Provides intelligent analysis of SonicWall firewall logs through natural language queries, real-time threat detection, connection search and investigation, network statistics and security metrics, and log export capabilities for both SonicOS 7.x and 8.x versions
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@SonicWall MCP Servershow me blocked connections from the last hour"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
SonicWall MCP Server
Professional SonicWall log analysis and threat detection via Model Context Protocol
π§ͺ Community Testing Needed
β οΈ IMPORTANT: This project needs community testing and validation!
π₯ We need your help to test this with real SonicWall devices and environments.
π Test it with your SonicWall setup
π Report issues via GitHub Issues
π§ Fix bugs and submit PRs
π Improve documentation based on real-world usage
π‘ Contribute features and enhancements
Your testing and contributions will help make this production-ready for everyone!
A production-ready MCP server that provides intelligent analysis of SonicWall firewall logs through natural language queries. Fully compliant with MCP 2025-06-18 specification with comprehensive support for both SonicOS 7.x and 8.x including accurate API endpoints and version-specific features.
Related MCP server: Fastly NGWAF MCP Server
β¨ Features
π Natural Language Log Analysis - Query firewall logs using conversational AI
π‘οΈ Real-time Threat Detection - Advanced threat correlation and behavioral analysis
π Complete SonicOS Support - Accurate API endpoints for both 7.x and 8.x versions
π― Version-Aware Integration - Automatic endpoint resolution and feature detection
π Enterprise Ready - Production deployment with comprehensive security
π Advanced Analytics - Network intelligence and security metrics
π MCP 2025-06-18 Compliant - Latest protocol compliance with enhanced JSON-RPC 2.0
β‘ High Performance - In-memory caching with intelligent TTL management
π Security First - Authentication, authorization, and comprehensive audit logging
π Quick Start
Prerequisites
SonicWall Device running SonicOS 7.x or 8.x
API Access enabled on your SonicWall (MANAGE > System Setup > Appliance > SonicOS API)
Docker & Docker Compose (recommended) or Node.js 20+
1. Get the Server
2. Configure Environment
Required configuration:
3. Start the Server
Using Docker (Recommended):
Using Node.js:
4. Verify Installation
π Connect to Claude
Add to your Claude Desktop configuration (claude_desktop_config.json):
That's it! Start using SonicWall analysis in Claude:
"Show me blocked connections from the last hour"
"Find critical security threats from today"
"Analyze VPN authentication failures"
π― Latest Improvements
β‘ Enhanced SonicOS Support (v1.0.0)
Accurate API Endpoints: Complete endpoint mapping for both SonicOS 7.x (
/api/sonicos) and 8.x (/api/sonicos/v8)Version-Aware Features: Automatic detection and utilization of version-specific capabilities
Advanced Authentication: Enhanced session management with proper token refresh and error handling
Cloud Integration: Full support for SonicOS 8.x cloud management and NSM integration
π‘οΈ Security & Compliance Enhancements
MCP 2024-11-05 Compliance: Full protocol implementation with JSON-RPC 2.0 support
Enhanced Error Handling: SonicWall-specific error codes with intelligent retry logic
Advanced Validation: Comprehensive JSON Schema validation using AJV
Security Hardening: Improved authentication flow with comprehensive audit logging
π Performance & Reliability
Intelligent Caching: Enhanced TTL management with automatic cleanup
Endpoint Optimization: Version-specific timeout and rate limiting configurations
Connection Management: Improved retry logic and failover handling
Comprehensive Logging: Structured logging with performance metrics and debugging support
π οΈ Available Tools
analyze_logs
Natural language log analysis with intelligent insights
get_threats
Real-time threat monitoring and analysis
search_connections
Advanced connection search and investigation
get_stats
Network statistics and security metrics
export_logs
Export filtered logs for compliance and analysis
π Documentation
Complete Usage Guide - Detailed examples and use cases
Configuration Reference - All settings explained
API Documentation - Complete tool specifications
Troubleshooting Guide - Common issues and solutions
Security Guide - Security best practices
MCP Compliance - Protocol compliance details
ποΈ Architecture
Key Components:
MCP Protocol Layer: Full MCP 2024-11-05 compliance with SSE transport
Enhanced API Client: Accurate SonicOS 7.x/8.x endpoints with session management
Intelligent Log Parser: Multi-format parsing with version-specific optimizations
Analysis Engine: AI-powered natural language processing and threat correlation
Performance Cache: High-performance in-memory caching with TTL management
Security Framework: Comprehensive authentication and input validation
π§ Configuration
Basic Configuration
Advanced Configuration
π³ Docker Deployment
Prerequisites
Docker Engine 24.0+ (latest stable)
Docker Compose V2 (integrated plugin, comes with Docker Desktop)
Note: Legacy
docker-composecommand is deprecated, usedocker compose
Quick Start Commands
NPM Script Shortcuts
Environment Configuration
Docker Compose Files
docker-compose.yml- Production configurationdocker-compose.dev.yml- Development overridesdocker-compose.override.yml- Local customizations (optional)
π§ͺ Testing & Validation
Quick Health Check
SonicWall Connectivity Test
Run Test Suite
π Security
Security Features
β Transport Security - HTTPS enforcement with comprehensive CORS validation
β Authentication - Bearer token support with intelligent rate limiting
β Input Validation - JSON Schema validation using AJV with comprehensive sanitization
β Container Security - Non-root user execution with read-only filesystem
β Data Privacy - Zero sensitive data logging with audit-compliant processing
β MCP Compliance - Full protocol security implementation
β API Security - SonicWall credential protection with secure session management
Security Checklist
Enable API access only from trusted networks
Use strong passwords for SonicWall admin accounts
Configure MCP_BEARER_TOKEN for additional security
Monitor logs for unusual activity
Keep SonicWall firmware updated
Review firewall rules regularly
π¨ Common Issues
β "Authentication Failed"
Problem: Cannot connect to SonicWall API
β "No logs returned"
Problem: Empty responses from log queries
β "CORS Error in Browser"
Problem: Browser blocks MCP requests
π Monitoring & Observability
Health Monitoring
Performance Metrics
Log Analysis
π€ Contributing
We welcome contributions! Please read our Contributing Guidelines.
Development Setup
π License
MIT License - see LICENSE file for details.
π Support & Community
π Issues: GitHub Issues
π¬ Discussions: GitHub Discussions
π Documentation: Project Wiki
π§ Security: security@yourorganization.com
π Acknowledgments
Model Context Protocol for the excellent specification
SonicWall for comprehensive API documentation
Claude Code community for feedback and testing
All contributors and users who make this project better
π Built with security-first principles for enterprise cybersecurity teams
Get Started β’ API Docs β’ Troubleshooting