{"type":"api","title":"Update Network Wireless Ssid","meta":{"id":"/apps/pubhub/media/Meraki-Dashboard-API-v1-Documentation/e92a64d0814b40091de22f4a93378df69809b95e/5c63a5d4-9452-397a-85eb-8b6fec45147e","info":{"title":"Meraki Dashboard API","description":"A RESTful API to programmatically manage and monitor Cisco Meraki networks at scale.\n\n\u003e Date: 06 November, 2024\n\u003e\n\u003e [Recent Updates](https://meraki.io/whats-new/)\n\n---\n\n[API Documentation](https://meraki.io/api)\n\n[Community Support](https://meraki.io/community)\n\n[Meraki Homepage](https://www.meraki.com)\n","contact":{"name":"Meraki Developer Community","url":"https://meraki.io/community"},"version":"1.52.0"},"security":[{"meraki_api_key":[]},{"bearerAuth":[]}],"tags":[{"name":"organizations"},{"name":"networks"},{"name":"devices"},{"name":"insight"},{"name":"wireless"},{"name":"camera"},{"name":"appliance"},{"name":"switch"},{"name":"cellularGateway"},{"name":"sm"},{"name":"sensor"},{"name":"administered"},{"name":"wirelessController"},{"name":"policy"},{"name":"accessControlLists"},{"name":"accessPolicies"},{"name":"accounts"},{"name":"acls"},{"name":"actionBatches"},{"name":"adaptivePolicy"},{"name":"addresses"},{"name":"admins"},{"name":"airMarshal"},{"name":"alertTypes"},{"name":"alerts"},{"name":"alternateManagementInterface"},{"name":"analytics"},{"name":"api"},{"name":"apiRequests"},{"name":"apnsCert"},{"name":"appliances"},{"name":"applicationCategories"},{"name":"applicationUsage"},{"name":"applications"},{"name":"areas"},{"name":"arpInspection"},{"name":"arpTable"},{"name":"artifacts"},{"name":"assets"},{"name":"assignments"},{"name":"authenticationToken"},{"name":"autoLocate"},{"name":"autoRf"},{"name":"availabilities"},{"name":"bandwidthUsageHistory"},{"name":"bgp"},{"name":"billing"},{"name":"bluetooth"},{"name":"bluetoothClients"},{"name":"bonjourForwarding"},{"name":"boundaries"},{"name":"brandingPolicies"},{"name":"bulk"},{"name":"bulkUpdate"},{"name":"byBoundary"},{"name":"byClient"},{"name":"byDevice"},{"name":"byEnergyUsage"},{"name":"byInterval"},{"name":"byMetric"},{"name":"byModel"},{"name":"byNetwork"},{"name":"byStatus"},{"name":"bySwitch"},{"name":"byType"},{"name":"byUsage"},{"name":"byUtilization"},{"name":"bypassActivationLockAttempts"},{"name":"cableTest"},{"name":"callbacks"},{"name":"categories"},{"name":"cellular"},{"name":"cellularFirewallRules"},{"name":"cellularUsageHistory"},{"name":"certs"},{"name":"changeHistory"},{"name":"channelUtilization"},{"name":"channelUtilizationHistory"},{"name":"channels"},{"name":"claim"},{"name":"claimKey"},{"name":"clientCountHistory"},{"name":"clients"},{"name":"cloudMonitoring"},{"name":"commands"},{"name":"communicationPlans"},{"name":"compliance"},{"name":"configTemplates"},{"name":"configurationChanges"},{"name":"configure"},{"name":"configuredDevices"},{"name":"connectionStats"},{"name":"connections"},{"name":"connectivity"},{"name":"connectivityEvents"},{"name":"connectivityMonitoringDestinations"},{"name":"contentFiltering"},{"name":"coterm"},{"name":"current"},{"name":"customAnalytics"},{"name":"customPerformanceClasses"},{"name":"dataRateHistory"},{"name":"delegated"},{"name":"desktopLogs"},{"name":"details"},{"name":"detections"},{"name":"deviceCommandLogs"},{"name":"deviceProfiles"},{"name":"deviceTypeGroupPolicies"},{"name":"dhcp"},{"name":"dhcpServerPolicy"},{"name":"dscpTaggingOptions"},{"name":"dscpToCosMappings"},{"name":"eapOverride"},{"name":"earlyAccess"},{"name":"electronicShelfLabel"},{"name":"entitlements"},{"name":"esims"},{"name":"ethernet"},{"name":"eventTypes"},{"name":"events"},{"name":"exportEvents"},{"name":"failedConnections"},{"name":"failover"},{"name":"features"},{"name":"fields"},{"name":"firewall"},{"name":"firewalledServices"},{"name":"firmware"},{"name":"firmwareUpgrades"},{"name":"floorPlans"},{"name":"groupPolicies"},{"name":"groups"},{"name":"health"},{"name":"healthByTime"},{"name":"historical"},{"name":"history"},{"name":"hotspot20"},{"name":"httpServers"},{"name":"identities"},{"name":"identityPsks"},{"name":"idps"},{"name":"imports"},{"name":"inboundCellularFirewallRules"},{"name":"inboundFirewallRules"},{"name":"interfaces"},{"name":"internetPolicies"},{"name":"intrusion"},{"name":"inventory"},{"name":"ipv6"},{"name":"jobs"},{"name":"keys"},{"name":"l2"},{"name":"l3"},{"name":"l3FirewallRules"},{"name":"l7FirewallRules"},{"name":"lan"},{"name":"latencyHistory"},{"name":"latencyStats"},{"name":"latest"},{"name":"licenses"},{"name":"licensing"},{"name":"lines"},{"name":"linkAggregations"},{"name":"linkLayer"},{"name":"live"},{"name":"liveTools"},{"name":"lldpCdp"},{"name":"loginSecurity"},{"name":"logs"},{"name":"lossAndLatencyHistory"},{"name":"malware"},{"name":"managementInterface"},{"name":"manufacturers"},{"name":"me"},{"name":"merakiAuthUsers"},{"name":"meshStatuses"},{"name":"models"},{"name":"monitor"},{"name":"monitoredMediaServers"},{"name":"mqttBrokers"},{"name":"mtu"},{"name":"multicast"},{"name":"netflow"},{"name":"networkAdapters"},{"name":"networkHealth"},{"name":"objectDetectionModels"},{"name":"onboarding"},{"name":"oneToManyNatRules"},{"name":"oneToOneNatRules"},{"name":"openapiSpec"},{"name":"optIns"},{"name":"order"},{"name":"ospf"},{"name":"overview"},{"name":"packetLoss"},{"name":"packets"},{"name":"payloadTemplates"},{"name":"performance"},{"name":"performanceHistory"},{"name":"permissions"},{"name":"pii"},{"name":"piiKeys"},{"name":"ping"},{"name":"pingDevice"},{"name":"policies"},{"name":"policyObjects"},{"name":"portForwardingRules"},{"name":"portSchedules"},{"name":"ports"},{"name":"power"},{"name":"powerModules"},{"name":"prefixes"},{"name":"prepare"},{"name":"priorities"},{"name":"profiles"},{"name":"provisioning"},{"name":"qosRules"},{"name":"qualityAndRetention"},{"name":"qualityRetentionProfiles"},{"name":"radio"},{"name":"ratePlans"},{"name":"readings"},{"name":"recent"},{"name":"redundancy"},{"name":"relationships"},{"name":"rendezvousPoints"},{"name":"requests"},{"name":"responseCodes"},{"name":"restrictions"},{"name":"rfProfiles"},{"name":"roles"},{"name":"rollbacks"},{"name":"routing"},{"name":"rules"},{"name":"saml"},{"name":"samlRoles"},{"name":"schedules"},{"name":"sdwan"},{"name":"search"},{"name":"security"},{"name":"securityCenters"},{"name":"seen"},{"name":"sense"},{"name":"sentry"},{"name":"servers"},{"name":"serviceProviders"},{"name":"settings"},{"name":"signalQualityHistory"},{"name":"sims"},{"name":"singleLan"},{"name":"siteToSiteVpn"},{"name":"smDevicesForKey"},{"name":"smOwnersForKey"},{"name":"snmp"},{"name":"softwares"},{"name":"splash"},{"name":"splashAuthorizationStatus"},{"name":"splashLoginAttempts"},{"name":"ssids"},{"name":"stacks"},{"name":"staged"},{"name":"stages"},{"name":"staticRoutes"},{"name":"statics"},{"name":"stats"},{"name":"status"},{"name":"statuses"},{"name":"stormControl"},{"name":"stp"},{"name":"subnetPool"},{"name":"subnets"},{"name":"subscription"},{"name":"subscriptions"},{"name":"summary"},{"name":"swap"},{"name":"swaps"},{"name":"switches"},{"name":"syslogServers"},{"name":"system"},{"name":"targetGroups"},{"name":"themes"},{"name":"thirdPartyVPNPeers"},{"name":"throughputTest"},{"name":"top"},{"name":"topology"},{"name":"traffic"},{"name":"trafficAnalysis"},{"name":"trafficHistory"},{"name":"trafficShaping"},{"name":"trustedAccessConfigs"},{"name":"trustedServers"},{"name":"upgrades"},{"name":"uplink"},{"name":"uplinkBandwidth"},{"name":"uplinkSelection"},{"name":"uplinks"},{"name":"uplinksLossAndLatency"},{"name":"usage"},{"name":"usageHistories"},{"name":"usageHistory"},{"name":"userAccessDevices"},{"name":"utilization"},{"name":"v4"},{"name":"video"},{"name":"videoLink"},{"name":"vlanAssignments"},{"name":"vlanProfiles"},{"name":"vlans"},{"name":"vmx"},{"name":"vpn"},{"name":"vpnExclusions"},{"name":"vpnFirewallRules"},{"name":"vppAccounts"},{"name":"wakeOnLan"},{"name":"warmSpare"},{"name":"warnings"},{"name":"webhookTests"},{"name":"webhooks"},{"name":"wirelessControllers"},{"name":"wirelessProfiles"},{"name":"wlanLists"},{"name":"zones"}],"x-parser-conf":{"overview":{"markdownPath":"docs/overview.md"},"theme":"meraki","serverConfig":true,"meta":{"useProxy":true},"httpBearer":{"bearerToken":"75dd5334bef4d2bc96f26138c163c0a3fa0b5ca6"},"labelConfig":{"endpoint":{"field":"operationId","format":"startCase"}},"groupBy":{"$remoteModule":"config/group_platform.js"},"sortBy":{"$remoteModule":"config/sort_by.js"},"exampleAsDefault":true,"expand":3,"sampleCode":{"python":{"folder":"meraki/sdk/python","name":"Meraki Python Library","highlight":"python"}},"variables":{"organizationId":"1215707","networkId":"N_784752235069315754","serial":"QBSB-VQ3J-XZ54"}},"openapi":"3.0.1","servers":[{"url":"https://api.meraki.com/{basePath}","variables":{"basePath":{"default":"api/v1"}}}],"securitySchemes":{"meraki_api_key":{"type":"apiKey","name":"X-Cisco-Meraki-API-Key","in":"header"},"bearerAuth":{"type":"http","scheme":"bearer","bearerFormat":"API Key"}}},"spec":{"description":"Update the attributes of an MR SSID","operationId":"updateNetworkWirelessSsid","parameters":[{"name":"networkId","in":"path","description":"Network ID","schema":{"type":"string"},"required":true},{"name":"number","in":"path","description":"Number","schema":{"type":"string"},"required":true}],"requestBody":{"content":{"application/json":{"schema":{"type":"object","properties":{"name":{"type":"string","description":"The name of the SSID"},"enabled":{"type":"boolean","description":"Whether or not the SSID is enabled"},"authMode":{"type":"string","enum":["8021x-entra","8021x-google","8021x-localradius","8021x-meraki","8021x-nac","8021x-radius","ipsk-with-nac","ipsk-with-radius","ipsk-without-radius","open","open-enhanced","open-with-nac","open-with-radius","psk"],"description":"The association control method for the SSID ('open', 'open-enhanced', 'psk', 'open-with-radius', 'open-with-nac', '8021x-meraki', '8021x-nac', '8021x-radius', '8021x-google', '8021x-entra', '8021x-localradius', 'ipsk-with-radius', 'ipsk-without-radius' or 'ipsk-with-nac')"},"enterpriseAdminAccess":{"type":"string","enum":["access disabled","access enabled"],"description":"Whether or not an SSID is accessible by 'enterprise' administrators ('access disabled' or 'access enabled')"},"encryptionMode":{"type":"string","enum":["open","wep","wpa","wpa-eap"],"description":"The psk encryption mode for the SSID ('wep' or 'wpa'). This param is only valid if the authMode is 'psk'"},"psk":{"type":"string","description":"The passkey for the SSID. This param is only valid if the authMode is 'psk'"},"wpaEncryptionMode":{"type":"string","enum":["WPA1 and WPA2","WPA1 only","WPA2 only","WPA3 192-bit Security","WPA3 Transition Mode","WPA3 only"],"description":"The types of WPA encryption. ('WPA1 only', 'WPA1 and WPA2', 'WPA2 only', 'WPA3 Transition Mode', 'WPA3 only' or 'WPA3 192-bit Security')"},"dot11w":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Whether 802.11w is enabled or not."},"required":{"type":"boolean","description":"(Optional) Whether 802.11w is required or not."}},"description":"The current setting for Protected Management Frames (802.11w)."},"dot11r":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Whether 802.11r is enabled or not."},"adaptive":{"type":"boolean","description":"(Optional) Whether 802.11r is adaptive or not."}},"description":"The current setting for 802.11r"},"splashPage":{"type":"string","enum":["Billing","Cisco ISE","Click-through splash page","Facebook Wi-Fi","Google Apps domain","Google OAuth","Microsoft Entra ID","None","Password-protected with Active Directory","Password-protected with LDAP","Password-protected with Meraki RADIUS","Password-protected with custom RADIUS","SMS authentication","Sponsored guest","Systems Manager Sentry"],"description":"The type of splash page for the SSID ('None', 'Click-through splash page', 'Billing', 'Password-protected with Meraki RADIUS', 'Password-protected with custom RADIUS', 'Password-protected with Active Directory', 'Password-protected with LDAP', 'SMS authentication', 'Systems Manager Sentry', 'Facebook Wi-Fi', 'Google OAuth', 'Microsoft Entra ID', 'Sponsored guest', 'Cisco ISE' or 'Google Apps domain'). This attribute is not supported for template children."},"splashGuestSponsorDomains":{"type":"array","items":{"type":"string"},"description":"Array of valid sponsor email domains for sponsored guest splash type."},"oauth":{"type":"object","properties":{"allowedDomains":{"type":"array","items":{"type":"string"},"description":"(Optional) The list of domains allowed access to the network."}},"description":"The OAuth settings of this SSID. Only valid if splashPage is 'Google OAuth'."},"localRadius":{"type":"object","properties":{"cacheTimeout":{"type":"integer","description":"The duration (in seconds) for which LDAP and OCSP lookups are cached."},"passwordAuthentication":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Whether or not to use EAP-TTLS/PAP or PEAP-GTC password-based authentication via LDAP lookup."}},"description":"The current setting for password-based authentication."},"certificateAuthentication":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Whether or not to use EAP-TLS certificate-based authentication to validate wireless clients."},"useLdap":{"type":"boolean","description":"Whether or not to verify the certificate with LDAP."},"useOcsp":{"type":"boolean","description":"Whether or not to verify the certificate with OCSP."},"ocspResponderUrl":{"type":"string","description":"(Optional) The URL of the OCSP responder to verify client certificate status."},"clientRootCaCertificate":{"type":"object","properties":{"contents":{"type":"string","description":"The contents of the Client CA Certificate. Must be in PEM or DER format."}},"description":"The Client CA Certificate used to sign the client certificate."}},"description":"The current setting for certificate verification."}},"description":"The current setting for Local Authentication, a built-in RADIUS server on the access point. Only valid if authMode is '8021x-localradius'."},"ldap":{"type":"object","properties":{"servers":{"type":"array","items":{"type":"object","properties":{"host":{"type":"string","description":"IP address (or FQDN) of your LDAP server."},"port":{"type":"integer","description":"UDP port the LDAP server listens on."}},"required":["host","port"]},"description":"The LDAP servers to be used for authentication."},"credentials":{"type":"object","properties":{"distinguishedName":{"type":"string","description":"The distinguished name of the LDAP user account (example: cn=user,dc=meraki,dc=com)."},"password":{"type":"string","description":"The password of the LDAP user account."}},"description":"(Optional) The credentials of the user account to be used by the AP to bind to your LDAP server. The LDAP account should have permissions on all your LDAP servers."},"baseDistinguishedName":{"type":"string","description":"The base distinguished name of users on the LDAP server."},"serverCaCertificate":{"type":"object","properties":{"contents":{"type":"string","description":"The contents of the CA certificate. Must be in PEM or DER format."}},"description":"The CA certificate used to sign the LDAP server's key."}},"description":"The current setting for LDAP. Only valid if splashPage is 'Password-protected with LDAP'."},"activeDirectory":{"type":"object","properties":{"servers":{"type":"array","items":{"type":"object","properties":{"host":{"type":"string","description":"IP address (or FQDN) of your Active Directory server."},"port":{"type":"integer","description":"(Optional) UDP port the Active Directory server listens on. By default, uses port 3268."}},"required":["host"]},"description":"The Active Directory servers to be used for authentication."},"credentials":{"type":"object","properties":{"logonName":{"type":"string","description":"The logon name of the Active Directory account."},"password":{"type":"string","description":"The password to the Active Directory user account."}},"description":"(Optional) The credentials of the user account to be used by the AP to bind to your Active Directory server. The Active Directory account should have permissions on all your Active Directory servers. Only valid if the splashPage is 'Password-protected with Active Directory'."}},"description":"The current setting for Active Directory. Only valid if splashPage is 'Password-protected with Active Directory'"},"radiusServers":{"type":"array","items":{"type":"object","properties":{"host":{"type":"string","description":"IP address (or FQDN) of your RADIUS server"},"port":{"type":"integer","description":"UDP port the RADIUS server listens on for Access-requests"},"secret":{"type":"string","description":"RADIUS client shared secret"},"radsecEnabled":{"type":"boolean","description":"Use RADSEC (TLS over TCP) to connect to this RADIUS server. Requires radiusProxyEnabled."},"openRoamingCertificateId":{"type":"integer","description":"The ID of the Openroaming Certificate attached to radius server."},"caCertificate":{"type":"string","description":"Certificate used for authorization for the RADSEC Server"}},"required":["host"]},"description":"The RADIUS 802.1X servers to be used for authentication. This param is only valid if the authMode is 'open-with-radius', '8021x-radius' or 'ipsk-with-radius'"},"radiusProxyEnabled":{"type":"boolean","description":"If true, Meraki devices will proxy RADIUS messages through the Meraki cloud to the configured RADIUS auth and accounting servers."},"radiusTestingEnabled":{"type":"boolean","description":"If true, Meraki devices will periodically send Access-Request messages to configured RADIUS servers using identity 'meraki_8021x_test' to ensure that the RADIUS servers are reachable."},"radiusCalledStationId":{"type":"string","description":"The template of the called station identifier to be used for RADIUS (ex. $NODE_MAC$:$VAP_NUM$)."},"radiusAuthenticationNasId":{"type":"string","description":"The template of the NAS identifier to be used for RADIUS authentication (ex. $NODE_MAC$:$VAP_NUM$)."},"radiusServerTimeout":{"type":"integer","description":"The amount of time for which a RADIUS client waits for a reply from the RADIUS server (must be between 1-10 seconds)."},"radiusServerAttemptsLimit":{"type":"integer","description":"The maximum number of transmit attempts after which a RADIUS server is failed over (must be between 1-5)."},"radiusFallbackEnabled":{"type":"boolean","description":"Whether or not higher priority RADIUS servers should be retried after 60 seconds."},"radiusCoaEnabled":{"type":"boolean","description":"If true, Meraki devices will act as a RADIUS Dynamic Authorization Server and will respond to RADIUS Change-of-Authorization and Disconnect messages sent by the RADIUS server."},"radiusFailoverPolicy":{"type":"string","enum":["Allow access","Deny access"],"description":"This policy determines how authentication requests should be handled in the event that all of the configured RADIUS servers are unreachable ('Deny access' or 'Allow access')"},"radiusLoadBalancingPolicy":{"type":"string","enum":["Round robin","Strict priority order"],"description":"This policy determines which RADIUS server will be contacted first in an authentication attempt and the ordering of any necessary retry attempts ('Strict priority order' or 'Round robin')"},"radiusAccountingEnabled":{"type":"boolean","description":"Whether or not RADIUS accounting is enabled. This param is only valid if the authMode is 'open-with-radius', '8021x-radius' or 'ipsk-with-radius'"},"radiusAccountingServers":{"type":"array","items":{"type":"object","properties":{"host":{"type":"string","description":"IP address (or FQDN) to which the APs will send RADIUS accounting messages"},"port":{"type":"integer","description":"Port on the RADIUS server that is listening for accounting messages"},"secret":{"type":"string","description":"Shared key used to authenticate messages between the APs and RADIUS server"},"radsecEnabled":{"type":"boolean","description":"Use RADSEC (TLS over TCP) to connect to this RADIUS accounting server. Requires radiusProxyEnabled."},"caCertificate":{"type":"string","description":"Certificate used for authorization for the RADSEC Server"}},"required":["host"]},"description":"The RADIUS accounting 802.1X servers to be used for authentication. This param is only valid if the authMode is 'open-with-radius', '8021x-radius' or 'ipsk-with-radius' and radiusAccountingEnabled is 'true'"},"radiusAccountingInterimInterval":{"type":"integer","description":"The interval (in seconds) in which accounting information is updated and sent to the RADIUS accounting server."},"radiusAttributeForGroupPolicies":{"type":"string","enum":["Airespace-ACL-Name","Aruba-User-Role","Filter-Id","Reply-Message"],"description":"Specify the RADIUS attribute used to look up group policies ('Filter-Id', 'Reply-Message', 'Airespace-ACL-Name' or 'Aruba-User-Role'). Access points must receive this attribute in the RADIUS Access-Accept message"},"ipAssignmentMode":{"type":"string","description":"The client IP assignment mode ('NAT mode', 'Bridge mode', 'Layer 3 roaming', 'Ethernet over GRE', 'Layer 3 roaming with a concentrator' or 'VPN')"},"useVlanTagging":{"type":"boolean","description":"Whether or not traffic should be directed to use specific VLANs. This param is only valid if the ipAssignmentMode is 'Bridge mode' or 'Layer 3 roaming'"},"concentratorNetworkId":{"type":"string","description":"The concentrator to use when the ipAssignmentMode is 'Layer 3 roaming with a concentrator' or 'VPN'."},"secondaryConcentratorNetworkId":{"type":"string","description":"The secondary concentrator to use when the ipAssignmentMode is 'VPN'. If configured, the APs will switch to using this concentrator if the primary concentrator is unreachable. This param is optional. ('disabled' represents no secondary concentrator.)"},"disassociateClientsOnVpnFailover":{"type":"boolean","description":"Disassociate clients when 'VPN' concentrator failover occurs in order to trigger clients to re-associate and generate new DHCP requests. This param is only valid if ipAssignmentMode is 'VPN'."},"vlanId":{"type":"integer","description":"The VLAN ID used for VLAN tagging. This param is only valid when the ipAssignmentMode is 'Layer 3 roaming with a concentrator' or 'VPN'"},"defaultVlanId":{"type":"integer","description":"The default VLAN ID used for 'all other APs'. This param is only valid when the ipAssignmentMode is 'Bridge mode' or 'Layer 3 roaming'"},"apTagsAndVlanIds":{"type":"array","items":{"type":"object","properties":{"tags":{"type":"array","items":{"type":"string"},"description":"Array of AP tags"},"vlanId":{"type":"integer","description":"Numerical identifier that is assigned to the VLAN"}}},"description":"The list of tags and VLAN IDs used for VLAN tagging. This param is only valid when the ipAssignmentMode is 'Bridge mode' or 'Layer 3 roaming'"},"walledGardenEnabled":{"type":"boolean","description":"Allow access to a configurable list of IP ranges, which users may access prior to sign-on."},"walledGardenRanges":{"type":"array","items":{"type":"string"},"description":"Specify your walled garden by entering an array of addresses, ranges using CIDR notation, domain names, and domain wildcards (e.g. '192.168.1.1/24', '192.168.37.10/32', 'www.yahoo.com', '*.google.com']). Meraki's splash page is automatically included in your walled garden."},"gre":{"type":"object","properties":{"concentrator":{"type":"object","properties":{"host":{"type":"string","description":"The EoGRE concentrator's IP or FQDN. This param is required when ipAssignmentMode is 'Ethernet over GRE'."}},"required":["host"],"description":"The EoGRE concentrator's settings"},"key":{"type":"integer","description":"Optional numerical identifier that will add the GRE key field to the GRE header. Used to identify an individual traffic flow within a tunnel."}},"description":"Ethernet over GRE settings"},"radiusOverride":{"type":"boolean","description":"If true, the RADIUS response can override VLAN tag. This is not valid when ipAssignmentMode is 'NAT mode'."},"radiusGuestVlanEnabled":{"type":"boolean","description":"Whether or not RADIUS Guest VLAN is enabled. This param is only valid if the authMode is 'open-with-radius' and addressing mode is not set to 'isolated' or 'nat' mode"},"radiusGuestVlanId":{"type":"integer","description":"VLAN ID of the RADIUS Guest VLAN. This param is only valid if the authMode is 'open-with-radius' and addressing mode is not set to 'isolated' or 'nat' mode"},"minBitrate":{"type":"number","format":"float","description":"The minimum bitrate in Mbps of this SSID in the default indoor RF profile. ('1', '2', '5.5', '6', '9', '11', '12', '18', '24', '36', '48' or '54')"},"bandSelection":{"type":"string","description":"The client-serving radio frequencies of this SSID in the default indoor RF profile. ('Dual band operation', '5 GHz band only' or 'Dual band operation with Band Steering')"},"perClientBandwidthLimitUp":{"type":"integer","description":"The upload bandwidth limit in Kbps. (0 represents no limit.)"},"perClientBandwidthLimitDown":{"type":"integer","description":"The download bandwidth limit in Kbps. (0 represents no limit.)"},"perSsidBandwidthLimitUp":{"type":"integer","description":"The total upload bandwidth limit in Kbps. (0 represents no limit.)"},"perSsidBandwidthLimitDown":{"type":"integer","description":"The total download bandwidth limit in Kbps. (0 represents no limit.)"},"lanIsolationEnabled":{"type":"boolean","description":"Boolean indicating whether Layer 2 LAN isolation should be enabled or disabled. Only configurable when ipAssignmentMode is 'Bridge mode'."},"visible":{"type":"boolean","description":"Boolean indicating whether APs should advertise or hide this SSID. APs will only broadcast this SSID if set to true"},"availableOnAllAps":{"type":"boolean","description":"Boolean indicating whether all APs should broadcast the SSID or if it should be restricted to APs matching any availability tags. Can only be false if the SSID has availability tags."},"availabilityTags":{"type":"array","items":{"type":"string"},"description":"Accepts a list of tags for this SSID. If availableOnAllAps is false, then the SSID will only be broadcast by APs with tags matching any of the tags in this list."},"mandatoryDhcpEnabled":{"type":"boolean","description":"If true, Mandatory DHCP will enforce that clients connecting to this SSID must use the IP address assigned by the DHCP server. Clients who use a static IP address won't be able to associate."},"adultContentFilteringEnabled":{"type":"boolean","description":"Boolean indicating whether or not adult content will be blocked"},"dnsRewrite":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Boolean indicating whether or not DNS server rewrite is enabled. If disabled, upstream DNS will be used"},"dnsCustomNameservers":{"type":"array","items":{"type":"string"},"description":"User specified DNS servers (up to two servers)"}},"description":"DNS servers rewrite settings"},"speedBurst":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Boolean indicating whether or not to allow users to temporarily exceed the bandwidth limit for short periods while still keeping them under the bandwidth limit over time."}},"description":"The SpeedBurst setting for this SSID'"},"namedVlans":{"type":"object","properties":{"tagging":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Whether or not traffic should be directed to use specific VLAN names."},"defaultVlanName":{"type":"string","description":"The default VLAN name used to tag traffic in the absence of a matching AP tag."},"byApTags":{"type":"array","items":{"type":"object","properties":{"tags":{"type":"array","items":{"type":"string"},"description":"List of AP tags."},"vlanName":{"type":"string","description":"VLAN name that will be used to tag traffic."}}},"description":"The list of AP tags and VLAN names used for named VLAN tagging. If an AP has a tag matching one in the list, then traffic on this SSID will be directed to use the VLAN name associated to the tag."}},"description":"VLAN tagging settings. This param is only valid when ipAssignmentMode is 'Bridge mode' or 'Layer 3 roaming'."},"radius":{"type":"object","properties":{"guestVlan":{"type":"object","properties":{"enabled":{"type":"boolean","description":"Whether or not RADIUS guest named VLAN is enabled."},"name":{"type":"string","description":"RADIUS guest VLAN name."}},"description":"Guest VLAN settings. Used to direct traffic to a guest VLAN when none of the RADIUS servers are reachable or a client receives access-reject from the RADIUS server."}},"description":"RADIUS settings. This param is only valid when authMode is 'open-with-radius' and ipAssignmentMode is not 'NAT mode'."}},"description":"Named VLAN settings."}},"example":{"name":"My SSID","enabled":true,"authMode":"8021x-radius","enterpriseAdminAccess":"access enabled","encryptionMode":"wpa","psk":"deadbeef","wpaEncryptionMode":"WPA2 only","dot11w":{"enabled":true,"required":false},"dot11r":{"enabled":true,"adaptive":true},"splashPage":"Click-through splash page","splashGuestSponsorDomains":["example.com"],"oauth":{"allowedDomains":["example.com"]},"localRadius":{"cacheTimeout":60,"passwordAuthentication":{"enabled":false},"certificateAuthentication":{"enabled":true,"useLdap":false,"useOcsp":true,"ocspResponderUrl":"http://ocsp-server.example.com","clientRootCaCertificate":{"contents":"-----BEGIN CERTIFICATE-----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\nwTw70BVktzJnb0VLeDg=\n-----END CERTIFICATE-----"}}},"ldap":{"servers":[{"host":"127.0.0.1","port":389}],"credentials":{"distinguishedName":"cn=user,dc=example,dc=com","password":"password"},"baseDistinguishedName":"dc=example,dc=com","serverCaCertificate":{"contents":"-----BEGIN CERTIFICATE-----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\nwTw70BVktzJnb0VLeDg=\n-----END CERTIFICATE-----"}},"activeDirectory":{"servers":[{"host":"127.0.0.1","port":3268}],"credentials":{"logonName":"user","password":"password"}},"radiusServers":[{"host":"0.0.0.0","port":3000,"secret":"secret-string","radsecEnabled":true,"openRoamingCertificateId":2,"caCertificate":"-----BEGIN CERTIFICATE-----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\nwTw70BVktzJnb0VLeDg=\n-----END CERTIFICATE-----"}],"radiusProxyEnabled":false,"radiusTestingEnabled":true,"radiusCalledStationId":"00-11-22-33-44-55:AP1","radiusAuthenticationNasId":"00-11-22-33-44-55:AP1","radiusServerTimeout":5,"radiusServerAttemptsLimit":5,"radiusFallbackEnabled":true,"radiusCoaEnabled":true,"radiusFailoverPolicy":"Deny access","radiusLoadBalancingPolicy":"Round robin","radiusAccountingEnabled":true,"radiusAccountingServers":[{"host":"0.0.0.0","port":3000,"secret":"secret-string","radsecEnabled":true,"caCertificate":"-----BEGIN CERTIFICATE-----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\nwTw70BVktzJnb0VLeDg=\n-----END CERTIFICATE-----"}],"radiusAccountingInterimInterval":5,"radiusAttributeForGroupPolicies":"Filter-Id","ipAssignmentMode":"NAT mode","useVlanTagging":false,"concentratorNetworkId":"N_24329156","secondaryConcentratorNetworkId":"disabled","disassociateClientsOnVpnFailover":false,"vlanId":10,"defaultVlanId":1,"apTagsAndVlanIds":[{"tags":["tag1","tag2"],"vlanId":100}],"walledGardenEnabled":true,"walledGardenRanges":["example.com","1.1.1.1/32"],"gre":{"concentrator":{"host":"192.168.1.1"},"key":5},"radiusOverride":false,"radiusGuestVlanEnabled":true,"radiusGuestVlanId":1,"minBitrate":5.5,"bandSelection":"5 GHz band only","perClientBandwidthLimitUp":0,"perClientBandwidthLimitDown":0,"perSsidBandwidthLimitUp":0,"perSsidBandwidthLimitDown":0,"lanIsolationEnabled":true,"visible":true,"availableOnAllAps":false,"availabilityTags":["tag1","tag2"],"mandatoryDhcpEnabled":false,"adultContentFilteringEnabled":false,"dnsRewrite":{"enabled":true,"dnsCustomNameservers":["8.8.8.8","8.8.4.4"]},"speedBurst":{"enabled":true},"namedVlans":{"tagging":{"enabled":true,"defaultVlanName":"My VLAN","byApTags":[{"tags":["tag1","tag2"],"vlanName":"My VLAN"}]},"radius":{"guestVlan":{"enabled":true,"name":"Guest VLAN"}}}}}}},"required":false},"responses":{"200":{"description":"Successful operation","content":{"application/json":{"schema":{"type":"object","properties":{"number":{"type":"integer","description":"Unique identifier of the SSID"},"name":{"type":"string","description":"The name of the SSID"},"enabled":{"type":"boolean","description":"Whether or not the SSID is enabled"},"splashPage":{"type":"string","enum":["Billing","Cisco ISE","Click-through splash page","Facebook Wi-Fi","Google Apps domain","Google OAuth","Microsoft Entra ID","None","Password-protected with Active Directory","Password-protected with LDAP","Password-protected with Meraki RADIUS","Password-protected with custom RADIUS","SMS authentication","Sponsored guest","Systems Manager Sentry"],"description":"The type of splash page for the SSID"},"ssidAdminAccessible":{"type":"boolean","description":"SSID Administrator access status"},"localAuth":{"type":"boolean","description":"Extended local auth flag for Enterprise NAC"},"authMode":{"type":"string","enum":["8021x-entra","8021x-google","8021x-localradius","8021x-meraki","8021x-nac","8021x-radius","ipsk-with-nac","ipsk-with-radius","ipsk-without-radius","open","open-enhanced","open-with-nac","open-with-radius","psk"],"description":"The association control method for the SSID"},"encryptionMode":{"type":"string","enum":["wep","wpa"],"description":"The psk encryption mode for the SSID"},"wpaEncryptionMode":{"type":"string","enum":["WPA1 and WPA2","WPA1 only","WPA2 only","WPA3 192-bit Security","WPA3 Transition Mode","WPA3 only"],"description":"The types of WPA encryption"},"radiusServers":{"type":"array","items":{"type":"object","properties":{"host":{"type":"string","description":"IP address (or FQDN) of your RADIUS server"},"port":{"type":"integer","description":"UDP port the RADIUS server listens on for Access-requests"},"openRoamingCertificateId":{"type":"integer","description":"The ID of the Openroaming Certificate attached to radius server"},"caCertificate":{"type":"string","description":"Certificate used for authorization for the RADSEC Server"}}},"description":"List of RADIUS 802.1X servers to be used for authentication"},"radiusAccountingServers":{"type":"array","items":{"type":"object","properties":{"host":{"type":"string","description":"IP address (or FQDN) to which the APs will send RADIUS accounting messages"},"port":{"type":"integer","description":"Port on the RADIUS server that is listening for accounting messages"},"openRoamingCertificateId":{"type":"integer","description":"The ID of the Openroaming Certificate attached to radius server"},"caCertificate":{"type":"string","description":"Certificate used for authorization for the RADSEC Server"}}},"description":"List of RADIUS accounting 802.1X servers to be used for authentication"},"radiusAccountingEnabled":{"type":"boolean","description":"Whether or not RADIUS accounting is enabled"},"radiusEnabled":{"type":"boolean","description":"Whether RADIUS authentication is enabled"},"radiusAttributeForGroupPolicies":{"type":"string","enum":["Airespace-ACL-Name","Aruba-User-Role","Filter-Id","Reply-Message"],"description":"RADIUS attribute used to look up group policies"},"radiusFailoverPolicy":{"type":"string","enum":["Allow access","Deny access"],"description":"Policy which determines how authentication requests should be handled in the event that all of the configured RADIUS servers are unreachable"},"radiusLoadBalancingPolicy":{"type":"string","enum":["Round robin","Strict priority order"],"description":"Policy which determines which RADIUS server will be contacted first in an authentication attempt, and the ordering of any necessary retry attempts"},"ipAssignmentMode":{"type":"string","enum":["Bridge mode","Ethernet over GRE","Layer 3 roaming","Layer 3 roaming with a concentrator","NAT mode","VPN"],"description":"The client IP assignment mode"},"adminSplashUrl":{"type":"string","description":"URL for the admin splash page"},"splashTimeout":{"type":"string","description":"Splash page timeout"},"walledGardenEnabled":{"type":"boolean","description":"Allow users to access a configurable list of IP ranges prior to sign-on"},"walledGardenRanges":{"type":"array","items":{"type":"string"},"description":"Domain names and IP address ranges available in Walled Garden mode"},"minBitrate":{"type":"integer","description":"The minimum bitrate in Mbps of this SSID in the default indoor RF profile"},"bandSelection":{"type":"string","enum":["5 GHz band only","Dual band operation","Dual band operation with Band Steering"],"description":"The client-serving radio frequencies of this SSID in the default indoor RF profile"},"perClientBandwidthLimitUp":{"type":"integer","description":"The upload bandwidth limit in Kbps. (0 represents no limit.)"},"perClientBandwidthLimitDown":{"type":"integer","description":"The download bandwidth limit in Kbps. (0 represents no limit.)"},"visible":{"type":"boolean","description":"Whether the SSID is advertised or hidden by the AP"},"availableOnAllAps":{"type":"boolean","description":"Whether all APs broadcast the SSID or if it's restricted to APs matching any availability tags"},"availabilityTags":{"type":"array","items":{"type":"string"},"description":"List of tags for this SSID. If availableOnAllAps is false, then the SSID is only broadcast by APs with tags matching any of the tags in this list"},"perSsidBandwidthLimitUp":{"type":"integer","description":"The total upload bandwidth limit in Kbps (0 represents no limit)"},"perSsidBandwidthLimitDown":{"type":"integer","description":"The total download bandwidth limit in Kbps (0 represents no limit)"},"mandatoryDhcpEnabled":{"type":"boolean","description":"Whether clients connecting to this SSID must use the IP address assigned by the DHCP server"}}},"example":{"number":0,"name":"My SSID","enabled":true,"splashPage":"Click-through splash page","ssidAdminAccessible":false,"localAuth":false,"authMode":"8021x-radius","encryptionMode":"wpa","wpaEncryptionMode":"WPA2 only","radiusServers":[{"host":"0.0.0.0","port":3000,"openRoamingCertificateId":2,"caCertificate":"-----BEGIN CERTIFICATE-----\nMIIEKjCCAxKgAwIBAgIRANb+lsED3eb4+6YKLFFYqEkwDQYJKoZIhvcNAQELBQAw\ngYcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMREwDwYDVQQHDAhT\nYW4gSm9zZTEcMBoGA1UECgwTQ2lzY28gU3lzdGVtcywgSW5jLjESMBAGA1UECwwJ\nRE5BU3BhY2VzMR4wHAYDVQQDDBVjaXNjby5vcGVucm9hbWluZy5vcmcwHhcNMjAx\nMTA1MjEzMzM1WhcNMjExMTA1MjIzMzM1WjCBpDEcMBoGCgmSJomT8ixkAQETDGRu\nYXNwYWNlczpVUzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMQ4wDAYDVQQKEwVD\naXNjbzEcMBoGA1UECxMTV0JBOldSSVggRW5kLUVudGl0eTE8MDoGA1UEAxMzNjQ3\nMDcwNDM4NDQ5NjQxMjAwMDAuMTg4MzQuaHMuY2lzY28ub3BlbnJvYW1pbmcub3Jn\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoqjP9QgRGyUO3p7SH9QK\nuTq6UYK7nAyjImgS4yQxeBkyZ5f2EUkX8m/AOcewpPxxPBhjPKRwxGeX3S50ksiA\nayFomUeslR0S0Z7RN9rzJa+CFyi9MwWIHMbLgXpB8tsSpgTAqwrzoTzOGq9fgC6u\npZhdZrBkg3FeJgD88goCi9mZDsY2YAoeGRLFJ2fR8iICqIVQy+Htq9pE22WBLpnS\nKjL3+mR9FArHNFtWlhKF2YHMUqyHHrnZnF/Ns7QNoMMF7/CK18iAKgnb+2wuGKM2\naEMddOeOTtz+i/rgjkp/RGMt011EdCsso0/cTo9qqX/bxOOCE4/Mne/ChMkQPnNU\nCwIDAQABo3IwcDAJBgNVHRMEAjAAMB8GA1UdIwQYMBaAFIG+4l5yiB01gP0sw4ML\nUSopqYcuMB0GA1UdDgQWBBSby1T9leYVOVVdOZXiHCSaDDEMiDAOBgNVHQ8BAf8E\nBAMCBaAwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAEyE\n1mjSUyY6uNp6W4l20w7SskALSJDRKkOeZxAgF3VMxlsCuEl70s9oEfntwIpyQtSa\njON/9yJHbwm/Az824bmk8Dc7AXIPhay+dftXb8j529gPuYB9AKoPNg0NctkyYCQh\na/3YQVdDWX7XgmEiXkL57M7G6+IdcPDONLArfjOcT9qHdkVVq1AIjlMSx3OQQmm/\nuoLb/G9q/97QA2/l8shG/Na8HjVqGLcl5TNZdbNhs2w9ogxr/GNzqdvym6RQ8vT/\nUR2n+uwH4n1MUxmHYYeyot5dnIV1IJ6hQ54JAncM9HvCLFk1WHz6RKshQUCuPBiJ\nwTw70BVktzJnb0VLeDg=\n-----END CERTIFICATE-----"}],"radiusAccountingServers":[{"host":"0.0.0.0","port":3000,"openRoamingCertificateId":2,"caCertificate":"-----BEGIN CERTIFICATE-----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\nwTw70BVktzJnb0VLeDg=\n-----END CERTIFICATE-----"}],"radiusAccountingEnabled":false,"radiusEnabled":true,"radiusAttributeForGroupPolicies":"Filter-Id","radiusFailoverPolicy":"Deny access","radiusLoadBalancingPolicy":"Round robin","ipAssignmentMode":"NAT mode","adminSplashUrl":"http://example.com","splashTimeout":"30 minutes","walledGardenEnabled":true,"walledGardenRanges":["example.com","1.1.1.1/32"],"minBitrate":11,"bandSelection":"5 GHz band only","perClientBandwidthLimitUp":0,"perClientBandwidthLimitDown":0,"visible":true,"availableOnAllAps":false,"availabilityTags":["tag1","tag2"],"perSsidBandwidthLimitUp":0,"perSsidBandwidthLimitDown":0,"mandatoryDhcpEnabled":false}}}}},"summary":"Update the attributes of an MR SSID","tags":["wireless","configure","ssids"],"__originalOperationId":"updateNetworkWirelessSsid","security":[{"meraki_api_key":[]},{"bearerAuth":[]}],"method":"put","path":"/networks/{networkId}/wireless/ssids/{number}","sampleCode":{"Meraki Python Library":{"code":"import meraki\n\n# Defining your API key as a variable in source code is discouraged.\n# This API key is for a read-only docs-specific environment.\n# In your own code, use an environment variable as shown under the Usage section\n# @ https://github.com/meraki/dashboard-api-python/\n\nAPI_KEY = '75dd5334bef4d2bc96f26138c163c0a3fa0b5ca6'\n\ndashboard = meraki.DashboardAPI(API_KEY)\n\nnetwork_id = 'L_646829496481105433'\nnumber = ''\n\nresponse = dashboard.wireless.updateNetworkWirelessSsid(\n network_id, number, \n name='My SSID', \n enabled=True, \n authMode='8021x-radius', \n enterpriseAdminAccess='access enabled', \n encryptionMode='wpa', \n psk='deadbeef', \n wpaEncryptionMode='WPA2 only', \n dot11w={'enabled': True, 'required': False}, \n dot11r={'enabled': True, 'adaptive': True}, \n splashPage='Click-through splash page', \n splashGuestSponsorDomains=['example.com'], \n oauth={'allowedDomains': ['example.com']}, \n localRadius={'cacheTimeout': 60, 'passwordAuthentication': {'enabled': False}, 'certificateAuthentication': {'enabled': True, 'useLdap': False, 'useOcsp': True, 'ocspResponderUrl': 'http://ocsp-server.example.com', 'clientRootCaCertificate': {'contents': '-----BEGIN CERTIFICATE-----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\\nwTw70BVktzJnb0VLeDg=\\n-----END CERTIFICATE-----'}}}, \n ldap={'servers': [{'host': '127.0.0.1', 'port': 389}], 'credentials': {'distinguishedName': 'cn=user,dc=example,dc=com', 'password': 'password'}, 'baseDistinguishedName': 'dc=example,dc=com', 'serverCaCertificate': {'contents': '-----BEGIN CERTIFICATE-----\\nMIIEKjCCAxKgAwIBAgIRANb+lsED3eb4+6YKLFFYqEkwDQYJKoZIhvcNAQELBQAw\\ngYcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMREwDwYDVQQHDAhT\\nYW4gSm9zZTEcMBoGA1UECgwTQ2lzY28gU3lzdGVtcywgSW5jLjESMBAGA1UECwwJ\\nRE5BU3BhY2VzMR4wHAYDVQQDDBVjaXNjby5vcGVucm9hbWluZy5vcmcwHhcNMjAx\\nMTA1MjEzMzM1WhcNMjExMTA1MjIzMzM1WjCBpDEcMBoGCgmSJomT8ixkAQETDGRu\\nYXNwYWNlczpVUzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMQ4wDAYDVQQKEwVD\\naXNjbzEcMBoGA1UECxMTV0JBOldSSVggRW5kLUVudGl0eTE8MDoGA1UEAxMzNjQ3\\nMDcwNDM4NDQ5NjQxMjAwMDAuMTg4MzQuaHMuY2lzY28ub3BlbnJvYW1pbmcub3Jn\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoqjP9QgRGyUO3p7SH9QK\\nuTq6UYK7nAyjImgS4yQxeBkyZ5f2EUkX8m/AOcewpPxxPBhjPKRwxGeX3S50ksiA\\nayFomUeslR0S0Z7RN9rzJa+CFyi9MwWIHMbLgXpB8tsSpgTAqwrzoTzOGq9fgC6u\\npZhdZrBkg3FeJgD88goCi9mZDsY2YAoeGRLFJ2fR8iICqIVQy+Htq9pE22WBLpnS\\nKjL3+mR9FArHNFtWlhKF2YHMUqyHHrnZnF/Ns7QNoMMF7/CK18iAKgnb+2wuGKM2\\naEMddOeOTtz+i/rgjkp/RGMt011EdCsso0/cTo9qqX/bxOOCE4/Mne/ChMkQPnNU\\nCwIDAQABo3IwcDAJBgNVHRMEAjAAMB8GA1UdIwQYMBaAFIG+4l5yiB01gP0sw4ML\\nUSopqYcuMB0GA1UdDgQWBBSby1T9leYVOVVdOZXiHCSaDDEMiDAOBgNVHQ8BAf8E\\nBAMCBaAwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAEyE\\n1mjSUyY6uNp6W4l20w7SskALSJDRKkOeZxAgF3VMxlsCuEl70s9oEfntwIpyQtSa\\njON/9yJHbwm/Az824bmk8Dc7AXIPhay+dftXb8j529gPuYB9AKoPNg0NctkyYCQh\\na/3YQVdDWX7XgmEiXkL57M7G6+IdcPDONLArfjOcT9qHdkVVq1AIjlMSx3OQQmm/\\nuoLb/G9q/97QA2/l8shG/Na8HjVqGLcl5TNZdbNhs2w9ogxr/GNzqdvym6RQ8vT/\\nUR2n+uwH4n1MUxmHYYeyot5dnIV1IJ6hQ54JAncM9HvCLFk1WHz6RKshQUCuPBiJ\\nwTw70BVktzJnb0VLeDg=\\n-----END CERTIFICATE-----'}}, \n activeDirectory={'servers': [{'host': '127.0.0.1', 'port': 3268}], 'credentials': {'logonName': 'user', 'password': 'password'}}, \n radiusServers=[{'host': '0.0.0.0', 'port': 3000, 'secret': 'secret-string', 'radsecEnabled': True, 'openRoamingCertificateId': 2, 'caCertificate': '-----BEGIN CERTIFICATE-----\\nMIIEKjCCAxKgAwIBAgIRANb+lsED3eb4+6YKLFFYqEkwDQYJKoZIhvcNAQELBQAw\\ngYcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMREwDwYDVQQHDAhT\\nYW4gSm9zZTEcMBoGA1UECgwTQ2lzY28gU3lzdGVtcywgSW5jLjESMBAGA1UECwwJ\\nRE5BU3BhY2VzMR4wHAYDVQQDDBVjaXNjby5vcGVucm9hbWluZy5vcmcwHhcNMjAx\\nMTA1MjEzMzM1WhcNMjExMTA1MjIzMzM1WjCBpDEcMBoGCgmSJomT8ixkAQETDGRu\\nYXNwYWNlczpVUzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMQ4wDAYDVQQKEwVD\\naXNjbzEcMBoGA1UECxMTV0JBOldSSVggRW5kLUVudGl0eTE8MDoGA1UEAxMzNjQ3\\nMDcwNDM4NDQ5NjQxMjAwMDAuMTg4MzQuaHMuY2lzY28ub3BlbnJvYW1pbmcub3Jn\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoqjP9QgRGyUO3p7SH9QK\\nuTq6UYK7nAyjImgS4yQxeBkyZ5f2EUkX8m/AOcewpPxxPBhjPKRwxGeX3S50ksiA\\nayFomUeslR0S0Z7RN9rzJa+CFyi9MwWIHMbLgXpB8tsSpgTAqwrzoTzOGq9fgC6u\\npZhdZrBkg3FeJgD88goCi9mZDsY2YAoeGRLFJ2fR8iICqIVQy+Htq9pE22WBLpnS\\nKjL3+mR9FArHNFtWlhKF2YHMUqyHHrnZnF/Ns7QNoMMF7/CK18iAKgnb+2wuGKM2\\naEMddOeOTtz+i/rgjkp/RGMt011EdCsso0/cTo9qqX/bxOOCE4/Mne/ChMkQPnNU\\nCwIDAQABo3IwcDAJBgNVHRMEAjAAMB8GA1UdIwQYMBaAFIG+4l5yiB01gP0sw4ML\\nUSopqYcuMB0GA1UdDgQWBBSby1T9leYVOVVdOZXiHCSaDDEMiDAOBgNVHQ8BAf8E\\nBAMCBaAwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAEyE\\n1mjSUyY6uNp6W4l20w7SskALSJDRKkOeZxAgF3VMxlsCuEl70s9oEfntwIpyQtSa\\njON/9yJHbwm/Az824bmk8Dc7AXIPhay+dftXb8j529gPuYB9AKoPNg0NctkyYCQh\\na/3YQVdDWX7XgmEiXkL57M7G6+IdcPDONLArfjOcT9qHdkVVq1AIjlMSx3OQQmm/\\nuoLb/G9q/97QA2/l8shG/Na8HjVqGLcl5TNZdbNhs2w9ogxr/GNzqdvym6RQ8vT/\\nUR2n+uwH4n1MUxmHYYeyot5dnIV1IJ6hQ54JAncM9HvCLFk1WHz6RKshQUCuPBiJ\\nwTw70BVktzJnb0VLeDg=\\n-----END CERTIFICATE-----'}], \n radiusProxyEnabled=False, \n radiusTestingEnabled=True, \n radiusCalledStationId='00-11-22-33-44-55:AP1', \n radiusAuthenticationNasId='00-11-22-33-44-55:AP1', \n radiusServerTimeout=5, \n radiusServerAttemptsLimit=5, \n radiusFallbackEnabled=True, \n radiusCoaEnabled=True, \n radiusFailoverPolicy='Deny access', \n radiusLoadBalancingPolicy='Round robin', \n radiusAccountingEnabled=True, \n radiusAccountingServers=[{'host': '0.0.0.0', 'port': 3000, 'secret': 'secret-string', 'radsecEnabled': True, 'caCertificate': '-----BEGIN CERTIFICATE-----\\nMIIEKjCCAxKgAwIBAgIRANb+lsED3eb4+6YKLFFYqEkwDQYJKoZIhvcNAQELBQAw\\ngYcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMREwDwYDVQQHDAhT\\nYW4gSm9zZTEcMBoGA1UECgwTQ2lzY28gU3lzdGVtcywgSW5jLjESMBAGA1UECwwJ\\nRE5BU3BhY2VzMR4wHAYDVQQDDBVjaXNjby5vcGVucm9hbWluZy5vcmcwHhcNMjAx\\nMTA1MjEzMzM1WhcNMjExMTA1MjIzMzM1WjCBpDEcMBoGCgmSJomT8ixkAQETDGRu\\nYXNwYWNlczpVUzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMQ4wDAYDVQQKEwVD\\naXNjbzEcMBoGA1UECxMTV0JBOldSSVggRW5kLUVudGl0eTE8MDoGA1UEAxMzNjQ3\\nMDcwNDM4NDQ5NjQxMjAwMDAuMTg4MzQuaHMuY2lzY28ub3BlbnJvYW1pbmcub3Jn\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoqjP9QgRGyUO3p7SH9QK\\nuTq6UYK7nAyjImgS4yQxeBkyZ5f2EUkX8m/AOcewpPxxPBhjPKRwxGeX3S50ksiA\\nayFomUeslR0S0Z7RN9rzJa+CFyi9MwWIHMbLgXpB8tsSpgTAqwrzoTzOGq9fgC6u\\npZhdZrBkg3FeJgD88goCi9mZDsY2YAoeGRLFJ2fR8iICqIVQy+Htq9pE22WBLpnS\\nKjL3+mR9FArHNFtWlhKF2YHMUqyHHrnZnF/Ns7QNoMMF7/CK18iAKgnb+2wuGKM2\\naEMddOeOTtz+i/rgjkp/RGMt011EdCsso0/cTo9qqX/bxOOCE4/Mne/ChMkQPnNU\\nCwIDAQABo3IwcDAJBgNVHRMEAjAAMB8GA1UdIwQYMBaAFIG+4l5yiB01gP0sw4ML\\nUSopqYcuMB0GA1UdDgQWBBSby1T9leYVOVVdOZXiHCSaDDEMiDAOBgNVHQ8BAf8E\\nBAMCBaAwEwYDVR0lBAwwCgYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAEyE\\n1mjSUyY6uNp6W4l20w7SskALSJDRKkOeZxAgF3VMxlsCuEl70s9oEfntwIpyQtSa\\njON/9yJHbwm/Az824bmk8Dc7AXIPhay+dftXb8j529gPuYB9AKoPNg0NctkyYCQh\\na/3YQVdDWX7XgmEiXkL57M7G6+IdcPDONLArfjOcT9qHdkVVq1AIjlMSx3OQQmm/\\nuoLb/G9q/97QA2/l8shG/Na8HjVqGLcl5TNZdbNhs2w9ogxr/GNzqdvym6RQ8vT/\\nUR2n+uwH4n1MUxmHYYeyot5dnIV1IJ6hQ54JAncM9HvCLFk1WHz6RKshQUCuPBiJ\\nwTw70BVktzJnb0VLeDg=\\n-----END CERTIFICATE-----'}], \n radiusAccountingInterimInterval=5, \n radiusAttributeForGroupPolicies='Filter-Id', \n ipAssignmentMode='NAT mode', \n useVlanTagging=False, \n concentratorNetworkId='N_24329156', \n secondaryConcentratorNetworkId='disabled', \n disassociateClientsOnVpnFailover=False, \n vlanId=10, \n defaultVlanId=1, \n apTagsAndVlanIds=[{'tags': ['tag1', 'tag2'], 'vlanId': 100}], \n walledGardenEnabled=True, \n walledGardenRanges=['example.com', '1.1.1.1/32'], \n gre={'concentrator': {'host': '192.168.1.1'}, 'key': 5}, \n radiusOverride=False, \n radiusGuestVlanEnabled=True, \n radiusGuestVlanId=1, \n minBitrate=5.5, \n bandSelection='5 GHz band only', \n perClientBandwidthLimitUp=0, \n perClientBandwidthLimitDown=0, \n perSsidBandwidthLimitUp=0, \n perSsidBandwidthLimitDown=0, \n lanIsolationEnabled=True, \n visible=True, \n availableOnAllAps=False, \n availabilityTags=['tag1', 'tag2'], \n mandatoryDhcpEnabled=False, \n adultContentFilteringEnabled=False, \n dnsRewrite={'enabled': True, 'dnsCustomNameservers': ['8.8.8.8', '8.8.4.4']}, \n speedBurst={'enabled': True}, \n namedVlans={'tagging': {'enabled': True, 'defaultVlanName': 'My VLAN', 'byApTags': [{'tags': ['tag1', 'tag2'], 'vlanName': 'My VLAN'}]}, 'radius': {'guestVlan': {'enabled': True, 'name': 'Guest VLAN'}}}\n)\n\nprint(response)","highlight":"python"}}}}