List Firewalla Target Lists
firewalla_list_target_listsView available block and allow target lists, including Firewalla-managed categories and user-defined custom lists, to audit network security configurations.
Instructions
List the block/allow target lists available on this MSP account — both Firewalla-managed ("global") and user-defined.
Use this to answer:
"Which block lists is Firewalla enforcing against?"
"Have I added any custom target lists, and what are their owners?"
"What categories (ad, tracker, malware, …) are covered?"
This endpoint returns summaries (including target count per list);
call firewalla_get_target_list for the actual targets array.
Args:
owner (string, optional): Filter by owner (e.g. 'global').
response_format ('markdown' | 'json'): Output format (default: markdown).
Returns: { count: number, // number of target lists targetLists: Array<{ id: string, name: string, owner: string, // "global" | user id type?: string, // e.g. "ad", "tracker", "malware", "custom" source?: string, // upstream feed source (Firewalla-managed lists) count?: number, // number of entries in the list blockMode?: string, // e.g. "dns" | "ip" beta?: boolean, notes?: string, lastUpdated?: number }> }
Audit framing:
Custom lists (owner != global) without notes → undocumented intent.
blockMode=dns only, but target includes raw IPs → mismatch, investigate.
Zero-count list → may be stale / never populated.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| owner | No | Filter by owner. Common values: 'global' (Firewalla-managed), or a specific user id. Omit to list all. | |
| response_format | No | Output format. 'markdown' (default) renders human-readable audit tables. 'json' returns structured data suitable for chaining into another tool call. | markdown |