Cyberoam CR50 I NG

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Unified Threat Management CR 50iNG

Future-ready

Future-ready Security for Small & Medium networks CR 50iNG Data Sheet

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
small and medium enterprises (SMEs) by allowing user identity-based policy controls.

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in
the protocol stack. It attaches user identity to security, taking organizations a step ahead of
conventional solutions that bind security to IP-addresses. This adds speed to an
organization’s security by offering instant visibility into the source of attacks by username
rather than IP address – allowing immediate remediation to restore security or allowing
The ‘Next-Generation’ Series for SOHO:
proactive security. Layer 8 technology functions along with each of Cyberoam
security features to allow creation of identity-based security policies. Offering “the fastest UTMs made for SMBs”
to Small & Medium Offices
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an
extensible platform that can grow with the future security needs of an
organization without degrading system performance. ESA supports
feature enhancements that can be developed rapidly and deployed Cyberoam's Layer 8 Technology treats
with minimum efforts. “User Identity” as the 8th Layer in the
protocol stack

VPNC
L8 USER
CERTIFIED
SSL
Portal
SSL
Exchange
L7 Application
SSL
Firefox
VPNC
CERTIFIED
Basic
SSL
JavaScript

SSL Basic
L6 Presentation ASCII, EBCDIC, ICA
Interop Network Extension

www.check-mark.com
AES
Interop
SSL Advanced
Network Extension Cyberoam UTM offers security
L5 Session L2TP, PPTP
across Layer 2-Layer 8 using
L4 Transport TCP, UDP Identity-based policies

L3 Network 192.168.1.1

L2 Data Link 00-17-BB-8C-E3-E7

L1 Physical

Cyberoam UTM features assure Security, Connectivity, Productivity

Security Connectivity Productivity


Network Security Business Continuity Employee Productivity
- Firewall - Multiple Link Management - Content Filtering
- Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls

Content Security Network Availability IT Resource Optimization


- Anti-Virus/Anti-Spyware - VPN - Bandwidth Management
- Anti-Spam (Inbound/Outbound)## - 3G/4G/WiMAX Connectivity - Traffic Discovery
- HTTPS/SSL Content Security - Application Layer 7 Management
Future-ready Connectivity - Application Visibility & Control
Administrative Security - “IPv6 Ready” Gold Logo
- Next-Gen UI Administrator Productivity
- iView- Logging & Reporting - Next-Gen UI
Specification
Interfaces Web Application Firewall Administration & System Management
Copper GbE Ports 8 - Positive Protection model - Web-based configuration wizard
Configurable Internal/DMZ/WAN Ports Yes - Unique "Intuitive Website Flow Detector" technology - Role-based access control
Console Ports (Rj45) 1 - Protection against SQL Injections, Cross-site Scripting - Firmware Upgrades via Web UI
USB Ports 2 (XSS), Session Hijacking, URL Tampering, Cookie - Web 2.0 compliant UI (HTTPS)
Hardware Bypass Segment
#
2 Poisoning - UI Color Styler
- Support for HTTP 0.9/1.0/1.1 - Command Line Interface (Serial, SSH, Telnet)
- Extensive Logging & Reporting - SNMP (v1, v2c, v3)
System Performance*
Firewall Throughput (UDP) (Mbps) 3,250 - Multi-lingual support: Chinese, Hindi, French, Korean
Firewall Throughput (TCP) (Mbps) 3,000 Virtual Private Network - Cyberoam Central Console (Optional)
New sessions/second 30,000 - IPSec, L2TP, PPTP - Network Time Protocol Support
Concurrent sessions 1,000,000 - Encryption - 3DES, DES, AES, Twofish, Blowfish,
IPSec VPN Throughput (Mbps) 400 Serpent User Authentication
No. of IPSec Tunnels 200 - Hash Algorithms - MD5, SHA-1 - Internal database
SSL VPN Throughput (Mbps) 300 - Authentication - Preshared key, Digital certificates - Active Directory Integration
WAF Protected Throughput (Mbps) 300 - IPSec NAT Traversal
- Automatic Windows Single Sign On
Anti-Virus Throughput (Mbps) 1,000 - Dead peer detection and PFS support
- External LDAP/RADIUS database integration
IPS Throughput (Mbps) 750 - Diffie Hellman Groups - 1,2,5,14,15,16
- External Certificate Authority support - Thin Client support - Microsoft Windows Server 2003
UTM Throughput (Mbps) 550 Terminal Services and Citrix XenApp - Novell eDirectory
- Export Road Warrior connection configuration
- Domain name support for tunnel end points - RSA SecurID support
Stateful Inspection Firewall - External Authentication - Users and Administrators
- VPN connection redundancy
- Layer 8 (User - Identity) Firewall - User/MAC Binding
- Overlapping Network support
- Multiple Security Zones - Multiple Authentication servers
- Hub & Spoke VPN support
- Access Control Criteria (ACC) - User - Identity, Source &
Destination Zone, MAC and IP address, Service Logging/Monitoring
- UTM policies - IPS, Web Filtering, Application Filtering,
SSL VPN
- TCP & UDP Tunneling - Graphical real-time and historical monitoring
Anti-Virus, Anti-Spam and Bandwidth Management - Email notification of reports, gateway status, viruses and
- Authentication - Active Directory, LDAP, RADIUS,
- Layer 7 (Application) Control & Visibility
Cyberoam attacks
- Access Scheduling
- Policy based Source & Destination NAT - Multi-layered Client Authentication - Certificate, - Syslog support
- H.323, SIP NAT Traversal Username/Password - Log Viewer - Firewall, IPS, Web filter, Anti Virus, Anti
- 802.1q VLAN Support - User & Group policy enforcement Spam, Authentication, System and Admin Events
- DoS & DDoS Attack prevention - Network access - Split and Full tunneling
- MAC & IP-MAC filtering and Spoof prevention - Browser-based (Portal) Access - Clientless access On-Appliance Cyberoam-iView Reporting Cyberoam TM

- Lightweight SSL VPN Tunneling Client - Integrated Web-based Reporting tool - VIEW
- Granular access control to all the Enterprise Network Cyberoam-iView
Gateway Anti-Virus & Anti-Spyware
- Virus, Worm, Trojan: Detection & Removal resources - 1000+ drilldown reports
- Spyware, Malware, Phishing protection - Administrative controls - Session timeout, Dead Peer - 45+ Compliance Reports
- Automatic virus signature database update Detection, Portal customization - Historical and Real-time reports
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, - TCP- based Application Access - HTTP, HTTPS, RDP, - Multiple Dashboards
VPN Tunnels TELNET, SSH - Username, Host, Email ID specific Monitoring
- Customize individual user scanning Dashboard
- Self Service Quarantine area Instant Messaging (IM) Management - Reports - Security, Virus, Spam, Traffic, Policy
- Scan and deliver by file size - Yahoo and Windows Live Messenger violations, VPN, Search Engine keywords
- Block by file types - Virus Scanning for IM traffic - Multi-format reports - tabular, graphical
- Add disclaimer/signature - Allow/Block Login - Exportable formats - PDF, Excel
- Allow/Block File Transfer - Automated Report Scheduling
Gateway Anti-Spam - Allow/Block Webcam
- Inbound/Outbound Scanning - Allow/Block one-to-one/group chat IPSec VPN Client**
- Real-time Blacklist (RBL), MIME header check - Content-based blocking - Inter-operability with major IPSec VPN Gateways
- Filter based on message header, size, sender, recipient - IM activities Log - Supported platforms: Windows 2000, WinXP 32/64-bit,
- Subject line tagging - Archive files transferred Windows 2003 32-bit, Windows 2008 32/64-bit, Windows
- IP address Black list/White list - Custom Alerts Vista 32/64-bit, Windows 7 RC1 32/64-bit
- Redirect Spam mails to dedicated email address - Import Connection configuration
- Image-based Spam filtering using RPD Technology Wireless WAN
- Zero hour Virus Outbreak Protection - USB port 3G/4G and Wimax Support Certification
- Self Service Quarantine area - Primary WAN link - ICSA Firewall - Corporate
- Spam Notification through Digest - WAN Backup link - Checkmark UTM Level 5 Certification
- IP Reputation-based Spam filtering - VPNC - Basic and AES interoperability
Bandwidth Management - “IPv6 Ready” Gold Logo
Intrusion Prevention System - Application and User Identity based Bandwidth
- Signatures: Default (4500+), Custom Management Hardware Specifications
- IPS Policies: Multiple, Custom - Guaranteed & Burstable bandwidth policy Memory 2GB
- User-based policy creation - Application & User Identity based Traffic Discovery Compact Flash 4GB
- Automatic real-time updates from CRProtect networks - Multi WAN bandwidth reporting HDD 250GB or higher
- Protocol Anomaly Detection - Category-based bandwidth restriction
- DDoS attack prevention Compliance
User Identity and Group Based Controls CE
Web Filtering - Access time restriction FCC
- Inbuilt Web Category Database - Time and Data Quota restriction UL
- URL, keyword, File type block - Schedule based Committed and Burstable Bandwidth
- Categories: Default(82+), Custom - Schedule based P2P and IM Controls
Dimensions
- Protocols supported: HTTP, HTTPS H x W x D (inches) 1.7 x 14.6 x 17.3
- Block Malware, Phishing, Pharming URLs Networking H x W x D (cms) 4.4 X 37.2 X 44
- Schedule-based access control - Failover - Automated Failover/Failback, Multi-WAN Weight 5 kg, 11.02 lbs
- Custom block messages per category failover, 3GModem failover
- Block Java Applets, Cookies, Active X - WRR based load balancing Power
- CIPA Compliant - Policy routing based on Application and User Input Voltage 100-240 VAC
- Data leakage control via HTTP, HTTPS upload - IP Address Assignment - Static, PPPoE, L2TP, PPTP & Consumption 99W
DDNS Client, Proxy ARP, DHCP server, DHCP relay Total Heat Dissipation (BTU) 338
Application Filtering - Support for HTTP Proxy
- Inbuilt Application Category Database - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Environmental
- 11+ Application Categories: e.g. Gaming, IM, P2P, Forwarding Operating Temperature 0 to 40 °C
Proxy - Parent Proxy support with FQDN Storage Temperature -25 to 75 °C
- Schedule-based access control - “IPv6 Ready” Gold Logo Relative Humidity (Non condensing) 10 to 90%
- Block
- P2P applications e.g. Skype High Availability
- Anonymous proxies e.g. UItra surf - Active-Active
- “Phone home” activities - Active-Passive with State Synchronization
- Keylogger - Stateful failover
- Layer 7 (Applications) & Layer 8 (User - Identity) - Alerts on appliance status change
Visibility

# ##
If Enabled, will bypass traffic only in case of power failure. **Additional Purchase Required. Inbound and Outbound Spam filtering cannot be used simultaneously.
*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.

Toll Free Numbers C o p y r i g h t © 1999-2012 Cyberoam Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.


Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although
USA : +1-800-686-2360 | India : 1-800-301-00013 Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy
or completeness of information neither is this a legally binding representation. Elitecore has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000252-100718 Unified Threat Management

www.cyberoam.com I [email protected]

You might also like