Skip to main content
Glama

firewalla-mcp-server

claude-code.md3.22 kB
# Firewalla MCP × Claude Code Integrate Firewalla network security data into your Claude Code CLI workflow for command-line security monitoring and analysis. ## Prerequisites - Claude Code CLI installed and authenticated - Node.js 18+ and npm - Active Firewalla MSP account with API credentials ## Quick Setup ### 1. Install the MCP Server ```bash # Install globally for system-wide access npm install -g firewalla-mcp-server # Verify installation npx firewalla-mcp-server --version ``` ### 2. Configure MCP Connection Create or update your Claude Code MCP configuration file: **Linux/macOS**: `~/.config/claude-code/mcp_config.json` **Windows**: `%APPDATA%\claude-code\mcp_config.json` ```json { "mcpServers": { "firewalla": { "command": "npx", "args": ["firewalla-mcp-server"], "env": { "FIREWALLA_MSP_TOKEN": "your_msp_access_token_here", "FIREWALLA_MSP_ID": "yourdomain.firewalla.net", "FIREWALLA_BOX_ID": "your_box_gid_here" } } } } ``` ### 3. Environment Variables (Alternative) For convenience, set environment variables in your shell profile: ```bash export FIREWALLA_MSP_TOKEN="your_msp_access_token_here" export FIREWALLA_MSP_ID="yourdomain.firewalla.net" export FIREWALLA_BOX_ID="your_box_gid_here" ``` ### 4. Test Integration Start a Claude Code session and test: ```bash claude-code # In Claude Code prompt: "Check my Firewalla status and show me any security alerts" ``` ## CLI Workflow Examples **Security Monitoring** ```bash claude-code "Analyze my network traffic from the last 2 hours and flag any suspicious activity" ``` **Bandwidth Investigation** ```bash claude-code "Who are my top bandwidth consumers today? Show me devices and data usage" ``` **Rule Management** ```bash claude-code "List all active firewall rules and show me which ones have blocked traffic recently" ``` ## Advanced CLI Usage **Scripted Analysis** ```bash # Save network report to file claude-code "Generate a comprehensive network security report" > security_report.md # Pipe to other tools claude-code "Get high-severity alarms as JSON" | jq '.alarms[] | select(.severity=="high")' ``` **Automated Monitoring** ```bash # Add to cron for daily reports 0 9 * * * claude-code "Daily Firewalla security summary" | mail -s "Security Report" admin@company.com ``` ## Troubleshooting **MCP Server Not Found** - Verify global installation: `npm list -g firewalla-mcp-server` - Try full path: `/usr/local/bin/npx firewalla-mcp-server` **Authentication Issues** - Test credentials with: `curl -H "Authorization: Bearer $FIREWALLA_MSP_TOKEN" https://$FIREWALLA_MSP_ID/v2/boxes` - Verify Box ID format (UUID, not device name) **Performance Tips** - Use specific time ranges for faster queries - Leverage caching by avoiding `force_refresh` unless needed - Limit result sets with explicit `limit` parameters ## Integration Benefits - **Real-time CLI monitoring** of network security - **Scriptable security analysis** for automation - **28 specialized tools** accessible via natural language - **Advanced search capabilities** with complex query syntax --- *Need another client? [Return to main setup guide](../../README.md#client-setup-guides)*

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/amittell/firewalla-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server