Friday, 5 June 2009

Cyberoam CR100ia - Comprehensive Network Security for Small and Remote

Cyberoam UTM

Cyberoam CR100ia is an identity-based security appliance that delivers real-time network protection against evolving Internet threats to small and medium enterprises (SMEs) through unique user based policies. CR100ia delivers comprehensive protection from malware, virus, spam, phishing, pharming and more. Its unique identity-based security protects users from internal threats that lead to data leakage. Cyberoam features include Stateful Inspection Firewall, VPN (SSL VPN & IPSec), Gateway Anti-Virus and Anti-Spyware, Gateway Anti-Spam, IPS, Content Filtering, Bandwidth Management, Multiple Link Management and can be centrally managed with Cyberoam Central Console.

Identity-based Security inUTM
Cyberoam attaches the user identity to security, taking enterprises a step ahead of conventional solutions that bind security to IP-addresses. Cyberoam's identity-based security offers full business flexibility while ensuring complete security in any environment, including DHCP and Wi-Fi, by identifying individual users within the network-whether they are victims or attackers.

Features

DescriptionBenefits
Stateful Inspection Firewall
(ICSA Labs Certified
)
  • Powerful stateful and deep packet inspection
  • Fusion technology blends all the components of Cyberoam into a single firewall policy
  • Prevents DoS & flooding attacks from internal & external sources
  • Identity-based access control for applications like P2P, IM
  • Application layer protection
  • Provides the right balance of security, connectivity and productivity
  • Flexibility to set policies by user identity
  • High scalability
Virtual Private Network
  • Threat Free Tunneling
  • Industry standard: IPSec, L2TP, PPTP VPN
  • VPN High Availability for IPSec and L2TP connections
  • Dual VPNC Certifications - Basic and AES Interop
  • Safe and clean VPN traffic
  • Secure connectivity to branch offices and remote users
  • Low cost remote connectivity over the Internet
  • Effective failover management with defined connectionpriorities
Gateway Anti-Virus
& Anti-Spyware
  • Scans HTTP, FTP, IMAP, POP3 and SMTP traffic
  • Detects and removes viruses, worms and Trojans
  • Access to quarantined mails to key executives
  • Instant user identification in case of HTTP threats
  • Complete protection of traffic over all protocols
  • High business flexibility
  • Protection of confidential information
  • Real-time security
Gateway Anti-Spam
  • Scans SMTP, POP3 and IMAP traffic for spam
  • Detects, tags and quarantines spam mail
  • Enforces black and white lists
  • Virus Outbreak Protection
  • Content-agnostic spam protection including Image-spam using Recurrent Pattern Detection (RPD ) Technology
  • Enhances productivity
  • High business flexibility
  • Protection from emerging threats
  • High scalability
  • Zero hour protection incase of virus outbreaks
  • Multi-language and Multi-format spam detection
Intrusion Prevention
System - IPS
  • Database of over 3000 signatures
  • Multi-policy capability with policies based on default & custom signatures, source and destination
  • Prevents intrusion attempts, DoS attacks, malicious code, backdoor activity and network-based blended threats
  • Blocks anonymous proxies with HTTP proxy signatures
  • Blocks “phone home” activities
  • Low false positives
  • Real-time Security in dynamic environments like DHCP and Wi-Fi
  • Offers instant user-identification in case of internal threats
  • Apply IPS policies on users
Content &
Application Filtering
  • Automated web categorization engine blocks non-work sites
    based on millions of sites in over 82+ categories
  • URL Filtering for HTTP & HTTPS protocols
  • Hierarchy, department, group, user-based filtering policies
  • Time-based access to pre-defined sites
  • Prevents downloads of streaming media, gaming, tickers, ads
  • Supports CIPA compliance for schools and libraries
  • Prevents exposure of network to external threats
  • Blocks access to restricted websites
  • Ensures regulatory compliance
  • Saves bandwidth and enhances productivity
  • Protects against legal liability
  • Ensures the safety and security of minors online
  • Enables schools to qualify for E-rate funding
Bandwidth Management
  • Committed and burstable bandwidth by hierarchy,
    departments, groups & users
  • Prevents bandwidth congestion
  • Prioritizes bandwidth for critical applications
Multiple Link Management
  • Security over multiple ISP links using a single appliance
  • Load balances traffic based on weighted round robin distribution
  • Link Failover automatically shifts traffic from a failed link to a working link
  • Easy to manage security over multiple links
  • Controls bandwidth congestion
  • Optimal use of low-cost links
  • Ensures business continuity
On-Appliance Reporting
  • Complete Reporting Suite available on the Appliance
  • Traffic discovery offers real-time reports
  • Reporting by username
  • Reduced TCO as no additional purchase required
  • Instant and complete visibility into patterns of usage
  • Instant identification of victims and attackers in internal network
Specification
Interfaces
10/100 Ethernet Ports-
10/100/1000 GBE Ports6
Configurable Internal/DMZ/WAN PortsYes
Console Ports (RJ45)-
SFP (Mini GBIC) Ports-
USB ports2
System Performance*
Firewall throughput (Mbps)1,000
New sessions/second10,000
Concurrent sessions400,000
168-bit Triple-DES/AES throughput (Mbps)80/100
Antivirus throughput (Mbps)200
IPS throughput (Mbps)300
UTM throughput (Mbps)160
Stateful Inspection Firewall
Multiple Zones security with separate levels of access rule enforcement for each zoneYes
Rules based on the combination of User, Source &
Destination Zone and IP address and Service
Yes
Actions include policy based control for IPS, Content
Filtering, Anti virus, Anti spam and Bandwidth Management
Yes
Access SchedulingYes
Policy based Source & Destination NATYes
H.323 NAT TraversalYes
802.1q VLAN SupportYes
DoS & DDoS Attack preventionYes
Gateway Anti-Virus & Anti-Spyware
Virus, Worm, Trojan Detection & RemovalYes
Spyware, Malware, Phishing protectionYes
Automatic virus signature database updateYes
Scans HTTP, FTP, SMTP, POP3, IMAP, VPN TunnelsYes
Customize individual user scanningYes
Self Service Quarantine areaYes
Scan and deliver by file sizeYes
Block by file typesYes
Gateway Anti-Spam
Real-time Blacklist (RBL), MIME header checkYes
Filter based on message header, size, sender, recipientYes
Subject line taggingYes
IP address Black list/White listYes
Redirect spam mails to dedicated email addressYes
Image-based spam filtering using RPD TechnologyYes
Zero hour Virus Outbreak ProtectionYes
Self Service Quarantine areaYes
Intrusion Prevention System
Signatures: Default (3000+), Custom Yes
IPS Policies: Multiple, Custom Yes
User-based policy creation Yes
Automatic real-time updates from CRProtect networksYes
Protocol Anomaly DetectionYes
Block
- P2P applications e.g. Skype
- Anonymous proxies e.g. UItra surf
- “Phone home” activities
- Keylogger

Yes
Yes
Yes
Yes

Content & Application Filtering
Inbuilt Web Category DatabaseYes
URL, keyword, File type blockYes
Categories: Default(82+), CustomYes
Protocols supported: HTTP, HTTPSYes
Block Malware, Phishing, Pharming URLsYes
Custom block messages per category Yes
Block Java Applets, Cookies, Active XYes
CIPA CompliantYes
Data leakage control via HTTP uploadYes
Virtual Private Network - VPN
IPSec, L2TP, PPTP Yes
Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent Yes
Hash Algorithms - MD5, SHA-1 Yes
Authentication - Preshared key, Digital certificates Yes
IPSec NAT Traversal Yes
Dead peer detection and PFS support Yes
Diffie Hellman Groups - 1,2,5,14,15,16 Yes
External Certificate Authority support Yes
Export Road Warrior connection configuration Yes
Domain name support for tunnel end points Yes
VPN connection redundancy Yes
Overlapping Network support Yes
Hub & Spoke VPN support Yes
SSL VPN
TCP & UDP TunnelingYes
Authentication - Active Directory, LDAP, RADIUS, CyberoamYes
Multi-layered Client Authentication - Certificate, Username/PasswordYes
Network access - Split and Full tunnelingYes
Browser-based (Portal) Access - Clientless accessYes
Lightweight SSL VPN Tunneling ClientYes
Granular access control to all the Enterprise Network resourcesYes
Administrative controls - Session timeout, Dead Peer Detection, Portal customizationYes
User & Group policy enforcementYes
Bandwidth Management
Application and User Identity based Bandwidth ManagementYes
Guaranteed & Burstable bandwidth policyYes
Application & User Identity based Traffic Discovery
Multi WAN bandwidth reporting
User Identity and Group Based Controls
Access time restrictionYes
Time and Data Quota restrictionYes
Schedule based Committed and Burstable BandwidthYes
Schedule based P2P and IM Controls Yes
Networking
Multiple Link Auto FailoverYes
WRR based Load balancingYes
Policy routing based on Application and UserYes
DDNS/PPPoE ClientYes
Support for HTTP ProxyYes
Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast ForwardingYes
Parent Proxy support with FQDNYes
High Availability
Active-Active Yes
Active-Passive with state synchronizationYes
Stateful FailoverYes
Alert on Appliance Status changeYes
Administration & System Management
Web-based configuration wizardYes
Role-based administrationYes
Multiple administrators and user levelsYes
Upgrades & changes via Web UIYes
Multi-lingual support: Chinese, HindiYes
Web UI (HTTPS)Yes
Command line interface (Serial, SSH, Telnet)Yes
SNMP (v1, v2c, v3)Yes
Cyberoam Central ConsoleYes
Version RollbackYes
NTP Server SupportYes
User Authentication
Local databaseYes
Windows Domain Control & Active Directory IntegrationYes
Automatic Windows Single Sign OnYes
External LDAP/RADIUS database IntegrationYes
User/MAC BindingYes
Logging/Monitoring
Internal HDDYes
Graphical real-time and historical monitoringYes
Email notification of reports, viruses and attacksYes
Syslog support Yes
On-Appliance Reporting
Intrusion events reportsYes
Policy violations reportsYes
Web Category reports (user, content type)Yes
Search Engine Keywords reportingYes
Data transfer reporting (By Host, Group & IP Address)Yes
Virus reporting by User and IP AddressYes
Compliance Reports45+
VPN Client
IPSec compliantYes
Inter-operability with major IPSec VPN GatewaysYes
Supported platforms: Windows 98, Me, NT4, 2000, XP, VistaYes
Import Connection configurationYes
Certification
ICSA Firewall - CorporateYes
VPNC - Basic and AES interoperabilityYes
Checkmark UTM Level 5 CertificationYes
Compliance
CE Yes
FCCYes
Dimensions
H x W x D (inches)16.8 x 10.3 x 1.7
H x W x D (cms)42.8 x 25.5 x 4.4
Weight 5.3 kg,11.68 lbs
Power
Input Voltage115-230 VAC
Consumption90W
Total Heat Dissipation (BTU)200
Environmental
Operating Temperature0 to 40 °C
Storage Temperature-20 to 80 °C
Relative Humidity (Non condensing)0 to 90%
Cooling System -Fans2

No comments:

Post a Comment