CacheGuard-OS
CacheGuard-OS is built on a Linux kernel and several other well-known open-source components, all compiled from scratch to ensure maximum integrity and security. The combination of these components and proprietary software developed by CacheGuard Technologies constitutes CacheGuard-OS. Note that CacheGuard does not rely on any specific Linux distribution, as it is itself an appliance-oriented Linux distribution.
Open-source software used by CacheGuard-OS is mainly distributed under the GNU GPL. Open-source programs developed by CacheGuard Technologies are distributed under the CacheGuard License, which is a dedicated open-source licence. Please read the Licence Agreement carefully before using the product.
The installation programme offers two installation options: Gateway or Manager. A Gateway system provides network Security and Optimisation services. If you deploy multiple Gateways, you may manage them individually or centrally through a Manager system. In the latter case, install CacheGuard-OS as a Manager on a dedicated machine to manage several Gateways centrally. Note that only one installation type can be selected per machine — a single system cannot act as both a Gateway and a Manager simultaneously.
An installed Gateway can operate in forwarding mode to protect internal users accessing the internet, and in reverse mode to secure and optimise traffic exchanged with Web applications. Both modes can be activated concurrently on the same Gateway.
During installation, the OS is fine-tuned according to the expected number of users to support, ensuring an optimal balance between performance and resource consumption. To provide an optimised quality of service, the tuning process assumes that not all users are connected simultaneously — only about 20 percent of them. For example, an appliance installed for 100 users is configured to support 20 simultaneous users while still allowing short bursts of up to 100 simultaneous users for limited periods.
For 100 users (20 simultaneous users), a typical machine configuration is as follows:
For higher numbers of users, it is advisable to use a machine with additional RAM, CPU cores, and disk capacity. As a general rule, add one CPU core and 1 GB of RAM (+75 GB of disk space in forwarding mode) for every 10 additional simultaneous users. For instance, an appliance supporting 40 simultaneous users would require six CPU cores, 10 GB of RAM, and approximately 400 GB of disk space in forwarding mode.
On physical hardware, CacheGuard-OS performs more efficiently with multiple lower-capacity disks configured as a RAID array rather than a single high-capacity disk. CacheGuard-OS natively supports software RAID using only about 3% of CPU resources. Supported RAID levels include RAID 0 (striping), RAID 1 (mirroring), RAID 5 (striping with parity), RAID 6 (striping with double parity), and RAID 10 (striping with mirroring).
CacheGuard-OS allows you to enable all integrated security and optimisation features simultaneously on the same machine. Some features, such as real-time HTTP compression and antivirus, are more CPU-intensive than others, and activating antivirus functionality requires approximately 2 GB of RAM. The configuration guidelines provided above apply when all features are enabled concurrently. Fewer resources may be sufficient if not all features are required. Please note that, in all cases, CacheGuard-OS requires at least 512 MB of RAM for installation.
CacheGuard-OS requires at least two NICs (Network Interface Cards). If your machine has only one NIC, you may use a USB Ethernet adapter as the second interface. To take advantage of link bonding or to use an auxiliary network interface, additional NICs (or USB Ethernet adapters) are required.
CacheGuard-OS can also be installed for a minimal number of users on a compact computer. The minimum configuration to support 10 users in forwarding mode is as follows:
To manage additional Gateways, opt for a system with increased disk capacity. As a general guideline, add approximately 25 GB of disk space for every 10 additional Gateway systems to be managed.
...
allow booting;
allow bootp;
filename "/cacheguard-boot/isolinux/pxelinux.0";
subnet <network-ip-address> netmask <network-mask> {
range <first-ip-address> <last-ip-address>;
next-server <tftp-ip-address>;
}
...
After booting the VM, log in as admin (default password: admin) and follow the setup procedure.
CacheGuard uses two logical interfaces: external and internal. Each logical interface must map to at least one physical network interface.

Connect the internal interface to your LAN and the external interface to your WAN (typically your Internet router).
The console can be accessed via:
Upon first login, the setup command is automatically launched to guide you through basic network configuration. Alternatively, you can use CLI commands directly:
The apply command verifies consistency before deployment, taking between 5–180 seconds depending on hardware and operation type. It runs in the background, allowing other commands to be executed (except configuration changes). Check progress using apply report.
Accurate timekeeping is vital, as many services depend on the system clock. To set time and date:
Only trusted administrators can remotely manage the appliance. Use access to define trusted networks. Example:
To enable SSH and Web administration interfaces:
Connect remotely using SSH:
ssh admin@10.20.0.254
Or via the Web GUI at:
https://10.20.0.254:8090
Verify the SSL fingerprint with tls server fingerprint default. For enhanced security, set distinct passwords for console/SSH and Web administration using password login.
Features (or “modes”) can be enabled or disabled with the mode command. By default, both web (proxy) and transparent modes are enabled. Transparent mode intercepts HTTP traffic without browser configuration, while non-transparent mode requires proxy settings (e.g. 10.20.0.254:8080).
Enable caching with:
Refer to the General Modes section for a summary of available features. To secure Web servers, enable reverse mode (mode rweb on) and configure it via rweb. To disable unused features (e.g. forwarding proxy), use mode web off.
For command assistance, use help or help <command> (e.g. help ip). Press <TAB> to autocomplete or list available parameters.