@pulumi/juniper-mist 0.1.3 → 0.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (80) hide show
  1. package/device/gatewayCluster.d.ts +3 -1
  2. package/device/gatewayCluster.js +3 -1
  3. package/device/gatewayCluster.js.map +1 -1
  4. package/device/getApStats.d.ts +1 -1
  5. package/device/getApStats.js.map +1 -1
  6. package/device/getGatewayStats.d.ts +1 -1
  7. package/device/getGatewayStats.js.map +1 -1
  8. package/device/getSwitchStats.d.ts +1 -1
  9. package/device/getSwitchStats.js.map +1 -1
  10. package/getConstAlarms.d.ts +1 -1
  11. package/getConstAlarms.js.map +1 -1
  12. package/getConstAppCategories.d.ts +1 -1
  13. package/getConstAppCategories.js.map +1 -1
  14. package/getConstAppSubCategories.d.ts +1 -1
  15. package/getConstAppSubCategories.js.map +1 -1
  16. package/getConstApplications.d.ts +1 -1
  17. package/getConstApplications.js.map +1 -1
  18. package/getConstCountries.d.ts +1 -1
  19. package/getConstCountries.js.map +1 -1
  20. package/getConstTrafficTypes.d.ts +1 -1
  21. package/getConstTrafficTypes.js.map +1 -1
  22. package/getConstWebhooks.d.ts +1 -1
  23. package/getConstWebhooks.js.map +1 -1
  24. package/getSites.d.ts +1 -1
  25. package/getSites.js.map +1 -1
  26. package/org/getDeviceprofilesAp.d.ts +1 -1
  27. package/org/getDeviceprofilesAp.js.map +1 -1
  28. package/org/getDeviceprofilesGateway.d.ts +1 -1
  29. package/org/getDeviceprofilesGateway.js.map +1 -1
  30. package/org/getGatewaytemplates.d.ts +1 -1
  31. package/org/getGatewaytemplates.js.map +1 -1
  32. package/org/getIdpprofiles.d.ts +1 -1
  33. package/org/getIdpprofiles.js.map +1 -1
  34. package/org/getInventory.d.ts +1 -1
  35. package/org/getInventory.js.map +1 -1
  36. package/org/getNacidpMetadata.d.ts +1 -1
  37. package/org/getNacidpMetadata.js.map +1 -1
  38. package/org/getNacrules.d.ts +1 -1
  39. package/org/getNacrules.js.map +1 -1
  40. package/org/getNactags.d.ts +1 -1
  41. package/org/getNactags.js.map +1 -1
  42. package/org/getNetworks.d.ts +1 -1
  43. package/org/getNetworks.js.map +1 -1
  44. package/org/getNetworktemplates.d.ts +1 -1
  45. package/org/getNetworktemplates.js.map +1 -1
  46. package/org/getPsks.d.ts +1 -1
  47. package/org/getPsks.js.map +1 -1
  48. package/org/getRftemplates.d.ts +1 -1
  49. package/org/getRftemplates.js.map +1 -1
  50. package/org/getServicepolicies.d.ts +1 -1
  51. package/org/getServicepolicies.js.map +1 -1
  52. package/org/getServices.d.ts +1 -1
  53. package/org/getServices.js.map +1 -1
  54. package/org/getSitegroups.d.ts +1 -1
  55. package/org/getSitegroups.js.map +1 -1
  56. package/org/getSsoMetadata.d.ts +1 -1
  57. package/org/getSsoMetadata.js.map +1 -1
  58. package/org/getVpns.d.ts +1 -1
  59. package/org/getVpns.js.map +1 -1
  60. package/org/getWebhooks.d.ts +1 -1
  61. package/org/getWebhooks.js.map +1 -1
  62. package/org/getWlantemplates.d.ts +1 -1
  63. package/org/getWlantemplates.js.map +1 -1
  64. package/org/getWxtags.d.ts +1 -1
  65. package/org/getWxtags.js.map +1 -1
  66. package/org/inventory.d.ts +9 -3
  67. package/org/inventory.js.map +1 -1
  68. package/org/wlan.d.ts +57 -42
  69. package/org/wlan.js +6 -4
  70. package/org/wlan.js.map +1 -1
  71. package/package.json +3 -3
  72. package/site/getPsks.d.ts +1 -1
  73. package/site/getPsks.js.map +1 -1
  74. package/site/getWebhooks.d.ts +1 -1
  75. package/site/getWebhooks.js.map +1 -1
  76. package/site/wlan.d.ts +57 -42
  77. package/site/wlan.js +6 -4
  78. package/site/wlan.js.map +1 -1
  79. package/types/input.d.ts +120 -126
  80. package/types/output.d.ts +171 -177
package/types/output.d.ts CHANGED
@@ -4690,7 +4690,7 @@ export declare namespace org {
4690
4690
  /**
4691
4691
  * List of additional email string to deliver the alarms via emails
4692
4692
  */
4693
- additionalEmails?: string[];
4693
+ additionalEmails: string[];
4694
4694
  /**
4695
4695
  * Whether to enable the alarm delivery via emails or not
4696
4696
  */
@@ -10176,7 +10176,7 @@ Please update your configurations.
10176
10176
  /**
10177
10177
  * SAE anti-clogging token threshold
10178
10178
  */
10179
- anticlogThreshold: number;
10179
+ anticlogThreshold?: number;
10180
10180
  /**
10181
10181
  * whether to trigger EAP reauth when the session ends
10182
10182
  */
@@ -10200,7 +10200,7 @@ Please update your configurations.
10200
10200
  /**
10201
10201
  * if `type`==`open`. enum: `disabled`, `enabled` (means transition mode), `required`
10202
10202
  */
10203
- owe: string;
10203
+ owe?: string;
10204
10204
  /**
10205
10205
  * when `type`=`psk` or `type`=`eap`, one or more of `wpa1-ccmp`, `wpa1-tkip`, `wpa2-ccmp`, `wpa2-tkip`, `wpa3`
10206
10206
  */
@@ -10220,7 +10220,7 @@ Please update your configurations.
10220
10220
  /**
10221
10221
  * enable WEP as secondary auth
10222
10222
  */
10223
- wepAsSecondaryAuth: boolean;
10223
+ wepAsSecondaryAuth?: boolean;
10224
10224
  }
10225
10225
  interface WlanAuthServer {
10226
10226
  /**
@@ -10329,7 +10329,6 @@ Please update your configurations.
10329
10329
  * enum: `cloudPsks`, `radius`
10330
10330
  */
10331
10331
  source: string;
10332
- vlanIds?: string[];
10333
10332
  }
10334
10333
  interface WlanDynamicVlan {
10335
10334
  /**
@@ -10337,7 +10336,7 @@ Please update your configurations.
10337
10336
  */
10338
10337
  defaultVlanIds: string[];
10339
10338
  /**
10340
- * whether to enable dynamic vlan
10339
+ * Requires `vlanEnabled`==`true` to be set to `true`. Whether to enable dynamic vlan
10341
10340
  */
10342
10341
  enabled: boolean;
10343
10342
  /**
@@ -10404,19 +10403,19 @@ Please update your configurations.
10404
10403
  }
10405
10404
  interface WlanPortal {
10406
10405
  /**
10407
- * whether to allow guest to connect to other Guest WLANs (with different `WLAN.ssid`) of same org without reauthentication (disable randomMac for seamless roaming)
10406
+ * Optional if `amazonEnabled`==`true`. Whether to allow guest to connect to other Guest WLANs (with different `WLAN.ssid`) of same org without reauthentication (disable randomMac for seamless roaming)
10408
10407
  */
10409
- allowWlanIdRoam: boolean;
10408
+ allowWlanIdRoam?: boolean;
10410
10409
  /**
10411
- * amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
10410
+ * Optional if `amazonEnabled`==`true`. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
10412
10411
  */
10413
10412
  amazonClientId: string;
10414
10413
  /**
10415
- * amazon OAuth2 client secret. If amazonClientId was provided, provide a correspoinding value. Else leave blank.
10414
+ * Optional if `amazonEnabled`==`true`. Amazon OAuth2 client secret. If amazonClientId was provided, provide a correspoinding value. Else leave blank.
10416
10415
  */
10417
10416
  amazonClientSecret: string;
10418
10417
  /**
10419
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10418
+ * Optional if `amazonEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10420
10419
  */
10421
10420
  amazonEmailDomains: string[];
10422
10421
  /**
@@ -10424,21 +10423,19 @@ Please update your configurations.
10424
10423
  */
10425
10424
  amazonEnabled: boolean;
10426
10425
  /**
10427
- * interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
10426
+ * Optional if `amazonEnabled`==`true`. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
10428
10427
  */
10429
- amazonExpire: number;
10428
+ amazonExpire?: number;
10430
10429
  /**
10431
- * authentication scheme. enum: `external`, `none`, `sso`
10430
+ * authentication scheme. enum: `amazon`, `azure`, `email`, `external`, `facebook`, `google`, `microsoft`, `multi`, `none`, `password`, `sponsor`, `sso`
10432
10431
  */
10433
10432
  auth: string;
10434
10433
  /**
10435
- * Required if `azureEnabled`==`true`.
10436
- * Azure active directory app client id
10434
+ * Required if `azureEnabled`==`true`. Azure active directory app client id
10437
10435
  */
10438
10436
  azureClientId: string;
10439
10437
  /**
10440
- * Required if `azureEnabled`==`true`.
10441
- * Azure active directory app client secret
10438
+ * Required if `azureEnabled`==`true`. Azure active directory app client secret
10442
10439
  */
10443
10440
  azureClientSecret: string;
10444
10441
  /**
@@ -10448,36 +10445,35 @@ Please update your configurations.
10448
10445
  /**
10449
10446
  * interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
10450
10447
  */
10451
- azureExpire: number;
10448
+ azureExpire?: number;
10452
10449
  /**
10453
- * Required if `azureEnabled`==`true`.
10454
- * Azure active directory tenant id.
10450
+ * Required if `azureEnabled`==`true`. Azure active directory tenant id.
10455
10451
  */
10456
10452
  azureTenantId: string;
10457
10453
  /**
10458
- * when `smsProvider`==`broadnet`
10454
+ * Required if `smsProvider`==`broadnet`
10459
10455
  */
10460
10456
  broadnetPassword: string;
10461
10457
  /**
10462
- * when `smsProvider`==`broadnet`
10458
+ * Required if `smsProvider`==`broadnet`
10463
10459
  */
10464
- broadnetSid: string;
10460
+ broadnetSid?: string;
10465
10461
  /**
10466
- * when `smsProvider`==`broadnet`
10462
+ * Required if `smsProvider`==`broadnet`
10467
10463
  */
10468
- broadnetUserId: string;
10464
+ broadnetUserId?: string;
10469
10465
  /**
10470
10466
  * whether to bypass the guest portal when cloud not reachable (and apply the default policies)
10471
10467
  */
10472
10468
  bypassWhenCloudDown: boolean;
10473
10469
  /**
10474
- * when `smsProvider`==`clickatell`
10470
+ * Required if `smsProvider`==`clickatell`
10475
10471
  */
10476
- clickatellApiKey: string;
10472
+ clickatellApiKey?: string;
10477
10473
  /**
10478
10474
  * whether to allow guest to roam between WLANs (with same `WLAN.ssid`, regardless of variables) of different sites of same org without reauthentication (disable randomMac for seamless roaming)
10479
10475
  */
10480
- crossSite: boolean;
10476
+ crossSite?: boolean;
10481
10477
  /**
10482
10478
  * whether email (access code verification) is enabled as a login method
10483
10479
  */
@@ -10491,21 +10487,19 @@ Please update your configurations.
10491
10487
  */
10492
10488
  expire: number;
10493
10489
  /**
10494
- * external portal URL (e.g. https://host/url) where we can append our query parameters to
10490
+ * Required if `wlanPortalAuth`==`external`. External portal URL (e.g. https://host/url) where we can append our query parameters to
10495
10491
  */
10496
10492
  externalPortalUrl: string;
10497
10493
  /**
10498
- * Required if `facebookEnabled`==`true`.
10499
- * Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
10494
+ * Required if `facebookEnabled`==`true`. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
10500
10495
  */
10501
10496
  facebookClientId: string;
10502
10497
  /**
10503
- * Required if `facebookEnabled`==`true`.
10504
- * Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
10498
+ * Required if `facebookEnabled`==`true`. Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
10505
10499
  */
10506
10500
  facebookClientSecret: string;
10507
10501
  /**
10508
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10502
+ * Optional if `facebookEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10509
10503
  */
10510
10504
  facebookEmailDomains: string[];
10511
10505
  /**
@@ -10513,9 +10507,9 @@ Please update your configurations.
10513
10507
  */
10514
10508
  facebookEnabled: boolean;
10515
10509
  /**
10516
- * interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
10510
+ * Optional if `facebookEnabled`==`true`. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
10517
10511
  */
10518
- facebookExpire: number;
10512
+ facebookExpire?: number;
10519
10513
  /**
10520
10514
  * whether to forward the user to another URL after authorized
10521
10515
  */
@@ -10529,11 +10523,11 @@ Please update your configurations.
10529
10523
  */
10530
10524
  googleClientId: string;
10531
10525
  /**
10532
- * Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
10526
+ * Optional if `googleEnabled`==`true`. Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
10533
10527
  */
10534
10528
  googleClientSecret: string;
10535
10529
  /**
10536
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10530
+ * Optional if `googleEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10537
10531
  */
10538
10532
  googleEmailDomains: string[];
10539
10533
  /**
@@ -10541,27 +10535,27 @@ Please update your configurations.
10541
10535
  */
10542
10536
  googleEnabled: boolean;
10543
10537
  /**
10544
- * interval for which guest remains authorized using google auth (in minutes), if not provided, uses expire`
10538
+ * Optional if `googleEnabled`==`true`. Interval for which guest remains authorized using google auth (in minutes), if not provided, uses expire`
10545
10539
  */
10546
- googleExpire: number;
10540
+ googleExpire?: number;
10547
10541
  /**
10548
- * when `smsProvider`==`gupshup`
10542
+ * Required if `smsProvider`==`gupshup`
10549
10543
  */
10550
- gupshupPassword: string;
10544
+ gupshupPassword?: string;
10551
10545
  /**
10552
- * when `smsProvider`==`gupshup`
10546
+ * Required if `smsProvider`==`gupshup`
10553
10547
  */
10554
- gupshupUserid: string;
10548
+ gupshupUserid?: string;
10555
10549
  /**
10556
- * microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
10550
+ * Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
10557
10551
  */
10558
10552
  microsoftClientId: string;
10559
10553
  /**
10560
- * microsoft 365 OAuth2 client secret. If microsoftClientId was provided, provide a correspoinding value. Else leave blank.
10554
+ * Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client secret. If microsoftClientId was provided, provide a correspoinding value. Else leave blank.
10561
10555
  */
10562
10556
  microsoftClientSecret: string;
10563
10557
  /**
10564
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10558
+ * Optional if `microsoftEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
10565
10559
  */
10566
10560
  microsoftEmailDomains: string[];
10567
10561
  /**
@@ -10569,19 +10563,19 @@ Please update your configurations.
10569
10563
  */
10570
10564
  microsoftEnabled: boolean;
10571
10565
  /**
10572
- * interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
10566
+ * Optional if `microsoftEnabled`==`true`. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
10573
10567
  */
10574
- microsoftExpire: number;
10568
+ microsoftExpire?: number;
10575
10569
  /**
10576
- * whether password is enabled
10570
+ * Whether password is enabled
10577
10571
  */
10578
10572
  passphraseEnabled: boolean;
10579
10573
  /**
10580
- * interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses `expire`
10574
+ * Optional if `passphraseEnabled`==`true`. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses `expire`
10581
10575
  */
10582
- passphraseExpire: number;
10576
+ passphraseExpire?: number;
10583
10577
  /**
10584
- * passphrase
10578
+ * Required if `passphraseEnabled`==`true`.
10585
10579
  */
10586
10580
  password: string;
10587
10581
  /**
@@ -10594,34 +10588,37 @@ Please update your configurations.
10594
10588
  predefinedSponsorsHideEmail: boolean;
10595
10589
  privacy: boolean;
10596
10590
  /**
10597
- * when `smsProvider`==`puzzel`
10591
+ * Required if `smsProvider`==`puzzel`
10598
10592
  */
10599
- puzzelPassword: string;
10593
+ puzzelPassword?: string;
10600
10594
  /**
10601
- * when `smsProvider`==`puzzel`
10595
+ * Required if `smsProvider`==`puzzel`
10602
10596
  */
10603
- puzzelServiceId: string;
10597
+ puzzelServiceId?: string;
10604
10598
  /**
10605
- * when `smsProvider`==`puzzel`
10599
+ * Required if `smsProvider`==`puzzel`
10606
10600
  */
10607
- puzzelUsername: string;
10601
+ puzzelUsername?: string;
10608
10602
  /**
10609
10603
  * whether sms is enabled as a login method
10610
10604
  */
10611
10605
  smsEnabled: boolean;
10612
10606
  /**
10613
- * interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
10607
+ * Optional if `smsEnabled`==`true`. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
10608
+ */
10609
+ smsExpire?: number;
10610
+ /**
10611
+ * Optional if `smsEnabled`==`true`. SMS Message format
10614
10612
  */
10615
- smsExpire: number;
10616
10613
  smsMessageFormat: string;
10617
10614
  /**
10618
- * enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
10615
+ * Optioanl if `smsEnabled`==`true`. enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
10619
10616
  */
10620
10617
  smsProvider: string;
10621
10618
  /**
10622
- * whether to automatically approve guest and allow sponsor to revoke guest access, needs predefinedSponsorsEnabled enabled and sponsorNotifyAll disabled
10619
+ * Optional if `sponsorEnabled`==`true`. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefinedSponsorsEnabled enabled and sponsorNotifyAll disabled
10623
10620
  */
10624
- sponsorAutoApprove: boolean;
10621
+ sponsorAutoApprove?: boolean;
10625
10622
  /**
10626
10623
  * list of domain allowed for sponsor email. Required if `sponsorEnabled` is `true` and `sponsors` is empty.
10627
10624
  */
@@ -10631,19 +10628,19 @@ Please update your configurations.
10631
10628
  */
10632
10629
  sponsorEnabled: boolean;
10633
10630
  /**
10634
- * interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
10631
+ * Optional if `sponsorEnabled`==`true`. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
10635
10632
  */
10636
- sponsorExpire: number;
10633
+ sponsorExpire?: number;
10637
10634
  /**
10638
- * how long to remain valid sponsored guest request approve/deny link received in email, in minutes.
10635
+ * Optional if `sponsorEnabled`==`true`. How long to remain valid sponsored guest request approve/deny link received in email, in minutes.
10639
10636
  */
10640
10637
  sponsorLinkValidityDuration: string;
10641
10638
  /**
10642
- * whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
10639
+ * Optional if `sponsorEnabled`==`true`. whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
10643
10640
  */
10644
10641
  sponsorNotifyAll: boolean;
10645
10642
  /**
10646
- * if enabled, guest will get email about sponsor's action (approve/deny)
10643
+ * Optional if `sponsorEnabled`==`true`. If enabled, guest will get email about sponsor's action (approve/deny)
10647
10644
  */
10648
10645
  sponsorStatusNotify: boolean;
10649
10646
  /**
@@ -10656,53 +10653,53 @@ Please update your configurations.
10656
10653
  [key: string]: string;
10657
10654
  };
10658
10655
  /**
10659
- * if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
10656
+ * Optionl if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
10660
10657
  */
10661
10658
  ssoDefaultRole: string;
10662
10659
  /**
10663
- * if `wlanPortalAuth`==`sso`
10660
+ * Optionl if `wlanPortalAuth`==`sso`
10664
10661
  */
10665
10662
  ssoForcedRole: string;
10666
10663
  /**
10667
- * if `wlanPortalAuth`==`sso`, IDP Cert (used to verify the signed response)
10664
+ * Required if `wlanPortalAuth`==`sso`. IDP Cert (used to verify the signed response)
10668
10665
  */
10669
10666
  ssoIdpCert: string;
10670
10667
  /**
10671
- * if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
10668
+ * Optioanl if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
10672
10669
  */
10673
10670
  ssoIdpSignAlgo: string;
10674
10671
  /**
10675
- * if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
10672
+ * Required if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
10676
10673
  */
10677
10674
  ssoIdpSsoUrl: string;
10678
10675
  /**
10679
- * if `wlanPortalAuth`==`sso`, IDP issuer URL
10676
+ * Required if `wlanPortalAuth`==`sso`, IDP issuer URL
10680
10677
  */
10681
10678
  ssoIssuer: string;
10682
10679
  /**
10683
- * if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
10680
+ * Optional if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
10684
10681
  */
10685
10682
  ssoNameidFormat: string;
10686
10683
  /**
10687
- * when `smsProvider`==`telstra`, Client ID provided by Telstra
10684
+ * Required if `smsProvider`==`telstra`, Client ID provided by Telstra
10688
10685
  */
10689
- telstraClientId: string;
10686
+ telstraClientId?: string;
10690
10687
  /**
10691
- * when `smsProvider`==`telstra`, Client secret provided by Telstra
10688
+ * Required if `smsProvider`==`telstra`, Client secret provided by Telstra
10692
10689
  */
10693
- telstraClientSecret: string;
10690
+ telstraClientSecret?: string;
10694
10691
  /**
10695
- * when `smsProvider`==`twilio`, Auth token account with twilio account
10692
+ * Required if `smsProvider`==`twilio`, Auth token account with twilio account
10696
10693
  */
10697
- twilioAuthToken: string;
10694
+ twilioAuthToken?: string;
10698
10695
  /**
10699
- * when `smsProvider`==`twilio`, Twilio phone number associated with the account. See example for accepted format.
10696
+ * Required if `smsProvider`==`twilio`, Twilio phone number associated with the account. See example for accepted format.
10700
10697
  */
10701
- twilioPhoneNumber: string;
10698
+ twilioPhoneNumber?: string;
10702
10699
  /**
10703
- * when `smsProvider`==`twilio`, Account SID provided by Twilio
10700
+ * Required if `smsProvider`==`twilio`, Account SID provided by Twilio
10704
10701
  */
10705
- twilioSid: string;
10702
+ twilioSid?: string;
10706
10703
  }
10707
10704
  interface WlanPortalTemplatePortalTemplate {
10708
10705
  accessCodeAlternateEmail: string;
@@ -11425,7 +11422,7 @@ Please update your configurations.
11425
11422
  /**
11426
11423
  * Minimum RSSI for client to connect, 0 means not enforcing
11427
11424
  */
11428
- minRssi?: number;
11425
+ minRssi: number;
11429
11426
  /**
11430
11427
  * Data Rates template to apply. enum:
11431
11428
  * * `no-legacy`: no 11b
@@ -11434,7 +11431,7 @@ Please update your configurations.
11434
11431
  * * `high-density`: no 11b, no low rates
11435
11432
  * * `custom`: user defined
11436
11433
  */
11437
- template?: string;
11434
+ template: string;
11438
11435
  /**
11439
11436
  * if `template`==`custom`. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
11440
11437
  */
@@ -13435,7 +13432,7 @@ Please update your configurations.
13435
13432
  /**
13436
13433
  * SAE anti-clogging token threshold
13437
13434
  */
13438
- anticlogThreshold: number;
13435
+ anticlogThreshold?: number;
13439
13436
  /**
13440
13437
  * whether to trigger EAP reauth when the session ends
13441
13438
  */
@@ -13459,7 +13456,7 @@ Please update your configurations.
13459
13456
  /**
13460
13457
  * if `type`==`open`. enum: `disabled`, `enabled` (means transition mode), `required`
13461
13458
  */
13462
- owe: string;
13459
+ owe?: string;
13463
13460
  /**
13464
13461
  * when `type`=`psk` or `type`=`eap`, one or more of `wpa1-ccmp`, `wpa1-tkip`, `wpa2-ccmp`, `wpa2-tkip`, `wpa3`
13465
13462
  */
@@ -13479,7 +13476,7 @@ Please update your configurations.
13479
13476
  /**
13480
13477
  * enable WEP as secondary auth
13481
13478
  */
13482
- wepAsSecondaryAuth: boolean;
13479
+ wepAsSecondaryAuth?: boolean;
13483
13480
  }
13484
13481
  interface WlanAuthServer {
13485
13482
  /**
@@ -13588,7 +13585,6 @@ Please update your configurations.
13588
13585
  * enum: `cloudPsks`, `radius`
13589
13586
  */
13590
13587
  source: string;
13591
- vlanIds?: string[];
13592
13588
  }
13593
13589
  interface WlanDynamicVlan {
13594
13590
  /**
@@ -13596,7 +13592,7 @@ Please update your configurations.
13596
13592
  */
13597
13593
  defaultVlanIds: string[];
13598
13594
  /**
13599
- * whether to enable dynamic vlan
13595
+ * Requires `vlanEnabled`==`true` to be set to `true`. Whether to enable dynamic vlan
13600
13596
  */
13601
13597
  enabled: boolean;
13602
13598
  /**
@@ -13663,19 +13659,19 @@ Please update your configurations.
13663
13659
  }
13664
13660
  interface WlanPortal {
13665
13661
  /**
13666
- * whether to allow guest to connect to other Guest WLANs (with different `WLAN.ssid`) of same org without reauthentication (disable randomMac for seamless roaming)
13662
+ * Optional if `amazonEnabled`==`true`. Whether to allow guest to connect to other Guest WLANs (with different `WLAN.ssid`) of same org without reauthentication (disable randomMac for seamless roaming)
13667
13663
  */
13668
- allowWlanIdRoam: boolean;
13664
+ allowWlanIdRoam?: boolean;
13669
13665
  /**
13670
- * amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
13666
+ * Optional if `amazonEnabled`==`true`. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
13671
13667
  */
13672
13668
  amazonClientId: string;
13673
13669
  /**
13674
- * amazon OAuth2 client secret. If amazonClientId was provided, provide a correspoinding value. Else leave blank.
13670
+ * Optional if `amazonEnabled`==`true`. Amazon OAuth2 client secret. If amazonClientId was provided, provide a correspoinding value. Else leave blank.
13675
13671
  */
13676
13672
  amazonClientSecret: string;
13677
13673
  /**
13678
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13674
+ * Optional if `amazonEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13679
13675
  */
13680
13676
  amazonEmailDomains: string[];
13681
13677
  /**
@@ -13683,21 +13679,19 @@ Please update your configurations.
13683
13679
  */
13684
13680
  amazonEnabled: boolean;
13685
13681
  /**
13686
- * interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
13682
+ * Optional if `amazonEnabled`==`true`. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
13687
13683
  */
13688
- amazonExpire: number;
13684
+ amazonExpire?: number;
13689
13685
  /**
13690
- * authentication scheme. enum: `external`, `none`, `sso`
13686
+ * authentication scheme. enum: `amazon`, `azure`, `email`, `external`, `facebook`, `google`, `microsoft`, `multi`, `none`, `password`, `sponsor`, `sso`
13691
13687
  */
13692
13688
  auth: string;
13693
13689
  /**
13694
- * Required if `azureEnabled`==`true`.
13695
- * Azure active directory app client id
13690
+ * Required if `azureEnabled`==`true`. Azure active directory app client id
13696
13691
  */
13697
13692
  azureClientId: string;
13698
13693
  /**
13699
- * Required if `azureEnabled`==`true`.
13700
- * Azure active directory app client secret
13694
+ * Required if `azureEnabled`==`true`. Azure active directory app client secret
13701
13695
  */
13702
13696
  azureClientSecret: string;
13703
13697
  /**
@@ -13707,36 +13701,35 @@ Please update your configurations.
13707
13701
  /**
13708
13702
  * interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
13709
13703
  */
13710
- azureExpire: number;
13704
+ azureExpire?: number;
13711
13705
  /**
13712
- * Required if `azureEnabled`==`true`.
13713
- * Azure active directory tenant id.
13706
+ * Required if `azureEnabled`==`true`. Azure active directory tenant id.
13714
13707
  */
13715
13708
  azureTenantId: string;
13716
13709
  /**
13717
- * when `smsProvider`==`broadnet`
13710
+ * Required if `smsProvider`==`broadnet`
13718
13711
  */
13719
13712
  broadnetPassword: string;
13720
13713
  /**
13721
- * when `smsProvider`==`broadnet`
13714
+ * Required if `smsProvider`==`broadnet`
13722
13715
  */
13723
- broadnetSid: string;
13716
+ broadnetSid?: string;
13724
13717
  /**
13725
- * when `smsProvider`==`broadnet`
13718
+ * Required if `smsProvider`==`broadnet`
13726
13719
  */
13727
- broadnetUserId: string;
13720
+ broadnetUserId?: string;
13728
13721
  /**
13729
13722
  * whether to bypass the guest portal when cloud not reachable (and apply the default policies)
13730
13723
  */
13731
13724
  bypassWhenCloudDown: boolean;
13732
13725
  /**
13733
- * when `smsProvider`==`clickatell`
13726
+ * Required if `smsProvider`==`clickatell`
13734
13727
  */
13735
- clickatellApiKey: string;
13728
+ clickatellApiKey?: string;
13736
13729
  /**
13737
13730
  * whether to allow guest to roam between WLANs (with same `WLAN.ssid`, regardless of variables) of different sites of same org without reauthentication (disable randomMac for seamless roaming)
13738
13731
  */
13739
- crossSite: boolean;
13732
+ crossSite?: boolean;
13740
13733
  /**
13741
13734
  * whether email (access code verification) is enabled as a login method
13742
13735
  */
@@ -13750,21 +13743,19 @@ Please update your configurations.
13750
13743
  */
13751
13744
  expire: number;
13752
13745
  /**
13753
- * external portal URL (e.g. https://host/url) where we can append our query parameters to
13746
+ * Required if `wlanPortalAuth`==`external`. External portal URL (e.g. https://host/url) where we can append our query parameters to
13754
13747
  */
13755
13748
  externalPortalUrl: string;
13756
13749
  /**
13757
- * Required if `facebookEnabled`==`true`.
13758
- * Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
13750
+ * Required if `facebookEnabled`==`true`. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
13759
13751
  */
13760
13752
  facebookClientId: string;
13761
13753
  /**
13762
- * Required if `facebookEnabled`==`true`.
13763
- * Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
13754
+ * Required if `facebookEnabled`==`true`. Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
13764
13755
  */
13765
13756
  facebookClientSecret: string;
13766
13757
  /**
13767
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13758
+ * Optional if `facebookEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13768
13759
  */
13769
13760
  facebookEmailDomains: string[];
13770
13761
  /**
@@ -13772,9 +13763,9 @@ Please update your configurations.
13772
13763
  */
13773
13764
  facebookEnabled: boolean;
13774
13765
  /**
13775
- * interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
13766
+ * Optional if `facebookEnabled`==`true`. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
13776
13767
  */
13777
- facebookExpire: number;
13768
+ facebookExpire?: number;
13778
13769
  /**
13779
13770
  * whether to forward the user to another URL after authorized
13780
13771
  */
@@ -13788,11 +13779,11 @@ Please update your configurations.
13788
13779
  */
13789
13780
  googleClientId: string;
13790
13781
  /**
13791
- * Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
13782
+ * Optional if `googleEnabled`==`true`. Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
13792
13783
  */
13793
13784
  googleClientSecret: string;
13794
13785
  /**
13795
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13786
+ * Optional if `googleEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13796
13787
  */
13797
13788
  googleEmailDomains: string[];
13798
13789
  /**
@@ -13800,27 +13791,27 @@ Please update your configurations.
13800
13791
  */
13801
13792
  googleEnabled: boolean;
13802
13793
  /**
13803
- * interval for which guest remains authorized using google auth (in minutes), if not provided, uses expire`
13794
+ * Optional if `googleEnabled`==`true`. Interval for which guest remains authorized using google auth (in minutes), if not provided, uses expire`
13804
13795
  */
13805
- googleExpire: number;
13796
+ googleExpire?: number;
13806
13797
  /**
13807
- * when `smsProvider`==`gupshup`
13798
+ * Required if `smsProvider`==`gupshup`
13808
13799
  */
13809
- gupshupPassword: string;
13800
+ gupshupPassword?: string;
13810
13801
  /**
13811
- * when `smsProvider`==`gupshup`
13802
+ * Required if `smsProvider`==`gupshup`
13812
13803
  */
13813
- gupshupUserid: string;
13804
+ gupshupUserid?: string;
13814
13805
  /**
13815
- * microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
13806
+ * Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
13816
13807
  */
13817
13808
  microsoftClientId: string;
13818
13809
  /**
13819
- * microsoft 365 OAuth2 client secret. If microsoftClientId was provided, provide a correspoinding value. Else leave blank.
13810
+ * Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client secret. If microsoftClientId was provided, provide a correspoinding value. Else leave blank.
13820
13811
  */
13821
13812
  microsoftClientSecret: string;
13822
13813
  /**
13823
- * Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13814
+ * Optional if `microsoftEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
13824
13815
  */
13825
13816
  microsoftEmailDomains: string[];
13826
13817
  /**
@@ -13828,19 +13819,19 @@ Please update your configurations.
13828
13819
  */
13829
13820
  microsoftEnabled: boolean;
13830
13821
  /**
13831
- * interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
13822
+ * Optional if `microsoftEnabled`==`true`. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
13832
13823
  */
13833
- microsoftExpire: number;
13824
+ microsoftExpire?: number;
13834
13825
  /**
13835
- * whether password is enabled
13826
+ * Whether password is enabled
13836
13827
  */
13837
13828
  passphraseEnabled: boolean;
13838
13829
  /**
13839
- * interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses `expire`
13830
+ * Optional if `passphraseEnabled`==`true`. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses `expire`
13840
13831
  */
13841
- passphraseExpire: number;
13832
+ passphraseExpire?: number;
13842
13833
  /**
13843
- * passphrase
13834
+ * Required if `passphraseEnabled`==`true`.
13844
13835
  */
13845
13836
  password: string;
13846
13837
  /**
@@ -13853,34 +13844,37 @@ Please update your configurations.
13853
13844
  predefinedSponsorsHideEmail: boolean;
13854
13845
  privacy: boolean;
13855
13846
  /**
13856
- * when `smsProvider`==`puzzel`
13847
+ * Required if `smsProvider`==`puzzel`
13857
13848
  */
13858
- puzzelPassword: string;
13849
+ puzzelPassword?: string;
13859
13850
  /**
13860
- * when `smsProvider`==`puzzel`
13851
+ * Required if `smsProvider`==`puzzel`
13861
13852
  */
13862
- puzzelServiceId: string;
13853
+ puzzelServiceId?: string;
13863
13854
  /**
13864
- * when `smsProvider`==`puzzel`
13855
+ * Required if `smsProvider`==`puzzel`
13865
13856
  */
13866
- puzzelUsername: string;
13857
+ puzzelUsername?: string;
13867
13858
  /**
13868
13859
  * whether sms is enabled as a login method
13869
13860
  */
13870
13861
  smsEnabled: boolean;
13871
13862
  /**
13872
- * interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
13863
+ * Optional if `smsEnabled`==`true`. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
13864
+ */
13865
+ smsExpire?: number;
13866
+ /**
13867
+ * Optional if `smsEnabled`==`true`. SMS Message format
13873
13868
  */
13874
- smsExpire: number;
13875
13869
  smsMessageFormat: string;
13876
13870
  /**
13877
- * enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
13871
+ * Optioanl if `smsEnabled`==`true`. enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
13878
13872
  */
13879
13873
  smsProvider: string;
13880
13874
  /**
13881
- * whether to automatically approve guest and allow sponsor to revoke guest access, needs predefinedSponsorsEnabled enabled and sponsorNotifyAll disabled
13875
+ * Optional if `sponsorEnabled`==`true`. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefinedSponsorsEnabled enabled and sponsorNotifyAll disabled
13882
13876
  */
13883
- sponsorAutoApprove: boolean;
13877
+ sponsorAutoApprove?: boolean;
13884
13878
  /**
13885
13879
  * list of domain allowed for sponsor email. Required if `sponsorEnabled` is `true` and `sponsors` is empty.
13886
13880
  */
@@ -13890,19 +13884,19 @@ Please update your configurations.
13890
13884
  */
13891
13885
  sponsorEnabled: boolean;
13892
13886
  /**
13893
- * interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
13887
+ * Optional if `sponsorEnabled`==`true`. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
13894
13888
  */
13895
- sponsorExpire: number;
13889
+ sponsorExpire?: number;
13896
13890
  /**
13897
- * how long to remain valid sponsored guest request approve/deny link received in email, in minutes.
13891
+ * Optional if `sponsorEnabled`==`true`. How long to remain valid sponsored guest request approve/deny link received in email, in minutes.
13898
13892
  */
13899
13893
  sponsorLinkValidityDuration: string;
13900
13894
  /**
13901
- * whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
13895
+ * Optional if `sponsorEnabled`==`true`. whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
13902
13896
  */
13903
13897
  sponsorNotifyAll: boolean;
13904
13898
  /**
13905
- * if enabled, guest will get email about sponsor's action (approve/deny)
13899
+ * Optional if `sponsorEnabled`==`true`. If enabled, guest will get email about sponsor's action (approve/deny)
13906
13900
  */
13907
13901
  sponsorStatusNotify: boolean;
13908
13902
  /**
@@ -13915,53 +13909,53 @@ Please update your configurations.
13915
13909
  [key: string]: string;
13916
13910
  };
13917
13911
  /**
13918
- * if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
13912
+ * Optionl if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
13919
13913
  */
13920
13914
  ssoDefaultRole: string;
13921
13915
  /**
13922
- * if `wlanPortalAuth`==`sso`
13916
+ * Optionl if `wlanPortalAuth`==`sso`
13923
13917
  */
13924
13918
  ssoForcedRole: string;
13925
13919
  /**
13926
- * if `wlanPortalAuth`==`sso`, IDP Cert (used to verify the signed response)
13920
+ * Required if `wlanPortalAuth`==`sso`. IDP Cert (used to verify the signed response)
13927
13921
  */
13928
13922
  ssoIdpCert: string;
13929
13923
  /**
13930
- * if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
13924
+ * Optioanl if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
13931
13925
  */
13932
13926
  ssoIdpSignAlgo: string;
13933
13927
  /**
13934
- * if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
13928
+ * Required if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
13935
13929
  */
13936
13930
  ssoIdpSsoUrl: string;
13937
13931
  /**
13938
- * if `wlanPortalAuth`==`sso`, IDP issuer URL
13932
+ * Required if `wlanPortalAuth`==`sso`, IDP issuer URL
13939
13933
  */
13940
13934
  ssoIssuer: string;
13941
13935
  /**
13942
- * if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
13936
+ * Optional if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
13943
13937
  */
13944
13938
  ssoNameidFormat: string;
13945
13939
  /**
13946
- * when `smsProvider`==`telstra`, Client ID provided by Telstra
13940
+ * Required if `smsProvider`==`telstra`, Client ID provided by Telstra
13947
13941
  */
13948
- telstraClientId: string;
13942
+ telstraClientId?: string;
13949
13943
  /**
13950
- * when `smsProvider`==`telstra`, Client secret provided by Telstra
13944
+ * Required if `smsProvider`==`telstra`, Client secret provided by Telstra
13951
13945
  */
13952
- telstraClientSecret: string;
13946
+ telstraClientSecret?: string;
13953
13947
  /**
13954
- * when `smsProvider`==`twilio`, Auth token account with twilio account
13948
+ * Required if `smsProvider`==`twilio`, Auth token account with twilio account
13955
13949
  */
13956
- twilioAuthToken: string;
13950
+ twilioAuthToken?: string;
13957
13951
  /**
13958
- * when `smsProvider`==`twilio`, Twilio phone number associated with the account. See example for accepted format.
13952
+ * Required if `smsProvider`==`twilio`, Twilio phone number associated with the account. See example for accepted format.
13959
13953
  */
13960
- twilioPhoneNumber: string;
13954
+ twilioPhoneNumber?: string;
13961
13955
  /**
13962
- * when `smsProvider`==`twilio`, Account SID provided by Twilio
13956
+ * Required if `smsProvider`==`twilio`, Account SID provided by Twilio
13963
13957
  */
13964
- twilioSid: string;
13958
+ twilioSid?: string;
13965
13959
  }
13966
13960
  interface WlanPortalTemplatePortalTemplate {
13967
13961
  accessCodeAlternateEmail: string;
@@ -14684,7 +14678,7 @@ Please update your configurations.
14684
14678
  /**
14685
14679
  * Minimum RSSI for client to connect, 0 means not enforcing
14686
14680
  */
14687
- minRssi?: number;
14681
+ minRssi: number;
14688
14682
  /**
14689
14683
  * Data Rates template to apply. enum:
14690
14684
  * * `no-legacy`: no 11b
@@ -14693,7 +14687,7 @@ Please update your configurations.
14693
14687
  * * `high-density`: no 11b, no low rates
14694
14688
  * * `custom`: user defined
14695
14689
  */
14696
- template?: string;
14690
+ template: string;
14697
14691
  /**
14698
14692
  * if `template`==`custom`. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
14699
14693
  */