loading…
Search for a command to run...
loading…
Enables network management through Cisco Catalyst Center, providing tools for monitoring device health, tracking client data, and managing network issues. It al
Enables network management through Cisco Catalyst Center, providing tools for monitoring device health, tracking client data, and managing network issues. It also supports compliance and lifecycle management by retrieving EoX summaries and detailed security advisory status.
A Model Context Protocol (MCP) server for Cisco Catalyst Center, providing network management capabilities through structured tools.
This MCP server provides focused, high-value tools for Cisco Catalyst Center:
get_client_counts - Get counts of wired and wireless clients connected to the networkget_network_devices - Query network device inventory with flexible filteringget_network_health - Get overall network health by device categoryget_site_health - Get health information for sites (areas and buildings)get_client_detail - Get detailed information about a specific client by MAC addressget_issues - Retrieve network issues with filtering by priority, status, and moreget_compliance_detail - Get detailed compliance status for devices (EOX, IMAGE, PSIRT, etc.)get_compliance_count - Get aggregate count of devices by compliance criteriaget_eox_summary - Get network-wide End-of-Life/End-of-Support summaryget_eox_devices - Get EoX status for all devices in the networkget_eox_device_details - Get detailed EoX bulletins for a specific devicecurl -LsSf https://astral.sh/uv/install.sh | sh
Clone this repository or download the source code
Initialize and install dependencies:
cd catalyst-center-mcp
uv sync
.env file from the example:cp .env.example .env
.env with your Catalyst Center credentials:CATALYST_CENTER_URL=https://your-catalyst-center.example.com
CATALYST_CENTER_USERNAME=your_username
CATALYST_CENTER_PASSWORD=your_password
CATALYST_CENTER_VERIFY_SSL=true
Start the server in development mode:
uv run mcp dev src/server.py
Or run directly:
uv run src/server.py
The server will start and be available for MCP clients to connect to via stdio transport.
Add this server to your Claude Desktop configuration file:
Option 1: Using environment variables directly
{
"mcpServers": {
"catalyst-center": {
"command": "uv",
"args": ["run", "src/server.py"],
"cwd": "/path/to/catalyst-center-mcp",
"env": {
"CATALYST_CENTER_URL": "https://your-catalyst-center.example.com",
"CATALYST_CENTER_USERNAME": "your_username",
"CATALYST_CENTER_PASSWORD": "your_password",
"CATALYST_CENTER_VERIFY_SSL": "true"
}
}
}
}
Option 2: Using .env file (recommended)
Create a .env file in the project directory with your credentials, then:
{
"mcpServers": {
"catalyst-center": {
"command": "uv",
"args": ["run", "src/server.py"],
"cwd": "/path/to/catalyst-center-mcp"
}
}
}
# Get current wired and wireless client counts
result = await get_client_counts()
# Returns: {"wired_count": 150, "wireless_count": 75, "total_count": 225, "timestamp": "current"}
# Get all devices
devices = await get_network_devices()
# Filter by hostname
devices = await get_network_devices(hostname="switch.*")
# Filter by device family
devices = await get_network_devices(device_family="Switches and Hubs", limit=50)
# Get current network health by device category
health = await get_network_health()
# Returns health scores for Access, Distribution, Core, Router, and Wireless devices
# Get all active P1 issues
issues = await get_issues(priority="P1", issue_status="ACTIVE")
# Get issues for a specific site
issues = await get_issues(site_id="site-uuid-here")
# Get AI-driven issues
issues = await get_issues(ai_driven="YES")
# Get health for all sites
sites = await get_site_health()
# Get only building sites
sites = await get_site_health(site_type="BUILDING")
# Get detailed info for a specific client
client = await get_client_detail(mac_address="00:11:22:33:44:55")
# Get all non-compliant devices
compliance = await get_compliance_detail(compliance_status="NON_COMPLIANT")
# Get EOX compliance status for specific devices
compliance = await get_compliance_detail(
compliance_type="EOX",
device_uuid="device-uuid-1,device-uuid-2"
)
# Get PSIRT (security advisory) compliance
compliance = await get_compliance_detail(compliance_type="PSIRT", limit=100)
# Count all non-compliant devices
count = await get_compliance_count(compliance_status="NON_COMPLIANT")
# Count devices with image compliance issues
count = await get_compliance_count(
compliance_type="IMAGE",
compliance_status="NON_COMPLIANT"
)
# Get network-wide EoX summary
summary = await get_eox_summary()
# Returns: {"hardware_count": 15, "software_count": 8, "module_count": 3, "total_count": 26}
# Get all devices with EoX alerts
devices = await get_eox_devices()
# Get with pagination for large networks
devices = await get_eox_devices(limit=50, offset=1)
# Get detailed EoX bulletins for a specific device
details = await get_eox_device_details(device_id="device-uuid-here")
# Returns detailed bulletin info with end-of-sale/support dates and URLs
catalyst-center-mcp/
├── src/
│ ├── __init__.py
│ ├── server.py # FastMCP server with tool definitions
│ ├── client.py # HTTP client for Catalyst Center API
│ ├── auth.py # Authentication handler
│ └── config.py # Configuration management
├── requirements.txt # Python dependencies
├── .env.example # Environment variable template
├── .gitignore # Git ignore rules
└── README.md # This file
The server uses Catalyst Center's authentication API:
/dna/system/api/v1/auth/tokenX-Auth-Token header for all API callsTo add a new tool:
src/server.py decorated with @mcp.tool()client instance to make API callsExample:
@mcp.tool()
async def get_something(param: str) -> dict[str, Any]:
"""
Description of what this tool does.
Args:
param: Description of parameter
Returns:
Description of return value
"""
response = await client.get("/dna/intent/api/v1/endpoint", params={"param": param})
return response
This project is provided as-is for use with Cisco Catalyst Center.
This server uses Cisco Catalyst Center Intent API v2.3.7.9. For full API documentation, refer to the Catalyst Center API documentation.
If you encounter SSL certificate errors, you can disable SSL verification (not recommended for production):
CATALYST_CENTER_VERIFY_SSL=false
The default timeout is 30 seconds. For slower networks, you may need to adjust the timeout in src/client.py.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"cisco-catalyst-center-mcp-server": {
"command": "npx",
"args": []
}
}
}