Evaluation Guide. Page 1 of
|
|
|
- Lora McDonald
- 9 years ago
- Views:
Transcription
1 Page 1 of
2 Contents Preface...4 Cyberoam - Identity-based Unified Threat Management... 4 Deploying Cyberoam... 5 Accessing Cyberoam... 5 Verify Configuration... 6 Configure Mail and Web server access... 7 User Authentication... 7 Firewall... 7 Firewall rule...8 Default Firewall rules...9 Firewall rule processing order...9 Manage firewall rules...9 Intrusion Prevention System (IPS)... 9 Create Custom IPS policy...10 Create Identity-based IPS Policy...11 Create custom IPS signatures...11 Virtual Private Network Configure Net-to-Net IPSec VPN connection...12 Configure remote VPN access using Cyberoam VPN Client...12 Configure VPN failover...13 SSL VPN Allow access to Internal network...13 Allow access to internally hosted sites...15 Virus and Spam scanning Managing Spam Actions for Spam mails...17 Block mails using White lists and Black lists...18 Quarantine management...19 Spam Digest...20 Release Quarantined Spam Mails...20 Archive mails...20 Content filtering Filter traffic based on Domain names...22 Block P2P applications for a particular user...23 Block Facebook a social networking service...23 Allow specific Messenger (IM)...24 Manage Bandwidth Control bandwidth for group of users...24 Prioritize bandwidth usage of an Application...24 Configure Multiple Gateways Add Gateway...25 Define gateway weight for load balancing...25 Page 2 of
3 Configure Source based routing...25 Configure Outbound Load balancing...25 Configure Gateway Failover...25 Gateway Failback...26 Virtual LAN (VLAN) Dynamic Routing On-Appliance Reports Dashboard...26 Threats detected...27 Access Reports...28 Analytical Reports...28 Search Engine Report...31 Compliance reports...31 Data Leakage report...32 High Availability Configure Active-Active HA cluster...33 Trouble Shooting General Administration Points to remember...36 Page 3 of
4 Preface Thank you for purchasing the award-winning Identity-based Cyberoam UTM. Welcome to Cyberoam Evaluation Guide! This document is designed to ensure that you are able to use the basic features of your Cyberoam. It contains configuration guidelines on what is to be done after Cyberoam appliance is up and running in your network and addresses the most common use-case scenarios. In addition to this guide, you can access online help by clicking Online Help icon located on the right most corner of every page of GUI. Entire Cyberoam documentation set can be referred from The configuration given in the document is to be performed from Web Admin console (GUI) of Cyberoam unless specified. Solutions provided in the document are applicable up to version Cyberoam - Identity-based Unified Threat Management Cyberoam CR200i is part of the unique Identity-based Unified Threat Management range of appliances that offer comprehensive network security with fine granularity through its user identitybased security policies. Here are some key reasons why Cyberoam CR200i is able to provide intelligent threat management with multiple benefits for SMEs and large enterprises, leaving no loopholes in their security arrangements. Full Feature Set Excellent Value for Money: Due to its high performance and full feature set, Cyberoam CR200i gives an excellent value for money. It has multiple security features integrated over a single UTM appliance: Stateful Inspection Firewall, Gateway Anti-Virus & Anti-Spyware, Gateway Anti-Spam, Intrusion Prevention System, Content Filtering, Bandwidth Management, Multiple Link Management and On-appliance Reporting for comprehensive logs and reports of user activities in the network. Cyberoam offers IPSec VPN for secure remote access and the option of SSL VPN for greater security, ease of use and granular control in VPN environments, without the need to install individual VPN clients. Cyberoam s multicore-aware software architecture fully leverages the strength of multicore processors, therefore offering high gigabit throughput performances, while ensuring enhanced flexibility and security. VLANs create work-profile based policies by enabling logical grouping of users in the network. Active-Active High Availability (HA) feature ensures continuous uptime along with multiple link management and failover detection feature for ISP links. Cyberoam UTM also complies with several regulatory requirements such as PCI-DSS, HIPAA, CIPA, GLBA, and SOX. Quick Deployment and Easy Set-up: CR200i is very simple to operate and readily deployable in any networking environment. The Quick Start guide gives step-by-step deployment instructions for easy setup from Web Admin Console (GUI). Zero-hour protection: Cyberoam UTM offers robust protection against rapidly evolving and shortlived threats through technologies such as Threat Free Tunneling (TFT) for safe VPN Internet browsing, Recurrent Pattern Detection (RPD TM ) for content-agnostic, multi-language and multiformat spam protection and ID-based Custom IPS policies to protect against external and internal threats, that work in dynamic environments to inform the administrator who is doing what in the Page 4 of
5 network, and take instant corrective actions. Unified Security: Cyberoam's identity-based security offers a single window entry to dynamically apply policies for all its UTM features - to the user directly, from within the firewall rule. This delivers truly unified controls in addition to ease of use and for troubleshooting. Full Flexibility and High Customization: Cyberoam offers Identity-based policy detailing across all its features, enabling higher granularity and greater flexibility in comparison to blanket policies. Cyberoam s allows custom IPS signatures and custom web categories, allowing high levels of customization. Cyberoam GUI offers a clear screen-view of usage and threat patterns. Enterprises can use Cyberoam s flexibility and customization to define and apply user, group and applicationbased policies. Customer Support and Documentation: CR200i appliance carries Free 1 year subscription for 8x5 support and includes Web, Telephone, and Chat Support along with software upgrades. It also includes access to the knowledge base, Customer Support Portal ( and the Cyberoam Security Center ( Cyberoam appliances offer three levels of customer support, as shown in this link Basic, Advanced and Premium. Premium Support is a highly-personalized service offering that includes 24x7 Helpdesk, a dedicated account manager, and the option for on-site assistance. The Cyberoam product Documentation website provides the latest documentation for all Cyberoam products. Also, Cyberoam s knowledge database, contains an exhaustive array of information related to upgrades and troubleshooting guidelines. Deploying Cyberoam If Cyberoam is not already deployed in your network, refer to Appliance model specific Quick Start Guide to get step-by-step deployment help. Accessing Cyberoam Web Admin Console If you are accessing Cyberoam appliance, first time after deployment and have not changed the default IP scheme, browse to else IP address of Cyberoam> and log on with default username cyberoam and password cyber. LAN IP address of Cyberoam is the IP address configured through the Network Configuration Wizard at the time of deployment. CLI Console can be accessed via remote login utility TELNET or SSH client. Page 5 of
6 Verify Configuration Verify configuration done through Network Configuration Wizard from Dashboard. Dashboard provides a quick and fast overview of all the important parameters of Cyberoam appliance including the current operating status of the Cyberoam appliance. Press F10 key to go to view Dashboard from any of the pages. Confirm: subscription of all the modules from the License Information section deployment mode from Appliance Information section status of the default gateway from Gateway Status section Page 6 of
7 Configure Mail and Web server access To configure Cyberoam to provide the access of internal resources i.e. mail and web server hosted in LAN, you need to create: Virtual host from (Firewall Virtual Host Create) WAN to LAN firewall rule for the respective virtual host to allow the inbound traffic (when servers are hosted in LAN) WAN to DMZ firewall rule for respective virtual host to allow the inbound traffic (when servers are hosted in DMZ) Refer Configure one-to-one IP address mapping to access devices on Internal network for step-bystep configuration. User Authentication Configure user authentication from User Authentication settings. Available options: Active Directory (AD) Authentication - Refer to article ( for more details. LDAP Authentication - Refer to article ( for more details. RADIUS Authentication - Refer to article ( for more details. Windows NT Domain controller Authentication - Refer to article for more details. Cyberoam/Local Authentication - If you want Cyberoam to authenticate users, add users and configure group membership for users. Cyberoam supports various user types, refer to User types for details on user types and how to add users. Generate Reports with user names You need to configure authentication to generate reports with user names. It is easy to monitor user activity and identify the source and destination of the traffic with user name rather than with IP address. Firewall Zones Cyberoam provides zone-based security. Zone is a logical grouping of ports that have similar functions. Cyberoam provides 5 default zones types: LAN, DMZ, WAN, LOCAL, VPN Entire set of physical ports available on the Cyberoam appliance including their configured aliases are grouped in LOCAL zone. In other words, IP addresses assigned to all the ports fall under the LOCAL zone. To create additional LAN, DMZ and VPN zone types, refer User Guide. Page 7 of
8 Firewall rule Firewall rule provides centralized management of entire set of security policies. From a single firewall rule, you can define and manage entire set of Cyberoam security policies. Zone based firewall rules are created to control (allow or block) the network traffic. If you wish to have more granular control, include user and/or service in the zone based firewall rule. From the firewall rule, you can: Define inbound and outbound access based on source and destination hosts/network and MAC address. Enable scanning for HTTP, FTP, SMTP, POP3 or IMAP traffic - for spam filtering, virus security, spyware, malware and phishing protection Define IPS policy - for protection against threats and attacks originating from external world and internal network Attach Gateway routing policy - for loading balancing and gateway failover protection incase of multiple gateways Specify Internet Access policy - for web access to control access of inappropriate web sites, IM and P2P traffic Schedule access Attach bandwidth policy - to control and schedule bandwidth usage for individual user or group and prioritize bandwidth usage for particular application To create firewall rule, go to Firewall Create Rule Click Check Identity and specify user name to configure userbased firewall rule Multiple Configurable policies Page 8 of
9 Default Firewall rules Cyberoam automatically creates two default firewall rules based on the Internet Access policy (IAP) defined through Network Configuration Wizard at the time of deployment. Refer to Cyberoam User Guide for more details. Firewall rule processing order Cyberoam processes firewall rules from top to bottom and the first suitable matching rule found is applied. When a matching rule is found, traffic is immediately dropped or forwarded without being tested by the rest of the rules in the list. While adding multiple firewall rules, make sure specific rules are placed above the general rules. If general rule is placed above the specific rule, general rule will allow the traffic for which you have defined the deny rule later in the list. Manage firewall rules Edit, delete, or change the rule order from Firewall Manage Rule Please note that default rules cannot be deleted but edited as per the requirement. Last Action Status Schedule Deactive Enable/Disable Rule Edit Insert Delete NAT(Network Address Translation) Move NAT rule changes the source IP address of the packet i.e. the IP address of the connection initiator is changed. Apply NAT rule whenever it is required to send the outgoing traffic with a specific IP address. For example, multiple public IP address for WAN port , To route the traffic of a Group of users through only, you need to create NAT rule for Group of users. Intrusion Prevention System (IPS) To reduce the chances of excessive false positives and number of alerts, Cyberoam allows creation of tailor-made IPS scanning policy. Administrator can fine-tune the default policies as well as create custom policies to reduce the false positives. By disabling the IPS scanning for the traffic of the applications not in use allows to reduce network load. Page 9 of
10 Fine-tuning policies will help in reducing false positive, alerts and network choking. Apart from the fine-tuning default policies, Administrator can also create custom policies for individual applications and users. Create Custom IPS policy Create IPS policy from IPS Policy Create Once you create a policy, all the signature categories are enabled and the individual signatures within the category are set to Detect or Drop mode. You can enable/disable signature category or configure individual signature as and when needed. Click Edit icon against the category/signature Detect When any traffic that matches the signature is detected, Cyberoam does not take any action against the traffic and the connection proceeds to its intended destination. Drop - When any traffic that matches the signature is detected, Cyberoam automatically drops the packets that triggered IPS, resets the connection, and prevents the traffic to reach its destination. In both the case, Cyberoam logs the details, gives the alert to the Administrator, and to be enabled/disabled. Disable Excludes signature or category from prevention process Page 10 of
11 Create Identity-based IPS Policy In order to provide high level of granularity, Cyberoam allows to implement IPS scanning for individual user also. This additionally reduces the network load as the traffic for the other users will not be scanned. To configure Identity-based IPS policy: 1. Define IPS policy from IPS Policy Create 2. Configure Firewall rule for the user and attach IPS policy created in step 1 Create custom IPS signatures Default signatures included in Cyberoam cover common attacks signature. But, enterprises with diverse network environments require flexibility to customize IPS and deliver instant protection against emerging threats and high levels of granularity. Custom signatures provide flexibility to deliver zero-hour protection and address the custom Page 11 of
12 requirements for blocking, detecting traffic on a network e.g. define a custom signature for blocking a particular Yahoo! id To use custom signature for scanning and allowing/blocking specific traffic: Create signature from IPS Custom Signature Create Enable from signature from IPS policy Custom signature is the advanced feature and to create signatures requires previous experience in IPS and signatures. Refer to Create Custom IDP Signature for syntax and other details. Virtual Private Network Cyberoam can be used to establish VPN connection and supports following protocols to authenticate and encrypt traffic: Internet Protocol Security (IPSec) Layer Two Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) Configure Net-to-Net IPSec VPN connection To make VPN connection configuration an easy task, Cyberoam provides six preconfigured VPN policies for the frequently used VPN deployment scenarios: DefaultRoadWarrior DefaultL2TP DefaultHeadOffice DefaultBrachOffice AES128_MD5 Default Policy Administrator can directly use DefaultHeadOffice and DefaultBrachOffice default policies for the most common scenario to establish net-to-net connection using preshared key to authenticate peers. For step by step configuration, refer to Cyberoam provides VPN interoperability with number of third party IPSec VPN Gateways, refer to for list of supported gateways and how to establish connection with them. Configure remote VPN access using Cyberoam VPN Client This is commonly called a "road warrior" configuration, because the client is typically a laptop being used from remote locations, and connected over the internet using service providers and dialup connections. The most common use of this scenario is when you are at home or on the road and want access to the corporate network. For step by step configuration, refer to If you are using Cyberoam IPSec VPN Client for the first time, download Client from Page 12 of
13 Configure VPN failover You will need to configure VPN failover condition to keep your VPN connection always ON. To configure connection failover, you have to: Create Connection Group from VPN Connection Failover Create Connection Group. Connection Group is the grouping of all the connections that are to be used for failover. The order of connections in the Group defines fail over priority of the connection. Define Fail over condition in the Group itself Your primary VPN connection will failover to the very next active Connection in the Group if Connection group is created including the primary connection. For example, if the connection established using 4th Connection in the Group is lost then 5th Connections will take over provided the 5 th connection is active. SSL VPN SSL ((Secure Socket Layer)) VPN allows access to the Enterprise network from anywhere, anytime and provides the ability to create point-to-point encrypted tunnels between remote employees and company s internal network, requiring combination of SSL certificates and a username/password for authentication to enable access to the internal resources. To provide access, it operates in two modes: Full Access and Web Access mode. Full access for the remote users who are to be provided with the Enterprise network access from laptops, Internet cafes, hotels etc. It requires an SSL VPN Client at the remote end. Remote users can download and install SSL VPN Client from the End user Web Portal. Web access for the remote users who are equipped with the web browser only and when access is to be provided to the certain Enterprise Web applications/servers through web browser only. In other words, it is a clientless access. The basic and common administrative configuration for both the modes of operation can be configured from the Global settings and portal settings. Allow access to Internal network Cyberoam Configuration 3 step configuration is required to provide access of the Internal network to the remote users: Step 1. Create hosts for all the Internal networks whose access is to be provided from Firewall Host Add. Page 13 of
14 Step 2. Create SSL VPN policy from SSL VPN SSL VPN Policy Add SSL VPN Policy with the following parameters: Parameters Name Access Mode Full Access Setting Tunnel Type Value networkaccesspolicy Full Access Mode Split Tunnel (default) Tunnel type determines how the remote user s traffic will be routed. Split tunneling ensures that only the traffic for the private network is tunneled and encrypted while in full tunneling private network traffic as well as other Internet traffic is also tunneled and encrypted. Accessible Resources (created in step 1) Page 14 of
15 Step 3. Edit SSL VPN policy (created in step 2) from SSL VPN SSL VPN Policy Manage SSL VPN Policy to assign policy to the required user. Click Add Policy Member(s) and select the user. Once the above configuration is done, remote user can access hosts specified in the SSL VPN policy through End user Web Portal. Cyberoam Administrator needs to provide End user Web portal URL - IP address of Cyberoam:port> to the remote users. Use default port: 8443 unless customized. Confirm port number from System Configure Customize Client Preferences before forwarding URL to the remote user. End-user Configuration Step 1. To logon to the End user Web portal, browse to the Web portal URL provided by the Cyberoam Administration. Default URL: IP address of Cyberoam:8443>. Step 2. Download and install Cyberoam SSL VPN client Step 3. Download Cyberoam SSL VPN client configuration. Right Click the client to import downloaded configuration. Step 4. Once the tunnel is establish, user can access all the hosts specified in his SSL VPN policy. Allow access to internally hosted sites Step 1. Create Bookmark for all the resources whose access is to be provided from SSL VPN Bookmark Add Bookmark. Step 2. Create SSL VPN policy from SSL VPN SSL VPN Policy Add SSL VPN Policy with the following parameters: Parameters Name Value webaccesspolicy Page 15 of
16 Access Mode Web Access Mode Web Access setting Accessible Resources QAserver (created in step 1) Step 3. Edit SSL VPN policy (created in step 2) from SSL VPN SSL VPN Policy Manage SSL VPN Policy to assign policy to the required user. Click Add Policy Member(s) and select the user. Once the above configuration is done, remote user can access resources (bookmarks) specified in the SSL VPN policy from the End user Web Portal. Cyberoam Administrator needs to provide End user Web portal URL - IP address of Cyberoam:port> to the remote users. Use default port: 8443 unless customized. Confirm port number from System Configure Customize Client Preferences before forwarding URL to the remote user. Portal Access Step 1. To logon to the End user Web portal, browse to the Web portal URL provided by the Cyberoam Administration. Default URL: IP address of Cyberoam:8443>.. Step 2. Click the Bookmark link to access Page 16 of
17 Virus and Spam scanning Cyberoam scans incoming and outgoing HTTP, FTP, IMAP, POP3, and SMTP traffic, blocking malicious programs at the entry. What Enable HTTP virus scanning Enable SMTP/FTP virus scanning when Mail server/ftp server deployed in LAN Enable SMTP/FTP virus scanning when Mail server/ftp server deployed in DMZ Fine tune virus scanning parameters Fine tune spam scanning parameters Block password protected attachments (for all the recipients) From Firewall Manage Rule Enable scanning from LAN to WAN firewall rule Firewall Manage Rule Enable SMTP/FTP scanning from WAN to LOCAL firewall rule Firewall Manage Rule Enable SMTP/FTP scanning from WAN to LOCAL firewall rule and LAN to DMZ firewall rule Anti Virus Mail General Configuration Anti Spam Mail General Configuration Update default policy from Anti Virus SMTP Default Scan policy Specify All for Block File Types Enable Protected Attachment for Receiver s Action and Notify Administrator Managing Spam Actions for Spam mails Cyberoam tags suspected spam mail as a Probable Spam while mail tagged as Spam is actually a spam mail. You can reject, drop, accept, change the mail recipient or add a prefix to the mail subject and forward the spam mails. Spam actions can be specified from Spam policy. You can define different actions for: Spam and Probable spam mails Page 17 of
18 SMTP and POP3/IMAP spam mails Block mails using White lists and Black lists Step 1. Create White list from Anti Spam Configuration Address Groups with the following parameters: Parameters Name Group Type Address Value Whitelist Address Type all the address from which mails are to be allowed Page 18 of
19 Step 2. Create Black list from Anti Spam Configuration Address Groups with the following parameters: Parameters Name Group Type Address Value Blacklist IP Address Type all the address from which mails are to be blocked Update Global Policy (Anti Spam Spam Policy Global Policy) and use white list and black list to allow and block spam mails. Quarantine management Cyberoam quarantines virus infected and SMTP spam mails. If you are Network Administrator, you can view quarantined mails from: Anti Virus Mail General Configuration Anti Spam Configuration General Configuration As a Network Administrator, you can also educate your network users to view and manage their own quarantine space. Page 19 of
20 Individual network user can log on to User My Account and go to Quarantine Mails option and view the list of their quarantined mails. Spam Digest Spam digest is an containing a list of quarantined spam messages filtered by Cyberoam and held in the user quarantine area. If configured, Cyberoam mails the spam digest every day to the user. Digest provides a link to User My Account from where user can access his quarantined messages and take the required action. Digest service can be configured globally for all the users or for individual user. Configure digest service for all the users from Anti Spam Spam Quarantine Spam Digest Setting. Administrator can even customize the Digest service setting for individual user. Release Quarantined Spam Mails Either Administrator or user himself can release the quarantined spam mails. Administrator can release the quarantined spam mails from Quarantine area while user can release from his My Account. Released quarantined spam mails are delivered to the intended recipient s inbox. Administrator can access Spam Quarantine area from Anti Spam Configuration General Configuration while user can logon to My Account and access Spam Quarantine area from Quarantine Mails Spam Spam Quarantine area. Archive mails The communications that pertain to the organization s business activity are subject to regulatory requirements. This act necessitates retaining correspondence. Cyberoam s Copy-to provides an in-house archiving solution for building your repository. By specifying address in Send copy to address(s) field, you can transparently codeliver and archive all the mails to the pre-defined mail address. Archive all incoming mails If you want to archive all the mails, update Anti Spam Global policy from Anti Spam Spam Policy Global Policy and configure id in Send copy to address(s) field. Page 20 of
21 Archive mails of specific mail recipient or group of recipients If you want to archive mails for the specific recipient or group of recipients Create Anti Spam Custom policy from Anti Spam Spam Policy Create Custom Policy and configure id in Send copy to address(s) field Create spam rule for specific recipient or group of recipients whose mails you want to archive from Anti Spam Spam Rules and attach above policy All the mails received by will also be delivered at the address configured in the accnt_archive policy Content filtering Content filtering is used to limit the access of the contents available to the user based on combination of categories, keywords, URLs, domain names and file types. Fine-tune the default Internet Access Policy (IAP) for controlling access as per your requirement. Access control For Block Category All the users (Blanket block) How and from Update Allow All default policy from Policies Internet Access Policy Manage Policy: Category - specify category to be blocked e.g. music Strategy Deny Schedule Work hours (5 Day week) Page 21 of
22 Group/User With the above policy, all the users will be denied the access to the music category during the working hours. 1. Create policy from Policies Internet Access Policy Create Policy Policy Type Allow Category - specify category to be blocked Strategy - Deny Block Uncategorized URL/sites All the users (Blanket block) Group/User 2. Attach IAP created in step 1 to the user Group 2. Create LAN to WAN Identity based rule from Firewall Create Rule Select user for whom the category is to be blocked 1. Create Custom category from Categories Web Category Create Custom and specify the URL to be blocked Under Domain Management 2. Update Allow All default policy from Policies Internet Access Policy Manage Policy and add category created in step 1 1. Create Custom category from Categories Web Category Create Custom and specify the URL to be blocked Under Domain Management 2. Create policy from Policies Internet Access Policy Create Policy Policy Type Allow Category - specify category created in step 1 Strategy - Deny 3. Attach IAP created in step 2 to the user Group 4. Create LAN to WAN Identity based rule from Firewall Create Rule Select user for whom the category is to be blocked Filter traffic based on Domain names If enabled, users will not be able to bypass and access to sites using URL translation or HTTP proxy websites hosted on HTTPS will be blocked. In other word, Cyberoam will block any attempts to bypass the web content filtering and sites hosted on SSLv2, SSLv3 and TLS protocols. By default, it is enabled from CLI console and for all the default Internet Access Policy (Web Admin console). Page 22 of
23 Block P2P applications for a particular user Create following Internet Access Policy (IAP) and firewall rule for the user as follows: Step 1. Create IAP from Policies Internet Access Policy Create Policy Specify policy name, policy type (Allow) Click Add button to add categories for blocking In Select Category, under Application Protocol Category column, select P2P Applications Select Deny for Strategy Select the appropriate schedule. User will not be able to access any of the P2P Applications during the time specified in the schedule. Step 2. Include IAP created in step 1 in the user Group from Group Manage Group Step 3. Create User based Firewall rule from Firewall Create Rule Source: LAN, Any Host Click Check Identity to enable User based Firewall rule and select the user whose access P2P Applications category (created in step 1) is to be blocked Destination: WAN, Any Host Service: All Services Block Facebook a social networking service Facebook ( is a social networking website and is categorized in DatingAndMatrimonials category. So to block the site you need to deny access for the site. Go to Policies Internet Access Policy Manage Policy and update Allow All default Internet Page 23 of
24 Access policy. Select DatingAndMatrimonials in Web Category field and Deny in Strategy field. Above solution will work only if you have not changed LAN to WAN, Allow All default firewall rule. Allow specific Messenger (IM) Consider the example where one wants allow access of yahoo messenger only and block all other messengers. 1. Update Allow All default policy from Policies Internet Access Policy Manage Policy to allow access to yahoo messenger while deny Chat category. 2. Create LAN to WAN firewall rule and apply Allow All IAP (updated in step 1) Manage Bandwidth Control bandwidth for group of users Create User based Bandwidth policy from Policies Bandwidth Policy Create Policy Create user group from Group Add group and attach the bandwidth policy created for the group Create Identity based firewall rule from Firewall Create Rule and select the user group. Prioritize bandwidth usage of an Application Create Firewall rule based Bandwidth policy from Policies Bandwidth Policy Create Policy. Set the priority as required. Priority can be set from 0 (highest) to 7 (lowest) Create firewall rule from Firewall Create Rule and select service and bandwidth policy created in above step. Page 24 of
25 Configure Multiple Gateways Please note that multiple gateways can be configured only if Cyberoam is deployed as a Gateway. Add Gateway One unused WAN port is required for each new Gateway to be added. Go to System Gateway Manage Gateway(s) and click Add button to configure Gateway IP address and port. Define gateway weight for load balancing Assign weight to the Gateway if load balancing is required. Cyberoam distributes traffic across links in proportion to the ratio of weights assigned to the individual link. This weight determines how much traffic will pass through a particular link relative to the other link. Set weight as 0 (zero) to disable load balancing and pass the traffic through the default gateway Set same weight to all the gateways to distribute traffic equally among all the links Set different weights to various gateways to distribute traffic in the ratio of the proportions of the weight set Configure Source based routing Configure source based routing if it is required to route traffic of a particular network/subnet from the specific gateway. Go to System Gateway Manage Gateway(s) and click the Gateway for which the source based routing is defined. Page displays the details of the Gateway; click Add Network and add the network IP address. Configure Outbound Load balancing Load balancing is a mechanism that enables balancing traffic between various links. It distributes traffic among various links, optimizing utilization of all the links to accelerate performance and cut operating costs. Configure links in active-active setup i.e. define gateways as Active Assign appropriate weight to each gateway. Cyberoam distributes traffic across links in proportion to the ratio of weights assigned to the individual link. Configure Gateway Failover Gateway failover provides link failure protection i.e. when one link goes down; the traffic is switched over to the active link. This safeguard helps provide uninterrupted, continuous Internet connectivity to users. The transition is seamless and transparent to the end user with no disruption in service i.e. no downtime. To achieve WAN failover between multiple links: Configure links in Active-Backup Define Active gateway Define Backup gateway traffic through this link is routed only when active interface is down Define failover rule Page 25 of
26 In the event of link failure, traffic will automatically be routed through the Backup gateway without administrator intervention. If more than one backup gateway is configured, traffic is distributed among the gateways in the ratio of the weights assigned to them. On fail over, Backup gateway can inherit the parent gateway s (Active gateway) weight or the configured weight. Gateway Failback During a link failure, Cyberoam regularly checks the health of a given connection, assuring fast reconnection when Internet service is restored. When the connection is restored and gateway is up again, without administrator s intervention, traffic is again routed through the Active gateway. In other words, backup gateway fails back on Active gateway. Virtual LAN (VLAN) Virtual LANs are useful in different network scenarios where administrator needs expand the number of interfaces or when traffic filtering is required between different VLANs in an organization. Cyberoam follows the IEEE 802.1Q specification for VLAN and allows the definition of one or more VLAN Subinterfaces to be associated with a particular physical interface. These are then considered to be logical interfaces and are treated like physical interfaces in firewall rule sets. For step-by-step creation and implementation of VLAN, refer to Dynamic Routing Cyberoam supports following dynamic routing protocols: Routing Information Protocol (RIP) For configuration, refer Open Shortest Path First (OSPF) For configuration, refer Border Gateway Protocol (BGP) For configuration, refer Additionally, a firewall rule is to be configured for the zone for which the BGP & OSPF traffic is to be allowed i.e. LAN to LOCAL or WAN to LOCAL. On-Appliance Reports Dashboard Dashboard serves the purpose of a ready-reference providing the instant visibility into the network resource usability as well as alerts providing attack vs. user information without in-depth search. Drag-and-Drop Dashboard doclets can be minimized or repositioned to place doclets that requires special attention for managing Cyberoam. Press F10 key to go to view Dashboard from any of the pages. Page 26 of
27 Threats detected Dashboard - Recent IPS Alerts doclet Administrator can get the information of threat origin even in DHCP environment as username is included in the IPS alerts. In DHCP environment, where IP address is allocated dynamically, without username it is practically impossible to track the threat origin. Page 27 of
28 Dashboard - Recent HTTP Viruses detected doclet Dashboard - Recent Mail Viruses detected doclet Access Reports Browse to IP Address of Cyberoam> and logon to Reports with default username and password to view various reports. Most of the reports can be drilled down to the last level which provides User wise full URL details. Analytical Reports Analytical reports provide details on each and every activity for your network including users receiving virus and spam mails, spam and virus mail senders, users becoming victims of IPS attacks as well as details on IPS attackers. Page 28 of
29 Additionally, extensive reports that can help to analyze all the User activities like sites surfed, amount of data transferred and surfing time, carried out by user, group and so on are also provided to take the corrective actions by tuning the policies based on the user behavior. Want to know From Does Joe receive SMTP Spam mails? Anti Spam SMPT Spam Reports Top 10 Spam Receivers How many virus mails did Abraham receive List of IPS attack victims Is Margaret user accessing Chat category? How many users are attempting to access blocked sites? Click Show All Anti Virus HTTP Top 10 users Click Show All IPS Top 10 Victims Web Surfing Search Search by Chat category and <xyz> user Web Surfing Blocked attempts Top 10 Blocked-User Drill down from username to view the list of blocked categories, sites and the URL wise attempt details that user has tried to access. Which top 10 Categories accessed? Web Surfing Organization wide Top 10 Categories (By Hits) Which applications are accessed through a ? Drill down from Category name Traffic Discovery Report by LAN IP Address Traffic Discovery Report by WAN IP Address Sample Blocked Categories report View from Web Surfing Blocked Attempts Web Trends Web Trends track and reports surfing activity i.e. hits and displays the usage pattern over a period of time (hourly/weekly/monthly) in the form of graph. View from Trends Web Trends Page 29 of
30 Category & Category Type Trends Category Trends tracks and reports hits on category and category type i.e. category wise surfing activity and displays the usage pattern in the form of graph. View from Trends Category Trends or Trends Category Type Trends Page 30 of
31 Search Engine Report Google and Yahoo Search Engine Report displays the keywords searched by using Google search engine. It displays username, date and time of the search. View from Web Surfing Search Compliance reports Many business and organizations require protecting their critical applications as well as customer (patient) data, controlling access to that date and proving how they have done. For this, they need to meet regulatory requirements such as HIPAA, GLBA, SOX, FISMA and PCI. Cyberoam provides 45+ compliance reports and can be accessed from Reports > Compliance Reports. HIPAA - Health Insurance Portability & Accountability Act for Health care Industry regulations i.e. healthcare providers and insurance companies. GLBA - The Gramm-Leach-Bliley Act regulations for on financial institutions including banks, mortgage brokers, lenders, credit unions, insurance and real-estate companies. SOX - Sarbanes-Oxley for publicly held companies. PCI - Payment Card Industry regulations for organization that processes credit or debit card information, including merchants and third-party service providers that store, process or transmit credit card/debit card data. FISMA The Federal Information Security Management Act regulations for all information systems used or operated by a US Government federal agency or by a contractor or other organization on behalf of a US Government agency. Page 31 of
32 Data Leakage report Data leakage reveals the data loss resulting from employee behavior like lack of awareness, lack of diligence or deliberate action from the disgruntled employees, which poses a much more extensive threat than Enterprise can realize. Report provides files uploaded by the employees. View from Web Surfing By User HTTP File Upload. High Availability Using High availability for hardware failover and load balancing, involves installing two Cyberoam appliances Primary and Auxiliary appliance, with the same number of interfaces and same version installed on both the appliances. Cyberoam offers high availability by using Virtual MAC address shared between a primary and auxiliary appliance linked together as a cluster. Appliances - primary and auxiliary appliance, must be physically connected over a dedicated HA link port. Cluster appliances use this link to communicate cluster information and to synchronize with each other. Continuous connectivity - Failover Active-Active Yes Active-Passive Yes Load balance traffic Yes No Traffic processing Both Primary and Auxiliary Primary appliance appliance. Primary appliance acts as a load balancer and forwards traffic to the Auxiliary appliance for processing. But when primary appliance fails, an auxiliary appliance takes over and processes the entire traffic. Auxiliary appliance process only when primary appliance or any of the monitored links fails. Page 32 of
33 How high availability cluster works Appliances - primary and auxiliary appliance, are physically connected over a dedicated HA link port to operate as an HA Cluster. Cluster appliances use this link to communicate cluster information and to synchronize with each other. Once the HA cluster is configured, Cyberoam assigns a Virtual MAC address to one of the appliance in the cluster. Entire network traffic is forwarded to the cluster appliance which has the virtual MAC address. The appliance which has virtual MAC address becomes Primary Appliance while peer becomes Auxiliary Appliance. Primary appliance regularly sends keep-alive request through HA link, which is answered by Auxiliary appliance. If keep-alive request is not returned by primary appliance, the device is considered to have failed. In this case, Auxiliary appliance takes ownership of the virtual MAC address from primary appliance, and becomes primary appliance temporarily. Primary appliance automatically takes over from the Auxiliary appliance once it starts functioning. Configure Active-Active HA cluster The appliance from which HA is enabled becomes primary appliance and is assigned the virtual MAC address while the peer appliance acts as auxiliary appliance Step A: Configuring Auxiliary appliance 1. Create firewall rule to allow HA service traffic from Firewall Create Rule as Source: DMZ/Any Host Destination: LOCAL/Dedicated HA link port Service: HA Service Action: Accept Step B: Configuring Primary appliance 1. Create firewall rule to allow HA service traffic from Firewall Create Rule as Source: DMZ/Any Host Destination: LOCAL/Dedicated HA link port Service: HA Service Action: Accept 2. Add HA administrator from User User Add User to log HA events under this name in Audit log. Make sure, User Type of this user is Administrator 3. Configure HA cluster from System HA Configure HA and select Active-Active from HA Configuration Mode dropdown list. Page 33 of
34 Trouble Shooting Cyberoam provides Analytical Tool to check the health of the System in a single shot. It is used for troubleshooting and diagnosing problems found in the System. Analytical Tool is like a periodic health check up that helps to identify the impending System related problems. After identifying the problem, appropriate actions can be taken to solve the problems and keep the System running smoothly and efficiently. It can be accessed by browsing to IP address>/dg.html Page 34 of
35 You can use default Cyberoam IP address or IP address configured for LAN interface from Network Configuration Wizard at the time of deployment. Username cyberoam Password cyber Analytical tool also provides a Dropped Packet log which can be to monitor the dropped packet. Refer to on how to view and interpret the dropped packet log. General Administration Restart Cyberoam management services Cyberoam management services can be restarted from CLI Console. Add Alias Alias refers to assigning multiple IP addresses to an Interface. You can add alias from System Configure Network Manage Interface. General Administration using Web Admin Console Apart from Network management, following configurations can be performed only from Web Admin Console: DNS and DHCP firewall rules content filtering categories and policies user authentication method and integration with external authentication servers access control (Local ACL) antivirus and anti spam filtering policies VPN connection policies multiple gateways user and user groups bandwidth and internet access policy IPS policies and signature In addition, Dashboard, reports including traffic discovery and bandwidth usage graphs can be viewed only from Web Admin Console. General Administration using CLI Console Use CLI console for troubleshooting and diagnose network problems in details. Additionally you can also: Restart management services Restart and shutdown Cyberoam View log information Update MTU and MSS value Configure static and dynamic routes Upgrade Cyberoam and restore backup Restore to factory default settings Reset and change password Enable/disable LAN Bypass (only if Cyberoam is deployed as Bridge) Page 35 of
36 For more details, refer version specific Console Guide available on Reboot or shutdown Cyberoam You can reboot or shutdown Cyberoam from CLI Console Points to remember If you are integrating Cyberoam with Active Directory for authentication, use Active Directory as your DNS. You are required to define Active Directory as DNS both in Cyberoam as well as all the desktops. If you have configured Cyberoam as DHCP server for leasing IP addresses, make sure DHCP server is enabled for autostart. If not, then IP address will be leased only after rebooting Cyberoam. Page 36 of
37 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. USER S LICENSE The Appliance described in this document is furnished under the terms of Elitecore s End User license agreement. Please read these terms and conditions carefully before using the Appliance. By using this Appliance, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused Appliance and manual (with proof of payment) to the place of purchase for a full refund. LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service center s option, repair, replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore warrant that the Software is error free, or that the customer will be able to operate the software without problems or interruptions. Elitecore hereby declares that the anti virus and anti spam modules are powered by Kaspersky Labs and Commtouch respectively and the performance thereof is under warranty provided by Kaspersky Labs and by Commtouch. It is specified that Kaspersky Lab does not warrant that the Software identifies all known viruses, nor that the Software will not occasionally erroneously report a virus in a title not infected by that virus. Hardware: Elitecore warrants that the Hardware portion of the Elitecore Products excluding power supplies, fans and electrical components will be free from material defects in workmanship and materials for a period of One (1) year. Elitecore's sole obligation shall be to repair or replace the defective Hardware at no charge to the original owner. The replacement Hardware need not be new or of an identical make, model or part; Elitecore may, in its discretion, replace the defective Hardware (or any part thereof) with any reconditioned product that Elitecore reasonably determines is substantially equivalent (or superior) in all material respects to the defective Hardware. DISCLAIMER OF WARRANTY Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising from a course of dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law. In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect, consequential, incidental, or punitive damages however caused and regardless of the theory of liability arising out of the use of or inability to use the product even if Elitecore or its suppliers have been advised of the possibility of such damages. In the event shall Elitecore s or its supplier s liability to the customer, whether in contract, tort (including negligence) or otherwise, exceed the price paid by the customer. The foregoing limitations shall apply even if the above stated warranty fails of its essential purpose. In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages, including, without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual, even if Elitecore or its suppliers have been advised of the possibility of such damages. RESTRICTED RIGHTS Copyright Elitecore Technologies Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of Elitecore Technologies Ltd. CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad , INDIA Phone: Fax: Web site: Page 37 of
SSL VPN Client Installation Guide Version 9
SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
High Availability Configuration Guide Version 9
High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
Radius Integration Guide Version 9
Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
Virtual LAN Configuration Guide Version 9
Virtual LAN Configuration Guide Version 9 Document version 96-1.0-12/05/2009 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Cyberoam Multi link Implementation Guide Version 9
Cyberoam Multi link Implementation Guide Version 9 Document version 96-1.0-12/05/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
ADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
SSL VPN Management Guide Version 10
SSL VPN Management Guide Version 10 Document version 10.00.0302-1.0-09/08/2010 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
HTTP Client Installation Guide Version 9
HTTP Client Installation Guide Version 9 Document version 7300-1.0-9/13/2006 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
Cyberoam Anti Spam Implementation Guide Version 9
Cyberoam Anti Spam Implementation Guide Version 9 Document version 9402-1.0-18/10/2006 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
Cyberoam Anti Spam Configuration Guide Version 9
Cyberoam Anti Spam Configuration Guide Version 9 Document version 95466-1.0-25/06/2008 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Cyberoam Anti Virus Implementation Guide Version 9
Cyberoam Anti Virus Implementation Guide Version 9 Document version 9402-1.0-18/10/2006 2 Cyberoam Anti Virus Implementation Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it
IPSec VPN Client Installation Guide. Version 4
IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Cyberoam IPSec VPN Client Configuration Guide Version 4
Cyberoam IPSec VPN Client Configuration Guide Version 4 Document version 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time
Cyberoam Anti Spam Implementation Guide Version 9
Cyberoam Anti Spam Implementation Guide Version 9 Document version 96-1.0-12/05/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
SOFTWARE LICENSE LIMITED WARRANTY
CYBEROAM INSTALLATION GUIDE VERSION: 6..0..0..0 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty
Cyberoam Perspective BFSI Security Guidelines. Overview
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
Version: 4.10 Build 010 Date: April, 2008
Version: 4.10 Build 010 Date: April, 2008 Contents Download Client...2 Operating Systems supported...2 Introduction...2 Release 4.10 build 010...2...2 Release 4.10 build 009...2...2 Enhancements...2...2
User Guide Version 9.5.8
User Guide Version 9.5.8 Document version 95838-1.0-24/20/2008 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for VMware ESX/ESXi Version 10 Document Version 10.6.2-16/04/2015 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam
How To - Deploy Cyberoam in Gateway Mode
How To - Deploy Cyberoam in Gateway Mode Cyberoam appliance can be deployed in a network in two modes: Gateway mode. Popularly known as Route mode Bridge mode. Popularly known as Transparent mode Article
CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual
CYBEROAM WINDOWS DOMAIN CONTROLLER INTEGRATION GUIDE VERSION:
7300-1.0-9/20/2005 1 CYBEROAM WINDOWS DOMAIN CONTROLLER INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
Reviewer s Guide. Document Version 10.04.5.007-20/12/2013. Document version 7400-1.0-16/11/2005. Document version 7400-1.
Document Version 10.04.5.007-20/12/2013 Document version 7400-1.0-16/11/2005 Document version 7400-1.0-16/11/2005 Document version 7400-1.0-16/11/2005 General Information Technical Assistance If you have
User Guide Version 9 Document version 9412-1.0-01/03/2007
User Guide Version 9 Document version 9412-1.0-01/03/2007 2 Cyberoam User Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com
CYBEROAM LDAP INTEGRATION GUIDE VERSION: 7 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of
SSL VPN User Guide Version 10
SSL VPN User Guide Version 10 Version 7 Document Version 10.04.5.0007-30/11/2013 Document Version 10.04.4.0028-08/10/2013 Version 7 Version 7 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied
Unified Threat Management
Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0
Preparing for Version 10
Preparing for Version 10 Release Information Release Type: General Availability Compatible versions: 9.6.0.78 for al CRs except CR15i; 9.5.8.68 for CR15i Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Cyberoam Next-Generation Security. 11 de Setembro de 2015
Cyberoam Next-Generation Security 11 de Setembro de 2015 Network Security Appliances UTM, NGFW (Hardware & Virtual) 2 Who is Cyberoam? Leading UTM company, headquartered in Ahmedabad, India founded in
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0
Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Cyberoam. Unified Threat Management. Comprehensive Network Security
Cyberoam Unified Threat Management Comprehensive Network Security Cyberoam Emerging Internet threats External and Internal Viruses, Worms, Trojans Malware Spam Intrusions Spyware Phishing and Pharming
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
How To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
Barracuda IM Firewall Administrator s Guide
Barracuda IM Firewall Administrator s Guide Version 3.0 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2007, Barracuda Networks www.barracuda.com
INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start with the installation of the
Sonicwall Reporting Server
Sonicwall Reporting Server How to access the reporting server: Navigate to https://swreports.hitechsupport.com.au, and enter your username and password provided. After you have logged in, click on the
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Cisco Collaboration with Microsoft Interoperability
Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014
www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Check Point Security Administrator R70
Page 1 of 6 Check Point Security Administrator R70 Check Point Security Administration R70 Length Prerequisites 5 days* (recommended) Basic networking knowledge, knowledge of Windows Server and/or UNIX,
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Balancing and Gateway Failover
How To Add Active How or To Backup Add Gateway Active for Load or Backup Balancing and Gateway for Failover Load Balancing and Gateway Failover Applicable versions: 9.5.3 build 18 onwards Today organizations
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
NESCOT Cyberoam Training Academy
NESCOT Cyberoam Training Academy Sage Lal [email protected] BSc (Hons), B.C.S, PGCE, CCNA, CCAI, DHTI, LMC, MiFL, CCNSP Nescot becomes first FE/HE Institution in the UK to deliver CCNSP Training! Cyberoam
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
User Manual. Page 2 of 38
DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
How To Configure L2TP VPN Connection for MAC OS X client
How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used
SonicWALL Email Security Solutions SonicWALL Email Security
SonicWALL Email Security Solutions EMAIL SECURITY SonicWALL Email Security SonicWALL Email Security 6.0 Administrator's Guide Appliance Edition SonicWALL Email Security Administrator s Guide Version 6.0
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
GFI WebMonitor 2011. Administration and Configuration Manual
GFI WebMonitor 2011 Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Chapter 4 Security and Firewall Protection
Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be
Securing the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.
SOLUTION GUIDE Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management. North America Radware Inc. 575 Corporate Dr Suite 205 Mahwah, NJ 07430
602LAN SUITE 5.0 Groupware
602LAN SUITE 5.0 Groupware Installation Manual 2007 Software602, Inc. 1 Table of Contents Table of Contents...2 Introduction...3 Prerequisites...4 Installation... 5 Server Configuration...7 Console...7
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
Websense Email Security Transition Guide
Websense Email Security Transition Guide Websense Email Security Gateway v7.6 2011, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA R140611760 Published August 2011
