CacheGuard OS
User's Guide - Version EH-1.3.7

Network Security

The security issue is one of the major occupations of the appliance. The appliance distinguishes between two types of network traffic: network traffic destined to the appliance itself (Web traffic) and network traffic destined to third parties across the appliance externally.

Accessing the appliance itself or objects accessed by the appliance may all be controlled and configured according to your needs and security policies. The command "access" allows you to control the traffic.

The appliance integrates a stateful IP firewall that controls all other network traffic not destined to the appliance itself. The command "firewall" allows you to control these types of traffic.

Administration Access

For security reasons the appliance administration is only granted to trusted administrators, so administrators must be authenticated before they can access the administration interfaces (with login/password). Moreover remote administrators should be declared as trusted before being allowed to access the administration interfaces. A remote trusted administrator is identified by its IP address. The same restriction is applied for file servers exchanging files with the appliance. To allow remote administrators having the IP address "" to administrate the appliance, use the following commands: To trust the file server accessible with the IP address "" in your networks, use the following commands: Note that supported protocols are FTP and TFP. When using the FTP, if the FTP server requires authentication, a login and password may also be specified with the command "access file". To set the login and password information, give the login name after the IP address and then press return to be prompted to enter the password securely. The FTP password can also be set with the command "password".

Web Users Access

By default all internal Web users are allowed to connect to the Internet by using the appliance as an Internet gateway and a Web proxy. This access may be restricted to predefined subnets only, if desired. To activate this feature at least one Web user access rule should be defined. Note that when previous peers (see the command "peer") are defined, this feature is implicitly activated.

To allow only Web users located on the subnets " /" and " /" to access the Internet, use the following commands:

Web Servers Access

By default the appliance is allowed to access all backend Web servers. This access may be restricted to predefined subnets only. To activate this feature at least one Web server access rule should be defined.

To allow only Web servers located on the subnet " /" to be accessed by the appliance, use the following commands:

The Firewall

The appliance may filter other network traffic than Web traffic as soon as firewall mode is activated and the appliance acts as a router. This way, all incoming network traffic from the external area (Internet) destined to the internal area and all outgoing network traffic from the internal area (local Web users and Web servers) destined to the external area may be controlled by the appliance. The internal firewall (command "firewall internal") manages outgoing network traffic while the external firewall (command "firewall external") manages incoming network traffic.

The "firewall" command allows you to configure the integrated firewall. If no rules are specified, all outgoing traffic initiated from the internal area and destined to the external area are allowed while all incoming traffic from the external area and destined to the internal area are denied. If at least one rule is added to the internal firewall then only specified network traffic will be allowed. To allow an incoming network traffic from the external area destined to the internal area, you have just to add the related rule to the external firewall.

In addition, when the firewall feature is activated, the appliance blocks common network attacks like syn-flood attacks, ping-of-death attacks, brute-force attacks, smurf attacks and much more.

Also the firewall module provides NAT (Network Address Translation) and PAT (Port Address Translation) mechanisms to translate network address and port numbers.

To understand better the firewall mechanism see the following example: to allow a workstation identified by the IP address "" and located in the internal area to access peer-to-peer applications located in the external area which use the TCP ports 7510:7529, to connect to that workstation, use the following commands: Please note that firewall rules are applied before source NAT but after destination NAT and PAT..


Authentication is used to restrict the Web (or rWeb) usage to authenticated users only. The current appliance version supports LDAP and Kerberos authentication modes. The command "authenticate" allows you to configure the authentication mode. To authenticate users, the authentication mode should be activated using the command "mode". For instance consider the following commands: The first command is used to activate the authentication mode. The second command specifies that authentication is required for users of the class "inetOrgPerson", registered under the object ou=people,dc=example,dc=com, identified by the LDAP attributes "uid" and for which a password is stored in the LDAP attribute "userPassword".

The third command allows you to specify an LDAP server that supports SSL/TLS encryption, having the IP address "" and named "". Finally the fourth and fifth commands allow you to specify a bind DN (Distinguish Name) and password to access the LDAP tree. An empty value ('') may be used for <passwd-attr> and <ldap-filter>. If an empty value ('') is specified for <passwd-attr> the LDAP binding is used during the basic authentication phase instead of comparing the entered password to <passwd-attr> (this is the preferred method used by Microsoft AD (Active Directory)™.

Sample Consfiguration for AD™

Create a user specifically for the LDAP binding In your AD™ with the user name let's say webgateway. Make suer that this user is not disabled and its associated password never expires. Then use the following commands to configure the authentication: AD™ has the capability to authenticate users using the Kerberos protocol. For instance consider the following commands: The first and second commands are used to activate the Kerberos authentication mode. The second and third commands are used to set the Kerberos service name and domain name. Those names are used to create the appropriate object in the AD™ LDAP directory. The fifth and sixth commands are used to set the AD™ domain controller. Please note that more than one domain controller can be specified. The seventh command is used to set the encryption type used by AD™. If your AD is running on a Windows™ server 2003 you should use the des type. For Windows™ server 2008 and above the aes type should be used. Finally the eighth command is used to set the relative DN (Distinguish Name) of the object representing the in the AD™ LDAP directory tree. In this example the FDN (Full Distinguish Name) will be: cn=proxy,cn=computers,dc=example,dc=com.

IMPORTANT NOTICE: The first time the Kerberos authentication mode is activated (after the apply operation), the Kerberos authentication should be initialized. During the initialization process if the the LDAP object representing your system ( in the example above) in AD™ does not yet exist, an object representing it is created in AD™. Also the initialization process allows your system to obtain a Kerberos ticket. To initialize the Kerberos authentication use the following commands: To this end, it is necessary to use an AD™ account with administrator permissions (user administrator for instance). The first command requires that you interactively enter the password associated to the used administrator account. The given password here is not permanently saved and is removed after having obtained a Kerberos ticket. Please note that the Kerberos initialization is an asynchronous operation and is executed in background. The report keyword allows you to display a report of the last Kerberos initialization operation.

Password Management

Administrator users are authenticated with a login and password to access the appliance. There are three types of passwords: To set the console password use the following command: Note that the console password modification takes effect after invoking the command "apply".

To set the Web administration GUI password use the following command: To set the Web auditing GUI password use the following command: If accessing authentication information in LDAP servers requires a password, the command "password" is there to set this password. To set the access password for the top LDAP object identified by the distinguished name "cn=admin,dc=example,dc=com", use the following command: If no password is required, erase the given password with the following command: