Introduction
Cyberoam Appliance should undergo regular maintenance for smooth and efficient functioning of the
Appliance. The various tasks involved in Maintenance are as follows.
Securing Backup
Updating Appliance Firmware
Configuring Email Alerts
Validating Subscriptions
Checking Status of Services
Updating User Accounts and User Groups
Updating Policies
Securing Access to Appliance
Updating Firewall Rules
Reviewing Denial of Service (DoS) Settings
Monitoring Appliance Health
Configuring iView Logs & Reports
Securing Backup
Taking backup of Cyberoam Appliance Configuration enables us to preserve a copy of all current
configurations. It is advisable to take a backup of Cyberoam Appliance Configuration on a regular
basis. In case of equipment failure or other anomaly, the backup can be restored on an existing
appliance after repairs or can be applied to a new appliance to facilitate recovery. For details on how
to take a backup of Cyberoam Appliance configuration, click here.
Validating Subscriptions
Cyberoam Appliance contains 2 types of modules:
Basic modules Firewall, VPN, Multi Link Management, Bandwidth Management, Real-time
Blackhole List (RBL), Traffic Discovery and On-Appliance Reports.
Subscription modules - Gateway Anti Virus, Gateway Anti Spam (Inbound and Outbound),
Intrusion Detection and Prevention, Web and Application Filtering, Web Application Filtering
(WAF), 8x5 support, 24x7 support.
Basic modules are pre-registered with the Appliance for an indefinite time period. Subscription
modules are to be subscribed at regular intervals. In case one or more of the Subscription Modules
has expired or is on the verge of expiry, renew the same to continue enjoying the benefits. For details
on how to renew the subscription of a module, click here.
Anti Spam
Anti Virus
Authentication
DNS Server
IPS
Web Proxy
WAF
DHCP Server
DHCPv6 Server
Router Advertisement Service
It is a good practice to regularly check if these services are up and running. To check and manage
services, go to System > Maintenance > Services. The following screen appears.
Usage
Start
Stop
Restart
Updating Policies
Cyberoam Appliance enforces many rules and policies upon users to ensure that they have a safe
and productive Internet experience. These policies are:
These policies should be regularly updated to reflect changing Network Environment and User Surfing
Patterns in the organization to ensure optimal usage of the Appliance .For details on how to manage
various Cyberoam Policies, refer to the User Guide.
Configuring too high Threshold Values degrades system performance while too low values blocks
regular requests. For details on how to protect Cyberoam from DoS attacks, click here.
Again, Cyberoam allows you to bypass DoS rules in case you are sure that the specified source will
not be used for flooding or ignore if flooding occurs from the specified source These Rules should be
updated from time to time so that they are in accordance with changing Network Environment.
Unused Rules should be deleted to reduce system overhead.
For details on how to create a Bypass Rule, click here.
Live Graph
CPU usage Information
Memory usage Information
Load Average
Interface usage Information
Utility wise graphs show the same graphs regrouped based on the time interval. Use these statistics
to verify System Utilization. In case of any discrepancy, contact Cyberoam Technical Support at
support@cyberoam.com.
Firewall log
Anti-virus infection and blocking
Web filtering, URL and HTTP content blocking
Signature and anomaly attack and prevention
Spam filtering
IM logs
Administrator logs
User Authentication logs
Cyberoam-iView emails these reports in PDF format to specified email addresses according to the
configured frequency. Hence, ensure that correct Email Addresses are configured in iView report
notifications. Also, ensure that appropriate log retention period is configured to retain the logs. For
details on how to manage Log Retention Period in iView, click here.