The CR25ia Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
|10/100 Ethernet Ports||4|
|Configurable Internal/DMZ/WAN Ports||Yes|
|Console Ports (RJ45/DB9)||1|
|Firewall throughput (UDP)) (Mbps)||450|
|Firewall throughput (TCP) ) (Mbps)||225|
|168-bit 3DES/AES throughput (Mbps)||30/75|
|Anti-Virus throughput (Mbps)||65|
|IPS throughput (Mbps)||70|
|UTM throughput (Mbps)||50|
|H x W x D (inches)||1.7 x 6 x 9.1|
|H x W x D (cms)||4.4 x 15.3 x 23.2|
|Weight||2.3kg, 5.07 lbs|