Cyberoam CR50 I NG
Cyberoam CR50 I NG
Cyberoam CR50 I NG
Future-ready
Future-ready Security for Small & Medium networks CR 50iNG Data Sheet
Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
small and medium enterprises (SMEs) by allowing user identity-based policy controls.
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in
the protocol stack. It attaches user identity to security, taking organizations a step ahead of
conventional solutions that bind security to IP-addresses. This adds speed to an
organization’s security by offering instant visibility into the source of attacks by username
rather than IP address – allowing immediate remediation to restore security or allowing
The ‘Next-Generation’ Series for SOHO:
proactive security. Layer 8 technology functions along with each of Cyberoam
security features to allow creation of identity-based security policies. Offering “the fastest UTMs made for SMBs”
to Small & Medium Offices
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an
extensible platform that can grow with the future security needs of an
organization without degrading system performance. ESA supports
feature enhancements that can be developed rapidly and deployed Cyberoam's Layer 8 Technology treats
with minimum efforts. “User Identity” as the 8th Layer in the
protocol stack
VPNC
L8 USER
CERTIFIED
SSL
Portal
SSL
Exchange
L7 Application
SSL
Firefox
VPNC
CERTIFIED
Basic
SSL
JavaScript
SSL Basic
L6 Presentation ASCII, EBCDIC, ICA
Interop Network Extension
www.check-mark.com
AES
Interop
SSL Advanced
Network Extension Cyberoam UTM offers security
L5 Session L2TP, PPTP
across Layer 2-Layer 8 using
L4 Transport TCP, UDP Identity-based policies
L3 Network 192.168.1.1
L1 Physical
- Lightweight SSL VPN Tunneling Client - Integrated Web-based Reporting tool - VIEW
- Granular access control to all the Enterprise Network Cyberoam-iView
Gateway Anti-Virus & Anti-Spyware
- Virus, Worm, Trojan: Detection & Removal resources - 1000+ drilldown reports
- Spyware, Malware, Phishing protection - Administrative controls - Session timeout, Dead Peer - 45+ Compliance Reports
- Automatic virus signature database update Detection, Portal customization - Historical and Real-time reports
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, - TCP- based Application Access - HTTP, HTTPS, RDP, - Multiple Dashboards
VPN Tunnels TELNET, SSH - Username, Host, Email ID specific Monitoring
- Customize individual user scanning Dashboard
- Self Service Quarantine area Instant Messaging (IM) Management - Reports - Security, Virus, Spam, Traffic, Policy
- Scan and deliver by file size - Yahoo and Windows Live Messenger violations, VPN, Search Engine keywords
- Block by file types - Virus Scanning for IM traffic - Multi-format reports - tabular, graphical
- Add disclaimer/signature - Allow/Block Login - Exportable formats - PDF, Excel
- Allow/Block File Transfer - Automated Report Scheduling
Gateway Anti-Spam - Allow/Block Webcam
- Inbound/Outbound Scanning - Allow/Block one-to-one/group chat IPSec VPN Client**
- Real-time Blacklist (RBL), MIME header check - Content-based blocking - Inter-operability with major IPSec VPN Gateways
- Filter based on message header, size, sender, recipient - IM activities Log - Supported platforms: Windows 2000, WinXP 32/64-bit,
- Subject line tagging - Archive files transferred Windows 2003 32-bit, Windows 2008 32/64-bit, Windows
- IP address Black list/White list - Custom Alerts Vista 32/64-bit, Windows 7 RC1 32/64-bit
- Redirect Spam mails to dedicated email address - Import Connection configuration
- Image-based Spam filtering using RPD Technology Wireless WAN
- Zero hour Virus Outbreak Protection - USB port 3G/4G and Wimax Support Certification
- Self Service Quarantine area - Primary WAN link - ICSA Firewall - Corporate
- Spam Notification through Digest - WAN Backup link - Checkmark UTM Level 5 Certification
- IP Reputation-based Spam filtering - VPNC - Basic and AES interoperability
Bandwidth Management - “IPv6 Ready” Gold Logo
Intrusion Prevention System - Application and User Identity based Bandwidth
- Signatures: Default (4500+), Custom Management Hardware Specifications
- IPS Policies: Multiple, Custom - Guaranteed & Burstable bandwidth policy Memory 2GB
- User-based policy creation - Application & User Identity based Traffic Discovery Compact Flash 4GB
- Automatic real-time updates from CRProtect networks - Multi WAN bandwidth reporting HDD 250GB or higher
- Protocol Anomaly Detection - Category-based bandwidth restriction
- DDoS attack prevention Compliance
User Identity and Group Based Controls CE
Web Filtering - Access time restriction FCC
- Inbuilt Web Category Database - Time and Data Quota restriction UL
- URL, keyword, File type block - Schedule based Committed and Burstable Bandwidth
- Categories: Default(82+), Custom - Schedule based P2P and IM Controls
Dimensions
- Protocols supported: HTTP, HTTPS H x W x D (inches) 1.7 x 14.6 x 17.3
- Block Malware, Phishing, Pharming URLs Networking H x W x D (cms) 4.4 X 37.2 X 44
- Schedule-based access control - Failover - Automated Failover/Failback, Multi-WAN Weight 5 kg, 11.02 lbs
- Custom block messages per category failover, 3GModem failover
- Block Java Applets, Cookies, Active X - WRR based load balancing Power
- CIPA Compliant - Policy routing based on Application and User Input Voltage 100-240 VAC
- Data leakage control via HTTP, HTTPS upload - IP Address Assignment - Static, PPPoE, L2TP, PPTP & Consumption 99W
DDNS Client, Proxy ARP, DHCP server, DHCP relay Total Heat Dissipation (BTU) 338
Application Filtering - Support for HTTP Proxy
- Inbuilt Application Category Database - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Environmental
- 11+ Application Categories: e.g. Gaming, IM, P2P, Forwarding Operating Temperature 0 to 40 °C
Proxy - Parent Proxy support with FQDN Storage Temperature -25 to 75 °C
- Schedule-based access control - “IPv6 Ready” Gold Logo Relative Humidity (Non condensing) 10 to 90%
- Block
- P2P applications e.g. Skype High Availability
- Anonymous proxies e.g. UItra surf - Active-Active
- “Phone home” activities - Active-Passive with State Synchronization
- Keylogger - Stateful failover
- Layer 7 (Applications) & Layer 8 (User - Identity) - Alerts on appliance status change
Visibility
# ##
If Enabled, will bypass traffic only in case of power failure. **Additional Purchase Required. Inbound and Outbound Spam filtering cannot be used simultaneously.
*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
www.cyberoam.com I [email protected]