cisco.dnac.wireless_settings_ap_profiles_id module – Resource module for Wireless Settings Ap Profiles Id
Note
This module is part of the cisco.dnac collection (version 6.27.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install cisco.dnac
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.dnac.wireless_settings_ap_profiles_id
.
New in cisco.dnac 6.17.0
Synopsis
This module represents an alias of the module wireless_settings_ap_profiles_id_v1
Note
This module has a corresponding action plugin.
Requirements
The below requirements are needed on the host that executes this module.
dnacentersdk >= 2.4.9
python >= 3.5
Parameters
Parameter |
Comments |
---|---|
Name of the existing AP power profile. |
|
Name of the Access Point profile. Max length is 32 characters. |
|
Indicates if AWIPS is enabled on the AP. Choices:
|
|
Indicates if AWIPS forensic is enabled on the AP. Forensic Capture is supported from IOS-XE version 17.4 and above. Forensic Capture can be activated only if aWIPS is enabled. Choices:
|
|
Wireless Settings Ap Profiles Id’s calendarPowerProfiles. |
|
Wireless Settings Ap Profiles Id’s duration. |
|
Start and End date of the duration setting, applicable for MONTHLY schedulers. |
|
Applies every week on the selected days. |
|
End time of the duration setting. |
|
Start time of the duration setting. |
|
Name of the existing AP power profile to be mapped to the calendar power profile. API-/intent/api/v1/wirelessSettings/powerProfiles. |
|
Type of the scheduler. |
|
Number of clients. Value should be between 0-1200. |
|
Country Code. |
|
Description of the AP profile. Max length is 241 characters. |
|
Flag for Cisco DNA Center SDK to enable debugging. Choices:
|
|
The Cisco DNA Center hostname. |
|
The Cisco DNA Center password to authenticate. |
|
The Cisco DNA Center port. Default: |
|
The Cisco DNA Center username to authenticate. Default: |
|
Flag to enable or disable SSL certificate verification. Choices:
|
|
Informs the SDK which version of Cisco DNA Center to use. Default: |
|
Id path parameter. AP Profile ID. |
|
Wireless Settings Ap Profiles Id’s managementSetting. |
|
Authentication type used in the AP profile. These setting are applicable during PnP claim and for day-N authentication of AP. Changing these settings will be service impacting for the PnP onboarded APs and will need a factory-reset for those APs. |
|
Indicates if CDP is enabled on the AP. Enable CDP in order to make Cisco Access Points known to its neighboring devices and vice-versa. Choices:
|
|
Password for 802.1X authentication. AP dot1x password length should not exceed 120. |
|
Username for 802.1X authentication. Dot1xUsername must have a minimum of 1 character and a maximum of 32 characters. |
|
Enable password for managing the AP. Length must be 8-120 characters. |
|
Management password for the AP. Length must be 8-120 characters. |
|
Management username must have a minimum of 1 character and a maximum of 32 characters. |
|
Indicates if SSH is enabled on the AP. Enable SSH add credentials for device management. Choices:
|
|
Indicates if Telnet is enabled on the AP. Enable Telnet to add credentials for device management. Choices:
|
|
This indicates whether mesh networking is enabled on the AP. For IOS-XE devices, when mesh networking is enabled, a custom mesh profile with the configured parameters will be created and mapped to the AP join profile on the device. When mesh networking is disabled, any existing custom mesh profile will be deleted from the device, and the AP join profile will be mapped to the default mesh profile on the device. Choices:
|
|
Wireless Settings Ap Profiles Id’s meshSetting. |
|
Indicates if backhaul client access is enabled on the AP. Choices:
|
|
Name of the bridge group for mesh settings. If not configured, ‘Default’ Bridge group name will be used in mesh profile. |
|
2.4GHz backhaul data rates. |
|
5GHz backhaul data rates. |
|
Range of the mesh network. Value should be between 150-132000. |
|
Type of downlink backhaul used. Available values 5 GHz, 2.4 GHz. |
|
Indicates if PMF denial is active on the AP. PMF Denial is supported from IOS-XE version 17.12 and above. Choices:
|
|
Indicates if remote worker mode is enabled on the AP. Remote teleworker enabled profile cannot support security features like aWIPS,Forensic Capture Enablement, Rogue Detection and Rogue Containment. Choices:
|
|
Wireless Settings Ap Profiles Id’s rogueDetectionSetting. |
|
Indicates if rogue detection is enabled on the AP. Detect Access Points that have been installed on a secure network without explicit authorization from a system administrator and configure rogue general configuration parameters. Choices:
|
|
Minimum RSSI for rogue detection. Value should be in range -128 decibel milliwatts and -70 decibel milliwatts. |
|
Report interval for rogue detection. Value should be in range 10 and 300. |
|
Transient interval for rogue detection. Value should be 0 or from 120 to 1800. |
|
In the Time Zone area, choose one of the following options. Not Configured - APs operate in the UTC time zone. Controller - APs operate in the Cisco Wireless Controller time zone. Delta from Controller - APs operate in the offset time from the wireless controller time zone. |
|
Enter the hour value (HH). The valid range is from -12 through 14. |
|
Enter the minute value (MM). The valid range is from 0 through 59. |
|
Flag for Cisco DNA Center SDK to enable the validation of request bodies against a JSON schema. Choices:
|
Notes
Note
SDK Method used are wireless.Wireless.delete_ap_profile_by_id_v1, wireless.Wireless.update_ap_profile_by_id_v1,
Paths used are delete /dna/intent/api/v1/wirelessSettings/apProfiles/{id}, put /dna/intent/api/v1/wirelessSettings/apProfiles/{id},
It should be noted that this module is an alias of wireless_settings_ap_profiles_id_v1
Does not support
check_mode
The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco DNAC SDK
The parameters starting with dnac_ are used by the Cisco DNAC Python SDK to establish the connection
See Also
See also
- Cisco DNA Center documentation for Wireless DeleteAPProfileByIDV1
Complete reference of the DeleteAPProfileByIDV1 API.
- Cisco DNA Center documentation for Wireless UpdateAPProfileByIDV1
Complete reference of the UpdateAPProfileByIDV1 API.
Examples
- name: Delete by id
cisco.dnac.wireless_settings_ap_profiles_id:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
state: absent
id: string
- name: Update by id
cisco.dnac.wireless_settings_ap_profiles_id:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
state: present
apPowerProfileName: string
apProfileName: string
awipsEnabled: true
awipsForensicEnabled: true
calendarPowerProfiles:
duration:
schedulerDate: string
schedulerDay: string
schedulerEndTime: string
schedulerStartTime: string
powerProfileName: string
schedulerType: string
clientLimit: 0
countryCode: string
description: string
id: string
managementSetting:
authType: string
cdpState: true
dot1xPassword: string
dot1xUsername: string
managementEnablePassword: string
managementPassword: string
managementUserName: string
sshEnabled: true
telnetEnabled: true
meshEnabled: true
meshSetting:
backhaulClientAccess: true
bridgeGroupName: string
ghz24BackhaulDataRates: string
ghz5BackhaulDataRates: string
range: 0
rapDownlinkBackhaul: string
pmfDenialEnabled: true
remoteWorkerEnabled: true
rogueDetectionSetting:
rogueDetection: true
rogueDetectionMinRssi: 0
rogueDetectionReportInterval: 0
rogueDetectionTransientInterval: 0
timeZone: string
timeZoneOffsetHour: 0
timeZoneOffsetMinutes: 0
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
A dictionary or list with the response returned by the Cisco DNAC Python SDK Returned: always Sample: |