Data Sheet

Cyberoam CR50ia

Comprehensive Network Security for Small & Medium Offices

Unified Threat Management

A F/D

B

C

D

E

F RESET

CONSOLE

CR 50ia

VPNC
CERTIFIED
SSL Portal SSL Exchange

VPNC
CERTIFIED
Basic

SSL Firefox SSL JavaScript SSL Basic Network Extension SSL Advanced Network Extension

Interop
AES
www.check-mark.com

Interop

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to small and medium enterprises (SMEs) by allowing user identity-based policy controls.

BEST BUY

Cyberoam CR50ia rated as “BEST BUY” by SC Magazine

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies. Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

User Identity-based Security Policy Controls
L8 L7 L6 L5 L4 L3 L2 L1 USER Application Presentation ASCII, EBCDIC, ICA Session Transport Network Data Link Physical
L2TP, PPTP TCP, UDP 192.168.1.1
00-17-BB-8C-E3-E7

Cyberoam's Layer 8 Technology treats “User Identity” as the 8th Layer in the protocol stack
Cyberoam UTM offers security across Layer 2-Layer 8 using Identity-based policies

Cyberoam UTM features assure Security, Connectivity, Productivity

Security
Network Security - Firewall - Intrusion Prevention System - Wireless security Content Security - Anti-Virus/Anti-Spyware - Anti-Spam - HTTPS/SSL Content Security Administrative Security - Next-Gen UI - iView- Logging & Reporting

Connectivity
Business Continuity - Multiple Link Management - High Availability Network Availability - VPN - 3G/WiMAX Connectivity Future-ready Connectivity - “IPv6 Ready” Gold Logo

Productivity
Employee Productivity - Content Filtering - Instant Messaging Archiving & Controls IT Resource Optimization - Bandwidth Management - Traffic Discovery - Application Layer 7 Management Administrator Productivity - Next-Gen UI

Filter based on message header.User/MAC Binding .Certificate.3 4.Checkmark UTM Level 5 Certification .Corporate .45+ Compliance reports .Multi-lingual support: Chinese.PDF.Policy based Source & Destination NAT .Multi-layered Client Authentication . Web Filtering.External Certificate Authority support . Worm.Self Service Quarantine area .14. VPN Tunnels .Access Scheduling .cyberoam.URL.Cyberoam Central Console (Optional) .Application Categories e.3 kg.IP Reputation-based Spam filtering Wireless WAN . RDP. Excel . Ltd.5.Allow/Block Login .TCP.Specification Interfaces 10/100/1000 GBE Ports Configurable Internal/DMZ/WAN Ports Console Ports (RJ45/DB9) USB Ports Hardware Bypass Segments 6 Yes 1 2 1* 1000 750 8. Virus. WinXP 32/64bit. L2TP.3 x 42. BGP.g. Blowfish.Custom block messages per category .Spyware. keyword.Syslog support .Customize Individual user scanning .Identity) Visibility High Availability ## Virtual Private Network . IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. PPTP & DDNS Client.NTP Support Stateful Inspection Firewall .com I sales@cyberoam. size.Users and Administrators .Thin Client support .Yahoo and Windows Live Messenger . Trojan Detection & Removal .USB port 3G and WiMax Support . Although Elitecore has attempted to provide accurate information.Log Viewer .Dynamic Routing: RIP v1& v2. UItra surf Environmental Operating Temperature Storage Temperature Relative Humidity (Non condensing) *Antivirus. Windows 7 RC1 32/64-bit . Cookies.Multiple Authentication servers SSL VPN .SNMP (v1.WRR based Load balancing .Add disclaimer/signature Instant Messaging (IM) Management . SMTP. DES. **Additional Purchase Required Toll Free Numbers USA : +1-877-777-0368 | India : 1-800-301-00013 APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 C o p y r i g h t © 1999-2010 E l i t e c o r e Te c h n o l o g i e s Pvt. PPTP . File type block .Graphical real-time and historical monitoring .Identity.7 x 16.Authentication .Stateful Failover . Twofish. Anti-Spam and Bandwidth Management . MAC and IP address.Authentication . Active X .UTM policies . sender. Proxy: 11+ . PPPoE.IPS Policies: Multiple.Content-based blocking .Application & User Identity based Traffic Discovery . RADIUS.tabular.Scan and deliver by file size .Block .16 . IMAP.Keylogger .Schedule-based access control .1000+ drilldown reports . Custom .Command line interface (Serial.0 compliant UI (HTTPS) . Pharming URLs . Portal customization .Zero hour Virus Outbreak Protection . AES. French. Windows Vista 32/64-bit.Real-time Blacklist (RBL).Anonymous proxies e. SHA-1 .Primary WAN link . IM.DDoS Attack prevention Certification .Active Directory Integration . SSH Logging/Monitoring .IPv6 Ready Gold Logo User Identity and Group Based Controls .Access Control Criteria (ACC) . Username/Password . SIP NAT Traversal .Signatures: Default (3000+).Parent Proxy support with FQDN .Multiple Security Zones . PL-10-1000301-101011 Unified Threat Management www.68 lbs 100-240 VAC 90W 200 5 to 40 °C 0 to 70 °C 10 to 90% Power Input Voltage Consumption Total Heat Dissipation (BTU) Application Filtering . VPN.000 220. LDAP.Session timeout.Inter-operability with major IPSec VPN Gateways . 3G Modem failover .Web-based configuration wizard .External LDAP/RADIUS database Integration .1. DHCP server.Active-Passive with state synchronization .Static. Authentication.Internal database .Self Service Quarantine area .Schedule based P2P and IM Controls Web Filtering . FTP.Failover . viruses and attacks .Integrated Web-based Reporting tool Cyberoam-iView .VPN connection redundancy .g.Block by file types .Clientless access .Access time restriction .Supported platforms: Windows 2000.Schedule based Committed and Burstable Bandwidth . Web filter.External Authentication .IPSec. Hindi.8 x 10. Skype . Telnet) . P2P. Elitecore has the right to change.based Application Access .Exportable formats .Multi WAN bandwidth reporting . Application Filtering.Alerts on Appliance Status change System Performance* Firewall Throughput (UDP) (Mbps) Firewall Throughput (TCP) (Mbps) New sessions/second Concurrent sessions 168-bit 3DES/AES Throughput (Mbps) Antivirus Throughput (Mbps) IPS Throughput (Mbps) UTM Throughput (Mbps) Administration & System Management .Layer 8 (User .g.User .Spam Notification through Digest .Security.IPSec NAT Traversal . Phishing protection . HTTPS .Subject line tagging .IPv6 Ready Gold Logo Dimensions H x W x D (inches) H x W x D (cms) Weight 1. A l l R i g h t s R e s e r v e d.VPNC . MIME header check .Inbuilt Web Category Database .Categories: Default(82+).Scans HTTP.Image-based spam filtering using RPD Technology .Allow/Block Webcam .Multi-format reports .Guaranteed & Burstable bandwidth policy .com for supported USB devices. Dead Peer Detection.Block Java Applets. graphical .H.Automatic virus signature database update .Inbuilt Application Category Database . Actual performance may vary depending on the real network traffic environments.TCP & UDP Tunneling .Virus Scanning for IM traffic . Windows 2008 32/64-bit. Malware.RSA SecurID support .7 x 26.Role-based Access control .Application and User Identity based Bandwidth Management .Category-based Bandwidth restriction Intrusion Prevention System .Overlapping Network support . Digital certificates . POP3.MAC & IP-MAC filtering and Spoof prevention User Authentication .Identity) Firewall . ## High Availability is currently a Beta feature. v3) .Lightweight SSL VPN Tunneling Client .Block Malware.ICSA Firewall . Phishing. TELNET. Service . transfer or otherwise revise the publication without notice.Active Directory. Cyberoam .Automated Report Scheduling VIEW Cyberoam TM Gateway Anti-Spam .User & Group policy enforcement .Network access .Browser-based (Portal) Access .Reports . Anti-Spam. Proxy ARP.Granular access control to all the Enterprise Network resources .IPS.User-based policy creation .Archive files transferred .Historical and Real-time reports .Firmware Upgrades via Web UI .Preshared key. Policy violations.Administrative controls .MD5.Policy routing based on Application and User . v2c. See http://www.Domain name support for tunnel end points .2.000 60/90 150 200 130 . Anti-Virus.IP address Black list/White list .Automatic Windows Single Sign On .1q VLAN Support .IPS.Hash Algorithms .CIPA Compliant .IM activities Log .Export Road Warrior connection configuration . L t d.IP Address Assignment . Custom .“Phone home” activities . OSPF. Korean . L2TP.com Elitecore Product . Traffic.Automated Failover/Failback. IM. Multicast Forwarding .Dead Peer Detection and PFS support .Web 2. Elitecore assumes no responsibility for accuracy or completeness of information neither is this a legally binding representation.Data leakage control via HTTP.Custom Alerts On-Appliance Cyberoam-iView Reporting .WAN Backup link # IPSec VPN Client** . Gaming.Protocols supported: HTTP.2 5.Username. Source & Destination Zone. Custom .15.802. Anti-Virus. Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt.cyberoam. Serpent .Diffie Hellman Groups . HTTPS.Protocol Anomaly Detection .DoS & DDoS Attack prevention . Host. Email ID specific Monitoring Dashboard . HTTPS upload Compliance CE FCC Networking .Time and Data Quota restriction . Spam.HTTP. # 3G card and modem details are not included. Multi-WAN failover.3DES.Active-Active .P2P applications e. System and Admin Events Gateway Anti-Virus & Anti-Spyware .UI Color Styler .Split and Full tunneling . SSH. Search Engine keywords .Hub & Spoke VPN support .Email notification of reports.Schedule-based access control .Allow/Block one-to-one/group Chat . recipient .Allow/Block File Transfer .Encryption .Basic and AES interoperability .Virus.Support for HTTP Proxy .Redirect spam mails to dedicated email address .Microsoft Windows Server 2003 Terminal Services and Citrix XenApp . DHCP relay . Windows 2003 32-bit.Automatic real-time updates from CRProtect networks .Multiple Dashboards .Layer 7 (Application) Control & Visibility .Layer 7 (Applications) & Layer 8 (User .modify. 11.323.Import Connection configuration Bandwidth Management .

Sign up to vote on this title
UsefulNot useful