Cyberoam UTM Techsheet
Total Page:16
File Type:pdf, Size:1020Kb
Future-ready Future-ready Security for SOHO/ROBO, SME and Large Enterprise networks Tech Sheet With high-speed Internet becoming a reality in organizations along with rising number of devices per user and data usage increasing at exponential rates, the next-generation security appliances must match the needs of future networks. Cyberoam NG series delivers future-ready security to organizations by offering unmatched throughput speeds with its best-in-class hardware along with software to match. NG series for SOHO and SMEs: The NG series appliances for SOHO, SMEs are the “fastest UTMs” made for this segment. NG Series for Large Enterprises: The NG series appliances for enterprises offer “Next-Generation Firewall (NGFW)” protection to large VPNC CERTIFIED SSL enterprises with NGFW capabilities offering high performance required for future enterprise networks. Portal SSL Exchange SSL Firefox VPNC SSL CERTIFIED JavaScript Basic SSL Basic With Cyberoam NG series, businesses get assured Security, Connectivity and Productivity. The Layer 8 Interop Network Extension AES SSL Advanced Technology attaches User-Identity to security, adding speed to an organization’s security. Cyberoam’s www.check-mark.com Interop Network Extension Extensible Security Architecture (ESA) supports feature enhancements that can be developed Cyberoam NG Series : 15iNG, 25iNG, 25iNG-6P,35iNG, 50iNG, 100iNG, 2500iNG rapidly and deployed with minimum efforts. Cyberoam NG Wireless series : 15wiNG, 25wiNG, 25wiNG-6P, 35wiNG Feature Specifications Stateful Inspection Firewall Web Application Firewall3 High Availability* - Layer 8 (User - Identity) Firewall - Positive Protection model - Active-Active - Multiple Security Zones - Unique "Intuitive Website Flow Detector" technology - Active-Passive with state synchronization - Access Control Criteria (ACC) : User-Identity, Source and - Protection against SQL Injections, Cross-site Scripting (XSS), - Stateful Failover Destination Zone, MAC and IP address, Service Session Hijacking, URL Tampering, Cookie Poisoning etc. - Alerts on Appliance Status change - UTM policies - IPS, Web Filtering, Application Filtering, Anti- - Support for HTTP 0.9/1.0/1.1 virus, Anti-spam and Bandwidth Management - Back-end servers supported: 5 to 200 servers Administration and System Management - Application (Layer 7) Control and Visibility - Web-based configuration wizard - Access Scheduling Virtual Private Network - Role-based Access control - Policy based Source and Destination NAT - IPSec, L2TP, PPTP - Firmware Upgrades via Web UI - H.323, SIP NAT Traversal - Encryption - 3DES, DES, AES, Twofish, Blowfish, Serpent - Web 2.0 compliant UI (HTTPS) - 802.1q VLAN Support - Hash Algorithms - MD5, SHA-1 - UI Color Styler - DoS and DDoS attack prevention - Authentication: Preshared key, Digital certificates - Command line interface (Serial, SSH, Telnet) - MAC and IP-MAC filtering and Spoof prevention - IPSec NAT Traversal - SNMP (v1, v2, v3) - Dead peer detection and PFS support - Multi-lingual support: Chinese, Hindi, French, Korean Gateway Anti-Virus & Anti-Spyware - Diffie Hellman Groups - 1,2,5,14,15,16 - Cyberoam Central Console (Optional) - Virus, Worm, Trojan Detection and Removal - External Certificate Authority support - NTP Support - Spyware, Malware, Phishing protection - Export Road Warrior connection configuration - Automatic virus signature database update - Domain name support for tunnel end points User Authentication - Scans HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM, VPN Tunnels - VPN connection redundancy - Internal database - Customize individual user scanning - Overlapping Network support - Active Directory Integration - Self Service Quarantine area - Hub & Spoke VPN support - Automatic Windows Single Sign On - Scan and deliver by file size - External LDAP/RADIUS database Integration - Block by file types SSL VPN - Thin Client support - Microsoft Windows Server 2003 Terminal - Add disclaimer/signature - TCP & UDP Tunneling Services and Citrix XenApp - Authentication - Active Directory, LDAP, RADIUS,Cyberoam (Local) - RSA SecurID support Gateway Anti-Spam - Multi-layered Client Authentication - Certificate, - External Authentication - Users and Administrators - Inbound/Outbound Scanning## Username/Password - User/MAC Binding - Real-time Blacklist (RBL), MIME header check - User & Group policy enforcement - Multiple Authentication servers - Filter based on message header, size, sender, recipient - Network access - Split and Full tunneling - Subject line tagging - Browser-based (Portal) Access - Clientless access Logging and Monitoring - Redirect spam mails to dedicated email address - Lightweight SSL VPN Tunneling Client - Graphical real-time and historical Monitoring - Image-spam filtering using RPD Technology - Granular access control to all the enterprise network resources - Email notification of reports, viruses and attacks - Zero hour Virus Outbreak Protection - Administrative controls - Session timeout, Dead Peer Detection, - Syslog support - Self Service Quarantine area1 Portal customization - Log Viewer - IPS, Web filter, WAF, Anti-Virus, Anti-Spam, - IP address Black list/White list - TCP-based Application Access - HTTP, HTTPS, RDP, TELNET, SSH Authentication, System and Admin Events - Spam Notification through Digest2 - IP Reputation-based Spam filtering Instant Messaging (IM) Management 5 On-Appliance Cyberoam - iView Reporting Cyberoam TM - Yahoo and Windows Live Messenger - Integrated Web-based Reporting tool - VIEW Intrusion Prevention System - Virus Scanning for IM traffic Cyberoam-iView - Signatures: Default (4500+), Custom - Allow/Block: Login, File Transfer, Webcam, One-to-one/group Chat - 1000+ drilldown reports - IPS Policies: Multiple, Custom - Content-based blocking - 45+ Compliance reports - User-based policy creation - IM activities Log - Historical and Real-time reports - Automatic real-time updates from CRProtect networks - Archive files transferred - Multiple Dashboards - Protocol Anomaly Detection - Custom Alerts - Username, Host, Email ID specific Monitoring Dashboard - DDoS attack prevention - Reports - Security, Spam, Virus, Traffic, Policy violations, VPN, Wireless WAN Search Engine keywords Web Filtering - USB port 3G/4G and WiMax Support - Multi-format reports - tabular, graphical - Inbuilt Web Category Database - Primary WAN link - Exportable formats - PDF,Excel - URL, keyword, File type block - WAN Backup link - Automated Report Scheduling - Web Categories: Default(82+), Custom 6 - Protocols supported: HTTP, HTTPS Bandwidth Management IPSec VPN Client - Block Malware, Phishing, Pharming URLs - Application and User Identity based Bandwidth Management - Inter-operability with major IPSec VPN Gateways - Category-based Bandwidth allocation and prioritization - Category-based Bandwidth restriction - Supported platforms: Windows 2000, WinXP 32/64-bit, Windows - Block Java Applets, Cookies, Active X - Guaranteed & Burstable bandwidth policy 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 32/64- 4 - CIPA Compliant - Application & User Identity based Traffic Discovery bit, Windows 7 RC1 32/64-bit, Windows 8 RC1 32/64-bit - Data leakage control via HTTP, HTTPS upload - Multi WAN bandwidth reporting - Import Connection configuration - Schedule-based access control - Custom block messages per category User Identity-based and Group-based Controls Certification - Access time restriction - ICSA Firewall - Corporate Application Filtering - Time and Data Quota restriction, P2P and IM Controls - Checkmark UTM Level 5 Certification - Inbuilt Application Category Database - Schedule-based Committed and Burstable Bandwidth - VPNC - Basic and AES interoperability - 11+ Application Categories e.g. Gaming, IM, P2P, Proxy - IPv6 Ready Gold Logo - Schedule-based access control Networking - Block - Automated Failover/Failback, Multi-WAN - P2P applications e.g. Skype - WRR based Load balancing - Anonymous proxies e.g. UItra surf - Policy routing based on Application and User - “Phone home” activities - IP Address Assignment - Static, PPPoE, L2TP, PPTP & DDNS Client, 1,2,3,4,5, ## Available in all the Models except CR15iNG & CR15wiNG - Keylogger Proxy ARP, DHCP server, DHCP relay 6Additional Purchase Required - Layer 7 (Applications) & Layer 8 (User - Identity) Visibility - Supports HTTP Proxy, Parent Proxy with FQDN * - Dynamic Routing: RIP v1& v2, OSPF, BGP, MulticastForwarding Not supported in CR15iNG & WiFi series of appliances ##Inbound and Outbound Spam filtering cannot be used simultaneously. www.cyberoam.com I [email protected] Techsheet NG Future-ready Specifications 15iNG 25iNG/6P 35iNG 15wiNG 25wiNG/6P 35wiNG Interfaces Copper GbE Ports 3 4/6 6 3 4/6 6 Console Ports (RJ45) 1 1 1 1 1 1 USB Ports 2 2 2 2 2 2 # Hardware Bypass Segments - - - - - - Configurable Internal/DMZ/WAN Ports Yes Yes Yes Yes Yes Yes System Performance* Firewall Throughput (UDP) (Mbps) 1,000 1,500 2,300 1,000 1,500 2,300 Firewall Throughput (TCP) (Mbps) 750 1,000 2,000 750 1,000 2,000 New sessions/second 3,500 5,000 12,000 3,500 5,000 12,000 Concurrent sessions 60,000 150,000 350,000 60,000 150,000 350,000 IPSec VPN Throughput (Mbps) 110 210 250 110 210 250 No. of IPSec Tunnels 50 100 150 50 100 150 SSL VPN Throughput (Mbps) 50 75 100 50 75 100 WAF Protected Throughput (Mbps) -NA- 45 65 -NA- 45 65 Anti-Virus Throughput (Mbps) 180 300 525 180 300 525 IPS Throughput (Mbps) 140 200 350 140 200 350 UTM Throughput (Mbps) 80 110 210 80 110 210 Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited Unlimited Unlimited Built-in Wireless