home / mcp / pfclaude mcp server
Provides a bidirectional MCP server for pfSense control with an emergency health brain and multiple alert channels.
Configuration
View docs{
"mcpServers": {
"arktechnwa-pfsense-mcp": {
"command": "pfsense-mcp",
"args": [],
"env": {
"PFSENSE_HOST": "192.168.1.1",
"PFSENSE_API_KEY": "your-api-key"
}
}
}
}pfClaude is a bidirectional MCP server that lets you control pfSense through a dedicated MCP server while providing an onboard emergency brain for health checks and autonomous recovery. It combines a full pfSense API passthrough with robust health monitoring, alerts, and automated responses to keep your network safe and responsive even if the primary control channel is unavailable.
You operate pfClaude from an MCP client that talks to the pfSense MCP server. Use the normal mode to issue authenticated, HTTPS-based commands that cover the full range of pfSense operations. If the network becomes unhealthy or Claude Code cannot reach pfSense, pfClaude activates its emergency brain to run diagnostics, send alerts, and take predefined autonomous actions via configurable escalation paths.
Prerequisites you must prepare first:
Install the MCP server on your Claude Code host using the following steps:
pkg add https://github.com/ArktechNWA/pfsense-mcp/releases/latest/pfsense.pkg
npm install -g @arktechnwa/pfsense-mcp{
"mcpServers": {
"pfsense": {
"command": "pfsense-mcp",
"env": {
"PFSENSE_HOST": "192.168.1.1",
"PFSENSE_API_KEY": "your-api-key"
}
}
}
}Query hostname, version, uptime, and resource usage of pfSense.
Get an overall health summary of the pfSense system.
Reboot pfSense (dangerous operation).
Shutdown pfSense (dangerous operation).
Export the pfSense configuration XML.
List all interfaces with current status.
Get detailed status for a specific interface.
Retrieve traffic counters and errors for interfaces.
Restart a specific network interface.
Enable a specific interface.
Disable a specific interface.
List firewall and NAT rules.
Add a firewall rule.
Delete a firewall rule.
Modify a firewall rule.
View the connection state table.
Flush the firewall state table.
Manage firewall aliases.
List NAT rules such as port forwards.
Add a NAT rule.
Delete a NAT rule.
Modify a NAT rule.
Show current DHCP leases.
Show reserved DHCP mappings.
Show DHCP server configuration.
Restart the DHCP service.
Show Unbound resolver config.
Show dnsmasq config.
Add a DNS override.
Delete a DNS override.
Restart DNS services.
Show OpenVPN connections.
Show IPsec SAs.
Show WireGuard peers.
Disconnect a VPN client or tunnel.
Show the routing table.
Show static routes.
Show gateway health.
Switch the default gateway.
Provide data for bandwidth graphs.
Show interface traffic totals.
Show top talkers.
Show system logs.
Show firewall logs.
Show DHCP logs.
Show VPN logs.
Search across all logs.
List installed packages.
List available packages.
Install a package.
Remove a package.
List all services and their status.
Start a service.
Stop a service.
Restart a service.
Ping from pfSense.
Traceroute from pfSense.
DNS lookup from pfSense.
ARP table.
IPv6 neighbor table.
Open sockets.
Real-time state table.