Sie sind auf Seite 1von 2

Unified Threat Management CR35iNG

Future-ready

Future-ready Security for SOHO/ROBO networks CR35iNG Data Sheet

Cyberoam NG series of Unified Threat Management appliances are the Next-Generation network security
appliances that include UTM security features and performance required for future networks. The NG
series for SOHO offer the fastest UTMs made for SMBs to small offices. The best-in-class hardware
along with software to match, enables the NG series to offer unmatched throughput speeds,
compared to any other UTM appliance in this market segment. This assures support for future IT
trends in organizations like high-speed Internet and rising number of devices in organizations
offering future-ready security for small office networks.

The Next-Generation Series for SOHO:


With Cyberoam NG series, businesses get assured Security, Connectivity and
Productivity. The Layer 8 Technology treats User-Identity as the 8th Layer or the Offering the fastest UTMs made for SMBs
HUMAN layer in the protocol stack. It attaches User-Identity to security, which to Small Offices
adds speed to an organizations security by offering instant visibility into the
source of attacks by username rather than only IP address. Cyberoams
Extensible Security Architecture (ESA) supports feature
enhancements that can be developed rapidly and deployed with Cyberoam's Layer 8 Technology treats
minimum efforts, offering future-ready security to organizations. User Identity as the 8th Layer in the
protocol stack

VPNC
L8 USER
CERTIFIED
SSL
Portal
SSL
Exchange
L7 Application
SSL
Firefox
VPNC
CERTIFIED
Basic
SSL
JavaScript

SSL Basic
L6 Presentation ASCII, EBCDIC, ICA
Interop Network Extension

www.check-mark.com
AES
Interop
SSL Advanced
Network Extension Cyberoam UTM offers security
L5 Session L2TP, PPTP
across Layer 2-Layer 8 using
L4 Transport TCP, UDP Identity-based policies

L3 Network 192.168.1.1

L2 Data Link 00-17-BB-8C-E3-E7

L1 Physical

Cyberoam UTM features assure Security, Connectivity, Productivity

Security Connectivity Productivity


Network Security Business Continuity Employee Productivity
- Firewall - Multiple Link Management - Content Filtering
- Intrusion Prevention System - High Availability - Instant Messaging Archiving & Controls
- Web Application Firewall
Network Availability IT Resource Optimization
Content Security - VPN - Bandwidth Management
- Anti-Virus/Anti-Spyware - 3G/4G/WiMAX Connectivity - Traffic Discovery
- Anti-Spam (Inbound/Outbound)## - Application Visibility & Control
- HTTPS/SSL Content Security Future-ready Connectivity
- IPv6 Ready Gold Logo Administrator Productivity
Administrative Security - Next-Gen UI
- Next-Gen UI
- iView- Logging & Reporting
Specification
Interfaces Web Application Firewall Administration & System Management
Copper GbE Ports 6 - Positive Protection model - Web-based configuration wizard
Configurable Internal/DMZ/WAN Ports Yes - Unique "Intuitive Website Flow Detector" technology - Role-based access control
Console Ports (RJ45) 1 - Protection against SQL Injections, Cross-site Scripting - Firmware Upgrades via Web UI
USB Ports 2 (XSS), Session Hijacking, URL Tampering, Cookie - Web 2.0 compliant UI (HTTPS)
Poisoning - UI Color Styler
System Performance* - Support for HTTP 0.9/1.0/1.1 - Command Line Interface (Serial, SSH, Telnet)
2,300 - Extensive Logging & Reporting - SNMP (v1, v2c, v3)
Firewall Throughput (UDP) (Mbps)
Firewall Throughput (TCP) (Mbps) 2,000 - Multi-lingual support: Chinese, Hindi, French, Korean
New sessions/second 11,000 Virtual Private Network - Cyberoam Central Console (Optional)
Concurrent sessions 350,000 - IPSec, L2TP, PPTP - Network Time Protocol Support
IPSec VPN Throughput (Mbps) 250 - Encryption - 3DES, DES, AES, Twofish, Blowfish,
No. of IPSec Tunnels 150 Serpent User Authentication
SSL VPN Throughput (Mbps) 100 - Hash Algorithms - MD5, SHA-1 - Internal database
WAF Protected Throughput (Mbps) 65 - Authentication - Preshared key, Digital certificates - Active Directory Integration
Anti-Virus Throughput (Mbps) 525 - IPSec NAT Traversal
- Automatic Windows Single Sign On
IPS Throughput (Mbps) 350 - Dead peer detection and PFS support
- External LDAP/RADIUS database integration
UTM Throughput (Mbps) 210 - Diffie Hellman Groups - 1,2,5,14,15,16
- External Certificate Authority support - Thin Client support - Microsoft Windows Server 2003
- Export Road Warrior connection configuration Terminal Services and Citrix XenApp - Novell eDirectory
Stateful Inspection Firewall - RSA SecurID support
- Layer 8 (User - Identity) Firewall - Domain name support for tunnel end points
- VPN connection redundancy - External Authentication - Users and Administrators
- Multiple Security Zones - User/MAC Binding
- Access Control Criteria (ACC) - User - Identity, Source & - Overlapping Network support
- Hub & Spoke VPN support - Multiple Authentication servers
Destination Zone, MAC and IP address, Service
- UTM policies - IPS, Web Filtering, Application Filtering, Logging/Monitoring
Anti-Virus, Anti-Spam and Bandwidth Management
SSL VPN
- TCP & UDP Tunneling - Graphical real-time and historical monitoring
- Layer 7 (Application) Control & Visibility
- Authentication - Active Directory, LDAP, RADIUS, - Email notification of reports, gateway status, viruses and
- Access Scheduling
Cyberoam attacks
- Policy based Source & Destination NAT
- H.323, SIP NAT Traversal - Multi-layered Client Authentication - Certificate, - Syslog support
- 802.1q VLAN Support Username/Password - Log Viewer - Firewall, IPS, Web filter, Anti Virus, Anti Spam,
- DoS & DDoS Attack prevention - User & Group policy enforcement Authentication, System and Admin Events
- MAC & IP-MAC filtering and Spoof prevention - Network access - Split and Full tunneling
- Browser-based (Portal) Access - Clientless access On-Appliance Cyberoam-iView Reporting Cyberoam TM

- Lightweight SSL VPN Tunneling Client VIEW


Gateway Anti-Virus & Anti-Spyware - Integrated Web-based Reporting tool -
- Virus, Worm, Trojan: Detection & Removal - Granular access control to all the Enterprise Network Cyberoam-iView
- Spyware, Malware, Phishing protection resources - 1000+ drilldown reports
- Automatic virus signature database update - Administrative controls - Session timeout, Dead Peer - 45+ Compliance Reports
- Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, Detection, Portal customization - Historical and Real-time reports
VPN Tunnels - TCP- based Application Access - HTTP, HTTPS, RDP, - Multiple Dashboards
- Customize individual user scanning TELNET, SSH - Username, Host, Email ID specific Monitoring Dashboard
- Self Service Quarantine area - Reports - Security, Virus, Spam, Traffic, Policy violations,
- Scan and deliver by file size Instant Messaging (IM) Management VPN, Search Engine keywords
- Block by file types - Yahoo and Windows Live Messenger - Multi-format reports - tabular, graphical
- Add disclaimer/signature - Virus Scanning for IM traffic - Exportable formats - PDF, Excel
- Allow/Block Login - Automated Report Scheduling
Gateway Anti-Spam - Allow/Block File Transfer
- Inbound/Outbound Scanning - Allow/Block Webcam IPSec VPN Client**
- Real-time Blacklist (RBL), MIME header check - Allow/Block one-to-one/group chat - Inter-operability with major IPSec VPN Gateways
- Filter based on message header, size, sender, recipient - Content-based blocking - Supported platforms: Windows 2000, WinXP 32/64-bit,
- Subject line tagging - IM activities Log Windows 2003 32-bit, Windows 2008 32/64-bit, Windows
- IP address Black list/White list - Archive files transferred Vista 32/64-bit, Windows 7 RC1 32/64-bit
- Redirect Spam mails to dedicated email address - Custom Alerts - Import Connection configuration
- Image-based Spam filtering using RPD Technology
- Zero hour Virus Outbreak Protection Wireless WAN Certification
- Self Service Quarantine area - USB port 3G/4G and Wimax Support - ICSA Firewall - Corporate
- Spam Notification through Digest - Primary WAN link - Checkmark UTM Level 5 Certification
- IP Reputation-based Spam filtering - WAN Backup link - VPNC - Basic and AES interoperability
- IPv6 Ready Gold Logo
Intrusion Prevention System Bandwidth Management
- Signatures: Default (4500+), Custom - Application and User Identity based Bandwidth Hardware Specifications
- IPS Policies: Multiple, Custom Management Memory 1GB
- User-based policy creation - Guaranteed & Burstable bandwidth policy Compact Flash 2GB
- Automatic real-time updates from CRProtect networks - Application & User Identity based Traffic Discovery HDD 250GB or higher
- Protocol Anomaly Detection - Multi WAN bandwidth reporting
- DDoS attack prevention - Category-based bandwidth restriction Compliance
CE
Web Filtering User Identity and Group Based Controls FCC
- Inbuilt Web Category Database - Access time restriction
- URL, keyword, File type block - Time and Data Quota restriction Dimensions
- Categories: Default(82+), Custom - Schedule based Committed and Burstable Bandwidth H x W x D (inches) 1.7 x 6 x 9.1
- Protocols supported: HTTP, HTTPS - Schedule based P2P and IM Controls H x W x D (cms) 4.4 x 15.3 x 23.2
- Block Malware, Phishing, Pharming URLs Weight 2.3 kg, 5.07 lbs
- Schedule-based access control Networking
- Custom block messages per category - Failover - Automated Failover/Failback, Multi-WAN Power
- Block Java Applets, Cookies, Active X failover, 3GModem failover Input Voltage 100-240 VAC
- CIPA Compliant - WRR based load balancing Consumption 47.8W
- Data leakage control via HTTP, HTTPS upload - Policy routing based on Application and User Total Heat Dissipation (BTU) 163
- IP Address Assignment - Static, PPPoE, L2TP, PPTP &
Application Filtering DDNS Client, Proxy ARP, DHCP server, DHCP relay Environmental
- Inbuilt Application Category Database - Support for HTTP Proxy Operating Temperature 0 to 40 C
- 11+ Application Categories: e.g. Gaming, IM, P2P, - Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Storage Temperature -25 to 75 C
Proxy Forwarding Relative Humidity (Non condensing) 10 to 90%
- Schedule-based access control - Parent Proxy support with FQDN
- Block - IPv6 Ready Gold Logo
- P2P applications e.g. Skype
- Anonymous proxies e.g. UItra surf High Availability
- Phone home activities - Active-Active
- Keylogger - Active-Passive with State Synchronization
- Layer 7 (Applications) & Layer 8 (User - Identity) - Stateful failover
Visibility - Alerts on appliance status change

*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
##
**Additional Purchase Required. Inbound and Outbound Spam filtering cannot be used simultaneously.

Toll Free Numbers C o p y r i g h t 1999-2012 Cyberoam Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d.


Cyberoam and Cyberoam logo are registered trademark of Elitecore Technologies Pvt. Ltd. Although
USA : +1-800-686-2360 | India : 1-800-301-00013 Elitecore has attempted to provide accurate information, Elitecore assumes no responsibility for accuracy
or completeness of information neither is this a legally binding representation. Elitecore has the right to
APAC/MEA : +1-877-777-0368 | Europe : +44-808-120-3958 change,modify, transfer or otherwise revise the publication without notice. PL-10-1000252-100718 Unified Threat Management

www.cyberoam.com I sales@cyberoam.com

Das könnte Ihnen auch gefallen