SlideShare a Scribd company logo
1 of 2
Download to read offline
Data Sheet


                                                                                    Comprehensive Network Security
                                         Cyberoam CR100ia
                                                                                      for Small & Medium Offices




Unified Threat Management
                                                                                                                                                         VPNC
                                                                                                                                                        CERTIFIED
                                                                                                                                                              SSL
                                                                                                                                                             Portal
                                                                                                                                                              SSL
                                                                                                                                                            Exchange

                                                                                                                                                              SSL
                                                                                                                                                             Firefox
                                                                                                                                             VPNC             SSL
                                                                                                                                            CERTIFIED      JavaScript
                                                                                                                                              Basic        SSL Basic
                                                                                                                                             Interop    Network Extension
                                                                                                                                              AES        SSL Advanced
                                                                                                                       www.check-mark.com    Interop    Network Extension




                                         Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
                                         small and medium enterprises (SMEs) by allowing user identity-based policy controls.


Gartner positions                        Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the
                                         protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional
Cyberoam UTM as a                        solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering
“Visionary” in Magic                     instant visibility into the source of attacks by username rather than IP address – allowing immediate
                                         remediation to restore security or allowing proactive security. Layer 8 technology functions along with each
Quadrant for SMB                         of Cyberoam security features to allow creation of identity-based security policies.
Multifunction
Firewalls                                Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can
                                         grow with the future security needs of an organization without degrading system performance. ESA
                                         supports feature enhancements that can be developed rapidly and deployed with minimum efforts.




                                                               User Identity-based Security Policy Controls

                                    L8    USER

                                    L7    Application
                                                                                         Cyberoam's Layer 8 Technology treats
                                    L6    Presentation ASCII, EBCDIC, ICA                 “User Identity” as the 8th Layer
                                                                                         in the protocol stack
                                    L5    Session               L2TP, PPTP

                                          Transport                                      Cyberoam UTM offers security across
                                    L4                           TCP, UDP
                                                                                         Layer 2-Layer 8 using Identity-based policies
                                    L3    Network               192.168.1.1

                                    L2    Data Link          00-17-BB-8C-E3-E7

                                    L1    Physical


                 Cyberoam UTM features assure Security, Connectivity, Productivity

                         Security                                Connectivity                                                  Productivity

  Network Security                            Business Continuity                                     Employee Productivity
  - Firewall                                  - Multiple Link Management                              - Content Filtering
  - Intrusion Prevention System               - High Availability                                     - Instant Messaging Archiving & Controls
  - Wireless security
                                              Network Availability                                    IT Resource Optimization
  Content Security                            - VPN                                                    - Bandwidth Management
  - Anti-Virus/Anti-Spyware                   - 3G/WiMAX Connectivity                                  - Traffic Discovery
  - Anti-Spam                                                                                          - Application Layer 7 Management
  - HTTPS/SSL Content Security                Future-ready Connectivity
                                              - “IPv6 Ready” Gold Logo                                Administrator Productivity
  Administrative Security                                                                             - Next-Gen UI
  - Next-Gen UI
  - iView- Logging & Reporting
Specification
                                                                                                                                                                                                                    ##
Interfaces                                                            - “Phone home” activities                                                                                          High Availability
10/100/1000 GBE Ports                             6                   - Keylogger                                                                                                        - Active-Active
Configurable Internal/DMZ/WAN Ports               Yes             - Layer 7 (Applications) & Layer 8 (User - Identity)                                                                   - Active-Passive with state synchronization
Console Ports (RJ45/DB9)                          1                 Visibility                                                                                                           - Stateful Failover
USB Ports                                         2                                                                                                                                      - Alerts on Appliance Status change
Hardware Bypass Segments                          1*              Virtual Private Network
                                                                  - IPSec, L2TP, PPTP                                                                                                    Administration & System Management
System Performance*                                               - Encryption - 3DES, DES, AES, Twofish, Blowfish,                                                                      - Web-based configuration wizard
Firewall Throughput (UDP) (Mbps)                  1250              Serpent                                                                                                              - Role-based Access control
Firewall Throughput (TCP) (Mbps)                  1000            - Hash Algorithms - MD5, SHA-1                                                                                         - Firmware Upgrades via Web UI
New sessions/second                               10,000          - Authentication - Preshared key, Digital certificates                                                                 - Web 2.0 compliant UI (HTTPS)
Concurrent sessions                               400,000         - IPSec NAT Traversal                                                                                                  - UI Color Styler
168-bit 3DES/AES Throughput (Mbps)                80/100          - Dead Peer Detection and PFS support                                                                                  - Command line interface (Serial, SSH, Telnet)
Antivirus Throughput (Mbps)                       200             - Diffie Hellman Groups - 1,2,5,14,15,16                                                                               - SNMP (v1, v2c, v3)
IPS Throughput (Mbps)                             300             - External Certificate Authority support                                                                               - Multi-lingual support: Chinese, Hindi, French,
UTM Throughput (Mbps)                             160             - Export Road Warrior connection configuration                                                                           Korean
                                                                  - Domain name support for tunnel end points                                                                            - Cyberoam Central Console (Optional)
Stateful Inspection Firewall                                      - VPN connection redundancy                                                                                            - NTP Support
- Layer 8 (User - Identity) Firewall                              - Overlapping Network support
- Multiple Security Zones                                         - Hub & Spoke VPN support
                                                                                                                                                                                         User Authentication
- Access Control Criteria (ACC) - User - Identity, Source                                                                                                                                - Internal database
  & Destination Zone, MAC and IP address, Service                 SSL VPN                                                                                                                - Active Directory Integration
- UTM policies - IPS, Web Filtering, Application                  - TCP & UDP Tunneling                                                                                                  - Automatic Windows Single Sign On
  Filtering, Anti-Virus, Anti-Spam and Bandwidth                  - Authentication - Active Directory, LDAP, RADIUS,                                                                     - External LDAP/RADIUS database Integration
  Management                                                        Cyberoam                                                                                                             - Thin Client support - Microsoft Windows Server 2003
- Layer 7 (Application) Control & Visibility                      - Multi-layered Client Authentication - Certificate,                                                                     Terminal Services and Citrix XenApp
- Access Scheduling                                                 Username/Password                                                                                                    - RSA SecurID support
- Policy based Source & Destination NAT                           - User & Group policy enforcement                                                                                      - External Authentication - Users and Administrators
- H.323, SIP NAT Traversal                                        - Network access - Split and Full tunneling                                                                            - User/MAC Binding
- 802.1q VLAN Support                                             - Browser-based (Portal) Access - Clientless access                                                                    - Multiple Authentication servers
- DoS & DDoS Attack prevention                                    - Lightweight SSL VPN Tunneling Client
- MAC & IP-MAC filtering and Spoof prevention                     - Granular access control to all the Enterprise Network                                                                Logging/Monitoring
                                                                    resources                                                                                                            - Graphical real-time and historical monitoring
Gateway Anti-Virus & Anti-Spyware                                 - Administrative controls - Session timeout, Dead Peer                                                                 - Email notification of reports, viruses and attacks
- Virus, Worm, Trojan Detection & Removal                           Detection, Portal customization                                                                                      - Syslog support
- Spyware, Malware, Phishing protection                           - TCP- based Application Access - HTTP, HTTPS,                                                                         - Log Viewer - IPS, Web filter, Anti-Virus, Anti-Spam,
- Automatic virus signature database update                         RDP, TELNET, SSH                                                                                                       Authentication, System and Admin Events
- Scans HTTP, FTP, SMTP, POP3, IMAP, IM, VPN
  Tunnels                                                         Instant Messaging (IM) Management                                                                                      On-Appliance Cyberoam-iView Reporting
- Customize Individual user scanning                              - Yahoo and Windows Live Messenger
                                                                                                                                                                                                                                                             TM
                                                                                                                                                                                                                                                  Cyberoam
                                                                                                                                                                                         - Integrated Web-based Reporting tool -                VIEW
- Self Service Quarantine area                                    - Virus Scanning for IM traffic                                                                                          Cyberoam-iView
- Scan and deliver by file size                                   - Allow/Block Login                                                                                                    - 1000+ drilldown reports
- Block by file types                                             - Allow/Block File Transfer                                                                                            - 45+ Compliance reports
- Add disclaimer/signature                                        - Allow/Block Webcam                                                                                                   - Historical and Real-time reports
                                                                  - Allow/Block one-to-one/group Chat                                                                                    - Multiple Dashboards
Gateway Anti-Spam                                                 - Content-based blocking                                                                                               - Username, Host, Email ID specific Monitoring
- Real-time Blacklist (RBL), MIME header check                    - IM activities Log                                                                                                      Dashboard
- Filter based on message header, size, sender,                   - Archive files transferred                                                                                            - Reports - Security, Virus, Spam, Traffic, Policy
  recipient                                                       - Custom Alerts                                                                                                          violations, VPN, Search Engine keywords
- Subject line tagging                                                                                                                                                                   - Multi-format reports - tabular, graphical
- IP address Black list/White list                                Wireless WAN                                                                                                           - Exportable formats - PDF, Excel
                                                                                                                     #
- Redirect spam mails to dedicated email address                  - USB port 3G and WiMax Support                                                                                        - Automated Report Scheduling
- Image-based spam filtering using RPD Technology                 - Primary WAN link
- Zero hour Virus Outbreak Protection                             - WAN Backup link                                                                                                      IPSec VPN Client
- Self Service Quarantine area                                                                                                                                                           - Inter-operability with major IPSec VPN Gateways
- Spam Notification through Digest                                Bandwidth Management                                                                                                   - Supported platforms: Windows 2000, WinXP 32/64-
- IP Reputation-based Spam filtering                              - Application and User Identity based Bandwidth                                                                          bit, Windows 2003 32-bit, Windows 2008 32/64-bit,
                                                                    Management                                                                                                             Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
Intrusion Prevention System                                       - Guaranteed & Burstable bandwidth policy                                                                              - Import Connection configuration
- Signatures: Default (3000+), Custom                             - Application & User Identity based Traffic Discovery
- IPS Policies: Multiple, Custom                                  - Multi WAN bandwidth reporting                                                                                        Certification
- User-based policy creation                                      - Category-based Bandwidth restriction                                                                                 - ICSA Firewall - Corporate
- Automatic real-time updates from CRProtect networks                                                                                                                                    - Checkmark UTM Level 5 Certification
- Protocol Anomaly Detection                                      User Identity and Group Based Controls                                                                                 - VPNC - Basic and AES interoperability
- DDoS Attack prevention                                          - Access time restriction                                                                                              - IPv6 Ready Gold Logo
                                                                  - Time and Data Quota restriction
Web Filtering                                                     - Schedule based Committed and Burstable                                                                               Compliance
- Inbuilt Web Category Database                                     Bandwidth                                                                                                            CE
- URL, keyword, File type block                                   - Schedule based P2P and IM Controls                                                                                   FCC
- Categories: Default(82+), Custom
- Protocols supported: HTTP, HTTPS                                Networking                                                                                                             Dimensions
- Block Malware, Phishing, Pharming URLs                          - Failover - Automated Failover/Failback, Multi-WAN                                                                    H x W x D (inches)
- Schedule-based access control                                                                                                                                                                                                    1.7 x 16.8 x 10.3
                                                                    failover, 3G Modem failover                                                                                          H x W x D (cms)                           4.3 x 42.7 x 26.2
- Custom block messages per category                              - WRR based Load balancing                                                                                             Weight
- Block Java Applets, Cookies, Active X                                                                                                                                                                                            5.3 kg, 11.68 lbs
                                                                  - Policy routing based on Application and User
- CIPA Compliant                                                  - IP Address Assignment - Static, PPPoE, L2TP, PPTP                                                                    Power
- Data leakage control via HTTP, HTTPS upload                       & DDNS Client, Proxy ARP, DHCP server, DHCP                                                                          Input Voltage                             100-240 VAC
                                                                    relay                                                                                                                Consumption                               90W
Application Filtering                                             - Support for HTTP Proxy                                                                                               Total Heat Dissipation (BTU)              200
- Inbuilt Application Category Database                           - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast
- Application Categories e.g. Gaming, IM, P2P,                      Forwarding                                                                                                           Environmental
  Proxy: 11+                                                      - Parent Proxy support with FQDN                                                                                       Operating Temperature                     5 to 40 °C
- Schedule-based access control                                   - IPv6 Ready Gold Logo                                                                                                 Storage Temperature                       0 to 70 °C
- Block                                                                                                                                                                                  Relative Humidity (Non condensing)        10 to 90%
    - P2P applications e.g. Skype                                                                                                                                                        Cooling System - Fan                      Fanless
    - Anonymous proxies e.g. UItra surf
                                                            ##
*If Enabled, will bypass traffic only in case of power failure. High Availability is currently a Beta feature.
**Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
#
  3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices.



Toll Free Numbers                                                                      C o p y r i g h t © 1999-2010 E l i t e c o r e Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.
                                                                                       Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although
USA : +1-877-777-0368 | India : 1-800-301-00013                                        Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy
                                                                                       or completeness of information neither is this a legally binding representation. Elitecore has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958                                 change,modify, transfer or otherwise revise the publication without notice.                           PL-10-1000301-101011         Unified Threat Management


www.cyberoam.com         I sales@cyberoam.com                                                                                                                                                                            Elitecore Product

More Related Content

Similar to Cyberoam cr100ia

Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCapsLayer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCapsCA API Management
 
Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa Data
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksCisco Service Provider
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
Unified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAPUnified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAPOliver Pfaff
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesCisco Mobility
 
A Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNA Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNijtsrd
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02Bố Su
 

Similar to Cyberoam cr100ia (20)

Cyberoam25i a
Cyberoam25i aCyberoam25i a
Cyberoam25i a
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
CONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300INGCONSULTCORP CYBEROAM CR300ING
CONSULTCORP CYBEROAM CR300ING
 
CONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50INGCONSULTCORP- CYBEROAM CR50ING
CONSULTCORP- CYBEROAM CR50ING
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
CONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200INGCONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200ING
 
CONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35INGCONSULTCORP- CYBEROAM CR35ING
CONSULTCORP- CYBEROAM CR35ING
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCapsLayer 7: Enterprise SOA with SecureSpan and JavaCaps
Layer 7: Enterprise SOA with SecureSpan and JavaCaps
 
Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Unified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAPUnified Security Architectures for Web and WAP
Unified Security Architectures for Web and WAP
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
 
Daniel künzli net scaler 10
Daniel künzli net scaler 10Daniel künzli net scaler 10
Daniel künzli net scaler 10
 
A Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNA Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPN
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
Intorduction to Datapower
Intorduction to DatapowerIntorduction to Datapower
Intorduction to Datapower
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Cyberoam cr100ia

  • 1. Data Sheet Comprehensive Network Security Cyberoam CR100ia for Small & Medium Offices Unified Threat Management VPNC CERTIFIED SSL Portal SSL Exchange SSL Firefox VPNC SSL CERTIFIED JavaScript Basic SSL Basic Interop Network Extension AES SSL Advanced www.check-mark.com Interop Network Extension Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls. Gartner positions Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional Cyberoam UTM as a solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering “Visionary” in Magic instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each Quadrant for SMB of Cyberoam security features to allow creation of identity-based security policies. Multifunction Firewalls Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts. User Identity-based Security Policy Controls L8 USER L7 Application Cyberoam's Layer 8 Technology treats L6 Presentation ASCII, EBCDIC, ICA “User Identity” as the 8th Layer in the protocol stack L5 Session L2TP, PPTP Transport Cyberoam UTM offers security across L4 TCP, UDP Layer 2-Layer 8 using Identity-based policies L3 Network 192.168.1.1 L2 Data Link 00-17-BB-8C-E3-E7 L1 Physical Cyberoam UTM features assure Security, Connectivity, Productivity Security Connectivity Productivity Network Security Business Continuity Employee Productivity - Firewall - Multiple Link Management - Content Filtering - Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls - Wireless security Network Availability IT Resource Optimization Content Security - VPN - Bandwidth Management - Anti-Virus/Anti-Spyware - 3G/WiMAX Connectivity - Traffic Discovery - Anti-Spam - Application Layer 7 Management - HTTPS/SSL Content Security Future-ready Connectivity - “IPv6 Ready” Gold Logo Administrator Productivity Administrative Security - Next-Gen UI - Next-Gen UI - iView- Logging & Reporting
  • 2. Specification ## Interfaces - “Phone home” activities High Availability 10/100/1000 GBE Ports 6 - Keylogger - Active-Active Configurable Internal/DMZ/WAN Ports Yes - Layer 7 (Applications) & Layer 8 (User - Identity) - Active-Passive with state synchronization Console Ports (RJ45/DB9) 1 Visibility - Stateful Failover USB Ports 2 - Alerts on Appliance Status change Hardware Bypass Segments 1* Virtual Private Network - IPSec, L2TP, PPTP Administration & System Management System Performance* - Encryption - 3DES, DES, AES, Twofish, Blowfish, - Web-based configuration wizard Firewall Throughput (UDP) (Mbps) 1250 Serpent - Role-based Access control Firewall Throughput (TCP) (Mbps) 1000 - Hash Algorithms - MD5, SHA-1 - Firmware Upgrades via Web UI New sessions/second 10,000 - Authentication - Preshared key, Digital certificates - Web 2.0 compliant UI (HTTPS) Concurrent sessions 400,000 - IPSec NAT Traversal - UI Color Styler 168-bit 3DES/AES Throughput (Mbps) 80/100 - Dead Peer Detection and PFS support - Command line interface (Serial, SSH, Telnet) Antivirus Throughput (Mbps) 200 - Diffie Hellman Groups - 1,2,5,14,15,16 - SNMP (v1, v2c, v3) IPS Throughput (Mbps) 300 - External Certificate Authority support - Multi-lingual support: Chinese, Hindi, French, UTM Throughput (Mbps) 160 - Export Road Warrior connection configuration Korean - Domain name support for tunnel end points - Cyberoam Central Console (Optional) Stateful Inspection Firewall - VPN connection redundancy - NTP Support - Layer 8 (User - Identity) Firewall - Overlapping Network support - Multiple Security Zones - Hub & Spoke VPN support User Authentication - Access Control Criteria (ACC) - User - Identity, Source - Internal database & Destination Zone, MAC and IP address, Service SSL VPN - Active Directory Integration - UTM policies - IPS, Web Filtering, Application - TCP & UDP Tunneling - Automatic Windows Single Sign On Filtering, Anti-Virus, Anti-Spam and Bandwidth - Authentication - Active Directory, LDAP, RADIUS, - External LDAP/RADIUS database Integration Management Cyberoam - Thin Client support - Microsoft Windows Server 2003 - Layer 7 (Application) Control & Visibility - Multi-layered Client Authentication - Certificate, Terminal Services and Citrix XenApp - Access Scheduling Username/Password - RSA SecurID support - Policy based Source & Destination NAT - User & Group policy enforcement - External Authentication - Users and Administrators - H.323, SIP NAT Traversal - Network access - Split and Full tunneling - User/MAC Binding - 802.1q VLAN Support - Browser-based (Portal) Access - Clientless access - Multiple Authentication servers - DoS & DDoS Attack prevention - Lightweight SSL VPN Tunneling Client - MAC & IP-MAC filtering and Spoof prevention - Granular access control to all the Enterprise Network Logging/Monitoring resources - Graphical real-time and historical monitoring Gateway Anti-Virus & Anti-Spyware - Administrative controls - Session timeout, Dead Peer - Email notification of reports, viruses and attacks - Virus, Worm, Trojan Detection & Removal Detection, Portal customization - Syslog support - Spyware, Malware, Phishing protection - TCP- based Application Access - HTTP, HTTPS, - Log Viewer - IPS, Web filter, Anti-Virus, Anti-Spam, - Automatic virus signature database update RDP, TELNET, SSH Authentication, System and Admin Events - Scans HTTP, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels Instant Messaging (IM) Management On-Appliance Cyberoam-iView Reporting - Customize Individual user scanning - Yahoo and Windows Live Messenger TM Cyberoam - Integrated Web-based Reporting tool - VIEW - Self Service Quarantine area - Virus Scanning for IM traffic Cyberoam-iView - Scan and deliver by file size - Allow/Block Login - 1000+ drilldown reports - Block by file types - Allow/Block File Transfer - 45+ Compliance reports - Add disclaimer/signature - Allow/Block Webcam - Historical and Real-time reports - Allow/Block one-to-one/group Chat - Multiple Dashboards Gateway Anti-Spam - Content-based blocking - Username, Host, Email ID specific Monitoring - Real-time Blacklist (RBL), MIME header check - IM activities Log Dashboard - Filter based on message header, size, sender, - Archive files transferred - Reports - Security, Virus, Spam, Traffic, Policy recipient - Custom Alerts violations, VPN, Search Engine keywords - Subject line tagging - Multi-format reports - tabular, graphical - IP address Black list/White list Wireless WAN - Exportable formats - PDF, Excel # - Redirect spam mails to dedicated email address - USB port 3G and WiMax Support - Automated Report Scheduling - Image-based spam filtering using RPD Technology - Primary WAN link - Zero hour Virus Outbreak Protection - WAN Backup link IPSec VPN Client - Self Service Quarantine area - Inter-operability with major IPSec VPN Gateways - Spam Notification through Digest Bandwidth Management - Supported platforms: Windows 2000, WinXP 32/64- - IP Reputation-based Spam filtering - Application and User Identity based Bandwidth bit, Windows 2003 32-bit, Windows 2008 32/64-bit, Management Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit Intrusion Prevention System - Guaranteed & Burstable bandwidth policy - Import Connection configuration - Signatures: Default (3000+), Custom - Application & User Identity based Traffic Discovery - IPS Policies: Multiple, Custom - Multi WAN bandwidth reporting Certification - User-based policy creation - Category-based Bandwidth restriction - ICSA Firewall - Corporate - Automatic real-time updates from CRProtect networks - Checkmark UTM Level 5 Certification - Protocol Anomaly Detection User Identity and Group Based Controls - VPNC - Basic and AES interoperability - DDoS Attack prevention - Access time restriction - IPv6 Ready Gold Logo - Time and Data Quota restriction Web Filtering - Schedule based Committed and Burstable Compliance - Inbuilt Web Category Database Bandwidth CE - URL, keyword, File type block - Schedule based P2P and IM Controls FCC - Categories: Default(82+), Custom - Protocols supported: HTTP, HTTPS Networking Dimensions - Block Malware, Phishing, Pharming URLs - Failover - Automated Failover/Failback, Multi-WAN H x W x D (inches) - Schedule-based access control 1.7 x 16.8 x 10.3 failover, 3G Modem failover H x W x D (cms) 4.3 x 42.7 x 26.2 - Custom block messages per category - WRR based Load balancing Weight - Block Java Applets, Cookies, Active X 5.3 kg, 11.68 lbs - Policy routing based on Application and User - CIPA Compliant - IP Address Assignment - Static, PPPoE, L2TP, PPTP Power - Data leakage control via HTTP, HTTPS upload & DDNS Client, Proxy ARP, DHCP server, DHCP Input Voltage 100-240 VAC relay Consumption 90W Application Filtering - Support for HTTP Proxy Total Heat Dissipation (BTU) 200 - Inbuilt Application Category Database - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast - Application Categories e.g. Gaming, IM, P2P, Forwarding Environmental Proxy: 11+ - Parent Proxy support with FQDN Operating Temperature 5 to 40 °C - Schedule-based access control - IPv6 Ready Gold Logo Storage Temperature 0 to 70 °C - Block Relative Humidity (Non condensing) 10 to 90% - P2P applications e.g. Skype Cooling System - Fan Fanless - Anonymous proxies e.g. UItra surf ## *If Enabled, will bypass traffic only in case of power failure. High Availability is currently a Beta feature. **Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. # 3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices. Toll Free Numbers C o p y r i g h t © 1999-2010 E l i t e c o r e Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d. Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although USA : +1-877-777-0368 | India : 1-800-301-00013 Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy or completeness of information neither is this a legally binding representation. Elitecore has the right to APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000301-101011 Unified Threat Management www.cyberoam.com I sales@cyberoam.com Elitecore Product