Data Sheet


                                                                                    Comprehensive Network Security
                                         Cyberoam CR100ia
                                                                                      for Small & Medium Offices




Unified Threat Management
                                                                                                                                                         VPNC
                                                                                                                                                        CERTIFIED
                                                                                                                                                              SSL
                                                                                                                                                             Portal
                                                                                                                                                              SSL
                                                                                                                                                            Exchange

                                                                                                                                                              SSL
                                                                                                                                                             Firefox
                                                                                                                                             VPNC             SSL
                                                                                                                                            CERTIFIED      JavaScript
                                                                                                                                              Basic        SSL Basic
                                                                                                                                             Interop    Network Extension
                                                                                                                                              AES        SSL Advanced
                                                                                                                       www.check-mark.com    Interop    Network Extension




                                         Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
                                         small and medium enterprises (SMEs) by allowing user identity-based policy controls.


Gartner positions                        Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the
                                         protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional
Cyberoam UTM as a                        solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering
“Visionary” in Magic                     instant visibility into the source of attacks by username rather than IP address – allowing immediate
                                         remediation to restore security or allowing proactive security. Layer 8 technology functions along with each
Quadrant for SMB                         of Cyberoam security features to allow creation of identity-based security policies.
Multifunction
Firewalls                                Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can
                                         grow with the future security needs of an organization without degrading system performance. ESA
                                         supports feature enhancements that can be developed rapidly and deployed with minimum efforts.




                                                               User Identity-based Security Policy Controls

                                    L8    USER

                                    L7    Application
                                                                                         Cyberoam's Layer 8 Technology treats
                                    L6    Presentation ASCII, EBCDIC, ICA                 “User Identity” as the 8th Layer
                                                                                         in the protocol stack
                                    L5    Session               L2TP, PPTP

                                          Transport                                      Cyberoam UTM offers security across
                                    L4                           TCP, UDP
                                                                                         Layer 2-Layer 8 using Identity-based policies
                                    L3    Network               192.168.1.1

                                    L2    Data Link          00-17-BB-8C-E3-E7

                                    L1    Physical


                 Cyberoam UTM features assure Security, Connectivity, Productivity

                         Security                                Connectivity                                                  Productivity

  Network Security                            Business Continuity                                     Employee Productivity
  - Firewall                                  - Multiple Link Management                              - Content Filtering
  - Intrusion Prevention System               - High Availability                                     - Instant Messaging Archiving & Controls
  - Wireless security
                                              Network Availability                                    IT Resource Optimization
  Content Security                            - VPN                                                    - Bandwidth Management
  - Anti-Virus/Anti-Spyware                   - 3G/WiMAX Connectivity                                  - Traffic Discovery
  - Anti-Spam                                                                                          - Application Layer 7 Management
  - HTTPS/SSL Content Security                Future-ready Connectivity
                                              - “IPv6 Ready” Gold Logo                                Administrator Productivity
  Administrative Security                                                                             - Next-Gen UI
  - Next-Gen UI
  - iView- Logging & Reporting
Specification
                                                                                                                                                                                                                    ##
Interfaces                                                            - “Phone home” activities                                                                                          High Availability
10/100/1000 GBE Ports                             6                   - Keylogger                                                                                                        - Active-Active
Configurable Internal/DMZ/WAN Ports               Yes             - Layer 7 (Applications) & Layer 8 (User - Identity)                                                                   - Active-Passive with state synchronization
Console Ports (RJ45/DB9)                          1                 Visibility                                                                                                           - Stateful Failover
USB Ports                                         2                                                                                                                                      - Alerts on Appliance Status change
Hardware Bypass Segments                          1*              Virtual Private Network
                                                                  - IPSec, L2TP, PPTP                                                                                                    Administration & System Management
System Performance*                                               - Encryption - 3DES, DES, AES, Twofish, Blowfish,                                                                      - Web-based configuration wizard
Firewall Throughput (UDP) (Mbps)                  1250              Serpent                                                                                                              - Role-based Access control
Firewall Throughput (TCP) (Mbps)                  1000            - Hash Algorithms - MD5, SHA-1                                                                                         - Firmware Upgrades via Web UI
New sessions/second                               10,000          - Authentication - Preshared key, Digital certificates                                                                 - Web 2.0 compliant UI (HTTPS)
Concurrent sessions                               400,000         - IPSec NAT Traversal                                                                                                  - UI Color Styler
168-bit 3DES/AES Throughput (Mbps)                80/100          - Dead Peer Detection and PFS support                                                                                  - Command line interface (Serial, SSH, Telnet)
Antivirus Throughput (Mbps)                       200             - Diffie Hellman Groups - 1,2,5,14,15,16                                                                               - SNMP (v1, v2c, v3)
IPS Throughput (Mbps)                             300             - External Certificate Authority support                                                                               - Multi-lingual support: Chinese, Hindi, French,
UTM Throughput (Mbps)                             160             - Export Road Warrior connection configuration                                                                           Korean
                                                                  - Domain name support for tunnel end points                                                                            - Cyberoam Central Console (Optional)
Stateful Inspection Firewall                                      - VPN connection redundancy                                                                                            - NTP Support
- Layer 8 (User - Identity) Firewall                              - Overlapping Network support
- Multiple Security Zones                                         - Hub & Spoke VPN support
                                                                                                                                                                                         User Authentication
- Access Control Criteria (ACC) - User - Identity, Source                                                                                                                                - Internal database
  & Destination Zone, MAC and IP address, Service                 SSL VPN                                                                                                                - Active Directory Integration
- UTM policies - IPS, Web Filtering, Application                  - TCP & UDP Tunneling                                                                                                  - Automatic Windows Single Sign On
  Filtering, Anti-Virus, Anti-Spam and Bandwidth                  - Authentication - Active Directory, LDAP, RADIUS,                                                                     - External LDAP/RADIUS database Integration
  Management                                                        Cyberoam                                                                                                             - Thin Client support - Microsoft Windows Server 2003
- Layer 7 (Application) Control & Visibility                      - Multi-layered Client Authentication - Certificate,                                                                     Terminal Services and Citrix XenApp
- Access Scheduling                                                 Username/Password                                                                                                    - RSA SecurID support
- Policy based Source & Destination NAT                           - User & Group policy enforcement                                                                                      - External Authentication - Users and Administrators
- H.323, SIP NAT Traversal                                        - Network access - Split and Full tunneling                                                                            - User/MAC Binding
- 802.1q VLAN Support                                             - Browser-based (Portal) Access - Clientless access                                                                    - Multiple Authentication servers
- DoS & DDoS Attack prevention                                    - Lightweight SSL VPN Tunneling Client
- MAC & IP-MAC filtering and Spoof prevention                     - Granular access control to all the Enterprise Network                                                                Logging/Monitoring
                                                                    resources                                                                                                            - Graphical real-time and historical monitoring
Gateway Anti-Virus & Anti-Spyware                                 - Administrative controls - Session timeout, Dead Peer                                                                 - Email notification of reports, viruses and attacks
- Virus, Worm, Trojan Detection & Removal                           Detection, Portal customization                                                                                      - Syslog support
- Spyware, Malware, Phishing protection                           - TCP- based Application Access - HTTP, HTTPS,                                                                         - Log Viewer - IPS, Web filter, Anti-Virus, Anti-Spam,
- Automatic virus signature database update                         RDP, TELNET, SSH                                                                                                       Authentication, System and Admin Events
- Scans HTTP, FTP, SMTP, POP3, IMAP, IM, VPN
  Tunnels                                                         Instant Messaging (IM) Management                                                                                      On-Appliance Cyberoam-iView Reporting
- Customize Individual user scanning                              - Yahoo and Windows Live Messenger
                                                                                                                                                                                                                                                             TM
                                                                                                                                                                                                                                                  Cyberoam
                                                                                                                                                                                         - Integrated Web-based Reporting tool -                VIEW
- Self Service Quarantine area                                    - Virus Scanning for IM traffic                                                                                          Cyberoam-iView
- Scan and deliver by file size                                   - Allow/Block Login                                                                                                    - 1000+ drilldown reports
- Block by file types                                             - Allow/Block File Transfer                                                                                            - 45+ Compliance reports
- Add disclaimer/signature                                        - Allow/Block Webcam                                                                                                   - Historical and Real-time reports
                                                                  - Allow/Block one-to-one/group Chat                                                                                    - Multiple Dashboards
Gateway Anti-Spam                                                 - Content-based blocking                                                                                               - Username, Host, Email ID specific Monitoring
- Real-time Blacklist (RBL), MIME header check                    - IM activities Log                                                                                                      Dashboard
- Filter based on message header, size, sender,                   - Archive files transferred                                                                                            - Reports - Security, Virus, Spam, Traffic, Policy
  recipient                                                       - Custom Alerts                                                                                                          violations, VPN, Search Engine keywords
- Subject line tagging                                                                                                                                                                   - Multi-format reports - tabular, graphical
- IP address Black list/White list                                Wireless WAN                                                                                                           - Exportable formats - PDF, Excel
                                                                                                                     #
- Redirect spam mails to dedicated email address                  - USB port 3G and WiMax Support                                                                                        - Automated Report Scheduling
- Image-based spam filtering using RPD Technology                 - Primary WAN link
- Zero hour Virus Outbreak Protection                             - WAN Backup link                                                                                                      IPSec VPN Client
- Self Service Quarantine area                                                                                                                                                           - Inter-operability with major IPSec VPN Gateways
- Spam Notification through Digest                                Bandwidth Management                                                                                                   - Supported platforms: Windows 2000, WinXP 32/64-
- IP Reputation-based Spam filtering                              - Application and User Identity based Bandwidth                                                                          bit, Windows 2003 32-bit, Windows 2008 32/64-bit,
                                                                    Management                                                                                                             Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
Intrusion Prevention System                                       - Guaranteed & Burstable bandwidth policy                                                                              - Import Connection configuration
- Signatures: Default (3000+), Custom                             - Application & User Identity based Traffic Discovery
- IPS Policies: Multiple, Custom                                  - Multi WAN bandwidth reporting                                                                                        Certification
- User-based policy creation                                      - Category-based Bandwidth restriction                                                                                 - ICSA Firewall - Corporate
- Automatic real-time updates from CRProtect networks                                                                                                                                    - Checkmark UTM Level 5 Certification
- Protocol Anomaly Detection                                      User Identity and Group Based Controls                                                                                 - VPNC - Basic and AES interoperability
- DDoS Attack prevention                                          - Access time restriction                                                                                              - IPv6 Ready Gold Logo
                                                                  - Time and Data Quota restriction
Web Filtering                                                     - Schedule based Committed and Burstable                                                                               Compliance
- Inbuilt Web Category Database                                     Bandwidth                                                                                                            CE
- URL, keyword, File type block                                   - Schedule based P2P and IM Controls                                                                                   FCC
- Categories: Default(82+), Custom
- Protocols supported: HTTP, HTTPS                                Networking                                                                                                             Dimensions
- Block Malware, Phishing, Pharming URLs                          - Failover - Automated Failover/Failback, Multi-WAN                                                                    H x W x D (inches)
- Schedule-based access control                                                                                                                                                                                                    1.7 x 16.8 x 10.3
                                                                    failover, 3G Modem failover                                                                                          H x W x D (cms)                           4.3 x 42.7 x 26.2
- Custom block messages per category                              - WRR based Load balancing                                                                                             Weight
- Block Java Applets, Cookies, Active X                                                                                                                                                                                            5.3 kg, 11.68 lbs
                                                                  - Policy routing based on Application and User
- CIPA Compliant                                                  - IP Address Assignment - Static, PPPoE, L2TP, PPTP                                                                    Power
- Data leakage control via HTTP, HTTPS upload                       & DDNS Client, Proxy ARP, DHCP server, DHCP                                                                          Input Voltage                             100-240 VAC
                                                                    relay                                                                                                                Consumption                               90W
Application Filtering                                             - Support for HTTP Proxy                                                                                               Total Heat Dissipation (BTU)              200
- Inbuilt Application Category Database                           - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast
- Application Categories e.g. Gaming, IM, P2P,                      Forwarding                                                                                                           Environmental
  Proxy: 11+                                                      - Parent Proxy support with FQDN                                                                                       Operating Temperature                     5 to 40 °C
- Schedule-based access control                                   - IPv6 Ready Gold Logo                                                                                                 Storage Temperature                       0 to 70 °C
- Block                                                                                                                                                                                  Relative Humidity (Non condensing)        10 to 90%
    - P2P applications e.g. Skype                                                                                                                                                        Cooling System - Fan                      Fanless
    - Anonymous proxies e.g. UItra surf
                                                            ##
*If Enabled, will bypass traffic only in case of power failure. High Availability is currently a Beta feature.
**Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
#
  3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices.



Toll Free Numbers                                                                      C o p y r i g h t © 1999-2010 E l i t e c o r e Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.
                                                                                       Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although
USA : +1-877-777-0368 | India : 1-800-301-00013                                        Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy
                                                                                       or completeness of information neither is this a legally binding representation. Elitecore has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958                                 change,modify, transfer or otherwise revise the publication without notice.                           PL-10-1000301-101011         Unified Threat Management


www.cyberoam.com         I sales@cyberoam.com                                                                                                                                                                            Elitecore Product

Cyberoam cr100ia

  • 1.
    Data Sheet Comprehensive Network Security Cyberoam CR100ia for Small & Medium Offices Unified Threat Management VPNC CERTIFIED SSL Portal SSL Exchange SSL Firefox VPNC SSL CERTIFIED JavaScript Basic SSL Basic Interop Network Extension AES SSL Advanced www.check-mark.com Interop Network Extension Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls. Gartner positions Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional Cyberoam UTM as a solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering “Visionary” in Magic instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each Quadrant for SMB of Cyberoam security features to allow creation of identity-based security policies. Multifunction Firewalls Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts. User Identity-based Security Policy Controls L8 USER L7 Application Cyberoam's Layer 8 Technology treats L6 Presentation ASCII, EBCDIC, ICA “User Identity” as the 8th Layer in the protocol stack L5 Session L2TP, PPTP Transport Cyberoam UTM offers security across L4 TCP, UDP Layer 2-Layer 8 using Identity-based policies L3 Network 192.168.1.1 L2 Data Link 00-17-BB-8C-E3-E7 L1 Physical Cyberoam UTM features assure Security, Connectivity, Productivity Security Connectivity Productivity Network Security Business Continuity Employee Productivity - Firewall - Multiple Link Management - Content Filtering - Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls - Wireless security Network Availability IT Resource Optimization Content Security - VPN - Bandwidth Management - Anti-Virus/Anti-Spyware - 3G/WiMAX Connectivity - Traffic Discovery - Anti-Spam - Application Layer 7 Management - HTTPS/SSL Content Security Future-ready Connectivity - “IPv6 Ready” Gold Logo Administrator Productivity Administrative Security - Next-Gen UI - Next-Gen UI - iView- Logging & Reporting
  • 2.
    Specification ## Interfaces - “Phone home” activities High Availability 10/100/1000 GBE Ports 6 - Keylogger - Active-Active Configurable Internal/DMZ/WAN Ports Yes - Layer 7 (Applications) & Layer 8 (User - Identity) - Active-Passive with state synchronization Console Ports (RJ45/DB9) 1 Visibility - Stateful Failover USB Ports 2 - Alerts on Appliance Status change Hardware Bypass Segments 1* Virtual Private Network - IPSec, L2TP, PPTP Administration & System Management System Performance* - Encryption - 3DES, DES, AES, Twofish, Blowfish, - Web-based configuration wizard Firewall Throughput (UDP) (Mbps) 1250 Serpent - Role-based Access control Firewall Throughput (TCP) (Mbps) 1000 - Hash Algorithms - MD5, SHA-1 - Firmware Upgrades via Web UI New sessions/second 10,000 - Authentication - Preshared key, Digital certificates - Web 2.0 compliant UI (HTTPS) Concurrent sessions 400,000 - IPSec NAT Traversal - UI Color Styler 168-bit 3DES/AES Throughput (Mbps) 80/100 - Dead Peer Detection and PFS support - Command line interface (Serial, SSH, Telnet) Antivirus Throughput (Mbps) 200 - Diffie Hellman Groups - 1,2,5,14,15,16 - SNMP (v1, v2c, v3) IPS Throughput (Mbps) 300 - External Certificate Authority support - Multi-lingual support: Chinese, Hindi, French, UTM Throughput (Mbps) 160 - Export Road Warrior connection configuration Korean - Domain name support for tunnel end points - Cyberoam Central Console (Optional) Stateful Inspection Firewall - VPN connection redundancy - NTP Support - Layer 8 (User - Identity) Firewall - Overlapping Network support - Multiple Security Zones - Hub & Spoke VPN support User Authentication - Access Control Criteria (ACC) - User - Identity, Source - Internal database & Destination Zone, MAC and IP address, Service SSL VPN - Active Directory Integration - UTM policies - IPS, Web Filtering, Application - TCP & UDP Tunneling - Automatic Windows Single Sign On Filtering, Anti-Virus, Anti-Spam and Bandwidth - Authentication - Active Directory, LDAP, RADIUS, - External LDAP/RADIUS database Integration Management Cyberoam - Thin Client support - Microsoft Windows Server 2003 - Layer 7 (Application) Control & Visibility - Multi-layered Client Authentication - Certificate, Terminal Services and Citrix XenApp - Access Scheduling Username/Password - RSA SecurID support - Policy based Source & Destination NAT - User & Group policy enforcement - External Authentication - Users and Administrators - H.323, SIP NAT Traversal - Network access - Split and Full tunneling - User/MAC Binding - 802.1q VLAN Support - Browser-based (Portal) Access - Clientless access - Multiple Authentication servers - DoS & DDoS Attack prevention - Lightweight SSL VPN Tunneling Client - MAC & IP-MAC filtering and Spoof prevention - Granular access control to all the Enterprise Network Logging/Monitoring resources - Graphical real-time and historical monitoring Gateway Anti-Virus & Anti-Spyware - Administrative controls - Session timeout, Dead Peer - Email notification of reports, viruses and attacks - Virus, Worm, Trojan Detection & Removal Detection, Portal customization - Syslog support - Spyware, Malware, Phishing protection - TCP- based Application Access - HTTP, HTTPS, - Log Viewer - IPS, Web filter, Anti-Virus, Anti-Spam, - Automatic virus signature database update RDP, TELNET, SSH Authentication, System and Admin Events - Scans HTTP, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels Instant Messaging (IM) Management On-Appliance Cyberoam-iView Reporting - Customize Individual user scanning - Yahoo and Windows Live Messenger TM Cyberoam - Integrated Web-based Reporting tool - VIEW - Self Service Quarantine area - Virus Scanning for IM traffic Cyberoam-iView - Scan and deliver by file size - Allow/Block Login - 1000+ drilldown reports - Block by file types - Allow/Block File Transfer - 45+ Compliance reports - Add disclaimer/signature - Allow/Block Webcam - Historical and Real-time reports - Allow/Block one-to-one/group Chat - Multiple Dashboards Gateway Anti-Spam - Content-based blocking - Username, Host, Email ID specific Monitoring - Real-time Blacklist (RBL), MIME header check - IM activities Log Dashboard - Filter based on message header, size, sender, - Archive files transferred - Reports - Security, Virus, Spam, Traffic, Policy recipient - Custom Alerts violations, VPN, Search Engine keywords - Subject line tagging - Multi-format reports - tabular, graphical - IP address Black list/White list Wireless WAN - Exportable formats - PDF, Excel # - Redirect spam mails to dedicated email address - USB port 3G and WiMax Support - Automated Report Scheduling - Image-based spam filtering using RPD Technology - Primary WAN link - Zero hour Virus Outbreak Protection - WAN Backup link IPSec VPN Client - Self Service Quarantine area - Inter-operability with major IPSec VPN Gateways - Spam Notification through Digest Bandwidth Management - Supported platforms: Windows 2000, WinXP 32/64- - IP Reputation-based Spam filtering - Application and User Identity based Bandwidth bit, Windows 2003 32-bit, Windows 2008 32/64-bit, Management Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit Intrusion Prevention System - Guaranteed & Burstable bandwidth policy - Import Connection configuration - Signatures: Default (3000+), Custom - Application & User Identity based Traffic Discovery - IPS Policies: Multiple, Custom - Multi WAN bandwidth reporting Certification - User-based policy creation - Category-based Bandwidth restriction - ICSA Firewall - Corporate - Automatic real-time updates from CRProtect networks - Checkmark UTM Level 5 Certification - Protocol Anomaly Detection User Identity and Group Based Controls - VPNC - Basic and AES interoperability - DDoS Attack prevention - Access time restriction - IPv6 Ready Gold Logo - Time and Data Quota restriction Web Filtering - Schedule based Committed and Burstable Compliance - Inbuilt Web Category Database Bandwidth CE - URL, keyword, File type block - Schedule based P2P and IM Controls FCC - Categories: Default(82+), Custom - Protocols supported: HTTP, HTTPS Networking Dimensions - Block Malware, Phishing, Pharming URLs - Failover - Automated Failover/Failback, Multi-WAN H x W x D (inches) - Schedule-based access control 1.7 x 16.8 x 10.3 failover, 3G Modem failover H x W x D (cms) 4.3 x 42.7 x 26.2 - Custom block messages per category - WRR based Load balancing Weight - Block Java Applets, Cookies, Active X 5.3 kg, 11.68 lbs - Policy routing based on Application and User - CIPA Compliant - IP Address Assignment - Static, PPPoE, L2TP, PPTP Power - Data leakage control via HTTP, HTTPS upload & DDNS Client, Proxy ARP, DHCP server, DHCP Input Voltage 100-240 VAC relay Consumption 90W Application Filtering - Support for HTTP Proxy Total Heat Dissipation (BTU) 200 - Inbuilt Application Category Database - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast - Application Categories e.g. Gaming, IM, P2P, Forwarding Environmental Proxy: 11+ - Parent Proxy support with FQDN Operating Temperature 5 to 40 °C - Schedule-based access control - IPv6 Ready Gold Logo Storage Temperature 0 to 70 °C - Block Relative Humidity (Non condensing) 10 to 90% - P2P applications e.g. Skype Cooling System - Fan Fanless - Anonymous proxies e.g. UItra surf ## *If Enabled, will bypass traffic only in case of power failure. High Availability is currently a Beta feature. **Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. # 3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices. Toll Free Numbers C o p y r i g h t © 1999-2010 E l i t e c o r e Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d. Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although USA : +1-877-777-0368 | India : 1-800-301-00013 Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy or completeness of information neither is this a legally binding representation. Elitecore has the right to APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000301-101011 Unified Threat Management www.cyberoam.com I sales@cyberoam.com Elitecore Product