{% extends "base.html" %} {% block content %}

Cisco STIG audit — offline, on-prem, intelligent.

Paste a running-config or upload a .cfg file. NetGuard parses it, classifies the device, runs the catalog-driven DISA STIG audit, triages every manual-review item, and gives you a STIG-Viewer-ready .ckl in one click. Nothing leaves this machine.

{% if error %}
{{ error }}
{% endif %} {% if not catalog_loaded %}
STIG catalog not loaded. Build it once with python -m netguard --build-stig-catalog stigs --catalog-out stigs/stig_catalog.json. The audit will run but no STIG findings will be produced.
{% endif %}
— or —
Select multiple files for a batch audit — netguard will run each through the full pipeline and produce an aggregate dashboard with one-click ZIP downloads of every CKL / annotated .cfg.
Outputs: triaged findings · annotated .cfg · DISA .ckl · CSV
⚡ SSH-pull a live device 🗂 Audit history 📚 Catalog refresh

Catalog loaded

{% if catalog_loaded %}
{{ catalog_total }}
STIG rules across {{ catalog_products|length }} Cisco product families
{{ n_implemented }}
auto-checks with PASS / FAIL + Deviation engine
{% for p in catalog_products %}{{ p }}{% endfor %}
Source: {{ catalog_path }}
{% else %}

Build the catalog to see rule counts here.

{% endif %}

What you get on every audit

Auto-checked controls

{{ n_implemented }} STIG vulns netguard verifies structurally: banner, vty timeout, NTP redundancy + auth, SNMPv3, syslog redundancy, password encryption, HTTP server disable, login-audit logging. Same code covers IOS, IOS-XE, NX-OS via short_id mapping.

Deviation engine (L1)

Every FAIL carries Expected / Actual / At / Patch — the exact config commands to paste, with source line numbers. No more "V-220544 failed" with no context.

MANUAL triage (L2)

A 25-topic protocol classifier scans every MANUAL rule and proposes "likely N/A" with engineering reasoning ("Device runs no BGP; routing is via EIGRP AS 65000 on lines 145–158") or "applicable — review these lines" with config localization. Drops the review pile 40–60%.

Audit trail outputs

DISA .ckl drops into STIG Viewer. Annotated .cfg for the compliance binder. CSV for ad-hoc analysis. Every line that maps to a STIG control is documented in place.

802.1x posture

Beyond STIG: detects the AAA / RADIUS prereqs, host-mode mismatches, monitor-mode (auth open) ports, missing portfast/bpduguard, and VLAN-uplink blackholes that silently break IP phones + dot1x clients.

Live device pull CLI

netguard --pull HOST --audit-after SSHs to a Cisco device, pulls running-config + facts, runs the audit end-to-end. Browser-driven pull is on the roadmap.

{% endblock %}