<?xml version="1.0" encoding="UTF-8"?>
<!-- <?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?> -->
<rfc category="info" docName="draft-zm-rtgwg-mcp-troubleshooting-01" ipr="trust200902" submissionType="IETF" xml:lang="en" version="3" xmlns:xi="http://www.w3.org/2001/XInclude">
  <front>
    <title abbrev="MCP for Networks">
      Using the Model Context Protocol (MCP) for Intent-Based Network Troubleshooting Automation
    </title>
    <seriesInfo name="Internet-Draft" value="draft-zm-rtgwg-mcp-troubleshooting-01"/>
        <author fullname="Guanming Zeng" initials="G." surname="Zeng">
      <organization>Huawei</organization>
      <address><email>zengguanming@huawei.com</email></address>
    </author>
    <author fullname="Jianwei Mao" initials="J." surname="Mao">
      <organization>Huawei</organization>
      <address><email>maojianwei@huawei.com</email></address>
    </author>
    <author fullname="Bing Liu" initials="B." surname="Liu">
      <organization>Huawei</organization>
      <address><email>leo.liubing@huawei.com</email></address>
    </author>
    <author fullname="Nan Geng" initials="N." surname="Geng">
      <organization>Huawei</organization>
      <address><email>gengnan@huawei.com</email></address>
    </author>
    <author fullname="Xiaotong Shang" initials="X." surname="Shang">
      <organization>Huawei</organization>
      <address><email>shangxiaotong@huawei.com</email></address>
    </author>
    <author fullname="Qiangzhou Gao" initials="Q." surname="Gao">
      <organization>Huawei</organization>
      <address><email>gaoqiangzhou@huawei.com</email></address>
    </author>
    <author fullname="Zhenbin Li" initials="Z." surname="Li">
      <organization>Huawei</organization>
      <address><email>robinli314@163.com</email></address>
    </author>
    <date year="2025"/>
    <abstract>
      <t>The Model Context Protocol (MCP) is an open standard that enables Large Language Model (LLM) applications to seamlessly integrate with external data sources and tools by exposing Resources, Prompts and Tools in a JSON-RPC 2.0 transport. This document describes a mapping of MCP roles, primitives and security model to the network management domain so that network devices act as MCP servers and network controllers act as MCP clients. This document also extends the model to Device-to-Device (D2D) collaboration, allowing network elements to perform distributed fault correlation when the controller is unreachable or when real-time cross-device data is required. The goal is to provide an intent-based, conversational and secure approach for automated network troubleshooting, configuration validation, and closed-loop remediation without inventing new protocols or device agents.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Network operators today face two converging demands: (1) reduce Mean Time to Repair (MTTR) while managing ever larger infrastructures, and (2) adopt intent-based interfaces that allow engineers to express high-level goals such as "verify reachability between Site-A and Site-B" instead of typing low-level CLI commands.</t>
      <t>Simultaneously, Large Language Models (LLMs) have demonstrated utility in reasoning about semi-structured data such as device logs, configurations, and command outputs. However, safely exposing device-level actions and data to an LLM in real time remains an open problem. The Model Context Protocol (MCP), developed by Anthropic and published at <eref target="https://modelcontextprotocol.io"/>, provides a lightweight, capability-oriented RPC layer that already addresses this problem for general LLM applications.</t>
      <t>This document specifies a deterministic mapping of MCP roles, primitives, and security workflows onto the network management plane so that:</t>
        <ul spacing="normal">
          <li>A network element (router, switch, firewall, etc.) becomes an "MCP server" that exposes management data and actions as MCP Resources, Prompts and Tools.</li>
          <li>A controller, orchestrator or chat-based assistant becomes an "MCP client" that consumes these primitives.</li>
          <li>Human operators interact with the controller using natural language; the controller translates the intent into a sequence of MCP calls, optionally consulting an LLM for reasoning.</li>
          <li>All interactions are subject to explicit user consent, audit, and capability-based access control, as mandated by MCP.</li>
        </ul>

    <t>While the star-shaped Controller-to-Device model covers most brown-field
  deployments, some faults are visible only when two or more devices compare
  live data in real time. To address this we extend MCP to support
  Device-to-Device (D2D) troubleshooting collaboration. In this mode network
  elements autonomously form a transient "collaboration domain", exchange
  YANG/JSON-RPC calls, correlate results with an on-box LLM, and produce a
  signed report that can be retrieved by the controller once connectivity is
  restored. Security is maintained through mutual TLS, short-lived device
  certificates, and a white-list of neighbour-callable capabilities.</t>
      
      <t>The result is an intent-based, conversational and secure automation framework that re-uses existing agents (NETCONF/RESTCONF/YANG, SNMP, CLI, gNMI, etc.) already present on devices instead of requiring new firmware.</t>
    </section>

<section numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
      <t>MCP terms such as "Tool", "Resource", "Prompt", "Client", "Server", "Host", and "Capability" are used as defined in the MCP specification dated 2025-06-18.</t>
      <t>Intent: A high-level, declarative statement of desired network behaviour, expressed in natural language or structured YAML/JSON, that the controller must translate into concrete device actions.</t>
    </section>

    <section anchor="mapping" numbered="true" toc="default">
      <name>Mapping of MCP Primitives to Network Management</name>

      <section anchor="res" numbered="true" toc="default">
        <name>Resources</name>
        <t>Resources are exposed under the URI scheme <tt>mcp://&lt;device&gt;/&lt;yang-module&gt;:&lt;path&gt;</tt>. Reading a resource returns YANG JSON-encoded data per <xref target="RFC7951"/>. Examples: </t>
          <ul spacing="normal">
            <li><tt>mcp://router1/ietf-interfaces:interfaces/interface=eth0</tt></li>
            <li><tt>mcp://router1/openconfig-bgp:bgp/neighbors/neighbor=1.1.1.1</tt></li>
          </ul>
        
        <t>Servers SHOULD support the "content-id" header to enable E-tags for caching.</t>
      </section>

      <section anchor="tools" numbered="true" toc="default">
        <name>Tools</name>
        <t>Tools are mapped to well-known RPC operations already exposed by devices via NETCONF/RESTCONF/YANG, gNMI, or CLI. A Tool is described by an OpenAPI 3.0 Operation Object and MUST be idempotent when possible.</t>
        <t>Example Tool schema (ping):</t>
          <figure>
            <name>Tool Schema Example</name>
            <artwork><![CDATA[
{
  "name": "ping",
  "description": "Execute ICMP echo probe",
  "inputSchema": {
    "type": "object",
    "properties": {
      "destination": { "type": "string" },
      "count":       { "type": "integer", "default": 5 },
      "source":      { "type": "string" }
    },
    "required": ["destination"]
  }
}
            ]]></artwork>
          </figure>
        
      </section>

      <section anchor="prompts" numbered="true" toc="default">
        <name>Prompts</name>
        <t>Prompts are reusable prompt templates stored on the device. They allow vendors or operators to encode golden troubleshooting workflows in natural language. A prompt MAY contain variable placeholders such as "{{interface}}" that the client fills in before sending to an LLM.</t>
      </section>

      <section anchor="sampling" numbered="true" toc="default">
        <name>Sampling (Optional)</name>
        <t>If the client advertises the "sampling" capability, the server MAY request LLM inference on behalf of the device. This is useful for recursive troubleshooting where the device needs to ask clarifying questions. All sampling requests MUST be approved by the human operator via explicit consent UI.</t>
      </section>
    </section>


<section anchor="c2d" title="Controller-to-Device Troubleshooting">
    <section anchor="arch" numbered="true" toc="default">
      <name>Architecture</name>
        <figure>
          <name>Controller-to-Device model</name>
          <artwork><![CDATA[
   +----------------------------------+
   |  Human Operator (Chat UI, Web)   |
   +-----------------+----------------+
                     | Intent (natural lang.)
                     v
   +----------------------------------+
   |  Controller / Orchestrator       |
   |  (MCP Client + LLM Host)         |
   +-----------------+----------------+
                     | JSON-RPC 2.0 over TLS
                     v
   +----------------------------------+
   |  Network Device                  |
   |  (MCP Server)                    |
   +----------------------------------+
          ]]></artwork>
        </figure>
    </section>

      <section anchor="roles" numbered="true" toc="default">
        <name>Role Allocation</name>
        <t>MCP Server: Runs on or proxied in front of the network element. Exposes: </t>
          <ul spacing="normal">
            <li>Resources: Read-only YANG datastores, syslog, tech-support</li>
            <li>Tools: Idempotent actions, e.g., "ping", "traceroute", "clear counters", "rollback config"</li>
            <li>Prompts: Re-usable prompt templates, e.g., "Diagnose BGP session down"</li>
          </ul>
        
        <t>MCP Client: Runs inside the controller. Maintains a persistent JSON-RPC 2.0 connection to each server. Optionally hosts an LLM that reasons about the data returned by servers.</t>
      </section>

      <section anchor="cap" numbered="true" toc="default">
        <name>Capability Negotiation</name>
        <t>On connection establishment, the client and server exchange capability objects as defined in MCP. Servers list their supported YANG modules <xref target="RFC8525"/>, CLI command sets, and Tool schemas encoded in OpenAPI 3.0. Clients list optional features such as "sampling" (LLM recursion) or "roots" (URI scoping).</t>
      </section>

    <section anchor="usecases" numbered="true" toc="default">
      <name>Example Use Cases</name>

<section anchor="uc1" numbered="true" toc="default">
  <name>Intent: "Verify reachability between Site-A and Site-B"</name>
  <t>The following steps illustrate the flow:</t>
  <ol spacing="normal">
    <li>Operator enters intent in chat UI.</li>
    <li>Controller's LLM deduces required Tools:
      − <tt>ping</tt> (Tool) from router1 to 10.2.2.2<br/>
      − <tt>show interfaces</tt> (Resource) on router2
    </li>
    <li>Controller issues MCP calls.</li>
    <li>Devices return results.</li>
    <li>LLM summarizes: "Packet loss 0%; MTU mismatch detected on router2 ge-0/0/0. Recommend 'set interfaces ge-0/0/0 mtu 1500'."</li>
  </ol>
</section>

      <section anchor="uc2" numbered="true" toc="default">
        <name>Intent: "Diagnose why BGP neighbor 1.1.1.1 is down"</name>
        <ol spacing="normal">
          <li>Controller retrieves:
              -<tt>/openconfig-bgp:bgp/neighbors/neighbor=1.1.1.1/state</tt>
              -<tt>/ietf-interfaces:interfaces/interface=loopback0</tt>
          </li>
          <li>Controller calls Tool "tcpdump" filtered on port 179.</li>
          <li>LLM correlates: "No TCP SYN received; ACL foo on interface loopback0 denies port 179."</li>
          <li>Controller offers one-click remediation: remove ACL entry.</li>
        </ol>
      </section>
    </section>

</section>




<!-- Device-to-Device (D2D) Troubleshooting Collaboration -->
<section anchor="d2d" title="Device-to-Device Troubleshooting Collaboration">
  <t>Some root causes are scattered across several nodes (e.g., unidirectional fiber, one-way ACL, single-sided BFD Down, localized SRv6 SID failure). Although the controller can collect data centrally, the north-bound link may be impaired, time-synchronisation is costly, and uploading bulk data is expensive. Allowing nearby devices to form a transient "trusted collaboration domain" and exchange data, correlate and infer root causes locally can significantly shorten MTTR.</t>

     <section anchor="arch2" numbered="true" toc="default">
      <name>Architecture</name> 
<figure anchor="fig-d2d-arch" title="Device-to-Device Collaboration Model">
  <artwork><![CDATA[
      +-------------+       +-------------+       +-------------+
      |   Device A  |       |   Device B  |       |   Device C  |
      | MCP Client  |       | MCP Client  |       | MCP Client  |
      |  + Server   |<----->|  + Server   |<----->|  + Server   |
      +-------------+       +-------------+       +-------------+
            |                       |                       |
            |  MCP/JSON-RPC 2.0     |  MCP/JSON-RPC 2.0     |
            |  over mutual-TLS      |  over mutual-TLS      |
            |                       |                       |

]]></artwork>
</figure>
</section>

  <section anchor="d2d-roles" title="Role Allocation">
    <ul spacing="normal">
      <li>MCP-Server, MCP-Client: moved into a "Collaboration Agent" (CA) running on the device. Every CA is both client and server; the MCP message layer MUST support mutual TLS and capability negotiation.</li>
      <li>The user (human or controller) only needs to inject an Intent on any one device in the domain; the CA will then perform the chained calls autonomously and roll-up the final report.</li>
    </ul>
  </section>




<section anchor="d2d-flow" title="Example Use Cases">
 <section title="Intent: Verify packet loss on the SRv6 path from PE-1 to PE-3 via P-2">
  <t>The following steps illustrate SRv6 packet-loss localization between three routers:
  PE-1 (head-end), P-2 (mid-point), and PE-3 (tail-end).  The same pattern can be
  applied to any multi-box fault domain.</t>

  <t> <strong>Step-0: Intent Injection</strong> </t>
    <t>An operator types the following natural-language goal in the chat window
    that is served by PE-1:</t>
    <artwork><![CDATA[
Intent: "Verify packet loss on the SRv6 path from PE-1 to PE-3 via P-2"
]]></artwork>
    <t>PE-1 Collaboration Agent (CA) parses the Intent, extracts the SID list
    {PE-1, P-2, PE-3}, and starts the D2D workflow.</t>

<t> <strong>Step-1: Collaboration Domain Discovery</strong> </t>
    <t>PE-1 CA sends an LLDP/IS-IS Extended TLV that contains:</t>
    <artwork><![CDATA[
  + mcp-d2d-port = 9514
  + supported-capabilities = [ietf-srv6-ping, ietf-interface-counters]
  + cert-thumbprint = <SHA-256 of device certificate>
]]></artwork>
    <t>P-2 and PE-3 reply with their own TLV.  All three nodes are now aware of
    each other's MCP endpoint and capabilities.</t>

<t> <strong>Step-2: Mutual TLS &amp; Capability Negotiation</strong> </t>
    <t>PE-1 opens a TLS 1.3 connection to P-2 and PE-3 on port 9514.  Both sides
    send their X.509 device certificates and the MCP initialize message:</t>
    <artwork><![CDATA[
{ "jsonrpc": "2.0",
  "method": "mcp/initialize",
  "params": {
      "protocolVersion": "2025-12",
      "capabilities": [ "ietf-srv6-ping", "ietf-interface-counters" ]
  },
  "id": 1 }
]]></artwork>
    <t>The responder echoes its own capability list.  If the intersection is
    non-empty the session is marked authorised for those capabilities.</t>

<t> <strong>Step-3: Parallel Resource &amp; Tool Calls</strong> </t>
    <t>PE-1 CA schedules three operations in parallel:</t>
      <t>Local call (no network RPC)</t>
        <artwork><![CDATA[
  Tool: "ietf-srv6-ping"
  Params: { Head=PE-1, Tail=PE-3, SID-List=[P-2, PE-3], Count=100 }
]]></artwork>

      <t>RPC toward P-2</t>
        <artwork><![CDATA[
  POST https://[P-2]:9514/mcp/tool/call
  Body: { tool: "ietf-srv6-ping",
          arguments: { Local=P-2, Tail=PE-3, Count=100 } }
]]></artwork>

      <t>RPC toward PE-3</t>
        <artwork><![CDATA[
  POST https://[PE-3]:9514/mcp/resource/read
  Body: { uri: "urn:ietf:params:xml:ns:yang:ietf-interfaces/interfaces/interface=SID-Endpoint/statistics" }
]]></artwork>

    <t>Each callee returns a JSON-RPC result plus an ed25519 signature covering
    the result body and a monotonic nonce.  The nonce prevents replay if the
    controller later fetches the audit-log.</t>

<t> <strong>Step-4: Local Correlation &amp; Inference</strong> </t>
    <t>PE-1 CA feeds the three data sets into its on-box LLM with the prompt:</t>
    <artwork><![CDATA[
  "Compare loss % from PE-1 vs P-2; if PE-1>0 and P-2=0, root cause is
   in {PE-1→P-2 link, upstream ACL}; output a single sentence."
]]></artwork>
    <t>Model output:</t>
    <artwork><![CDATA[
  "Loss 3.2 % observed only on PE-1→P-2 direction; P-2→PE-1 0 %;
   suggest checking PE-1 egress ACL 2001."
]]></artwork>
    <t>The deterministic part of the reply (ACL 2001) is extracted as a
    structured fault hypothesis and stored in the candidate list.</t>

<t> <strong>Step-5: Roll-up Report &amp; User Consent</strong> </t>
    <t>PE-1 CA assembles the signed results, inference, and raw packets into an
    MCP resource:</t>
    <artwork><![CDATA[
  URI:  urn:ietf:params:xml:ns:yang:ietf-mcp/report/74e8
  Body: { "creator": "PE-1",
          "created": "2025-10-30T14:23:42Z",
          "hypothesis": "PE-1 egress ACL 2001",
          "evidence": [ <base64 encoded PCAP>, ... ],
          "signatures": { "PE-1": <sig1>, "P-2": <sig2>, "PE-3": <sig3> } }
]]></artwork>
    <t>If the operator is still on-line the CA presents the hypothesis and asks
    for explicit approval before any mitigating action (e.g., edit ACL) is
    executed.  If the controller is reachable the report is pushed through the
    conventional star channel; otherwise it remains on-box until the next
    controller sync.</t>

<t> <strong>Failure Handling</strong> </t>
    <t>If any D2D call times out or returns an authentication error, PE-1 CA
    marks that node "untrusted" and falls back to controller-based polling if
    available.  All intermediate temporary states (e.g., cleared counters) are
    rolled back immediately to preserve atomicity.</t>
</section>
</section>

  <!-- <section anchor="d2d-backward" title="Backward Compatibility">
    <t>When the controller is reachable and the user has not explicitly enabled "local-collaboration", devices MUST reject any D2D call to maintain a single audit path. If authorization is revoked during collaboration, the initiator CA sends MCP/cancel and all temporary configuration changes are rolled back.</t>
  </section> -->

    <!-- <section anchor="d2d-security" title="Security Model">
    <t>Extends <xref target="security"/> with the following rules:</t>
    <ul spacing="normal">
      <li>In-domain trust: short-lived X.509 certificates plus IEEE 802.1AR device identity, injected during manufacturing or ZTP.</li>
      <li>Invocation authorisation: each device publishes a white-list of capabilities that neighbours are allowed to call (e.g., ping, clear-counter; write-memory denied).</li>
      <li>Evidence chain: every D2D call produces a signed audit-log that can be bulk-collected after the controller regains reachability.</li>
    </ul>
  </section> -->
</section>



    <section anchor="transport" numbered="true" toc="default">
      <name>Transport &amp; Encoding Considerations</name>
      <t>JSON-RPC 2.0 is carried over TLS 1.3 <xref target="RFC8446"/> with TCP/443 or QUIC <xref target="RFC9000"/> as the underlying transport. Servers present X.509 device certificates; clients use mutual TLS with short-lived SPAKE2 <xref target="RFC9383"/> tokens to achieve zero-touch onboarding.</t>
      <t>YANG data is encoded in JSON <xref target="RFC7951"/> unless the client explicitly requests XML.</t>
      <t>Large tech-support files MAY be streamed via HTTP/2 chunked transfer and are integrity-protected by SHA-256 hashes delivered in the JSON-RPC result.</t>
      <t>Servers MAY support the MCP "progress" notification to report percentage completion for long-running Tools such as "tracepath".</t>
    </section>

    <section anchor="security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>This section extends the security model defined in MCP with network-specific requirements.</t>

      <section anchor="consent" numbered="true" toc="default">
        <name>User Consent and Authorization</name>
        <t>All Tool invocations that change device state MUST be confirmed by an authenticated user via an out-of-band consent channel (e.g., click-through UI or signed JWT). The consent object includes:</t>
          <ul spacing="normal">
            <li>Tool name and parameter values</li>
            <li>Estimated impact window (rollback timer)</li>
            <li>User identity and role</li>
            <li>Signed timestamp</li>
          </ul>
        
      </section>

      <section anchor="tokens" numbered="true" toc="default">
        <name>Least-Privilege Capability Tokens</name>
        <t>Servers issue short-lived OAuth 2.0 <xref target="RFC6749"/> access tokens scoped to individual YANG subtrees or Tools. Tokens are bound to the mutual TLS channel to prevent replay.</t>
      </section>

      <section anchor="llmiso" numbered="true" toc="default">
        <name>LLM Isolation</name>
        <t>When the controller hosts an LLM, the LLM is placed in a sandbox with no direct layer-3 reachability to devices. All interactions MUST traverse the MCP client to mitigate prompt-injection attacks.</t>
      </section>

      <section anchor="audit" numbered="true" toc="default">
        <name>Audit and Post-Mortem</name>
        <t>Every JSON-RPC request and response is appended to an immutable audit trail (e.g., syslog <xref target="RFC5424"/> or IETF syslog over TLS). Servers include a "session-id" field to allow cross-device correlation.</t>
      </section>

      <section anchor="privacy" numbered="true" toc="default">
        <name>Privacy</name>
        <t>Resources containing customer data (e.g., DPI logs) are redacted by default. Servers expose a "privacy-level" capability; clients request explicit user consent before retrieving level-3 data.</t>
      </section>
    </section>

    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document requests IANA to register the following well-known URI:</t>
      <ul spacing="normal">
        <li>URI suffix: mcp</li>
        <li>Description: Model Context Protocol over TLS</li>
        <li>Reference: This document</li>
      </ul>
      <t>Additionally, the YANG module "ietf-mcp" is requested to be added to the IETF YANG module registry with namespace "urn:ietf:params:xml:ns:yang:ietf-mcp".</t>
    </section>
      </middle>

    <back>
    <references title="Normative References">
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner"/>
          <date year="1997"/>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
      </reference>

      <reference anchor="RFC7951" target="https://www.rfc-editor.org/info/rfc7951">
        <front>
          <title>JSON Encoding of Data Modeled with YANG</title>
          <author initials="L." surname="Lhotka"/>
          <date year="2016"/>
        </front>
        <seriesInfo name="RFC" value="7951"/>
      </reference>

      <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author initials="E." surname="Rescorla"/>
          <date year="2018"/>
        </front>
        <seriesInfo name="RFC" value="8446"/>
      </reference>

      <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000">
        <front>
          <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
          <author initials="J." surname="Iyengar"/>
          <author initials="M." surname="Thomson"/>
          <date year="2021"/>
        </front>
        <seriesInfo name="RFC" value="9000"/>
      </reference>
    

    <!-- 加到 <back> 内的 <references> 区域，放在已有引用之后即可 -->
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author initials="B." surname="Leiba"/>
    <date year="2017"/>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
</reference>

<reference anchor="RFC8525" target="https://www.rfc-editor.org/info/rfc8525">
  <front>
    <title>YANG Library</title>
    <author initials="A." surname="Bierman"/>
    <author initials="M." surname="Bjorklund"/>
    <author initials="K." surname="Watsen"/>
    <date year="2019"/>
  </front>
  <seriesInfo name="RFC" value="8525"/>
</reference>

<reference anchor="RFC5424" target="https://www.rfc-editor.org/info/rfc5424">
  <front>
    <title>The Syslog Protocol</title>
    <author initials="R." surname="Gerhards"/>
    <date year="2009"/>
  </front>
  <seriesInfo name="RFC" value="5424"/>
</reference>

<reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749">
  <front>
    <title>The OAuth 2.0 Authorization Framework</title>
    <author initials="D." surname="Hardt"/>
    <date year="2012"/>
  </front>
  <seriesInfo name="RFC" value="6749"/>
</reference>

<reference anchor="RFC9383" target="https://www.rfc-editor.org/info/rfc9383">
  <front>
    <title>SPAKE2+, an Augmented Password-Authenticated Key Exchange (PAKE) Protocol</title>
    <author initials="M." surname="Sethi"/>
    <author initials="R." surname="Struik"/>
    <date year="2023"/>
  </front>
  <seriesInfo name="RFC" value="9383"/>
</reference>

</references>

    <references title="Informative References">
        <name>Informative References</name>
        <reference anchor="MCP-SPEC">
        <front>
          <title>Model Context Protocol Specification 2025-06-18</title>
          <author><organization>Anthropic</organization></author>
          <date year="2025"/>
        </front>
        <seriesInfo name="URL" value="https://modelcontextprotocol.io/specification/2025-06-18/basic"/>
      </reference>
    </references>


    <section anchor="app-examples" numbered="true" toc="default">
      <name>JSON-RPC Examples</name>

      <section anchor="ex-ping" numbered="true" toc="default">
        <name>Client Call: ping</name>
        <figure>
          <name>ping Request and Response</name>
          <artwork><![CDATA[
--> {
      "jsonrpc": "2.0",
      "id": 1,
      "method": "tools/call",
      "params": {
        "name": "ping",
        "arguments": {
          "destination": "10.2.2.2",
          "count": 5,
          "source": "192.0.2.1"
        }
      }
    }

<-- {
      "jsonrpc": "2.0",
      "id": 1,
      "result": {
        "loss": 0,
        "rtt": { "min": 2.1, "max": 2.3, "avg": 2.2 }
      }
    }
          ]]></artwork>
        </figure>
      </section>

      <section anchor="ex-sub" numbered="true" toc="default">
        <name>Server Resource Subscription</name>
        <figure>
          <name>Resource Subscribe Example</name>
          <artwork><![CDATA[
--> {
      "jsonrpc": "2.0",
      "id": 2,
      "method": "resources/subscribe",
      "params": {
        "uri": "mcp://router1/ietf-interfaces:interfaces/interface=eth0",
        "content-id": "etag-1234"
      }
    }

<-- {
      "jsonrpc": "2.0",
      "id": 2,
      "result": {
        "subscription-id": "sub-42",
        "initial": { "admin-status": "up", "oper-status": "up" }
      }
    }
          ]]></artwork>
        </figure>
      </section>
    </section>

  </back>
</rfc>