SlideShare a Scribd company logo
Feature Specifications
www.cyberoam.com I sales@cyberoam.com
Future-ready Security for SOHO/ROBO and SME networks Tech Sheet
With high-speed Internet becoming a reality in organizations, along with rising number of devices per user
and data usage increasing at exponential rates, the next-generation security appliances must match the
needs of future networks. Cyberoam NG series delivers future-ready security to organizations by
offering unmatched throughput speeds with its best-in-class hardware along with software to
match. The NG series appliances for SOHO, SMEs are the “fastest UTMs” made for this
segment.
With Cyberoam NG series, businesses get assured Security, Connectivity and
Productivity. The Layer 8 Technology attaches User-Identity to security, adding
speed to an organization’s security. Cyberoam’s Extensible Security Architecture
(ESA) supports feature enhancements that can be developed rapidly and
deployed with minimum efforts.
CERTIFIED
VPNC
Interop
Basic
AES
Interopwww.check-mark.com
SSL Advanced
Network Extension
SSL Basic
Network Extension
SSL
JavaScript
SSL
Firefox
SSL
Exchange
SSL
Portal
CERTIFIED
VPNC
NG Series : 10iNG, 15iNG, 25iNG/6P, 35iNG, 50iNG, 100iNG, 200iNG/XP, 300iNG/XP
15wiNG, 25wiNG, 25wiNG-6P, 35wiNGNG Wireless Series :
NG Series UTM Appliances
- Securing SCADA Networks
- SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3,
IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk
- Control various Commands and Functions
Web Application Firewall4
- Positive Protection model
- Unique "Intuitive Website Flow Detector" technology
- Protection against SQL Injections, Cross-site Scripting (XSS),
Session Hijacking, URL Tampering, Cookie Poisoning etc.
- Support for HTTP 0.9/1.0/1.1
- Back-end servers supported: 5 to 300 servers
Virtual Private Network
- IPSec, L2TP, PPTP
- Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent
- Hash Algorithms - MD5, SHA-1
- Authentication: Preshared key, Digital certificates
- IPSec NAT Traversal
- Dead peer detection and PFS support
- Diffie Hellman Groups - 1, 2, 5, 14, 15, 16
- External Certificate Authority support
- Export Road Warrior connection configuration
- Domain name support for tunnel end points
- VPN connection redundancy
- Overlapping Network support
- Hub & Spoke VPN support
- Threat Free Tunnelling (TFT) Technology
SSL VPN
- TCP & UDP Tunnelling
- Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local)
- Multi-layered Client Authentication - Certificate, Username/Password
- User & Group policy enforcement
- Network access - Split and Full tunnelling
- Browser-based (Portal) Access - Clientless access
- Lightweight SSL VPN Tunnelling Client
- Administrative controls - Session timeout, Dead Peer Detection, Portal
customization
- TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH
Wireless WAN
- USB port 3G/4G and WiMAX Support
- Primary WAN link
- WAN Backup link
Bandwidth Management
- Application, Web Category and Identity based Bandwidth Management
- Guaranteed & Burstable bandwidth policy
- Application & User Identity based Traffic Discovery
- Data Transfer Report for multiple Gateways
Networking
- WRR based Multilink Load Balancing
- Automated Failover/Failback
- Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN,
WLAN , WWAN, TAP###
- DNS-based inbound load balancing
- IP Address Assignment - Static, PPPoE, L2TP, PPTP & DDNS, Client,
Proxy ARP, Multiple DHCP Servers support, DHCP relay
- Supports HTTP Proxy, Parent Proxy with FQDN
- PIM-SM,Dynamic Routing: RIP v1&v2, OSPF, BGP, Multicast Forwarding
- Support of ICAP to integrate third-party DLP, Web Filtering and AV
applications
7
- Discover mode for PoC Deployments
- IPv6 Support:
- Dual Stack Architecture: Support for IPv4 and IPv6 Protocols
- IPv6 Route: Static and Source
- IPv6 tunneling (6in4, 6to4, 6rd, 4in6)
- Alias and VLAN
- DNSv6 and DHCPv6 Services
- Firewall security over IPv6 traffic
- High Availability for IPv6 networks
High Availability
#
- Active-Active
- Active-Passive with state synchronization
- Stateful Failover with LAG Support
Administration and System Management
- Web-based configuration wizard
- Role-based Access control
- Support of External Policy Manager (XML API)
- Firmware Upgrades via Web UI
- Web 2.0 compliant UI (HTTPS)
- UI Color Styler
- Command Line Interface (Serial, SSH, Telnet)
- SNMP (v1, v2, v3)
- Multi-lingual support: English, Chinese, Hindi, French, Japanese
- Cyberoam Central Console (Optional)
User Authentication
- Internal database
- AD Integration with support for OU-based Security Policies
- Automatic Windows Single Sign On/RADIUS
- External LDAP/LDAPS/RADIUS database Integration
- Thin Client support
- 2-factor authentication: 3rd party support
5
- User/MAC Binding
- SMS (Text-based) Authentication
- Layer 8 Identity over IPv6
- Secure Authentication – AD, LDAP, Radius
- Clientless Users
- Authentication using Captive Portal
Logging and Monitoring
- Real-time and historical Monitoring
- Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication,
System and Admin Events
- Forensic Analysis with quick identification of network attacks and other
traffic anomalies
- Syslog support
- 4-eye Authentication
On-Appliance Cyberoam - iView Reporting
6
- Integrated Web-based Reporting tool
- 1,200+ drilldown reports
- Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA
- Zone based application reports
- Historical and Real-time reports
- Default Dashboards: Traffic and Security
- Username, Host, Email ID specific Monitoring Dashboard
- Reports – Application, Internet & Web Usage, Mail Usage, Attacks,
Spam, Virus, Search Engine, User Threat Quotient (UTQ) for high risk
users and more
- Client Types Report including BYOD Client Types
- Multi-format reports - tabular, graphical
- Export reports in - PDF, Excel, HTML
- Email notification of reports
- Report customization – (Custom view and custom logo)
- Supports 3rd party PSA Solution – ConnectWise
IPSec VPN Client##
- Inter-operability with major IPSec VPN Gateways
- Import Connection configuration
Certification
- Common Criteria - EAL4+
- ICSA Firewall - Corporate
- Checkmark Certification
- VPNC - Basic and AES interoperability
- IPv6 Ready Gold Logo
- Global Support Excellence - ITIL compliance (ISO 20000)
VIEW
Cyberoam TM
Stateful Inspection Firewall
- Layer 8 (User - Identity) Firewall
- Multiple Security Zones
- Location and Device-aware Identity-based Access Control Policy
- Access Control Criteria (ACC): User-Identity, Source and Destination
Zone, MAC and IP address, Service
- Security policies - IPS, Web Filtering, Application Filtering, Anti-virus,
Anti-spam and QoS
- Country-based Traffic Control
- Access Scheduling
- Policy based Source and Destination NAT, Gateway Specific NAT Policy
- H.323, SIP NAT Traversal
- Spoof Prevention DoS and DDoS attack prevention,
- MAC and IP-MAC filtering
Intrusion Prevention System (IPS)
- Signatures: Default (4500+), Custom
- IPS Policies: Pre-configured Zone-based multiple policies, Custom
- Filter based selection: Category, Severity, Platform and Target
(Client/Server)
- IPS actions: Recommended, Allow Packet, Drop Packet, Disable, Drop
Session, Reset, Bypass Session
- User-based policy creation
- Automatic signature updates via Cyberoam Threat Research Labs
- Protocol Anomaly Detection
- SCADA-aware IPS with pre-defined category for ICS and SCADA
signatures
Gateway Anti-Virus & Anti-Spyware
- Virus, Worm, Trojan Detection and Removal
- Spyware, Malware, Phishing protection
- Automatic virus signature database update
- Scans HTTP, HTTPS, FTP, SMTP POP3, IMAP, IM, VPN Tunnels/S,
- Customize individual user scanning
- Self Service Quarantine area
- Scan and deliver by file size
Gateway Anti-Spam
- Inbound and Outbound Scanning1
- Real-time Blacklist (RBL), MIME header check
- Filter based on message header, size, sender, recipient
- Subject line tagging
- Language and Content-agnostic spam protection using RPD Technology
- Zero Hour Virus Outbreak Protection
- Self Service Quarantine area2
- IP address Black list/White list
- Spam Notification through Digest
3
- IP Reputation based Spam filtering
Web Filtering
- On-Cloud Web Categorization
- Controls based on URL, Keyword and File type
- Web Categories: Default (89+), External URL Database, Custom
- Protocols supported: HTTP, HTTPS
- Block Malware, Phishing, Pharming URLs
- Web Category-based Bandwidth allocation and prioritization
- Block Java Applets, Cookies, Active X, Google Cache pages
- CIPA Compliant
- Data leakage control by blocking HTTP and HTTPS upload
- Schedule-based access control
- Custom Denied Message per Web Category
- Safe Search enforcement, YouTube for Schools
Application Filtering
- Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility
- Inbuilt Application Category Database
- Control over 2,000+ Applications classified in 21 Categories
- Filter based selection: Category, Risk Level, Characteristics and
Technology
- Schedule-based access control
- Visibility and Controls for HTTPS based Micro-Apps like Facebook chat,
Youtube video upload
1,2,3,4,6
Available in all the Models except CR10iNG, CR15iNG & CR15wiNG
For details, refer Cyberoam's Technical Alliance Partner list on Cyberoam website.
5
Supported in CR50iNG and above. Not supported in Wi-Fi series of appliances.
7 #
## ###
Additional Purchase Required Available in Wi-Fi series of appliances.
Specifications
www.cyberoam.com I sales@cyberoam.com
Toll Free Numbers
+1-800-686-2360 1-800-301-00013USA : | India :
APAC/MEA : | Europe :+1-877-777-0368 +44-808-120-3958
Environmental Conditions: Operating Temperature 0 °C to 40 °C, Storage Temperature
-25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90%
* **
If Enabled, will bypass traffic only in case of Power failure. Antivirus, IPS and UTM
performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual
performance may vary depending on the real network traffic environments. Additional***
Purchase required, only single FleXi Ports Module can be used at a time.
100iNG 200iNG/XP 300iNG/XP
8
-
-
1
2
2
Yes
8
-
-
1
2
2
Yes
10 / 6
1
8 / 8 / 4
1
2
2
Yes
10 / 6
1
8 / 8 / 4
1
2
2
Yes
Interfaces
Copper GbE Ports
Number of Slots for FleXi Ports Module
FleXi Ports Module (For XP Appliances)
***
(1 GbE Copper / 1 GbE SFP / 10 GbE SFP)
Console Ports (RJ45)
USB Ports
Hardware Bypass Segments*
Configurable Internal/DMZ/WAN Ports
50iNG
System Performance
**
Firewall Throughput (UDP) (Mbps)
Firewall Throughput (TCP) (Mbps)
New sessions/second
Concurrent sessions
IPSec VPN Throughput (Mbps)
No. of IPSec Tunnels
SSL VPN Throughput (Mbps)
WAF Protected Throughput (Mbps)
Anti-Virus Throughput (Mbps)
IPS Throughput (Mbps)
UTM Throughput (Mbps)
Authenticated Users/Nodes
Power
Input Voltage
Consumption
Total Heat Dissipation (BTU)
100-240VAC
99W
338
100-240VAC
137W
467
100-240VAC
137W
467
100-240VAC
99W
338
Techsheet NG Future-ready
Dimensions
H x W x D (inches)
H x W x D (cms)
Appliance Weight
1.7 x 14.6 x 17.3
4.4 X 37.2 X 44
5 kg, 11.02 lbs
1.7 x 17.3 x 11.85
4.4 x 43.9 x 30.1
5.1 kg, 11.24 lbs
1.7 x 17.3 x 11.85
4.4 x 43.9 x 30.1
5.1 kg, 11.24 lbs
1.7 x 14.6 x 17.3
4.4 X 37.2 X 44
5 kg, 11.02 lbs
Specifications 35wiNG15wiNG 25wiNG/6P
Interfaces
Copper GbE Ports
Console Ports (RJ45)
USB Ports
Hardware Bypass Segments
*
Configurable Internal/DMZ/WAN Ports
6
1
2
-
Yes
3
1
2
-
Yes
4/6
1
2
-
Yes
System Performance
**
Firewall Throughput (UDP) (Mbps)
Firewall Throughput (TCP) (Mbps)
New sessions/second
Concurrent sessions
IPSec VPN Throughput (Mbps)
No. of IPSec Tunnels
SSL VPN Throughput (Mbps)
WAF Protected Throughput (Mbps)
Anti-Virus Throughput (Mbps)
IPS Throughput (Mbps)
UTM Throughput (Mbps)
Authenticated Users/Nodes
Power
Input Voltage
Consumption
Total Heat Dissipation (BTU)
100-240VAC
47.8W
163
100-240VAC
13.2W
45
100-240VAC
33.5W
114
Dimensions
H x W x D (inches)
H x W x D (cms)
Appliance Weight
1.7 x 6 x 9.1
4.4 x 15.3 x 23.2
2.3 kg, 5.07 lbs
1.7 x 6 x 9.1
4.4 x 15.3 x 23.2
1.5 kg, 3.307 lbs
25iNG/6P
4/6
1
2
-
Yes
100-240VAC
33.5W
114
1.7 x 6 x 9.1
4.4 x 15.3 x 23.2
2.3 kg, 5.07 lbs
1.7 x 6 x 9.1
4.4 x 15.3 x 23.2
2.3 kg, 5.07 lbs
15iNG
3
1
2
-
Yes
100-240VAC
13.2W
45
1.7 x 6 x 9.1
4.4 x 15.3 x 23.2
1.5 kg, 3.307 lbs
10iNG
3
1
2
-
Yes
100-240VAC
22W
75
1.35 x 8.75 x 6.8
3.43 x 22.23 x 17.3
1.10 kg, 2.42 lbs
35iNG
6
1
2
-
Yes
100-240VAC
47.8W
163
1.7 x 6 x 9.1
4.4 x 15.3 x 23.2
2.3 kg, 5.07 lbs
Built-in Wireless LAN (Only for wiNG series)
Wireless Standards
Antenna
Access Points
Transmit Power (EIRP)
Receiver Sensitivity
Frequency Range
Number of Selectable Channels
Data Rate
IEEE 802.11 a/b/g/n (WEP, WPA, WPA2, 802.11i , TKIP, AES, PSK)
Detachable 3x3 MIMO
Up to 8 bssid
11n HT40 : +15dBm, 11b CCK: +15dBm, 11g OFDM:+15dBm
-68dBm at 300Mbps, -70dBm at 54Mbps, -88dBm at 6Mbps
USA (FCC) - 11 channels, EU (ETSI) / Japan (TELEC) - 13 channels
802.11n: up to 450Mbps, 802.11b: 1, 2, 5,5, 11Mbps,
802.11g: 6, 9, 12, 18, 24, 36, 48, 54Mbps
2.412 GHz - 2.472 GHz
5.200 GHz - 5.825 GHz
NA
3,700
2,400
21,000
750,000
280
850
100
150
600
650
300
Unlimited
1,200
900
5,000
200,000
130
300
50
-NA-
200
160
90
Unlimited
1,800
1,200
6,000
500,000
210
550
75
100
350
240
125
Unlimited
1,800
1,200
6,000
500,000
210
550
75
100
350
240
125
Unlimited
1,200
900
5,000
200,000
130
300
50
-NA-
200
160
90
Unlimited
3,700
2,400
21,000
750,000
280
850
100
150
600
650
300
Unlimited
400
300
2,000
27,500
100
25
25
-NA-
100
90
60
Unlimited
8,000
5,000
60,000
3,000,000
1,050
4,000
400
700
2,200
2,500
1,050
Unlimited
6,500
4,000
45,000
1,000,000
850
2,000
300
450
1,500
1,600
850
Unlimited
Copyright © 1999-2015 Cyberoam Technologies Pvt. Ltd. All Rights Reserved 1.0-10.6.2-191214
10,000/14,000
8,000
85,000
3,200,000
1,150
4,500
450
1,000
2,600
3,000
1,400
Unlimited
12,000/21,000
9,500/10,500
100,000
3,200,000
1,300
5,000
500
1,250
2,900
4,000
1,700
Unlimited

More Related Content

What's hot

Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
Michele Leroux Bustamante
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
OmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetOmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetJulien Kirsch
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
Alberto Rivai
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
Muhammad Zbeedat
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
Alberto Rivai
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
Alberto Rivai
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
Hannes Tschofenig
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitch
Lior Rotkovitch
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
CA Technologies
 
Paloalto Networks ACE
Paloalto Networks ACEPaloalto Networks ACE
Paloalto Networks ACE
adam_jhon
 

What's hot (13)

Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
OmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetOmniAccess_8550_Datasheet
OmniAccess_8550_Datasheet
 
Palo alto networks NAT flow logic
Palo alto networks NAT flow logicPalo alto networks NAT flow logic
Palo alto networks NAT flow logic
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
 
User id installation and configuration
User id installation and configurationUser id installation and configuration
User id installation and configuration
 
User Expert forum Wildfire configuration
User Expert forum Wildfire configurationUser Expert forum Wildfire configuration
User Expert forum Wildfire configuration
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software Vendors
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitch
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 
Paloalto Networks ACE
Paloalto Networks ACEPaloalto Networks ACE
Paloalto Networks ACE
 

Viewers also liked

Imágenes publicitarias
Imágenes publicitariasImágenes publicitarias
Imágenes publicitarias
tixi98
 
Tricorp Workwear catalogus 2015- 2016 bij woltex
Tricorp Workwear catalogus 2015- 2016 bij woltexTricorp Workwear catalogus 2015- 2016 bij woltex
Tricorp Workwear catalogus 2015- 2016 bij woltex
Woltex.nl
 
Doc7
Doc7Doc7
Dossier
DossierDossier
Dossier
ana fdez-lera
 
Imagen en movimiento
Imagen en movimientoImagen en movimiento
Imagen en movimiento
ana fdez-lera
 
Actividad 1 a
Actividad 1 aActividad 1 a
Actividad 1 a
natalialrd3
 
Landscaper phoenix
Landscaper phoenixLandscaper phoenix
Landscaper phoenix
selian10
 
INITIAL EDUCATION BY JIMENA PAUCAR
INITIAL EDUCATION BY JIMENA PAUCARINITIAL EDUCATION BY JIMENA PAUCAR
INITIAL EDUCATION BY JIMENA PAUCARjimenalexandra92
 
Breast Density Notification Law Information For Primary Care Providers
Breast Density Notification Law Information For Primary Care ProvidersBreast Density Notification Law Information For Primary Care Providers
Breast Density Notification Law Information For Primary Care Providers
Department of Learning Health Sciences, University of Michigan Medical School
 

Viewers also liked (12)

Imágenes publicitarias
Imágenes publicitariasImágenes publicitarias
Imágenes publicitarias
 
Tricorp Workwear catalogus 2015- 2016 bij woltex
Tricorp Workwear catalogus 2015- 2016 bij woltexTricorp Workwear catalogus 2015- 2016 bij woltex
Tricorp Workwear catalogus 2015- 2016 bij woltex
 
Doc7
Doc7Doc7
Doc7
 
Dossier
DossierDossier
Dossier
 
CV_Floris van Nouhuijs_201405
CV_Floris van Nouhuijs_201405CV_Floris van Nouhuijs_201405
CV_Floris van Nouhuijs_201405
 
Schutt
Schutt Schutt
Schutt
 
Imagen en movimiento
Imagen en movimientoImagen en movimiento
Imagen en movimiento
 
Actividad 1 a
Actividad 1 aActividad 1 a
Actividad 1 a
 
Landscaper phoenix
Landscaper phoenixLandscaper phoenix
Landscaper phoenix
 
INITIAL EDUCATION BY JIMENA PAUCAR
INITIAL EDUCATION BY JIMENA PAUCARINITIAL EDUCATION BY JIMENA PAUCAR
INITIAL EDUCATION BY JIMENA PAUCAR
 
2 - Diploma Economista Supsi
2 - Diploma Economista Supsi2 - Diploma Economista Supsi
2 - Diploma Economista Supsi
 
Breast Density Notification Law Information For Primary Care Providers
Breast Density Notification Law Information For Primary Care ProvidersBreast Density Notification Law Information For Primary Care Providers
Breast Density Notification Law Information For Primary Care Providers
 

Similar to CyberoamNGSeriesUTMTechSheet

Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
Huu Hieu
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
Rodrigo Martini
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetMaliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetbakar kazmi
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetBaqar kazmi
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
Sangfor Technologies USA
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal
 
ip pier solution
ip pier solutionip pier solution
ip pier solution
Alexey Stankus
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
Manoj Kumar Mishra
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
Liberteks
 
FortiGate-80C
FortiGate-80CFortiGate-80C
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
zpeofficial
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Cisco asa fire power services
Cisco asa fire power servicesCisco asa fire power services
Cisco asa fire power services
Tapan Doshi
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
BAKOTECH
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
AVEVA
 

Similar to CyberoamNGSeriesUTMTechSheet (20)

Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
ip pier solution
ip pier solutionip pier solution
ip pier solution
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Cisco asa fire power services
Cisco asa fire power servicesCisco asa fire power services
Cisco asa fire power services
 
Z2HCurriculm
Z2HCurriculmZ2HCurriculm
Z2HCurriculm
 
Vpn
VpnVpn
Vpn
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
 

CyberoamNGSeriesUTMTechSheet

  • 1. Feature Specifications www.cyberoam.com I sales@cyberoam.com Future-ready Security for SOHO/ROBO and SME networks Tech Sheet With high-speed Internet becoming a reality in organizations, along with rising number of devices per user and data usage increasing at exponential rates, the next-generation security appliances must match the needs of future networks. Cyberoam NG series delivers future-ready security to organizations by offering unmatched throughput speeds with its best-in-class hardware along with software to match. The NG series appliances for SOHO, SMEs are the “fastest UTMs” made for this segment. With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Technology attaches User-Identity to security, adding speed to an organization’s security. Cyberoam’s Extensible Security Architecture (ESA) supports feature enhancements that can be developed rapidly and deployed with minimum efforts. CERTIFIED VPNC Interop Basic AES Interopwww.check-mark.com SSL Advanced Network Extension SSL Basic Network Extension SSL JavaScript SSL Firefox SSL Exchange SSL Portal CERTIFIED VPNC NG Series : 10iNG, 15iNG, 25iNG/6P, 35iNG, 50iNG, 100iNG, 200iNG/XP, 300iNG/XP 15wiNG, 25wiNG, 25wiNG-6P, 35wiNGNG Wireless Series : NG Series UTM Appliances - Securing SCADA Networks - SCADA/ICS Signature-based Filtering for Protocols Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk - Control various Commands and Functions Web Application Firewall4 - Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers Virtual Private Network - IPSec, L2TP, PPTP - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Hash Algorithms - MD5, SHA-1 - Authentication: Preshared key, Digital certificates - IPSec NAT Traversal - Dead peer detection and PFS support - Diffie Hellman Groups - 1, 2, 5, 14, 15, 16 - External Certificate Authority support - Export Road Warrior connection configuration - Domain name support for tunnel end points - VPN connection redundancy - Overlapping Network support - Hub & Spoke VPN support - Threat Free Tunnelling (TFT) Technology SSL VPN - TCP & UDP Tunnelling - Authentication - Active Directory, LDAP, RADIUS, Cyberoam (Local) - Multi-layered Client Authentication - Certificate, Username/Password - User & Group policy enforcement - Network access - Split and Full tunnelling - Browser-based (Portal) Access - Clientless access - Lightweight SSL VPN Tunnelling Client - Administrative controls - Session timeout, Dead Peer Detection, Portal customization - TCP based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Wireless WAN - USB port 3G/4G and WiMAX Support - Primary WAN link - WAN Backup link Bandwidth Management - Application, Web Category and Identity based Bandwidth Management - Guaranteed & Burstable bandwidth policy - Application & User Identity based Traffic Discovery - Data Transfer Report for multiple Gateways Networking - WRR based Multilink Load Balancing - Automated Failover/Failback - Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WLAN , WWAN, TAP### - DNS-based inbound load balancing - IP Address Assignment - Static, PPPoE, L2TP, PPTP & DDNS, Client, Proxy ARP, Multiple DHCP Servers support, DHCP relay - Supports HTTP Proxy, Parent Proxy with FQDN - PIM-SM,Dynamic Routing: RIP v1&v2, OSPF, BGP, Multicast Forwarding - Support of ICAP to integrate third-party DLP, Web Filtering and AV applications 7 - Discover mode for PoC Deployments - IPv6 Support: - Dual Stack Architecture: Support for IPv4 and IPv6 Protocols - IPv6 Route: Static and Source - IPv6 tunneling (6in4, 6to4, 6rd, 4in6) - Alias and VLAN - DNSv6 and DHCPv6 Services - Firewall security over IPv6 traffic - High Availability for IPv6 networks High Availability # - Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support Administration and System Management - Web-based configuration wizard - Role-based Access control - Support of External Policy Manager (XML API) - Firmware Upgrades via Web UI - Web 2.0 compliant UI (HTTPS) - UI Color Styler - Command Line Interface (Serial, SSH, Telnet) - SNMP (v1, v2, v3) - Multi-lingual support: English, Chinese, Hindi, French, Japanese - Cyberoam Central Console (Optional) User Authentication - Internal database - AD Integration with support for OU-based Security Policies - Automatic Windows Single Sign On/RADIUS - External LDAP/LDAPS/RADIUS database Integration - Thin Client support - 2-factor authentication: 3rd party support 5 - User/MAC Binding - SMS (Text-based) Authentication - Layer 8 Identity over IPv6 - Secure Authentication – AD, LDAP, Radius - Clientless Users - Authentication using Captive Portal Logging and Monitoring - Real-time and historical Monitoring - Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, Authentication, System and Admin Events - Forensic Analysis with quick identification of network attacks and other traffic anomalies - Syslog support - 4-eye Authentication On-Appliance Cyberoam - iView Reporting 6 - Integrated Web-based Reporting tool - 1,200+ drilldown reports - Compliance reports - HIPAA, GLBA, SOX, PCI, FISMA - Zone based application reports - Historical and Real-time reports - Default Dashboards: Traffic and Security - Username, Host, Email ID specific Monitoring Dashboard - Reports – Application, Internet & Web Usage, Mail Usage, Attacks, Spam, Virus, Search Engine, User Threat Quotient (UTQ) for high risk users and more - Client Types Report including BYOD Client Types - Multi-format reports - tabular, graphical - Export reports in - PDF, Excel, HTML - Email notification of reports - Report customization – (Custom view and custom logo) - Supports 3rd party PSA Solution – ConnectWise IPSec VPN Client## - Inter-operability with major IPSec VPN Gateways - Import Connection configuration Certification - Common Criteria - EAL4+ - ICSA Firewall - Corporate - Checkmark Certification - VPNC - Basic and AES interoperability - IPv6 Ready Gold Logo - Global Support Excellence - ITIL compliance (ISO 20000) VIEW Cyberoam TM Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall - Multiple Security Zones - Location and Device-aware Identity-based Access Control Policy - Access Control Criteria (ACC): User-Identity, Source and Destination Zone, MAC and IP address, Service - Security policies - IPS, Web Filtering, Application Filtering, Anti-virus, Anti-spam and QoS - Country-based Traffic Control - Access Scheduling - Policy based Source and Destination NAT, Gateway Specific NAT Policy - H.323, SIP NAT Traversal - Spoof Prevention DoS and DDoS attack prevention, - MAC and IP-MAC filtering Intrusion Prevention System (IPS) - Signatures: Default (4500+), Custom - IPS Policies: Pre-configured Zone-based multiple policies, Custom - Filter based selection: Category, Severity, Platform and Target (Client/Server) - IPS actions: Recommended, Allow Packet, Drop Packet, Disable, Drop Session, Reset, Bypass Session - User-based policy creation - Automatic signature updates via Cyberoam Threat Research Labs - Protocol Anomaly Detection - SCADA-aware IPS with pre-defined category for ICS and SCADA signatures Gateway Anti-Virus & Anti-Spyware - Virus, Worm, Trojan Detection and Removal - Spyware, Malware, Phishing protection - Automatic virus signature database update - Scans HTTP, HTTPS, FTP, SMTP POP3, IMAP, IM, VPN Tunnels/S, - Customize individual user scanning - Self Service Quarantine area - Scan and deliver by file size Gateway Anti-Spam - Inbound and Outbound Scanning1 - Real-time Blacklist (RBL), MIME header check - Filter based on message header, size, sender, recipient - Subject line tagging - Language and Content-agnostic spam protection using RPD Technology - Zero Hour Virus Outbreak Protection - Self Service Quarantine area2 - IP address Black list/White list - Spam Notification through Digest 3 - IP Reputation based Spam filtering Web Filtering - On-Cloud Web Categorization - Controls based on URL, Keyword and File type - Web Categories: Default (89+), External URL Database, Custom - Protocols supported: HTTP, HTTPS - Block Malware, Phishing, Pharming URLs - Web Category-based Bandwidth allocation and prioritization - Block Java Applets, Cookies, Active X, Google Cache pages - CIPA Compliant - Data leakage control by blocking HTTP and HTTPS upload - Schedule-based access control - Custom Denied Message per Web Category - Safe Search enforcement, YouTube for Schools Application Filtering - Layer 7 (Applications) & Layer 8 (User - Identity) Control and Visibility - Inbuilt Application Category Database - Control over 2,000+ Applications classified in 21 Categories - Filter based selection: Category, Risk Level, Characteristics and Technology - Schedule-based access control - Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload 1,2,3,4,6 Available in all the Models except CR10iNG, CR15iNG & CR15wiNG For details, refer Cyberoam's Technical Alliance Partner list on Cyberoam website. 5 Supported in CR50iNG and above. Not supported in Wi-Fi series of appliances. 7 # ## ### Additional Purchase Required Available in Wi-Fi series of appliances.
  • 2. Specifications www.cyberoam.com I sales@cyberoam.com Toll Free Numbers +1-800-686-2360 1-800-301-00013USA : | India : APAC/MEA : | Europe :+1-877-777-0368 +44-808-120-3958 Environmental Conditions: Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90% * ** If Enabled, will bypass traffic only in case of Power failure. Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. Additional*** Purchase required, only single FleXi Ports Module can be used at a time. 100iNG 200iNG/XP 300iNG/XP 8 - - 1 2 2 Yes 8 - - 1 2 2 Yes 10 / 6 1 8 / 8 / 4 1 2 2 Yes 10 / 6 1 8 / 8 / 4 1 2 2 Yes Interfaces Copper GbE Ports Number of Slots for FleXi Ports Module FleXi Ports Module (For XP Appliances) *** (1 GbE Copper / 1 GbE SFP / 10 GbE SFP) Console Ports (RJ45) USB Ports Hardware Bypass Segments* Configurable Internal/DMZ/WAN Ports 50iNG System Performance ** Firewall Throughput (UDP) (Mbps) Firewall Throughput (TCP) (Mbps) New sessions/second Concurrent sessions IPSec VPN Throughput (Mbps) No. of IPSec Tunnels SSL VPN Throughput (Mbps) WAF Protected Throughput (Mbps) Anti-Virus Throughput (Mbps) IPS Throughput (Mbps) UTM Throughput (Mbps) Authenticated Users/Nodes Power Input Voltage Consumption Total Heat Dissipation (BTU) 100-240VAC 99W 338 100-240VAC 137W 467 100-240VAC 137W 467 100-240VAC 99W 338 Techsheet NG Future-ready Dimensions H x W x D (inches) H x W x D (cms) Appliance Weight 1.7 x 14.6 x 17.3 4.4 X 37.2 X 44 5 kg, 11.02 lbs 1.7 x 17.3 x 11.85 4.4 x 43.9 x 30.1 5.1 kg, 11.24 lbs 1.7 x 17.3 x 11.85 4.4 x 43.9 x 30.1 5.1 kg, 11.24 lbs 1.7 x 14.6 x 17.3 4.4 X 37.2 X 44 5 kg, 11.02 lbs Specifications 35wiNG15wiNG 25wiNG/6P Interfaces Copper GbE Ports Console Ports (RJ45) USB Ports Hardware Bypass Segments * Configurable Internal/DMZ/WAN Ports 6 1 2 - Yes 3 1 2 - Yes 4/6 1 2 - Yes System Performance ** Firewall Throughput (UDP) (Mbps) Firewall Throughput (TCP) (Mbps) New sessions/second Concurrent sessions IPSec VPN Throughput (Mbps) No. of IPSec Tunnels SSL VPN Throughput (Mbps) WAF Protected Throughput (Mbps) Anti-Virus Throughput (Mbps) IPS Throughput (Mbps) UTM Throughput (Mbps) Authenticated Users/Nodes Power Input Voltage Consumption Total Heat Dissipation (BTU) 100-240VAC 47.8W 163 100-240VAC 13.2W 45 100-240VAC 33.5W 114 Dimensions H x W x D (inches) H x W x D (cms) Appliance Weight 1.7 x 6 x 9.1 4.4 x 15.3 x 23.2 2.3 kg, 5.07 lbs 1.7 x 6 x 9.1 4.4 x 15.3 x 23.2 1.5 kg, 3.307 lbs 25iNG/6P 4/6 1 2 - Yes 100-240VAC 33.5W 114 1.7 x 6 x 9.1 4.4 x 15.3 x 23.2 2.3 kg, 5.07 lbs 1.7 x 6 x 9.1 4.4 x 15.3 x 23.2 2.3 kg, 5.07 lbs 15iNG 3 1 2 - Yes 100-240VAC 13.2W 45 1.7 x 6 x 9.1 4.4 x 15.3 x 23.2 1.5 kg, 3.307 lbs 10iNG 3 1 2 - Yes 100-240VAC 22W 75 1.35 x 8.75 x 6.8 3.43 x 22.23 x 17.3 1.10 kg, 2.42 lbs 35iNG 6 1 2 - Yes 100-240VAC 47.8W 163 1.7 x 6 x 9.1 4.4 x 15.3 x 23.2 2.3 kg, 5.07 lbs Built-in Wireless LAN (Only for wiNG series) Wireless Standards Antenna Access Points Transmit Power (EIRP) Receiver Sensitivity Frequency Range Number of Selectable Channels Data Rate IEEE 802.11 a/b/g/n (WEP, WPA, WPA2, 802.11i , TKIP, AES, PSK) Detachable 3x3 MIMO Up to 8 bssid 11n HT40 : +15dBm, 11b CCK: +15dBm, 11g OFDM:+15dBm -68dBm at 300Mbps, -70dBm at 54Mbps, -88dBm at 6Mbps USA (FCC) - 11 channels, EU (ETSI) / Japan (TELEC) - 13 channels 802.11n: up to 450Mbps, 802.11b: 1, 2, 5,5, 11Mbps, 802.11g: 6, 9, 12, 18, 24, 36, 48, 54Mbps 2.412 GHz - 2.472 GHz 5.200 GHz - 5.825 GHz NA 3,700 2,400 21,000 750,000 280 850 100 150 600 650 300 Unlimited 1,200 900 5,000 200,000 130 300 50 -NA- 200 160 90 Unlimited 1,800 1,200 6,000 500,000 210 550 75 100 350 240 125 Unlimited 1,800 1,200 6,000 500,000 210 550 75 100 350 240 125 Unlimited 1,200 900 5,000 200,000 130 300 50 -NA- 200 160 90 Unlimited 3,700 2,400 21,000 750,000 280 850 100 150 600 650 300 Unlimited 400 300 2,000 27,500 100 25 25 -NA- 100 90 60 Unlimited 8,000 5,000 60,000 3,000,000 1,050 4,000 400 700 2,200 2,500 1,050 Unlimited 6,500 4,000 45,000 1,000,000 850 2,000 300 450 1,500 1,600 850 Unlimited Copyright © 1999-2015 Cyberoam Technologies Pvt. Ltd. All Rights Reserved 1.0-10.6.2-191214 10,000/14,000 8,000 85,000 3,200,000 1,150 4,500 450 1,000 2,600 3,000 1,400 Unlimited 12,000/21,000 9,500/10,500 100,000 3,200,000 1,300 5,000 500 1,250 2,900 4,000 1,700 Unlimited