
********************************************************************************
* Copyright (C) 2019-2024 by Extreme Networks , Inc.                           *
* This file is part of rBreeze Dump                                            *
*                                                                              *
* Author: Pradeep Raj.                                                         *
*                                                                              *
*                                                                              *
* Directions to Use:                                                           *
* 1. Replace all the values enclosed in the "%" with                           *
*    the values to be configured. The string present with in the braces        * 
*    indicates its type.                                                       *
* 2. To pass "" in the request replace the " with %22.                         *
* 3. To pass multiple keys in the URI enclose seperate them with %2c or        *
*    comma(",").                                                               *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
*                                                                              *
* Disclaimer:                                                                  *
* 1. The queries mentioned here do not have a one-to-one correlation with CLI. *
* 2. The queries inferred here are based on an automated tool and are not      *
*    gauranteed to work. Its the functional teams responsibilty to ensure its  *
*    working.                                                                  *
* 3. In case if you find any discrepancy you can always contact the author to  *
*    get it fixed.                                                             *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
********************************************************************************

curl -v -X PUT -d "<non-profiled-macs>true</non-profiled-macs>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/allow/non-profiled-macs


curl -v -X PUT -d "<vlan-profile />"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile


curl -v -X PUT -d "<qos-profile />"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile


curl -v -X PUT -d "<security-profile />"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/security-profile


curl -v -X PUT -d "<restrict-flooding>true</restrict-flooding>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/restrict-flooding


curl -v -X PUT -d "<switchport>true</switchport>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport


curl -v -X PUT -d "<vlan-mode>%appm-sw-mode-type%</vlan-mode>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/mode/vlan-mode


curl -v -X PUT -d "<name>%interface:vlan-type%</name>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/access/vlan/name


curl -v -X PUT -d "<all>true</all>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan/all


curl -v -X PUT -d "<none>true</none>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan/none


curl -v -X PUT -d "<add>%interface:ui32-vlan-range%</add>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan/add


curl -v -X PUT -d "<except>%interface:ui32-vlan-range%</except>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan/except


curl -v -X PUT -d "<remove>%interface:ui32-vlan-range%</remove>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/allowed/vlan/remove


curl -v -X PUT -d "<native-vlan>%uint32%</native-vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/native-vlan


curl -v -X PUT -d "<ctag>%interface:dot1q-vlan-type%</ctag>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/ctag


curl -v -X PUT -d "<native-vlan>%uint32%</native-vlan>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/vlan-profile/switchport/trunk/native-vlan


curl -v -X PUT -d "<cee>%common-def:name-string32%</cee>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/cee


curl -v -X PUT -d "<cos>%int32%</cos>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/cos


curl -v -X PUT -d "<cos>true</cos>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/trust/cos


curl -v -X PUT -d "<cos-mutation>%common-def:name-string32%</cos-mutation>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/cos-mutation


curl -v -X PUT -d "<cos-traffic-class>%common-def:name-string32%</cos-traffic-class>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/cos-traffic-class


curl -v -X PUT -d "<flowcontrol><tx>%enumeration%</tx><rx>%enumeration%</rx></flowcontrol>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/qos-profile/qos/flowcontrol


curl -v -X PUT -d "<access-group><access-group-name>%mac-access-list:mac-acl-name%</access-group-name><in>true</in></access-group>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/security-profile/mac/access-group


curl -v -X PUT -d "<access-group><ipv4-access-group-name>%ip-access-list:l3-acl-policy-name%</ipv4-access-group-name><in>true</in></access-group>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/security-profile/ip/access-group


curl -v -X PUT -d "<access-group><ipv6-access-group-name>%ip-access-list:l3-acl-policy-name%</ipv6-access-group-name><in>true</in></access-group>"  -u admin:password http://%ipaddress%:80/rest/config/running/port-profile/%name%/security-profile/ipv6/access-group


curl -v -X PUT -d "<port-profile-port>true</port-profile-port>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ethernet/%name%/port-profile-port


curl -v -X PUT -d "<profile-domain-name>%port-profile-domain-name-type%</profile-domain-name>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Ethernet/%name%/port-profile-port/domain/profile-domain-name


curl -v -X PUT -d "<port-profile-port>true</port-profile-port>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Port-channel/%name%/port-profile-port


curl -v -X PUT -d "<profile-domain-name>%port-profile-domain-name-type%</profile-domain-name>"  -u admin:password http://%ipaddress%:80/rest/config/running/interface/Port-channel/%name%/port-profile-port/domain/profile-domain-name

