The mobilization of workforce has led to demand for anytime-anywhere access to network resources. This,along with increasing number of users like customers and partners connecting to an enterprise networkfrom outside, and trends like rise in number of network users and devices, application explosion,virtualization, and more are leading to loss of security controls for enterprises over their networks.Cyberoam Next-Generation Firewalls NGFW with Layer 8 Identity-based technology offeractionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security. Cyberoams Human Layer 8 acts like a standard abstractlayer that binds with real Layers 2-7, enabling organizations to regain lost security controls..
Other Specifications Download Specification | |
---|---|
Deployment Modes | Product can be deployed in any of Bridge mode, transparent proxy mode, router mode, reverse proxy and passive promiscuous mode |
Web Application Security | Positive Protection model, Unique Ïntuitive Website flow detector, technology, Protection against SQL Injections, Cross site scripting (xss), Session Hijacking, URL tempering, Cookies poisoning etc. |
Concurrent Connection (Max.) | 240000 Numbers |
HTTP Connections/Sec (Max.) | 2 Numbers |
System Throughput (Maximum) | 120000 Gbps |
Request Latency | sub-ms |
Network Interface Ports | 42x GEBase-t |
Bypass Ports For Fail Safe | Yes |
Attack Protection | Positive Protection model, Unique Ïntuitive Website flow detector, technology, Protection against SQL Injections, Cross site scripting (xss), Session Hijacking, URL tempering, Cookies poisoning etc. |
Detect And Prevent Attackers From Finding Hidden Directories Features | Available |
Processor | Intel quad core xeon processor |
Storage | 250 GB |
Authentication And Authorization | Internal Data base, AD Integration and OU based Security Policies, Automatic Windows/Radious Single sign on, External LDAP/LDAPS RADIOUS Database integration, thin client support, sms authentication,Layer 8 Identity over IPV6, SECURE AUTHENTICATION, Client less users, Authentication using Captive Portal |
Integrated Scanner | Yes |
Logging, Reporting And Monitoring | Real time and historical monitoring, Log viewer-IPS Web filter, WAF, Anti virus, Anti spam, Authentication, system and admin events, Forensic Analysiswith quick identification of network, attacks and other traffic anamalies, syslog support, 4 eye authentication, Integrated web based REPORTING TOOL |
Input-Output Port | 2 usb |
Power Supply | Single |
Power Consumption | 258 Watt |
Operating Temperature Range | 0- 40 Degree C |
Storage Temperature Range | -25 - 75 Degree C |
Operating Humidity (RH) | 10-90 % |
Compliance Certificates | CE,FCC |
Availability Of Type Tests Reports From A Central Govt. Lab OR International Laboratory Accreditation Cooperation (ILAC)or Their Worldwide Affiliated/ Recognized Labs OR NABL Approved Lab Showing Conformity To The Specifications. | Available |
Name Of The Lab | ICSA |
Address Of The Lab | CALIFORNIA USA |
Test Report No. And Date | NIL |
Test Report To Be Furnished To The Buyer On Demand | Yes |
Dimensions (H X W X D) | 3.54X17.52X23.23 cm x cm x cm |
Weight | 19 Kg |
Warranty | 3 Year |