M 176 Prog Yang Netconf
M 176 Prog Yang Netconf
NETCONF Protocol
1
NETCONF Protocol
NETCONF
Note To access Cisco YANG models in a developer-friendly way, clone the GitHub repository, and navigate to
the vendor/cisco subdirectory. Models for various releases of IOS-XE, IOS-XR, and NX-OS platforms are
available here.
NETCONF
NETCONF provides a mechanism to install, manipulate, and delete the configuration of network devices.
It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the
protocol messages.
NETCONF uses a simple Remote Procedure Call (RPC) based mechanism to facilitate communication between
a client and a server. The client can be a script or application running as part of a network manager. The server
is typically a network device (switch or router). It uses Secure Shell (SSH) as the transport layer across network
devices. It uses SSH port number 830 as the default port. The port number is a configurable option.
NETCONF also supports capability discovery and model downloads. Supported models are discovered using
the ietf-netconf-monitoring model. Revision dates for each model are shown in the capabilities response.
Data models are available for optional download from a device using the get-schema RPC. You can use these
YANG models to understand or export the data model. For more details on NETCONF, see RFC 6241.
In releases prior to Cisco IOS XE Fuji 16.8.1, an operational data manager (based on polling) was enabled
separately. In Cisco IOS XE Fuji 16.8.1 and later releases, operational data works on platforms running
NETCONF (similar to how configuration data works), and is enabled by default. For more information on
the components that are enabled for operational data queries or streaming, see the GitHub respository, to view
*-oper in the naming convention.
NETCONF Protocol
2
NETCONF Protocol
NETCONF Global Session Lock
<rpc message-id="101"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<lock>
<target>
<running/>
</target>
</lock>
</rpc>
NETCONF Protocol
3
NETCONF Protocol
NETCONF-YANG SSH Server Support
Note It must be kept in mind that candidate datastore is a shared data store. Multiple NETCONF sessions can
modify it contents simultaneously. Therefore, it is important to lock the datastore before modifying its contents,
to prevent conflicting commits that can eventually lead to the loss of any configuration changes.
Note The information in this section has been referenced from section 8.3.4 of RFC 6241. Please refer to the RFC
for more details and the exact RPCs.
NETCONF Protocol
4
NETCONF Protocol
NETCONF Operations on Candidate
Lock
A <lock> RPC is used to lock the target data store. This prevents others users from modifying the configuration
in the locked data store. Both candidate and running data can be locked through the lock operation.
Note Locking the candidate datastore does not affect the Cisco IOS config lock or the running configuration lock
and vice versa.
Commit
A <commit> RPC, copies the candidate configuration to the device’s running configuration. A commit operation
must be performed after you have updated the candidate configuration to push the configuration to the device.
If either the running or the candidate datastore is locked by another NETCONF session, the <commit> RPC
will fail with an RPC error reply. The <error-tag> should be <in-use> and <error-info> should have the session
ID of the NETCONF session holding the lock. You can also lock the running configuration by using the global
lock by entering the conf t lock mode, but, the commit operation will fail with an RPC error reply, with
error-tag value <in-use> and the session-id will be “0”.
Edit-config
The candidate configuration can be used as a target for the edit-config operation to modify a configuration.
You can change the candidate configuration without affecting the running configuration on the device.
Discard
To remove the changes made to the candidate configuration, perform a discard operation to revert the candidate
configuration to running configuration.
If contents of the candidate datastore are modified by NETCONF session A, and session B tries to lock the
candidate datastore, the lock fails. NETCONF session B must perform a <discard> operation to remove any
outstanding configuration changes on the candidate datastore from other NETCONF sessions before locking
a candidate.
Unlock
After working on candidate configuration, such as, lock, edit-config, or commit operations, you can unlock
the datastore, by specifying candidate as target in the unlock RPC. The candidate datastore is now available
for all operations in other sessions.
If a failure occurs with outstanding changes to the candidate datastore, it can be challenging to recover the
configuration, and may create problems for other sessions. To avoid any issues, outstanding changes must be
discarded when the lock is released—either implicitly on “NETCONF session failure” or explicitly by using
the unlock operation.
NETCONF Protocol
5
NETCONF Protocol
Confirmed Candidate Configuration Commit
In a NETCONF session, to commit the candidate configuration and to explicitly confirm the commit to become
permanent, a client application encloses the empty <confirmed/> tag in the <commit> and <rpc> tag elements:
<rpc>
<commit>
<confirmed/>
</commit>
</rpc>
The following sample RPC shows how to change the default rollback timer:
NETCONF Protocol
6
NETCONF Protocol
Candidate Support Configuration
<rpc>
<commit>
<confirmed/>
<confirm-timeout>nnn</confirm-timeout> !nnn is the rollback-delay in seconds.
</commit>
</rpc>
The following sample RPC shows that the NETCONF server confirms that the candidate configuration is
committed temporarily:
If the NETCONF server cannot commit the candidate configuration, the <rpc-reply> element will enclose an
<rpc-error> element explaining the reason for the failure. The most common causes are semantic or syntactic
errors in the candidate configuration.
To delay the rollback to a time later than the current rollback timer, the client application sends a <confirmed/>
tag inside a <commit> tag element again before the deadline passes. Optionally, it includes the
<confirm-timeout> element to specify how long to delay the next rollback. The client application can delay
the rollback indefinitely by sending the <confirmed/> tag repeatedly.
To commit the configuration permanently, the client application sends the <commit/> tag enclosed in an <rpc>
tag element before the rollback deadline passes. The rollback is canceled and the candidate configuration is
committed immediately. If the candidate configuration is the same as the temporarily committed configuration,
the temporarily committed configuration is recommitted.
If another application uses the <kill-session/> tag element to terminate this application’s session while a
confirmed commit is pending (this application has committed changes but not yet confirmed them), the
NETCONF server that is using this session restores the configuration to its state before the confirmed commit
instruction was issued.
The candidate datastore is disabled by using the no netconf-yang feature candidate-datastore command.
Because the candidate datastore confirmed commit is enabled when the candidate datastore is enabled, the
confirmed commit is disabled when the candidate datastore is disabled. All sessions in progress are terminated,
and the confd program is restarted.
netconf-yang initialization in progress - datastore transition not allowed, please try again
after 30 seconds
If the selection of the candidate or running datastore is made after the NETCONF-YANG or RESTCONF
confd process starts, the following apply:
NETCONF Protocol
7
NETCONF Protocol
Side-Effect Synchronization of the Configuration Database
• If the netconf-yang feature candidate-datastore command is configured, the command enables the
candidate datastore and prints the following warning:
“netconf-yang and/or restconf is transitioning from running to candidate netconf-yang
and/or restconf will now be restarted,
and any sessions in progress will be terminated”.
• If the netconf-yang feature candidate-datastore command is removed, the command disables the
candidate datastore, enables the running datastore and prints the following warning:
netconf-yang and/or restconf is transitioning from candidate to running netconf-yang
and/or restconf will now be restarted,
and any sessions in progress will be terminated”.
The following is the configuration on the device after the NETCONF edit-config RPC is configured:
hostname Switch
Here, the side-effect of the NETCONF edit-config RPC is a change to the running configuration that is not
directly intended by the RPC. The edit-config request is supposed to delete the host name, but instead the
hostname is changed back to Switch. The side-effect synchronization does a synchronization of this
configuration change to the NETCONF database without synchronizing the entire configuration, thereby
improving performance.
The side-effect synchronization is based on the CLI-mode tree concept, where the commands are maintained
with modes and submodes structure. This CLI-mode tree data structure consists of three main nodes:
• Same-Level Node: This node points to the list of CLI nodes that belongs to the same parent and on the
same level.
• Parent Node: This node points to the CLI nodes parent, its mode, and submode node.
• Child Node: This node points to the child CLI; the CLI under the current mode or submode. If the node
has multiple child nodes then those child nodes are linked as part of the same-level node pointers.
NETCONF Protocol
8
NETCONF Protocol
How to Configure the NETCONF Protocol
SUMMARY STEPS
1. enable
2. configure terminal
3. username name privilege level password password
4. aaa new-model
5. aaa authentication login default local
6. aaa authorization exec default local
7. end
DETAILED STEPS
Procedure
Step 3 username name privilege level password password Establishes a user name-based authentication system.
Configure the following keywords:
Example:
Device(config)# username example-name privilege 15 • privilege level: Sets the privilege level for the user.
password example_password For the NETCONF protocol, it must be 15.
• password password: Sets a password to access the
CLI view.
NETCONF Protocol
9
NETCONF Protocol
Configuring NETCONF-YANG
Step 6 aaa authorization exec default local Configures user AAA authorization, check the local
database, and allows the user to run an EXEC shell.
Example:
Device(config)# aaa authorization exec default Note
local Only the default AAA authorization method is supported
for the NETCONF protocol.
Configuring NETCONF-YANG
If the legacy NETCONF protocol is enabled on your device, the RFC-compliant NETCONF protocol does
not work. Disable the legacy NETCONF protocol by using the no netconf legacy command.
SUMMARY STEPS
1. enable
2. configure terminal
3. netconf-yang
4. netconf-yang feature candidate-datastore
5. exit
NETCONF Protocol
10
NETCONF Protocol
Configuring NETCONF Options
DETAILED STEPS
Procedure
SUMMARY STEPS
1. Enable SNMP features in IOS.
2. After NETCONF-YANG starts, enable SNMP Trap support by sending the following RPC <edit-config>
message to the NETCONF-YANG port.
3. Send the following RPC message to the NETCONF-YANG port to save the running configuration to the
startup configuration.
NETCONF Protocol
11
NETCONF Protocol
Configuring SNMP
DETAILED STEPS
Procedure
Step 2 After NETCONF-YANG starts, enable SNMP Trap support by sending the following RPC <edit-config> message to the
NETCONF-YANG port.
Example:
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="">
<edit-config>
<target>
<running/>
</target>
<config>
<netconf-yang xmlns="http://cisco.com/yang/cisco-self-mgmt">
<cisco-ia xmlns="http://cisco.com/yang/cisco-ia">
<snmp-trap-control>
<trap-list>
<trap-oid>1.3.6.1.4.1.9.9.41.2.0.1</trap-oid>
</trap-list>
<trap-list>
<trap-oid>1.3.6.1.6.3.1.1.5.3</trap-oid>
</trap-list>
<trap-list>
<trap-oid>1.3.6.1.6.3.1.1.5.4</trap-oid>
</trap-list>
</snmp-trap-control>
</cisco-ia>
</netconf-yang>
</config>
</edit-config>
</rpc>
Step 3 Send the following RPC message to the NETCONF-YANG port to save the running configuration to the startup
configuration.
Example:
NETCONF Protocol
12
NETCONF Protocol
Configuring the SSH Server to Perform RSA-Based User Authentication
SUMMARY STEPS
1. enable
2. configure terminal
3. ip ssh pubkey-chain
4. username username
5. key-string
6. end
DETAILED STEPS
Procedure
Step 3 ip ssh pubkey-chain Configures SSH-RSA keys for user and server
authentication on the SSH server and enters public-key
Example:
configuration mode.
Device(config)# ip ssh pubkey-chain
• The user authentication is successful if the RSA public
key stored on the server is verified with the public or
the private key pair stored on the client.
Step 4 username username Configures the SSH username and enters public-key user
configuration mode.
Example:
Device(conf-ssh-pubkey)# username user1
Step 5 key-string Specifies the RSA public key of the remote peer and enters
public-key data configuration mode.
Example:
Device(conf-ssh-pubkey-user)# key-string Note
NETCONF Protocol
13
NETCONF Protocol
Verifying the NETCONF Protocol Configuration Through the CLI
SUMMARY STEPS
1. show netconf-yang datastores
2. show netconf-yang sessions
3. show netconf-yang sessions detail
4. show netconf-yang diagnostics summary
5. show netconf-yang statistics
6. show platform software yang-management process
DETAILED STEPS
Procedure
NETCONF Protocol
14
NETCONF Protocol
Verifying the NETCONF Protocol Configuration Through the CLI
Number of sessions : 10
session-id transport username source-host global-lock
-------------------------------------------------------------------------------
40 netconf-ssh admin 10.85.70.224 None
42 netconf-ssh admin 10.85.70.224 None
44 netconf-ssh admin 10.85.70.224 None
46 netconf-ssh admin 10.85.70.224 None
48 netconf-ssh admin 10.85.70.224 None
50 netconf-ssh admin 10.85.70.224 None
52 netconf-ssh admin 10.85.70.224 None
54 netconf-ssh admin 10.85.70.224 None
56 netconf-ssh admin 10.85.70.224 None
58 netconf-ssh admin 10.85.70.224 None
Number of sessions : 1
session-id : 19
transport : netconf-ssh
username : admin
source-host : 2001:db8::1
login-time : 2018-10-26T12:37:22+00:00
in-rpcs : 0
in-bad-rpcs : 0
out-rpc-errors : 0
out-notifications : 0
global-lock : None
Diagnostic Debugging is ON
Diagnostic Debugging Level: Maximum
Total Log Size (bytes): 20097
Total Transactions: 1
message username session-id transaction-id start-time end-time log size
----------------------------------------------------------------------------------------
1 admin 35 53 03/12/21 14:31:03 03/12/21 14:31:04 20097
NETCONF Protocol
15
NETCONF Protocol
Verifying the NETCONF Protocol Configuration Through the CLI
netconf-start-time : 2018-01-15T12:51:14-05:00
in-rpcs : 0
in-bad-rpcs : 0
out-rpc-errors : 0
out-notifications : 0
in-sessions : 10
dropped-sessions : 0
in-bad-hellos : 0
confd : Running
nesd : Running
syncfd : Running
ncsshd : Running
dmiauthd : Running
vtyserverutild : Running
opdatamgrd : Running
nginx : Running
ndbmand : Running
Note
The process nginx runs if ip http secure-server or ip http server is configured on the device. This process is not required
to be in the running state for NETCONF to function properly. However, the nginx process is required for RESTCONF.
Field Description
NETCONF Protocol
16
NETCONF Protocol
Displaying NETCONF-YANG Diagnostics Through RPCs
#308
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="urn:uuid:b0f45ac0-3fe2-4e1d-a3a1-f57985965be6">
<enable-netconf-diag xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-netconf-diag-rpc">
<diag-level>diag-maximum</diag-level>
</enable-netconf-diag>
</nc:rpc>
##
The following is a sample RPC that shows the current status and the RPC response received from the host:
#294
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="urn:uuid:c6c986ac-fc44-45e2-9390-f8a5968dc8d4">
<nc:get>
<nc:filter>
<netconf-diag-oper-data
xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-netconf-diag-oper"/>
</nc:filter>
</nc:get>
</nc:rpc>
<diag-summary>
<level>diag-maximum</level>
<log-size>0</log-size>
<trans-count>0</trans-count>
</diag-summary>
</netconf-diag-oper-data>
NETCONF Protocol
17
NETCONF Protocol
Displaying NETCONF-YANG Diagnostics Through RPCs
</data>
</rpc-reply>
The following is a sample RPC to change the host name and the RPC response received from the host:
#
#364
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="urn:uuid:f3005ee6-8a11-4146-b616-dd95a92b97d1">
<nc:edit-config>
<nc:target>
<nc:running/>
</nc:target>
<nc:config>
<native xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-native">
<hostname>new-ott-c9300-35</hostname>
</native>
</nc:config>
</nc:edit-config>
</nc:rpc>
##
The following is a sample RPC to display the current status and the RPC response received from the host:
#294
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="urn:uuid:9bffb8d5-3866-48ef-b59d-0486e508fbc4">
<nc:get>
<nc:filter>
<netconf-diag-oper-data
xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-netconf-diag-oper"/>
</nc:filter>
</nc:get>
</nc:rpc>
##
<diag-summary>
<level>diag-maximum</level>
<log-size>20775</log-size>
<trans-count>1</trans-count>
</diag-summary>
<diag-trans>
NETCONF Protocol
18
NETCONF Protocol
Displaying NETCONF-YANG Diagnostics Through RPCs
<message>1</message>
<username>lab</username>
<session-id>31</session-id>
<trans-id>50</trans-id>
<start-time>2021-03-12T14:08:26.830334+00:00</start-time>
<end-time>2021-03-12T14:08:28.279414+00:00</end-time>
<log-size>20775</log-size>
</diag-trans>
</netconf-diag-oper-data>
</data>
</rpc-reply>
The following is a sample RPC to archive the collected system error messages, and the RPC response from
the host:
#
#256
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="urn:uuid:1dbc795c-f594-4194-a89b-fd4d88446b69">
<archive-netconf-diag-logs xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-netconf-diag-rpc"/>
</nc:rpc>
##
</rpc-reply>
The following is a sample RPC that disables NETCONF-YANG diagnostics, and the RPC response received
from the host:
#309
<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="urn:uuid:d253a313-4aec-42bc-80a2-672e9bb9ad56">
<enable-netconf-diag xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-netconf-diag-rpc">
<diag-level>diag-disabled</diag-level>
</enable-netconf-diag>
</nc:rpc>
##
NETCONF Protocol
19
NETCONF Protocol
Additional References for NETCONF Protocol
Standard/RFC Title
RFC 6020 YANG - A Data Modeling Language for the Network Configuration
Protocol (NETCONF)
Technical Assistance
Description Link
The Cisco Support website provides extensive online resources, http://www.cisco.com/support
including documentation and tools for troubleshooting and resolving
technical issues with Cisco products and technologies.
To receive security and technical information about your products,
you can subscribe to various services, such as the Product Alert Tool
(accessed from Field Notices), the Cisco Technical Services
Newsletter, and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a
Cisco.com user ID and password.
NETCONF Protocol
20
NETCONF Protocol
Feature Information for NETCONF Protocol
NETCONF Protocol Cisco IOS XE Denali 16.3.1 The NETCONF Protocol feature facilitates a
programmatic and standards-based way of
writing configurations and reading operational
data from network devices.
The following command was introduced:
netconf-yang.
This feature was implemented on the
following platforms:
• Cisco 4000 Series Integrated Services
Routers
• Cisco ASR 1000 Series Aggregation
Services Routers
• Cisco Cloud Services Router 1000V
Series
NETCONF Protocol
21
NETCONF Protocol
Feature Information for NETCONF Protocol
NETCONF Protocol
22
NETCONF Protocol
Feature Information for NETCONF Protocol
NETCONF and RESTCONF Cisco IOS XE Fuji 16.8.1a IPv6 support for the NETCONF and
IPv6 Support RESTCONF protocols. This feature was
implemented on the following platforms:
• Cisco 4000 Series Integrated Services
Routers
• Cisco ASR 1000 Series Aggregation
Services Routers
• Cisco ASR 900 Series Aggregation
Services Routers
• Cisco Catalyst 3650 Series Switches
• Cisco Catalyst 3850 Series Switches
• Cisco Catalyst 9300 Series Switches
• Cisco Catalyst 9400 Series Switches
• Cisco Catalyst 9500 Series Switches
• Cisco CBR-8 Series Routers
• Cisco Cloud Services Router 1000V
Series
NETCONF Protocol
23
NETCONF Protocol
Feature Information for NETCONF Protocol
NETCONF Global Lock and Cisco IOS XE Fuji 16.8.1a The NETCONF protocol supports a global
Kill Session lock, and the ability to kill non-responsive
sessions. This feature is implemented on the
following platforms:
• Cisco 1100 Series Integrated Services
Routers
• Cisco 4000 Series Integrated Services
Routers
• Cisco ASR 1000 Series Aggregation
Services Routers
• Cisco ASR 900 Series Aggregation
Services Routers
• Cisco Catalyst 3650 Series Switches
• Cisco Catalyst 3850 Series Switches
• Cisco Catalyst 9300 Series Switches
• Cisco Catalyst 9400 Series Switches
• Cisco Catalyst 9500 Series Switches
• Cisco CBR-8 Series Routers
• Cisco Cloud Services Router 1000v
Series
NETCONF Protocol
24
NETCONF Protocol
Feature Information for NETCONF Protocol
NETCONF: Candidate Cisco IOS XE Fuji 16.9.1 The Candidate Config Support feature enables
Configuration Support support for candidate capability by
implementing RFC 6241 with a simple commit
option.
This feature was implemented on the
following platforms:
• Cisco 4000 Series Integrated Services
Routers
• Cisco ASR 1000 Series Aggregation
Services Routers
• Cisco ASR 900 Series Aggregation
Services Routers
• Cisco Catalyst 3650 Series Switches
• Cisco Catalyst 3850 Series Switches
• Cisco Catalyst 9300 Series Switches
• Cisco Catalyst 9400 Series Switches
• Cisco Catalyst 9500 Series Switches
• Cisco CBR-8 Series Routers
• Cisco Cloud Services Router 1000V
Series
NETCONF Protocol
25
NETCONF Protocol
Feature Information for NETCONF Protocol
NETCONF: Candidate Cisco IOS XE Amsterdam The candidate configuration supports the
Configuration Commit 17.1.1 confirmed commit capability.
Confirm
This feature was implemented on the
following platforms:
• Cisco 1000 Series Integrated Services
Routers
• Cisco 4000 Series Integrated Services
Routers
• Cisco ASR 1000 Series Aggregation
Services Routers
• Cisco ASR 900 Series Aggregation
Services Routers
• Cisco Catalyst 3650 Series Switches
• Cisco Catalyst 3850 Series Switches
• Cisco Catalyst 9200 Series Switches
• Cisco Catalyst 9300 Series Switches
• Cisco Catalyst 9400 Series Switches
• Cisco Catalyst 9500 Series Switches
• Cisco cBR-8 Converged Broadband
Router
• Cisco Cloud Services Router 1000V
Series
• Cisco Network Convergence System 520
Series
• Cisco Network Convergence System
4200 Series
NETCONF Protocol
26
NETCONF Protocol
Feature Information for NETCONF Protocol
NETCONF-YANG SSH Cisco IOS XE Gibraltar This feature was implemented on the
Server Support 16.12.1 following platforms:
• Cisco 1000 Series Integrated Services
Routers
• Cisco 4000 Series Integrated Services
Routers
• Cisco ASR 900 Series Aggregation
Services Routers
• Cisco ASR 920 Series Aggregation
Services Routers
• Cisco ASR 1000 Aggregation Services
Routers
• Cisco Catalyst 3650 Series Switches
• Cisco Catalyst 3850 Series Switches
• Cisco Catalyst 9200 Series Switches
• Cisco Catalyst 9300 Series Switches
• Cisco Catalyst 9400 Series Switches
• Cisco Catalyst 9500 Series Switches
• Cisco Catalyst 9600 Series Switches
• Cisco Catalyst 9800 Series Wireless
Controllers
• Cisco cBR-8 Converged Broadband
Router
• Cisco Cloud Services Router 1000V
Series
• Cisco Network Convergence System 520
Series
• Cisco Network Convergence System
4200 Series
NETCONF Protocol
27
NETCONF Protocol
Feature Information for NETCONF Protocol
Side-Effect Synchronization Cisco IOS XE Bengaluru During configuration changes in the DMI, a
of the Configuration Database 17.4.1 partial synchronization of the changes that are
triggered when a command or RPC is
configured happens. This is called the
side-effect synchronization, and it reduces the
synchronization time and NETCONF
downtime.
This feature was implemented on the
following platforms:
• Cisco ASR 1000 Aggregation Services
Routers
• Cisco Catalyst 8500 and 8500L Series
Edge Platforms
• Cisco Catalyst 9200 Series Switches
• Cisco Catalyst 9300 Series Switches
• Cisco Catalyst 9400 Series Switches
• Cisco Catalyst 9500 Series Switches
• Cisco Catalyst 9600 Series Switches
NETCONF Protocol
28