aws-network-ops
SKILL.md
AWS Network Operations
You have access to AWS cloud networking via the AWS Network MCP server. This is a read-only server with 27 tools for inspecting VPCs, Transit Gateways, Cloud WAN, VPN connections, Network Firewalls, and flow logs.
MCP Server
- Command:
uvx awslabs.aws-network-mcp-server@latest(stdio transport) - Requires:
AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY,AWS_REGION(orAWS_PROFILE) - Read-only: All operations are Describe/Get/List — no create/modify/delete
Available Tools (27)
General (3)
| Tool | What It Does |
|---|---|
get_path_trace_methodology |
Guidance for tracing network paths across AWS resources |
find_ip_address |
Find which VPC/subnet/ENI an IP address belongs to |
get_eni_details |
Get Elastic Network Interface details — security groups, subnet, routes |
VPC (3)
| Tool | What It Does |
|---|---|
list_vpcs |
List all VPCs in the account/region |
get_vpc_network_details |
Full VPC details — subnets, route tables, IGW, NAT GW, endpoints, NACLs |
get_vpc_flow_logs |
Query VPC flow logs for traffic analysis |
Transit Gateway (7)
| Tool | What It Does |
|---|---|
list_transit_gateways |
List all Transit Gateways |
get_tgw_details |
Transit Gateway details — attachments, route tables, associations |
get_tgw_routes |
Get routes from a specific TGW route table |
get_all_tgw_routes |
Get routes from all TGW route tables |
get_tgw_flow_logs |
Query Transit Gateway flow logs |
list_tgw_peerings |
List TGW peering connections |
detect_tgw_inspection |
Detect if traffic inspection is configured on a TGW |
Cloud WAN (10)
| Tool | What It Does |
|---|---|
list_core_networks |
List all Cloud WAN core networks |
get_cloudwan_details |
Core network details — segments, policies, attachments |
get_cloudwan_routes |
Get routes from a Cloud WAN segment |
get_all_cloudwan_routes |
Get routes from all Cloud WAN segments |
get_cloudwan_attachment_details |
Details for a specific Cloud WAN attachment |
detect_cloudwan_inspection |
Detect inspection configuration on Cloud WAN |
list_cloudwan_peerings |
List Cloud WAN peering connections |
get_cloudwan_peering_details |
Details for a specific Cloud WAN peering |
get_cloudwan_logs |
Query Cloud WAN logs |
simulate_cloud_wan_route_change |
Simulate a route change and predict impact |
VPN (1)
| Tool | What It Does |
|---|---|
list_vpn_connections |
List all site-to-site VPN connections with tunnel status |
Network Firewall (3)
| Tool | What It Does |
|---|---|
list_network_firewalls |
List all AWS Network Firewalls |
get_firewall_rules |
Get firewall rule groups and policies |
get_network_firewall_flow_logs |
Query Network Firewall flow logs |
Workflow: VPC Network Audit
When a user asks "show me our AWS network" or "audit the VPCs":
- List VPCs:
list_vpcsto see all VPCs in the region - For each VPC:
get_vpc_network_details— subnets, route tables, gateways, NACLs - Check TGW:
list_transit_gatewaysto see cross-VPC connectivity - Check VPN:
list_vpn_connectionsfor hybrid connectivity - Check firewalls:
list_network_firewallsfor security posture - Report: Formatted summary of the cloud network architecture
Workflow: Troubleshoot Connectivity
When a user asks "why can't EC2 instance X reach Y?":
- Find the IPs:
find_ip_addressfor both source and destination - Get ENI details:
get_eni_detailsto check security groups, subnet, routes - Check route tables:
get_vpc_network_detailsto see routing - Check flow logs:
get_vpc_flow_logsto see if traffic is being dropped - Check firewalls:
get_firewall_rulesif traffic crosses a Network Firewall - Check TGW:
get_tgw_routesif traffic crosses Transit Gateway - Report: Root cause analysis with fix recommendation
Workflow: Transit Gateway Health
When checking multi-VPC connectivity:
- List TGWs:
list_transit_gateways - Get details:
get_tgw_detailsfor attachments and route tables - Check routes:
get_all_tgw_routesfor route table completeness - Check peerings:
list_tgw_peeringsfor cross-region/cross-account - Check inspection:
detect_tgw_inspectionfor security posture - Flow logs:
get_tgw_flow_logsfor traffic analysis
Workflow: VPN Tunnel Monitoring
When checking hybrid connectivity:
- List VPNs:
list_vpn_connections - Check tunnel status: Up/Down for each tunnel (redundancy check)
- Check routes: TGW or VGW routes for the VPN prefixes
- Flow logs: VPC flow logs for traffic across VPN
- Report: VPN health summary with any down tunnels flagged
Important Rules
- Read-only — this MCP cannot create, modify, or delete any AWS resources
- Region-specific — results are scoped to the configured AWS_REGION
- IAM permissions required — EC2 Describe, Network Manager, Network Firewall Describe, CloudWatch Logs
- Record in GAIT — log all AWS network investigations for audit trail
Environment Variables
AWS_ACCESS_KEY_ID— AWS access keyAWS_SECRET_ACCESS_KEY— AWS secret keyAWS_REGION— AWS region (e.g., us-east-1)- Or
AWS_PROFILE— Named AWS CLI profile
Weekly Installs
5
Repository
automateyournet…/netclawGitHub Stars
282
First Seen
10 days ago
Security Audits
Installed on
opencode5
gemini-cli5
claude-code5
github-copilot5
codex5
kimi-cli5