Description

Cyberoam CR500iNG-XP Firewall

The Cyberoam CR500iNG-XP Firewall features 8×10/100/1000 Ethernet ports, 18000 Mbps Firewall Throughput and comes with 2 Flexi Slots for add-on port modules of (8 Copper/8 x 1GbE Fiber/4 x 10GbE Fiber).

Features 

  • 8×10/100/1000 Ethernet ports
  • 18000 Mbps Firewall Throughput
  • 3250 Mbps NGFW Throughput
  • 1650 Mbps Fully Protected Throughput
  • Layer 8 Identity-based Security / Application Visibility & Control
  • Web Filtering / Web Application Firewall

Cyberoam CR500iNG-XP Firewall – Technical Specifications

Interfaces

  • Maximum number of Available Ports 24
  • Fixed Copper GbE Ports 8
  • Number of Slots for FleXi Ports Module 2
  • Port options per FleXi Ports Module*** 8 / 8 / 4
  • (GbE Copper/GbE Fiber/10GbE Fiber)
  • Console Ports (RJ45) 1
  • Configurable Internal/DMZ/WAN Ports Yes
  • USB Ports 2
  • # Hardware Bypass Segment 2

System Performance*

  • Firewall Throughput (UDP) (Mbps) 18,000
  • Firewall Throughput (TCP) (Mbps) 16,000
  • New sessions/second 100,000
  • Concurrent sessions 2,500,000
  • IPSec VPN Throughput (Mbps) 1,500
  • No. of IPSecTunnels 1,000
  • SSLVPN Throughput (Mbps) 650
  • WAF Protected Throughput (Mbps) 1,500
  • Anti-Virus Throughput (Mbps) 3,500
  • IPS Throughput (Mbps) 4,500
  • NGFW Throughput (Mbps)**** 3,250
  • Fully Protected Throughput (Mbps)***** 1,650

Stateful Inspection Firewall

  • Layer 8 (User – Identity) Firewall
  • Multiple Security Zones
  • Location-aware and Device-aware Identity-based Access
    Control Policy
  • Access Control Criteria (ACC): User-Identity, Source and
    Destination Zone, MAC and IP address, Service
  • Security policies – IPS, Web Filtering, Application
    Filtering, Anti-virus, Anti-spam and QoS
  • Country-based Traffic Control
  • Access Scheduling
  • Policy based Source and Destination NAT, Gateway
  • Specific NAT Policy
  • H.323, SIP NAT Traversal
  • DoS and DDoS attack prevention
  • MAC and IP-MAC filtering
  • Spoof Prevention

Intrusion Prevention System

  • Signatures: Default (4500+), Custom
  • IPS Policies: Pre-configured Zone-based multiple policies, Custom
  • Filter based selection: Category, Severity, Platform and
    Target (Client/Server)
  • IPS actions: Recommended, Allow Packet, Drop Packet,
    Disable, Drop Session, Reset, Bypass Session
  • User-based policy creation
  • Automatic signature updates via Cyberoam Threat
    Research Labs
  • Protocol Anomaly Detection
  • SCADA-aware IPS with pre-defined category for ICS and SCADA signatures

Gateway Anti-Virus & Anti-Spyware

  • Virus, Worm, Trojan Detection and Removal
  • Spyware, Malware, Phishing protection
  • Automatic virus signature database update
  • Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels
  • Customize individual user scanning
  • Self Service Quarantine area
  • Scan and deliver by file size
  • Block by file types

Gateway Anti-Spam

  • Inbound and Outbound Scanning
  • Real-time Blacklist (RBL), MIME header check
  • Filter based on message header, size, sender, recipient
  • Subject line tagging
  • Language and Content-agnostic spam protection using RPD Technology
  • Zero Hour Virus Outbreak Protection
  • Self Service Quarantine area
  • IP address Black list/White list-
  • Spam Notification through Digest
  • IP Reputation based Spam filtering

Web Filtering

  • On-Cloud Web Categorization
  • Controls based on URL, Keyword and File type
  • Web Categories: Default (89+), External URL Database,
    Custom
  • Protocols supported: HTTP, HTTPS-
  • Block Malware, Phishing, Pharming URLs
  • Block Java Applets, Cookies, Active X, Google Cache
    pages
  • CIPA Compliant
  • Data leakage control by blocking HTTP and HTTPS
    upload
  • Schedule-based access control
    Custom Denied Message per Web Category
  • Safe Search enforcement, YouTube for Schools

Application Filtering

  • Layer 7 (Applications) & Layer 8 (User – Identity) Control and Visibility
  • Inbuilt Application Category Database
  • Control over 2,000+ Applications classified in 21
    Categories
  • Filter based selection: Category, Risk Level, Characteristics and Technology
  • Schedule-based access control
  • Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload
  • Securing SCADA Networks
  • SCADA/ICS Signature-based Filtering for Protocols
  • Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure
  • DNP3, Longtalk
  • Control various Commands and Functions

Web Application Firewall

  • Positive Protection model
  • Unique “Intuitive Website Flow Detector” technology
  • Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie
    Poisoning etc.
  • Support for HTTP 0.9/1.0/1.1
  • Back-end servers supported: 5 to 300 servers

Virtual Private Network

  • IPSec, L2TP, PPTP
    Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
  • Hash Algorithms – MD5, SHA-1
  • Authentication: Preshared key, Digital certificates
  • IPSec NAT Traversal
  • Dead peer detection and PFS support
  • Diffie Hellman Groups – 1, 2, 5, 14, 15, 16
  • External Certificate Authority support
  • Export Road Warrior connection configuration
  • Domain name support for tunnel end points
  • VPN connection redundancy
  • Overlapping Network support
  • Hub & Spoke VPN support
  • Threat Free Tunnelling (TFT) Technology

SSL VPN

  • TCP & UDP Tunnelling
  • Authentication – Active Directory, LDAP, RADIUS,
    Cyberoam (Local)
  • Multi-layered Client Authentication – Certificate,
    Username/Password
  • User & Group policy enforcement
  • Network access – Split and Full tunnelling
  • Browser-based (Portal) Access – Clientless access
  • Lightweight SSL VPN Tunnelling Client
  • Granular access control to all the enterprise network
    resources
  • Administrative controls – Session timeout, Dead Peer
    Detection, Portal customization
  • TCP based Application Access – HTTP, HTTPS, RDP,
    TELNET, SSH

Wireless WAN

  • USB port 3G/4G and WiMAX Support
  • Primary WAN link
  • WAN Backup link

Bandwidth Management

  • Application, Web Category and Identity based Bandwidth Management
  • Guaranteed & Burstable bandwidth policy
  • Application & User Identity based Traffic Discovery
  • Data Transfer Report for multiple Gateways

Networking

  • WRR based Multilink Load Balancing
  • Automated Failover/Failback
  • Interface types: Alias, Multiport Bridge, LAG (port trunking), VLAN, WWAN, TAP
  • DNS-based inbound load balancing
  • IP Address Assignment – Static, PPPoE (with Schedule
    Management), L2TP, PPTP & DDNS, Client, Proxy ARP,
    Multiple DHCP Servers support, DHCP relay
  • Supports HTTP Proxy, Parent Proxy with FQDN
  • Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SIM,
    Multicast Forwarding
  • Support of ICAP to integrate third-party DLP, Web
    Filtering and AV applications
  • Discover mode for PoC Deployments
  • IPv6 Support:
  • Dual Stack Architecture: Support for IPv4 and IPv6
    Protocols
  • Management over IPv6
  • IPv6 Route: Static and Source
  • IPv6 tunneling (6in4, 6to4, 6rd, 4in6)
  • Alias and VLAN
  • DNSv6 and DHCPv6 Services
    Firewall security over IPv6 traffic
  • High Availability for IPv6 networks

High Availability

  • Active-Active
  • Active-Passive with state synchronization
  • Stateful Failover with LAG Support

Administration & System Management

  • Web-based configuration wizard
  • Role-based Access control
  • Support of API
  • Firmware Upgrades via Web UI
  • Web 2.0 compliant UI (HTTPS)
  • UI Color Styler
  • Command Line Interface (Serial, SSH, Telnet)
  • SNMP (v1, v2c)
  • Multi-lingual : English, Chinese, Hindi, French, Japanese
  • Cyberoam Central Console (Optional)

User Authentication

  • Internal database
  • AD Integration and OU-based Security Policies
  • Automatic Windows/RADIUS Single Sign On
  • External LDAP/LDAPS/RADIUS database Integration
  • Thin Client support
  • 2-factor authentication: 3rd party support**
  • SMS (Text-based) Authentication
  • Layer 8 Identity over IPv6
  • Secure Authentication – AD, LDAP, Radius
  • Clientless Users
  • Authentication using Captive Portal

Logging/Monitoring

  • Real-time and historical Monitoring
  • Log Viewer – IPS, Web filter, WAF, Anti-Virus, Anti-Spam,
    Authentication, System and Admin Events
  • Forensic Analysis with quick identification of network
    attacks and other traffic anomalies
  • Syslog support
  • 4-eye Authentication

On-Appliance Cyberoam-iView Reporting

  • Integrated Web-based Reporting tool
  • 1,200+ drilldown reports
  • Compliance reports – HIPAA, GLBA, SOX, PCI, FISMA
  • Zone based application reports
  • Historical and Real-time reports
  • Default Dashboards: Traffic and Security
  • Username, Host, Email ID specific Monitoring Dashboard
  • Reports – Application, Internet & Web Usage, Mail Usage,
    Attacks, Spam, Virus, Search Engine, User Threat
    Quotient (UTQ) for high risk users and more
  • Client Types Report including BYOD Client Types
  • Multi-format reports – tabular, graphical
  • Export reports in – PDF, Excel, HTML
  • Email notification of reports
  • Report customization – (Custom view and custom logo)
  • Supports 3rd party PSA Solution – ConnectWise

IPSec VPN Client***

  • Inter-operability with major IPSec VPN Gateways
  • Import Connection configuration

Certification

  • Common Criteria – EAL4+
  • ICSA Firewall – Corporate
  • Checkmark Certification
  • VPNC – Basic and AES interoperability
  • IPv6 Ready Gold Logo
  • Global Support Excellence – ITIL compliance (ISO 20000)

Hardware Specifications

  • Memory 4GB
  • Compact Flash 4GB
  • HDD 250GB or higher

Compliance

  • CE
  • FCC
  • UL

Dimensions

  • H x W x D (inches) – 1.7 x 17.3 x 11.85
  • H x W x D (cms) – 4.4 X 43.9 X 30.1
  • Weight – 5.1 kg, 11.24 lbs

Power

  • Input Voltage – 100-240 VAC
  • Consumption – 208W
  • Total Heat Dissipation (BTU) – 345

Environmental

  • Operating Temperature – 0 to 40 °C
  • Storage Temperature – 0 to 70 °C
  • Relative Humidity (Non condensing) – 10 to 90%