Internet Security

Skip to Main Content »

Have a Question? Call Us!
Toll Free: 877.449.5102

Welcome to NTSecurity.com

You're currently on:

Cyberoam Small Business SMB Firewall ( 75-100 Users) Cyberoam CR50 Cyberoam CR50ia Appliance (Hardware only) 1186.55

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.

Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

Security

Network Security
» Firewall
» Intrusion Prevention System
» Wireless security
Content Security
» Anti-Virus/Anti-Spyware
» Anti-Spam
» HTTPS/SSL Content Security
Administrative Security
» Next-Gen UI
» View Logging & Reporting

Connectivity

Business Continuity
» Multiple Link Management
» High Availability
Network Availability
» VPN
» 3G/WiMAX Connectivity
Future-ready Connectivity
» “IPv6 Ready” Gold Logo



Productivity

Employee Productivity
» Content Filtering
» Instant Messaging Archiving & Controls
IT Resource Optimization
» Bandwidth Management
» Traffic Discovery
» Application Layer 7 Management
Administrator Productivity
» Next-Gen UI


Specification

Small & Medium Enterprises: CR50ia CR100ia CR200i CR300i

Interfaces

10/100 Ethernet Ports - - - -
10/100/1000 GBE Ports 6 6 6 6
Configurable Internal/DMZ/WANPorts Yes Yes Yes Yes
Console Ports (RJ45/DB9) 1 1 1 1
SFP (Mini GBIC) Ports - - - -
USB Ports 2 2 2 2
Hardware Bypass Segments 1* 1* 1* 1*

System Performance*

Firewall Throughput (UDP) (Mbps) 1,000 1,250 2,200 2,600
Firewall Throughput (TCP) (Mbps) 750 1,000 1,500 1,800
New sessions/second 8,000 10,000 12,000 15,000
Concurrent sessions 220,000 400,000 450,000 500,000
3DES/AES throughput (Mbps) 60/90 80/100 150/180 180/200
Antivirus throughput (Mbps) 150 200 280 450
IPS throughput (Mbps) 200 300 750 850
UTM throughput (Mbps) 130 160 250 350
Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited

Dimensions

HxWxD(inches) 1.7 x 16.8 x 10.3 1.7 x 16.8 x 10.3 1.7 x 16.8 x 10.3 1.7 x 16.8 x 10.3
HxWxD(cms) 4.3 x 42.7 x 26.2 4.3 x 42.7 x 26.2 4.3 x 43.9 x 37.1 4.3 x 43.9 x 37.1
Weight 5.3 kg, 11.68 lbs 6.5 kg, 14.33 lbs 6.5 kg, 14.33 lbs 6.5 kg, 14.33 lbs

Power

Input Voltage 100-240VAC 100-240VAC 90-264VAC 90-264VAC
Consumption 90W 90W 62.7W 72.1W
Total Heat Dissipation (BTU) 200 200 324 324
Redundant Power Supply - - - -
Environmental
Operating Temperature 5 to 40 °C 5 to 40 °C 5 to 40 °C 5 to 40 °C
Storage Temperature 0 to 70 °C 0 to 70 °C 0 to 70 °C 0 to 70 °C
Relative Humidity (Non condensing) 10 to 90% 10 to 90% 10 to 90% 10 to 90%
http://www.ntsecurity.com/cyberoam-cr50ia-appliance-hardware-only.html in_stock Yes Products Catalog USD
Cyberoam CR50ia Appliance (Hardware only)

01-CRI-050IA-01 Cyberoam CR50ia Appliance (Hardware only)


Finding Lowest
Internet Price...

FREE Training & Admin Tools

Free access to our training videos & admin tools with any SonicWALL firewall purchase from Firewalls.com.


Purchase Orders & Company Checks Accepted.

Cyberoam CR50ia Appliance (Hardware only)

Double click on above image to view full picture

Zoom Out
Zoom In

More Views

Related Upgrades and Subscriptions

Details

Cyberoam Unified Threat Management appliances offer assured security, connectivity and productivity to Small Office-Home Office (SOHO) and Remote Office-Branch Office (ROBO) users by allowing user identity-based policy controls.

Cyberoam’s User Layer 8 Technology treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack. It attaches user identity to security, taking organizations a step ahead of conventional solutions that bind security to IP-addresses. This adds speed to an organization’s security by offering instant visibility into the source of attacks by username rather than IP address – allowing immediate remediation to restore security or allowing proactive security. Layer 8 technology functions along with each of Cyberoam security features to allow creation of identity-based security policies.

Cyberoam’s future-ready Extensible Security Architecture (ESA) offers an extensible platform that can grow with the future security needs of an organization without degrading system performance. ESA supports feature enhancements that can be developed rapidly and deployed with minimum efforts.

Security

Network Security
» Firewall
» Intrusion Prevention System
» Wireless security
Content Security
» Anti-Virus/Anti-Spyware
» Anti-Spam
» HTTPS/SSL Content Security
Administrative Security
» Next-Gen UI
» View Logging & Reporting

Connectivity

Business Continuity
» Multiple Link Management
» High Availability
Network Availability
» VPN
» 3G/WiMAX Connectivity
Future-ready Connectivity
» “IPv6 Ready” Gold Logo



Productivity

Employee Productivity
» Content Filtering
» Instant Messaging Archiving & Controls
IT Resource Optimization
» Bandwidth Management
» Traffic Discovery
» Application Layer 7 Management
Administrator Productivity
» Next-Gen UI


Specification

Small & Medium Enterprises: CR50ia CR100ia CR200i CR300i

Interfaces

10/100 Ethernet Ports - - - -
10/100/1000 GBE Ports 6 6 6 6
Configurable Internal/DMZ/WANPorts Yes Yes Yes Yes
Console Ports (RJ45/DB9) 1 1 1 1
SFP (Mini GBIC) Ports - - - -
USB Ports 2 2 2 2
Hardware Bypass Segments 1* 1* 1* 1*

System Performance*

Firewall Throughput (UDP) (Mbps) 1,000 1,250 2,200 2,600
Firewall Throughput (TCP) (Mbps) 750 1,000 1,500 1,800
New sessions/second 8,000 10,000 12,000 15,000
Concurrent sessions 220,000 400,000 450,000 500,000
3DES/AES throughput (Mbps) 60/90 80/100 150/180 180/200
Antivirus throughput (Mbps) 150 200 280 450
IPS throughput (Mbps) 200 300 750 850
UTM throughput (Mbps) 130 160 250 350
Authenticated Users/Nodes Unlimited Unlimited Unlimited Unlimited

Dimensions

HxWxD(inches) 1.7 x 16.8 x 10.3 1.7 x 16.8 x 10.3 1.7 x 16.8 x 10.3 1.7 x 16.8 x 10.3
HxWxD(cms) 4.3 x 42.7 x 26.2 4.3 x 42.7 x 26.2 4.3 x 43.9 x 37.1 4.3 x 43.9 x 37.1
Weight 5.3 kg, 11.68 lbs 6.5 kg, 14.33 lbs 6.5 kg, 14.33 lbs 6.5 kg, 14.33 lbs

Power

Input Voltage 100-240VAC 100-240VAC 90-264VAC 90-264VAC
Consumption 90W 90W 62.7W 72.1W
Total Heat Dissipation (BTU) 200 200 324 324
Redundant Power Supply - - - -
Environmental
Operating Temperature 5 to 40 °C 5 to 40 °C 5 to 40 °C 5 to 40 °C
Storage Temperature 0 to 70 °C 0 to 70 °C 0 to 70 °C 0 to 70 °C
Relative Humidity (Non condensing) 10 to 90% 10 to 90% 10 to 90% 10 to 90%

Additional Information

Manufacturer Cyberoam
Designed For Home Office, Small Office
Device Type Security Appliance
Bundled with No
Form Factor External
Ports Qty No
Condition New
Renewal No
Height (Rack Units) 1U
Width 16.8 in
Depth 10.3 in
Height 1.7 in
Weight 11.68 lbs
RAM Installed (Max) No
Flash Memory Installed (Max) No
Connectivity Technology Wired
Data Transfer Rate No
Data Link Protocol Ethernet, Fast Ethernet
Network / Transport Protocol L2TP, IPSec
Routing Protocol No
Remote Management Protocol No
Performance Firewall throughput (UDP) : 1000 Mbps
Firewall Throughput (TCP) : 750 Mbps
IPS throughput: 200 Mbps
3DES and AES performance : 60 and 90 Mbps
UTM throughput : 130 Mbps
Capacity Concurrent connections :220,000
Authenticated Users/Nodes: Unlimited
New sessions/second: 8,000
Features Network Security, Content Security, Administrative Security, Business Continuity, Network Availability, Future-ready Connectivity, Employee Productivity, IT Resource Optimization, Administrator Productivity
Encryption Algorithm No
Authentication Method No
Compliant Standards No
VoIP Protocols No
Expansion Slots Total (Free) No
Interfaces 6 x 10/100/1000 GBE Ports
Included Accessories No
Pricing Type No
Power Device Power adapter - external
Installed Qty (Power) 1
Voltage Required 100-240VAC
Power Consumption Operational 90W
Power Provided No
OS Provided No
Software Included No
OS Required No
Min Operating Temperature 5°C
Max Operating Temperature 40°C
Humidity Range Operating 10 - 90%
Part Number No
UPC No
Protection Level UTM Optional
Firewall Type Wired Firewall
Network Interface Speed 10/100/1000 Mbps
VPN Tunnels No
VPN Clients Included No
Product Articles RSS No
Price $1,249.00

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Additional Product Images: