mcp-opnsense
mcp-opnsense
Slim OPNsense MCP Server for managing firewall infrastructure via the OPNsense REST API.
No SSH. No shell execution. API-only. 3 runtime dependencies.
Table of Contents
Features
62 tools across 8 domains:
DNS/Unbound (12) — Host overrides, forwards, blocklist, cache management
Firewall (8) — Rules, aliases, NAT, apply changes
Diagnostics (8) — ARP, routes, ping, traceroute, DNS lookup, firewall states/logs
Interfaces (3) — List, configuration, statistics (read-only)
DHCP (5) — Leases, static mappings (ISC DHCPv4 + Kea dual support)
System (7) — Info, backup (list/download/revert), certificate listing, service control
ACME/Let's Encrypt (14) — Accounts, challenges, certificates, renewal, settings
Firmware/Plugins (5) — Version info, plugin management
Quick Start
npm install
cp .env.example .env # Edit with your OPNsense API credentials
npm run build
node dist/index.js # stdio transport for MCPHashiCorp Vault Integration (Optional)
mcp-opnsense supports opportunistic AppRole authentication against a HashiCorp Vault
instance. When Vault env vars are present, the server fetches OPNsense credentials from
KV v2 at startup. If they are absent, the server falls back silently to direct env vars or
MCP_SECRETS_FILE — no configuration change or restart required.
How It Works
At startup, the server checks for
NAS_VAULT_ADDRinprocess.env.If set, it authenticates via AppRole (
NAS_VAULT_ROLE_ID+NAS_VAULT_SECRET_ID), reads the secret at<NAS_VAULT_KV_MOUNT>/data/<path>, and maps the KV fields to OPNsense env vars.If
NAS_VAULT_ADDRis not set (or any Vault call fails), a single warning line is written to stderr and the server continues with whatever env vars are already available.The Vault client uses the global
fetchbuilt into Node 20+ — no additional runtime dependencies are added.
Secret Precedence
Explicit env vars > Vault > MCP_SECRETS_FILE > error (required var missing)Values already present in
process.envare never overwritten by Vault.Vault is skipped entirely if
NAS_VAULT_ADDRis unset.MCP_SECRETS_FILEis the last fallback (see Loading Secrets from a File below).
Vault Environment Variables
Variable | Required | Description |
| Yes* | Vault server address (e.g. |
| Yes* | AppRole role ID for this server |
| Yes* | AppRole secret ID for this server |
| No | KV v2 mount path (default: |
* Only required when using Vault. Without these, the server uses direct env vars or MCP_SECRETS_FILE.
Note:
OPNSENSE_VERIFY_SSL,OPNSENSE_TIMEOUT, and all SSH-related env vars (OPNSENSE_SSH_*) are not loaded from Vault. Set them directly in the MCP config or your shell environment.
KV v2 Secret Structure
The server reads from the path configured at startup (default: kv/data/opnsense/bifrost,
customisable via the KV mount). The secret must contain the following keys:
# Path: kv/your/opnsense/secret
{
"url": "https://your-opnsense.example.com",
"api_key": "your-api-key",
"api_secret": "your-api-secret"
}Key mapping:
KV field | Env var |
|
|
|
|
|
|
Vault Setup
1. Write credentials to KV v2:
vault kv put kv/opnsense/your-firewall \
url=https://your-opnsense.example.com \
api_key=your-api-key \
api_secret=your-api-secret2. Create a read-only policy:
# opnsense-read.hcl
path "kv/data/opnsense/*" {
capabilities = ["read"]
}
path "kv/metadata/opnsense/*" {
capabilities = ["list", "read"]
}vault policy write opnsense-read opnsense-read.hcl3. Enable AppRole auth and create a role:
vault auth enable approle
vault write auth/approle/role/mcp-opnsense \
token_policies="opnsense-read" \
token_ttl=1h \
token_max_ttl=4h \
secret_id_ttl=04. Retrieve the role credentials:
vault read auth/approle/role/mcp-opnsense/role-id
vault write -f auth/approle/role/mcp-opnsense/secret-idStore the returned role_id and secret_id in your MCP config (see example below).
Claude Desktop / MCP Config Example (Vault)
When using Vault, OPNsense credentials are not present in the config file. Only Vault authentication details and non-secret options are needed:
{
"mcpServers": {
"opnsense": {
"command": "npx",
"args": ["@itunified.io/mcp-opnsense"],
"env": {
"NAS_VAULT_ADDR": "https://vault.example.com:8200",
"NAS_VAULT_ROLE_ID": "your-role-id",
"NAS_VAULT_SECRET_ID": "your-secret-id",
"OPNSENSE_VERIFY_SSL": "true"
}
}
}
}This keeps all OPNsense secrets out of config files and version control. The server authenticates to Vault on each startup and retrieves fresh credentials.
Claude Code Integration
Add to .mcp.json in your project root:
{
"mcpServers": {
"opnsense": {
"command": "node",
"args": ["/path/to/mcp-opnsense/dist/index.js"],
"env": {
"OPNSENSE_URL": "https://your-opnsense.example.com",
"OPNSENSE_API_KEY": "your-api-key",
"OPNSENSE_API_SECRET": "your-api-secret",
"OPNSENSE_VERIFY_SSL": "true"
}
}
}
}Environment Variables
Variable | Required | Default | Description |
| Yes | — | OPNsense base URL (e.g. |
| Yes | — | API key for authentication |
| Yes | — | API secret for authentication |
| No |
| Set to |
| No |
| Request timeout in milliseconds |
| No | — | Path to a key/value file to load on startup (see below) |
| No | — | HashiCorp Vault URL, enables Vault AppRole loading (see below) |
| No | — | Vault AppRole role_id |
| No | — | Vault AppRole secret_id |
| No |
| Vault KV v2 mount path |
| No |
| Enable SSH-backed tools ( |
| If SSH enabled | — | SSH hostname of the OPNsense target |
| If SSH enabled | — | SSH login user (must have |
| If SSH enabled | — | Path to the private key (e.g. |
| If SSH enabled | — | Path to a pre-populated |
| No |
| SSH port |
| No |
| Remote directory holding |
| No |
| SSH connect timeout in seconds |
Loading Secrets from a File
When the MCP server is launched from a context that does not inherit your shell
environment (e.g. a GUI desktop app launched via launchd), process.env may
be empty and tool calls will fail with Invalid URL errors. To avoid
system-wide environment hacks, point MCP_SECRETS_FILE at a file that holds
the required variables:
export MCP_SECRETS_FILE=~/.mcp-opnsense.envThe file is a simple KEY=value format (optionally prefixed with export,
with single or double quotes around values, # comments allowed). Example:
OPNSENSE_URL=https://your-opnsense.example.com
OPNSENSE_API_KEY=your-api-key
OPNSENSE_API_SECRET=your-api-secretThe OPNsense web UI "Download as .txt" button generates a two-line file with
lowercase key= / secret= pairs. That format is also recognized directly —
no rewriting needed:
key=your-api-key
secret=your-api-secretPrecedence: values in process.env always win over values from the file,
so the existing shell-based workflow stays fully backward compatible. Missing
or unreadable files are silently skipped (the server will fail with the usual
"required variable" error if nothing is set).
Security: the file holds plaintext credentials. Store it outside any git
repository and restrict permissions: chmod 600 ~/.mcp-opnsense.env.
Loading Secrets from HashiCorp Vault (AppRole)
If you run a central Vault instance, mcp-opnsense can fetch its credentials
at startup via AppRole instead of storing them in a file. Set:
export NAS_VAULT_ADDR=https://vault.example.com
export NAS_VAULT_ROLE_ID=<role-id>
export NAS_VAULT_SECRET_ID=<secret-id>
# optional — defaults to "kv"
export NAS_VAULT_KV_MOUNT=kvThe loader reads KV v2 at <mount>/data/opnsense/bifrost and expects three
keys: url, api_key, api_secret. Example Vault write:
vault kv put kv/opnsense/bifrost \
url=https://your-opnsense.example.com \
api_key=your-api-key \
api_secret=your-api-secretPrecedence: process.env > Vault > MCP_SECRETS_FILE. If NAS_VAULT_ADDR
is unset, Vault loading is a silent no-op — the server behaves exactly as
before. On any Vault error (network, auth, missing path), a single-line
warning is written to stderr and the server falls back to whatever env vars
are already set; it will then fail with the usual "required variable" error
if nothing remains.
Security: secret values are never logged. Only the KV path name and a
populated-count appear in stderr diagnostics. The loader uses the global
fetch (Node 20+) — no new runtime dependencies.
Available Tools (87)
DNS/Unbound (12 tools)
Tool | Description |
| List host overrides (A/AAAA/CNAME) |
| Add a host override record |
| Delete a host override by UUID |
| List DNS-over-TLS forwarding servers |
| Add a DNS forwarding server |
| Delete a DNS forward by UUID |
| List domain overrides (blocked domains) |
| Block a domain |
| Unblock a domain by UUID |
| Flush DNS cache and DNSBL data |
| Dump DNS cache for diagnostics |
| Apply DNS changes (reconfigure Unbound) |
Firewall (10 tools)
Tool | Description |
| List all firewall filter rules |
| Create a firewall rule |
| Update a firewall rule by UUID |
| Delete a firewall rule by UUID |
| Enable/disable a firewall rule |
| Change the evaluation order (sequence) of a rule — enforces whitelist-before-deny |
| Audit rule descriptions against a regex (default: |
| List firewall aliases (host, network, port, URL) |
| Create/update/delete aliases |
| Apply pending firewall changes |
Diagnostics (8 tools)
Tool | Description |
| Show ARP table (IP-to-MAC mappings) |
| Show routing table |
| Ping a host from OPNsense |
| Traceroute to a destination |
| Perform DNS lookup from OPNsense |
| List active firewall connection states |
| Retrieve recent firewall log entries |
| Get system status (CPU, memory, uptime, disk) |
Interfaces (5 tools)
Tool | Description |
| List all network interfaces with device mappings |
| Get detailed interface configuration |
| Get traffic statistics for all interfaces |
| SSH-backed. Assign a VLAN/NIC device to a free |
| SSH-backed. Set IPv4/IPv6 on an already-assigned |
SSH-backed interface assignment
opnsense_if_assign and opnsense_if_configure are the only tools that do
not go through the OPNsense REST API. The REST API has no "Interfaces →
Assignments" endpoint, so mcp-opnsense invokes two small PHP helpers over
SSH + sudo instead. Both tools fail fast with a clear error if
OPNSENSE_SSH_ENABLED is not true, so non-SSH deployments are unaffected.
Setup on the OPNsense host:
Install the helpers (shipped in this repo under
opnsense-helpers/):sudo install -m 0755 -o root -g wheel if_assign.php /usr/local/opnsense/scripts/mcp/ sudo install -m 0755 -o root -g wheel if_configure.php /usr/local/opnsense/scripts/mcp/Create a dedicated SSH user with a public key and add a
sudoers.ddrop-in that whitelists the exact helper invocations (seeopnsense-helpers/README.mdfor the recommended pattern — the glob MUST end in*to accommodate the mandatory PHP--separator).
Setup on the mcp-opnsense host:
export OPNSENSE_SSH_ENABLED=true
export OPNSENSE_SSH_HOST=your-opnsense.example.com
export OPNSENSE_SSH_USER=claude
export OPNSENSE_SSH_KEY_PATH=~/.ssh/id_ed25519
export OPNSENSE_SSH_KNOWN_HOSTS=~/.ssh/known_hostsThe known_hosts file must be pre-populated — mcp-opnsense enforces strict
host key checking and will refuse to connect otherwise (no TOFU fallback).
Security posture:
No shell is invoked locally; the client spawns
sshdirectly with an argv array.Arguments are single-quote-escaped before concatenation into the remote command string, so untrusted tool input cannot break out of argv on the remote side.
BatchMode=yes+PreferredAuthentications=publickeydisables password and keyboard-interactive auth.The PHP helpers validate every argument (slot regex, device regex, description charset, IP + CIDR) before touching
config.xml, stamp everywrite_config()withmcp-opnsense: ...for audit traceability, and use numbered exit codes so the caller can distinguish "invalid args" from "write_config failed" from "apply failed".
See ADR-0092 (in the private infrastructure repo) for the full research spike, empirical findings, and rollback contract.
DHCP (5 tools)
Tool | Description |
| List all current DHCPv4 leases |
| Search leases by IP, MAC, or hostname |
| List static DHCP mappings (reservations) |
| Add a static DHCP mapping |
| Delete a static mapping by UUID |
System (7 tools)
Tool | Description |
| Get system status (hostname, versions, CPU, memory, uptime, disk) |
| List all configuration backups with timestamps and descriptions |
| Download configuration backup as XML (current or specific) |
| Revert to a previous configuration backup (destructive) |
| List all certificates in the trust store |
| List all services and their running status |
| Start, stop, or restart a service by name |
ACME/Let's Encrypt (14 tools)
Tool | Description |
| List ACME accounts (Let's Encrypt, ZeroSSL, etc.) |
| Register a new ACME account with a CA |
| Delete an ACME account by UUID |
| Trigger registration of an ACME account with its CA |
| List all challenge/validation methods |
| Add a DNS-01 challenge (Cloudflare, AWS, etc.) |
| Update an existing challenge configuration |
| Delete a challenge by UUID |
| List all ACME certificates and their status |
| Create a new certificate request |
| Delete an ACME certificate by UUID |
| Trigger immediate certificate renewal |
| Get or update ACME service settings |
| Apply pending ACME configuration changes |
VLANs (4 tools)
Tool | Description |
| List configured 802.1Q VLAN interfaces (parent, tag, priority, description) |
| Create a VLAN interface on a parent device |
| Update VLAN tag, parent, priority, or description |
| Delete a VLAN interface by UUID |
Firmware/Plugins (5 tools)
Tool | Description |
| Get firmware version, architecture, update status |
| Check for available firmware upgrades |
| List all available and installed plugins |
| Install an OPNsense plugin package |
| Remove a plugin package (requires confirmation) |
Skills
Claude Code skills compose MCP tools into higher-level workflows. See .claude/skills/README.md for detailed documentation.
Skill | Slash Command | Description |
opnsense-service-health |
| Health dashboard — system status, services, firmware, interfaces |
opnsense-acme-renew |
| ACME certificate status check and renewal |
opnsense-backup |
| Configuration backup management — list, download, revert |
opnsense-live-test |
| Live integration test — read + safe writes with cleanup |
opnsense-diagnostics | — | Network connectivity diagnostics — ping, traceroute, DNS, ARP |
opnsense-dns-management | — | DNS record management — add, delete, apply, verify resolution |
opnsense-firewall-audit | — | Firewall security audit — permissive rules, disabled rules, patterns |
Known Limitations
Some OPNsense operations are not available via the REST API and require manual GUI access:
Web GUI SSL certificate assignment —
ssl-certrefcan only be changed via System > Settings > Administration in the web UI. See docs/manual-operations.md.Configuration upload/import — OPNsense has no API to upload configuration XML files. Use
opnsense_sys_backup_revertto revert to local backups, or upload via the web GUI.User/group management — Not exposed via REST API.
VPN configuration — Limited API coverage; most settings require the web UI.
Security
Transport: stdio only — no HTTP endpoints exposed
Authentication: OPNsense API key/secret via environment variables
SSL: Enabled by default, configurable for self-signed certs
No SSH: All operations use the OPNsense REST API exclusively
Input validation: Strict Zod schemas for all tool parameters
Destructive operations: Require explicit
confirm: trueparameterSee SECURITY.md for the full security policy
Development
npm test # Run unit tests (vitest)
npm run build # Compile TypeScript
npx tsc --noEmit # Type check onlySee CONTRIBUTING.md for contribution guidelines.
License
This project is dual-licensed:
Open Source: GNU Affero General Public License v3.0 (AGPL-3.0) — free for open-source and non-commercial use
Commercial: Available for proprietary integrations — see COMMERCIAL_LICENSE.md
If you use mcp-opnsense in a proprietary product or SaaS offering, a commercial license is required. Support development by sponsoring us on GitHub.
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/itunified-io/mcp-opnsense'
If you have feedback or need assistance with the MCP directory API, please join our Discord server