× All the transactions performed on 2.0 is available here. To access Market click "Home".

utm firewall (cyberoam)(50 ing)

` 46,786.00

  • MRP: `51999.00

Cyberoam Firewall is available as a Next-Generation Firewall and UTM firewall. It offers stateful and deep packet inspection for network, application and user identity-based security. Cyberoam Firewall thus protects organizations from DoS, DDoS and IP Spoofing attacks.. Web Application Security - Positive Protection model - Unique Intuitive Website Flow Detector technology - Protection against SQL Injections, Cross-site Scripting XSS, Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported 5 to 300 servers.

  • Availability: 100 In Stock
  • Min. Qty. Per Consignee: 1
  • Web Application Security - Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers
  • Concurrent Connection (Max.) - 1000000 Numbers Numbers
  • HTTP Connections/Sec (Max.) - 45000 Numbers Numbers
  • Request Latency - sub-ms
  • Attack Protection - Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks,
Other Specifications Download Specification
Deployment Modes Active-Active - Active-Passive with state synchronization - Stateful Failover with LAG Support
Web Application Security Positive Protection model - Unique "Intuitive Website Flow Detector" technology - Protection against SQL Injections, Cross-site Scripting (XSS), Session Hijacking, URL Tampering, Cookie Poisoning etc. - Support for HTTP 0.9/1.0/1.1 - Back-end servers supported: 5 to 300 servers
Concurrent Connection (Max.) 1000000 Numbers Numbers
HTTP Connections/Sec (Max.) 45000 Numbers Numbers
System Throughput (Maximum) 6500mbps Gbps
Request Latency sub-ms
Network Interface Ports 8
Bypass Ports For Fail Safe Yes
Attack Protection Cookie Poisoning, cookie injection command injection, XSS, SQL injection, layer7 DDOS attacks,
Detect And Prevent Attackers From Finding Hidden Directories Features Available
Processor intel dual-core xenon
Storage NA GB
Authentication And Authorization LDAP/RADIUS
Integrated Scanner Yes
Logging, Reporting And Monitoring Integrated Web-based Reporting tool
Input-Output Port USB, VGA
Power Supply Single
Power Consumption 100-240 Watt Watt
Operating Temperature Range 40c Degree C
Storage Temperature Range -25 to 75c Degree C Degree C
Operating Humidity (RH) 10-90 % %
Compliance Certificates FCC/CE
Availability Of Type Tests Reports From A Central Govt. Lab OR International Laboratory Accreditation Cooperation (ILAC)or Their Worldwide Affiliated/ Recognized Labs OR NABL Approved Lab Showing Conformity To The Specifications. Available
Name Of The Lab Common Criteria - EAL4+
Address Of The Lab NA
Test Report No. And Date NA
Test Report To Be Furnished To The Buyer On Demand Yes
Dimensions (H X W X D) 1.7 x 14.6 x 17.3 cm x cm x cm
Weight 5 Kg Kg
Warranty 1 Year

Price Dekho Price Dekho Price List in india