• Home
  • Cyberoam NG Series
  • CR15iNG

Cyberoam CR15iNG Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack.

It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.

Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

Interfaces
Copper GbE Ports 3
Configurable Internal/DMZ/WAN Ports Yes
Console Ports (RJ45) 1
USB Ports 2
System Performance
Firewall throughput (UDP) (Mbps) 1,200
Firewall throughput (TCP) (Mbps) 900
New sessions/second 5,000
Concurrent sessions 200,000
IPSec VPN throughput (Mbps) 130
No. of IPSec Tunnels 300
SSLVPN Throughput (Mbps) 50
Anti-Virus throughput (Mbps) 200
IPS throughput (Mbps) 160
UTM throughput (Mbps) 90
Dimensions
H x W x D (inches) 1.7 x 6 x 9.1
H x W x D (cms) 4.4 x 15.3 x 23.2
Weight 1.5 kg, 3.307 lbs
Official Distributor of Official distributor of Cyberoam and Euphoria PBX Official distributor of Cyberoam and Euphoria PBX
    • Location

      21A Thor Circle, Thornton
      Cape Town, South Africa

      Mon – Fri: 8AM – 5PM

      Follow us