MCP server for network device queries via SSH (Palo Alto firewalls, Cisco IOS)
Project description
MCP Network JCD
MCP server for querying network devices via SSH. Supports Palo Alto firewalls and Cisco IOS devices.
Installation
pip install mcp-network-jcd
Or from source:
python3.12 -m venv .venv
source .venv/bin/activate
pip install -e .
Configuration
Set environment variables for credentials:
# Palo Alto
export PALOALTO_USERNAME="readonly_user"
export PALOALTO_PASSWORD="your_password"
# Cisco IOS
export CISCO_USERNAME="readonly_user"
export CISCO_PASSWORD="your_password"
export CISCO_ENABLE_PASSWORD="enable_secret" # Optional
Claude Desktop
Add to ~/.config/claude/claude_desktop_config.json:
{
"mcpServers": {
"mcp-network-jcd": {
"command": "python",
"args": ["-m", "mcp_network_jcd.server"],
"env": {
"PALOALTO_USERNAME": "readonly_user",
"PALOALTO_PASSWORD": "your_password",
"CISCO_USERNAME": "cisco_user",
"CISCO_PASSWORD": "cisco_password",
"CISCO_ENABLE_PASSWORD": "enable_secret"
}
}
}
}
Tools
paloalto_query
Query Palo Alto firewall via SSH.
Input: host*, commands* (1-10), port (22), timeout (30s)
Output: {success, device, results[], total_duration_ms, timestamp}
Usage Tips
Use filtered commands to avoid large outputs:
# Good
show routing route | match 10.14
test security-policy-match from ZONE1 to ZONE2 source IP destination IP protocol 6 destination-port 443
show interface logical
show system info
# Avoid (output too large)
show running security-policy
show session all
show routing route # without filter
cisco_ios_query
Query Cisco IOS devices via SSH.
Input: host*, commands* (1-10), port (22), timeout (30s)
Output: {success, device, results[], total_duration_ms, timestamp}
Usage Tips
Use filtered commands to avoid large outputs:
# Good
show version
show ip interface brief
show ip route | include 10.0
show running-config | section interface
show interfaces status
# Avoid (output too large)
show running-config # full config
show ip route # without filter on large routing tables
show tech-support
Enable Mode
If CISCO_ENABLE_PASSWORD is set, the tool automatically enters privileged EXEC mode before running commands.
Error Codes
Both tools return structured error responses:
| Code | Description |
|---|---|
CONFIG_ERROR |
Missing credentials in environment |
AUTH_FAILED |
Invalid username/password or enable password |
CONNECTION_TIMEOUT |
Device unreachable |
CONNECTION_REFUSED |
SSH connection rejected |
UNKNOWN_ERROR |
Unexpected error |
Development
# Install dev dependencies
pip install -e ".[dev]"
# Run tests
pytest
# Lint
ruff check .
License
MIT
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mcp_network_jcd-0.2.0.tar.gz.
File metadata
- Download URL: mcp_network_jcd-0.2.0.tar.gz
- Upload date:
- Size: 83.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e6f9998eddb46c3f78294012419b23c22d3347bc818d585f27b3965fc277f835
|
|
| MD5 |
7c16f9c296346408428ed5606011271f
|
|
| BLAKE2b-256 |
a0e3bbcdbcbc0adef4cc72a8737d825026699704c9349d3b20b019e13eff9ad8
|
File details
Details for the file mcp_network_jcd-0.2.0-py3-none-any.whl.
File metadata
- Download URL: mcp_network_jcd-0.2.0-py3-none-any.whl
- Upload date:
- Size: 11.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
390476f1ae6eac5f17d8ae8635545197d650131e4bbb5444d1ba4512b4b37c52
|
|
| MD5 |
5d88a8691e00949ae381b20c02dcb011
|
|
| BLAKE2b-256 |
a1abe136a6ef9927e37c2d267583f7cbf54ebeb3a726a9626ae47188b2b35411
|