1,005 STIG rules · 9 product families
Pre-ingested DISA quarterly bundle for IOS, IOS-XE Switch + Router, NX-OS Switch, ACI, ASA, IOS-XR, ISE, Wireless. Drop the next quarterly zip → catalog rebuilds in-process.
InfoRelay NetGuard ingests your Cisco running-configs, runs the full DISA quarterly STIG,
explains every finding in plain network-engineer language, and emits ready-to-file compliance
artifacts — DISA .ckl, annotated .cfg, Excel workbook, printable PDF.
Configs never leave the audit host.
line vty 0 4 / exec-timeout 5 0Every applicable Vuln_Num produces a row. Every FAIL carries the exact remediation. Every MANUAL is triaged with engineering reasoning so the review pile drops 40–60% before the auditor opens it.
Pre-ingested DISA quarterly bundle for IOS, IOS-XE Switch + Router, NX-OS Switch, ACI, ASA, IOS-XR, ISE, Wireless. Drop the next quarterly zip → catalog rebuilds in-process.
Every FAIL carries Expected / Actual / At-line / Patch. The operator gets the exact commands to paste, with source-line refs into their config. No more "V-220544 failed" with no context.
25-topic protocol classifier scans every MANUAL rule. Marks "likely N/A" with engineer's reasoning ("Device runs no BGP — routing is via EIGRP AS 65000 on lines 145–158") or "applicable, review lines X–Y".
netguard --pull HOST --audit-after. Autodetects IOS / IOS-XE / NX-OS / IOS-XR via Netmiko. Pulls show running + facts (model, serial, software) and chains audit + annotation + CKL.
DISA .ckl drops into STIG Viewer. Annotated .cfg for the compliance binder. Excel workbook for analyst review. Printable PDF for the executive summary. All produced in one click.
Drop 50 configs at once → aggregate dashboard with per-device drill-down + one-click ZIP downloads of every CKL, every annotated config, every workbook.
Pick two saved audits, compare. NetGuard re-audits both against the current catalog and shows: NEW FAILs, RESOLVED, status changes. Use after every quarterly STIG release.
Binds to 127.0.0.1 only. The only outbound traffic is SSH to operator-specified targets. No telemetry. No phone-home. No external LLM, ever. Suitable for SCIF-adjacent admin workstations.
Single-binary install. Double-click to launch — own window, own title bar, no browser tab. CLI mode available for headless / scripted use.
Three input modes, one pipeline, four artifact types. Nothing leaves the box.
Paste a config, upload a folder of .cfg files, or have netguard SSH to your devices with the scan account.
Product family auto-inferred (IOS-XE switch vs router, NX-OS, IOS-XR). Catalog-driven audit selects only the STIGs that apply.
Every applicable Vuln_Num produces a finding. Auto-checks PASS/FAIL with Deviation. Manual items get an engineer's note for likely N/A vs applicable.
Download CKL → STIG Viewer. Annotated .cfg → compliance binder. XLSX → analyst review. Print → PDF for the exec summary.
Built for environments where running-configs cannot leave the perimeter: air-gapped admin workstations, STIG'd networks, SCIF-adjacent enclaves, and any DoD posture where "calls home" is a non-starter.
We deliberately stop at the edge of external LLM. The "intelligence" you see — the Deviation engine, the MANUAL triage — is rule-driven Python that you can vet line-by-line. No models. No API calls. No outbound traffic except to the devices you point it at.
127.0.0.1 only by default~/.netguard/configs/Single-binary builds for Windows, macOS, Linux. SHA-256 + Ed25519 signatures published alongside.
netguard-0.1-windows-x64.zip.netguard-0.1-windows-x64.exe → Properties → check Unblock at the bottom → OK.netguard-0.1-windows-x64.exe --audit foo.cfg --ckl-out report.cklWhy the warnings? Pre-v1.0 evaluation builds are unsigned. The binary is reproducible from the public source at inforelay-netguard-0.1-src.tar.gz; verify with the SHA-256 published alongside each download. v1.0 release will be EV-signed and SmartScreen-clean.
NetGuard is InfoRelay's tools spin-off — offline, on-prem, intelligent network engineering utilities. Audit is the first; more are on the way.
This product — DISA Cisco STIG audit, MANUAL triage, CKL / annotated.cfg / XLSX / PDF outputs, live SSH pull.
"Can workstation 10.20.10.45 reach Call Manager 10.50.0.100 on tcp/2000?" Walks L2/L3/ACL/routing across every audited device to find the break.
Continuous config-drift detection across your inventory. Alerts on baseline divergence without ever sending the configs anywhere.
PAN-OS (Palo Alto) and JunOS (Juniper) STIG audit modules with the same Deviation + Triage intelligence layer.
127.0.0.1 only. The single exception is the --pull feature, which makes an SSH connection to operator-specified device IPs — never to anywhere else. No telemetry, no update checks, no analytics.--product./catalog page in the UI (or netguard --build-stig-catalog on the CLI). NetGuard extracts safely under ./stigs/ and rebuilds the cache in-process. No service restart.127.0.0.1:9999 for the UI; no firewall changes required.