| Internet-Draft | MCP-A2A-Gap | November 2025 |
| Zeng, et al. | Expires 6 May 2026 | [Page] |
NETCONF provides robust configuration transactions and YANG-based data models, but falls short in scenarios requiring AI-driven semantic translation, long-lived cross-domain orchestration, multi-agent consensus, rapid DevOps iteration, or delivery of large non-configuration artifacts. This document systematically analyzes the functional gaps and presents Model Context Protocol (MCP) and Agent-to-Agent (A2A) as complementary solutions. Implementation guidance and coexistence models are also provided.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 6 May 2026.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
NETCONF [RFC6241] remains the gold standard for network configuration transactions. However, five emerging scenarios expose its fundamental limitations:¶
This document identifies objective gaps and specifies when and how MCP [I-D.yang-nmrg-mcp-nm] and A2A [I-D.google-agent2agent] should be engaged.¶
This section enumerates the fundamental gaps between NETCONF and the advanced management scenarios introduced in Section 1. For each gap, the table below identifies:¶
| Gap | Root Cause in NETCONF | MCP/A2A Solution |
|---|---|---|
| AI Semantic Layer | XML-centric, no function registry | MCP /tools/list + JSON-Schema |
| Long-Flow Orchestration | No Task life-cycle or human-in-the-loop | A2A Task state machine |
| Multi-Agent Consensus | Client-server only; no peer negotiation | A2A AgentCard + Message |
| Weekly DevOps Iteration | YANG revision 6-9 months; firmware lock | MCP Tool hot-register |
| Large Artifact Delivery | 64 kB chunk; no MIME/hash/URL | MCP/A2A Artifact (cloud URL) |
The gaps are not implementation defects but architectural invariants of RFC 6241. They become blocking only in the five advanced scenarios identified. Outside these scenarios, NETCONF continues to provide the most robust configuration transactions and should remain the south-bound protocol of choice.¶
Operators increasingly expect to issue instructions in natural language: “Raise MTU to 9000 for all Beijing core switches” or “Block source 1.2.3.4 for 30 minutes”. NETCONF requires an edit-config XML blob with exact leaf names and namespaces; even experienced engineers make syntax mistakes under time pressure.¶
The root cause is architectural:¶
MCP solves these issues with three primitives:¶
/tools/list — JSON array of callable functions, each carrying human-readable description and JSON-Schema input.¶
Example MCP Tool Descriptor (simplified):¶
{
"name": "batch_set_mtu",
"description": "Set interface MTU on multiple devices",
"inputSchema": {
"type": "object",
"properties": {
"device_group": {"type": "string"},
"mtu": {"type": "integer", "minimum": 576, "maximum": 9216}
},
"required": ["device_group", "mtu"]
}
}
The LLM now produces:¶
{
"jsonrpc": "2.0",
"method": "batch_set_mtu",
"params": {"device_group": "beijing-core", "mtu": 9000},
"id": 1
}
Cloud-era value-added services must be deployed within days, not months. NETCONF's revision cycle (IETF draft → RFC: 6-9 months) and firmware upgrade windows (≤ 1 per year) are incompatible with weekly release trains. The blocking points are:¶
MCP breaks the deadlock by treating "intent" as a hot-swappable Tool rather than a permanent YANG node:¶
/tools/register and is immediately callable;¶
Example: Cloud-Shield DDoS Cleaning Service¶
Private YANG (120 lines) +--rw start-cleanse | +--rw target-ip inet:ipv4-address | +--rw bandwidth-Mbps uint32 | +--rw duration-min uint16
Compiled JSON-Schema and registered in 30 s:¶
{
"name": "start_cleanse",
"version": "1.0.0",
"description": "Start DDoS cleanse for target IP",
"inputSchema": {
"type": "object",
"properties": {
"target_ip": {"type": "string", "format": "ipv4"},
"bandwidth_Mbps": {"type": "integer", "minimum": 100, "maximum": 100000},
"duration_min": {"type": "integer", "minimum": 5, "maximum": 1440}
},
"required": ["target_ip", "bandwidth_Mbps"]
}
}
Thus MCP is mandatory for any management surface that must support weekly or daily release cycles without waiting for firmware or standards body timelines.¶
Maintenance windows for core-network upgrades often exceed 30 minutes and span multiple vendor domains. NETCONF provides atomic configuration on a single controller, but lacks:¶
A2A fills these gaps with three primitives:¶
Task — state machine (pending → working → completed/failed/cancelled) persisting across agent restarts;¶
Artifact — hash-signed object store (≤ 2 GB, resumable upload);¶
Message — multi-round negotiation (JSON or natural language).¶
| State | Meaning | NETCONF Equivalent |
|---|---|---|
| pending | Waiting for resources or approval | None (RPC is fire-and-forget) |
| awaiting-human-approval | Human must click approve/cancel | None |
| working | Agents executing sub-tasks | edit-config (local only) |
| completed | All agents report success | commit |
| failed | Any agent reports failure | rollback-on-error |
| cancelled | Operator or policy cancelled | discard-changes |
Real-World Example: Five-City Core MTU Migration¶
Controllers: Huawei NCE (3 cities) + Cisco NSO (2 cities) Devices: 312 PE routers Window: 120 min (02:00-04:00) Artifact: 2 GB firmware image + 40 MB diff-report
Step-wise A2A Flow (time-stamps):¶
A2A is mandatory for any multi-vendor, multi-hour workflow that demands task persistence, human gates, and multi-gigabyte artifact delivery—scenarios where NETCONF's single-controller, single-RPC paradigm is insufficient.¶
Fault recovery, security mitigation and resource optimisation often require multiple autonomous agents (monitoring, security, controller, human) to reach a common decision. NETCONF's strict client-server model provides no peer-to-peer capability advertisement, multi-round negotiation or voting primitives.¶
A2A introduces three building blocks:¶
AgentCard — JSON-LD advertisement of skills and endpoint;¶
Message — multi-round negotiation (JSON or natural language);¶
Consensus Engine — policy-based scoring, voting, human-in-the-loop.¶
| Field | Description | Example Value |
|---|---|---|
| id | globally unique agent identifier | monitor-sh-01 |
| skills | array of skill objects (name, description) | {name: "threat_analyze", desc: "Return 0-10 threat score"} |
| endpoint | HTTPS URL for A2A messages | https://mon-sh.example:9443/a2a |
| authentication | mTLS + OIDC | {"type": "mTLS", "sha256": "8f66..."} |
Consensus Flow Example: DDoS Port Shutdown¶
Agents: Monitor, Security, Controller, Human Decision: shutdown port 10/1 ? Scoring: threat_level×0.6 + impact×0.4 Threshold: ≥ 5.0 → shutdown
Message Sequence (time-stamps):¶
Therefore A2A is mandatory whenever multiple autonomous agents must discover, negotiate, vote and reach a binding decision — scenarios that NETCONF's unidirectional client-server paradigm cannot emulate.¶
This section describes how MCP and A2A can be deployed without forcing a redesign of the existing NETCONF ecosystem. The architecture keeps NETCONF as the configuration authority and allows either controller-hosted or device-hosted MCP servers — the latter avoids a central gateway bottleneck while preserving operator investment in controllers.¶
TBD¶
MCP and A2A introduce OAuth2/JWT and long-lived Tasks.¶