Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.
SecurityNetwork Security » Firewall Content Security » Intrusion Prevention System » Wireless security » Anti-Virus/Anti-Spyware Administrative Security » Anti-Spam » HTTPS/SSL Content Security » Next-Gen UI » View Logging & Reporting | ConnectivityBusiness Continuity » Multiple Link Management Network Availability » High Availability » VPN Future-ready Connectivity » 3G/WiMAX Connectivity » “IPv6 Ready” Gold Logo | ProductivityEmployee Productivity » Content Filtering IT Resource Optimization » Instant Messaging Archiving & Controls » Bandwidth Management Administrator Productivity » Traffic Discovery » Application Layer 7 Management » Next-Gen UI |
| Small & Medium Enterprises: | CR50ia | CR100ia | CR200i | CR300i |
|---|---|---|---|---|
Interfaces | ||||
| 10/100 Ethernet Ports | - | - | - | - |
| 10/100/1000 GBE Ports | 6 | 6 | 6 | 6 |
| Configurable Internal/DMZ/WANPorts | Yes | Yes | Yes | Yes |
| Console Ports (RJ45/DB9) | 1 | 1 | 1 | 1 |
| SFP (Mini GBIC) Ports | - | - | - | - |
| USB Ports | 2 | 2 | 2 | 2 |
| Hardware Bypass Segments | 1* | 1* | 1* | 1* |
System Performance* | ||||
| Firewall Throughput (UDP) (Mbps) | 1,000 | 1,250 | 2,200 | 2,600 |
| Firewall Throughput (TCP) (Mbps) | 750 | 1,000 | 1,500 | 1,800 |
| New sessions/second | 8,000 | 10,000 | 12,000 | 15,000 |
| Concurrent sessions | 220,000 | 400,000 | 450,000 | 500,000 |
| 3DES/AES throughput (Mbps) | 60/90 | 80/100 | 150/180 | 180/200 |
| Antivirus throughput (Mbps) | 150 | 200 | 280 | 450 |
| IPS throughput (Mbps) | 200 | 300 | 750 | 850 |
| UTM throughput (Mbps) | 130 | 160 | 250 | 350 |
| Authenticated Users/Nodes | Unlimited | Unlimited | Unlimited | Unlimited |
Dimensions | ||||
| HxWxD(inches) | 1.7 x 16.8 x 10.3 | 1.7 x 16.8 x 10.3 | 1.7 x 16.8 x 10.3 | 1.7 x 16.8 x 10.3 |
| HxWxD(cms) | 4.3 x 42.7 x 26.2 | 4.3 x 42.7 x 26.2 | 4.3 x 43.9 x 37.1 | 4.3 x 43.9 x 37.1 |
| Weight | 5.3 kg, 11.68 lbs | 6.5 kg, 14.33 lbs | 6.5 kg, 14.33 lbs | 6.5 kg, 14.33 lbs |
Power | ||||
| Input Voltage | 100-240VAC | 100-240VAC | 90-264VAC | 90-264VAC |
| Consumption | 90W | 90W | 62.7W | 72.1W |
| Total Heat Dissipation (BTU) | 200 | 200 | 324 | 324 |
| Redundant Power Supply | - | - | - | - |
| Environmental | ||||
| Operating Temperature | 5 to 40 °C | 5 to 40 °C | 5 to 40 °C | 5 to 40 °C |
| Storage Temperature | 0 to 70 °C | 0 to 70 °C | 0 to 70 °C | 0 to 70 °C |
| Relative Humidity (Non condensing) | 10 to 90% | 10 to 90% | 10 to 90% | 10 to 90% |
Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.
Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.
Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

SecurityNetwork Security » Firewall Content Security » Intrusion Prevention System » Wireless security » Anti-Virus/Anti-Spyware Administrative Security » Anti-Spam » HTTPS/SSL Content Security » Next-Gen UI » View Logging & Reporting | ConnectivityBusiness Continuity » Multiple Link Management Network Availability » High Availability » VPN Future-ready Connectivity » 3G/WiMAX Connectivity » “IPv6 Ready” Gold Logo | ProductivityEmployee Productivity » Content Filtering IT Resource Optimization » Instant Messaging Archiving & Controls » Bandwidth Management Administrator Productivity » Traffic Discovery » Application Layer 7 Management » Next-Gen UI |
| Small & Medium Enterprises: | CR50ia | CR100ia | CR200i | CR300i |
|---|---|---|---|---|
Interfaces | ||||
| 10/100 Ethernet Ports | - | - | - | - |
| 10/100/1000 GBE Ports | 6 | 6 | 6 | 6 |
| Configurable Internal/DMZ/WANPorts | Yes | Yes | Yes | Yes |
| Console Ports (RJ45/DB9) | 1 | 1 | 1 | 1 |
| SFP (Mini GBIC) Ports | - | - | - | - |
| USB Ports | 2 | 2 | 2 | 2 |
| Hardware Bypass Segments | 1* | 1* | 1* | 1* |
System Performance* | ||||
| Firewall Throughput (UDP) (Mbps) | 1,000 | 1,250 | 2,200 | 2,600 |
| Firewall Throughput (TCP) (Mbps) | 750 | 1,000 | 1,500 | 1,800 |
| New sessions/second | 8,000 | 10,000 | 12,000 | 15,000 |
| Concurrent sessions | 220,000 | 400,000 | 450,000 | 500,000 |
| 3DES/AES throughput (Mbps) | 60/90 | 80/100 | 150/180 | 180/200 |
| Antivirus throughput (Mbps) | 150 | 200 | 280 | 450 |
| IPS throughput (Mbps) | 200 | 300 | 750 | 850 |
| UTM throughput (Mbps) | 130 | 160 | 250 | 350 |
| Authenticated Users/Nodes | Unlimited | Unlimited | Unlimited | Unlimited |
Dimensions | ||||
| HxWxD(inches) | 1.7 x 16.8 x 10.3 | 1.7 x 16.8 x 10.3 | 1.7 x 16.8 x 10.3 | 1.7 x 16.8 x 10.3 |
| HxWxD(cms) | 4.3 x 42.7 x 26.2 | 4.3 x 42.7 x 26.2 | 4.3 x 43.9 x 37.1 | 4.3 x 43.9 x 37.1 |
| Weight | 5.3 kg, 11.68 lbs | 6.5 kg, 14.33 lbs | 6.5 kg, 14.33 lbs | 6.5 kg, 14.33 lbs |
Power | ||||
| Input Voltage | 100-240VAC | 100-240VAC | 90-264VAC | 90-264VAC |
| Consumption | 90W | 90W | 62.7W | 72.1W |
| Total Heat Dissipation (BTU) | 200 | 200 | 324 | 324 |
| Redundant Power Supply | - | - | - | - |
| Environmental | ||||
| Operating Temperature | 5 to 40 °C | 5 to 40 °C | 5 to 40 °C | 5 to 40 °C |
| Storage Temperature | 0 to 70 °C | 0 to 70 °C | 0 to 70 °C | 0 to 70 °C |
| Relative Humidity (Non condensing) | 10 to 90% | 10 to 90% | 10 to 90% | 10 to 90% |
| Manufacturer | Cyberoam |
|---|---|
| Designed For | Small Office, Mid-Enterprise Networks |
| Device Type | Security Appliance |
| Bundled with | No |
| Form Factor | External |
| Ports Qty | No |
| Condition | New |
| Renewal | No |
| Height (Rack Units) | 1U |
| Width | 16.8 in |
| Depth | 10.3 in |
| Height | 1.7 in |
| Weight | 11.68 lbs |
| RAM Installed (Max) | No |
| Flash Memory Installed (Max) | No |
| Connectivity Technology | Wired |
| Data Transfer Rate | No |
| Data Link Protocol | Ethernet, Fast Ethernet |
| Network / Transport Protocol | L2TP, IPSec |
| Routing Protocol | No |
| Remote Management Protocol | No |
| Performance | Firewall throughput (UDP) : 1250 Mbps Firewall Throughput (TCP) : 1000 Mbps IPS throughput: 300 Mbps 3DES and AES performance : 80 and 100 Mbps UTM throughput : 160 Mbps |
| Capacity | Concurrent connections :400,000 Authenticated Users/Nodes: Unlimited New sessions/second: 10,000 |
| Features | Network Security, Content Security, Administrative Security, Business Continuity, Network Availability, Future-ready Connectivity, Employee Productivity, IT Resource Optimization, Administrator Productivity |
| Encryption Algorithm | No |
| Authentication Method | No |
| Compliant Standards | No |
| VoIP Protocols | No |
| Expansion Slots Total (Free) | No |
| Interfaces | 6 x 10/100/1000 GBE Ports |
| Included Accessories | No |
| Pricing Type | No |
| Power Device | Power adapter - external |
| Installed Qty (Power) | 1 |
| Voltage Required | 100-240VAC |
| Power Consumption Operational | 90W |
| Power Provided | No |
| OS Provided | No |
| Software Included | No |
| OS Required | No |
| Min Operating Temperature | 5°C |
| Max Operating Temperature | 40°C |
| Humidity Range Operating | 10 - 90% |
| Part Number | No |
| UPC | No |
| Protection Level | UTM Optional |
| Firewall Type | Wired Firewall |
| Network Interface Speed | 10/100/1000 Mbps |
| VPN Tunnels | No |
| VPN Clients Included | No |
| Product Articles RSS | No |
| Price | $2,495.00 |