Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Data Sheet

Comprehensive Network Security


Cyberoam CR50ia
for Small & Medium Offices

Unified Threat Management A B C D E F CONSOLE

F/D
RESET
CR 50ia VPNC
CERTIFIED
SSL
Portal
SSL
Exchange

SSL
Firefox
VPNC SSL
CERTIFIED JavaScript
Basic SSL Basic
Interop Network Extension
AES SSL Advanced
www.check-mark.com Interop Network Extension

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
small and medium enterprises (SMEs) by allowing user identity-based policy controls.
BEST BUY
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the
protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional
Cyberoam CR50ia solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering
instant visibility into the source of attacks by username rather than IP address – allowing immediate
rated as remediation to restore security or allowing proactive security. Layer 8 technology functions along with each
“BEST BUY” by of Cyberoam security features to allow creation of identity-based security policies.

SC Magazine Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can
grow with the future security needs of an organization without degrading system performance. ESA
supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

User Identity-based Security Policy Controls

L8 USER

L7 Application
Cyberoam's Layer 8 Technology treats
L6 Presentation ASCII, EBCDIC, ICA “User Identity” as the 8th Layer
in the protocol stack
L5 Session L2TP, PPTP

Transport Cyberoam UTM offers security across


L4 TCP, UDP
Layer 2-Layer 8 using Identity-based policies
L3 Network 192.168.1.1

L2 Data Link 00-17-BB-8C-E3-E7

L1 Physical

Cyberoam UTM features assure Security, Connectivity, Productivity

Security Connectivity Productivity

Network Security Business Continuity Employee Productivity


- Firewall - Multiple Link Management - Content Filtering
- Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls
- Wireless security
Network Availability IT Resource Optimization
Content Security - VPN - Bandwidth Management
- Anti-Virus/Anti-Spyware - 3G/WiMAX Connectivity - Traffic Discovery
- Anti-Spam - Application Layer 7 Management
- HTTPS/SSL Content Security Future-ready Connectivity
- “IPv6 Ready” Gold Logo Administrator Productivity
Administrative Security - Next-Gen UI
- Next-Gen UI
- iView- Logging & Reporting
Specification
##
Interfaces Web Application Firewall High Availability
Copper GbE Ports 6 - Positive Protection model - Active-Active
Configurable Internal/DMZ/WAN Ports Yes - Unique "Intuitive Website Flow Detector" technology - Active-Passive with State Synchronization
Console Ports (RJ45/DB9) 1 - Protection against SQL Injections, Cross-site Scripting - Stateful failover
(XSS), Session Hijacking, URL Tampering, Cookie
USB Ports 2 Poisoning - Alerts on appliance status change
Hardware Bypass Segments 1* - Support for HTTP 0.9/1.0/1.1
- Extensive Logging & Reporting Administration & System Management
System Performance** - Back-end servers supported: 5 - Web-based configuration wizard
Firewall throughput (UDP) (Mbps) 1000 - Role-based access control
Firewall throughput (TCP) (Mbps) 750 Virtual Private Network - Firmware Upgrades via Web UI
New sessions/second 8,000 - IPSec, L2TP, PPTP - Web 2.0 compliant UI (HTTPS)
Concurrent sessions 220,000 - Encryption - 3DES, DES, AES, Twofish, Blowfish, - UI Color Styler
168-bit 3DES/AES throughput (Mbps) 60/90 Serpent - Command Line Interface (Serial, SSH, Telnet)
WAF Protected Throughput (Mbps) 35 - Hash Algorithms - MD5, SHA-1 - SNMP (v1, v2c, v3)
Anti-Virus throughput (Mbps) 150 - Authentication - Preshared key, Digital certificates - Multi-lingual support: Chinese, Hindi, French, Korean
IPS throughput (Mbps) 200 - IPSec NAT Traversal - Cyberoam Central Console (Optional)
UTM throughput (Mbps) 130 - Dead peer detection and PFS support - NTP Support
- Diffie Hellman Groups - 1,2,5,14,15,16
Stateful Inspection Firewall - External Certificate Authority support User Authentication
- Layer 8 (User - Identity) Firewall - Export Road Warrior connection configuration - Internal database
- Multiple Security Zones - Domain name support for tunnel end points - Active Directory Integration
- Access Control Criteria (ACC) - User - Identity, Source & - VPN connection redundancy - Automatic Windows Single Sign On
Destination Zone, MAC and IP address, Service - Overlapping Network support - External LDAP/RADIUS database integration
- UTM policies - IPS, Web Filtering, Application Filtering, - Hub & Spoke VPN support - Thin Client support - Microsoft Windows Server 2003
Anti-Virus, Anti-Spam and Bandwidth Management Terminal Services and Citrix XenApp
- Layer 7 (Application) Control & Visibility SSL VPN - RSA securID support
- Access Scheduling - TCP & UDP Tunneling - External Authentication - Users and Administrators
- Policy based Source & Destination NAT - Authentication - Active Directory, LDAP, RADIUS, - User/MAC Binding
- H.323, SIP NAT Traversal Cyberoam - Multiple Authentication servers
- 802.1q VLAN Support - Multi-layered Client Authentication - Certificate,
- DoS & DDoS Attack prevention Username/Password Logging/Monitoring
- MAC & IP-MAC filtering and Spoof prevention - User & Group policy enforcement - Graphical real-time and historical monitoring
- Network access - Split and Full tunneling - Email notification of reports, viruses and attacks
Gateway Anti-Virus & Anti-Spyware - Browser-based (Portal) Access - Clientless access - Syslog support
- Virus, Worm, Trojan Detection & Removal - Lightweight SSL VPN Tunneling Client - Log Viewer - IPS, Web filter, Anti Virus, Anti Spam,
- Spyware, Malware, Phishing protection - Granular access control to all the Enterprise Network Authentication, System and Admin Events
- Automatic virus signature database update resources TM

- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, - Administrative controls - Session timeout, Dead Peer On-Appliance Cyberoam-iView Reporting Cyberoam
VIEW
VPN Tunnels Detection, Portal customization - Integrated Web-based Reporting tool -
- Customize individual user scanning - TCP- based Application Access - HTTP, HTTPS, RDP, Cyberoam-iView
- Self Service Quarantine area TELNET, SSH - 1000+ drilldown reports
- Scan and deliver by file size - 45+ Compliance Reports
- Block by file types Instant Messaging (IM) Management - Historical and Real-time reports
- Add disclaimer/signature - Yahoo and Windows Live Messenger - Multiple Dashboards
- Virus Scanning for IM traffic - Username, Host, Email ID specific Monitoring
Gateway Anti-Spam - Allow/Block Login Dashboard
- Real-time Blacklist (RBL), MIME header check - Allow/Block File Transfer - Reports - Security, Virus, Spam, Traffic, Policy
- Filter based on message header, size, sender, recipient - Allow/Block Webcam violations, VPN, Search Engine keywords
- Subject line tagging - Allow/Block one-to-one/group chat - Multi-format reports - tabular, graphical
- IP address Black list/White list - Content-based blocking - Exportable formats - PDF, Excel
- Redirect Spam mails to dedicated email address - IM activities Log - Automated Report Scheduling
- Image-based Spam filtering using RPD Technology - Archive files transferred
- Zero hour Virus Outbreak Protection - Custom Alerts IPSec VPN Client***
- Self Service Quarantine area - Inter-operability with major IPSec VPN Gateways
- Spam Notification through Digest Wireless WAN - Supported platforms: Windows 2000, WinXP 32/64-bit,
- IP Reputation-based Spam filtering - USB port 3G and Wimax Support
#
Windows 2003 32-bit, Windows 2008 32/64-bit,
- Primary WAN link Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
Intrusion Prevention System - WAN Backup link - Import Connection configuration
- Signatures: Default (3000+), Custom
- IPS Policies: Multiple, Custom Bandwidth Management Certification
- User-based policy creation - Application and User Identity based Bandwidth - ICSA Firewall - Corporate
- Automatic real-time updates from CRProtect networks Management - Checkmark UTM Level 5 Certification
- Protocol Anomaly Detection - Guaranteed & Burstable bandwidth policy - VPNC - Basic and AES interoperability
- DDoS attack prevention - Application & User Identity based Traffic Discovery - “IPv6 Ready” Gold Logo
- Multi WAN bandwidth reporting
Web Filtering - Category-based bandwidth restriction Compliance
- Inbuilt Web Category Database CE
- URL, keyword, File type block User Identity and Group Based Controls FCC
- Categories: Default(82+), Custom - Access time restriction
- Protocols supported: HTTP, HTTPS - Time and Data Quota restriction Dimensions
- Block Malware, Phishing, Pharming URLs - Schedule based Committed and Burstable Bandwidth H x W x D (inches) 1.7 x 16.8 x 10.3
- Schedule-based access control - Schedule based P2P and IM Controls H x W x D (cms) 4.3 x 42.7 x 26.2
- Custom block messages per category Weight 5.3 kg, 11.68 lbs
- Block Java Applets, Cookies, Active X Networking
- CIPA Compliant - Failover - Automated Failover/Failback, Multi-WAN Power
- Data leakage control via HTTP, HTTPS upload failover, 3GModem failover Input Voltage 100-240 VAC
- WRR based load balancing Consumption 90W
Application Filtering - Policy routing based on Application and User Total Heat Dissipation (BTU) 200
- Inbuilt Application Category Database - IP Address Assignment - Static, PPPoE, L2TP, PPTP &
- Application Categories: e.g. Gaming, IM, P2P, DDNS Client, Proxy ARP, DHCP server, DHCP relay Environmental
Proxy : 11+ - Support for HTTP Proxy Operating Temperature 5 to 40 °C
- Schedule-based access control - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Storage Temperature 0 to 70 °C
- Block Forwarding Relative Humidity (Non condensing) 10 to 90%
- P2P applications e.g. Skype - Parent Proxy support with FQDN
- Anonymous proxies e.g. UItra surf - “IPv6 Ready” Gold Logo
- “Phone home” activities
- Keylogger
- Layer 7 (Applications) & Layer 8 (User - Identity)
Visibility

*If Enabled, will bypass traffic only in case of power failure. ##Subscription available in all the Models of CR50ia & above. For further details refer to WAF Datasheet.
**Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
***Additional Purchase Required. #3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices.

Toll Free Numbers C o p y r i g h t © 1999-2013 Cyberoam Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.


Cyberoam and Cyberoam logo are registered trademark of Cyberoam Technologies Pvt. Ltd. Although
USA : +1-800-686-2360 | India : 1-800-301-00013 Cyberoam has attempted to provide accurate information, Cyberoam assumes no responsibility for accuracy or
completeness of information neither is this a legally binding representation. Cyberoam has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000252-100423 Unified Threat Management

www.cyberoam.com I sales@cyberoam.com

You might also like