---
name: security-management
description: Manage security policies, firewall zones, access control rules (ACLs), and guest network access. Perform comprehensive security audits and compliance reviews.
---
# Security Management Skill
Manage your UniFi network security including firewall zones, access controls, and guest policies.
## What this skill does
This skill enables you to:
- View and manage firewall zones and network segmentation
- Review and manage access control rules (ACLs)
- Monitor and manage guest network access via hotspot vouchers
- Perform comprehensive security audits
- Verify security policies and configurations
- Generate security compliance reports
## When to use this skill
Use this skill when you need to:
- Review firewall configuration and zone setup
- Audit access control policies
- Manage guest network access and vouchers
- Ensure security compliance
- Plan network segmentation
- Troubleshoot security-related issues
- Generate security audit reports
## Available Tools
- `get_firewall_zones` - List and view firewall zones
- `get_acl_rules` - List and review access control rules
- `get_hotspot_vouchers` - List and manage guest access vouchers
- `get_network_info` - Get system information for compliance verification
## Typical Workflows
### Security Audit
1. Use `get_firewall_zones` to verify zone configuration
2. Use `get_acl_rules` to review access control policies
3. Use `get_hotspot_vouchers` to check guest access setup
4. Use `get_network_info` for system-level security info
5. Generate audit report with findings and recommendations
### Guest Access Management
1. Use `get_hotspot_vouchers` to list active vouchers
2. Check expiration dates and status
3. Verify guest network policies
4. Plan voucher lifecycle management
### Network Segmentation Review
1. Use `get_firewall_zones` to understand zone setup
2. Verify zone isolation policies
3. Review intra-zone communication rules
4. Assess network segmentation adequacy
## Example Questions
- "Show all firewall zones and their configuration"
- "Review all access control rules"
- "List active guest network vouchers and their status"
- "Are there any expired or expiring vouchers?"
- "Perform a complete security audit"
- "Verify network segmentation setup"
- "Check security compliance status"
## Response Format
When using this skill, I provide:
- Firewall zone listings with descriptions
- Access control rule details with purposes
- Guest access voucher status and expiration dates
- Security assessment findings
- Compliance status
- Specific recommendations for improvements
- Risk assessments where applicable
## Best Practices
- Review firewall zones quarterly
- Audit access control rules regularly
- Monitor guest voucher expiration dates
- Document security policy changes
- Test zone isolation periodically
- Review guest access patterns
- Keep audit logs for compliance
- Implement principle of least privilege
- Segment networks by trust level and function