junipermist.site.Wlan
This resource manages the Site Wlans. The WLAN object contains all the required configuration to broadcast an SSID (Authentication, VLAN, …)
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as junipermist from "@pulumi/juniper-mist";
const wlanOne = new junipermist.site.Wlan("wlan_one", {
    ssid: "wlan_one",
    siteId: terraformTest.id,
    bands: [
        "5",
        "6",
    ],
    vlanEnabled: true,
    vlanId: "143",
    wlanLimitUp: "10000",
    wlanLimitDown: "20000",
    clientLimitUp: "512",
    clientLimitDown: "1000",
    auth: {
        type: "psk",
        psk: "secretpsk",
    },
    "interface": "all",
});
import pulumi
import pulumi_juniper_mist as junipermist
wlan_one = junipermist.site.Wlan("wlan_one",
    ssid="wlan_one",
    site_id=terraform_test["id"],
    bands=[
        "5",
        "6",
    ],
    vlan_enabled=True,
    vlan_id="143",
    wlan_limit_up="10000",
    wlan_limit_down="20000",
    client_limit_up="512",
    client_limit_down="1000",
    auth={
        "type": "psk",
        "psk": "secretpsk",
    },
    interface="all")
package main
import (
	"github.com/pulumi/pulumi-junipermist/sdk/go/junipermist/site"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := site.NewWlan(ctx, "wlan_one", &site.WlanArgs{
			Ssid:   pulumi.String("wlan_one"),
			SiteId: pulumi.Any(terraformTest.Id),
			Bands: pulumi.StringArray{
				pulumi.String("5"),
				pulumi.String("6"),
			},
			VlanEnabled:     pulumi.Bool(true),
			VlanId:          pulumi.String("143"),
			WlanLimitUp:     pulumi.String("10000"),
			WlanLimitDown:   pulumi.String("20000"),
			ClientLimitUp:   pulumi.String("512"),
			ClientLimitDown: pulumi.String("1000"),
			Auth: &site.WlanAuthArgs{
				Type: pulumi.String("psk"),
				Psk:  pulumi.String("secretpsk"),
			},
			Interface: pulumi.String("all"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using JuniperMist = Pulumi.JuniperMist;
return await Deployment.RunAsync(() => 
{
    var wlanOne = new JuniperMist.Site.Wlan("wlan_one", new()
    {
        Ssid = "wlan_one",
        SiteId = terraformTest.Id,
        Bands = new[]
        {
            "5",
            "6",
        },
        VlanEnabled = true,
        VlanId = "143",
        WlanLimitUp = "10000",
        WlanLimitDown = "20000",
        ClientLimitUp = "512",
        ClientLimitDown = "1000",
        Auth = new JuniperMist.Site.Inputs.WlanAuthArgs
        {
            Type = "psk",
            Psk = "secretpsk",
        },
        Interface = "all",
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.junipermist.site.Wlan;
import com.pulumi.junipermist.site.WlanArgs;
import com.pulumi.junipermist.site.inputs.WlanAuthArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var wlanOne = new Wlan("wlanOne", WlanArgs.builder()
            .ssid("wlan_one")
            .siteId(terraformTest.id())
            .bands(            
                "5",
                "6")
            .vlanEnabled(true)
            .vlanId("143")
            .wlanLimitUp("10000")
            .wlanLimitDown("20000")
            .clientLimitUp("512")
            .clientLimitDown("1000")
            .auth(WlanAuthArgs.builder()
                .type("psk")
                .psk("secretpsk")
                .build())
            .interface_("all")
            .build());
    }
}
resources:
  wlanOne:
    type: junipermist:site:Wlan
    name: wlan_one
    properties:
      ssid: wlan_one
      siteId: ${terraformTest.id}
      bands:
        - '5'
        - '6'
      vlanEnabled: true
      vlanId: 143
      wlanLimitUp: 10000
      wlanLimitDown: 20000
      clientLimitUp: 512
      clientLimitDown: 1000
      auth:
        type: psk
        psk: secretpsk
      interface: all
Create Wlan Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Wlan(name: string, args: WlanArgs, opts?: CustomResourceOptions);@overload
def Wlan(resource_name: str,
         args: WlanArgs,
         opts: Optional[ResourceOptions] = None)
@overload
def Wlan(resource_name: str,
         opts: Optional[ResourceOptions] = None,
         site_id: Optional[str] = None,
         ssid: Optional[str] = None,
         acct_immediate_update: Optional[bool] = None,
         acct_interim_interval: Optional[int] = None,
         acct_servers: Optional[Sequence[WlanAcctServerArgs]] = None,
         airwatch: Optional[WlanAirwatchArgs] = None,
         allow_ipv6_ndp: Optional[bool] = None,
         allow_mdns: Optional[bool] = None,
         allow_ssdp: Optional[bool] = None,
         ap_ids: Optional[Sequence[str]] = None,
         app_limit: Optional[WlanAppLimitArgs] = None,
         app_qos: Optional[WlanAppQosArgs] = None,
         apply_to: Optional[str] = None,
         arp_filter: Optional[bool] = None,
         auth: Optional[WlanAuthArgs] = None,
         auth_server_selection: Optional[str] = None,
         auth_servers: Optional[Sequence[WlanAuthServerArgs]] = None,
         auth_servers_nas_id: Optional[str] = None,
         auth_servers_nas_ip: Optional[str] = None,
         auth_servers_retries: Optional[int] = None,
         auth_servers_timeout: Optional[int] = None,
         band_steer: Optional[bool] = None,
         band_steer_force_band5: Optional[bool] = None,
         bands: Optional[Sequence[str]] = None,
         block_blacklist_clients: Optional[bool] = None,
         bonjour: Optional[WlanBonjourArgs] = None,
         cisco_cwa: Optional[WlanCiscoCwaArgs] = None,
         client_limit_down: Optional[str] = None,
         client_limit_down_enabled: Optional[bool] = None,
         client_limit_up: Optional[str] = None,
         client_limit_up_enabled: Optional[bool] = None,
         coa_servers: Optional[Sequence[WlanCoaServerArgs]] = None,
         disable11ax: Optional[bool] = None,
         disable11be: Optional[bool] = None,
         disable_ht_vht_rates: Optional[bool] = None,
         disable_uapsd: Optional[bool] = None,
         disable_v1_roam_notify: Optional[bool] = None,
         disable_v2_roam_notify: Optional[bool] = None,
         disable_when_gateway_unreachable: Optional[bool] = None,
         disable_when_mxtunnel_down: Optional[bool] = None,
         disable_wmm: Optional[bool] = None,
         dns_server_rewrite: Optional[WlanDnsServerRewriteArgs] = None,
         dtim: Optional[int] = None,
         dynamic_psk: Optional[WlanDynamicPskArgs] = None,
         dynamic_vlan: Optional[WlanDynamicVlanArgs] = None,
         enable_local_keycaching: Optional[bool] = None,
         enable_wireless_bridging: Optional[bool] = None,
         enable_wireless_bridging_dhcp_tracking: Optional[bool] = None,
         enabled: Optional[bool] = None,
         fast_dot1x_timers: Optional[bool] = None,
         hide_ssid: Optional[bool] = None,
         hostname_ie: Optional[bool] = None,
         hotspot20: Optional[WlanHotspot20Args] = None,
         inject_dhcp_option82: Optional[WlanInjectDhcpOption82Args] = None,
         interface: Optional[str] = None,
         isolation: Optional[bool] = None,
         l2_isolation: Optional[bool] = None,
         legacy_overds: Optional[bool] = None,
         limit_bcast: Optional[bool] = None,
         limit_probe_response: Optional[bool] = None,
         max_idletime: Optional[int] = None,
         max_num_clients: Optional[int] = None,
         mist_nac: Optional[WlanMistNacArgs] = None,
         mxtunnel_ids: Optional[Sequence[str]] = None,
         mxtunnel_names: Optional[Sequence[str]] = None,
         no_static_dns: Optional[bool] = None,
         no_static_ip: Optional[bool] = None,
         portal: Optional[WlanPortalArgs] = None,
         portal_allowed_hostnames: Optional[Sequence[str]] = None,
         portal_allowed_subnets: Optional[Sequence[str]] = None,
         portal_denied_hostnames: Optional[Sequence[str]] = None,
         qos: Optional[WlanQosArgs] = None,
         radsec: Optional[WlanRadsecArgs] = None,
         rateset: Optional[Mapping[str, WlanRatesetArgs]] = None,
         reconnect_clients_when_roaming_mxcluster: Optional[bool] = None,
         roam_mode: Optional[str] = None,
         schedule: Optional[WlanScheduleArgs] = None,
         sle_excluded: Optional[bool] = None,
         use_eapol_v1: Optional[bool] = None,
         vlan_enabled: Optional[bool] = None,
         vlan_id: Optional[str] = None,
         vlan_ids: Optional[Sequence[str]] = None,
         vlan_pooling: Optional[bool] = None,
         wlan_limit_down: Optional[str] = None,
         wlan_limit_down_enabled: Optional[bool] = None,
         wlan_limit_up: Optional[str] = None,
         wlan_limit_up_enabled: Optional[bool] = None,
         wxtag_ids: Optional[Sequence[str]] = None,
         wxtunnel_id: Optional[str] = None,
         wxtunnel_remote_id: Optional[str] = None)func NewWlan(ctx *Context, name string, args WlanArgs, opts ...ResourceOption) (*Wlan, error)public Wlan(string name, WlanArgs args, CustomResourceOptions? opts = null)type: junipermist:site:Wlan
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args WlanArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args WlanArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args WlanArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args WlanArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args WlanArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var junipermistWlanResource = new JuniperMist.Site.Wlan("junipermistWlanResource", new()
{
    SiteId = "string",
    Ssid = "string",
    AcctImmediateUpdate = false,
    AcctInterimInterval = 0,
    AcctServers = new[]
    {
        new JuniperMist.Site.Inputs.WlanAcctServerArgs
        {
            Host = "string",
            Secret = "string",
            KeywrapEnabled = false,
            KeywrapFormat = "string",
            KeywrapKek = "string",
            KeywrapMack = "string",
            Port = "string",
        },
    },
    Airwatch = new JuniperMist.Site.Inputs.WlanAirwatchArgs
    {
        ApiKey = "string",
        ConsoleUrl = "string",
        Enabled = false,
        Password = "string",
        Username = "string",
    },
    AllowIpv6Ndp = false,
    AllowMdns = false,
    AllowSsdp = false,
    ApIds = new[]
    {
        "string",
    },
    AppLimit = new JuniperMist.Site.Inputs.WlanAppLimitArgs
    {
        Apps = 
        {
            { "string", 0 },
        },
        Enabled = false,
        WxtagIds = 
        {
            { "string", 0 },
        },
    },
    AppQos = new JuniperMist.Site.Inputs.WlanAppQosArgs
    {
        Apps = 
        {
            { "string", new JuniperMist.Site.Inputs.WlanAppQosAppsArgs
            {
                Dscp = "string",
                DstSubnet = "string",
                SrcSubnet = "string",
            } },
        },
        Enabled = false,
        Others = new[]
        {
            new JuniperMist.Site.Inputs.WlanAppQosOtherArgs
            {
                Dscp = "string",
                DstSubnet = "string",
                PortRanges = "string",
                Protocol = "string",
                SrcSubnet = "string",
            },
        },
    },
    ApplyTo = "string",
    ArpFilter = false,
    Auth = new JuniperMist.Site.Inputs.WlanAuthArgs
    {
        AnticlogThreshold = 0,
        EapReauth = false,
        EnableMacAuth = false,
        KeyIdx = 0,
        Keys = new[]
        {
            "string",
        },
        MultiPskOnly = false,
        Owe = "string",
        Pairwises = new[]
        {
            "string",
        },
        PrivateWlan = false,
        Psk = "string",
        Type = "string",
        WepAsSecondaryAuth = false,
    },
    AuthServerSelection = "string",
    AuthServers = new[]
    {
        new JuniperMist.Site.Inputs.WlanAuthServerArgs
        {
            Host = "string",
            Secret = "string",
            KeywrapEnabled = false,
            KeywrapFormat = "string",
            KeywrapKek = "string",
            KeywrapMack = "string",
            Port = "string",
            RequireMessageAuthenticator = false,
        },
    },
    AuthServersNasId = "string",
    AuthServersNasIp = "string",
    AuthServersRetries = 0,
    AuthServersTimeout = 0,
    BandSteer = false,
    BandSteerForceBand5 = false,
    Bands = new[]
    {
        "string",
    },
    BlockBlacklistClients = false,
    Bonjour = new JuniperMist.Site.Inputs.WlanBonjourArgs
    {
        AdditionalVlanIds = new[]
        {
            "string",
        },
        Enabled = false,
        Services = 
        {
            { "string", new JuniperMist.Site.Inputs.WlanBonjourServicesArgs
            {
                DisableLocal = false,
                RadiusGroups = new[]
                {
                    "string",
                },
                Scope = "string",
            } },
        },
    },
    CiscoCwa = new JuniperMist.Site.Inputs.WlanCiscoCwaArgs
    {
        AllowedHostnames = new[]
        {
            "string",
        },
        AllowedSubnets = new[]
        {
            "string",
        },
        BlockedSubnets = new[]
        {
            "string",
        },
        Enabled = false,
    },
    ClientLimitDown = "string",
    ClientLimitDownEnabled = false,
    ClientLimitUp = "string",
    ClientLimitUpEnabled = false,
    CoaServers = new[]
    {
        new JuniperMist.Site.Inputs.WlanCoaServerArgs
        {
            Ip = "string",
            Secret = "string",
            DisableEventTimestampCheck = false,
            Enabled = false,
            Port = "string",
        },
    },
    Disable11ax = false,
    Disable11be = false,
    DisableHtVhtRates = false,
    DisableUapsd = false,
    DisableV1RoamNotify = false,
    DisableV2RoamNotify = false,
    DisableWhenGatewayUnreachable = false,
    DisableWhenMxtunnelDown = false,
    DisableWmm = false,
    DnsServerRewrite = new JuniperMist.Site.Inputs.WlanDnsServerRewriteArgs
    {
        Enabled = false,
        RadiusGroups = 
        {
            { "string", "string" },
        },
    },
    Dtim = 0,
    DynamicPsk = new JuniperMist.Site.Inputs.WlanDynamicPskArgs
    {
        DefaultPsk = "string",
        DefaultVlanId = "string",
        Enabled = false,
        ForceLookup = false,
        Source = "string",
    },
    DynamicVlan = new JuniperMist.Site.Inputs.WlanDynamicVlanArgs
    {
        DefaultVlanIds = new[]
        {
            "string",
        },
        Enabled = false,
        LocalVlanIds = new[]
        {
            "string",
        },
        Type = "string",
        Vlans = 
        {
            { "string", "string" },
        },
    },
    EnableLocalKeycaching = false,
    EnableWirelessBridging = false,
    EnableWirelessBridgingDhcpTracking = false,
    Enabled = false,
    FastDot1xTimers = false,
    HideSsid = false,
    HostnameIe = false,
    Hotspot20 = new JuniperMist.Site.Inputs.WlanHotspot20Args
    {
        DomainNames = new[]
        {
            "string",
        },
        Enabled = false,
        NaiRealms = new[]
        {
            "string",
        },
        Operators = new[]
        {
            "string",
        },
        Rcois = new[]
        {
            "string",
        },
        VenueName = "string",
    },
    InjectDhcpOption82 = new JuniperMist.Site.Inputs.WlanInjectDhcpOption82Args
    {
        CircuitId = "string",
        Enabled = false,
    },
    Interface = "string",
    Isolation = false,
    L2Isolation = false,
    LegacyOverds = false,
    LimitBcast = false,
    LimitProbeResponse = false,
    MaxIdletime = 0,
    MaxNumClients = 0,
    MistNac = new JuniperMist.Site.Inputs.WlanMistNacArgs
    {
        AcctInterimInterval = 0,
        AuthServersRetries = 0,
        AuthServersTimeout = 0,
        CoaEnabled = false,
        CoaPort = 0,
        Enabled = false,
        FastDot1xTimers = false,
        Network = "string",
        SourceIp = "string",
    },
    MxtunnelIds = new[]
    {
        "string",
    },
    MxtunnelNames = new[]
    {
        "string",
    },
    NoStaticDns = false,
    NoStaticIp = false,
    Portal = new JuniperMist.Site.Inputs.WlanPortalArgs
    {
        AllowWlanIdRoam = false,
        AmazonClientId = "string",
        AmazonClientSecret = "string",
        AmazonEmailDomains = new[]
        {
            "string",
        },
        AmazonEnabled = false,
        AmazonExpire = 0,
        Auth = "string",
        AzureClientId = "string",
        AzureClientSecret = "string",
        AzureEnabled = false,
        AzureExpire = 0,
        AzureTenantId = "string",
        BroadnetPassword = "string",
        BroadnetSid = "string",
        BroadnetUserId = "string",
        BypassWhenCloudDown = false,
        ClickatellApiKey = "string",
        CrossSite = false,
        EmailEnabled = false,
        Enabled = false,
        Expire = 0,
        ExternalPortalUrl = "string",
        FacebookClientId = "string",
        FacebookClientSecret = "string",
        FacebookEmailDomains = new[]
        {
            "string",
        },
        FacebookEnabled = false,
        FacebookExpire = 0,
        Forward = false,
        ForwardUrl = "string",
        GoogleClientId = "string",
        GoogleClientSecret = "string",
        GoogleEmailDomains = new[]
        {
            "string",
        },
        GoogleEnabled = false,
        GoogleExpire = 0,
        GupshupPassword = "string",
        GupshupUserid = "string",
        MicrosoftClientId = "string",
        MicrosoftClientSecret = "string",
        MicrosoftEmailDomains = new[]
        {
            "string",
        },
        MicrosoftEnabled = false,
        MicrosoftExpire = 0,
        PassphraseEnabled = false,
        PassphraseExpire = 0,
        Password = "string",
        PredefinedSponsorsEnabled = false,
        PredefinedSponsorsHideEmail = false,
        Privacy = false,
        PuzzelPassword = "string",
        PuzzelServiceId = "string",
        PuzzelUsername = "string",
        SmsEnabled = false,
        SmsExpire = 0,
        SmsMessageFormat = "string",
        SmsProvider = "string",
        SmsglobalApiKey = "string",
        SmsglobalApiSecret = "string",
        SponsorAutoApprove = false,
        SponsorEmailDomains = new[]
        {
            "string",
        },
        SponsorEnabled = false,
        SponsorExpire = 0,
        SponsorLinkValidityDuration = "string",
        SponsorNotifyAll = false,
        SponsorStatusNotify = false,
        Sponsors = 
        {
            { "string", "string" },
        },
        SsoDefaultRole = "string",
        SsoForcedRole = "string",
        SsoIdpCert = "string",
        SsoIdpSignAlgo = "string",
        SsoIdpSsoUrl = "string",
        SsoIssuer = "string",
        SsoNameidFormat = "string",
        TelstraClientId = "string",
        TelstraClientSecret = "string",
        TwilioAuthToken = "string",
        TwilioPhoneNumber = "string",
        TwilioSid = "string",
    },
    PortalAllowedHostnames = new[]
    {
        "string",
    },
    PortalAllowedSubnets = new[]
    {
        "string",
    },
    PortalDeniedHostnames = new[]
    {
        "string",
    },
    Qos = new JuniperMist.Site.Inputs.WlanQosArgs
    {
        Class = "string",
        Overwrite = false,
    },
    Radsec = new JuniperMist.Site.Inputs.WlanRadsecArgs
    {
        CoaEnabled = false,
        Enabled = false,
        IdleTimeout = "string",
        MxclusterIds = new[]
        {
            "string",
        },
        ProxyHosts = new[]
        {
            "string",
        },
        ServerName = "string",
        Servers = new[]
        {
            new JuniperMist.Site.Inputs.WlanRadsecServerArgs
            {
                Host = "string",
                Port = 0,
            },
        },
        UseMxedge = false,
        UseSiteMxedge = false,
    },
    Rateset = 
    {
        { "string", new JuniperMist.Site.Inputs.WlanRatesetArgs
        {
            Eht = "string",
            He = "string",
            Ht = "string",
            Legacies = new[]
            {
                "string",
            },
            MinRssi = 0,
            Template = "string",
            Vht = "string",
        } },
    },
    ReconnectClientsWhenRoamingMxcluster = false,
    RoamMode = "string",
    Schedule = new JuniperMist.Site.Inputs.WlanScheduleArgs
    {
        Enabled = false,
        Hours = new JuniperMist.Site.Inputs.WlanScheduleHoursArgs
        {
            Fri = "string",
            Mon = "string",
            Sat = "string",
            Sun = "string",
            Thu = "string",
            Tue = "string",
            Wed = "string",
        },
    },
    SleExcluded = false,
    UseEapolV1 = false,
    VlanEnabled = false,
    VlanId = "string",
    VlanIds = new[]
    {
        "string",
    },
    VlanPooling = false,
    WlanLimitDown = "string",
    WlanLimitDownEnabled = false,
    WlanLimitUp = "string",
    WlanLimitUpEnabled = false,
    WxtagIds = new[]
    {
        "string",
    },
    WxtunnelId = "string",
    WxtunnelRemoteId = "string",
});
example, err := site.NewWlan(ctx, "junipermistWlanResource", &site.WlanArgs{
	SiteId:              pulumi.String("string"),
	Ssid:                pulumi.String("string"),
	AcctImmediateUpdate: pulumi.Bool(false),
	AcctInterimInterval: pulumi.Int(0),
	AcctServers: site.WlanAcctServerArray{
		&site.WlanAcctServerArgs{
			Host:           pulumi.String("string"),
			Secret:         pulumi.String("string"),
			KeywrapEnabled: pulumi.Bool(false),
			KeywrapFormat:  pulumi.String("string"),
			KeywrapKek:     pulumi.String("string"),
			KeywrapMack:    pulumi.String("string"),
			Port:           pulumi.String("string"),
		},
	},
	Airwatch: &site.WlanAirwatchArgs{
		ApiKey:     pulumi.String("string"),
		ConsoleUrl: pulumi.String("string"),
		Enabled:    pulumi.Bool(false),
		Password:   pulumi.String("string"),
		Username:   pulumi.String("string"),
	},
	AllowIpv6Ndp: pulumi.Bool(false),
	AllowMdns:    pulumi.Bool(false),
	AllowSsdp:    pulumi.Bool(false),
	ApIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	AppLimit: &site.WlanAppLimitArgs{
		Apps: pulumi.IntMap{
			"string": pulumi.Int(0),
		},
		Enabled: pulumi.Bool(false),
		WxtagIds: pulumi.IntMap{
			"string": pulumi.Int(0),
		},
	},
	AppQos: &site.WlanAppQosArgs{
		Apps: site.WlanAppQosAppsMap{
			"string": &site.WlanAppQosAppsArgs{
				Dscp:      pulumi.String("string"),
				DstSubnet: pulumi.String("string"),
				SrcSubnet: pulumi.String("string"),
			},
		},
		Enabled: pulumi.Bool(false),
		Others: site.WlanAppQosOtherArray{
			&site.WlanAppQosOtherArgs{
				Dscp:       pulumi.String("string"),
				DstSubnet:  pulumi.String("string"),
				PortRanges: pulumi.String("string"),
				Protocol:   pulumi.String("string"),
				SrcSubnet:  pulumi.String("string"),
			},
		},
	},
	ApplyTo:   pulumi.String("string"),
	ArpFilter: pulumi.Bool(false),
	Auth: &site.WlanAuthArgs{
		AnticlogThreshold: pulumi.Int(0),
		EapReauth:         pulumi.Bool(false),
		EnableMacAuth:     pulumi.Bool(false),
		KeyIdx:            pulumi.Int(0),
		Keys: pulumi.StringArray{
			pulumi.String("string"),
		},
		MultiPskOnly: pulumi.Bool(false),
		Owe:          pulumi.String("string"),
		Pairwises: pulumi.StringArray{
			pulumi.String("string"),
		},
		PrivateWlan:        pulumi.Bool(false),
		Psk:                pulumi.String("string"),
		Type:               pulumi.String("string"),
		WepAsSecondaryAuth: pulumi.Bool(false),
	},
	AuthServerSelection: pulumi.String("string"),
	AuthServers: site.WlanAuthServerArray{
		&site.WlanAuthServerArgs{
			Host:                        pulumi.String("string"),
			Secret:                      pulumi.String("string"),
			KeywrapEnabled:              pulumi.Bool(false),
			KeywrapFormat:               pulumi.String("string"),
			KeywrapKek:                  pulumi.String("string"),
			KeywrapMack:                 pulumi.String("string"),
			Port:                        pulumi.String("string"),
			RequireMessageAuthenticator: pulumi.Bool(false),
		},
	},
	AuthServersNasId:    pulumi.String("string"),
	AuthServersNasIp:    pulumi.String("string"),
	AuthServersRetries:  pulumi.Int(0),
	AuthServersTimeout:  pulumi.Int(0),
	BandSteer:           pulumi.Bool(false),
	BandSteerForceBand5: pulumi.Bool(false),
	Bands: pulumi.StringArray{
		pulumi.String("string"),
	},
	BlockBlacklistClients: pulumi.Bool(false),
	Bonjour: &site.WlanBonjourArgs{
		AdditionalVlanIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		Services: site.WlanBonjourServicesMap{
			"string": &site.WlanBonjourServicesArgs{
				DisableLocal: pulumi.Bool(false),
				RadiusGroups: pulumi.StringArray{
					pulumi.String("string"),
				},
				Scope: pulumi.String("string"),
			},
		},
	},
	CiscoCwa: &site.WlanCiscoCwaArgs{
		AllowedHostnames: pulumi.StringArray{
			pulumi.String("string"),
		},
		AllowedSubnets: pulumi.StringArray{
			pulumi.String("string"),
		},
		BlockedSubnets: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
	},
	ClientLimitDown:        pulumi.String("string"),
	ClientLimitDownEnabled: pulumi.Bool(false),
	ClientLimitUp:          pulumi.String("string"),
	ClientLimitUpEnabled:   pulumi.Bool(false),
	CoaServers: site.WlanCoaServerArray{
		&site.WlanCoaServerArgs{
			Ip:                         pulumi.String("string"),
			Secret:                     pulumi.String("string"),
			DisableEventTimestampCheck: pulumi.Bool(false),
			Enabled:                    pulumi.Bool(false),
			Port:                       pulumi.String("string"),
		},
	},
	Disable11ax:                   pulumi.Bool(false),
	Disable11be:                   pulumi.Bool(false),
	DisableHtVhtRates:             pulumi.Bool(false),
	DisableUapsd:                  pulumi.Bool(false),
	DisableV1RoamNotify:           pulumi.Bool(false),
	DisableV2RoamNotify:           pulumi.Bool(false),
	DisableWhenGatewayUnreachable: pulumi.Bool(false),
	DisableWhenMxtunnelDown:       pulumi.Bool(false),
	DisableWmm:                    pulumi.Bool(false),
	DnsServerRewrite: &site.WlanDnsServerRewriteArgs{
		Enabled: pulumi.Bool(false),
		RadiusGroups: pulumi.StringMap{
			"string": pulumi.String("string"),
		},
	},
	Dtim: pulumi.Int(0),
	DynamicPsk: &site.WlanDynamicPskArgs{
		DefaultPsk:    pulumi.String("string"),
		DefaultVlanId: pulumi.String("string"),
		Enabled:       pulumi.Bool(false),
		ForceLookup:   pulumi.Bool(false),
		Source:        pulumi.String("string"),
	},
	DynamicVlan: &site.WlanDynamicVlanArgs{
		DefaultVlanIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		LocalVlanIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		Type: pulumi.String("string"),
		Vlans: pulumi.StringMap{
			"string": pulumi.String("string"),
		},
	},
	EnableLocalKeycaching:              pulumi.Bool(false),
	EnableWirelessBridging:             pulumi.Bool(false),
	EnableWirelessBridgingDhcpTracking: pulumi.Bool(false),
	Enabled:                            pulumi.Bool(false),
	FastDot1xTimers:                    pulumi.Bool(false),
	HideSsid:                           pulumi.Bool(false),
	HostnameIe:                         pulumi.Bool(false),
	Hotspot20: &site.WlanHotspot20Args{
		DomainNames: pulumi.StringArray{
			pulumi.String("string"),
		},
		Enabled: pulumi.Bool(false),
		NaiRealms: pulumi.StringArray{
			pulumi.String("string"),
		},
		Operators: pulumi.StringArray{
			pulumi.String("string"),
		},
		Rcois: pulumi.StringArray{
			pulumi.String("string"),
		},
		VenueName: pulumi.String("string"),
	},
	InjectDhcpOption82: &site.WlanInjectDhcpOption82Args{
		CircuitId: pulumi.String("string"),
		Enabled:   pulumi.Bool(false),
	},
	Interface:          pulumi.String("string"),
	Isolation:          pulumi.Bool(false),
	L2Isolation:        pulumi.Bool(false),
	LegacyOverds:       pulumi.Bool(false),
	LimitBcast:         pulumi.Bool(false),
	LimitProbeResponse: pulumi.Bool(false),
	MaxIdletime:        pulumi.Int(0),
	MaxNumClients:      pulumi.Int(0),
	MistNac: &site.WlanMistNacArgs{
		AcctInterimInterval: pulumi.Int(0),
		AuthServersRetries:  pulumi.Int(0),
		AuthServersTimeout:  pulumi.Int(0),
		CoaEnabled:          pulumi.Bool(false),
		CoaPort:             pulumi.Int(0),
		Enabled:             pulumi.Bool(false),
		FastDot1xTimers:     pulumi.Bool(false),
		Network:             pulumi.String("string"),
		SourceIp:            pulumi.String("string"),
	},
	MxtunnelIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	MxtunnelNames: pulumi.StringArray{
		pulumi.String("string"),
	},
	NoStaticDns: pulumi.Bool(false),
	NoStaticIp:  pulumi.Bool(false),
	Portal: &site.WlanPortalArgs{
		AllowWlanIdRoam:    pulumi.Bool(false),
		AmazonClientId:     pulumi.String("string"),
		AmazonClientSecret: pulumi.String("string"),
		AmazonEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		AmazonEnabled:        pulumi.Bool(false),
		AmazonExpire:         pulumi.Int(0),
		Auth:                 pulumi.String("string"),
		AzureClientId:        pulumi.String("string"),
		AzureClientSecret:    pulumi.String("string"),
		AzureEnabled:         pulumi.Bool(false),
		AzureExpire:          pulumi.Int(0),
		AzureTenantId:        pulumi.String("string"),
		BroadnetPassword:     pulumi.String("string"),
		BroadnetSid:          pulumi.String("string"),
		BroadnetUserId:       pulumi.String("string"),
		BypassWhenCloudDown:  pulumi.Bool(false),
		ClickatellApiKey:     pulumi.String("string"),
		CrossSite:            pulumi.Bool(false),
		EmailEnabled:         pulumi.Bool(false),
		Enabled:              pulumi.Bool(false),
		Expire:               pulumi.Int(0),
		ExternalPortalUrl:    pulumi.String("string"),
		FacebookClientId:     pulumi.String("string"),
		FacebookClientSecret: pulumi.String("string"),
		FacebookEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		FacebookEnabled:    pulumi.Bool(false),
		FacebookExpire:     pulumi.Int(0),
		Forward:            pulumi.Bool(false),
		ForwardUrl:         pulumi.String("string"),
		GoogleClientId:     pulumi.String("string"),
		GoogleClientSecret: pulumi.String("string"),
		GoogleEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		GoogleEnabled:         pulumi.Bool(false),
		GoogleExpire:          pulumi.Int(0),
		GupshupPassword:       pulumi.String("string"),
		GupshupUserid:         pulumi.String("string"),
		MicrosoftClientId:     pulumi.String("string"),
		MicrosoftClientSecret: pulumi.String("string"),
		MicrosoftEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		MicrosoftEnabled:            pulumi.Bool(false),
		MicrosoftExpire:             pulumi.Int(0),
		PassphraseEnabled:           pulumi.Bool(false),
		PassphraseExpire:            pulumi.Int(0),
		Password:                    pulumi.String("string"),
		PredefinedSponsorsEnabled:   pulumi.Bool(false),
		PredefinedSponsorsHideEmail: pulumi.Bool(false),
		Privacy:                     pulumi.Bool(false),
		PuzzelPassword:              pulumi.String("string"),
		PuzzelServiceId:             pulumi.String("string"),
		PuzzelUsername:              pulumi.String("string"),
		SmsEnabled:                  pulumi.Bool(false),
		SmsExpire:                   pulumi.Int(0),
		SmsMessageFormat:            pulumi.String("string"),
		SmsProvider:                 pulumi.String("string"),
		SmsglobalApiKey:             pulumi.String("string"),
		SmsglobalApiSecret:          pulumi.String("string"),
		SponsorAutoApprove:          pulumi.Bool(false),
		SponsorEmailDomains: pulumi.StringArray{
			pulumi.String("string"),
		},
		SponsorEnabled:              pulumi.Bool(false),
		SponsorExpire:               pulumi.Int(0),
		SponsorLinkValidityDuration: pulumi.String("string"),
		SponsorNotifyAll:            pulumi.Bool(false),
		SponsorStatusNotify:         pulumi.Bool(false),
		Sponsors: pulumi.StringMap{
			"string": pulumi.String("string"),
		},
		SsoDefaultRole:      pulumi.String("string"),
		SsoForcedRole:       pulumi.String("string"),
		SsoIdpCert:          pulumi.String("string"),
		SsoIdpSignAlgo:      pulumi.String("string"),
		SsoIdpSsoUrl:        pulumi.String("string"),
		SsoIssuer:           pulumi.String("string"),
		SsoNameidFormat:     pulumi.String("string"),
		TelstraClientId:     pulumi.String("string"),
		TelstraClientSecret: pulumi.String("string"),
		TwilioAuthToken:     pulumi.String("string"),
		TwilioPhoneNumber:   pulumi.String("string"),
		TwilioSid:           pulumi.String("string"),
	},
	PortalAllowedHostnames: pulumi.StringArray{
		pulumi.String("string"),
	},
	PortalAllowedSubnets: pulumi.StringArray{
		pulumi.String("string"),
	},
	PortalDeniedHostnames: pulumi.StringArray{
		pulumi.String("string"),
	},
	Qos: &site.WlanQosArgs{
		Class:     pulumi.String("string"),
		Overwrite: pulumi.Bool(false),
	},
	Radsec: &site.WlanRadsecArgs{
		CoaEnabled:  pulumi.Bool(false),
		Enabled:     pulumi.Bool(false),
		IdleTimeout: pulumi.String("string"),
		MxclusterIds: pulumi.StringArray{
			pulumi.String("string"),
		},
		ProxyHosts: pulumi.StringArray{
			pulumi.String("string"),
		},
		ServerName: pulumi.String("string"),
		Servers: site.WlanRadsecServerArray{
			&site.WlanRadsecServerArgs{
				Host: pulumi.String("string"),
				Port: pulumi.Int(0),
			},
		},
		UseMxedge:     pulumi.Bool(false),
		UseSiteMxedge: pulumi.Bool(false),
	},
	Rateset: site.WlanRatesetMap{
		"string": &site.WlanRatesetArgs{
			Eht: pulumi.String("string"),
			He:  pulumi.String("string"),
			Ht:  pulumi.String("string"),
			Legacies: pulumi.StringArray{
				pulumi.String("string"),
			},
			MinRssi:  pulumi.Int(0),
			Template: pulumi.String("string"),
			Vht:      pulumi.String("string"),
		},
	},
	ReconnectClientsWhenRoamingMxcluster: pulumi.Bool(false),
	RoamMode:                             pulumi.String("string"),
	Schedule: &site.WlanScheduleArgs{
		Enabled: pulumi.Bool(false),
		Hours: &site.WlanScheduleHoursArgs{
			Fri: pulumi.String("string"),
			Mon: pulumi.String("string"),
			Sat: pulumi.String("string"),
			Sun: pulumi.String("string"),
			Thu: pulumi.String("string"),
			Tue: pulumi.String("string"),
			Wed: pulumi.String("string"),
		},
	},
	SleExcluded: pulumi.Bool(false),
	UseEapolV1:  pulumi.Bool(false),
	VlanEnabled: pulumi.Bool(false),
	VlanId:      pulumi.String("string"),
	VlanIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	VlanPooling:          pulumi.Bool(false),
	WlanLimitDown:        pulumi.String("string"),
	WlanLimitDownEnabled: pulumi.Bool(false),
	WlanLimitUp:          pulumi.String("string"),
	WlanLimitUpEnabled:   pulumi.Bool(false),
	WxtagIds: pulumi.StringArray{
		pulumi.String("string"),
	},
	WxtunnelId:       pulumi.String("string"),
	WxtunnelRemoteId: pulumi.String("string"),
})
var junipermistWlanResource = new com.pulumi.junipermist.site.Wlan("junipermistWlanResource", com.pulumi.junipermist.site.WlanArgs.builder()
    .siteId("string")
    .ssid("string")
    .acctImmediateUpdate(false)
    .acctInterimInterval(0)
    .acctServers(WlanAcctServerArgs.builder()
        .host("string")
        .secret("string")
        .keywrapEnabled(false)
        .keywrapFormat("string")
        .keywrapKek("string")
        .keywrapMack("string")
        .port("string")
        .build())
    .airwatch(WlanAirwatchArgs.builder()
        .apiKey("string")
        .consoleUrl("string")
        .enabled(false)
        .password("string")
        .username("string")
        .build())
    .allowIpv6Ndp(false)
    .allowMdns(false)
    .allowSsdp(false)
    .apIds("string")
    .appLimit(WlanAppLimitArgs.builder()
        .apps(Map.of("string", 0))
        .enabled(false)
        .wxtagIds(Map.of("string", 0))
        .build())
    .appQos(WlanAppQosArgs.builder()
        .apps(Map.of("string", WlanAppQosAppsArgs.builder()
            .dscp("string")
            .dstSubnet("string")
            .srcSubnet("string")
            .build()))
        .enabled(false)
        .others(WlanAppQosOtherArgs.builder()
            .dscp("string")
            .dstSubnet("string")
            .portRanges("string")
            .protocol("string")
            .srcSubnet("string")
            .build())
        .build())
    .applyTo("string")
    .arpFilter(false)
    .auth(WlanAuthArgs.builder()
        .anticlogThreshold(0)
        .eapReauth(false)
        .enableMacAuth(false)
        .keyIdx(0)
        .keys("string")
        .multiPskOnly(false)
        .owe("string")
        .pairwises("string")
        .privateWlan(false)
        .psk("string")
        .type("string")
        .wepAsSecondaryAuth(false)
        .build())
    .authServerSelection("string")
    .authServers(WlanAuthServerArgs.builder()
        .host("string")
        .secret("string")
        .keywrapEnabled(false)
        .keywrapFormat("string")
        .keywrapKek("string")
        .keywrapMack("string")
        .port("string")
        .requireMessageAuthenticator(false)
        .build())
    .authServersNasId("string")
    .authServersNasIp("string")
    .authServersRetries(0)
    .authServersTimeout(0)
    .bandSteer(false)
    .bandSteerForceBand5(false)
    .bands("string")
    .blockBlacklistClients(false)
    .bonjour(WlanBonjourArgs.builder()
        .additionalVlanIds("string")
        .enabled(false)
        .services(Map.of("string", WlanBonjourServicesArgs.builder()
            .disableLocal(false)
            .radiusGroups("string")
            .scope("string")
            .build()))
        .build())
    .ciscoCwa(WlanCiscoCwaArgs.builder()
        .allowedHostnames("string")
        .allowedSubnets("string")
        .blockedSubnets("string")
        .enabled(false)
        .build())
    .clientLimitDown("string")
    .clientLimitDownEnabled(false)
    .clientLimitUp("string")
    .clientLimitUpEnabled(false)
    .coaServers(WlanCoaServerArgs.builder()
        .ip("string")
        .secret("string")
        .disableEventTimestampCheck(false)
        .enabled(false)
        .port("string")
        .build())
    .disable11ax(false)
    .disable11be(false)
    .disableHtVhtRates(false)
    .disableUapsd(false)
    .disableV1RoamNotify(false)
    .disableV2RoamNotify(false)
    .disableWhenGatewayUnreachable(false)
    .disableWhenMxtunnelDown(false)
    .disableWmm(false)
    .dnsServerRewrite(WlanDnsServerRewriteArgs.builder()
        .enabled(false)
        .radiusGroups(Map.of("string", "string"))
        .build())
    .dtim(0)
    .dynamicPsk(WlanDynamicPskArgs.builder()
        .defaultPsk("string")
        .defaultVlanId("string")
        .enabled(false)
        .forceLookup(false)
        .source("string")
        .build())
    .dynamicVlan(WlanDynamicVlanArgs.builder()
        .defaultVlanIds("string")
        .enabled(false)
        .localVlanIds("string")
        .type("string")
        .vlans(Map.of("string", "string"))
        .build())
    .enableLocalKeycaching(false)
    .enableWirelessBridging(false)
    .enableWirelessBridgingDhcpTracking(false)
    .enabled(false)
    .fastDot1xTimers(false)
    .hideSsid(false)
    .hostnameIe(false)
    .hotspot20(WlanHotspot20Args.builder()
        .domainNames("string")
        .enabled(false)
        .naiRealms("string")
        .operators("string")
        .rcois("string")
        .venueName("string")
        .build())
    .injectDhcpOption82(WlanInjectDhcpOption82Args.builder()
        .circuitId("string")
        .enabled(false)
        .build())
    .interface_("string")
    .isolation(false)
    .l2Isolation(false)
    .legacyOverds(false)
    .limitBcast(false)
    .limitProbeResponse(false)
    .maxIdletime(0)
    .maxNumClients(0)
    .mistNac(WlanMistNacArgs.builder()
        .acctInterimInterval(0)
        .authServersRetries(0)
        .authServersTimeout(0)
        .coaEnabled(false)
        .coaPort(0)
        .enabled(false)
        .fastDot1xTimers(false)
        .network("string")
        .sourceIp("string")
        .build())
    .mxtunnelIds("string")
    .mxtunnelNames("string")
    .noStaticDns(false)
    .noStaticIp(false)
    .portal(WlanPortalArgs.builder()
        .allowWlanIdRoam(false)
        .amazonClientId("string")
        .amazonClientSecret("string")
        .amazonEmailDomains("string")
        .amazonEnabled(false)
        .amazonExpire(0)
        .auth("string")
        .azureClientId("string")
        .azureClientSecret("string")
        .azureEnabled(false)
        .azureExpire(0)
        .azureTenantId("string")
        .broadnetPassword("string")
        .broadnetSid("string")
        .broadnetUserId("string")
        .bypassWhenCloudDown(false)
        .clickatellApiKey("string")
        .crossSite(false)
        .emailEnabled(false)
        .enabled(false)
        .expire(0)
        .externalPortalUrl("string")
        .facebookClientId("string")
        .facebookClientSecret("string")
        .facebookEmailDomains("string")
        .facebookEnabled(false)
        .facebookExpire(0)
        .forward(false)
        .forwardUrl("string")
        .googleClientId("string")
        .googleClientSecret("string")
        .googleEmailDomains("string")
        .googleEnabled(false)
        .googleExpire(0)
        .gupshupPassword("string")
        .gupshupUserid("string")
        .microsoftClientId("string")
        .microsoftClientSecret("string")
        .microsoftEmailDomains("string")
        .microsoftEnabled(false)
        .microsoftExpire(0)
        .passphraseEnabled(false)
        .passphraseExpire(0)
        .password("string")
        .predefinedSponsorsEnabled(false)
        .predefinedSponsorsHideEmail(false)
        .privacy(false)
        .puzzelPassword("string")
        .puzzelServiceId("string")
        .puzzelUsername("string")
        .smsEnabled(false)
        .smsExpire(0)
        .smsMessageFormat("string")
        .smsProvider("string")
        .smsglobalApiKey("string")
        .smsglobalApiSecret("string")
        .sponsorAutoApprove(false)
        .sponsorEmailDomains("string")
        .sponsorEnabled(false)
        .sponsorExpire(0)
        .sponsorLinkValidityDuration("string")
        .sponsorNotifyAll(false)
        .sponsorStatusNotify(false)
        .sponsors(Map.of("string", "string"))
        .ssoDefaultRole("string")
        .ssoForcedRole("string")
        .ssoIdpCert("string")
        .ssoIdpSignAlgo("string")
        .ssoIdpSsoUrl("string")
        .ssoIssuer("string")
        .ssoNameidFormat("string")
        .telstraClientId("string")
        .telstraClientSecret("string")
        .twilioAuthToken("string")
        .twilioPhoneNumber("string")
        .twilioSid("string")
        .build())
    .portalAllowedHostnames("string")
    .portalAllowedSubnets("string")
    .portalDeniedHostnames("string")
    .qos(WlanQosArgs.builder()
        .class_("string")
        .overwrite(false)
        .build())
    .radsec(WlanRadsecArgs.builder()
        .coaEnabled(false)
        .enabled(false)
        .idleTimeout("string")
        .mxclusterIds("string")
        .proxyHosts("string")
        .serverName("string")
        .servers(WlanRadsecServerArgs.builder()
            .host("string")
            .port(0)
            .build())
        .useMxedge(false)
        .useSiteMxedge(false)
        .build())
    .rateset(Map.of("string", WlanRatesetArgs.builder()
        .eht("string")
        .he("string")
        .ht("string")
        .legacies("string")
        .minRssi(0)
        .template("string")
        .vht("string")
        .build()))
    .reconnectClientsWhenRoamingMxcluster(false)
    .roamMode("string")
    .schedule(WlanScheduleArgs.builder()
        .enabled(false)
        .hours(WlanScheduleHoursArgs.builder()
            .fri("string")
            .mon("string")
            .sat("string")
            .sun("string")
            .thu("string")
            .tue("string")
            .wed("string")
            .build())
        .build())
    .sleExcluded(false)
    .useEapolV1(false)
    .vlanEnabled(false)
    .vlanId("string")
    .vlanIds("string")
    .vlanPooling(false)
    .wlanLimitDown("string")
    .wlanLimitDownEnabled(false)
    .wlanLimitUp("string")
    .wlanLimitUpEnabled(false)
    .wxtagIds("string")
    .wxtunnelId("string")
    .wxtunnelRemoteId("string")
    .build());
junipermist_wlan_resource = junipermist.site.Wlan("junipermistWlanResource",
    site_id="string",
    ssid="string",
    acct_immediate_update=False,
    acct_interim_interval=0,
    acct_servers=[{
        "host": "string",
        "secret": "string",
        "keywrap_enabled": False,
        "keywrap_format": "string",
        "keywrap_kek": "string",
        "keywrap_mack": "string",
        "port": "string",
    }],
    airwatch={
        "api_key": "string",
        "console_url": "string",
        "enabled": False,
        "password": "string",
        "username": "string",
    },
    allow_ipv6_ndp=False,
    allow_mdns=False,
    allow_ssdp=False,
    ap_ids=["string"],
    app_limit={
        "apps": {
            "string": 0,
        },
        "enabled": False,
        "wxtag_ids": {
            "string": 0,
        },
    },
    app_qos={
        "apps": {
            "string": {
                "dscp": "string",
                "dst_subnet": "string",
                "src_subnet": "string",
            },
        },
        "enabled": False,
        "others": [{
            "dscp": "string",
            "dst_subnet": "string",
            "port_ranges": "string",
            "protocol": "string",
            "src_subnet": "string",
        }],
    },
    apply_to="string",
    arp_filter=False,
    auth={
        "anticlog_threshold": 0,
        "eap_reauth": False,
        "enable_mac_auth": False,
        "key_idx": 0,
        "keys": ["string"],
        "multi_psk_only": False,
        "owe": "string",
        "pairwises": ["string"],
        "private_wlan": False,
        "psk": "string",
        "type": "string",
        "wep_as_secondary_auth": False,
    },
    auth_server_selection="string",
    auth_servers=[{
        "host": "string",
        "secret": "string",
        "keywrap_enabled": False,
        "keywrap_format": "string",
        "keywrap_kek": "string",
        "keywrap_mack": "string",
        "port": "string",
        "require_message_authenticator": False,
    }],
    auth_servers_nas_id="string",
    auth_servers_nas_ip="string",
    auth_servers_retries=0,
    auth_servers_timeout=0,
    band_steer=False,
    band_steer_force_band5=False,
    bands=["string"],
    block_blacklist_clients=False,
    bonjour={
        "additional_vlan_ids": ["string"],
        "enabled": False,
        "services": {
            "string": {
                "disable_local": False,
                "radius_groups": ["string"],
                "scope": "string",
            },
        },
    },
    cisco_cwa={
        "allowed_hostnames": ["string"],
        "allowed_subnets": ["string"],
        "blocked_subnets": ["string"],
        "enabled": False,
    },
    client_limit_down="string",
    client_limit_down_enabled=False,
    client_limit_up="string",
    client_limit_up_enabled=False,
    coa_servers=[{
        "ip": "string",
        "secret": "string",
        "disable_event_timestamp_check": False,
        "enabled": False,
        "port": "string",
    }],
    disable11ax=False,
    disable11be=False,
    disable_ht_vht_rates=False,
    disable_uapsd=False,
    disable_v1_roam_notify=False,
    disable_v2_roam_notify=False,
    disable_when_gateway_unreachable=False,
    disable_when_mxtunnel_down=False,
    disable_wmm=False,
    dns_server_rewrite={
        "enabled": False,
        "radius_groups": {
            "string": "string",
        },
    },
    dtim=0,
    dynamic_psk={
        "default_psk": "string",
        "default_vlan_id": "string",
        "enabled": False,
        "force_lookup": False,
        "source": "string",
    },
    dynamic_vlan={
        "default_vlan_ids": ["string"],
        "enabled": False,
        "local_vlan_ids": ["string"],
        "type": "string",
        "vlans": {
            "string": "string",
        },
    },
    enable_local_keycaching=False,
    enable_wireless_bridging=False,
    enable_wireless_bridging_dhcp_tracking=False,
    enabled=False,
    fast_dot1x_timers=False,
    hide_ssid=False,
    hostname_ie=False,
    hotspot20={
        "domain_names": ["string"],
        "enabled": False,
        "nai_realms": ["string"],
        "operators": ["string"],
        "rcois": ["string"],
        "venue_name": "string",
    },
    inject_dhcp_option82={
        "circuit_id": "string",
        "enabled": False,
    },
    interface="string",
    isolation=False,
    l2_isolation=False,
    legacy_overds=False,
    limit_bcast=False,
    limit_probe_response=False,
    max_idletime=0,
    max_num_clients=0,
    mist_nac={
        "acct_interim_interval": 0,
        "auth_servers_retries": 0,
        "auth_servers_timeout": 0,
        "coa_enabled": False,
        "coa_port": 0,
        "enabled": False,
        "fast_dot1x_timers": False,
        "network": "string",
        "source_ip": "string",
    },
    mxtunnel_ids=["string"],
    mxtunnel_names=["string"],
    no_static_dns=False,
    no_static_ip=False,
    portal={
        "allow_wlan_id_roam": False,
        "amazon_client_id": "string",
        "amazon_client_secret": "string",
        "amazon_email_domains": ["string"],
        "amazon_enabled": False,
        "amazon_expire": 0,
        "auth": "string",
        "azure_client_id": "string",
        "azure_client_secret": "string",
        "azure_enabled": False,
        "azure_expire": 0,
        "azure_tenant_id": "string",
        "broadnet_password": "string",
        "broadnet_sid": "string",
        "broadnet_user_id": "string",
        "bypass_when_cloud_down": False,
        "clickatell_api_key": "string",
        "cross_site": False,
        "email_enabled": False,
        "enabled": False,
        "expire": 0,
        "external_portal_url": "string",
        "facebook_client_id": "string",
        "facebook_client_secret": "string",
        "facebook_email_domains": ["string"],
        "facebook_enabled": False,
        "facebook_expire": 0,
        "forward": False,
        "forward_url": "string",
        "google_client_id": "string",
        "google_client_secret": "string",
        "google_email_domains": ["string"],
        "google_enabled": False,
        "google_expire": 0,
        "gupshup_password": "string",
        "gupshup_userid": "string",
        "microsoft_client_id": "string",
        "microsoft_client_secret": "string",
        "microsoft_email_domains": ["string"],
        "microsoft_enabled": False,
        "microsoft_expire": 0,
        "passphrase_enabled": False,
        "passphrase_expire": 0,
        "password": "string",
        "predefined_sponsors_enabled": False,
        "predefined_sponsors_hide_email": False,
        "privacy": False,
        "puzzel_password": "string",
        "puzzel_service_id": "string",
        "puzzel_username": "string",
        "sms_enabled": False,
        "sms_expire": 0,
        "sms_message_format": "string",
        "sms_provider": "string",
        "smsglobal_api_key": "string",
        "smsglobal_api_secret": "string",
        "sponsor_auto_approve": False,
        "sponsor_email_domains": ["string"],
        "sponsor_enabled": False,
        "sponsor_expire": 0,
        "sponsor_link_validity_duration": "string",
        "sponsor_notify_all": False,
        "sponsor_status_notify": False,
        "sponsors": {
            "string": "string",
        },
        "sso_default_role": "string",
        "sso_forced_role": "string",
        "sso_idp_cert": "string",
        "sso_idp_sign_algo": "string",
        "sso_idp_sso_url": "string",
        "sso_issuer": "string",
        "sso_nameid_format": "string",
        "telstra_client_id": "string",
        "telstra_client_secret": "string",
        "twilio_auth_token": "string",
        "twilio_phone_number": "string",
        "twilio_sid": "string",
    },
    portal_allowed_hostnames=["string"],
    portal_allowed_subnets=["string"],
    portal_denied_hostnames=["string"],
    qos={
        "class_": "string",
        "overwrite": False,
    },
    radsec={
        "coa_enabled": False,
        "enabled": False,
        "idle_timeout": "string",
        "mxcluster_ids": ["string"],
        "proxy_hosts": ["string"],
        "server_name": "string",
        "servers": [{
            "host": "string",
            "port": 0,
        }],
        "use_mxedge": False,
        "use_site_mxedge": False,
    },
    rateset={
        "string": {
            "eht": "string",
            "he": "string",
            "ht": "string",
            "legacies": ["string"],
            "min_rssi": 0,
            "template": "string",
            "vht": "string",
        },
    },
    reconnect_clients_when_roaming_mxcluster=False,
    roam_mode="string",
    schedule={
        "enabled": False,
        "hours": {
            "fri": "string",
            "mon": "string",
            "sat": "string",
            "sun": "string",
            "thu": "string",
            "tue": "string",
            "wed": "string",
        },
    },
    sle_excluded=False,
    use_eapol_v1=False,
    vlan_enabled=False,
    vlan_id="string",
    vlan_ids=["string"],
    vlan_pooling=False,
    wlan_limit_down="string",
    wlan_limit_down_enabled=False,
    wlan_limit_up="string",
    wlan_limit_up_enabled=False,
    wxtag_ids=["string"],
    wxtunnel_id="string",
    wxtunnel_remote_id="string")
const junipermistWlanResource = new junipermist.site.Wlan("junipermistWlanResource", {
    siteId: "string",
    ssid: "string",
    acctImmediateUpdate: false,
    acctInterimInterval: 0,
    acctServers: [{
        host: "string",
        secret: "string",
        keywrapEnabled: false,
        keywrapFormat: "string",
        keywrapKek: "string",
        keywrapMack: "string",
        port: "string",
    }],
    airwatch: {
        apiKey: "string",
        consoleUrl: "string",
        enabled: false,
        password: "string",
        username: "string",
    },
    allowIpv6Ndp: false,
    allowMdns: false,
    allowSsdp: false,
    apIds: ["string"],
    appLimit: {
        apps: {
            string: 0,
        },
        enabled: false,
        wxtagIds: {
            string: 0,
        },
    },
    appQos: {
        apps: {
            string: {
                dscp: "string",
                dstSubnet: "string",
                srcSubnet: "string",
            },
        },
        enabled: false,
        others: [{
            dscp: "string",
            dstSubnet: "string",
            portRanges: "string",
            protocol: "string",
            srcSubnet: "string",
        }],
    },
    applyTo: "string",
    arpFilter: false,
    auth: {
        anticlogThreshold: 0,
        eapReauth: false,
        enableMacAuth: false,
        keyIdx: 0,
        keys: ["string"],
        multiPskOnly: false,
        owe: "string",
        pairwises: ["string"],
        privateWlan: false,
        psk: "string",
        type: "string",
        wepAsSecondaryAuth: false,
    },
    authServerSelection: "string",
    authServers: [{
        host: "string",
        secret: "string",
        keywrapEnabled: false,
        keywrapFormat: "string",
        keywrapKek: "string",
        keywrapMack: "string",
        port: "string",
        requireMessageAuthenticator: false,
    }],
    authServersNasId: "string",
    authServersNasIp: "string",
    authServersRetries: 0,
    authServersTimeout: 0,
    bandSteer: false,
    bandSteerForceBand5: false,
    bands: ["string"],
    blockBlacklistClients: false,
    bonjour: {
        additionalVlanIds: ["string"],
        enabled: false,
        services: {
            string: {
                disableLocal: false,
                radiusGroups: ["string"],
                scope: "string",
            },
        },
    },
    ciscoCwa: {
        allowedHostnames: ["string"],
        allowedSubnets: ["string"],
        blockedSubnets: ["string"],
        enabled: false,
    },
    clientLimitDown: "string",
    clientLimitDownEnabled: false,
    clientLimitUp: "string",
    clientLimitUpEnabled: false,
    coaServers: [{
        ip: "string",
        secret: "string",
        disableEventTimestampCheck: false,
        enabled: false,
        port: "string",
    }],
    disable11ax: false,
    disable11be: false,
    disableHtVhtRates: false,
    disableUapsd: false,
    disableV1RoamNotify: false,
    disableV2RoamNotify: false,
    disableWhenGatewayUnreachable: false,
    disableWhenMxtunnelDown: false,
    disableWmm: false,
    dnsServerRewrite: {
        enabled: false,
        radiusGroups: {
            string: "string",
        },
    },
    dtim: 0,
    dynamicPsk: {
        defaultPsk: "string",
        defaultVlanId: "string",
        enabled: false,
        forceLookup: false,
        source: "string",
    },
    dynamicVlan: {
        defaultVlanIds: ["string"],
        enabled: false,
        localVlanIds: ["string"],
        type: "string",
        vlans: {
            string: "string",
        },
    },
    enableLocalKeycaching: false,
    enableWirelessBridging: false,
    enableWirelessBridgingDhcpTracking: false,
    enabled: false,
    fastDot1xTimers: false,
    hideSsid: false,
    hostnameIe: false,
    hotspot20: {
        domainNames: ["string"],
        enabled: false,
        naiRealms: ["string"],
        operators: ["string"],
        rcois: ["string"],
        venueName: "string",
    },
    injectDhcpOption82: {
        circuitId: "string",
        enabled: false,
    },
    "interface": "string",
    isolation: false,
    l2Isolation: false,
    legacyOverds: false,
    limitBcast: false,
    limitProbeResponse: false,
    maxIdletime: 0,
    maxNumClients: 0,
    mistNac: {
        acctInterimInterval: 0,
        authServersRetries: 0,
        authServersTimeout: 0,
        coaEnabled: false,
        coaPort: 0,
        enabled: false,
        fastDot1xTimers: false,
        network: "string",
        sourceIp: "string",
    },
    mxtunnelIds: ["string"],
    mxtunnelNames: ["string"],
    noStaticDns: false,
    noStaticIp: false,
    portal: {
        allowWlanIdRoam: false,
        amazonClientId: "string",
        amazonClientSecret: "string",
        amazonEmailDomains: ["string"],
        amazonEnabled: false,
        amazonExpire: 0,
        auth: "string",
        azureClientId: "string",
        azureClientSecret: "string",
        azureEnabled: false,
        azureExpire: 0,
        azureTenantId: "string",
        broadnetPassword: "string",
        broadnetSid: "string",
        broadnetUserId: "string",
        bypassWhenCloudDown: false,
        clickatellApiKey: "string",
        crossSite: false,
        emailEnabled: false,
        enabled: false,
        expire: 0,
        externalPortalUrl: "string",
        facebookClientId: "string",
        facebookClientSecret: "string",
        facebookEmailDomains: ["string"],
        facebookEnabled: false,
        facebookExpire: 0,
        forward: false,
        forwardUrl: "string",
        googleClientId: "string",
        googleClientSecret: "string",
        googleEmailDomains: ["string"],
        googleEnabled: false,
        googleExpire: 0,
        gupshupPassword: "string",
        gupshupUserid: "string",
        microsoftClientId: "string",
        microsoftClientSecret: "string",
        microsoftEmailDomains: ["string"],
        microsoftEnabled: false,
        microsoftExpire: 0,
        passphraseEnabled: false,
        passphraseExpire: 0,
        password: "string",
        predefinedSponsorsEnabled: false,
        predefinedSponsorsHideEmail: false,
        privacy: false,
        puzzelPassword: "string",
        puzzelServiceId: "string",
        puzzelUsername: "string",
        smsEnabled: false,
        smsExpire: 0,
        smsMessageFormat: "string",
        smsProvider: "string",
        smsglobalApiKey: "string",
        smsglobalApiSecret: "string",
        sponsorAutoApprove: false,
        sponsorEmailDomains: ["string"],
        sponsorEnabled: false,
        sponsorExpire: 0,
        sponsorLinkValidityDuration: "string",
        sponsorNotifyAll: false,
        sponsorStatusNotify: false,
        sponsors: {
            string: "string",
        },
        ssoDefaultRole: "string",
        ssoForcedRole: "string",
        ssoIdpCert: "string",
        ssoIdpSignAlgo: "string",
        ssoIdpSsoUrl: "string",
        ssoIssuer: "string",
        ssoNameidFormat: "string",
        telstraClientId: "string",
        telstraClientSecret: "string",
        twilioAuthToken: "string",
        twilioPhoneNumber: "string",
        twilioSid: "string",
    },
    portalAllowedHostnames: ["string"],
    portalAllowedSubnets: ["string"],
    portalDeniedHostnames: ["string"],
    qos: {
        "class": "string",
        overwrite: false,
    },
    radsec: {
        coaEnabled: false,
        enabled: false,
        idleTimeout: "string",
        mxclusterIds: ["string"],
        proxyHosts: ["string"],
        serverName: "string",
        servers: [{
            host: "string",
            port: 0,
        }],
        useMxedge: false,
        useSiteMxedge: false,
    },
    rateset: {
        string: {
            eht: "string",
            he: "string",
            ht: "string",
            legacies: ["string"],
            minRssi: 0,
            template: "string",
            vht: "string",
        },
    },
    reconnectClientsWhenRoamingMxcluster: false,
    roamMode: "string",
    schedule: {
        enabled: false,
        hours: {
            fri: "string",
            mon: "string",
            sat: "string",
            sun: "string",
            thu: "string",
            tue: "string",
            wed: "string",
        },
    },
    sleExcluded: false,
    useEapolV1: false,
    vlanEnabled: false,
    vlanId: "string",
    vlanIds: ["string"],
    vlanPooling: false,
    wlanLimitDown: "string",
    wlanLimitDownEnabled: false,
    wlanLimitUp: "string",
    wlanLimitUpEnabled: false,
    wxtagIds: ["string"],
    wxtunnelId: "string",
    wxtunnelRemoteId: "string",
});
type: junipermist:site:Wlan
properties:
    acctImmediateUpdate: false
    acctInterimInterval: 0
    acctServers:
        - host: string
          keywrapEnabled: false
          keywrapFormat: string
          keywrapKek: string
          keywrapMack: string
          port: string
          secret: string
    airwatch:
        apiKey: string
        consoleUrl: string
        enabled: false
        password: string
        username: string
    allowIpv6Ndp: false
    allowMdns: false
    allowSsdp: false
    apIds:
        - string
    appLimit:
        apps:
            string: 0
        enabled: false
        wxtagIds:
            string: 0
    appQos:
        apps:
            string:
                dscp: string
                dstSubnet: string
                srcSubnet: string
        enabled: false
        others:
            - dscp: string
              dstSubnet: string
              portRanges: string
              protocol: string
              srcSubnet: string
    applyTo: string
    arpFilter: false
    auth:
        anticlogThreshold: 0
        eapReauth: false
        enableMacAuth: false
        keyIdx: 0
        keys:
            - string
        multiPskOnly: false
        owe: string
        pairwises:
            - string
        privateWlan: false
        psk: string
        type: string
        wepAsSecondaryAuth: false
    authServerSelection: string
    authServers:
        - host: string
          keywrapEnabled: false
          keywrapFormat: string
          keywrapKek: string
          keywrapMack: string
          port: string
          requireMessageAuthenticator: false
          secret: string
    authServersNasId: string
    authServersNasIp: string
    authServersRetries: 0
    authServersTimeout: 0
    bandSteer: false
    bandSteerForceBand5: false
    bands:
        - string
    blockBlacklistClients: false
    bonjour:
        additionalVlanIds:
            - string
        enabled: false
        services:
            string:
                disableLocal: false
                radiusGroups:
                    - string
                scope: string
    ciscoCwa:
        allowedHostnames:
            - string
        allowedSubnets:
            - string
        blockedSubnets:
            - string
        enabled: false
    clientLimitDown: string
    clientLimitDownEnabled: false
    clientLimitUp: string
    clientLimitUpEnabled: false
    coaServers:
        - disableEventTimestampCheck: false
          enabled: false
          ip: string
          port: string
          secret: string
    disable11ax: false
    disable11be: false
    disableHtVhtRates: false
    disableUapsd: false
    disableV1RoamNotify: false
    disableV2RoamNotify: false
    disableWhenGatewayUnreachable: false
    disableWhenMxtunnelDown: false
    disableWmm: false
    dnsServerRewrite:
        enabled: false
        radiusGroups:
            string: string
    dtim: 0
    dynamicPsk:
        defaultPsk: string
        defaultVlanId: string
        enabled: false
        forceLookup: false
        source: string
    dynamicVlan:
        defaultVlanIds:
            - string
        enabled: false
        localVlanIds:
            - string
        type: string
        vlans:
            string: string
    enableLocalKeycaching: false
    enableWirelessBridging: false
    enableWirelessBridgingDhcpTracking: false
    enabled: false
    fastDot1xTimers: false
    hideSsid: false
    hostnameIe: false
    hotspot20:
        domainNames:
            - string
        enabled: false
        naiRealms:
            - string
        operators:
            - string
        rcois:
            - string
        venueName: string
    injectDhcpOption82:
        circuitId: string
        enabled: false
    interface: string
    isolation: false
    l2Isolation: false
    legacyOverds: false
    limitBcast: false
    limitProbeResponse: false
    maxIdletime: 0
    maxNumClients: 0
    mistNac:
        acctInterimInterval: 0
        authServersRetries: 0
        authServersTimeout: 0
        coaEnabled: false
        coaPort: 0
        enabled: false
        fastDot1xTimers: false
        network: string
        sourceIp: string
    mxtunnelIds:
        - string
    mxtunnelNames:
        - string
    noStaticDns: false
    noStaticIp: false
    portal:
        allowWlanIdRoam: false
        amazonClientId: string
        amazonClientSecret: string
        amazonEmailDomains:
            - string
        amazonEnabled: false
        amazonExpire: 0
        auth: string
        azureClientId: string
        azureClientSecret: string
        azureEnabled: false
        azureExpire: 0
        azureTenantId: string
        broadnetPassword: string
        broadnetSid: string
        broadnetUserId: string
        bypassWhenCloudDown: false
        clickatellApiKey: string
        crossSite: false
        emailEnabled: false
        enabled: false
        expire: 0
        externalPortalUrl: string
        facebookClientId: string
        facebookClientSecret: string
        facebookEmailDomains:
            - string
        facebookEnabled: false
        facebookExpire: 0
        forward: false
        forwardUrl: string
        googleClientId: string
        googleClientSecret: string
        googleEmailDomains:
            - string
        googleEnabled: false
        googleExpire: 0
        gupshupPassword: string
        gupshupUserid: string
        microsoftClientId: string
        microsoftClientSecret: string
        microsoftEmailDomains:
            - string
        microsoftEnabled: false
        microsoftExpire: 0
        passphraseEnabled: false
        passphraseExpire: 0
        password: string
        predefinedSponsorsEnabled: false
        predefinedSponsorsHideEmail: false
        privacy: false
        puzzelPassword: string
        puzzelServiceId: string
        puzzelUsername: string
        smsEnabled: false
        smsExpire: 0
        smsMessageFormat: string
        smsProvider: string
        smsglobalApiKey: string
        smsglobalApiSecret: string
        sponsorAutoApprove: false
        sponsorEmailDomains:
            - string
        sponsorEnabled: false
        sponsorExpire: 0
        sponsorLinkValidityDuration: string
        sponsorNotifyAll: false
        sponsorStatusNotify: false
        sponsors:
            string: string
        ssoDefaultRole: string
        ssoForcedRole: string
        ssoIdpCert: string
        ssoIdpSignAlgo: string
        ssoIdpSsoUrl: string
        ssoIssuer: string
        ssoNameidFormat: string
        telstraClientId: string
        telstraClientSecret: string
        twilioAuthToken: string
        twilioPhoneNumber: string
        twilioSid: string
    portalAllowedHostnames:
        - string
    portalAllowedSubnets:
        - string
    portalDeniedHostnames:
        - string
    qos:
        class: string
        overwrite: false
    radsec:
        coaEnabled: false
        enabled: false
        idleTimeout: string
        mxclusterIds:
            - string
        proxyHosts:
            - string
        serverName: string
        servers:
            - host: string
              port: 0
        useMxedge: false
        useSiteMxedge: false
    rateset:
        string:
            eht: string
            he: string
            ht: string
            legacies:
                - string
            minRssi: 0
            template: string
            vht: string
    reconnectClientsWhenRoamingMxcluster: false
    roamMode: string
    schedule:
        enabled: false
        hours:
            fri: string
            mon: string
            sat: string
            sun: string
            thu: string
            tue: string
            wed: string
    siteId: string
    sleExcluded: false
    ssid: string
    useEapolV1: false
    vlanEnabled: false
    vlanId: string
    vlanIds:
        - string
    vlanPooling: false
    wlanLimitDown: string
    wlanLimitDownEnabled: false
    wlanLimitUp: string
    wlanLimitUpEnabled: false
    wxtagIds:
        - string
    wxtunnelId: string
    wxtunnelRemoteId: string
Wlan Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Wlan resource accepts the following input properties:
- SiteId string
- Ssid string
- Name of the SSID
- AcctImmediate boolUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- AcctInterim intInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- AcctServers List<Pulumi.Juniper Mist. Site. Inputs. Wlan Acct Server> 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- Airwatch
Pulumi.Juniper Mist. Site. Inputs. Wlan Airwatch 
- Airwatch wlan settings
- AllowIpv6Ndp bool
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- AllowMdns bool
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- AllowSsdp bool
- Only applicable when limit_bcast==true, which allows SSDP
- ApIds List<string>
- List of device ids
- AppLimit Pulumi.Juniper Mist. Site. Inputs. Wlan App Limit 
- Bandwidth limiting for apps (applies to up/down)
- AppQos Pulumi.Juniper Mist. Site. Inputs. Wlan App Qos 
- APp qos wlan settings
- ApplyTo string
- enum: aps,site,wxtags
- ArpFilter bool
- Whether to enable smart arp filter
- Auth
Pulumi.Juniper Mist. Site. Inputs. Wlan Auth 
- Authentication wlan settings
- AuthServer stringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- AuthServers List<Pulumi.Juniper Mist. Site. Inputs. Wlan Auth Server> 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- AuthServers stringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- AuthServers stringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- AuthServers intRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- AuthServers intTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- BandSteer bool
- Whether to enable band_steering, this works only when band==both
- BandSteer boolForce Band5 
- Force dual_band capable client to connect to 5G
- Bands List<string>
- list of radios that the wlan should apply to. enum: 24,5,6
- BlockBlacklist boolClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- Bonjour
Pulumi.Juniper Mist. Site. Inputs. Wlan Bonjour 
- Bonjour gateway wlan settings
- CiscoCwa Pulumi.Juniper Mist. Site. Inputs. Wlan Cisco Cwa 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- ClientLimit stringDown 
- ClientLimit boolDown Enabled 
- If downlink limiting per-client is enabled
- ClientLimit stringUp 
- ClientLimit boolUp Enabled 
- If uplink limiting per-client is enabled
- CoaServers List<Pulumi.Juniper Mist. Site. Inputs. Wlan Coa Server> 
- List of COA (change of authorization) servers, optional
- Disable11ax bool
- Some old WLAN drivers may not be compatible
- Disable11be bool
- To disable Wi-Fi 7 EHT IEs
- DisableHt boolVht Rates 
- To disable ht or vht rates
- DisableUapsd bool
- Whether to disable U-APSD
- DisableV1Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableV2Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableWhen boolGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- DisableWhen boolMxtunnel Down 
- DisableWmm bool
- Whether to disable WMM
- DnsServer Pulumi.Rewrite Juniper Mist. Site. Inputs. Wlan Dns Server Rewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- Dtim int
- DynamicPsk Pulumi.Juniper Mist. Site. Inputs. Wlan Dynamic Psk 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- DynamicVlan Pulumi.Juniper Mist. Site. Inputs. Wlan Dynamic Vlan 
- For 802.1x
- EnableLocal boolKeycaching 
- Enable AP-AP keycaching via multicast
- EnableWireless boolBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- EnableWireless boolBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- Enabled bool
- If this wlan is enabled
- FastDot1x boolTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- HideSsid bool
- Whether to hide SSID in beacon
- HostnameIe bool
- Include hostname inside IE in AP beacons / probe responses
- Hotspot20
Pulumi.Juniper Mist. Site. Inputs. Wlan Hotspot20 
- Hostspot 2.0 wlan settings
- InjectDhcp Pulumi.Option82 Juniper Mist. Site. Inputs. Wlan Inject Dhcp Option82 
- Interface string
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- Isolation bool
- Whether to stop clients to talk to each other
- L2Isolation bool
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- LegacyOverds bool
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- LimitBcast bool
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- LimitProbe boolResponse 
- Limit probe response base on some heuristic rules
- MaxIdletime int
- Max idle time in seconds
- MaxNum intClients 
- Maximum number of client connected to the SSID. 0means unlimited
- MistNac Pulumi.Juniper Mist. Site. Inputs. Wlan Mist Nac 
- MxtunnelIds List<string>
- When interface=mxtunnel, id of the Mist Tunnel
- MxtunnelNames List<string>
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- NoStatic boolDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- NoStatic boolIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- Portal
Pulumi.Juniper Mist. Site. Inputs. Wlan Portal 
- Portal wlan settings
- PortalAllowed List<string>Hostnames 
- List of hostnames without http(s):// (matched by substring)
- PortalAllowed List<string>Subnets 
- List of CIDRs
- PortalDenied List<string>Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- Qos
Pulumi.Juniper Mist. Site. Inputs. Wlan Qos 
- Radsec
Pulumi.Juniper Mist. Site. Inputs. Wlan Radsec 
- RadSec settings
- Rateset
Dictionary<string, Pulumi.Juniper Mist. Site. Inputs. Wlan Rateset Args> 
- Property key is the RF band. enum: 24,5,6
- ReconnectClients boolWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- RoamMode string
- enum: 11r,OKC,NONE
- Schedule
Pulumi.Juniper Mist. Site. Inputs. Wlan Schedule 
- WLAN operating schedule, default is disabled
- SleExcluded bool
- Whether to exclude this WLAN from SLE metrics
- UseEapol boolV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- VlanEnabled bool
- If vlan tagging is enabled
- VlanId string
- VlanIds List<string>
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- VlanPooling bool
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- WlanLimit stringDown 
- WlanLimit boolDown Enabled 
- If downlink limiting for whole wlan is enabled
- WlanLimit stringUp 
- WlanLimit boolUp Enabled 
- If uplink limiting for whole wlan is enabled
- WxtagIds List<string>
- List of wxtag_ids
- WxtunnelId string
- When interface=wxtunnel, id of the WXLAN Tunnel
- WxtunnelRemote stringId 
- When interface=wxtunnel, remote tunnel identifier
- SiteId string
- Ssid string
- Name of the SSID
- AcctImmediate boolUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- AcctInterim intInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- AcctServers []WlanAcct Server Args 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- Airwatch
WlanAirwatch Args 
- Airwatch wlan settings
- AllowIpv6Ndp bool
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- AllowMdns bool
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- AllowSsdp bool
- Only applicable when limit_bcast==true, which allows SSDP
- ApIds []string
- List of device ids
- AppLimit WlanApp Limit Args 
- Bandwidth limiting for apps (applies to up/down)
- AppQos WlanApp Qos Args 
- APp qos wlan settings
- ApplyTo string
- enum: aps,site,wxtags
- ArpFilter bool
- Whether to enable smart arp filter
- Auth
WlanAuth Args 
- Authentication wlan settings
- AuthServer stringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- AuthServers []WlanAuth Server Args 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- AuthServers stringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- AuthServers stringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- AuthServers intRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- AuthServers intTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- BandSteer bool
- Whether to enable band_steering, this works only when band==both
- BandSteer boolForce Band5 
- Force dual_band capable client to connect to 5G
- Bands []string
- list of radios that the wlan should apply to. enum: 24,5,6
- BlockBlacklist boolClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- Bonjour
WlanBonjour Args 
- Bonjour gateway wlan settings
- CiscoCwa WlanCisco Cwa Args 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- ClientLimit stringDown 
- ClientLimit boolDown Enabled 
- If downlink limiting per-client is enabled
- ClientLimit stringUp 
- ClientLimit boolUp Enabled 
- If uplink limiting per-client is enabled
- CoaServers []WlanCoa Server Args 
- List of COA (change of authorization) servers, optional
- Disable11ax bool
- Some old WLAN drivers may not be compatible
- Disable11be bool
- To disable Wi-Fi 7 EHT IEs
- DisableHt boolVht Rates 
- To disable ht or vht rates
- DisableUapsd bool
- Whether to disable U-APSD
- DisableV1Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableV2Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableWhen boolGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- DisableWhen boolMxtunnel Down 
- DisableWmm bool
- Whether to disable WMM
- DnsServer WlanRewrite Dns Server Rewrite Args 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- Dtim int
- DynamicPsk WlanDynamic Psk Args 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- DynamicVlan WlanDynamic Vlan Args 
- For 802.1x
- EnableLocal boolKeycaching 
- Enable AP-AP keycaching via multicast
- EnableWireless boolBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- EnableWireless boolBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- Enabled bool
- If this wlan is enabled
- FastDot1x boolTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- HideSsid bool
- Whether to hide SSID in beacon
- HostnameIe bool
- Include hostname inside IE in AP beacons / probe responses
- Hotspot20
WlanHotspot20Args 
- Hostspot 2.0 wlan settings
- InjectDhcp WlanOption82 Inject Dhcp Option82Args 
- Interface string
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- Isolation bool
- Whether to stop clients to talk to each other
- L2Isolation bool
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- LegacyOverds bool
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- LimitBcast bool
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- LimitProbe boolResponse 
- Limit probe response base on some heuristic rules
- MaxIdletime int
- Max idle time in seconds
- MaxNum intClients 
- Maximum number of client connected to the SSID. 0means unlimited
- MistNac WlanMist Nac Args 
- MxtunnelIds []string
- When interface=mxtunnel, id of the Mist Tunnel
- MxtunnelNames []string
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- NoStatic boolDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- NoStatic boolIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- Portal
WlanPortal Args 
- Portal wlan settings
- PortalAllowed []stringHostnames 
- List of hostnames without http(s):// (matched by substring)
- PortalAllowed []stringSubnets 
- List of CIDRs
- PortalDenied []stringHostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- Qos
WlanQos Args 
- Radsec
WlanRadsec Args 
- RadSec settings
- Rateset
map[string]WlanRateset Args 
- Property key is the RF band. enum: 24,5,6
- ReconnectClients boolWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- RoamMode string
- enum: 11r,OKC,NONE
- Schedule
WlanSchedule Args 
- WLAN operating schedule, default is disabled
- SleExcluded bool
- Whether to exclude this WLAN from SLE metrics
- UseEapol boolV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- VlanEnabled bool
- If vlan tagging is enabled
- VlanId string
- VlanIds []string
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- VlanPooling bool
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- WlanLimit stringDown 
- WlanLimit boolDown Enabled 
- If downlink limiting for whole wlan is enabled
- WlanLimit stringUp 
- WlanLimit boolUp Enabled 
- If uplink limiting for whole wlan is enabled
- WxtagIds []string
- List of wxtag_ids
- WxtunnelId string
- When interface=wxtunnel, id of the WXLAN Tunnel
- WxtunnelRemote stringId 
- When interface=wxtunnel, remote tunnel identifier
- siteId String
- ssid String
- Name of the SSID
- acctImmediate BooleanUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acctInterim IntegerInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acctServers List<WlanAcct Server> 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch
WlanAirwatch 
- Airwatch wlan settings
- allowIpv6Ndp Boolean
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allowMdns Boolean
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allowSsdp Boolean
- Only applicable when limit_bcast==true, which allows SSDP
- apIds List<String>
- List of device ids
- appLimit WlanApp Limit 
- Bandwidth limiting for apps (applies to up/down)
- appQos WlanApp Qos 
- APp qos wlan settings
- applyTo String
- enum: aps,site,wxtags
- arpFilter Boolean
- Whether to enable smart arp filter
- auth
WlanAuth 
- Authentication wlan settings
- authServer StringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- authServers List<WlanAuth Server> 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- authServers StringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- authServers StringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- authServers IntegerRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- authServers IntegerTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- bandSteer Boolean
- Whether to enable band_steering, this works only when band==both
- bandSteer BooleanForce Band5 
- Force dual_band capable client to connect to 5G
- bands List<String>
- list of radios that the wlan should apply to. enum: 24,5,6
- blockBlacklist BooleanClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour
WlanBonjour 
- Bonjour gateway wlan settings
- ciscoCwa WlanCisco Cwa 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- clientLimit StringDown 
- clientLimit BooleanDown Enabled 
- If downlink limiting per-client is enabled
- clientLimit StringUp 
- clientLimit BooleanUp Enabled 
- If uplink limiting per-client is enabled
- coaServers List<WlanCoa Server> 
- List of COA (change of authorization) servers, optional
- disable11ax Boolean
- Some old WLAN drivers may not be compatible
- disable11be Boolean
- To disable Wi-Fi 7 EHT IEs
- disableHt BooleanVht Rates 
- To disable ht or vht rates
- disableUapsd Boolean
- Whether to disable U-APSD
- disableV1Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableV2Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableWhen BooleanGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disableWhen BooleanMxtunnel Down 
- disableWmm Boolean
- Whether to disable WMM
- dnsServer WlanRewrite Dns Server Rewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim Integer
- dynamicPsk WlanDynamic Psk 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamicVlan WlanDynamic Vlan 
- For 802.1x
- enableLocal BooleanKeycaching 
- Enable AP-AP keycaching via multicast
- enableWireless BooleanBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enableWireless BooleanBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled Boolean
- If this wlan is enabled
- fastDot1x BooleanTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hideSsid Boolean
- Whether to hide SSID in beacon
- hostnameIe Boolean
- Include hostname inside IE in AP beacons / probe responses
- hotspot20
WlanHotspot20 
- Hostspot 2.0 wlan settings
- injectDhcp WlanOption82 Inject Dhcp Option82 
- interface_ String
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation Boolean
- Whether to stop clients to talk to each other
- l2Isolation Boolean
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacyOverds Boolean
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limitBcast Boolean
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limitProbe BooleanResponse 
- Limit probe response base on some heuristic rules
- maxIdletime Integer
- Max idle time in seconds
- maxNum IntegerClients 
- Maximum number of client connected to the SSID. 0means unlimited
- mistNac WlanMist Nac 
- mxtunnelIds List<String>
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnelNames List<String>
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- noStatic BooleanDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- noStatic BooleanIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- portal
WlanPortal 
- Portal wlan settings
- portalAllowed List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring)
- portalAllowed List<String>Subnets 
- List of CIDRs
- portalDenied List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- qos
WlanQos 
- radsec
WlanRadsec 
- RadSec settings
- rateset
Map<String,WlanRateset Args> 
- Property key is the RF band. enum: 24,5,6
- reconnectClients BooleanWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roamMode String
- enum: 11r,OKC,NONE
- schedule
WlanSchedule 
- WLAN operating schedule, default is disabled
- sleExcluded Boolean
- Whether to exclude this WLAN from SLE metrics
- useEapol BooleanV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlanEnabled Boolean
- If vlan tagging is enabled
- vlanId String
- vlanIds List<String>
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlanPooling Boolean
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlanLimit StringDown 
- wlanLimit BooleanDown Enabled 
- If downlink limiting for whole wlan is enabled
- wlanLimit StringUp 
- wlanLimit BooleanUp Enabled 
- If uplink limiting for whole wlan is enabled
- wxtagIds List<String>
- List of wxtag_ids
- wxtunnelId String
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnelRemote StringId 
- When interface=wxtunnel, remote tunnel identifier
- siteId string
- ssid string
- Name of the SSID
- acctImmediate booleanUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acctInterim numberInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acctServers WlanAcct Server[] 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch
WlanAirwatch 
- Airwatch wlan settings
- allowIpv6Ndp boolean
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allowMdns boolean
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allowSsdp boolean
- Only applicable when limit_bcast==true, which allows SSDP
- apIds string[]
- List of device ids
- appLimit WlanApp Limit 
- Bandwidth limiting for apps (applies to up/down)
- appQos WlanApp Qos 
- APp qos wlan settings
- applyTo string
- enum: aps,site,wxtags
- arpFilter boolean
- Whether to enable smart arp filter
- auth
WlanAuth 
- Authentication wlan settings
- authServer stringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- authServers WlanAuth Server[] 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- authServers stringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- authServers stringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- authServers numberRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- authServers numberTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- bandSteer boolean
- Whether to enable band_steering, this works only when band==both
- bandSteer booleanForce Band5 
- Force dual_band capable client to connect to 5G
- bands string[]
- list of radios that the wlan should apply to. enum: 24,5,6
- blockBlacklist booleanClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour
WlanBonjour 
- Bonjour gateway wlan settings
- ciscoCwa WlanCisco Cwa 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- clientLimit stringDown 
- clientLimit booleanDown Enabled 
- If downlink limiting per-client is enabled
- clientLimit stringUp 
- clientLimit booleanUp Enabled 
- If uplink limiting per-client is enabled
- coaServers WlanCoa Server[] 
- List of COA (change of authorization) servers, optional
- disable11ax boolean
- Some old WLAN drivers may not be compatible
- disable11be boolean
- To disable Wi-Fi 7 EHT IEs
- disableHt booleanVht Rates 
- To disable ht or vht rates
- disableUapsd boolean
- Whether to disable U-APSD
- disableV1Roam booleanNotify 
- Disable sending v2 roam notification messages
- disableV2Roam booleanNotify 
- Disable sending v2 roam notification messages
- disableWhen booleanGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disableWhen booleanMxtunnel Down 
- disableWmm boolean
- Whether to disable WMM
- dnsServer WlanRewrite Dns Server Rewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim number
- dynamicPsk WlanDynamic Psk 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamicVlan WlanDynamic Vlan 
- For 802.1x
- enableLocal booleanKeycaching 
- Enable AP-AP keycaching via multicast
- enableWireless booleanBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enableWireless booleanBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled boolean
- If this wlan is enabled
- fastDot1x booleanTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hideSsid boolean
- Whether to hide SSID in beacon
- hostnameIe boolean
- Include hostname inside IE in AP beacons / probe responses
- hotspot20
WlanHotspot20 
- Hostspot 2.0 wlan settings
- injectDhcp WlanOption82 Inject Dhcp Option82 
- interface string
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation boolean
- Whether to stop clients to talk to each other
- l2Isolation boolean
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacyOverds boolean
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limitBcast boolean
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limitProbe booleanResponse 
- Limit probe response base on some heuristic rules
- maxIdletime number
- Max idle time in seconds
- maxNum numberClients 
- Maximum number of client connected to the SSID. 0means unlimited
- mistNac WlanMist Nac 
- mxtunnelIds string[]
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnelNames string[]
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- noStatic booleanDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- noStatic booleanIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- portal
WlanPortal 
- Portal wlan settings
- portalAllowed string[]Hostnames 
- List of hostnames without http(s):// (matched by substring)
- portalAllowed string[]Subnets 
- List of CIDRs
- portalDenied string[]Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- qos
WlanQos 
- radsec
WlanRadsec 
- RadSec settings
- rateset
{[key: string]: WlanRateset Args} 
- Property key is the RF band. enum: 24,5,6
- reconnectClients booleanWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roamMode string
- enum: 11r,OKC,NONE
- schedule
WlanSchedule 
- WLAN operating schedule, default is disabled
- sleExcluded boolean
- Whether to exclude this WLAN from SLE metrics
- useEapol booleanV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlanEnabled boolean
- If vlan tagging is enabled
- vlanId string
- vlanIds string[]
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlanPooling boolean
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlanLimit stringDown 
- wlanLimit booleanDown Enabled 
- If downlink limiting for whole wlan is enabled
- wlanLimit stringUp 
- wlanLimit booleanUp Enabled 
- If uplink limiting for whole wlan is enabled
- wxtagIds string[]
- List of wxtag_ids
- wxtunnelId string
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnelRemote stringId 
- When interface=wxtunnel, remote tunnel identifier
- site_id str
- ssid str
- Name of the SSID
- acct_immediate_ boolupdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acct_interim_ intinterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acct_servers Sequence[WlanAcct Server Args] 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch
WlanAirwatch Args 
- Airwatch wlan settings
- allow_ipv6_ boolndp 
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allow_mdns bool
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allow_ssdp bool
- Only applicable when limit_bcast==true, which allows SSDP
- ap_ids Sequence[str]
- List of device ids
- app_limit WlanApp Limit Args 
- Bandwidth limiting for apps (applies to up/down)
- app_qos WlanApp Qos Args 
- APp qos wlan settings
- apply_to str
- enum: aps,site,wxtags
- arp_filter bool
- Whether to enable smart arp filter
- auth
WlanAuth Args 
- Authentication wlan settings
- auth_server_ strselection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- auth_servers Sequence[WlanAuth Server Args] 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- auth_servers_ strnas_ id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- auth_servers_ strnas_ ip 
- Optional, NAS-IP-ADDRESS to use
- auth_servers_ intretries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- auth_servers_ inttimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- band_steer bool
- Whether to enable band_steering, this works only when band==both
- band_steer_ boolforce_ band5 
- Force dual_band capable client to connect to 5G
- bands Sequence[str]
- list of radios that the wlan should apply to. enum: 24,5,6
- block_blacklist_ boolclients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour
WlanBonjour Args 
- Bonjour gateway wlan settings
- cisco_cwa WlanCisco Cwa Args 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- client_limit_ strdown 
- client_limit_ booldown_ enabled 
- If downlink limiting per-client is enabled
- client_limit_ strup 
- client_limit_ boolup_ enabled 
- If uplink limiting per-client is enabled
- coa_servers Sequence[WlanCoa Server Args] 
- List of COA (change of authorization) servers, optional
- disable11ax bool
- Some old WLAN drivers may not be compatible
- disable11be bool
- To disable Wi-Fi 7 EHT IEs
- disable_ht_ boolvht_ rates 
- To disable ht or vht rates
- disable_uapsd bool
- Whether to disable U-APSD
- disable_v1_ boolroam_ notify 
- Disable sending v2 roam notification messages
- disable_v2_ boolroam_ notify 
- Disable sending v2 roam notification messages
- disable_when_ boolgateway_ unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disable_when_ boolmxtunnel_ down 
- disable_wmm bool
- Whether to disable WMM
- dns_server_ Wlanrewrite Dns Server Rewrite Args 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim int
- dynamic_psk WlanDynamic Psk Args 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamic_vlan WlanDynamic Vlan Args 
- For 802.1x
- enable_local_ boolkeycaching 
- Enable AP-AP keycaching via multicast
- enable_wireless_ boolbridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enable_wireless_ boolbridging_ dhcp_ tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled bool
- If this wlan is enabled
- fast_dot1x_ booltimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hide_ssid bool
- Whether to hide SSID in beacon
- hostname_ie bool
- Include hostname inside IE in AP beacons / probe responses
- hotspot20
WlanHotspot20Args 
- Hostspot 2.0 wlan settings
- inject_dhcp_ Wlanoption82 Inject Dhcp Option82Args 
- interface str
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation bool
- Whether to stop clients to talk to each other
- l2_isolation bool
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacy_overds bool
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limit_bcast bool
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limit_probe_ boolresponse 
- Limit probe response base on some heuristic rules
- max_idletime int
- Max idle time in seconds
- max_num_ intclients 
- Maximum number of client connected to the SSID. 0means unlimited
- mist_nac WlanMist Nac Args 
- mxtunnel_ids Sequence[str]
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnel_names Sequence[str]
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- no_static_ booldns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- no_static_ boolip 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- portal
WlanPortal Args 
- Portal wlan settings
- portal_allowed_ Sequence[str]hostnames 
- List of hostnames without http(s):// (matched by substring)
- portal_allowed_ Sequence[str]subnets 
- List of CIDRs
- portal_denied_ Sequence[str]hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- qos
WlanQos Args 
- radsec
WlanRadsec Args 
- RadSec settings
- rateset
Mapping[str, WlanRateset Args] 
- Property key is the RF band. enum: 24,5,6
- reconnect_clients_ boolwhen_ roaming_ mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roam_mode str
- enum: 11r,OKC,NONE
- schedule
WlanSchedule Args 
- WLAN operating schedule, default is disabled
- sle_excluded bool
- Whether to exclude this WLAN from SLE metrics
- use_eapol_ boolv1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlan_enabled bool
- If vlan tagging is enabled
- vlan_id str
- vlan_ids Sequence[str]
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlan_pooling bool
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlan_limit_ strdown 
- wlan_limit_ booldown_ enabled 
- If downlink limiting for whole wlan is enabled
- wlan_limit_ strup 
- wlan_limit_ boolup_ enabled 
- If uplink limiting for whole wlan is enabled
- wxtag_ids Sequence[str]
- List of wxtag_ids
- wxtunnel_id str
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnel_remote_ strid 
- When interface=wxtunnel, remote tunnel identifier
- siteId String
- ssid String
- Name of the SSID
- acctImmediate BooleanUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acctInterim NumberInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acctServers List<Property Map>
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch Property Map
- Airwatch wlan settings
- allowIpv6Ndp Boolean
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allowMdns Boolean
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allowSsdp Boolean
- Only applicable when limit_bcast==true, which allows SSDP
- apIds List<String>
- List of device ids
- appLimit Property Map
- Bandwidth limiting for apps (applies to up/down)
- appQos Property Map
- APp qos wlan settings
- applyTo String
- enum: aps,site,wxtags
- arpFilter Boolean
- Whether to enable smart arp filter
- auth Property Map
- Authentication wlan settings
- authServer StringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- authServers List<Property Map>
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- authServers StringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- authServers StringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- authServers NumberRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- authServers NumberTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- bandSteer Boolean
- Whether to enable band_steering, this works only when band==both
- bandSteer BooleanForce Band5 
- Force dual_band capable client to connect to 5G
- bands List<String>
- list of radios that the wlan should apply to. enum: 24,5,6
- blockBlacklist BooleanClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour Property Map
- Bonjour gateway wlan settings
- ciscoCwa Property Map
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- clientLimit StringDown 
- clientLimit BooleanDown Enabled 
- If downlink limiting per-client is enabled
- clientLimit StringUp 
- clientLimit BooleanUp Enabled 
- If uplink limiting per-client is enabled
- coaServers List<Property Map>
- List of COA (change of authorization) servers, optional
- disable11ax Boolean
- Some old WLAN drivers may not be compatible
- disable11be Boolean
- To disable Wi-Fi 7 EHT IEs
- disableHt BooleanVht Rates 
- To disable ht or vht rates
- disableUapsd Boolean
- Whether to disable U-APSD
- disableV1Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableV2Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableWhen BooleanGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disableWhen BooleanMxtunnel Down 
- disableWmm Boolean
- Whether to disable WMM
- dnsServer Property MapRewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim Number
- dynamicPsk Property Map
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamicVlan Property Map
- For 802.1x
- enableLocal BooleanKeycaching 
- Enable AP-AP keycaching via multicast
- enableWireless BooleanBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enableWireless BooleanBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled Boolean
- If this wlan is enabled
- fastDot1x BooleanTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hideSsid Boolean
- Whether to hide SSID in beacon
- hostnameIe Boolean
- Include hostname inside IE in AP beacons / probe responses
- hotspot20 Property Map
- Hostspot 2.0 wlan settings
- injectDhcp Property MapOption82 
- interface String
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation Boolean
- Whether to stop clients to talk to each other
- l2Isolation Boolean
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacyOverds Boolean
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limitBcast Boolean
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limitProbe BooleanResponse 
- Limit probe response base on some heuristic rules
- maxIdletime Number
- Max idle time in seconds
- maxNum NumberClients 
- Maximum number of client connected to the SSID. 0means unlimited
- mistNac Property Map
- mxtunnelIds List<String>
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnelNames List<String>
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- noStatic BooleanDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- noStatic BooleanIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- portal Property Map
- Portal wlan settings
- portalAllowed List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring)
- portalAllowed List<String>Subnets 
- List of CIDRs
- portalDenied List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- qos Property Map
- radsec Property Map
- RadSec settings
- rateset Map<Property Map>
- Property key is the RF band. enum: 24,5,6
- reconnectClients BooleanWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roamMode String
- enum: 11r,OKC,NONE
- schedule Property Map
- WLAN operating schedule, default is disabled
- sleExcluded Boolean
- Whether to exclude this WLAN from SLE metrics
- useEapol BooleanV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlanEnabled Boolean
- If vlan tagging is enabled
- vlanId String
- vlanIds List<String>
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlanPooling Boolean
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlanLimit StringDown 
- wlanLimit BooleanDown Enabled 
- If downlink limiting for whole wlan is enabled
- wlanLimit StringUp 
- wlanLimit BooleanUp Enabled 
- If uplink limiting for whole wlan is enabled
- wxtagIds List<String>
- List of wxtag_ids
- wxtunnelId String
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnelRemote StringId 
- When interface=wxtunnel, remote tunnel identifier
Outputs
All input properties are implicitly available as output properties. Additionally, the Wlan resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- MspId string
- OrgId string
- PortalApi stringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- PortalImage string
- Url of portal background image
- PortalSso stringUrl 
- Id string
- The provider-assigned unique ID for this managed resource.
- MspId string
- OrgId string
- PortalApi stringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- PortalImage string
- Url of portal background image
- PortalSso stringUrl 
- id String
- The provider-assigned unique ID for this managed resource.
- mspId String
- orgId String
- portalApi StringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portalImage String
- Url of portal background image
- portalSso StringUrl 
- id string
- The provider-assigned unique ID for this managed resource.
- mspId string
- orgId string
- portalApi stringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portalImage string
- Url of portal background image
- portalSso stringUrl 
- id str
- The provider-assigned unique ID for this managed resource.
- msp_id str
- org_id str
- portal_api_ strsecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portal_image str
- Url of portal background image
- portal_sso_ strurl 
- id String
- The provider-assigned unique ID for this managed resource.
- mspId String
- orgId String
- portalApi StringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portalImage String
- Url of portal background image
- portalSso StringUrl 
Look up Existing Wlan Resource
Get an existing Wlan resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: WlanState, opts?: CustomResourceOptions): Wlan@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        acct_immediate_update: Optional[bool] = None,
        acct_interim_interval: Optional[int] = None,
        acct_servers: Optional[Sequence[WlanAcctServerArgs]] = None,
        airwatch: Optional[WlanAirwatchArgs] = None,
        allow_ipv6_ndp: Optional[bool] = None,
        allow_mdns: Optional[bool] = None,
        allow_ssdp: Optional[bool] = None,
        ap_ids: Optional[Sequence[str]] = None,
        app_limit: Optional[WlanAppLimitArgs] = None,
        app_qos: Optional[WlanAppQosArgs] = None,
        apply_to: Optional[str] = None,
        arp_filter: Optional[bool] = None,
        auth: Optional[WlanAuthArgs] = None,
        auth_server_selection: Optional[str] = None,
        auth_servers: Optional[Sequence[WlanAuthServerArgs]] = None,
        auth_servers_nas_id: Optional[str] = None,
        auth_servers_nas_ip: Optional[str] = None,
        auth_servers_retries: Optional[int] = None,
        auth_servers_timeout: Optional[int] = None,
        band_steer: Optional[bool] = None,
        band_steer_force_band5: Optional[bool] = None,
        bands: Optional[Sequence[str]] = None,
        block_blacklist_clients: Optional[bool] = None,
        bonjour: Optional[WlanBonjourArgs] = None,
        cisco_cwa: Optional[WlanCiscoCwaArgs] = None,
        client_limit_down: Optional[str] = None,
        client_limit_down_enabled: Optional[bool] = None,
        client_limit_up: Optional[str] = None,
        client_limit_up_enabled: Optional[bool] = None,
        coa_servers: Optional[Sequence[WlanCoaServerArgs]] = None,
        disable11ax: Optional[bool] = None,
        disable11be: Optional[bool] = None,
        disable_ht_vht_rates: Optional[bool] = None,
        disable_uapsd: Optional[bool] = None,
        disable_v1_roam_notify: Optional[bool] = None,
        disable_v2_roam_notify: Optional[bool] = None,
        disable_when_gateway_unreachable: Optional[bool] = None,
        disable_when_mxtunnel_down: Optional[bool] = None,
        disable_wmm: Optional[bool] = None,
        dns_server_rewrite: Optional[WlanDnsServerRewriteArgs] = None,
        dtim: Optional[int] = None,
        dynamic_psk: Optional[WlanDynamicPskArgs] = None,
        dynamic_vlan: Optional[WlanDynamicVlanArgs] = None,
        enable_local_keycaching: Optional[bool] = None,
        enable_wireless_bridging: Optional[bool] = None,
        enable_wireless_bridging_dhcp_tracking: Optional[bool] = None,
        enabled: Optional[bool] = None,
        fast_dot1x_timers: Optional[bool] = None,
        hide_ssid: Optional[bool] = None,
        hostname_ie: Optional[bool] = None,
        hotspot20: Optional[WlanHotspot20Args] = None,
        inject_dhcp_option82: Optional[WlanInjectDhcpOption82Args] = None,
        interface: Optional[str] = None,
        isolation: Optional[bool] = None,
        l2_isolation: Optional[bool] = None,
        legacy_overds: Optional[bool] = None,
        limit_bcast: Optional[bool] = None,
        limit_probe_response: Optional[bool] = None,
        max_idletime: Optional[int] = None,
        max_num_clients: Optional[int] = None,
        mist_nac: Optional[WlanMistNacArgs] = None,
        msp_id: Optional[str] = None,
        mxtunnel_ids: Optional[Sequence[str]] = None,
        mxtunnel_names: Optional[Sequence[str]] = None,
        no_static_dns: Optional[bool] = None,
        no_static_ip: Optional[bool] = None,
        org_id: Optional[str] = None,
        portal: Optional[WlanPortalArgs] = None,
        portal_allowed_hostnames: Optional[Sequence[str]] = None,
        portal_allowed_subnets: Optional[Sequence[str]] = None,
        portal_api_secret: Optional[str] = None,
        portal_denied_hostnames: Optional[Sequence[str]] = None,
        portal_image: Optional[str] = None,
        portal_sso_url: Optional[str] = None,
        qos: Optional[WlanQosArgs] = None,
        radsec: Optional[WlanRadsecArgs] = None,
        rateset: Optional[Mapping[str, WlanRatesetArgs]] = None,
        reconnect_clients_when_roaming_mxcluster: Optional[bool] = None,
        roam_mode: Optional[str] = None,
        schedule: Optional[WlanScheduleArgs] = None,
        site_id: Optional[str] = None,
        sle_excluded: Optional[bool] = None,
        ssid: Optional[str] = None,
        use_eapol_v1: Optional[bool] = None,
        vlan_enabled: Optional[bool] = None,
        vlan_id: Optional[str] = None,
        vlan_ids: Optional[Sequence[str]] = None,
        vlan_pooling: Optional[bool] = None,
        wlan_limit_down: Optional[str] = None,
        wlan_limit_down_enabled: Optional[bool] = None,
        wlan_limit_up: Optional[str] = None,
        wlan_limit_up_enabled: Optional[bool] = None,
        wxtag_ids: Optional[Sequence[str]] = None,
        wxtunnel_id: Optional[str] = None,
        wxtunnel_remote_id: Optional[str] = None) -> Wlanfunc GetWlan(ctx *Context, name string, id IDInput, state *WlanState, opts ...ResourceOption) (*Wlan, error)public static Wlan Get(string name, Input<string> id, WlanState? state, CustomResourceOptions? opts = null)public static Wlan get(String name, Output<String> id, WlanState state, CustomResourceOptions options)resources:  _:    type: junipermist:site:Wlan    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- AcctImmediate boolUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- AcctInterim intInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- AcctServers List<Pulumi.Juniper Mist. Site. Inputs. Wlan Acct Server> 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- Airwatch
Pulumi.Juniper Mist. Site. Inputs. Wlan Airwatch 
- Airwatch wlan settings
- AllowIpv6Ndp bool
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- AllowMdns bool
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- AllowSsdp bool
- Only applicable when limit_bcast==true, which allows SSDP
- ApIds List<string>
- List of device ids
- AppLimit Pulumi.Juniper Mist. Site. Inputs. Wlan App Limit 
- Bandwidth limiting for apps (applies to up/down)
- AppQos Pulumi.Juniper Mist. Site. Inputs. Wlan App Qos 
- APp qos wlan settings
- ApplyTo string
- enum: aps,site,wxtags
- ArpFilter bool
- Whether to enable smart arp filter
- Auth
Pulumi.Juniper Mist. Site. Inputs. Wlan Auth 
- Authentication wlan settings
- AuthServer stringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- AuthServers List<Pulumi.Juniper Mist. Site. Inputs. Wlan Auth Server> 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- AuthServers stringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- AuthServers stringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- AuthServers intRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- AuthServers intTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- BandSteer bool
- Whether to enable band_steering, this works only when band==both
- BandSteer boolForce Band5 
- Force dual_band capable client to connect to 5G
- Bands List<string>
- list of radios that the wlan should apply to. enum: 24,5,6
- BlockBlacklist boolClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- Bonjour
Pulumi.Juniper Mist. Site. Inputs. Wlan Bonjour 
- Bonjour gateway wlan settings
- CiscoCwa Pulumi.Juniper Mist. Site. Inputs. Wlan Cisco Cwa 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- ClientLimit stringDown 
- ClientLimit boolDown Enabled 
- If downlink limiting per-client is enabled
- ClientLimit stringUp 
- ClientLimit boolUp Enabled 
- If uplink limiting per-client is enabled
- CoaServers List<Pulumi.Juniper Mist. Site. Inputs. Wlan Coa Server> 
- List of COA (change of authorization) servers, optional
- Disable11ax bool
- Some old WLAN drivers may not be compatible
- Disable11be bool
- To disable Wi-Fi 7 EHT IEs
- DisableHt boolVht Rates 
- To disable ht or vht rates
- DisableUapsd bool
- Whether to disable U-APSD
- DisableV1Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableV2Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableWhen boolGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- DisableWhen boolMxtunnel Down 
- DisableWmm bool
- Whether to disable WMM
- DnsServer Pulumi.Rewrite Juniper Mist. Site. Inputs. Wlan Dns Server Rewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- Dtim int
- DynamicPsk Pulumi.Juniper Mist. Site. Inputs. Wlan Dynamic Psk 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- DynamicVlan Pulumi.Juniper Mist. Site. Inputs. Wlan Dynamic Vlan 
- For 802.1x
- EnableLocal boolKeycaching 
- Enable AP-AP keycaching via multicast
- EnableWireless boolBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- EnableWireless boolBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- Enabled bool
- If this wlan is enabled
- FastDot1x boolTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- HideSsid bool
- Whether to hide SSID in beacon
- HostnameIe bool
- Include hostname inside IE in AP beacons / probe responses
- Hotspot20
Pulumi.Juniper Mist. Site. Inputs. Wlan Hotspot20 
- Hostspot 2.0 wlan settings
- InjectDhcp Pulumi.Option82 Juniper Mist. Site. Inputs. Wlan Inject Dhcp Option82 
- Interface string
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- Isolation bool
- Whether to stop clients to talk to each other
- L2Isolation bool
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- LegacyOverds bool
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- LimitBcast bool
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- LimitProbe boolResponse 
- Limit probe response base on some heuristic rules
- MaxIdletime int
- Max idle time in seconds
- MaxNum intClients 
- Maximum number of client connected to the SSID. 0means unlimited
- MistNac Pulumi.Juniper Mist. Site. Inputs. Wlan Mist Nac 
- MspId string
- MxtunnelIds List<string>
- When interface=mxtunnel, id of the Mist Tunnel
- MxtunnelNames List<string>
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- NoStatic boolDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- NoStatic boolIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- OrgId string
- Portal
Pulumi.Juniper Mist. Site. Inputs. Wlan Portal 
- Portal wlan settings
- PortalAllowed List<string>Hostnames 
- List of hostnames without http(s):// (matched by substring)
- PortalAllowed List<string>Subnets 
- List of CIDRs
- PortalApi stringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- PortalDenied List<string>Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- PortalImage string
- Url of portal background image
- PortalSso stringUrl 
- Qos
Pulumi.Juniper Mist. Site. Inputs. Wlan Qos 
- Radsec
Pulumi.Juniper Mist. Site. Inputs. Wlan Radsec 
- RadSec settings
- Rateset
Dictionary<string, Pulumi.Juniper Mist. Site. Inputs. Wlan Rateset Args> 
- Property key is the RF band. enum: 24,5,6
- ReconnectClients boolWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- RoamMode string
- enum: 11r,OKC,NONE
- Schedule
Pulumi.Juniper Mist. Site. Inputs. Wlan Schedule 
- WLAN operating schedule, default is disabled
- SiteId string
- SleExcluded bool
- Whether to exclude this WLAN from SLE metrics
- Ssid string
- Name of the SSID
- UseEapol boolV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- VlanEnabled bool
- If vlan tagging is enabled
- VlanId string
- VlanIds List<string>
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- VlanPooling bool
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- WlanLimit stringDown 
- WlanLimit boolDown Enabled 
- If downlink limiting for whole wlan is enabled
- WlanLimit stringUp 
- WlanLimit boolUp Enabled 
- If uplink limiting for whole wlan is enabled
- WxtagIds List<string>
- List of wxtag_ids
- WxtunnelId string
- When interface=wxtunnel, id of the WXLAN Tunnel
- WxtunnelRemote stringId 
- When interface=wxtunnel, remote tunnel identifier
- AcctImmediate boolUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- AcctInterim intInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- AcctServers []WlanAcct Server Args 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- Airwatch
WlanAirwatch Args 
- Airwatch wlan settings
- AllowIpv6Ndp bool
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- AllowMdns bool
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- AllowSsdp bool
- Only applicable when limit_bcast==true, which allows SSDP
- ApIds []string
- List of device ids
- AppLimit WlanApp Limit Args 
- Bandwidth limiting for apps (applies to up/down)
- AppQos WlanApp Qos Args 
- APp qos wlan settings
- ApplyTo string
- enum: aps,site,wxtags
- ArpFilter bool
- Whether to enable smart arp filter
- Auth
WlanAuth Args 
- Authentication wlan settings
- AuthServer stringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- AuthServers []WlanAuth Server Args 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- AuthServers stringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- AuthServers stringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- AuthServers intRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- AuthServers intTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- BandSteer bool
- Whether to enable band_steering, this works only when band==both
- BandSteer boolForce Band5 
- Force dual_band capable client to connect to 5G
- Bands []string
- list of radios that the wlan should apply to. enum: 24,5,6
- BlockBlacklist boolClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- Bonjour
WlanBonjour Args 
- Bonjour gateway wlan settings
- CiscoCwa WlanCisco Cwa Args 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- ClientLimit stringDown 
- ClientLimit boolDown Enabled 
- If downlink limiting per-client is enabled
- ClientLimit stringUp 
- ClientLimit boolUp Enabled 
- If uplink limiting per-client is enabled
- CoaServers []WlanCoa Server Args 
- List of COA (change of authorization) servers, optional
- Disable11ax bool
- Some old WLAN drivers may not be compatible
- Disable11be bool
- To disable Wi-Fi 7 EHT IEs
- DisableHt boolVht Rates 
- To disable ht or vht rates
- DisableUapsd bool
- Whether to disable U-APSD
- DisableV1Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableV2Roam boolNotify 
- Disable sending v2 roam notification messages
- DisableWhen boolGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- DisableWhen boolMxtunnel Down 
- DisableWmm bool
- Whether to disable WMM
- DnsServer WlanRewrite Dns Server Rewrite Args 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- Dtim int
- DynamicPsk WlanDynamic Psk Args 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- DynamicVlan WlanDynamic Vlan Args 
- For 802.1x
- EnableLocal boolKeycaching 
- Enable AP-AP keycaching via multicast
- EnableWireless boolBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- EnableWireless boolBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- Enabled bool
- If this wlan is enabled
- FastDot1x boolTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- HideSsid bool
- Whether to hide SSID in beacon
- HostnameIe bool
- Include hostname inside IE in AP beacons / probe responses
- Hotspot20
WlanHotspot20Args 
- Hostspot 2.0 wlan settings
- InjectDhcp WlanOption82 Inject Dhcp Option82Args 
- Interface string
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- Isolation bool
- Whether to stop clients to talk to each other
- L2Isolation bool
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- LegacyOverds bool
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- LimitBcast bool
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- LimitProbe boolResponse 
- Limit probe response base on some heuristic rules
- MaxIdletime int
- Max idle time in seconds
- MaxNum intClients 
- Maximum number of client connected to the SSID. 0means unlimited
- MistNac WlanMist Nac Args 
- MspId string
- MxtunnelIds []string
- When interface=mxtunnel, id of the Mist Tunnel
- MxtunnelNames []string
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- NoStatic boolDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- NoStatic boolIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- OrgId string
- Portal
WlanPortal Args 
- Portal wlan settings
- PortalAllowed []stringHostnames 
- List of hostnames without http(s):// (matched by substring)
- PortalAllowed []stringSubnets 
- List of CIDRs
- PortalApi stringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- PortalDenied []stringHostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- PortalImage string
- Url of portal background image
- PortalSso stringUrl 
- Qos
WlanQos Args 
- Radsec
WlanRadsec Args 
- RadSec settings
- Rateset
map[string]WlanRateset Args 
- Property key is the RF band. enum: 24,5,6
- ReconnectClients boolWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- RoamMode string
- enum: 11r,OKC,NONE
- Schedule
WlanSchedule Args 
- WLAN operating schedule, default is disabled
- SiteId string
- SleExcluded bool
- Whether to exclude this WLAN from SLE metrics
- Ssid string
- Name of the SSID
- UseEapol boolV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- VlanEnabled bool
- If vlan tagging is enabled
- VlanId string
- VlanIds []string
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- VlanPooling bool
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- WlanLimit stringDown 
- WlanLimit boolDown Enabled 
- If downlink limiting for whole wlan is enabled
- WlanLimit stringUp 
- WlanLimit boolUp Enabled 
- If uplink limiting for whole wlan is enabled
- WxtagIds []string
- List of wxtag_ids
- WxtunnelId string
- When interface=wxtunnel, id of the WXLAN Tunnel
- WxtunnelRemote stringId 
- When interface=wxtunnel, remote tunnel identifier
- acctImmediate BooleanUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acctInterim IntegerInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acctServers List<WlanAcct Server> 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch
WlanAirwatch 
- Airwatch wlan settings
- allowIpv6Ndp Boolean
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allowMdns Boolean
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allowSsdp Boolean
- Only applicable when limit_bcast==true, which allows SSDP
- apIds List<String>
- List of device ids
- appLimit WlanApp Limit 
- Bandwidth limiting for apps (applies to up/down)
- appQos WlanApp Qos 
- APp qos wlan settings
- applyTo String
- enum: aps,site,wxtags
- arpFilter Boolean
- Whether to enable smart arp filter
- auth
WlanAuth 
- Authentication wlan settings
- authServer StringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- authServers List<WlanAuth Server> 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- authServers StringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- authServers StringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- authServers IntegerRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- authServers IntegerTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- bandSteer Boolean
- Whether to enable band_steering, this works only when band==both
- bandSteer BooleanForce Band5 
- Force dual_band capable client to connect to 5G
- bands List<String>
- list of radios that the wlan should apply to. enum: 24,5,6
- blockBlacklist BooleanClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour
WlanBonjour 
- Bonjour gateway wlan settings
- ciscoCwa WlanCisco Cwa 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- clientLimit StringDown 
- clientLimit BooleanDown Enabled 
- If downlink limiting per-client is enabled
- clientLimit StringUp 
- clientLimit BooleanUp Enabled 
- If uplink limiting per-client is enabled
- coaServers List<WlanCoa Server> 
- List of COA (change of authorization) servers, optional
- disable11ax Boolean
- Some old WLAN drivers may not be compatible
- disable11be Boolean
- To disable Wi-Fi 7 EHT IEs
- disableHt BooleanVht Rates 
- To disable ht or vht rates
- disableUapsd Boolean
- Whether to disable U-APSD
- disableV1Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableV2Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableWhen BooleanGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disableWhen BooleanMxtunnel Down 
- disableWmm Boolean
- Whether to disable WMM
- dnsServer WlanRewrite Dns Server Rewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim Integer
- dynamicPsk WlanDynamic Psk 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamicVlan WlanDynamic Vlan 
- For 802.1x
- enableLocal BooleanKeycaching 
- Enable AP-AP keycaching via multicast
- enableWireless BooleanBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enableWireless BooleanBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled Boolean
- If this wlan is enabled
- fastDot1x BooleanTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hideSsid Boolean
- Whether to hide SSID in beacon
- hostnameIe Boolean
- Include hostname inside IE in AP beacons / probe responses
- hotspot20
WlanHotspot20 
- Hostspot 2.0 wlan settings
- injectDhcp WlanOption82 Inject Dhcp Option82 
- interface_ String
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation Boolean
- Whether to stop clients to talk to each other
- l2Isolation Boolean
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacyOverds Boolean
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limitBcast Boolean
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limitProbe BooleanResponse 
- Limit probe response base on some heuristic rules
- maxIdletime Integer
- Max idle time in seconds
- maxNum IntegerClients 
- Maximum number of client connected to the SSID. 0means unlimited
- mistNac WlanMist Nac 
- mspId String
- mxtunnelIds List<String>
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnelNames List<String>
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- noStatic BooleanDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- noStatic BooleanIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- orgId String
- portal
WlanPortal 
- Portal wlan settings
- portalAllowed List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring)
- portalAllowed List<String>Subnets 
- List of CIDRs
- portalApi StringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portalDenied List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- portalImage String
- Url of portal background image
- portalSso StringUrl 
- qos
WlanQos 
- radsec
WlanRadsec 
- RadSec settings
- rateset
Map<String,WlanRateset Args> 
- Property key is the RF band. enum: 24,5,6
- reconnectClients BooleanWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roamMode String
- enum: 11r,OKC,NONE
- schedule
WlanSchedule 
- WLAN operating schedule, default is disabled
- siteId String
- sleExcluded Boolean
- Whether to exclude this WLAN from SLE metrics
- ssid String
- Name of the SSID
- useEapol BooleanV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlanEnabled Boolean
- If vlan tagging is enabled
- vlanId String
- vlanIds List<String>
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlanPooling Boolean
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlanLimit StringDown 
- wlanLimit BooleanDown Enabled 
- If downlink limiting for whole wlan is enabled
- wlanLimit StringUp 
- wlanLimit BooleanUp Enabled 
- If uplink limiting for whole wlan is enabled
- wxtagIds List<String>
- List of wxtag_ids
- wxtunnelId String
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnelRemote StringId 
- When interface=wxtunnel, remote tunnel identifier
- acctImmediate booleanUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acctInterim numberInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acctServers WlanAcct Server[] 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch
WlanAirwatch 
- Airwatch wlan settings
- allowIpv6Ndp boolean
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allowMdns boolean
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allowSsdp boolean
- Only applicable when limit_bcast==true, which allows SSDP
- apIds string[]
- List of device ids
- appLimit WlanApp Limit 
- Bandwidth limiting for apps (applies to up/down)
- appQos WlanApp Qos 
- APp qos wlan settings
- applyTo string
- enum: aps,site,wxtags
- arpFilter boolean
- Whether to enable smart arp filter
- auth
WlanAuth 
- Authentication wlan settings
- authServer stringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- authServers WlanAuth Server[] 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- authServers stringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- authServers stringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- authServers numberRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- authServers numberTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- bandSteer boolean
- Whether to enable band_steering, this works only when band==both
- bandSteer booleanForce Band5 
- Force dual_band capable client to connect to 5G
- bands string[]
- list of radios that the wlan should apply to. enum: 24,5,6
- blockBlacklist booleanClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour
WlanBonjour 
- Bonjour gateway wlan settings
- ciscoCwa WlanCisco Cwa 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- clientLimit stringDown 
- clientLimit booleanDown Enabled 
- If downlink limiting per-client is enabled
- clientLimit stringUp 
- clientLimit booleanUp Enabled 
- If uplink limiting per-client is enabled
- coaServers WlanCoa Server[] 
- List of COA (change of authorization) servers, optional
- disable11ax boolean
- Some old WLAN drivers may not be compatible
- disable11be boolean
- To disable Wi-Fi 7 EHT IEs
- disableHt booleanVht Rates 
- To disable ht or vht rates
- disableUapsd boolean
- Whether to disable U-APSD
- disableV1Roam booleanNotify 
- Disable sending v2 roam notification messages
- disableV2Roam booleanNotify 
- Disable sending v2 roam notification messages
- disableWhen booleanGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disableWhen booleanMxtunnel Down 
- disableWmm boolean
- Whether to disable WMM
- dnsServer WlanRewrite Dns Server Rewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim number
- dynamicPsk WlanDynamic Psk 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamicVlan WlanDynamic Vlan 
- For 802.1x
- enableLocal booleanKeycaching 
- Enable AP-AP keycaching via multicast
- enableWireless booleanBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enableWireless booleanBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled boolean
- If this wlan is enabled
- fastDot1x booleanTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hideSsid boolean
- Whether to hide SSID in beacon
- hostnameIe boolean
- Include hostname inside IE in AP beacons / probe responses
- hotspot20
WlanHotspot20 
- Hostspot 2.0 wlan settings
- injectDhcp WlanOption82 Inject Dhcp Option82 
- interface string
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation boolean
- Whether to stop clients to talk to each other
- l2Isolation boolean
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacyOverds boolean
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limitBcast boolean
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limitProbe booleanResponse 
- Limit probe response base on some heuristic rules
- maxIdletime number
- Max idle time in seconds
- maxNum numberClients 
- Maximum number of client connected to the SSID. 0means unlimited
- mistNac WlanMist Nac 
- mspId string
- mxtunnelIds string[]
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnelNames string[]
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- noStatic booleanDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- noStatic booleanIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- orgId string
- portal
WlanPortal 
- Portal wlan settings
- portalAllowed string[]Hostnames 
- List of hostnames without http(s):// (matched by substring)
- portalAllowed string[]Subnets 
- List of CIDRs
- portalApi stringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portalDenied string[]Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- portalImage string
- Url of portal background image
- portalSso stringUrl 
- qos
WlanQos 
- radsec
WlanRadsec 
- RadSec settings
- rateset
{[key: string]: WlanRateset Args} 
- Property key is the RF band. enum: 24,5,6
- reconnectClients booleanWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roamMode string
- enum: 11r,OKC,NONE
- schedule
WlanSchedule 
- WLAN operating schedule, default is disabled
- siteId string
- sleExcluded boolean
- Whether to exclude this WLAN from SLE metrics
- ssid string
- Name of the SSID
- useEapol booleanV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlanEnabled boolean
- If vlan tagging is enabled
- vlanId string
- vlanIds string[]
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlanPooling boolean
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlanLimit stringDown 
- wlanLimit booleanDown Enabled 
- If downlink limiting for whole wlan is enabled
- wlanLimit stringUp 
- wlanLimit booleanUp Enabled 
- If uplink limiting for whole wlan is enabled
- wxtagIds string[]
- List of wxtag_ids
- wxtunnelId string
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnelRemote stringId 
- When interface=wxtunnel, remote tunnel identifier
- acct_immediate_ boolupdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acct_interim_ intinterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acct_servers Sequence[WlanAcct Server Args] 
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch
WlanAirwatch Args 
- Airwatch wlan settings
- allow_ipv6_ boolndp 
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allow_mdns bool
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allow_ssdp bool
- Only applicable when limit_bcast==true, which allows SSDP
- ap_ids Sequence[str]
- List of device ids
- app_limit WlanApp Limit Args 
- Bandwidth limiting for apps (applies to up/down)
- app_qos WlanApp Qos Args 
- APp qos wlan settings
- apply_to str
- enum: aps,site,wxtags
- arp_filter bool
- Whether to enable smart arp filter
- auth
WlanAuth Args 
- Authentication wlan settings
- auth_server_ strselection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- auth_servers Sequence[WlanAuth Server Args] 
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- auth_servers_ strnas_ id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- auth_servers_ strnas_ ip 
- Optional, NAS-IP-ADDRESS to use
- auth_servers_ intretries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- auth_servers_ inttimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- band_steer bool
- Whether to enable band_steering, this works only when band==both
- band_steer_ boolforce_ band5 
- Force dual_band capable client to connect to 5G
- bands Sequence[str]
- list of radios that the wlan should apply to. enum: 24,5,6
- block_blacklist_ boolclients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour
WlanBonjour Args 
- Bonjour gateway wlan settings
- cisco_cwa WlanCisco Cwa Args 
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- client_limit_ strdown 
- client_limit_ booldown_ enabled 
- If downlink limiting per-client is enabled
- client_limit_ strup 
- client_limit_ boolup_ enabled 
- If uplink limiting per-client is enabled
- coa_servers Sequence[WlanCoa Server Args] 
- List of COA (change of authorization) servers, optional
- disable11ax bool
- Some old WLAN drivers may not be compatible
- disable11be bool
- To disable Wi-Fi 7 EHT IEs
- disable_ht_ boolvht_ rates 
- To disable ht or vht rates
- disable_uapsd bool
- Whether to disable U-APSD
- disable_v1_ boolroam_ notify 
- Disable sending v2 roam notification messages
- disable_v2_ boolroam_ notify 
- Disable sending v2 roam notification messages
- disable_when_ boolgateway_ unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disable_when_ boolmxtunnel_ down 
- disable_wmm bool
- Whether to disable WMM
- dns_server_ Wlanrewrite Dns Server Rewrite Args 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim int
- dynamic_psk WlanDynamic Psk Args 
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamic_vlan WlanDynamic Vlan Args 
- For 802.1x
- enable_local_ boolkeycaching 
- Enable AP-AP keycaching via multicast
- enable_wireless_ boolbridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enable_wireless_ boolbridging_ dhcp_ tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled bool
- If this wlan is enabled
- fast_dot1x_ booltimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hide_ssid bool
- Whether to hide SSID in beacon
- hostname_ie bool
- Include hostname inside IE in AP beacons / probe responses
- hotspot20
WlanHotspot20Args 
- Hostspot 2.0 wlan settings
- inject_dhcp_ Wlanoption82 Inject Dhcp Option82Args 
- interface str
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation bool
- Whether to stop clients to talk to each other
- l2_isolation bool
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacy_overds bool
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limit_bcast bool
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limit_probe_ boolresponse 
- Limit probe response base on some heuristic rules
- max_idletime int
- Max idle time in seconds
- max_num_ intclients 
- Maximum number of client connected to the SSID. 0means unlimited
- mist_nac WlanMist Nac Args 
- msp_id str
- mxtunnel_ids Sequence[str]
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnel_names Sequence[str]
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- no_static_ booldns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- no_static_ boolip 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- org_id str
- portal
WlanPortal Args 
- Portal wlan settings
- portal_allowed_ Sequence[str]hostnames 
- List of hostnames without http(s):// (matched by substring)
- portal_allowed_ Sequence[str]subnets 
- List of CIDRs
- portal_api_ strsecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portal_denied_ Sequence[str]hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- portal_image str
- Url of portal background image
- portal_sso_ strurl 
- qos
WlanQos Args 
- radsec
WlanRadsec Args 
- RadSec settings
- rateset
Mapping[str, WlanRateset Args] 
- Property key is the RF band. enum: 24,5,6
- reconnect_clients_ boolwhen_ roaming_ mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roam_mode str
- enum: 11r,OKC,NONE
- schedule
WlanSchedule Args 
- WLAN operating schedule, default is disabled
- site_id str
- sle_excluded bool
- Whether to exclude this WLAN from SLE metrics
- ssid str
- Name of the SSID
- use_eapol_ boolv1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlan_enabled bool
- If vlan tagging is enabled
- vlan_id str
- vlan_ids Sequence[str]
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlan_pooling bool
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlan_limit_ strdown 
- wlan_limit_ booldown_ enabled 
- If downlink limiting for whole wlan is enabled
- wlan_limit_ strup 
- wlan_limit_ boolup_ enabled 
- If uplink limiting for whole wlan is enabled
- wxtag_ids Sequence[str]
- List of wxtag_ids
- wxtunnel_id str
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnel_remote_ strid 
- When interface=wxtunnel, remote tunnel identifier
- acctImmediate BooleanUpdate 
- Enable coa-immediate-update and address-change-immediate-update on the access profile.
- acctInterim NumberInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from RADIUS Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled
- acctServers List<Property Map>
- List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
- airwatch Property Map
- Airwatch wlan settings
- allowIpv6Ndp Boolean
- Only applicable when limit_bcast==true, which allows or disallows ipv6 Neighbor Discovery packets to go through
- allowMdns Boolean
- Only applicable when limit_bcast==true, which allows mDNS / Bonjour packets to go through
- allowSsdp Boolean
- Only applicable when limit_bcast==true, which allows SSDP
- apIds List<String>
- List of device ids
- appLimit Property Map
- Bandwidth limiting for apps (applies to up/down)
- appQos Property Map
- APp qos wlan settings
- applyTo String
- enum: aps,site,wxtags
- arpFilter Boolean
- Whether to enable smart arp filter
- auth Property Map
- Authentication wlan settings
- authServer StringSelection 
- When ordered, AP will prefer and go back to the first server if possible. enum: ordered,unordered
- authServers List<Property Map>
- List of RADIUS authentication servers, at least one is needed if auth type==eap, order matters where the first one is treated as primary
- authServers StringNas Id 
- Optional, up to 48 bytes, will be dynamically generated if not provided. used only for authentication servers
- authServers StringNas Ip 
- Optional, NAS-IP-ADDRESS to use
- authServers NumberRetries 
- Radius auth session retries. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘retries’ are set to value of auth_servers_retries. ‘max-requests’ is also set when setting auth_servers_retries and is set to default value to 3.
- authServers NumberTimeout 
- Radius auth session timeout. Following fast timers are set if "fast_dot1x_timers" knob is enabled. ‘quite-period’ and ‘transmit-period’ are set to half the value of auth_servers_timeout. ‘supplicant-timeout’ is also set when setting auth_servers_timeout and is set to default value of 10.
- bandSteer Boolean
- Whether to enable band_steering, this works only when band==both
- bandSteer BooleanForce Band5 
- Force dual_band capable client to connect to 5G
- bands List<String>
- list of radios that the wlan should apply to. enum: 24,5,6
- blockBlacklist BooleanClients 
- Whether to block the clients in the blacklist (up to first 256 macs)
- bonjour Property Map
- Bonjour gateway wlan settings
- ciscoCwa Property Map
- Cisco CWA (central web authentication) required RADIUS with COA in order to work. See CWA: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/115732-central-web-auth-00.html
- clientLimit StringDown 
- clientLimit BooleanDown Enabled 
- If downlink limiting per-client is enabled
- clientLimit StringUp 
- clientLimit BooleanUp Enabled 
- If uplink limiting per-client is enabled
- coaServers List<Property Map>
- List of COA (change of authorization) servers, optional
- disable11ax Boolean
- Some old WLAN drivers may not be compatible
- disable11be Boolean
- To disable Wi-Fi 7 EHT IEs
- disableHt BooleanVht Rates 
- To disable ht or vht rates
- disableUapsd Boolean
- Whether to disable U-APSD
- disableV1Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableV2Roam BooleanNotify 
- Disable sending v2 roam notification messages
- disableWhen BooleanGateway Unreachable 
- When any of the following is true, this WLAN will be disabled- cannot get IP
- cannot obtain default gateway
- cannot reach default gateway
 
- disableWhen BooleanMxtunnel Down 
- disableWmm Boolean
- Whether to disable WMM
- dnsServer Property MapRewrite 
- For radius_group-based DNS server (rewrite DNS request depending on the Group RADIUS server returns)
- dtim Number
- dynamicPsk Property Map
- For dynamic PSK where we get per_user PSK from Radius. dynamic_psk allows PSK to be selected at runtime depending on context (wlan/site/user/...) thus following configurations are assumed (currently)- PSK will come from RADIUS server
- AP sends client MAC as username and password (i.e. enable_mac_authis assumed)
- AP sends BSSID:SSID as Caller-Station-ID
- auth_serversis required
- PSK will come from cloud WLC if source is cloud_psks
- default_psk will be used if cloud WLC is not available
- multi_psk_onlyand- pskis ignored
- pairwisecan only be wpa2-ccmp (for now, wpa3 support on the roadmap)
 
- dynamicVlan Property Map
- For 802.1x
- enableLocal BooleanKeycaching 
- Enable AP-AP keycaching via multicast
- enableWireless BooleanBridging 
- By default, we'd inspect all DHCP packets and drop those unrelated to the wireless client itself in the case where client is a wireless bridge (DHCP packets for other MACs will need to be forwarded), wireless_bridging can be enabled
- enableWireless BooleanBridging Dhcp Tracking 
- If the client bridge is doing DHCP on behalf of other devices (L2-NAT), enable dhcp_tracking will cut down DHCP response packets to be forwarded to wireless
- enabled Boolean
- If this wlan is enabled
- fastDot1x BooleanTimers 
- If set to true, sets default fast-timers with values calculated from ‘auth_servers_timeout’ and ‘auth_server_retries’ .
- hideSsid Boolean
- Whether to hide SSID in beacon
- hostnameIe Boolean
- Include hostname inside IE in AP beacons / probe responses
- hotspot20 Property Map
- Hostspot 2.0 wlan settings
- injectDhcp Property MapOption82 
- interface String
- where this WLAN will be connected to. enum: all,eth0,eth1,eth2,eth3,mxtunnel,site_mxedge,wxtunnel
- isolation Boolean
- Whether to stop clients to talk to each other
- l2Isolation Boolean
- If isolation is enabled, whether to deny clients to talk to L2 on the LAN
- legacyOverds Boolean
- Legacy devices requires the Over-DS (for Fast BSS Transition) bit set (while our chip doesn’t support it). Warning! Enabling this will cause problem for iOS devices.
- limitBcast Boolean
- Whether to limit broadcast packets going to wireless (i.e. only allow certain bcast packets to go through)
- limitProbe BooleanResponse 
- Limit probe response base on some heuristic rules
- maxIdletime Number
- Max idle time in seconds
- maxNum NumberClients 
- Maximum number of client connected to the SSID. 0means unlimited
- mistNac Property Map
- mspId String
- mxtunnelIds List<String>
- When interface=mxtunnel, id of the Mist Tunnel
- mxtunnelNames List<String>
- When interface=site_mxedge, name of the mxtunnel that in mxtunnels under Site Setting
- noStatic BooleanDns 
- Whether to only allow client to use DNS that we’ve learned from DHCP response
- noStatic BooleanIp 
- Whether to only allow client that we’ve learned from DHCP exchange to talk
- orgId String
- portal Property Map
- Portal wlan settings
- portalAllowed List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring)
- portalAllowed List<String>Subnets 
- List of CIDRs
- portalApi StringSecret 
- APi secret (auto-generated) that can be used to sign guest authorization requests
- portalDenied List<String>Hostnames 
- List of hostnames without http(s):// (matched by substring), this takes precedence over portal_allowed_hostnames
- portalImage String
- Url of portal background image
- portalSso StringUrl 
- qos Property Map
- radsec Property Map
- RadSec settings
- rateset Map<Property Map>
- Property key is the RF band. enum: 24,5,6
- reconnectClients BooleanWhen Roaming Mxcluster 
- When different mxcluster is on different subnet, we'd want to disconnect clients (so they'll reconnect and get new IPs)
- roamMode String
- enum: 11r,OKC,NONE
- schedule Property Map
- WLAN operating schedule, default is disabled
- siteId String
- sleExcluded Boolean
- Whether to exclude this WLAN from SLE metrics
- ssid String
- Name of the SSID
- useEapol BooleanV1 
- If auth.type==eaporauth.type==psk, should only be set for legacy client, such as pre-2004, 802.11b devices
- vlanEnabled Boolean
- If vlan tagging is enabled
- vlanId String
- vlanIds List<String>
- if vlan_enabled==trueandvlan_pooling==true. List of VLAN IDs (comma separated) to be used in the VLAN Pool
- vlanPooling Boolean
- Requires vlan_enabled==trueto be set totrue. Vlan pooling allows AP to place client on different VLAN using a deterministic algorithm
- wlanLimit StringDown 
- wlanLimit BooleanDown Enabled 
- If downlink limiting for whole wlan is enabled
- wlanLimit StringUp 
- wlanLimit BooleanUp Enabled 
- If uplink limiting for whole wlan is enabled
- wxtagIds List<String>
- List of wxtag_ids
- wxtunnelId String
- When interface=wxtunnel, id of the WXLAN Tunnel
- wxtunnelRemote StringId 
- When interface=wxtunnel, remote tunnel identifier
Supporting Types
WlanAcctServer, WlanAcctServerArgs      
- Host string
- IP/ hostname of RADIUS server
- Secret string
- Secret of RADIUS server
- KeywrapEnabled bool
- KeywrapFormat string
- enum: ascii,hex
- KeywrapKek string
- KeywrapMack string
- Port string
- Host string
- IP/ hostname of RADIUS server
- Secret string
- Secret of RADIUS server
- KeywrapEnabled bool
- KeywrapFormat string
- enum: ascii,hex
- KeywrapKek string
- KeywrapMack string
- Port string
- host String
- IP/ hostname of RADIUS server
- secret String
- Secret of RADIUS server
- keywrapEnabled Boolean
- keywrapFormat String
- enum: ascii,hex
- keywrapKek String
- keywrapMack String
- port String
- host string
- IP/ hostname of RADIUS server
- secret string
- Secret of RADIUS server
- keywrapEnabled boolean
- keywrapFormat string
- enum: ascii,hex
- keywrapKek string
- keywrapMack string
- port string
- host str
- IP/ hostname of RADIUS server
- secret str
- Secret of RADIUS server
- keywrap_enabled bool
- keywrap_format str
- enum: ascii,hex
- keywrap_kek str
- keywrap_mack str
- port str
- host String
- IP/ hostname of RADIUS server
- secret String
- Secret of RADIUS server
- keywrapEnabled Boolean
- keywrapFormat String
- enum: ascii,hex
- keywrapKek String
- keywrapMack String
- port String
WlanAirwatch, WlanAirwatchArgs    
- ApiKey string
- API Key
- ConsoleUrl string
- Console URL
- Enabled bool
- Password string
- Password
- Username string
- Username
- ApiKey string
- API Key
- ConsoleUrl string
- Console URL
- Enabled bool
- Password string
- Password
- Username string
- Username
- apiKey String
- API Key
- consoleUrl String
- Console URL
- enabled Boolean
- password String
- Password
- username String
- Username
- apiKey string
- API Key
- consoleUrl string
- Console URL
- enabled boolean
- password string
- Password
- username string
- Username
- api_key str
- API Key
- console_url str
- Console URL
- enabled bool
- password str
- Password
- username str
- Username
- apiKey String
- API Key
- consoleUrl String
- Console URL
- enabled Boolean
- password String
- Password
- username String
- Username
WlanAppLimit, WlanAppLimitArgs      
WlanAppQos, WlanAppQosArgs      
- Apps
Dictionary<string, Pulumi.Juniper Mist. Site. Inputs. Wlan App Qos Apps> 
- Enabled bool
- Others
List<Pulumi.Juniper Mist. Site. Inputs. Wlan App Qos Other> 
- Apps
map[string]WlanApp Qos Apps 
- Enabled bool
- Others
[]WlanApp Qos Other 
- apps
Map<String,WlanApp Qos Apps> 
- enabled Boolean
- others
List<WlanApp Qos Other> 
- apps
{[key: string]: WlanApp Qos Apps} 
- enabled boolean
- others
WlanApp Qos Other[] 
- apps
Mapping[str, WlanApp Qos Apps] 
- enabled bool
- others
Sequence[WlanApp Qos Other] 
- apps Map<Property Map>
- enabled Boolean
- others List<Property Map>
WlanAppQosApps, WlanAppQosAppsArgs        
- dscp str
- DSCP value range between 0 and 63
- dst_subnet str
- Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
- src_subnet str
- Subnet filter is not required but helps AP to only inspect certain traffic (thus reducing AP load)
WlanAppQosOther, WlanAppQosOtherArgs        
- Dscp string
- DstSubnet string
- PortRanges string
- Protocol string
- SrcSubnet string
- Dscp string
- DstSubnet string
- PortRanges string
- Protocol string
- SrcSubnet string
- dscp String
- dstSubnet String
- portRanges String
- protocol String
- srcSubnet String
- dscp string
- dstSubnet string
- portRanges string
- protocol string
- srcSubnet string
- dscp str
- dst_subnet str
- port_ranges str
- protocol str
- src_subnet str
- dscp String
- dstSubnet String
- portRanges String
- protocol String
- srcSubnet String
WlanAuth, WlanAuthArgs    
- AnticlogThreshold int
- SAE anti-clogging token threshold
- EapReauth bool
- Whether to trigger EAP reauth when the session ends
- EnableMac boolAuth 
- Whether to enable MAC Auth, uses the same auth_servers
- KeyIdx int
- When type==wep
- Keys List<string>
- When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
- MultiPsk boolOnly 
- When type==psk, whether to only use multi_psk
- Owe string
- if type==open. enum:disabled,enabled(means transition mode),required
- Pairwises List<string>
- When type=pskortype=eap, one or more ofwpa1-ccmp,wpa1-tkip,wpa2-ccmp,wpa2-tkip,wpa3
- PrivateWlan bool
- When multi_psk_only==true, whether private wlan is enabled
- Psk string
- When type==psk, 8-64 characters, or 64 hex characters
- Type string
- enum: eap,eap192,open,psk,psk-tkip,psk-wpa2-tkip,wep
- WepAs boolSecondary Auth 
- Enable WEP as secondary auth
- AnticlogThreshold int
- SAE anti-clogging token threshold
- EapReauth bool
- Whether to trigger EAP reauth when the session ends
- EnableMac boolAuth 
- Whether to enable MAC Auth, uses the same auth_servers
- KeyIdx int
- When type==wep
- Keys []string
- When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
- MultiPsk boolOnly 
- When type==psk, whether to only use multi_psk
- Owe string
- if type==open. enum:disabled,enabled(means transition mode),required
- Pairwises []string
- When type=pskortype=eap, one or more ofwpa1-ccmp,wpa1-tkip,wpa2-ccmp,wpa2-tkip,wpa3
- PrivateWlan bool
- When multi_psk_only==true, whether private wlan is enabled
- Psk string
- When type==psk, 8-64 characters, or 64 hex characters
- Type string
- enum: eap,eap192,open,psk,psk-tkip,psk-wpa2-tkip,wep
- WepAs boolSecondary Auth 
- Enable WEP as secondary auth
- anticlogThreshold Integer
- SAE anti-clogging token threshold
- eapReauth Boolean
- Whether to trigger EAP reauth when the session ends
- enableMac BooleanAuth 
- Whether to enable MAC Auth, uses the same auth_servers
- keyIdx Integer
- When type==wep
- keys List<String>
- When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
- multiPsk BooleanOnly 
- When type==psk, whether to only use multi_psk
- owe String
- if type==open. enum:disabled,enabled(means transition mode),required
- pairwises List<String>
- When type=pskortype=eap, one or more ofwpa1-ccmp,wpa1-tkip,wpa2-ccmp,wpa2-tkip,wpa3
- privateWlan Boolean
- When multi_psk_only==true, whether private wlan is enabled
- psk String
- When type==psk, 8-64 characters, or 64 hex characters
- type String
- enum: eap,eap192,open,psk,psk-tkip,psk-wpa2-tkip,wep
- wepAs BooleanSecondary Auth 
- Enable WEP as secondary auth
- anticlogThreshold number
- SAE anti-clogging token threshold
- eapReauth boolean
- Whether to trigger EAP reauth when the session ends
- enableMac booleanAuth 
- Whether to enable MAC Auth, uses the same auth_servers
- keyIdx number
- When type==wep
- keys string[]
- When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
- multiPsk booleanOnly 
- When type==psk, whether to only use multi_psk
- owe string
- if type==open. enum:disabled,enabled(means transition mode),required
- pairwises string[]
- When type=pskortype=eap, one or more ofwpa1-ccmp,wpa1-tkip,wpa2-ccmp,wpa2-tkip,wpa3
- privateWlan boolean
- When multi_psk_only==true, whether private wlan is enabled
- psk string
- When type==psk, 8-64 characters, or 64 hex characters
- type string
- enum: eap,eap192,open,psk,psk-tkip,psk-wpa2-tkip,wep
- wepAs booleanSecondary Auth 
- Enable WEP as secondary auth
- anticlog_threshold int
- SAE anti-clogging token threshold
- eap_reauth bool
- Whether to trigger EAP reauth when the session ends
- enable_mac_ boolauth 
- Whether to enable MAC Auth, uses the same auth_servers
- key_idx int
- When type==wep
- keys Sequence[str]
- When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
- multi_psk_ boolonly 
- When type==psk, whether to only use multi_psk
- owe str
- if type==open. enum:disabled,enabled(means transition mode),required
- pairwises Sequence[str]
- When type=pskortype=eap, one or more ofwpa1-ccmp,wpa1-tkip,wpa2-ccmp,wpa2-tkip,wpa3
- private_wlan bool
- When multi_psk_only==true, whether private wlan is enabled
- psk str
- When type==psk, 8-64 characters, or 64 hex characters
- type str
- enum: eap,eap192,open,psk,psk-tkip,psk-wpa2-tkip,wep
- wep_as_ boolsecondary_ auth 
- Enable WEP as secondary auth
- anticlogThreshold Number
- SAE anti-clogging token threshold
- eapReauth Boolean
- Whether to trigger EAP reauth when the session ends
- enableMac BooleanAuth 
- Whether to enable MAC Auth, uses the same auth_servers
- keyIdx Number
- When type==wep
- keys List<String>
- When type=wep, four 10-character or 26-character hex string, null can be used. All keys, if provided, have to be in the same length
- multiPsk BooleanOnly 
- When type==psk, whether to only use multi_psk
- owe String
- if type==open. enum:disabled,enabled(means transition mode),required
- pairwises List<String>
- When type=pskortype=eap, one or more ofwpa1-ccmp,wpa1-tkip,wpa2-ccmp,wpa2-tkip,wpa3
- privateWlan Boolean
- When multi_psk_only==true, whether private wlan is enabled
- psk String
- When type==psk, 8-64 characters, or 64 hex characters
- type String
- enum: eap,eap192,open,psk,psk-tkip,psk-wpa2-tkip,wep
- wepAs BooleanSecondary Auth 
- Enable WEP as secondary auth
WlanAuthServer, WlanAuthServerArgs      
- Host string
- IP/ hostname of RADIUS server
- Secret string
- Secret of RADIUS server
- KeywrapEnabled bool
- KeywrapFormat string
- enum: ascii,hex
- KeywrapKek string
- KeywrapMack string
- Port string
- RequireMessage boolAuthenticator 
- Whether to require Message-Authenticator in requests
- Host string
- IP/ hostname of RADIUS server
- Secret string
- Secret of RADIUS server
- KeywrapEnabled bool
- KeywrapFormat string
- enum: ascii,hex
- KeywrapKek string
- KeywrapMack string
- Port string
- RequireMessage boolAuthenticator 
- Whether to require Message-Authenticator in requests
- host String
- IP/ hostname of RADIUS server
- secret String
- Secret of RADIUS server
- keywrapEnabled Boolean
- keywrapFormat String
- enum: ascii,hex
- keywrapKek String
- keywrapMack String
- port String
- requireMessage BooleanAuthenticator 
- Whether to require Message-Authenticator in requests
- host string
- IP/ hostname of RADIUS server
- secret string
- Secret of RADIUS server
- keywrapEnabled boolean
- keywrapFormat string
- enum: ascii,hex
- keywrapKek string
- keywrapMack string
- port string
- requireMessage booleanAuthenticator 
- Whether to require Message-Authenticator in requests
- host str
- IP/ hostname of RADIUS server
- secret str
- Secret of RADIUS server
- keywrap_enabled bool
- keywrap_format str
- enum: ascii,hex
- keywrap_kek str
- keywrap_mack str
- port str
- require_message_ boolauthenticator 
- Whether to require Message-Authenticator in requests
- host String
- IP/ hostname of RADIUS server
- secret String
- Secret of RADIUS server
- keywrapEnabled Boolean
- keywrapFormat String
- enum: ascii,hex
- keywrapKek String
- keywrapMack String
- port String
- requireMessage BooleanAuthenticator 
- Whether to require Message-Authenticator in requests
WlanBonjour, WlanBonjourArgs    
- AdditionalVlan List<string>Ids 
- additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
- Enabled bool
- Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
- Services
Dictionary<string, Pulumi.Juniper Mist. Site. Inputs. Wlan Bonjour Services> 
- What services are allowed. Property key is the service name
- AdditionalVlan []stringIds 
- additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
- Enabled bool
- Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
- Services
map[string]WlanBonjour Services 
- What services are allowed. Property key is the service name
- additionalVlan List<String>Ids 
- additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
- enabled Boolean
- Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
- services
Map<String,WlanBonjour Services> 
- What services are allowed. Property key is the service name
- additionalVlan string[]Ids 
- additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
- enabled boolean
- Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
- services
{[key: string]: WlanBonjour Services} 
- What services are allowed. Property key is the service name
- additional_vlan_ Sequence[str]ids 
- additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
- enabled bool
- Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
- services
Mapping[str, WlanBonjour Services] 
- What services are allowed. Property key is the service name
- additionalVlan List<String>Ids 
- additional VLAN IDs (on the LAN side or from other WLANs) should we be forwarding bonjour queries/responses
- enabled Boolean
- Whether to enable bonjour for this WLAN. Once enabled, limit_bcast is assumed true, allow_mdns is assumed false
- services Map<Property Map>
- What services are allowed. Property key is the service name
WlanBonjourServices, WlanBonjourServicesArgs      
- DisableLocal bool
- Whether to prevent wireless clients to discover bonjour devices on the same WLAN
- RadiusGroups List<string>
- Optional, if the service is further restricted for certain RADIUS groups
- Scope string
- how bonjour services should be discovered for the same WLAN. enum: same_ap,same_map,same_site
- DisableLocal bool
- Whether to prevent wireless clients to discover bonjour devices on the same WLAN
- RadiusGroups []string
- Optional, if the service is further restricted for certain RADIUS groups
- Scope string
- how bonjour services should be discovered for the same WLAN. enum: same_ap,same_map,same_site
- disableLocal Boolean
- Whether to prevent wireless clients to discover bonjour devices on the same WLAN
- radiusGroups List<String>
- Optional, if the service is further restricted for certain RADIUS groups
- scope String
- how bonjour services should be discovered for the same WLAN. enum: same_ap,same_map,same_site
- disableLocal boolean
- Whether to prevent wireless clients to discover bonjour devices on the same WLAN
- radiusGroups string[]
- Optional, if the service is further restricted for certain RADIUS groups
- scope string
- how bonjour services should be discovered for the same WLAN. enum: same_ap,same_map,same_site
- disable_local bool
- Whether to prevent wireless clients to discover bonjour devices on the same WLAN
- radius_groups Sequence[str]
- Optional, if the service is further restricted for certain RADIUS groups
- scope str
- how bonjour services should be discovered for the same WLAN. enum: same_ap,same_map,same_site
- disableLocal Boolean
- Whether to prevent wireless clients to discover bonjour devices on the same WLAN
- radiusGroups List<String>
- Optional, if the service is further restricted for certain RADIUS groups
- scope String
- how bonjour services should be discovered for the same WLAN. enum: same_ap,same_map,same_site
WlanCiscoCwa, WlanCiscoCwaArgs      
- AllowedHostnames List<string>
- List of hostnames without http(s):// (matched by substring)
- AllowedSubnets List<string>
- List of CIDRs
- BlockedSubnets List<string>
- List of blocked CIDRs
- Enabled bool
- AllowedHostnames []string
- List of hostnames without http(s):// (matched by substring)
- AllowedSubnets []string
- List of CIDRs
- BlockedSubnets []string
- List of blocked CIDRs
- Enabled bool
- allowedHostnames List<String>
- List of hostnames without http(s):// (matched by substring)
- allowedSubnets List<String>
- List of CIDRs
- blockedSubnets List<String>
- List of blocked CIDRs
- enabled Boolean
- allowedHostnames string[]
- List of hostnames without http(s):// (matched by substring)
- allowedSubnets string[]
- List of CIDRs
- blockedSubnets string[]
- List of blocked CIDRs
- enabled boolean
- allowed_hostnames Sequence[str]
- List of hostnames without http(s):// (matched by substring)
- allowed_subnets Sequence[str]
- List of CIDRs
- blocked_subnets Sequence[str]
- List of blocked CIDRs
- enabled bool
- allowedHostnames List<String>
- List of hostnames without http(s):// (matched by substring)
- allowedSubnets List<String>
- List of CIDRs
- blockedSubnets List<String>
- List of blocked CIDRs
- enabled Boolean
WlanCoaServer, WlanCoaServerArgs      
- Ip string
- Secret string
- DisableEvent boolTimestamp Check 
- Whether to disable Event-Timestamp Check
- Enabled bool
- Port string
- Ip string
- Secret string
- DisableEvent boolTimestamp Check 
- Whether to disable Event-Timestamp Check
- Enabled bool
- Port string
- ip String
- secret String
- disableEvent BooleanTimestamp Check 
- Whether to disable Event-Timestamp Check
- enabled Boolean
- port String
- ip string
- secret string
- disableEvent booleanTimestamp Check 
- Whether to disable Event-Timestamp Check
- enabled boolean
- port string
- ip str
- secret str
- disable_event_ booltimestamp_ check 
- Whether to disable Event-Timestamp Check
- enabled bool
- port str
- ip String
- secret String
- disableEvent BooleanTimestamp Check 
- Whether to disable Event-Timestamp Check
- enabled Boolean
- port String
WlanDnsServerRewrite, WlanDnsServerRewriteArgs        
- Enabled bool
- RadiusGroups Dictionary<string, string>
- Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
- Enabled bool
- RadiusGroups map[string]string
- Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
- enabled Boolean
- radiusGroups Map<String,String>
- Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
- enabled boolean
- radiusGroups {[key: string]: string}
- Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
- enabled bool
- radius_groups Mapping[str, str]
- Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
- enabled Boolean
- radiusGroups Map<String>
- Map between radius_group and the desired DNS server (IPv4 only). Property key is the RADIUS group, property value is the desired DNS Server
WlanDynamicPsk, WlanDynamicPskArgs      
- DefaultPsk string
- Default PSK to use if cloud WLC is not available, 8-63 characters
- DefaultVlan stringId 
- Enabled bool
- ForceLookup bool
- When 11r is enabled, we'll try to use the cached PMK, this can be disabled. falsemeans auto
- Source string
- enum: cloud_psks,radius
- DefaultPsk string
- Default PSK to use if cloud WLC is not available, 8-63 characters
- DefaultVlan stringId 
- Enabled bool
- ForceLookup bool
- When 11r is enabled, we'll try to use the cached PMK, this can be disabled. falsemeans auto
- Source string
- enum: cloud_psks,radius
- defaultPsk String
- Default PSK to use if cloud WLC is not available, 8-63 characters
- defaultVlan StringId 
- enabled Boolean
- forceLookup Boolean
- When 11r is enabled, we'll try to use the cached PMK, this can be disabled. falsemeans auto
- source String
- enum: cloud_psks,radius
- defaultPsk string
- Default PSK to use if cloud WLC is not available, 8-63 characters
- defaultVlan stringId 
- enabled boolean
- forceLookup boolean
- When 11r is enabled, we'll try to use the cached PMK, this can be disabled. falsemeans auto
- source string
- enum: cloud_psks,radius
- default_psk str
- Default PSK to use if cloud WLC is not available, 8-63 characters
- default_vlan_ strid 
- enabled bool
- force_lookup bool
- When 11r is enabled, we'll try to use the cached PMK, this can be disabled. falsemeans auto
- source str
- enum: cloud_psks,radius
- defaultPsk String
- Default PSK to use if cloud WLC is not available, 8-63 characters
- defaultVlan StringId 
- enabled Boolean
- forceLookup Boolean
- When 11r is enabled, we'll try to use the cached PMK, this can be disabled. falsemeans auto
- source String
- enum: cloud_psks,radius
WlanDynamicVlan, WlanDynamicVlanArgs      
- DefaultVlan List<string>Ids 
- Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
- Enabled bool
- Requires vlan_enabled==trueto be set totrue. Whether to enable dynamic vlan
- LocalVlan List<string>Ids 
- VLAN_ids to be locally bridged
- Type string
- standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name,standard
- Vlans Dictionary<string, string>
- Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping- if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
- if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
 
- if 
- DefaultVlan []stringIds 
- Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
- Enabled bool
- Requires vlan_enabled==trueto be set totrue. Whether to enable dynamic vlan
- LocalVlan []stringIds 
- VLAN_ids to be locally bridged
- Type string
- standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name,standard
- Vlans map[string]string
- Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping- if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
- if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
 
- if 
- defaultVlan List<String>Ids 
- Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
- enabled Boolean
- Requires vlan_enabled==trueto be set totrue. Whether to enable dynamic vlan
- localVlan List<String>Ids 
- VLAN_ids to be locally bridged
- type String
- standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name,standard
- vlans Map<String,String>
- Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping- if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
- if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
 
- if 
- defaultVlan string[]Ids 
- Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
- enabled boolean
- Requires vlan_enabled==trueto be set totrue. Whether to enable dynamic vlan
- localVlan string[]Ids 
- VLAN_ids to be locally bridged
- type string
- standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name,standard
- vlans {[key: string]: string}
- Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping- if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
- if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
 
- if 
- default_vlan_ Sequence[str]ids 
- Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
- enabled bool
- Requires vlan_enabled==trueto be set totrue. Whether to enable dynamic vlan
- local_vlan_ Sequence[str]ids 
- VLAN_ids to be locally bridged
- type str
- standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name,standard
- vlans Mapping[str, str]
- Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping- if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
- if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
 
- if 
- defaultVlan List<String>Ids 
- Default VLAN ID(s) can be a number, a range of VLAN IDs, a variable or multiple numbers, ranges or variables as a VLAN pool. Default VLAN as a pool of VLANS requires 0.14.x or newer firmware
- enabled Boolean
- Requires vlan_enabled==trueto be set totrue. Whether to enable dynamic vlan
- localVlan List<String>Ids 
- VLAN_ids to be locally bridged
- type String
- standard (using Tunnel-Private-Group-ID, widely supported), airespace-interface-name (Airespace/Cisco). enum: airespace-interface-name,standard
- vlans Map<String>
- Map between vlan_id (as string) to airespace interface names (comma-separated) or null for standard mapping- if dynamic_vlan.type==standard, property key is the Vlan ID and property value is ""
- if dynamic_vlan.type==airespace-interface-name, property key is the Vlan ID and property value is the Airespace Interface Name
 
- if 
WlanHotspot20, WlanHotspot20Args    
- domain_names Sequence[str]
- enabled bool
- Whether to enable hotspot 2.0 config
- nai_realms Sequence[str]
- operators Sequence[str]
- List of operators to support
- rcois Sequence[str]
- venue_name str
- Venue name, default is site name
WlanInjectDhcpOption82, WlanInjectDhcpOption82Args        
- CircuitId string
- Information to set in the circuit_idfield of the DHCP Option 82. It is possible to use static string or the following variables (e.g.{{SSID}}:{{AP_MAC}}):- {{AP_MAC}}
- {{AP_MAC_DASHED}}
- {{AP_MODEL}}
- {{AP_NAME}}
- {{SITE_NAME}}
- {{SSID}}
 
- Enabled bool
- Whether to inject option 82 when forwarding DHCP packets
- CircuitId string
- Information to set in the circuit_idfield of the DHCP Option 82. It is possible to use static string or the following variables (e.g.{{SSID}}:{{AP_MAC}}):- {{AP_MAC}}
- {{AP_MAC_DASHED}}
- {{AP_MODEL}}
- {{AP_NAME}}
- {{SITE_NAME}}
- {{SSID}}
 
- Enabled bool
- Whether to inject option 82 when forwarding DHCP packets
- circuitId String
- Information to set in the circuit_idfield of the DHCP Option 82. It is possible to use static string or the following variables (e.g.{{SSID}}:{{AP_MAC}}):- {{AP_MAC}}
- {{AP_MAC_DASHED}}
- {{AP_MODEL}}
- {{AP_NAME}}
- {{SITE_NAME}}
- {{SSID}}
 
- enabled Boolean
- Whether to inject option 82 when forwarding DHCP packets
- circuitId string
- Information to set in the circuit_idfield of the DHCP Option 82. It is possible to use static string or the following variables (e.g.{{SSID}}:{{AP_MAC}}):- {{AP_MAC}}
- {{AP_MAC_DASHED}}
- {{AP_MODEL}}
- {{AP_NAME}}
- {{SITE_NAME}}
- {{SSID}}
 
- enabled boolean
- Whether to inject option 82 when forwarding DHCP packets
- circuit_id str
- Information to set in the circuit_idfield of the DHCP Option 82. It is possible to use static string or the following variables (e.g.{{SSID}}:{{AP_MAC}}):- {{AP_MAC}}
- {{AP_MAC_DASHED}}
- {{AP_MODEL}}
- {{AP_NAME}}
- {{SITE_NAME}}
- {{SSID}}
 
- enabled bool
- Whether to inject option 82 when forwarding DHCP packets
- circuitId String
- Information to set in the circuit_idfield of the DHCP Option 82. It is possible to use static string or the following variables (e.g.{{SSID}}:{{AP_MAC}}):- {{AP_MAC}}
- {{AP_MAC_DASHED}}
- {{AP_MODEL}}
- {{AP_NAME}}
- {{SITE_NAME}}
- {{SSID}}
 
- enabled Boolean
- Whether to inject option 82 when forwarding DHCP packets
WlanMistNac, WlanMistNacArgs      
- AcctInterim intInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled.
- AuthServers intRetries 
- Radius auth session retries. Following fast timers are set if fast_dot1x_timersknob is enabled. "retries" are set to value ofauth_servers_timeout. "max-requests" is also set when settingauth_servers_retriesis set to default value to 3.
- AuthServers intTimeout 
- Radius auth session timeout. Following fast timers are set if fast_dot1x_timersknob is enabled. "quite-period" and "transmit-period" are set to half the value ofauth_servers_timeout. "supplicant-timeout" is also set when settingauth_servers_timeoutis set to default value of 10.
- CoaEnabled bool
- Allows a RADIUS server to dynamically modify the authorization status of a user session.
- CoaPort int
- the communication port used for “Change of Authorization” (CoA) messages
- Enabled bool
- When enabled:- auth_serversis ignored
- acct_serversis ignored
- auth_servers_*are ignored
- coa_serversis ignored
- radsecis ignored
- coa_enabledis assumed
 
- FastDot1x boolTimers 
- If set to true, sets default fast-timers with values calculated from auth_servers_timeoutandauth_server_retries.
- Network string
- Which network the mist nac server resides in
- SourceIp string
- In case there is a static IP for this network, we can specify it using source ip
- AcctInterim intInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled.
- AuthServers intRetries 
- Radius auth session retries. Following fast timers are set if fast_dot1x_timersknob is enabled. "retries" are set to value ofauth_servers_timeout. "max-requests" is also set when settingauth_servers_retriesis set to default value to 3.
- AuthServers intTimeout 
- Radius auth session timeout. Following fast timers are set if fast_dot1x_timersknob is enabled. "quite-period" and "transmit-period" are set to half the value ofauth_servers_timeout. "supplicant-timeout" is also set when settingauth_servers_timeoutis set to default value of 10.
- CoaEnabled bool
- Allows a RADIUS server to dynamically modify the authorization status of a user session.
- CoaPort int
- the communication port used for “Change of Authorization” (CoA) messages
- Enabled bool
- When enabled:- auth_serversis ignored
- acct_serversis ignored
- auth_servers_*are ignored
- coa_serversis ignored
- radsecis ignored
- coa_enabledis assumed
 
- FastDot1x boolTimers 
- If set to true, sets default fast-timers with values calculated from auth_servers_timeoutandauth_server_retries.
- Network string
- Which network the mist nac server resides in
- SourceIp string
- In case there is a static IP for this network, we can specify it using source ip
- acctInterim IntegerInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled.
- authServers IntegerRetries 
- Radius auth session retries. Following fast timers are set if fast_dot1x_timersknob is enabled. "retries" are set to value ofauth_servers_timeout. "max-requests" is also set when settingauth_servers_retriesis set to default value to 3.
- authServers IntegerTimeout 
- Radius auth session timeout. Following fast timers are set if fast_dot1x_timersknob is enabled. "quite-period" and "transmit-period" are set to half the value ofauth_servers_timeout. "supplicant-timeout" is also set when settingauth_servers_timeoutis set to default value of 10.
- coaEnabled Boolean
- Allows a RADIUS server to dynamically modify the authorization status of a user session.
- coaPort Integer
- the communication port used for “Change of Authorization” (CoA) messages
- enabled Boolean
- When enabled:- auth_serversis ignored
- acct_serversis ignored
- auth_servers_*are ignored
- coa_serversis ignored
- radsecis ignored
- coa_enabledis assumed
 
- fastDot1x BooleanTimers 
- If set to true, sets default fast-timers with values calculated from auth_servers_timeoutandauth_server_retries.
- network String
- Which network the mist nac server resides in
- sourceIp String
- In case there is a static IP for this network, we can specify it using source ip
- acctInterim numberInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled.
- authServers numberRetries 
- Radius auth session retries. Following fast timers are set if fast_dot1x_timersknob is enabled. "retries" are set to value ofauth_servers_timeout. "max-requests" is also set when settingauth_servers_retriesis set to default value to 3.
- authServers numberTimeout 
- Radius auth session timeout. Following fast timers are set if fast_dot1x_timersknob is enabled. "quite-period" and "transmit-period" are set to half the value ofauth_servers_timeout. "supplicant-timeout" is also set when settingauth_servers_timeoutis set to default value of 10.
- coaEnabled boolean
- Allows a RADIUS server to dynamically modify the authorization status of a user session.
- coaPort number
- the communication port used for “Change of Authorization” (CoA) messages
- enabled boolean
- When enabled:- auth_serversis ignored
- acct_serversis ignored
- auth_servers_*are ignored
- coa_serversis ignored
- radsecis ignored
- coa_enabledis assumed
 
- fastDot1x booleanTimers 
- If set to true, sets default fast-timers with values calculated from auth_servers_timeoutandauth_server_retries.
- network string
- Which network the mist nac server resides in
- sourceIp string
- In case there is a static IP for this network, we can specify it using source ip
- acct_interim_ intinterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled.
- auth_servers_ intretries 
- Radius auth session retries. Following fast timers are set if fast_dot1x_timersknob is enabled. "retries" are set to value ofauth_servers_timeout. "max-requests" is also set when settingauth_servers_retriesis set to default value to 3.
- auth_servers_ inttimeout 
- Radius auth session timeout. Following fast timers are set if fast_dot1x_timersknob is enabled. "quite-period" and "transmit-period" are set to half the value ofauth_servers_timeout. "supplicant-timeout" is also set when settingauth_servers_timeoutis set to default value of 10.
- coa_enabled bool
- Allows a RADIUS server to dynamically modify the authorization status of a user session.
- coa_port int
- the communication port used for “Change of Authorization” (CoA) messages
- enabled bool
- When enabled:- auth_serversis ignored
- acct_serversis ignored
- auth_servers_*are ignored
- coa_serversis ignored
- radsecis ignored
- coa_enabledis assumed
 
- fast_dot1x_ booltimers 
- If set to true, sets default fast-timers with values calculated from auth_servers_timeoutandauth_server_retries.
- network str
- Which network the mist nac server resides in
- source_ip str
- In case there is a static IP for this network, we can specify it using source ip
- acctInterim NumberInterval 
- How frequently should interim accounting be reported, 60-65535. default is 0 (use one specified in Access-Accept request from Server). Very frequent messages can affect the performance of the radius server, 600 and up is recommended when enabled.
- authServers NumberRetries 
- Radius auth session retries. Following fast timers are set if fast_dot1x_timersknob is enabled. "retries" are set to value ofauth_servers_timeout. "max-requests" is also set when settingauth_servers_retriesis set to default value to 3.
- authServers NumberTimeout 
- Radius auth session timeout. Following fast timers are set if fast_dot1x_timersknob is enabled. "quite-period" and "transmit-period" are set to half the value ofauth_servers_timeout. "supplicant-timeout" is also set when settingauth_servers_timeoutis set to default value of 10.
- coaEnabled Boolean
- Allows a RADIUS server to dynamically modify the authorization status of a user session.
- coaPort Number
- the communication port used for “Change of Authorization” (CoA) messages
- enabled Boolean
- When enabled:- auth_serversis ignored
- acct_serversis ignored
- auth_servers_*are ignored
- coa_serversis ignored
- radsecis ignored
- coa_enabledis assumed
 
- fastDot1x BooleanTimers 
- If set to true, sets default fast-timers with values calculated from auth_servers_timeoutandauth_server_retries.
- network String
- Which network the mist nac server resides in
- sourceIp String
- In case there is a static IP for this network, we can specify it using source ip
WlanPortal, WlanPortalArgs    
- AllowWlan boolId Roam 
- Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with differentWLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
- AmazonClient stringId 
- Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
- AmazonClient stringSecret 
- Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
- AmazonEmail List<string>Domains 
- Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- AmazonEnabled bool
- Whether amazon is enabled as a login method
- AmazonExpire int
- Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
- Auth string
- authentication scheme. enum: amazon,azure,email,external,facebook,google,microsoft,multi,none,password,sms,sponsor,sso
- AzureClient stringId 
- Required if azure_enabled==true. Azure active directory app client id
- AzureClient stringSecret 
- Required if azure_enabled==true. Azure active directory app client secret
- AzureEnabled bool
- Whether Azure Active Directory is enabled as a login method
- AzureExpire int
- Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
- AzureTenant stringId 
- Required if azure_enabled==true. Azure active directory tenant id.
- BroadnetPassword string
- Required if sms_provider==broadnet
- BroadnetSid string
- Required if sms_provider==broadnet
- BroadnetUser stringId 
- Required if sms_provider==broadnet
- BypassWhen boolCloud Down 
- Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
- ClickatellApi stringKey 
- Required if sms_provider==clickatell
- CrossSite bool
- Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
- EmailEnabled bool
- Whether email (access code verification) is enabled as a login method
- Enabled bool
- Whether guest portal is enabled
- Expire int
- How long to remain authorized, in minutes
- ExternalPortal stringUrl 
- Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
- FacebookClient stringId 
- Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
- FacebookClient stringSecret 
- Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
- FacebookEmail List<string>Domains 
- Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- FacebookEnabled bool
- Whether facebook is enabled as a login method
- FacebookExpire int
- Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
- Forward bool
- Whether to forward the user to another URL after authorized
- ForwardUrl string
- URL to forward the user to
- GoogleClient stringId 
- Google OAuth2 app id. This is optional. If not provided, it will use a default one.
- GoogleClient stringSecret 
- Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
- GoogleEmail List<string>Domains 
- Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- GoogleEnabled bool
- Whether Google is enabled as login method
- GoogleExpire int
- Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
- GupshupPassword string
- Required if sms_provider==gupshup
- GupshupUserid string
- Required if sms_provider==gupshup
- MicrosoftClient stringId 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
- MicrosoftClient stringSecret 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
- MicrosoftEmail List<string>Domains 
- Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- MicrosoftEnabled bool
- Whether microsoft 365 is enabled as a login method
- MicrosoftExpire int
- Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
- PassphraseEnabled bool
- Whether password is enabled
- PassphraseExpire int
- Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, usesexpire
- Password string
- Required if passphrase_enabled==true.
- PredefinedSponsors boolEnabled 
- Whether to show list of sponsor emails mentioned in sponsorsobject as a dropdown. If bothsponsor_notify_allandpredefined_sponsors_enabledare false, behavior is acc tosponsor_email_domains
- PredefinedSponsors boolHide Email 
- Whether to hide sponsor’s email from list of sponsors
- Privacy bool
- PuzzelPassword string
- Required if sms_provider==puzzel
- PuzzelService stringId 
- Required if sms_provider==puzzel
- PuzzelUsername string
- Required if sms_provider==puzzel
- SmsEnabled bool
- Whether sms is enabled as a login method
- SmsExpire int
- Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
- SmsMessage stringFormat 
- Optional if sms_enabled==true. SMS Message format
- SmsProvider string
- Optional if sms_enabled==true. enum:broadnet,clickatell,gupshup,manual,puzzel,smsglobal,telstra,twilio
- SmsglobalApi stringKey 
- Required if sms_provider==smsglobal, Client API Key
- SmsglobalApi stringSecret 
- Required if sms_provider==smsglobal, Client secret
- SponsorAuto boolApprove 
- Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
- SponsorEmail List<string>Domains 
- List of domain allowed for sponsor email. Required if sponsor_enabledistrueandsponsorsis empty.
- SponsorEnabled bool
- Whether sponsor is enabled
- SponsorExpire int
- Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
- SponsorLink stringValidity Duration 
- Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
- SponsorNotify boolAll 
- Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned insponsorsobject. Bothsponsor_notify_allandpredefined_sponsors_enabledshould be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
- SponsorStatus boolNotify 
- Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
- Sponsors Dictionary<string, string>
- object of allowed sponsors email with name. Required if sponsor_enabledistrueandsponsor_email_domainsis empty.Property key is the sponsor email, Property value is the sponsor name
- SsoDefault stringRole 
- Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
- SsoForced stringRole 
- Optional if wlan_portal_auth==sso
- SsoIdp stringCert 
- Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
- SsoIdp stringSign Algo 
- Optional if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum:sha1,sha256,sha384,sha512
- SsoIdp stringSso Url 
- Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
- SsoIssuer string
- Required if wlan_portal_auth==sso, IDP issuer URL
- SsoNameid stringFormat 
- Optional if wlan_portal_auth==sso. enum:email,unspecified
- TelstraClient stringId 
- Required if sms_provider==telstra, Client ID provided by Telstra
- TelstraClient stringSecret 
- Required if sms_provider==telstra, Client secret provided by Telstra
- TwilioAuth stringToken 
- Required if sms_provider==twilio, Auth token account with twilio account
- TwilioPhone stringNumber 
- Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
- TwilioSid string
- Required if sms_provider==twilio, Account SID provided by Twilio
- AllowWlan boolId Roam 
- Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with differentWLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
- AmazonClient stringId 
- Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
- AmazonClient stringSecret 
- Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
- AmazonEmail []stringDomains 
- Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- AmazonEnabled bool
- Whether amazon is enabled as a login method
- AmazonExpire int
- Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
- Auth string
- authentication scheme. enum: amazon,azure,email,external,facebook,google,microsoft,multi,none,password,sms,sponsor,sso
- AzureClient stringId 
- Required if azure_enabled==true. Azure active directory app client id
- AzureClient stringSecret 
- Required if azure_enabled==true. Azure active directory app client secret
- AzureEnabled bool
- Whether Azure Active Directory is enabled as a login method
- AzureExpire int
- Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
- AzureTenant stringId 
- Required if azure_enabled==true. Azure active directory tenant id.
- BroadnetPassword string
- Required if sms_provider==broadnet
- BroadnetSid string
- Required if sms_provider==broadnet
- BroadnetUser stringId 
- Required if sms_provider==broadnet
- BypassWhen boolCloud Down 
- Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
- ClickatellApi stringKey 
- Required if sms_provider==clickatell
- CrossSite bool
- Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
- EmailEnabled bool
- Whether email (access code verification) is enabled as a login method
- Enabled bool
- Whether guest portal is enabled
- Expire int
- How long to remain authorized, in minutes
- ExternalPortal stringUrl 
- Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
- FacebookClient stringId 
- Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
- FacebookClient stringSecret 
- Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
- FacebookEmail []stringDomains 
- Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- FacebookEnabled bool
- Whether facebook is enabled as a login method
- FacebookExpire int
- Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
- Forward bool
- Whether to forward the user to another URL after authorized
- ForwardUrl string
- URL to forward the user to
- GoogleClient stringId 
- Google OAuth2 app id. This is optional. If not provided, it will use a default one.
- GoogleClient stringSecret 
- Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
- GoogleEmail []stringDomains 
- Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- GoogleEnabled bool
- Whether Google is enabled as login method
- GoogleExpire int
- Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
- GupshupPassword string
- Required if sms_provider==gupshup
- GupshupUserid string
- Required if sms_provider==gupshup
- MicrosoftClient stringId 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
- MicrosoftClient stringSecret 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
- MicrosoftEmail []stringDomains 
- Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- MicrosoftEnabled bool
- Whether microsoft 365 is enabled as a login method
- MicrosoftExpire int
- Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
- PassphraseEnabled bool
- Whether password is enabled
- PassphraseExpire int
- Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, usesexpire
- Password string
- Required if passphrase_enabled==true.
- PredefinedSponsors boolEnabled 
- Whether to show list of sponsor emails mentioned in sponsorsobject as a dropdown. If bothsponsor_notify_allandpredefined_sponsors_enabledare false, behavior is acc tosponsor_email_domains
- PredefinedSponsors boolHide Email 
- Whether to hide sponsor’s email from list of sponsors
- Privacy bool
- PuzzelPassword string
- Required if sms_provider==puzzel
- PuzzelService stringId 
- Required if sms_provider==puzzel
- PuzzelUsername string
- Required if sms_provider==puzzel
- SmsEnabled bool
- Whether sms is enabled as a login method
- SmsExpire int
- Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
- SmsMessage stringFormat 
- Optional if sms_enabled==true. SMS Message format
- SmsProvider string
- Optional if sms_enabled==true. enum:broadnet,clickatell,gupshup,manual,puzzel,smsglobal,telstra,twilio
- SmsglobalApi stringKey 
- Required if sms_provider==smsglobal, Client API Key
- SmsglobalApi stringSecret 
- Required if sms_provider==smsglobal, Client secret
- SponsorAuto boolApprove 
- Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
- SponsorEmail []stringDomains 
- List of domain allowed for sponsor email. Required if sponsor_enabledistrueandsponsorsis empty.
- SponsorEnabled bool
- Whether sponsor is enabled
- SponsorExpire int
- Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
- SponsorLink stringValidity Duration 
- Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
- SponsorNotify boolAll 
- Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned insponsorsobject. Bothsponsor_notify_allandpredefined_sponsors_enabledshould be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
- SponsorStatus boolNotify 
- Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
- Sponsors map[string]string
- object of allowed sponsors email with name. Required if sponsor_enabledistrueandsponsor_email_domainsis empty.Property key is the sponsor email, Property value is the sponsor name
- SsoDefault stringRole 
- Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
- SsoForced stringRole 
- Optional if wlan_portal_auth==sso
- SsoIdp stringCert 
- Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
- SsoIdp stringSign Algo 
- Optional if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum:sha1,sha256,sha384,sha512
- SsoIdp stringSso Url 
- Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
- SsoIssuer string
- Required if wlan_portal_auth==sso, IDP issuer URL
- SsoNameid stringFormat 
- Optional if wlan_portal_auth==sso. enum:email,unspecified
- TelstraClient stringId 
- Required if sms_provider==telstra, Client ID provided by Telstra
- TelstraClient stringSecret 
- Required if sms_provider==telstra, Client secret provided by Telstra
- TwilioAuth stringToken 
- Required if sms_provider==twilio, Auth token account with twilio account
- TwilioPhone stringNumber 
- Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
- TwilioSid string
- Required if sms_provider==twilio, Account SID provided by Twilio
- allowWlan BooleanId Roam 
- Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with differentWLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
- amazonClient StringId 
- Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
- amazonClient StringSecret 
- Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
- amazonEmail List<String>Domains 
- Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- amazonEnabled Boolean
- Whether amazon is enabled as a login method
- amazonExpire Integer
- Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
- auth String
- authentication scheme. enum: amazon,azure,email,external,facebook,google,microsoft,multi,none,password,sms,sponsor,sso
- azureClient StringId 
- Required if azure_enabled==true. Azure active directory app client id
- azureClient StringSecret 
- Required if azure_enabled==true. Azure active directory app client secret
- azureEnabled Boolean
- Whether Azure Active Directory is enabled as a login method
- azureExpire Integer
- Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
- azureTenant StringId 
- Required if azure_enabled==true. Azure active directory tenant id.
- broadnetPassword String
- Required if sms_provider==broadnet
- broadnetSid String
- Required if sms_provider==broadnet
- broadnetUser StringId 
- Required if sms_provider==broadnet
- bypassWhen BooleanCloud Down 
- Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
- clickatellApi StringKey 
- Required if sms_provider==clickatell
- crossSite Boolean
- Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
- emailEnabled Boolean
- Whether email (access code verification) is enabled as a login method
- enabled Boolean
- Whether guest portal is enabled
- expire Integer
- How long to remain authorized, in minutes
- externalPortal StringUrl 
- Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
- facebookClient StringId 
- Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
- facebookClient StringSecret 
- Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
- facebookEmail List<String>Domains 
- Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- facebookEnabled Boolean
- Whether facebook is enabled as a login method
- facebookExpire Integer
- Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
- forward Boolean
- Whether to forward the user to another URL after authorized
- forwardUrl String
- URL to forward the user to
- googleClient StringId 
- Google OAuth2 app id. This is optional. If not provided, it will use a default one.
- googleClient StringSecret 
- Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
- googleEmail List<String>Domains 
- Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- googleEnabled Boolean
- Whether Google is enabled as login method
- googleExpire Integer
- Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
- gupshupPassword String
- Required if sms_provider==gupshup
- gupshupUserid String
- Required if sms_provider==gupshup
- microsoftClient StringId 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
- microsoftClient StringSecret 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
- microsoftEmail List<String>Domains 
- Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- microsoftEnabled Boolean
- Whether microsoft 365 is enabled as a login method
- microsoftExpire Integer
- Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
- passphraseEnabled Boolean
- Whether password is enabled
- passphraseExpire Integer
- Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, usesexpire
- password String
- Required if passphrase_enabled==true.
- predefinedSponsors BooleanEnabled 
- Whether to show list of sponsor emails mentioned in sponsorsobject as a dropdown. If bothsponsor_notify_allandpredefined_sponsors_enabledare false, behavior is acc tosponsor_email_domains
- predefinedSponsors BooleanHide Email 
- Whether to hide sponsor’s email from list of sponsors
- privacy Boolean
- puzzelPassword String
- Required if sms_provider==puzzel
- puzzelService StringId 
- Required if sms_provider==puzzel
- puzzelUsername String
- Required if sms_provider==puzzel
- smsEnabled Boolean
- Whether sms is enabled as a login method
- smsExpire Integer
- Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
- smsMessage StringFormat 
- Optional if sms_enabled==true. SMS Message format
- smsProvider String
- Optional if sms_enabled==true. enum:broadnet,clickatell,gupshup,manual,puzzel,smsglobal,telstra,twilio
- smsglobalApi StringKey 
- Required if sms_provider==smsglobal, Client API Key
- smsglobalApi StringSecret 
- Required if sms_provider==smsglobal, Client secret
- sponsorAuto BooleanApprove 
- Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
- sponsorEmail List<String>Domains 
- List of domain allowed for sponsor email. Required if sponsor_enabledistrueandsponsorsis empty.
- sponsorEnabled Boolean
- Whether sponsor is enabled
- sponsorExpire Integer
- Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
- sponsorLink StringValidity Duration 
- Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
- sponsorNotify BooleanAll 
- Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned insponsorsobject. Bothsponsor_notify_allandpredefined_sponsors_enabledshould be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
- sponsorStatus BooleanNotify 
- Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
- sponsors Map<String,String>
- object of allowed sponsors email with name. Required if sponsor_enabledistrueandsponsor_email_domainsis empty.Property key is the sponsor email, Property value is the sponsor name
- ssoDefault StringRole 
- Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
- ssoForced StringRole 
- Optional if wlan_portal_auth==sso
- ssoIdp StringCert 
- Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
- ssoIdp StringSign Algo 
- Optional if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum:sha1,sha256,sha384,sha512
- ssoIdp StringSso Url 
- Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
- ssoIssuer String
- Required if wlan_portal_auth==sso, IDP issuer URL
- ssoNameid StringFormat 
- Optional if wlan_portal_auth==sso. enum:email,unspecified
- telstraClient StringId 
- Required if sms_provider==telstra, Client ID provided by Telstra
- telstraClient StringSecret 
- Required if sms_provider==telstra, Client secret provided by Telstra
- twilioAuth StringToken 
- Required if sms_provider==twilio, Auth token account with twilio account
- twilioPhone StringNumber 
- Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
- twilioSid String
- Required if sms_provider==twilio, Account SID provided by Twilio
- allowWlan booleanId Roam 
- Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with differentWLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
- amazonClient stringId 
- Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
- amazonClient stringSecret 
- Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
- amazonEmail string[]Domains 
- Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- amazonEnabled boolean
- Whether amazon is enabled as a login method
- amazonExpire number
- Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
- auth string
- authentication scheme. enum: amazon,azure,email,external,facebook,google,microsoft,multi,none,password,sms,sponsor,sso
- azureClient stringId 
- Required if azure_enabled==true. Azure active directory app client id
- azureClient stringSecret 
- Required if azure_enabled==true. Azure active directory app client secret
- azureEnabled boolean
- Whether Azure Active Directory is enabled as a login method
- azureExpire number
- Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
- azureTenant stringId 
- Required if azure_enabled==true. Azure active directory tenant id.
- broadnetPassword string
- Required if sms_provider==broadnet
- broadnetSid string
- Required if sms_provider==broadnet
- broadnetUser stringId 
- Required if sms_provider==broadnet
- bypassWhen booleanCloud Down 
- Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
- clickatellApi stringKey 
- Required if sms_provider==clickatell
- crossSite boolean
- Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
- emailEnabled boolean
- Whether email (access code verification) is enabled as a login method
- enabled boolean
- Whether guest portal is enabled
- expire number
- How long to remain authorized, in minutes
- externalPortal stringUrl 
- Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
- facebookClient stringId 
- Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
- facebookClient stringSecret 
- Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
- facebookEmail string[]Domains 
- Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- facebookEnabled boolean
- Whether facebook is enabled as a login method
- facebookExpire number
- Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
- forward boolean
- Whether to forward the user to another URL after authorized
- forwardUrl string
- URL to forward the user to
- googleClient stringId 
- Google OAuth2 app id. This is optional. If not provided, it will use a default one.
- googleClient stringSecret 
- Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
- googleEmail string[]Domains 
- Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- googleEnabled boolean
- Whether Google is enabled as login method
- googleExpire number
- Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
- gupshupPassword string
- Required if sms_provider==gupshup
- gupshupUserid string
- Required if sms_provider==gupshup
- microsoftClient stringId 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
- microsoftClient stringSecret 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
- microsoftEmail string[]Domains 
- Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- microsoftEnabled boolean
- Whether microsoft 365 is enabled as a login method
- microsoftExpire number
- Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
- passphraseEnabled boolean
- Whether password is enabled
- passphraseExpire number
- Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, usesexpire
- password string
- Required if passphrase_enabled==true.
- predefinedSponsors booleanEnabled 
- Whether to show list of sponsor emails mentioned in sponsorsobject as a dropdown. If bothsponsor_notify_allandpredefined_sponsors_enabledare false, behavior is acc tosponsor_email_domains
- predefinedSponsors booleanHide Email 
- Whether to hide sponsor’s email from list of sponsors
- privacy boolean
- puzzelPassword string
- Required if sms_provider==puzzel
- puzzelService stringId 
- Required if sms_provider==puzzel
- puzzelUsername string
- Required if sms_provider==puzzel
- smsEnabled boolean
- Whether sms is enabled as a login method
- smsExpire number
- Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
- smsMessage stringFormat 
- Optional if sms_enabled==true. SMS Message format
- smsProvider string
- Optional if sms_enabled==true. enum:broadnet,clickatell,gupshup,manual,puzzel,smsglobal,telstra,twilio
- smsglobalApi stringKey 
- Required if sms_provider==smsglobal, Client API Key
- smsglobalApi stringSecret 
- Required if sms_provider==smsglobal, Client secret
- sponsorAuto booleanApprove 
- Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
- sponsorEmail string[]Domains 
- List of domain allowed for sponsor email. Required if sponsor_enabledistrueandsponsorsis empty.
- sponsorEnabled boolean
- Whether sponsor is enabled
- sponsorExpire number
- Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
- sponsorLink stringValidity Duration 
- Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
- sponsorNotify booleanAll 
- Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned insponsorsobject. Bothsponsor_notify_allandpredefined_sponsors_enabledshould be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
- sponsorStatus booleanNotify 
- Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
- sponsors {[key: string]: string}
- object of allowed sponsors email with name. Required if sponsor_enabledistrueandsponsor_email_domainsis empty.Property key is the sponsor email, Property value is the sponsor name
- ssoDefault stringRole 
- Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
- ssoForced stringRole 
- Optional if wlan_portal_auth==sso
- ssoIdp stringCert 
- Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
- ssoIdp stringSign Algo 
- Optional if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum:sha1,sha256,sha384,sha512
- ssoIdp stringSso Url 
- Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
- ssoIssuer string
- Required if wlan_portal_auth==sso, IDP issuer URL
- ssoNameid stringFormat 
- Optional if wlan_portal_auth==sso. enum:email,unspecified
- telstraClient stringId 
- Required if sms_provider==telstra, Client ID provided by Telstra
- telstraClient stringSecret 
- Required if sms_provider==telstra, Client secret provided by Telstra
- twilioAuth stringToken 
- Required if sms_provider==twilio, Auth token account with twilio account
- twilioPhone stringNumber 
- Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
- twilioSid string
- Required if sms_provider==twilio, Account SID provided by Twilio
- allow_wlan_ boolid_ roam 
- Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with differentWLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
- amazon_client_ strid 
- Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
- amazon_client_ strsecret 
- Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
- amazon_email_ Sequence[str]domains 
- Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- amazon_enabled bool
- Whether amazon is enabled as a login method
- amazon_expire int
- Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
- auth str
- authentication scheme. enum: amazon,azure,email,external,facebook,google,microsoft,multi,none,password,sms,sponsor,sso
- azure_client_ strid 
- Required if azure_enabled==true. Azure active directory app client id
- azure_client_ strsecret 
- Required if azure_enabled==true. Azure active directory app client secret
- azure_enabled bool
- Whether Azure Active Directory is enabled as a login method
- azure_expire int
- Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
- azure_tenant_ strid 
- Required if azure_enabled==true. Azure active directory tenant id.
- broadnet_password str
- Required if sms_provider==broadnet
- broadnet_sid str
- Required if sms_provider==broadnet
- broadnet_user_ strid 
- Required if sms_provider==broadnet
- bypass_when_ boolcloud_ down 
- Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
- clickatell_api_ strkey 
- Required if sms_provider==clickatell
- cross_site bool
- Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
- email_enabled bool
- Whether email (access code verification) is enabled as a login method
- enabled bool
- Whether guest portal is enabled
- expire int
- How long to remain authorized, in minutes
- external_portal_ strurl 
- Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
- facebook_client_ strid 
- Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
- facebook_client_ strsecret 
- Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
- facebook_email_ Sequence[str]domains 
- Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- facebook_enabled bool
- Whether facebook is enabled as a login method
- facebook_expire int
- Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
- forward bool
- Whether to forward the user to another URL after authorized
- forward_url str
- URL to forward the user to
- google_client_ strid 
- Google OAuth2 app id. This is optional. If not provided, it will use a default one.
- google_client_ strsecret 
- Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
- google_email_ Sequence[str]domains 
- Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- google_enabled bool
- Whether Google is enabled as login method
- google_expire int
- Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
- gupshup_password str
- Required if sms_provider==gupshup
- gupshup_userid str
- Required if sms_provider==gupshup
- microsoft_client_ strid 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
- microsoft_client_ strsecret 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
- microsoft_email_ Sequence[str]domains 
- Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- microsoft_enabled bool
- Whether microsoft 365 is enabled as a login method
- microsoft_expire int
- Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
- passphrase_enabled bool
- Whether password is enabled
- passphrase_expire int
- Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, usesexpire
- password str
- Required if passphrase_enabled==true.
- predefined_sponsors_ boolenabled 
- Whether to show list of sponsor emails mentioned in sponsorsobject as a dropdown. If bothsponsor_notify_allandpredefined_sponsors_enabledare false, behavior is acc tosponsor_email_domains
- predefined_sponsors_ boolhide_ email 
- Whether to hide sponsor’s email from list of sponsors
- privacy bool
- puzzel_password str
- Required if sms_provider==puzzel
- puzzel_service_ strid 
- Required if sms_provider==puzzel
- puzzel_username str
- Required if sms_provider==puzzel
- sms_enabled bool
- Whether sms is enabled as a login method
- sms_expire int
- Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
- sms_message_ strformat 
- Optional if sms_enabled==true. SMS Message format
- sms_provider str
- Optional if sms_enabled==true. enum:broadnet,clickatell,gupshup,manual,puzzel,smsglobal,telstra,twilio
- smsglobal_api_ strkey 
- Required if sms_provider==smsglobal, Client API Key
- smsglobal_api_ strsecret 
- Required if sms_provider==smsglobal, Client secret
- sponsor_auto_ boolapprove 
- Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
- sponsor_email_ Sequence[str]domains 
- List of domain allowed for sponsor email. Required if sponsor_enabledistrueandsponsorsis empty.
- sponsor_enabled bool
- Whether sponsor is enabled
- sponsor_expire int
- Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
- sponsor_link_ strvalidity_ duration 
- Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
- sponsor_notify_ boolall 
- Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned insponsorsobject. Bothsponsor_notify_allandpredefined_sponsors_enabledshould be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
- sponsor_status_ boolnotify 
- Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
- sponsors Mapping[str, str]
- object of allowed sponsors email with name. Required if sponsor_enabledistrueandsponsor_email_domainsis empty.Property key is the sponsor email, Property value is the sponsor name
- sso_default_ strrole 
- Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
- sso_forced_ strrole 
- Optional if wlan_portal_auth==sso
- sso_idp_ strcert 
- Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
- sso_idp_ strsign_ algo 
- Optional if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum:sha1,sha256,sha384,sha512
- sso_idp_ strsso_ url 
- Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
- sso_issuer str
- Required if wlan_portal_auth==sso, IDP issuer URL
- sso_nameid_ strformat 
- Optional if wlan_portal_auth==sso. enum:email,unspecified
- telstra_client_ strid 
- Required if sms_provider==telstra, Client ID provided by Telstra
- telstra_client_ strsecret 
- Required if sms_provider==telstra, Client secret provided by Telstra
- twilio_auth_ strtoken 
- Required if sms_provider==twilio, Auth token account with twilio account
- twilio_phone_ strnumber 
- Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
- twilio_sid str
- Required if sms_provider==twilio, Account SID provided by Twilio
- allowWlan BooleanId Roam 
- Optional if amazon_enabled==true. Whether to allow guest to connect to other Guest WLANs (with differentWLAN.ssid) of same org without reauthentication (disable random_mac for seamless roaming)
- amazonClient StringId 
- Optional if amazon_enabled==true. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
- amazonClient StringSecret 
- Optional if amazon_enabled==true. Amazon OAuth2 client secret. If amazon_client_id was provided, provide a corresponding value. Else leave blank.
- amazonEmail List<String>Domains 
- Optional if amazon_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- amazonEnabled Boolean
- Whether amazon is enabled as a login method
- amazonExpire Number
- Optional if amazon_enabled==true. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
- auth String
- authentication scheme. enum: amazon,azure,email,external,facebook,google,microsoft,multi,none,password,sms,sponsor,sso
- azureClient StringId 
- Required if azure_enabled==true. Azure active directory app client id
- azureClient StringSecret 
- Required if azure_enabled==true. Azure active directory app client secret
- azureEnabled Boolean
- Whether Azure Active Directory is enabled as a login method
- azureExpire Number
- Interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
- azureTenant StringId 
- Required if azure_enabled==true. Azure active directory tenant id.
- broadnetPassword String
- Required if sms_provider==broadnet
- broadnetSid String
- Required if sms_provider==broadnet
- broadnetUser StringId 
- Required if sms_provider==broadnet
- bypassWhen BooleanCloud Down 
- Whether to bypass the guest portal when cloud not reachable (and apply the default policies)
- clickatellApi StringKey 
- Required if sms_provider==clickatell
- crossSite Boolean
- Whether to allow guest to roam between WLANs (with same WLAN.ssid, regardless of variables) of different sites of same org without reauthentication (disable random_mac for seamless roaming)
- emailEnabled Boolean
- Whether email (access code verification) is enabled as a login method
- enabled Boolean
- Whether guest portal is enabled
- expire Number
- How long to remain authorized, in minutes
- externalPortal StringUrl 
- Required if wlan_portal_auth==external. External portal URL (e.g. https://host/url) where we can append our query parameters to
- facebookClient StringId 
- Required if facebook_enabled==true. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
- facebookClient StringSecret 
- Required if facebook_enabled==true. Facebook OAuth2 app secret. If facebook_client_id was provided, provide a corresponding value. Else leave blank.
- facebookEmail List<String>Domains 
- Optional if facebook_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- facebookEnabled Boolean
- Whether facebook is enabled as a login method
- facebookExpire Number
- Optional if facebook_enabled==true. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
- forward Boolean
- Whether to forward the user to another URL after authorized
- forwardUrl String
- URL to forward the user to
- googleClient StringId 
- Google OAuth2 app id. This is optional. If not provided, it will use a default one.
- googleClient StringSecret 
- Optional if google_enabled==true. Google OAuth2 app secret. If google_client_id was provided, provide a corresponding value. Else leave blank.
- googleEmail List<String>Domains 
- Optional if google_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- googleEnabled Boolean
- Whether Google is enabled as login method
- googleExpire Number
- Optional if google_enabled==true. Interval for which guest remains authorized using Google Auth (in minutes), if not provided, uses expire`
- gupshupPassword String
- Required if sms_provider==gupshup
- gupshupUserid String
- Required if sms_provider==gupshup
- microsoftClient StringId 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
- microsoftClient StringSecret 
- Optional if microsoft_enabled==true. Microsoft 365 OAuth2 client secret. If microsoft_client_id was provided, provide a corresponding value. Else leave blank.
- microsoftEmail List<String>Domains 
- Optional if microsoft_enabled==true. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
- microsoftEnabled Boolean
- Whether microsoft 365 is enabled as a login method
- microsoftExpire Number
- Optional if microsoft_enabled==true. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
- passphraseEnabled Boolean
- Whether password is enabled
- passphraseExpire Number
- Optional if passphrase_enabled==true. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, usesexpire
- password String
- Required if passphrase_enabled==true.
- predefinedSponsors BooleanEnabled 
- Whether to show list of sponsor emails mentioned in sponsorsobject as a dropdown. If bothsponsor_notify_allandpredefined_sponsors_enabledare false, behavior is acc tosponsor_email_domains
- predefinedSponsors BooleanHide Email 
- Whether to hide sponsor’s email from list of sponsors
- privacy Boolean
- puzzelPassword String
- Required if sms_provider==puzzel
- puzzelService StringId 
- Required if sms_provider==puzzel
- puzzelUsername String
- Required if sms_provider==puzzel
- smsEnabled Boolean
- Whether sms is enabled as a login method
- smsExpire Number
- Optional if sms_enabled==true. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
- smsMessage StringFormat 
- Optional if sms_enabled==true. SMS Message format
- smsProvider String
- Optional if sms_enabled==true. enum:broadnet,clickatell,gupshup,manual,puzzel,smsglobal,telstra,twilio
- smsglobalApi StringKey 
- Required if sms_provider==smsglobal, Client API Key
- smsglobalApi StringSecret 
- Required if sms_provider==smsglobal, Client secret
- sponsorAuto BooleanApprove 
- Optional if sponsor_enabled==true. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefined_sponsors_enabled enabled and sponsor_notify_all disabled
- sponsorEmail List<String>Domains 
- List of domain allowed for sponsor email. Required if sponsor_enabledistrueandsponsorsis empty.
- sponsorEnabled Boolean
- Whether sponsor is enabled
- sponsorExpire Number
- Optional if sponsor_enabled==true. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
- sponsorLink StringValidity Duration 
- Optional if sponsor_enabled==true. How long to remain valid sponsored guest request approve/deny link received in email, in minutes. Default is 60 minutes.
- sponsorNotify BooleanAll 
- Optional if sponsor_enabled==true. whether to notify all sponsors that are mentioned insponsorsobject. Bothsponsor_notify_allandpredefined_sponsors_enabledshould be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
- sponsorStatus BooleanNotify 
- Optional if sponsor_enabled==true. If enabled, guest will get email about sponsor's action (approve/deny)
- sponsors Map<String>
- object of allowed sponsors email with name. Required if sponsor_enabledistrueandsponsor_email_domainsis empty.Property key is the sponsor email, Property value is the sponsor name
- ssoDefault StringRole 
- Optional if wlan_portal_auth==sso, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
- ssoForced StringRole 
- Optional if wlan_portal_auth==sso
- ssoIdp StringCert 
- Required if wlan_portal_auth==sso. IDP Cert (used to verify the signed response)
- ssoIdp StringSign Algo 
- Optional if wlan_portal_auth==sso, Signing algorithm for SAML Assertion. enum:sha1,sha256,sha384,sha512
- ssoIdp StringSso Url 
- Required if wlan_portal_auth==sso, IDP Single-Sign-On URL
- ssoIssuer String
- Required if wlan_portal_auth==sso, IDP issuer URL
- ssoNameid StringFormat 
- Optional if wlan_portal_auth==sso. enum:email,unspecified
- telstraClient StringId 
- Required if sms_provider==telstra, Client ID provided by Telstra
- telstraClient StringSecret 
- Required if sms_provider==telstra, Client secret provided by Telstra
- twilioAuth StringToken 
- Required if sms_provider==twilio, Auth token account with twilio account
- twilioPhone StringNumber 
- Required if sms_provider==twilio, Twilio phone number associated with the account. See example for accepted format.
- twilioSid String
- Required if sms_provider==twilio, Account SID provided by Twilio
WlanQos, WlanQosArgs    
WlanRadsec, WlanRadsecArgs    
- CoaEnabled bool
- Enabled bool
- IdleTimeout string
- MxclusterIds List<string>
- To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
- ProxyHosts List<string>
- Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. Whenradsec.proxy_hostsare not used, tunnel peers (org or site mxedges) are used irrespective ofuse_site_mxedge
- ServerName string
- Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
- Servers
List<Pulumi.Juniper Mist. Site. Inputs. Wlan Radsec Server> 
- List of RadSec Servers. Only if not Mist Edge.
- UseMxedge bool
- use mxedge(s) as RadSec Proxy
- UseSite boolMxedge 
- To use Site mxedges when this WLAN does not use mxtunnel
- CoaEnabled bool
- Enabled bool
- IdleTimeout string
- MxclusterIds []string
- To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
- ProxyHosts []string
- Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. Whenradsec.proxy_hostsare not used, tunnel peers (org or site mxedges) are used irrespective ofuse_site_mxedge
- ServerName string
- Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
- Servers
[]WlanRadsec Server 
- List of RadSec Servers. Only if not Mist Edge.
- UseMxedge bool
- use mxedge(s) as RadSec Proxy
- UseSite boolMxedge 
- To use Site mxedges when this WLAN does not use mxtunnel
- coaEnabled Boolean
- enabled Boolean
- idleTimeout String
- mxclusterIds List<String>
- To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
- proxyHosts List<String>
- Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. Whenradsec.proxy_hostsare not used, tunnel peers (org or site mxedges) are used irrespective ofuse_site_mxedge
- serverName String
- Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
- servers
List<WlanRadsec Server> 
- List of RadSec Servers. Only if not Mist Edge.
- useMxedge Boolean
- use mxedge(s) as RadSec Proxy
- useSite BooleanMxedge 
- To use Site mxedges when this WLAN does not use mxtunnel
- coaEnabled boolean
- enabled boolean
- idleTimeout string
- mxclusterIds string[]
- To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
- proxyHosts string[]
- Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. Whenradsec.proxy_hostsare not used, tunnel peers (org or site mxedges) are used irrespective ofuse_site_mxedge
- serverName string
- Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
- servers
WlanRadsec Server[] 
- List of RadSec Servers. Only if not Mist Edge.
- useMxedge boolean
- use mxedge(s) as RadSec Proxy
- useSite booleanMxedge 
- To use Site mxedges when this WLAN does not use mxtunnel
- coa_enabled bool
- enabled bool
- idle_timeout str
- mxcluster_ids Sequence[str]
- To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
- proxy_hosts Sequence[str]
- Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. Whenradsec.proxy_hostsare not used, tunnel peers (org or site mxedges) are used irrespective ofuse_site_mxedge
- server_name str
- Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
- servers
Sequence[WlanRadsec Server] 
- List of RadSec Servers. Only if not Mist Edge.
- use_mxedge bool
- use mxedge(s) as RadSec Proxy
- use_site_ boolmxedge 
- To use Site mxedges when this WLAN does not use mxtunnel
- coaEnabled Boolean
- enabled Boolean
- idleTimeout String
- mxclusterIds List<String>
- To use Org mxedges when this WLAN does not use mxtunnel, specify their mxcluster_ids. Org mxedge(s) identified by mxcluster_ids
- proxyHosts List<String>
- Default is site.mxedge.radsec.proxy_hosts which must be a superset of all wlans[*].radsec.proxy_hosts. Whenradsec.proxy_hostsare not used, tunnel peers (org or site mxedges) are used irrespective ofuse_site_mxedge
- serverName String
- Name of the server to verify (against the cacerts in Org Setting). Only if not Mist Edge.
- servers List<Property Map>
- List of RadSec Servers. Only if not Mist Edge.
- useMxedge Boolean
- use mxedge(s) as RadSec Proxy
- useSite BooleanMxedge 
- To use Site mxedges when this WLAN does not use mxtunnel
WlanRadsecServer, WlanRadsecServerArgs      
WlanRateset, WlanRatesetArgs    
- Eht string
- If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
- He string
- If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
- Ht string
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
- Legacies List<string>
- if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. Iftemplate==customis configured and legacy does not define at least one basic rate, it will useno-legacydefault values. enum:1,11,11b,12,12b,18,18b,1b,2,24,24b,2b,36,36b,48,48b,5.5,5.5b,54,54b,6,6b,9,9b
- MinRssi int
- Minimum RSSI for client to connect, 0 means not enforcing
- Template string
- Data Rates template to apply. enum:- no-legacy: no 11b
- compatible: all, like before, default setting that Broadcom/Atheros used
- legacy-only: disable 802.11n and 802.11ac
- high-density: no 11b, no low rates
- custom: user defined
 
- Vht string
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
- Eht string
- If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
- He string
- If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
- Ht string
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
- Legacies []string
- if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. Iftemplate==customis configured and legacy does not define at least one basic rate, it will useno-legacydefault values. enum:1,11,11b,12,12b,18,18b,1b,2,24,24b,2b,36,36b,48,48b,5.5,5.5b,54,54b,6,6b,9,9b
- MinRssi int
- Minimum RSSI for client to connect, 0 means not enforcing
- Template string
- Data Rates template to apply. enum:- no-legacy: no 11b
- compatible: all, like before, default setting that Broadcom/Atheros used
- legacy-only: disable 802.11n and 802.11ac
- high-density: no 11b, no low rates
- custom: user defined
 
- Vht string
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
- eht String
- If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
- he String
- If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
- ht String
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
- legacies List<String>
- if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. Iftemplate==customis configured and legacy does not define at least one basic rate, it will useno-legacydefault values. enum:1,11,11b,12,12b,18,18b,1b,2,24,24b,2b,36,36b,48,48b,5.5,5.5b,54,54b,6,6b,9,9b
- minRssi Integer
- Minimum RSSI for client to connect, 0 means not enforcing
- template String
- Data Rates template to apply. enum:- no-legacy: no 11b
- compatible: all, like before, default setting that Broadcom/Atheros used
- legacy-only: disable 802.11n and 802.11ac
- high-density: no 11b, no low rates
- custom: user defined
 
- vht String
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
- eht string
- If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
- he string
- If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
- ht string
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
- legacies string[]
- if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. Iftemplate==customis configured and legacy does not define at least one basic rate, it will useno-legacydefault values. enum:1,11,11b,12,12b,18,18b,1b,2,24,24b,2b,36,36b,48,48b,5.5,5.5b,54,54b,6,6b,9,9b
- minRssi number
- Minimum RSSI for client to connect, 0 means not enforcing
- template string
- Data Rates template to apply. enum:- no-legacy: no 11b
- compatible: all, like before, default setting that Broadcom/Atheros used
- legacy-only: disable 802.11n and 802.11ac
- high-density: no 11b, no low rates
- custom: user defined
 
- vht string
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
- eht str
- If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
- he str
- If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
- ht str
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
- legacies Sequence[str]
- if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. Iftemplate==customis configured and legacy does not define at least one basic rate, it will useno-legacydefault values. enum:1,11,11b,12,12b,18,18b,1b,2,24,24b,2b,36,36b,48,48b,5.5,5.5b,54,54b,6,6b,9,9b
- min_rssi int
- Minimum RSSI for client to connect, 0 means not enforcing
- template str
- Data Rates template to apply. enum:- no-legacy: no 11b
- compatible: all, like before, default setting that Broadcom/Atheros used
- legacy-only: disable 802.11n and 802.11ac
- high-density: no 11b, no low rates
- custom: user defined
 
- vht str
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
- eht String
- If template==custom. EHT MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit)
- he String
- If template==custom. HE MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit
- ht String
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 00ff 00f0 001f limits HT rates to MCS 0-7 for 1 stream, MCS 4-7 for 2 stream (i.e. MCS 12-15), MCS 1-5 for 3 stream (i.e. MCS 16-20)
- legacies List<String>
- if template==custom. List of supported rates (IE=1) and extended supported rates (IE=50) for custom template, append ‘b’ at the end to indicate a rate being basic/mandatory. Iftemplate==customis configured and legacy does not define at least one basic rate, it will useno-legacydefault values. enum:1,11,11b,12,12b,18,18b,1b,2,24,24b,2b,36,36b,48,48b,5.5,5.5b,54,54b,6,6b,9,9b
- minRssi Number
- Minimum RSSI for client to connect, 0 means not enforcing
- template String
- Data Rates template to apply. enum:- no-legacy: no 11b
- compatible: all, like before, default setting that Broadcom/Atheros used
- legacy-only: disable 802.11n and 802.11ac
- high-density: no 11b, no low rates
- custom: user defined
 
- vht String
- If template==custom. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
WlanSchedule, WlanScheduleArgs    
- Enabled bool
- Hours
Pulumi.Juniper Mist. Site. Inputs. Wlan Schedule Hours 
- Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
- Enabled bool
- Hours
WlanSchedule Hours 
- Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
- enabled Boolean
- hours
WlanSchedule Hours 
- Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
- enabled boolean
- hours
WlanSchedule Hours 
- Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
- enabled bool
- hours
WlanSchedule Hours 
- Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
- enabled Boolean
- hours Property Map
- Days/Hours of operation filter, the available days (mon, tue, wed, thu, fri, sat, sun)
WlanScheduleHours, WlanScheduleHoursArgs      
- Fri string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Mon string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Sat string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Sun string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Thu string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Tue string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Wed string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Fri string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Mon string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Sat string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Sun string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Thu string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Tue string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- Wed string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- fri String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- mon String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sat String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sun String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- thu String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- tue String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- wed String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- fri string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- mon string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sat string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sun string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- thu string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- tue string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- wed string
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- fri str
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- mon str
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sat str
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sun str
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- thu str
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- tue str
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- wed str
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- fri String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- mon String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sat String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- sun String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- thu String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- tue String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
- wed String
- Hour range of the day (e.g. 09:00-17:00). If the hour is not defined then it's treated as 00:00-23:59.
Import
Using pulumi import, import mist_site_wlan with:
Site WLAN can be imported by specifying the site_id and the wlan_id
$ pulumi import junipermist:site/wlan:Wlan wlan_one 17b46405-3a6d-4715-8bb4-6bb6d06f316a.d3c42998-9012-4859-9743-6b9bee475309
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- junipermist pulumi/pulumi-junipermist
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the mistTerraform Provider.
 
