Track MCP LogoTrack MCP
Track MCP LogoTrack MCP

The world's largest repository of Model Context Protocol servers. Discover, explore, and submit MCP tools.

Product

  • Categories
  • Top MCP
  • New & Updated
  • Submit MCP

Company

  • About

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 TrackMCP. All rights reserved.

Built with ❤️ by Krishna Goyal

    Illumio Mcp Server

    The first MCP server for cybersecurity

    2 stars
    Python
    Updated Jun 12, 2025

    Table of Contents

    • What can it do?
    • Prerequisites
    • Installation
    • Configuration
    • Using uv and Claude Desktop
    • Tools
    • Workload Management
    • Label Operations
    • Ruleset & Rule Management
    • IP List Management
    • Service Management
    • Traffic Analysis
    • Automated Ringfencing
    • Infrastructure Service Identification
    • Policy Lifecycle
    • Enforcement Readiness
    • Batch Operations
    • Workload Enforcement Status
    • Policy Coverage
    • Security Analysis
    • Event Monitoring
    • Connection Testing
    • Testing
    • Illumio Rule Processing Order
    • Visual Examples
    • Application Analysis
    • Infrastructure Insights
    • Security Assessment
    • Remediation Planning
    • Policy Management
    • Workload Management
    • Label Management
    • Service Analysis
    • Project Planning
    • Available Prompts
    • Ringfence Application
    • Analyze Application Traffic
    • How to use MCP prompts
    • How prompts work
    • Docker
    • Pull the container
    • Run with Claude Desktop
    • Run Standalone
    • Docker Compose
    • Contributing
    • License
    • Support

    Table of Contents

    • What can it do?
    • Prerequisites
    • Installation
    • Configuration
    • Using uv and Claude Desktop
    • Tools
    • Workload Management
    • Label Operations
    • Ruleset & Rule Management
    • IP List Management
    • Service Management
    • Traffic Analysis
    • Automated Ringfencing
    • Infrastructure Service Identification
    • Policy Lifecycle
    • Enforcement Readiness
    • Batch Operations
    • Workload Enforcement Status
    • Policy Coverage
    • Security Analysis
    • Event Monitoring
    • Connection Testing
    • Testing
    • Illumio Rule Processing Order
    • Visual Examples
    • Application Analysis
    • Infrastructure Insights
    • Security Assessment
    • Remediation Planning
    • Policy Management
    • Workload Management
    • Label Management
    • Service Analysis
    • Project Planning
    • Available Prompts
    • Ringfence Application
    • Analyze Application Traffic
    • How to use MCP prompts
    • How prompts work
    • Docker
    • Pull the container
    • Run with Claude Desktop
    • Run Standalone
    • Docker Compose
    • Contributing
    • License
    • Support

    Documentation

    MseeP.ai Security Assessment Badge

    Illumio MCP Server

    A Model Context Protocol (MCP) server that provides an interface to interact with Illumio PCE (Policy Compute Engine). This server enables programmatic access to Illumio workload management, label operations, traffic flow analysis, automated ringfencing, and infrastructure service identification.

    What can it do?

    Use conversational AI to talk to your PCE:

    • Full CRUD on workloads, labels, IP lists, services, and rulesets
    • Traffic analysis — query flows, get summaries, filter by policy decision
    • Automated ringfencing — analyze traffic and create app-to-app segmentation policies with one command
    • Selective enforcement — add deny rules for apps in selective mode with configurable consumer flavors
    • Infrastructure service identification — discover which apps are infrastructure services using graph centrality analysis, so you know what to policy first
    • Deny rule management — create, update, and delete deny rules (including override deny for emergencies)
    • Event monitoring — query PCE events with severity and type filters
    • PCE health checks — verify connectivity and credentials

    Prerequisites

    • Python 3.8+
    • Access to an Illumio PCE instance
    • Valid API credentials for the PCE

    Installation

    1. Clone the repository:

    bash
    git clone https://github.com/alexgoller/illumio-mcp-server.git
    cd illumio-mcp-server

    2. Install dependencies:

    bash
    uv sync

    Configuration

    You should run this using the uv command, which makes it easier to pass in environment variables and run it in the background.

    Using uv and Claude Desktop

    On MacOS: ~/Library/Application\ Support/Claude/claude_desktop_config.json

    On Windows: %APPDATA%/Claude/claude_desktop_config.json

    Add the following to the custom_settings section:

    json
    "mcpServers": {
        "illumio-mcp": {
          "command": "uv",
          "args": [
            "--directory",
            "/path/to/illumio-mcp-server",
            "run",
            "illumio-mcp"
          ],
          "env": {
            "PCE_HOST": "your-pce-host",
            "PCE_PORT": "your-pce-port",
            "PCE_ORG_ID": "1",
            "API_KEY": "api_key",
            "API_SECRET": "api_secret"
          }
        }
      }
    }

    Tools

    Workload Management

    • get-workloads — Retrieve workloads with optional filtering by name, hostname, IP, labels, and max results
    • create-workload — Create an unmanaged workload with name, IP addresses, and labels
    • update-workload — Update an existing workload's properties
    • delete-workload — Remove a workload from PCE

    Label Operations

    • get-labels — Retrieve labels with optional filtering by key, value, and max results
    • create-label — Create a new label with key-value pair
    • update-label — Update an existing label
    • delete-label — Remove a label

    Ruleset & Rule Management

    • get-rulesets — Get rulesets with optional filtering by name, description, and enabled status
    • create-ruleset — Create a new ruleset with scopes
    • update-ruleset — Update ruleset properties
    • delete-ruleset — Remove a ruleset
    • create-deny-rule — Create a deny rule (regular or override deny) in a ruleset
    • update-deny-rule — Update an existing deny rule
    • delete-deny-rule — Remove a deny rule

    IP List Management

    • get-iplists — Get IP lists with optional filtering by name, description, FQDN, and max results
    • create-iplist — Create a new IP list
    • update-iplist — Update an existing IP list
    • delete-iplist — Remove an IP list

    Service Management

    • get-services — Get services with optional filtering by name, port, protocol, and max results
    • create-service — Create a new service definition
    • update-service — Update an existing service
    • delete-service — Remove a service

    Traffic Analysis

    • get-traffic-flows — Get detailed traffic flow data with filtering by date range, source/destination, service, policy decision, and more
    • get-traffic-flows-summary — Get aggregated traffic summaries grouped by app, env, port, and protocol

    Automated Ringfencing

    • create-ringfence — Automated app-to-app segmentation policy creation. Analyzes traffic flows to discover which remote apps communicate with a target app, then creates a ruleset with:
    • Intra-scope allow rule — all workloads within the app can communicate freely
    • Extra-scope allow rules — each discovered remote app gets an allow rule on All Services
    • Selective enforcement mode (selective=true) — adds a deny rule blocking all inbound, with allow rules for known apps processed first. Gets you to enforcement faster than full enforcement mode.
    • Deny consumer flavors (deny_consumer parameter):
    • any (default) — IP list Any (0.0.0.0/0) as consumer, deny only at destination. Safest.
    • ams — All Workloads as consumer, deny pushed to every managed workload. Broader.
    • ams_and_any — Both. Maximum coverage.
    • Policy coverage awareness — each rule is annotated as already_allowed (traffic covered by existing policy, created for documentation) or newly_allowed (filling a policy gap). Summary shows how many remote apps are already covered vs need new rules.
    • **skip_allowed parameter** — set to true to only create rules for traffic not yet covered by existing policy, producing minimal rulesets that fill gaps only
    • Merge-safe — detects existing rulesets and rules, never creates duplicates
    • Dry-run support — preview what would be created without making changes

    Infrastructure Service Identification

    • identify-infrastructure-services — Discover which apps are infrastructure services by analyzing traffic patterns. Builds an app-to-app communication graph and uses dual-pattern scoring to recognize two types of infrastructure:

    Provider infra (AD, DNS, shared DB) — consumed by many apps, high in-degree, low out-degree.

    Consumer infra (monitoring, backup, log shipping) — connects out to many apps, high out-degree, low in-degree.

    Two scores are computed per app, and the higher one wins:

    ScoreDegree metric (40%)Directionality (30%)Betweenness (25%)Volume (5%)
    ProviderIn-degreeConsumer ratio (in/total)Betweenness centralityConnection volume
    ConsumerOut-degreeProducer ratio (out/total)Betweenness centralityConnection volume

    Mixed-traffic dampening: score *= 1 / (1 + min(in_degree, out_degree) * 0.3) — apps with both significant inbound AND outbound connections are business apps, not infrastructure. Pure directional apps (all in OR all out) get no penalty.

    Non-production environments (staging, dev, etc.) receive a 50% score penalty since infrastructure services typically live in production.

    Apps are classified into tiers:

    • Core Infrastructure (score >= 75) — monitoring, AD, SIEM, DNS. Policy these first.
    • Shared Service (score >= 50) — shared databases, message queues. Policy these second.
    • Standard Application (score .env << EOF

    PCE_HOST=your-pce-host

    PCE_PORT=8443

    PCE_ORG_ID=1

    API_KEY=your-api-key

    API_SECRET=your-api-secret

    EOF

    Run all tests

    uv run pytest tests/ -v

    code
    The test suite covers:
    - Tool listing and schema validation
    - Full CRUD lifecycle for workloads, labels, IP lists, services, rulesets, and deny rules
    - Traffic flow queries and summaries
    - Ringfence creation (standard, selective, deny consumer flavors, merge idempotency)
    - Infrastructure service identification (scoring, sorting, tier classification)
    - Error handling for missing resources
    
    ## Illumio Rule Processing Order
    
    Understanding rule processing is essential for ringfencing:
    
    1. **Essential rules** — built-in, cannot be modified
    2. **Override Deny rules** — block traffic overriding all allows (emergency use)
    3. **Allow rules** — permit traffic (ringfence remote app rules go here)
    4. **Deny rules** — block specific traffic (ringfence deny-all-inbound goes here)
    5. **Default action** — selective mode = allow-all, full enforcement = deny-all
    
    In selective enforcement, the default is allow-all, so a deny rule is needed to make the ringfence effective. Known remote apps get allow rules (step 3) which are processed before the deny (step 4).
    
    ## Visual Examples
    
    All the examples below were generated by Claude Desktop and with data obtained through this MCP server.
    
    ### Application Analysis
    ![Application Analysis](images/application-analysis.png)
    *Detailed view of application communication patterns and dependencies*
    
    ![Application Tier Analysis](images/application-tier-analysis.png)
    *Analysis of traffic patterns between different application tiers*
    
    ### Infrastructure Insights
    ![Infrastructure Analysis Dashboard](images/infrastrcture-analysis-dashboard.png)
    *Overview dashboard showing key infrastructure metrics and status*
    
    ![Infrastructure Services](images/infrastructure-services-analysis.png)
    *Detailed analysis of infrastructure service communications*
    
    ### Security Assessment
    ![Security Analysis Report](images/security-analysis-report.png)
    *Comprehensive security analysis report*
    
    ![High Risk Findings](images/security-assessment-findings-high-risk.png)
    *Security assessment findings for high-risk vulnerabilities*
    
    ![PCI Compliance](images/security-assessment-findings-pci.png)
    *PCI compliance assessment findings*
    
    ![SWIFT Compliance](images/security-assessment-findings-swift.png)
    *SWIFT compliance assessment findings*
    
    ### Remediation Planning
    ![Remediation Plan Overview](images/security-remediation-plan.png)
    *Overview of security remediation planning*
    
    ![Detailed Remediation Steps](images/security-remediation-plan-2.png)
    *Detailed steps for security remediation implementation*
    
    ### Policy Management
    ![IP Lists Overview](images/iplists-overview.png)
    *Management interface for IP lists*
    
    ![Ruleset Categories](images/ruleset-categories.png)
    *Overview of ruleset categories and organization*
    
    ![Application Ruleset Ordering](images/ordering-application-ruleset-overview.png)
    *Configuration of application ruleset ordering*
    
    ### Workload Management
    ![Workload Analysis](images/workload-analysis.png)
    *Detailed workload analysis and metrics*
    
    ![Workload Traffic](images/workload-traffic-identification.png)
    *Identification and analysis of workload traffic patterns*
    
    ### Label Management
    ![PCE Labels by Type](images/pce-labels-by-type.png)
    *Organization of PCE labels by type and category*
    
    ### Service Analysis
    ![Service Role Inference](images/service-role-inference.png)
    *Automatic inference of service roles based on traffic patterns*
    
    ![Top Sources and Destinations](images/top-5-sources-and-destinations.png)
    *Analysis of top 5 traffic sources and destinations*
    
    ### Project Planning
    ![Project Plan](images/project-plan-mermaid.png)
    *Project implementation timeline and milestones*
    
    ## Available Prompts
    
    ### Ringfence Application
    The `ringfence-application` prompt helps create security policies to isolate and protect applications by controlling inbound and outbound traffic.
    
    **Required Arguments:**
    - `application_name`: Name of the application to ringfence
    - `application_environment`: Environment of the application to ringfence
    
    **Features:**
    - Creates rules for inter-tier communication within the application
    - Uses traffic flows to identify required external connections
    - Implements inbound traffic restrictions based on source applications
    - Creates outbound traffic rules for necessary external communications
    - Handles both intra-scope (same app/env) and extra-scope (external) connections
    - Creates separate rulesets for remote application connections
    
    ### Analyze Application Traffic
    The `analyze-application-traffic` prompt provides detailed analysis of application traffic patterns and connectivity.
    
    **Required Arguments:**
    - `application_name`: Name of the application to analyze
    - `application_environment`: Environment of the application to analyze
    
    **Analysis Features:**
    - Orders traffic by inbound and outbound flows
    - Groups by application/environment/role combinations
    - Identifies relevant label types and patterns
    - Displays results in a React component format
    - Shows protocol and port information
    - Attempts to identify known service patterns (e.g., Nagios on port 5666)
    - Categorizes traffic into infrastructure and application types
    - Determines internet exposure
    - Displays Illumio role, application, and environment labels
    
    ### How to use MCP prompts
    
    Step1: Click "Attach from MCP" button in the interface
    
    ![MCP Prompt Workflow](images/prompts-finding-prompt-menu.png)
    
    Step 2: Choose from installed MCP servers
    
    ![MCP Prompt Workflow](images/prompts-choose-integration.png)
    
    Step 3: Fill in required prompt arguments:
    
    ![MCP Prompt Workflow](images/prompts-required-parameters.png)
    
    Step 4: Click Submit to send the configured prompt
    
    ### How prompts work
    
    - The MCP server sends the configured prompt to Claude
    - Claude receives context through the Model Context Protocol
    - Allows specialized handling of Illumio-specific tasks
    
    This workflow enables automated context sharing between Illumio systems and Claude for application traffic analysis and ringfencing tasks.
    
    ## Docker
    
    The application is available as a Docker container from the GitHub Container Registry.
    
    ### Pull the container

    docker pull ghcr.io/alexgoller/illumio-mcp-server:latest

    code
    You can also use a specific version by replacing `latest` with a version number:

    docker pull ghcr.io/alexgoller/illumio-mcp-server:1.0.0

    code
    ### Run with Claude Desktop
    
    To use the container with Claude Desktop, you'll need to:
    
    1. Create an environment file (e.g. `~/.illumio-mcp.env`) with your PCE credentials:

    PCE_HOST=your-pce-host

    PCE_PORT=your-pce-port

    PCE_ORG_ID=1

    API_KEY=your-api-key

    API_SECRET=your-api-secret

    code
    2. Add the following configuration to your Claude Desktop config file:
    
    On MacOS (`~/Library/Application Support/Claude/claude_desktop_config.json`):

    {

    "mcpServers": {

    "illumio-mcp-docker": {

    "command": "docker",

    "args": [

    "run",

    "-i",

    "--init",

    "--rm",

    "-v",

    "/Users/YOUR_USERNAME/tmp:/var/log/illumio-mcp",

    "-e",

    "DOCKER_CONTAINER=true",

    "-e",

    "PYTHONWARNINGS=ignore",

    "--env-file",

    "/Users/YOUR_USERNAME/.illumio-mcp.env",

    "illumio-mcp:latest"

    ]

    }

    }

    }

    code
    Make sure to:
    - Replace `YOUR_USERNAME` with your actual username
    - Create the log directory (e.g. `~/tmp`)
    - Adjust the paths according to your system
    
    ### Run Standalone
    
    You can also run the container directly:

    docker run -i --init --rm \

    -v /path/to/logs:/var/log/illumio-mcp \

    -e DOCKER_CONTAINER=true \

    -e PYTHONWARNINGS=ignore \

    --env-file ~/.illumio-mcp.env \

    ghcr.io/alexgoller/illumio-mcp-server:latest

    code
    ### Docker Compose
    
    For development or testing, you can use Docker Compose:

    version: '3'

    services:

    illumio-mcp:

    image: ghcr.io/alexgoller/illumio-mcp-server:latest

    init: true

    volumes:

    • ./logs:/var/log/illumio-mcp

    environment:

    • DOCKER_CONTAINER=true
    • PYTHONWARNINGS=ignore

    env_file:

    • ~/.illumio-mcp.env
    code
    Then run:

    docker-compose up

    code
    ## Contributing
    
    1. Fork the repository
    2. Create a feature branch
    3. Commit your changes
    4. Push to the branch
    5. Create a Pull Request
    
    ## License
    
    This project is licensed under the GPL-3.0 License. See the [LICENSE](LICENSE) file for details.
    
    ## Support
    
    For support, please [create an issue](https://github.com/alexgoller/illumio-mcp-server/issues).

    Similar MCP

    Based on tags & features

    • CH

      Chuk Mcp Linkedin

      Python00
    • PU

      Pursuit Mcp

      Python00
    • HE

      Hello Mcp

      Python00
    • GR

      Gradle Mcp

      Python00

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k
    View All MCP Servers

    Similar MCP

    Based on tags & features

    • CH

      Chuk Mcp Linkedin

      Python00
    • PU

      Pursuit Mcp

      Python00
    • HE

      Hello Mcp

      Python00
    • GR

      Gradle Mcp

      Python00

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k