CacheGuard-OS
User's Guide - Version UF-2.3.5


Network Security

CacheGuard appliance distinguishes between two types of network traffic: traffic exchanged with the appliance itself, and traffic that is only routed via the appliance (for which the source or destination is not the appliance itself). To control the traffic exchanged with the appliance, you can use the access command, while the firewall command can be used to control routed traffic. Both types of traffic are managed by a stateful firewall integrated into the appliance.

Administration Access

For security reasons, administration access (via SSH or the Web GUI) to a CacheGuard appliance is granted only to users or machines located within trusted networks. The same rule applies to file servers and monitoring systems that need to access the appliance. File servers are used to exchange files (via TFTP, FTP, or SSH) with the appliance for configuration or administration purposes (for instance, to load or save SSL certificates or perform a system backup). Monitoring managers can be used to monitor the appliance using SNMP.

In the example below, the appliance is configured to allow SSH and Web administration GUI access via its internal network interface to remote users or machines in the 172.18.2.0 255.255.255.0 network. In addition, the SNMP manager with the IP address 172.18.2.202 is authorised to send SNMP requests to the appliance via its internal network interface, and the file server ftp.cacheguard.net is authorised to exchange files with the appliance via its external network interface.

Note that to exchange files, CacheGuard appliance can use TFTP, FTP, or SFTP. As FTP and SFTP servers often require authentication (login and password), you can store authentication credentials in the appliance to avoid entering them interactively each time a file exchange is needed. Credentials may be defined using the access command or the password command. The following commands define credentials for FTP access to the ftp.cacheguard.net file server and SFTP access to the file server with IP address 172.18.2.203:

Web Browsing Access

By default, the Web proxy is accessible to all devices except those located in the external zone (routed via the external network interface). This default access policy can be modified using the access web command to restrict access to predefined networks only. To activate Web proxy access limitation, you must define at least one Web access rule. Note that when at least one previous peer or transparent network is defined, access limitation is implicitly activated, and you must explicitly specify permitted networks. Refer to the peer and transparent command manuals for more information about peers and transparent networks.

To restrict Web proxy access to devices located in the 172.18.2.0 255.255.255.0 and 10.26.0.0 255.255.0.0 networks via the appliance’s internal network interface, use the following commands:

The Firewall

CacheGuard appliance can act as a stateful firewall with NAT capabilities to filter routed network traffic according to source and destination IP addresses and protocols. To filter network traffic, you must define firewall rules. A firewall rule is attached to a network interface and controls incoming traffic through that interface. Rules attached to a network interface form a rule set, and there is one rule set per interface. To use the firewall, you must first activate it using the mode firewall on command and then define rules using the firewall command. In the absence of any rules, the following default rules are applied: If at least one firewall rule is present in a rule set, default rules no longer apply, and only explicitly defined traffic will be allowed (or denied). Each firewall rule set implicitly includes a deny any rule at its end. For example, the following commands allow all TCP traffic incoming from the web interface with a source IP address in the 172.18.2.0/24 network and outgoing via the external network interface: In the above example, if VLAN mode is activated, the defined rule applies exclusively to the web pseudo network interface (tagged VLAN). Otherwise, it applies to the native internal network interface.

When defining a firewall rule, you may also apply NAT (Network Address Translation) to the source and/or destination IP addresses of the traffic. For example, the following commands allow the IP address 192.168.44.55 to establish TCP connections via the external interface to the destination 192.168.22.11:80 and translate that destination to 10.0.10.11:81:

It is IMPORTANT to note that in firewall rules, source and destination NAT are always applied after filtering.

IPsec VPN

VPN stands for Virtual Private Network, and IPsec for Internet Protocol Security. An IPsec VPN allows you to authenticate and encrypt data packets between private networks over a public IP network (for instance, the Internet) to provide secure encrypted communication. You can create persistent IPsec VPNs between sites or enable remote workers to access your internal infrastructure securely via an IPsec VPN. CacheGuard appliance integrates an IPsec VPN server that you can activate using the mode vpnipsec on command. The vpnipsec command is then used to configure the IPsec VPN server.

Two types of IPsec VPNs are supported: site-to-site VPNs and remote-access VPNs. A site-to-site (or inter-site) VPN enables a permanent secure tunnel between two sites, allowing computers in both locations to communicate securely as if they were in the same place. To establish such a VPN tunnel, you require two VPN servers: a local VPN server and a remote (peer) VPN server.

A remote-access VPN enables remote users to connect securely to a central VPN server. Such tunnels allow remote workers to access systems protected by the VPN server securely, as if they were physically connected to the internal network.

Please note that on a CacheGuard appliance, you must choose between site-to-site mode or remote-access mode; both cannot be activated simultaneously. The vpnipsec access on and vpnipsec access off commands enable you to switch between modes.