You are on page 1of 2

Data Sheet

Assured Connectivity with Security &


Cyberoam CR25ia
Productivity for Small & Remote Offices

Unified Threat Management CR 25ia


1000Mbps 1000Mbps 1000Mbps 1000Mbps VPNC
ACT ACT ACT ACT CERTIFIED

POWER HDD SSL


Portal
LAN/A WAN/B DMZ/C D SSL
Exchange

SSL
Firefox
VPNC SSL
CERTIFIED JavaScript
Basic SSL Basic
Interop Network Extension
AES SSL Advanced
www.check-mark.com Interop Network Extension

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to
Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user
identity-based policy controls.
Gartner positions
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the
Cyberoam UTM as a protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional
“Visionary” in Magic solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering
instant visibility into the source of attacks by username rather than IP address – allowing immediate
Quadrant for SMB remediation to restore security or allowing proactive security. Layer 8 technology functions along with each
Multifunction of Cyberoam security features to allow creation of identity-based security policies.
Firewalls
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can
grow with the future security needs of an organization without degrading system performance. ESA
supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

User Identity-based Security Policy Controls

L8 USER

L7 Application
Cyberoam's Layer 8 Technology treats
L6 Presentation ASCII, EBCDIC, ICA “User Identity” as the 8th Layer
in the protocol stack
L5 Session L2TP, PPTP

Transport Cyberoam UTM offers security across


L4 TCP, UDP
Layer 2-Layer 8 using Identity-based policies
L3 Network 192.168.1.1

L2 Data Link 00-17-BB-8C-E3-E7

L1 Physical

Cyberoam UTM features assure Security, Connectivity, Productivity

Security Connectivity Productivity

Network Security Business Continuity Employee Productivity


- Firewall - Multiple Link Management - Content Filtering
- Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls
- Wireless security
Network Availability IT Resource Optimization
Content Security - VPN - Bandwidth Management
- Anti-Virus/Anti-Spyware - 3G/WiMAX Connectivity - Traffic Discovery
- Anti-Spam - Application Layer 7 Management
- HTTPS/SSL Content Security Future-ready Connectivity
- “IPv6 Ready” Gold Logo Administrator Productivity
Administrative Security - Next-Gen UI
- Next-Gen UI
- iView- Logging & Reporting
Specification
##
Interfaces Web Application Firewall Administration & System Management
Copper GbE Ports 4 - Positive Protection model - Web-based configuration wizard
Configurable Internal/DMZ/WAN Ports Yes - Unique "Intuitive Website Flow Detector" technology - Role-based access control
Console Ports (RJ45/DB9) 1 - Protection against SQL Injections, Cross-site Scripting - Firmware Upgrades via Web UI
USB Ports 1 (XSS), Session Hijacking, URL Tampering, Cookie - Web 2.0 compliant UI (HTTPS)
Poisoning - UI Color Styler
System Performance* - Support for HTTP 0.9/1.0/1.1 - Command Line Interface (Serial, SSH, Telnet)
Firewall throughput (UDP) (Mbps) 450 - Extensive Logging & Reporting - SNMP (v1, v2c, v3)
Firewall throughput (TCP) (Mbps) 225 - Multi-lingual support: Chinese, Hindi, French, Korean
New sessions/second 3,500 Virtual Private Network - Cyberoam Central Console (Optional)
Concurrent sessions 130,000 - IPSec, L2TP, PPTP - NTP Support
168-bit 3DES/AES throughput (Mbps) 30/75 - Encryption - 3DES, DES, AES, Twofish, Blowfish,
Anti-Virus throughput (Mbps) 65 Serpent User Authentication
IPS throughput (Mbps) 70 - Hash Algorithms - MD5, SHA-1 - Internal database
UTM throughput (Mbps) 50 - Authentication - Preshared key, Digital certificates - Active Directory Integration
- IPSec NAT Traversal - Automatic Windows Single Sign On
Stateful Inspection Firewall - Dead peer detection and PFS support - External LDAP/RADIUS database integration
- Layer 8 (User - Identity) Firewall - Diffie Hellman Groups - 1,2,5,14,15,16 - Thin Client support - Microsoft Windows Server 2003
- Multiple Security Zones - External Certificate Authority support Terminal Services and Citrix XenApp
- Access Control Criteria (ACC) - User - Identity, Source & - Export Road Warrior connection configuration - RSA securID support
Destination Zone, MAC and IP address, Service - Domain name support for tunnel end points - External Authentication - Users and Administrators
- UTM policies - IPS, Web Filtering, Application Filtering, - VPN connection redundancy - User/MAC Binding
Anti-Virus, Anti-Spam and Bandwidth Management - Overlapping Network support - Multiple Authentication servers
- Layer 7 (Application) Control & Visibility - Hub & Spoke VPN support
- Access Scheduling Logging/Monitoring
- Policy based Source & Destination NAT SSL VPN - Graphical real-time and historical monitoring
- H.323, SIP NAT Traversal - TCP & UDP Tunneling - Email notification of reports, viruses and attacks
- 802.1q VLAN Support - Authentication - Active Directory, LDAP, RADIUS, - Syslog support
- DoS & DDoS Attack prevention Cyberoam - Log Viewer - IPS, Web filter, Anti Virus, Anti Spam,
- MAC & IP-MAC filtering and Spoof prevention - Multi-layered Client Authentication - Certificate, Authentication, System and Admin Events
Username/Password
Gateway Anti-Virus & Anti-Spyware - User & Group policy enforcement On-Appliance Cyberoam-iView Reporting Cyberoam TM

- Virus, Worm, Trojan Detection & Removal - Network access - Split and Full tunneling - Integrated Web-based Reporting tool - VIEW
- Spyware, Malware, Phishing protection - Browser-based (Portal) Access - Clientless access Cyberoam-iView
- Automatic virus signature database update - Lightweight SSL VPN Tunneling Client - 1000+ drilldown reports
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, - Granular access control to all the Enterprise Network - 45+ Compliance Reports
VPN Tunnels resources - Historical and Real-time reports
- Customize individual user scanning - Administrative controls - Session timeout, Dead Peer - Multiple Dashboards
- Self Service Quarantine area Detection, Portal customization - Username, Host, Email ID specific Monitoring
- Scan and deliver by file size - TCP- based Application Access - HTTP, HTTPS, RDP, Dashboard
- Block by file types TELNET, SSH - Reports - Security, Virus, Spam, Traffic, Policy
- Add disclaimer/signature violations, VPN, Search Engine keywords
Instant Messaging (IM) Management - Multi-format reports - tabular, graphical
Gateway Anti-Spam - Yahoo and Windows Live Messenger - Exportable formats - PDF, Excel
- Real-time Blacklist (RBL), MIME header check - Virus Scanning for IM traffic - Automated Report Scheduling
- Filter based on message header, size, sender, recipient - Allow/Block Login
- Subject line tagging - Allow/Block File Transfer IPSec VPN Client**
- IP address Black list/White list - Allow/Block Webcam - Inter-operability with major IPSec VPN Gateways
- Redirect Spam mails to dedicated email address - Allow/Block one-to-one/group chat - Supported platforms: Windows 2000, WinXP 32/64-bit,
- Image-based Spam filtering using RPD Technology - Content-based blocking Windows 2003 32-bit, Windows 2008 32/64-bit,
- Zero hour Virus Outbreak Protection - IM activities Log Windows Vista 32/64-bit, Windows 7 RC1 32/64-bit
- Self Service Quarantine area - Archive files transferred - Import Connection configuration
- Spam Notification through Digest - Custom Alerts
- IP Reputation-based Spam filtering Certification
Wireless WAN - ICSA Firewall - Corporate
#
Intrusion Prevention System - USB port 3G and Wimax Support - Checkmark UTM Level 5 Certification
- Signatures: Default (3000+), Custom - Primary WAN link - VPNC - Basic and AES interoperability
- IPS Policies: Multiple, Custom - WAN Backup link - “IPv6 Ready” Gold Logo
- User-based policy creation
- Automatic real-time updates from CRProtect networks Bandwidth Management Compliance
- Protocol Anomaly Detection - Application and User Identity based Bandwidth CE
- DDoS attack prevention Management FCC
- Guaranteed & Burstable bandwidth policy
Web Filtering - Application & User Identity based Traffic Discovery Dimensions
- Inbuilt Web Category Database - Multi WAN bandwidth reporting H x W x D (inches)
- Category-based bandwidth restriction 1.7 x 6 x 9.1
- URL, keyword, File type block H x W x D (cms) 4.4 x 15.3 x 23.2
- Categories: Default(82+), Custom Weight 2.3 kg, 5.07 lbs
- Protocols supported: HTTP, HTTPS User Identity and Group Based Controls
- Block Malware, Phishing, Pharming URLs - Access time restriction Power
- Schedule-based access control - Time and Data Quota restriction Input Voltage 100-240 VAC
- Custom block messages per category - Schedule based Committed and Burstable Bandwidth Consumption 33.5W
- Block Java Applets, Cookies, Active X - Schedule based P2P and IM Controls Total Heat Dissipation (BTU) 114
- CIPA Compliant
- Data leakage control via HTTP, HTTPS upload Networking Environmental
- Failover - Automated Failover/Failback, Multi-WAN Operating Temperature 0 to 40 °C
Application Filtering failover, 3GModem failover Storage Temperature -25 to 75 °C
- Inbuilt Application Category Database - WRR based load balancing Relative Humidity (Non condensing) 10 to 90%
- Application Categories: e.g. Gaming, IM, P2P, - Policy routing based on Application and User
Proxy : 11+ - IP Address Assignment - Static, PPPoE, L2TP, PPTP &
- Schedule-based access control DDNS Client, Proxy ARP, DHCP server, DHCP relay
- Block - Support for HTTP Proxy
- P2P applications e.g. Skype - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast
- Anonymous proxies e.g. UItra surf Forwarding
- “Phone home” activities - Parent Proxy support with FQDN
- Keylogger - “IPv6 Ready” Gold Logo
- Layer 7 (Applications) & Layer 8 (User - Identity)
Visibility High Availability
- Active-Active
- Active-Passive with State Synchronization
- Stateful failover
- Alerts on appliance status change

*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
# ##
**Additional Purchase Required. 3G card and modem details are not included. See http://www.cyberoam.com for supported USB devices. Subscription available in all the Models of CR50ia & above.

Toll Free Numbers C o p y r i g h t © 1999-2013 Cyberoam Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.


Cyberoam and Cyberoam logo are registered trademark of Cyberoam Technologies Pvt. Ltd. Although
USA : +1-800-686-2360 | India : 1-800-301-00013 Cyberoam has attempted to provide accurate information, Cyberoam assumes no responsibility for accuracy or
completeness of information neither is this a legally binding representation. Cyberoam has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000252-100423 Unified Threat Management

www.cyberoam.com I sales@cyberoam.com

You might also like