Supports containerized deployment with Docker, allowing the MCP server to run in isolated containers with appropriate environment variables.
Provides real-time access to Firewalla firewall data through 28 specialized tools for network monitoring, security analysis, bandwidth tracking, rule management, and target list management.
Firewalla MCP Server
A Model Context Protocol (MCP) server that provides real-time access to Firewalla firewall data through 28 specialized tools, compatible with any MCP client.
Why Firewalla MCP Server?
Simple Network Security Integration
- 28 Tools for network monitoring and analysis
- 23 Direct API Endpoints + 5 Convenience Wrappers
- Advanced Search with query syntax and filters
- Clean, Verified Architecture with corrected API schemas
Features
- Real-time Firewall Data: Query security alerts, network flows, and device status
- Security Analysis: Get insights on threats, blocked attacks, and network anomalies
- Bandwidth Monitoring: Track top bandwidth consumers and usage patterns
- Rule Management: View and temporarily pause firewall rules
- Target Lists: Manage custom security target lists and categories
- Search Tools: Query syntax with filters and logical operators
Client Setup Guides
Client | Quick Start | Full Guide |
---|---|---|
Claude Desktop | npm i -g firewalla-mcp-server → Configure MCP | Setup Guide |
Claude Code | npm i -g firewalla-mcp-server → CLI integration | Setup Guide |
VS Code | Install MCP extension → Configure server | Setup Guide |
Cursor | Install Claude Code → VSIX method | Setup Guide |
Roocode | Install MCP support → Configure server | Setup Guide |
Cline | Configure in VS Code → Enable MCP | Setup Guide |
How It Works
The MCP server acts as a bridge between Claude and your Firewalla firewall, translating Claude's requests into Firewalla API calls and returning the results in a format Claude can understand.
Prerequisites
- Node.js 18+ and npm
- Firewalla MSP account with API access
- Your Firewalla device online and connected
Quick Start
1. Installation
Option A: Install from npm (Recommended)
Option B: Use Docker
Warning: Not for production use – secrets visible in process list
The examples below pass credentials directly in the command line, which exposes them to process listing and shell history. For production use, consider these secure alternatives:
- Use
--env-file
with a.env
file:docker run --env-file .env ...
- Set environment variables in your shell before running Docker
- Use Docker secrets for orchestration environments
Option C: Install from source
2. Configuration
Create a .env
file with your Firewalla credentials:
Getting Your Credentials:
- Log into your Firewalla MSP portal at
https://yourdomain.firewalla.net
- Your MSP ID is the full domain (e.g.,
company123.firewalla.net
) - Generate an access token in API settings
- Find your Box GID (Group ID) in device settings - this is your unique device identifier
3. Build and Start
4. Connect Claude Desktop
Add this configuration to your Claude Desktop claude_desktop_config.json
:
If installed via npm
If using Docker
If installed from source
Config file locations:
- macOS:
~/Library/Application Support/Claude/claude_desktop_config.json
- Windows:
%APPDATA%\Claude\claude_desktop_config.json
5. Next Steps
- See USAGE.md for practical examples and common queries
- Check TROUBLESHOOTING.md if you encounter issues
- Review client-specific setup guides in docs/clients/
Usage Examples
Step-by-Step First Use
1. Verify Connection After completing the setup, verify the MCP server is working:
2. Test with Claude Open Claude Desktop and try these starter queries:
Basic Health Check:
This uses: firewall_summary
resource + get_simple_statistics
tool
Security Overview:
This uses: get_active_alarms
tool with limit parameter
Practical Workflows
Daily Security Review:
Investigating Suspicious Activity:
Network Troubleshooting:
Bandwidth Investigation:
Advanced Search Examples
Find Specific Threats:
Uses: search_alarms
with query: "type:1 AND source_ip:10.0.0. AND timestamp:>24h"*
Analyze Rule Effectiveness:
Uses: get_network_rules
+ search_flows
for blocked traffic analysis
Device Behavior Analysis:
Uses: search_devices
with temporal queries + get_offline_devices
Troubleshooting Common Issues
Connection Problems: If you get authentication errors:
- Verify your
.env
file has correct credentials - Check your MSP token hasn't expired
- Confirm your Box ID is the full GID format
Empty Results: If queries return no data:
- Check your Firewalla is online and reporting
- Verify the time range isn't too narrow
- Try broader search terms first
Performance Issues: If responses are slow:
- Reduce the limit parameter in queries
- Use more specific time ranges
- Check your network connection to the MSP API
Available Tools (28 total)
Core Tools
- Security: Get alarms, analyze threats
- Network: Monitor traffic flows, track bandwidth usage
- Devices: Check device status, find offline devices
- Rules: Manage firewall rules, pause/resume rules
- Search: Advanced search across all data types
- Analytics: Statistics, trends, and geographic analysis
- Target Management: Create, update, and delete security target lists
Quick Reference
Development
Scripts
MCP Execution Methods
Why npx
for MCP servers?
- Version Management: Always uses the correct/latest version
- Dependency Resolution: Handles package dependencies automatically
- No global installation required: Works without global installation
- MCP Standard: Follows Model Context Protocol conventions
- Reliable: Works consistently across different environments
Alternative execution methods:
Project Structure
Documentation
- README.md (this file) - Setup and basic usage
- USAGE.md - Simple usage guide with examples
- TROUBLESHOOTING.md - Common issues and solutions
- docs/clients/ - Client-specific setup guides
- CLAUDE.md - Development guide and commands
Security
- MSP tokens are stored securely in environment variables
- No credentials are logged or stored in code
- Rate limiting prevents API abuse
- Input validation prevents injection attacks
- All API communications use HTTPS
Known Behaviors and Limitations
Category Classification
- Flow Categories: Many network flows may show as empty category ("") in the Firewalla API response. This is expected behavior - Firewalla categorizes traffic when it recognizes the domain/service (e.g., "av" for audio/video, "social" for social media).
- Target List Categories: Some target lists may show category as "unknown". This is normal for user-created or certain system lists.
- Timeline: Category classification happens at the Firewalla device level and may take time to build up meaningful categorization data.
Data Characteristics
- Response Sizes: The
get_recent_flow_activity
tool returns up to 150 recent flows to stay within token limits. For larger datasets or historical analysis, usesearch_flows
with time filters for more targeted queries. - Geographic Data: IP geolocation is enriched by the MCP server and includes country, city, and risk scores when available.
API Limitations
- Alarm Deletion: The
delete_alarm
tool may not actually delete alarms even though the Firewalla API returns a success response. This appears to be a limitation of the MSP API where delete operations return{"message": "success", "success": true}
but the alarm remains in the system. This may be due to permission restrictions or API design.
Troubleshooting
Quick Fixes
Server won't start:
Authentication errors:
- Check your MSP token is valid
- Verify Box ID format (long UUID)
- Confirm MSP domain is correct
No data returned:
- Try broader queries: "last week" vs "last hour"
- Check if Firewalla is online
- Test with: "show me basic statistics"
Slow responses:
- Add limits: "top 10 devices"
- Use shorter time ranges
- Restart the server
Debug Mode
Enable detailed logging:
For more detailed troubleshooting, see TROUBLESHOOTING.md
Contributing
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests for new functionality
- Run the test suite
- Submit a pull request
What's New
Version 1.0.0:
- 28 tools with API-verified schemas
- 24 direct API endpoints + 5 convenience wrappers
- NEW: get_flow_insights for category-based traffic analysis
- Advanced search with logical operators (AND, OR, NOT)
- All limits corrected to API maximum (500)
- Required parameters added for proper API calls
- Better caching for faster responses
- Handles high-volume networks (300k+ flows/day)
License
Support
For issues and questions:
- Check the troubleshooting guide
- Review the technical specifications
- Open an issue on GitHub
GitHub Repository
Repository: https://github.com/amittell/firewalla-mcp-server
Quick Links
Repository Stats
This server cannot be installed
remote-capable server
The server can be hosted and run remotely because it primarily relies on remote services or has no dependency on the local environment.
Provides comprehensive Firewalla MSP firewall integration via MCP protocol with 28 tools for real-time security monitoring, network analysis, bandwidth tracking, and rule management. Supports all MCP-compatible clients for automated network security operations.
Related MCP Servers
- AsecurityAlicenseAqualityAn MCP server that provides a comprehensive interface to Semgrep, enabling users to scan code for security vulnerabilities, create custom rules, and analyze scan results through the Model Context Protocol.Last updated -6226PythonMIT License
- AsecurityFlicenseAqualityAn MCP server designed to work with FFmpeg for media processing tasks, offering enhanced performance and secure communication for handling media processing requests.Last updated -21411TypeScript
- AsecurityFlicenseAqualityMCP server that exposes Alpaca Market Data & Broker API as tools, enabling access to financial data like stock bars, assets, market days, and news through the Message Control Protocol.Last updated -4112TypeScript
- PythonApache 2.0