Skip to main content
Glama

run_traceflow

Trace packet paths through NSX overlay to identify firewall rule hits and drop reasons for troubleshooting connectivity issues.

Instructions

Run a Traceflow to trace a packet's path through the NSX overlay.

Injects a synthetic probe packet from the source logical port and returns hop-by-hop observations including DFW rule hits and drop reasons.

Args: src_lport_id: Source logical port ID (attachment UUID of the VM NIC). src_ip: Source IP address for the probe packet. dst_ip: Destination IP address. protocol: IP protocol — TCP, UDP, or ICMP (default: TCP). dst_port: Destination port for TCP/UDP probes (default: 80). src_port: Source port for TCP/UDP probes (default: 1234). ttl: IP TTL value (default: 64). timeout_seconds: Maximum seconds to wait for completion (default: 20). target: Optional NSX Manager target name from config.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
src_lport_idYes
src_ipYes
dst_ipYes
protocolNoTCP
dst_portNo
src_portNo
ttlNo
timeout_secondsNo
targetNo
Behavior3/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations provided, the description carries the full burden and successfully discloses key behavioral traits: it uses synthetic probes (not real traffic) and returns specific data types (hop-by-hop observations, DFW rule hits, drop reasons). However, it omits whether the operation blocks until completion (given the timeout_seconds parameter) or returns immediately, and doesn't mention potential side effects or permission requirements.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is well-structured with a front-loaded purpose statement, followed by behavioral details, then a cleanly formatted Args section. No sentences are wasted; every line adds value beyond the structured schema fields.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness3/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

For a 9-parameter tool with no annotations and no output schema, the description adequately covers inputs but leaves gaps regarding the exact return structure (does it return raw observations or a session ID for use with get_traceflow_result?) and the synchronous/asynchronous nature of the operation.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters5/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Given 0% schema description coverage (only titles like 'Src Lport Id'), the Args section in the description provides comprehensive compensation by documenting all 9 parameters with specific semantics, including the UUID nature of src_lport_id, default values for protocol/ports, and the config reference for the target parameter.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description opens with a specific verb ('Run a Traceflow') and resource ('packet's path through the NSX overlay'), clearly distinguishing this diagnostic tool from sibling policy management tools like create_dfw_rule or update_dfw_policy.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description provides clear context for when to use the tool ('trace a packet's path') and explains the mechanism ('Injects a synthetic probe packet'), implying its use for debugging connectivity. However, it lacks explicit exclusions or mentions of the complementary sibling get_traceflow_result for result retrieval workflows.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/zw008/VMware-NSX-Security'

If you have feedback or need assistance with the MCP directory API, please join our Discord server