| name | security-management |
| description | Manage security policies, firewall zones, access control rules (ACLs), and guest network access. Perform comprehensive security audits and compliance reviews. |
Security Management Skill
Manage your UniFi network security including firewall zones, access controls, and guest policies.
What this skill does
This skill enables you to:
- View and manage firewall zones and network segmentation
- Review and manage access control rules (ACLs)
- Monitor and manage guest network access via hotspot vouchers
- Perform comprehensive security audits
- Verify security policies and configurations
- Generate security compliance reports
When to use this skill
Use this skill when you need to:
- Review firewall configuration and zone setup
- Audit access control policies
- Manage guest network access and vouchers
- Ensure security compliance
- Plan network segmentation
- Troubleshoot security-related issues
- Generate security audit reports
Available Tools
get_firewall_zones- List and view firewall zonesget_acl_rules- List and review access control rulesget_hotspot_vouchers- List and manage guest access vouchersget_network_info- Get system information for compliance verification
Typical Workflows
Security Audit
- Use
get_firewall_zonesto verify zone configuration - Use
get_acl_rulesto review access control policies - Use
get_hotspot_vouchersto check guest access setup - Use
get_network_infofor system-level security info - Generate audit report with findings and recommendations
Guest Access Management
- Use
get_hotspot_vouchersto list active vouchers - Check expiration dates and status
- Verify guest network policies
- Plan voucher lifecycle management
Network Segmentation Review
- Use
get_firewall_zonesto understand zone setup - Verify zone isolation policies
- Review intra-zone communication rules
- Assess network segmentation adequacy
Example Questions
- "Show all firewall zones and their configuration"
- "Review all access control rules"
- "List active guest network vouchers and their status"
- "Are there any expired or expiring vouchers?"
- "Perform a complete security audit"
- "Verify network segmentation setup"
- "Check security compliance status"
Response Format
When using this skill, I provide:
- Firewall zone listings with descriptions
- Access control rule details with purposes
- Guest access voucher status and expiration dates
- Security assessment findings
- Compliance status
- Specific recommendations for improvements
- Risk assessments where applicable
Best Practices
- Review firewall zones quarterly
- Audit access control rules regularly
- Monitor guest voucher expiration dates
- Document security policy changes
- Test zone isolation periodically
- Review guest access patterns
- Keep audit logs for compliance
- Implement principle of least privilege
- Segment networks by trust level and function