...

Cogli l`attimo e prendi la giusta decisione

by user

on
Category: Documents
780

views

Report

Comments

Transcript

Cogli l`attimo e prendi la giusta decisione
www.cyberoam.com
Cogli l’attimo e
prendi la giusta decisione
prima che la tua rete aziendale finisca sotto assedio
Scegli la sicurezza di
nuova generazione progettata
per le reti aziendali del futuro
Fenomeni come BYOD, de-perimetrazione delle reti
aziendali, aumento del numero di utenti e dei
dispositivi che accedono alla rete, esplosione delle
applicazioni e virtualizzazione possono essere un
vantaggio o una minaccia per il tuo business e causare
la perdita di controllo sulla sicurezza della rete
aziendale. I firewall next generation di Cyberoam
offrono protezione certificata EAL4+, strumenti e
controlli di intelligence attivabili e funzionalità di
sicurezza di nuova generazione per garantire
protezione Layer 8 basata sull'identità dell'utente,
visibilità e controllo sulle applicazioni, IPS, VPN, onappliance reporting e molto altro ancora.
Inoltre, grazie a performance cinque volte superiori
rispetto allo standard di mercato, un'architettura di
sicurezza estensibile e alta affidabilità dei sistemi,
Cyberoam consente ai CIO aziendali di affrontare con
serenità questo cambio generazionale mantenendo il
pieno controllo sui propri network.
 

4
Cyberoam Product Line :
Network security appliances
(Next-Generation Firewalls/UTMs)
Centralized Management
(Hardware & Virtual)
Centralized Reporting
Distributore Ufficiale per l'Italia:
HORUS INFORMATICA Srl
Via Enzo Ferrari, 21/B
20010 Arluno - Milano - Italy
www.horus.it
© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Ufficio Commerciale
[email protected]
Tel: 02/33510135
Fax: 02/33510199
Supporto Tecnico
Pre vendita
[email protected]
Post vendita
[email protected]
Ufficio Marketing
[email protected]
Fax: 02/33510838
Soluzioni Cyberoam
per la Network Security
Con una presenza capillare in oltre 125 paesi, Cyberoam
Technologies, azienda di Sophos, è il fornitore globale delle
pluripremiate soluzioni per la sicurezza IT.
Con la sua gamma completa di prodotti accreditati sul
mercato con standard e certificazioni globali, Cyberoam
offre soluzioni affidabili che rispondono alle principali
esigenze di network security, gestione e reporting
centralizzato della sicurezza delle aziende di qualsiasi
dimensione. Grazie a caratteristiche innovative e uniche
sul mercato le soluzioni Cyberoam sono oggi la scelta
vincente di migliaia di aziende che affidano a Cyberoam la
protezione ed il controllo dei propri network.
Portfolio soluzioni Cyberoam:
Network Security
Appliance firewall di nuova generazione per
la protezione da minacce attuali e future dei
network fisici e virtuali.
Gestione centralizzata della sicurezza
Console per la gestione e il controllo centralizzato dei dispositivi UTM all’interno di network
distribuiti ed estesi
Reporting centralizzato
Logging e reporting centralizzato per la visibilità in tempo reale delle attività all’interno del
network aziendale
Training & Supporto
Rapida risoluzione dei problemi grazie a
supporto cliente e piani di training che offrono
gli skill necessari ad implementare e gestire in
modo efficace le soluzioni Cyberoam
L8
USER
L7
Application
L6
Presentation ASCII, EBCDIC, ICA
L5
Session
L4
Transport
L3
Network
L2
Data Link
L1
Physical
L2TP, PPTP
TCP, UDP
192.168.1.1
00-17-BB-8C-E3-E7
TECNOLOGIA LAYER 8 DI CYBEROAM
La tecnologia identity-based di Cyberoam estende le funzionalità
di security al Layer 8, lo human layer del modello OSI.
L’ecosistema IT può essere suddiviso in 7 livelli definiti livelli
OSI: il punto d’incontro tra persone e tecnologia è conosciuto
come Layer 8 e Cyberoam garantisce sicurezza a questo livello
ponendosi al livello più vicino all’intelligenza umana.
Questo consente alle aziende di identificare gli utenti
in modo univoco, controllare le loro attività all’interno della
rete e attivare policy e reporting in base allo username, anche
in ambienti di IP dinamici come DHCP e Wi-Fi. La tecnologia
Layer 8 di Cyberoam aggiunge velocità alla sicurezza della
rete aziendale offrendo immediata visibilità dell’origine degli
attacchi e permette il monitoraggio proattivo degli incidenti.
Grazie a questa tecnologia le aziende sono in grado di gestire
la sicurezza, proteggere i dati, effettuare analisi e garantire
la conformità alle normative.
La Tecnologia Layer 8 di Cyberoam
considera l’identità dell’utente come l’8°
livello del modello OSI
I firewall di nuova generazione di Cyberoam
garantiscono la sicurezza dal Layer 2 al Layer 8
grazie alle policy identity based
NETWORK SECURITY
Grazie a molteplici funzionalità di sicurezza integrate in una
singola appliance Cyberoam offre una sicurezza di rete completa.
Le appliance Cyberoam proteggono le reti da malware, vulnerabilità
di applicazioni web, problematiche BYOD, perdita di dati su siti
Web e applicazioni, attacchi misti sofisticati, spam, spyware e altre
minacce esterne in continua evoluzione. Grazie alla disponibilità
sia della versione hardware che virtuale, Cyberoam protegge sia
network fisici che virtuali.
Funzionalità di sicurezza di nuova
generazione della serie Cyberoam NGFW:
. Stateful Inspection Firewall
. Application Visibility&Control
. Web Application Firewall
. VPN (SSL VPN&IPSec)
. Intrusion Prevention System
. Anti-Virus&Anti-Spyware
. Anti-Spam
. Outbound Spam Protection
. Web Filtering
. Bandwidth Management
. 3G / 4G / WiMAX Connectivity *
. IM Archiving&Controls
. Multiple Link Management
. On-Appliance Reporting
. IPv6 Ready
. Wi-Fi Appliances *
. FleXi Ports*
*Funzionalità non disponibili nelle appliance virtuali
FATTORI CHIAVE:
• Presenza capillare in oltre 125 paesi
• Leader nel settore per R&D
• Primo vendor di network security dotato di Global Customer Support Service
certificato ISO 20000:2011
• Standard e certificazioni globali, come EAL4+, CheckMark UTM Level 5 Certification,
ICSA Labs, IPv6 Gold logo, membro del Virtual Private Network Consortium
• Riconosciuto come ‘Network - Security Innovator’ da SC Magazine
• Riconosciuto come “Visionary” all’interno del Magic Quadrant per SMB Multi-function
Firewalls di Gartner
Cyberoam serie NG - Next Generation Firewall (NGFW)
Le appliance Cyberoam NG Series NGFW offrono ad aziende di qualsiasi dimensione,
protezione dalle minacce attuali e future. Grazie a funzionalità di sicurezza di nuova
generazione i network aziendali sono protetti dalle minacce derivanti dai nuovi trend IT
emergenti come l’aumento del numero dei dispositivi e delle applicazioni che accedono alla
rete, l’ampia diffusione delle applicazioni web.
Firewall Throughput Gigabit, anche per Branch Office
Grazie a valori difirewall throughput Gigabit disponibili sin dalle
appliance entry-level le aziende possono godere di performance
eccezionali anche per le loro sedi remote.
Security Appliance con opzioni di connettività flessibili
Le appliance Cyberoam fleXi Port NGFW, disponibili come parte della
serie NG, garantiscono alle aziende la flessibilità di rete e la libertà
di configurazione grazie a slot I/O che permettono di scegliere tra
connettività di rete CopperGbE e Fiber 1GbE/10GbE
Firmware Intelligente
OS
Perfettamente integrato con hardware per accelerazione
criptografica e di rete il sistema operativo di Cyberoam
estrae i massimi livelli diperformance graze alla sua
piattaforma multi-core ed garantisci i più bassi valori
di latenza. Unito alle funzionalità di sicurezza di nuova
generazione offre la migliore protezione dalle nuove
minacce in continua evoluzione
Extensible Security Architecture (ESA)
L’architettura di sicurezza “Extensible” di Cyberoam
aiuta le aziende a contrastare le minacce sconosciute
del futuro grazie alla capacità di prolungare la vita e
le performance delle sue appliance NGFW così da
supportare le nuove funzionalità e le migliorie che
verranno implementate a livello di sicurezza
Future-Ready Security.
Serie Hardware Appliance Cyberoam NGFW:
Serie CRNG
15wiNG, 15iNG, 25wiNG, 25iNG, 35wiNG, 35iNG, 50iNG,
100iNG, 200iNG, 300iNG, 500iNG-XP, 750iNG-XP,
1000iNG-XP, 1500iNG-XP, 2500iNG, 2500iNG-XP
Caratteristiche principali
Tecnologia Layer 8
• Tutti i moduli di sicurezza integrati nelle appliance Cyberoam NGFW si basano sulla tecnologia Layer 8 per garantire controlli basati sull’identità dell’utente attraverso le fasi di user authentication, service authorization e reporting (AAA)
• Strumenti Avanzati di logging e reporting identity based
• Controllo della navigazione utenti identity based anche in ambienti Remote Desktop e Citrix
UTQ User Threat Quotient
• Cyberoam è l’unica soluzione di sicurezza UTM/NGFW in grado
di identificare i fattori di rischio attraverso l’analisi comportamentale degli utenti della rete e fornire un completo controllo dei rischi
per intraprendere in maniera automatica le contromisure necessarie
in caso di attacco
Wireless Guest User Authentication via SMS gateway
• Automazione dei processi di gestione utenti ospiti delle retei WiFi
è così possibile coprire le esigenze del mercato hospitality
4 Eye authentication
• Grazie a questa caratteristica Cyberoam è l’unica soluzione
di sicurezza UTM/NGFW veramente compliant con le normative sulla privacy
Sicurezza delle reti WiFi
• Possibilità di estendere le funzionalità di sicurezza alle reti WiFi esistenti grazie all’integrazione con i wireless controller
per l’autenticazione utenti via Radius Single Sign On (RSSO)
o via API
Funzionalità di multi link management e local Load Balancer
• Gestione automatica del Failover/Failback della linea
• Gestione di multi connessioni Wan
• Supporto connessioni 3G/4G su porta USB e WiMax
• Supporto routing dinamico: RIP v1& v2, OSPF, BGP, Multicast
• Funzionalità di Local Load Balancer basate su WRR
Security Appliance virtuali
Progettate per rispondere alle esigenze di sicurezza delle aziende in ambienti virtuali come data center virtuali, ambienti
‘Security in a box’ ed ‘Office in a box’, le soluzioni Cyberoam offrono una soluzione di network security adatta ai principali
scenari di virtualizzazione:
• Protezione dei data center virtuali senza la necessità di implementare
soluzioni di sicurezza hardware dedicate
• Sicurezza Layer 8 e controllo degli accessi basati sull’utente fondamentali
in ambienti “Offi ce-in-a-Box” e BYOD
• Supporto piattaforme VMware, Microsoft Hyper-V, KVM
e Citrix XenServer con la possibilità di passare facilmente
a configurazioni di sicurezza “chiavi in mano” per MSSP/aziende.
I moduli di licenza permettono di assegnare il numero di vCPU
per l’appliance Cyberoam NGWF virtuale in base all’esigenza
dell’azienda. Tale flessibilità, unitamente alla compatibilità
con diverse piattaforme virtuali e alla possibilità di aggiornarla
facilmente a modelli virtuali UTM superiori, garantisce alle
aziende pieno controllo delle infrastrutture di rete.
Grazie alla scansione del traffico in ambienti virtuali e alle
funzionalità di sicurezza integrata su un’unica appliance virtuale,
Cyberoam virtual UTM protegge le reti virtuali da attacchi
su console di gestione hypervisor, hypervisor & Guest OS,
applicazioni web virtualizzate e server, e permette alle aziende di
proteggere le reti Zero Trust Networks.
Cyberoam offre una soluzione di sicurezza completamente
virtuale in combinazione con la Virtual Cyberoam Central Console
per la gestione centralizzata della sicurezza, e al software
Cyberoam iView per il logging e il reporting.
Application Visibility & Control
• Gestione della priorità delle applicazioni in base alla combinazione di più criteri tra cui utente, orario, tipo di applicazione e banda
• QoS (Quality of Service) sulla navigazione
• Controlli granulari delle applicazioni attraverso classificazione basata
su livello di rischio, caratteristiche, tecnologia
• Modello di protezione proattivo che evita la necessità di interventi manuali per l’aggiornamento delle policy con le nuove applicazioni
Web Application Firewall (WAF)
• Protezione avanzata delle applicazioni web (ecommerce, intranet, webmail aziendali) grazie alla nuovissima tecnicologia WAF
VPN
• Accessi remoti sicuri grazie a IPSec VPN, LT2P, PPTP e SSL VPN
• Tecnologia Threat-free Tunneling per la scansione del traffico di malware e tentativi di intrusione
Linea di appliance virtuali Cyberoam NGFW:
CRiV-1C, CRiV-2C, CRiV-4C, CRiV-8C, CRiV-12C
Advanced Threat Protection
• Grazie alla protezione contro le nuove minacce in evoluzione garantita dai moduli Intrusion Prevention, Gateway Anti-Virus/Anti- Spyware, Gateway Anti-Spam e Web & Content Filtering, Cyberoam offre il massimo della sicurezza al livello delle migliori soluzioni best-of-breed
Outbound Spam Protection
• Protezione da incidenti di outbound spam ricorrenti con una significativa riduzione del consumo di banda e ottimizzazione
delle performance della rete
• Tecnologia Recurrent Pattern Detection (RPD) per classificazione
in tempo reale e rapida identificazione e blocco dello spam
Le aziende ed i MSSP possono gestire
centralmente la sicurezza di tutte le sedi e client
remoti che utilizzando le appliance Cyberoam UTM
e NGWF attraverso lo strumento di managemnt
CyberoamCentral Console (CCC), disponibile sia
in versione hardware che virtuale.
Centralized Security Management across Branch Offices
• Attivazione centrale di policy, security subscription e aggiornamenti di firmware/signature con gestione delle modifiche per uniformare policy e garantire protezione da minacce zero hour
• Possibilità di raggruppare le appliance per client, area geografica, modello appliance, versione firmware, tipo azienda o tipo di licenza
• Creazione di policy template da riutilizzare per la configurazione delle security policy di nuove sedi o di nuovi clienti
• possibilità di impostare diversi livelli di amministazione in base al ruolo e prevenire l’abuso di privilegi amministrativi
• Notifiche di alert come reminder per la scadenza di licenze, minacce che superano una determinata soglia di punteggio,
cambiamenti distato di connessione delle appliance o della VPN
• Ottimizzazione dei tool di Professional Services Automation (PSA) esistenti, monitoring dell’infrastruttura IT e dei sistemi di ticketing
• Business Continuity - High Availability (HA) Active-Passive
• Roll-back configuration - Change Control & Logging: gestione centralizzata e controllo dei change per mantenere la revision history
dei cambiamenti effettuati sugli appliance gestiti ed effettuare il Roll-back delle configurazioni modificate
• L’integrazione con Cyberoam iView consente l’auto-provisioning delle appliance e la sincronizzazione automatica degli amministratori CCC in Cyberoam iView
Linea di appliance CCC:
• Hardware CCC NM Appliances
- CCC15NM, CCC50NM, CCC100NM, CCC200NM, CCC500NM
• Hardware CCC Appliances
- CCC15, CCC50, CCC100, CCC200, CCC500, CCC1000
• Virtual CCC Appliances
- CCCV15, CCCV50, CCCV100, CCCV200, CCCV500
Le aziende possono avere in tempo reale la
visibilità completa delle attività utente e di rete
grazie alle funzionalità di logging e reporting
centralizzato offerte da Cyberoam iView
Centralized Visibility across Networks
• Oltre 1200 report a supporto della gestione della sicurezza, della conformità alle normative e delle analisi forensi
• Log, report ed alert su molteplici dispositivi, protocolli e location forniscono informazioni sull’attività degli utenti e della rete
così da poter identificare eventuali violazioni alla sicurezza ed intraprendere velocemente le opportune contromisure
minimizzando downtime della rete
• Report che rispondono alle normative vigenti come HIPAA, PCI DSS, GLBA, SOX e report drill-down riducono notevolmente i costi per garantire la conformità
• Supporto per analisi legali; le aziende sono in grado di ricostruire la sequenza degli eventi che si sono verificati nel momento di della violazione ed estrarre lo storico degli eventi relativi alla rete, riducendo i costi necessari a indagare sull’accaduto
e ridurre il downtime della rete
• Compatibilità con un’ampia gamma di dispositivi inclusi Proxy Firewall, applicazioni customizzate e qualsiasi dispositivo compatibile
con Syslog. Le aziende possono raccogliere log e report provenienti da molteplici dispositivi
Cyberoam iView Appliance Range:
• Hardware appliances
- CR-iVU25NR, CR-iVU100NR, CR-iVU200NR
•Software
Techsheet – Cyberoam Product Range
Tech Sheet
Techsheet – Cyberoam Product Range
Techsheet – Cyberoam Product Range
Tech Sheet
Tech Sheet
Techsheet – Cyberoam Product Range
Tech Sheet
Techsheet – Cyberoam Product Range
Tech Sheet
Cyberoam
offre Next-Generation
a network SOHO,
SMEs along
ed Enterprise
di nuova
generazione
performance
attraverso la sua
linea and
di appliance
Next-Generation
Cyberoam offers
security
with high sicurezza
performance
to SOHO,
SMEs anddalle
Enterprise
networkseccezionali
with its Next-Generation
Firewalls
UTM appliances.
CyberoamFirewall
ed UTM. Cyberoam non si limita a fornire una soluzione completa di network security, ma semplifica la gestione della sicurezza per aziende con più sedi attraverso la console di
moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution,
management
Cyberoam
Central security
Consolealong
(CCC),
e la
soluzione
di logging
& reporting
centralizzato
Cyberoam
iView.
L’intera linea di Firewalls
prodotti and
Cyberoam
è disponibile
sia in versione
Cyberoam
offers
Next-Generation
with
high
performance
to SOHO,
SMEsThese
and
Enterprise
networks
with
its Next-Generation
UTM
appliances.
Cyberoam
Cyberoamche
Central
Console (CCC), and
its centralized
visibility
solution, Cyberoam
iView.
future-ready
security
solutions
are available for both physical
and
virtual networks.
harware
virtuale.
moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution,
Cyberoam offers Next-Generation security along with high performance to SOHO, SMEs and Enterprise networks with its Next-Generation Firewalls and UTM appliances. Cyberoam
Cyberoam Central
Console
(CCC), and its centralized visibility solution, Cyberoam iView. These future-ready security solutions are available for both physical and virtual networks.
Cyberoam
Products
Portfolio
moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution,
Cyberoam
Central
Console
(CCC), and
its centralized
solution, Cyberoam
future-ready
security
solutions
are available for
both physical
and
virtual networks.
offers
Next-Generation
security
along withvisibility
high performance
to SOHO,iView.
SMEsThese
and Enterprise
networks
with
its Next-Generation
Firewalls
and UTM
appliances.
Cyberoam
Cyberoam
Products
Portfolio
moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution,
Cyberoam
Products
Portfolio
Cyberoam Central
offers
Next-Generation
security
along withvisibility
high performance
to SOHO,iView.
SMEsThese
and Enterprise
networks
with
its Next-Generation
Firewalls
and UTM
appliances.
Cyberoam
Console (CCC), and
its centralized
solution, Cyberoam
future-ready
security
solutions
are available for
both physical
and
virtual networks.
moves beyond offering comprehensive network security to simplify security management for organizations with multiple offices with its centralized security management solution,
Cyberoam
Products
Portfolio
Cyberoam Central
Console
(CCC), and its centralized visibility solution, Cyberoam iView. These future-ready security solutions are available for both physical and virtual networks.
CR NG series UTMs
CR NG series NGFWs
Virtual Security Appliances
Cyberoam Central Console (CCC)
CR iView (Logging & Reporting)
CyberoamCRNetwork
Security Appliances
NG series UTMs
CR NG series NGFWs
Virtual Security Appliances
Cyberoam Central Console (CCC)
CR iView (Logging & Reporting)
Cyberoam Products Portfolio
CyberoamOS
Cyberoam
Network Security
CR NGOperating
series UTMs
- The Security-Hardened
System
AppliancesBandwidth Management
On-Appliance Cyberoam - iView Reporting2
TM
Cyberoam
CR NG- series
NGFWs
Virtualbased
Security
Appliances
Cyberoam Central
Console
(CCC)
CRtool
iView (Logging & Reporting)
VIEW
Application
and User Identity
Bandwidth
Management
- Integrated
Web-based
Reporting
- Category-based Bandwidth restriction
- 1,200+ drill-down reports
2
Bandwidth Management
On-Appliance
Cyberoam
- iView
Reporting
CyberoamOS
Cyberoam
- Compliance reports
- HIPAA, GLBA,
SOX,
PCI, FISMA
Extensible Security Architecture
VIEW
- The
Security-Hardened
System
Application
and
User
Identity
based
Bandwidth
Management
- Integrated
Web-based
Reporting
Agility
to prolongCR
the NG
lifeOperating
and
performance
of
its
NGFW
appliances
Historical
and
Real-time
reportCRtool
series UTMs
CR NGNetworking
series NGFWs
Virtual Security Appliances Cyberoam Central
Console
(CCC)
iView (Logging & Reporting)
-- Category-based
Bandwidth restriction
- 1,200+
2
- Supports newer enterprise security features and enhancements
Supportsdrill-down
3rd party reports
PSA Solution - ConnectWise
Automated
Failover/Failback,
Multi-WAN
CyberoamOS
Bandwidth Management
On-Appliance
Cyberoam
- iView
Reporting
Cyberoam
- Compliance reports
- HIPAA, GLBA,
SOX,
PCI, FISMA
Extensible Security Architecture
WRR based and
LoadUser
balancing
VIEW
-- The
Security-Hardened
System
-- Application
Identity based Bandwidth Management
-- Integrated
Web-based
Reporting
Agility
to prolong
the NG
lifeOperating
and
performance
Historical
and
Real-time
reportCRtool
Stateful
Inspection
Firewall
Logging
and
Monitoring
-- series
Dynamic
Routing:
RIPVirtual
v1& v2,
OSPF, BGPAppliances
, Multicast Forwarding
CR
series
UTMs of its NGFW appliancesCR NGNetworking
NGFWs
Security
Cyberoam Central
Console
(CCC)
iView (Logging & Reporting)
Category-based
Bandwidth
restriction
- Supports
1,200+
drill-down
reports
- Supports
newer
enterprise
security
features
and
enhancements
3rd
party
PSA
Solution
ConnectWise
Layer 8 (User - Identity) Firewall
- Automated Failover/Failback, Multi-WAN
Graphical real-time
historical
Monitoring
2
-- Compliance
reports and
- HIPAA,
GLBA,
SOX, PCI, FISMA
Extensible
Security
- Multiple Security
Zones Architecture
Bandwidth
Management
On-Appliance
Cyberoam
- iView
Reporting
CyberoamOS
-Wireless
WRR based
Load
balancing
Log Viewerand
- IPS,
Web filter,
WAF,
Anti-Virus,
Anti-Spam, Cyberoam
WAN
-Stateful
Agility
toControl
prolong
the life(ACC)
and performance
of Source
its NGFW
appliances
-- Historical
Real-time
report
Networking
Inspection
Firewall
Access
Criteria
: User-Identity,
and
VIEW
-- The
Security-Hardened
Operating
System
Logging
and
Monitoring
Dynamic
Routing:
RIP
v1&
v2,based
OSPF,
BGP, Multicast
Forwarding
- Application
and
User
Identity
Bandwidth
Management
-- Integrated
Web-based
Reporting
tool
Authentication,
System
and
Admin
Events
USB
port
3G/4G
and
WiMax
Support
Supports
newer
enterprise
security
features
and
enhancements
Supports 3rd party PSA Solution - ConnectWise
Automated Failover/Failback,
Multi-WAN
Zone,
MAC and
IP address, Service
- Destination
Layer 8 (User
- Identity)
Firewall
Graphicaldrill-down
real-time reports
and historical Monitoring
-- Category-based
Bandwidth restriction
- 1,200+
- Primary
link
2
-Bandwidth
WRR
basedWAN
Load
balancing
- Multiple Security
Zones Architecture
Log
Viewer
IPS,
Web
filter,
WAF,
Anti-Virus,
Anti-Spam,
Compliance
reports
HIPAA,
GLBA,
SOX,
PCI,
FISMA
Extensible
Security
Management
On-Appliance
Cyberoam
iView
Reporting
CyberoamOS
Wireless
WAN
Cyberoam
Gateway
Anti-Virus
&
Anti-Spyware
WAN
Backup
link
Stateful
Inspection
Firewall
Logging
and
Monitoring
- Dynamic Routing: RIP v1& v2, OSPF, BGP, Multicast Forwarding
Access
Control
Criteria
: User-Identity,
and
Prevention
System
VIEW
--Intrusion
Agility
prolong
the life(ACC)
and
performance
its NGFW
appliances
Authentication,
System
Admin
-- Historical
and
Real-time
report
The
Security-Hardened
Operating
System of Source
-Networking
Application
User
Identity
Bandwidth Management
Integrated
Web-based
Reporting
toolEvents
- USB port and
3G/4G
and
WiMaxbased
Support
Scans
HTTP
, HTTPS,
FTP
,and
SMTP
, POP3,
IMAP, IM, VPN Tunnels
- Destination
Layer
8to(User
- Identity)
Firewall
- Graphical
real-time
and
historical
Monitoring
Zone,
MAC
and
IP Custom
address,
Service
Signatures:
Default
(4500+),
3
-- Supports
newer
enterprise
security
features
and
enhancements
Supports
3rd
party
PSA
Solution
ConnectWise
Category-based
Bandwidth
restriction
1,200+
drill-down
reports
Primary
WAN
link
Automated
Failover/Failback,
Multi-WAN
Self Viewer
Service- Quarantine
areaWAF, Anti-Virus, Anti-Spam,
Multiple
Security
ZonesCustom
-- Log
IPS, Web filter,
Virtual
Private
Network
-Extensible
IPS Policies:
Multiple,
Wireless
WAN
- Compliance
reports - HIPAA,
GLBA, SOX, PCI, FISMA
Security
Architecture
Gateway
Anti-Virus
& Anti-Spyware
- WAN
Backup
- WRR
based
Loadlink
balancing
-Intrusion
Control
Criteria
(ACC)
: User-Identity, Source and
Authentication, System and Admin Events
- IPSec,
,3G/4G
PPTP and WiMax Support
Prevention
System
- Access
User-based
policy
creation
- USB L2TP
port
Inspection
-Stateful
Agility
to prolong
the
lifeFirewall
and
of its NGFW appliances
-Gateway
Historical
and
Real-time
Logging
and
Monitoring
Scans HTTP
, HTTPS,
FTP, report
SMTP, POP3, IMAP, IM, VPN Tunnels
-Networking
Dynamic
Routing:
RIP v1& v2, OSPF, BGP, Multicast Forwarding
Zone,
MAC
and
IPperformance
address,
Service
Anti-Spam
Encryption
3DES,
DES,
AES,
Twofish,
Blowfish,
Serpent
SCADA-aware
IPS
with
pre-defined
category
for
ICS
and
SCADA
-- Destination
Signatures:
Default
(4500+),
Custom
3
Primary
WAN
link
Layer 8 (User
- Identity)
Firewall
Supports
newer
enterprise
security features and enhancements
-- Supports
3rd
party Scanning
PSA
Solution
-Monitoring
ConnectWise
Self
Service
Quarantine
area
Graphical
real-time
and
historical
Automated
Failover/Failback,
Multi-WAN
Inbound/Outbound
Virtual
Private
Network
signatures
IPS
Policies:
Multiple,
- Authentication:
key, Digital certificates
Gateway
& Anti-Spyware
- WAN Backup Preshared
link
--Intrusion
Multiple
Security
ZonesCustom
- Log
ViewerAnti-Virus
- IPS, Web
filter,
WAF,header
Anti-Virus,
Anti-Spam,
-Wireless
WAN
Prevention
System
Real-time
Blacklist
(RBL),
MIME
check
- WRR
IPSec,based
L2TP
,Load
PPTPbalancing
-- User-based
policy
creation
--Logging
Scans
HTTP
, HTTPS,
FTP,and
SMTP
, POP3,
IMAP
, IM, VPN Tunnels
Access
Control
Criteria
(ACC)
:Custom
User-Identity, Source and
4
Stateful
Inspection
Firewall
Authentication,
System
Admin
Events
and
Monitoring
#
Dynamic
Routing:
RIP
v1&
v2,
OSPF,
BGP
,
Multicast
Forwarding
--Web
Signatures:
Default
(4500+),
Gateway
Anti-Spam
3
USB
port
3G/4G
and
WiMax
Support
Self Service
Service Quarantine
Quarantine area
area
-IPSec
Encryption
- 3DES,
DES, AES, Twofish, Blowfish, Serpent
SCADA-aware
IPS MAC
with pre-defined
category
for ICS and SCADA
Filtering
-- Self
VPN
Client
Zone,
and
IP address,
Service
- Destination
Layer
8 (User
- Identity)
Firewall
Private
Networkkey, Digital certificates
Policies:
Multiple,
Custom
- Graphical
real-time Scanning
and historical Monitoring
Inbound/Outbound
- Primary
WAN Preshared
link
signatures
-Virtual
Authentication:
-- IPS
On-Cloud
Web
Categorization
Inter-operability
with major IPSec VPN Gateways
Multiple Security
Zones
--Wireless
IPSec,
, PPTP
policyDefault(89+),
creation
-Certification
Log
ViewerAnti-Virus
- IPS, Web
filter,
WAF,header
Anti-Virus,
Anti-Spam,
Gateway
& Anti-Spyware
Real-time
Blacklist
(RBL),
MIME
check
- WANL2TP
Backup
link
WAN
- User-based
Web Categories:
Custom
-- Supported
platforms:
Windows
2000, WinXP 32/64-bit,
Prevention
System
4
Gateway
Anti-Spam
-Intrusion
Access
Control
Criteria
(ACC)
: User-Identity,
Source
and SCADA
#
Encryption
3DES, and
DES,
AES, Twofish,
SerpentWindows
SCADA-aware
IPS
withHTTP
pre-defined
category for
ICS and
Authentication,
System
Admin
Events
Self
Service
area
-- Common
Scans
HTTP
, Quarantine
HTTPS,
FTP,and
SMTP
, POP3,
IMAP, IM, VPN Tunnels
- USB32-bit,
port- 3G/4G
WiMax
Support Blowfish,
Web
Filtering
-- Destination
Protocols
supported:
Criteria
- EAL4+
IPSec
VPN
Client
2003
Windows
2008
32/64-bit,
Windows Vista 3 2/64Signatures:
DefaultMAC
(4500+),
3
Zone,
and, HTTPS
IP Custom
address, Service
-- Inbound/Outbound
Scanning
signatures
Authentication:
Preshared
key,
Digital
certificates
Self
Quarantine
area
- Primary
WAN
link
On-Cloud
Web
Categorization
ICSAService
Firewall
- Corporate
Virtual
Private
Network
- Inter-operability
with
major IPSecWindows
VPN Gateways
-- IPS
Policies:
Multiple,
Custom
bit,
Windows
7 RC1
32/64-bit,
8 RC1 32/64-bit
--Gateway
Real-time
Blacklist
(RBL), Anti-Spyware
MIME header check
Anti-Virus
- WANL2TP
Backup
link # Windows 2000, WinXP 32/64-bit, Windows
-Application
Web
Categories:
Default(89+),
Custom
Certification
4
Filtering
Checkmark
Level 5&area
Certification
Supported
platforms:
- IPSec,
, PPTP
-Web
User-based
policy
creation
-- Self
Service UTM
Quarantine
Intrusion
Prevention
System
Filtering
IPSec
VPN- 3DES,
Client
Protocols
supported:
HTTP
, HTTPS
-- Common
Scans
HTTP
, HTTPS,
FTPinteroperability
, SMTP, POP3, IMAP, IM, VPN Tunnels
Gateway
Anti-Spam
Criteria
EAL4+
Layer
7
(Applications)
&
Layer
8
(User
Identity)
Visibility
VPNC
Basic
and
AES
2003
32-bit,
Windows
2008
32/64-bit,
Windows
Vista
3
2/64Encryption
DES,
AES,
Twofish,
Blowfish,
Serpent
--- SCADA-aware
IPS
with
pre-defined
category
for
ICS
and
SCADA
Signatures:
Default
(4500+), Custom
SSL
VPN
3
Web
Categorization
Inter-operability
with
major
IPSec
VPN
Gateways
Self
Service
Quarantine
area
ICSA
Firewall
Corporate
Inbound/Outbound
Scanning
-- On-Cloud
Control
over
2,000+
Applications,
classified
in
21
Categories
- IPv6 Ready Gold Logo
signatures
bit, Windows
7 Preshared
RC1
32/64-bit,
Windows
8 RC1 32/64-bit
-- Authentication:
key, Digital
certificates
Virtual
Private
Network
IPS
Policies:
Multiple,
Custom Custom
& UDP
Tunneling
Categories:
Default(89+),
Certification
- TCP
Supported
platforms:
Windows 2000, WinXP 32/64-bit, Windows
Application
Filtering
-- Web
Filter
based policy
selection:
Category, Risk Level, Characteristics and
CheckmarkBlacklist
UTM Level
5 Certification
- Real-time
(RBL),
MIME header check
-- IPSec,
L2TP, PPTP
User-based
creation
Authentication
- Active
Directory,
LDAP, RADIUS,
Cyberoam
Protocols
supported:
HTTP
, HTTPS
4
-Gateway
Common
Criteria
EAL4+
#
2003
32-bit,
Windows
2008
32/64-bit,
Windows
Vista
3
2/64Technology
--Web
Layer
7
(Applications)
&
Layer
8
(User
Identity)
Visibility
VPNCService
- Basic
and AES
interoperability
- Self
Quarantine
area
Anti-Spam
FilteringIPS with pre-defined category for ICS and SCADA
Virtual
Appliance
advantages
-IPSec
Encryption
SCADA-aware
SSL
VPN
VPN- 3DES,
ClientDES, AES, Twofish, Blowfish, Serpent
(Local)
-Cyberoam
ICSA
FirewallGold
- Corporate
bit, Windows 7 RC1 32/64-bit, Windows 8 RC1 32/64-bit
Securing
SCADA
Networks
Control
over
2,000+
Applications, classified in 21 Categories
IPv6
Ready
Logo
-- Inbound/Outbound
Scanning
--Application
On-Cloud
Web
Categorization
signatures
-- Authentication:
Preshared
key,
certificates
Supported
Virtualization
TCP
& UDP Application
Tunneling
Inter-operability
with major
IPSec
VPN
Gateways
TCP-based
Access
-Digital
HTTP
, HTTPS,
RDP, TELNET, SSH
Filtering
- Checkmark
UTM Level 5 Platforms:
CertificationVMware, Microsoft Hyper-V,
SCADA/ICS
Signature-based
Filtering
for
Protocols
-- Filter
based
selection:
Category,
Risk
Level,
Characteristics
and
- Real-time
Blacklist
(RBL), MIME header check
Categories:
Default(89+),
Custom
Certification
KVM
and
Citrix
XenServer
Authentication
Active
Directory,
LDAP
,
RADIUS,
Cyberoam
Supported
platforms:
Windows
2000,
WinXP
32/64-bit,
Windows
- Web
Layer
7
(Applications)
&
Layer
8
(User
Identity)
Visibility
- VPNC - Basic and AES interoperability
4
- Modbus,
DNP3, IEC,
Bacnet
Technology
#
SSL
VPN
-Web
Protocols
supported:
HTTP
, HTTPSetc
-- Common
Self
Service
Quarantine
area “Security-in-a-Box”,
Cyberoam
Virtual
Appliance
advantages and “Office-in-aCriteria
- EAL4+
Filtering
Protects
virtual
(Local)
2003
32-bit,
Windows
2008 32/64-bit,
Windows Vista 3 2/64IPSec
VPN Client
Control
over
2,000+
Applications,
- IPv6
Ready
Golddata-centers,
Logo
Administration
and System
Management
- Control
various
Commands
andclassified
Functionsin 21 Categories
-- Securing
SCADA
Networks
- TCP-based
TCP
& UDP Application
Tunneling
Supported
Virtualization
- ICSA
Firewall
- CorporatePlatforms: VMware, Microsoft Hyper-V,
- On-Cloud
Web
Categorization
Box” set-ups
Access
- Windows
HTTP
, HTTPS,
RDP
, TELNET, SSH
bit, Windows
7 RC1
8 RC1
32/64-bit
Filter
based
selection:
Category, Risk
Level,
and
-- Web-based
Inter-operability
with 32/64-bit,
major
IPSec
VPN
Gateways
configuration
wizard
- SCADA/ICS
Signature-based
Filtering
forCharacteristics
Protocols
Authentication
Active
Directory,
LDAP
,
RADIUS,
Cyberoam
Application
Filtering
KVM and
Citrix
XenServer
- Checkmark
UTM
Level
5 Certification
- Web
Categories:
Default(89+),
Certification
Scans
traffic
within
virtual
networks, protecting hypervisor
1 Custom
Technology
-- Command
Supportedline
platforms:
Windows
2000,Telnet)
WinXP 32/64-bit, Windows
- Modbus,
DNP3,
IEC, Bacnet
etc
interface
(Serial, SSH,
Cyberoam
Virtual
Appliance
advantages and “Office-in-aApplication
Firewall
(Local)
Layer
7 (Applications)
& Layer
8 (User - Identity) Visibility
Protects
virtual
data-centers,
“Security-in-a-Box”,
VPNC
- Basic
and
interoperability
-Web
Protocols
supported:
HTTP
, HTTPS
- Common
Criteria
-AES
EAL4+
management
console,
hypervisor
& Guest OS, securing
zero trust
Securing
SCADA
Networks
2003
32-bit,
Windows
2008 32/64-bit,
Windows Vista 3 2/64Administration
System
Management
SSL
VPN
- Control
various
Commands
and Functions
(v1,
v2,
v3) and Access
- Supported
Virtualization
Positive
Protection
model
-- SNMP
TCP-based
Application
- HTTP, HTTPS, RDP, TELNET, SSH
- Control
over
2,000+
Applications,
classified
in 21 Categories
Box”
set-ups
IPv6
Ready
Logo Platforms: VMware, Microsoft Hyper-V,
- ICSA
FirewallGold
- Corporate
networks
- SCADA/ICS
Signature-based
Filtering
for Protocols
bit,
Windows
7
RC1
32/64-bit,
Windows
8
RC1
32/64-bit
Web-based
configuration
wizard
TCP
&
UDP
Tunneling
KVM and
Citrix
XenServer
Unique
"Intuitive
Website
Flow
Detector"
technology
- Filter
based
selection:
Category,
Risk
Characteristics and
Scans
traffic
within
virtual
networks,
protecting
hypervisor
Application
Filtering
1
- Modbus,
DNP3,
IEC,
Bacnet
etc Level,
Checkmark
UTM
Level
5
Certification
Command
line interface
(Serial, SSH,
Telnet)
-User
Authentication
- Active Directory,
LDAP
, RADIUS, Cyberoam
Web
Application
Firewall
- Protects
virtualconsole,
data-centers,
“Security-in-a-Box”,
and “Office-in-aAuthentication
-- Protection
against
Cross-site
Scripting
(XSS),
Technology
management
hypervisor
&advantages
Guest OS, securing
zero trust
Layer
7 (Applications)
&Injections,
Layer 8and
(User
- Identity)
Visibility
- Control
variousSQL
Commands
Functions
- VPNC
- Basic
and AES
interoperability
Cyberoam
Virtual
Appliance
-Administration
SNMP
(v1,
v2, v3) and System Management
(Local)
SSL
VPN
Sessionover
Hijacking,
URL
Tampering, classified
Cookie Poisoning
etc
Positive
Protection
model
Box”
set-ups
Internal
database
Securing
SCADA
Networks
-- Web-based
configuration
wizard- HTTP, HTTPS, RDP, TELNET, SSH
networks
-- Control
2,000+
Applications,
in 21 Categories
- IPv6
ReadyVirtualization
Gold Logo Platforms: VMware, Microsoft Hyper-V,
Supported
TCP-based
Access
-- TCP
& UDP Application
Tunneling
-- Unique
"Intuitive
Website
Flow
Detector"
technology
Scans
traffic
within
virtual
networks,
protecting
hypervisor
AD
Integration
with
support
for
OU-based
Security
Policies
SCADA/ICS
Signature-based
Filtering
for
Protocols
1
FilterApplication
based selection:
Category, Risk Level, Characteristics and
- Command line interface (Serial, SSH, Telnet)
KVM
and
Citrix
XenServer
Web
Firewall
1,2,3,4
*
-User
Authentication
- Active Directory, LDAP, RADIUS, Cyberoam
Authentication
-High
Protection
against
SQL
Injections,
Cross-site Scripting (XSS),
management
& Guest
OS, securing zero trust
- Modbus,
DNP3,
IEC,
Bacnet etc
Available in all console,
the Modelshypervisor
except CR15iNG
& CR15wiNG
Automatic
Windows
Availability
Technology
-- SNMP
(v1, v2,
v3) Single Sign On
- Protects
virtual
data-centers,
“Security-in-a-Box”,
- Positive
Protection
model
Cyberoam
Virtual
Appliance
advantages and “Office-in-a*
Session
Hijacking,
URL
Tampering,
Poisoning etc
Administration
and System
Management
-(Local)
Internal
- Control
various
Commands
andCookie
Functions
networks
External database
LDAP/DAPS/RADIUS
database
Integration
Not
supported in CR15iNG & WiFi series of appliances
-- Securing
SCADA
Networks
Active-Active
andWebsite
Active-Passive
Box” set-ups
Unique
"Intuitive
Flow Detector" technology
-Additional
Supported
Virtualization Platforms: VMware, Microsoft Hyper-V,
#
- Web-based
TCP-based
Application
Access
HTTP, HTTPS,
RDP, Policies
TELNET, SSH
AD Integration
with support
for-OU-based
Security
configuration
wizard
Purchase Required
SCADA/ICS
Signature-based
Filtering
for
Protocols
-- Stateful
Failover
Authentication
1,2,3,4
Protection against *SQL Injections,
Cross-site Scripting (XSS),
- Scans
traffic
virtual
networks,
protecting
hypervisor
1
KVM
and
Citrix
XenServer
Available
in
allwithin
the
Models
except
CR15iNG
& CR15wiNG
Automatic
Windows
Single
SignSSH,
On Telnet)
-User
Command
line
interface
(Serial,
High
Availability
- Modbus,
DNP3,
IEC,
Bacnet etcCookie Poisoning etc
Web
Application
Firewall
Session
Hijacking,
URL
Tampering,
*
-Administration
Internal
database
management
console,
Guest OS, securing
zero trust
-Not
Protects
virtual
data-centers,
“Security-in-a-Box”,
and “Office-in-aExternal
LDAP/DAPS/RADIUS
database
Integration
- SNMP
(v1,
v2, v3) and System
supported
in CR15iNG
&hypervisor
WiFi series
of&appliances
Management
- Control
various
Commands and Functions
Active-Active
and Active-Passive
- Positive
Protection
model
- AD Integration with support for OU-based Security Policies
networks
# Box”
set-ups
Additional
Purchase
Required
- Web-based configuration wizard
- Unique
Flow Detector" technology
Stateful"Intuitive
Failover Website
1,2,3,4
*
Available
in
all
the
Models
except
CR15iNG
&
CR15wiNG
Automatic
Windows
Single
Sign
On
- Scans traffic within virtual networks, protecting hypervisor
Availability
1
-User
Command
line interface (Serial, SSH, Telnet)
Authentication
-High
Protection
against SQL
Injections,
Cross-site Scripting (XSS),
*
Web
Application
Firewall
- VPN
- External LDAP/DAPS/RADIUS database Integration
Not
supported in CR15iNG
WiFi series of&appliances
Centralized logging
Remote
Management
management
console,&Communication
hypervisor
Guest OS, securing zero trust
-Centralized
Active-Active
and
Active-Passive
Session Protection
Hijacking,
URL
Tampering,
Cookie Poisoning etc
- SNMP
v2, v3)
Internal(v1,
database
#
- Positive
model
Additional
networksPurchase Required- Secure Encryption
- User, User Groups
and
Guest Users
-Configure
Stateful Failover
Audit
and
System
log
and
Manage
AD
Integration
with
support
for
OU-based
Security
Policies
- Unique "Intuitive Website Flow Detector" technology
1,2,3,4
*
Available in all the Models- except
& CR15wiNG
- Automatic
Windows Single Sign On
MutualCR15iNG
Authentication
Individual
Appliances
Authentication
-High
Protection
against
SQL Injections,
Cross-site Scripting (XSS),
Availability
- and
VPN more... User
Centralized logging
Centralized
Remote
Management
Communication
*
- External
LDAP/DAPS/RADIUS database Integration
Not supported in CR15iNG &- WiFi
series
of appliances
Session Hijacking,
URL Tampering, Cookie Poisoning etc- User, User Groups
Internal
database
- Active-Active
and Active-Passive
HTTP
, HTTPS,
Syslog & Secure Syslog
Appliance
Groups
Distribution
Service
and Guest
Users
#
-Upgrade
Audit
andPolicies
System log
- Secure
Encryption
Configure
and
Manage
Additional Purchase Required
AD
Integration
with
support
for
OU-based
Security
- Stateful Failover
Configuration
Management
-Centralized
Security Upgrades
1,2,3,4
*
- and
VPN more... - Automatic
MutualCR15iNG
Authentication
-High
Individual
Appliances
logging
Centralized
Remote
Management
Available in all the Models-Communication
except
& CR15wiNG
Windows Single Sign On
Availability
-- Template-based
configuration
Policy
Enforcement
*
Management
- AV, and
IPS &
Application
User, User Groups
and Guest
Users
- External
LDAP/DAPS/RADIUS
database Integration
-- WiFi
HTTP
, HTTPS,
Syslog & Secure Syslog
Not supported in CR15iNG &System
series
of appliances
-Global
Appliance
Groups
Upgrade
Distribution
Service
- Audit
System
log Signatures
Secure
Encryption
and
Manage
-Configure
Active-Active
and
Active-Passive
#
Configuration
Synchronization
Firewall
Web Based
User Interface
- Web Filtering
Categories
Additional Purchase Required
Configuration
Management
--- Stateful
and more...
-- Mutual
Authentication
IndividualFailover
Appliances
- Security
Upgrades
-- Backup
and Restore
-Centralized
Network
configuration
Command
Line
Interface
- CyberoamOS
Firmware Updates
VPN
Template-based
configuration
Global
Policy
Enforcement
Centralized
logging
Remote Management
Communication
System
Management
-- HTTP
, HTTPS,
Syslog
& Secure Syslog
- Appliance
Groups
- AV, IPS &
Application
Signatures
Upgrade
Distribution
Service
-- Web
Filter
User, User Groups
and Guest Users
-Configuration
Configuration
Synchronization
Firewall
-- Security
Audit
System
log
- Secure
Encryption
Configure
and Manage
Management
Web Based
User Interface
- Weband
Filtering
Categories
Upgrades
- Application
Filter
Appliance
Monitoring
&
Alerts
more...
Compliance
Backup
and Restore
Network
configuration
-System
Mutual
Authentication
-Global
Individual
Appliances
--- and
Template-based
configuration
Command
Line Interface
-Administration
CyberoamOS
Firmware Updates
Policy
Enforcement
Management
- AV, IPS & Application
Signatures
VPN
Centralized
logging
Centralized
Remote Management
Communication
-- QoS
-- Dashboard
forSynchronization
Appliance Group, Individual
- Role-based
Granular
control
over
CE, FCC,
UL,User
RoHS
Web Policy
Filter Groups
HTTP
,Based
HTTPS,
Syslog
& Secure Syslog
Appliance
- Firewall
Upgrade
Distribution
Service
--- Web
Interface
- Weband
Filtering
Categories
- Configuration
User, User Groups
and Guest Users
- Audit
System
log
Secure
Encryption
Configure
and Manage
-- IPS
Appliance
ApplianceUpgrades
andFirmware
Appliance
Groups
Filter
Configuration
Management
Appliance
& Alerts
- and
Backup
andMonitoring
Restore
- Application
Network configuration
-Administration
Security
Compliance
-- Command
Line Interface
CyberoamOS
Updates
more...
Mutual Authentication
- Individual
Appliances
Anti
Virus,
Anti
Spam
Appliance
Monitor
Graph
Health
Monitoring:
CCC,
Managed
- Web
QoS Policy
Template-based
configuration
Policy Enforcement
-Global
Filter
- Dashboard
for Appliance
Group, Individual
System
Management
- AV, IPS & Granular
Application
Signatures
- Role-based
control
over
-- CE,
UL, RoHS
HTTPFCC,
, HTTPS,
Syslog & Secure Syslog
- Appliance
GroupsFirewall
Web Application
Upgrade
Distribution
Service
Email
Alerts Synchronization
Appliances
-- IPS
--Appliance
Configuration
Firewall
Application Filter
Appliance
-Compliance
Web Based User Interface
- Web Filtering
CategoriesGroups
Monitoring
& Alerts
Appliance
and Appliance
Administration
Configuration
Management
- Anti
LogsVirus,
& Reports
- Security Upgrades
Anti
Spam
Backup
and
Restore
- Network
configuration
QoS Policy
Appliance Monitor
Graph Group, Individual
- CE,
Command
Line
Interface
CyberoamOS
Firmware
Updates
Dashboard
for Appliance
-- Health
Monitoring:
CCC,
Managed
Role-based
Granular
control
over
FCC,
UL,
RoHS
-- Template-based
configuration
Global Policy Enforcement
System Management
- AV, IPS & Application Signatures
Application Firewall
- Web
IPS Filter
- Email
Alerts
*
Appliance
Appliancesand Appliance Groups
Appliance
- Configuration
Synchronization
- Firewall
- Web Based User Interface
- Web Filtering Categories
Logs
& Reports
- Application
Filter
Anti Virus,
Anti
Spam
Appliance
Monitoring
&
Alerts
Appliance
Monitor
Graph
Administration
Compliance
-- Health
Monitoring:
CCC,Updates
Managed
-- Backup
and
Restore
- Network configuration
- Command Line Interface
CyberoamOS
Firmware
- QoS
Web Policy
Application Firewall
- Dashboard
Email Alertsfor Appliance Group, Individual
- Role-based
- CE, FCC, UL, RoHS
Appliances Granular control over
*
- Web Filter
- User
and Group based Reports
Logs
Administration
Operating Environment
- IPS
Logs & Reports
Appliance
Appliance and Appliance Groups
- Application
Filter
Appliance
Monitoring
&
Alerts
Internet
Usage
Reports
Data
Transfer,
Administration
Compliance
Real-time/Archived
logs
- Web based Management Console
- Hardened Linux OS
- Anti
Virus, Anti Spam
- Appliance Monitor Graph
Health
Monitoring:
CCC,
Managed
-- QoS
Policy (Backup/restore)
Surfing
Time,
Client
Type
*
Dashboard
for
Appliance
Group,
Individual
Log
storage
Role-based
administration
Granular control over
- CE, FCC, UL, RoHS
- Web Application Firewall
- Email
Alerts
User and
Group based Reports
Logs
Administration
Operating
Environment
Appliances
-- IPS
- Security
Reports - Firewall, Attacks, Spam,
Appliance
Audit
logs
Categories
Mail,
User,
Device,
Multiple
Dashboards
Resource,
Device,
Appliance
and
Appliance
Groups
Logs & Reports
Network
and Security
- Internet Usage Reports - Data Transfer,
--- Real-time/Archived
logs
- Web based Management Console
-Supported
Hardened Linux
OS
Virus, Blocked
Attempts,
WAF
Anti Virus, Anti
Spam
Application,
Views,
Data, Archive, Report
User,
Host,
Email
Address
- Surfing
Appliance
Monitor
Graph
Health
Monitoring:
CCC,
Managed
Time,
Client
Type
Devices Environment
-- Log
(Backup/restore)
- Role-based administration
User
and
Group
based
Reports
-- Remote
Access
Reports
Logs
Administration
Operating
Webstorage
Application
Firewall
- Device
Grouping - Device type & models
*
Email
Alerts
Appliances
Security
Reports
Firewall,
Attacks,
Spam,
Custom/Proprietary
UTMs
- Real-time/Archived
Audit logs Categories
- Mail, User, Device,
Multiple
Dashboards
- Resource,
- Internet
Usage
Reports
- Data
Exportable
formats
- PDF,
ExcelTransfer,
Supported
Network
andincluding
Security
logs
-- Web
based
Management
ConsoleDevice,
-- Hardened
Linux
OS devices
-Reports
Logs & Reports
Virus, Blocked
Attempts,
WAF
- Proxy Firewalls, Access Gateway
Views, Data, Archive, Report
User,
Host, Email
Address
Time, Client
TypeReport
- Surfing
Email Alerts/automated
Scheduling
-- Application,
Log
storage
(Backup/restore)
-Supported
Role-based
administration
Devices
Web- Device
Browsers
1,200+
drilldown
Reports
-- Remote
Access
Reports
Smart
Wireless
Router
Device
Grouping
type
&
models
Security
Reports
Firewall,
Attacks,
Spam,
*
Audit logs Categories
Mail, User,
Multiple Dashboards
- Resource,
- User and Group based Reports
Logs
Administration
Operating
Environment
-Supported
Custom/Proprietary
devices
UTMs
-- Microsoft
Internet Explorer
8.0+ Device,
-- Compliance
Reports - -HIPAA,
SOX,Device,
FISMA,
Network
andincluding
Security
- Exportable
formats - PDF,WAF
Excel
- Endpoint Security
Solution
Reports
Virus, Blocked
Host,
Email
Address
- Internet
Usage Attempts,
Reports - Data Transfer,
Proxy Firewalls,
Gateway
- Application,
Real-time/Archived
logs Archive, Report
- User,
Web
based
Management
Hardened
Linux Access
OSdevices
Mozilla
Firefox
3.0+
(BestConsole
view)
GLBA, PCI Views, Data,
*- Email Alerts/automated Report Scheduling
Devices
-- Syslog-compatible
available
asClient
Software
Supported
Web- Device
Browsers
1,200+
drilldown
Reports
-Also
Remote
Access
Reports
Device Grouping
type & models
Surfing
Time,
Type
-- Smart
Wireless
Router
-- Log
storage
(Backup/restore)
-- Role-based
administration
Custom/Proprietary devices including UTMs
-Administration
Internet Explorer
8.0+ Device,
-Logs
Reports - -HIPAA,
SOX,Device,
FISMA,
Exportable
formats
- PDF,
Excel
-- User
andReports
Group
based
Reports
Operating
Environment
Security
- Firewall,
Attacks, Spam,
Reports
-Supported
Security
Solution
- Compliance
Audit logs Categories
Mail, User,
- Microsoft
Multiple Dashboards
- Resource,
Network
and Security
- Endpoint
Proxy Firewalls,
Access
Gateway
www.cyberoam.com
I [email protected]*- Internet
-Supported
Mozilla
Firefox
3.0+
(BestConsole
view)
GLBA, PCI
Email
Alerts/automated
Scheduling
Usage Attempts,
Reports -Report
Data Transfer,
-- Application,
Real-time/Archived
logs Archive,
- User,
Web based
Management
-- Hardened
Linux OSdevices
Virus,
Blocked
Web
Browsers
Syslog-compatible
1,200+
drilldown
Views,Reports
Data,
Report
Host,
Email
Address
Also
available
as Software WAF
Smart
Wireless Router
Devices
Surfing
Time,
Client
Type
-- Log
storage
(Backup/restore)
Role-based
administration
Remote
Access
Reports
Microsoft
Internet- Explorer
8.0+
Compliance Reports - HIPAA, SOX, FISMA,
- Device
Grouping
Device type
& models
Endpoint
Security
Solution
- Custom/Proprietary devices including UTMs
-- Security
Reports
- Firewall,
Attacks, Spam,
-Reports
Audit
User, Device,
-- Multiple
Dashboards
- Resource,
Exportable
formats
- PDF, Excel
Mozilla Firefox
3.0+ (Best
view) Device,
GLBA,logs
PCI Categories - Mail,
*
www.cyberoam.com
I [email protected]
Supported
Network
and Security
Syslog-compatible
devices
available
as Software
-- Proxy
Firewalls,
Access
Gateway
Virus,
Blocked
Attempts,Report
WAF Scheduling
Views,Reports
Data, Archive, Report
User, Host, Email
-Also
Email
Alerts/automated
Supported
WebAddress
Browsers
- Application,
1,200+ drilldown
Devices
- Smart Wireless Router
- Remote Access Reports
Device
Grouping
Device
type
&
models
Microsoft
Internet
Explorer
8.0+
- Compliance Reports - HIPAA,
SOX,
FISMA,
Custom/Proprietary
devices
www.cyberoam.com
[email protected]
I
- Endpoint Security Solution including UTMs
- Exportable formats - PDF, Excel
Reports
- Mozilla Firefox 3.0+ (Best view)
GLBA, PCI
*
-- Proxy
Firewalls, Access
Gateway
Syslog-compatible
devices
-Also
Email
Alerts/automated
available
as Software Report Scheduling
Supported Web Browsers
- 1,200+ drilldown Reports
- Smart Wireless Router
- Microsoft Internet Explorer 8.0+
- Compliance Reports - HIPAA, SOX, FISMA,
Endpoint
Security
Solution
www.cyberoam.com
I [email protected]*
- Mozilla Firefox 3.0+ (Best view)
GLBA, PCI
- Syslog-compatible devices
Also available as Software
Cyberoam Network Security Appliances
TM
TM
Cyberoam Network Security Appliances
Cyberoam Network Security Appliances
TM
TM
Centralized Security Management with Cyberoam Central Console (CCC)
Centralized Security Management with Cyberoam Central Console (CCC)
Centralized Security Management with Cyberoam Central Console (CCC)
Centralized Security Management with Cyberoam Central Console (CCC)
Centralized Security Management with Cyberoam Central Console (CCC)
Centralized Visibility across Networks with Cyberoam iView
Centralized Visibility across Networks with Cyberoam iView
Centralized Visibility across Networks with Cyberoam iView
Centralized Visibility across Networks with Cyberoam iView
Centralized Visibility across Networks with Cyberoam iView
www.cyberoam.com I [email protected]
Cyberoam NG series UTM Appliances
Techsheet
Cyberoam NG series UTM Appliances
Specifications
Cyberoam
Interfaces
15iNG
25iNG/6P
NG series UTM Appliances
35iNG
15wiNG
Techsheet
25wiNG/6P
35wiNG
Techsheet
25wiNG/6P
35wiNG
4/6
6
Specifications
15iNG
25iNG/6P
15wiNG
Copper GbE Ports
3
4/6
3
6
Console Ports (RJ45)
1
1
1
1
1
1
Interfaces
USB Ports
2
2
2
2
2
2
Copper GbE Ports
*
Techsheet
3
4/6
4/6
3
6
Specifications
15iNG
25iNG/6P
15wiNG
25wiNG/6P
6
Hardware Bypass Segments*
-35wiNG
Console Ports (RJ45)
1
1
1
1
1
1
Configurable Internal/DMZ/WAN Ports
Yes
Yes
Yes
Yes
Yes
Yes
Interfaces
USB Ports
2
2
2
2
2
2
** *
Copper GbE
PortsSegments
Hardware
Bypass
-3
-4/6
-4/6
-3
-6
System
Performance
-6
Specifications
15iNG
25iNG/6P
15wiNG
25wiNG/6P
35wiNG
ConsoleThroughput
PortsInternal/DMZ/WAN
(RJ45)(UDP) (Mbps)
Configurable
Ports
1
1
Yes
1
Yes
1
Yes
1
Yes
Yes
Firewall
1
Yes
2,300
1,000
1,500
1,500
1,000
2,300
USB Ports
2
2
2
2
2
Firewall
Throughput (TCP) **(Mbps)
2
2,000
750
1,000
1,000
750
2,000
*
Interfaces
System
Performance
Hardware
Bypass Segments
New
sessions/second
12,000
3,500
5,000
5,000
3,500
12,000
Copper
GbE
Ports
Firewall
Throughput
(UDP) (Mbps)
3
4/6
4/6
3
6
6
2,300
1,000
1,500
1,500
1,000
2,300
Configurable
Internal/DMZ/WAN
Ports
Yes
Yes
Yes
Yes
Yes
Yes
Concurrent
sessions
350,000
60,000
150,000
150,000
60,000
350,000
Console
Ports (RJ45)(TCP) (Mbps)
1
1
1
1
1
Firewall Throughput
1
2,000
750
1,000
1,000
750
2,000
IPSec VPN Throughput (Mbps)
**
210
110
250
250
110
210
USB
PortsPerformance
System
2
2
2
2
2
New sessions/second
2
12,000
3,500
5,000
5,000
3,500
12,000
No. of IPSec Tunnels
150
50
100
100
50
150
**
Hardware
Bypass
Segments
Firewall Throughput
(UDP) (Mbps)
-60,000
-150,000
-1,000
Concurrent
sessions
-350,000
2,300
1,000
1,500
1,500
2,300
150,000
60,000
350,000
SSL VPN Throughput (Mbps)
100
50
75
75
50
100
Configurable
Internal/DMZ/WAN
Ports
Yes
Yes
Yes
Yes
Yes
FirewallVPN
Throughput
(TCP)
(Mbps)
IPSec
Throughput
(Mbps)
Yes
2,000
750
1,000
1,000
750
2,000
250
110
210
210
110
250
WAF Protected Throughput (Mbps)
150
-NA100
100
-NA150
New
sessions/second
12,000
3,500
5,000
5,000
3,500
12,000
**
SSL VPN Throughput
(Mbps)
100
50
75
75
50
100
Anti-Virus
Throughput
(Mbps)
System
Performance
525
180
300
300
180
525
Concurrent
sessions
350,000
60,000
150,000
150,000
60,000
350,000
WAF
Protected Throughput
(Mbps)
150
-NA100
100
-NA150
IPS Throughput
(Mbps)
Firewall
Throughput
(UDP)
(Mbps)
350
140
200
200
140
350
2,300
1,000
1,500
1,500
1,000
2,300
IPSec
VPN
Throughput
(Mbps)
250
110
210
210
110
250
Anti-Virus
Throughput
(Mbps)
525
180
300
300
180
525
UTM Throughput
(Mbps)
Firewall
Throughput
(TCP) (Mbps)
210
80
110
110
80
210
2,000
750
1,000
1,000
750
2,000
No.
of
IPSec
Tunnels
150
50
100
100
50
150
IPS
ThroughputUsers/Nodes
(Mbps)
350
140
200
200
140
350
Authenticated
New
sessions/second
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
12,000
3,500
5,000
5,000
3,500
12,000
SSL VPN
Throughput
(Mbps)
100
50
75
75
50
100
UTM
Throughput
(Mbps)
210
80
110
110
80
210
Concurrent
sessions
350,000
60,000
150,000
150,000
60,000
350,000
WAF Protected
Throughput
150
-NA100
100
-NA150
Built-in
Wireless
LAN (Mbps)
(Only for wiNG series)
Authenticated
Users/Nodes
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
IPSec
VPN
Throughput
(Mbps)
250
110
210
210
110
250
Anti-VirusStandards
Throughput (Mbps)
525
180
300
300 WPA2, 802.11i , TKIP
180 802.11 a/b/g/n (WEP, WPA,
525
IEEE
, AES, PSK)
Wireless
No.
of
IPSec
Tunnels
150
50
100
100
50
150
IPS Throughput (Mbps)
350
140
200
200
140
350
Detachable
3x3 MIMO
Antenna
SSL
VPN
Throughput
(Mbps)
Built-in
Wireless
LAN
(Only for wiNG series)
100
50
75
75
50
100
UTM Throughput
(Mbps)
210
80
110
110
80 to 8 bssid
210
Up
Access
Points Throughput
WAF
Protected
(Mbps)
IEEE
802.11 a/b/g/n (WEP, WPA,
WPA2, 802.11i , TKIP
, AES, PSK)
Wireless
Standards
150
-NA100
100
-NA150
Authenticated
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
11n
HT40 : +15dBm, 11b CCK:
+15dBm, 11g OFDM:+15dBm
Transmit
PowerUsers/Nodes
(EIRP)
Anti-Virus
Detachable 3x3 MIMO
525
180
300
300
180
525
Antenna Throughput (Mbps)
-68dBm
at
300Mbps,
-70dBm
at
54Mbps,
-88dBm
at
6Mbps
Receiver
Sensitivity
Built-in
Wireless
LAN (Only for wiNG series)
IPS
Throughput
(Mbps)
350
140
200
200
140
350
Up to 8 bssid
Access
Points
2.412
GHz - 2.472
GHz
Frequency
Range(Mbps)
IEEE
802.11
a/b/g/n
(WEP
,
WPA,
WPA2,
802.11i
,
TKIP
,
AES, PSK)
UTM
Throughput
Wireless
Standards
210
80
110
110
80
210
11n HT40 : +15dBm, 11b CCK: +15dBm, 11g OFDM:+15dBm
Transmit Power (EIRP)
5.200
GHz - 3x3
5.825
GHz
Authenticated
Users/Nodes
Detachable
MIMO
Antenna
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
-68dBm at 300Mbps,
-70dBm
at 54Mbps, -88dBm atUnlimited
6Mbps
Receiver Sensitivity
Number
of Selectable Channels
USA
11 channels,
Up to(FCC)
8
bssid
Access Points
2.412
GHz
-- 2.472
GHz EU (ETSI) / Japan (TELEC) - 13 channels
Frequency
Range
Built-in
Wireless
LAN (Only for wiNG series)
Data
RatePower (EIRP)
802.11n:
up
to
450Mbps,
1, 2, 5,5,11g
11Mbps,
11n HT40
: -+15dBm,
11b,802.11b:
CCK:
OFDM:+15dBm
Transmit
5.200
GHz
5.825
GHz
IEEE
802.11
a/b/g/n
(WEP
WPA, +15dBm,
WPA2, 802.11i
, TKIP, AES, PSK)
Wireless Standards
802.11g:
9,11
12,
18, -70dBm
24, 36,
48,
54Mbps
-68dBm
at6,300Mbps,
at 54Mbps,
-88dBm
at 6Mbps
Receiver of
Sensitivity
Number
Selectable
Channels
USA
(FCC)
channels,
EU
(ETSI)
/
Japan
(TELEC)
- 13 channels
Dimensions
Detachable 3x3 MIMO
Antenna
2.412 GHz
2.472
GHz 802.11b: 1, 2, 5,5, 11Mbps,
Frequency
Range
Data
802.11n:
up- to
450Mbps,
H
x WRate
x Points
D (inches)
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7
x 68xbssid
9.1
1.7 x 6 x 9.1
1.7 x 6 x 9.1
Up
to
Access
5.200 GHz - 5.825 GHz
802.11g:
9,
12, 18, 24,
48,x+15dBm,
54Mbps
4.4 x 15.3 x 23.2
4.4 x 15.3 x 23.2
4.4 x 15.3 x 23.2
4.4 xHT40
15.36,:x +15dBm,
23.2
4.4
15.3 x 23.2
4.4 x 15.3 x 23.2
H
x W x DPower
(cms)(EIRP)
11n
11b36,
CCK:
11g OFDM:+15dBm
Transmit
Dimensions
Number of Selectable Channels
USA (FCC) - 11 channels, EU (ETSI) / Japan (TELEC) - 13 channels
Appliance
Weight
1.5
kg,
3.307
lbs
2.3
kg,
5.07
lbs
2.3
kg,
5.07
lbs
1.5 kg, 3.307
lbs
2.3atkg,
5.07 lbs-88dBm at2.3
kg, 5.07 lbs
-68dBm
at 300Mbps,
-70dBm
54Mbps,
6Mbps
Receiver
Sensitivity
H
x WRate
x D (inches)
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7
x 6 x 9.1
1.7 x 6 x1,9.1
1.7 x 6 x 9.1
Data
802.11n:
up
to
450Mbps,
802.11b:
2,
5,5,
11Mbps,
2.412 GHz - 2.472 GHz
Frequency
Range
4.4 x 15.3 x 23.2
4.4 x 15.3 x 23.2
4.4 x 15.3 x 23.2
4.4
x
15.3
x
23.2
4.4
x
15.3
x
23.2
4.4
x
15.3 x 23.2
H
x W x D (cms)
Power
802.11g:
6,-9,5.825
12, 18,
24, 36, 48, 54Mbps
5.200
GHz
GHz
Dimensions
Appliance
Weight
1.5 kg, 3.307 lbs
2.3 kg, 5.07 lbs
2.3 kg, 5.07 lbs
1.5 kg, 3.307 lbs
2.3 kg, 5.07 lbs
2.3 kg, 5.07 lbs
Input
Voltage
100-240VAC
100-240VAC
100-240VAC
100-240VAC
100-240VAC
100-240VAC
Number
of
Selectable
Channels
USA
(FCC)
11
channels,
EU
(ETSI)
/
Japan
(TELEC)
13
H x W x D (inches)
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7 x 6 x 9.1
1.7 x 6channels
x 9.1
Consumption
47.8W
13.2W
33.5W
33.5W
13.2W
47.8W
Power
Data
Rate
802.11n:
up
to
450Mbps,
802.11b:
1,
2,
5,5,
11Mbps,
4.4
x
15.3
x
23.2
4.4
x
15.3
x
23.2
4.4
x
15.3
x
23.2
4.4
x
15.3
x
23.2
4.4
x
15.3
x
23.2
4.4
H
x
W
x
D
(cms)
Total Heat Dissipation (BTU)
163x 15.3 x 23.2
45
114
114
45
163
Input
Voltage
100-240VAC
100-240VAC
100-240VAC
100-240VAC
100-240VAC
100-240VAC
Appliance
Weight
802.11g:
6, 9,lbs
12, 18, 24, 36,2.3
48,kg,
54Mbps
1.5
kg, 3.307 lbs
2.3
kg, 5.07 lbs
2.3
kg, 5.07 lbs
1.5
kg, 3.307
5.07 lbs
2.3
kg, 5.07 lbs
Dimensions
Consumption
47.8W
13.2W
33.5W
33.5W
13.2W
47.8W
H
x
W
x
D
(inches)
1.7
x
6
x
9.1
1.7
x
6
x
9.1
1.7
x
6
x
9.1
1.7
x
6
x
9.1
1.7
x
6
x
9.1
1.7
x
Power
Total Heat Dissipation (BTU)
163 6 x 9.1
45
114
114
45
163
Specifications
100iNG
200iNG/XP
300iNG/XP
50iNG
4.4
x 15.3 x 23.2
4.4
x 15.3 x 23.2
4.4
x 15.3 x 23.2
4.4
x 15.3 x 23.2
4.4
x 15.3 x 23.2
4.4
x 15.3 x 23.2
H
x WVoltage
x D (cms)
Input
100-240VAC
100-240VAC
100-240VAC
100-240VAC
100-240VAC
100-240VAC
Appliance
Weight
1.5
kg, 3.307 lbs
2.3
kg, 5.07 lbs
2.3
kg, 5.07 lbs
1.5
kg, 3.307 lbs
2.3
kg, 5.07 lbs
2.3
kg, 5.07 lbs
Consumption
Interfaces
47.8W
13.2W
33.5W
33.5W
13.2W
47.8W
Specifications
100iNG
200iNG/XP
300iNG/XP
50iNG
Total Heat
Dissipation
(BTU)
Copper
GbE
Ports
163
45 / 6
114
114
163/ 6
10
10
845
8
Power
Number of Slots for FleXi Ports Module
1
1
Interfaces
***
Input
Voltage
***
100-240VAC
100-240VAC
100-240VAC
100-240VAC
100-240VAC
FleXi Ports Module (For XP Appliances) 100-240VAC
Copper
GbE
Ports
8
/ /86/ 4
8
/
8
/
4
10
10
/
6
8
8
Consumption
47.8W
13.2W
33.5W
33.5W
13.2W
47.8W
Specifications
100iNG
200iNG/XP
300iNG/XP
50iNG
(GbE
Copper/GbE Fiber/10GbE Fiber)
Number
ofDissipation
Slots for FleXi
Ports Module
145
1163
-45
-114
163
114
Total
Heat
(BTU)
Console
Ports (RJ45)
1
1
1
1
***
Interfaces
FleXi Ports Module (For XP Appliances)
USB Ports
2
2
2
2
8/8/4
8
/
8
/
4
(GbE
Copper/GbE
Copper
GbE PortsFiber/10GbE** Fiber)
10 / 6
10 / 6
8
8
Hardware Bypass Segments
2
2
2
2
Specifications
100iNG
200iNG/XP
300iNG/XP
50iNG
Console
Ports
(RJ45)
Number of
Slots
for FleXi Ports Module
1
1
1
1
Configurable Internal/DMZ/WAN
Ports
Yes
Yes
Yes
Yes
***
USB
FleXi Ports
Ports Module (For XP Appliances) 2
2
2
2
8/8/4
8
/
8
/
4
Interfaces
** *
(GbE
Copper/GbE
Hardware
BypassFiber/10GbE
Segments Fiber)
System
Performance
2
2
2
2
Copper
GbE
Ports
10
/6
10
/6
8
8
ConsoleThroughput
PortsInternal/DMZ/WAN
(RJ45)(UDP) (Mbps)
Configurable
Ports
Firewall
1
1
Yes
1
Yes
1
3,250
Yes
Yes
12,000
10,000
4,500
Number
of
Slots
for
FleXi
Ports
Module
1
1
-2
-2
USB Ports
2
2
Firewall
Throughput***
(Mbps)
3,000
9,500
8,000
3,500
***(TCP) **
System
Performance
*
FleXi
PortsBypass
ModuleSegments
(For XP Appliances) 2
Hardware
2
2
New
sessions/second
85,000
70,000
45,000
8
/8/4
8
/8/4
-30,000
-2
(GbE
Copper/GbE
Fiber/10GbE
Fiber)
Firewall
Throughput
(UDP) (Mbps)
3,250
12,000
10,000
4,500
Configurablesessions
Internal/DMZ/WAN Ports
Yes
Yes
Yes
Yes
1,000,000
2,000,000
Concurrent
1,500,000
1,250,000
Console
Ports
(RJ45)
Firewall Throughput (TCP) (Mbps)
3,000
9,500
8,000
3,500
1
1
1
1
IPSec VPN Throughput (Mbps)
**
400
1,200
800
450
System
USB
PortsPerformance
New sessions/second
30,000
85,000
70,000
45,000
2
2
2
2
No. of IPSec Tunnels
200
400
300
250
**
Firewall Throughput
(UDP) (Mbps)
Concurrent
sessions
3,250
12,000
10,000
4,500
Hardware
Bypass
Segments
1,000,000
2,000,000
1,500,000
1,250,000
2
2
2
2
SSL VPN Throughput
(Mbps)
300
500
450
400
FirewallVPN
Throughput
(TCP)
(Mbps)
IPSec
Throughput
(Mbps)
3,000
9,500
8,000
3,500
Configurable
Internal/DMZ/WAN
Ports
Yes
Yes
Yes
Yes
400
1,200
800
450
WAF Protected
Throughput (Mbps)
450
1,250
1,000
700
Newofsessions/second
No.
IPSec Tunnels
30,000
85,000
70,000
45,000
200
400
300
250
**
Anti-Virus Throughput
(Mbps)
System
Performance
1,000
2,600
2,200
1,400
Concurrent
sessions (Mbps)
SSL
VPN Throughput
1,000,000
2,000,000
1,500,000
1,250,000
300
500
450
400
IPS Throughput
(Mbps)
Firewall
Throughput
(UDP)
(Mbps)
750
2,400
2,000
1,200
3,250
12,000
10,000
4,500
IPSecProtected
VPN Throughput
(Mbps)
WAF
Throughput
(Mbps)
400
1,200
800
450
450
1,250
1,000
700
UTM Throughput
(Mbps)
Firewall
Throughput
(TCP) (Mbps)
550
1,500
1,200
750
3,000
9,500
8,000
3,500
SSL VPN Throughput
Anti-Virus
Throughput (Mbps)
(Mbps)
300
500
450
400
1,000
2,600
2,200
1,400
Authenticated
Users/Nodes
New
sessions/second
Unlimited
Unlimited
Unlimited
Unlimited
30,000
85,000
70,000
45,000
WAFThroughput
Protected Throughput
(Mbps)
IPS
(Mbps)
450
1,250
1,000
700
750
2,400
2,000
1,200
Concurrent
sessions
1,000,000
2,000,000
1,500,000
1,250,000
Dimensions
Anti-Virus
Throughput
(Mbps)
UTM
Throughput
(Mbps)
1,000
2,600
2,200
1,400
550
1,500
1,200
750
IPSec
VPN
Throughput
(Mbps)
400
1,200
800
450
H
x D (inches)
1.7
1.7
x 14.6 x 17.3
1.7
x 17.3 x 11.85
1.7
x 17.3 x 11.85
IPSx W
Throughput
(Mbps)
Authenticated
Users/Nodes
750x 14.6 x 17.3
2,400
2,000
1,200
Unlimited
Unlimited
Unlimited
Unlimited
No. of IPSec Tunnels
200
400
300
250
UTM
4.4 X 37.2 X 44
4.4 X 37.2 X 44
4.4 x 43.9 x 30.1
4.4 x 43.9 x 30.1
H
x WThroughput
x D (cms) (Mbps)
550
1,500
1,200
750
Dimensions
SSL
VPN Throughput (Mbps)
300
500
450
400
Authenticated
Users/Nodes
Appliance
Weight
5 kg, 11.02 lbs
5 kg, 11.02 lbs
5.1 kg, 11.24 lbs
5.1 kg, 11.24 lbs
Unlimited
Unlimited
Unlimited
Unlimited
H x WProtected
x D (inches)
1.7 x 14.6 x 17.3
1.7 x 14.6 x 17.3
1.7 x 17.3 x 11.85
1.7 x 17.3 x 11.85
WAF
Throughput (Mbps)
450
1,250
1,000
700
4.4 X 37.2 X 44
4.4 X 37.2 X 44
4.4 x 43.9 x 30.1
4.4 x 43.9 x 30.1
H x W x D Throughput
(cms)
Anti-Virus
(Mbps)
Power
1,000
2,600
2,200
1,400
Dimensions
Appliance
Weight
5
kg, 11.02 lbs
5 kg, 11.02 lbs
5.1 kg, 11.24 lbs
5.1 kg, 11.24 lbs
IPS
Throughput
(Mbps)
Input
Voltage
750
2,400
2,000
1,200
100-240VAC
100-240VAC
100-240VAC
100-240VAC
H x WThroughput
x D (inches)(Mbps)
1.7
1.7
1.7
x 17.3 x 11.85
1.7
x 17.3 x 11.85
UTM
99Wx 14.6 x 17.3
137W
137W
99Wx 14.6 x 17.3
Consumption
550
1,500
1,200
750
Power
4.4
4.4
4.4
4.4
H x WHeat
x D (cms)
Authenticated
Users/Nodes
338X 37.2 X 44
467x 43.9 x 30.1
467x 43.9 x 30.1
338X 37.2 X 44
Total
Dissipation
(BTU)
Unlimited
Unlimited
Unlimited
Unlimited
Input
Voltage
100-240VAC
100-240VAC
100-240VAC
100-240VAC
Appliance
Weight
5 kg, 11.02 lbs
5 kg, 11.02 lbs
5.1 kg, 11.24 lbs
5.1 kg, 11.24 lbs
Dimensions
Consumption
99W
137W
137W
99W
1.7
x
14.6
x
17.3
1.7
x
14.6
x
17.3
1.7
x
17.3
x
11.85
1.7
x 17.3
x 11.85 10% to 90%
Environmental
Conditions:
Operating
Temperature
0
°C
to
40
°C,
Storage
Temperature
-25
°C
to
75
°C,
Relative
Humidity
(Non
condensing)
H
x
W
x
D
(inches)
Power
Total Heat Dissipation (BTU)
338
467
467
338
**
If xEnabled,
will bypass traffic only in case of4.4
Power
failure.
X 37.2
X 44
4.4
X 37.2 X 44
4.4
x 43.9 x 30.1
4.4
x 43.9 x 30.1
H
WVoltage
x D (cms)
Input
100-240VAC
100-240VAC
100-240VAC
100-240VAC
**
**
Appliance
Consumption
Antivirus, Weight
IPS and UTM performance is measured
based
on HTTP traffic
as per
RFC
guidelines.
Actual
performance
may
depending
on the real network traffic environments.
99W
137W
137W
99W
5
kg, 11.02
5
kg,
11.02
lbs3511-25
5.1
kg,
11.24
lbs Humidity
5.1
kg,vary
11.24
lbs
Environmental Conditions: Operating Temperature
0 lbs
°C to 40 °C, Storage
Temperature
°C to
75
°C,
Relative
(Non
condensing)
10% to 90%
***
***
Heat Dissipation
338 at a time.
467
467
338 Ports Module can be used
Additional
Purchase (BTU)
required, only single FleXi
*Total
If Enabled, will bypass traffic only in case of Power failure.
Power
**
Antivirus,
IPS and UTM performance is measured
based on HTTP traffic
as per RFC 3511 guidelines.
Actual performance100-240VAC
may vary depending on the real network traffic environments.
Input
Voltage
100-240VAC
100-240VAC
100-240VAC
***
Environmental
Conditions:
Operating
Temperature
°C to 40can
°C,be
Storage
-25 °C to
75 °C, Relative Humidity
(Non condensing) 10% to 90%
Additional Purchase
required,
only single
FleXi
used
a time.
Consumption
99WatTemperature
137W
137W
99W Ports0Module
*
If Enabled,
will bypass(BTU)
traffic only in case of338
Power failure.
Total
Heat Dissipation
338
467
467
**
Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
***
Additional Purchase required, only single FleXi Ports Module can be used at a time.
Environmental Conditions: Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90%
**
If Enabled, will bypass traffic only in case of Power failure.
**
**
Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
***
***
Additional Purchase required, only single FleXi Ports Module can be used at a time.
35iNG
Cyberoam NG series UTM Appliances
35iNG
35iNG
NA
NA
NA
NA
Cyberoam NG series Next-Generation Firewalls
Cyberoam NG series Next-Generation Firewalls
Specifications
750iNG-XP
500iNG-XP Firewalls
Cyberoam NG series Next-Generation
Interfaces
Specifications
Copper GbE Ports
Specifications
Number of Slots for FleXi Ports Module
*
Interfaces
Port
options per FleXi Ports Module
Copper
GbE PortsFiber/10GbE Fiber)
(GbE
Copper/GbE
Interfaces
NumberGbE
of
Slots
for FleXi Ports Module
Console
Ports
(RJ45)
Copper
Ports
*
Specifications
Port options
per FleXi
Ports
Module
USB
Ports
Number
of Slots
for FleXi
Ports
Module
500iNG-XP
8
750iNG-XP
8
750iNG-XP
500iNG-XP
Cyberoam NG series Next-Generation
Firewalls
2
2
Cyberoam NG series Next-Generation
Firewalls
8/8/4
8/8/4
Techsheet
1000iNG-XP
1000iNG-XP
10
1000iNG-XP
4
1500iNG-XP
1500iNG-XP
10
1500iNG-XP
4
Techsheet
2500iNG-XP
Techsheet
2500iNG-XP
10
2500iNG-XP
Techsheet
4
Techsheet
8/8/4
8
8
8
10/ 8 / 4
10/ 8 / 4
10
8
2
4
4
4
2
1
1
1
1
1
8
10
10
10
8
750iNG-XP
1000iNG-XP
1500iNG-XP
2500iNG-XP
500iNG-XP
2
2
2
2
4
4
4
2
8
/
8
/
4
8
/
8
/
4
8
/
8
/
4
8/8/4
8
/
8
/
4
** Fiber)*
(GbE Copper/GbE
Fiber/10GbE
Specifications
750iNG-XP
1000iNG-XP
1500iNG-XP
2500iNG-XP
500iNG-XP
Hardware
Bypass
Segments
2
2
Port
options
per FleXi
Ports Module
8
/
8
/
4
8
/
8
/
4
8
/
8
/
4
8
8
/
8
/
4
Console
Ports
(RJ45)
1
1
1
1/8/4
1
Interfaces
Configurable
Internal/DMZ/WAN
Ports
(GbE Copper/GbE Fiber/10GbE Fiber)
Yes
Yes
Yes
Yes
Yes
USB
Ports
2
2
2
2
2
Copper
GbE
Console
PortsPorts
(RJ45)
8
10
10
10
8
1
1
1
1
1
***
Interfaces
**
System
Performance
Hardware
2
-4
-4
-4
2
Number
ofBypass
Slots
forSegments
FleXi Ports Module
USB
Ports
2
2
2
2
2
Copper
GbE
Ports
8
10
10
10
8
Firewall
Throughput
(UDP) (Mbps)
*
**
18,000
60,000
32,000
27,500
22,000
Configurable
Internal/DMZ/WAN
Ports
Yes
Yes
Yes
Yes
Yes
Port options
per FleXi
Ports
Module
Hardware
Bypass
Segments
2
-4
-4
-4
2
Number
of
Slots
for
FleXi
Ports
Module
2
2
8/8/4
8
/8/4
8/8/4
8
/8/4
8
/8/4
Firewall
Throughput
(TCP) ***
(Mbps)
16,000
36,000
26,000
22,500
18,000
*
(GbEoptions
Copper/GbE
Fiber/10GbE
Fiber)
Configurable
Internal/DMZ/WAN
Ports
Yes
Yes
Yes
Yes
Yes
Port
per
FleXi
Ports
Module
System
Performance
New
sessions/second
100,000
300,000
265,000
240,000
140,000
8
/8/4
8
/8/4
8
8
/8/4
8
/8/4
Console
Ports (RJ45)
1
1
1/8/4
1
1
***
(GbE
Copper/GbE
Fiber/10GbE
Fiber)
Firewall
Throughput
(UDP)
(Mbps)
18,000
60,000
32,000
27,500
22,000
System
Performance
Concurrent
sessions
2,500,000
10,000,000
7,500,000
5,500,000
3,000,000
USB
Ports
2
2
2
2
2
Console
Ports (RJ45)(TCP) (Mbps)
1
1
1
1
1
Firewall
Throughput
16,000
36,000
26,000
22,500
18,000
**
IPSec
VPN
Throughput
(Mbps)
Firewall
Throughput
(UDP)
(Mbps)
18,000
32,000
22,000
1,500
9,000
4,500
3,000
2,250
Hardware
2
-27,500
-60,000
2
USB
Ports Bypass Segments
2
2
2
2
2
New
sessions/second
100,000
300,000
265,000
240,000
140,000
No.
of
IPSec
Tunnels
Firewall
Throughput
(TCP)
(Mbps)
16,000
36,000
26,000
22,500
18,000
1,000
5,000
4,000
3,000
1,500
**
Configurable
Internal/DMZ/WAN
Ports
Yes
Yes
Hardware
Bypass
Segments
2
-Yes
-Yes
-Yes
2
Concurrent
sessions
2,500,000
10,000,000
7,500,000
5,500,000
3,000,000
SSL
VPN
Throughput
(Mbps)
New
sessions/second
100,000
300,000
265,000
240,000
140,000
650
1,450
1,050
850
750
***
Configurable
Internal/DMZ/WAN
Ports
Yes
Yes
Yes
Yes
Yes
IPSec
VPNPerformance
Throughput
(Mbps)
1,500
9,000
4,500
3,000
2,250
System
WAF
Protected
Throughput
(Mbps)
Concurrent
sessions
2,500,000
10,000,000
7,500,000
5,500,000
3,000,000
1,500
2,600
2,300
2,000
1,750
***
SSL VPN
Throughput
(Mbps)
Firewall
Throughput
(UDP)
(Mbps)
650
1,450
1,050
850
750
18,000
60,000
32,000
27,500
22,000
Anti-Virus
Throughput
(Mbps)
IPSec
VPN
Throughput
(Mbps)
System
Performance
1,500
9,000
4,500
3,000
2,250
3,500
6,500
5,000
4,500
4,000
WAFThroughput
Throughput
(Mbps)
Firewall
Throughput
(TCP) (Mbps)
1,500
2,600
2,300
2,000
1,750
16,000
36,000
26,000
22,500
18,000
IPS
(Mbps)
No.
ofProtected
IPSec
Tunnels
Firewall
Throughput
(UDP)
(Mbps)
1,000
5,000
4,000
3,000
1,500
4,500
16,000
12,500
10,500
6,500
18,000
60,000
32,000
27,500
22,000
****
Anti-Virus
Throughput
(Mbps)
New
sessions/second
3,500
6,500
5,000
4,500
4,000
100,000
300,000
265,000
240,000
140,000
NGFW
Throughput
(Mbps)
SSL
VPN
Throughput
(Mbps)
Firewall
Throughput
(TCP)
(Mbps)
650
1,450
1,050
850
750
3,250
8,000
6,000
5,000
3,600
16,000
36,000
26,000
22,500
18,000
*****
IPS Throughput
(Mbps)
Concurrent
sessions
4,500
16,000
12,500
10,500
6,500
2,500,000
Fully
Protected
Throughput
10,000,000
7,500,000
5,500,000
WAF
(Mbps)
3,000,000
New
sessions/second
1,500
2,600
2,300
2,000
1,750
1,650
5,500
3,600
3,000
1,800
100,000
300,000
265,000
240,000
140,000
****
NGFWVPN
Throughput
(Mbps)
IPSec
Throughput
(Mbps)
3,250
8,000
6,000
5,000
3,600
Authenticated
Users/Nodes
1,500
9,000
Anti-Virus
Throughput
(Mbps)
4,500
3,000
2,250
Concurrent
sessions
3,500
6,500
5,000
4,500
Unlimited
4,000
Unlimited
Unlimited
Unlimited
Unlimited
2,500,000
10,000,000
7,500,000
5,500,000
3,000,000
*****
FullyThroughput
Throughput
No.
ofProtected
IPSecThroughput
Tunnels
1,650
5,500
3,600
1,800
IPS
(Mbps) (Mbps)
1,000
5,000
4,000
3,000
1,500
IPSec
VPN
4,500
16,000
12,500
10,500
6,500
1,500
9,000
4,500
3,000
2,250
****
Authenticated
Users/Nodes
Dimensions
SSL
VPN
Throughput
(Mbps)
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
NGFW
Throughput
(Mbps)
650
1,450
1,050
850
750
No.
of
IPSec
Tunnels
3,250
8,000
6,000
5,000
3,600
1,000
5,000
4,000
3,000
1,500
*****
WAF
(Mbps)
H
xW
x DThroughput
(inches)
Fully
Protected
Throughput
1,500
2,600x 17.52 x 23.23
2,300
2,000x 17.52 x 23.23
1,750
1.7
x 17.44 x 18.75
1.7
x 17.44 x 18.75
3.54
3.54 x 17.52 x 23.23
3.54
SSL
VPN
(Mbps)
1,650
5,500
3,600
3,000
1,800
650
1,450
1,050
850
750
Anti-Virus
(Mbps)
9 x 44.5 x 59
9
x 44.5 x 59
4.4
X 44.3 X 47.62
4.4
X 44.3 X 47.62
9
x 44.5 x 59
Authenticated
Users/Nodes
3,500
6,500
5,000
4,500
4,000
H
x WProtected
x D Throughput
(cms)
WAF
Throughput
(Mbps)
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
1,500
2,600
2,300
2,000
1,750
Dimensions
IPS
Throughput
(Mbps)
10,50041.8lbs
6,500
4,500
16,000
12,500
Appliance
Weight
19 kg, 41.8 lbs
19
kg, 41.8 lbs
Anti-Virus
Throughput
(Mbps)
5.1
kg,
11.24
lbs
19kg,
5.1
kg,
11.24
lbs
3,500
6,500
5,000
4,500
4,000
H x W xThroughput
D (inches) (Mbps)****
1.7
x 17.44 x 18.75
1.7
x 17.44 x 18.75
3.54
3.54 x 17.52 x 23.23
3.54
Dimensions
NGFW
3,250
8,000x 17.52 x 23.23
6,000
5,000x 17.52 x 23.23
3,600
IPS
Throughput (Mbps)
4,500
16,000
12,500
10,500
6,500
*****
9
x
44.5
x
59
9
x
44.5
x 59 x 23.23
4.4
X
44.3
X
47.62
4.4
X
44.3
X
47.62
9
x
44.5
x
59
****
H
x
W
x
D
(cms)
Fully
Protected
Throughput
H
x W xThroughput
D (inches) (Mbps)
1,650
5,500
3,600
3,000x 17.52 x 23.23
1,800
1.7
x 17.44 x 18.75
1.7
x 17.44 x 18.75
3.54
3.54 x 17.52 x 23.23
3.54
x 17.52
Power
NGFW
3,250
8,000
6,000
5,000
3,600
Appliance
Weight
19
19
5.1
kg,44.3
11.24
lbs
19kg,
41.8lbs
5.1
kg,44.3
11.24
lbs
Authenticated
Users/Nodes
9
x kg,
44.541.8
x 59lbs
9
x kg,
44.541.8
x 59lbs
4.4
X
X 47.62
4.4
X
X 47.62
9
x 44.5
x 59
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
H
x WProtected
x D (cms)
Input
Voltage
Fully
Throughput*****
100-240
VAC
100-240
VAC
90-260
VAC
90-260
VAC
90-260
VAC
1,650
5,500
3,600
3,000
1,800
Appliance
Weight
Consumption
Authenticated
Users/Nodes
208kg,
W 11.24 lbs
19
19
258 W41.8lbs
258kg,
W 41.8 lbs
258kg,
W 41.8 lbs
208kg,
W 11.24 lbs
5.1
19kg,
5.1
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
Power
Dimensions
Total
Heat Dissipation (BTU)
345
881
881
881
345
Input
Voltage
100-240
VAC
100-240
VAC
90-260
VAC
90-260
VAC
90-260
VAC x 23.23
H
x
W
x
D
(inches)
1.7 x 17.44 x 18.75
3.54 x 17.52 x 23.23
3.54 x 17.52 x 23.23
3.54 x 17.52
Dimensions
Redundant Power Supply
Power
-1.7 x 17.44 x 18.75
Yes
Yes
Yes
Yes
Consumption
208xXW17.44
258
W
258
W
258
W
208xXW17.44
990-260
x 44.5
x 59 x 23.23
990-260
x 44.5
x 59 x 23.23
4.4
44.3VAC
Xx47.62
4.4
44.3VAC
Xx47.62
990-260
x 44.5
x 59 x 23.23
(cms)
H
x WVoltage
x D (inches)
Input
100-240
1.7
18.75
100-240
VAC
VAC
VAC
1.7
18.75
3.54
x 17.52
3.54
x 17.52
3.54
x 17.52
Total
Heat Dissipation
(BTU)
345X
881
881
881
345X
Appliance
Weight
19
19
5.1
kg,
11.24
lbs
19kg,
5.1
kg,
11.24
lbs
9
x kg,
44.5
x 59lbs
9
x kg,
44.5
x 59lbs
4.4
X 47.62
4.4
X 47.62
9
x 44.5
x 59
Consumption
208
W44.3
258
W41.8lbs
258
W 41.8
258
W 41.8
208
W44.3
H
x W x D (cms)
Redundant PowerConditions:
Supply
Environmental
Temperature
0 °C to 40 °C, Storage Temperature
-25 °C to 75 °C,
Humidity (Non condensing)
10% to 90% Yes
-345kg,
Yes
Yes
Yes
Total
Heat Dissipation
(BTU) Operating
881Relative
881kg, 41.8 lbs
881kg, 41.8 lbs
345kg, 11.24 lbs
Appliance
Weight
19
19
5.1
19kg,
41.8lbs
5.1
11.24 lbs
*
**
Additional Purchase
required. If Enabled, will bypass traffic only in case of Power failure.
Power
Redundant
Power Supply
Yes
Yes
Yes
Yes
***
Antivirus,
IPS and Fully Protected Throughput performance
on HTTP
RFC 3511
performance
may vary depending
on the real
Input
Voltage
100-240 VACis measured based
100-240
VAC traffic as per90-260
VACguidelines. Actual
90-260
VAC 10%
90-260 VAC
Power
Environmental Conditions: ****
Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing)
to 90%
*****
network
traffic environments. **NGFW throughput
is W
measured
with Firewall, IPS
Filtering
features turned on.
Fully
Protected Throughput
is measured
with
208
258
W VAC
258 W
258 W
208 and
W Web
*Consumption
Input
Voltage
100-240
VAConly
100-240
VAC & Application90-260
90-260
VAC
90-260
VAC
Additional
Purchase
required.Operating
If Enabled,
will bypass
traffic
in Storage
case of Power
failure.
Environmental
Conditions:
Temperature
0
°C
to
40
°C,
Temperature
-25
°C
to
75
°C,
Relative
Humidity
(Non
condensing)
10%
to
90%
Total
HeatIPS,
Dissipation
(BTU)
345 W features turned on. 208
Firewall,
Web & Application
Filtering and Anti-Virus
881 W
881 W
881 W
345 W
***
Consumption
208
258
258
258
* Antivirus, IPS and Fully Protected
**
Throughput
performance
is
measured
based
on
HTTP
traffic
as
per
RFC
3511
guidelines.
Actual
performance
may
vary
depending
on
the
real
Additional Purchase
required. If Enabled, will bypass
failure.
Redundant
Power Supply
-345 traffic only in case of Power
Yes
Yes
Yes
Yes
Total
Heat Dissipation
(BTU) ****
881
881
881
345
*****
***
network
traffic
environments.
NGFW
throughput
is measured
Firewall,
IPS on
andHTTP
Web traffic
& Application
Filtering
turned
on. performance
Fully Protected
is measured
with
Antivirus,
IPS
and
Fully Protected
Throughput
performance
is with
measured
based
as per RFC
3511features
guidelines.
Actual
may Throughput
vary depending
on the real
Redundant
Power
Supply
Yes
Yes*****
Yes
Yes
****
Firewall, traffic
IPS, Web
& ApplicationNGFW
Filtering
and Anti-Virus
features
turned
on. IPS and Web & Application Filtering features turned on. Fully Protected Throughput is measured with
network
environments.
throughput
is measured
with
Firewall,
Environmental Conditions: Operating Temperature 0 °C to 40 °C, Storage Temperature -25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90%
Firewall,
IPS, Web & Application
Filtering and Anti-Virus features turned on.
*
**
Additional Purchase
required.Operating
If Enabled,
will bypass0traffic
in Storage
case of Power
failure.-25 °C to 75 °C, Relative Humidity (Non condensing) 10% to 90%
Environmental
Conditions:
Temperature
°C to only
40 °C,
Temperature
****
**
Antivirus, Purchase
IPS and Fully
Protected
Throughput
performance
is measured
based
onfailure.
HTTP traffic as perCRiV-4C
RFC 3511 guidelines. Actual
performance may vary depending
on the real
Additional
required.
If Enabled,
will bypass
traffic only
in case of
Power
CRiV-1C
CRiV-2C
CRiV-8C
CRiV-12C
****
*****
***
network
traffic
NGFW
throughput
is measured
Firewall,
IPS on
andHTTP
Web traffic
& Application
Filtering
turned
on. performance
Fully Protected
is measured
with
Antivirus,
IPSenvironments.
and Fully Protected
Throughput
performance
is with
measured
based
as per RFC
3511features
guidelines.
Actual
may Throughput
vary depending
on the real
****
Firewall, traffic
IPS,Specifications
Web
& Application
Filtering
and Anti-Virus
features
turned
on. IPS and Web & Application Filtering features turned on. *****Fully Protected Throughput is measured with
network
environments.
NGFW
throughput
is measured
with
Firewall,
Technical
Cyberoam Virtual Security Appliances
Cyberoam Virtual Security Appliances
Cyberoam Virtual Security Appliances
CRiV-1C
CRiV-8C
CRiV-12C
CRiV-4C
Firewall, IPS, Web & Application Filtering and Anti-Virus
features turned on. CRiV-2C
VMware ESX/ESXi 4.0/4.1/5.0, VMware Workstation 7.0/8.0/9.0, VMware Player 4.0/5.0, Microsoft Hyper-V 2008/2012, KVM, Citrix XenServer
Hypervisor Support
Cyberoam Virtual SecurityCRiV-1C
Appliances
/1
Cyberoam Virtual Security1Appliances
vCPU
Support
(Min / Max)
Technical
Specifications
#
CRiV-2C
CRiV-4C
CRiV-8C
CRiV-12C
1/2
1/4
1/8
1 / 12
Technical
Specifications
Network
Interface
Support (Min / Max )
Hypervisor
Support
3 /VMware
10
Workstation 7.0/8.0/9.0,
VMware Player 4.0/5.0,
KVM, Citrix XenServer
3 / 10
3 / 10
3 / 10 Microsoft Hyper-V 2008/2012,
3VMware
/ 10 ESX/ESXi 4.0/4.1/5.0,
Hypervisor
Support
Memory
Support
(Min
/ Max)
vCPU Support
(Min
/ Max)
1
GB
VMware
4.0/4.1/5.0,
VMware Player 4.0/5.0,
Hyper-V 2008/2012,
KVM, Citrix XenServer
1 GB
1
GB
1
GB
4 GB
1
GB
GB
/VMware
2 / 4 GBWorkstation 7.0/8.0/9.0,
/ 1 / 4 ESX/ESXi
/ 12 / 4 GB
/ 4 / 4 GB
/ 8 /Microsoft
CRiV-1C
CRiV-2C
CRiV-8C
CRiV-12C
CRiV-4C
vCPU
Support
(Min
/ Max) (Min / Max#)
Network
Interface
Support
1
3/1
10
CRiV-1C
System Performance*
Technical
Specifications
Network
Interface
Support
(Min / Max#)
Memory Support
(Min
/ Max)
Firewall
Throughput
(UDP)
(Mbps)
Technical
Specifications
Hypervisor
Support
Memory
Support
(Min
/ Max)
System
Performance*
Firewall
Throughput
(TCP)
(Mbps)
Hypervisor
Support
vCPU Support (Min / Max)
System
Performance*
Firewall
Throughput
(Mbps)
New
sessions/second
vCPU
Support
(Min
/(UDP)
Max) (Min
Network
Interface
Support
/ Max#)
Firewall
(UDP)
(Mbps)
(TCP)
(Mbps)
Concurrent
sessions
Network
Interface
Support
(Min
/ Max#)
MemoryThroughput
Support
(Min
/ Max)
3
10
1
/2
CRiV-2C
1
3/4
10
CRiV-4C
1
/8
3
10
CRiV-8C
1
/ 12
3
10
CRiV-12C
1 /GB
3
10 / 4 GB
3
10 / 4 GB
3
10 / 4 GB
3
10 / 4 GB
3
10 / 4 GB
1 /GB
1 /GB
1 /GB
1 /GB
3,500
4,000
3,000
1,500
4,000
VMware
4.0/4.1/5.0,
VMware
VMware Player 4.0/5.0,
Hyper-V 2008/2012,
KVM, Citrix XenServer
1
GB
/ 4 GBWorkstation 7.0/8.0/9.0,
1
GB / 4 GB
1 GB / 4 GB
1
GB /Microsoft
4 GB
1
GB / 4 ESX/ESXi
GB
ESX/ESXi 4.0/4.1/5.0,
Workstation 7.0/8.0/9.0,
VMware Player 4.0/5.0,
KVM, Citrix XenServer
4,000
3,500
3,000
2,500
1,200
1 /VMware
2
1VMware
/1
1 / 12
1/4
1 / 8 Microsoft Hyper-V 2008/2012,
60,000
50,000
40,000
4,000
3,500
4,000
30,000
3,000
1,500
25,000
1
/2
1
/1
1
/ 12
1
/4
1
/8
3
10
3
10
3
10
3
10
3
10
1,500
230,000
1,200
3
/GB
10 / 4 GB
1
1,200
25,000
200
1
GB / 4 GB
3,000
3
/GB
10 / 4 GB
525,000
2,500
1
Firewall
Throughput
(TCP)
(Mbps)
New sessions/second
IPSec
VPN
Throughput
Memory
Support
(Min
/ (Mbps)
Max)
1
GB / 4 GB
2,500
250
30,000
3,500
1,200,000
3,000
3
/GB
10 / 4 GB
1
3,000
1 GB / 4 GB
300
40,000
4,000
1,500,000
3,500
3
/GB
10 / 4 GB
1
3,500
350
1
GB / 4 GB
50,000
4,000
1,750,000
3
10 / 4 GB
1 /GB
4,000
400
1
GB / 4 GB
60,000
System
Performance*
New
Concurrent
sessions
No.
ofsessions/second
IPSec
Tunnels
System
Performance*
Firewall
Throughput
(Mbps)
Concurrent
sessions(UDP)
IPSecVPN
VPN
Throughput
(Mbps)
SSL
Throughput
(Mbps)
25,000
230,000
200
1,500
230,000
200
300
30,000
525,000
1,000
3,000
525,000
400
250
40,000
1,200,000
1,500
3,500
1,200,000
550
300
50,000
1,500,000
2,000
4,000
1,500,000
550
350
60,000
1,750,000
2,500
4,000
1,750,000
750
400
Firewall
Throughput
(UDP)
(Mbps)
Firewall
Throughput
(TCP)
(Mbps)
IPSec
VPN
Throughput
(Mbps)
No. ofProtected
IPSec
Tunnels
WAF
Throughput
(Mbps)
Firewall
Throughput
(Mbps)
Newof
sessions/second
No.
IPSec
Tunnels(TCP)
SSL
VPN
Throughput
(Mbps)
Anti-Virus
Throughput
(Mbps)
New
sessions/second
Concurrent
sessions
SSL
VPN
Throughput
(Mbps)
WAFThroughput
Protected
Throughput
(Mbps)
IPS
(Mbps)
1,500
1,200
200
300
1,200
25,000
200
300
900
3,000
2,500
250
500
1,000
2,500
30,000
1,000
1,500
400
3,500
3,000
300
800
1,500
3,000
40,000
1,500
2,000
550
4,000
3,500
350
1,400
2,000
3,500
50,000
2,000
2,200
550
4,000
400
1,550
2,500
4,000
60,000
2,500
2,450
750
25,000
230,000
300
450
230,000
200
300
900
250
30,000
525,000
400
750
500
525,000
250
500
450
1,500
40,000
1,200,000
550
1,200
800
1,200,000
300
800
1,000
2,000
50,000
1,500,000
550
1,800
1,400
1,500,000
350
1,400
2,200
60,000
1,750,000
750
1,900
1,550
1,750,000
400
1,550
2,450
200
900
450
Unlimited
200
300
450
250
250
1,000
1,500
Unlimited
750
1,000
400
750
450
300
1,500
2,000
Unlimited
1,200
1,500
550
1,200
1,000
350
2,000
2,200
Unlimited
1,800
2,000
550
1,800
1,400
400
2,500
2,450
Unlimited
1,900
2,500
750
1,900
1,550
Concurrent
sessions (Mbps)
**
IPSec
VPNThroughput
Throughput
(Mbps)
WAF
(Mbps)
Anti-Virus
Fully
Protected
Throughput
(Mbps)
IPSec
VPN
Throughput
(Mbps)
No.
of
IPSec
Tunnels
Anti-Virus
Throughput
(Mbps)
IPS Throughput
(Mbps)
Authenticated
Users/Nodes
**
No.
of
IPSec
Tunnels
SSL
VPN
Throughput
(Mbps)
IPS
(Mbps)
FullyThroughput
Protected
Throughput
(Mbps)
**
SSL
VPN
Throughput
(Mbps)
750
550
550
400
300
WAF
Protected
Throughput
(Mbps)
800
500
Fully
Protected
Throughput
(Mbps)
1,550
1,400
Authenticated
Users/Nodes
1,000
450
250
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
Actual
performance
may vary
depending on the 300
real network traffic environments. Performance values given
above were observed1,400
using server with Intel Xeon1,550
E5645 (2.4 GHz) and
WAF
Protected
Throughput
(Mbps)
800
Anti-Virus Throughput
(Mbps)
2,450
2,200
2,000
1,500
900ESXi 5.0 (Update 1) with 4500
Authenticated
Users/Nodes
Unlimited
Unlimited
Unlimited
Unlimited
Unlimited
E1000E
Ethernet
Drivers, running VMware version
GB vRAM assigned to CR
Virtual Security Appliance.
#
Anti-Virus
Throughput
(Mbps)
2,450
2,200
2,000
TheThroughput
Number
depends
on the Hypervisor you are900
using.
1,500
IPS
(Mbps)
1,900
1,800
1,200
750
450
*Antivirus,
IPS and Fully
Throughput
measured
based onPerformance
HTTP traffic values
as per given
RFC 3511
Actualusing
performance
mayIntel
varyXeon
depending
realand
Actual
performance
may Protected
vary
depending
on theperformance
real network is
traffic
environments.
aboveguidelines.
were observed
server with
E5645 on
(2.4the
GHz)
**
IPS
Throughput
(Mbps)
**
1,900
1,200
750
450
Fully
Protected
Throughput
(Mbps)
1,550
1,400
1,000
250ESXi 5.0
network
traffic
environments.
FullyVMware
Protected
Throughput
is measured
IPS, assigned
Web & Application
Filtering
andAppliance.
Anti-Virus1,800
features turned on.
E1000E
Ethernet
Drivers, running
version
(Update 1)with
withFirewall,
4450
GB vRAM
to CR
Virtual
Security
**
Actual
performance
may
vary
depending
on
the
real
network
traffic
environments.
Performance
values
given
above
were
observed
using
server
with
Intel
Xeon
E5645
(2.4
GHz)
and
#
Fully
Throughput
(Mbps)
1,550
1,400
1,000
The Protected
Number depends
on the
Hypervisor you are250
using.
450
Authenticated
Users/Nodes
Unlimited
Unlimited
Unlimited
Unlimited
E1000E
Ethernet
Drivers, running VMware version
ESXi 5.0 (Update 1) with 4Unlimited
GB vRAM assigned to CR
Virtual Security Appliance.
*Antivirus, IPS and Fully Protected Throughput performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real
#
Authenticated
Users/Nodes
The Number depends
on the **Hypervisor you areUnlimited
using.
Unlimited
Unlimited
Unlimited
Unlimited
network traffic environments. Fully Protected Throughput is measured with Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on.
*Antivirus, IPS and Fully Protected Throughput performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real
network traffic environments. **Fully Protected Throughput is measured with Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on.
Actual performance may vary depending on the real network traffic environments. Performance values given above were observed using server with Intel Xeon E5645 (2.4 GHz) and
E1000E
Ethernet Drivers,
running
VMware
5.0 (Update
1) with 4 GB Performance
vRAM assigned
to CR
Virtual
Security
Actual
performance
may vary
depending
onversion
the realESXi
network
traffic environments.
values
given
above
were Appliance.
observed using server with Intel Xeon E5645 (2.4 GHz) and
#
The Number
depends
on running
the Hypervisor
you
are using.
E1000E
Ethernet
Drivers,
VMware
version
ESXi 5.0 (Update 1) with 4 GB vRAM assigned to CR Virtual Security Appliance.
#
*Antivirus,
IPS
and
Fully
Protected
Throughput
performance
is
measured
based
on
HTTP
traffic
as
per
RFC
3511
guidelines.
Actual performance may vary depending on the real
The Number depends on the **Hypervisor you are using.
network traffic
FullyThroughput
Protected Throughput
is measured
with
Firewall,
IPS, Web
Application
Filtering
and Anti-Virus
turned
on.vary depending on the real
*Antivirus,
IPS environments.
and Fully Protected
performance
is measured
based
on HTTP
traffic&as
per RFC 3511
guidelines.
Actual features
performance
may
network traffic environments. **Fully Protected Throughput is measured with Firewall, IPS, Web & Application Filtering and Anti-Virus features turned on.
3
HORUS INFORMATICA
VALUE ADDED DISTRIBUTOR
Un team di esperti in networking,
sicurezza di rete e virtualizzazione al
servizio delle imprese italiane.
Le necessità del mercato
L’Azienda
Indipendentemente dai contesti e dai settori industriali in cui si
trovano a operare, oggi per le aziende la tecnologia informatica
Sul mercato della distribuzione di information technology dal
1997, Horus Informatica si propone come il naturale alleato
e Internet sono elementi abilitanti di importanza fondamentale
per la buona gestione del business. Si tratta però di risorse da
maneggiare con estrema cura perché al ruolo cruciale dell’hi-
delle società italiane nella loro inarrestabile marcia verso
l’innovazione.
tech e del networking nelle attività di un’impresa moderna
fa da contraltare la crescente complessità degli ambienti
distribuiti.
Grazie a una rete di oltre 100 partner più rivenditori, system
integrator e dealer in grado di coprire l’intero territorio
nazionale, Horus Informatica garantisce non soltanto la
progettazione di applicazioni su misura scelte fra prodotti
Temi come quello della mobility, con la possibilità di accedere
ai dati aziendali da postazioni remote e con strumenti portatili;
e della security, ovvero la necessità di amministrare i flussi di
dati in modo affidabile e protetto, assumono un peso sempre
più rilevante.
Il successo nella scelta delle soluzioni da adottare, e di
conseguenza la riuscita in un mercato quanto mai competitivo,
è perciò spesso una questione di dettagli. Per curarli
inmaniera efficiente e, soprattutto, vincente, le aziende non
hanno più bisogno di semplici fornitori di hardware e software,
ma di partner in grado di seguirli passo dopo passo nella
realizzazione di strategie in linea con le loro esigenze, con
un’offerta composta sì di prodotti di qualità, ma soprattutto di
consulenza a 360°.
best of breed, ma segue anche i servizi di assistenza pre
o post vendita e di formazione dei clienti, erogata sul
posto da personale qualificato e certificato.
Il Supporto al cliente
Su tutte queste soluzioni Horus Informatica è in grado di
intervenire presso i clienti direttamente o attraverso i suoi
partner di canale assicurando un’accurata analisi delle
infrastrutture prima della vendita e successivamente il design,
la progettazione e l’implementazione dei prodotti.
A corredo di tutte queste operazioni, Horus Informatica si
presenta in qualità di referente unico della clientela anche
per quel che riguarda l’assistenza post-vendita e il training.
E in virtù dello studio accurato delle reali necessità dei
suoi interlocutori, può proporre architetture chiavi in mano
personalizzate, che rispettano non soltanto le necessità
tecnologiche delle aziende, ma anche i loro budget di spesa.
4
HORUS INFORMATICA
L’OFFERTA
VALUE ADDED DISTRIBUTOR
Horus Informatica scommette oggi principalmente
su cinque brand di cui è distributore ufficiale a
valore aggiunto per il mercato italiano
Cyberoam, con le soluzioni:
Citrix XenDesktop®, Citrix XenApp™, e Citrix VDI-in-a-Box™,
soluzioni per le quali NComputing ha ottenuto la certificazione
HDX Ready.
Cyberoam Unified Threat Management, un pacchetto
completo e flessibile per la gestione identity-based e la
reportistica degli strumenti di sicurezza e anti-intrusione
presenti sulle reti aziendali accessibili anche in mobilità;
Cyberoam Central Console (CCC): hardware e virtual
appliance per la gestione e il controllo centralizzato dei dispositivi
UTM all’interno di network distribuiti ed estesi. Consente di
potenziare le policy di sicurezza aziendali volte a rafforzare il
livello di protezione degli uffici periferici o gestiti da remoto.
Cyberoam iView, soluzione per logging e reporting che aiuta
le aziende a monitorare le reti attraverso dispositivi multipli in
modo da garantire elevati livelli di sicurezza e riservatezza dei
dati nella totale conformità alle normative vigenti.
Array Networks, con le soluzioni:
Array Networks APV, una gamma di controller tesi a
migliorare l’efficienza, la sicurezza e la disponibilità delle
applicazioni basate sul Web;
Array Networks AG, una nuova famiglia di controller che
garantiscono la sicurezza perimetrale delle informazioni
sensibili per le aziende e la estendono via via a tutte le
applicazioni client e ai singoli utenti;
Array Networks DesktopDirect, applicazione enterprise di
protezione dei dati critici che è oggi progettata per servire al
meglio le esigenze degli utenti mobile ed è compatibile anche
con dispositivi come iPad e iPhone di Apple.
Array Networks WANVelocity, è un WAN Optimization
Controller che ha come punto di forza le performance; è in
grado di ottimizzare le connessioni WAN utilizzando tecnologia
proprietaria.
NComputing, con le soluzioni:
vSpace Server, il cuore dell’offerta di NComputing è rappresentato dal software vSpace Server che permette alle imprese
di ottimizzare le operazioni di abilitazione dei virtual desktop
assicurando l’accesso simultaneo a un solo sistema operativo
da parte di una molteplicità di utilizzatori;
Dispositivi di accesso, a basso costo e basso consumo, piccoli e duraturi, i dispositivi di accesso alla desktop virtualization
della gamma NComputing si connettono da un lato alle periferiche degli utenti come il mouse, la tastiera o il monitor; dall’altra a
un server centralizzato raggiungibile direttamente o via Ethernet
che ospita ogni desktop virtuale e le applicazioni necessarie.
Disponibili nelle gamme L-Series, M-Series, X-Series
Thin client N-Series di NComputing per Citrix HDX: La
linea di prodotti altamente innovativi dedicata agli ambienti
vSpace Client, software innovativo che estende i benefici
della desktop virtualization a qualsiasi PC o laptop trasformandolo in un performante client virtuale e consente di offrire accessi sicuri in qualsiasi momento e luogo al desktop
aziendale o a determinate applicazioni sul server host centrale
alimentato da software vSpace Server
Cellopoint
Cellopoint UTM, è una soluzione unica nel suo genere. E’ il
primo sistema UTM per la posta elettronica. Esiste sia nella
versione virtuale, fisica e software.
Il sistema proprietario Cello Operating System consente di
avere in un unico apparato la protezione da spam e virus, la
possibilità di tracciare e prevenire la fuga di informazioni (Audit e Data Loss Prevention), l’archiviazione delle email e la loro
cifratura per comunicare in maniera sicura.
24Online Billing & Bandwidth
Management - Reti WIFI
Soluzione esaustiva per il controllo degli accessi,
l’ottimizzazione e l’amministrazione della banda nelle
infrastrutture di rete WIFI.
Professional service & skill
I nostri servizi di delivery, messi a punto per i partner ed il
mercato, hanno l’obiettivo di finalizzare l’implementazione e
la personalizzazione delle soluzioni proposte e si riferiscono al
raggiungimento degli obiettivi del progetto:
- analisi iniziale del progetto e definizione obiettivi
- implementazione ed ottimizzazione della
configurazione / training on the job
- verifica delle funzionalità ambiente e del
raggiungimento obiettivi / go live
- supporto post go-live
Offriamo una competenza specifica per individuare le linee
guida di definizione dei progetti e perseguire risultati legati
all’affidabilità ed efficacia dell’infrastruttura e quindi ottimizzazione delle risorse e budget.
Un team di specialisti dedicato alla progettazione di infrastrutture informatiche complesse con le capacità di progettazione
di soluzioni per l’integrazione di sistemi ed apparati in ambiente multi-vendor, di gestione di problematiche relative alle
architetture, alla sicurezza ed all’alta disponibilità, ed esperienza nell’analisi di performance di sistemi e reti finalizzata
al capacity management di infrastrutture IT.
DAL 1997 ABBIAMO
LA TESTA TRA LE NUVOLE
Innovazione è sempre stata la parola chiave alla
base delle nostre scelte.
Abbiamo portato il cloud nelle aziende ben prima che
divenisse un tema caldo del mercato e che operatori
e vendor ne iniziassero a parlare.
E’ dal 1997 che i nostri clienti possono godere di
soluzioni tecnologicamente all’avanguardia che
consentono a centinaia di utenti di gestire il proprio
business in modo sicuro, efficace e professionale
senza dover effettuare onerosi investimenti in risorse
o competenze.
HORUSHORUS
INFORMATICA
HORUS
INFORMATICA
HORUS
INFORMATICA
Srl INFORMATICA
Ufficio
Srl
Srl
Ufficio
Commerciale
Srl
Ufficio
Commerciale
Ufficio
Commerciale
Supporto
Commerciale
Supporto
Tecnico
Supporto
Tecnico
Supporto
Ufficio
Tecnico
Ufficio
Marketing
Tecnico
Ufficio
Marketing
Ufficio
Marketing
Marketing
Via Enzo
ViaFerrari,
Enzo
ViaFerrari,
21/B
Enzo
ViaFerrari,
Enzo
21/B Ferrari,
21/B
[email protected]
21/B
[email protected]
[email protected]
[email protected]
Pre vendita
Pre vendita
Pre vendita
[email protected]
vendita
[email protected]
[email protected]
[email protected]
20010 Arluno
20010 20010
Arluno
- Milano
20010
Arluno
- Milano
- Italy
Arluno
- Milano
- Italy
Tel:
- Milano
02/33510135
- Italy
Tel:-02/33510135
Italy
Tel: 02/33510135
Tel: 02/33510135
[email protected]
[email protected]
[email protected]
[email protected]
Fax: 02/33510838
Fax: 02/33510838
Fax: 02/33510838
Fax: 02/33510838
www.horus.it
www.horus.it
www.horus.it
www.horus.it
Fax: 02/33510199
Fax: 02/33510199
Fax: 02/33510199
Fax: 02/33510199
Post vendita
Post vendita
Post vendita
Post vendita
[email protected]
[email protected]
[email protected]
[email protected]
Fly UP