<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cui-nmrg-llm-nm-01" category="info" consensus="true" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="LLM4Net">A Framework for LLM Agent-Assisted Network Management with Human-in-the-Loop</title>
    <seriesInfo name="Internet-Draft" value="draft-cui-nmrg-llm-nm-01"/>
    <author initials="Y." surname="Cui" fullname="Yong Cui">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100084</code>
          <country>China</country>
        </postal>
        <email>cuiyong@tsinghua.edu.cn</email>
        <uri>http://www.cuiyong.net/</uri>
      </address>
    </author>
    <author initials="M." surname="Xing" fullname="Mingzhe Xing">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>xingmz@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="L." surname="Zhang" fullname="Lei Zhang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <region>Beijing</region>
          <code>100094</code>
          <country>China</country>
        </postal>
        <email>zhanglei@zgclab.edu.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="18"/>
    <area>IRTF</area>
    <workgroup>Network Management</workgroup>
    <keyword>Large Language Model</keyword>
    <keyword>Autonomous Agent</keyword>
    <keyword>Network Management</keyword>
    <keyword>Human in The Loop</keyword>
    <abstract>
      <?line 131?>

<t>This document defines an interoperable framework that facilitates collaborative network management between Large Language Models (LLMs) agents and human operators. The proposed framework introduces an enhanced telemetry module, an LLM agent decision module, and interaction data models between human operators and LLM agent-driven systems, and workflows to enforce human oversight. The approach ensures compatibility with existing network management systems and protocols while improving automation and decision-making capabilities in network operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://xmzzyo.github.io/draft_llm_nm/draft-cui-nmrg-llm-nm.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-cui-nmrg-llm-nm/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network Management Research Group mailing list (<eref target="mailto:nmrg@irtf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nmrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nmrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/xmzzyo/draft_llm_nm"/>.</t>
    </note>
  </front>
  <middle>
    <?line 137?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>Traditional network automation systems often face challenges in handling unanticipated scenarios and managing complex multi-domain data dependencies. Large Language Models (LLMs) offer advanced multimodal data comprehension, adaptive reasoning, and generalization capabilities, making them a promising tool for network management and autonomous network<xref target="TM-IG1230"/>. However, full automation remains impractical due to risks such as model hallucination, operational errors, and a lack of accountability in decision-making<xref target="Huang25"/>. This document proposes a structured framework that integrates LLMs into network management through human-in-the-loop collaboration, leveraging their strengths while ensuring oversight, reliability, and operational safety.</t>
      </section>
      <section anchor="problem-statement">
        <name>Problem Statement</name>
        <t>Network management faces significant challenges, including the complexity of multi-vendor configurations, the real-time correlation of heterogeneous telemetry data, and the need for rapid responses to dynamic security threats.
LLMs offer a promising approach to addressing these challenges through their advanced multimodal data understanding and adaptive reasoning capabilities.
However, the direct application of LLMs in network management introduces several technical considerations.
These include the need for semantic enrichment of network telemetry to enhance LLM comprehension, a decision execution mechanism with confidence-based escalation, and auditability of LLM-generated decisions through provenance tracking.
Addressing these requirements is critical to integrating LLM agents effectively into network management workflows while maintaining reliability, transparency, and interoperability.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="acronyms-and-abbreviations">
        <name>Acronyms and Abbreviations</name>
        <ul spacing="normal">
          <li>
            <t>LLM: Large Language Model</t>
          </li>
          <li>
            <t>RAG: Retrieve Augmented Generation</t>
          </li>
          <li>
            <t>MCP: Model Context Protocol</t>
          </li>
          <li>
            <t>A2A: Agent-to-Agent Protocol</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="framework-overview">
      <name>Framework Overview</name>
      <artwork><![CDATA[
+-------------------------------------------------------------+
|         LLM-Agent Assisted Network Management System        |
+-------------------------------------------------------------+
|+---------------LLM Agent Decision Module-------------------+|
||                                                           ||
||               +----Task Agent Module---+  +-------------+ ||
||               | +---------------------+|  | Task Agent  <-----+
||               | |      MCP & A2A      ||<-> Mgt Module  | ||  |
||               | +---------------------+|  +-------------+ ||  |
||               | +------+  +----------+ |  |Syntax Verify| ||  |
||               | |Prompt|  |Fine-Tuned| <->|     Module  | ||  |
||               | | Lib  |  |Weight Lib| |  +-------------+ ||  |
|| +----------+  | +------+  +----------+ |  +--------------+||  |
|| |RAG Module|<-> +--------------------+ |  |Access Control|||  |
|| +-----^----+  | |Foundation Model Lib| -->|    Module    |||  |
||       |       | +--------------------+ |  +-------|------+||  |
||       |       +----^---------------^---+          |       ||  |
|+-------|------------|---------------|--------------|-------+|  |
|+-------v------------v----+ +--------v--------------v-------+|  |
||Enhanced Telemetry Module| |   Operator Audit Module       ||  |
|+-----------^-------------+ +--------------|-------------^--+|  |
+------------|------------------------------|-------------|---+  |
             |                              |       +-----v---+  |
             |                              |       |Operator <--+
             |                              |       +---------+
+------------v------------------------------v------------------+
|               Original Network Management System             |
+------------------------------^-------------------------------+
                               |
+------------------------------v-------------------------------+
|                       Physical Network                       |
+--------------------------------------------------------------+

Figure 1: The LLM-Assisted Network Management Framework
]]></artwork>
      <t>The proposed framework is shown in Figure 1, highlighting the key components of LLM agent-assisted network management.
The human operator can generate a specific task agent, e.g., fault analysis or topology optimization, using the task agent management module by specifying foundation model, prompt, and adaptation fine-tuned parameters<xref target="Hu22"/>.
The enhanced telemetry module improves the semantics of raw telemetry data from original network management system, providing supplementary information to the LLM agent decision module for more informed decision-making.
After the decision-making, the generated configuration parameters are validated against the YANG model and enforced with access control rules.
The operator audit module provides a structured mechanism for human oversight of LLM-generated configurations, and the configuration can be issued to the original network management system for deployment once the operator approves.</t>
      <section anchor="enhanced-telemetry-module">
        <name>Enhanced Telemetry Module</name>
        <t>The Enhanced Telemetry Module improves the semantics of raw telemetry data, providing supplementary information to the LLM agent decision module for more informed decision-making.
Telemetry data retrieved from network devices via NETCONF<xref target="RFC6241"/>, e.g., in XML format, often lacks field descriptions, structured metadata, and vendor-specific details. Since this information is not included in the pre-trained knowledge of LLMs, it can lead to misinterpretation and erroneous reasoning.
To address this limitation, an external knowledge base should be introduced to store YANG model schema, device manuals, and other relevant documentation.
The Enhanced Telemetry Module functions as middleware between the network management system and the external knowledge base. Through its southbound interface, it retrieves NETCONF data from the NETCONF client of existing network management system. Through its northbound interface, the module queries the external knowledge base for the corresponding YANG model or device manual.
To enhance semantic richness, the Enhanced Telemetry Module processes the retrieved data by simplifying formatted content (e.g., removing redundant or closing XML tags) and appending XML path and description information from the YANG tree to the relevant fields. This approach ensures that the LLM has access to structured, contextually enriched data, improving its ability to analyze and reason about network telemetry.</t>
      </section>
      <section anchor="llm-agent-decision-module">
        <name>LLM Agent Decision Module</name>
        <section anchor="rag-module">
          <name>RAG Module</name>
          <t>The pre-trained LLM may not encompass specific task requirements or vendor-specific knowledge. To address this kind of limitation, the Retrieve-Augmented Generation (RAG)<xref target="Lewis20"/> approach is widely used. This module retrieves relevant information from operator-defined sources, such as device documentation and expert knowledge, and integrates it with the Enhanced Telemetry Module to obtain YANG model schema.
The retrieved textual data is stored in a database, either as raw text or in a vectorized format for efficient search and retrieval. For a given task context, the module retrieves relevant knowledge from the database and incorporates it into the input context, improving the understanding and response accuracy of LLM.</t>
        </section>
        <section anchor="task-agent-module">
          <name>Task Agent Module</name>
          <t>To execute a specific task, such as traffic analysis, traffic optimization, or fault remediation, a corresponding task agent must be created. A task agent consists of a selected LLM foundation model, an associated prompt, and fine-tuned weights.</t>
          <ul spacing="normal">
            <li>
              <t>Foundation Model Library. Operators must select an appropriate foundation model based on the specific task requirements. Examples include general-purpose models such as GPT-4, LLaMA, and DeepSeek, as well as domain-specific models fine-tuned on private datasets. Since foundation models are trained on different datasets using varying methodologies, their performance may differ across tasks.</t>
            </li>
            <li>
              <t>Fine-Tuned Weight Library. For domain-specific applications, fine-tuned weights can be applied on top of a foundation model to efficiently adapt it to private datasets. One commonly used approach is to store the fine-tuned weights as the difference between the original foundation model and the adapted model, which can largely reduce storage requirements.
The Fine-Tuned Weights Module supports the selection and loading of an appropriate foundation model along with the corresponding fine-tuned weights, based on the selection of operators. This ensures flexibility in leveraging both general-purpose and domain-specific knowledge while maintaining computational efficiency.</t>
            </li>
            <li>
              <t>Prompt Library. For each task, it is essential to accurately define the task description, the format of its inputs and outputs. These definitions are stored in a structured prompt library. When an operator instantiates a task, the corresponding prompt, including placeholders for contextual information, is automatically retrieved. operator inputs and device data are then incorporated into the prompt at the designated placeholders, ensuring a structured and consistent interaction with the language model.</t>
            </li>
          </ul>
        </section>
        <section anchor="task-agent-communication-module">
          <name>Task Agent Communication Module</name>
          <t>Task agent can interact with external tools (e.g., Python scripts, Batfish or ILP solver) to acquire additional knowledge and perform specific actions.
The Model Context Prtocol (MCP)<xref target="mcp"/> enables task agents to securely and efficiently interact with external tools and services.
MCP defines a standardized interface for tool invocation, data exchange, and state synchronization between the agent and external systems.
MCP consists of two primary components:</t>
          <ul spacing="normal">
            <li>
              <t>MCP Client: Embedded within the task agent, the MCP client is responsible for:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Serializing agent-generated tool invocation requests into structured MCP messages.</t>
                </li>
                <li>
                  <t>Managing authentication and session tokens for secure tool access.</t>
                </li>
                <li>
                  <t>Handling timeouts, retries, and error propagation from tool responses.</t>
                </li>
                <li>
                  <t>Injecting tool outputs back into the agent context as structured observations.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>MCP Server: Hosted alongside or within external tools, the MCP server:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Exposes a well-defined set of capabilities via a manifest (e.g., <tt>tool_name</tt>, <tt>tool_description</tt>, <tt>input_schema</tt>, <tt>output_schema</tt>, <tt>authentication_method</tt>).</t>
                </li>
                <li>
                  <t>Validates incoming MCP requests against the tool’s schema and permissions.</t>
                </li>
                <li>
                  <t>Executes the requested operation and returns structured results in a deterministic format.</t>
                </li>
                <li>
                  <t>Supports streaming for long-running operations (e.g., iterative optimization or real-time telemetry polling).</t>
                </li>
              </ul>
            </li>
          </ul>
          <t>In many complex scenarios, multiple task agents may collaborate to achieve a shared network management objective.
The Agent-to-Agent Protocol (A2A)<xref target="a2a"/> is a coordination protocol that enables multiple task agents to exchange information, delegate subtasks, negotiate resource usage, and synchronize execution states in a distributed network management environment. A2A ensures semantic interoperability, temporal consistency, and conflict avoidance across heterogeneous agents.
Key design principles of A2A include:</t>
          <ul spacing="normal">
            <li>
              <t>Decentralized orchestration: No central controller is required; agents coordinate peer-to-peer using shared intents and commitments.</t>
            </li>
            <li>
              <t>Intent-based messaging: Communication is driven by high-level intents (e.g., “optimize latency for flow X”) rather than low-level commands, allowing flexibility in implementation.</t>
            </li>
            <li>
              <t>State-aware handoffs: Agents share partial execution states (e.g., intermediate results, constraints, confidence scores) to enable context-preserving collaboration.</t>
            </li>
          </ul>
          <t>Additionally, A2A integrates with the Task Agent Management Module to dynamically spawn or terminate agents based on collaboration needs, ensuring scalability and resource efficiency.</t>
        </section>
        <section anchor="task-agent-management-module">
          <name>Task Agent Management Module</name>
          <t>The Task Agent Management Module is responsible for the creation, update, and deletion of task agents. This module ensures that each agent is appropriately configured to align with the intended network management objective.</t>
          <t>The agent lifecycle operations are defined as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>Creation of Task Agents.
A task agent is instantiated in response to an operator request, an automated policy trigger, or a higher-level orchestration workflow. The creation process involves the following steps:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Intent Parsing: The module parses the high-level intent (e.g., “remediate BGP flapping on router R5”) to identify the required task type, target network scope, and performance constraints.</t>
                </li>
                <li>
                  <t>Agent Template Selection: Based on the parsed intent, the module selects a pre-registered agent template from the Prompt Library.</t>
                </li>
                <li>
                  <t>Resource Allocation: The module allocates necessary compute resources (CPU/GPU, memory) and instantiates the LLM runtime environment.</t>
                </li>
                <li>
                  <t>Context Initialization: The agent is initialized with: Network context (e.g., device inventory, topology from Enhanced Telemetry), security credentials, and session ID and logging context for auditability.</t>
                </li>
                <li>
                  <t>Registration: The newly created agent is registered with its metadata, status (“initializing”), and heartbeat endpoint.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Update of Task Agents.
Task agents may require updates due to changing network conditions, model improvements, or revised operator policies. Updates should be performed in a non-disruptive manner whenever possible:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Configuration Update: Operators or automated controllers may modify agent parameters (e.g., optimization thresholds, output verbosity).</t>
                </li>
                <li>
                  <t>Model or Weight Swapping: If a newer fine-tuned weight version becomes available, the module can hot-swap the adapter weights while preserving the agent’s execution state, provided the base foundation model remains compatible.</t>
                </li>
                <li>
                  <t>State Preservation: During updates, the module snapshots the agent’s working memory (e.g., conversation history, intermediate plans) and restores it post-update to maintain task continuity.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>Deletion of Task Agents.
Task agents are terminated when their assigned task completes, when an unrecoverable error occurs, or upon an explicit teardown request. The deletion process ensures proper resource reclamation and audit compliance:
              </t>
              <ul spacing="normal">
                <li>
                  <t>Graceful Shutdown: The module issues a termination signal, allowing the agent to complete any pending operations (e.g., commit configuration changes, MCP calls, A2A communications).</t>
                </li>
                <li>
                  <t>State Archival: The final agent state, including input context, generated actions, and performance metrics, is serialized and stored in the Audit Log for replayability and compliance.</t>
                </li>
                <li>
                  <t>Resource Deallocation: Compute resources (GPU memory, threads) are released, and MCP sessions are invalidated.</t>
                </li>
                <li>
                  <t>Deregistration: The agent entry is removed, and its lifecycle event is logged.</t>
                </li>
              </ul>
            </li>
          </ol>
          <t>By providing structured, auditable, and policy-governed lifecycle management, the Task Agent Management Module enables scalable and trustworthy deployment of LLM Agent-driven network automation.</t>
        </section>
      </section>
      <section anchor="config-verification-module">
        <name>Config Verification Module</name>
        <section anchor="syntax-validation-module">
          <name>Syntax Validation Module</name>
          <t>To ensure correctness and policy compliance, LLM-generated configurations must pass the YANG schema validation steps before being queued for human approval.
This module ensures that only syntactically correct configurations are presented for operator review, thereby reducing errors and enhancing network reliability.</t>
        </section>
        <section anchor="access-control-module">
          <name>Access Control Module</name>
          <t>Although the Configuration Verify Module can guarantee the syntactic correction, LLMs may generate unintended or potentially harmful operations on critical network devices, it is essential for operators to enforce clear permission boundaries for LLM task agent to ensure security and operational integrity.
The Network Configuration Access Control Model defined in <xref target="RFC8341"/> provides a framework for specifying access permissions, which can be used to grant access to LLM task agents. This data model includes the concepts of users, groups, access operation types, and action types, which can be applied as follows:</t>
          <ul spacing="normal">
            <li>
              <t>User and Group: Each task agent should be registered as a specific user, representing an entity with defined access permissions for particular devices. These permissions control the types of operations the LLM is authorized to perform. A task agent (i.e., user) is identified by a unique string within the system. Access control can also be applied at the group level, where a group consists of zero or more members, and a task agent can belong to multiple groups.</t>
            </li>
            <li>
              <t>Access Operation Types: These define the types of operations permitted, including create, read, update, delete, and execute. Each task agent may support different sets of operations depending on its assigned permissions.</t>
            </li>
            <li>
              <t>Action Types: These specify whether a given operation is permitted or denied. This mechanism determines whether an LLM request to perform an operation is allowed based on predefined access control rules.</t>
            </li>
            <li>
              <t>Rule List: A rule governs access control by specifying the content and operations a task agent is authorized to handle within the system.</t>
            </li>
          </ul>
          <t>This module must enforce explicit restrictions on the actions an LLM is permitted to perform, ensuring that network configurations remain secure and compliant with operational policies.</t>
        </section>
        <section anchor="feedback-module">
          <name>Feedback Module</name>
          <t>As the generated configuration might not be always aligned with YANG model schema, access control, or bussiness constrains, they need further modification to meet the multi-dimensional requirements. The Feedback Module is used to provide semantic-rich feedback (e.g., represented in structure text) and hints to LLM agent to improve the generated configuration.</t>
        </section>
      </section>
      <section anchor="operator-audit-module">
        <name>Operator Audit Module</name>
        <t>The Operator Audit Module provides a structured mechanism for human oversight of LLM-generated configurations before deployment.
The output from the LLM Decision Module should include both the generated configuration parameters and an associated confidence score.
The configuration parameters are validated for compliance with the YANG model and are subject to Access Control Rules enforcement.
The confidence score, e.g., ranging from 0 to 100, serves as a reference for operators to assess the reliability of the generated configuration.
Each audit process must track the input context (e.g., input data, RAG query content, model selection, configuration files) and the corresponding output results. The auditing steps are as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Result Verification: The operator verifies the LLM-generated output to ensure alignment with business objectives and policy requirements.</t>
          </li>
          <li>
            <t>Compliance Check: The operator ensures that the LLM output adheres to regulatory standards and legal requirements.</t>
          </li>
          <li>
            <t>Security Verification: The operator examines the output for potential security risks, such as misconfigurations or vulnerabilities.</t>
          </li>
          <li>
            <t>Suggestions and Corrections: If issues are identified, the operator documents the findings and proposes corrective actions.</t>
          </li>
        </ul>
        <t>Upon completing the audit, the system maintains an audit decision record to ensure traceability of operator actions. The audit record includes the following information:</t>
        <ul spacing="normal">
          <li>
            <t>Timestamp of the audit action</t>
          </li>
          <li>
            <t>LLM Task Agent ID associated with the action</t>
          </li>
          <li>
            <t>Operator decisions, including approval, rejection, modification, or pending status</t>
          </li>
          <li>
            <t>Executed command reflecting the final action taken</t>
          </li>
          <li>
            <t>Operation type (e.g., configuration update, deletion, or execution)</t>
          </li>
        </ul>
        <t>This structured approach ensures that all LLM-generated configurations undergo rigorous human review, maintaining operational accountability, and security.</t>
        <t>The Operator Audit Module is enhanced with Explainability functionality to improve transparency and trust in LLM-assisted decision-making. This enhancement ensures that operators can understand the reasoning behind LLM-generated configurations, verify their reliability, and take corrective actions when necessary.</t>
        <t>To achieve Explainability, the module provides a structured breakdown of the decision-making process by capturing key influencing factors, justification logs, and confidence scores. Each LLM-generated configuration must include a detailed rationale explaining why a particular decision was made. For example, if the system recommends increasing bandwidth allocation, the decision log should indicate whether this was due to high latency detected in telemetry, SLA thresholds being exceeded, or other contributing factors.</t>
        <t>Additionally, the audit process incorporates counterfactual analysis, allowing operators to assess alternative outcomes. For instance, the system may indicate that if no action is taken, packet loss is expected to increase by 20% in the next ten minutes. This capability enhances operational decision-making by providing a comparative assessment of different actions.</t>
        <t>To further ensure reliability, the module includes a mechanism to detect potential biases or hallucinations in LLM-generated outputs. If an LLM agent decision is based on incomplete or uncertain data, the system flags it accordingly, allowing operators to make informed judgments. For example, if real-time telemetry data is insufficient, the system may indicate that the confidence in a particular recommendation is low.</t>
        <t>By integrating these Explainability features, the Operator Audit Module strengthens human oversight, ensuring that LLM-generated configurations align with business policies, security requirements, and regulatory standards. This structured approach enhances accountability and mitigates risks associated with automated decision-making.</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <section anchor="ddos-intelligent-defense">
        <name>DDoS Intelligent Defense</name>
        <t>Distributed Denial of Service (DDoS) attacks remain a critical operational threat. While conventional systems use rate-limiting and signature matching, they often fail to adapt in real-time or generate fine-grained filtering rules based on multi-dimensional telemetry data.</t>
        <t>This use case demonstrates how the LLM agent-assisted framework enables intelligent filtering rule generation and secure deployment with human oversight.</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Telemetry Collection and Semantic Enrichment</strong>
The Enhanced Telemetry Module retrieves real-time traffic statistics and interface metrics from network devices using NETCONF. These raw telemetry data are semantically enriched by referencing YANG models and device-specific documentation to generate a context-rich dataset suitable for LLM processing.</t>
          </li>
          <li>
            <t><strong>DDoS Filtering Task Instantiation</strong>
The operator initiates a <tt>ddos-mitigation</tt> task. The Task Agent Module selects a security-specialized foundation model and task-specific prompt.  </t>
            <t>
It first analyzes the following conclusions:
- Interface <tt>GigabitEthernet0/1</tt> receiving sustained traffic &gt; 100,000 pps
- 95% of incoming packets are TCP SYN
- Top source prefixes identified as: <tt>IP1/24</tt>, <tt>IP2/24</tt>  </t>
            <t>
The RAG Module supplements the analysis with:
- Cisco ACL syntax documentation
- Prior incident response templates</t>
          </li>
          <li>
            <t><strong>LLM-Generated Firewall Configuration Output</strong>
The LLM agent reasons that a TCP SYN flood is underway and generates the following ACL-based filtering policy:</t>
          </li>
        </ol>
        <sourcecode type="shell"><![CDATA[
ip access-list extended BLOCK-DDOS
deny tcp IP1 0.0.0.255 any
deny tcp IP2 0.0.0.255 any
permit ip any any

interface GigabitEthernet0/1
ip access-group BLOCK-DDOS in
]]></sourcecode>
        <t>This configuration includes both source-based filtering and a global SYN rate-limiter. It is passed to the Config Verify Module for syntax validation and to the Access Control Module for permission checks.</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Operator Audit and Decision</strong>
The Operator Audit Module provides the following metadata:</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t><strong>Task Agent ID</strong>: <tt>ddos-mitigation-task-01</tt></t>
          </li>
          <li>
            <t><strong>Confidence Score</strong>: 85/100</t>
          </li>
          <li>
            <t><strong>RAG Context</strong>: <tt>Cisco IOS ACL Syntax</tt>, <tt>Internal Threat List v5</tt></t>
          </li>
          <li>
            <t><strong>Input Summary</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Affected Interface: <tt>GigabitEthernet0/1</tt></t>
              </li>
              <li>
                <t>Malicious Sources: <tt>IP1/24</tt>, <tt>IP2/24</tt></t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The human operator performs the audit with the following steps:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Result Verification</strong>: ACL syntax matches Cisco IOS 15.6 standards.</t>
          </li>
          <li>
            <t><strong>Compliance Check</strong>: Confirmed that both prefixes appear in the enterprise blacklist.</t>
          </li>
          <li>
            <t><strong>Security Review</strong>: Low false-positive risk for blanket deny of SYN traffic from identified prefixes.</t>
          </li>
          <li>
            <t><strong>Audit Record</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Timestamp: <tt>2025-07-16T17:03:00Z</tt></t>
              </li>
              <li>
                <t>Decision: <em>Approved</em></t>
              </li>
              <li>
                <t>Action: <tt>Apply via NMS interface</tt></t>
              </li>
              <li>
                <t>Operator Note: “Confirmed match with active threat list. Monitor for collateral traffic drops.”</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The configuration is deployed through the network management system, completing the defense workflow with human oversight and traceability.</t>
        <t>This simplified case shows how the LLM agent can assist in quickly generating actionable filtering rules in response to DDoS patterns, while adhering to operational safeguards.</t>
      </section>
      <section anchor="traffic-scheduling-and-optimization">
        <name>Traffic Scheduling and Optimization</name>
        <t>In large-scale networks, dynamic traffic scheduling is required to adapt to fluctuating loads, ensure QoS, and meet SLA requirements. Traditional methods may lack responsiveness or cross-domain visibility.</t>
        <t>The proposed framework enables intelligent, context-aware traffic scheduling through LLM agent-based reasoning. The following illustrates the process:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Telemetry Data Acquisition</strong>
The Enhanced Telemetry Module gathers link utilization, queue occupancy, and delay metrics from multiple routers. The semantic enrichment process tags each metric with human-readable labels from the YANG model, including path topology and policy tags (e.g., gold/silver/bronze service classes).</t>
          </li>
          <li>
            <t><strong>Optimization Task Execution</strong>
An operator initiates a traffic scheduling task. The Task Agent Module selects a foundation model fine-tuned on traffic engineering datasets and uses a structured prompt to describe current constraints: high utilization on core links <tt>L1-L3</tt>, SLA violations for gold-class VoIP traffic.</t>
          </li>
          <li>
            <t><strong>Sample Configuration Output</strong>
The LLM agent suggests adjusting RSVP-TE path metrics to reroute gold traffic via underutilized backup paths:</t>
          </li>
        </ol>
        <sourcecode type="shell"><![CDATA[
policy-options {
    policy-statement reroute-gold {
        term gold-traffic {
            from {
                community gold-voip;
            }
            then {
                metric 10;
                next-hop [IP];
            }
        }
    }
}
protocols {
    rsvp {
        interface ge-0/0/0 {
            bandwidth 500m;
        }
    }
}
]]></sourcecode>
        <t>This configuration is syntax-validated and checked against the Access Control Module to ensure that traffic engineering policy updates are permitted for this task agent.</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Operator Audit and Decision</strong>
The Operator Audit Module presents:</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t><strong>Confidence Score</strong>: 91/100</t>
          </li>
          <li>
            <t><strong>Audit Metadata</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Task Agent: <tt>traffic-opt-te-v2</tt></t>
              </li>
              <li>
                <t>Input Context: “Link L1 (95% utilization), gold-voip SLA latency breach”</t>
              </li>
              <li>
                <t>Recommendation: “Increase TE path metric to reroute VoIP via L2 backup path”</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The operator reviews:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Result Verification</strong>: Simulates expected path shift via NMS.</t>
          </li>
          <li>
            <t><strong>Compliance Check</strong>: Confirms SLA routing rules permit TE adjustment.</t>
          </li>
          <li>
            <t><strong>Security Review</strong>: Confirms backup link L2 is secure and isolated.</t>
          </li>
          <li>
            <t><strong>Final Action</strong>: <em>Approved with modification</em>: “Set bandwidth cap to 400m on backup to avoid overuse.”</t>
          </li>
        </ul>
        <t>The revised configuration is stored and forwarded to the network management system for application.</t>
        <t>This use case illustrates how the framework enables LLM agents to propose adaptive, policy-compliant traffic engineering strategies while maintaining operator control, traceability, and auditability.</t>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <ul spacing="normal">
        <li>
          <t>Model Hallucination: A key challenge is that, without proper constraints, the LLM agent may produce malformed or invalid configurations. This issue can be mitigated using techniques such as Constrained Decoding, which enforces syntactic correctness by modeling the configuration syntax and restricting the output to conform to predefined rules during the generation process.</t>
        </li>
        <li>
          <t>Training Data Poisoning: LLMs can be trained on malicious or biased data, potentially leading to unintended behavior or security vulnerabilities. To mitigate this risk, LLMs should be trained on curated, high-quality datasets with rigorous validation and filtering processes. Periodic retraining and adversarial testing should also be conducted to detect and correct anomalies before deployment.</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="TM-IG1230">
          <front>
            <title>Autonomous Networks Technical Architecture</title>
            <author initials="K." surname="McDonnell" fullname="Kevin McDonnell">
              <organization/>
            </author>
            <author initials="A." surname="Machwe" fullname="Azahar Machwe">
              <organization/>
            </author>
            <author initials="D." surname="Milham" fullname="Dave Milham">
              <organization/>
            </author>
            <author initials="J." surname="O’Sullivan" fullname="James O’Sullivan">
              <organization/>
            </author>
            <author initials="J." surname="Niemöller" fullname="Jörg Niemöller">
              <organization/>
            </author>
            <author initials="L. F." surname="Varvello" fullname="Luca Franco Varvello">
              <organization/>
            </author>
            <author initials="V." surname="Devadatta" fullname="Vinay Devadatta">
              <organization/>
            </author>
            <author initials="W." surname="Lei" fullname="Wang Lei">
              <organization/>
            </author>
            <author initials="W." surname="Xu" fullname="Wang Xu">
              <organization/>
            </author>
            <author initials="X." surname="Yuan" fullname="Xie Yuan">
              <organization/>
            </author>
            <author initials="Y." surname="Stein" fullname="Yuval Stein">
              <organization/>
            </author>
            <date year="2023" month="February"/>
          </front>
        </reference>
        <reference anchor="Huang25">
          <front>
            <title>A Survey on Hallucination in Large Language Models Principles, Taxonomy, Challenges, and Open Questions</title>
            <author initials="L." surname="Huang," fullname="Lei Huang,">
              <organization/>
            </author>
            <author initials="W." surname="Yu" fullname="Weijiang Yu">
              <organization/>
            </author>
            <author initials="W." surname="Ma" fullname="Weitao Ma">
              <organization/>
            </author>
            <author initials="W." surname="Zhong" fullname="Weihong Zhong">
              <organization/>
            </author>
            <author initials="Z." surname="Feng" fullname="Zhangyin Feng">
              <organization/>
            </author>
            <author initials="H." surname="Wang" fullname="Haotian Wang">
              <organization/>
            </author>
            <author initials="Q." surname="Chen" fullname="Qianglong Chen">
              <organization/>
            </author>
            <author initials="W." surname="Peng" fullname="Weihua Peng">
              <organization/>
            </author>
            <author initials="X." surname="Feng" fullname="Xiaocheng Feng">
              <organization/>
            </author>
            <author initials="B." surname="Qin" fullname="Bing Qin">
              <organization/>
            </author>
            <author initials="T." surname="Liu" fullname="Ting Liu">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Hu22">
          <front>
            <title>LoRA Low-Rank Adaptation of Large Language Models</title>
            <author initials="E. J." surname="Hu" fullname="Edward J Hu">
              <organization/>
            </author>
            <author initials="Y." surname="Shen" fullname="Yelong Shen">
              <organization/>
            </author>
            <author initials="P." surname="Wallis" fullname="Phillip Wallis">
              <organization/>
            </author>
            <author initials="Z." surname="Allen-Zhu" fullname="Zeyuan Allen-Zhu">
              <organization/>
            </author>
            <author initials="Y." surname="Li" fullname="Yuanzhi Li">
              <organization/>
            </author>
            <author initials="S." surname="Wang" fullname="Shean Wang">
              <organization/>
            </author>
            <author initials="L." surname="Wang" fullname="Lu Wang">
              <organization/>
            </author>
            <author initials="W." surname="Chen" fullname="Weizhu Chen">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="Lewis20">
          <front>
            <title>Retrieval-augmented generation for knowledge-intensive NLP tasks</title>
            <author initials="P." surname="Lewis" fullname="Patrick Lewis">
              <organization/>
            </author>
            <author initials="E." surname="Perez" fullname="Ethan Perez">
              <organization/>
            </author>
            <author initials="A." surname="Piktus" fullname="Aleksandra Piktus">
              <organization/>
            </author>
            <author initials="F." surname="Petroni" fullname="Fabio Petroni">
              <organization/>
            </author>
            <author initials="V." surname="Karpukhin" fullname="Vladimir Karpukhin">
              <organization/>
            </author>
            <author initials="N." surname="Goyal" fullname="Naman Goyal">
              <organization/>
            </author>
            <author initials="H." surname="Küttler" fullname="Heinrich Küttler">
              <organization/>
            </author>
            <author initials="M." surname="Lewis" fullname="Mike Lewis">
              <organization/>
            </author>
            <author initials="W.-t." surname="Yih" fullname="Wen-tau Yih">
              <organization/>
            </author>
            <author initials="T." surname="Rocktäschel" fullname="Tim Rocktäschel">
              <organization/>
            </author>
            <author initials="S." surname="Riede" fullname="Sebastian Riede">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="mcp" target="https://modelcontextprotocol.io/introduction">
          <front>
            <title>Model Context Protocol</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="a2a" target="https://developers.googleblog.com/en/a2a-a-new-era-of-agent-interoperability/">
          <front>
            <title>Announcing the Agent2Agent Protocol (A2A)</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 486?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thanks Shailesh Prabhu from Nokia for his contributions to this document.</t>
    </section>
    <section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="appendix-a1-data-model">
        <name>Appendix A.1 Data Model</name>
        <t>This section defines the essential data models for LLM agent-assisted network management, including the LLM agent decision response and human audit records.</t>
        <section numbered="false" anchor="llm-response-data-model">
          <name>LLM Response Data Model</name>
          <t>The LLM agent decision module should respond with the generated configuration parameters along with an associated confidence score. If the LLM is unable to generate a valid configuration, it should return an error message accompanied by an explanation of the issue.</t>
          <sourcecode type="yang"><![CDATA[
module: llm-response-module
  +--rw llm-response
     +--rw config?         string
     +--rw confidence?     uint64
     +--rw error-reason?   enumeration
]]></sourcecode>
          <t>The LLM response YANG model is structured as follows:</t>
          <sourcecode type="yang"><![CDATA[
module llm-response-module {
  namespace "urn:ietf:params:xml:ns:yang:ietf-nmrg-llmn4et";
  prefix llmresponse;
  container llm-response {
    leaf config {
      type string;
    }
    leaf confidence {
      type uint64;
    }
    leaf error-reason {
      type enumeration {
        enum unsupported-task;
        enum unsupported-vendor;
      }
    }
  }
}
]]></sourcecode>
        </section>
        <section numbered="false" anchor="human-audit-data-model">
          <name>Human Audit Data Model</name>
          <t>This data model defines the structure for human audit operations and record-keeping. It facilitates collaborative decision-making by allowing LLMs to generate actionable insights while ensuring that human operators retain final operational authority.</t>
          <sourcecode type="yang"><![CDATA[
module: human-audit-module
  +--rw human-audit
     +--rw task-id?      string
     +--rw generated-config?   string
     +--rw confidence?         int64
     +--rw human-actions
        +--rw operator?          string
        +--rw action?            enumeration
        +--rw modified-config?   string
        +--rw timestamp?         yang:date-and-time
]]></sourcecode>
          <t>The human audit YANG model is structured as follows:</t>
          <sourcecode type="yang"><![CDATA[
module human-audit-module {
  namespace "urn:ietf:params:xml:ns:yang:ietf-nmrg-llmn4et";
  prefix llmaudit;
  import ietf-yang-types { prefix yang; }

  container human-audit {
    leaf task-id {
      type string;
      }
    leaf generated-config {
      type string;
      }
    leaf confidence {
      type int64;
      }
    container human-actions {
      leaf operator {
        type string;
        }
      leaf action {
        type enumeration {
          enum approve;
          enum modify;
          enum reject;
          }
        }
      leaf modified-config {
        type string;
        }
      leaf timestamp {
        type yang:date-and-time;
        }
    }
  }
}
]]></sourcecode>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
