Description
We give the best Cyberoam cr15wing price in Dubai. Also we are the top Cyberoam Security & Firewalls dealers and distributors in Dubai.
Cyberoam UTM appliances deliver unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive UTM protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming and intrusions. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. These offices also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.
Product Features
CR15wiNG | CR25wiNG | CR35wiNG | CR15iNG | CR25iNG | CR35iNG | |
---|---|---|---|---|---|---|
Hardware Specifications | ||||||
Copper GbE Ports | 3 | 4 | 6 | 3 | 4 | 6 |
Console Ports (RJ45) | 1 | 1 | 1 | 1 | 1 | 1 |
USB Ports | 2 | 2 | 2 | 2 | 2 | 2 |
Hardware Bypass Segments# | – | – | – | – | – | – |
Configurable Internal/DMZ/WAN Ports | Yes | Yes | Yes | Yes | Yes | Yes |
System Performance* | ||||||
Firewall Throughput (UDP) (Mbps) | 1,000 | 1,500 | 2.300 | 1,000 | 1,500 | 2,300 |
Firewall Throughput (TCP) (Mbps) | 750 | 1,000 | 2,000 | 750 | 1,000 | 2,000 |
New sessions/second | 3,500 | 5,000 | 12,000 | 3,500 | 5,000 | 12,000 |
Concurrent sessions | 60,000 | 150,000 | 350,000 | 60,000 | 150,000 | 350,000 |
IPSec VPN Throughput (Mbps) | 110 | 210 | 250 | 110 | 210 | 250 |
No. of IPSec Tunnels | 50 | 100 | 150 | 50 | 100 | 150 |
SSL VPN Throughput (Mbps) | 50 | 75 | 100 | 50 | 75 | 100 |
WAF Protected Throughput (Mbps) | -NA- | 45 | 65 | -NA- | 45 | 65 |
Anti-Virus Throughput (Mbps) | 180 | 300 | 525 | 180 | 300 | 525 |
IPS Throughput (Mbps) | 140 | 200 | 350 | 140 | 200 | 350 |
UTM Throughput (Mbps) | 80 | 110 | 210 | 80 | 110 | 210 |
Authenticated Users/Nodes | Unlimited | Unlimited | Unlimited | Unlimited | Unlimited | Unlimited |
# If Enabled, will bypass traffic only in case of Power failure.
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines.Also the actual performance may vary depending on the real network traffic environments.
Key Features | |
---|---|
Layer 8 Identity-based policies | Role-based access at remote locations |
Visibility into who is doing what | |
Comprehensive UTM Security | Stateful Inspection Firewall |
Intrusion Prevention System | |
Anti-Virus & Anti-Spyware | |
Anti-Spam | |
Web Filtering | |
Application Visibility & Control | |
On-appliance Reporting | |
Web Application Firewall | |
Outbound Spam Protection | |
Secure Remote Access | IPSec VPN |
L2TP | |
PPTP | |
SSL VPN | |
WAN Connectivity & Availability | Bandwidth Management |
Multiple Link Management | |
3G / WiMAx Support | |
Advanced Networking | Multi-core Processing |
Extensible Security Architecture | |
Active-Active High Availability | |
IPv6 Ready Gold Certified | |
Wi-Fi Security | Wireless Standards IEEE 802.11 n/b/g (WEP, WPA, WPA2, 802.11i, TKIP, AES, PSK, 802.1x EAP) |
Up to 8 bssid Access Points | |
Centralized Security Management | CCC Appliances |
Cyberoam iView Open Source Solution – Logging & Reporting | |
Cyberoam iView Appliances – Logging & Reporting |
Specification | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Interfaces
Built-in Wireless LAN
System Performance*
Stateful Inspection Firewall – Layer 8 (User – Identity) Firewall GatewayAnti-Virus & Anti-Spyware -Virus,Worm,Trojan Detection &Removal GatewayAnti-Spam – Inbound Scanning Intrusion Prevention System – Signatures: Default (4500+), Custom | Web Filtering – InbuiltWeb Category Database Application Filtering – Inbuilt Application Category Database
– Layer 7 (Applications) & Layer 8 (User – Identity) VisibilityWeb Application Firewall – Positive Protection model Virtual Private Network – IPSec, L2TP, PPTP SSL VPN -TCP&UDPTunneling Instant Messaging (IM) Management -Yahoo and Windows Live Messenger WirelessWAN -USBport 3G/4G and Wimax Support Bandwidth Management – Application and User Identity based Bandwidth User Identity and Group Based Controls – Access time restriction | Networking – Failover – Automated Failover/Failback, Multi-WAN failover, Administration & System Management -Web-based configuration wizard User Authentication – Internal database Logging/Monitoring – Graphical real-time and historical monitoring On-Appliance Cyberoam-iView Reporting – Integrated Web-based Reporting tool – IPSecVPNClient** – Inter-operability with major IPSecVPNGateways Certification – ICSAFirewall – Corporate Hardware Specifications
Compliance -CE Dimensions
|
Reviews
There are no reviews yet.