CacheGuard-OS
User's Guide - Version UF-2.3.5


Getting Started

CacheGuard-OS is an autonomous Operating System (OS) that transforms an x86/x64-based machine (virtual or bare metal) into a network Security and Optimisation appliance. Caution: installing CacheGuard-OS on a machine formats all disks on that machine, permanently erasing all existing data.

CacheGuard-OS is built on a Linux kernel and several other well-known open-source components, all compiled from scratch to ensure maximum integrity and security. The combination of these components and proprietary software developed by CacheGuard Technologies constitutes CacheGuard-OS. Note that CacheGuard does not rely on any specific Linux distribution, as it is itself an appliance-oriented Linux distribution.

Open-source software used by CacheGuard-OS is mainly distributed under the GNU GPL. Open-source programs developed by CacheGuard Technologies are distributed under the CacheGuard License, which is a dedicated open-source licence. Please read the Licence Agreement carefully before using the product.

The installation programme offers two installation options: Gateway or Manager. A Gateway system provides network Security and Optimisation services. If you deploy multiple Gateways, you may manage them individually or centrally through a Manager system. In the latter case, install CacheGuard-OS as a Manager on a dedicated machine to manage several Gateways centrally. Note that only one installation type can be selected per machine — a single system cannot act as both a Gateway and a Manager simultaneously.

An installed Gateway can operate in forwarding mode to protect internal users accessing the internet, and in reverse mode to secure and optimise traffic exchanged with Web applications. Both modes can be activated concurrently on the same Gateway.

Machine Requirements

Gateway Machine Requirements

The required machine resources for a Gateway system primarily depend on the total number of users to protect (in forwarding mode) or the maximum number of simultaneous users of Web applications to protect (in reverse mode). By “simultaneous users”, we mean active users who consume the appliance’s resources (mainly RAM and CPU). Simultaneous users differ from concurrent users, who may all be connected to protected Web applications without necessarily consuming any resources on the CacheGuard appliance. On Web application servers, concurrent users typically consume RAM and/or disk space, whereas on CacheGuard, only simultaneous users consume RAM and CPU (number of simultaneous users ≤ number of concurrent users).

During installation, the OS is fine-tuned according to the expected number of users to support, ensuring an optimal balance between performance and resource consumption. To provide an optimised quality of service, the tuning process assumes that not all users are connected simultaneously — only about 20 percent of them. For example, an appliance installed for 100 users is configured to support 20 simultaneous users while still allowing short bursts of up to 100 simultaneous users for limited periods.

For 100 users (20 simultaneous users), a typical machine configuration is as follows:

For higher numbers of users, it is advisable to use a machine with additional RAM, CPU cores, and disk capacity. As a general rule, add one CPU core and 1 GB of RAM (+75 GB of disk space in forwarding mode) for every 10 additional simultaneous users. For instance, an appliance supporting 40 simultaneous users would require six CPU cores, 10 GB of RAM, and approximately 400 GB of disk space in forwarding mode.

On physical hardware, CacheGuard-OS performs more efficiently with multiple lower-capacity disks configured as a RAID array rather than a single high-capacity disk. CacheGuard-OS natively supports software RAID using only about 3% of CPU resources. Supported RAID levels include RAID 0 (striping), RAID 1 (mirroring), RAID 5 (striping with parity), RAID 6 (striping with double parity), and RAID 10 (striping with mirroring).

CacheGuard-OS allows you to enable all integrated security and optimisation features simultaneously on the same machine. Some features, such as real-time HTTP compression and antivirus, are more CPU-intensive than others, and activating antivirus functionality requires approximately 2 GB of RAM. The configuration guidelines provided above apply when all features are enabled concurrently. Fewer resources may be sufficient if not all features are required. Please note that, in all cases, CacheGuard-OS requires at least 512 MB of RAM for installation.

CacheGuard-OS requires at least two NICs (Network Interface Cards). If your machine has only one NIC, you may use a USB Ethernet adapter as the second interface. To take advantage of link bonding or to use an auxiliary network interface, additional NICs (or USB Ethernet adapters) are required.

CacheGuard-OS can also be installed for a minimal number of users on a compact computer. The minimum configuration to support 10 users in forwarding mode is as follows:

This configuration allows all CacheGuard-OS features to be enabled simultaneously on a 64-bit machine. However, if high-memory-demand services such as antivirus are unnecessary, CacheGuard-OS can operate with as little as 256 MB of RAM. With that amount of RAM, your CacheGuard-OS-based system can function effectively as a firewall and VPN server. Nevertheless, installation still requires a minimum of 512 MB of RAM.

Manager Machine Requirements

The required resources for a Manager system mainly depend on the total number of Gateway systems to be managed. To manage up to 10 Gateway systems, a typical configuration is as follows:

To manage additional Gateways, opt for a system with increased disk capacity. As a general guideline, add approximately 25 GB of disk space for every 10 additional Gateway systems to be managed.

Machine Compatibility

CacheGuard-OS supports most popular x86/x64-based devices available on the market. If your device is not detected during installation, please contact us — we will endeavour to integrate the appropriate drivers into the OS to ensure compatibility.

OS Installation

The same installation CD-ROM can be used to install the appliance as either a Gateway system or a Manager system. Simply follow the on-screen instructions during installation to select the desired system type.

CD-ROM Drive Installation

To install CacheGuard-OS from a CD-ROM drive, follow these steps:

USB Memory Stick Installation

To install CacheGuard-OS from a USB memory stick, follow these steps:

Network Installation

To install CacheGuard-OS over a network, the target machine must support PXE boot. An installation server is also required, running the following services: To perform a network installation:

The OVA & VHD Distribution Forms

The Gateway OVA (Open Virtual Appliance) version uses two network interfaces, which should be connected to the appropriate networks as per your configuration requirements. The VHD (Virtual Hard Drive) version can be attached to a virtual machine with at least two network interfaces. Typically, the CacheGuard external interface connects to an internet router or DMZ, while the internal interface connects to the LAN.

After booting the VM, log in as admin (default password: admin) and follow the setup procedure.

VMware® Notes

For security reasons, VMware Tools are not installed and cannot be installed on a CacheGuard appliance.

Oracle VirtualBox® Note

CacheGuard is fully compatible with Oracle VirtualBox®.

Microsoft Hyper-V® Note

When installing CacheGuard on Microsoft Hyper-V®, ensure that MAC address spoofing is disabled on the virtual machine.

Gateway Connection

In a standard configuration, CacheGuard Gateway divides your network into two zones: an external, untrusted zone (connected to the Internet) and an internal, trusted LAN zone.

CacheGuard uses two logical interfaces: external and internal. Each logical interface must map to at least one physical network interface.

Use the link command (without arguments) to list detected network interfaces, or link bond to view interface associations. By default, eth0 is assigned to the external interface and eth1 to the internal interface.

Connect the internal interface to your LAN and the external interface to your WAN (typically your Internet router).

Gateway Configuration

First Configuration

To begin, connect to the CacheGuard console interface and log in as the admin user.

The console can be accessed via:

Upon first login, the setup command is automatically launched to guide you through basic network configuration. Alternatively, you can use CLI commands directly:

Apply the configuration using:

Basic Configuration

Configuration in CacheGuard-OS is transactional: you define settings, then commit them with the apply command. This ensures stability and allows pre-validation before activation.

The apply command verifies consistency before deployment, taking between 5–180 seconds depending on hardware and operation type. It runs in the background, allowing other commands to be executed (except configuration changes). Check progress using apply report.

Accurate timekeeping is vital, as many services depend on the system clock. To set time and date:

You may also use NTP servers — refer to Date & Time for details.

Only trusted administrators can remotely manage the appliance. Use access to define trusted networks. Example:

To enable SSH and Web administration interfaces:

Connect remotely using SSH: ssh admin@10.20.0.254
Or via the Web GUI at: https://10.20.0.254:8090

Verify the SSL fingerprint with tls server fingerprint default. For enhanced security, set distinct passwords for console/SSH and Web administration using password login.

Features (or “modes”) can be enabled or disabled with the mode command. By default, both web (proxy) and transparent modes are enabled. Transparent mode intercepts HTTP traffic without browser configuration, while non-transparent mode requires proxy settings (e.g. 10.20.0.254:8080).

Enable caching with:

Refer to the General Modes section for a summary of available features. To secure Web servers, enable reverse mode (mode rweb on) and configure it via rweb. To disable unused features (e.g. forwarding proxy), use mode web off.

For command assistance, use help or help <command> (e.g. help ip). Press <TAB> to autocomplete or list available parameters.