Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training...

70
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Transcript of Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training...

Page 1: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam Upgrade Training

v9.5.9.xx (Beta)

Page 2: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

1. Free On-Appliance SSL VPN

2. Complete Layer 2 to Layer 8 security

3. Category Based Bandwidth Management (Upcoming)

4. Free RBL Support (Upcoming)

New Features:

Page 3: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Enhancements:

1. Provide Bandwidth to Branch offices over VPN

2. Total Threat Free Tunneling.

3. Clientless Automated SSO (Upcoming)

4. Spam Quarantine Enhancements

Page 4: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

New features

Page 5: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

All free On-Appliance SSL VPN

Page 6: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

On-Appliance SSL VPN

• Now the VPN feature is extended to include SSL VPN functionality within Cyberoam to provide secure access for the remote users.

• Easier to use and control to allow access to the Corporate network from anywhere, anytime.

• Any device that has browser can access SSL VPN 

Page 7: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Client and Location independent access Authentication - AD, LDAP, RADIUS, Cyberoam Multi-layered Client Authentication - Certificate, Username/Password User & Group policy enforcement Network access - Split and Full tunneling End user Web Portal - Clientless access SSL VPN Tunneling Client - Granular access control to all the Enterprise Network resources Administrative controls: Session timeout, Dead Peer Detection, Portal customization• The SSL VPN feature would not be a chargeable module and would be enabled by default in all appliances 25i, 50i, 100i, 200i, 300i, 250i, 500i, 1000i and 1500i.

License Free SSL-VPN:

Page 8: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Key Advantages

1.Its FREE!!! (Promotional Offer)

2.Easy to use. No complicated configurations.

3.Device Independent. Can be used with Smart-phones, Iphones, Netbooks etc.

4.Works in restricted network environments where VPN traffic is blocked.

5.Data transfer is encrypted by SSL. Safe to use on an unsecured network.

6. VPNC certified

Page 9: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Page 10: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

On appliance SSL VPN in detail

Page 11: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Who should access what?

• Cyberoam’s on appliance SSL-VPN gives full flexibility to the administrators to decide what type of access should be given by creating policies.

• SSL VPN policy determines access mode available to the remote users and also controls the access to the private network (corporate network) in the form bookmarks.

Page 12: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Two modes: Full Access and Web Access mode

– Web Access mode ( Web based or clientless )• Does not require any client to be installed• Can be accessed using browser • Limited to use on web resources only

– Full Access mode ( Client mode )• Require client to be installed • Works in two modes

– Split Tunnel» Allows access to only defined network resources in the policy

– Full Tunnel » Routes all traffic to Cyberoam, internet through HO» Allows access to only defined internal network resources» Full access to WAN

Page 13: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Creating SSL VPN Policy

Select the access mode by clicking the appropriate option

Accessible Resources allows restricting the access to the certain

hosts of the private network

Select tunnel type

Accessible Resources allows restricting the access to the certain hosts of the

private network

Bookmarks are the resources that will be available through

Web portal

Page 14: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

•It provides the ability to create point-to-point encrypted tunnels between remote employees and your company’s internal network

•It requires a combination of SSL certificates and a username/password for authentication to enable access to the internal resources.

•To restrict the access to the Corporate network, it operates in two modes: Full Access and Web Access mode.

•User’s access to private network is controlled through his SSL VPN policy while Internet access is controlled through his Internet Access policy.  

Page 15: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

User Authenticates himself Access web-based resources available to him Install SSL VPN Client

End user experience

Page 16: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Open Issues / Limitations till v95933 beta:

1. Sites using redirection will not work properly2. MS-Exchange not working (OWA) 3. Flash will not work4. CARL will not work5. URLs like http://<IP Address>/test/ will not work with Webbased SSL VPN6. Idle time out is not working7. Host Groups will not listed in SSLVPN policy8. Reporting is not provided 9. Password with extended characters like @ will not work10.Same IP in IP Lease Range to and start (10.10.0.1 - 10.10.0.1) will stop

SSL-VPN service. Need to specify correct range.11.Firewall Implementation is not there and planned in Phase-II (Not this Final

Release).

Page 17: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Open Issues / Limitations in 2nd EA (beta) v960xx:

1. MS-Exchange not working (OWA) Works – with limitations.

With IE Browsers: OWA 2003, 2007 (and may be 2000) – works only with Basic mode (Not Premium/Advanced modes).

With non IE Browsers: OWA 2003, 2007 (and may be 2000) – works

2. Flash will not work3. Idle time out is not working4. As of now Reporting is not provided.5. Same IP in IP Lease Range to and start (10.10.0.1 - 10.10.0.1) will stop SSL-

VPN service. Need to specify correct range.6. Firewall Implementation is not there and planned in Phase-II (Not in coming

final release).

Page 18: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Enhanced security with L2 Firewall support

Page 19: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Identity-IP address-MAC address

• Enhanced security with Cyberoam. Cyberoam now extends down to the OSI Layer 2, to achieve a major security enhancement.

• Now MAC address (Machine Address) is also a decision parameter along with identity and ip address for the firewall policies

• All normal firewall policies like IAP, AV, IPS, Bandwidth policy etc can be applied on MAC firewall rule

• Now for any server running on dynamic IP Address, we can create a firewall rule to allow that server through firewall using MAC

Page 20: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Create firewall rule based on MAC address

Page 21: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Create MAC based host for Dynamic web serverNow create MAC based firewall rule

Page 22: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Web Category Bandwidth(Upcoming)

Page 23: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Web Category Bandwidth features

• Bandwidth Restriction can be applied on Web categories

• Configuration provided in Web Category and Firewall

• Bandwidth will be shared among all the users/firewall rules for particular Web category

• Web category bandwidth will take priority with respect to all other bandwidth configuration

• If a users is given 32kbps of bandwidth and Web category he is accessing is given 16kbps of bandwidth user can draw a maximum of 32+16 kbps of bandwidth

Page 24: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Create web category based bandwidth policy

Page 25: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Allot bandwidth while creating web category

Page 26: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

View which Bandwidth policy is applied to which web category

Page 27: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Apply through the firewall rule

Page 28: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Create a BW policy for online games sitesCreate a category for online gamesApply the web based BW categorization to all the LAN users

Page 29: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Free RBL support for Anti Spam(Upcoming)

• Now get free Anti Spam protection with the RBL

• No need to purchase a separate license if you need RBL Anti Spam protection

Page 30: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Enhancements

Page 31: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Branch office Internet Traffic Tunneling over VPN

Page 32: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Branch office Internet Traffic Tunneling over VPN

• Cyberoam now facilitates central Internet access and control for an organization with multiple branch offices

• All the branch office can now use the Internet facility at the head office to browse

• Supported only in Net-Net connections

Page 33: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

All the branches can access internet through HO

Page 34: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Advantages

• Even if the branch offices don’t have internet access they can access internet through Head office.

• Centralized implementation of user policies from HO

• Central reporting in HO.

• Easy to manage the branch offices.

Page 35: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Threat free tunneling

Page 36: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

• Cyberoam VPN zone traffic is now totally secure.

• It extends its firewall rule gamut to L2TP and PPTP VPN traffic, which is scanned for Malware, Spam and inappropriate Web content.

• This ensures that nothing dangerous can sneak through.

• All normal firewall policies like IAP, AV, IPS, Bandwidth policy etc can be applied on L2TP and PPTP traffic

Page 37: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Create L2TP configuration

Page 38: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Create PPTP Configuration

Page 39: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Create hosts for L2TP and PPTP configurations

Page 40: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Firewall rules for L2TP and PPTP tunnel users

Page 41: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Spoof prevention

Page 42: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

• You can configure MAC and/or IP address pair entry in IP-MAC trusted list to improve the security of your network

• Using MAC address filtering makes it more difficult for a hacker to guess and use a random MAC address

• It is also possible to filter packets based on IP-MAC pair

Page 43: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Spoof Prevention

– MAC filtering• Does not allow any IP Address to connect other than trusted MAC

– IP-MAC Pair filtering• Drops traffic where IP-MAC pair does not match• Allows all traffic for which MAC entry does not exists

– Spoof prevention• Drops any traffic that does not match with the subnet of the

incoming NIC

Page 44: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Page 45: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Spoof Prevention Settings

Packets will be dropped if the MAC addresses not configured in the “Trusted

MAC address” list.

Packets will be dropped if IP and MAC do not match with any entry in the IP-

MAC trusted list

Packet will be dropped if matching route entry is not available 

Page 46: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

ARP Management

Page 47: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Cyberoam ARP Management Features

– Facility to mange ARP entries

– Static entries can be added from GUI

– Shows list of ARP entries, both Static and Dynamic

– Do not add static ARP entry for any configured gateway, it will mark the gateway dead

– Cyberoam maintains two types of table for ARP entries: ARP Cache and Static ARP

Page 48: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

How does Static ARP work in Cyberoam?

• Add Static ARP.

• These entries will be stored in static ARP as well as ARP Cache table.

• When the Cyberoam appliance receives the ARP request on a particular port, Cyberoam performs the ARP lookup in the static ARP table.

• If there is any mismatch in IP address or port Cyberoam considers it as an ARP poisoning attempt and does not update its ARP Cache.

• If entry is not available in the table, Cyberoam will lookup in the ARP Cache and adds MAC address to ARP Cache if required.

Page 49: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Add Static ARP

Page 50: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Manage ARP

Select from the drop down list to view ARP entries

It lists IP address, MAC address, port and type of the

entry

Page 51: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Clientless - Automated Single Sign-On

Page 52: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Clientless - Automated Single Sign-OnAdvantages

• No need to convince the administrators to modify the Logon scripts or make client side installations.

• With the new Clientless - Automated Single Sign On there is a single light weight installer that can be installed on any windows computer on the network

• Cyberoam will detect all logons and logoffs.

• Also works with Macintosh Clients authenticating with Microsoft Domain Controller.

Page 53: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Features

• New clientless SSO is agent based solution in that no need to configure any logon script or no need to push SSO client software on any of the client machine.

• This is platform independent that means if client OS is integrated with Active Directory then Cyberoam will automatically login them into Cyberoam once they login into Active Directory, example: Mac-OS, Linux, Windows (All Versions).

• In this new SSO, we just need to install one agent software on AD controller which will automatically send login information to Cyberoam for authentication.

• In case of multiple AD controller of same domain, we just need to install agent on all the AD controller.

Page 54: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Spam Digest

Page 55: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

• Daily Spam Digest: Cyberoam will now mail the summary of Spam mails that have been quarantined by Cyberoam.

• Release the false positives to your mailbox: Now Cyberoam allows you to release the mail from the quarantine area and get it right in your mailbox,

• Promotes end user’s self-sufficiency

• Reduces network administrator’s dependency

Spam digest features

Page 56: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

User’s Antispam Quarantine Area

User logos into his accountGo to the spam quarantine areaAccess as well as release the spam quarantine mails

Page 57: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Separate sub menu to manage digital certificates

Page 58: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Bundle Subscription

Page 59: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Details• Applicable from version – 9.5.8.52

• Cyberoam’s “Bundle Subscription” service provides subscribers a purchase option to choose between single subscription module and a bundle of modules.

• Cyberoam will also continue to offer single subscription modules also.

• Bundle can be the combination of or all of the following modules: • Gateway Anti Virus • Gateway Anti-spam • Intrusion Prevention System • Web and Application Filter • 8 X 5 Support

Page 60: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Benefits

• Subscription bundle will reduce Administrator’s task of subscribing each module individually as all the modules in the bundle will be subscribed in a single step using just one key.

• Along with customers, the feature is also beneficial to the suppliers as one can achieve the desired cost reduction for the bundled pack.

Page 61: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

How to subscribe

• Subscriber will be provided a single key for all the modules included in the bundle.

• For renewal, subscriber can choose to renew the pack or the single module.

Page 62: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

One time subscription

Page 63: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

DHCP Enhancements (Upcoming)

Page 64: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

DHCP Enhancements

• More user friendly interface

• Configuration for Dynamic as well as static lease

• IP Address conflict detection

• Facility to lease primary and secondary DNS

• Option to lease Cyberoam’s DNS configuration

• DHCP can now lease WINS server

• DHCP Relay configuration

Page 65: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Page 66: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Configure for Dynamic Lease

Page 67: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Configure for Static Lease

Page 68: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Manage DHCP Servers

Page 69: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Page 70: Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)

Cyberoam - Unified Threat ManagementUnified Threat ManagementCyberoam

Thank you