261 MCP tools give AI assistants structured access to Arista EOS, Cisco IOS-XE, Cisco NX-OS, and Juniper JunOS. Ask questions in natural language. Get answers in seconds.
pip install latticio
You ask a question. The AI picks the right tools, queries your devices, and explains what it found.
Enterprise-grade safety, observability, and multi-tenancy from day one.
All write operations are blocked unless you explicitly opt in. Dangerous commands like reload, write erase, and bash are permanently denied.
70 vendor-agnostic net_* tools return the same schema regardless of whether the device runs EOS, IOS-XE, NX-OS, or JunOS.
Every parameter is validated against injection patterns — semicolons, pipes, backticks, subshell syntax, null bytes — before reaching any device.
Stage changes in atomic config sessions. Review diffs before committing. Set rollback timers for automatic revert if anything goes wrong.
Scope-based access control with network:read, network:write, and network:admin. JWT/mTLS authentication for HTTP transport deployments.
Full audit logging with tenant attribution, OpenTelemetry distributed tracing, Prometheus metrics export, and per-device circuit breakers.
Connect Latticio to the AI tools you already use.
Demo mode works with zero hardware. No devices, no lab, no configuration.
NET_DEMO_MODE=true uvx latticio