0% found this document useful (0 votes)
17 views

CyberoamCR100iNG

The Cyberoam NG series of Unified Threat Management appliances offers advanced security features tailored for SMEs, ensuring high throughput speeds and future-ready capabilities. It utilizes Layer 8 Technology to enhance security by associating user identity with network activities, providing instant visibility into potential threats. The appliances support a range of security functions including firewall, intrusion prevention, and content filtering, while also ensuring connectivity and productivity for businesses.

Uploaded by

foursoul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

CyberoamCR100iNG

The Cyberoam NG series of Unified Threat Management appliances offers advanced security features tailored for SMEs, ensuring high throughput speeds and future-ready capabilities. It utilizes Layer 8 Technology to enhance security by associating user identity with network activities, providing instant visibility into potential threats. The appliances support a range of security functions including firewall, intrusion prevention, and content filtering, while also ensuring connectivity and productivity for businesses.

Uploaded by

foursoul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Unified Threat Management CR100iNG

Future-ready

Future-ready Security for SME networks CR100iNG Data Sheet

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security
appliances that include UTM security features along with performance required for future networks. The
NG series for SMEs are the “fastest UTMs” made for this segment. The best-in-class hardware along
with software to match, enables the NG series to offer unmatched throughput speeds, compared
to any other UTM appliance in this market segment. This assures support for future IT trends in
organizations like high-speed Internet and rising number of devices in organizations –
offering future-ready security to SMEs.

The ‘Next-Generation’ Series:


With Cyberoam NG series, businesses get assured Security, Connectivity and
Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the The fastest UTMs made for SMEs
HUMAN layer in the protocol stack. It attaches User-Identity to security, which
adds speed to an organization’s security by offering instant visibility into the
source of attacks by username rather than only IP address. Cyberoam’s
Extensible Security Architecture (ESA) supports feature
enhancements that can be developed rapidly and deployed with Cyberoam's Layer 8 Technology treats
minimum efforts, offering future-ready security to organizations. “User Identity” as the 8th Layer in the
protocol stack

VPNC
L8 USER
CERTIFIED
SSL
Portal
SSL
Exchange
L7 Application
SSL
Firefox
VPNC
CERTIFIED
Basic
SSL
JavaScript

SSL Basic
L6 Presentation ASCII, EBCDIC, ICA
Interop Network Extension

www.check-mark.com
AES
Interop
SSL Advanced
Network Extension Cyberoam UTM offers security
L5 Session L2TP, PPTP
across Layer 2-Layer 8 using
L4 Transport TCP, UDP Identity-based policies

L3 Network 192.168.1.1

L2 Data Link 00-17-BB-8C-E3-E7

L1 Physical

Cyberoam UTM features assure Security, Connectivity, Productivity

Security Connectivity Productivity


Network Security Business Continuity Employee Productivity
- Firewall - Multiple Link Management - Content Filtering
- Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls
- Web Application Firewall
Network Availability IT Resource Optimization
Content Security - VPN - Bandwidth Management
- Anti-Virus/Anti-Spyware - 3G/4G/WiMAX Connectivity - Traffic Discovery
- Anti-Spam (Inbound/Outbound)## - Application Visibility & Control
- HTTPS/SSL Content Security Future-ready Connectivity
- “IPv6 Ready” Gold Logo Administrator Productivity
Administrative Security - Next-Gen UI
- Next-Gen UI
- iView- Logging & Reporting
Specification
Interfaces Web Application Firewall Administration & System Management
Copper GbE Ports 8 - Positive Protection model - Web-based configuration wizard
Configurable Internal/DMZ/WAN Ports Yes - Unique "Intuitive Website Flow Detector" technology - Role-based access control
Console Ports (RJ45) 1 - Protection against SQL Injections, Cross-site Scripting - Firmware Upgrades via Web UI
USB Ports 2 (XSS), Session Hijacking, URL Tampering, Cookie - Web 2.0 compliant UI (HTTPS)
Hardware Bypass Segment
#
2 Poisoning - UI Color Styler
- Support for HTTP 0.9/1.0/1.1 - Command Line Interface (Serial, SSH, Telnet)
- Extensive Logging & Reporting - SNMP (v1, v2c, v3)
System Performance*
Firewall Throughput (UDP) (Mbps) 4,500 - Multi-lingual support: Chinese, Hindi, French, Korean
Firewall Throughput (TCP) (Mbps) 3,500 Virtual Private Network - Cyberoam Central Console (Optional)
New sessions/second 45,000 - IPSec, L2TP, PPTP - Network Time Protocol Support
Concurrent sessions 1,250,000 - Encryption - 3DES, DES, AES, Twofish, Blowfish,
IPSec VPN Throughput (Mbps) 450 Serpent User Authentication
No. of IPSec Tunnels 250 - Hash Algorithms - MD5, SHA-1 - Internal database
SSL VPN Throughput (Mbps) 400 - Authentication - Preshared key, Digital certificates - Active Directory Integration
WAF Protected Throughput (Mbps) 500 - IPSec NAT Traversal
- Automatic Windows Single Sign On
Anti-Virus Throughput (Mbps) 1,400 - Dead peer detection and PFS support
- External LDAP/RADIUS database integration
IPS Throughput (Mbps) 1,200 - Diffie Hellman Groups - 1,2,5,14,15,16
- External Certificate Authority support - Thin Client support - Microsoft Windows Server 2003
UTM Throughput (Mbps) 750 Terminal Services and Citrix XenApp - Novell eDirectory
- Export Road Warrior connection configuration
- Domain name support for tunnel end points - RSA SecurID support
Stateful Inspection Firewall - External Authentication - Users and Administrators
- VPN connection redundancy
- Layer 8 (User - Identity) Firewall - User/MAC Binding
- Overlapping Network support
- Multiple Security Zones - Multiple Authentication servers
- Hub & Spoke VPN support
- Access Control Criteria (ACC) - User - Identity, Source &
Destination Zone, MAC and IP address, Service Logging/Monitoring
- UTM policies - IPS, Web Filtering, Application Filtering,
SSL VPN
- TCP & UDP Tunneling - Graphical real-time and historical monitoring
Anti-Virus, Anti-Spam and Bandwidth Management - Email notification of reports, gateway status, viruses and
- Authentication - Active Directory, LDAP, RADIUS,
- Layer 7 (Application) Control & Visibility
Cyberoam attacks
- Access Scheduling
- Policy based Source & Destination NAT - Multi-layered Client Authentication - Certificate, - Syslog support
- H.323, SIP NAT Traversal Username/Password - Log Viewer - Firewall, IPS, Web filter, Anti Virus, Anti
- 802.1q VLAN Support - User & Group policy enforcement Spam, Authentication, System and Admin Events
- DoS & DDoS Attack prevention - Network access - Split and Full tunneling
- MAC & IP-MAC filtering and Spoof prevention - Browser-based (Portal) Access - Clientless access On-Appliance Cyberoam-iView Reporting Cyberoam TM

- Lightweight SSL VPN Tunneling Client - Integrated Web-based Reporting tool - VIEW
- Granular access control to all the Enterprise Network Cyberoam-iView
Gateway Anti-Virus & Anti-Spyware
- Virus, Worm, Trojan: Detection & Removal resources - 1000+ drilldown reports
- Spyware, Malware, Phishing protection - Administrative controls - Session timeout, Dead Peer - 45+ Compliance Reports
- Automatic virus signature database update Detection, Portal customization - Historical and Real-time reports
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, - TCP- based Application Access - HTTP, HTTPS, RDP, - Multiple Dashboards
VPN Tunnels TELNET, SSH - Username, Host, Email ID specific Monitoring
- Customize individual user scanning Dashboard
- Self Service Quarantine area Instant Messaging (IM) Management - Reports - Security, Virus, Spam, Traffic, Policy
- Scan and deliver by file size - Yahoo and Windows Live Messenger violations, VPN, Search Engine keywords
- Block by file types - Virus Scanning for IM traffic - Multi-format reports - tabular, graphical
- Add disclaimer/signature - Allow/Block Login - Exportable formats - PDF, Excel
- Allow/Block File Transfer - Automated Report Scheduling
Gateway Anti-Spam - Allow/Block Webcam
- Inbound/Outbound Scanning - Allow/Block one-to-one/group chat IPSec VPN Client**
- Real-time Blacklist (RBL), MIME header check - Content-based blocking - Inter-operability with major IPSec VPN Gateways
- Filter based on message header, size, sender, recipient - IM activities Log - Supported platforms: Windows 2000, WinXP 32/64-bit,
- Subject line tagging - Archive files transferred Windows 2003 32-bit, Windows 2008 32/64-bit, Windows
- IP address Black list/White list - Custom Alerts Vista 32/64-bit, Windows 7 RC1 32/64-bit
- Redirect Spam mails to dedicated email address - Import Connection configuration
- Image-based Spam filtering using RPD Technology Wireless WAN
- Zero hour Virus Outbreak Protection - USB port 3G/4G and Wimax Support Certification
- Self Service Quarantine area - Primary WAN link - ICSA Firewall - Corporate
- Spam Notification through Digest - WAN Backup link - Checkmark UTM Level 5 Certification
- IP Reputation-based Spam filtering - VPNC - Basic and AES interoperability
Bandwidth Management - “IPv6 Ready” Gold Logo
Intrusion Prevention System - Application and User Identity based Bandwidth
- Signatures: Default (4500+), Custom Management Hardware Specifications
- IPS Policies: Multiple, Custom - Guaranteed & Burstable bandwidth policy Memory 2GB
- User-based policy creation - Application & User Identity based Traffic Discovery Compact Flash 4GB
- Automatic real-time updates from CRProtect networks - Multi WAN bandwidth reporting HDD 250GB or higher
- Protocol Anomaly Detection - Category-based bandwidth restriction
- DDoS attack prevention Compliance
User Identity and Group Based Controls CE
Web Filtering - Access time restriction FCC
- Inbuilt Web Category Database - Time and Data Quota restriction UL
- URL, keyword, File type block - Schedule based Committed and Burstable Bandwidth
- Categories: Default(82+), Custom - Schedule based P2P and IM Controls
Dimensions
- Protocols supported: HTTP, HTTPS H x W x D (inches) 1.7 x 14.6 x 17.3
- Block Malware, Phishing, Pharming URLs Networking H x W x D (cms) 4.4 X 37.2 X 44
- Schedule-based access control - Failover - Automated Failover/Failback, Multi-WAN Weight 5 kg, 11.02 lbs
- Custom block messages per category failover, 3GModem failover
- Block Java Applets, Cookies, Active X - WRR based load balancing Power
- CIPA Compliant - Policy routing based on Application and User Input Voltage 100-240 VAC
- Data leakage control via HTTP, HTTPS upload - IP Address Assignment - Static, PPPoE, L2TP, PPTP & Consumption 99W
DDNS Client, Proxy ARP, DHCP server, DHCP relay Total Heat Dissipation (BTU) 338
Application Filtering - Support for HTTP Proxy
- Inbuilt Application Category Database - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Environmental
- 11+ Application Categories: e.g. Gaming, IM, P2P, Forwarding Operating Temperature 0 to 40 °C
Proxy - Parent Proxy support with FQDN Storage Temperature -25 to 75 °C
- Schedule-based access control - “IPv6 Ready” Gold Logo Relative Humidity (Non condensing) 10 to 90%
- Block
- P2P applications e.g. Skype High Availability
- Anonymous proxies e.g. UItra surf - Active-Active
- “Phone home” activities - Active-Passive with State Synchronization
- Keylogger - Stateful failover
- Layer 7 (Applications) & Layer 8 (User - Identity) - Alerts on appliance status change
Visibility

# ##
If Enabled, will bypass traffic only in case of power failure. **Additional Purchase Required. Inbound and Outbound Spam filtering cannot be used simultaneously.
*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.

Toll Free Numbers C o p y r i g h t © 1999-2012 Cyberoam Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.


Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although
USA : +1-800-686-2360 | India : 1-800-301-00013 Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy
or completeness of information neither is this a legally binding representation. Elitecore has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000252-100718 Unified Threat Management

www.cyberoam.com I sales@cyberoam.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy