
********************************************************************************
* Copyright (C) 2019-2024 by Extreme Networks , Inc.                           *
* This file is part of rBreeze Dump                                            *
*                                                                              *
* Author: Pradeep Raj.                                                         *
*                                                                              *
*                                                                              *
* Directions to Use:                                                           *
* 1. Replace all the values enclosed in the "%" with                           *
*    the values to be configured. The string present with in the braces        * 
*    indicates its type.                                                       *
* 2. To pass "" in the request replace the " with %22.                         *
* 3. To pass multiple keys in the URI enclose seperate them with %2c or        *
*    comma(",").                                                               *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
*                                                                              *
* Disclaimer:                                                                  *
* 1. The queries mentioned here do not have a one-to-one correlation with CLI. *
* 2. The queries inferred here are based on an automated tool and are not      *
*    gauranteed to work. Its the functional teams responsibilty to ensure its  *
*    working.                                                                  *
* 3. In case if you find any discrepancy you can always contact the author to  *
*    get it fixed.                                                             *
* 4. Avoid using the requests with [DO NOT USE] tag in the payload. These could*
*    be defective because of the tailf extensions they have.                   *
********************************************************************************

curl -v -X PATCH -d "<vrf><rd>%rd-type%</rd></vrf>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%


curl -v -X PATCH -d "<vrf><vpn-statistics>true</vpn-statistics></vrf>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%


curl -v -X PATCH -d "<ecmp><enable>true</enable></ecmp>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/resilient-hash/ecmp


curl -v -X PATCH -d "[DO NOT USE]<resilient-hash><max-path>%uint32%</max-path></resilient-hash>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/resilient-hash


curl -v -X PATCH -d "<irb><ve>%interface:ve-type%</ve></irb>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/evpn/irb


curl -v -X PATCH -d "<irb><cluster-gateway>true</cluster-gateway></irb>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/evpn/irb


curl -v -X PATCH -d "<unicast><max-route>%uint32%</max-route></unicast>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast


curl -v -X PATCH -d "<unicast><connected-route-leak>true</connected-route-leak></unicast>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast


curl -v -X PATCH -d "<route-target><evpn>true</evpn></route-target>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast/route-target/%action%/%target-community%


curl -v -X PATCH -d "<import><map>%route-map-type%</map></import>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast/import


curl -v -X PATCH -d "<import><map>%route-map-type%</map><evpn>true</evpn></import>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast/import


curl -v -X PATCH -d "<export><map>%route-map-type%</map></export>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast/export


curl -v -X PATCH -d "<export><map>%route-map-type%</map><evpn>true</evpn></export>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast/export


curl -v -X PATCH -d "<next-hop><loopback>%intf-loopback:intf-loopback-port-type%</loopback></next-hop>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv4/unicast/bgp/next-hop


curl -v -X PATCH -d "<unicast><max-route>%uint32%</max-route></unicast>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast


curl -v -X PATCH -d "<unicast><connected-route-leak>true</connected-route-leak></unicast>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast


curl -v -X PATCH -d "<route-target><evpn>true</evpn></route-target>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast/route-target/%action%/%target-community%


curl -v -X PATCH -d "<import><map>%route-map-type%</map></import>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast/import


curl -v -X PATCH -d "<import><map>%route-map-type%</map><evpn>true</evpn></import>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast/import


curl -v -X PATCH -d "<export><map>%route-map-type%</map></export>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast/export


curl -v -X PATCH -d "<export><map>%route-map-type%</map><evpn>true</evpn></export>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast/export


curl -v -X PATCH -d "<next-hop><loopback>%intf-loopback:intf-loopback-port-type%</loopback></next-hop>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/address-family/ipv6/unicast/bgp/next-hop


curl -v -X PATCH -d "<ip><router-id>%inet:ipv4-address%</router-id></ip>"  -u admin:password http://%ipaddress%:80/rest/config/running/vrf/%vrf-name%/ip

