1. Packages
  2. Cisco Meraki
  3. API Docs
  4. networks
  5. SwitchAccessPolicies
Cisco Meraki v0.2.4 published on Friday, Jun 14, 2024 by Pulumi

meraki.networks.SwitchAccessPolicies

Explore with Pulumi AI

meraki logo
Cisco Meraki v0.2.4 published on Friday, Jun 14, 2024 by Pulumi

    Example Usage

    Coming soon!
    
    Coming soon!
    
    Coming soon!
    
    Coming soon!
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.meraki.networks.SwitchAccessPolicies;
    import com.pulumi.meraki.networks.SwitchAccessPoliciesArgs;
    import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesDot1xArgs;
    import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesRadiusArgs;
    import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesRadiusAccountingServerArgs;
    import com.pulumi.meraki.networks.inputs.SwitchAccessPoliciesRadiusServerArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new SwitchAccessPolicies("example", SwitchAccessPoliciesArgs.builder()
                .accessPolicyType("Hybrid authentication")
                .dot1x(SwitchAccessPoliciesDot1xArgs.builder()
                    .control_direction("inbound")
                    .build())
                .guestPortBouncing(false)
                .guestVlanId(100)
                .hostMode("Single-Host")
                .increaseAccessSpeed(false)
                .name("Access policy #1")
                .networkId("string")
                .radius(SwitchAccessPoliciesRadiusArgs.builder()
                    .critical_auth(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                    .failed_auth_vlan_id(100)
                    .re_authentication_interval(120)
                    .build())
                .radiusAccountingEnabled(true)
                .radiusAccountingServers(SwitchAccessPoliciesRadiusAccountingServerArgs.builder()
                    .host("1.2.3.4")
                    .port(22)
                    .secret("secret")
                    .build())
                .radiusCoaSupportEnabled(false)
                .radiusGroupAttribute("11")
                .radiusServers(SwitchAccessPoliciesRadiusServerArgs.builder()
                    .host("1.2.3.4")
                    .port(22)
                    .secret("secret")
                    .build())
                .radiusTestingEnabled(false)
                .urlRedirectWalledGardenEnabled(true)
                .urlRedirectWalledGardenRanges("192.168.1.0/24")
                .voiceVlanClients(true)
                .build());
    
            ctx.export("merakiNetworksSwitchAccessPoliciesExample", example);
        }
    }
    
    resources:
      example:
        type: meraki:networks:SwitchAccessPolicies
        properties:
          accessPolicyType: Hybrid authentication
          dot1x:
            control_direction: inbound
          guestPortBouncing: false
          guestVlanId: 100
          hostMode: Single-Host
          increaseAccessSpeed: false
          name: 'Access policy #1'
          networkId: string
          radius:
            critical_auth:
              dataVlanId: 100
              suspendPortBounce: true
              voiceVlanId: 100
            failed_auth_vlan_id: 100
            re_authentication_interval: 120
          radiusAccountingEnabled: true
          radiusAccountingServers:
            - host: 1.2.3.4
              port: 22
              secret: secret
          radiusCoaSupportEnabled: false
          radiusGroupAttribute: '11'
          radiusServers:
            - host: 1.2.3.4
              port: 22
              secret: secret
          radiusTestingEnabled: false
          urlRedirectWalledGardenEnabled: true
          urlRedirectWalledGardenRanges:
            - 192.168.1.0/24
          voiceVlanClients: true
    outputs:
      merakiNetworksSwitchAccessPoliciesExample: ${example}
    

    Create SwitchAccessPolicies Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SwitchAccessPolicies(name: string, args: SwitchAccessPoliciesArgs, opts?: CustomResourceOptions);
    @overload
    def SwitchAccessPolicies(resource_name: str,
                             args: SwitchAccessPoliciesArgs,
                             opts: Optional[ResourceOptions] = None)
    
    @overload
    def SwitchAccessPolicies(resource_name: str,
                             opts: Optional[ResourceOptions] = None,
                             network_id: Optional[str] = None,
                             guest_vlan_id: Optional[int] = None,
                             guest_port_bouncing: Optional[bool] = None,
                             radius_accounting_enabled: Optional[bool] = None,
                             radius_accounting_servers: Optional[Sequence[SwitchAccessPoliciesRadiusAccountingServerArgs]] = None,
                             host_mode: Optional[str] = None,
                             increase_access_speed: Optional[bool] = None,
                             name: Optional[str] = None,
                             access_policy_type: Optional[str] = None,
                             voice_vlan_clients: Optional[bool] = None,
                             dot1x: Optional[SwitchAccessPoliciesDot1xArgs] = None,
                             access_policy_number: Optional[str] = None,
                             radius_coa_support_enabled: Optional[bool] = None,
                             radius_group_attribute: Optional[str] = None,
                             radius_servers: Optional[Sequence[SwitchAccessPoliciesRadiusServerArgs]] = None,
                             radius_testing_enabled: Optional[bool] = None,
                             url_redirect_walled_garden_enabled: Optional[bool] = None,
                             url_redirect_walled_garden_ranges: Optional[Sequence[str]] = None,
                             radius: Optional[SwitchAccessPoliciesRadiusArgs] = None)
    func NewSwitchAccessPolicies(ctx *Context, name string, args SwitchAccessPoliciesArgs, opts ...ResourceOption) (*SwitchAccessPolicies, error)
    public SwitchAccessPolicies(string name, SwitchAccessPoliciesArgs args, CustomResourceOptions? opts = null)
    public SwitchAccessPolicies(String name, SwitchAccessPoliciesArgs args)
    public SwitchAccessPolicies(String name, SwitchAccessPoliciesArgs args, CustomResourceOptions options)
    
    type: meraki:networks:SwitchAccessPolicies
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SwitchAccessPoliciesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SwitchAccessPoliciesArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SwitchAccessPoliciesArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SwitchAccessPoliciesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SwitchAccessPoliciesArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var switchAccessPoliciesResource = new Meraki.Networks.SwitchAccessPolicies("switchAccessPoliciesResource", new()
    {
        NetworkId = "string",
        GuestVlanId = 0,
        GuestPortBouncing = false,
        RadiusAccountingEnabled = false,
        RadiusAccountingServers = new[]
        {
            new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusAccountingServerArgs
            {
                Host = "string",
                Port = 0,
                Secret = "string",
            },
        },
        HostMode = "string",
        IncreaseAccessSpeed = false,
        Name = "string",
        AccessPolicyType = "string",
        VoiceVlanClients = false,
        Dot1x = new Meraki.Networks.Inputs.SwitchAccessPoliciesDot1xArgs
        {
            ControlDirection = "string",
        },
        AccessPolicyNumber = "string",
        RadiusCoaSupportEnabled = false,
        RadiusGroupAttribute = "string",
        RadiusServers = new[]
        {
            new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusServerArgs
            {
                Host = "string",
                Port = 0,
                Secret = "string",
            },
        },
        RadiusTestingEnabled = false,
        UrlRedirectWalledGardenEnabled = false,
        UrlRedirectWalledGardenRanges = new[]
        {
            "string",
        },
        Radius = new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusArgs
        {
            CriticalAuth = new Meraki.Networks.Inputs.SwitchAccessPoliciesRadiusCriticalAuthArgs
            {
                DataVlanId = 0,
                SuspendPortBounce = false,
                VoiceVlanId = 0,
            },
            FailedAuthVlanId = 0,
            ReAuthenticationInterval = 0,
        },
    });
    
    example, err := networks.NewSwitchAccessPolicies(ctx, "switchAccessPoliciesResource", &networks.SwitchAccessPoliciesArgs{
    	NetworkId:               pulumi.String("string"),
    	GuestVlanId:             pulumi.Int(0),
    	GuestPortBouncing:       pulumi.Bool(false),
    	RadiusAccountingEnabled: pulumi.Bool(false),
    	RadiusAccountingServers: networks.SwitchAccessPoliciesRadiusAccountingServerArray{
    		&networks.SwitchAccessPoliciesRadiusAccountingServerArgs{
    			Host:   pulumi.String("string"),
    			Port:   pulumi.Int(0),
    			Secret: pulumi.String("string"),
    		},
    	},
    	HostMode:            pulumi.String("string"),
    	IncreaseAccessSpeed: pulumi.Bool(false),
    	Name:                pulumi.String("string"),
    	AccessPolicyType:    pulumi.String("string"),
    	VoiceVlanClients:    pulumi.Bool(false),
    	Dot1x: &networks.SwitchAccessPoliciesDot1xArgs{
    		ControlDirection: pulumi.String("string"),
    	},
    	AccessPolicyNumber:      pulumi.String("string"),
    	RadiusCoaSupportEnabled: pulumi.Bool(false),
    	RadiusGroupAttribute:    pulumi.String("string"),
    	RadiusServers: networks.SwitchAccessPoliciesRadiusServerArray{
    		&networks.SwitchAccessPoliciesRadiusServerArgs{
    			Host:   pulumi.String("string"),
    			Port:   pulumi.Int(0),
    			Secret: pulumi.String("string"),
    		},
    	},
    	RadiusTestingEnabled:           pulumi.Bool(false),
    	UrlRedirectWalledGardenEnabled: pulumi.Bool(false),
    	UrlRedirectWalledGardenRanges: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Radius: &networks.SwitchAccessPoliciesRadiusArgs{
    		CriticalAuth: &networks.SwitchAccessPoliciesRadiusCriticalAuthArgs{
    			DataVlanId:        pulumi.Int(0),
    			SuspendPortBounce: pulumi.Bool(false),
    			VoiceVlanId:       pulumi.Int(0),
    		},
    		FailedAuthVlanId:         pulumi.Int(0),
    		ReAuthenticationInterval: pulumi.Int(0),
    	},
    })
    
    var switchAccessPoliciesResource = new SwitchAccessPolicies("switchAccessPoliciesResource", SwitchAccessPoliciesArgs.builder()
        .networkId("string")
        .guestVlanId(0)
        .guestPortBouncing(false)
        .radiusAccountingEnabled(false)
        .radiusAccountingServers(SwitchAccessPoliciesRadiusAccountingServerArgs.builder()
            .host("string")
            .port(0)
            .secret("string")
            .build())
        .hostMode("string")
        .increaseAccessSpeed(false)
        .name("string")
        .accessPolicyType("string")
        .voiceVlanClients(false)
        .dot1x(SwitchAccessPoliciesDot1xArgs.builder()
            .controlDirection("string")
            .build())
        .accessPolicyNumber("string")
        .radiusCoaSupportEnabled(false)
        .radiusGroupAttribute("string")
        .radiusServers(SwitchAccessPoliciesRadiusServerArgs.builder()
            .host("string")
            .port(0)
            .secret("string")
            .build())
        .radiusTestingEnabled(false)
        .urlRedirectWalledGardenEnabled(false)
        .urlRedirectWalledGardenRanges("string")
        .radius(SwitchAccessPoliciesRadiusArgs.builder()
            .criticalAuth(SwitchAccessPoliciesRadiusCriticalAuthArgs.builder()
                .dataVlanId(0)
                .suspendPortBounce(false)
                .voiceVlanId(0)
                .build())
            .failedAuthVlanId(0)
            .reAuthenticationInterval(0)
            .build())
        .build());
    
    switch_access_policies_resource = meraki.networks.SwitchAccessPolicies("switchAccessPoliciesResource",
        network_id="string",
        guest_vlan_id=0,
        guest_port_bouncing=False,
        radius_accounting_enabled=False,
        radius_accounting_servers=[meraki.networks.SwitchAccessPoliciesRadiusAccountingServerArgs(
            host="string",
            port=0,
            secret="string",
        )],
        host_mode="string",
        increase_access_speed=False,
        name="string",
        access_policy_type="string",
        voice_vlan_clients=False,
        dot1x=meraki.networks.SwitchAccessPoliciesDot1xArgs(
            control_direction="string",
        ),
        access_policy_number="string",
        radius_coa_support_enabled=False,
        radius_group_attribute="string",
        radius_servers=[meraki.networks.SwitchAccessPoliciesRadiusServerArgs(
            host="string",
            port=0,
            secret="string",
        )],
        radius_testing_enabled=False,
        url_redirect_walled_garden_enabled=False,
        url_redirect_walled_garden_ranges=["string"],
        radius=meraki.networks.SwitchAccessPoliciesRadiusArgs(
            critical_auth=meraki.networks.SwitchAccessPoliciesRadiusCriticalAuthArgs(
                data_vlan_id=0,
                suspend_port_bounce=False,
                voice_vlan_id=0,
            ),
            failed_auth_vlan_id=0,
            re_authentication_interval=0,
        ))
    
    const switchAccessPoliciesResource = new meraki.networks.SwitchAccessPolicies("switchAccessPoliciesResource", {
        networkId: "string",
        guestVlanId: 0,
        guestPortBouncing: false,
        radiusAccountingEnabled: false,
        radiusAccountingServers: [{
            host: "string",
            port: 0,
            secret: "string",
        }],
        hostMode: "string",
        increaseAccessSpeed: false,
        name: "string",
        accessPolicyType: "string",
        voiceVlanClients: false,
        dot1x: {
            controlDirection: "string",
        },
        accessPolicyNumber: "string",
        radiusCoaSupportEnabled: false,
        radiusGroupAttribute: "string",
        radiusServers: [{
            host: "string",
            port: 0,
            secret: "string",
        }],
        radiusTestingEnabled: false,
        urlRedirectWalledGardenEnabled: false,
        urlRedirectWalledGardenRanges: ["string"],
        radius: {
            criticalAuth: {
                dataVlanId: 0,
                suspendPortBounce: false,
                voiceVlanId: 0,
            },
            failedAuthVlanId: 0,
            reAuthenticationInterval: 0,
        },
    });
    
    type: meraki:networks:SwitchAccessPolicies
    properties:
        accessPolicyNumber: string
        accessPolicyType: string
        dot1x:
            controlDirection: string
        guestPortBouncing: false
        guestVlanId: 0
        hostMode: string
        increaseAccessSpeed: false
        name: string
        networkId: string
        radius:
            criticalAuth:
                dataVlanId: 0
                suspendPortBounce: false
                voiceVlanId: 0
            failedAuthVlanId: 0
            reAuthenticationInterval: 0
        radiusAccountingEnabled: false
        radiusAccountingServers:
            - host: string
              port: 0
              secret: string
        radiusCoaSupportEnabled: false
        radiusGroupAttribute: string
        radiusServers:
            - host: string
              port: 0
              secret: string
        radiusTestingEnabled: false
        urlRedirectWalledGardenEnabled: false
        urlRedirectWalledGardenRanges:
            - string
        voiceVlanClients: false
    

    SwitchAccessPolicies Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The SwitchAccessPolicies resource accepts the following input properties:

    NetworkId string
    networkId path parameter. Network ID
    AccessPolicyNumber string
    accessPolicyNumber path parameter. Access policy number
    AccessPolicyType string
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    Dot1x SwitchAccessPoliciesDot1x
    802.1x Settings
    GuestPortBouncing bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    GuestVlanId int
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    HostMode string
    Choose the Host Mode for the access policy.
    IncreaseAccessSpeed bool
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    Name string
    Name of the access policy
    Radius SwitchAccessPoliciesRadius
    Object for RADIUS Settings
    RadiusAccountingEnabled bool
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    RadiusAccountingServers List<SwitchAccessPoliciesRadiusAccountingServer>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusCoaSupportEnabled bool
    Change of authentication for RADIUS re-authentication and disconnection
    RadiusGroupAttribute string
    Acceptable values are "" for None, or "11" for Group Policies ACL
    RadiusServers List<SwitchAccessPoliciesRadiusServer>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    RadiusTestingEnabled bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    UrlRedirectWalledGardenEnabled bool
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    UrlRedirectWalledGardenRanges List<string>
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    VoiceVlanClients bool
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    NetworkId string
    networkId path parameter. Network ID
    AccessPolicyNumber string
    accessPolicyNumber path parameter. Access policy number
    AccessPolicyType string
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    Dot1x SwitchAccessPoliciesDot1xArgs
    802.1x Settings
    GuestPortBouncing bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    GuestVlanId int
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    HostMode string
    Choose the Host Mode for the access policy.
    IncreaseAccessSpeed bool
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    Name string
    Name of the access policy
    Radius SwitchAccessPoliciesRadiusArgs
    Object for RADIUS Settings
    RadiusAccountingEnabled bool
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    RadiusAccountingServers []SwitchAccessPoliciesRadiusAccountingServerArgs
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusCoaSupportEnabled bool
    Change of authentication for RADIUS re-authentication and disconnection
    RadiusGroupAttribute string
    Acceptable values are "" for None, or "11" for Group Policies ACL
    RadiusServers []SwitchAccessPoliciesRadiusServerArgs
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    RadiusTestingEnabled bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    UrlRedirectWalledGardenEnabled bool
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    UrlRedirectWalledGardenRanges []string
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    VoiceVlanClients bool
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    networkId String
    networkId path parameter. Network ID
    accessPolicyNumber String
    accessPolicyNumber path parameter. Access policy number
    accessPolicyType String
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    dot1x SwitchAccessPoliciesDot1x
    802.1x Settings
    guestPortBouncing Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guestVlanId Integer
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    hostMode String
    Choose the Host Mode for the access policy.
    increaseAccessSpeed Boolean
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name String
    Name of the access policy
    radius SwitchAccessPoliciesRadius
    Object for RADIUS Settings
    radiusAccountingEnabled Boolean
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radiusAccountingServers List<SwitchAccessPoliciesRadiusAccountingServer>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusCoaSupportEnabled Boolean
    Change of authentication for RADIUS re-authentication and disconnection
    radiusGroupAttribute String
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radiusServers List<SwitchAccessPoliciesRadiusServer>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusTestingEnabled Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    urlRedirectWalledGardenEnabled Boolean
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    urlRedirectWalledGardenRanges List<String>
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voiceVlanClients Boolean
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    networkId string
    networkId path parameter. Network ID
    accessPolicyNumber string
    accessPolicyNumber path parameter. Access policy number
    accessPolicyType string
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    dot1x SwitchAccessPoliciesDot1x
    802.1x Settings
    guestPortBouncing boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guestVlanId number
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    hostMode string
    Choose the Host Mode for the access policy.
    increaseAccessSpeed boolean
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name string
    Name of the access policy
    radius SwitchAccessPoliciesRadius
    Object for RADIUS Settings
    radiusAccountingEnabled boolean
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radiusAccountingServers SwitchAccessPoliciesRadiusAccountingServer[]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusCoaSupportEnabled boolean
    Change of authentication for RADIUS re-authentication and disconnection
    radiusGroupAttribute string
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radiusServers SwitchAccessPoliciesRadiusServer[]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusTestingEnabled boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    urlRedirectWalledGardenEnabled boolean
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    urlRedirectWalledGardenRanges string[]
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voiceVlanClients boolean
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    network_id str
    networkId path parameter. Network ID
    access_policy_number str
    accessPolicyNumber path parameter. Access policy number
    access_policy_type str
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    dot1x SwitchAccessPoliciesDot1xArgs
    802.1x Settings
    guest_port_bouncing bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guest_vlan_id int
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    host_mode str
    Choose the Host Mode for the access policy.
    increase_access_speed bool
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name str
    Name of the access policy
    radius SwitchAccessPoliciesRadiusArgs
    Object for RADIUS Settings
    radius_accounting_enabled bool
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radius_accounting_servers Sequence[SwitchAccessPoliciesRadiusAccountingServerArgs]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radius_coa_support_enabled bool
    Change of authentication for RADIUS re-authentication and disconnection
    radius_group_attribute str
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radius_servers Sequence[SwitchAccessPoliciesRadiusServerArgs]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radius_testing_enabled bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    url_redirect_walled_garden_enabled bool
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    url_redirect_walled_garden_ranges Sequence[str]
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voice_vlan_clients bool
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    networkId String
    networkId path parameter. Network ID
    accessPolicyNumber String
    accessPolicyNumber path parameter. Access policy number
    accessPolicyType String
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    dot1x Property Map
    802.1x Settings
    guestPortBouncing Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guestVlanId Number
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    hostMode String
    Choose the Host Mode for the access policy.
    increaseAccessSpeed Boolean
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name String
    Name of the access policy
    radius Property Map
    Object for RADIUS Settings
    radiusAccountingEnabled Boolean
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radiusAccountingServers List<Property Map>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusCoaSupportEnabled Boolean
    Change of authentication for RADIUS re-authentication and disconnection
    radiusGroupAttribute String
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radiusServers List<Property Map>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusTestingEnabled Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    urlRedirectWalledGardenEnabled Boolean
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    urlRedirectWalledGardenRanges List<String>
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voiceVlanClients Boolean
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SwitchAccessPolicies resource produces the following output properties:

    Counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    Id string
    The provider-assigned unique ID for this managed resource.
    RadiusAccountingServersResponses List<SwitchAccessPoliciesRadiusAccountingServersResponse>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusServersResponses List<SwitchAccessPoliciesRadiusServersResponse>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    Counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    Id string
    The provider-assigned unique ID for this managed resource.
    RadiusAccountingServersResponses []SwitchAccessPoliciesRadiusAccountingServersResponse
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusServersResponses []SwitchAccessPoliciesRadiusServersResponse
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    id String
    The provider-assigned unique ID for this managed resource.
    radiusAccountingServersResponses List<SwitchAccessPoliciesRadiusAccountingServersResponse>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusServersResponses List<SwitchAccessPoliciesRadiusServersResponse>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    id string
    The provider-assigned unique ID for this managed resource.
    radiusAccountingServersResponses SwitchAccessPoliciesRadiusAccountingServersResponse[]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusServersResponses SwitchAccessPoliciesRadiusServersResponse[]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    id str
    The provider-assigned unique ID for this managed resource.
    radius_accounting_servers_responses Sequence[SwitchAccessPoliciesRadiusAccountingServersResponse]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radius_servers_responses Sequence[SwitchAccessPoliciesRadiusServersResponse]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    counts Property Map
    Counts associated with the access policy
    id String
    The provider-assigned unique ID for this managed resource.
    radiusAccountingServersResponses List<Property Map>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusServersResponses List<Property Map>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access

    Look up Existing SwitchAccessPolicies Resource

    Get an existing SwitchAccessPolicies resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SwitchAccessPoliciesState, opts?: CustomResourceOptions): SwitchAccessPolicies
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            access_policy_number: Optional[str] = None,
            access_policy_type: Optional[str] = None,
            counts: Optional[SwitchAccessPoliciesCountsArgs] = None,
            dot1x: Optional[SwitchAccessPoliciesDot1xArgs] = None,
            guest_port_bouncing: Optional[bool] = None,
            guest_vlan_id: Optional[int] = None,
            host_mode: Optional[str] = None,
            increase_access_speed: Optional[bool] = None,
            name: Optional[str] = None,
            network_id: Optional[str] = None,
            radius: Optional[SwitchAccessPoliciesRadiusArgs] = None,
            radius_accounting_enabled: Optional[bool] = None,
            radius_accounting_servers: Optional[Sequence[SwitchAccessPoliciesRadiusAccountingServerArgs]] = None,
            radius_accounting_servers_responses: Optional[Sequence[SwitchAccessPoliciesRadiusAccountingServersResponseArgs]] = None,
            radius_coa_support_enabled: Optional[bool] = None,
            radius_group_attribute: Optional[str] = None,
            radius_servers: Optional[Sequence[SwitchAccessPoliciesRadiusServerArgs]] = None,
            radius_servers_responses: Optional[Sequence[SwitchAccessPoliciesRadiusServersResponseArgs]] = None,
            radius_testing_enabled: Optional[bool] = None,
            url_redirect_walled_garden_enabled: Optional[bool] = None,
            url_redirect_walled_garden_ranges: Optional[Sequence[str]] = None,
            voice_vlan_clients: Optional[bool] = None) -> SwitchAccessPolicies
    func GetSwitchAccessPolicies(ctx *Context, name string, id IDInput, state *SwitchAccessPoliciesState, opts ...ResourceOption) (*SwitchAccessPolicies, error)
    public static SwitchAccessPolicies Get(string name, Input<string> id, SwitchAccessPoliciesState? state, CustomResourceOptions? opts = null)
    public static SwitchAccessPolicies get(String name, Output<String> id, SwitchAccessPoliciesState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccessPolicyNumber string
    accessPolicyNumber path parameter. Access policy number
    AccessPolicyType string
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    Counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    Dot1x SwitchAccessPoliciesDot1x
    802.1x Settings
    GuestPortBouncing bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    GuestVlanId int
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    HostMode string
    Choose the Host Mode for the access policy.
    IncreaseAccessSpeed bool
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    Name string
    Name of the access policy
    NetworkId string
    networkId path parameter. Network ID
    Radius SwitchAccessPoliciesRadius
    Object for RADIUS Settings
    RadiusAccountingEnabled bool
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    RadiusAccountingServers List<SwitchAccessPoliciesRadiusAccountingServer>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusAccountingServersResponses List<SwitchAccessPoliciesRadiusAccountingServersResponse>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusCoaSupportEnabled bool
    Change of authentication for RADIUS re-authentication and disconnection
    RadiusGroupAttribute string
    Acceptable values are "" for None, or "11" for Group Policies ACL
    RadiusServers List<SwitchAccessPoliciesRadiusServer>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    RadiusServersResponses List<SwitchAccessPoliciesRadiusServersResponse>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    RadiusTestingEnabled bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    UrlRedirectWalledGardenEnabled bool
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    UrlRedirectWalledGardenRanges List<string>
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    VoiceVlanClients bool
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    AccessPolicyNumber string
    accessPolicyNumber path parameter. Access policy number
    AccessPolicyType string
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    Counts SwitchAccessPoliciesCountsArgs
    Counts associated with the access policy
    Dot1x SwitchAccessPoliciesDot1xArgs
    802.1x Settings
    GuestPortBouncing bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    GuestVlanId int
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    HostMode string
    Choose the Host Mode for the access policy.
    IncreaseAccessSpeed bool
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    Name string
    Name of the access policy
    NetworkId string
    networkId path parameter. Network ID
    Radius SwitchAccessPoliciesRadiusArgs
    Object for RADIUS Settings
    RadiusAccountingEnabled bool
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    RadiusAccountingServers []SwitchAccessPoliciesRadiusAccountingServerArgs
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusAccountingServersResponses []SwitchAccessPoliciesRadiusAccountingServersResponseArgs
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    RadiusCoaSupportEnabled bool
    Change of authentication for RADIUS re-authentication and disconnection
    RadiusGroupAttribute string
    Acceptable values are "" for None, or "11" for Group Policies ACL
    RadiusServers []SwitchAccessPoliciesRadiusServerArgs
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    RadiusServersResponses []SwitchAccessPoliciesRadiusServersResponseArgs
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    RadiusTestingEnabled bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    UrlRedirectWalledGardenEnabled bool
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    UrlRedirectWalledGardenRanges []string
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    VoiceVlanClients bool
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    accessPolicyNumber String
    accessPolicyNumber path parameter. Access policy number
    accessPolicyType String
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    dot1x SwitchAccessPoliciesDot1x
    802.1x Settings
    guestPortBouncing Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guestVlanId Integer
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    hostMode String
    Choose the Host Mode for the access policy.
    increaseAccessSpeed Boolean
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name String
    Name of the access policy
    networkId String
    networkId path parameter. Network ID
    radius SwitchAccessPoliciesRadius
    Object for RADIUS Settings
    radiusAccountingEnabled Boolean
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radiusAccountingServers List<SwitchAccessPoliciesRadiusAccountingServer>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusAccountingServersResponses List<SwitchAccessPoliciesRadiusAccountingServersResponse>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusCoaSupportEnabled Boolean
    Change of authentication for RADIUS re-authentication and disconnection
    radiusGroupAttribute String
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radiusServers List<SwitchAccessPoliciesRadiusServer>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusServersResponses List<SwitchAccessPoliciesRadiusServersResponse>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusTestingEnabled Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    urlRedirectWalledGardenEnabled Boolean
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    urlRedirectWalledGardenRanges List<String>
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voiceVlanClients Boolean
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    accessPolicyNumber string
    accessPolicyNumber path parameter. Access policy number
    accessPolicyType string
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    counts SwitchAccessPoliciesCounts
    Counts associated with the access policy
    dot1x SwitchAccessPoliciesDot1x
    802.1x Settings
    guestPortBouncing boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guestVlanId number
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    hostMode string
    Choose the Host Mode for the access policy.
    increaseAccessSpeed boolean
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name string
    Name of the access policy
    networkId string
    networkId path parameter. Network ID
    radius SwitchAccessPoliciesRadius
    Object for RADIUS Settings
    radiusAccountingEnabled boolean
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radiusAccountingServers SwitchAccessPoliciesRadiusAccountingServer[]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusAccountingServersResponses SwitchAccessPoliciesRadiusAccountingServersResponse[]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusCoaSupportEnabled boolean
    Change of authentication for RADIUS re-authentication and disconnection
    radiusGroupAttribute string
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radiusServers SwitchAccessPoliciesRadiusServer[]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusServersResponses SwitchAccessPoliciesRadiusServersResponse[]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusTestingEnabled boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    urlRedirectWalledGardenEnabled boolean
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    urlRedirectWalledGardenRanges string[]
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voiceVlanClients boolean
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    access_policy_number str
    accessPolicyNumber path parameter. Access policy number
    access_policy_type str
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    counts SwitchAccessPoliciesCountsArgs
    Counts associated with the access policy
    dot1x SwitchAccessPoliciesDot1xArgs
    802.1x Settings
    guest_port_bouncing bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guest_vlan_id int
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    host_mode str
    Choose the Host Mode for the access policy.
    increase_access_speed bool
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name str
    Name of the access policy
    network_id str
    networkId path parameter. Network ID
    radius SwitchAccessPoliciesRadiusArgs
    Object for RADIUS Settings
    radius_accounting_enabled bool
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radius_accounting_servers Sequence[SwitchAccessPoliciesRadiusAccountingServerArgs]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radius_accounting_servers_responses Sequence[SwitchAccessPoliciesRadiusAccountingServersResponseArgs]
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radius_coa_support_enabled bool
    Change of authentication for RADIUS re-authentication and disconnection
    radius_group_attribute str
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radius_servers Sequence[SwitchAccessPoliciesRadiusServerArgs]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radius_servers_responses Sequence[SwitchAccessPoliciesRadiusServersResponseArgs]
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radius_testing_enabled bool
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    url_redirect_walled_garden_enabled bool
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    url_redirect_walled_garden_ranges Sequence[str]
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voice_vlan_clients bool
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.
    accessPolicyNumber String
    accessPolicyNumber path parameter. Access policy number
    accessPolicyType String
    Access Type of the policy. Automatically 'Hybrid authentication' when hostMode is 'Multi-Domain'.
    counts Property Map
    Counts associated with the access policy
    dot1x Property Map
    802.1x Settings
    guestPortBouncing Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    guestVlanId Number
    ID for the guest VLAN allow unauthorized devices access to limited network resources
    hostMode String
    Choose the Host Mode for the access policy.
    increaseAccessSpeed Boolean
    Enabling this option will make switches execute 802.1X and MAC-bypass authentication simultaneously so that clients authenticate faster. Only required when accessPolicyType is 'Hybrid Authentication.
    name String
    Name of the access policy
    networkId String
    networkId path parameter. Network ID
    radius Property Map
    Object for RADIUS Settings
    radiusAccountingEnabled Boolean
    Enable to send start, interim-update and stop messages to a configured RADIUS accounting server for tracking connected clients
    radiusAccountingServers List<Property Map>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusAccountingServersResponses List<Property Map>
    List of RADIUS accounting servers to require connecting devices to authenticate against before granting network access
    radiusCoaSupportEnabled Boolean
    Change of authentication for RADIUS re-authentication and disconnection
    radiusGroupAttribute String
    Acceptable values are "" for None, or "11" for Group Policies ACL
    radiusServers List<Property Map>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusServersResponses List<Property Map>
    List of RADIUS servers to require connecting devices to authenticate against before granting network access
    radiusTestingEnabled Boolean
    If enabled, Meraki devices will periodically send access-request messages to these RADIUS servers
    urlRedirectWalledGardenEnabled Boolean
    Enable to restrict access for clients to a response_objectific set of IP addresses or hostnames prior to authentication
    urlRedirectWalledGardenRanges List<String>
    IP address ranges, in CIDR notation, to restrict access for clients to a specific set of IP addresses or hostnames prior to authentication
    voiceVlanClients Boolean
    CDP/LLDP capable voice clients will be able to use this VLAN. Automatically true when hostMode is 'Multi-Domain'.

    Supporting Types

    SwitchAccessPoliciesCounts, SwitchAccessPoliciesCountsArgs

    Ports SwitchAccessPoliciesCountsPorts
    Counts associated with ports
    Ports SwitchAccessPoliciesCountsPorts
    Counts associated with ports
    ports SwitchAccessPoliciesCountsPorts
    Counts associated with ports
    ports SwitchAccessPoliciesCountsPorts
    Counts associated with ports
    ports SwitchAccessPoliciesCountsPorts
    Counts associated with ports
    ports Property Map
    Counts associated with ports

    SwitchAccessPoliciesCountsPorts, SwitchAccessPoliciesCountsPortsArgs

    WithThisPolicy int
    Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
    WithThisPolicy int
    Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
    withThisPolicy Integer
    Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
    withThisPolicy number
    Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
    with_this_policy int
    Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.
    withThisPolicy Number
    Number of ports in the network with this policy. For template networks, this is the number of template ports (not child ports) with this policy.

    SwitchAccessPoliciesDot1x, SwitchAccessPoliciesDot1xArgs

    ControlDirection string
    Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
    ControlDirection string
    Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
    controlDirection String
    Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
    controlDirection string
    Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
    control_direction str
    Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'
    controlDirection String
    Supports either 'both' or 'inbound'. Set to 'inbound' to allow unauthorized egress on the switchport. Set to 'both' to control both traffic directions with authorization. Defaults to 'both'

    SwitchAccessPoliciesRadius, SwitchAccessPoliciesRadiusArgs

    CriticalAuth SwitchAccessPoliciesRadiusCriticalAuth
    Critical auth settings for when authentication is rejected by the RADIUS server
    FailedAuthVlanId int
    VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    ReAuthenticationInterval int
    Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
    CriticalAuth SwitchAccessPoliciesRadiusCriticalAuth
    Critical auth settings for when authentication is rejected by the RADIUS server
    FailedAuthVlanId int
    VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    ReAuthenticationInterval int
    Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
    criticalAuth SwitchAccessPoliciesRadiusCriticalAuth
    Critical auth settings for when authentication is rejected by the RADIUS server
    failedAuthVlanId Integer
    VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    reAuthenticationInterval Integer
    Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
    criticalAuth SwitchAccessPoliciesRadiusCriticalAuth
    Critical auth settings for when authentication is rejected by the RADIUS server
    failedAuthVlanId number
    VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    reAuthenticationInterval number
    Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
    critical_auth SwitchAccessPoliciesRadiusCriticalAuth
    Critical auth settings for when authentication is rejected by the RADIUS server
    failed_auth_vlan_id int
    VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    re_authentication_interval int
    Re-authentication period in seconds. Will be null if hostMode is Multi-Auth
    criticalAuth Property Map
    Critical auth settings for when authentication is rejected by the RADIUS server
    failedAuthVlanId Number
    VLAN that clients will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    reAuthenticationInterval Number
    Re-authentication period in seconds. Will be null if hostMode is Multi-Auth

    SwitchAccessPoliciesRadiusAccountingServer, SwitchAccessPoliciesRadiusAccountingServerArgs

    Host string
    Public IP address of the RADIUS accounting server
    Port int
    UDP port that the RADIUS Accounting server listens on for access requests
    Secret string
    RADIUS client shared secret
    Host string
    Public IP address of the RADIUS accounting server
    Port int
    UDP port that the RADIUS Accounting server listens on for access requests
    Secret string
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS accounting server
    port Integer
    UDP port that the RADIUS Accounting server listens on for access requests
    secret String
    RADIUS client shared secret
    host string
    Public IP address of the RADIUS accounting server
    port number
    UDP port that the RADIUS Accounting server listens on for access requests
    secret string
    RADIUS client shared secret
    host str
    Public IP address of the RADIUS accounting server
    port int
    UDP port that the RADIUS Accounting server listens on for access requests
    secret str
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS accounting server
    port Number
    UDP port that the RADIUS Accounting server listens on for access requests
    secret String
    RADIUS client shared secret

    SwitchAccessPoliciesRadiusAccountingServersResponse, SwitchAccessPoliciesRadiusAccountingServersResponseArgs

    Host string
    Public IP address of the RADIUS accounting server
    Port int
    UDP port that the RADIUS Accounting server listens on for access requests
    Secret string
    RADIUS client shared secret
    Host string
    Public IP address of the RADIUS accounting server
    Port int
    UDP port that the RADIUS Accounting server listens on for access requests
    Secret string
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS accounting server
    port Integer
    UDP port that the RADIUS Accounting server listens on for access requests
    secret String
    RADIUS client shared secret
    host string
    Public IP address of the RADIUS accounting server
    port number
    UDP port that the RADIUS Accounting server listens on for access requests
    secret string
    RADIUS client shared secret
    host str
    Public IP address of the RADIUS accounting server
    port int
    UDP port that the RADIUS Accounting server listens on for access requests
    secret str
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS accounting server
    port Number
    UDP port that the RADIUS Accounting server listens on for access requests
    secret String
    RADIUS client shared secret

    SwitchAccessPoliciesRadiusCriticalAuth, SwitchAccessPoliciesRadiusCriticalAuthArgs

    DataVlanId int
    VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    SuspendPortBounce bool
    Enable to suspend port bounce when RADIUS servers are unreachable
    VoiceVlanId int
    VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    DataVlanId int
    VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    SuspendPortBounce bool
    Enable to suspend port bounce when RADIUS servers are unreachable
    VoiceVlanId int
    VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    dataVlanId Integer
    VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    suspendPortBounce Boolean
    Enable to suspend port bounce when RADIUS servers are unreachable
    voiceVlanId Integer
    VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    dataVlanId number
    VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    suspendPortBounce boolean
    Enable to suspend port bounce when RADIUS servers are unreachable
    voiceVlanId number
    VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    data_vlan_id int
    VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    suspend_port_bounce bool
    Enable to suspend port bounce when RADIUS servers are unreachable
    voice_vlan_id int
    VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    dataVlanId Number
    VLAN that clients who use data will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth
    suspendPortBounce Boolean
    Enable to suspend port bounce when RADIUS servers are unreachable
    voiceVlanId Number
    VLAN that clients who use voice will be placed on when RADIUS authentication fails. Will be null if hostMode is Multi-Auth

    SwitchAccessPoliciesRadiusServer, SwitchAccessPoliciesRadiusServerArgs

    Host string
    Public IP address of the RADIUS server
    Port int
    UDP port that the RADIUS server listens on for access requests
    Secret string
    RADIUS client shared secret
    Host string
    Public IP address of the RADIUS server
    Port int
    UDP port that the RADIUS server listens on for access requests
    Secret string
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS server
    port Integer
    UDP port that the RADIUS server listens on for access requests
    secret String
    RADIUS client shared secret
    host string
    Public IP address of the RADIUS server
    port number
    UDP port that the RADIUS server listens on for access requests
    secret string
    RADIUS client shared secret
    host str
    Public IP address of the RADIUS server
    port int
    UDP port that the RADIUS server listens on for access requests
    secret str
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS server
    port Number
    UDP port that the RADIUS server listens on for access requests
    secret String
    RADIUS client shared secret

    SwitchAccessPoliciesRadiusServersResponse, SwitchAccessPoliciesRadiusServersResponseArgs

    Host string
    Public IP address of the RADIUS server
    Port int
    UDP port that the RADIUS server listens on for access requests
    Secret string
    RADIUS client shared secret
    Host string
    Public IP address of the RADIUS server
    Port int
    UDP port that the RADIUS server listens on for access requests
    Secret string
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS server
    port Integer
    UDP port that the RADIUS server listens on for access requests
    secret String
    RADIUS client shared secret
    host string
    Public IP address of the RADIUS server
    port number
    UDP port that the RADIUS server listens on for access requests
    secret string
    RADIUS client shared secret
    host str
    Public IP address of the RADIUS server
    port int
    UDP port that the RADIUS server listens on for access requests
    secret str
    RADIUS client shared secret
    host String
    Public IP address of the RADIUS server
    port Number
    UDP port that the RADIUS server listens on for access requests
    secret String
    RADIUS client shared secret

    Import

    $ pulumi import meraki:networks/switchAccessPolicies:SwitchAccessPolicies example "access_policy_number,network_id"
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    meraki pulumi/pulumi-meraki
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the meraki Terraform Provider.
    meraki logo
    Cisco Meraki v0.2.4 published on Friday, Jun 14, 2024 by Pulumi