Está en la página 1de 2

Data Sheet

Comprehensive Network Security


Cyberoam CR50ia
for Small & Medium Offices

Unified Threat Management F/D


A B C D E F

RESET
CONSOLE
CR 50ia
VPNC
CERTIFIED
SSL
Portal
SSL
Exchange

SSL
Firefox
VPNC SSL
CERTIFIED JavaScript
Basic SSL Basic
Interop Network Extension
AES SSL Advanced
www.check-mark.com Interop Network Extension

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
small and medium enterprises (SMEs) by allowing user identity-based policy controls.
BEST BUY
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the
protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional
Cyberoam CR50ia solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering
instant visibility into the source of attacks by username rather than IP address – allowing immediate
rated as remediation to restore security or allowing proactive security. Layer 8 technology functions along with each
“BEST BUY” by of Cyberoam security features to allow creation of identity-based security policies.

SC Magazine Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can
grow with the future security needs of an organization without degrading system performance. ESA
supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

User Identity-based Security Policy Controls

L8 USER

L7 Application
Cyberoam's Layer 8 Technology treats
L6 Presentation ASCII, EBCDIC, ICA “User Identity” as the 8th Layer
in the protocol stack
L5 Session L2TP, PPTP

Transport Cyberoam UTM offers security across


L4 TCP, UDP
Layer 2-Layer 8 using Identity-based policies
L3 Network 192.168.1.1

L2 Data Link 00-17-BB-8C-E3-E7

L1 Physical

Cyberoam UTM features assure Security, Connectivity, Productivity

Security Connectivity Productivity

Network Security Business Continuity Employee Productivity


- Firewall - Multiple Link Management - Content Filtering
- Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls
- Wireless security
Network Availability IT Resource Optimization
Content Security - VPN - Bandwidth Management
- Anti-Virus/Anti-Spyware - 3G/WiMAX Connectivity - Traffic Discovery
- Anti-Spam - Application Layer 7 Management
- HTTPS/SSL Content Security Future-ready Connectivity
- “IPv6 Ready” Gold Logo Administrator Productivity
Administrative Security - Next-Gen UI
- Next-Gen UI
- iView- Logging & Reporting
Specification
##
Interfaces - “Phone home” activities High Availability
10/100/1000 GBE Ports 6 - Keylogger - Active-Active
Configurable Internal/DMZ/WAN Ports Yes - Layer 7 (Applications) & Layer 8 (User - Identity) - Active-Passive with state synchronization
Console Ports (RJ45/DB9) 1 Visibility - Stateful Failover
USB Ports 2 - Alerts on Appliance Status change
Hardware Bypass Segments 1* Virtual Private Network
- IPSec, L2TP, PPTP Administration & System Management
System Performance* - Encryption - 3DES, DES, AES, Twofish, Blowfish, - Web-based configuration wizard
Firewall Throughput (UDP) (Mbps) 1000 Serpent - Role-based Access control
Firewall Throughput (TCP) (Mbps) 750 - Hash Algorithms - MD5, SHA-1 - Firmware Upgrades via Web UI
New sessions/second 8,000 - Authentication - Preshared key, Digital certificates - Web 2.0 compliant UI (HTTPS)
Concurrent sessions 220,000 - IPSec NAT Traversal - UI Color Styler
168-bit 3DES/AES Throughput (Mbps) 60/90 - Dead Peer Detection and PFS support - Command line interface (Serial, SSH, Telnet)
Antivirus Throughput (Mbps) 150 - Diffie Hellman Groups - 1,2,5,14,15,16 - SNMP (v1, v2c, v3)
IPS Throughput (Mbps) 200 - External Certificate Authority support - Multi-lingual support: Chinese, Hindi, French,
UTM Throughput (Mbps) 130 - Export Road Warrior connection configuration Korean
- Domain name support for tunnel end points - Cyberoam Central Console (Optional)
Stateful Inspection Firewall - VPN connection redundancy - NTP Support
- Layer 8 (User - Identity) Firewall - Overlapping Network support
- Multiple Security Zones - Hub & Spoke VPN support
User Authentication
- Access Control Criteria (ACC) - User - Identity, Source - Internal database
& Destination Zone, MAC and IP address, Service SSL VPN - Active Directory Integration
- UTM policies - IPS, Web Filtering, Application - TCP & UDP Tunneling - Automatic Windows Single Sign On
Filtering, Anti-Virus, Anti-Spam and Bandwidth - Authentication - Active Directory, LDAP, RADIUS, - External LDAP/RADIUS database Integration
Management Cyberoam - Thin Client support - Microsoft Windows Server 2003
- Layer 7 (Application) Control & Visibility - Multi-layered Client Authentication - Certificate, Terminal Services and Citrix XenApp
- Access Scheduling Username/Password - RSA SecurID support
- Policy based Source & Destination NAT - User & Group policy enforcement - External Authentication - Users and Administrators
- H.323, SIP NAT Traversal - Network access - Split and Full tunneling - User/MAC Binding
- 802.1q VLAN Support - Browser-based (Portal) Access - Clientless access - Multiple Authentication servers
- DoS & DDoS Attack prevention - Lightweight SSL VPN Tunneling Client
- MAC & IP-MAC filtering and Spoof prevention - Granular access control to all the Enterprise Network Logging/Monitoring
resources - Graphical real-time and historical monitoring
Gateway Anti-Virus & Anti-Spyware - Administrative controls - Session timeout, Dead Peer - Email notification of reports, viruses and attacks
- Virus, Worm, Trojan Detection & Removal Detection, Portal customization - Syslog support
- Spyware, Malware, Phishing protection - TCP- based Application Access - HTTP, HTTPS, - Log Viewer - IPS, Web filter, Anti-Virus, Anti-Spam,
- Automatic virus signature database update RDP, TELNET, SSH Authentication, System and Admin Events
- Scans HTTP, FTP, SMTP, POP3, IMAP, IM, VPN
Tunnels Instant Messaging (IM) Management On-Appliance Cyberoam-iView Reporting TM
Cyberoam
- Customize Individual user scanning - Yahoo and Windows Live Messenger - Integrated Web-based Reporting tool - VIEW
- Self Service Quarantine area - Virus Scanning for IM traffic Cyberoam-iView
- Scan and deliver by file size - Allow/Block Login - 1000+ drilldown reports
- Block by file types - Allow/Block File Transfer - 45+ Compliance reports
- Add disclaimer/signature - Allow/Block Webcam - Historical and Real-time reports
- Allow/Block one-to-one/group Chat - Multiple Dashboards
Gateway Anti-Spam - Content-based blocking - Username, Host, Email ID specific Monitoring
- Real-time Blacklist (RBL), MIME header check - IM activities Log Dashboard
- Filter based on message header, size, sender, - Archive files transferred - Reports - Security, Virus, Spam, Traffic, Policy
recipient - Custom Alerts violations, VPN, Search Engine keywords
- Subject line tagging - Multi-format reports - tabular, graphical
- IP address Black list/White list Wireless WAN - Exportable formats - PDF, Excel
#
- Redirect spam mails to dedicated email address - USB port 3G and WiMax Support - Automated Report Scheduling
- Image-based spam filtering using RPD Technology - Primary WAN link
- Zero hour Virus Outbreak Protection - WAN Backup link IPSec VPN Client**
- Self Service Quarantine area - Inter-operability with major IPSec VPN Gateways
- Spam Notification through Digest Bandwidth Management - Supported platforms: Windows 2000, WinXP 32/64-
- IP Reputation-based Spam filtering - Application and User Identity based Bandwidth bit, Windows 2003 32-bit, Windows 2008 32/64-bit,
Management Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
Intrusion Prevention System - Guaranteed & Burstable bandwidth policy - Import Connection configuration
- Signatures: Default (3000+), Custom - Application & User Identity based Traffic Discovery
- IPS Policies: Multiple, Custom - Multi WAN bandwidth reporting Certification
- User-based policy creation - Category-based Bandwidth restriction - ICSA Firewall - Corporate
- Automatic real-time updates from CRProtect networks - Checkmark UTM Level 5 Certification
- Protocol Anomaly Detection User Identity and Group Based Controls - VPNC - Basic and AES interoperability
- DDoS Attack prevention - Access time restriction - IPv6 Ready Gold Logo
- Time and Data Quota restriction
Web Filtering - Schedule based Committed and Burstable Compliance
- Inbuilt Web Category Database Bandwidth CE
- URL, keyword, File type block - Schedule based P2P and IM Controls FCC
- Categories: Default(82+), Custom
- Protocols supported: HTTP, HTTPS Networking Dimensions
- Block Malware, Phishing, Pharming URLs - Failover - Automated Failover/Failback, Multi-WAN H x W x D (inches) 1.7 x 16.8 x 10.3
- Schedule-based access control failover, 3G Modem failover H x W x D (cms) 4.3 x 42.7 x 26.2
- Custom block messages per category - WRR based Load balancing Weight 5.3 kg, 11.68 lbs
- Block Java Applets, Cookies, Active X - Policy routing based on Application and User
- CIPA Compliant - IP Address Assignment - Static, PPPoE, L2TP, PPTP Power
- Data leakage control via HTTP, HTTPS upload & DDNS Client, Proxy ARP, DHCP server, DHCP Input Voltage 100-240 VAC
relay Consumption 90W
Application Filtering - Support for HTTP Proxy Total Heat Dissipation (BTU) 200
- Inbuilt Application Category Database - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast
- Application Categories e.g. Gaming, IM, P2P, Forwarding Environmental
Proxy: 11+ - Parent Proxy support with FQDN Operating Temperature 5 to 40 °C
- Schedule-based access control - IPv6 Ready Gold Logo Storage Temperature 0 to 70 °C
- Block Relative Humidity (Non condensing) 10 to 90%
- P2P applications e.g. Skype
- Anonymous proxies e.g. UItra surf
*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
#
3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices.
##
High Availability is currently a Beta feature.
**Additional Purchase Required

Toll Free Numbers C o p y r i g h t © 1999-2010 E l i t e c o r e Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.


Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although
USA : +1-877-777-0368 | India : 1-800-301-00013 Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy
or completeness of information neither is this a legally binding representation. Elitecore has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000301-101011
Unified Threat Management

www.cyberoam.com I sales@cyberoam.com Elitecore Product

También podría gustarte