Data Sheet

Cyberoam CR200i

Comprehensive Network Security for Small & Medium Offices

Unified Threat Management
CR 200i

POWER CONSOLE E F A B C D

VPNC
RESET

CERTIFIED
SSL Portal SSL Exchange

VPNC
CERTIFIED
Basic

SSL Firefox SSL JavaScript SSL Basic Network Extension SSL Advanced Network Extension

Interop
AES
www.check-mark.com

Interop

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls.

Gartner positions Cyberoam UTM as a “Visionary” in Magic Quadrant for SMB Multifunction Firewalls

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies. Cyberoam’s multi-core technology allows parallel processing of all its security features – ensuring security without compromising performance. Its future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

User Identity-based Security Policy Controls
L8 L7 L6 L5 L4 L3 L2 L1 USER Application Presentation ASCII, EBCDIC, ICA Session Transport Network Data Link Physical
L2TP, PPTP TCP, UDP 192.168.1.1
00-17-BB-8C-E3-E7

Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack
Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies

Cyberoam UTM features assure Security, Connectivity, Productivity

Security
Network Security - Firewall - Intrusion Prevention System - Wireless security Content Security - Anti-Virus/Anti-Spyware - Anti-Spam - HTTPS/SSL Content Security Administrative Security - Next-Gen UI - iView- Logging & Reporting

Connectivity
Business Continuity - Multiple Link Management - High Availability Network Availability - VPN - 3G/WiMAX Connectivity Future-ready Connectivity - “IPv6 Ready” Gold Logo

Productivity
Employee Productivity - Content Filtering - Instant Messaging Archiving & Controls IT Resource Optimization - Bandwidth Management - Traffic Discovery - Application Layer 7 Management Administrator Productivity - Next-Gen UI

Identity. L t d.Self Service Quarantine area .Multiple Security Zones .Clientless access . IM.Schedule-based access control . A l l R i g h t s R e s e r v e d. Custom .Automatic real-time updates from CRProtect networks .Active-Active . MIME header check .IPS.Active Directory. Portal customization . For further details refer to WAF Datasheet. MAC and IP address.Multiple Dashboards .com Elitecore Product . HTTPS.7 x 17. recipient . OSPF. Phishing.Anonymous proxies e.Category-based bandwidth restriction Certification . Korean .“IPv6 Ready” Gold Logo Power Input Voltage Consumption Total Heat Dissipation (BTU) Application Filtering .Authentication .7W 324 0 to 40 °C -20 to 80 °C 0 to 90% Networking .Automated Failover/Failback. size. Application Filtering.USB port 3G and Wimax Support# .Diffie Hellman Groups .Inbuilt Application Category Database .Firmware Upgrades via Web UI . URL Tampering.cyberoam. HTTPS upload Compliance CE FCC User Identity and Group Based Controls .com for supported USB devices.IP Reputation-based Spam filtering IPSec VPN Client*** .1.Block by file types . **Antivirus. IMAP.Hash Algorithms .33 lbs 115-230 VAC 62.Scan and deliver by file size .Positive Protection model .Network access . UItra surf . VPN. Windows 2008 32/64-bit.Checkmark UTM Level 5 Certification . Policy violations.Self Service Quarantine area . #3G card and modem details are not included. Anti Spam.Spyware.Browser-based (Portal) Access . Malware.3 x 43. graphical . Multi-WAN failover.Inter-operability with major IPSec VPN Gateways .9 x 37. will bypass traffic only in case of power failure. Elitecore has the right to change.3 x 14.SNMP (v1.Block Java Applets. IM.Authentication .Multiple Authentication servers SSL VPN .Domain name support for tunnel end points .Block Malware.Support for HTTP Proxy .9/1. RDP.VPN connection redundancy . Authentication.323. Active X .Application Categories: e. Anti-Virus.g.Certificate.Content-based blocking .URL.Multi-layered Client Authentication .5.Protocols supported: HTTP. Worm.Add disclaimer/signature On-Appliance Cyberoam-iView Reporting .Zero hour Virus Outbreak Protection .DDoS attack prevention Bandwidth Management .Corporate .Session timeout.External Authentication .Encryption .000 150/180 100 280 750 250 Web Application Firewall ## High Availability .WAN Backup link Intrusion Prevention System .6 4. Service .tabular.Back-end servers supported: 10 Administration & System Management .Identity) Visibility Environmental Operating Temperature Storage Temperature Relative Humidity (Non condensing) *If Enabled.Automated Report Scheduling Cyberoam TM VIEW Instant Messaging (IM) Management .Layer 7 (Application) Control & Visibility .Basic and AES interoperability . ##Subscription available in all the Models of CR50ia & above.Schedule-based access control .User & Group policy enforcement .5 kg. FTP.Alerts on appliance status change System Performance** Firewall throughput (UDP) (Mbps) Firewall throughput (TCP) (Mbps) New sessions/second Concurrent sessions 168-bit 3DES/AES throughput (Mbps) WAF Protected Throughput (Mbps) Anti-Virus throughput (Mbps) IPS throughput (Mbps) UTM throughput (Mbps) . Windows 2003 32-bit. Web filter.Subject line tagging . BGP. Twofish. Toll Free Numbers USA : +1-800-686-2360 | India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 C o p y r i g h t © 1999-2012 E l i t e c o r e Te c h n o l o g i e s Pvt.Administrative controls . Windows Vista 32/64-bit.16 .Categories: Default(82+). Phishing protection .User-based policy creation .Multi WAN bandwidth reporting .Supported platforms: Windows 2000.Protocol Anomaly Detection .Allow/Block Webcam .Block . Windows 7 RC1 32/64-bit . PPTP .Web-based configuration wizard . keyword. 3GModem failover .Filter based on message header. viruses and attacks .Hub & Spoke VPN support Stateful Inspection Firewall . PPPoE.UTM policies .DoS & DDoS Attack prevention .Granular access control to all the Enterprise Network resources .Application & User Identity based Traffic Discovery . DHCP server. RADIUS. SSH. Cyberoam . Trojan Detection & Removal .Historical and Real-time reports .Signatures: Default (3000+).Customize individual user scanning .Command Line Interface (Serial.Unique "Intuitive Website Flow Detector" technology .Time and Data Quota restriction . System and Admin Events Gateway Anti-Virus & Anti-Spyware .15. See http://www. DHCP relay . 14. IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines.“IPv6 Ready” Gold Logo Web Filtering .cyberoam.User . Email ID specific Monitoring Dashboard . AES.Thin Client support .Support for HTTP 0.Dead peer detection and PFS support . Virus.Extensive Logging & Reporting .External LDAP/RADIUS database integration . Telnet) . Skype .Failover .Specification Interfaces Copper GbE Ports Configurable Internal/DMZ/WAN Ports Console Ports (RJ45/DB9) USB Ports Hardware Bypass Segments 6 Yes 1 2 1* 2200 1500 12. HTTPS .Schedule based P2P and IM Controls Dimensions H x W x D (inches) H x W x D (cms) Weight 1.1 . Cookies.Layer 7 (Applications) & Layer 8 (User . Username/Password .ICSA Firewall .Allow/Block File Transfer . Traffic. L2TP.1 6.45+ Compliance Reports .Syslog support .PDF.1000+ drilldown reports .IPSec.Redirect Spam mails to dedicated email address .Keylogger .VPNC . Anti Virus. Web Filtering. PL-10-1000252-100602 Unified Threat Management www.0 compliant UI (HTTPS) . Host.Virus.Virus Scanning for IM traffic .MD5.Import Connection configuration Wireless WAN . transfer or otherwise revise the publication without notice.Access Control Criteria (ACC) .Layer 8 (User .Microsoft Windows Server 2003 Terminal Services and Citrix XenApp .Spam Notification through Digest .based Application Access .Identity) Firewall . Source & Destination Zone. French.NTP Support Virtual Private Network . Proxy ARP. Custom .Custom Alerts Gateway Anti-Spam . Digital certificates . SSH Logging/Monitoring . Although Elitecore has attempted to provide accurate information. WinXP 32/64-bit. Spam.TCP.Cyberoam Central Console (Optional) . Hindi. v2c. Serpent .com I sales@cyberoam.Policy routing based on Application and User .Integrated Web-based Reporting tool Cyberoam-iView . Search Engine keywords .Scans HTTP.Multi-format reports .Overlapping Network support .Preshared key. L2TP.IPS.Inbuilt Web Category Database .Application and User Identity based Bandwidth Management .Lightweight SSL VPN Tunneling Client . P2P. sender.CIPA Compliant .Primary WAN link .Security.Protection against SQL Injections.g. Elitecore assumes no responsibility for accuracy or completeness of information neither is this a legally binding representation. Gaming.Yahoo and Windows Live Messenger .Allow/Block Login .“Phone home” activities .Graphical real-time and historical monitoring .1q VLAN Support . PPTP & DDNS Client.Export Road Warrior connection configuration . v3) .Image-based Spam filtering using RPD Technology . VPN Tunnels . Ltd.Stateful failover . Pharming URLs .0/1. SMTP. File type block .Schedule based Committed and Burstable Bandwidth . LDAP.TCP & UDP Tunneling . Cross-site Scripting (XSS). ***Additional Purchase Required. HTTPS.000 450.Parent Proxy support with FQDN .3DES. SIP NAT Traversal .Web 2.Access time restriction . Session Hijacking. Proxy : 11+ .IPS Policies: Multiple.Access Scheduling . Custom .Username. DES.External Certificate Authority support .Policy based Source & Destination NAT .modify. Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt.IP Address Assignment .User/MAC Binding .P2P applications e.Reports .WRR based load balancing .Multi-lingual support: Chinese.Archive files transferred . Actual performance may vary depending on the real network traffic environments.Exportable formats . Anti-Spam and Bandwidth Management .IP address Black list/White list . Blowfish.Data leakage control via HTTP.Users and Administrators .IPSec NAT Traversal .Custom block messages per category . Excel .Allow/Block one-to-one/group chat . POP3.2.Log Viewer . Cookie Poisoning .Internal database . Dead Peer Detection. Multicast Forwarding .Automatic virus signature database update .UI Color Styler .14.Dynamic Routing: RIP v1& v2. SHA-1 .Guaranteed & Burstable bandwidth policy .Active Directory Integration .Active-Passive with State Synchronization .RSA securID support .MAC & IP-MAC filtering and Spoof prevention User Authentication .Email notification of reports.Automatic Windows Single Sign On .H.Split and Full tunneling . TELNET.Role-based access control .802.Real-time Blacklist (RBL).IM activities Log .HTTP.Static.g.