CR10wing-quote

Specifications

Interfaces

Copper GbE3
Internal/DMZ/WAN PortsYes
Console Ports (RJ45/DB9)1
USB Ports2

 

Built-in Wireless LAN

Wireless StandardsIEEE 802.11 a/b/g/n (WEP, WPA, WPA2,802.11i , TKIP, AES, PSK)
AntennaDetachable 2×2 MIMO
Access PointsUp to 8 SSID
Transmit Power802.11a: 12dBm ± 2dBm
802.11b: 17dBm ± 2dBm 
802.11g: 16dBm ± 2dBm 
802.11an (HT20): 12dBm ± 2dBm@MCS7 
802.11an (HT40): 11dBm ± 2dBm@MCS7 
802.11gn (HT20): 15dBm ± 2dBm@MCS7 
802.11gn (HT40): 14dBm ± 2dBm@MCS7
Receiver Sensitivity802.11a: ≤ -76dBm@54Mbps 
802.11b: ≤ -85dBm@11Mbps 
802.11g: ≤ -76dBm@54Mbps 
802.11gn (HT20): ≤ -75dBm@MCS7 
802.11gn (HT40): ≤ -72dBm@MCS7 
802.11an (HT20): ≤ -74dBm@MCS7 
802.11an (HT40): ≤ -71dBm@MCS7
Frequency Range2.412 GHz – 2.472 GHz, 5.200 GHz – 5.825 GHz
Data Rate11a: Up to 54Mbps 
11b: Up to 11Mbps 
11g: Up to 54Mbps 
11n: Up to 300Mbps

 

System Performance*

Firewall Throughput (UDP)400 (Mbps)
Firewall Throughput (TCP)300 (Mbps)
New sessions/second2,000
Concurrent sessions27,500
IPSec VPN Throughput100 (Mbps)
No. of IPSec Tunnels25
SSL VPN Throughput25 (Mbps)
Anti-Virus Throughput100 (Mbps)
IPS Throughput90 (Mbps)
UTM Throughput60 (Mbps)

 

Stateful Inspection Firewall

  • Layer 8 (User – Identity) Firewall
  • Multiple Security Zones
  • Access Control Criteria (ACC) – User – Identity, Source & Destination Zone, MAC and IP address, Service
  • UTM policies – IPS, Web Filtering, Application Filtering,Anti-Virus, Anti-Spam and Bandwidth Management
  • Layer 7 (Application) Control & Visibility
  • Access Scheduling
  • Policy based Source & Destination NAT
  • H.323, SIP NAT Traversal
  • 802.1q VLAN Support
  • DoS & DDoS Attack prevention
  • MAC & IP-MAC filtering and Spoof prevention

 

Gateway Anti-Virus & Anti-Spyware

  • Virus, Worm, Trojan Detection & Removal
  • Spyware, Malware, Phishing protection
  • Automatic virus signature database update
  • Scans HTTP, HTTPS, FTP, SMTP/S, POP3, IMAP, IM, VPN Tunnels
  • Customize individual user scanning
  • Scan and deliver by file size
  • Block by file types
  • Add disclaimer/signature

 

Gateway Anti-Spam

  • Inbound Scanning
  • Real-time Blacklist (RBL), MIME header check
  • Filter based on message header, size, sender, recipient
  • Subject line tagging
  • IP address Black list/White list
  • Redirect Spam mails to dedicated email address
  • Image-based Spam filtering using RPD Technology
  • Zero hour Virus Outbreak Protection
  • IP Reputation-based Spam filtering

 

Intrusion Prevention System

  • Signatures: Default, Custom
  • IPS Policies: Multiple, Custom
  • User-based policy creation
  • Automatic Signature updates
  • Protocol Anomaly Detection
  • DDoS attack prevention
  • SCADA-aware IPS with pre-defined category for ICS and SCADA signatures

Web Filtering

  • On-cloud Web Category Database
  • URL, keyword, File type block
  • Categories: Default(89+), Custom
  • Protocols supported: HTTP, HTTPS
  • Block Malware, Phishing, Pharming URLs
  • Schedule-based access control
  • Visibility and Controls for HTTPS based Micro-Apps like Facebook chat, Youtube video upload
  • Custom block messages per category
  • Block Java Applets, Cookies, Active X
  • CIPA Compliant
  • Data leakage control via HTTP, HTTPS upload

 

Application Filtering

  • Inbuilt Application Category Database
  • Schedule-based access control
  • Block
    • Proxy and Tunnel
    • File Transfer
    • Social Networking
    • Streaming Media
    • Storage and Backup
  • Layer 7 (Applications) & Layer 8 (User – Identity) Visibility
  • Securing SCADA Networks
    • SCADA/ICS Signature-based Filtering for Protocols – Modbus, DNP3, IEC, Bacnet, Omron FINS, Secure DNP3, Longtalk
    • Control various Commands and Functions

 

Virtual Private Network

  • IPSec, L2TP, PPTP
  • Encryption – 3DES, DES, AES, Twofish, Blowfish, Serpent
  • Hash Algorithms – MD5, SHA-1
  • Authentication – Preshared key, Digital certificates
  • IPSec NAT Traversal
  • Dead peer detection and PFS support
  • Diffie Hellman Groups – 1,2,5,14,15,16
  • External Certificate Authority support
  • Export Road Warrior connection configuration
  • Domain name support for tunnel end points
  • VPN connection redundancy
  • Overlapping Network support
  • Hub & Spoke VPN support

 

VSSL VPN

  • TCP & UDPTunneling
  • Authentication – Active Directory, LDAP, RADIUS, Cyberoam
  • Multi-layered Client Authentication – Certificate, Username/Password
  • User & Group policy enforcement
  • Network access – Split and Full tunneling
  • Browser-based (Portal)Access – Clientless access
  • Lightweight SSL VPN Tunneling Client
  • Granular access control to all the Enterprise Network resources
  • Administrative controls – Session timeout, Dead Peer Detection, Portal customization
  • TCP- based Application Access – HTTP, HTTPS, RDP, TELNET, SSH

 

Instant Messaging (IM) Management

  • Yahoo and Windows Live Messenger
  • Virus Scanning for IM traffic
  • Allow/Block Login
  • Allow/Block File Transfer
  • Allow/Block Webcam
  • Allow/Block one-to-one/group chat
  • Content-based blocking
  • IM activities Log
  • Archive files transferred
  • Custom Alerts

 

Wireless WAN

  • USB port 3G/4G and WiMAX Support
  • Primary WAN link
  • WAN Backup link

 

Bandwidth Management

  • Application and User Identity based Bandwidth Management
  • Guaranteed & Burstable bandwidth policy
  • Application & User Identity based Traffic Discovery
  • Multi WAN bandwidth reporting
  • Category-based bandwidth restriction

 

User Identity and Group Based Controls

  • Access time restriction
  • Time and Data Quota restriction
  • Schedule based Committed and Burstable Bandwidth
  • Schedule based P2Pand IM Controls

Networking

  • Failover – Automated Failover/Failback, Multi-WAN failover, 3G Modem failover
  • WRR based load balancing
  • Policy routing based on Application and User
  • IP Address Assignment – Static, PPPoE, L2TP, PPTP & DDNS Client, Proxy ARP, DHCP server, DHCP relay
  • Support for HTTP Proxy
  • Dynamic Routing: RIP v1& v2, OSPF, BGP, PIM-SIM, Multicast Forwarding
  • Parent Proxy support with FQDN
  • “IPv6 Ready” Gold Logo

 

Administration & System Management

  • Web-based configuration wizard
  • Role-based access control
  • Firmware Upgrades via Web UI
  • Web 2.0 compliant UI (HTTPS)
  • UI Color Styler
  • Command Line Interface (Serial, SSH, Telnet)
  • SNMP(v1, v2c, v3)
  • Multi-lingual support: Chinese, Hindi, French, Korean
  • Cyberoam Central Console (Optional)
  • NTP Support

 

User Authentication

  • Internal database
  • Active Directory Integration
  • Automatic Windows/RADIUS Single Sign On
  • External LDAP/RADIUS database integration
  • Thin Client support – Microsoft Windows Server 2003
  • 2-factor authentication: 3rd party support** 
    Terminal Services and Citrix XenApp
  • External Authentication – Users and Administrators
  • User/MAC Binding
  • Multiple Authentication servers

 

Logging/Monitoring

  • Graphical real-time logging and monitoring
  • Syslog support
  • Log Viewer – Firewall, IPS, Web filter, Anti Virus, Anti Spam, Authentication, System and Admin Events

 

IPSec VPN Client***

  • Inter-operability with major IPSec VPN Gateways
  • Supported platforms: Windows 2000, WinXP 32/64-bit, Windows 2003 32-bit, Windows 2008 32/64-bit, Windows Vista 32/64-bit, Windows 7 32/64-bit
  • Import Connection configuration

 

Certification

  • ICSAFirewall – Corporate
  • Checkmark UTM Level 5 Certification
  • VPNC – Basic and AES interoperability
  • ” IPv6 Ready ” Gold Logo

 

 

Hardware Specifications

Memory1GB
Storage4GB

Compliance

  • CE
  • FCC

 

 

Dimensions

H x W x D (inches)1.35 x 8.75 x 6.8
H x W x D (cms)3.43 x 22.23 x 17.3
Weight1.10 kg, 2.42 lbs

 

Power

Input Voltage100-240 VAC
Consumption22W
Total Heat Dissipation (BTU)75

 

Environmental

Operating Temperature0 to 40 °C
Storage Temperature-25 to 75 °C
Relative Humidity (Non condensing)10 to 90%

*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments. 
**For details, refer Cyberoam’s Technical Alliance Partner list on Cyberoam website. ***Additional Purchase Required.

Contact Us

Ready to use Cyberoam CR10wiNG? Contact us to know more about our services or submit the form below.


Join over a thousand users and let House of IT help you get started! Get a free quote now!