Online IT store
Cyberoam cr100ing network firewall
Cyberoam cr100ing network firewallNIT-CYB-08a

Cyberoam cr100ing


Cyberoam CR100iNG
8×10/100/1000 Ethernet ports, 4500 Mbps Firewall Throughput, 750 Mbps UTM Throughput

Product Description

Cyberoam delivers a cost-effective and comprehensive Unified Threat Management (UTM) solution, delivering enterprise-class Security Appliances to Small & Medium Enterprises (SMEs) with 60-400 users. SMEs can function with assured Security-Connectivity-Productivity, with Cyberoam UTM protection over a single security appliance, eliminating the need to invest in multiple solutions.

Product Features
Stateful Inspection Firewall
Intrusion Prevention System
Anti-Virus & Anti-Spyware
Outbound Spam Protection
Web Filtering
Bandwidth Management
Application Visibility & Control
Web Application Firewall
3G / 4G / WiMAx Connectivity
IM Archiving & Controls
Multiple Link Management
On-Appliance Reporting
IPv6 Ready
Wi-Fi Appliances

Product Features


Hardware Specifications
Copper GbE Ports88
1GbE SFP (Mini GBIC) Ports
10GbE SFP (Mini GBIC) Ports
Console Ports (RJ45)11
USB Ports22
Hardware Bypass Segments#22
Configurable Internal/DMZ/WAN PortsYesYes
System Performance*
Firewall Throughput (UDP) (Mbps)3,2504,500
Firewall Throughput (TCP) (Mbps)3,0003,500
New sessions/second30,00045,000
Concurrent sessions1,000,0001,250,000
IPSec VPN Throughput (Mbps)400450
No. of IPSec Tunnels200250
SSL VPN Throughput (Mbps)300400
WAF Protected Throughput (Mbps)300500
Anti-Virus Throughput (Mbps)1,0001,400
IPS Throughput (Mbps)7501,200
UTM Throughput (Mbps)550750
Authenticated Users/NodesUnlimitedUnlimited

# If Enabled, will bypass traffic only in case of Power failure.
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.

Key Features
Layer 8 Identity-based policies Role-based access at remote locations
Visibility into who is doing what
Comprehensive UTM Security Stateful Inspection Firewall
Intrusion Prevention System
Anti-Virus & Anti-Spyware
Web Filtering
Application Visibility & Control
On-appliance Reporting
Web Application Firewall
Outbound Spam Protection
Secure Remote AccessIPSec VPN
WAN Connectivity & AvailabilityBandwidth Management
Multiple Link Management
3G / WiMAx Support
Advanced NetworkingMulti-core Processing
Extensible Security Architecture
Active-Active High Availability
IPv6 Ready Gold Certified
Wi-Fi SecurityWireless Standards IEEE 802.11 n/b/g (WEP, WPA, WPA2, 802.11i, TKIP, AES, PSK, 802.1x EAP)
Up to 8 bssid Access Points
Centralized Security ManagementCCC Appliances
Cyberoam iView Open Source Solution – Logging & Reporting
Cyberoam iView Appliances – Logging & Reporting



Copper GbEPorts8
Configurable Internal/DMZ/WANPortsYes
Console Ports (RJ45)1
USB Ports2
Hardware Bypass Segment#2

System Performance*

Firewall Throughput (UDP)4,500
Firewall Throughput (TCP)3,500
New sessions/second45,000
Concurrent sessions1,250,000
IPSec VPN Throughput450
No. of IPSec Tunnels250
SSL VPN Throughput400
WAF Protected Throughput (Mbps)500
Anti-Virus Throughput1,400
IPS Throughput1,200
UTM Throughput750

Stateful Inspection Firewall

– Layer 8 (User – Identity) Firewall
– Multiple Security Zones
– Access Control Criteria (ACC) – User – Identity, Source &
Destination Zone,MACand IP address, Service
– UTM policies – IPS, Web Filtering, Application Filtering,
Anti-Virus, Anti-Spam and Bandwidth Management
– Layer 7 (Application) Control &Visibility
-Access Scheduling
– Policy based Source &DestinationNAT
– H.323, SIPNATTraversal
– 802.1q VLAN Support
– DoS &DDoSAttack prevention
-MAC&IP-MAC filtering and Spoof prevention

GatewayAnti-Virus & Anti-Spyware

-Virus,Worm,Trojan: Detection &Removal
– Spyware, Malware, Phishing protection
-Automatic virus signature database update
VPN Tunnels
– Customize individual user scanning
– Self Service Quarantine area
– Scan and deliver by file size
– Block by file types
-Add disclaimer/signature

Gateway Anti-Spam

– Inbound/Outbound Scanning
– Real-time Blacklist (RBL), MIME header check
– Filter based on message header, size, sender, recipient
– Subject line tagging
– IP address Black list/White list
– Redirect Spam mails to dedicated email address
– Image-based Spam filtering usingRPDTechnology
– Zero hour Virus Outbreak Protection
– Self Service Quarantine area
– Spam Notification through Digest
– IP Reputation-based Spam filtering

Intrusion Prevention System

– Signatures: Default (4500+), Custom
– IPS Policies: Multiple, Custom
– User-based policy creation
-Automatic real-time updates from CRProtect networks
– ProtocolAnomaly Detection
-DDoS attack prevention

Web Filtering

– InbuiltWeb Category Database
– URL, keyword, File type block
– Categories: Default(82+), Custom
– Protocols supported: HTTP, HTTPS
– Block Malware, Phishing, Pharming URLs
– Schedule-based access control
– Custom block messages per category
– Block JavaApplets, Cookies,Active x
– CIPA Compliant
– Data leakage control via HTTP, HTTPS upload

Application Filtering

– Inbuilt Application Category Database
– 11+ Application Categories: e.g. Gaming, IM, P2P, Proxy
– Schedule-based access control
– Block

– P2Papplications e.g. Skype
-Anonymous proxies e.g. UItra surf
– “Phone home” activities
– Keylogger

– Layer 7 (Applications) & Layer 8 (User – Identity) Visibility

Web Application Firewall

– Positive Protection model
– Unique “Intuitive Website Flow Detector” technology
– Protection against SQL Injections, Cross-site Scripting
(xSS), Session Hijacking, URL Tampering, Cookie
– Support for HTTP 0.9/1.0/1.1
– Extensive Logging & Reporting

Virtual Private Network

– Encryption – 3DES, DES, AES, Twofish, Blowfish,
– HashAlgorithms – MD5, SHA-1
-Authentication – Preshared key, Digital certificates
– IPSecNATTraversal
– Dead peer detection and PFS support
– Diffie Hellman Groups – 1,2,5,14,15,16
– External Certificate Authority support
– Export RoadWarrior connection configuration
– Domain name support for tunnel end points
-VPNconnection redundancy
– Overlapping Network support
– Hub &SpokeVPNsupport


– Authentication – Active Directory, LDAP, RADIUS,
– Multi-layered Client Authentication – Certificate,
– User &Group policy enforcement
– Network access – Split and Full tunneling
– Browser-based (Portal)Access – Clientless access
– Lightweight SSLVPNTunneling Client
– Granular access control to all the Enterprise Network
– Administrative controls – Session timeout, Dead Peer
Detection, Portal customization
– TCP- based Application Access – HTTP, HTTPS, RDP,

Instant Messaging (IM) Management

-Yahoo and Windows Live Messenger
-Virus Scanning for IM traffic
-Allow/Block Login
-Allow/Block FileTransfer
-Allow/Block one-to-one/group chat
– Content-based blocking
– IM activities Log
-Archive files transferred
– CustomAlerts


-USBport 3G/4G and Wimax Support
– PrimaryWANlink
-WANBackup link

Bandwidth Management

– Application and User Identity based Bandwidth
– Guaranteed &Burstable bandwidth policy
– Application &User Identity basedTraffic Discovery
– MultiWANbandwidth reporting
– Category-based bandwidth restriction

User Identity and Group Based Controls

-Access time restriction
-Time and Data Quota restriction
– Schedule based Committed and Burstable Bandwidth
– Schedule based P2Pand IM Controls


– Failover – Automated Failover/Failback, Multi-WAN
failover, 3GModem failover
-WRRbased load balancing
– Policy routing based onApplication and User
– IP Address Assignment – Static, PPPoE, L2TP, PPTP &
DDNSClient, ProxyARP,DHCPserver,DHCPrelay
– Support for HTTPProxy
– Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast
– Parent Proxy support withFQDN
– “IPv6 Ready” Gold Logo

High Availability

– Active-Active
-Active-Passive with State Synchronization
– Stateful failover
– Alerts on appliance status change

Administration & System Management

-Web-based configuration wizard
– Role-based access control
– Firmware Upgrades viaWeb UI
-Web 2.0 compliant UI (HTTPS)
– UI Color Styler
– Command Line Interface (Serial, SSH,Telnet)
-SNMP(v1, v2c, v3)
– Multi-lingual support: Chinese, Hindi, French, Korean
– Cyberoam Central Console (Optional)
– Network Time Protocol Support

User Authentication

– Internal database
-Active Directory Integration
-Automatic Windows Single Sign On
– External LDAP/RADIUS database integration
– Thin Client support – Microsoft Windows Server 2003
Terminal Services and Citrix xenApp – Novell eDirectory
-RSASecurID support
– ExternalAuthentication – Users andAdministrators
– User/MAC Binding
– MultipleAuthentication servers


– Graphical real-time and historical monitoring
– Email notification of reports, gateway status, viruses and
– Syslog support
– Log Viewer – Firewall, IPS, Web filter, Anti Virus, Anti
Spam,Authentication, System andAdmin Events

On-Appliance Cyberoam-iView Reporting

– IntegratedWeb-based Reporting tool –
– 1000+ drilldown reports
– 45+ Compliance Reports
– Historical and Real-time reports
– Multiple Dashboards
– Username, Host, Email ID specific Monitoring
– Reports – Security, Virus, Spam, Traffic, Policy
violations, VPN, Search Engine keywords
– Multi-format reports – tabular, graphical
– Exportable formats – PDF, Excel
-Automated Report Scheduling


– Inter-operability with major IPSecVPNGateways
– Supported platforms: Windows 2000, WinxP 32/64-bit,
Windows 2003 32-bit, Windows 2008 32/64-bit, Windows
Vista 32/64-bit, Windows 7 RC1 32/64-bit
– Import Connection configuration


– ICSAFirewall – Corporate
– CheckmarkUTMLevel 5 Certification
-VPNC- Basic andAESinteroperability
– “IPv6 Ready”Gold Logo

Hardware Specifications

Compact Flash4GB
HDD250GB or higher




HxWxD(inches)1.7 x 14.6 x 17.3
HxWxD(cms)4.4 x 37.2 x 44
Weight5 kg, 11.02 lbs


Input Voltage100-240 VAC
Total Heat Dissipation (BTU)338


OperatingTemperature0 to 40 °C
Storage Temperature-25 to 75 °C
Relative Humidity (Non condensing)10 to 90%

Additional Information

Weight5 kg
Dimensions44 x 37.2 x 4.4 cm


There are no reviews yet.

Be the first to review “Cyberoam cr100ing”

%d bloggers like this: