",
        "secret": "string",
        "keywrap_enabled": False,
        "keywrap_format": "string",
        "keywrap_kek": "string",
        "keywrap_mack": "string",
        "port": "string",
        "require_message_authenticator": False,
    }],
    auth_servers_nas_id="string",
    auth_servers_nas_ip="string",
    auth_servers_retries=0,
    auth_servers_timeout=0,
    band_steer=False,
    band_steer_force_band5=False,
    bands=["string"],
    block_blacklist_clients=False,
    bonjour={
        "additional_vlan_ids": ["string"],
        "enabled": False,
        "services": {
            "string": {
                "disable_local": False,
                "radius_groups": ["string"],
                "scope": "string",
            },
        },
    },
    cisco_cwa={
        "allowed_hostnames": ["string"],
        "allowed_subnets": ["string"],
        "blocked_subnets": ["string"],
        "enabled": False,
    },
    client_limit_down="string",
    client_limit_down_enabled=False,
    client_limit_up="string",
    client_limit_up_enabled=False,
    coa_servers=[{
        "ip": "string",
        "secret": "string",
        "disable_event_timestamp_check": False,
        "enabled": False,
        "port": "string",
    }],
    disable11ax=False,
    disable11be=False,
    disable_ht_vht_rates=False,
    disable_uapsd=False,
    disable_v1_roam_notify=False,
    disable_v2_roam_notify=False,
    disable_when_gateway_unreachable=False,
    disable_when_mxtunnel_down=False,
    disable_wmm=False,
    dns_server_rewrite={
        "enabled": False,
        "radius_groups": {
            "string": "string",
        },
    },
    dtim=0,
    dynamic_psk={
        "default_psk": "string",
        "default_vlan_id": "string",
        "enabled": False,
        "force_lookup": False,
        "source": "string",
    },
    dynamic_vlan={
        "default_vlan_ids": ["string"],
        "enabled": False,
        "local_vlan_ids": ["string"],
        "type": "string",
        "vlans": {
            "string": "string",
        },
    },
    enable_local_keycaching=False,
    enable_wireless_bridging=False,
    enable_wireless_bridging_dhcp_tracking=False,
    enabled=False,
    fast_dot1x_timers=False,
    hide_ssid=False,
    hostname_ie=False,
    hotspot20={
        "domain_names": ["string"],
        "enabled": False,
        "nai_realms": ["string"],
        "operators": ["string"],
        "rcois": ["string"],
        "venue_name": "string",
    },
    inject_dhcp_option82={
        "circuit_id": "string",
        "enabled": False,
    },
    interface="string",
    isolation=False,
    l2_isolation=False,
    legacy_overds=False,
    limit_bcast=False,
    limit_probe_response=False,
    max_idletime=0,
    max_num_clients=0,
    mist_nac={
        "enabled": False,
    },
    mxtunnel_ids=["string"],
    mxtunnel_names=["string"],
    no_static_dns=False,
    no_static_ip=False,
    portal={
        "allow_wlan_id_roam": False,
        "amazon_client_id": "string",
        "amazon_client_secret": "string",
        "amazon_email_domains": ["string"],
        "amazon_enabled": False,
        "amazon_expire": 0,
        "auth": "string",
        "azure_client_id": "string",
        "azure_client_secret": "string",
        "azure_enabled": False,
        "azure_expire": 0,
        "azure_tenant_id": "string",
        "broadnet_password": "string",
        "broadnet_sid": "string",
        "broadnet_user_id": "string",
        "bypass_when_cloud_down": False,
        "clickatell_api_key": "string",
        "cross_site": False,
        "email_enabled": False,
        "enabled": False,
        "expire": 0,
        "external_portal_url": "string",
        "facebook_client_id": "string",
        "facebook_client_secret": "string",
        "facebook_email_domains": ["string"],
        "facebook_enabled": False,
        "facebook_expire": 0,
        "forward": False,
        "forward_url": "string",
        "google_client_id": "string",
        "google_client_secret": "string",
        "google_email_domains": ["string"],
        "google_enabled": False,
        "google_expire": 0,
        "gupshup_password": "string",
        "gupshup_userid": "string",
        "microsoft_client_id": "string",
        "microsoft_client_secret": "string",
        "microsoft_email_domains": ["string"],
        "microsoft_enabled": False,
        "microsoft_expire": 0,
        "passphrase_enabled": False,
        "passphrase_expire": 0,
        "password": "string",
        "predefined_sponsors_enabled": False,
        "predefined_sponsors_hide_email": False,
        "privacy": False,
        "puzzel_password": "string",
        "puzzel_service_id": "string",
        "puzzel_username": "string",
        "sms_enabled": False,
        "sms_expire": 0,
        "sms_message_format": "string",
        "sms_provider": "string",
        "sponsor_auto_approve": False,
        "sponsor_email_domains": ["string"],
        "sponsor_enabled": False,
        "sponsor_expire": 0,
        "sponsor_link_validity_duration": "string",
        "sponsor_notify_all": False,
        "sponsor_status_notify": False,
        "sponsors": {
            "string": "string",
        },
        "sso_default_role": "string",
        "sso_forced_role": "string",
        "sso_idp_cert": "string",
        "sso_idp_sign_algo": "string",
        "sso_idp_sso_url": "string",
        "sso_issuer": "string",
        "sso_nameid_format": "string",
        "telstra_client_id": "string",
        "telstra_client_secret": "string",
        "twilio_auth_token": "string",
        "twilio_phone_number": "string",
        "twilio_sid": "string",
    },
    portal_allowed_hostnames=["string"],
    portal_allowed_subnets=["string"],
    portal_denied_hostnames=["string"],
    qos={
        "class_": "string",
        "overwrite": False,
    },
    radsec={
        "coa_enabled": False,
        "enabled": False,
        "idle_timeout": "string",
        "mxcluster_ids": ["string"],
        "proxy_hosts": ["string"],
        "server_name": "string",
        "servers": [{
            "host": "string",
            "port": 0,
        }],
        "use_mxedge": False,
        "use_site_mxedge": False,
    },
    rateset={
        "string": {
            "eht": "string",
            "he": "string",
            "ht": "string",
            "legacies": ["string"],
            "min_rssi": 0,
            "template": "string",
            "vht": "string",
        },
    },
    reconnect_clients_when_roaming_mxcluster=False,
    roam_mode="string",
    schedule={
        "enabled": False,
        "hours": {
            "fri": "string",
            "mon": "string",
            "sat": "string",
            "sun": "string",
            "thu": "string",
            "tue": "string",
            "wed": "string",
        },
    },
    sle_excluded=False,
    use_eapol_v1=False,
    vlan_enabled=False,
    vlan_id="string",
    vlan_ids=["string"],
    vlan_pooling=False,
    wlan_limit_down="string",
    wlan_limit_down_enabled=False,
    wlan_limit_up="string",
    wlan_limit_up_enabled=False,
    wxtag_ids=["string"],
    wxtunnel_id="string",
    wxtunnel_remote_id="string")
Copy
const junipermistWlanResource = new junipermist.site.Wlan("junipermistWlanResource", {
    siteId: "string",
    ssid: "string",
    acctImmediateUpdate: false,
    acctInterimInterval: 0,
    acctServers: [{
        host: "string",
        secret: "string",
        keywrapEnabled: false,
        keywrapFormat: "string",
        keywrapKek: "string",
        keywrapMack: "string",
        port: "string",
    }],
    airwatch: {
        apiKey: "string",
        consoleUrl: "string",
        enabled: false,
        password: "string",
        username: "string",
    },
    allowIpv6Ndp: false,
    allowMdns: false,
    allowSsdp: false,
    apIds: ["string"],
    appLimit: {
        apps: {
            string: 0,
        },
        enabled: false,
        wxtagIds: {
            string: 0,
        },
    },
    appQos: {
        apps: {
            string: {
                dscp: "string",
                dstSubnet: "string",
                srcSubnet: "string",
            },
        },
        enabled: false,
        others: [{
            dscp: "string",
            dstSubnet: "string",
            portRanges: "string",
            protocol: "string",
            srcSubnet: "string",
        }],
    },
    applyTo: "string",
    arpFilter: false,
    auth: {
        anticlogThreshold: 0,
        eapReauth: false,
        enableMacAuth: false,
        keyIdx: 0,
        keys: ["string"],
        multiPskOnly: false,
        owe: "string",
        pairwises: ["string"],
        privateWlan: false,
        psk: "string",
        type: "string",
        wepAsSecondaryAuth: false,
    },
    authServerSelection: "string",
    authServers: [{
        host: "string",
        secret: "string",
        keywrapEnabled: false,
        keywrapFormat: "string",
        keywrapKek: "string",
        keywrapMack: "string",
        port: "string",
        requireMessageAuthenticator: false,
    }],
    authServersNasId: "string",
    authServersNasIp: "string",
    authServersRetries: 0,
    authServersTimeout: 0,
    bandSteer: false,
    bandSteerForceBand5: false,
    bands: ["string"],
    blockBlacklistClients: false,
    bonjour: {
        additionalVlanIds: ["string"],
        enabled: false,
        services: {
            string: {
                disableLocal: false,
                radiusGroups: ["string"],
                scope: "string",
            },
        },
    },
    ciscoCwa: {
        allowedHostnames: ["string"],
        allowedSubnets: ["string"],
        blockedSubnets: ["string"],
        enabled: false,
    },
    clientLimitDown: "string",
    clientLimitDownEnabled: false,
    clientLimitUp: "string",
    clientLimitUpEnabled: false,
    coaServers: [{
        ip: "string",
        secret: "string",
        disableEventTimestampCheck: false,
        enabled: false,
        port: "string",
    }],
    disable11ax: false,
    disable11be: false,
    disableHtVhtRates: false,
    disableUapsd: false,
    disableV1RoamNotify: false,
    disableV2RoamNotify: false,
    disableWhenGatewayUnreachable: false,
    disableWhenMxtunnelDown: false,
    disableWmm: false,
    dnsServerRewrite: {
        enabled: false,
        radiusGroups: {
            string: "string",
        },
    },
    dtim: 0,
    dynamicPsk: {
        defaultPsk: "string",
        defaultVlanId: "string",
        enabled: false,
        forceLookup: false,
        source: "string",
    },
    dynamicVlan: {
        defaultVlanIds: ["string"],
        enabled: false,
        localVlanIds: ["string"],
        type: "string",
        vlans: {
            string: "string",
        },
    },
    enableLocalKeycaching: false,
    enableWirelessBridging: false,
    enableWirelessBridgingDhcpTracking: false,
    enabled: false,
    fastDot1xTimers: false,
    hideSsid: false,
    hostnameIe: false,
    hotspot20: {
        domainNames: ["string"],
        enabled: false,
        naiRealms: ["string"],
        operators: ["string"],
        rcois: ["string"],
        venueName: "string",
    },
    injectDhcpOption82: {
        circuitId: "string",
        enabled: false,
    },
    "interface": "string",
    isolation: false,
    l2Isolation: false,
    legacyOverds: false,
    limitBcast: false,
    limitProbeResponse: false,
    maxIdletime: 0,
    maxNumClients: 0,
    mistNac: {
        enabled: false,
    },
    mxtunnelIds: ["string"],
    mxtunnelNames: ["string"],
    noStaticDns: false,
    noStaticIp: false,
    portal: {
        allowWlanIdRoam: false,
        amazonClientId: "string",
        amazonClientSecret: "string",
        amazonEmailDomains: ["string"],
        amazonEnabled: false,
        amazonExpire: 0,
        auth: "string",
        azureClientId: "string",
        azureClientSecret: "string",
        azureEnabled: false,
        azureExpire: 0,
        azureTenantId: "string",
        broadnetPassword: "string",
        broadnetSid: "string",
        broadnetUserId: "string",
        bypassWhenCloudDown: false,
        clickatellApiKey: "string",
        crossSite: false,
        emailEnabled: false,
        enabled: false,
        expire: 0,
        externalPortalUrl: "string",
        facebookClientId: "string",
        facebookClientSecret: "string",
        facebookEmailDomains: ["string"],
        facebookEnabled: false,
        facebookExpire: 0,
        forward: false,
        forwardUrl: "string",
        googleClientId: "string",
        googleClientSecret: "string",
        googleEmailDomains: ["string"],
        googleEnabled: false,
        googleExpire: 0,
        gupshupPassword: "string",
        gupshupUserid: "string",
        microsoftClientId: "string",
        microsoftClientSecret: "string",
        microsoftEmailDomains: ["string"],
        microsoftEnabled: false,
        microsoftExpire: 0,
        passphraseEnabled: false,
        passphraseExpire: 0,
        password: "string",
        predefinedSponsorsEnabled: false,
        predefinedSponsorsHideEmail: false,
        privacy: false,
        puzzelPassword: "string",
        puzzelServiceId: "string",
        puzzelUsername: "string",
        smsEnabled: false,
        smsExpire: 0,
        smsMessageFormat: "string",
        smsProvider: "string",
        sponsorAutoApprove: false,
        sponsorEmailDomains: ["string"],
        sponsorEnabled: false,
        sponsorExpire: 0,
        sponsorLinkValidityDuration: "string",
        sponsorNotifyAll: false,
        sponsorStatusNotify: false,
        sponsors: {
            string: "string",
        },
        ssoDefaultRole: "string",
        ssoForcedRole: "string",
        ssoIdpCert: "string",
        ssoIdpSignAlgo: "string",
        ssoIdpSsoUrl: "string",
        ssoIssuer: "string",
        ssoNameidFormat: "string",
        telstraClientId: "string",
        telstraClientSecret: "string",
        twilioAuthToken: "string",
        twilioPhoneNumber: "string",
        twilioSid: "string",
    },
    portalAllowedHostnames: ["string"],
    portalAllowedSubnets: ["string"],
    portalDeniedHostnames: ["string"],
    qos: {
        "class": "string",
        overwrite: false,
    },
    radsec: {
        coaEnabled: false,
        enabled: false,
        idleTimeout: "string",
        mxclusterIds: ["string"],
        proxyHosts: ["string"],
        serverName: "string",
        servers: [{
            host: "string",
            port: 0,
        }],
        useMxedge: false,
        useSiteMxedge: false,
    },
    rateset: {
        string: {
            eht: "string",
            he: "string",
            ht: "string",
            legacies: ["string"],
            minRssi: 0,
            template: "string",
            vht: "string",
        },
    },
    reconnectClientsWhenRoamingMxcluster: false,
    roamMode: "string",
    schedule: {
        enabled: false,
        hours: {
            fri: "string",
            mon: "string",
            sat: "string",
            sun: "string",
            thu: "string",
            tue: "string",
            wed: "string",
        },
    },
    sleExcluded: false,
    useEapolV1: false,
    vlanEnabled: false,
    vlanId: "string",
    vlanIds: ["string"],
    vlanPooling: false,
    wlanLimitDown: "string",
    wlanLimitDownEnabled: false,
    wlanLimitUp: "string",
    wlanLimitUpEnabled: false,
    wxtagIds: ["string"],
    wxtunnelId: "string",
    wxtunnelRemoteId: "string",
});
Copy
type: junipermist:site:Wlan
properties:
    acctImmediateUpdate: false
    acctInterimInterval: 0
    acctServers:
        - host: string
          keywrapEnabled: false
          keywrapFormat: string
          keywrapKek: string
          keywrapMack: string
          port: string
          secret: string
    airwatch:
        apiKey: string
        consoleUrl: string
        enabled: false
        password: string
        username: string
    allowIpv6Ndp: false
    allowMdns: false
    allowSsdp: false
    apIds:
        - string
    appLimit:
        apps:
            string: 0
        enabled: false
        wxtagIds:
            string: 0
    appQos:
        apps:
            string:
                dscp: string
                dstSubnet: string
                srcSubnet: string
        enabled: false
        others:
            - dscp: string
              dstSubnet: string
              portRanges: string
              protocol: string
              srcSubnet: string
    applyTo: string
    arpFilter: false
    auth:
        anticlogThreshold: 0
        eapReauth: false
        enableMacAuth: false
        keyIdx: 0
        keys:
            - string
        multiPskOnly: false
        owe: string
        pairwises:
            - string
        privateWlan: false
        psk: string
        type: string
        wepAsSecondaryAuth: false
    authServerSelection: string
    authServers:
        - host: string
          keywrapEnabled: false
          keywrapFormat: string
          keywrapKek: string
          keywrapMack: string
          port: string
          requireMessageAuthenticator: false
          secret: string
    authServersNasId: string
    authServersNasIp: string
    authServersRetries: 0
    authServersTimeout: 0
    bandSteer: false
    bandSteerForceBand5: false
    bands:
        - string
    blockBlacklistClients: false
    bonjour:
        additionalVlanIds:
            - string
        enabled: false
        services:
            string:
                disableLocal: false
                radiusGroups:
                    - string
                scope: string
    ciscoCwa:
        allowedHostnames:
            - string
        allowedSubnets:
            - string
        blockedSubnets:
            - string
        enabled: false
    clientLimitDown: string
    clientLimitDownEnabled: false
    clientLimitUp: string
    clientLimitUpEnabled: false
    coaServers:
        - disableEventTimestampCheck: false
          enabled: false
          ip: string
          port: string
          secret: string
    disable11ax: false
    disable11be: false
    disableHtVhtRates: false
    disableUapsd: false
    disableV1RoamNotify: false
    disableV2RoamNotify: false
    disableWhenGatewayUnreachable: false
    disableWhenMxtunnelDown: false
    disableWmm: false
    dnsServerRewrite:
        enabled: false
        radiusGroups:
            string: string
    dtim: 0
    dynamicPsk:
        defaultPsk: string
        defaultVlanId: string
        enabled: false
        forceLookup: false
        source: string
    dynamicVlan:
        defaultVlanIds:
            - string
        enabled: false
        localVlanIds:
            - string
        type: string
        vlans:
            string: string
    enableLocalKeycaching: false
    enableWirelessBridging: false
    enableWirelessBridgingDhcpTracking: false
    enabled: false
    fastDot1xTimers: false
    hideSsid: false
    hostnameIe: false
    hotspot20:
        domainNames:
            - string
        enabled: false
        naiRealms:
            - string
        operators:
            - string
        rcois:
            - string
        venueName: string
    injectDhcpOption82:
        circuitId: string
        enabled: false
    interface: string
    isolation: false
    l2Isolation: false
    legacyOverds: false
    limitBcast: false
    limitProbeResponse: false
    maxIdletime: 0
    maxNumClients: 0
    mistNac:
        enabled: false
    mxtunnelIds:
        - string
    mxtunnelNames:
        - string
    noStaticDns: false
    noStaticIp: false
    portal:
        allowWlanIdRoam: false
        amazonClientId: string
        amazonClientSecret: string
        amazonEmailDomains:
            - string
        amazonEnabled: false
        amazonExpire: 0
        auth: string
        azureClientId: string
        azureClientSecret: string
        azureEnabled: false
        azureExpire: 0
        azureTenantId: string
        broadnetPassword: string
        broadnetSid: string
        broadnetUserId: string
        bypassWhenCloudDown: false
        clickatellApiKey: string
        crossSite: false
        emailEnabled: false
        enabled: false
        expire: 0
        externalPortalUrl: string
        facebookClientId: string
        facebookClientSecret: string
        facebookEmailDomains:
            - string
        facebookEnabled: false
        facebookExpire: 0
        forward: false
        forwardUrl: string
        googleClientId: string
        googleClientSecret: string
        googleEmailDomains:
            - string
        googleEnabled: false
        googleExpire: 0
        gupshupPassword: string
        gupshupUserid: string
        microsoftClientId: string
        microsoftClientSecret: string
        microsoftEmailDomains:
            - string
        microsoftEnabled: false
        microsoftExpire: 0
        passphraseEnabled: false
        passphraseExpire: 0
        password: string
        predefinedSponsorsEnabled: false
        predefinedSponsorsHideEmail: false
        privacy: false
        puzzelPassword: string
        puzzelServiceId: string
        puzzelUsername: string
        smsEnabled: false
        smsExpire: 0
        smsMessageFormat: string
        smsProvider: string
        sponsorAutoApprove: false
        sponsorEmailDomains:
            - string
        sponsorEnabled: false
        sponsorExpire: 0
        sponsorLinkValidityDuration: string
        sponsorNotifyAll: false
        sponsorStatusNotify: false
        sponsors:
            string: string
        ssoDefaultRole: string
        ssoForcedRole: string
        ssoIdpCert: string
        ssoIdpSignAlgo: string
        ssoIdpSsoUrl: string
        ssoIssuer: string
        ssoNameidFormat: string
        telstraClientId: string
        telstraClientSecret: string
        twilioAuthToken: string
        twilioPhoneNumber: string
        twilioSid: string
    portalAllowedHostnames:
        - string
    portalAllowedSubnets:
        - string
    portalDeniedHostnames:
        - string
    qos:
        class: string
        overwrite: false
    radsec:
        coaEnabled: false
        enabled: false
        idleTimeout: string
        mxclusterIds:
            - string
        proxyHosts:
            - string
        serverName: string
        servers:
            - host: string
              port: 0
        useMxedge: false
        useSiteMxedge: false
    rateset:
        string:
            eht: string
            he: string
            ht: string
            legacies:
                - string
            minRssi: 0
            template: string
            vht: string
    reconnectClientsWhenRoamingMxcluster: false
    roamMode: string
    schedule:
        enabled: false
        hours:
            fri: string
            mon: string
            sat: string
            sun: string
            thu: string
            tue: string
            wed: string
    siteId: string
    sleExcluded: false
    ssid: string
    useEapolV1: false
    vlanEnabled: false
    vlanId: string
    vlanIds:
        - string
    vlanPooling: false
    wlanLimitDown: string
    wlanLimitDownEnabled: false
    wlanLimitUp: string
    wlanLimitUpEnabled: false
    wxtagIds:
        - string
    wxtunnelId: string
    wxtunnelRemoteId: string
Copy

Wlan Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The Wlan resource accepts the following input properties:

SiteId This property is required. string
Ssid This property is required. string
Name of the SSID
AcctImmediateUpdate bool
Enable coa-immediate-update and address-change-immediate-update on the access profile.
AcctInterimInterval int
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
AcctServers List<Pulumi.JuniperMist.Site.Inputs.WlanAcctServer>
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
Airwatch Pulumi.JuniperMist.Site.Inputs.WlanAirwatch
Airwatch wlan settings
AllowIpv6Ndp bool
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
AllowMdns bool
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
AllowSsdp bool
Only applicable when limit_bcast==true, which allows SSDP
ApIds List<string>
List of device ids
AppLimit Pulumi.JuniperMist.Site.Inputs.WlanAppLimit
Bandwidth limiting for apps (applies to up/down)
AppQos Pulumi.JuniperMist.Site.Inputs.WlanAppQos
APp qos wlan settings
ApplyTo string
enum: aps, site, wxtags
ArpFilter bool
Whether to enable smart arp filter
Auth Pulumi.JuniperMist.Site.Inputs.WlanAuth
Authentication wlan settings
AuthServerSelection string
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
AuthServers List<Pulumi.JuniperMist.Site.Inputs.WlanAuthServer>
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
AuthServersNasId string
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
AuthServersNasIp string
Optional, NAS-IP-ADDRESS to use
AuthServersRetries int
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
AuthServersTimeout int
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
BandSteer bool
Whether to enable band_steering, this works only when band==both
BandSteerForceBand5 bool
Force dual_band capable client to connect to 5G
Bands List<string>
list of radios that the wlan should apply to. enum: 24, 5, 6
BlockBlacklistClients bool
Whether to block the clients in the blacklist (up to first 256 macs)
Bonjour Pulumi.JuniperMist.Site.Inputs.WlanBonjour
Bonjour gateway wlan settings
CiscoCwa Pulumi.JuniperMist.Site.Inputs.WlanCiscoCwa
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
ClientLimitDown string
ClientLimitDownEnabled bool
If downlink limiting per-client is enabled
ClientLimitUp string
ClientLimitUpEnabled bool
If uplink limiting per-client is enabled
CoaServers List<Pulumi.JuniperMist.Site.Inputs.WlanCoaServer>
List of COA (change of authorization) servers, optional
Disable11ax bool
Some old WLAN drivers may not be compatible
Disable11be bool
To disable Wi-Fi 7 EHT IEs
DisableHtVhtRates bool
To disable ht or vht rates
DisableUapsd bool
Whether to disable U-APSD
DisableV1RoamNotify bool
Disable sending v2 roam notification messages
DisableV2RoamNotify bool
Disable sending v2 roam notification messages
DisableWhenGatewayUnreachable bool
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
DisableWhenMxtunnelDown bool
DisableWmm bool
Whether to disable WMM
DnsServerRewrite Pulumi.JuniperMist.Site.Inputs.WlanDnsServerRewrite
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
Dtim int
DynamicPsk Pulumi.JuniperMist.Site.Inputs.WlanDynamicPsk
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
DynamicVlan Pulumi.JuniperMist.Site.Inputs.WlanDynamicVlan
For 802.1x
EnableLocalKeycaching bool
Enable AP-AP keycaching via multicast
EnableWirelessBridging bool
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
EnableWirelessBridgingDhcpTracking bool
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
Enabled bool
If this wlan is enabled
FastDot1xTimers bool
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
HideSsid bool
Whether to hide SSID in beacon
HostnameIe bool
Include hostname inside IE in AP beacons / probe responses
Hotspot20 Pulumi.JuniperMist.Site.Inputs.WlanHotspot20
Hostspot 2.0 wlan settings
InjectDhcpOption82 Pulumi.JuniperMist.Site.Inputs.WlanInjectDhcpOption82
Interface string
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
Isolation bool
Whether to stop clients to talk to each other
L2Isolation bool
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
LegacyOverds bool
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
LimitBcast bool
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
LimitProbeResponse bool
Limit probe response base on some heuristic rules
MaxIdletime int
Max idle time in seconds
MaxNumClients int
Maximum number of client connected to the SSID. 0 means unlimited
MistNac Pulumi.JuniperMist.Site.Inputs.WlanMistNac
MxtunnelIds List<string>
When interface=mxtunnel, id of the Mist Tunnel
MxtunnelNames List<string>
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
NoStaticDns bool
Whether to only allow client to use DNS that we’ve learned from DHCP response
NoStaticIp bool
Whether to only allow client that we’ve learned from DHCP exchange to talk
Portal Pulumi.JuniperMist.Site.Inputs.WlanPortal
Portal wlan settings
PortalAllowedHostnames List<string>
List of hostnames without http(s):// (matched by substring)
PortalAllowedSubnets List<string>
List of CIDRs
PortalDeniedHostnames List<string>
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
Qos Pulumi.JuniperMist.Site.Inputs.WlanQos
Radsec Pulumi.JuniperMist.Site.Inputs.WlanRadsec
RadSec settings
Rateset Dictionary<string, Pulumi.JuniperMist.Site.Inputs.WlanRatesetArgs>
Property key is the RF band. enum: 24, 5, 6
ReconnectClientsWhenRoamingMxcluster bool
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
RoamMode string
enum: 11r, OKC, NONE
Schedule Pulumi.JuniperMist.Site.Inputs.WlanSchedule
WLAN operating schedule, default is disabled
SleExcluded bool
Whether to exclude this WLAN from SLE metrics
UseEapolV1 bool
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
VlanEnabled bool
If vlan tagging is enabled
VlanId string
VlanIds List<string>
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
VlanPooling bool
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
WlanLimitDown string
WlanLimitDownEnabled bool
If downlink limiting for whole wlan is enabled
WlanLimitUp string
WlanLimitUpEnabled bool
If uplink limiting for whole wlan is enabled
WxtagIds List<string>
List of wxtag_ids
WxtunnelId string
When interface=wxtunnel, id of the WXLAN Tunnel
WxtunnelRemoteId string
When interface=wxtunnel, remote tunnel identifier
SiteId This property is required. string
Ssid This property is required. string
Name of the SSID
AcctImmediateUpdate bool
Enable coa-immediate-update and address-change-immediate-update on the access profile.
AcctInterimInterval int
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
AcctServers []WlanAcctServerArgs
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
Airwatch WlanAirwatchArgs
Airwatch wlan settings
AllowIpv6Ndp bool
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
AllowMdns bool
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
AllowSsdp bool
Only applicable when limit_bcast==true, which allows SSDP
ApIds []string
List of device ids
AppLimit WlanAppLimitArgs
Bandwidth limiting for apps (applies to up/down)
AppQos WlanAppQosArgs
APp qos wlan settings
ApplyTo string
enum: aps, site, wxtags
ArpFilter bool
Whether to enable smart arp filter
Auth WlanAuthArgs
Authentication wlan settings
AuthServerSelection string
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
AuthServers []WlanAuthServerArgs
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
AuthServersNasId string
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
AuthServersNasIp string
Optional, NAS-IP-ADDRESS to use
AuthServersRetries int
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
AuthServersTimeout int
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
BandSteer bool
Whether to enable band_steering, this works only when band==both
BandSteerForceBand5 bool
Force dual_band capable client to connect to 5G
Bands []string
list of radios that the wlan should apply to. enum: 24, 5, 6
BlockBlacklistClients bool
Whether to block the clients in the blacklist (up to first 256 macs)
Bonjour WlanBonjourArgs
Bonjour gateway wlan settings
CiscoCwa WlanCiscoCwaArgs
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
ClientLimitDown string
ClientLimitDownEnabled bool
If downlink limiting per-client is enabled
ClientLimitUp string
ClientLimitUpEnabled bool
If uplink limiting per-client is enabled
CoaServers []WlanCoaServerArgs
List of COA (change of authorization) servers, optional
Disable11ax bool
Some old WLAN drivers may not be compatible
Disable11be bool
To disable Wi-Fi 7 EHT IEs
DisableHtVhtRates bool
To disable ht or vht rates
DisableUapsd bool
Whether to disable U-APSD
DisableV1RoamNotify bool
Disable sending v2 roam notification messages
DisableV2RoamNotify bool
Disable sending v2 roam notification messages
DisableWhenGatewayUnreachable bool
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
DisableWhenMxtunnelDown bool
DisableWmm bool
Whether to disable WMM
DnsServerRewrite WlanDnsServerRewriteArgs
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
Dtim int
DynamicPsk WlanDynamicPskArgs
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
DynamicVlan WlanDynamicVlanArgs
For 802.1x
EnableLocalKeycaching bool
Enable AP-AP keycaching via multicast
EnableWirelessBridging bool
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
EnableWirelessBridgingDhcpTracking bool
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
Enabled bool
If this wlan is enabled
FastDot1xTimers bool
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
HideSsid bool
Whether to hide SSID in beacon
HostnameIe bool
Include hostname inside IE in AP beacons / probe responses
Hotspot20 WlanHotspot20Args
Hostspot 2.0 wlan settings
InjectDhcpOption82 WlanInjectDhcpOption82Args
Interface string
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
Isolation bool
Whether to stop clients to talk to each other
L2Isolation bool
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
LegacyOverds bool
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
LimitBcast bool
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
LimitProbeResponse bool
Limit probe response base on some heuristic rules
MaxIdletime int
Max idle time in seconds
MaxNumClients int
Maximum number of client connected to the SSID. 0 means unlimited
MistNac WlanMistNacArgs
MxtunnelIds []string
When interface=mxtunnel, id of the Mist Tunnel
MxtunnelNames []string
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
NoStaticDns bool
Whether to only allow client to use DNS that we’ve learned from DHCP response
NoStaticIp bool
Whether to only allow client that we’ve learned from DHCP exchange to talk
Portal WlanPortalArgs
Portal wlan settings
PortalAllowedHostnames []string
List of hostnames without http(s):// (matched by substring)
PortalAllowedSubnets []string
List of CIDRs
PortalDeniedHostnames []string
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
Qos WlanQosArgs
Radsec WlanRadsecArgs
RadSec settings
Rateset map[string]WlanRatesetArgs
Property key is the RF band. enum: 24, 5, 6
ReconnectClientsWhenRoamingMxcluster bool
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
RoamMode string
enum: 11r, OKC, NONE
Schedule WlanScheduleArgs
WLAN operating schedule, default is disabled
SleExcluded bool
Whether to exclude this WLAN from SLE metrics
UseEapolV1 bool
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
VlanEnabled bool
If vlan tagging is enabled
VlanId string
VlanIds []string
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
VlanPooling bool
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
WlanLimitDown string
WlanLimitDownEnabled bool
If downlink limiting for whole wlan is enabled
WlanLimitUp string
WlanLimitUpEnabled bool
If uplink limiting for whole wlan is enabled
WxtagIds []string
List of wxtag_ids
WxtunnelId string
When interface=wxtunnel, id of the WXLAN Tunnel
WxtunnelRemoteId string
When interface=wxtunnel, remote tunnel identifier
siteId This property is required. String
ssid This property is required. String
Name of the SSID
acctImmediateUpdate Boolean
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acctInterimInterval Integer
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acctServers List<WlanAcctServer>
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch WlanAirwatch
Airwatch wlan settings
allowIpv6Ndp Boolean
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allowMdns Boolean
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allowSsdp Boolean
Only applicable when limit_bcast==true, which allows SSDP
apIds List<String>
List of device ids
appLimit WlanAppLimit
Bandwidth limiting for apps (applies to up/down)
appQos WlanAppQos
APp qos wlan settings
applyTo String
enum: aps, site, wxtags
arpFilter Boolean
Whether to enable smart arp filter
auth WlanAuth
Authentication wlan settings
authServerSelection String
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
authServers List<WlanAuthServer>
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
authServersNasId String
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
authServersNasIp String
Optional, NAS-IP-ADDRESS to use
authServersRetries Integer
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
authServersTimeout Integer
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
bandSteer Boolean
Whether to enable band_steering, this works only when band==both
bandSteerForceBand5 Boolean
Force dual_band capable client to connect to 5G
bands List<String>
list of radios that the wlan should apply to. enum: 24, 5, 6
blockBlacklistClients Boolean
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour WlanBonjour
Bonjour gateway wlan settings
ciscoCwa WlanCiscoCwa
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
clientLimitDown String
clientLimitDownEnabled Boolean
If downlink limiting per-client is enabled
clientLimitUp String
clientLimitUpEnabled Boolean
If uplink limiting per-client is enabled
coaServers List<WlanCoaServer>
List of COA (change of authorization) servers, optional
disable11ax Boolean
Some old WLAN drivers may not be compatible
disable11be Boolean
To disable Wi-Fi 7 EHT IEs
disableHtVhtRates Boolean
To disable ht or vht rates
disableUapsd Boolean
Whether to disable U-APSD
disableV1RoamNotify Boolean
Disable sending v2 roam notification messages
disableV2RoamNotify Boolean
Disable sending v2 roam notification messages
disableWhenGatewayUnreachable Boolean
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disableWhenMxtunnelDown Boolean
disableWmm Boolean
Whether to disable WMM
dnsServerRewrite WlanDnsServerRewrite
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim Integer
dynamicPsk WlanDynamicPsk
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamicVlan WlanDynamicVlan
For 802.1x
enableLocalKeycaching Boolean
Enable AP-AP keycaching via multicast
enableWirelessBridging Boolean
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enableWirelessBridgingDhcpTracking Boolean
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled Boolean
If this wlan is enabled
fastDot1xTimers Boolean
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hideSsid Boolean
Whether to hide SSID in beacon
hostnameIe Boolean
Include hostname inside IE in AP beacons / probe responses
hotspot20 WlanHotspot20
Hostspot 2.0 wlan settings
injectDhcpOption82 WlanInjectDhcpOption82
interface_ String
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation Boolean
Whether to stop clients to talk to each other
l2Isolation Boolean
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacyOverds Boolean
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limitBcast Boolean
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limitProbeResponse Boolean
Limit probe response base on some heuristic rules
maxIdletime Integer
Max idle time in seconds
maxNumClients Integer
Maximum number of client connected to the SSID. 0 means unlimited
mistNac WlanMistNac
mxtunnelIds List<String>
When interface=mxtunnel, id of the Mist Tunnel
mxtunnelNames List<String>
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
noStaticDns Boolean
Whether to only allow client to use DNS that we’ve learned from DHCP response
noStaticIp Boolean
Whether to only allow client that we’ve learned from DHCP exchange to talk
portal WlanPortal
Portal wlan settings
portalAllowedHostnames List<String>
List of hostnames without http(s):// (matched by substring)
portalAllowedSubnets List<String>
List of CIDRs
portalDeniedHostnames List<String>
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
qos WlanQos
radsec WlanRadsec
RadSec settings
rateset Map<String,WlanRatesetArgs>
Property key is the RF band. enum: 24, 5, 6
reconnectClientsWhenRoamingMxcluster Boolean
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roamMode String
enum: 11r, OKC, NONE
schedule WlanSchedule
WLAN operating schedule, default is disabled
sleExcluded Boolean
Whether to exclude this WLAN from SLE metrics
useEapolV1 Boolean
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlanEnabled Boolean
If vlan tagging is enabled
vlanId String
vlanIds List<String>
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlanPooling Boolean
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlanLimitDown String
wlanLimitDownEnabled Boolean
If downlink limiting for whole wlan is enabled
wlanLimitUp String
wlanLimitUpEnabled Boolean
If uplink limiting for whole wlan is enabled
wxtagIds List<String>
List of wxtag_ids
wxtunnelId String
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnelRemoteId String
When interface=wxtunnel, remote tunnel identifier
siteId This property is required. string
ssid This property is required. string
Name of the SSID
acctImmediateUpdate boolean
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acctInterimInterval number
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acctServers WlanAcctServer[]
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch WlanAirwatch
Airwatch wlan settings
allowIpv6Ndp boolean
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allowMdns boolean
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allowSsdp boolean
Only applicable when limit_bcast==true, which allows SSDP
apIds string[]
List of device ids
appLimit WlanAppLimit
Bandwidth limiting for apps (applies to up/down)
appQos WlanAppQos
APp qos wlan settings
applyTo string
enum: aps, site, wxtags
arpFilter boolean
Whether to enable smart arp filter
auth WlanAuth
Authentication wlan settings
authServerSelection string
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
authServers WlanAuthServer[]
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
authServersNasId string
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
authServersNasIp string
Optional, NAS-IP-ADDRESS to use
authServersRetries number
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
authServersTimeout number
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
bandSteer boolean
Whether to enable band_steering, this works only when band==both
bandSteerForceBand5 boolean
Force dual_band capable client to connect to 5G
bands string[]
list of radios that the wlan should apply to. enum: 24, 5, 6
blockBlacklistClients boolean
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour WlanBonjour
Bonjour gateway wlan settings
ciscoCwa WlanCiscoCwa
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
clientLimitDown string
clientLimitDownEnabled boolean
If downlink limiting per-client is enabled
clientLimitUp string
clientLimitUpEnabled boolean
If uplink limiting per-client is enabled
coaServers WlanCoaServer[]
List of COA (change of authorization) servers, optional
disable11ax boolean
Some old WLAN drivers may not be compatible
disable11be boolean
To disable Wi-Fi 7 EHT IEs
disableHtVhtRates boolean
To disable ht or vht rates
disableUapsd boolean
Whether to disable U-APSD
disableV1RoamNotify boolean
Disable sending v2 roam notification messages
disableV2RoamNotify boolean
Disable sending v2 roam notification messages
disableWhenGatewayUnreachable boolean
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disableWhenMxtunnelDown boolean
disableWmm boolean
Whether to disable WMM
dnsServerRewrite WlanDnsServerRewrite
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim number
dynamicPsk WlanDynamicPsk
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamicVlan WlanDynamicVlan
For 802.1x
enableLocalKeycaching boolean
Enable AP-AP keycaching via multicast
enableWirelessBridging boolean
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enableWirelessBridgingDhcpTracking boolean
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled boolean
If this wlan is enabled
fastDot1xTimers boolean
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hideSsid boolean
Whether to hide SSID in beacon
hostnameIe boolean
Include hostname inside IE in AP beacons / probe responses
hotspot20 WlanHotspot20
Hostspot 2.0 wlan settings
injectDhcpOption82 WlanInjectDhcpOption82
interface string
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation boolean
Whether to stop clients to talk to each other
l2Isolation boolean
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacyOverds boolean
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limitBcast boolean
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limitProbeResponse boolean
Limit probe response base on some heuristic rules
maxIdletime number
Max idle time in seconds
maxNumClients number
Maximum number of client connected to the SSID. 0 means unlimited
mistNac WlanMistNac
mxtunnelIds string[]
When interface=mxtunnel, id of the Mist Tunnel
mxtunnelNames string[]
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
noStaticDns boolean
Whether to only allow client to use DNS that we’ve learned from DHCP response
noStaticIp boolean
Whether to only allow client that we’ve learned from DHCP exchange to talk
portal WlanPortal
Portal wlan settings
portalAllowedHostnames string[]
List of hostnames without http(s):// (matched by substring)
portalAllowedSubnets string[]
List of CIDRs
portalDeniedHostnames string[]
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
qos WlanQos
radsec WlanRadsec
RadSec settings
rateset {[key: string]: WlanRatesetArgs}
Property key is the RF band. enum: 24, 5, 6
reconnectClientsWhenRoamingMxcluster boolean
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roamMode string
enum: 11r, OKC, NONE
schedule WlanSchedule
WLAN operating schedule, default is disabled
sleExcluded boolean
Whether to exclude this WLAN from SLE metrics
useEapolV1 boolean
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlanEnabled boolean
If vlan tagging is enabled
vlanId string
vlanIds string[]
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlanPooling boolean
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlanLimitDown string
wlanLimitDownEnabled boolean
If downlink limiting for whole wlan is enabled
wlanLimitUp string
wlanLimitUpEnabled boolean
If uplink limiting for whole wlan is enabled
wxtagIds string[]
List of wxtag_ids
wxtunnelId string
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnelRemoteId string
When interface=wxtunnel, remote tunnel identifier
site_id This property is required. str
ssid This property is required. str
Name of the SSID
acct_immediate_update bool
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acct_interim_interval int
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acct_servers Sequence[WlanAcctServerArgs]
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch WlanAirwatchArgs
Airwatch wlan settings
allow_ipv6_ndp bool
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allow_mdns bool
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allow_ssdp bool
Only applicable when limit_bcast==true, which allows SSDP
ap_ids Sequence[str]
List of device ids
app_limit WlanAppLimitArgs
Bandwidth limiting for apps (applies to up/down)
app_qos WlanAppQosArgs
APp qos wlan settings
apply_to str
enum: aps, site, wxtags
arp_filter bool
Whether to enable smart arp filter
auth WlanAuthArgs
Authentication wlan settings
auth_server_selection str
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
auth_servers Sequence[WlanAuthServerArgs]
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
auth_servers_nas_id str
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
auth_servers_nas_ip str
Optional, NAS-IP-ADDRESS to use
auth_servers_retries int
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
auth_servers_timeout int
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
band_steer bool
Whether to enable band_steering, this works only when band==both
band_steer_force_band5 bool
Force dual_band capable client to connect to 5G
bands Sequence[str]
list of radios that the wlan should apply to. enum: 24, 5, 6
block_blacklist_clients bool
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour WlanBonjourArgs
Bonjour gateway wlan settings
cisco_cwa WlanCiscoCwaArgs
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
client_limit_down str
client_limit_down_enabled bool
If downlink limiting per-client is enabled
client_limit_up str
client_limit_up_enabled bool
If uplink limiting per-client is enabled
coa_servers Sequence[WlanCoaServerArgs]
List of COA (change of authorization) servers, optional
disable11ax bool
Some old WLAN drivers may not be compatible
disable11be bool
To disable Wi-Fi 7 EHT IEs
disable_ht_vht_rates bool
To disable ht or vht rates
disable_uapsd bool
Whether to disable U-APSD
disable_v1_roam_notify bool
Disable sending v2 roam notification messages
disable_v2_roam_notify bool
Disable sending v2 roam notification messages
disable_when_gateway_unreachable bool
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disable_when_mxtunnel_down bool
disable_wmm bool
Whether to disable WMM
dns_server_rewrite WlanDnsServerRewriteArgs
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim int
dynamic_psk WlanDynamicPskArgs
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamic_vlan WlanDynamicVlanArgs
For 802.1x
enable_local_keycaching bool
Enable AP-AP keycaching via multicast
enable_wireless_bridging bool
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enable_wireless_bridging_dhcp_tracking bool
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled bool
If this wlan is enabled
fast_dot1x_timers bool
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hide_ssid bool
Whether to hide SSID in beacon
hostname_ie bool
Include hostname inside IE in AP beacons / probe responses
hotspot20 WlanHotspot20Args
Hostspot 2.0 wlan settings
inject_dhcp_option82 WlanInjectDhcpOption82Args
interface str
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation bool
Whether to stop clients to talk to each other
l2_isolation bool
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacy_overds bool
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limit_bcast bool
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limit_probe_response bool
Limit probe response base on some heuristic rules
max_idletime int
Max idle time in seconds
max_num_clients int
Maximum number of client connected to the SSID. 0 means unlimited
mist_nac WlanMistNacArgs
mxtunnel_ids Sequence[str]
When interface=mxtunnel, id of the Mist Tunnel
mxtunnel_names Sequence[str]
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
no_static_dns bool
Whether to only allow client to use DNS that we’ve learned from DHCP response
no_static_ip bool
Whether to only allow client that we’ve learned from DHCP exchange to talk
portal WlanPortalArgs
Portal wlan settings
portal_allowed_hostnames Sequence[str]
List of hostnames without http(s):// (matched by substring)
portal_allowed_subnets Sequence[str]
List of CIDRs
portal_denied_hostnames Sequence[str]
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
qos WlanQosArgs
radsec WlanRadsecArgs
RadSec settings
rateset Mapping[str, WlanRatesetArgs]
Property key is the RF band. enum: 24, 5, 6
reconnect_clients_when_roaming_mxcluster bool
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roam_mode str
enum: 11r, OKC, NONE
schedule WlanScheduleArgs
WLAN operating schedule, default is disabled
sle_excluded bool
Whether to exclude this WLAN from SLE metrics
use_eapol_v1 bool
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlan_enabled bool
If vlan tagging is enabled
vlan_id str
vlan_ids Sequence[str]
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlan_pooling bool
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlan_limit_down str
wlan_limit_down_enabled bool
If downlink limiting for whole wlan is enabled
wlan_limit_up str
wlan_limit_up_enabled bool
If uplink limiting for whole wlan is enabled
wxtag_ids Sequence[str]
List of wxtag_ids
wxtunnel_id str
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnel_remote_id str
When interface=wxtunnel, remote tunnel identifier
siteId This property is required. String
ssid This property is required. String
Name of the SSID
acctImmediateUpdate Boolean
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acctInterimInterval Number
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acctServers List<Property Map>
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch Property Map
Airwatch wlan settings
allowIpv6Ndp Boolean
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allowMdns Boolean
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allowSsdp Boolean
Only applicable when limit_bcast==true, which allows SSDP
apIds List<String>
List of device ids
appLimit Property Map
Bandwidth limiting for apps (applies to up/down)
appQos Property Map
APp qos wlan settings
applyTo String
enum: aps, site, wxtags
arpFilter Boolean
Whether to enable smart arp filter
auth Property Map
Authentication wlan settings
authServerSelection String
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
authServers List<Property Map>
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
authServersNasId String
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
authServersNasIp String
Optional, NAS-IP-ADDRESS to use
authServersRetries Number
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
authServersTimeout Number
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
bandSteer Boolean
Whether to enable band_steering, this works only when band==both
bandSteerForceBand5 Boolean
Force dual_band capable client to connect to 5G
bands List<String>
list of radios that the wlan should apply to. enum: 24, 5, 6
blockBlacklistClients Boolean
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour Property Map
Bonjour gateway wlan settings
ciscoCwa Property Map
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
clientLimitDown String
clientLimitDownEnabled Boolean
If downlink limiting per-client is enabled
clientLimitUp String
clientLimitUpEnabled Boolean
If uplink limiting per-client is enabled
coaServers List<Property Map>
List of COA (change of authorization) servers, optional
disable11ax Boolean
Some old WLAN drivers may not be compatible
disable11be Boolean
To disable Wi-Fi 7 EHT IEs
disableHtVhtRates Boolean
To disable ht or vht rates
disableUapsd Boolean
Whether to disable U-APSD
disableV1RoamNotify Boolean
Disable sending v2 roam notification messages
disableV2RoamNotify Boolean
Disable sending v2 roam notification messages
disableWhenGatewayUnreachable Boolean
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disableWhenMxtunnelDown Boolean
disableWmm Boolean
Whether to disable WMM
dnsServerRewrite Property Map
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim Number
dynamicPsk Property Map
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamicVlan Property Map
For 802.1x
enableLocalKeycaching Boolean
Enable AP-AP keycaching via multicast
enableWirelessBridging Boolean
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enableWirelessBridgingDhcpTracking Boolean
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled Boolean
If this wlan is enabled
fastDot1xTimers Boolean
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hideSsid Boolean
Whether to hide SSID in beacon
hostnameIe Boolean
Include hostname inside IE in AP beacons / probe responses
hotspot20 Property Map
Hostspot 2.0 wlan settings
injectDhcpOption82 Property Map
interface String
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation Boolean
Whether to stop clients to talk to each other
l2Isolation Boolean
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacyOverds Boolean
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limitBcast Boolean
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limitProbeResponse Boolean
Limit probe response base on some heuristic rules
maxIdletime Number
Max idle time in seconds
maxNumClients Number
Maximum number of client connected to the SSID. 0 means unlimited
mistNac Property Map
mxtunnelIds List<String>
When interface=mxtunnel, id of the Mist Tunnel
mxtunnelNames List<String>
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
noStaticDns Boolean
Whether to only allow client to use DNS that we’ve learned from DHCP response
noStaticIp Boolean
Whether to only allow client that we’ve learned from DHCP exchange to talk
portal Property Map
Portal wlan settings
portalAllowedHostnames List<String>
List of hostnames without http(s):// (matched by substring)
portalAllowedSubnets List<String>
List of CIDRs
portalDeniedHostnames List<String>
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
qos Property Map
radsec Property Map
RadSec settings
rateset Map<Property Map>
Property key is the RF band. enum: 24, 5, 6
reconnectClientsWhenRoamingMxcluster Boolean
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roamMode String
enum: 11r, OKC, NONE
schedule Property Map
WLAN operating schedule, default is disabled
sleExcluded Boolean
Whether to exclude this WLAN from SLE metrics
useEapolV1 Boolean
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlanEnabled Boolean
If vlan tagging is enabled
vlanId String
vlanIds List<String>
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlanPooling Boolean
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlanLimitDown String
wlanLimitDownEnabled Boolean
If downlink limiting for whole wlan is enabled
wlanLimitUp String
wlanLimitUpEnabled Boolean
If uplink limiting for whole wlan is enabled
wxtagIds List<String>
List of wxtag_ids
wxtunnelId String
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnelRemoteId String
When interface=wxtunnel, remote tunnel identifier

Outputs

All input properties are implicitly available as output properties. Additionally, the Wlan resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
MspId string
OrgId string
PortalApiSecret string
APi secret (auto-generated) that can be used to sign guest authorization requests
PortalImage string
Url of portal background image
PortalSsoUrl string
Id string
The provider-assigned unique ID for this managed resource.
MspId string
OrgId string
PortalApiSecret string
APi secret (auto-generated) that can be used to sign guest authorization requests
PortalImage string
Url of portal background image
PortalSsoUrl string
id String
The provider-assigned unique ID for this managed resource.
mspId String
orgId String
portalApiSecret String
APi secret (auto-generated) that can be used to sign guest authorization requests
portalImage String
Url of portal background image
portalSsoUrl String
id string
The provider-assigned unique ID for this managed resource.
mspId string
orgId string
portalApiSecret string
APi secret (auto-generated) that can be used to sign guest authorization requests
portalImage string
Url of portal background image
portalSsoUrl string
id str
The provider-assigned unique ID for this managed resource.
msp_id str
org_id str
portal_api_secret str
APi secret (auto-generated) that can be used to sign guest authorization requests
portal_image str
Url of portal background image
portal_sso_url str
id String
The provider-assigned unique ID for this managed resource.
mspId String
orgId String
portalApiSecret String
APi secret (auto-generated) that can be used to sign guest authorization requests
portalImage String
Url of portal background image
portalSsoUrl String

Look up Existing Wlan Resource

Get an existing Wlan resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: WlanState, opts?: CustomResourceOptions): Wlan
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        acct_immediate_update: Optional[bool] = None,
        acct_interim_interval: Optional[int] = None,
        acct_servers: Optional[Sequence[WlanAcctServerArgs]] = None,
        airwatch: Optional[WlanAirwatchArgs] = None,
        allow_ipv6_ndp: Optional[bool] = None,
        allow_mdns: Optional[bool] = None,
        allow_ssdp: Optional[bool] = None,
        ap_ids: Optional[Sequence[str]] = None,
        app_limit: Optional[WlanAppLimitArgs] = None,
        app_qos: Optional[WlanAppQosArgs] = None,
        apply_to: Optional[str] = None,
        arp_filter: Optional[bool] = None,
        auth: Optional[WlanAuthArgs] = None,
        auth_server_selection: Optional[str] = None,
        auth_servers: Optional[Sequence[WlanAuthServerArgs]] = None,
        auth_servers_nas_id: Optional[str] = None,
        auth_servers_nas_ip: Optional[str] = None,
        auth_servers_retries: Optional[int] = None,
        auth_servers_timeout: Optional[int] = None,
        band_steer: Optional[bool] = None,
        band_steer_force_band5: Optional[bool] = None,
        bands: Optional[Sequence[str]] = None,
        block_blacklist_clients: Optional[bool] = None,
        bonjour: Optional[WlanBonjourArgs] = None,
        cisco_cwa: Optional[WlanCiscoCwaArgs] = None,
        client_limit_down: Optional[str] = None,
        client_limit_down_enabled: Optional[bool] = None,
        client_limit_up: Optional[str] = None,
        client_limit_up_enabled: Optional[bool] = None,
        coa_servers: Optional[Sequence[WlanCoaServerArgs]] = None,
        disable11ax: Optional[bool] = None,
        disable11be: Optional[bool] = None,
        disable_ht_vht_rates: Optional[bool] = None,
        disable_uapsd: Optional[bool] = None,
        disable_v1_roam_notify: Optional[bool] = None,
        disable_v2_roam_notify: Optional[bool] = None,
        disable_when_gateway_unreachable: Optional[bool] = None,
        disable_when_mxtunnel_down: Optional[bool] = None,
        disable_wmm: Optional[bool] = None,
        dns_server_rewrite: Optional[WlanDnsServerRewriteArgs] = None,
        dtim: Optional[int] = None,
        dynamic_psk: Optional[WlanDynamicPskArgs] = None,
        dynamic_vlan: Optional[WlanDynamicVlanArgs] = None,
        enable_local_keycaching: Optional[bool] = None,
        enable_wireless_bridging: Optional[bool] = None,
        enable_wireless_bridging_dhcp_tracking: Optional[bool] = None,
        enabled: Optional[bool] = None,
        fast_dot1x_timers: Optional[bool] = None,
        hide_ssid: Optional[bool] = None,
        hostname_ie: Optional[bool] = None,
        hotspot20: Optional[WlanHotspot20Args] = None,
        inject_dhcp_option82: Optional[WlanInjectDhcpOption82Args] = None,
        interface: Optional[str] = None,
        isolation: Optional[bool] = None,
        l2_isolation: Optional[bool] = None,
        legacy_overds: Optional[bool] = None,
        limit_bcast: Optional[bool] = None,
        limit_probe_response: Optional[bool] = None,
        max_idletime: Optional[int] = None,
        max_num_clients: Optional[int] = None,
        mist_nac: Optional[WlanMistNacArgs] = None,
        msp_id: Optional[str] = None,
        mxtunnel_ids: Optional[Sequence[str]] = None,
        mxtunnel_names: Optional[Sequence[str]] = None,
        no_static_dns: Optional[bool] = None,
        no_static_ip: Optional[bool] = None,
        org_id: Optional[str] = None,
        portal: Optional[WlanPortalArgs] = None,
        portal_allowed_hostnames: Optional[Sequence[str]] = None,
        portal_allowed_subnets: Optional[Sequence[str]] = None,
        portal_api_secret: Optional[str] = None,
        portal_denied_hostnames: Optional[Sequence[str]] = None,
        portal_image: Optional[str] = None,
        portal_sso_url: Optional[str] = None,
        qos: Optional[WlanQosArgs] = None,
        radsec: Optional[WlanRadsecArgs] = None,
        rateset: Optional[Mapping[str, WlanRatesetArgs]] = None,
        reconnect_clients_when_roaming_mxcluster: Optional[bool] = None,
        roam_mode: Optional[str] = None,
        schedule: Optional[WlanScheduleArgs] = None,
        site_id: Optional[str] = None,
        sle_excluded: Optional[bool] = None,
        ssid: Optional[str] = None,
        use_eapol_v1: Optional[bool] = None,
        vlan_enabled: Optional[bool] = None,
        vlan_id: Optional[str] = None,
        vlan_ids: Optional[Sequence[str]] = None,
        vlan_pooling: Optional[bool] = None,
        wlan_limit_down: Optional[str] = None,
        wlan_limit_down_enabled: Optional[bool] = None,
        wlan_limit_up: Optional[str] = None,
        wlan_limit_up_enabled: Optional[bool] = None,
        wxtag_ids: Optional[Sequence[str]] = None,
        wxtunnel_id: Optional[str] = None,
        wxtunnel_remote_id: Optional[str] = None) -> Wlan
func GetWlan(ctx *Context, name string, id IDInput, state *WlanState, opts ...ResourceOption) (*Wlan, error)
public static Wlan Get(string name, Input<string> id, WlanState? state, CustomResourceOptions? opts = null)
public static Wlan get(String name, Output<String> id, WlanState state, CustomResourceOptions options)
resources:  _:    type: junipermist:site:Wlan    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
AcctImmediateUpdate bool
Enable coa-immediate-update and address-change-immediate-update on the access profile.
AcctInterimInterval int
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
AcctServers List<Pulumi.JuniperMist.Site.Inputs.WlanAcctServer>
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
Airwatch Pulumi.JuniperMist.Site.Inputs.WlanAirwatch
Airwatch wlan settings
AllowIpv6Ndp bool
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
AllowMdns bool
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
AllowSsdp bool
Only applicable when limit_bcast==true, which allows SSDP
ApIds List<string>
List of device ids
AppLimit Pulumi.JuniperMist.Site.Inputs.WlanAppLimit
Bandwidth limiting for apps (applies to up/down)
AppQos Pulumi.JuniperMist.Site.Inputs.WlanAppQos
APp qos wlan settings
ApplyTo string
enum: aps, site, wxtags
ArpFilter bool
Whether to enable smart arp filter
Auth Pulumi.JuniperMist.Site.Inputs.WlanAuth
Authentication wlan settings
AuthServerSelection string
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
AuthServers List<Pulumi.JuniperMist.Site.Inputs.WlanAuthServer>
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
AuthServersNasId string
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
AuthServersNasIp string
Optional, NAS-IP-ADDRESS to use
AuthServersRetries int
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
AuthServersTimeout int
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
BandSteer bool
Whether to enable band_steering, this works only when band==both
BandSteerForceBand5 bool
Force dual_band capable client to connect to 5G
Bands List<string>
list of radios that the wlan should apply to. enum: 24, 5, 6
BlockBlacklistClients bool
Whether to block the clients in the blacklist (up to first 256 macs)
Bonjour Pulumi.JuniperMist.Site.Inputs.WlanBonjour
Bonjour gateway wlan settings
CiscoCwa Pulumi.JuniperMist.Site.Inputs.WlanCiscoCwa
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
ClientLimitDown string
ClientLimitDownEnabled bool
If downlink limiting per-client is enabled
ClientLimitUp string
ClientLimitUpEnabled bool
If uplink limiting per-client is enabled
CoaServers List<Pulumi.JuniperMist.Site.Inputs.WlanCoaServer>
List of COA (change of authorization) servers, optional
Disable11ax bool
Some old WLAN drivers may not be compatible
Disable11be bool
To disable Wi-Fi 7 EHT IEs
DisableHtVhtRates bool
To disable ht or vht rates
DisableUapsd bool
Whether to disable U-APSD
DisableV1RoamNotify bool
Disable sending v2 roam notification messages
DisableV2RoamNotify bool
Disable sending v2 roam notification messages
DisableWhenGatewayUnreachable bool
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
DisableWhenMxtunnelDown bool
DisableWmm bool
Whether to disable WMM
DnsServerRewrite Pulumi.JuniperMist.Site.Inputs.WlanDnsServerRewrite
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
Dtim int
DynamicPsk Pulumi.JuniperMist.Site.Inputs.WlanDynamicPsk
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
DynamicVlan Pulumi.JuniperMist.Site.Inputs.WlanDynamicVlan
For 802.1x
EnableLocalKeycaching bool
Enable AP-AP keycaching via multicast
EnableWirelessBridging bool
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
EnableWirelessBridgingDhcpTracking bool
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
Enabled bool
If this wlan is enabled
FastDot1xTimers bool
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
HideSsid bool
Whether to hide SSID in beacon
HostnameIe bool
Include hostname inside IE in AP beacons / probe responses
Hotspot20 Pulumi.JuniperMist.Site.Inputs.WlanHotspot20
Hostspot 2.0 wlan settings
InjectDhcpOption82 Pulumi.JuniperMist.Site.Inputs.WlanInjectDhcpOption82
Interface string
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
Isolation bool
Whether to stop clients to talk to each other
L2Isolation bool
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
LegacyOverds bool
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
LimitBcast bool
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
LimitProbeResponse bool
Limit probe response base on some heuristic rules
MaxIdletime int
Max idle time in seconds
MaxNumClients int
Maximum number of client connected to the SSID. 0 means unlimited
MistNac Pulumi.JuniperMist.Site.Inputs.WlanMistNac
MspId string
MxtunnelIds List<string>
When interface=mxtunnel, id of the Mist Tunnel
MxtunnelNames List<string>
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
NoStaticDns bool
Whether to only allow client to use DNS that we’ve learned from DHCP response
NoStaticIp bool
Whether to only allow client that we’ve learned from DHCP exchange to talk
OrgId string
Portal Pulumi.JuniperMist.Site.Inputs.WlanPortal
Portal wlan settings
PortalAllowedHostnames List<string>
List of hostnames without http(s):// (matched by substring)
PortalAllowedSubnets List<string>
List of CIDRs
PortalApiSecret string
APi secret (auto-generated) that can be used to sign guest authorization requests
PortalDeniedHostnames List<string>
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
PortalImage string
Url of portal background image
PortalSsoUrl string
Qos Pulumi.JuniperMist.Site.Inputs.WlanQos
Radsec Pulumi.JuniperMist.Site.Inputs.WlanRadsec
RadSec settings
Rateset Dictionary<string, Pulumi.JuniperMist.Site.Inputs.WlanRatesetArgs>
Property key is the RF band. enum: 24, 5, 6
ReconnectClientsWhenRoamingMxcluster bool
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
RoamMode string
enum: 11r, OKC, NONE
Schedule Pulumi.JuniperMist.Site.Inputs.WlanSchedule
WLAN operating schedule, default is disabled
SiteId string
SleExcluded bool
Whether to exclude this WLAN from SLE metrics
Ssid string
Name of the SSID
UseEapolV1 bool
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
VlanEnabled bool
If vlan tagging is enabled
VlanId string
VlanIds List<string>
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
VlanPooling bool
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
WlanLimitDown string
WlanLimitDownEnabled bool
If downlink limiting for whole wlan is enabled
WlanLimitUp string
WlanLimitUpEnabled bool
If uplink limiting for whole wlan is enabled
WxtagIds List<string>
List of wxtag_ids
WxtunnelId string
When interface=wxtunnel, id of the WXLAN Tunnel
WxtunnelRemoteId string
When interface=wxtunnel, remote tunnel identifier
AcctImmediateUpdate bool
Enable coa-immediate-update and address-change-immediate-update on the access profile.
AcctInterimInterval int
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
AcctServers []WlanAcctServerArgs
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
Airwatch WlanAirwatchArgs
Airwatch wlan settings
AllowIpv6Ndp bool
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
AllowMdns bool
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
AllowSsdp bool
Only applicable when limit_bcast==true, which allows SSDP
ApIds []string
List of device ids
AppLimit WlanAppLimitArgs
Bandwidth limiting for apps (applies to up/down)
AppQos WlanAppQosArgs
APp qos wlan settings
ApplyTo string
enum: aps, site, wxtags
ArpFilter bool
Whether to enable smart arp filter
Auth WlanAuthArgs
Authentication wlan settings
AuthServerSelection string
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
AuthServers []WlanAuthServerArgs
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
AuthServersNasId string
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
AuthServersNasIp string
Optional, NAS-IP-ADDRESS to use
AuthServersRetries int
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
AuthServersTimeout int
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
BandSteer bool
Whether to enable band_steering, this works only when band==both
BandSteerForceBand5 bool
Force dual_band capable client to connect to 5G
Bands []string
list of radios that the wlan should apply to. enum: 24, 5, 6
BlockBlacklistClients bool
Whether to block the clients in the blacklist (up to first 256 macs)
Bonjour WlanBonjourArgs
Bonjour gateway wlan settings
CiscoCwa WlanCiscoCwaArgs
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
ClientLimitDown string
ClientLimitDownEnabled bool
If downlink limiting per-client is enabled
ClientLimitUp string
ClientLimitUpEnabled bool
If uplink limiting per-client is enabled
CoaServers []WlanCoaServerArgs
List of COA (change of authorization) servers, optional
Disable11ax bool
Some old WLAN drivers may not be compatible
Disable11be bool
To disable Wi-Fi 7 EHT IEs
DisableHtVhtRates bool
To disable ht or vht rates
DisableUapsd bool
Whether to disable U-APSD
DisableV1RoamNotify bool
Disable sending v2 roam notification messages
DisableV2RoamNotify bool
Disable sending v2 roam notification messages
DisableWhenGatewayUnreachable bool
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
DisableWhenMxtunnelDown bool
DisableWmm bool
Whether to disable WMM
DnsServerRewrite WlanDnsServerRewriteArgs
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
Dtim int
DynamicPsk WlanDynamicPskArgs
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
DynamicVlan WlanDynamicVlanArgs
For 802.1x
EnableLocalKeycaching bool
Enable AP-AP keycaching via multicast
EnableWirelessBridging bool
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
EnableWirelessBridgingDhcpTracking bool
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
Enabled bool
If this wlan is enabled
FastDot1xTimers bool
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
HideSsid bool
Whether to hide SSID in beacon
HostnameIe bool
Include hostname inside IE in AP beacons / probe responses
Hotspot20 WlanHotspot20Args
Hostspot 2.0 wlan settings
InjectDhcpOption82 WlanInjectDhcpOption82Args
Interface string
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
Isolation bool
Whether to stop clients to talk to each other
L2Isolation bool
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
LegacyOverds bool
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
LimitBcast bool
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
LimitProbeResponse bool
Limit probe response base on some heuristic rules
MaxIdletime int
Max idle time in seconds
MaxNumClients int
Maximum number of client connected to the SSID. 0 means unlimited
MistNac WlanMistNacArgs
MspId string
MxtunnelIds []string
When interface=mxtunnel, id of the Mist Tunnel
MxtunnelNames []string
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
NoStaticDns bool
Whether to only allow client to use DNS that we’ve learned from DHCP response
NoStaticIp bool
Whether to only allow client that we’ve learned from DHCP exchange to talk
OrgId string
Portal WlanPortalArgs
Portal wlan settings
PortalAllowedHostnames []string
List of hostnames without http(s):// (matched by substring)
PortalAllowedSubnets []string
List of CIDRs
PortalApiSecret string
APi secret (auto-generated) that can be used to sign guest authorization requests
PortalDeniedHostnames []string
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
PortalImage string
Url of portal background image
PortalSsoUrl string
Qos WlanQosArgs
Radsec WlanRadsecArgs
RadSec settings
Rateset map[string]WlanRatesetArgs
Property key is the RF band. enum: 24, 5, 6
ReconnectClientsWhenRoamingMxcluster bool
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
RoamMode string
enum: 11r, OKC, NONE
Schedule WlanScheduleArgs
WLAN operating schedule, default is disabled
SiteId string
SleExcluded bool
Whether to exclude this WLAN from SLE metrics
Ssid string
Name of the SSID
UseEapolV1 bool
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
VlanEnabled bool
If vlan tagging is enabled
VlanId string
VlanIds []string
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
VlanPooling bool
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
WlanLimitDown string
WlanLimitDownEnabled bool
If downlink limiting for whole wlan is enabled
WlanLimitUp string
WlanLimitUpEnabled bool
If uplink limiting for whole wlan is enabled
WxtagIds []string
List of wxtag_ids
WxtunnelId string
When interface=wxtunnel, id of the WXLAN Tunnel
WxtunnelRemoteId string
When interface=wxtunnel, remote tunnel identifier
acctImmediateUpdate Boolean
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acctInterimInterval Integer
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acctServers List<WlanAcctServer>
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch WlanAirwatch
Airwatch wlan settings
allowIpv6Ndp Boolean
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allowMdns Boolean
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allowSsdp Boolean
Only applicable when limit_bcast==true, which allows SSDP
apIds List<String>
List of device ids
appLimit WlanAppLimit
Bandwidth limiting for apps (applies to up/down)
appQos WlanAppQos
APp qos wlan settings
applyTo String
enum: aps, site, wxtags
arpFilter Boolean
Whether to enable smart arp filter
auth WlanAuth
Authentication wlan settings
authServerSelection String
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
authServers List<WlanAuthServer>
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
authServersNasId String
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
authServersNasIp String
Optional, NAS-IP-ADDRESS to use
authServersRetries Integer
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
authServersTimeout Integer
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
bandSteer Boolean
Whether to enable band_steering, this works only when band==both
bandSteerForceBand5 Boolean
Force dual_band capable client to connect to 5G
bands List<String>
list of radios that the wlan should apply to. enum: 24, 5, 6
blockBlacklistClients Boolean
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour WlanBonjour
Bonjour gateway wlan settings
ciscoCwa WlanCiscoCwa
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
clientLimitDown String
clientLimitDownEnabled Boolean
If downlink limiting per-client is enabled
clientLimitUp String
clientLimitUpEnabled Boolean
If uplink limiting per-client is enabled
coaServers List<WlanCoaServer>
List of COA (change of authorization) servers, optional
disable11ax Boolean
Some old WLAN drivers may not be compatible
disable11be Boolean
To disable Wi-Fi 7 EHT IEs
disableHtVhtRates Boolean
To disable ht or vht rates
disableUapsd Boolean
Whether to disable U-APSD
disableV1RoamNotify Boolean
Disable sending v2 roam notification messages
disableV2RoamNotify Boolean
Disable sending v2 roam notification messages
disableWhenGatewayUnreachable Boolean
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disableWhenMxtunnelDown Boolean
disableWmm Boolean
Whether to disable WMM
dnsServerRewrite WlanDnsServerRewrite
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim Integer
dynamicPsk WlanDynamicPsk
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamicVlan WlanDynamicVlan
For 802.1x
enableLocalKeycaching Boolean
Enable AP-AP keycaching via multicast
enableWirelessBridging Boolean
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enableWirelessBridgingDhcpTracking Boolean
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled Boolean
If this wlan is enabled
fastDot1xTimers Boolean
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hideSsid Boolean
Whether to hide SSID in beacon
hostnameIe Boolean
Include hostname inside IE in AP beacons / probe responses
hotspot20 WlanHotspot20
Hostspot 2.0 wlan settings
injectDhcpOption82 WlanInjectDhcpOption82
interface_ String
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation Boolean
Whether to stop clients to talk to each other
l2Isolation Boolean
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacyOverds Boolean
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limitBcast Boolean
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limitProbeResponse Boolean
Limit probe response base on some heuristic rules
maxIdletime Integer
Max idle time in seconds
maxNumClients Integer
Maximum number of client connected to the SSID. 0 means unlimited
mistNac WlanMistNac
mspId String
mxtunnelIds List<String>
When interface=mxtunnel, id of the Mist Tunnel
mxtunnelNames List<String>
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
noStaticDns Boolean
Whether to only allow client to use DNS that we’ve learned from DHCP response
noStaticIp Boolean
Whether to only allow client that we’ve learned from DHCP exchange to talk
orgId String
portal WlanPortal
Portal wlan settings
portalAllowedHostnames List<String>
List of hostnames without http(s):// (matched by substring)
portalAllowedSubnets List<String>
List of CIDRs
portalApiSecret String
APi secret (auto-generated) that can be used to sign guest authorization requests
portalDeniedHostnames List<String>
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
portalImage String
Url of portal background image
portalSsoUrl String
qos WlanQos
radsec WlanRadsec
RadSec settings
rateset Map<String,WlanRatesetArgs>
Property key is the RF band. enum: 24, 5, 6
reconnectClientsWhenRoamingMxcluster Boolean
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roamMode String
enum: 11r, OKC, NONE
schedule WlanSchedule
WLAN operating schedule, default is disabled
siteId String
sleExcluded Boolean
Whether to exclude this WLAN from SLE metrics
ssid String
Name of the SSID
useEapolV1 Boolean
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlanEnabled Boolean
If vlan tagging is enabled
vlanId String
vlanIds List<String>
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlanPooling Boolean
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlanLimitDown String
wlanLimitDownEnabled Boolean
If downlink limiting for whole wlan is enabled
wlanLimitUp String
wlanLimitUpEnabled Boolean
If uplink limiting for whole wlan is enabled
wxtagIds List<String>
List of wxtag_ids
wxtunnelId String
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnelRemoteId String
When interface=wxtunnel, remote tunnel identifier
acctImmediateUpdate boolean
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acctInterimInterval number
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acctServers WlanAcctServer[]
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch WlanAirwatch
Airwatch wlan settings
allowIpv6Ndp boolean
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allowMdns boolean
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allowSsdp boolean
Only applicable when limit_bcast==true, which allows SSDP
apIds string[]
List of device ids
appLimit WlanAppLimit
Bandwidth limiting for apps (applies to up/down)
appQos WlanAppQos
APp qos wlan settings
applyTo string
enum: aps, site, wxtags
arpFilter boolean
Whether to enable smart arp filter
auth WlanAuth
Authentication wlan settings
authServerSelection string
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
authServers WlanAuthServer[]
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
authServersNasId string
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
authServersNasIp string
Optional, NAS-IP-ADDRESS to use
authServersRetries number
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
authServersTimeout number
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
bandSteer boolean
Whether to enable band_steering, this works only when band==both
bandSteerForceBand5 boolean
Force dual_band capable client to connect to 5G
bands string[]
list of radios that the wlan should apply to. enum: 24, 5, 6
blockBlacklistClients boolean
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour WlanBonjour
Bonjour gateway wlan settings
ciscoCwa WlanCiscoCwa
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
clientLimitDown string
clientLimitDownEnabled boolean
If downlink limiting per-client is enabled
clientLimitUp string
clientLimitUpEnabled boolean
If uplink limiting per-client is enabled
coaServers WlanCoaServer[]
List of COA (change of authorization) servers, optional
disable11ax boolean
Some old WLAN drivers may not be compatible
disable11be boolean
To disable Wi-Fi 7 EHT IEs
disableHtVhtRates boolean
To disable ht or vht rates
disableUapsd boolean
Whether to disable U-APSD
disableV1RoamNotify boolean
Disable sending v2 roam notification messages
disableV2RoamNotify boolean
Disable sending v2 roam notification messages
disableWhenGatewayUnreachable boolean
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disableWhenMxtunnelDown boolean
disableWmm boolean
Whether to disable WMM
dnsServerRewrite WlanDnsServerRewrite
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim number
dynamicPsk WlanDynamicPsk
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamicVlan WlanDynamicVlan
For 802.1x
enableLocalKeycaching boolean
Enable AP-AP keycaching via multicast
enableWirelessBridging boolean
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enableWirelessBridgingDhcpTracking boolean
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled boolean
If this wlan is enabled
fastDot1xTimers boolean
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hideSsid boolean
Whether to hide SSID in beacon
hostnameIe boolean
Include hostname inside IE in AP beacons / probe responses
hotspot20 WlanHotspot20
Hostspot 2.0 wlan settings
injectDhcpOption82 WlanInjectDhcpOption82
interface string
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation boolean
Whether to stop clients to talk to each other
l2Isolation boolean
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacyOverds boolean
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limitBcast boolean
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limitProbeResponse boolean
Limit probe response base on some heuristic rules
maxIdletime number
Max idle time in seconds
maxNumClients number
Maximum number of client connected to the SSID. 0 means unlimited
mistNac WlanMistNac
mspId string
mxtunnelIds string[]
When interface=mxtunnel, id of the Mist Tunnel
mxtunnelNames string[]
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
noStaticDns boolean
Whether to only allow client to use DNS that we’ve learned from DHCP response
noStaticIp boolean
Whether to only allow client that we’ve learned from DHCP exchange to talk
orgId string
portal WlanPortal
Portal wlan settings
portalAllowedHostnames string[]
List of hostnames without http(s):// (matched by substring)
portalAllowedSubnets string[]
List of CIDRs
portalApiSecret string
APi secret (auto-generated) that can be used to sign guest authorization requests
portalDeniedHostnames string[]
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
portalImage string
Url of portal background image
portalSsoUrl string
qos WlanQos
radsec WlanRadsec
RadSec settings
rateset {[key: string]: WlanRatesetArgs}
Property key is the RF band. enum: 24, 5, 6
reconnectClientsWhenRoamingMxcluster boolean
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roamMode string
enum: 11r, OKC, NONE
schedule WlanSchedule
WLAN operating schedule, default is disabled
siteId string
sleExcluded boolean
Whether to exclude this WLAN from SLE metrics
ssid string
Name of the SSID
useEapolV1 boolean
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlanEnabled boolean
If vlan tagging is enabled
vlanId string
vlanIds string[]
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlanPooling boolean
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlanLimitDown string
wlanLimitDownEnabled boolean
If downlink limiting for whole wlan is enabled
wlanLimitUp string
wlanLimitUpEnabled boolean
If uplink limiting for whole wlan is enabled
wxtagIds string[]
List of wxtag_ids
wxtunnelId string
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnelRemoteId string
When interface=wxtunnel, remote tunnel identifier
acct_immediate_update bool
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acct_interim_interval int
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acct_servers Sequence[WlanAcctServerArgs]
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch WlanAirwatchArgs
Airwatch wlan settings
allow_ipv6_ndp bool
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allow_mdns bool
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allow_ssdp bool
Only applicable when limit_bcast==true, which allows SSDP
ap_ids Sequence[str]
List of device ids
app_limit WlanAppLimitArgs
Bandwidth limiting for apps (applies to up/down)
app_qos WlanAppQosArgs
APp qos wlan settings
apply_to str
enum: aps, site, wxtags
arp_filter bool
Whether to enable smart arp filter
auth WlanAuthArgs
Authentication wlan settings
auth_server_selection str
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
auth_servers Sequence[WlanAuthServerArgs]
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
auth_servers_nas_id str
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
auth_servers_nas_ip str
Optional, NAS-IP-ADDRESS to use
auth_servers_retries int
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
auth_servers_timeout int
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
band_steer bool
Whether to enable band_steering, this works only when band==both
band_steer_force_band5 bool
Force dual_band capable client to connect to 5G
bands Sequence[str]
list of radios that the wlan should apply to. enum: 24, 5, 6
block_blacklist_clients bool
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour WlanBonjourArgs
Bonjour gateway wlan settings
cisco_cwa WlanCiscoCwaArgs
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
client_limit_down str
client_limit_down_enabled bool
If downlink limiting per-client is enabled
client_limit_up str
client_limit_up_enabled bool
If uplink limiting per-client is enabled
coa_servers Sequence[WlanCoaServerArgs]
List of COA (change of authorization) servers, optional
disable11ax bool
Some old WLAN drivers may not be compatible
disable11be bool
To disable Wi-Fi 7 EHT IEs
disable_ht_vht_rates bool
To disable ht or vht rates
disable_uapsd bool
Whether to disable U-APSD
disable_v1_roam_notify bool
Disable sending v2 roam notification messages
disable_v2_roam_notify bool
Disable sending v2 roam notification messages
disable_when_gateway_unreachable bool
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disable_when_mxtunnel_down bool
disable_wmm bool
Whether to disable WMM
dns_server_rewrite WlanDnsServerRewriteArgs
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim int
dynamic_psk WlanDynamicPskArgs
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamic_vlan WlanDynamicVlanArgs
For 802.1x
enable_local_keycaching bool
Enable AP-AP keycaching via multicast
enable_wireless_bridging bool
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enable_wireless_bridging_dhcp_tracking bool
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled bool
If this wlan is enabled
fast_dot1x_timers bool
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hide_ssid bool
Whether to hide SSID in beacon
hostname_ie bool
Include hostname inside IE in AP beacons / probe responses
hotspot20 WlanHotspot20Args
Hostspot 2.0 wlan settings
inject_dhcp_option82 WlanInjectDhcpOption82Args
interface str
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation bool
Whether to stop clients to talk to each other
l2_isolation bool
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacy_overds bool
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limit_bcast bool
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limit_probe_response bool
Limit probe response base on some heuristic rules
max_idletime int
Max idle time in seconds
max_num_clients int
Maximum number of client connected to the SSID. 0 means unlimited
mist_nac WlanMistNacArgs
msp_id str
mxtunnel_ids Sequence[str]
When interface=mxtunnel, id of the Mist Tunnel
mxtunnel_names Sequence[str]
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
no_static_dns bool
Whether to only allow client to use DNS that we’ve learned from DHCP response
no_static_ip bool
Whether to only allow client that we’ve learned from DHCP exchange to talk
org_id str
portal WlanPortalArgs
Portal wlan settings
portal_allowed_hostnames Sequence[str]
List of hostnames without http(s):// (matched by substring)
portal_allowed_subnets Sequence[str]
List of CIDRs
portal_api_secret str
APi secret (auto-generated) that can be used to sign guest authorization requests
portal_denied_hostnames Sequence[str]
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
portal_image str
Url of portal background image
portal_sso_url str
qos WlanQosArgs
radsec WlanRadsecArgs
RadSec settings
rateset Mapping[str, WlanRatesetArgs]
Property key is the RF band. enum: 24, 5, 6
reconnect_clients_when_roaming_mxcluster bool
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roam_mode str
enum: 11r, OKC, NONE
schedule WlanScheduleArgs
WLAN operating schedule, default is disabled
site_id str
sle_excluded bool
Whether to exclude this WLAN from SLE metrics
ssid str
Name of the SSID
use_eapol_v1 bool
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlan_enabled bool
If vlan tagging is enabled
vlan_id str
vlan_ids Sequence[str]
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlan_pooling bool
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlan_limit_down str
wlan_limit_down_enabled bool
If downlink limiting for whole wlan is enabled
wlan_limit_up str
wlan_limit_up_enabled bool
If uplink limiting for whole wlan is enabled
wxtag_ids Sequence[str]
List of wxtag_ids
wxtunnel_id str
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnel_remote_id str
When interface=wxtunnel, remote tunnel identifier
acctImmediateUpdate Boolean
Enable coa-immediate-update and address-change-immediate-update on the access profile.
acctInterimInterval Number
How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
acctServers List<Property Map>
List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
airwatch Property Map
Airwatch wlan settings
allowIpv6Ndp Boolean
Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
allowMdns Boolean
Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
allowSsdp Boolean
Only applicable when limit_bcast==true, which allows SSDP
apIds List<String>
List of device ids
appLimit Property Map
Bandwidth limiting for apps (applies to up/down)
appQos Property Map
APp qos wlan settings
applyTo String
enum: aps, site, wxtags
arpFilter Boolean
Whether to enable smart arp filter
auth Property Map
Authentication wlan settings
authServerSelection String
When ordered, AP will prefer and go back to the first server if possible. enum: ordered, unordered
authServers List<Property Map>
List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
authServersNasId String
Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
authServersNasIp String
Optional, NAS-IP-ADDRESS to use
authServersRetries Number
Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
authServersTimeout Number
Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
bandSteer Boolean
Whether to enable band_steering, this works only when band==both
bandSteerForceBand5 Boolean
Force dual_band capable client to connect to 5G
bands List<String>
list of radios that the wlan should apply to. enum: 24, 5, 6
blockBlacklistClients Boolean
Whether to block the clients in the blacklist (up to first 256 macs)
bonjour Property Map
Bonjour gateway wlan settings
ciscoCwa Property Map
Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
clientLimitDown String
clientLimitDownEnabled Boolean
If downlink limiting per-client is enabled
clientLimitUp String
clientLimitUpEnabled Boolean
If uplink limiting per-client is enabled
coaServers List<Property Map>
List of COA (change of authorization) servers, optional
disable11ax Boolean
Some old WLAN drivers may not be compatible
disable11be Boolean
To disable Wi-Fi 7 EHT IEs
disableHtVhtRates Boolean
To disable ht or vht rates
disableUapsd Boolean
Whether to disable U-APSD
disableV1RoamNotify Boolean
Disable sending v2 roam notification messages
disableV2RoamNotify Boolean
Disable sending v2 roam notification messages
disableWhenGatewayUnreachable Boolean
When any of the following is true, this WLAN will be disabled * cannot get IP * cannot obtain default gateway * cannot reach default gateway
disableWhenMxtunnelDown Boolean
disableWmm Boolean
Whether to disable WMM
dnsServerRewrite Property Map
For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
dtim Number
dynamicPsk Property Map
For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently) * PSK will come from RADIUS server * AP sends client MAC as username and password (i.e. enable_mac_auth is assumed) * AP sends BSSID:SSID as Caller-Station-ID * auth_servers is required * PSK will come from cloud WLC if source is cloud_psks * default_psk will be used if cloud WLC is not available * multi_psk_only and psk is ignored * pairwise can only be wpa2-ccmp (for now, wpa3 support on the roadmap)
dynamicVlan Property Map
For 802.1x
enableLocalKeycaching Boolean
Enable AP-AP keycaching via multicast
enableWirelessBridging Boolean
By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
enableWirelessBridgingDhcpTracking Boolean
If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
enabled Boolean
If this wlan is enabled
fastDot1xTimers Boolean
If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
hideSsid Boolean
Whether to hide SSID in beacon
hostnameIe Boolean
Include hostname inside IE in AP beacons / probe responses
hotspot20 Property Map
Hostspot 2.0 wlan settings
injectDhcpOption82 Property Map
interface String
where this WLAN will be connected to. enum: all, eth0, eth1, eth2, eth3, mxtunnel, site_mxedge, wxtunnel
isolation Boolean
Whether to stop clients to talk to each other
l2Isolation Boolean
If isolation is enabled, whether to deny clients to talk to L2 on the LAN
legacyOverds Boolean
Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
limitBcast Boolean
Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
limitProbeResponse Boolean
Limit probe response base on some heuristic rules
maxIdletime Number
Max idle time in seconds
maxNumClients Number
Maximum number of client connected to the SSID. 0 means unlimited
mistNac Property Map
mspId String
mxtunnelIds List<String>
When interface=mxtunnel, id of the Mist Tunnel
mxtunnelNames List<String>
When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
noStaticDns Boolean
Whether to only allow client to use DNS that we’ve learned from DHCP response
noStaticIp Boolean
Whether to only allow client that we’ve learned from DHCP exchange to talk
orgId String
portal Property Map
Portal wlan settings
portalAllowedHostnames List<String>
List of hostnames without http(s):// (matched by substring)
portalAllowedSubnets List<String>
List of CIDRs
portalApiSecret String
APi secret (auto-generated) that can be used to sign guest authorization requests
portalDeniedHostnames List<String>
List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
portalImage String
Url of portal background image
portalSsoUrl String
qos Property Map
radsec Property Map
RadSec settings
rateset Map<Property Map>
Property key is the RF band. enum: 24, 5, 6
reconnectClientsWhenRoamingMxcluster Boolean
When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
roamMode String
enum: 11r, OKC, NONE
schedule Property Map
WLAN operating schedule, default is disabled
siteId String
sleExcluded Boolean
Whether to exclude this WLAN from SLE metrics
ssid String
Name of the SSID
useEapolV1 Boolean
If auth.type==eap or auth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
vlanEnabled Boolean
If vlan tagging is enabled
vlanId String
vlanIds List<String>
if vlan_enabled==true and vlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
vlanPooling Boolean
Requires vlan_enabled==true to be set to true. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
wlanLimitDown String
wlanLimitDownEnabled Boolean
If downlink limiting for whole wlan is enabled
wlanLimitUp String
wlanLimitUpEnabled Boolean
If uplink limiting for whole wlan is enabled
wxtagIds List<String>
List of wxtag_ids
wxtunnelId String
When interface=wxtunnel, id of the WXLAN Tunnel
wxtunnelRemoteId String
When interface=wxtunnel, remote tunnel identifier

Supporting Types

WlanAcctServer
, WlanAcctServerArgs

Host This property is required. string
IP/ hostname of RADIUS server
Secret This property is required. string
Secret of RADIUS server
KeywrapEnabled bool
KeywrapFormat string
enum: ascii, hex
KeywrapKek string
KeywrapMack string
Port string
Host This property is required. string
IP/ hostname of RADIUS server
Secret This property is required. string
Secret of RADIUS server
KeywrapEnabled bool
KeywrapFormat string
enum: ascii, hex
KeywrapKek string
KeywrapMack string
Port string
host This property is required. String
IP/ hostname of RADIUS server
secret This property is required. String
Secret of RADIUS server
keywrapEnabled Boolean
keywrapFormat String
enum: ascii, hex
keywrapKek String
keywrapMack String
port String
host This property is required. string
IP/ hostname of RADIUS server
secret This property is required. string
Secret of RADIUS server
keywrapEnabled boolean
keywrapFormat string
enum: ascii, hex
keywrapKek string
keywrapMack string
port string
host This property is required. str
IP/ hostname of RADIUS server
secret This property is required. str
Secret of RADIUS server
keywrap_enabled bool
keywrap_format str
enum: ascii, hex
keywrap_kek str
keywrap_mack str
port str
host This property is required. String
IP/ hostname of RADIUS server
secret This property is required. String
Secret of RADIUS server
keywrapEnabled Boolean
keywrapFormat String
enum: ascii, hex
keywrapKek String
keywrapMack String
port String

WlanAirwatch
, WlanAirwatchArgs

ApiKey string
API Key
ConsoleUrl string
Console URL
Enabled bool
Password string
Password
Username string
Username
ApiKey string
API Key
ConsoleUrl string
Console URL
Enabled bool
Password string
Password
Username string
Username
apiKey String
API Key
consoleUrl String
Console URL
enabled Boolean
password String
Password
username String
Username
apiKey string
API Key
consoleUrl string
Console URL
enabled boolean
password string
Password
username string
Username
api_key str
API Key
console_url str
Console URL
enabled bool
password str
Password
username str
Username
apiKey String
API Key
consoleUrl String
Console URL
enabled Boolean
password String
Password
username String
Username

WlanAppLimit
, WlanAppLimitArgs

Apps Dictionary<string, int>
Map from app key to bandwidth in kbps. Property key is the app key, defined in Get Application List
Enabled bool
WxtagIds Dictionary<string, int>
Map from wxtag_id of Hostname Wxlan Tags to bandwidth in kbps. Property key is the wxtag_id
Apps map[string]int
Map from app key to bandwidth in kbps. Property key is the app key, defined in Get Application List
Enabled bool
WxtagIds map[string]int
Map from wxtag_id of Hostname Wxlan Tags to bandwidth in kbps. Property key is the wxtag_id
apps Map<String,Integer>
Map from app key to bandwidth in kbps. Property key is the app key, defined in Get Application List
enabled Boolean
wxtagIds Map<String,Integer>
Map from wxtag_id of Hostname Wxlan Tags to bandwidth in kbps. Property key is the wxtag_id
apps {[key: string]: number}
Map from app key to bandwidth in kbps. Property key is the app key, defined in Get Application List
enabled boolean
wxtagIds {[key: string]: number}
Map from wxtag_id of Hostname Wxlan Tags to bandwidth in kbps. Property key is the wxtag_id
apps Mapping[str, int]
Map from app key to bandwidth in kbps. Property key is the app key, defined in Get Application List
enabled bool
wxtag_ids Mapping[str, int]
Map from wxtag_id of Hostname Wxlan Tags to bandwidth in kbps. Property key is the wxtag_id
apps Map<Number>
Map from app key to bandwidth in kbps. Property key is the app key, defined in Get Application List
enabled Boolean
wxtagIds Map<Number>
Map from wxtag_id of Hostname Wxlan Tags to bandwidth in kbps. Property key is the wxtag_id

WlanAppQos
, WlanAppQosArgs

Apps Dictionary<string, Pulumi.JuniperMist.Site.Inputs.WlanAppQosApps>
Enabled bool
Others List<Pulumi.JuniperMist.Site.Inputs.WlanAppQosOther>
Apps map[string]WlanAppQosApps
Enabled bool
Others []WlanAppQosOther
apps Map<String,WlanAppQosApps>
enabled Boolean
others List<WlanAppQosOther>
apps {[key: string]: WlanAppQosApps}
enabled boolean
others WlanAppQosOther[]
apps Mapping[str, WlanAppQosApps]
enabled bool
others Sequence[WlanAppQosOther]
apps Map<Property Map>
enabled Boolean
others List<Property Map>

WlanAppQosApps
, WlanAppQosAppsArgs

Dscp string
DSCP value range between 0 and 63
DstSubnet string
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
SrcSubnet string
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
Dscp string
DSCP value range between 0 and 63
DstSubnet string
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
SrcSubnet string
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
dscp String
DSCP value range between 0 and 63
dstSubnet String
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
srcSubnet String
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
dscp string
DSCP value range between 0 and 63
dstSubnet string
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
srcSubnet string
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
dscp str
DSCP value range between 0 and 63
dst_subnet str
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
src_subnet str
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
dscp String
DSCP value range between 0 and 63
dstSubnet String
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
srcSubnet String
Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)

WlanAppQosOther
, WlanAppQosOtherArgs

Dscp string
DstSubnet string
PortRanges string
Protocol string
SrcSubnet string
Dscp string
DstSubnet string
PortRanges string
Protocol string
SrcSubnet string
dscp String
dstSubnet String
portRanges String
protocol String
srcSubnet String
dscp string
dstSubnet string
portRanges string
protocol string
srcSubnet string
dscp String
dstSubnet String
portRanges String
protocol String
srcSubnet String

WlanAuth
, WlanAuthArgs

AnticlogThreshold int
SAE anti-clogging token threshold
EapReauth bool
Whether to trigger EAP reauth when the session ends
EnableMacAuth bool
Whether to enable MAC Auth, uses the same auth_servers
KeyIdx int
When type==wep
Keys List<string>
When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
MultiPskOnly bool
When type==psk, whether to only use multi_psk
Owe string
if type==open. enum: disabled, enabled (means transition mode), required
Pairwises List<string>
When type=psk or type=eap, one or more of wpa1-ccmp, wpa1-tkip, wpa2-ccmp, wpa2-tkip, wpa3
PrivateWlan bool
When multi_psk_only==true, whether private wlan is enabled
Psk string
When type==psk, 8-64 characters, or 64 hex characters
Type string
enum: eap, eap192, open, psk, psk-tkip, psk-wpa2-tkip, wep
WepAsSecondaryAuth bool
Enable WEP as secondary auth
AnticlogThreshold int
SAE anti-clogging token threshold
EapReauth bool
Whether to trigger EAP reauth when the session ends
EnableMacAuth bool
Whether to enable MAC Auth, uses the same auth_servers
KeyIdx int
When type==wep
Keys []string
When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
MultiPskOnly bool
When type==psk, whether to only use multi_psk
Owe string
if type==open. enum: disabled, enabled (means transition mode), required
Pairwises []string
When type=psk or type=eap, one or more of wpa1-ccmp, wpa1-tkip, wpa2-ccmp, wpa2-tkip, wpa3
PrivateWlan bool
When multi_psk_only==true, whether private wlan is enabled
Psk string
When type==psk, 8-64 characters, or 64 hex characters
Type string
enum: eap, eap192, open, psk, psk-tkip, psk-wpa2-tkip, wep
WepAsSecondaryAuth bool
Enable WEP as secondary auth
anticlogThreshold Integer
SAE anti-clogging token threshold
eapReauth Boolean
Whether to trigger EAP reauth when the session ends
enableMacAuth Boolean
Whether to enable MAC Auth, uses the same auth_servers
keyIdx Integer
When type==wep
keys List<String>
When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
multiPskOnly Boolean
When type==psk, whether to only use multi_psk
owe String
if type==open. enum: disabled, enabled (means transition mode), required
pairwises List<String>
When type=psk or type=eap, one or more of wpa1-ccmp, wpa1-tkip, wpa2-ccmp, wpa2-tkip, wpa3
privateWlan Boolean
When multi_psk_only==true, whether private wlan is enabled
psk String
When type==psk, 8-64 characters, or 64 hex characters
type String
enum: eap, eap192, open, psk, psk-tkip, psk-wpa2-tkip, wep
wepAsSecondaryAuth Boolean
Enable WEP as secondary auth
anticlogThreshold number
SAE anti-clogging token threshold
eapReauth boolean
Whether to trigger EAP reauth when the session ends
enableMacAuth boolean
Whether to enable MAC Auth, uses the same auth_servers
keyIdx number
When type==wep
keys string[]
When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
multiPskOnly boolean
When type==psk, whether to only use multi_psk
owe string
if type==open. enum: disabled, enabled (means transition mode), required
pairwises string[]
When type=psk or type=eap, one or more of wpa1-ccmp, wpa1-tkip, wpa2-ccmp, wpa2-tkip, wpa3
privateWlan boolean
When multi_psk_only==true, whether private wlan is enabled
psk string
When type==psk, 8-64 characters, or 64 hex characters
type string
enum: eap, eap192, open, psk, psk-tkip, psk-wpa2-tkip, wep
wepAsSecondaryAuth boolean
Enable WEP as secondary auth
anticlog_threshold int
SAE anti-clogging token threshold
eap_reauth bool
Whether to trigger EAP reauth when the session ends
enable_mac_auth bool
Whether to enable MAC Auth, uses the same auth_servers
key_idx int
When type==wep
keys Sequence[str]
When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
multi_psk_only bool
When type==psk, whether to only use multi_psk
owe str
if type==open. enum: disabled, enabled (means transition mode), required
pairwises Sequence[str]
When type=psk or type=eap, one or more of wpa1-ccmp, wpa1-tkip, wpa2-ccmp, wpa2-tkip, wpa3
private_wlan bool
When multi_psk_only==true, whether private wlan is enabled
psk str
When type==psk, 8-64 characters, or 64 hex characters
type str
enum: eap, eap192, open, psk, psk-tkip, psk-wpa2-tkip, wep
wep_as_secondary_auth bool
Enable WEP as secondary auth
anticlogThreshold Number
SAE anti-clogging token threshold
eapReauth Boolean
Whether to trigger EAP reauth when the session ends
enableMacAuth Boolean
Whether to enable MAC Auth, uses the same auth_servers
keyIdx Number
When type==wep
keys List<String>
When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
multiPskOnly Boolean
When type==psk, whether to only use multi_psk
owe String
if type==open. enum: disabled, enabled (means transition mode), required
pairwises List<String>
When type=psk or type=eap, one or more of wpa1-ccmp, wpa1-tkip, wpa2-ccmp, wpa2-tkip, wpa3
privateWlan Boolean
When multi_psk_only==true, whether private wlan is enabled
psk String
When type==psk, 8-64 characters, or 64 hex characters
type String
enum: eap, eap192, open, psk, psk-tkip, psk-wpa2-tkip, wep
wepAsSecondaryAuth Boolean
Enable WEP as secondary auth

WlanAuthServer
, WlanAuthServerArgs

Host This property is required. string
IP/ hostname of RADIUS server
Secret This property is required. string
Secret of RADIUS server
KeywrapEnabled bool
KeywrapFormat string
enum: ascii, hex
KeywrapKek string
KeywrapMack string
Port string
RequireMessageAuthenticator bool
Whether to require Message-Authenticator in requests
Host This property is required. string
IP/ hostname of RADIUS server
Secret This property is required. string
Secret of RADIUS server
KeywrapEnabled bool
KeywrapFormat string
enum: ascii, hex
KeywrapKek string
KeywrapMack string
Port string
RequireMessageAuthenticator bool
Whether to require Message-Authenticator in requests
host This property is required. String
IP/ hostname of RADIUS server
secret This property is required. String
Secret of RADIUS server
keywrapEnabled Boolean
keywrapFormat String
enum: ascii, hex
keywrapKek String
keywrapMack String
port String
requireMessageAuthenticator Boolean
Whether to require Message-Authenticator in requests
host This property is required. string
IP/ hostname of RADIUS server
secret This property is required. string
Secret of RADIUS server
keywrapEnabled boolean
keywrapFormat string
enum: ascii, hex
keywrapKek string
keywrapMack string
port string
requireMessageAuthenticator boolean
Whether to require Message-Authenticator in requests
host This property is required. str
IP/ hostname of RADIUS server
secret This property is required. str
Secret of RADIUS server
keywrap_enabled bool
keywrap_format str
enum: ascii, hex
keywrap_kek str
keywrap_mack str
port str
require_message_authenticator bool
Whether to require Message-Authenticator in requests
host This property is required. String
IP/ hostname of RADIUS server
secret This property is required. String
Secret of RADIUS server
keywrapEnabled Boolean
keywrapFormat String
enum: ascii, hex
keywrapKek String
keywrapMack String
port String
requireMessageAuthenticator Boolean
Whether to require Message-Authenticator in requests

WlanBonjour
, WlanBonjourArgs

AdditionalVlanIds List<string>
additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
Enabled bool
Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
Services Dictionary<string, Pulumi.JuniperMist.Site.Inputs.WlanBonjourServices>
What services are allowed. Property key is the service name
AdditionalVlanIds []string
additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
Enabled bool
Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
Services map[string]WlanBonjourServices
What services are allowed. Property key is the service name
additionalVlanIds List<String>
additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
enabled Boolean
Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
services Map<String,WlanBonjourServices>
What services are allowed. Property key is the service name
additionalVlanIds string[]
additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
enabled boolean
Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
services {[key: string]: WlanBonjourServices}
What services are allowed. Property key is the service name
additional_vlan_ids Sequence[str]
additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
enabled bool
Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
services Mapping[str, WlanBonjourServices]
What services are allowed. Property key is the service name
additionalVlanIds List<String>
additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
enabled Boolean
Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
services Map<Property Map>
What services are allowed. Property key is the service name

WlanBonjourServices
, WlanBonjourServicesArgs

DisableLocal bool
Whether to prevent wireless clients to discover bonjour devices on the same WLAN
RadiusGroups List<string>
Optional, if the service is further restricted for certain RADIUS groups
Scope string
how bonjour services should be discovered for the same WLAN. enum: same_ap, same_map, same_site
DisableLocal bool
Whether to prevent wireless clients to discover bonjour devices on the same WLAN
RadiusGroups []string
Optional, if the service is further restricted for certain RADIUS groups
Scope string
how bonjour services should be discovered for the same WLAN. enum: same_ap, same_map, same_site
disableLocal Boolean
Whether to prevent wireless clients to discover bonjour devices on the same WLAN
radiusGroups List<String>
Optional, if the service is further restricted for certain RADIUS groups
scope String
how bonjour services should be discovered for the same WLAN. enum: same_ap, same_map, same_site
disableLocal boolean
Whether to prevent wireless clients to discover bonjour devices on the same WLAN
radiusGroups string[]
Optional, if the service is further restricted for certain RADIUS groups
scope string
how bonjour services should be discovered for the same WLAN. enum: same_ap, same_map, same_site
disable_local bool
Whether to prevent wireless clients to discover bonjour devices on the same WLAN
radius_groups Sequence[str]
Optional, if the service is further restricted for certain RADIUS groups
scope str
how bonjour services should be discovered for the same WLAN. enum: same_ap, same_map, same_site
disableLocal Boolean
Whether to prevent wireless clients to discover bonjour devices on the same WLAN
radiusGroups List<String>
Optional, if the service is further restricted for certain RADIUS groups
scope String
how bonjour services should be discovered for the same WLAN. enum: same_ap, same_map, same_site

WlanCiscoCwa
, WlanCiscoCwaArgs

AllowedHostnames List<string>
List of hostnames without http(s):// (matched by substring)
AllowedSubnets List<string>
List of CIDRs
BlockedSubnets List<string>
List of blocked CIDRs
Enabled bool
AllowedHostnames []string
List of hostnames without http(s):// (matched by substring)
AllowedSubnets []string
List of CIDRs
BlockedSubnets []string
List of blocked CIDRs
Enabled bool
allowedHostnames List<String>
List of hostnames without http(s):// (matched by substring)
allowedSubnets List<String>
List of CIDRs
blockedSubnets List<String>
List of blocked CIDRs
enabled Boolean
allowedHostnames string[]
List of hostnames without http(s):// (matched by substring)
allowedSubnets string[]
List of CIDRs
blockedSubnets string[]
List of blocked CIDRs
enabled boolean
allowed_hostnames Sequence[str]
List of hostnames without http(s):// (matched by substring)
allowed_subnets Sequence[str]
List of CIDRs
blocked_subnets Sequence[str]
List of blocked CIDRs
enabled bool
allowedHostnames List<String>
List of hostnames without http(s):// (matched by substring)
allowedSubnets List<String>
List of CIDRs
blockedSubnets List<String>
List of blocked CIDRs
enabled Boolean

WlanCoaServer
, WlanCoaServerArgs

Ip This property is required. string
Secret This property is required. string
DisableEventTimestampCheck bool
Whether to disable Event-Timestamp Check
Enabled bool
Port string
Ip This property is required. string
Secret This property is required. string
DisableEventTimestampCheck bool
Whether to disable Event-Timestamp Check
Enabled bool
Port string
ip This property is required. String
secret This property is required. String
disableEventTimestampCheck Boolean
Whether to disable Event-Timestamp Check
enabled Boolean
port String
ip This property is required. string
secret This property is required. string
disableEventTimestampCheck boolean
Whether to disable Event-Timestamp Check
enabled boolean
port string
ip This property is required. str
secret This property is required. str
disable_event_timestamp_check bool
Whether to disable Event-Timestamp Check
enabled bool
port str
ip This property is required. String
secret This property is required. String
disableEventTimestampCheck Boolean
Whether to disable Event-Timestamp Check
enabled Boolean
port String

WlanDnsServerRewrite
, WlanDnsServerRewriteArgs

Enabled bool
RadiusGroups Dictionary<string, string>
Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
Enabled bool
RadiusGroups map[string]string
Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
enabled Boolean
radiusGroups Map<String,String>
Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
enabled boolean
radiusGroups {[key: string]: string}
Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
enabled bool
radius_groups Mapping[str, str]
Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
enabled Boolean
radiusGroups Map<String>
Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server

WlanDynamicPsk
, WlanDynamicPskArgs

DefaultPsk string
Default PSK to use if cloud WLC is not available, 8-63 characters
DefaultVlanId string
Enabled bool
ForceLookup bool
When 11r is enabled, we'll try to use the cached PMK, this can be disabled. false means auto
Source string
enum: cloud_psks, radius
DefaultPsk string
Default PSK to use if cloud WLC is not available, 8-63 characters
DefaultVlanId string
Enabled bool
ForceLookup bool
When 11r is enabled, we'll try to use the cached PMK, this can be disabled. false means auto
Source string
enum: cloud_psks, radius
defaultPsk String
Default PSK to use if cloud WLC is not available, 8-63 characters
defaultVlanId String
enabled Boolean
forceLookup Boolean
When 11r is enabled, we'll try to use the cached PMK, this can be disabled. false means auto
source String
enum: cloud_psks, radius
defaultPsk string
Default PSK to use if cloud WLC is not available, 8-63 characters
defaultVlanId string
enabled boolean
forceLookup boolean
When 11r is enabled, we'll try to use the cached PMK, this can be disabled. false means auto
source string
enum: cloud_psks, radius
default_psk str
Default PSK to use if cloud WLC is not available, 8-63 characters
default_vlan_id str
enabled bool
force_lookup bool
When 11r is enabled, we'll try to use the cached PMK, this can be disabled. false means auto
source str
enum: cloud_psks, radius
defaultPsk String
Default PSK to use if cloud WLC is not available, 8-63 characters
defaultVlanId String
enabled Boolean
forceLookup Boolean
When 11r is enabled, we'll try to use the cached PMK, this can be disabled. false means auto
source String
enum: cloud_psks, radius

WlanDynamicVlan
, WlanDynamicVlanArgs

DefaultVlanIds List<string>
Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
Enabled bool
Requires vlan_enabled==true to be set to true. Whether to enable dynamic vlan
LocalVlanIds List<string>
VLAN_ids to be locally bridged
Type string
standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name, standard
Vlans Dictionary<string, string>
Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping

  • if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
  • if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
DefaultVlanIds []string
Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
Enabled bool
Requires vlan_enabled==true to be set to true. Whether to enable dynamic vlan
LocalVlanIds []string
VLAN_ids to be locally bridged
Type string
standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name, standard
Vlans map[string]string
Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping

  • if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
  • if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
defaultVlanIds List<String>
Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
enabled Boolean
Requires vlan_enabled==true to be set to true. Whether to enable dynamic vlan
localVlanIds List<String>
VLAN_ids to be locally bridged
type String
standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name, standard
vlans Map<String,String>
Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping

  • if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
  • if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
defaultVlanIds string[]
Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
enabled boolean
Requires vlan_enabled==true to be set to true. Whether to enable dynamic vlan
localVlanIds string[]
VLAN_ids to be locally bridged
type string
standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name, standard
vlans {[key: string]: string}
Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping

  • if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
  • if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
default_vlan_ids Sequence[str]
Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
enabled bool
Requires vlan_enabled==true to be set to true. Whether to enable dynamic vlan
local_vlan_ids Sequence[str]
VLAN_ids to be locally bridged
type str
standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name, standard
vlans Mapping[str, str]
Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping

  • if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
  • if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
defaultVlanIds List<String>
Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
enabled Boolean
Requires vlan_enabled==true to be set to true. Whether to enable dynamic vlan
localVlanIds List<String>
VLAN_ids to be locally bridged
type String
standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name, standard
vlans Map<String>
Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping

  • if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
  • if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name

WlanHotspot20
, WlanHotspot20Args

DomainNames List<string>
Enabled bool
Whether to enable hotspot 2.0 config
NaiRealms List<string>
Operators List<string>
List of operators to support
Rcois List<string>
VenueName string
Venue name, default is site name
DomainNames []string
Enabled bool
Whether to enable hotspot 2.0 config
NaiRealms []string
Operators []string
List of operators to support
Rcois []string
VenueName string
Venue name, default is site name
domainNames List<String>
enabled Boolean
Whether to enable hotspot 2.0 config
naiRealms List<String>
operators List<String>
List of operators to support
rcois List<String>
venueName String
Venue name, default is site name
domainNames string[]
enabled boolean
Whether to enable hotspot 2.0 config
naiRealms string[]
operators string[]
List of operators to support
rcois string[]
venueName string
Venue name, default is site name
domain_names Sequence[str]
enabled bool
Whether to enable hotspot 2.0 config
nai_realms Sequence[str]
operators Sequence[str]
List of operators to support
rcois Sequence[str]
venue_name str
Venue name, default is site name
domainNames List<String>
enabled Boolean
Whether to enable hotspot 2.0 config
naiRealms List<String>
operators List<String>
List of operators to support
rcois List<String>
venueName String
Venue name, default is site name

WlanInjectDhcpOption82
, WlanInjectDhcpOption82Args

CircuitId string
Information to set in the circuit_id field of the DHCP Option 82. It is possible to use static string or the following variables (e.g. {{SSID}}:{{AP_MAC}}):

  • {{AP_MAC}}
  • {{AP_MAC_DASHED}}
  • {{AP_MODEL}}
  • {{AP_NAME}}
  • {{SITE_NAME}}
  • {{SSID}}
Enabled bool
Whether to inject option 82 when forwarding DHCP packets
CircuitId string
Information to set in the circuit_id field of the DHCP Option 82. It is possible to use static string or the following variables (e.g. {{SSID}}:{{AP_MAC}}):

  • {{AP_MAC}}
  • {{AP_MAC_DASHED}}
  • {{AP_MODEL}}
  • {{AP_NAME}}
  • {{SITE_NAME}}
  • {{SSID}}
Enabled bool
Whether to inject option 82 when forwarding DHCP packets
circuitId String
Information to set in the circuit_id field of the DHCP Option 82. It is possible to use static string or the following variables (e.g. {{SSID}}:{{AP_MAC}}):

  • {{AP_MAC}}
  • {{AP_MAC_DASHED}}
  • {{AP_MODEL}}
  • {{AP_NAME}}
  • {{SITE_NAME}}
  • {{SSID}}
enabled Boolean
Whether to inject option 82 when forwarding DHCP packets
circuitId string
Information to set in the circuit_id field of the DHCP Option 82. It is possible to use static string or the following variables (e.g. {{SSID}}:{{AP_MAC}}):

  • {{AP_MAC}}
  • {{AP_MAC_DASHED}}
  • {{AP_MODEL}}
  • {{AP_NAME}}
  • {{SITE_NAME}}
  • {{SSID}}
enabled boolean
Whether to inject option 82 when forwarding DHCP packets
circuit_id str
Information to set in the circuit_id field of the DHCP Option 82. It is possible to use static string or the following variables (e.g. {{SSID}}:{{AP_MAC}}):

  • {{AP_MAC}}
  • {{AP_MAC_DASHED}}
  • {{AP_MODEL}}
  • {{AP_NAME}}
  • {{SITE_NAME}}
  • {{SSID}}
enabled bool
Whether to inject option 82 when forwarding DHCP packets
circuitId String
Information to set in the circuit_id field of the DHCP Option 82. It is possible to use static string or the following variables (e.g. {{SSID}}:{{AP_MAC}}):

  • {{AP_MAC}}
  • {{AP_MAC_DASHED}}
  • {{AP_MODEL}}
  • {{AP_NAME}}
  • {{SITE_NAME}}
  • {{SSID}}
enabled Boolean
Whether to inject option 82 when forwarding DHCP packets

WlanMistNac
, WlanMistNacArgs

Enabled bool
When enabled:

  • auth_servers is ignored
  • acct_servers is ignored
  • auth_servers_* are ignored
  • coa_servers is ignored
  • radsec is ignored
  • coa_enabled is assumed
Enabled bool
When enabled:

  • auth_servers is ignored
  • acct_servers is ignored
  • auth_servers_* are ignored
  • coa_servers is ignored
  • radsec is ignored
  • coa_enabled is assumed
enabled Boolean
When enabled:

  • auth_servers is ignored
  • acct_servers is ignored
  • auth_servers_* are ignored
  • coa_servers is ignored
  • radsec is ignored
  • coa_enabled is assumed
enabled boolean
When enabled:

  • auth_servers is ignored
  • acct_servers is ignored
  • auth_servers_* are ignored
  • coa_servers is ignored
  • radsec is ignored
  • coa_enabled is assumed
enabled bool
When enabled:

  • auth_servers is ignored
  • acct_servers is ignored
  • auth_servers_* are ignored
  • coa_servers is ignored
  • radsec is ignored
  • coa_enabled is assumed
enabled Boolean
When enabled:

  • auth_servers is ignored
  • acct_servers is ignored
  • auth_servers_* are ignored
  • coa_servers is ignored
  • radsec is ignored
  • coa_enabled is assumed

WlanPortal
, WlanPortalArgs

AllowWlanIdRoam bool
Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with different WLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
AmazonClientId string
Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
AmazonClientSecret string
Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
AmazonEmailDomains List<string>
Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
AmazonEnabled bool
Whether amazon is enabled as a login method
AmazonExpire int
Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
Auth string
authentication scheme. enum: amazon, azure, email, external, facebook, google, microsoft, multi, none, password, sms, sponsor, sso
AzureClientId string
Required if azure_enabled==true. Azure active directory app client id
AzureClientSecret string
Required if azure_enabled==true. Azure active directory app client secret
AzureEnabled bool
Whether Azure Active Directory is enabled as a login method
AzureExpire int
Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
AzureTenantId string
Required if azure_enabled==true. Azure active directory tenant id.
BroadnetPassword string
Required if sms_provider==broadnet
BroadnetSid string
Required if sms_provider==broadnet
BroadnetUserId string
Required if sms_provider==broadnet
BypassWhenCloudDown bool
Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
ClickatellApiKey string
Required if sms_provider==clickatell
CrossSite bool
Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
EmailEnabled bool
Whether email (access code verification) is enabled as a login method
Enabled bool
Whether guest portal is enabled
Expire int
How long to remain authorized, in minutes
ExternalPortalUrl string
Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
FacebookClientId string
Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
FacebookClientSecret string
Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
FacebookEmailDomains List<string>
Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
FacebookEnabled bool
Whether facebook is enabled as a login method
FacebookExpire int
Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
Forward bool
Whether to forward the user to another URL after authorized
ForwardUrl string
URL to forward the user to
GoogleClientId string
Google OAuth2 app id. This is optional. If not provided, it will use a default one.
GoogleClientSecret string
Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
GoogleEmailDomains List<string>
Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
GoogleEnabled bool
Whether Google is enabled as login method
GoogleExpire int
Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
GupshupPassword string
Required if sms_provider==gupshup
GupshupUserid string
Required if sms_provider==gupshup
MicrosoftClientId string
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
MicrosoftClientSecret string
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
MicrosoftEmailDomains List<string>
Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
MicrosoftEnabled bool
Whether microsoft 365 is enabled as a login method
MicrosoftExpire int
Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
PassphraseEnabled bool
Whether password is enabled
PassphraseExpire int
Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses expire
Password string
Required if passphrase_enabled==true.
PredefinedSponsorsEnabled bool
Whether to show list of sponsor emails mentioned in sponsors object as a dropdown. If both sponsor_notify_all and predefined_sponsors_enabled are false, behaviour is acc to sponsor_email_domains
PredefinedSponsorsHideEmail bool
Whether to hide sponsor’s email from list of sponsors
Privacy bool
PuzzelPassword string
Required if sms_provider==puzzel
PuzzelServiceId string
Required if sms_provider==puzzel
PuzzelUsername string
Required if sms_provider==puzzel
SmsEnabled bool
Whether sms is enabled as a login method
SmsExpire int
Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
SmsMessageFormat string
Optional if sms_enabled==true. SMS Message format
SmsProvider string
Optioanl if sms_enabled==true. enum: broadnet, clickatell, gupshup, manual, puzzel, telstra, twilio
SponsorAutoApprove bool
Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
SponsorEmailDomains List<string>
List of domain allowed for sponsor email. Required if sponsor_enabled is true and sponsors is empty.
SponsorEnabled bool
Whether sponsor is enabled
SponsorExpire int
Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
SponsorLinkValidityDuration string
Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
SponsorNotifyAll bool
Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned in sponsors object. Both sponsor_notify_all and predefined_sponsors_enabled should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
SponsorStatusNotify bool
Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
Sponsors Dictionary<string, string>
object of allowed sponsors email with name. Required if sponsor_enabled is true and sponsor_email_domains is empty.

        Property key is the sponsor email, Property value is the sponsor name
SsoDefaultRole string
Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
SsoForcedRole string
Optional if wlan_portal_auth==sso
SsoIdpCert string
Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
SsoIdpSignAlgo string
Optioanl if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum: sha1, sha256, sha384, sha512
SsoIdpSsoUrl string
Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
SsoIssuer string
Required if wlan_portal_auth==sso, IDP issuer URL
SsoNameidFormat string
Optional if wlan_portal_auth==sso. enum: email, unspecified
TelstraClientId string
Required if sms_provider==telstra, Client ID provided by Telstra
TelstraClientSecret string
Required if sms_provider==telstra, Client secret provided by Telstra
TwilioAuthToken string
Required if sms_provider==twilio, Auth token account with twilio account
TwilioPhoneNumber string
Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
TwilioSid string
Required if sms_provider==twilio, Account SID provided by Twilio
AllowWlanIdRoam bool
Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with different WLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
AmazonClientId string
Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
AmazonClientSecret string
Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
AmazonEmailDomains []string
Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
AmazonEnabled bool
Whether amazon is enabled as a login method
AmazonExpire int
Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
Auth string
authentication scheme. enum: amazon, azure, email, external, facebook, google, microsoft, multi, none, password, sms, sponsor, sso
AzureClientId string
Required if azure_enabled==true. Azure active directory app client id
AzureClientSecret string
Required if azure_enabled==true. Azure active directory app client secret
AzureEnabled bool
Whether Azure Active Directory is enabled as a login method
AzureExpire int
Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
AzureTenantId string
Required if azure_enabled==true. Azure active directory tenant id.
BroadnetPassword string
Required if sms_provider==broadnet
BroadnetSid string
Required if sms_provider==broadnet
BroadnetUserId string
Required if sms_provider==broadnet
BypassWhenCloudDown bool
Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
ClickatellApiKey string
Required if sms_provider==clickatell
CrossSite bool
Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
EmailEnabled bool
Whether email (access code verification) is enabled as a login method
Enabled bool
Whether guest portal is enabled
Expire int
How long to remain authorized, in minutes
ExternalPortalUrl string
Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
FacebookClientId string
Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
FacebookClientSecret string
Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
FacebookEmailDomains []string
Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
FacebookEnabled bool
Whether facebook is enabled as a login method
FacebookExpire int
Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
Forward bool
Whether to forward the user to another URL after authorized
ForwardUrl string
URL to forward the user to
GoogleClientId string
Google OAuth2 app id. This is optional. If not provided, it will use a default one.
GoogleClientSecret string
Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
GoogleEmailDomains []string
Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
GoogleEnabled bool
Whether Google is enabled as login method
GoogleExpire int
Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
GupshupPassword string
Required if sms_provider==gupshup
GupshupUserid string
Required if sms_provider==gupshup
MicrosoftClientId string
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
MicrosoftClientSecret string
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
MicrosoftEmailDomains []string
Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
MicrosoftEnabled bool
Whether microsoft 365 is enabled as a login method
MicrosoftExpire int
Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
PassphraseEnabled bool
Whether password is enabled
PassphraseExpire int
Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses expire
Password string
Required if passphrase_enabled==true.
PredefinedSponsorsEnabled bool
Whether to show list of sponsor emails mentioned in sponsors object as a dropdown. If both sponsor_notify_all and predefined_sponsors_enabled are false, behaviour is acc to sponsor_email_domains
PredefinedSponsorsHideEmail bool
Whether to hide sponsor’s email from list of sponsors
Privacy bool
PuzzelPassword string
Required if sms_provider==puzzel
PuzzelServiceId string
Required if sms_provider==puzzel
PuzzelUsername string
Required if sms_provider==puzzel
SmsEnabled bool
Whether sms is enabled as a login method
SmsExpire int
Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
SmsMessageFormat string
Optional if sms_enabled==true. SMS Message format
SmsProvider string
Optioanl if sms_enabled==true. enum: broadnet, clickatell, gupshup, manual, puzzel, telstra, twilio
SponsorAutoApprove bool
Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
SponsorEmailDomains []string
List of domain allowed for sponsor email. Required if sponsor_enabled is true and sponsors is empty.
SponsorEnabled bool
Whether sponsor is enabled
SponsorExpire int
Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
SponsorLinkValidityDuration string
Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
SponsorNotifyAll bool
Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned in sponsors object. Both sponsor_notify_all and predefined_sponsors_enabled should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
SponsorStatusNotify bool
Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
Sponsors map[string]string
object of allowed sponsors email with name. Required if sponsor_enabled is true and sponsor_email_domains is empty.

        Property key is the sponsor email, Property value is the sponsor name
SsoDefaultRole string
Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
SsoForcedRole string
Optional if wlan_portal_auth==sso
SsoIdpCert string
Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
SsoIdpSignAlgo string
Optioanl if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum: sha1, sha256, sha384, sha512
SsoIdpSsoUrl string
Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
SsoIssuer string
Required if wlan_portal_auth==sso, IDP issuer URL
SsoNameidFormat string
Optional if wlan_portal_auth==sso. enum: email, unspecified
TelstraClientId string
Required if sms_provider==telstra, Client ID provided by Telstra
TelstraClientSecret string
Required if sms_provider==telstra, Client secret provided by Telstra
TwilioAuthToken string
Required if sms_provider==twilio, Auth token account with twilio account
TwilioPhoneNumber string
Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
TwilioSid string
Required if sms_provider==twilio, Account SID provided by Twilio
allowWlanIdRoam Boolean
Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with different WLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
amazonClientId String
Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
amazonClientSecret String
Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
amazonEmailDomains List<String>
Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
amazonEnabled Boolean
Whether amazon is enabled as a login method
amazonExpire Integer
Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
auth String
authentication scheme. enum: amazon, azure, email, external, facebook, google, microsoft, multi, none, password, sms, sponsor, sso
azureClientId String
Required if azure_enabled==true. Azure active directory app client id
azureClientSecret String
Required if azure_enabled==true. Azure active directory app client secret
azureEnabled Boolean
Whether Azure Active Directory is enabled as a login method
azureExpire Integer
Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
azureTenantId String
Required if azure_enabled==true. Azure active directory tenant id.
broadnetPassword String
Required if sms_provider==broadnet
broadnetSid String
Required if sms_provider==broadnet
broadnetUserId String
Required if sms_provider==broadnet
bypassWhenCloudDown Boolean
Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
clickatellApiKey String
Required if sms_provider==clickatell
crossSite Boolean
Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
emailEnabled Boolean
Whether email (access code verification) is enabled as a login method
enabled Boolean
Whether guest portal is enabled
expire Integer
How long to remain authorized, in minutes
externalPortalUrl String
Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
facebookClientId String
Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
facebookClientSecret String
Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
facebookEmailDomains List<String>
Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
facebookEnabled Boolean
Whether facebook is enabled as a login method
facebookExpire Integer
Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
forward Boolean
Whether to forward the user to another URL after authorized
forwardUrl String
URL to forward the user to
googleClientId String
Google OAuth2 app id. This is optional. If not provided, it will use a default one.
googleClientSecret String
Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
googleEmailDomains List<String>
Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
googleEnabled Boolean
Whether Google is enabled as login method
googleExpire Integer
Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
gupshupPassword String
Required if sms_provider==gupshup
gupshupUserid String
Required if sms_provider==gupshup
microsoftClientId String
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
microsoftClientSecret String
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
microsoftEmailDomains List<String>
Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
microsoftEnabled Boolean
Whether microsoft 365 is enabled as a login method
microsoftExpire Integer
Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
passphraseEnabled Boolean
Whether password is enabled
passphraseExpire Integer
Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses expire
password String
Required if passphrase_enabled==true.
predefinedSponsorsEnabled Boolean
Whether to show list of sponsor emails mentioned in sponsors object as a dropdown. If both sponsor_notify_all and predefined_sponsors_enabled are false, behaviour is acc to sponsor_email_domains
predefinedSponsorsHideEmail Boolean
Whether to hide sponsor’s email from list of sponsors
privacy Boolean
puzzelPassword String
Required if sms_provider==puzzel
puzzelServiceId String
Required if sms_provider==puzzel
puzzelUsername String
Required if sms_provider==puzzel
smsEnabled Boolean
Whether sms is enabled as a login method
smsExpire Integer
Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
smsMessageFormat String
Optional if sms_enabled==true. SMS Message format
smsProvider String
Optioanl if sms_enabled==true. enum: broadnet, clickatell, gupshup, manual, puzzel, telstra, twilio
sponsorAutoApprove Boolean
Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
sponsorEmailDomains List<String>
List of domain allowed for sponsor email. Required if sponsor_enabled is true and sponsors is empty.
sponsorEnabled Boolean
Whether sponsor is enabled
sponsorExpire Integer
Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
sponsorLinkValidityDuration String
Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
sponsorNotifyAll Boolean
Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned in sponsors object. Both sponsor_notify_all and predefined_sponsors_enabled should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
sponsorStatusNotify Boolean
Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
sponsors Map<String,String>
object of allowed sponsors email with name. Required if sponsor_enabled is true and sponsor_email_domains is empty.

        Property key is the sponsor email, Property value is the sponsor name
ssoDefaultRole String
Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
ssoForcedRole String
Optional if wlan_portal_auth==sso
ssoIdpCert String
Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
ssoIdpSignAlgo String
Optioanl if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum: sha1, sha256, sha384, sha512
ssoIdpSsoUrl String
Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
ssoIssuer String
Required if wlan_portal_auth==sso, IDP issuer URL
ssoNameidFormat String
Optional if wlan_portal_auth==sso. enum: email, unspecified
telstraClientId String
Required if sms_provider==telstra, Client ID provided by Telstra
telstraClientSecret String
Required if sms_provider==telstra, Client secret provided by Telstra
twilioAuthToken String
Required if sms_provider==twilio, Auth token account with twilio account
twilioPhoneNumber String
Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
twilioSid String
Required if sms_provider==twilio, Account SID provided by Twilio
allowWlanIdRoam boolean
Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with different WLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
amazonClientId string
Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
amazonClientSecret string
Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
amazonEmailDomains string[]
Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
amazonEnabled boolean
Whether amazon is enabled as a login method
amazonExpire number
Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
auth string
authentication scheme. enum: amazon, azure, email, external, facebook, google, microsoft, multi, none, password, sms, sponsor, sso
azureClientId string
Required if azure_enabled==true. Azure active directory app client id
azureClientSecret string
Required if azure_enabled==true. Azure active directory app client secret
azureEnabled boolean
Whether Azure Active Directory is enabled as a login method
azureExpire number
Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
azureTenantId string
Required if azure_enabled==true. Azure active directory tenant id.
broadnetPassword string
Required if sms_provider==broadnet
broadnetSid string
Required if sms_provider==broadnet
broadnetUserId string
Required if sms_provider==broadnet
bypassWhenCloudDown boolean
Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
clickatellApiKey string
Required if sms_provider==clickatell
crossSite boolean
Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
emailEnabled boolean
Whether email (access code verification) is enabled as a login method
enabled boolean
Whether guest portal is enabled
expire number
How long to remain authorized, in minutes
externalPortalUrl string
Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
facebookClientId string
Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
facebookClientSecret string
Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
facebookEmailDomains string[]
Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
facebookEnabled boolean
Whether facebook is enabled as a login method
facebookExpire number
Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
forward boolean
Whether to forward the user to another URL after authorized
forwardUrl string
URL to forward the user to
googleClientId string
Google OAuth2 app id. This is optional. If not provided, it will use a default one.
googleClientSecret string
Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
googleEmailDomains string[]
Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
googleEnabled boolean
Whether Google is enabled as login method
googleExpire number
Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
gupshupPassword string
Required if sms_provider==gupshup
gupshupUserid string
Required if sms_provider==gupshup
microsoftClientId string
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
microsoftClientSecret string
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
microsoftEmailDomains string[]
Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
microsoftEnabled boolean
Whether microsoft 365 is enabled as a login method
microsoftExpire number
Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
passphraseEnabled boolean
Whether password is enabled
passphraseExpire number
Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses expire
password string
Required if passphrase_enabled==true.
predefinedSponsorsEnabled boolean
Whether to show list of sponsor emails mentioned in sponsors object as a dropdown. If both sponsor_notify_all and predefined_sponsors_enabled are false, behaviour is acc to sponsor_email_domains
predefinedSponsorsHideEmail boolean
Whether to hide sponsor’s email from list of sponsors
privacy boolean
puzzelPassword string
Required if sms_provider==puzzel
puzzelServiceId string
Required if sms_provider==puzzel
puzzelUsername string
Required if sms_provider==puzzel
smsEnabled boolean
Whether sms is enabled as a login method
smsExpire number
Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
smsMessageFormat string
Optional if sms_enabled==true. SMS Message format
smsProvider string
Optioanl if sms_enabled==true. enum: broadnet, clickatell, gupshup, manual, puzzel, telstra, twilio
sponsorAutoApprove boolean
Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
sponsorEmailDomains string[]
List of domain allowed for sponsor email. Required if sponsor_enabled is true and sponsors is empty.
sponsorEnabled boolean
Whether sponsor is enabled
sponsorExpire number
Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
sponsorLinkValidityDuration string
Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
sponsorNotifyAll boolean
Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned in sponsors object. Both sponsor_notify_all and predefined_sponsors_enabled should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
sponsorStatusNotify boolean
Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
sponsors {[key: string]: string}
object of allowed sponsors email with name. Required if sponsor_enabled is true and sponsor_email_domains is empty.

        Property key is the sponsor email, Property value is the sponsor name
ssoDefaultRole string
Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
ssoForcedRole string
Optional if wlan_portal_auth==sso
ssoIdpCert string
Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
ssoIdpSignAlgo string
Optioanl if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum: sha1, sha256, sha384, sha512
ssoIdpSsoUrl string
Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
ssoIssuer string
Required if wlan_portal_auth==sso, IDP issuer URL
ssoNameidFormat string
Optional if wlan_portal_auth==sso. enum: email, unspecified
telstraClientId string
Required if sms_provider==telstra, Client ID provided by Telstra
telstraClientSecret string
Required if sms_provider==telstra, Client secret provided by Telstra
twilioAuthToken string
Required if sms_provider==twilio, Auth token account with twilio account
twilioPhoneNumber string
Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
twilioSid string
Required if sms_provider==twilio, Account SID provided by Twilio
allow_wlan_id_roam bool
Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with different WLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
amazon_client_id str
Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
amazon_client_secret str
Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
amazon_email_domains Sequence[str]
Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
amazon_enabled bool
Whether amazon is enabled as a login method
amazon_expire int
Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
auth str
authentication scheme. enum: amazon, azure, email, external, facebook, google, microsoft, multi, none, password, sms, sponsor, sso
azure_client_id str
Required if azure_enabled==true. Azure active directory app client id
azure_client_secret str
Required if azure_enabled==true. Azure active directory app client secret
azure_enabled bool
Whether Azure Active Directory is enabled as a login method
azure_expire int
Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
azure_tenant_id str
Required if azure_enabled==true. Azure active directory tenant id.
broadnet_password str
Required if sms_provider==broadnet
broadnet_sid str
Required if sms_provider==broadnet
broadnet_user_id str
Required if sms_provider==broadnet
bypass_when_cloud_down bool
Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
clickatell_api_key str
Required if sms_provider==clickatell
cross_site bool
Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
email_enabled bool
Whether email (access code verification) is enabled as a login method
enabled bool
Whether guest portal is enabled
expire int
How long to remain authorized, in minutes
external_portal_url str
Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
facebook_client_id str
Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
facebook_client_secret str
Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
facebook_email_domains Sequence[str]
Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
facebook_enabled bool
Whether facebook is enabled as a login method
facebook_expire int
Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
forward bool
Whether to forward the user to another URL after authorized
forward_url str
URL to forward the user to
google_client_id str
Google OAuth2 app id. This is optional. If not provided, it will use a default one.
google_client_secret str
Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
google_email_domains Sequence[str]
Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
google_enabled bool
Whether Google is enabled as login method
google_expire int
Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
gupshup_password str
Required if sms_provider==gupshup
gupshup_userid str
Required if sms_provider==gupshup
microsoft_client_id str
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
microsoft_client_secret str
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
microsoft_email_domains Sequence[str]
Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
microsoft_enabled bool
Whether microsoft 365 is enabled as a login method
microsoft_expire int
Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
passphrase_enabled bool
Whether password is enabled
passphrase_expire int
Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses expire
password str
Required if passphrase_enabled==true.
predefined_sponsors_enabled bool
Whether to show list of sponsor emails mentioned in sponsors object as a dropdown. If both sponsor_notify_all and predefined_sponsors_enabled are false, behaviour is acc to sponsor_email_domains
predefined_sponsors_hide_email bool
Whether to hide sponsor’s email from list of sponsors
privacy bool
puzzel_password str
Required if sms_provider==puzzel
puzzel_service_id str
Required if sms_provider==puzzel
puzzel_username str
Required if sms_provider==puzzel
sms_enabled bool
Whether sms is enabled as a login method
sms_expire int
Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
sms_message_format str
Optional if sms_enabled==true. SMS Message format
sms_provider str
Optioanl if sms_enabled==true. enum: broadnet, clickatell, gupshup, manual, puzzel, telstra, twilio
bool
Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
Sequence[str]
List of domain allowed for sponsor email. Required if sponsor_enabled is true and sponsors is empty.
bool
Whether sponsor is enabled
int
Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
str
Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
bool
Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned in sponsors object. Both sponsor_notify_all and predefined_sponsors_enabled should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
bool
Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
sponsors Mapping[str, str]
object of allowed sponsors email with name. Required if sponsor_enabled is true and sponsor_email_domains is empty.

        Property key is the sponsor email, Property value is the sponsor name
sso_default_role str
Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
sso_forced_role str
Optional if wlan_portal_auth==sso
sso_idp_cert str
Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
sso_idp_sign_algo str
Optioanl if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum: sha1, sha256, sha384, sha512
sso_idp_sso_url str
Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
sso_issuer str
Required if wlan_portal_auth==sso, IDP issuer URL
sso_nameid_format str
Optional if wlan_portal_auth==sso. enum: email, unspecified
telstra_client_id str
Required if sms_provider==telstra, Client ID provided by Telstra
telstra_client_secret str
Required if sms_provider==telstra, Client secret provided by Telstra
twilio_auth_token str
Required if sms_provider==twilio, Auth token account with twilio account
twilio_phone_number str
Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
twilio_sid str
Required if sms_provider==twilio, Account SID provided by Twilio
allowWlanIdRoam Boolean
Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with different WLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
amazonClientId String
Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
amazonClientSecret String
Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
amazonEmailDomains List<String>
Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
amazonEnabled Boolean
Whether amazon is enabled as a login method
amazonExpire Number
Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
auth String
authentication scheme. enum: amazon, azure, email, external, facebook, google, microsoft, multi, none, password, sms, sponsor, sso
azureClientId String
Required if azure_enabled==true. Azure active directory app client id
azureClientSecret String
Required if azure_enabled==true. Azure active directory app client secret
azureEnabled Boolean
Whether Azure Active Directory is enabled as a login method
azureExpire Number
Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
azureTenantId String
Required if azure_enabled==true. Azure active directory tenant id.
broadnetPassword String
Required if sms_provider==broadnet
broadnetSid String
Required if sms_provider==broadnet
broadnetUserId String
Required if sms_provider==broadnet
bypassWhenCloudDown Boolean
Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
clickatellApiKey String
Required if sms_provider==clickatell
crossSite Boolean
Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
emailEnabled Boolean
Whether email (access code verification) is enabled as a login method
enabled Boolean
Whether guest portal is enabled
expire Number
How long to remain authorized, in minutes
externalPortalUrl String
Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
facebookClientId String
Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
facebookClientSecret String
Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
facebookEmailDomains List<String>
Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
facebookEnabled Boolean
Whether facebook is enabled as a login method
facebookExpire Number
Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
forward Boolean
Whether to forward the user to another URL after authorized
forwardUrl String
URL to forward the user to
googleClientId String
Google OAuth2 app id. This is optional. If not provided, it will use a default one.
googleClientSecret String
Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
googleEmailDomains List<String>
Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
googleEnabled Boolean
Whether Google is enabled as login method
googleExpire Number
Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
gupshupPassword String
Required if sms_provider==gupshup
gupshupUserid String
Required if sms_provider==gupshup
microsoftClientId String
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
microsoftClientSecret String
Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
microsoftEmailDomains List<String>
Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
microsoftEnabled Boolean
Whether microsoft 365 is enabled as a login method
microsoftExpire Number
Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
passphraseEnabled Boolean
Whether password is enabled
passphraseExpire Number
Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses expire
password String
Required if passphrase_enabled==true.
predefinedSponsorsEnabled Boolean
Whether to show list of sponsor emails mentioned in sponsors object as a dropdown. If both sponsor_notify_all and predefined_sponsors_enabled are false, behaviour is acc to sponsor_email_domains
predefinedSponsorsHideEmail Boolean
Whether to hide sponsor’s email from list of sponsors
privacy Boolean
puzzelPassword String
Required if sms_provider==puzzel
puzzelServiceId String
Required if sms_provider==puzzel
puzzelUsername String
Required if sms_provider==puzzel
smsEnabled Boolean
Whether sms is enabled as a login method
smsExpire Number
Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
smsMessageFormat String
Optional if sms_enabled==true. SMS Message format
smsProvider String
Optioanl if sms_enabled==true. enum: broadnet, clickatell, gupshup, manual, puzzel, telstra, twilio
sponsorAutoApprove Boolean
Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
sponsorEmailDomains List<String>
List of domain allowed for sponsor email. Required if sponsor_enabled is true and sponsors is empty.
sponsorEnabled Boolean
Whether sponsor is enabled
sponsorExpire Number
Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
sponsorLinkValidityDuration String
Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
sponsorNotifyAll Boolean
Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned in sponsors object. Both sponsor_notify_all and predefined_sponsors_enabled should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
sponsorStatusNotify Boolean
Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
sponsors Map<String>
object of allowed sponsors email with name. Required if sponsor_enabled is true and sponsor_email_domains is empty.

        Property key is the sponsor email, Property value is the sponsor name
ssoDefaultRole String
Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
ssoForcedRole String
Optional if wlan_portal_auth==sso
ssoIdpCert String
Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
ssoIdpSignAlgo String
Optioanl if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum: sha1, sha256, sha384, sha512
ssoIdpSsoUrl String
Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
ssoIssuer String
Required if wlan_portal_auth==sso, IDP issuer URL
ssoNameidFormat String
Optional if wlan_portal_auth==sso. enum: email, unspecified
telstraClientId String
Required if sms_provider==telstra, Client ID provided by Telstra
telstraClientSecret String
Required if sms_provider==telstra, Client secret provided by Telstra
twilioAuthToken String
Required if sms_provider==twilio, Auth token account with twilio account
twilioPhoneNumber String
Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
twilioSid String
Required if sms_provider==twilio, Account SID provided by Twilio

WlanQos
, WlanQosArgs

Class string
enum: background, best_effort, video, voice
Overwrite bool
Whether to overwrite QoS
Class string
enum: background, best_effort, video, voice
Overwrite bool
Whether to overwrite QoS
class_ String
enum: background, best_effort, video, voice
overwrite Boolean
Whether to overwrite QoS
class string
enum: background, best_effort, video, voice
overwrite boolean
Whether to overwrite QoS
class_ str
enum: background, best_effort, video, voice
overwrite bool
Whether to overwrite QoS
class String
enum: background, best_effort, video, voice
overwrite Boolean
Whether to overwrite QoS

WlanRadsec
, WlanRadsecArgs

CoaEnabled bool
Enabled bool
IdleTimeout string
MxclusterIds List<string>
To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
ProxyHosts List<string>
Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. When radsec.proxy_hosts are not used, tunnel peers (org or site mxedges) are used irrespective of use_site_mxedge
ServerName string
Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
Servers List<Pulumi.JuniperMist.Site.Inputs.WlanRadsecServer>
List of RadSec Servers. Only if not Mist Edge.
UseMxedge bool
use mxedge(s) as RadSec Proxy
UseSiteMxedge bool
To use Site mxedges when this WLAN does not use mxtunnel
CoaEnabled bool
Enabled bool
IdleTimeout string
MxclusterIds []string
To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
ProxyHosts []string
Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. When radsec.proxy_hosts are not used, tunnel peers (org or site mxedges) are used irrespective of use_site_mxedge
ServerName string
Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
Servers []WlanRadsecServer
List of RadSec Servers. Only if not Mist Edge.
UseMxedge bool
use mxedge(s) as RadSec Proxy
UseSiteMxedge bool
To use Site mxedges when this WLAN does not use mxtunnel
coaEnabled Boolean
enabled Boolean
idleTimeout String
mxclusterIds List<String>
To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
proxyHosts List<String>
Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. When radsec.proxy_hosts are not used, tunnel peers (org or site mxedges) are used irrespective of use_site_mxedge
serverName String
Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
servers List<WlanRadsecServer>
List of RadSec Servers. Only if not Mist Edge.
useMxedge Boolean
use mxedge(s) as RadSec Proxy
useSiteMxedge Boolean
To use Site mxedges when this WLAN does not use mxtunnel
coaEnabled boolean
enabled boolean
idleTimeout string
mxclusterIds string[]
To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
proxyHosts string[]
Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. When radsec.proxy_hosts are not used, tunnel peers (org or site mxedges) are used irrespective of use_site_mxedge
serverName string
Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
servers WlanRadsecServer[]
List of RadSec Servers. Only if not Mist Edge.
useMxedge boolean
use mxedge(s) as RadSec Proxy
useSiteMxedge boolean
To use Site mxedges when this WLAN does not use mxtunnel
coa_enabled bool
enabled bool
idle_timeout str
mxcluster_ids Sequence[str]
To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
proxy_hosts Sequence[str]
Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. When radsec.proxy_hosts are not used, tunnel peers (org or site mxedges) are used irrespective of use_site_mxedge
server_name str
Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
servers Sequence[WlanRadsecServer]
List of RadSec Servers. Only if not Mist Edge.
use_mxedge bool
use mxedge(s) as RadSec Proxy
use_site_mxedge bool
To use Site mxedges when this WLAN does not use mxtunnel
coaEnabled Boolean
enabled Boolean
idleTimeout String
mxclusterIds List<String>
To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
proxyHosts List<String>
Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. When radsec.proxy_hosts are not used, tunnel peers (org or site mxedges) are used irrespective of use_site_mxedge
serverName String
Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
servers List<Property Map>
List of RadSec Servers. Only if not Mist Edge.
useMxedge Boolean
use mxedge(s) as RadSec Proxy
useSiteMxedge Boolean
To use Site mxedges when this WLAN does not use mxtunnel

WlanRadsecServer
, WlanRadsecServerArgs

Host string
Port int
Host string
Port int
host String
port Integer
host string
port number
host str
port int
host String
port Number

WlanRateset
, WlanRatesetArgs

Eht string
If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
He string
If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
Ht string
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
Legacies List<string>
if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. If template==custom is configured and legacy does not define at least one basic rate, it will use no-legacy default values. enum: 1, 11, 11b, 12, 12b, 18, 18b, 1b, 2, 24, 24b, 2b, 36, 36b, 48, 48b, 5.5, 5.5b, 54, 54b, 6, 6b, 9, 9b
MinRssi int
Minimum RSSI for client to connect, 0 means not enforcing
Template string
Data Rates template to apply. enum:

  • no-legacy: no 11b
  • compatible: all, like before, default setting that Broadcom/Atheros used
  • legacy-only: disable 802.11n and 802.11ac
  • high-density: no 11b, no low rates
  • custom: user defined
Vht string
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
Eht string
If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
He string
If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
Ht string
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
Legacies []string
if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. If template==custom is configured and legacy does not define at least one basic rate, it will use no-legacy default values. enum: 1, 11, 11b, 12, 12b, 18, 18b, 1b, 2, 24, 24b, 2b, 36, 36b, 48, 48b, 5.5, 5.5b, 54, 54b, 6, 6b, 9, 9b
MinRssi int
Minimum RSSI for client to connect, 0 means not enforcing
Template string
Data Rates template to apply. enum:

  • no-legacy: no 11b
  • compatible: all, like before, default setting that Broadcom/Atheros used
  • legacy-only: disable 802.11n and 802.11ac
  • high-density: no 11b, no low rates
  • custom: user defined
Vht string
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
eht String
If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
he String
If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
ht String
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
legacies List<String>
if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. If template==custom is configured and legacy does not define at least one basic rate, it will use no-legacy default values. enum: 1, 11, 11b, 12, 12b, 18, 18b, 1b, 2, 24, 24b, 2b, 36, 36b, 48, 48b, 5.5, 5.5b, 54, 54b, 6, 6b, 9, 9b
minRssi Integer
Minimum RSSI for client to connect, 0 means not enforcing
template String
Data Rates template to apply. enum:

  • no-legacy: no 11b
  • compatible: all, like before, default setting that Broadcom/Atheros used
  • legacy-only: disable 802.11n and 802.11ac
  • high-density: no 11b, no low rates
  • custom: user defined
vht String
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
eht string
If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
he string
If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
ht string
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
legacies string[]
if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. If template==custom is configured and legacy does not define at least one basic rate, it will use no-legacy default values. enum: 1, 11, 11b, 12, 12b, 18, 18b, 1b, 2, 24, 24b, 2b, 36, 36b, 48, 48b, 5.5, 5.5b, 54, 54b, 6, 6b, 9, 9b
minRssi number
Minimum RSSI for client to connect, 0 means not enforcing
template string
Data Rates template to apply. enum:

  • no-legacy: no 11b
  • compatible: all, like before, default setting that Broadcom/Atheros used
  • legacy-only: disable 802.11n and 802.11ac
  • high-density: no 11b, no low rates
  • custom: user defined
vht string
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
eht str
If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
he str
If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
ht str
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
legacies Sequence[str]
if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. If template==custom is configured and legacy does not define at least one basic rate, it will use no-legacy default values. enum: 1, 11, 11b, 12, 12b, 18, 18b, 1b, 2, 24, 24b, 2b, 36, 36b, 48, 48b, 5.5, 5.5b, 54, 54b, 6, 6b, 9, 9b
min_rssi int
Minimum RSSI for client to connect, 0 means not enforcing
template str
Data Rates template to apply. enum:

  • no-legacy: no 11b
  • compatible: all, like before, default setting that Broadcom/Atheros used
  • legacy-only: disable 802.11n and 802.11ac
  • high-density: no 11b, no low rates
  • custom: user defined
vht str
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
eht String
If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
he String
If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
ht String
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
legacies List<String>
if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. If template==custom is configured and legacy does not define at least one basic rate, it will use no-legacy default values. enum: 1, 11, 11b, 12, 12b, 18, 18b, 1b, 2, 24, 24b, 2b, 36, 36b, 48, 48b, 5.5, 5.5b, 54, 54b, 6, 6b, 9, 9b
minRssi Number
Minimum RSSI for client to connect, 0 means not enforcing
template String
Data Rates template to apply. enum:

  • no-legacy: no 11b
  • compatible: all, like before, default setting that Broadcom/Atheros used
  • legacy-only: disable 802.11n and 802.11ac
  • high-density: no 11b, no low rates
  • custom: user defined
vht String
If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.

WlanSchedule
, WlanScheduleArgs

Enabled bool
Hours Pulumi.JuniperMist.Site.Inputs.WlanScheduleHours
Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
Enabled bool
Hours WlanScheduleHours
Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
enabled Boolean
hours WlanScheduleHours
Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
enabled boolean
hours WlanScheduleHours
Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
enabled bool
hours WlanScheduleHours
Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
enabled Boolean
hours Property Map
Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)

WlanScheduleHours
, WlanScheduleHoursArgs

Fri string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Mon string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Sat string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Sun string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Thu string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Tue string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Wed string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Fri string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Mon string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Sat string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Sun string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Thu string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Tue string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Wed string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
fri String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
mon String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sat String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sun String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
thu String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
tue String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
wed String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
fri string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
mon string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sat string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sun string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
thu string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
tue string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
wed string
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
fri str
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
mon str
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sat str
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sun str
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
thu str
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
tue str
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
wed str
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
fri String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
mon String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sat String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
sun String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
thu String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
tue String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
wed String
Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.

Import

Using pulumi import, import mist_site_wlan with:

Site WLAN can be imported by specifying the site_id and the wlan_id

$ pulumi import junipermist:site/wlan:Wlan wlan_one 17b46405-3a6d-4715-8bb4-6bb6d06f316a.d3c42998-9012-4859-9743-6b9bee475309
Copy

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
junipermist pulumi/pulumi-junipermist
License
Apache-2.0
Notes
This Pulumi package is based on the mist Terraform Provider.