Skip to main content
Glama
gensecaihq

SonicWall MCP Server

by gensecaihq
queries.md6 kB
# SonicWall MCP Server - Query Examples This document provides examples of how to use the SonicWall MCP Server tools effectively. ## analyze_logs Examples ### Basic Log Analysis ```json { "query": "show blocked connections from last hour", "hoursBack": 1, "logType": "firewall" } ``` ### Security Threat Analysis ```json { "query": "find critical security threats", "hoursBack": 24, "logType": "all" } ``` ### VPN Connection Issues ```json { "query": "show VPN connection failures", "hoursBack": 6, "logType": "vpn" } ``` ### Port-Specific Analysis ```json { "query": "analyze connections to port 22 and 3389", "hoursBack": 12, "logType": "firewall" } ``` ### IP-Based Investigation ```json { "query": "investigate traffic from 192.168.1.100", "hoursBack": 24, "logType": "all" } ``` ## get_threats Examples ### Critical Threats Only ```json { "severity": "critical", "limit": 20 } ``` ### All High-Priority Threats ```json { "severity": "high", "limit": 50 } ``` ### Recent Threat Overview ```json { "severity": "all", "limit": 100 } ``` ## search_connections Examples ### Search by Source IP ```json { "sourceIp": "192.168.1.100", "hoursBack": 24, "limit": 100 } ``` ### Search by Destination IP ```json { "destIp": "8.8.8.8", "action": "deny", "hoursBack": 12 } ``` ### Port-Based Search ```json { "port": 443, "action": "all", "hoursBack": 6, "limit": 200 } ``` ### Blocked Connections Analysis ```json { "action": "deny", "hoursBack": 24, "limit": 500 } ``` ### Comprehensive IP Investigation ```json { "sourceIp": "203.0.113.10", "action": "all", "hoursBack": 48, "limit": 1000 } ``` ## get_stats Examples ### Top Blocked IPs ```json { "metric": "top_blocked_ips", "limit": 20 } ``` ### Most Active Allowed IPs ```json { "metric": "top_allowed_ips", "limit": 15 } ``` ### Port Usage Summary ```json { "metric": "port_summary", "limit": 25 } ``` ### Threat Type Breakdown ```json { "metric": "threat_summary", "limit": 10 } ``` ## export_logs Examples ### Basic CSV Export ```json { "format": "csv", "filters": { "startTime": "2024-01-01T00:00:00Z", "endTime": "2024-01-02T00:00:00Z" }, "limit": 5000 } ``` ### High-Severity JSON Export ```json { "format": "json", "filters": { "severity": ["critical", "high"], "logType": "firewall", "startTime": "2024-01-01T00:00:00Z" }, "limit": 1000 } ``` ### Blocked Connections Export ```json { "format": "csv", "filters": { "action": "deny", "startTime": "2024-01-01T00:00:00Z", "endTime": "2024-01-01T23:59:59Z" } } ``` ### IP-Specific Export ```json { "format": "json", "filters": { "sourceIp": "192.168.1.100", "startTime": "2024-01-01T00:00:00Z" }, "limit": 10000 } ``` ### VPN Logs Export ```json { "format": "csv", "filters": { "logType": "vpn", "startTime": "2024-01-01T00:00:00Z", "endTime": "2024-01-07T23:59:59Z" } } ``` ## Advanced Use Cases ### Security Incident Response 1. **Initial Analysis:** ```json { "query": "show critical and high severity events from last 24 hours", "hoursBack": 24, "logType": "all" } ``` 2. **Threat Investigation:** ```json { "severity": "critical", "limit": 100 } ``` 3. **Connection Analysis:** ```json { "sourceIp": "SUSPICIOUS_IP", "action": "all", "hoursBack": 72 } ``` 4. **Evidence Export:** ```json { "format": "json", "filters": { "sourceIp": "SUSPICIOUS_IP", "severity": ["critical", "high", "medium"], "startTime": "2024-01-01T00:00:00Z" } } ``` ### Network Performance Analysis 1. **Top Traffic Sources:** ```json { "metric": "top_allowed_ips", "limit": 50 } ``` 2. **Port Usage:** ```json { "metric": "port_summary", "limit": 100 } ``` 3. **Connection Patterns:** ```json { "query": "analyze connection patterns for high-traffic ports", "hoursBack": 24, "logType": "firewall" } ``` ### Compliance Reporting 1. **Access Attempts:** ```json { "query": "show all access attempts to administrative ports", "hoursBack": 168, "logType": "firewall" } ``` 2. **Failed Connections:** ```json { "action": "deny", "hoursBack": 168, "limit": 10000 } ``` 3. **Full Export:** ```json { "format": "csv", "filters": { "startTime": "2024-01-01T00:00:00Z", "endTime": "2024-01-31T23:59:59Z" }, "limit": 50000 } ``` ## Natural Language Query Tips ### Effective Query Patterns - **Time-based**: "last hour", "today", "past 24 hours" - **Severity-based**: "critical", "high priority", "severe threats" - **Action-based**: "blocked", "denied", "allowed" - **Network-based**: "from IP", "to port", "SSH connections" - **Service-based**: "VPN", "web traffic", "database connections" ### Example Natural Language Queries - "Show me blocked connections from external IPs in the last 2 hours" - "Find high-severity IPS alerts from today" - "Analyze VPN authentication failures this week" - "Show connections to administrative ports (22, 3389, 5900)" - "Find potential brute force attacks from the last 6 hours" - "Show malware detections and their sources" - "Analyze traffic patterns for suspicious internal hosts" ## Best Practices ### Query Optimization - Use specific time ranges to reduce processing load - Apply filters to focus on relevant data - Use appropriate limits for large datasets - Cache frequently used queries ### Security Considerations - Regularly review blocked IP statistics - Monitor for new threat types - Investigate unusual port activity - Track VPN connection patterns ### Performance Tips - Start with smaller time ranges for exploratory analysis - Use the most specific tool for your needs - Export large datasets during off-peak hours - Monitor cache hit rates for optimization

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/gensecaihq/Sonicwall-MCP-Server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server