+971-4-3559507 |+971-558663158 |[email protected]

Shopping cart

Cyberoam cr300ing-xp

Out of stock


Out of stock


We give the best Cyberoam cr300ing-xp price in Dubai. Also we are the top Cyberoam partners in Dubai.In addition to this we are the best Cyberoam Soho/Robo appliances suppliers in Dubai. Cyberoam product support services in Dubai. More than this we are the top Cyberoam product dealers and distributors in Dubai.


NGFWs offer next-generation security features to organizations to protect against newly-evolving threats.

Layer 8 Identity-based SecurityLayer 8 Identity-based Security
Cyberoam’s Layer 8 Technology treats user identity as the 8th layer or the “human layer” in the network protocol stack. This allows administrators to uniquely identify users, control Internet activity of these users in the network, and enable policy-setting and reporting by username – adding speed to security.


‘s Layer 8 security binds with Layer 2 to Layer 7 giving better security controls over the network and offers Layer 8 Identity-based security over AAA (User Authentication, Service Authorization, Audit with logs /reports).

Application Visibility & ControlApplication Visibility & Control
With an industry-leading coverage of 2000+ applications, Cyberoam’s Application Visibility & Control feature enables prioritization of applications based on User Identity, time, applications, and bandwidth, allowing great flexibility and real L2-L8 visibility & control. Advanced application controls classify applications based on their risk level, characteristics and technology, offering more granular controls. The pro-active protection model eliminates the need for manual intervention by administrator to update policy for new applications that are being added to the list.
Intrusion Prevention SystemIntrusion Prevention System


Intrusion Prevention System protects against network and application-level attacks, securing organizations against intrusion attempts, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats.

First-of-its-kind On-appliance ReportingFirst-of-its-kind On-appliance Reporting


has been the first and only vendor in the industry to offer on-appliance reporting with real-time logs and reports, saving the cost of deploying a dedicated reporting solution. The 1200+ in-depth reports offer real-time visibility into user and network activities, helping organizations to manage security, display compliance and forensic analysis, unmatched by any network security vendor till date. Cyberoam reports include dynamic and animated reports, in-line graphs, and country maps.

Virtual Private NetworkVirtual Private Network


VPN (IPSec and SSL) offers secure remote access, ensuring secure endpoints and network with its Threat-free Tunneling Technology.

Web FilteringWeb Filtering


‘s award-winning Web Filtering offers one of the most comprehensive URL databases with millions of URLs grouped into 89+ categories. It blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses.

Web Application FirewallWeb Application Firewall


offers an on-appliance Web Application Firewall subscription to secure websites and Web-based applications in organizations against attacks such as SQL injection, cross-site scripting (XSS), URL parameter tampering, session hijacking, buffer overflows, and more, including the OWASP Top 10 Web application vulnerabilities.

QoS / Bandwidth ManagementQoS / Bandwidth Management
Cyberoam enables organizations to tie bandwidth policies to users, user groups, Applications, Website Categories, Firewall rules, and more. Cyberoam’s granular Layer 7 and Layer 8 Bandwidth controls allow prioritization of business-critical applications and users for bandwidth allocation, ensuring assured QoS for business-critical applications like VoIP and CRM. Granular bandwidth controls allow committed bandwidth to critical users at all times and also allow policies to assign idle bandwidth to other applications automatically, delivering optimal use of idle bandwidth and higher ROI.

Based on the need, Enterprises can get additional security features like Web Application Firewall, Gateway Anti-Virus, Gateway Anti-Spam, and more.


Maximum number of Available Ports14
Fixed Copper GbE Ports6
FleXi Ports Module*** (GbE Copper/GbE Fiber/10GbE Fiber)8 / 8 / 4
Console Ports (RJ45)1
Configurable Internal/DMZ/WAN PortsYes
USB Ports2
Hardware Bypass Segment#2

System Performance*

Firewall Throughput (UDP) (Mbps)12,000
Firewall Throughput (TCP) (Mbps)9,500
New sessions/second85,000
Concurrent sessions2,000,000
IPSec VPN Throughput (Mbps)1,200
No. of IPSec Tunnels400
SSL VPN Throughput (Mbps)500
WAF Protected Throughput (Mbps)1,250
Anti-Virus Throughput (Mbps)2,600
IPS Throughput (Mbps)2,400
UTM Throughput (Mbps)1,500

Stateful Inspection Firewall

  • Layer 8 (User – Identity) Firewall
  • Multiple Security Zones
  • Access Control Criteria (ACC) : User – Identity, Source and Destination Zone, MAC and IP address, Service
  • UTM policies – IPS, Web Filtering, Application Filtering, Anti-Virus, Anti-Spam and Bandwidth Management
  • Application (Layer 7) Control and Visibility
  • Access Scheduling
  • Policy based Source and Destination NAT
  • H.323, SIP NAT Traversal
  • 802.1q VLAN Support
  • DoS and DDoS Attack prevention
  • MAC and IP-MAC filtering and Spoof prevention

Gateway Anti-Virus & Anti-Spyware

  • Virus, Worm, Trojan: Detection and Removal
  • Spyware, Malware, Phishing protection
  • Automatic virus signature database update
  • Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels
  • Customize individual user scanning
  • Self Service Quarantine area
  • Scan and deliver by file size
  • Block by file types
  • Add disclaimer/signature

Gateway Anti-Spam

  • Inbound/Outbound Scanning
  • Real-time Blacklist (RBL), MIME header check
  • Filter based on message header, size, sender, recipient
  • Subject line tagging
  • IP address Black list/White list
  • Redirect Spam mails to dedicated email address
  • Image-based Spam filtering using RPD Technology
  • Zero hour Virus Outbreak Protection
  • Self Service Quarantine area
  • Spam Notification through Digest
  • IP Reputation-based Spam filtering

Intrusion Prevention System

  • Signatures: Default (4500+), Custom
  • IPS Policies: Multiple, Custom
  • User-based policy creation
  • Automatic real-time updates from CRProtect networks
  • Protocol Anomaly Detection
  • DDoS attack prevention
  • SCADA-aware IPS with pre-defined category for ICS and SCADA signatures

Web Filtering

  • Inbuilt Web Category Database
  • URL, keyword, File type block
  • Categories: Default(89+), Custom
  • Protocols supported: HTTP, HTTPS
  • Block Malware, Phishing, Pharming URLs
  • Schedule-based access control
  • Custom block messages per category
  • Block Java Applets, Cookies, Active X
  • CIPA Compliant
  • Data leakage control via HTTP, HTTPS upload

Application Filtering

  • Inbuilt Application Category Database
  • 2,000+ Applications Supported
  • Schedule-based access control
  • Block
  • Proxy and Tunnel
  • File Transfer
  • Social Networking
  • Streaming Media
  • Layer 7 (Applications) & Layer 8 (User – Identity) Visibility
  • Securing SCADA Networks
  • SCADA/ICS Signature-based Filtering for Protocols
  • Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk
  • Control various Commands and Functions

Web Application Firewall

  • Positive Protection model
  • Unique “Intuitive Website Flow Detector” technology
  • Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning, etc.
  • Support for HTTP 0.9/1.0/1.1

Virtual Private Network

  • IPSec, L2TP, PPTP
  • Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
  • Hash Algorithms – MD5, SHA-1
  • Authentication – Preshared key, Digital certificates
  • IPSec NAT Traversal
  • Dead peer detection and PFS support
  • Diffie Hellman Groups – 1,2,5,14,15,16
  • External Certificate Authority support
  • Export Road Warrior connection configuration
  • Domain name support for tunnel end points
  • VPN connection redundancy
  • Overlapping Network support
  • Hub and Spoke VPN support


  • TCP and UDP Tunneling
  • Authentication – Active Directory, LDAP, RADIUS, Cyberoam (Local)
  • Multi-layered Client Authentication – Certificate, Username/Password
  • User and Group policy enforcement
  • Network access – Split and Full tunneling
  • Browser-based (Portal) Access – Clientless access
  • Lightweight SSL VPN Tunneling Client
  • Granular access control to all the enterprise network resources
  • Administrative controls – Session timeout, Dead Peer Detection, Portal customization
  • TCP- based Application Access – HTTP, HTTPS, RDP, TELNET, SSH

Instant Messaging (IM) Management

  • Yahoo and Windows Live Messenger
  • Virus Scanning for IM traffic
  • Provides Allow/Block Login
  • Also gives Allow/Block File Transfer
  • More than this provides Allow/Block Webcam
  • Allow/Block one-to-one/group chat
  • Content-based blocking
  • IM activities Log
  • Archive files transferred
  • Custom Alerts

Wireless WAN

  • USB port 3G/4G and Wimax Support
  • Primary WAN link
  • WAN Backup link

Bandwidth Management

  • Application and User Identity based Bandwidth Management
  • Guaranteed and Burstable bandwidth policy
  • Application and User Identity based Traffic Discovery
  • Multi WAN bandwidth reporting
  • Category-based bandwidth restriction

User Identity and Group Based Controls

  • Access time restriction
  • Time and Data Quota restriction
  • Schedule-based Committed and Burstable Bandwidth
  • Schedule-based P2P and IM Controls


  • Failover – Automated Failover/Failback, Multi-WAN failover, 3GModem failover
  • WRR based load balancing
  • Policy routing based on Application and User
  • IP Address Assignment – Static, PPPoE, L2TP, PPTP & DDNS Client, Proxy ARP, DHCP server, DHCP relay
  • Support for HTTP Proxy
  • Dynamic Routing: RIP v1 and v2, OSPF, BGP, Multicast Forwarding
  • Parent Proxy support with FQDN
  • “IPv6 Ready” Gold Logo
High Availability

  • Active-Active
  • Active-Passive with State Synchronization
  • Stateful failover
  • Alerts on appliance status change

Administration and System Management

  • Web-based configuration wizard
  • Role-based access control
  • Firmware Upgrades via Web UI
  • Web 2.0 compliant UI (HTTPS)
  • UI Color Styler
  • Command Line Interface (Serial, SSH, Telnet)
  • SNMP (v1, v2, v3)
  • Multi-lingual support: Chinese, Hindi, French, Korean
  • Cyberoam Central Console (Optional)
  • Network Time Protocol Support

User Authentication

  • Internal database
  • Active Directory Integration
  • Automatic Windows Single Sign On
  • External LDAP/RADIUS database integration
  • Thin Client support – Microsoft Windows Server 2003/2008 Terminal Services and Citrix XenApp – Novell eDirectory
  • RSA SecurID support
  • External Authentication – Users and Administrators
  • User/MAC Binding
  • Multiple Authentication servers

Logging and Monitoring

  • Graphical real-time and historical monitoring
  • Email notification of reports, gateway status, viruses and attacks
  • Syslog support
  • Log Viewer – Firewall, IPS, Web filter, WAF, Anti Virus, Anti Spam, Authentication, System and Admin Events

On-Appliance Cyberoam-iView Reporting

  • Integrated Web-based Reporting tool – Cyberoam-iView
  • 1000+ drilldown reports
  • 45+ Compliance Reports
  • Historical and Real-time reports
  • Multiple Dashboards
  • Username, Host, Email ID specific Monitoring Dashboard
  • Reports – Security, Virus, Spam, Traffic, Policy violations, VPN, Search Engine keywords
  • Multi-format reports – tabular, graphical
  • Exportable formats – PDF, Excel
  • Automated Report Scheduling

IPSec VPN Client**

  • Inter-operability with major IPSec VPN Gateways
  • Supported platforms: Windows 2000, WinXP 32/64-bit,
  • Windows 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 32/64-bit
  • Import Connection configuration


  • Common Criteria – EAL4+
  • ICSA Firewall – Corporate
  • Checkmark UTM Level 5 Certification – VPNC – Basic and AES interoperability – “IPv6 Ready” Gold Logo

Hardware Specifications

Compact Flash4GB
HDD250GB or higher




H x W x D (inches)1.7 x 17.3 x 11.85
H x W x D (cms)4.4 X 43.9 X 30.1
Weight5.1 kg, 11.24 lbs


Input Voltage100-240 VAC
Total Heat Dissipation (BTU)467


Operating Temperature0 to 40 °C
Storage Temperature0 to 70 °C
Relative Humidity (Non condensing)10 to 90%

#If Enabled, will bypass traffic only in case of power failure.
**Additional Purchase Required.
*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments






There are no reviews yet.

Be the first to review “Cyberoam cr300ing-xp”