- Table of Contents
-
- 12-Network Management and Monitoring Command Reference
- 00-Preface
- 01-System maintenance and debugging commands
- 02-NQA commands
- 03-iNQA commands
- 04-NTP commands
- 05-PTP commands
- 06-Network synchronization commands
- 07-PoE commands
- 08-SNMP commands
- 09-RMON commands
- 10-NETCONF commands
- 11-SmartMC commands
- 12-EPA commands
- 13-CWMP commands
- 14-EAA commands
- 15-Process monitoring and maintenance commands
- 16-Sampler commands
- 17-Mirroring commands
- 18-NetStream commands
- 19-IPv6 NetStream commands
- 20-NetAnalysis commands
- 21-sFlow commands
- 22-Information center commands
- 23-GOLD commands
- 24-Packet capture commands
- 25-VCF fabric commands
- 26-Cloud connection commands
- 27-EPS agent commands
- 28-eMDI commands
- 29-SQA commands
- 30-Performance management commands
- 31-TCP connection trace commands
- Related Documents
-
Title | Size | Download |
---|---|---|
10-NETCONF commands | 132.77 KB |
netconf capability specific-namespace
netconf soap https ssl-server-policy
reset netconf service statistics
reset netconf session statistics
snmp-agent trap enable netconf
NETCONF commands
MDC is supported only when the device operates in standalone mode. For more information about standalone mode, see IRF configuration in Virtual Technologies Configuration Guide. For more information about MDC and device models that support MDC, see MDC configuration in Virtual Technologies Configuration Guide.
The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide.
display netconf service
Use display netconf service to display current NETCONF service status and global NETCONF service statistics.
Syntax
display netconf service
Views
Any view
Predefined user roles
network-admin
network-operator
mdc-admin
mdc-operator
Examples
# Display the current NETCONF service status and global NETCONF service statistics.
<Sysname> display netconf service
NETCONF over SOAP over HTTP: Enabled (port 80)
NETCONF over SOAP over HTTPS: Enabled (port 443)
NETCONF over SSH: Enabled (port 830)
NETCONF over Telnet: Enabled
NETCONF over Console: Enabled
SOAP timeout: 10 minutes Agent timeout: 10 minutes
Active sessions: 1
Service statistics:
NETCONF start time: 2015-10-10T08:08:08
Output notifications: 50
Output RPC errors: 20
Dropped sessions: 0
Sessions: 100
Received bad hellos: 0
Received RPCs: 1000
Received bad RPCs: 20
Table 1 Command output
Field |
Description |
NETCONF over SOAP over HTTP |
Enabling state (Enabled or Disabled) of NETCONF over SOAP over HTTP, followed by the service listening port number in brackets. |
NETCONF over SOAP over HTTPS |
Enabling state (Enabled or Disabled) of NETCONF over SOAP over HTTPS, followed by the service listening port number in brackets. |
NETCONF over SSH |
Enabling state (Enabled or Disabled) of NETCONF over SSH, followed by the service listening port number in brackets. |
NETCONF over Telnet |
Enabling state (Enabled or Disabled) of NETCONF over Telnet, followed by the service listening port number in brackets. |
NETCONF over Console |
Enabling state (Enabled or Disabled) of NETCONF over console, followed by the service listening port number in brackets. |
SOAP timeout |
NETCONF session idle timeout time (in minutes) for NETCONF over SOAP over HTTP sessions and NETCONF over SOAP over HTTPS sessions. The value range is 1 to 999. |
Agent timeout |
NETCONF session idle timeout time (in minutes) for NETCONF over SSH sessions, NETCONF over Telnet sessions, and NETCONF over console sessions. The value range is 0 to 999. If this parameter is set to 0, the NETCONF over SSH, NETCONF over Telnet, and NETCONF over console sessions will never age out. |
Active sessions |
Number of active NETCONF sessions. |
Service statistics |
Operational NETCONF service statistics: · NETCONF start time—Time when the NETCONF service was started. · Output notifications—Number of subscribed notifications output by the device. · Output RPC errors—Number of erroneous RPC requests output by the device. · Dropped sessions—Number of NETCONF sessions dropped due to timeout or abnormal network disconnection. · Sessions—Number of established NETCONF sessions. · Received bad hellos—Number of received erroneous hello messages. · Received RPCs—Total number of RPC requests received by the device. · Received bad RPCs—Number of received erroneous RPC requests. |
display netconf session
Use display netconf session to display NETCONF session status and statistics.
Syntax
display netconf session
Views
Any view
Predefined user roles
network-admin
network-operator
mdc-admin
mdc-operator
Examples
# Display NETCONF session status and statistics.
<Sysname> display netconf session
Session ID: 1 Session type : SOAP
Username : xj
Login time : 2021-09-28T14:28:04
Client IP address : 172.31.9.125
Session statistics:
Received RPCs : 0 Received bad RPCs : 0
Output RPC errors: 0 Output notifications: 0
Table 2 Command output
Field |
Description |
Session ID |
ID of the NETCONF session. |
Session type |
NETCONF session type: · SOAP—NETCONF over SOAP over HTTP or NETCONF over SOAP over HTTPS. · Agent—NETCONF over SSH, NETCONF over Telnet, or NETCONF over console. |
Username |
Username used by the NETCONF client to establish the session. If the session type is agent and login authentication was not performed, this field displays a hyphen (-). |
Login time |
Time when the NETCONF session was established. |
Client IP address |
IP address of the NETCONF client. This field displays a hyphen (-) for NETCONF over console sessions. |
Received RPCs |
Number of received RPC requests. |
Received bad RPCs |
Number of received erroneous RPC requests. |
Output RPC errors |
Number of erroneous RPC requests output by the device. |
Output notifications |
Number of subscribed notifications output by the device. |
netconf capability specific-namespace
Use netconf capability specific-namespace to configure the device to use module-specific namespaces.
Use undo netconf capability specific-namespace to restore the default.
Syntax
netconf capability specific-namespace
undo netconf capability specific-namespace
Default
The device uses the common namespace.
Views
System view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
NETCONF supports both the common namespace and module-specific namespaces. The common namespace is incompatible with module-specific namespaces. To set up a NETCONF session, the device and the client must use the same type of namespaces. By default, the common namespace is used. If the client does not support the common namespace, use this command to configure the device to use module-specific namespaces.
For this command to take effect, you must reestablish the NETCONF session.
Examples
# Configure the device to use module-specific namespaces.
<Sysname> system-view
[Sysname] netconf capability specific-namespace
netconf idle-timeout
Use netconf idle-timeout to set the NETCONF session idle timeout time.
Use undo netconf idle-timeout to restore the default.
Syntax
netconf { soap | agent } idle-timeout minute
undo netconf { soap | agent } idle-timeout
Default
The NETCONF session idle timeout time is 10 minutes for NETCONF over SOAP over HTTP sessions and NETCONF over SOAP over HTTPS sessions.
The NETCONF session idle timeout time is 0 minutes for NETCONF over SSH sessions, NETCONF over Telnet sessions, and NETCONF over console sessions. The sessions never time out.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
soap: Specifies the NETCONF over SOAP over HTTP sessions and NETCONF over SOAP over HTTPS sessions.
agent: Specifies the NETCONF over SSH sessions, NETCONF over Telnet sessions, and NETCONF over console sessions.
minute: Specifies the NETCONF session idle timeout time in minutes. The value range is as follows:
· 1 to 999 for NETCONF over SOAP over HTTP sessions and NETCONF over SOAP over HTTPS sessions.
· 0 to 999 for NETCONF over SSH sessions, NETCONF over Telnet sessions, and NETCONF over console sessions. To disable the timeout feature, set this argument to 0.
Usage guidelines
If no NETCONF packets are exchanged on a NETCONF session within the NETCONF session idle timeout time, the device tears down the session.
Examples
# Set the NETCONF session idle timeout time to 20 minutes for NETCONF over SOAP over HTTP sessions and NETCONF over SOAP over HTTPS sessions.
<Sysname> system-view
[Sysname] netconf soap idle-timeout 20
netconf log
Use netconf log to enable NETCONF logging.
Use undo netconf log to remove the configuration for the specified NETCONF operation sources and NETCONF operations.
Syntax
netconf log source { all | { agent | soap | web } * } { protocol-operation { all | { action | config | get | session | set | syntax | others } * } | verbose }
undo netconf log source { all | { agent | soap | web } * } { protocol-operation { all | { action | config | get | session | set | syntax | others } * } | verbose }
Default
NETCONF logging is disabled.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
source: Specifies a NETCONF operation source that represents clients that use a protocol.
· all: Specifies NETCONF clients that use all protocols.
· agent: Specifies clients that use Telnet, SSH, NETCONF over console, or NETCONF over SSH.
· soap: Specifies clients that use SOAP over HTTP, or SOAP over HTTPS.
· web: Specifies clients that use Web.
protocol-operation: Logs requests and replies for specific types of NETCONF operations.
· all: Specifies all types of NETCONF operations.
· action: Specifies the <action> operation.
· config: Specifies the configuration-related NETCONF operations, including the <CLI>, <save>, <load>, <rollback>, <lock>, <unlock>, and <save-point> operations.
· get: Specifies the data retrieval-related NETCONF operations, including the <get>, <get-config>, <get-bulk>, <get-bulk-config>, and <get-sessions> operations.
· session: Specifies session-related NETCONF operations, including the <kill-session> and <close-session> operations, and capability exchanges by hello messages.
· set: Specifies all <edit-config> operations.
· syntax: Specifies the requests that include XML and schema errors.
· others: Specifies NETCONF operations except for those specified by keywords action, config, get, set, session, and syntax.
verbose: Logs detailed information about requests and replies for types of NETCONF operations, including the packet content of format-correct requests and error information about failed <edit-config> operations.
Usage guidelines
After you specify the protocol-operation keyword, the device logs the matching operations and their operation results on a per-request basis. For example, if the device creates VLANs 3 through 5 in response to a NETCONF request, the device outputs the following log messages:
%Mar 21 17:11:34:479 2019 Sysname XMLSOAP/6/XML_REQUEST: test from 192.168.100.198, session id 2,message-id 100, receive edit-config request.
%Mar 21 17:11:34:483 2019 Sysname XMLSOAP/6/EDIT-CONFIG: test from 192.168.100.198, session id 2,message-id 100, execute success.
For NETCONF to correctly send the generated logs to the information center, you must also configure the information center. For information about information center configuration, see Network Management and Monitoring Configuration Guide.
Examples
# Configure the device to log NETCONF edit-config information sourced from agent clients.
<Sysname> system-view
[Sysname] netconf log source agent protocol-operation set
netconf log xml2cli enable
Use netconf log xml2cli enable to enable the XML-to-CLI feature for NETCONF logging.
Use undo netconf log xml2cli enable to disable the XML-to-CLI feature for NETCONF logging.
Syntax
netconf log xml2cli enable
undo netconf log xml2cli enable
Default
The XML-to-CLI feature for NETCONF logging is disabled.
Views
System view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
To log NETCONF operations in CLI command format, use the XML-to-CLI feature for NETCONF logging. This feature converts every <action> and <edit-config> operation from their XML forms to their CLI command forms and logs the CLI commands for the operations.
For example, a NETCONF client sends the following <edit-config> request to set the link type of the specified interface to trunk, and set its PVID to 100:
<rpc message-id="100" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<edit-config>
<target>
<running/>
</target>
<config>
<Ifmgr xc:operation="merge">
<Interfaces>
<Interface>
<IfIndex>1647</IfIndex>
<LinkType>2</LinkType>
<PVID>100</PVID>
</Interface>
</Interfaces>
</Ifmgr>
</config>
</edit-config>
</rpc>
Upon execution of the requested operation, the device generates a log to record the CLI commands for the operation, as follows:
%Mar 31 17:50:02:608 2021 Sysname XMLSOAP/6/EDIT-CONFIG-CLI: User (test, 192.168.100.20, session ID 1), message ID=100, row index=1, command= Interface gigabitethernet1/0/1.
%Mar 31 17:50:02:608 2021 Sysname XMLSOAP/6/EDIT-CONFIG-CLI: User (test, 192.168.100.20, session ID 1), message ID=100, row index=1, command= port link-type trunk.
%Mar 31 17:50:02:608 2021 Sysname XMLSOAP/6/EDIT-CONFIG-CLI: User (test, 192.168.100.20, session ID 1), message ID=100, row index=1, command= port trunk pvid vlan 100.
Examples
# Enable the XML-to-CLI feature for NETCONF logging.
<Sysname> system-view
[Sysname] netconf log xml2cli enable
netconf soap acl
Use netconf soap acl to apply an IPv4 ACL to control NETCONF over SOAP access.
Use undo netconf soap acl to restore the default.
Syntax
In non-FIPS mode:
netconf soap { http | https } acl { ipv4-acl-number | name ipv4-acl-name }
undo netconf soap { http | https } acl
In FIPS mode:
netconf soap https acl { ipv4-acl-number | name ipv4-acl-name }
undo netconf soap https acl
Default
No IPv4 ACL is applied to control NETCONF over SOAP access. Any NETCONF clients can establish NETCONF over SOAP sessions with the device.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
ipv4-acl-number: Specifies a numbered IPv4 ACL by its number in the range of 2000 to 2999.
http: Applies an IPv4 ACL to control NETCONF over SOAP over HTTP access.
https: Applies an IPv4 ACL to control NETCONF over SOAP over HTTPS access.
name ipv4-acl-name: Specifies a named IPv4 basic ACL by its name. The ipv4-acl-name argument is a case-insensitive string of 1 to 63 characters. It must start with an English letter. To avoid confusion, it cannot be all.
Usage guidelines
To control NETCONF over SOAP access, specify an ACL that exists and has rules.
· If the specified ACL exists and has rules, only clients permitted by the ACL can establish NETCONF over SOAP sessions. A client cannot establish a NETCONF over SOAP session with the device if it does not match the ACL or is denied by the ACL.
· If the applied ACL does not exist or does not have rules, any NETCONF clients can establish NETCONF over SOAP sessions with the device.
· To apply an ACL rule only to a VPN instance, specify that VPN instance in the rule. If you do not specify a VPN instance, the rule applies to packets on the public network.
If you execute the netconf soap http acl command multiple times, the most recent configuration takes effect. The same is true for the netconf soap https acl command.
Examples
# Use IPv4 ACL 2001 to allow only NETCONF clients from subnet 10.10.0.0/16 to establish NETCONF over SOAP over HTTP sessions.
<Sysname> system-view
[Sysname] acl basic 2001
[Sysname-acl-ipv4-basic-2001] rule permit source 10.10.0.0 0.0.255.255
[Sysname-acl-ipv4-basic-2001] quit
[Sysname] netconf soap http acl 2001
netconf soap domain
Use netconf soap domain to specify a mandatory authentication domain for NETCONF users.
Use undo netconf soap domain to restore the default.
Syntax
netconf soap domain domain-name
undo netconf soap domain
Default
No mandatory authentication domain is specified for NETCONF users.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
domain-name: Specifies an ISP domain by its name, a case-insensitive string of 1 to 255 characters. For information about ISP domains, see Security Configuration Guide.
Usage guidelines
You can use either of the following methods to specify an authentication domain:
· Execute the netconf soap domain command to specify a mandatory authentication domain. After you execute this command, all NETCONF users are placed in the domain for authentication.
· Add an authentication domain to the <UserName> parameter of a SOAP request. The authentication domain takes effect only on the current request.
The authentication domain specified by using this command takes precedence over the authentication domain specified by the <UserName> parameter of a SOAP request.
If you execute this command multiple times, the most recent configuration takes effect.
Examples
# Specify mandatory authentication domain my-domain for NETCONF users.
<Sysname> system-view
[Sysname] netconf soap domain my-domain
netconf soap dscp
Use netconf soap dscp to set the DSCP value for outgoing NETCONF over SOAP packets.
Use undo netconf soap dscp to restore the default.
Syntax
In non-FIPS mode:
netconf soap { http | https } dscp dscp-value
undo netconf soap { http | https } dscp
In FIPS mode:
netconf soap https dscp dscp-value
undo netconf soap https dscp
Default
The DSCP value is 0 for outgoing NETCONF over SOAP packets.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
dscp-value: Specifies a DSCP value in the range of 0 to 63. A larger DSCP value represents a higher priority.
http: Specifies NETCONF over SOAP over HTTP packets.
https: Specifies NETCONF over SOAP over HTTPS packets.
Usage guidelines
The DSCP value of an IP packet specifies the priority level of the packet and affects the transmission priority of the packet.
Examples
# Set the DSCP value to 30 for outgoing NETCONF over SOAP over HTTP packets.
<Sysname> system-view
[Sysname] netconf soap http dscp 30
netconf soap enable
Use netconf soap enable to enable NETCONF over SOAP.
Use undo netconf soap enable to disable NETCONF over SOAP.
Syntax
In non-FIPS mode:
netconf soap { http | https } enable
undo netconf soap { http | https } enable
In FIPS mode:
netconf soap https enable
undo netconf soap https enable
Default
NETCONF over SOAP is disabled.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
http: Specifies NETCONF over SOAP over HTTP.
https: Specifies NETCONF over SOAP over HTTPS.
Usage guidelines
This command enables the device to resolve NETCONF messages that are encapsulated with SOAP in HTTP or HTTPS packets.
Examples
# Enable NETCONF over SOAP over HTTP.
<Sysname> system-view
[Sysname] netconf soap http enable
netconf soap https ssl-server-policy
Use netconf soap https ssl-server-policy to apply an SSL server policy to the NETCONF over SOAP over HTTPS service.
Use undo netconf soap https ssl-server-policy to restore the default.
Syntax
netconf soap https ssl-server-policy policy-name
undo netconf soap https ssl-server-policy
Default
No SSL server policy is applied to the NETCONF over SOAP over HTTPS service.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
policy-name: Specifies an SSL server policy name, a string of 1 to 31 characters.
Usage guidelines
The NETCONF over SOAP over HTTPS service will use the SSL server policy to enhance service security. For more information about SSL server policies, see SSL configuration in Security Configuration Guide.
You can execute this command only when NETCONF over SOAP over HTTPS is disabled. If the service has been enabled, disable it by using the undo netconf soap https enable command.
This command takes effect after you enable NETCONF over SOAP over HTTPS by using the netconf soap https enable command.
If you execute this command multiple times, the most recent configuration takes effect.
After NETCONF over SOAP over HTTPS is enabled, changes to the applied SSL server policy take effect only on the NETCONF over SOAP over HTTPS sessions established after the changes are made. They do not take effect on the existing NETCONF over SOAP over HTTPS sessions.
If you modify the applied SSL server policy after NETCONF over SOAP over HTTPS is enabled, the changes apply only to the NETCONF over SOAP over HTTPS sessions established subsequently. They do not take effect on the NETCONF over SOAP over HTTPS sessions that have been established before you modify the policy.
Examples
# Apply SSL server policy myssl to the NETCONF over SOAP over HTTPS service.
<Sysname> system-view
[Sysname] netconf soap https ssl-server-policy myssl
Related commands
netconf soap enable
ssl server-policy (Security Command Reference)
netconf ssh server enable
Use netconf ssh server enable to enable NETCONF over SSH.
Use undo netconf ssh server enable to disable NETCONF over SSH.
Syntax
netconf ssh server enable
undo netconf ssh server enable
Default
NETCONF over SSH is disabled.
Views
System view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
This feature allows you to use an SSH client to invoke NETCONF as an SSH subsystem. Then, you can directly use XML messages to perform NETCONF operations without using the xml command.
Before you execute this command, configure the authentication mode for users as scheme on the device. Then, the NETCONF-over-SSH-enabled user terminals can access the device through NETCONF over SSH.
Only capability set urn:ietf:params:netconf:base:1.0 is available. It is supported by both the device and user terminals.
Examples
# Enable NETCONF over SSH.
<Sysname> system-view
[Sysname] netconf ssh server enable
netconf ssh server port
Use netconf ssh server port to specify a port to listen for NETCONF over SSH session requests.
Use undo netconf ssh server port to restore the default.
Syntax
netconf ssh server port port-number
undo netconf ssh server port
Default
The device uses port 830 to listen for NETCONF over SSH session requests.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
port-number: Specifies a port by its number in the range of 1 to 65535.
Usage guidelines
Make sure the specified port is not being used by other services.
Examples
# Use port 800 to listen for NETCONF over SSH session requests.
<Sysname> system-view
[Sysname] netconf ssh server port 800
reset netconf service statistics
Use reset netconf service statistics to clear current global NETCONF service statistics.
Syntax
reset netconf service statistics
Views
User view
Predefined user roles
network-admin
mdc-admin
Examples
# Clear current global NETCONF service statistics.
<Sysname> reset netconf service statistics
reset netconf session statistics
Use reset netconf session statistics to clear current NETCONF session statistics.
Syntax
reset netconf session statistics
Views
User view
Predefined user roles
network-admin
mdc-admin
Examples
# Clear current NETCONF session statistics.
<Sysname> reset netconf session statistics
snmp-agent trap enable netconf
Use snmp-agent trap enable netconf to enable SNMP notifications for NETCONF.
Use undo snmp-agent trap enable netconf to disable SNMP notifications for NETCONF.
Syntax
snmp-agent trap enable netconf
undo snmp-agent trap enable netconf
Default
SNMP notifications are enabled for NETCONF.
Views
System view
Predefined user roles
network-admin
mdc-admin
Usage guidelines
To report critical NETCONF events to an SNMP NMS, enable SNMP notifications for NETCONF.
For NETCONF SNMP notifications to be sent correctly, you must also configure SNMP on the device. For more information about configuring SNMP, see Network Management and Monitoring Configuration Guide.
Examples
# Enable SNMP notifications for NETCONF.
<Sysname> system-view
[Sysname] snmp-agent trap enable netconf
xml
Use xml to enter XML view.
Syntax
xml
Views
User view
Predefined user roles
network-admin
network-operator
mdc-admin
mdc-operator
Usage guidelines
In XML view, use NETCONF messages to configure the device or obtain data from the device. The NETCONF operations you can perform depend on the user roles you have, as shown in Table 3.
Table 3 NETCONF operations available for the predefined user roles
User role |
NETCONF operations |
network-admin mdc-admin |
All NETCONF operations |
network-operator mdc-operator |
· Get · Get-bulk · Get-bulk-config · Get-config · Get-sessions · Close-session |
To ensure the format correctness of NETCONF messages in XML view, do not enter NETCONF messages manually. Copy and paste the messages.
While the device is performing a NETCONF operation, do not perform any other operations, such as pasting a NETCONF message or pressing Enter.
For the device to identify NETCONF messages, you must add end mark ]]>]]> at the end of each NETCONF message.
After you enter XML view, the device automatically advertises its NETCONF capabilities to the client. In response, you must configure the client to notify the device of its supported NETCONF capabilities. After the capability exchange, you can use the client to configure the device.
NETCONF messages must comply with the XML format requirements and semantic and syntactic requirements in the NETCONF XML API reference for the device. As a best practice, use third-party software to generate NETCONF messages to ensure successful configuration.
To quit XML view, use a NETCONF message instead of the quit command.
If you have configured a shortcut key (Ctrl + C, by default) by using the escape-key command in user line/user line class view, the NETCONF message should not contain the shortcut key string. If the NETCONF message contains the shortcut key string, relevant configurations in XML view might be affected. For example, in user line view, you configured "a" as the shortcut key by using the escape-key a command. When a NETCONF message includes the character "a," only the content after the last "a" in the message can be processed.
Examples
# Enter XML view.
<Sysname> xml
# Notify the device of the NETCONF capabilities supported on the client.
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<capabilities>
<capability>
urn:ietf:params:netconf:base:1.0
</capability>
</capabilities>
</hello>]]>]]>
# Quit XML view.
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<close-session/>
</rpc>]]>]]>