meraki.networks.SwitchAccessPolicies
Explore with Pulumi AI
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.meraki.networks.SwitchAccessPolicies;
import com.pulumi.meraki.networks.SwitchAccessPoliciesArgs;
import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesDot1xArgs;
import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesRadiusArgs;
import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesRadiusAccountingServerArgs;
import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesRadiusServerArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new SwitchAccessPolicies("example", SwitchAccessPoliciesArgs.builder()
.accessPolicyType("Hybrid authentication")
.dot1x(SwitchAccessPoliciesDot1xArgs.builder()
.control_direction("inbound")
.build())
.guestPortBouncing(false)
.guestVlanId(100)
.hostMode("Single-Host")
.increaseAccessSpeed(false)
.name("Access policy #1")
.networkId("string")
.radius(SwitchAccessPoliciesRadiusArgs.builder()
.critical_auth(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
.failed_auth_vlan_id(100)
.re_authentication_interval(120)
.build())
.radiusAccountingEnabled(true)
.radiusAccountingServers(SwitchAccessPoliciesRadiusAccountingServerArgs.builder()
.host("1.2.3.4")
.port(22)
.secret("secret")
.build())
.radiusCoaSupportEnabled(false)
.radiusGroupAttribute("11")
.radiusServers(SwitchAccessPoliciesRadiusServerArgs.builder()
.host("1.2.3.4")
.port(22)
.secret("secret")
.build())
.radiusTestingEnabled(false)
.urlRedirectWalledGardenEnabled(true)
.urlRedirectWalledGardenRanges("192.168.1.0/24")
.voiceVlanClients(true)
.build());
ctx.export("merakiNetworksSwitchAccessPoliciesExample", example);
}
}
resources:
example:
type: meraki:networks:SwitchAccessPolicies
properties:
accessPolicyType: Hybrid authentication
dot1x:
control_direction: inbound
guestPortBouncing: false
guestVlanId: 100
hostMode: Single-Host
increaseAccessSpeed: false
name: 'Access policy #1'
networkId: string
radius:
critical_auth:
dataVlanId: 100
suspendPortBounce: true
voiceVlanId: 100
failed_auth_vlan_id: 100
re_authentication_interval: 120
radiusAccountingEnabled: true
radiusAccountingServers:
- host: 1.2.3.4
port: 22
secret: secret
radiusCoaSupportEnabled: false
radiusGroupAttribute: '11'
radiusServers:
- host: 1.2.3.4
port: 22
secret: secret
radiusTestingEnabled: false
urlRedirectWalledGardenEnabled: true
urlRedirectWalledGardenRanges:
- 192.168.1.0/24
voiceVlanClients: true
outputs:
merakiNetworksSwitchAccessPoliciesExample: ${example}
Create SwitchAccessPolicies Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SwitchAccessPolicies(name: string, args: SwitchAccessPoliciesArgs, opts?: CustomResourceOptions);
@overload
def SwitchAccessPolicies(resource_name: str,
args: SwitchAccessPoliciesArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SwitchAccessPolicies(resource_name: str,
opts: Optional[ResourceOptions] = None,
network_id: Optional[str] = None,
guest_vlan_id: Optional[int] = None,
guest_port_bouncing: Optional[bool] = None,
radius_accounting_enabled: Optional[bool] = None,
radius_accounting_servers: Optional[Sequence[SwitchAccessPoliciesRadiusAccountingServerArgs]] = None,
host_mode: Optional[str] = None,
increase_access_speed: Optional[bool] = None,
name: Optional[str] = None,
access_policy_type: Optional[str] = None,
voice_vlan_clients: Optional[bool] = None,
dot1x: Optional[SwitchAccessPoliciesDot1xArgs] = None,
access_policy_number: Optional[str] = None,
radius_coa_support_enabled: Optional[bool] = None,
radius_group_attribute: Optional[str] = None,
radius_servers: Optional[Sequence[SwitchAccessPoliciesRadiusServerArgs]] = None,
radius_testing_enabled: Optional[bool] = None,
url_redirect_walled_garden_enabled: Optional[bool] = None,
url_redirect_walled_garden_ranges: Optional[Sequence[str]] = None,
radius: Optional[SwitchAccessPoliciesRadiusArgs] = None)
func NewSwitchAccessPolicies(ctx *Context, name string, args SwitchAccessPoliciesArgs, opts ...ResourceOption) (*SwitchAccessPolicies, error)
public SwitchAccessPolicies(string name, SwitchAccessPoliciesArgs args, CustomResourceOptions? opts = null)
public SwitchAccessPolicies(String name, SwitchAccessPoliciesArgs args)
public SwitchAccessPolicies(String name, SwitchAccessPoliciesArgs args, CustomResourceOptions options)
type: meraki:networks:SwitchAccessPolicies
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SwitchAccessPoliciesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SwitchAccessPoliciesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SwitchAccessPoliciesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SwitchAccessPoliciesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SwitchAccessPoliciesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var switchAccessPoliciesResource = new Meraki.Networks.SwitchAccessPolicies("switchAccessPoliciesResource", new()
{
NetworkId = "string",
GuestVlanId = 0,
GuestPortBouncing = false,
RadiusAccountingEnabled = false,
RadiusAccountingServers = new[]
{
new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusAccountingServerArgs
{
Host = "string",
Port = 0,
Secret = "string",
},
},
HostMode = "string",
IncreaseAccessSpeed = false,
Name = "string",
AccessPolicyType = "string",
VoiceVlanClients = false,
Dot1x = new Meraki.Networks.Inputs.SwitchAccessPoliciesDot1xArgs
{
ControlDirection = "string",
},
AccessPolicyNumber = "string",
RadiusCoaSupportEnabled = false,
RadiusGroupAttribute = "string",
RadiusServers = new[]
{
new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusServerArgs
{
Host = "string",
Port = 0,
Secret = "string",
},
},
RadiusTestingEnabled = false,
UrlRedirectWalledGardenEnabled = false,
UrlRedirectWalledGardenRanges = new[]
{
"string",
},
Radius = new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusArgs
{
CriticalAuth = new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusCriticalAuthArgs
{
DataVlanId = 0,
SuspendPortBounce = false,
VoiceVlanId = 0,
},
FailedAuthVlanId = 0,
ReAuthenticationInterval = 0,
},
});
example, err := networks.NewSwitchAccessPolicies(ctx, "switchAccessPoliciesResource", &networks.SwitchAccessPoliciesArgs{
NetworkId: pulumi.String("string"),
GuestVlanId: pulumi.Int(0),
GuestPortBouncing: pulumi.Bool(false),
RadiusAccountingEnabled: pulumi.Bool(false),
RadiusAccountingServers: networks.SwitchAccessPoliciesRadiusAccountingServerArray{
&networks.SwitchAccessPoliciesRadiusAccountingServerArgs{
Host: pulumi.String("string"),
Port: pulumi.Int(0),
Secret: pulumi.String("string"),
},
},
HostMode: pulumi.String("string"),
IncreaseAccessSpeed: pulumi.Bool(false),
Name: pulumi.String("string"),
AccessPolicyType: pulumi.String("string"),
VoiceVlanClients: pulumi.Bool(false),
Dot1x: &networks.SwitchAccessPoliciesDot1xArgs{
ControlDirection: pulumi.String("string"),
},
AccessPolicyNumber: pulumi.String("string"),
RadiusCoaSupportEnabled: pulumi.Bool(false),
RadiusGroupAttribute: pulumi.String("string"),
RadiusServers: networks.SwitchAccessPoliciesRadiusServerArray{
&networks.SwitchAccessPoliciesRadiusServerArgs{
Host: pulumi.String("string"),
Port: pulumi.Int(0),
Secret: pulumi.String("string"),
},
},
RadiusTestingEnabled: pulumi.Bool(false),
UrlRedirectWalledGardenEnabled: pulumi.Bool(false),
UrlRedirectWalledGardenRanges: pulumi.StringArray{
pulumi.String("string"),
},
Radius: &networks.SwitchAccessPoliciesRadiusArgs{
CriticalAuth: &networks.SwitchAccessPoliciesRadiusCriticalAuthArgs{
DataVlanId: pulumi.Int(0),
SuspendPortBounce: pulumi.Bool(false),
VoiceVlanId: pulumi.Int(0),
},
FailedAuthVlanId: pulumi.Int(0),
ReAuthenticationInterval: pulumi.Int(0),
},
})
var switchAccessPoliciesResource = new SwitchAccessPolicies("switchAccessPoliciesResource", SwitchAccessPoliciesArgs.builder()
.networkId("string")
.guestVlanId(0)
.guestPortBouncing(false)
.radiusAccountingEnabled(false)
.radiusAccountingServers(SwitchAccessPoliciesRadiusAccountingServerArgs.builder()
.host("string")
.port(0)
.secret("string")
.build())
.hostMode("string")
.increaseAccessSpeed(false)
.name("string")
.accessPolicyType("string")
.voiceVlanClients(false)
.dot1x(SwitchAccessPoliciesDot1xArgs.builder()
.controlDirection("string")
.build())
.accessPolicyNumber("string")
.radiusCoaSupportEnabled(false)
.radiusGroupAttribute("string")
.radiusServers(SwitchAccessPoliciesRadiusServerArgs.builder()
.host("string")
.port(0)
.secret("string")
.build())
.radiusTestingEnabled(false)
.urlRedirectWalledGardenEnabled(false)
.urlRedirectWalledGardenRanges("string")
.radius(SwitchAccessPoliciesRadiusArgs.builder()
.criticalAuth(SwitchAccessPoliciesRadiusCriticalAuthArgs.builder()
.dataVlanId(0)
.suspendPortBounce(false)
.voiceVlanId(0)
.build())
.failedAuthVlanId(0)
.reAuthenticationInterval(0)
.build())
.build());
switch_access_policies_resource = meraki.networks.SwitchAccessPolicies("switchAccessPoliciesResource",
network_id="string",
guest_vlan_id=0,
guest_port_bouncing=False,
radius_accounting_enabled=False,
radius_accounting_servers=[{
"host": "string",
"port": 0,
"secret": "string",
}],
host_mode="string",
increase_access_speed=False,
name="string",
access_policy_type="string",
voice_vlan_clients=False,
dot1x={
"control_direction": "string",
},
access_policy_number="string",
radius_coa_support_enabled=False,
radius_group_attribute="string",
radius_servers=[{
"host": "string",
"port": 0,
"secret": "string",
}],
radius_testing_enabled=False,
url_redirect_walled_garden_enabled=False,
url_redirect_walled_garden_ranges=["string"],
radius={
"critical_auth": {
"data_vlan_id": 0,
"suspend_port_bounce": False,
"voice_vlan_id": 0,
},
"failed_auth_vlan_id": 0,
"re_authentication_interval": 0,
})
const switchAccessPoliciesResource = new meraki.networks.SwitchAccessPolicies("switchAccessPoliciesResource", {
networkId: "string",
guestVlanId: 0,
guestPortBouncing: false,
radiusAccountingEnabled: false,
radiusAccountingServers: [{
host: "string",
port: 0,
secret: "string",
}],
hostMode: "string",
increaseAccessSpeed: false,
name: "string",
accessPolicyType: "string",
voiceVlanClients: false,
dot1x: {
controlDirection: "string",
},
accessPolicyNumber: "string",
radiusCoaSupportEnabled: false,
radiusGroupAttribute: "string",
radiusServers: [{
host: "string",
port: 0,
secret: "string",
}],
radiusTestingEnabled: false,
urlRedirectWalledGardenEnabled: false,
urlRedirectWalledGardenRanges: ["string"],
radius: {
criticalAuth: {
dataVlanId: 0,
suspendPortBounce: false,
voiceVlanId: 0,
},
failedAuthVlanId: 0,
reAuthenticationInterval: 0,
},
});
type: meraki:networks:SwitchAccessPolicies
properties:
accessPolicyNumber: string
accessPolicyType: string
dot1x:
controlDirection: string
guestPortBouncing: false
guestVlanId: 0
hostMode: string
increaseAccessSpeed: false
name: string
networkId: string
radius:
criticalAuth:
dataVlanId: 0
suspendPortBounce: false
voiceVlanId: 0
failedAuthVlanId: 0
reAuthenticationInterval: 0
radiusAccountingEnabled: false
radiusAccountingServers:
- host: string
port: 0
secret: string
radiusCoaSupportEnabled: false
radiusGroupAttribute: string
radiusServers:
- host: string
port: 0
secret: string
radiusTestingEnabled: false
urlRedirectWalledGardenEnabled: false
urlRedirectWalledGardenRanges:
- string
voiceVlanClients: false
SwitchAccessPolicies Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SwitchAccessPolicies resource accepts the following input properties:
- Network
Id string - networkId path parameter. Network ID
- Access
Policy stringNumber - accessPolicyNumber path parameter. Access policy number
- Access
Policy stringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- Dot1x
Switch
Access Policies Dot1x - 802.1x Settings
- Guest
Port boolBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Guest
Vlan intId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- Host
Mode string - Choose the Host Mode for the access policy.
- Increase
Access boolSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- Name string
- Name of the access policy
- Radius
Switch
Access Policies Radius - Object for RADIUS Settings
- Radius
Accounting boolEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- Radius
Accounting List<SwitchServers Access Policies Radius Accounting Server> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Coa boolSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- Radius
Group stringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- Radius
Servers List<SwitchAccess Policies Radius Server> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- Radius
Testing boolEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Url
Redirect boolWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- Url
Redirect List<string>Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- Voice
Vlan boolClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- Network
Id string - networkId path parameter. Network ID
- Access
Policy stringNumber - accessPolicyNumber path parameter. Access policy number
- Access
Policy stringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- Dot1x
Switch
Access Policies Dot1x Args - 802.1x Settings
- Guest
Port boolBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Guest
Vlan intId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- Host
Mode string - Choose the Host Mode for the access policy.
- Increase
Access boolSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- Name string
- Name of the access policy
- Radius
Switch
Access Policies Radius Args - Object for RADIUS Settings
- Radius
Accounting boolEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- Radius
Accounting []SwitchServers Access Policies Radius Accounting Server Args - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Coa boolSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- Radius
Group stringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- Radius
Servers []SwitchAccess Policies Radius Server Args - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- Radius
Testing boolEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Url
Redirect boolWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- Url
Redirect []stringWalled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- Voice
Vlan boolClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- network
Id String - networkId path parameter. Network ID
- access
Policy StringNumber - accessPolicyNumber path parameter. Access policy number
- access
Policy StringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- dot1x
Switch
Access Policies Dot1x - 802.1x Settings
- guest
Port BooleanBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest
Vlan IntegerId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host
Mode String - Choose the Host Mode for the access policy.
- increase
Access BooleanSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name String
- Name of the access policy
- radius
Switch
Access Policies Radius - Object for RADIUS Settings
- radius
Accounting BooleanEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius
Accounting List<SwitchServers Access Policies Radius Accounting Server> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Coa BooleanSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius
Group StringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius
Servers List<SwitchAccess Policies Radius Server> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Testing BooleanEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url
Redirect BooleanWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url
Redirect List<String>Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice
Vlan BooleanClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- network
Id string - networkId path parameter. Network ID
- access
Policy stringNumber - accessPolicyNumber path parameter. Access policy number
- access
Policy stringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- dot1x
Switch
Access Policies Dot1x - 802.1x Settings
- guest
Port booleanBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest
Vlan numberId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host
Mode string - Choose the Host Mode for the access policy.
- increase
Access booleanSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name string
- Name of the access policy
- radius
Switch
Access Policies Radius - Object for RADIUS Settings
- radius
Accounting booleanEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius
Accounting SwitchServers Access Policies Radius Accounting Server[] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Coa booleanSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius
Group stringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius
Servers SwitchAccess Policies Radius Server[] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Testing booleanEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url
Redirect booleanWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url
Redirect string[]Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice
Vlan booleanClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- network_
id str - networkId path parameter. Network ID
- access_
policy_ strnumber - accessPolicyNumber path parameter. Access policy number
- access_
policy_ strtype - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- dot1x
Switch
Access Policies Dot1x Args - 802.1x Settings
- guest_
port_ boolbouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest_
vlan_ intid - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host_
mode str - Choose the Host Mode for the access policy.
- increase_
access_ boolspeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name str
- Name of the access policy
- radius
Switch
Access Policies Radius Args - Object for RADIUS Settings
- radius_
accounting_ boolenabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius_
accounting_ Sequence[Switchservers Access Policies Radius Accounting Server Args] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius_
coa_ boolsupport_ enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius_
group_ strattribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius_
servers Sequence[SwitchAccess Policies Radius Server Args] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius_
testing_ boolenabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url_
redirect_ boolwalled_ garden_ enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url_
redirect_ Sequence[str]walled_ garden_ ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice_
vlan_ boolclients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- network
Id String - networkId path parameter. Network ID
- access
Policy StringNumber - accessPolicyNumber path parameter. Access policy number
- access
Policy StringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- dot1x Property Map
- 802.1x Settings
- guest
Port BooleanBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest
Vlan NumberId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host
Mode String - Choose the Host Mode for the access policy.
- increase
Access BooleanSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name String
- Name of the access policy
- radius Property Map
- Object for RADIUS Settings
- radius
Accounting BooleanEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius
Accounting List<Property Map>Servers - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Coa BooleanSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius
Group StringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius
Servers List<Property Map> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Testing BooleanEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url
Redirect BooleanWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url
Redirect List<String>Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice
Vlan BooleanClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
Outputs
All input properties are implicitly available as output properties. Additionally, the SwitchAccessPolicies resource produces the following output properties:
- Counts
Switch
Access Policies Counts - Counts associated with the access policy
- Id string
- The provider-assigned unique ID for this managed resource.
- Radius
Accounting List<SwitchServers Responses Access Policies Radius Accounting Servers Response> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Servers List<SwitchResponses Access Policies Radius Servers Response> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- Counts
Switch
Access Policies Counts - Counts associated with the access policy
- Id string
- The provider-assigned unique ID for this managed resource.
- Radius
Accounting []SwitchServers Responses Access Policies Radius Accounting Servers Response - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Servers []SwitchResponses Access Policies Radius Servers Response - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- counts
Switch
Access Policies Counts - Counts associated with the access policy
- id String
- The provider-assigned unique ID for this managed resource.
- radius
Accounting List<SwitchServers Responses Access Policies Radius Accounting Servers Response> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Servers List<SwitchResponses Access Policies Radius Servers Response> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- counts
Switch
Access Policies Counts - Counts associated with the access policy
- id string
- The provider-assigned unique ID for this managed resource.
- radius
Accounting SwitchServers Responses Access Policies Radius Accounting Servers Response[] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Servers SwitchResponses Access Policies Radius Servers Response[] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- counts
Switch
Access Policies Counts - Counts associated with the access policy
- id str
- The provider-assigned unique ID for this managed resource.
- radius_
accounting_ Sequence[Switchservers_ responses Access Policies Radius Accounting Servers Response] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius_
servers_ Sequence[Switchresponses Access Policies Radius Servers Response] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- counts Property Map
- Counts associated with the access policy
- id String
- The provider-assigned unique ID for this managed resource.
- radius
Accounting List<Property Map>Servers Responses - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Servers List<Property Map>Responses - List of RADIUS servers to require connecting devices to authenticate against before granting network access
Look up Existing SwitchAccessPolicies Resource
Get an existing SwitchAccessPolicies resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SwitchAccessPoliciesState, opts?: CustomResourceOptions): SwitchAccessPolicies
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_policy_number: Optional[str] = None,
access_policy_type: Optional[str] = None,
counts: Optional[SwitchAccessPoliciesCountsArgs] = None,
dot1x: Optional[SwitchAccessPoliciesDot1xArgs] = None,
guest_port_bouncing: Optional[bool] = None,
guest_vlan_id: Optional[int] = None,
host_mode: Optional[str] = None,
increase_access_speed: Optional[bool] = None,
name: Optional[str] = None,
network_id: Optional[str] = None,
radius: Optional[SwitchAccessPoliciesRadiusArgs] = None,
radius_accounting_enabled: Optional[bool] = None,
radius_accounting_servers: Optional[Sequence[SwitchAccessPoliciesRadiusAccountingServerArgs]] = None,
radius_accounting_servers_responses: Optional[Sequence[SwitchAccessPoliciesRadiusAccountingServersResponseArgs]] = None,
radius_coa_support_enabled: Optional[bool] = None,
radius_group_attribute: Optional[str] = None,
radius_servers: Optional[Sequence[SwitchAccessPoliciesRadiusServerArgs]] = None,
radius_servers_responses: Optional[Sequence[SwitchAccessPoliciesRadiusServersResponseArgs]] = None,
radius_testing_enabled: Optional[bool] = None,
url_redirect_walled_garden_enabled: Optional[bool] = None,
url_redirect_walled_garden_ranges: Optional[Sequence[str]] = None,
voice_vlan_clients: Optional[bool] = None) -> SwitchAccessPolicies
func GetSwitchAccessPolicies(ctx *Context, name string, id IDInput, state *SwitchAccessPoliciesState, opts ...ResourceOption) (*SwitchAccessPolicies, error)
public static SwitchAccessPolicies Get(string name, Input<string> id, SwitchAccessPoliciesState? state, CustomResourceOptions? opts = null)
public static SwitchAccessPolicies get(String name, Output<String> id, SwitchAccessPoliciesState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Policy stringNumber - accessPolicyNumber path parameter. Access policy number
- Access
Policy stringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- Counts
Switch
Access Policies Counts - Counts associated with the access policy
- Dot1x
Switch
Access Policies Dot1x - 802.1x Settings
- Guest
Port boolBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Guest
Vlan intId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- Host
Mode string - Choose the Host Mode for the access policy.
- Increase
Access boolSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- Name string
- Name of the access policy
- Network
Id string - networkId path parameter. Network ID
- Radius
Switch
Access Policies Radius - Object for RADIUS Settings
- Radius
Accounting boolEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- Radius
Accounting List<SwitchServers Access Policies Radius Accounting Server> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Accounting List<SwitchServers Responses Access Policies Radius Accounting Servers Response> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Coa boolSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- Radius
Group stringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- Radius
Servers List<SwitchAccess Policies Radius Server> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- Radius
Servers List<SwitchResponses Access Policies Radius Servers Response> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- Radius
Testing boolEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Url
Redirect boolWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- Url
Redirect List<string>Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- Voice
Vlan boolClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- Access
Policy stringNumber - accessPolicyNumber path parameter. Access policy number
- Access
Policy stringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- Counts
Switch
Access Policies Counts Args - Counts associated with the access policy
- Dot1x
Switch
Access Policies Dot1x Args - 802.1x Settings
- Guest
Port boolBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Guest
Vlan intId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- Host
Mode string - Choose the Host Mode for the access policy.
- Increase
Access boolSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- Name string
- Name of the access policy
- Network
Id string - networkId path parameter. Network ID
- Radius
Switch
Access Policies Radius Args - Object for RADIUS Settings
- Radius
Accounting boolEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- Radius
Accounting []SwitchServers Access Policies Radius Accounting Server Args - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Accounting []SwitchServers Responses Access Policies Radius Accounting Servers Response Args - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- Radius
Coa boolSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- Radius
Group stringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- Radius
Servers []SwitchAccess Policies Radius Server Args - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- Radius
Servers []SwitchResponses Access Policies Radius Servers Response Args - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- Radius
Testing boolEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- Url
Redirect boolWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- Url
Redirect []stringWalled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- Voice
Vlan boolClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- access
Policy StringNumber - accessPolicyNumber path parameter. Access policy number
- access
Policy StringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- counts
Switch
Access Policies Counts - Counts associated with the access policy
- dot1x
Switch
Access Policies Dot1x - 802.1x Settings
- guest
Port BooleanBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest
Vlan IntegerId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host
Mode String - Choose the Host Mode for the access policy.
- increase
Access BooleanSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name String
- Name of the access policy
- network
Id String - networkId path parameter. Network ID
- radius
Switch
Access Policies Radius - Object for RADIUS Settings
- radius
Accounting BooleanEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius
Accounting List<SwitchServers Access Policies Radius Accounting Server> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Accounting List<SwitchServers Responses Access Policies Radius Accounting Servers Response> - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Coa BooleanSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius
Group StringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius
Servers List<SwitchAccess Policies Radius Server> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Servers List<SwitchResponses Access Policies Radius Servers Response> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Testing BooleanEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url
Redirect BooleanWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url
Redirect List<String>Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice
Vlan BooleanClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- access
Policy stringNumber - accessPolicyNumber path parameter. Access policy number
- access
Policy stringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- counts
Switch
Access Policies Counts - Counts associated with the access policy
- dot1x
Switch
Access Policies Dot1x - 802.1x Settings
- guest
Port booleanBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest
Vlan numberId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host
Mode string - Choose the Host Mode for the access policy.
- increase
Access booleanSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name string
- Name of the access policy
- network
Id string - networkId path parameter. Network ID
- radius
Switch
Access Policies Radius - Object for RADIUS Settings
- radius
Accounting booleanEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius
Accounting SwitchServers Access Policies Radius Accounting Server[] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Accounting SwitchServers Responses Access Policies Radius Accounting Servers Response[] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Coa booleanSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius
Group stringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius
Servers SwitchAccess Policies Radius Server[] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Servers SwitchResponses Access Policies Radius Servers Response[] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Testing booleanEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url
Redirect booleanWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url
Redirect string[]Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice
Vlan booleanClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- access_
policy_ strnumber - accessPolicyNumber path parameter. Access policy number
- access_
policy_ strtype - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- counts
Switch
Access Policies Counts Args - Counts associated with the access policy
- dot1x
Switch
Access Policies Dot1x Args - 802.1x Settings
- guest_
port_ boolbouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest_
vlan_ intid - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host_
mode str - Choose the Host Mode for the access policy.
- increase_
access_ boolspeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name str
- Name of the access policy
- network_
id str - networkId path parameter. Network ID
- radius
Switch
Access Policies Radius Args - Object for RADIUS Settings
- radius_
accounting_ boolenabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius_
accounting_ Sequence[Switchservers Access Policies Radius Accounting Server Args] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius_
accounting_ Sequence[Switchservers_ responses Access Policies Radius Accounting Servers Response Args] - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius_
coa_ boolsupport_ enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius_
group_ strattribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius_
servers Sequence[SwitchAccess Policies Radius Server Args] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius_
servers_ Sequence[Switchresponses Access Policies Radius Servers Response Args] - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius_
testing_ boolenabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url_
redirect_ boolwalled_ garden_ enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url_
redirect_ Sequence[str]walled_ garden_ ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice_
vlan_ boolclients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
- access
Policy StringNumber - accessPolicyNumber path parameter. Access policy number
- access
Policy StringType - Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
- counts Property Map
- Counts associated with the access policy
- dot1x Property Map
- 802.1x Settings
- guest
Port BooleanBouncing - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- guest
Vlan NumberId - ID for the guest VLAN allow unauthorized devices access to limited network resources
- host
Mode String - Choose the Host Mode for the access policy.
- increase
Access BooleanSpeed - Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
- name String
- Name of the access policy
- network
Id String - networkId path parameter. Network ID
- radius Property Map
- Object for RADIUS Settings
- radius
Accounting BooleanEnabled - Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
- radius
Accounting List<Property Map>Servers - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Accounting List<Property Map>Servers Responses - List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
- radius
Coa BooleanSupport Enabled - Change of authentication for RADIUS re-authentication and disconnection
- radius
Group StringAttribute - Acceptable values are "" for None, or "11" for Group Policies ACL
- radius
Servers List<Property Map> - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Servers List<Property Map>Responses - List of RADIUS servers to require connecting devices to authenticate against before granting network access
- radius
Testing BooleanEnabled - If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
- url
Redirect BooleanWalled Garden Enabled - Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
- url
Redirect List<String>Walled Garden Ranges - IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
- voice
Vlan BooleanClients - CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
Supporting Types
SwitchAccessPoliciesCounts, SwitchAccessPoliciesCountsArgs
- Ports
Switch
Access Policies Counts Ports - Counts associated with ports
- Ports
Switch
Access Policies Counts Ports - Counts associated with ports
- ports
Switch
Access Policies Counts Ports - Counts associated with ports
- ports
Switch
Access Policies Counts Ports - Counts associated with ports
- ports
Switch
Access Policies Counts Ports - Counts associated with ports
- ports Property Map
- Counts associated with ports
SwitchAccessPoliciesCountsPorts, SwitchAccessPoliciesCountsPortsArgs
- With
This intPolicy - Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
- With
This intPolicy - Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
- with
This IntegerPolicy - Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
- with
This numberPolicy - Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
- with_
this_ intpolicy - Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
- with
This NumberPolicy - Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
SwitchAccessPoliciesDot1x, SwitchAccessPoliciesDot1xArgs
- Control
Direction string - Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
- Control
Direction string - Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
- control
Direction String - Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
- control
Direction string - Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
- control_
direction str - Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
- control
Direction String - Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
SwitchAccessPoliciesRadius, SwitchAccessPoliciesRadiusArgs
- Critical
Auth SwitchAccess Policies Radius Critical Auth - Critical auth settings for when authentication is rejected by the RADIUS server
- Failed
Auth intVlan Id - VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- Re
Authentication intInterval - Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
- Critical
Auth SwitchAccess Policies Radius Critical Auth - Critical auth settings for when authentication is rejected by the RADIUS server
- Failed
Auth intVlan Id - VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- Re
Authentication intInterval - Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
- critical
Auth SwitchAccess Policies Radius Critical Auth - Critical auth settings for when authentication is rejected by the RADIUS server
- failed
Auth IntegerVlan Id - VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- re
Authentication IntegerInterval - Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
- critical
Auth SwitchAccess Policies Radius Critical Auth - Critical auth settings for when authentication is rejected by the RADIUS server
- failed
Auth numberVlan Id - VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- re
Authentication numberInterval - Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
- critical_
auth SwitchAccess Policies Radius Critical Auth - Critical auth settings for when authentication is rejected by the RADIUS server
- failed_
auth_ intvlan_ id - VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- re_
authentication_ intinterval - Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
- critical
Auth Property Map - Critical auth settings for when authentication is rejected by the RADIUS server
- failed
Auth NumberVlan Id - VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- re
Authentication NumberInterval - Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
SwitchAccessPoliciesRadiusAccountingServer, SwitchAccessPoliciesRadiusAccountingServerArgs
SwitchAccessPoliciesRadiusAccountingServersResponse, SwitchAccessPoliciesRadiusAccountingServersResponseArgs
SwitchAccessPoliciesRadiusCriticalAuth, SwitchAccessPoliciesRadiusCriticalAuthArgs
- Data
Vlan intId - VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- Suspend
Port boolBounce - Enable to suspend port bounce when RADIUS servers are unreachable
- Voice
Vlan intId - VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- Data
Vlan intId - VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- Suspend
Port boolBounce - Enable to suspend port bounce when RADIUS servers are unreachable
- Voice
Vlan intId - VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- data
Vlan IntegerId - VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- suspend
Port BooleanBounce - Enable to suspend port bounce when RADIUS servers are unreachable
- voice
Vlan IntegerId - VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- data
Vlan numberId - VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- suspend
Port booleanBounce - Enable to suspend port bounce when RADIUS servers are unreachable
- voice
Vlan numberId - VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- data_
vlan_ intid - VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- suspend_
port_ boolbounce - Enable to suspend port bounce when RADIUS servers are unreachable
- voice_
vlan_ intid - VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- data
Vlan NumberId - VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
- suspend
Port BooleanBounce - Enable to suspend port bounce when RADIUS servers are unreachable
- voice
Vlan NumberId - VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
SwitchAccessPoliciesRadiusServer, SwitchAccessPoliciesRadiusServerArgs
SwitchAccessPoliciesRadiusServersResponse, SwitchAccessPoliciesRadiusServersResponseArgs
Import
$ pulumi import meraki:networks/switchAccessPolicies:SwitchAccessPolicies example "access_policy_number,network_id"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- meraki pulumi/pulumi-meraki
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
meraki
Terraform Provider.