InfoRelay·NetGuard

Audit STIGs. Cut certificates. Stay offline.

InfoRelay's tool suite for air-gapped admin workstations. Offline DISA Cisco STIG audits, single-binary AD CS cert lifecycle, no telemetry, no installer, no phone-home. Built for the network engineers running the perimeter, not their dashboards.

1,005 STIG rules 40–60% MANUAL reduction 100% air-gapped SCIF-deployable
Built for the standards that matter
DISA STIG
DoW DISA quarterly
NIST 800-171
NIST 800-53
CMMC 2.0
FedRAMP-aligned

CLI mode scriptable

netguard — ~/audit · live SSH pull
$ netguard --pull 10.50.0.12 --user scan --audit-after
Password for scan@10.50.0.12: ••••••••
SSH 10.50.0.12 · autodetected cisco_xe
pulled 17,842 bytes · hostname V1-9407R-1
product: IOS-XE_Switch · STIG: NDM, L2S, RTR
153 rules · 10 PASS · 6 FAIL · 137 MANUAL
MANUAL triage: 35 N/A · 102 applicable · 0 unknown
V-220544 FAIL — vty 0 4 exec-timeout 9:59
line vty 0 4 / exec-timeout 5 0
Saved: V1-9407R-1-20260521.ckl · .annotated.cfg · .xlsx

Desktop GUI double-click to open

InfoRelay NetGuard — Audit Results
Devices▸ AuditCatalogDrift v0.1.34 · localhost:9999
Devices › V1-9407R-1 › Audit (IOS-XE Switch)

Audit results · V1-9407R-1 scanned just now

10
PASS
6
FAIL
137
MANUAL
40%
↓ triaged
V-220544  FAIL
vty session must terminate after 5 min idle. Actual: exec-timeout 9 59 on line 142.
Patch: line vty 0 4 / exec-timeout 5 0
V-220631  MANUAL → likely-N/A
"Configure BGP authentication." Device runs no BGP — EIGRP only (lines 145-158).
V-220488  PASS
Banner of the day present and matches DoD template (line 12).
⬇ Download .ckl 📄 Annotated .cfg 📊 XLSX 🖨 Print PDF

One offline suite. InfoRelay™.

Every tool in the family is single-binary, air-gap deployable, written in Python you can vet. No SaaS. No cloud control plane. No connected LLM. Each tool stands alone; together they replace a row of vendor licenses at a fraction of the TCO.

Live · v0.1 🛡

NetGuard Audit

DISA Cisco STIG audit · live SSH pull · MANUAL triage · CKL / annotated.cfg / XLSX / PDF.

Live · v0.1 🔐

CertGuard

Windows AD CS-aware cert tool. Discover · monitor · enroll · bulk CSR · troubleshoot. 11 prebuilt template recipes.

2026 Q3 🔍

NetGuard Trace

"Can workstation X reach Call Manager Y on tcp/2000?" Walks L2/L3/ACL/routing across every audited device.

2026 Q4 📐

NetGuard Drift

Continuous config-drift detection across your inventory. Alerts on baseline divergence — without ever sending configs anywhere.

2027 🌐

NetGuard Multi-vendor

PAN-OS and JunOS STIG audit modules with the same Deviation + Triage intelligence layer.

2027 📊

NetGuard Inventory

Live discovery, normalization, and offline change-control for the whole device fleet. CMDB-grade artifacts, zero connected services.

Why InfoRelay?

Four design choices we will never break.

🔒

100% air-gapped

Binds 127.0.0.1 only. SSH-pull is the only outbound traffic — and only to IPs you specify. No telemetry. No update checks. No connected LLM.

📦

Single binary

No MSI. No service. No registry edits. No scheduled tasks. The binary's SHA-256 IS the entire SWAB artifact your ISSO has to track.

Fast time to value

Drop the .exe on disk, double-click, scan. First audit completes in under 60 seconds. No deployment ceremony, no consultant engagement.

💰

Honest pricing

Per-site tiered: Standard (100 devices) / Pro (250) / Enterprise (1,000+). No per-user fees. No per-feature paywalls. The full product is what ships.

Capabilities

Catalog-driven. Intelligence-augmented. Audit-trail-ready.

Every applicable Vuln_Num produces a row. Every FAIL carries exact remediation. Every MANUAL is triaged with engineering reasoning so the review pile drops 40–60% before the auditor opens it.

📚

1,005 STIG rules · 9 product families

Pre-ingested DISA quarterly bundle for IOS, IOS-XE Switch + Router, NX-OS Switch, ACI, ASA, IOS-XR, ISE, Wireless. Drop the next quarterly zip → catalog rebuilds in-process.

🎯

L1 — Deviation engine

Every FAIL carries Expected / Actual / At-line / Patch. The operator gets the exact commands to paste, with source-line refs into their config.

🧠

L2 — MANUAL triage

25-topic protocol classifier scans every MANUAL rule. Marks "likely N/A" with engineer's reasoning, or "applicable, review lines X–Y".

Live SSH pull

netguard --pull HOST --audit-after. Autodetects IOS / IOS-XE / NX-OS / IOS-XR. Pulls show running + facts and chains audit → annotation → CKL.

📊

Real audit artifacts

DISA .ckl drops into STIG Viewer. Annotated .cfg for the binder. Excel for analyst review. Printable PDF for executive summary.

📦

Batch mode + drift

Drop 50 configs at once → aggregate dashboard with per-device drill-down. Pick two saved audits → re-audit both → see NEW FAILs, RESOLVED, status changes.

How it works

From a config you don't trust to a checklist you can file.

Three input modes, one pipeline, four artifact types. Nothing leaves the box.

1

Ingest

Paste a config, upload a folder of .cfg files, or have netguard SSH to your devices with the scan account.

2

Detect

Product family auto-inferred (IOS-XE switch vs router, NX-OS, IOS-XR). Catalog-driven audit selects only the STIGs that apply.

3

Audit + Triage

Every applicable Vuln_Num produces a finding. Auto-checks PASS/FAIL with Deviation. Manual items get an engineer's note for likely N/A vs applicable.

4

File

Download CKL → STIG Viewer. Annotated .cfg → compliance binder. XLSX → analyst review. Print → PDF for the exec summary.

The numbers behind v0.1

1,005
STIG rules across 9 Cisco product families
11
CertGuard prebuilt template recipes (CAPF, WebServer, DC, EFS, OCSP…)
40–60%
MANUAL-review reduction via the L2 triage engine
0
External network calls. Period. Verifiable with tcpdump.

Built for the situations that break other tools.

Three operator realities the InfoRelay suite handles where SaaS platforms can't follow.

STIG quarter crunch

The quarterly review is in two weeks and 70% of findings are MANUAL.

Your team is staring at 800 MANUAL items per device. Most aren't applicable but you have to write a justification on every one. The analyst pile is the bottleneck — not the auditing.

NetGuard's L2 triage classifies every MANUAL with engineering reasoning. "Likely N/A — device runs no BGP" cuts the review pile by 40-60% before a human ever opens it.
Air-gap / SCIF

The admin workstation can't talk to the internet. Cloud tools are not an option.

Every commercial PKI / audit tool wants to phone home. Telemetry, license check-in, cloud-side dashboards. Your ATO doesn't allow any of it.

InfoRelay binds 127.0.0.1 only. Single binary, no installer, no service, no outbound except SSH to operator-specified IPs. Bring the .exe in on a transfer drive; it just works.
DoW SWAB approval

Anything that installs needs a 6-week Software Approval Baseline review.

MSI installers trigger registry writes, service installs, scheduled tasks — every one of which the SWAB has to vet. By the time the tool is approved, the audit window has passed.

Zero installer. No MSI. No service. No scheduled task. No registry writes. The binary's SHA-256 IS the SWAB artifact. v0.2 ships? Swap the .exe. No patch ceremony.

Ready to run an offline STIG audit?

Drop the binary on disk. Point it at a device. Get a CKL in 60 seconds. Free for evaluation — Standard / Pro / Enterprise pricing announced before v1.0.

Get NetGuard

v0.1 builds · single binary

SHA-256 + Ed25519 signatures published alongside. Source tarball lets you build it yourself and vet every line.

Installing on Windows

  1. Download netguard-0.1-windows-x64.zip.
  2. Right-click the zip → Extract All…
  3. Right-click netguard-0.1-windows-x64.exeProperties → check Unblock at the bottom → OK.
  4. Double-click the .exe. Windows SmartScreen will show "Windows protected your PC" — click More info → Run anyway. (Until we ship with an EV code-signing cert, this is the expected one-time approval.)
  5. NetGuard opens in a native window. CLI mode: netguard-0.1-windows-x64.exe --audit foo.cfg --ckl-out report.ckl
Already have Python? pip install inforelay-netguard, then netguard --app. See the user guide for the full walkthrough.
FAQ

The questions a DoW ISSO asks first.

Does NetGuard ever make external network calls?
No. The Flask UI binds to 127.0.0.1 only. The single exception is the --pull feature, which makes an SSH connection to operator-specified device IPs — never to anywhere else. No telemetry, no update checks, no analytics.
What's the difference vs. SCAP Compliance Checker (SCC) or Evaluate-STIG?
SCC and Evaluate-STIG are general SCAP/STIG scanners. NetGuard is purpose-built for Cisco network devices — same audit, plus the Deviation engine (Expected / Actual / Patch on every FAIL), MANUAL triage with engineering reasoning, live SSH pull, CKL export, and a native desktop app. The output drops into your existing STIG Viewer workflow.
What Cisco platforms are supported?
v0.1 ships the full DISA catalog for IOS, IOS-XE (Switch + Router), NX-OS Switch, ACI, ASA, IOS-XR, ISE, and Wireless — 1,005 rules across 9 product families. Auto-detection picks the right STIG set.
How are STIG catalogs updated?
Drop the next DISA quarterly zip into the /catalog page in the UI (or netguard --build-stig-catalog on the CLI). NetGuard extracts safely under ./stigs/ and rebuilds the cache in-process. No service restart.
Does this require SWAB sign-off?
Less than most tools, by design. There's no installer — no MSI, no Windows service, no scheduled task, no registry writes, no auto-update mechanism. The binary's SHA-256 hash IS the entire baseline artifact your ISSO has to track.
Licensing model?
Per-site tiered: Standard (100 devices), Pro (250), Enterprise (1,000+). Ed25519-signed license file with hardware-fingerprint binding. Evaluation tier ships unrestricted for 30 days.