<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: netconf device sync from get Protocol error in NSO Developer Hub Discussions</title>
    <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021917#M8367</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If the keyboard-interactive authentication type is enabled for the device SSH server, try disabling it.&lt;BR /&gt;sm000x: I do not know how to check and how do disable it.&lt;BR /&gt;&lt;BR /&gt;Here is the -vv ssh:&lt;BR /&gt;&lt;BR /&gt;[root@mtnjdslncs06 ~]# ssh -vv sm000x@166.193.252.44&lt;BR /&gt;OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: /etc/ssh/ssh_config line 58: Applying options for *&lt;BR /&gt;debug2: resolving "166.193.252.44" port 22&lt;BR /&gt;debug2: ssh_connect_direct: needpriv 0&lt;BR /&gt;debug1: Connecting to 166.193.252.44 [166.193.252.44] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ecdsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ed25519 type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ed25519-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_7.4&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8&lt;BR /&gt;debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: Authenticating to 166.193.252.44:22 as 'sm000x'&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: local client KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c&lt;BR /&gt;debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss&lt;BR /&gt;debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,ssh-rsa&lt;BR /&gt;debug2: ciphers ctos: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: ciphers stoc: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug1: kex: algorithm: curve25519-sha256@libssh.org&lt;BR /&gt;debug1: kex: host key algorithm: ecdsa-sha2-nistp256&lt;BR /&gt;debug1: kex: server-&amp;gt;client cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: client-&amp;gt;server cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_ECDH_REPLY&lt;BR /&gt;debug1: Server host key: ecdsa-sha2-nistp256 SHA256:yv7ZAEJqIeK6M/iDvyJrRLhsa7JXTKN4THFkWISsbWI&lt;BR /&gt;The authenticity of host '166.193.252.44 (166.193.252.44)' can't be established.&lt;BR /&gt;ECDSA key fingerprint is SHA256:yv7ZAEJqIeK6M/iDvyJrRLhsa7JXTKN4THFkWISsbWI.&lt;BR /&gt;ECDSA key fingerprint is MD5:97:96:a6:de:eb:bc:c5:8f:cc:ea:d9:fb:c3:ca:97:98.&lt;BR /&gt;Are you sure you want to continue connecting (yes/no)? yes&lt;BR /&gt;Warning: Permanently added '166.193.252.44' (ECDSA) to the list of known hosts.&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug2: key: /root/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_dsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_ecdsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_ed25519 ((nil))&lt;BR /&gt;debug1: SSH2_MSG_EXT_INFO received&lt;BR /&gt;debug1: kex_input_ext_info: server-sig-algs=&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,password&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_dsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_ecdsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_ed25519&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;sm000x@166.193.252.44's password:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thx&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
    <pubDate>Wed, 21 Feb 2024 13:34:35 GMT</pubDate>
    <dc:creator>sm000x</dc:creator>
    <dc:date>2024-02-21T13:34:35Z</dc:date>
    <item>
      <title>netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5020149#M8353</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a strange issue and I cannot figure out what was wrong.&lt;/P&gt;&lt;P&gt;I have a netconf device but when I do sync-from I got error:&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 sync-from&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-18 13:33:20]&lt;BR /&gt;admin@ncs&amp;gt; exit&lt;/P&gt;&lt;P&gt;and the trace log size is 0:&lt;BR /&gt;-rw-rw-r--. 1 sm000x sm000x 0 Feb 18 13:33 netconf-zrdm60gcsmf01.trace&lt;/P&gt;&lt;P&gt;However, I am able to use&lt;BR /&gt;ssh -s sm000x@zrdm60gcsmf01-ip-addess -p 22 netconf&lt;/P&gt;&lt;P&gt;to invoke the netconf (Although it takes longer than usual time)&lt;/P&gt;&lt;P&gt;The device type is netconf:&lt;BR /&gt;admin@ncs&amp;gt; show configuration devices device zrdm60gcsmf01&lt;BR /&gt;address x.x.x.x;&lt;BR /&gt;port 22;&lt;BR /&gt;authgroup SMF;&lt;BR /&gt;device-type {&lt;BR /&gt;netconf {&lt;BR /&gt;ned-id smf-nc-1.0;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;state {&lt;BR /&gt;admin-state unlocked;&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;I am able to do sync-from to other device with the same authgroup and ned-id:&lt;BR /&gt;dmin@ncs&amp;gt; request devices device z68bcsmf01 sync-from&lt;BR /&gt;result true&lt;BR /&gt;[ok][2024-02-18 13:49:42]&lt;/P&gt;&lt;P&gt;admin@ncs&amp;gt; show configuration devices device z68bcsmf01&lt;BR /&gt;address x.x.x.x;&lt;BR /&gt;port 22;&lt;BR /&gt;authgroup SMF;&lt;BR /&gt;device-type {&lt;BR /&gt;netconf {&lt;BR /&gt;ned-id smf-nc-1.0;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;state {&lt;BR /&gt;admin-state unlocked;&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Does anyone have same expierence?&lt;BR /&gt;What does "Protocol error" mean?&lt;/P&gt;&lt;P&gt;THX&lt;BR /&gt;sm000x&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 18:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5020149#M8353</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-18T18:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5020858#M8355</link>
      <description>&lt;P&gt;One of the reasons could be that SSH RSA algorithm on the device is not included to the NSO global settings. Hence the communication with the device fails. You can check the algorithm used by your device in the ~/.ssh/known_hosts file. In NSO check the global setting like this:&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;admin@ncs&amp;gt; show configuration devices global-settings ssh-algorithms public-key&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;public-key [ ssh-ed25519 ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 rsa-sha2-512 rsa-sha2-256 ssh-rsa ssh-dss ];&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Make sure the algorithm is listed. If not, modify the global settings by adding the missing algorithm.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 18:55:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5020858#M8355</guid>
      <dc:creator>ygorelik</dc:creator>
      <dc:date>2024-02-19T18:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021244#M8357</link>
      <description>Hi, ygorelik:&lt;BR /&gt;&lt;BR /&gt;Thank you for the suggestion.&lt;BR /&gt;&lt;BR /&gt;I checked global setting:&lt;BR /&gt;admin@ncs&amp;gt; show configuration devices global-settings ssh-algorithms public-key&lt;BR /&gt;public-key [ ssh-ed25519 ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 rsa-sha2-512 rsa-sha2-256 ];&lt;BR /&gt;&lt;BR /&gt;Then I added the missing algorithm:&lt;BR /&gt;admin@ncs% set devices global-settings ssh-algorithms public-key [ ssh-ed25519 ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 rsa-sha2-512 rsa-sha2-256 ssh-rsa ssh-dss ]&lt;BR /&gt;[ok][2024-02-20 08:31:02]&lt;BR /&gt;[edit]&lt;BR /&gt;admin@ncs% commit&lt;BR /&gt;Commit complete.&lt;BR /&gt;&lt;BR /&gt;But it still fail:&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 ssh fetch-host-keys&lt;BR /&gt;result updated&lt;BR /&gt;fingerprint {&lt;BR /&gt;algorithm ssh-ed25519&lt;BR /&gt;value 77:a5:d4:e5:d0:1c:ca:18:d4:e0:36:f4:d6:7b:b0:b1&lt;BR /&gt;}&lt;BR /&gt;fingerprint {&lt;BR /&gt;algorithm ecdsa-256&lt;BR /&gt;value a0:a9:c8:4c:37:37:de:a5:5d:fa:0a:ca:f7:70:71:df&lt;BR /&gt;}&lt;BR /&gt;fingerprint {&lt;BR /&gt;algorithm ssh-rsa&lt;BR /&gt;value 1f:bb:4a:95:93:9e:aa:46:f3:44:d4:6c:d1:ac:65:1d&lt;BR /&gt;}&lt;BR /&gt;[ok][2024-02-20 08:31:58]&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 sync-from&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-20 08:32:14]&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2024 13:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021244#M8357</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-20T13:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021341#M8358</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;BR /&gt;One possible reason can be that the device SSH server has keyboard-interactive authentication enabled, tries keyboard-interactive authentication before trying public-key authentication, and behaves non-standard for the keyboard-interactive authentication.&lt;/P&gt;
&lt;P&gt;The OpenSSH client may timeout the keyboard-interactive authentication and try the next authentication method, public-key authentication, while the NSO SSH client reports a protocol error.&lt;/P&gt;
&lt;P&gt;If the keyboard-interactive authentication type is enabled for the device SSH server, try disabling it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, try adding a "-v" or "-vv" when testing with the OpenSSH "ssh" client to debug why the device "ta&lt;SPAN&gt;kes longer than usual" to invoke NETCONF.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 15:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021341#M8358</guid>
      <dc:creator>cohult</dc:creator>
      <dc:date>2024-02-20T15:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021386#M8359</link>
      <description>&lt;P&gt;It is great that 'ssh fetch-host-keys' worked! That shows SSH communication is working. Some netconf devices require to do 'connect' before the 'sync-from'. I have seen this behavior while working on device-onboarding package. Please try this before going into further investigations.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021386#M8359</guid>
      <dc:creator>ygorelik</dc:creator>
      <dc:date>2024-02-20T17:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021396#M8360</link>
      <description>Hi, ygorelik:&lt;BR /&gt;&lt;BR /&gt;It is interesting, even the connect gets the same error:&lt;BR /&gt;&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 connect&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-20 12:26:18]&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 disconnect&lt;BR /&gt;[ok][2024-02-20 12:26:26]&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 connect&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-20 12:26:40]&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021396#M8360</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-20T17:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021563#M8361</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Regarding the trace, maybe you need to enable them.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;devices device &amp;lt;device_name&amp;gt; trace raw
commit dry-run
commit
devices device &amp;lt;device_name&amp;gt; connect&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Can you also execute the following&amp;nbsp; command and post the output&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;devices device &amp;lt;device_name&amp;gt; connect | detail debug
#sync-from but if it's fails for the connect it will also  fail for the sync-from
devices device &amp;lt;device_name&amp;gt; sync-from | detail debug&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the other devices&amp;nbsp; , are they using the same version ? Same config ssh/netconf config ?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 23:08:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021563#M8361</guid>
      <dc:creator>Nabsch</dc:creator>
      <dc:date>2024-02-20T23:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021574#M8362</link>
      <description>Hi, Nabsch:&lt;BR /&gt;&lt;BR /&gt;admin@ncs% set devices device zrdm60gcsmf01 trace raw&lt;BR /&gt;[ok][2024-02-20 17:54:32]&lt;BR /&gt;&lt;BR /&gt;[edit]&lt;BR /&gt;admin@ncs% commit dry-run&lt;BR /&gt;cli {&lt;BR /&gt;local-node {&lt;BR /&gt;data devices {&lt;BR /&gt;device zrdm60gcsmf01 {&lt;BR /&gt;- trace pretty;&lt;BR /&gt;+ trace raw;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[ok][2024-02-20 17:54:38]&lt;BR /&gt;&lt;BR /&gt;[edit]&lt;BR /&gt;admin@ncs% commit&lt;BR /&gt;Commit complete.&lt;BR /&gt;[ok][2024-02-20 17:54:50]&lt;BR /&gt;&lt;BR /&gt;[edit]&lt;BR /&gt;admin@ncs% request devices device zrdm60gcsmf01 connect&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-20 17:55:19]&lt;BR /&gt;&lt;BR /&gt;[edit]&lt;BR /&gt;admin@ncs%&lt;BR /&gt;&lt;BR /&gt;[sm000x@mtnjdslncs06 logs]$ ls -l *zrdm60gcsmf01*&lt;BR /&gt;-rw-rw-r--. 1 sm000x sm000x 0 Feb 18 13:33 netconf-zrdm60gcsmf01.trace&lt;BR /&gt;[sm000x@mtnjdslncs06 logs]&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2024 22:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021574#M8362</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-20T22:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021576#M8363</link>
      <description>Hi, Nabsch:&lt;BR /&gt;&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 connect | details debug&lt;BR /&gt;2024-02-20T18:01:08.448 device zrdm60gcsmf01: connect...&lt;BR /&gt;2024-02-20T18:01:08.448 device zrdm60gcsmf01: SSH connecting to admin@zrdm60gcsmf01&lt;BR /&gt;2024-02-20T18:01:15.046 device zrdm60gcsmf01: connect: error (6.598 s)&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-20 18:01:15]&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;admin@ncs&amp;gt; show configuration devices device zrdm60gcsmf01&lt;BR /&gt;address x.x.x.x;&lt;BR /&gt;port 22;&lt;BR /&gt;authgroup SMF;&lt;BR /&gt;device-type {&lt;BR /&gt;netconf {&lt;BR /&gt;ned-id smf-nc-1.0;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;trace raw;&lt;BR /&gt;state {&lt;BR /&gt;admin-state unlocked;&lt;BR /&gt;}&lt;BR /&gt;[ok][2024-02-20 18:02:19]&lt;BR /&gt;admin@ncs&amp;gt; show configuration devices authgroups group SMF&lt;BR /&gt;umap admin {&lt;BR /&gt;remote-name sm000x;&lt;BR /&gt;remote-password $9$n1M6TW3Rwz6ZBB9BsLs3zBDo43EO8QJS2QQ2vLdxzTo=;&lt;BR /&gt;}&lt;BR /&gt;[ok][2024-02-20 18:02:31]&lt;BR /&gt;admin@ncs&amp;gt;&lt;BR /&gt;&lt;BR /&gt;For other device with same auth group:&lt;BR /&gt;admin@ncs&amp;gt; show configuration devices device z68bcsmf01&lt;BR /&gt;address y.y.y.y;&lt;BR /&gt;port 22;&lt;BR /&gt;authgroup SMF;&lt;BR /&gt;device-type {&lt;BR /&gt;netconf {&lt;BR /&gt;ned-id smf-nc-1.0;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;state {&lt;BR /&gt;admin-state unlocked;&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;admin@ncs&amp;gt; request devices device z68bcsmf01 connect | details debug&lt;BR /&gt;2024-02-20T18:07:53.924 device z68bcsmf01: connect...&lt;BR /&gt;2024-02-20T18:07:53.924 device z68bcsmf01: SSH connecting to admin@z68bcsmf01&lt;BR /&gt;2024-02-20T18:07:55.465 device z68bcsmf01: reuse SSH connection to admin@z68bcsmf01&lt;BR /&gt;2024-02-20T18:07:56.502 device z68bcsmf01: connect: ok (2.578 s)&lt;BR /&gt;result true&lt;BR /&gt;info (admin) Connected to z68bcsmf01 - y.y.y.y&lt;BR /&gt;[ok][2024-02-20 18:07:56]&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2024 23:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021576#M8363</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-20T23:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021578#M8364</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Regarding the other devices&amp;nbsp; , are they using the same version ( device os version) ? Same config ssh/netconf config ( i mean device config) ?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 23:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021578#M8364</guid>
      <dc:creator>Nabsch</dc:creator>
      <dc:date>2024-02-20T23:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021579#M8365</link>
      <description>&lt;P&gt;Can you switch to netconf ned &amp;amp; check if the connect is working ? ( IF you have no services on it otherwise create a new device that use the previous ip&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;devices device &amp;lt;device-name&amp;gt; device-type netconf ned-id netconf&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 23:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021579#M8365</guid>
      <dc:creator>Nabsch</dc:creator>
      <dc:date>2024-02-20T23:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021739#M8366</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/817974"&gt;@ygorelik&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;It is great that 'ssh fetch-host-keys' worked! That shows SSH communication is working.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The SSH authentication is likely failing &lt;A href="https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021341/highlight/true#M8358" target="_self"&gt;as I wrote above&lt;/A&gt;.&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1429002"&gt;@sm000x&lt;/a&gt;, have you ready my post?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 08:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021739#M8366</guid>
      <dc:creator>cohult</dc:creator>
      <dc:date>2024-02-21T08:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021917#M8367</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If the keyboard-interactive authentication type is enabled for the device SSH server, try disabling it.&lt;BR /&gt;sm000x: I do not know how to check and how do disable it.&lt;BR /&gt;&lt;BR /&gt;Here is the -vv ssh:&lt;BR /&gt;&lt;BR /&gt;[root@mtnjdslncs06 ~]# ssh -vv sm000x@166.193.252.44&lt;BR /&gt;OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: /etc/ssh/ssh_config line 58: Applying options for *&lt;BR /&gt;debug2: resolving "166.193.252.44" port 22&lt;BR /&gt;debug2: ssh_connect_direct: needpriv 0&lt;BR /&gt;debug1: Connecting to 166.193.252.44 [166.193.252.44] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ecdsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ed25519 type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ed25519-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_7.4&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8&lt;BR /&gt;debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: Authenticating to 166.193.252.44:22 as 'sm000x'&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: local client KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c&lt;BR /&gt;debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss&lt;BR /&gt;debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,ssh-rsa&lt;BR /&gt;debug2: ciphers ctos: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: ciphers stoc: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug1: kex: algorithm: curve25519-sha256@libssh.org&lt;BR /&gt;debug1: kex: host key algorithm: ecdsa-sha2-nistp256&lt;BR /&gt;debug1: kex: server-&amp;gt;client cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: client-&amp;gt;server cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_ECDH_REPLY&lt;BR /&gt;debug1: Server host key: ecdsa-sha2-nistp256 SHA256:yv7ZAEJqIeK6M/iDvyJrRLhsa7JXTKN4THFkWISsbWI&lt;BR /&gt;The authenticity of host '166.193.252.44 (166.193.252.44)' can't be established.&lt;BR /&gt;ECDSA key fingerprint is SHA256:yv7ZAEJqIeK6M/iDvyJrRLhsa7JXTKN4THFkWISsbWI.&lt;BR /&gt;ECDSA key fingerprint is MD5:97:96:a6:de:eb:bc:c5:8f:cc:ea:d9:fb:c3:ca:97:98.&lt;BR /&gt;Are you sure you want to continue connecting (yes/no)? yes&lt;BR /&gt;Warning: Permanently added '166.193.252.44' (ECDSA) to the list of known hosts.&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug2: key: /root/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_dsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_ecdsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_ed25519 ((nil))&lt;BR /&gt;debug1: SSH2_MSG_EXT_INFO received&lt;BR /&gt;debug1: kex_input_ext_info: server-sig-algs=&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,password&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_dsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_ecdsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_ed25519&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;sm000x@166.193.252.44's password:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thx&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021917#M8367</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-21T13:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021928#M8368</link>
      <description>Hi, Nabsch:&lt;BR /&gt;&lt;BR /&gt;admin@ncs% set devices device zrdm60gcsmf01 device-type netconf ned-id netconf&lt;BR /&gt;[ok][2024-02-21 08:41:14]&lt;BR /&gt;&lt;BR /&gt;[edit]&lt;BR /&gt;admin@ncs% commit&lt;BR /&gt;Commit complete.&lt;BR /&gt;[ok][2024-02-21 08:41:17]&lt;BR /&gt;&lt;BR /&gt;[edit]&lt;BR /&gt;admin@ncs% exit&lt;BR /&gt;[ok][2024-02-21 08:41:20]&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 ssh fetch-host-keys&lt;BR /&gt;result unchanged&lt;BR /&gt;fingerprint {&lt;BR /&gt;algorithm ssh-ed25519&lt;BR /&gt;value 77:a5:d4:e5:d0:1c:ca:18:d4:e0:36:f4:d6:7b:b0:b1&lt;BR /&gt;}&lt;BR /&gt;fingerprint {&lt;BR /&gt;algorithm ecdsa-256&lt;BR /&gt;value a0:a9:c8:4c:37:37:de:a5:5d:fa:0a:ca:f7:70:71:df&lt;BR /&gt;}&lt;BR /&gt;fingerprint {&lt;BR /&gt;algorithm ssh-rsa&lt;BR /&gt;value 1f:bb:4a:95:93:9e:aa:46:f3:44:d4:6c:d1:ac:65:1d&lt;BR /&gt;}&lt;BR /&gt;[ok][2024-02-21 08:41:33]&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 connect | details debug&lt;BR /&gt;2024-02-21T08:41:46.288 device zrdm60gcsmf01: connect...&lt;BR /&gt;2024-02-21T08:41:46.288 device zrdm60gcsmf01: SSH connecting to admin@zrdm60gcsmf01&lt;BR /&gt;2024-02-21T08:41:52.837 device zrdm60gcsmf01: connect: error (6.548 s)&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-21 08:41:52]&lt;BR /&gt;admin@ncs&amp;gt;&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021928#M8368</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-21T13:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync fromm get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021932#M8369</link>
      <description>Hi, Nabsch:&lt;BR /&gt;&lt;BR /&gt;Regarding the other devices , are they using the same version ( device os version) ? Same config ssh/netconf config ( i mean device config) ?&lt;BR /&gt;sm000x: No, the other device is older OS version. The device in question is the newer version. Therefore, ssh/netconf might or might not be the same.&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021932#M8369</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-21T13:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021943#M8370</link>
      <description>Hi, cohult:&lt;BR /&gt;&lt;BR /&gt;Sorry. I gave you wrong trace (the device is wrong), here is the trace of the device in question:&lt;BR /&gt;&lt;BR /&gt;[sm000x@mtnjdslncs06 ~]$ ssh -v sm000x@166.193.178.44&lt;BR /&gt;OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: /etc/ssh/ssh_config line 58: Applying options for *&lt;BR /&gt;debug1: Connecting to 166.193.178.44 [166.193.178.44] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_rsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_rsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_dsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_dsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ecdsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ed25519 type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ed25519-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_7.4&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8&lt;BR /&gt;debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000&lt;BR /&gt;debug1: Authenticating to 166.193.178.44:22 as 'sm000x'&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug1: kex: algorithm: curve25519-sha256@libssh.org&lt;BR /&gt;debug1: kex: host key algorithm: ecdsa-sha2-nistp256&lt;BR /&gt;debug1: kex: server-&amp;gt;client cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: client-&amp;gt;server cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_ECDH_REPLY&lt;BR /&gt;debug1: Server host key: ecdsa-sha2-nistp256 SHA256:sy46Glg7HYidUHaTb0DJYiIhTTuS8ahT4gO9ewo6oKI&lt;BR /&gt;debug1: Host '166.193.178.44' is known and matches the ECDSA host key.&lt;BR /&gt;debug1: Found key in /home/sm000x/.ssh/known_hosts:2&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug1: SSH2_MSG_EXT_INFO received&lt;BR /&gt;debug1: kex_input_ext_info: server-sig-algs=&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_dsa&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_ecdsa&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_ed25519&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;Password:&lt;BR /&gt;&lt;BR /&gt;But&lt;BR /&gt;&lt;BR /&gt;admin@ncs&amp;gt; request devices device zrdm60gcsmf01 connect | details debug&lt;BR /&gt;2024-02-21T08:55:38.735 device zrdm60gcsmf01: connect...&lt;BR /&gt;2024-02-21T08:55:38.736 device zrdm60gcsmf01: SSH connecting to admin@zrdm60gcsmf01&lt;BR /&gt;2024-02-21T08:55:45.278 device zrdm60gcsmf01: connect: error (6.543 s)&lt;BR /&gt;result false&lt;BR /&gt;info Failed to connect to device zrdm60gcsmf01: Protocol error&lt;BR /&gt;[ok][2024-02-21 08:55:45]&lt;BR /&gt;admin@ncs&amp;gt;&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5021943#M8370</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-21T13:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022117#M8371</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1429002"&gt;@sm000x&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You cut out the interesting part. What comes after "&lt;EM&gt;debug1: Next authentication method: keyboard-interactive\n&amp;nbsp;&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;Password:&lt;/EM&gt;" is likely what is breaking the standard (&lt;A href="https://www.rfc-editor.org/rfc/rfc4256.html" target="_self"&gt;RFC 4256&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The OpenSSH client is an open-source project that tolerates non-compliant messages and waits until the expected message is&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;eventually received. NSO expects a compliant message, and the protocol error occurs when a non-compliant message is received.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="242424"&gt;If the device is from vendor H, you can log in to the&amp;nbsp;SSH&amp;nbsp;server CLI and run the&amp;nbsp;&lt;/FONT&gt;&lt;FONT color="242424"&gt;&lt;STRONG&gt;undo&amp;nbsp;SSH&amp;nbsp;server&amp;nbsp;authentication-type&amp;nbsp;keyboard-interactive&amp;nbsp;enable&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT color="242424"&gt;&amp;nbsp;command to disable "keyboard-interactive" authentication.&lt;BR /&gt;Since you do not use "publickey" authentication, you likely need to enable "password" authentication on the device.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 17:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022117#M8371</guid>
      <dc:creator>cohult</dc:creator>
      <dc:date>2024-02-21T17:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022125#M8372</link>
      <description>Hi, cohult:&lt;BR /&gt;&lt;BR /&gt;Sorry that I cut out the important part, here is the post again.&lt;BR /&gt;&lt;BR /&gt;[sm000x@mtnjdslncs06 ~]$ ssh -vv sm000x@166.193.178.44&lt;BR /&gt;OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: /etc/ssh/ssh_config line 58: Applying options for *&lt;BR /&gt;debug2: resolving "166.193.178.44" port 22&lt;BR /&gt;debug2: ssh_connect_direct: needpriv 0&lt;BR /&gt;debug1: Connecting to 166.193.178.44 [166.193.178.44] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_rsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_rsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_dsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_dsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ecdsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ed25519 type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /home/sm000x/.ssh/id_ed25519-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_7.4&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8&lt;BR /&gt;debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: Authenticating to 166.193.178.44:22 as 'sm000x'&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: local client KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c&lt;BR /&gt;debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss&lt;BR /&gt;debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,ssh-rsa&lt;BR /&gt;debug2: ciphers ctos: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: ciphers stoc: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug1: kex: algorithm: curve25519-sha256@libssh.org&lt;BR /&gt;debug1: kex: host key algorithm: ecdsa-sha2-nistp256&lt;BR /&gt;debug1: kex: server-&amp;gt;client cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: client-&amp;gt;server cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_ECDH_REPLY&lt;BR /&gt;debug1: Server host key: ecdsa-sha2-nistp256 SHA256:sy46Glg7HYidUHaTb0DJYiIhTTuS8ahT4gO9ewo6oKI&lt;BR /&gt;debug1: Host '166.193.178.44' is known and matches the ECDSA host key.&lt;BR /&gt;debug1: Found key in /home/sm000x/.ssh/known_hosts:2&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug2: key: /home/sm000x/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /home/sm000x/.ssh/id_dsa ((nil))&lt;BR /&gt;debug2: key: /home/sm000x/.ssh/id_ecdsa ((nil))&lt;BR /&gt;debug2: key: /home/sm000x/.ssh/id_ed25519 ((nil))&lt;BR /&gt;debug1: SSH2_MSG_EXT_INFO received&lt;BR /&gt;debug1: kex_input_ext_info: server-sig-algs=&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_dsa&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_ecdsa&lt;BR /&gt;debug1: Trying private key: /home/sm000x/.ssh/id_ed25519&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 1&lt;BR /&gt;Password:&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 0&lt;BR /&gt;&lt;BR /&gt;You are in Privilege Class (FULLACCESS)&lt;BR /&gt;debug1: Authentication succeeded (keyboard-interactive).&lt;BR /&gt;Authenticated to 166.193.178.44 ([166.193.178.44]:22).&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: pledge: network&lt;BR /&gt;debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: fd 3 setting TCP_NODELAY&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug2: channel 0: request pty-req confirm 1&lt;BR /&gt;debug1: Sending environment.&lt;BR /&gt;debug1: Sending env LANG = en_US.UTF-8&lt;BR /&gt;debug2: channel 0: request env confirm 0&lt;BR /&gt;debug2: channel 0: request shell confirm 1&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;debug2: PTY allocation request accepted on channel 0&lt;BR /&gt;debug2: channel 0: rcvd adjust 2097152&lt;BR /&gt;debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;debug2: shell request accepted on channel 0&lt;BR /&gt;&lt;BR /&gt;You are in Privilege Class (FULLACCESS)&lt;BR /&gt;Last login: Wed Feb 21 13:54:58 UTC 2024 from 192.168.218.64 on ssh&lt;BR /&gt;&lt;BR /&gt;User sm000x last logged in 2024-02-20T13:45:54.816261+00:00, to pod-cfgmgr-865fbc4c55-c7qw2, from 192.168.35.128 using cli-ssh&lt;BR /&gt;sm000x connected from 192.168.220.128 using ssh on zrdm60gcsmf01&lt;BR /&gt;sm000x@zrdm60gcsmf01 05:20:39#&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Feb 2024 17:24:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022125#M8372</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-21T17:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022131#M8373</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1429002"&gt;@sm000x&lt;/a&gt;,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1429002"&gt;@sm000x&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;Sorry that I cut out the important part, here is the post again.&lt;BR /&gt;[sm000x@mtnjdslncs06 ~]$ ssh -vv sm000x@166.193.178.44&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;You are showing the debug info for when you are connecting to a CLI? You cannot connect to a CLI using a NETCONF NED.&lt;BR /&gt;I was expecting the OpenSSH client debug output when connecting to the NETCONF subsystem. Something like:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ssh -vv -s sm000x@166.193.178.44 netconf&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 17:39:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022131#M8373</guid>
      <dc:creator>cohult</dc:creator>
      <dc:date>2024-02-21T17:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: netconf device sync from get Protocol error</title>
      <link>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022139#M8374</link>
      <description>Hi, cohult:&lt;BR /&gt;&lt;BR /&gt;Terrible sorry. Here is the new:&lt;BR /&gt;&lt;BR /&gt;[root@mtnjdslncs06 ~]# ssh -vv -s sm000x@166.193.178.44 -p 22 netconf&lt;BR /&gt;OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: /etc/ssh/ssh_config line 58: Applying options for *&lt;BR /&gt;debug2: resolving "166.193.178.44" port 22&lt;BR /&gt;debug2: ssh_connect_direct: needpriv 0&lt;BR /&gt;debug1: Connecting to 166.193.178.44 [166.193.178.44] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ecdsa type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ed25519 type -1&lt;BR /&gt;debug1: key_load_public: No such file or directory&lt;BR /&gt;debug1: identity file /root/.ssh/id_ed25519-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_7.4&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8&lt;BR /&gt;debug1: match: OpenSSH_8.8 pat OpenSSH* compat 0x04000000&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: Authenticating to 166.193.178.44:22 as 'sm000x'&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: local client KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c&lt;BR /&gt;debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss&lt;BR /&gt;debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;debug2: host key algorithms: ssh-ed25519,ecdsa-sha2-nistp256,ssh-rsa&lt;BR /&gt;debug2: ciphers ctos: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: ciphers stoc: aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;BR /&gt;debug2: languages ctos:&lt;BR /&gt;debug2: languages stoc:&lt;BR /&gt;debug2: first_kex_follows 0&lt;BR /&gt;debug2: reserved 0&lt;BR /&gt;debug1: kex: algorithm: curve25519-sha256@libssh.org&lt;BR /&gt;debug1: kex: host key algorithm: ecdsa-sha2-nistp256&lt;BR /&gt;debug1: kex: server-&amp;gt;client cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: client-&amp;gt;server cipher: aes128-ctr MAC: hmac-sha2-256 compression: none&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: kex: curve25519-sha256@libssh.org need=32 dh_need=32&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_ECDH_REPLY&lt;BR /&gt;debug1: Server host key: ecdsa-sha2-nistp256 SHA256:sy46Glg7HYidUHaTb0DJYiIhTTuS8ahT4gO9ewo6oKI&lt;BR /&gt;The authenticity of host '166.193.178.44 (166.193.178.44)' can't be established.&lt;BR /&gt;ECDSA key fingerprint is SHA256:sy46Glg7HYidUHaTb0DJYiIhTTuS8ahT4gO9ewo6oKI.&lt;BR /&gt;ECDSA key fingerprint is MD5:a0:a9:c8:4c:37:37:de:a5:5d:fa:0a:ca:f7:70:71:df.&lt;BR /&gt;Are you sure you want to continue connecting (yes/no)? yes&lt;BR /&gt;Warning: Permanently added '166.193.178.44' (ECDSA) to the list of known hosts.&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: rekey after 4294967296 blocks&lt;BR /&gt;debug2: key: /root/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_dsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_ecdsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_ed25519 ((nil))&lt;BR /&gt;debug1: SSH2_MSG_EXT_INFO received&lt;BR /&gt;debug1: kex_input_ext_info: server-sig-algs=&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug1: Authentications that can continue: publickey,keyboard-interactive&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_dsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_ecdsa&lt;BR /&gt;debug1: Trying private key: /root/.ssh/id_ed25519&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug1: Next authentication method: keyboard-interactive&lt;BR /&gt;debug2: userauth_kbdint&lt;BR /&gt;debug2: we sent a keyboard-interactive packet, wait for reply&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 1&lt;BR /&gt;Password:&lt;BR /&gt;debug2: input_userauth_info_req&lt;BR /&gt;debug2: input_userauth_info_req: num_prompts 0&lt;BR /&gt;&lt;BR /&gt;You are in Privilege Class (FULLACCESS)&lt;BR /&gt;debug1: Authentication succeeded (keyboard-interactive).&lt;BR /&gt;Authenticated to 166.193.178.44 ([166.193.178.44]:22).&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug1: pledge: network&lt;BR /&gt;debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: fd 3 setting TCP_NODELAY&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug1: Sending environment.&lt;BR /&gt;debug1: Sending env LANG = en_US.UTF-8&lt;BR /&gt;debug2: channel 0: request env confirm 0&lt;BR /&gt;debug1: Sending subsystem: netconf&lt;BR /&gt;debug2: channel 0: request subsystem confirm 1&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: channel 0: rcvd adjust 2097152&lt;BR /&gt;debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;debug2: subsystem request accepted on channel 0&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;urn:ietf:params:netconf:base:1.0&lt;BR /&gt;urn:ietf:params:netconf:base:1.1&lt;BR /&gt;urn:ietf:params:netconf:capability:confirmed-commit:1.1&lt;BR /&gt;urn:ietf:params:netconf:capability:confirmed-commit:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:writable-running:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:candidate:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:rollback-on-error:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:url:1.0?scheme=ftp,sftp,file&lt;BR /&gt;urn:ietf:params:netconf:capability:validate:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:validate:1.1&lt;BR /&gt;urn:ietf:params:netconf:capability:xpath:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:notification:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:partial-lock:1.0&lt;BR /&gt;urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode=report-all&lt;BR /&gt;urn:ietf:params:netconf:capability:with-operational-defaults:1.0?basic-mode=report-all&lt;BR /&gt;urn:ietf:params:netconf:capability:yang-library:1.0?revision=2019-01-04&amp;amp;module-set-id=baf58cc11ed263ae2fd7b649aa12fe1a&lt;BR /&gt;urn:ietf:params:netconf:capability:yang-library:1.1?revision=2019-01-04&amp;amp;content-id=baf58cc11ed263ae2fd7b649aa12fe1a&lt;BR /&gt;&lt;A href="http://tail-f.com/ns/netconf/actions/1.0" target="_blank"&gt;http://tail-f.com/ns/netconf/actions/1.0&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/affirmed?module=affirmed" target="_blank"&gt;http://affirmednetworks.com/ns/yang/affirmed?module=affirmed&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/bgpmgr?module=bgpmgr&amp;amp;revision=2019-05-25" target="_blank"&gt;http://affirmednetworks.com/ns/yang/bgpmgr?module=bgpmgr&amp;amp;revision=2019-05-25&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-cfgmgr?module=cna-cfgmgr&amp;amp;revision=2018-07-24" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-cfgmgr?module=cna-cfgmgr&amp;amp;revision=2018-07-24&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-chfagent?module=cna-chfagent&amp;amp;revision=2022-11-22" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-chfagent?module=cna-chfagent&amp;amp;revision=2022-11-22&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-event-exposure?module=cna-event-exposure&amp;amp;revision=2022-03-14" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-event-exposure?module=cna-event-exposure&amp;amp;revision=2022-03-14&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-gtpcagent?module=cna-gtpcagent&amp;amp;revision=2019-11-06" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-gtpcagent?module=cna-gtpcagent&amp;amp;revision=2019-11-06&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-interface-mgr?module=cna-interface-mgr&amp;amp;revision=2019-04-05" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-interface-mgr?module=cna-interface-mgr&amp;amp;revision=2019-04-05&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-li-x1?module=cna-li-x1&amp;amp;revision=2022-12-06" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-li-x1?module=cna-li-x1&amp;amp;revision=2022-12-06&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-li-x2?module=cna-li-x2" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-li-x2?module=cna-li-x2&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-pfcp?module=cna-pfcp&amp;amp;revision=2022-01-31" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-pfcp?module=cna-pfcp&amp;amp;revision=2022-01-31&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-pfcp-cp?module=cna-pfcp-cp&amp;amp;revision=2022-03-21" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-pfcp-cp?module=cna-pfcp-cp&amp;amp;revision=2022-03-21&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-radiusagent?module=cna-radiusagent&amp;amp;revision=2023-07-03" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-radiusagent?module=cna-radiusagent&amp;amp;revision=2023-07-03&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-routing?module=cna-routing&amp;amp;revision=2021-10-06" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-routing?module=cna-routing&amp;amp;revision=2021-10-06&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-smf?module=cna-smf&amp;amp;revision=2023-08-09" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-smf?module=cna-smf&amp;amp;revision=2023-08-09&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna-smfmonitor?module=cna-smfmonitor&amp;amp;revision=2019-11-01" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna-smfmonitor?module=cna-smfmonitor&amp;amp;revision=2019-11-01&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna/cna-nrf-agent?module=cna-nrf-agent&amp;amp;revision=2021-11-15" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna/cna-nrf-agent?module=cna-nrf-agent&amp;amp;revision=2021-11-15&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/cna/cna-sub_analyzer?module=cna-sub_analyzer&amp;amp;revision=2023-03-07" target="_blank"&gt;http://affirmednetworks.com/ns/yang/cna/cna-sub_analyzer?module=cna-sub_analyzer&amp;amp;revision=2023-03-07&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/dataplane-agent?module=dataplane-agent&amp;amp;revision=2019-05-25" target="_blank"&gt;http://affirmednetworks.com/ns/yang/dataplane-agent?module=dataplane-agent&amp;amp;revision=2019-05-25&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/lb-ppe?module=lb-ppe&amp;amp;revision=2023-04-05" target="_blank"&gt;http://affirmednetworks.com/ns/yang/lb-ppe?module=lb-ppe&amp;amp;revision=2023-04-05&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://affirmednetworks.com/ns/yang/ribmgr?module=ribmgr&amp;amp;revision=2019-05-25" target="_blank"&gt;http://affirmednetworks.com/ns/yang/ribmgr?module=ribmgr&amp;amp;revision=2019-05-25&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/ns/common/query?module=tailf-common-query&amp;amp;revision=2017-12-15" target="_blank"&gt;http://tail-f.com/ns/common/query?module=tailf-common-query&amp;amp;revision=2017-12-15&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/ns/confd-progress?module=tailf-confd-progress&amp;amp;revision=2020-06-29" target="_blank"&gt;http://tail-f.com/ns/confd-progress?module=tailf-confd-progress&amp;amp;revision=2020-06-29&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/ns/ietf-subscribed-notifications-deviation?module=ietf-subscribed-notifications-deviation&amp;amp;revision=2020-06-25" target="_blank"&gt;http://tail-f.com/ns/ietf-subscribed-notifications-deviation?module=ietf-subscribed-notifications-deviation&amp;amp;revision=2020-06-25&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/ns/ietf-yang-push-deviation?module=ietf-yang-push-deviation" target="_blank"&gt;http://tail-f.com/ns/ietf-yang-push-deviation?module=ietf-yang-push-deviation&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/ns/kicker?module=tailf-kicker&amp;amp;revision=2020-11-26" target="_blank"&gt;http://tail-f.com/ns/kicker?module=tailf-kicker&amp;amp;revision=2020-11-26&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/ns/netconf/query?module=tailf-netconf-query&amp;amp;revision=2017-01-06" target="_blank"&gt;http://tail-f.com/ns/netconf/query?module=tailf-netconf-query&amp;amp;revision=2017-01-06&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/acm?module=tailf-acm&amp;amp;revision=2013-03-07" target="_blank"&gt;http://tail-f.com/yang/acm?module=tailf-acm&amp;amp;revision=2013-03-07&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/common?module=tailf-common&amp;amp;revision=2022-09-29" target="_blank"&gt;http://tail-f.com/yang/common?module=tailf-common&amp;amp;revision=2022-09-29&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/common-monitoring?module=tailf-common-monitoring&amp;amp;revision=2022-09-29" target="_blank"&gt;http://tail-f.com/yang/common-monitoring?module=tailf-common-monitoring&amp;amp;revision=2022-09-29&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/common-monitoring2?module=tailf-common-monitoring2&amp;amp;revision=2022-09-29" target="_blank"&gt;http://tail-f.com/yang/common-monitoring2?module=tailf-common-monitoring2&amp;amp;revision=2022-09-29&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/confd-monitoring?module=tailf-confd-monitoring&amp;amp;revision=2022-09-29" target="_blank"&gt;http://tail-f.com/yang/confd-monitoring?module=tailf-confd-monitoring&amp;amp;revision=2022-09-29&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/confd-monitoring2?module=tailf-confd-monitoring2&amp;amp;revision=2022-10-03" target="_blank"&gt;http://tail-f.com/yang/confd-monitoring2?module=tailf-confd-monitoring2&amp;amp;revision=2022-10-03&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/last-login?module=tailf-last-login&amp;amp;revision=2019-11-21" target="_blank"&gt;http://tail-f.com/yang/last-login?module=tailf-last-login&amp;amp;revision=2019-11-21&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/netconf-monitoring?module=tailf-netconf-monitoring&amp;amp;revision=2022-04-12" target="_blank"&gt;http://tail-f.com/yang/netconf-monitoring?module=tailf-netconf-monitoring&amp;amp;revision=2022-04-12&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://tail-f.com/yang/xsd-types?module=tailf-xsd-types&amp;amp;revision=2017-11-20" target="_blank"&gt;http://tail-f.com/yang/xsd-types?module=tailf-xsd-types&amp;amp;revision=2017-11-20&lt;/A&gt;&lt;BR /&gt;urn:ietf:params:xml:ns:netconf:base:1.0?module=ietf-netconf&amp;amp;revision=2011-06-01&amp;amp;features=writable-running,confirmed-commit,candidate,rollback-on-error,validate,xpath,url&lt;BR /&gt;urn:ietf:params:xml:ns:netconf:partial-lock:1.0?module=ietf-netconf-partial-lock&amp;amp;revision=2009-10-19&lt;BR /&gt;urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-hash&amp;amp;revision=2014-08-06&amp;amp;features=crypt-hash-sha-512,crypt-hash-sha-256,crypt-hash-md5&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-types&amp;amp;revision=2013-07-15&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf-acm&amp;amp;revision=2018-02-14&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf-netconf-monitoring&amp;amp;revision=2010-10-04&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ietf-netconf-notifications&amp;amp;revision=2012-02-06&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ietf-netconf-with-defaults&amp;amp;revision=2011-06-01&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-restconf-monitoring?module=ietf-restconf-monitoring&amp;amp;revision=2017-01-26&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name?module=ietf-x509-cert-to-name&amp;amp;revision=2014-12-10&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang-metadata&amp;amp;revision=2016-08-05&lt;BR /&gt;urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-types&amp;amp;revision=2013-07-15&lt;BR /&gt;&lt;BR /&gt;17819]]&amp;gt;]]&amp;gt;&lt;BR /&gt;&lt;BR /&gt;THX&lt;BR /&gt;sm000x&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Feb 2024 17:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nso-developer-hub-discussions/netconf-device-sync-fromm-get-protocol-error/m-p/5022139#M8374</guid>
      <dc:creator>sm000x</dc:creator>
      <dc:date>2024-02-21T17:47:35Z</dc:date>
    </item>
  </channel>
</rss>

