<?xml version="1.0" encoding="UTF-8"?>
<!-- <?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?> -->
<rfc category="info" docName="draft-zeng-nmrg-mcp-usecases-requirements-00" ipr="trust200902" submissionType="IETF" xml:lang="en" version="3" xmlns:xi="http://www.w3.org/2001/XInclude">
  <front>
    <title>MCP for Network Management: Problem Statement, Use Cases, and Requirements</title>

    <author fullname="Guanming Zeng" initials="G." surname="Zeng">
      <organization>Huawei</organization>
      <address>
        <email>zengguanming@huawei.com</email>
      </address>
    </author>

    <date year="2026" month="February"/>

    <abstract>
      <t>
        The emergence of large language models (LLMs) and AI agents is reshaping how network operators interact with infrastructure. However, current network management systems lack a standardized, secure, and intent-driven interface that enables AI agents to discover, invoke, and reason over network capabilities. This document presents a problem statement for integrating the Model Context Protocol (MCP) into network management, outlines key use cases—including troubleshooting, measurement, security, and optimization—and specifies functional, security, and interoperability requirements for MCP-based network management architectures.
      </t>
    </abstract>


    <boilerplate>
      <section anchor="status-of-memo" numbered="false">
        <name>Status of This Memo</name>
        <t>
          This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
        </t>
        <t>
          Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at <eref target="https://datatracker.ietf.org/drafts/current/"/>.
        </t>
        <t>
          Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
        </t>
        <t>
          This Internet-Draft will expire on August 14, 2026.
        </t>
      </section>
      <section anchor="copyright" numbered="false">
        <name>Copyright Notice</name>
        <t>
          Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.
        </t>
        <t>
          This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (<eref target="https://trustee.ietf.org/license-info"/>) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
        </t>
      </section>
    </boilerplate>
  </front>

  <middle>
    <section anchor="intro" numbered="true">
      <name>Introduction</name>
      <t>
        Traditional network management relies on protocol-specific interfaces (e.g., SNMP, NETCONF, RESTCONF) and manual scripting, which are rigid, siloed, and ill-suited for natural-language-driven automation. The Model Context Protocol (MCP), originally designed to standardize tool interaction for AI agents, offers a promising abstraction layer to unify network capabilities as callable “tools” and readable “resources.” This document formalizes the motivation, scenarios, and technical prerequisites for adopting MCP in network management.
      </t>
    </section>

    <section anchor="problem-statement" numbered="true">
      <name>Problem Statement</name>
      <t>
        Modern networks face increasing complexity due to scale, heterogeneity, and dynamic service demands. Operators struggle with:
      </t>
      <ul spacing="normal">
        <li>
          <strong>Intent-to-Action Gap</strong>: Natural-language requests (e.g., “Fix slow video calls in Building B”) cannot be directly translated into coordinated network operations across devices and domains.
        </li>
        <li>
          <strong>Tool Fragmentation</strong>: Capabilities like ping, route lookup, or ACL modification exist but are exposed via disparate protocols (CLI, YANG RPCs, gNMI), making them inaccessible to generic AI agents.
        </li>
        <li>
          <strong>Lack of Contextual Awareness</strong>: Current systems do not provide structured, machine-readable context (e.g., topology, policy constraints, historical baselines) needed for intelligent reasoning.
        </li>
        <li>
          <strong>Multi-Vendor Interoperability Gap</strong>:  In heterogeneous networks, the lack of a common semantic and syntactic interface for management operations forces operators to develop and maintain vendor-specific automation scripts. This drastically reduces operational efficiency and blocks the deployment of unified AI-driven management across domains.
        </li>
      </ul>
      <t>
        Existing management frameworks address parts of these issues but lack a lightweight, agent-centric protocol that decouples AI logic from network implementation details. MCP fills this gap by providing a uniform, JSON-RPC–based interface for AI agents to securely interact with network elements as first-class tools.
      </t>
      <t>
        Without standardizing how networks expose capabilities to AI agents, the industry risks fragmented, vendor-specific integrations that hinder interoperability, auditability, and safe automation.
      </t>
    </section>

    <section anchor="use-cases" numbered="true">
      <name>Use Cases</name>
      <t>
        This section describes four representative use cases where MCP enables intelligent, intent-driven network management.
      </t>

      <section anchor="troubleshooting" numbered="true">
        <name>Troubleshooting</name>
        <t>
          An operator reports: “Users in Floor 3 cannot reach the cloud application.”
        </t>
        <t>
          Under this scenario, the MCP Workflow runs as follows:
          The LLM interprets the intent and identifies required tools: <tt>get_interface_status</tt>, <tt>ping</tt>, <tt>show_route</tt>, <tt>check_acl</tt>.
          The MCP Client (in controller or local device) invokes these tools across relevant switches and routers.
          In D2D (Device-to-Device) mode, affected devices collaboratively gather data even if the controller is unreachable.
          The LLM correlates results and concludes: “ACL ‘block_external’ on Switch-F3 denies outbound traffic.”
          A repair suggestion is generated and presented for approval.
        </t>
        <t>
          The MCP Workflow reduces mean time to resolution (MTTR) from hours to minutes with explainable root-cause analysis.
        </t>
      </section>

      <section anchor="measurement" numbered="true">
        <name>Network Measurement</name>
        <t>
           An operator requests: “Monitor end-to-end latency between all branch offices every 5 minutes and alert if &gt;50ms.”
        </t>
        <t>
          Under this scenario, the MCP Workflow runs as follows:
          The request is parsed into a recurring measurement task.
          MCP Tools such as <tt>measure_latency</tt>, <tt>collect_interface_stats</tt>, and <tt>query_bgp_rib</tt> are scheduled across edge routers.
          Structured results (with timestamps, paths, and metadata) are returned via MCP Resources.
          The LLM detects anomalies using historical baselines and triggers alerts or auto-remediation.
        </t>
        <t>
          The MCP Workflow enables continuous, intent-defined observability without custom collectors or polling scripts.
        </t>
      </section>

      <section anchor="security" numbered="true">
        <name>Security Operations</name>
        <t>
          An operator requests: “Detect and isolate any device exhibiting abnormal outbound traffic patterns.”
        </t>
        <t>
          Under this scenario, the MCP Workflow runs as follows:
          The security AI agent subscribes to flow data via MCP Resource <tt>netflow_records</tt>.
          Upon anomaly detection (e.g., sudden spike to unknown IP), it invokes <tt>get_device_info</tt>, <tt>list_connected_hosts</tt>, and <tt>apply_quarantine_acl</tt>.
          All actions are logged with cryptographic signatures for compliance.
          The agent may also query external threat intelligence via an external MCP Server.
        </t>
        <t>
          The MCP Workflow enables real-time, closed-loop security response.
        </t>
      </section>

      <section anchor="optimization" numbered="true">
        <name>Network Optimization</name>
        <t>
          An operator requests: “Optimize WAN bandwidth utilization during business hours without violating SLAs.”
        </t>
        <t>
          Under this scenario, the MCP Workflow runs as follows:
          The optimizer agent collects real-time metrics (<tt>bandwidth_utilization</tt>, <tt>application_qos_stats</tt>) via MCP Resources.
          It simulates policy changes (e.g., adjusting QoS profiles, shifting SD-WAN paths) using sandboxed MCP Tools.
          After validation, it applies the optimal configuration via <tt>update_qos_policy</tt> or <tt>modify_sdwan_rules</tt>.
          Post-change telemetry confirms SLA compliance.
        </t>
        <t>
          The MCP Workflow enables continuous, data-driven optimization aligned with business intent, reducing manual tuning.
        </t>
      </section>
    </section>

    <section anchor="requirements" numbered="true">
      <name>Requirements</name>
      <t>
        To support the above use cases safely and scalably, MCP-based network management must satisfy the following requirements.
      </t>

      <section anchor="functional-reqs" numbered="true">
        <name>Functional Requirements</name>
        <dl newline="false" spacing="normal">
          <dt>FR1 – Capability Exposure</dt>
          <dd>Every network element MUST expose its management capabilities as MCP Tools (for actions) and Resources (for state), mapped from underlying protocols (e.g., YANG, CLI).</dd>

          <dt>FR2 – Intent Interpretability</dt>
          <dd>Tools and Resources MUST include human- and machine-readable metadata (e.g., descriptions, parameter schemas) to enable accurate LLM parsing.</dd>

          <dt>FR3 – Safety</dt>
          <dd>Destructive operations require explicit user consent.</dd>

          <dt>FR4 – Progress Feedback</dt>
          <dd>Long-running operations (e.g., packet capture) MUST support asynchronous progress notifications.</dd>
        </dl>
      </section>

      <section anchor="security-reqs" numbered="true">
        <name>Security Requirements</name>
        <dl newline="false" spacing="normal">
          <dt>SR1 – Authentication &amp; Authorization</dt> <dd>TBD</dd>

          <dt>SR2 – Least Privilege</dt>
          <dd>Tools MUST be scoped to minimal necessary permissions (e.g., “read-only” vs “configure”).</dd>


        </dl>
      </section>

      <section anchor="interop-reqs" numbered="true">
        <name>Interoperability &amp; Operational Requirements</name>
        <dl newline="false" spacing="normal">
          <dt>IR1 – Protocol Compliance</dt>
          <dd>MCP implementations MUST conform to the latest MCP specification (e.g., JSON-RPC 2.0 over TLS).</dd>

          <dt>IR2 – YANG Integration</dt>
          <dd>Tools/Resources SHOULD be describable via standardized YANG modules (e.g., <tt>ietf-mcp-nm</tt>).</dd>

          <dt>IR3 – Backward Compatibility</dt>
          <dd>MCP Servers MUST coexist with existing management protocols (NETCONF, SNMP).</dd>

          <dt>IR4 – Error Handling</dt>
          <dd>Clear error codes and recovery guidance MUST be provided for common failure modes (e.g., “tool not supported,” “resource locked”).</dd>
        </dl>
      </section>
    </section>

    <section anchor="security-considerations" numbered="true">
      <name>Security Considerations</name>
      <t>
        This document’s requirements (<xref target="security-reqs"/>) are designed to mitigate risks inherent in AI-driven network control, including prompt injection, unauthorized configuration changes, and data leakage. Additional considerations include:
      </t>
      <ul spacing="normal">
        <li>Avoiding over-reliance on LLM determinism; critical operations should require human-in-the-loop confirmation.</li>
        <li>Ensuring MCP Server implementations undergo formal security review before deployment in production networks.</li>
      </ul>
    </section>

    <section anchor="iana-considerations" numbered="true">
      <name>IANA Considerations</name>
      <t>
        TBD
      </t>
      
    </section>
  </middle>

  <back>
    <references>
      <name>References</name>
      <reference anchor="MCP-SPEC" target="https://modelcontextprotocol.io/specification">
        <front>
          <title>Model Context Protocol Specification</title>
          <author>
            <organization>Anthropic</organization>
          </author>
          <date year="2025" month="June"/>
        </front>
      </reference>

      <reference anchor="I-D.yang-nmrg-mcp-nm">
        <front>
          <title>Applicability of MCP for the Network Management</title>
          <author initials="" surname="YUANYUANYANG" fullname="YUANYUANYANG">
            <organization>Huawei</organization>
            </author>
            <author initials="Q." surname="Wu" fullname="Qin Wu">
            <organization>Huawei</organization>
            </author>
            <author initials="D." surname="Lopez" fullname="Diego Lopez">
            <organization>Telefonica</organization>
            </author>
            <author initials="N. R." surname="Moreno" fullname="Nathalie Romo Moreno">
            <organization>Deutsche Telekom</organization>
            </author>
            <author initials="L." surname="Tailhardat" fullname="Lionel Tailhardat">
            <organization>Orange Research</organization>
            </author>
            <author initials="G." surname="Zeng" fullname="Guanming Zeng">
            <organization>Huawei</organization>
            </author>
          <date year="2025" month="October"/>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-yang-nmrg-mcp-nm-01"/>
      </reference>

      <reference anchor="I-D.zm-rtgwg-mcp-network-measurement">
        <front>
          <title>MCP-based Network Measurement Framework: Using Model Context Protocol for Intelligent Network Measurement</title>
          <author initials="G." surname="Zeng" fullname="Guanming Zeng">
            <organization>Huawei</organization>
            </author>
            <author initials="J." surname="Mao" fullname="Jianwei Mao">
            <organization>Huawei</organization>
            </author>
            <author initials="B." surname="Liu" fullname="Bing Liu">
            <organization>Huawei</organization>
            </author>
            <author initials="N." surname="Geng" fullname="Nan Geng">
            <organization>Huawei</organization>
            </author>
            <author initials="X." surname="Shang" fullname="Xiaotong Shang">
            <organization>Huawei</organization>
            </author>
            <author initials="Q." surname="Gao" fullname="Qiangzhou Gao">
            <organization>Huawei</organization>
            </author>
            <author initials="Z." surname="Li" fullname="Zhenbin Li">
            <organization>Huawei</organization>
            </author>
          <date year="2025" month="November"/>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-zm-rtgwg-mcp-network-measurement-01"/>
      </reference>

      <reference anchor="I-D.zm-rtgwg-mcp-troubleshooting">
        <front>
          <title>Using the Model Context Protocol (MCP) for Intent-Based Network Troubleshooting Automation</title>
          <author initials="G." surname="Zeng" fullname="Guanming Zeng">
            <organization>Huawei</organization>
            </author>
            <author initials="J." surname="Mao" fullname="Jianwei Mao">
            <organization>Huawei</organization>
            </author>
            <author initials="B." surname="Liu" fullname="Bing Liu">
            <organization>Huawei</organization>
            </author>
            <author initials="N." surname="Geng" fullname="Nan Geng">
            <organization>Huawei</organization>
            </author>
            <author initials="X." surname="Shang" fullname="Xiaotong Shang">
            <organization>Huawei</organization>
            </author>
            <author initials="Q." surname="Gao" fullname="Qiangzhou Gao">
            <organization>Huawei</organization>
            </author>
            <author initials="Z." surname="Li" fullname="Zhenbin Li">
            <organization>Huawei</organization>
            </author>
          <date year="2025" month="November"/>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-zm-rtgwg-mcp-troubleshooting-01"/>
      </reference>
    </references>
  </back>
</rfc>