You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -10,28 +8,28 @@ The Model Context Protocol (MCP) is a standardized interface that allows AI agen
10
8
- Retrieve and analyze access, NAT, and threat prevention rules
11
9
- List and inspect objects such as hosts, networks, services, VPN communities, and more
12
10
13
-
14
11
## Demo
15
12
16
13
<!-- Place a link or embed for a demo video here -->
17
14
18
15
## Use Cases
19
16
20
-
### Helps ensure regulatory compliance with industry standards.
17
+
### Ensure regulatory compliance with industry standards
21
18
Prompt: Check if my gateway configuration meets PCI-DSS/HIPAA/GDPR requirements.
22
-
23
-
### Find broad-definition rules
19
+
20
+
### Find broad-definition rules
24
21
Prompt: List all firewall rules that allow traffic from any source to any destination on any port. Highlight rules that are disabled or unused.
25
22
26
-
### Source -> Destination Path Analysis
27
-
Prompt: Can you check in my policy if HOST/Network can access the internet?
23
+
### Source → Destination Path Analysis
24
+
Prompt: Can you check in my policy if a HOST or Network can access the internet?
28
25
29
-
### Recommendation for rulebase optimization
30
-
Prompt: Take a look at the internetfacing rules in my policy and suggest improvements. Are there any rules that you think I should strengthen or loosen. Consider both security risks and time wasting. In your recommendations, only refer to specific rules that you think can be changed, or offer to add new rules.
26
+
### Recommendation for rulebase optimization
27
+
Prompt: Take a look at the internet-facing rules in my policy and suggest improvements. Identify if there are any rules that should be strengthened or loosened. Consider both security risks and administrative overhead. In your recommendations, refer only to specific rules that can be changed or suggest adding new ones.
31
28
32
-
### Custom policy visualizations
29
+
### Custom policy visualizations
33
30
Prompt: Please create a visual report that shows which services are allowed in my network, under which conditions, and which services are strictly blocked.
34
31
32
+
---
35
33
36
34
## Configuration Options
37
35
@@ -41,41 +39,43 @@ This server supports two main modes of authentication:
41
39
42
40
Authenticate to Check Point Smart-1 Cloud using an API key.
43
41
44
-
-**How to generate an API key:**
45
-
In your SmartOne Cloud dashboard, go to Settings -> API & SmartConsole and genrate an API Key.
46
-
Copy the key and the server login URL (without the "login" suffix) to your client settings.
42
+
-**How to generate an API key:**
43
+
In your Smart-1 Cloud dashboard, go to **Settings → API & SmartConsole** and generate an API key.
44
+
Copy the key and the server login URL (excluding the `/login` suffix) to your client settings.
47
45

48
46
47
+
Set the following environment variables:
49
48
50
-
Set the following environment variables for Smart-1 Cloud:
51
-
52
-
-`API_KEY`: Your Smart-1 Cloud API key
53
-
-`S1C_URL`: Your Smart-1 Cloud Tenant "Web-API" URL
49
+
-`API_KEY`: Your Smart-1 Cloud API key
50
+
-`S1C_URL`: Your Smart-1 Cloud tenant "Web-API" URL
54
51
55
52
---
56
53
57
54
### 2. On-Prem Management (API Key or Username/Password)
58
55
56
+
-**Configure your management server to allow API access:**
57
+
To use this server with an on-premises Check Point management server, you must first enable API access.
58
+
Follow the official instructions for [Managing Security through API](https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SmartProvisioning_AdminGuide/Content/Topics-SPROVG/Managing-Security-through-API.htm).
59
59
60
-
Authenticate to an on-premises Security Management Server using either an API key or username/password.
61
-
62
-
-**How to create an administrator and credentials:**
63
-
- Follow the official instructions here: [Managing Administrator Accounts (Check Point R81+)](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Managing_Administrator_Accounts.htm)
64
-
- When creating the administrator, set the desired permissions for API access and management operations.
65
-
- You can authenticate using either an API key (recommended for automation) or username/password credentials.
60
+
-**Authenticate to the Security Management Server** using either an API key or username/password:
61
+
- Follow the official instructions: [Managing Administrator Accounts (Check Point R81+)](https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Managing_Administrator_Accounts.htm)
62
+
- When creating the administrator, assign appropriate permissions for API access and management operations.
63
+
- You can authenticate using an API key (recommended for automation) or username/password credentials.
66
64
67
65
Set the following environment variables:
68
66
69
-
-`API_KEY`: Your management API key (if using API key authentication)
70
-
-`MANAGEMENT_HOST`: The IP or hostname of your management server
71
-
-`PORT`: (Optional) Management server port (default: 443)
72
-
-`USERNAME`: (Optional) Username for authentication
73
-
-`PASSWORD`: (Optional) Password for authentication
67
+
-`MANAGEMENT_HOST`: IP address or hostname of your management server
68
+
-`PORT`: (Optional) Management server port (default: 443)
69
+
-`API_KEY`: Your management API key (if using API key authentication)
70
+
-`USERNAME`: Username for authentication (if using username/password authentication)
71
+
-`PASSWORD`: Password for authentication (if using username/password authentication)
74
72
75
73
---
74
+
76
75
## Client Configuration
77
76
78
-
This server can be used with Claude Desktop, Cursor, GitHub Copilot MCP integrations or any other MCP. Use the appropriate configuration for your environment:
77
+
This server can be used with Claude Desktop, Cursor, GitHub Copilot MCP integrations, or any other MCP client.
78
+
> Note: Due to the nature of management API calls, using this server may require a paid subscription to the model provider to handle token limits and context windows.
79
79
80
80
### Smart-1 Cloud Example
81
81
@@ -87,7 +87,7 @@ This server can be used with Claude Desktop, Cursor, GitHub Copilot MCP integrat
1.**Authentication keys and credentials are never shared with the model.** They are only used by the MCP server to authenticate with your Check Point management system.
180
-
2.**Only use client implementations you trust.** Malicious or untrusted clients could misuse your credentials or data.
181
-
3.**Management data will be exposed to the model.**Ensure you only use models and providers that comply with your organization's policies regarding PII and sensitive information exposure.
188
+
1.**Authentication keys and credentials are never shared with the model.** They are used only by the MCP server to authenticate with your Check Point management system.
189
+
2.**Only use client implementations you trust.** Malicious or untrusted clients could misuse your credentials or access data improperly.
190
+
3.**Management data is exposed to the model.**Use models and providers that comply with your organization’s policies on sensitive data and PII handling.
0 commit comments