https://store-images.s-microsoft.com/image/apps.61635.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.3235dcd8-f87e-46e1-a516-e0dae12641bf
CacheGuard Gateway
CACHEGUARD TECHNOLOGIES
CacheGuard Gateway
CACHEGUARD TECHNOLOGIES
CacheGuard Gateway
CACHEGUARD TECHNOLOGIES
Secure & Optimize your on-premises and/or cloud networks and Web traffic Easily and Efficiently.
Network Appliance Design
CacheGuard Gateway is a network Security and traffic Optimization appliance that you can implement easily and quickly in your organization. When you deploy a CacheGuard Gateway, you get multiple features in a single box and it's up to you to activate features as per your requirements. All CacheGuard Gateway features are integrated into a core product called CacheGuard-OS. Once installed on a machine, CacheGuard-OS transforms that machine into a powerful network appliance. The CacheGuard Gateway on Azure is a ready for use Virtual Machine powered by CacheGuard-OS.
Security & Optimization
You can use CacheGuard Gateway either as a forwarding proxy to get security while browsing the Web or as a reverse proxy to protect your Web applications on the cloud. As a forwarding proxy, CacheGuard Gateway filters unwanted websites and block malware even before they can into your networks. As a reverse proxy, CacheGuard Gateway acts as a WAF (Web Application Firewall) and allows you to protect your applications against content attacks. In addition, CacheGuard Gateway comes with a VPN server, a Web application load balancer, a Firewall, a Web caching system, a traffic shaping and QoS facility, a mini PKI and much more. CacheGuard Gateway gives you the power to do it all as easily as possible.
Powered by CacheGuard-OS
All CacheGuard appliances run under an appliance oriented OS called CacheGuard-OS. CacheGuard-OS is open source and free of charge in its BYOL version for up to 10 protected users and/or 5 simultaneous users of protected Web applications. The OS has been rigorously and securely built from scratch around
a Linux kernel and strictly embed programs that are actually needed. While more than 100 000 lines of open source code had been developed to build CacheGuard-OS, the OS embeds very well-known and open source technologies provided by the open source community. CacheGuard-OS is a consistent merge of multiple technologies in order to offer a powerful, robust and easy to handle solution.
Functional & Easy to Handle
If you are a system administrator looking for a powerful, but easy to handle solution to secure and/or optimize your networks, CacheGuard Gateway is
for you. CacheGuard Gateway can be configured and managed with the help
of a CLI (Command Line Interface) and/or a Web GUI (Graphical User Interface). CacheGuard products are provided with full online and offline documentation. Our active and responsive technical forum https://help.cacheguard.net/, allows you to find answers to your questions as quickly as possible. Learn more at https://www.cacheguard.com/.
Usage Instructions
You can manage your CacheGuard Gateway via its Web GUI at https://[cacheguard-public-ip]:8090
or via SSH. By default, CacheGuard Gateway on Azure uses two distinct public IP addresses: one external public IP used for outgoing traffic to the internet and one internal public IP used for incoming connections to its embedded Web proxy on the TCP port 8080. If from the same local public IP address you manage AND use your CacheGuard Gateway (as a Web proxy), your CacheGuard Gateway will be accessible only on its internal public IP address from that local public IP address.
CacheGuard Gateway is provided with full online and offline documentation that include a User’s Guide and a Command Line Manual. You can find the CacheGuard Documentation via CacheGuard administration interfaces (Console, SSH and HTTPS) or online on the Web.
You can monitor the health of a CacheGuard Gateway either by inspecting the reports that are made available via its Web GUI or by using the “system report” command line. In addition, CacheGuard Gateway supports SNMP and the syslog protocol.
or via SSH. By default, CacheGuard Gateway on Azure uses two distinct public IP addresses: one external public IP used for outgoing traffic to the internet and one internal public IP used for incoming connections to its embedded Web proxy on the TCP port 8080. If from the same local public IP address you manage AND use your CacheGuard Gateway (as a Web proxy), your CacheGuard Gateway will be accessible only on its internal public IP address from that local public IP address.
CacheGuard Gateway is provided with full online and offline documentation that include a User’s Guide and a Command Line Manual. You can find the CacheGuard Documentation via CacheGuard administration interfaces (Console, SSH and HTTPS) or online on the Web.
You can monitor the health of a CacheGuard Gateway either by inspecting the reports that are made available via its Web GUI or by using the “system report” command line. In addition, CacheGuard Gateway supports SNMP and the syslog protocol.
https://store-images.s-microsoft.com/image/apps.16689.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.41efb43c-f2b8-41ec-84aa-c0621b2cb149
https://store-images.s-microsoft.com/image/apps.16689.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.41efb43c-f2b8-41ec-84aa-c0621b2cb149
https://store-images.s-microsoft.com/image/apps.28181.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.1d4229e5-2b63-453c-a283-66db681861f7
https://store-images.s-microsoft.com/image/apps.64374.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.5abe6097-267e-4c98-a8a9-8261cd8061d3
https://store-images.s-microsoft.com/image/apps.22726.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.35624f0d-04c7-46a9-a4e6-ad086f329047
https://store-images.s-microsoft.com/image/apps.41891.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.23d6ef5a-8b12-418d-b30d-dc8f6e119f95
https://store-images.s-microsoft.com/image/apps.15067.5ba7ed80-8b12-4ee1-849f-199061ad42a2.09c988e7-2766-49f6-b921-19d98a27681e.e49ea0b2-49c2-4db9-a200-2887428d3f23