Appliance-based network security is still seen by many SMBs as an expensive luxury, but Cyberoam is keen to change this perception. It’s the first Cyberoam appliance to sport an 802.11n wireless AP, and it’s the first look at the latest Version X firmware. This delivers a new web interface common to all Cyberoam appliances, which is easier to use and opens with a new dashboard view showing all detected threats, details about the appliance and subscription status. It’s more informative than the previous interface, which focused heavily on web activity and user’s surfing patterns. This device is relatively small, but enough to SMEs or remote-office. Cyberoam CR15wi has supported IPv6 addressing system that roadmap implementation in Indonesia was
completed in 2012, replacing IPv4. Support for 3G and WIMAX internet connection via a USB port on the rear panel makes CR15wi as long-term IT assets. Meanwhile, in the case of cable internet connection, there
is support for multi-enabled WAN fail-over and load balancing.
In the concept of User Identity-Based Security Policy, the identity of the client and the computer will be registered into the database CR15wi. Then, after logging into the system CR15wi via web interface, clients who registered will be thoroughly protected by various security features like anti-virus Kaspersky, Commtouch anti-spam, VPN connections also from GreenBow. Through the concept of User Identity-Based Security Policy After all, administrators facilitated in the silent control and monitor activity. CR15wi able to filter more
than 11 types of applications, including: online gaming, instant messenger and peer to peer sharing. There is also a feature to jump to the proxy attempts to break out (a technique known as an anonymous proxy or ultra surf) that aims to avoid the monitoring of surfing.
Internet connectivity and networking in CR15wi grouped under the concept of zone. The default is in port LAN zone A, zone B WAN port, DMZ zone in the port C. Wireless LAN (WLAN) can be inserted into the LAN zone. Firewalls work by policy or rule made by adjusting the configuration of multiple objects, namely: zone, group or user identity, as well as the implementation schedule. New firmware named Version X presents a more intuitive interface and integrated. For administrators, each time you log always treated to the first screen contains the detail the current status of various security tools (such as: detection of spyware, web viruses, viruses FTP, an attack that was captured by the IPS, as well as a DoS attack that was caught by a
facility DoS Protection). Also displayed license status of anti-virus, anti-spyware, Web filtering, and IPS signatures complete with a status update. To maximum security, it’s recommended to enable antispoofing
facility when setting the network configuration. This feature is important to bind the network card address and the IP address used by the client.
Its new web interface dashboard has an overview of threats, with details of the appliance and status of subscriptions. This is more informative than the previous version, which focused too much on general web-browsing activity. The interface is common across all of Cyberoam’s appliances, so moving up to a larger unit won’t be a problem. The identity-based security can use AD, NT Domain, Radius and LDAP servers or its own database, plus Cyberoam’s Corporate Client utility. You have three user types, with a normal user logging on via the locally-installed client.
The client isn’t required if you are using an external directory server. Clientless users with no authentication don’t have to log on, but can’t have surfing and data-transfer quotas or internet access time restrictions applied. User and group controls are extensive: we could apply web filtering, internet access and bandwidth usage policies to each one. Firewall rules use port zones to define sources and destinations. Advanced rules allow you to set AV and anti-spam functions, add IDP policies, limit internet access and apply bandwidth
The new IM controls use rules to control the login process and block or allow text chats, file transfer and webcam sharing. Creating IM contacts and groups takes this even further, as different access policies can be applied. If you are running in bridged mode, the appliance presents a single wireless access point, but in routed mode it can offer up to seven more wireless interfaces.
Cyberoam uses the Commtouch anti-spam service and the CR15wi allows you to apply a global policy to all users and fine-tune it with custom policies. It delivered excellent results: after filtering live email for three weeks, we saw a 98.5 per cent success rate. There are sweeping changes in reporting, largely handed over to Cyberoam’s new iView software. This functions as a Syslog server. The software runs on any Windows host and the level of information provided by iView is impressive, to say the least. It gives graphical summaries of allowed and denied traffic and hundreds of predefined reports are provided.
Despite its compact dimensions, the CR15wi is packed to the gills with security features and the low price makes it highly affordable for small businesses. Its identity-based security is extremely versatile, anti-spam measures are very accurate and the latest iView reporting software offers a wealth of valuable information.
performance of wireless data packet transfer rates needs to be improved. Because the graph Chariot testing showed that the average throughput can not be close to 100 Mbps. CR15wi Cyberoam security appliances can be integrated to the SMEs with financing schemes are relatively realistic and affordable. Several efforts to tune the default settings are able to maximize the performance of security.
• Anti-virus gateway (Kaspersky).
• Anti-spam gateway (Commtouch).
• IPS (Intrusion Prevention System).
• VPN (GreenBow).
• Multi-WAN management (Failover and load-balance).
• DMZ (Demilitarized Zone).
• Web content filtering.
• Application filtering.
• Ultra-surfing (anonymous proxy) prevention.
• DoS protection.
• Mac spoofing protection.
• Bandwidth management.
• DHCP server.
• DNS server.
• 1X gigabit ethernet WAN (internet).
• 1X gigabit ethernet LAN.
• 1X gigabit ethernet DMZ.
• 1X USB 2.0.
• 802.11 b / g / n.
Operation mode : Routed (gateway), bridged.
Guarantee : 1 year
Website : www.rml.co.id
Graph the results of the IPS testing using Nessus exploit.
New user interface named Version X for administrators.
• Rich security features
• Support 3G & WiMax modem
• Intuitive administration interface
• Realistic price
• Remarkably good value
• Identity-based security
• Simple deployment
• Extensive security measures
• Top quality reporting software
Cons: No complaints at this low price
Incoming Computer Tutorial Search:
- how to break cyberoam security
- cyberoam cr15wi
- cyberoam wireless router
- cyberoam create zone wan
- cyberoam wireless to lan
- grc shields up ipv6
- filetype:Computer security”
- how many cyberoam ips signatures
- how to breaak cyberroam policy
Related Computer Tutorial:
- Prolink PWH-2004 Wireless Router Available Now With Great Speed And In Affordable Price As mobile wireless broadband services become more popular, you can expect networking device vendors like Prolink to introduce more 3G routers. The PWH2004 is the third such product we’ve tested,...
- Cisco RVS4000 Linksys Wireless Router With Better Security And Other Useful Features A firewall is the first layer in this Ethernet router, however the facility Intrusion Detection / Prevention System into second-tier defenses. At first glance, the Cisco RVS4000 physical form is...
- TP-Link TL-WR1043ND The Wireless-N plus Gigabit Ethernet With Good Speed And Easy To Setup Recently the TP-Link released a wireless routers device that has output port ethernet 1000 mbps speed. Be offered at an affordable price indication TP-Link’s determination to compete or even win...
- How To Improve Your Wireless Access Point Security It’s important to remember that a wireless signal is broadcast and accessible to anyone who has the technology to receive it. By default all traffic is encrypted that travels between...
- Introducing The PC Tools Internet Security 2011 With Good Interface And Complete Rapid Protections The core of a good Windows internet security suite is obviously the protection it offers you from viruses, spyware and other threats which could disrupt your work or cost you...