
********************************************************************************
* Copyright (C) 2019-2024 by Extreme Networks , Inc.                           *
* This file is part of rBreeze Dump                                            *
*                                                                              *
* Author: Pradeep Raj.                                                         *
*                                                                              *
*                                                                              *
* Directions to Use:                                                           *
* 1. Replace all the values enclosed in the "%" with                           *
*    the values to be configured. The string present with in the braces        * 
*    indicates its type.                                                       *
* 2. To pass "" in the request replace the " with %22.                         *
* 3. To pass multiple keys in the URI enclose seperate them with %2c or        *
*    comma(",").                                                               *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
*                                                                              *
* Disclaimer:                                                                  *
* 1. The queries mentioned here do not have a one-to-one correlation with CLI. *
* 2. The queries inferred here are based on an automated tool and are not      *
*    gauranteed to work. Its the functional teams responsibilty to ensure its  *
*    working.                                                                  *
* 3. In case if you find any discrepancy you can always contact the author to  *
*    get it fixed.                                                             *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
********************************************************************************

curl -v -X PATCH -d "[DO NOT USE]<allow><non-profiled-macs>true</non-profiled-macs></allow>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/allow


curl -v -X PATCH -d "<port-profile><restrict-flooding>true</restrict-flooding></port-profile>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%


curl -v -X PATCH -d "<port-profile><activate>true</activate></port-profile>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%


curl -v -X PATCH -d "<switchport>true</switchport>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport


curl -v -X PATCH -d "<mode><vlan-mode>%appm-sw-mode-type%</vlan-mode></mode>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/mode


curl -v -X PATCH -d "<vlan><name>%interface:vlan-type%</name></vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/access/vlan


curl -v -X PATCH -d "<vlan><all>true</all></vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan


curl -v -X PATCH -d "<vlan><none>true</none></vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan


curl -v -X PATCH -d "<vlan><add>%interface:ui32-vlan-range%</add></vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan


curl -v -X PATCH -d "<vlan><except>%interface:ui32-vlan-range%</except></vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan


curl -v -X PATCH -d "<vlan><remove>%interface:ui32-vlan-range%</remove></vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan


curl -v -X PATCH -d "<trunk><native-vlan>%uint32%</native-vlan></trunk>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk


curl -v -X PATCH -d "<trunk><ctag>%interface:dot1q-vlan-type%</ctag></trunk>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk


curl -v -X PATCH -d "<trunk><native-vlan>%uint32%</native-vlan></trunk>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk


curl -v -X PATCH -d "<cee>%common-def:name-string32%</cee>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/cee


curl -v -X PATCH -d "<qos><cos>%int32%</cos></qos>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos


curl -v -X PATCH -d "<trust><cos>true</cos></trust>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/trust


curl -v -X PATCH -d "<qos><cos-mutation>%common-def:name-string32%</cos-mutation></qos>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos


curl -v -X PATCH -d "<qos><cos-traffic-class>%common-def:name-string32%</cos-traffic-class></qos>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos


curl -v -X PATCH -d "<flowcontrol><tx>%enumeration%</tx><rx>%enumeration%</rx></flowcontrol>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/flowcontrol


curl -v -X PATCH -d "<pfc><tx>%enumeration%</tx><rx>%enumeration%</rx></pfc>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/flowcontrol/pfc/%cos%


curl -v -X PATCH -d "<access-group><access-group-name>%mac-access-list:mac-acl-name%</access-group-name><in>true</in></access-group>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/security-profile/mac/access-group


curl -v -X PATCH -d "<access-group><ipv4-access-group-name>%ip-access-list:l3-acl-policy-name%</ipv4-access-group-name><in>true</in></access-group>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/security-profile/ip/access-group


curl -v -X PATCH -d "<access-group><ipv6-access-group-name>%ip-access-list:l3-acl-policy-name%</ipv6-access-group-name><in>true</in></access-group>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/security-profile/ipv6/access-group


curl -v -X PATCH -d "<port-profile-port>true</port-profile-port>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ethernet/%name%/port-profile-port


curl -v -X PATCH -d "<domain><profile-domain-name>%port-profile-domain-name-type%</profile-domain-name></domain>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ethernet/%name%/port-profile-port/domain


curl -v -X PATCH -d "<port-profile-port>true</port-profile-port>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Port-channel/%name%/port-profile-port


curl -v -X PATCH -d "<domain><profile-domain-name>%port-profile-domain-name-type%</profile-domain-name></domain>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Port-channel/%name%/port-profile-port/domain

