routeros.InterfaceWirelessSecurityProfiles
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as routeros from "@pulumi/routeros";
const test = new routeros.InterfaceWirelessSecurityProfiles("test", {
authenticationTypes: [
"wpa-psk",
"wpa2-psk",
],
mode: "dynamic-keys",
wpa2PreSharedKey: "wpa2_psk_key",
wpaPreSharedKey: "wpa_psk_key",
});
import pulumi
import pulumi_routeros as routeros
test = routeros.InterfaceWirelessSecurityProfiles("test",
authentication_types=[
"wpa-psk",
"wpa2-psk",
],
mode="dynamic-keys",
wpa2_pre_shared_key="wpa2_psk_key",
wpa_pre_shared_key="wpa_psk_key")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/routeros/routeros"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := routeros.NewInterfaceWirelessSecurityProfiles(ctx, "test", &routeros.InterfaceWirelessSecurityProfilesArgs{
AuthenticationTypes: pulumi.StringArray{
pulumi.String("wpa-psk"),
pulumi.String("wpa2-psk"),
},
Mode: pulumi.String("dynamic-keys"),
Wpa2PreSharedKey: pulumi.String("wpa2_psk_key"),
WpaPreSharedKey: pulumi.String("wpa_psk_key"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Routeros = Pulumi.Routeros;
return await Deployment.RunAsync(() =>
{
var test = new Routeros.InterfaceWirelessSecurityProfiles("test", new()
{
AuthenticationTypes = new[]
{
"wpa-psk",
"wpa2-psk",
},
Mode = "dynamic-keys",
Wpa2PreSharedKey = "wpa2_psk_key",
WpaPreSharedKey = "wpa_psk_key",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.routeros.InterfaceWirelessSecurityProfiles;
import com.pulumi.routeros.InterfaceWirelessSecurityProfilesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var test = new InterfaceWirelessSecurityProfiles("test", InterfaceWirelessSecurityProfilesArgs.builder()
.authenticationTypes(
"wpa-psk",
"wpa2-psk")
.mode("dynamic-keys")
.wpa2PreSharedKey("wpa2_psk_key")
.wpaPreSharedKey("wpa_psk_key")
.build());
}
}
resources:
test:
type: routeros:InterfaceWirelessSecurityProfiles
properties:
authenticationTypes:
- wpa-psk
- wpa2-psk
mode: dynamic-keys
wpa2PreSharedKey: wpa2_psk_key
wpaPreSharedKey: wpa_psk_key
Create InterfaceWirelessSecurityProfiles Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new InterfaceWirelessSecurityProfiles(name: string, args?: InterfaceWirelessSecurityProfilesArgs, opts?: CustomResourceOptions);
@overload
def InterfaceWirelessSecurityProfiles(resource_name: str,
args: Optional[InterfaceWirelessSecurityProfilesArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def InterfaceWirelessSecurityProfiles(resource_name: str,
opts: Optional[ResourceOptions] = None,
___id_: Optional[float] = None,
___path_: Optional[str] = None,
authentication_types: Optional[Sequence[str]] = None,
comment: Optional[str] = None,
disable_pmkid: Optional[bool] = None,
eap_methods: Optional[str] = None,
group_ciphers: Optional[str] = None,
group_key_update: Optional[str] = None,
interface_wireless_security_profiles_id: Optional[str] = None,
interim_update: Optional[str] = None,
management_protection: Optional[str] = None,
management_protection_key: Optional[str] = None,
mode: Optional[str] = None,
mschapv2_password: Optional[str] = None,
mschapv2_username: Optional[str] = None,
name: Optional[str] = None,
radius_called_format: Optional[str] = None,
radius_eap_accounting: Optional[bool] = None,
radius_mac_accounting: Optional[bool] = None,
radius_mac_authentication: Optional[bool] = None,
radius_mac_caching: Optional[str] = None,
radius_mac_format: Optional[str] = None,
radius_mac_mode: Optional[str] = None,
static_algo0: Optional[str] = None,
static_algo1: Optional[str] = None,
static_algo2: Optional[str] = None,
static_algo3: Optional[str] = None,
static_key0: Optional[str] = None,
static_key1: Optional[str] = None,
static_key2: Optional[str] = None,
static_key3: Optional[str] = None,
static_sta_private_algo: Optional[str] = None,
static_sta_private_key: Optional[str] = None,
static_transmit_key: Optional[str] = None,
supplicant_identity: Optional[str] = None,
tls_certificate: Optional[str] = None,
tls_mode: Optional[str] = None,
unicast_ciphers: Optional[str] = None,
wpa2_pre_shared_key: Optional[str] = None,
wpa_pre_shared_key: Optional[str] = None)
func NewInterfaceWirelessSecurityProfiles(ctx *Context, name string, args *InterfaceWirelessSecurityProfilesArgs, opts ...ResourceOption) (*InterfaceWirelessSecurityProfiles, error)
public InterfaceWirelessSecurityProfiles(string name, InterfaceWirelessSecurityProfilesArgs? args = null, CustomResourceOptions? opts = null)
public InterfaceWirelessSecurityProfiles(String name, InterfaceWirelessSecurityProfilesArgs args)
public InterfaceWirelessSecurityProfiles(String name, InterfaceWirelessSecurityProfilesArgs args, CustomResourceOptions options)
type: routeros:InterfaceWirelessSecurityProfiles
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args InterfaceWirelessSecurityProfilesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args InterfaceWirelessSecurityProfilesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args InterfaceWirelessSecurityProfilesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args InterfaceWirelessSecurityProfilesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args InterfaceWirelessSecurityProfilesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
InterfaceWirelessSecurityProfiles Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The InterfaceWirelessSecurityProfiles resource accepts the following input properties:
- Authentication
Types List<string> - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- Comment string
- Disable
Pmkid bool - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - Eap
Methods string - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - Group
Ciphers string - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - Group
Key stringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- Interface
Wireless stringSecurity Profiles Id - The ID of this resource.
- Interim
Update string - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- Management
Protection string - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - Management
Protection stringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- Mode string
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - Mschapv2Password string
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Mschapv2Username string
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Name string
- Name of the security profile.
- Radius
Called stringFormat - mac | mac:ssid | ssid
- Radius
Eap boolAccounting - Radius
Mac boolAccounting - Radius
Mac boolAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- Radius
Mac stringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- Radius
Mac stringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- Radius
Mac stringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - Static
Algo0 string - Encryption algorithm to use with the corresponding key.
- Static
Algo1 string - Encryption algorithm to use with the corresponding key.
- Static
Algo2 string - Encryption algorithm to use with the corresponding key.
- Static
Algo3 string - Encryption algorithm to use with the corresponding key.
- Static
Key0 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key1 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key2 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key3 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Sta stringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- Static
Sta stringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- Static
Transmit stringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- Supplicant
Identity string - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- Tls
Certificate string - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- Tls
Mode string - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - Unicast
Ciphers string - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- string
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- string
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.- ___
id_ double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- Authentication
Types []string - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- Comment string
- Disable
Pmkid bool - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - Eap
Methods string - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - Group
Ciphers string - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - Group
Key stringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- Interface
Wireless stringSecurity Profiles Id - The ID of this resource.
- Interim
Update string - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- Management
Protection string - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - Management
Protection stringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- Mode string
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - Mschapv2Password string
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Mschapv2Username string
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Name string
- Name of the security profile.
- Radius
Called stringFormat - mac | mac:ssid | ssid
- Radius
Eap boolAccounting - Radius
Mac boolAccounting - Radius
Mac boolAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- Radius
Mac stringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- Radius
Mac stringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- Radius
Mac stringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - Static
Algo0 string - Encryption algorithm to use with the corresponding key.
- Static
Algo1 string - Encryption algorithm to use with the corresponding key.
- Static
Algo2 string - Encryption algorithm to use with the corresponding key.
- Static
Algo3 string - Encryption algorithm to use with the corresponding key.
- Static
Key0 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key1 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key2 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key3 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Sta stringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- Static
Sta stringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- Static
Transmit stringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- Supplicant
Identity string - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- Tls
Certificate string - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- Tls
Mode string - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - Unicast
Ciphers string - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- string
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- string
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.- ___
id_ float64 - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
id_ Double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication
Types List<String> - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment String
- disable
Pmkid Boolean - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap
Methods String - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group
Ciphers String - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group
Key StringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface
Wireless StringSecurity Profiles Id - The ID of this resource.
- interim
Update String - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management
Protection String - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management
Protection StringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode String
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2Password String
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2Username String
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name String
- Name of the security profile.
- radius
Called StringFormat - mac | mac:ssid | ssid
- radius
Eap BooleanAccounting - radius
Mac BooleanAccounting - radius
Mac BooleanAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius
Mac StringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius
Mac StringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius
Mac StringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static
Algo0 String - Encryption algorithm to use with the corresponding key.
- static
Algo1 String - Encryption algorithm to use with the corresponding key.
- static
Algo2 String - Encryption algorithm to use with the corresponding key.
- static
Algo3 String - Encryption algorithm to use with the corresponding key.
- static
Key0 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key1 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key2 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key3 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Sta StringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static
Sta StringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static
Transmit StringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant
Identity String - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls
Certificate String - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls
Mode String - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast
Ciphers String - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- String
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- String
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
- ___
id_ number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication
Types string[] - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment string
- disable
Pmkid boolean - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap
Methods string - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group
Ciphers string - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group
Key stringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface
Wireless stringSecurity Profiles Id - The ID of this resource.
- interim
Update string - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management
Protection string - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management
Protection stringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode string
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2Password string
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2Username string
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name string
- Name of the security profile.
- radius
Called stringFormat - mac | mac:ssid | ssid
- radius
Eap booleanAccounting - radius
Mac booleanAccounting - radius
Mac booleanAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius
Mac stringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius
Mac stringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius
Mac stringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static
Algo0 string - Encryption algorithm to use with the corresponding key.
- static
Algo1 string - Encryption algorithm to use with the corresponding key.
- static
Algo2 string - Encryption algorithm to use with the corresponding key.
- static
Algo3 string - Encryption algorithm to use with the corresponding key.
- static
Key0 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key1 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key2 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key3 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Sta stringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static
Sta stringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static
Transmit stringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant
Identity string - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls
Certificate string - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls
Mode string - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast
Ciphers string - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- string
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- string
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
- ___
id_ float - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ str - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication_
types Sequence[str] - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment str
- disable_
pmkid bool - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap_
methods str - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group_
ciphers str - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group_
key_ strupdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface_
wireless_ strsecurity_ profiles_ id - The ID of this resource.
- interim_
update str - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management_
protection str - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management_
protection_ strkey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode str
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2_
password str - Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2_
username str - Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name str
- Name of the security profile.
- radius_
called_ strformat - mac | mac:ssid | ssid
- radius_
eap_ boolaccounting - radius_
mac_ boolaccounting - radius_
mac_ boolauthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius_
mac_ strcaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius_
mac_ strformat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius_
mac_ strmode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static_
algo0 str - Encryption algorithm to use with the corresponding key.
- static_
algo1 str - Encryption algorithm to use with the corresponding key.
- static_
algo2 str - Encryption algorithm to use with the corresponding key.
- static_
algo3 str - Encryption algorithm to use with the corresponding key.
- static_
key0 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
key1 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
key2 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
key3 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
sta_ strprivate_ algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static_
sta_ strprivate_ key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static_
transmit_ strkey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant_
identity str - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls_
certificate str - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls_
mode str - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast_
ciphers str - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- str
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- str
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
- ___
id_ Number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication
Types List<String> - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment String
- disable
Pmkid Boolean - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap
Methods String - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group
Ciphers String - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group
Key StringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface
Wireless StringSecurity Profiles Id - The ID of this resource.
- interim
Update String - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management
Protection String - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management
Protection StringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode String
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2Password String
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2Username String
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name String
- Name of the security profile.
- radius
Called StringFormat - mac | mac:ssid | ssid
- radius
Eap BooleanAccounting - radius
Mac BooleanAccounting - radius
Mac BooleanAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius
Mac StringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius
Mac StringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius
Mac StringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static
Algo0 String - Encryption algorithm to use with the corresponding key.
- static
Algo1 String - Encryption algorithm to use with the corresponding key.
- static
Algo2 String - Encryption algorithm to use with the corresponding key.
- static
Algo3 String - Encryption algorithm to use with the corresponding key.
- static
Key0 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key1 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key2 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key3 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Sta StringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static
Sta StringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static
Transmit StringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant
Identity String - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls
Certificate String - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls
Mode String - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast
Ciphers String - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- String
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- String
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
Outputs
All input properties are implicitly available as output properties. Additionally, the InterfaceWirelessSecurityProfiles resource produces the following output properties:
Look up Existing InterfaceWirelessSecurityProfiles Resource
Get an existing InterfaceWirelessSecurityProfiles resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: InterfaceWirelessSecurityProfilesState, opts?: CustomResourceOptions): InterfaceWirelessSecurityProfiles
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
___id_: Optional[float] = None,
___path_: Optional[str] = None,
authentication_types: Optional[Sequence[str]] = None,
comment: Optional[str] = None,
default: Optional[bool] = None,
disable_pmkid: Optional[bool] = None,
eap_methods: Optional[str] = None,
group_ciphers: Optional[str] = None,
group_key_update: Optional[str] = None,
interface_wireless_security_profiles_id: Optional[str] = None,
interim_update: Optional[str] = None,
management_protection: Optional[str] = None,
management_protection_key: Optional[str] = None,
mode: Optional[str] = None,
mschapv2_password: Optional[str] = None,
mschapv2_username: Optional[str] = None,
name: Optional[str] = None,
radius_called_format: Optional[str] = None,
radius_eap_accounting: Optional[bool] = None,
radius_mac_accounting: Optional[bool] = None,
radius_mac_authentication: Optional[bool] = None,
radius_mac_caching: Optional[str] = None,
radius_mac_format: Optional[str] = None,
radius_mac_mode: Optional[str] = None,
static_algo0: Optional[str] = None,
static_algo1: Optional[str] = None,
static_algo2: Optional[str] = None,
static_algo3: Optional[str] = None,
static_key0: Optional[str] = None,
static_key1: Optional[str] = None,
static_key2: Optional[str] = None,
static_key3: Optional[str] = None,
static_sta_private_algo: Optional[str] = None,
static_sta_private_key: Optional[str] = None,
static_transmit_key: Optional[str] = None,
supplicant_identity: Optional[str] = None,
tls_certificate: Optional[str] = None,
tls_mode: Optional[str] = None,
unicast_ciphers: Optional[str] = None,
wpa2_pre_shared_key: Optional[str] = None,
wpa_pre_shared_key: Optional[str] = None) -> InterfaceWirelessSecurityProfiles
func GetInterfaceWirelessSecurityProfiles(ctx *Context, name string, id IDInput, state *InterfaceWirelessSecurityProfilesState, opts ...ResourceOption) (*InterfaceWirelessSecurityProfiles, error)
public static InterfaceWirelessSecurityProfiles Get(string name, Input<string> id, InterfaceWirelessSecurityProfilesState? state, CustomResourceOptions? opts = null)
public static InterfaceWirelessSecurityProfiles get(String name, Output<String> id, InterfaceWirelessSecurityProfilesState state, CustomResourceOptions options)
resources: _: type: routeros:InterfaceWirelessSecurityProfiles get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Authentication
Types List<string> - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- Comment string
- Default bool
- It's the default item.
- Disable
Pmkid bool - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - Eap
Methods string - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - Group
Ciphers string - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - Group
Key stringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- Interface
Wireless stringSecurity Profiles Id - The ID of this resource.
- Interim
Update string - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- Management
Protection string - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - Management
Protection stringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- Mode string
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - Mschapv2Password string
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Mschapv2Username string
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Name string
- Name of the security profile.
- Radius
Called stringFormat - mac | mac:ssid | ssid
- Radius
Eap boolAccounting - Radius
Mac boolAccounting - Radius
Mac boolAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- Radius
Mac stringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- Radius
Mac stringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- Radius
Mac stringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - Static
Algo0 string - Encryption algorithm to use with the corresponding key.
- Static
Algo1 string - Encryption algorithm to use with the corresponding key.
- Static
Algo2 string - Encryption algorithm to use with the corresponding key.
- Static
Algo3 string - Encryption algorithm to use with the corresponding key.
- Static
Key0 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key1 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key2 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key3 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Sta stringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- Static
Sta stringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- Static
Transmit stringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- Supplicant
Identity string - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- Tls
Certificate string - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- Tls
Mode string - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - Unicast
Ciphers string - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- string
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- string
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.- ___
id_ double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- Authentication
Types []string - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- Comment string
- Default bool
- It's the default item.
- Disable
Pmkid bool - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - Eap
Methods string - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - Group
Ciphers string - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - Group
Key stringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- Interface
Wireless stringSecurity Profiles Id - The ID of this resource.
- Interim
Update string - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- Management
Protection string - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - Management
Protection stringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- Mode string
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - Mschapv2Password string
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Mschapv2Username string
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - Name string
- Name of the security profile.
- Radius
Called stringFormat - mac | mac:ssid | ssid
- Radius
Eap boolAccounting - Radius
Mac boolAccounting - Radius
Mac boolAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- Radius
Mac stringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- Radius
Mac stringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- Radius
Mac stringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - Static
Algo0 string - Encryption algorithm to use with the corresponding key.
- Static
Algo1 string - Encryption algorithm to use with the corresponding key.
- Static
Algo2 string - Encryption algorithm to use with the corresponding key.
- Static
Algo3 string - Encryption algorithm to use with the corresponding key.
- Static
Key0 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key1 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key2 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Key3 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- Static
Sta stringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- Static
Sta stringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- Static
Transmit stringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- Supplicant
Identity string - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- Tls
Certificate string - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- Tls
Mode string - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - Unicast
Ciphers string - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- string
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- string
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.- ___
id_ float64 - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
id_ Double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication
Types List<String> - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment String
- default_ Boolean
- It's the default item.
- disable
Pmkid Boolean - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap
Methods String - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group
Ciphers String - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group
Key StringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface
Wireless StringSecurity Profiles Id - The ID of this resource.
- interim
Update String - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management
Protection String - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management
Protection StringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode String
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2Password String
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2Username String
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name String
- Name of the security profile.
- radius
Called StringFormat - mac | mac:ssid | ssid
- radius
Eap BooleanAccounting - radius
Mac BooleanAccounting - radius
Mac BooleanAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius
Mac StringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius
Mac StringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius
Mac StringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static
Algo0 String - Encryption algorithm to use with the corresponding key.
- static
Algo1 String - Encryption algorithm to use with the corresponding key.
- static
Algo2 String - Encryption algorithm to use with the corresponding key.
- static
Algo3 String - Encryption algorithm to use with the corresponding key.
- static
Key0 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key1 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key2 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key3 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Sta StringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static
Sta StringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static
Transmit StringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant
Identity String - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls
Certificate String - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls
Mode String - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast
Ciphers String - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- String
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- String
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
- ___
id_ number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication
Types string[] - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment string
- default boolean
- It's the default item.
- disable
Pmkid boolean - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap
Methods string - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group
Ciphers string - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group
Key stringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface
Wireless stringSecurity Profiles Id - The ID of this resource.
- interim
Update string - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management
Protection string - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management
Protection stringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode string
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2Password string
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2Username string
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name string
- Name of the security profile.
- radius
Called stringFormat - mac | mac:ssid | ssid
- radius
Eap booleanAccounting - radius
Mac booleanAccounting - radius
Mac booleanAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius
Mac stringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius
Mac stringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius
Mac stringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static
Algo0 string - Encryption algorithm to use with the corresponding key.
- static
Algo1 string - Encryption algorithm to use with the corresponding key.
- static
Algo2 string - Encryption algorithm to use with the corresponding key.
- static
Algo3 string - Encryption algorithm to use with the corresponding key.
- static
Key0 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key1 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key2 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key3 string - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Sta stringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static
Sta stringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static
Transmit stringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant
Identity string - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls
Certificate string - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls
Mode string - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast
Ciphers string - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- string
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- string
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
- ___
id_ float - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ str - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication_
types Sequence[str] - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment str
- default bool
- It's the default item.
- disable_
pmkid bool - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap_
methods str - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group_
ciphers str - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group_
key_ strupdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface_
wireless_ strsecurity_ profiles_ id - The ID of this resource.
- interim_
update str - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management_
protection str - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management_
protection_ strkey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode str
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2_
password str - Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2_
username str - Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name str
- Name of the security profile.
- radius_
called_ strformat - mac | mac:ssid | ssid
- radius_
eap_ boolaccounting - radius_
mac_ boolaccounting - radius_
mac_ boolauthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius_
mac_ strcaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius_
mac_ strformat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius_
mac_ strmode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static_
algo0 str - Encryption algorithm to use with the corresponding key.
- static_
algo1 str - Encryption algorithm to use with the corresponding key.
- static_
algo2 str - Encryption algorithm to use with the corresponding key.
- static_
algo3 str - Encryption algorithm to use with the corresponding key.
- static_
key0 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
key1 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
key2 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
key3 str - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static_
sta_ strprivate_ algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static_
sta_ strprivate_ key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static_
transmit_ strkey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant_
identity str - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls_
certificate str - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls_
mode str - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast_
ciphers str - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- str
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- str
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
- ___
id_ Number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- authentication
Types List<String> - Set of supported authentication types, multiple values can be selected. Access Point will advertise supported authentication types, and client will connect to Access Point only if it supports any of the advertised authentication types.
- comment String
- default Boolean
- It's the default item.
- disable
Pmkid Boolean - Whether to include
PMKID
into theEAPOL
frame sent out by the Access Point. Disabling PMKID can cause compatibility issues with devices that use the PMKID to connect to an Access Point.yes
- removes PMKID from EAPOL frames (improves security, reduces compatibility).no
- includes PMKID into EAPOL frames (reduces security, improves compatibility).This property only has effect on Access Points. - eap
Methods String - Allowed types of authentication methods, multiple values can be selected. This property only has effect on Access Points.
eap-tls
- Use built-in EAP TLS authentication. Both client and server certificates are supported. See description of tls-mode and tls-certificate properties.eap-ttls-mschapv2
- Use EAP-TTLS with MS-CHAPv2 authentication.passthrough
- Access Point will relay authentication process to the RADIUS server.peap
- Use Protected EAP authentication. - group
Ciphers String - Access Point advertises one of these ciphers, multiple values can be selected. Access Point uses it to encrypt all broadcast and multicast frames. Client attempts connection only to Access Points that use one of the specified group ciphers.
tkip
- Temporal Key Integrity Protocol - encryption protocol, compatible with legacy WEP equipment, but enhanced to correct some of the WEP flaws.aes-ccm
- more secure WPA encryption protocol, based on the reliable AES (Advanced Encryption Standard). Networks free of WEP legacy should use only this cipher. - group
Key StringUpdate - Controls how often Access Point updates the group key. This key is used to encrypt all broadcast and multicast frames. property only has effect for Access Points.
- interface
Wireless StringSecurity Profiles Id - The ID of this resource.
- interim
Update String - When RADIUS accounting is used, Access Point periodically sends accounting information updates to the RADIUS server. This property specifies default update interval that can be overridden by the RADIUS server using Acct-Interim-Interval attribute.
- management
Protection String - Management frame protection. Used for: Deauthentication attack prevention, MAC address cloning issue. Possible values are:
disabled
- management protection is disabled (default),allowed
- use management protection if supported by remote party (for AP - allow both, non-management protection and management protection clients, for client - connect both to APs with and without management protection),required
- establish association only with remote devices that support management protection (for AP - accept only clients that support management protection, for client - connect only to APs that support management protection). - management
Protection StringKey - Management protection shared secret. When interface is in AP mode, default management protection key (configured in security-profile) can be overridden by key specified in access-list or RADIUS attribute.
- mode String
- Encryption mode for the security profile.
none
- Encryption is not used. Encrypted frames are not accepted.static-keys-required
- WEP mode. Do not accept and do not send unencrypted frames. Station in static-keys-required mode will not connect to an Access Point in static-keys-optional mode.static-keys-optional
- WEP mode. Support encryption and decryption, but allow also to receive and send unencrypted frames. Device will send unencrypted frames if encryption algorithm is specified as none. Station in static-keys-optional mode will not connect to an Access Point instatic-keys-required
mode. See also: static-sta-private-algo, static-transmit-key.dynamic-keys
- WPA mode. - mschapv2Password String
- Password to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - mschapv2Username String
- Username to use for authentication when
eap-ttls-mschapv2
orpeap
authentication method is being used. This property only has effect on Stations. - name String
- Name of the security profile.
- radius
Called StringFormat - mac | mac:ssid | ssid
- radius
Eap BooleanAccounting - radius
Mac BooleanAccounting - radius
Mac BooleanAuthentication - This property affects the way how Access Point processes clients that are not found in the Access List.no - allow or reject client authentication based on the value of default-authentication property of the Wireless interface.yes - Query RADIUS server using MAC address of client as user name. With this setting the value of default-authentication has no effect.
- radius
Mac StringCaching - If this value is set to time interval, the Access Point will cache RADIUS MAC authentication responses for specified time, and will not contact RADIUS server if matching cache entry already exists. Value disabled will disable cache, Access Point will always contact RADIUS server.
- radius
Mac StringFormat - Controls how MAC address of the client is encoded by Access Point in the User-Name attribute of the MAC authentication and MAC accounting RADIUS requests.
- radius
Mac StringMode - By default Access Point uses an empty password, when sending Access-Request during MAC authentication. When this property is set to
as-username-and-password
, Access Point will use the same value for User-Password attribute as for the User-Name attribute. - static
Algo0 String - Encryption algorithm to use with the corresponding key.
- static
Algo1 String - Encryption algorithm to use with the corresponding key.
- static
Algo2 String - Encryption algorithm to use with the corresponding key.
- static
Algo3 String - Encryption algorithm to use with the corresponding key.
- static
Key0 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key1 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key2 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Key3 String - Hexadecimal representation of the key. Length of key must be appropriate for selected algorithm. See the Statically configured WEP keys section.
- static
Sta StringPrivate Algo - Encryption algorithm to use with station private key. Value none disables use of the private key. This property is only used on Stations. Access Point has to get corresponding value either from private-algo property, or from Mikrotik-Wireless-Enc-Algo attribute. Station private key replaces key 0 for unicast frames. Station will not use private key to decrypt broadcast frames.
- static
Sta StringPrivate Key - Length of key must be appropriate for selected algorithm, see the Statically configured WEP keys section. This property is used only on Stations. Access Point uses corresponding key either from private-key property, or from Mikrotik-Wireless-Enc-Key attribute.
- static
Transmit StringKey - Access Point will use the specified key to encrypt frames for clients that do not use private key. Access Point will also use this key to encrypt broadcast and multicast frames. Client will use the specified key to encrypt frames if static-sta-private-algo is set to none. If corresponding static-algo-N property has value set to none, then frame will be sent unencrypted (when mode is set to static-keys-optional) or will not be sent at all (when mode is set to static-keys-required).
- supplicant
Identity String - EAP identity that is sent by client at the beginning of EAP authentication. This value is used as a value for User-Name attribute in RADIUS messages sent by RADIUS EAP accounting and RADIUS EAP pass-through authentication.
- tls
Certificate String - Access Point always needs a certificate when configured when tls-mode is set to verify-certificate, or is set to dont-verify-certificate. Client needs a certificate only if Access Point is configured with tls-mode set to verify-certificate. In this case client needs a valid certificate that is signed by a CA known to the Access Point. This property only has effect when tls-mode is not set to no-certificates and eap-methods contains eap-tls.
- tls
Mode String - This property has effect only when eap-methods contains eap-tls.
verify-certificate
- Require remote device to have valid certificate. Check that it is signed by known certificate authority. No additional identity verification is done. Certificate may include information about time period during which it is valid. If router has incorrect time and date, it may reject valid certificate because router's clock is outside that period. See also the Certificates configuration.dont-verify-certificate
- Do not check certificate of the remote device. Access Point will not require client to provide certificate.no-certificates
- Do not use certificates. TLS session is established using 2048 bit anonymous Diffie-Hellman key exchange.verify-certificate-with-crl
- Same as verify-certificate but also checks if the certificate is valid by checking the Certificate Revocation List. - unicast
Ciphers String - Access Point advertises that it supports specified ciphers, multiple values can be selected. Client attempts connection only to Access Points that supports at least one of the specified ciphers. One of the ciphers will be used to encrypt unicast frames that are sent between Access Point and Station.
- String
WPA2
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA2 mode. property only has effect when wpa2-psk is added to authentication-types.- String
WPA
pre-shared key mode requires all devices in a BSS to have common secret key. Value of this key can be an arbitrary text. Commonly referred to as the network password for WPA mode. property only has effect when wpa-psk is added to authentication-types.
Import
#The ID can be found via API or the terminal
#The command for the terminal is -> :put [/interface/wireless/security-profiles get [print show-ids]]
$ pulumi import routeros:index/interfaceWirelessSecurityProfiles:InterfaceWirelessSecurityProfiles test *3
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- routeros terraform-routeros/terraform-provider-routeros
- License
- Notes
- This Pulumi package is based on the
routeros
Terraform Provider.