SlideShare a Scribd company logo
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Please Introduce Yourself…
           •    Your name
           •    Your company, position, and responsibilities
           •    Your network experience
           •    Specific UTM appliance or Cyberoam product experience
           •    Your expectations from this workshop




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Training Kit

           Verify your take away:

           • CCNSP Guide
           • Cyberoam Brochure
           • Quick Start Guide
           • Writing Aids




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Schedule / Breaks

            •     Sessions starts at 09:00 hours
            •     Breaks
                  - Refreshments (around 10:30 hours)
                  - Lunch (around 12 – 13 hours)
                  - Refreshments (around 15:30 hours)
            •     Sessions ends at 17 hours




                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Training Pre-requisites

           The training programme assumes participants to
           have operational familiarity with following concepts:

           •   Operational OS understanding
           •   Networking Basics
           •   Protocols like HTTP, IMAP, POP3, SMTP
           •   TCP/IP Protocol Suite
           •   Network Security Fundamentals




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management




           Cyberoam Identity Based UTM




           Agenda:
               • Challenges with Current UTM Products
               • Cyberoam’s Security Approach
               • Layer 8 Firewall
               • Identity Based Technology

               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management



Challenges with Current UTM Products
    Lack of user Identity recognition and control
     Inadequate in handling threats that target the user – Phishing, Pharming

    Unable to Identify source of Internal Threats
     Employee with malicious intent posed a serious internal threat
     Indiscriminate surfing exposes network to external threats
     50 % of security problems originate from internal threats – Yankee Group
     Source of potentially dangerous internal threats remain anonymous

    Unable to Handle Dynamic Environments
     Wi-Fi
     DHCP

    Unable to Handle Blended Threats
     Threats arising out of internet activity done by internal members of organization
     External threats that use multiple methods to attack - Slammer

    Lack of In-depth Features
     Sacrificed flexibility as UTM tried to fit in many features in single appliance.
     Inadequate Logging, reporting, lack of granular features in individual solutions
Need for Identity based UTM…

                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                         Cyberoam: Identity-based Security

            Overview of Cyberoam’s Security Approach:

            Who do you give access to: An IP Address or a User?
            Whom do you wish to assign security policies:
           Username or IP Addresses?
            In case of an insider attempted breach, whom do you wish to
           see: User Name or IP Address?
            How do you create network address based policies in a DHCP
           and a Wi-Fi network?
            How do you create network address based policies for shared
           desktops?




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




           Cyberoam – Identity Based Security


           Cyberoam is the only Identity-based Unified Threat
           Management appliance that provides integrated Internet
           security to enterprises and educational institutions through
           its unique granular user-based controls.




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam      Cyberoam- Certified Network & Security Professional (CCNSP)
               Cyberoam Unified Threat Management




PATENT PENDING: IDENTITY-BASED TECHNOLOGY




                       User




                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Layer 8 Firewall (Patented Technology)




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




About Cyberoam


Cyberoam is the identity-based UTM solution that offers Integrated Internet
Security with fine granularity through its unique identity-based policies.

It offers comprehensive threat protection with:

     • Identity-based Firewall
     • VPN- Threat free tunneling
     • SSL VPN
     •   Gateway Anti-Virus
     •   Gateway Anti-Spam
     •   Intrusion Prevention System (IPS)
     •   Web & Application Content Filtering
     •   Bandwidth Management (QoS)
     •   Multi-Link Manager (Load balancing)
     • On-Appliance Reporting
     • 1000+ drilldown reports



                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management



Cyberoam Appliances
(Các số tương ứng với số người dùng internet)
    SOHO (Small Office-Home Office)
    & ROBO (Remote Office-Branch Office)
    CR 15i – CR 15iw
    CR 25ia – CR35ia

    Small to Medium Business
    CR 50ia – CR100ia


    Medium Enterprises
    CR 200i
    CR 300i

    CR 500ia
    CR 750i


    Large Enterprises
    CR 1000i
    CR 1500i

                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                       Cyberoam- Certified Network & Security Professional (CCNSP)
                                Cyberoam Unified Threat Management




 Basic Appliance – One time sale
 •   Identity-based Firewall
 •   8 x 5 Support for the first year.
 •   VPN- Threat Free Tunneling
 •   SSL VPN (Promotional offer)
 •   Bandwidth Management
 •   Multiple Link Management
Bundle Subscription Subscriptions
Individual Module Wise
 •Gateway be the combination of (Anti-malware, phishing, spyware protection included)
Bundle canAnti-Virus Subscription or all of the following modules:
 ••Gateway Anti-spam Subscription
    Gateway Anti Virus
 •Web & Application Filtering Subscription
  • Gateway Anti-spam
 •Intrusion Prevention System (IPS)
 ••24 x 7 Premium Support
    Intrusion Prevention System
 ••IPSec and Application Filter
    Web VPN Clients (Per Device-Life Time)
  • 8 X 5 Support
 (Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis)

                                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                                Cyberoam Unified Threat Management




    Bundle Subscription (TVS & SVS)



Bundle Subscriptions are available as:
• Total Value Subscription (TVS) includes:
    • Anti Virus
    • Anti Spam
    • Web & Application filter
    • IPS
    • 8*5 Support (if bought for more than 1 year as first year support is included for free)

•   Security Value Subscription (SVS) includes:
     • Anti Virus
     • Web & Application filter
     • IPS
     • 8*5 Support (if bought for more than 1 year as first year support is included for free)




                                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Bundle Subscription (One time subscription)




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




Demo vs Sale Appliance

Sale Appliance:

   The Cyberoam appliance sold to Partner / Reseller for direct customer sale. .Sale
   appliance can be registered once and can get 3, 15 days trials for all subscription
   based modules.

Demo Appliance:

  The Cyberoam appliance sold to Partner / Reseller for conducting end customer demo.
   Demo appliance can be registered unlimited number of times under different
   credentials after factory reset and can get 3, 15 days trial for all subscription based
   modules after each registration.




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




  Cyberoam Products




Agenda:
    • Cyberoam UTM Appliances
    • Appliance Family
    • Cyberoam SSL VPN
    • Cyberoam End Point Data ProtectionProtection
    • Cyberoam iView
    • Cyberoam Central Console (CCC)
    • Cyberoam VPN Client
                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




           Cyberoam – Identity Based Security


           Cyberoam is the only Identity-based Unified Threat Management appliance
           that provides integrated Internet security to enterprises and educational
           institutions through its unique granular user-based controls.




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                                           Cyberoam SSL VPN




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Benefits


 • Secure SSL VPN – Access from anywhere.
 • Trusted Remote Access – extend access to partners, telecommuters,
   wireless users.
 • Easy to use – Fast installation, less ongoing management, less downtime.
 • Continuous Access – provides reliable, available and scalable access.
 • Endpoint Security.
 • Hardened Secure OS.




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam         Cyberoam- Certified Network & Security Professional (CCNSP)
                  Cyberoam Unified Threat Management




Cyberoam SSL-VPN features




                    © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Models & Licenses

 • Base License

   – Default 5 User License valid for 30 days.
   – No EPS.

 • Software Based

 • Appliance Based

   – CR-SSL-0800 (Supports upto 50 Concurrent Users).
   – CR-SSL-1200 (Supports upto 250 Concurrent Users).
   – CR-SSL-2400 (Supports upto 1000 Concurrent Users).




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                     Cyberoam – End Point Data Protection
                     Protect your Data. Protect your Assets.

                           Cyberoam End Point Data Protection
                                            Protect Your Data, Protect Your Assets




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management




           Cyberoam End Point Data Protection

            Licenses (Per-user one time licenses)

                                           1.      Data Protection & Encryption
                                           2.      Device Management
                                           3.      Application Control
                                           4.      Asset Management

                                           Note: All the modules include 1 year
                                              maintenance support. A single key would be
                                              issued for the modules purchased. Need to
                                              buy the same number of licenses for all the
                                              modules. i.e. Not possible to buy 10 licenses
                                              for Device management & 50 for Asset
                                              management.

                                           Renewal (year on year)

                                           Maintenance support to be renewed for all the
                                                modules purchased each year.
                                           It includes version upgrades & technical support.
               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                                   Cyberoam iView
                     The Intelligent Logging & Reporting Solution
                           Its an Open Source, its free!




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




What is Cyberoam iView?

   Open Source Logging and Reporting solution
   Ability to log and report activities from -
     • UTM / Firewalls
     • HTTP Proxy
     • More to follow
   Unique ability – Shows “Who is doing What”
   Free to Download




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




 Cyberoam iView’s Logging & Reporting




Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics
                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




Cyberoam iView appliances

• CR-iVU 25
• CR-iVU 100
• CR-iVU 200


Products supported

• Network Devices: Linux IPtables / Netfilter Firewall,Cyberoam, Fortigate,
Sonicwall.

• HTTP Proxy: Squid

• Syslog Compatible Devices: Any product with Syslog support




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




 Central Console (CCC)




      Cyberoam Central Console (CCC Series)




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




CCC Deployment (Enterprise)



       Branch Offices                                                  Corporate Head Office

          Branch1


                                                                       Cyberoam UTM
         Branch2                                                         Appliance



         Branch3



        Branch…N




                                                                                               CCC



                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




CCC appliance family


Small-to-Medium Deployments

  •   CCC 15 (Capacity to manage 15 Cyberoam Appliances)
  •   CCC 50 (Capacity to manage 50 Cyberoam Appliances)



Medium-to-Large Deployments

  •   CCC 100 (Capacity to manage 100 Cyberoam Appliances)
  •   CCC 200 (Capacity to manage 200 Cyberoam Appliances)




 CCC Online Demo is available at: http://demo.cyberoam.com

                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management




           Cyberoam Deployment




           Agenda:
                          • Package Contents
                       • Factory Default Settings
                       • Deployment Modes

               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




    Cyberoam Package
                                                                             Cyberoam Appliance




        Blue Straight-through
                                                                                     Power Cable
        Ethernet Cable



        Red Crossover Ethernet
                                                                                     Quick Start Guide
        Cable



        Serial Cable                                                                 Documentation CD




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Cyberoam Factory Defaults



                                                       Web Based Administration Console:
                                                       Username: cyberoam
   Port     IP Address     Zone Type                   Password: cyber

           172.16.16.16/
    A                            LAN
           255.255.255.0                               Text Based Administration console
           192.168.2.1/                                (Telnet or Serial Connection):
    B                          WAN
           255.255.240.0                               Password: admin

                                                       SSH:
                                                       Username: admin
                                                       Password: admin




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Deployment Modes
           Cyberoam can be deployed in two modes:




                                 Bridge / Transparent Mode


                                 Gateway / Route / NAT Mode




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management




           Gateway/Route/NAT mode
            • You want to replace your existing firewall or router acting as
            a gateway for your network with Cyberoam

            • You want your gateway to act as a VPN server

            • You want redundancy in your network with by utilizing the
            multilink and HA (High-Availability) features of Cyberoam

            • You want to configure separate DMZ zone to protect servers
            from LAN & WAN zone.




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                        Cyberoam- Certified Network & Security Professional (CCNSP)
                                      Cyberoam Unified Threat Management




 Before Cyberoam Scenario - Gateway                                                                           Port A   IP Address         ___ ___ ___ ___
                                                                                                                       Subnet Mask        ___ ___ ___ ___
                                                                                                                       Zone Type          LAN/WAN/DMZ

                                                      DMZ Zone                                                Port B   IP Address         ___ ___ ___ ___
                                                                                                                       Subnet Mask        ___ ___ ___ ___
                                                                                                                       Zone Type          LAN/WAN/DMZ
                                                                                                              Port C   IP Address         ___ ___ ___ ___
                                                                                                                       Subnet Mask        ___ ___ ___ ___
                                                                                                                       Zone Type          LAN/WAN/DMZ
              Router                                                             Web Server
       IP:61.0.5.1/29                                                           IP:172.16.1.2                 Port D   IP Address         ___ ___ ___ ___
                                                                             Gateway: 172.16.1.1                       Subnet Mask        ___ ___ ___ ___
                                                                                                                       Zone Type          LAN/WAN/DMZ
            Firewall
INT IP:192.168.0.1/24                                                                                   IP address of the
             DMZ IP:                                       Switch                                       Default Gateway:                  ___ ___ ___ ___
        172.16.1.1/24                                                                                   DNS IP Address:                   ___.___.___.___
  EXT IP: 61.0.5.2/29                                                                                   System Time Zone:                 ______________
                                                                                                        System Date and Time:             ______________
 Gateway IP: 61.0.5.1                                                                                   Email ID of the administrator :   ______________
                                                                                 Mail Server
    Network:192.168.0.x/24       Switch                                         IP:172.16.1.3
                                                                             Gateway: 172.16.1.1




                                                                               Database Server
                         Users                                                   IP:172.16.1.4
                                                                              Gateway: 172.16.1.1
              Default Gateway: 192.168.0.1
                                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                            Cyberoam- Certified Network & Security Professional (CCNSP)
                                      Cyberoam Unified Threat Management




Cyberoam in Gateway Mode



              Router
         IP:61.0.5.1/29

  INT IP:192.168.0.1/24
  DMZ IP: 172.16.1.1/24
    EXT IP: 61.0.5.2/29
   Gateway IP: 61.0.5.1



                                                                            DMZ Zone
              Console                                                                                       Switch


               Switch

    Network:192.168.0.x/24

                                                                  Web Server          Mail Server      Database Server
                                                                 IP:172.16.1.2       IP:172.16.1.3       IP:172.16.1.4
                                                              Gateway: 172.16.1.1 Gateway: 172.16.1.1 Gateway: 172.16.1.1
                             Users

              Default Gateway: 192.168.0.1
                                        © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Gateway Mode- Zone information
                      Cyberoam in Gateway mode have Four default zone
                      LAN Zone: Network connected to LAN interface of Cyberoam
                      WAN Zone: Network connected to WAN interface of Cyberoam
                      DMZ Zone: Network connected to DMZ interface of Cyberoam
                      Local Zone: IP Addresses assigned on Cyberoam interfaces falls
                      under Local Zone


           WAN Zone                          Local Zone



                                            DMZ Zone
    LAN Zone




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Bridge/Transparent Mode


    When to choose bridge mode?

       •   You already have a firewall or a router acting a gateway for your network and
           you don’t want to change the existing setup

       •   Want to use Cyberoam for reporting.

       •   Want Cyberoam as a drop-in solution for Viruses, Spam, Content-Filtering and
           IDP and Bandwidth Management.

       •   Want to try-out Cyberoam without changing your existing setup.




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




Before Cyberoam Scenario - Bridge
                                                                                             Bridge IP Address   ___.___.___.___
                                                                                             Subnet Mask         ___.___.___.___


                                                                         IP address of the Default Gateway       ___.___.___.___
                                                                         DNS IP Address                          ___.___.___.___
                                                                         System Time Zone                        ______________
                                                                         System Date and Time                    ______________
                                                                         Email ID of the administrator           ______________

                     Router




                     Firewall
                     INT IP: 192.168.0.1/24


                     Switch
                     Network:192.168.0.x/24




           Users

  Default Gateway:
  192.168.0.1
                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




Cyberoam in Bridge Mode
                                                                                            Bridge IP Address   ___.___.___.___
                                                                                                                192.168. 0 . 5
                                                                                            Subnet Mask         ___.___.___.___
                                                                                                                255.255.255. 0


                                                                        IP address of the Default Gateway       ___.___.___.___
                                                                                                                192.168. 0 . 1
                                                                        DNS IP Address                           202. 54 . 1 . 30
                                                                        System Time Zone                        ______________
                         Router                                         System Date and Time                    ______________
                                                                        Email ID of the administrator           ______________

                         Firewall
                         INT IP: 192.168.0.1/24




                              Network:192.168.0.x/24




                                  Users

      Default Gateway:
      192.168.0.1
                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




Bridge Mode- Zone information

                                                      Cyberoam in transparent mode have
                                                      three default zone

                                                      LAN Zone: Network connected
                                                      to LAN interface of Cyberoam
  WAN Zone
                                                      WAN Zone: Network connected
                                                      to WAN interface of Cyberoam
                       LOCAL Zone
   LAN Zone                                           Local Zone: IP Address assigned
                                                      on the Bridge Interface falls under
                                                      Local Zone


              v




                        © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                              Cyberoam Unified Threat Management




Hardware Bypass in Transparent Mode


  •   When the appliance is deployed in Transparent mode and if there is a power failure,
      hardware problem or a software malfunction the appliance goes into ‘Bypass’ mode.

  •   In Bypass mode the bypass interfaces of the appliance get bridged and start acting
      like a hub.

  •   The traffic flow is not interrupted thus resulting in high network uptime.

  •   Hardware Bypass functionality is only available in Transparent Mode not in Gateway
      Mode.




                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                              Cyberoam Unified Threat Management




Hardware Bypass in Transparent Mode




                                                                                             Bypass LED
    •   CR 50ia,CR 100ia,CR200i, CR 300i, CR500ia, CR1000i and CR1500i come with hardware
        bypass feature

    •   In CR 50ia, CR 100ia, ports A and B have the bypass functionality available only on power
        failure.

    •   In CR 200ia and CR 300i ports C and D have the bypass functionality available.

    •   In CR500ia ports “A and B” and “C and D” have the bypass functionality available.

    •   In CR 1000i and CR1500i ports “A and B” “C and D” have the hardware bypass function
        available.

    •   A Blue LED on the front panel of the appliance blinks when hardware bypass is active.



                                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




Web Proxy Mode


  •   You would like to replace existing software / appliance based proxy solution

  •   You would like to use Cyberoam Identity based features along with Content
      Filtering / Bandwidth Management / Anti-virus / User based Reporting.

  •   You want to use Cyberoam as a drop in solution in proxy mode.

  •   You don’t want to make any major changes with you existing proxy setup




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




Cyberoam’s Web Proxy Features


  •   Cyberoam’s Web proxy listens on port 3128 by default

  •   Cyberoam can be configured to use an upstream parent proxy server by
      configuring the parent proxy’s IP address and the proxy port number

  •   Proxy mode is drop-in solution and this can be deployed by using single
      interface of Cyberoam and users can specify Cyberoam IP as a proxy in
      their browser.

  •   In general scenario, one can replace existing proxy solution with Cyberoam
      and specify existing proxy IP in Cyberoam so without making any major
      changes in the network Cyberoam can be placed.




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Configure Web Proxy
 System  Configuration  Web Proxy




                                                                                             Cyberoam’s HTTP
                                                                                             Proxy listens on port
                                                                                             3128 by default




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




Configure Parent Proxy
 System  Configuration  Parent Proxy




                                                                                    Configure to use an
                                                                                    upstream parent proxy
                                                                                    server




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Default Internet Access Policy

   The Network Configuration Wizard requires you to configure the Default
   Internet Access Policy




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




Default Internet Access Policy
  •   ‘Monitor Only’ Policy:
       – Allows LAN to WAN traffic.
       – Allow all outbound traffic without any authentication.
       – No scanning.
       – No content filtering.

  •   ‘General Internet’ Policy:
       – Allow all outbound traffic without any authentication.
       – Web traffic will be scanned for virus / malware / spyware.
       – Content filtering will be “ON” by using default content filtering policy “General
          Corporate Policy” which blocks below web URL categories:

            • Porn, Nudity, Adult Content, URL Translation Sites, Drugs, Crime and
              Suicide, Gambling, Militancy and Extremist, Phishing and Fraud, Violence,
              Weapons

       – It is the default selected policy.

  •   ‘Strict Internet’ Policy:
       – Block all outbound unauthenticated traffic.
       – Web traffic will be scanned for virus / malware / spyware.
       – All traffic will be scanned by IDP engine.
                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                                      Cyberoam Registration




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                               Cyberoam Unified Threat Management




What is registration? Registration is process which will create customer account in
    Cyberoam central registration database.

Why to register? Registration is mandatory task as without this subscription modules
    cannot be subscribed.

Registration gives following benefits:

•   8 x 5 Support as per country time zone for next one year.
•   Free trial of following Cyberoam Subscription Modules:
     • Gateway Anti-Virus & Gateway Anti-Spam
     • Web & Application Filter
     • Intrusion Prevention System (IPS)
•   Access of customer my account for
     • Support ticket management
     • Subscription management

Customer my account can be accessed from: http://customer.cyberoam.com

Multiple Cyberoam appliances can be registered using same customer account so that
   customer can manage all support tickets under one customer account.

                                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




                                         LABS


•   Lab #1 Factory Reset

•   Lab #2 Deployment in Bridge Mode (Optional)

•   Lab #3 Deployment in Gateway Mode

•   Lab #4 Registration, Upgradation & Subscription




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           Firewall




           Agenda:
               • Access Control (Appliance Access)
               • IP Management
               • Firewall Management
               • Default Firewall Rules
               • L2 Firewall support
               • Outbound NAT (Source NAT)
               • Inbound NAT (Virtual Host)
               • Denial of Service (DoS)
               • Cyberoam Unified Threat Control under Firewall
               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Appliance Access
System  Administration  Appliance Access




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Appliance Access (via Zones)
Network  Interface  Zone




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




IP Management
Network  Interface

View port wise network (physical interface) and zone details. If virtual sub-interfaces are
configured for VLAN implementation, they are also nested and displayed beneath the physical
interface.
Interface - Physical interfaces/ports available on Cyberoam. If virtual sub-interface is
configured for the physical interface, it also displayed beneath the physical interface. Virtual
sub-interface configuration can be updated or deleted.




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                Firewall Management




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Zone Management

Zone Types
LAN    : The Internal and most secure zone.
WAN    : The external, no-control and non-reliable zone.
DMZ    : The secured publicly accessible server zone.
Local  : All ports of the Cyberoam Appliance fall in this zone.
VPN    : It is the only zone that does not have an assigned physical port/interface.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Zone Mangement
Network  Interface  Zone




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




Service Management
Objects  Services  Add

Cyberoam provides several standard services and allows creating:
• Customized service definitions
• Firewall rule for Customized service definitions




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Manage Firewall Rules




                        © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Default Firewall Rules

•   Cyberoam creates two ‘Default Firewall Rules’ when it is first deployed in any of the
    two operational modes


•   These rules depend on the operational mode and the ‘Default Internet Access Policy’
    selected while running the network configuration wizard.


•   The default rules can be edited by the administrator but cannot be deleted.




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Cyberoam Default Firewall rule #2




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Cyberoam Default Firewall rule #1




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




L2 Firewall Support

•   In Cyberoam MAC address (Machine Address) is a decision parameter along with
    identity and ip address for the firewall policies.

•   All normal firewall policies like Web filter, Application filter, AV, IPS, QoS policy etc
    can be applied on the MAC firewall rule.

•   Eg: For any server running on dynamic IP Address, we can create a firewall rule to
    allow that server through firewall using MAC




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




  Add MAC based host
  Objects  Hosts  MAC Host  Add




Note: MAC based hosts can be added on the fly while creating firewall rules as well.
                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Firewall rule for MAC host




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




NAT (Outbound NAT)

•   What is NAT
     – Cyberoam has a predefined NAT policy called MASQ that NATs the outgoing
       traffic with the outgoing port’s IP Address
     – Use NAT when you want to do map a specific outbound traffic with a specific
       IP/IP Range
     – Cyberoam allows to create a NAT policy, which can be bound to a firewall rule.


•   Example
     – Mail server is configured in DMZ zone with private IP address & traffic generated
       from Mail server should be NATed with specific Public IP i.e. 121.22.141.250




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Add NAT Policy
Firewall  NAT Policy  Add




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Add firewall rule to include NAT policy
Firewall  Rule  Add




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Virtual Host (Inbound NAT)
 •   Virtual Host is required to make internal resources available on the internet like web
     servers or mail servers configured in LAN or DMZ.

 •   Virtual Host maps services of a public IP address to services of a host in a private
     network. In other words it is a mapping of public IP address to an internal IP address.

 •   This virtual host is used as the Destination address to access LAN or DMZ servers.

 •   Virtual Host is an object where we map few or all services of a public IP address to
     few or all services on an internal host.

 •   Example: Webserver configured in LAN zone with 192.168.1.157. From internet users
     are accessing www.abc.com which is resolving on 154.146.25.37. Let’s see how to
     make webserver available on Internet.




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Add Virtual Host
Firewall  Virtual Host  Add




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Add Firewall rule to include the Virtual Host




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




Loopback Firewall rule




Once the virtual host is created successfully, Cyberoam automatically creates a
loopback firewall rule for the zone of the mapped IP address. Loopback firewall rule is
created for the service specified in virtual host. If port forwarding is not enabled in virtual
host then firewall rule with “All Services” is created.
Loopback rules allow internal users to access the internal resources using its public IP
(external IP) or FQDN.




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Port Forwarding concept


Example: We have one public IP 154.146.25.37. In the DMZ, we have connected multiple
servers like Web Server (192.168.1.157), FTP Server (192.168.1.158) and RDP Server
(192.168.1.159). We want to publish all these servers using only one public IP
154.146.25.37.

In this case, we will use Port Forwarding while configuring the Virtual Host.

We will have to create 3 Virtual Hosts for above 3 servers with same external IP and
different Internal IP addresses, with port forwarding.

We have already created a Virtual Host for the Web Server with port 80, now we will create
remaining two Virtual Hosts for FTP and RDP.




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Creation of Virtual Hosts




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Creation of Firewall Rules




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Denial of Service


 •   What is Denial of Service

 •   How does Denial of Service Happen

 •   Effects of Denial of Service




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Types of DoS attacks


•   SYN Flood

•   UDP Flood

•   TCP Flood

•   ICMP Flood




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




DoS protection settings


 •   How many connections is each LAN host generating (take an average)?

 •   Multiply that by the number of hosts in your network.

 •   Destination based checking of DOS attacks should be disabled unless you
     suspect that there is a host inside your network generating a DOS attack.

 •   Turn off checking for TCP flood unless specifically instructed by the
     Cyberoam Support Staff




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




DoS Configuration
Firewall  DoS




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Cyberoam Unified Firewall Controls

           Cyberoam’s unified firewall controls include:

           • Web Filter
           • Application Filter
           • IPS Policy
           • QoS Policy
           • IM Scanning
           • Anti Virus & Anti Spam Scanning
           • Route through Gateway




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




Unified Threat Control’s in firewall rule




                        © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




                                           LABS
•   Lab #5 Securing the Appliance
•   Lab #6 Create a DROP firewall rule for your machine’s IP address
•   Lab #7 Create a ACCEPT firewall rule for your machine’s IP address.
•   Lab #8 Create Schedule & Apply in Firewall Rule
•   Lab #9 Enable / Disable Anti-Virus & Anti-Spam Scanning
•   Lab #10 Test Anti-Virus Scanning
•   Lab #11 Create Firewall Rule to Allow DNS Traffic
•   Lab #12 Create Virtual Host to Publish a RDP Server residing in the
    LAN
•   Lab 13# Create MAC based host for Dynamic web server and create
    MAC based firewall rule




                        © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           User Authentication




           Agenda:
               • Local & External Authentication
               • Authentication Settings
               • Type of Authentication
               • Single Sign On Concept
               • Identity Based Policy
               • Group Management
               • User Management
               • Identity Based Firewall
               • Traffic Discovery
               • Lab
               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Local Authentication Flow




User Authentication process initiates, when the client tries to
authenticate.




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




External Authentication Flow




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Authentication Servers
Identity  Authentication  Authentication Server




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Authentication Settings
Identity  Authentication  Firewall




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Authentication Settings
Identity  Authentication  VPN




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Authentication Settings
Identity  Authentication  Admin




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam     Cyberoam- Certified Network & Security Professional (CCNSP)
              Cyberoam Unified Threat Management




              Authentication Methods

           Normal
               - Captive Portal
               - Corporate client
           Windows:
           http://download.cyberoam.com/solution/optionals/Corporateclientsetup.exe
           Windows (Vista & Windows 7 – 32 bit):
           http://download.cyberoam.com/solution/optionals/Corporateclientsetup_vista_win7.



           Clientless
               - No Authentication Required

           Single Sign On
               - Authentication is done in sync with user’s
           authentication in domain




                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam         Cyberoam- Certified Network & Security Professional (CCNSP)
                  Cyberoam Unified Threat Management




 Single Sign On Flow (SSO)




                    © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




 Identity Based Policies




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




             Surfing Quota Policy

           • Surfing Quota Policy defines the duration of Internet
           surfing time.

           • It is the allowed time in hours for a group or an individual
           user to access Internet.

           • Cyberoam lets you define customized policies to define
           different levels of access for different users to meet your
           organization’s requirements.




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Access Time Policy

           • Access Time Policy defines the time period during
           which users can be allowed/denied the Internet
           access. Viz. Only office hours access.

           • It enables to set time interval – days and time for
           internet access with the help of a Schedule.

           •    Two strategies can be define:
                - Allow Strategy - allows access during the schedule
                - Deny Strategy - disallows access during the schedule




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Web & Application Filter
           • Web Filter Policy controls user’s web access. It specifies
           which user has access to which sites and allows defining
           powerful security policies based on almost limitless policy
           parameters like Individual users, Groups of users, Time of day,
           Location/Port/Protocol type, Content type, Bandwidth usage (for
           audio, video and streaming content).

           • Application Filter Policy controls user’s application access. It
           allows administrator to control access to applications based on
           almost limitless policy parameters like Individual users, Groups
           of users, Time of day.

           •Default web & application filtering policy is based on
           LAN➞WAN policy selected while running “Network
           Configuration Wizard”.

           •Applying default policy allows all the users to surf without login
           depending on the default policy applied and web surfing
           reports are generated on IP address as user has actually not
           logged on to Cyberoam.


              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Web Filter  Policy Add




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Application Filter  Policy  Add




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           QoS Policy

           •The primary objective of QoS Policy is to manage and distribute
           total bandwidth on certain parameters and user attributes.
           •It allocates and limits the maximum bandwidth usage of the user
           and controls web and network traffic.
           Policy can be defined/created for:
           •User - To restrict bandwidth of a particular user. Can be applied to
           a user’s profile.
           •Firewall Rule – This policy can be applied in the firewall rule only.
           Bandwidth restriction will be enforced on the traffic matching the
           firewall rule.
           •Web Category – To apply bandwidth restrictions on custom or
           default web categories. Policy can only be assigned to custom or
           default web categories.
           •Application – To restrict bandwidth for particular application. You
           need to go to application category, and apply bandwidth restriction.



              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           QoS  Policy  Add




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Data Transfer Policy

             •       The primary objective of this policy is to restrict the
                     users to upload and download anything from the
                     internet.

             •       Limits data transfer on a cyclic or non-cyclic basis.

             •       Single policy can be applied to number of Groups or
                     Users.

             •       Data transfer restriction can be based on:
                     Total Data transfer (Upload + Download)
                     Individual Upload and/or Download




                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Group Management

           • Group is a collection of users having common policies
           that can be managed as a single unit.

           • Its a mechanism of assigning various policies to a
           number of users in one operation/step.

           •    It simplifies the user configuration.

           • Users that belong to a particular group are referred to as
           a group user.




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Group Types:
           •    Normal

                A user of this group need to logon to Cyberoam using the
                Cyberoam Client to access the Internet
           •    Clientless
                A user of this group need not logon to Cyberoam using
                the Cyberoam Client to access the Internet. Access
                control is placed on the IP address, which is represented
                as Group name (C)




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




User-MAC binding


The Feature: Binds a user to a physical machine.


Benefit: Will prevent anyone from ‘impersonating’ someone else even if they have
   changed their IP address.

Details: User can login to Cyberoam and use the internet only from his/her own
   computer. User will not be able to login from any other computer and no one else will
   be able to login from his/her computer.

NOTE: User MAC binding feature is available only when user authenticates on
  Cyberoam using the corporate client (Windows/Linux).




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




User-MAC binding




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Identity based firewall rules
           Normal Firewall
           Cyberoam - Identity Based UTM
           • Rule matching criteria
              - Source address
              - Destination address
              - Service (port)
              - Schedule
              - Identity

           • Action
              - Accept
                     - NAT
              - Drop
              - Reject
           •     Unified Threatin DHCP, Wi-Fi Rule Matching Criteria)
                 However, fails Controls (per environment
                      - IPS Policy
                      - Web Filter Policy
                      - Application Filter Policy
                      - QoS Policy
                      - Anti Virus & Anti Spam
                      - Routing decision
               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




                                              LABS
•   Lab #14 Enforce Authentication

•   Lab #15 How to authenticate users through Captive Portal/Cyberoam Corporate
    Client

•   Lab #16 Create Custom Policies

•   Lab #17 Create Group, User and apply Custom Policies

•   Lab #18 Monitor User Activities

•   Lab #19 Single Sign On Implementation with Active Directory (Optional)

•   Lab #20 Customise HTTP Login Page




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           Content Filter




           Agenda:
               • Basics of Content Filter
               • Cyberoam Content Filter Features
               • Content Filter Categories
               • Content Filter Policies
               • Custom Category
               • Custom Denied Message
               • Upgrade
               • Safe Search capability to filter Adult Content
               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                                     Basics of Content Filter




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam     Cyberoam- Certified Network & Security Professional (CCNSP)
              Cyberoam Unified Threat Management




             Web & Application Filtering Features
           Database of millions of sites in 82+ default categories.
           Blocks phishing, pharming, spyware URLs.
           Data Leakage Prevention (HTTP upload control & reporting).




            Block & Control Applications such as P2P, Streaming, Videos/Flash
            Local Content Filter Database to reduces latency and dependence
           on network connectivity.




                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam     Cyberoam- Certified Network & Security Professional (CCNSP)
              Cyberoam Unified Threat Management




             Web & Application Filtering Features
            Google content categorization based on user policy:
                 Cache Pages
                 Translated Pages (http://translate.google.com)
            Enforcement of Google Safe Search Based on User Policy.
            Customized blocked message to educate users about organizational
             policies and reduce support calls




                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Web Categories
Web Filter  Categories




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Content Filter Policies
           • Web Filter Policy controls user’s web access. It specifies
           which user has access to which sites and allows defining
           powerful security policies based on almost limitless policy
           parameters like:
           Individual users, Groups of users, Time of day,
           Location/Port/Protocol type, Content type, Bandwidth usage (for
           audio, video and streaming content)

           • Application Filter Policy controls user’s application access. It
           specifies which user has access to which applications and
           allows defining powerful security policies based on almost
           limitless policy parameters like:
           Individual users, Groups of users, Time of day

           • IM (Instant Messaging) allows to configure and manage
           restrictions on instant messaging services provided by the
           Yahoo and MSN messengers. The traffic coming from the web
           in form of files and chat is filtered by various rules and content
           filtering strategies. You can add an IM contact or IM contact
           group for configuring rules.


              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




Default Web Filter Policies




Default Application Policies




                        © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




Safe Search Capability



 •   Benefit: Complete control on what turns up in Google and Yahoo search result.
     Capability to filter Adult Content related search.

 •   Details: If enabled, web sites containing pornography and explicit sexual content are
     blocked from the Google and Yahoo search results. This will be applicable only when
     access to Porn, Adult Content and Nudity categories is denied in Internet Access
     policy.

Web Filter  Settings




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Filtering Adult Content in case Safe Search is enabled




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                     Cyberoam- Certified Network & Security Professional (CCNSP)
                              Cyberoam Unified Threat Management




IM Policy



  •   This policy allows administrator to enforce restrictions on instant
      messaging services provided by Yahoo and MSN messengers.

  •   Possible to log & filter IM chat messages & files transferred.

  •   This policy can be applied to a user, group of users, IM contacts, IM
      group contacts in any combinations.

  •   Three configuration options available:
      1.    IM contacts
      2.    IM rules
      3.    Content Filter




                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




IM Contacts
IM  IM Contacts  Add

 •   IM Contact is used to register various Yahoo and MSN messaging
     application users.
 •   A Contact can be created for a user having access any of the two IM
     applications. Along with the contacts, IM Contact Groups can also be
     created.




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




IM Rules (Login)
IM  IM Rules  Login

 •   Login page allows you to configure and manage login rules for IM Contact, IM
     Contact Group, User and User Group.




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




IM Rules (Conversation)
IM  IM Rules Conversation
 •   Conversation page allows to configure and manage conversation rules between any of the
     two identities: IM Contact, IM Contact Group, User and User Group. The IM conversation
     between these two contacts can be monitored and logged.
 •   Cyberoam provides a default conversation rule that can be applied. This rule allows all the
     conversations but logs the content of the conversation.




                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




IM Rules (File Transfer)
IM  IM Rules  File Transfer
 • File Transfer page allows to configure and manage file transfer rules between any of
    the two identities. The files transfers between these two identities is monitored and
    logged.
 • If file transfer access between contacts is restricted and contact tries to transfer a file,
    an access restriction message is displayed in the conversation window.




                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




IM Rules (Webcam)
IM  IM Rules  Webcam
 •   Webcam page allows to configure and manage webcam rules between any of the two
     identities.
 •   If video conversation access between contacts is restricted and the contact tries to
     use the webcam, an access restriction message is displayed in the conversation
     window.




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




IM Content Filter
IM  Content Filter
 •   Content Filtering feature in Cyberoam is applied to Instant Messaging applications
     wherein content can be removed from the conversation if encountered.
 •   Content Filter page allows you specify list of keywords and regular expressions to be
     blocked, if encountered in any of the chat conversation. These configured keywords
     are removed and an error message is displayed for the same.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




IM Scanning on Firewall rules


 •   After the IM Contacts, Rules and Content Filter are configured, one needs to
     enable IM Scanning on the Firewall rule, so that all the messaging
     applications’ traffic is scanned.




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           Gateway Anti-Virus / Anti-Spam




           Agenda:
               • Gateway Anti-Virus Features
               • Basics of Virus / Spyware / Malware / Phishing
               • Mail Anti-Virus Configuration
               • FTP Anti-Virus Configuration
               • Web Anti-Virus Configuration
               • Gateway Anti-Spam Features
               • Basics of Spam
               • Basics of Anti-Spam Technologies
               • Cyberoam RPD Technology
               • Anti-Spam Policies
               • Anti-Spam Rules
               • Upgrade
               • Reports

               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Gateway Anti-Virus Features




 Scans WEB, FTP, Pop3, SMTP, IMAP & HTTPS traffic(Bidirectional:Upload &
Download)
 Self-service quarantine area
 Signature update ever 30 Mins
 Identity-based HTTP virus reports
 Disclaimer Addition to outbound emails
 Spyware and other malware protection including “Phishing” emails
 Block attachment based on Extensions (exe, .bat, .wav etc)
                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Anti Virus General Configuration
Anti Virus  Mail  Configuration




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           SMTP Scan Policy
           •Default SMTP policy is applicable for all SMTP traffic defined
           in the Scan Rules.

           •Cyberoam allows you to define multiple policies instead of
           single blanket policy.




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Default SMTP scanning rule
Anti Virus  Mail  SMTP Scanning Rules




 The default rules scans emails from any sender / recipient. Apply scanning in the appropriate
 firewall rule to scan incoming & outgoing emails.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                      Cyberoam- Certified Network & Security Professional (CCNSP)
                               Cyberoam Unified Threat Management




Custom SMTP rules
Anti Virus  Mail  Address Groups  Add




Use address group to create custom rules




The above custom rule will block all executable attachments for the recipient sales.manager@abc.com

                                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           POP3 Scan Policy
           • Strips the virus infected attachment from the message

           • The message body is replaced with a notification
           message

           • Provides an option to delete the mail from the server




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           IMAP Scan Policy
           •   Strips the virus infected attachment from the message

           • The message body is replaced with a notification
           message




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           FTP Scan Policy
           File Size Threshold

           •   Files that exceed configured threshold will not be scanned




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           How does Cyberoam HTTP AV work?
           Blocks all virus infected files being downloaded

           Cyberoam Virus Definition includes
             - Viruses
             - Worms
             - Trojans & Spyware
             - Hacker Utilities
             - Malware

           How does it help?
             - Blocks spyware not only from spyware sites but also
               from innocent sites
             - Malware being stopped at gateway level




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




HTTP Antivirus Configuration
Anti Virus  HTTP  Configuration




Anti Virus  HTTP/S  HTTP Scanning Rules




Anti Virus  HTTP/S  HTTPS Scanning Rules




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




HTTP Antivirus Configuration
Anti Virus  Quarantine




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                           Gateway Anti-Spam




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                              Cyberoam Unified Threat Management




    Gateway Anti Spam Features


     IP Reputation Filtering to block 85% of incoming messages at entry-point
      even before these messages enter the network.
     Spam filtering with (RPD) Recurrent Pattern Detection technology
     Virus Outbreak Detection (VOD) for zero hour protection
     Self-Service quarantine area
     User based Spam Digest
     Change recipients of emails
     Scans SMTP, POP3, IMAP traffic
     Content-agnostic
     5GB of disk space is reserved for both Antispam and Anti virus Quarantine.




                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Cyberoam RPD (Recurrent Pattern Detection) Technology




 Protects against Image-based Spam and spam in different languages
 The spam catch rate of over 98%
 1 in Million false positives in spam
 Local cache is effective for >70% of all spam resolution cases


                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Spam Detection Process




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




IP Reputation


 •   It dynamically classifies and reclassifies the reputation of each source IP
     and maintains a database of addresses used spammers and legitimate
     mailers.
 •   It fights the unwanted mail at the perimeter, reducing the incoming spam
     messages at the entry-point, before these messages enter the network
     resulting into reduced system resources and bandwidth usage.




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Enabling IP Reputation

 •   Feature available as “Verify Sender’s IP reputation” (Anti Spam 
     Configuration) in the Web Admin Console.

 •   If enabled, Cyberoam dynamically checks the sender IP address and
     rejects the SMTP connection if IP address is found to be responsible for
     sending spam mails.

 •   As it is a global option, if spam scanning is enabled, all the mails will be
     first subjected to IP reputation filtering followed by filtering based on
     actions configured in spam policy.

 •   If above mentioned option is not visible in the Web Admin console , one
     is required to purchase a new license of Gateway Anti Spam module
     and re-subscribe the module with the key. The new key enables both
     RPD & IP Reputation filtering.




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Enabling IP Reputation
Anti Spam  Configuration




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Global Spam Digest Settings
Anti Spam  Quarantine  Spam Digest Settings




Set the email frequency & from email address.




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Enable User based Spam Digest
Enable Spam Digest settings on user or group level.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam         Cyberoam- Certified Network & Security Professional (CCNSP)
                  Cyberoam Unified Threat Management




 User Quarantine Area




                    © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam        Cyberoam- Certified Network & Security Professional (CCNSP)
                 Cyberoam Unified Threat Management




 User My Account Quarantine Mails Virus




                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam       Cyberoam- Certified Network & Security Professional (CCNSP)
                Cyberoam Unified Threat Management




 User My Account Quarantine Mails Spam




                  © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam         Cyberoam- Certified Network & Security Professional (CCNSP)
                  Cyberoam Unified Threat Management




Spam Digest Settings




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Few On-appliance Mail Reports
Mail Usage Report: Top Mail Senders




iView the open source reporting software powered by Cyberoam is integrated as the
Cyberoam’s on-appliance reporting tool starting with Version X.
                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Few On appliance Mail Reports
Spam Report: Top Applications used for Spam




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




On appliance Mail Reports
Anti Virus Report: Top Viruses




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           Intrusion Prevention System (IPS)




           Agenda:
               • IPS Basics
               • Cyberoam IPS Features
               • IPS Signatures
               • IPS Policies
               •Reports



               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Introduction to IPS



                                                                     IPS acts as the Second
                                                                     layer of defense, It scans
                                                                     the traffic that has been
                                                                     allowed by the firewall for
                                                                     threats.




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Cyberoam IPS Features

• Cyberoam has more than 4500 signatures in its database.

• One can create custom IPS signatures

• Possible to create multiple IPS policies.

• Signatures in the database are organized in categories such as DNS, Finger,
  SMTP, DDOS, etc.

• One can customize the IPS policy by enabling/disabling individual signatures
  or categories. Hence reducing the load on Cyberoam.

• Possible modes (action) for each IPS Signature: Drop OR Detect. With Drop
  mode the IPS engine can be configured to act as a IDS (Intrusion detection
  system).



                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Default IPS Policy
IPS  Policy




                                              IPS  Policy  General Policy




Cyberoam offers four pre-defined policies to choose from. General Policy, LANtoWAN strict,
LANtoWAN general & DMZ policy. Seen above are the signature categories.


                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




IPS Reports
Reports  Attacks (IPS)




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam        Cyberoam- Certified Network & Security Professional (CCNSP)
                 Cyberoam Unified Threat Management




           Virtual Private Network (VPN)




           Agenda:

            •   Cyberoam VPN Features
            •   Cyberoam VPN Technology Comparison
            •   Cyberoam SSL VPN
            •   Labs




                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                                 Cyberoam Unified Threat Management




Cyberoam VPN Technology Comparison Matrix
•    The following table compares all VPN Technologies supported by Cyberoam and will
     help to make decision which VPN Technology to be used

VPN            Security level     Deployment Requirement
Technology

IPSec          High               This can be deployed in Remote Access and Site-to-Site scenario.
                                  In case of Remote Access, Cyberoam VPN Client is required and it’s
                                  a licensed product.
                                  In case of Site-to-Site, Cyberoam is compatible with all major VPN
                                  Gateways those supports standard IPSec architecture.
SSL-VPN        High                     This can be deployed in Remote Access or can be used as a
                                        web based portal without installing any SSL-VPN client
                                        SSL-VPN client is free of cost.

L2TP           High               This can be deployed in Remote Access scenario only.
                                  No third party VPN client required as Windows 2000 onward all OS
                                  have inbuilt L2TP VPN Client.

PPTP           Moderate           This can be deployed in Remote Access scenario only.
                                  No third party VPN client required as all windows OS have inbuilt
                                  PPTP VPN Client.


                                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




Cyberoam VPN Features
 Cyberoam supports SSL-VPN, IPSec, L2TP & PPTP

 Threat Free Tunneling (TFT)
      VPN Firewall Management
      VPN Bandwidth Management
      VPN Protection – Antivirus / Antispam / IPS / Web & Application Filtering / DoS

 VPN Topologies:
     Remote Access, Site to Site
     Hub & Spoke
         Branch Office Internet Traffic Tunneling over VPN
         Inter Branch Office Communication
     VPN Failover

 Main Mode / Aggressive Mode

 Identity based VPN control using xAuth

 Local digital certification authority (CA) and support external CA

Cyberoam supports MS-CHAPV2/Encryption over both L2TP as well as PPTP connection.

                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Basic VPN Deployments
Remote Access

 • It is a user-to-internal network connection via a public or shared network.
 • Connection is made by field agents using remote computers and laptops
   without static IP address.
 • All (IPSec, L2TP and PPTP) VPN technologies support this deployment.




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Basic VPN Deployments
Site-to-Site (Intranet/Extranet)

 • Used to extend a company’s existing network to other buildings & sites so that
   these remote employees can utilize the same network services.
 • Used to establish secure network connection between two or more companies
   in order to share a computing environment.
 • Only IPSec VPN technology supports this deployment.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




TFT- Threat Free Tunneling


 •   IPSec / L2TP / PPTP VPN traffic can be controlled through firewall

 •   Virus and spam scanning

 •   Intrusion check i.e. apply IPS policy

 •   VPN access can be configured and restricted to Networks, IP address ,Services and
     Users.

 •   Content Filtering

 •   Bandwidth Management




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Default VPN Zone
Network  Interface  Zone




Being a zone based firewall, Cyberoam creates the VPN zone which is used while
creating firewall rules to control VPN traffic.

                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




Default VPN Zone




Creation of firewall rules using the VPN zone.


                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           VPN Configuration & TFT




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




IPSec (Remote Access)
VPN  IPSec Connection




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




IPSec (Site-to-Site)
VPN  IPSec  Connection




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




L2TP
VPN  L2TP Configuration




                        © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




L2TP
VPN  L2TP  Connection




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam     Cyberoam- Certified Network & Security Professional (CCNSP)
              Cyberoam Unified Threat Management




PPTP
VPN  PPTP




                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Default VPN firewall rules




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




On-Appliance SSL VPN

   •   Cyberoam VPN includes SSL VPN functionality within the appliance to provide
       secure access for the remote users.

   •   Easier to use and control to allow access to the Corporate network from anywhere,
       anytime.

   •   Any device that has browser can access SSL VPN.

   •   It provides the ability to create point-to-point encrypted tunnels between remote
       employees and your company’s internal network.

   •   It requires a combination of SSL certificates and a username/password for
       authentication to enable access to the internal resources.

   •   To restrict the access to the Corporate network, it operates in two modes: Full
       Access and Web Access mode.

   •   User’s access to private network is controlled through his SSL VPN policy while
       Internet access is controlled through his Internet Access policy.

                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Cyberoam SSL-VPN Features
 Client and Location independent access

 Authentication - AD, LDAP, RADIUS, Cyberoam

 Multi-layered Client Authentication - Certificate, Username/Password

 User & Group policy enforcement

 Network access - Split and Full tunneling

 End user Web Portal - Clientless access

 SSL VPN Tunneling Client - Granular access control to all the Enterprise
  Network resources

 Administrative controls: Session timeout, Dead Peer Detection,

 Portal customization

• The SSL VPN feature would not be a chargeable module and would be enabled by
default in all appliances 25i, 50i,100i, 200i, 300i, 500i, 1000i and 1500i.

                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                               Cyberoam Unified Threat Management




Global Setting page allows you to configure certain parameters globally for both the type of Access
                                                                         Select protocol TCP or UDP from the dropdown
                                                                            list. Selected network protocol will be the
                                                                           default protocol for all the SSL VPN clients.
                                                                               Connection over UDP provides better
                                                                                           performance.



Specify the range of
    IP addresses
   reserved for the                                                       SSL certificate from the dropdown list to be
  SSL Clients. SSL                                                        used for authentication. If you do not have
    clients will be                                                                         certificate
 leased IP address
from the configured
         pool.




                                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




SSL-VPN Modes
Web Access, Application Access & Full Access Mode


     – Web Access mode & Application Access mode ( Web based or clientless )
        • Does not require any client to be installed
        • Can be accessed using browser
        • Limited to use on web resources only

     – Full Access mode ( Client mode )
        • Require client to be installed
        • Works in two modes
              – Split Tunnel
                  » Allows access to only defined network resources in the policy
              – Full Tunnel
                  » Routes all traffic to Cyberoam, internet through HO
                  » Allows access to only defined internal network resources
                  » Full access to WAN




                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Web Access Mode
SSL VPN  Bookmarks




• Any Bookmark, which is of type http or https, is used to publish web resources (http & https)
and can be made available using the end-user portal.

• These resources will be available in “Web Access” mode only and is to be configured in
SSLVPN Policy.

                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Bookmarks for Application Access Mode
SSL VPN  Bookmarks




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam        Cyberoam- Certified Network & Security Professional (CCNSP)
                 Cyberoam Unified Threat Management



                                        Select the access mode by clicking
 SSL-VPN Policy Creation                       on appropriate mode



                                                  Select Tunnel type

                                                                                   Accessible Resources




                                                                              Web based Bookmarks




                                                                                       Application based
                                                                                         Bookmarks


                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




SSL-VPN Portal




 SSL-VPN users authenticate on the portal with their username/password. If Cyberoam
 is integrated with external authentication server, the user needs to enter the
 credentials accordingly.
                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




SSL-VPN Portal (Welcome Page)




 Once logged into the portal the users get access to the bookmarks & the link to
 download the configuration file required for tunnel mode access.
                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




•   Lab #22 IPSec Remote Access Configuration using Pre-Shared Key

•   Lab #23 IPSec Net to Net Configuration using Pre-Shared Key

•   Lab24# Create L2TP Tunnel allowing the tunnel users to access only web
    services of Intranet in LAN enabling the DMZ IPS policy.

•   Lab#25 Create PPTP Tunnel allowing the tunnel users to access only web
    services of Internal network in LAN enabling the DMZ IPS policy.

•   Lab 26# Create Global policy for SSL VPN using self signed certificates for
    client and sever.

•   Lab 27#Create an SSL VPN tunnel with Web access applying it to user with
    access only to Intranet.

•   Lab 28# Create an SSL VPN tunnel with Full access in split tunnel mode
    applying it to Manager User giving access to the internal network.




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           Multilink Manager




           Agenda:
               • Cyberoam Multilink – An Introduction
               • Gateway Management
               • Active-Active load balancing and Gateway failover
               • Active-Passive Gateway Failover failover




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Multi-Link- An Introduction
           Introduction:
           • In a typical organization scenario, multiple WAN links may
               be required to be deployed.
           • Organizations may want to take advantage of multiple
               links to increase performance by maintaining high uptime.

           Benefits:
           • Active-Active load balancing and gateway failover
                It balances traffic between various links, optimizes
           utilization and thereby assist in cutting operating cost.
           • Active-Passive Gateway Failover
                Provides the link failure protection
           • Automatic ISP Failover Detection
                It detects link failure and passes the traffic to operating link.
           • High Uptime
                Improves performance because of high uptime.
           • Bandwidth Scalability
                Facilitates increased bandwidth scalability



              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




              Multilink Configuration




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Multi-Link- How it works
           Cyberoam does load balance using Weighted Round Robin (WRR)

           Load balancing is determined by the load metric i.e. Weight

           Cyberoam does load balance only on new connection

           Weight can be selected based on:
               • Weight can be decided on Link Capacity
               • Weight can be decided on Link Cost

           By Default all the Gateways are having weight as “1”, so Cyberoam
           will do the Load balancing in 1:1 across all Gateways’.




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Gateway Management



           What needs to be done if Multiple ISP links are
           available?

                             •Active-Active load balancing and gateway failover
                            •Active-Passive gateway failover




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam       Cyberoam- Certified Network & Security Professional (CCNSP)
                Cyberoam Unified Threat Management




   Active-Active load balancing and gateway failover




                  © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Active-Active gateway load balancing




              Weight: 3                                             Weight: 1




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                         Cyberoam Unified Threat Management




Setup Gateway- Configure Weights
Network  Gateway  Click on the gateway name




By default Cyberoam assigns the weight as 1 to all the gateways configured using the
initial network configuration wizard. One needs to change the weights of the gateway
manually as shown above.

                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management




            Active-Active gateway Failover



           •Depending on the weight, Cyberoam will select
           gateway for load balancing.


           •Cyberoam distributes traffic across links in
           proportion to the ratio of weights assigned to
           individual link.


           •This weight determines how much traffic will pass
           through a particular link relative to the other link.




               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Setup Gateway- Failover Rules
           Network➞ Gateway
           • Select Gateway and edit failover rule
           • Specify Communication protocol i.e. TCP, UDP, ICMP(Ping)
           • Specify Port number for communication
           • Specify Host




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Gateways configured as Active




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Enable load balancing in Firewall Rule




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam       Cyberoam- Certified Network & Security Professional (CCNSP)
                Cyberoam Unified Threat Management




           Active-Passive Gateway Failover




                  © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Active-Passive Gateway Failover


  The Feature:

  3.Configure a redundant link on Cyberoam.

  4.Configure multiple backup links.

  5.Backup links for specific routes.

  Benefit:

  Provides the link failure protection




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Active-Passive Gateway Failover

 •   Gateways with zero weight is the passive gateway

 •   Administrator will have to define the failover condition for the passive gateway

 •   Cyberoam periodically checks the health of the active gateway

 •   If the gateway does not respond, based on the failover condition, traffic will be routed
     automatically through the passive gateway.




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Backup gateway with failover condition
Network  Gateway  Click on the gateway name

A backup gateway is the one that can be used in an active/passive setup. The traffic is
routed through Backup gateway only when Active gateway is down




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Automatic Failover



                        Backup gateway will take over and traffic will be
                        routed through backup gateway when any of the
                                      active gateway fails

                                                                     Backup gateway will take over and traffic will be
                                                                      routed through backup gateway when all the
                                                                            configured active gateways fail




                                                                                Backup gateway will take over and traffic
Configure when the Backup gateway should                                        will be routed through back up gateway if
      take over the active gateway.                                                          ISP1 gateway fails




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                     Cyberoam- Certified Network & Security Professional (CCNSP)
                                  Cyberoam Unified Threat Management




   Manual Gateway Failover




If you want Backup gateway to inherit the                                              Administrator has to manually change
parent gateway’s (Active gateway) weight                                                 the gateway if the active gateway
                                                                                                       fails.



                                                                                                  specify weight.




                                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Enable Active-Passive gateway configuration through firewall rule




                                                        Create a firewall rule for
                                                           top management




                                                 Route the traffic through
                                                      one gateway



                                               Configure the another available
                                                    gateway as Backup


                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           Routing




           Agenda:
               • Basics of Routing
               • Cyberoam Routing Features
               • Static Routing
               • Policy Based Routing
               • Source Based Routing
               • Dynamic Routing
               • Multicast Routing

               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Basics of Routing
           • What is routing?

           • Routing Algorithm

                 • Static versus dynamic
                 • Single-path versus multi-path
                 • Link state versus distance vector




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




           Cyberoam Routing Features
           Cisco Compliance CLI Interface:

           Cyberoam provide Cisco compliance CLI interface for routing
           configuration.

           Routing Support:

           • Static Routing
           • Policy Based Routing
           • Dynamic Routing:
                • RIPv1, RIPv2
                • OSPF
                • BGP
           • Multicast Routing




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Static Routing
Network  Static Route  Unicast




The above example defines a static route where all requests destined for 4.2.2.2 will always be
routed via 1.1.1.1 (Port B). This traffic will be dropped in case the interface is down.


                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




 Policy Based Routing

Static routing method satisfies most of the requirements, but is limited to forwarding
based on destination address only.


Policy based routing is extended static routes which provide more flexible traffic
handling capabilities. It allows for matching based upon source address,
service/application, and gateway weight for load balancing. Hence, it offers granular
control for forwarding packets based upon a number of user defined variables like:
• Destination
• Source
• Application
• Combination of all of the above




                             © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




 Policy Based Routing




With the above firewall rule all HTTP traffic from LAN-WAN will be load balanced.
                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                     Cyberoam- Certified Network & Security Professional (CCNSP)
                                  Cyberoam Unified Threat Management


   Policy Based Routing




With the above firewall rule all SMTP traffic from LAN-WAN will always be routed via ISP1. This traffic will
be routed via ISP2 (backup) while ISP1 is down.
                                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                              Cyberoam Unified Threat Management




 Source Based Routing
 Network  Static Route  Source Route
Source Network routing allows Administrators to direct traffic generated from particular
Network over designated links according to the business policies. When you define Source
based routing for a particular subnet, all the traffic coming from that subnet will be forwarded to
the defined Interface.




All the traffic from network 192.168.1.0/24 will always be routed via ISP1 gateway
                                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




 Dynamic Routing - RIP

Routing Information Protocol (RIP) is a distance-vector routing protocol documented in RFC
1058. RIP uses broadcast User Datagram Protocol (UDP) data packets to exchange routing
information.


The Cyberoam implementation of RIP supports:


• RIP version 1 (as described in RFC 1058)
• RIP version 2 (as described in RFC 2453) and Plain text and Message Digest 5 (MD5)
authentication for RIP Version 2




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




 Dynamic Routing - OSPF

OSPF (Open Shortest Path First) is one of IGPs (Interior Gateway Protocols). Compared with
RIP, OSPF can serve much more networks and period of convergence is very short. OSPF is
widely used in large networks such as ISP backbone and enterprise networks.




The Cyberoam implementation of OSPF supports OSPF version 2 (as described in RFC 2328)
and plain text and Message Digest 5 (MD5) authentication




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                               Cyberoam Unified Threat Management




 Dynamic Routing - BGP

BGP (Border Gateway Protocol) is a path vector protocol that is used to carry routing between
routers that are in the different administrative domains (Autonomous Systems) e.g. BGP is
typically used by ISPs to exchange routing information between different ISP networks.


The Cyberoam implementation of BGP supports Version 4 (RFC 1771), Communities Attribute
(RFC 1997), Route Reflection (RFC 2796), Multi-protocol extensions (RFC 2858) and
Capabilities Advertisement (RFC 2842)


Additionally, a firewall rule is to be configured for the zone for which the BGP traffic is to be
allowed i.e. LAN to LOCAL or WAN to LOCAL.




                                  © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




 Dynamic Routing - Configuration
Configuration of RIP, OSPF & BGP is beyond the scope of CCNSP and is a part of CCNSE
curriculum. Please refer the document on Cyberoam knowledgebase sites for configuration:


RIP: http://kb.cyberoam.com/default.asp?id=1000&SID=&Lang=1
OSPF: http://kb.cyberoam.com/default.asp?id=999&SID=&Lang=1
BGP: http://kb.cyberoam.com/default.asp?id=1001&SID=&Lang=1




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                              Cyberoam Unified Threat Management




 Multicast Routing
Cyberoam supports multicast traffic forwarding in both Gateway / Bridge Mode. Multicast
forwarding is controlled by specifying static routes for multicast traffic.
In Gateway mode, multicast forwarding needs to be enabled and then static routing needs to
be configured.
In Bridge mode, only multicast forwarding needs to be enabled.
Multicast forwarding can be enabled and the mroutes can be added from both the GUI and
console.




Multicast routing configuration is beyond the scope of CCNSP and is a part of CCNSE
curriculum.
Refer knowledge base article for multicast routing configuration:
http://kb.cyberoam.com/default.asp?id=1021&SID=&Lang=1



                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           General Administration




           Agenda:
               • Logging Management
               • Report Management
               • DNS Management
               • DHCP Configurations
               • Cyberoam Upgrade
               • Backup – Restore
               • Diagnostic Tools
               • Troubleshooting Tools
               • Debugging Tools

               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




General Administration- Web admin console port settings
System  Administration  Settings




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Role Based Administration
System  Administration  Profile
•   Use Profile tab to create profiles for various administrator users. An administrator can
    have various levels of privileges and thus Cyberoam provides the facility of creating
    profiles.
•   All the profiles have a different level of access to Cyberoam Web Admin Console and
    CLI.
•   Default Admin Profiles:




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




Role Based Administration
System  Administration  Profile  Add




To create a new administration profile.

                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                      Cyberoam- Certified Network & Security Professional (CCNSP)
                               Cyberoam Unified Threat Management




Role Based Administration
Attach a profile to a user.




 As per the above new user configuration, profile option is only activated if we
 set the user type as Administrator.

 Here, we have selected the user type as Administrator and we have selected
 the profile as we created in previous slide.




                                 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Logging Management
Logs & Reports  Configuration  Syslog Servers  Add
•   Cyberoam provides extensive logging capabilities for traffic, system and network
    protection functions by sending the logs to a remote Syslog Server.
•   Detailed log information and reports provide historical as well as current analysis
    of network activity to help identify security issues and reduce network misuse and
    abuse.
•   The Cyberoam Syslog support requires an external server running a Syslog
    daemon on any of the UDP Port.
•   Cyberoam supports upto 5 Syslog servers.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Logging Management
Logs & Reports  Configuration  Log Settings
•   Once you add the Syslog
    server, configure logs to be
    send to the Syslog sever.
•   If multiple servers are
    configured various logs can
    be send on different servers.
•   To record logs you must
    enable the respective log and
    specify logging location.
    Administrator can choose
    between on-appliance (local)
    logging, Syslog logging or
    disabling logging temporarily.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Report Management
•   One of the best features of Cyberoam is the on-appliance User-based reporting.
    Cyberoam reports are generated and stored on local hard drive of the appliance.
•   The Cyberoam comes pre loaded with iView – Intelligent Logging & Reporting
•   The reports are available in various formats like:
     •   Tabular, Graphical, Printer Friendly and CSV.
•   Comprehensive on-appliance user-based reporting for all the UTM features
    including:
     •   Web surfing reports, Anti-virus & Anti-spam report, Intrusion Detection and
         Prevention reports along with VPN reports, Data Transfer reports, Web
         Trend reports for analysis and Compliance reports and Appliance Audit
         reports for Organization Auditing.




                               UTM Device                 Software / Device




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Report Management
Logs & Reports  View Reports
The administrator can also configure to receive pre-defined reports via email on a daily or a
   weekly basis.




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Sample Reports: User Wise Reports




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Sample Reports: Blocked Attempts Report




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Sample Reports: Application Group Report




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Sample Reports: Top Web Users Report




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




DNS Management
Network  DNS

•   The Domain Name System (DNS) is a system that provides a method for
    identifying hosts on the Internet using alphanumeric names called fully qualified
    domain names (FQDNs) instead of using difficult to remember numeric IP
    addresses. In other words, it translates domain names to IP addresses and vice
    versa.


•    DNS server is configured at the time of installation. You can also add additional
    IP addresses of the DNS servers to which Cyberoam can connect for name
    resolution from GUI.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




DHCP Configurations
Network  DHCP

 •   DHCP can only be configured in Gateway mode.

 •   Cyberoam acts as a DHCP server and assigns a unique IP address to a host,
     releases the address as host leaves and re-joins the network.
 •
 •   Host can have different IP address every time it connects to the network.

 •   Cyberoam can act as a Relay Agent also.

 •   It allows to configure Cyberoam’s Internal Interface as a DHCP relay agent, view the
     list of interfaces configured to serve as a DHCP relay agent, and delete agent.

 •   Cyberoam can act as a DHCP server with IP Reservation feature.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                 Cyberoam- Certified Network & Security Professional (CCNSP)
                          Cyberoam Unified Threat Management




DHCP Server Configuration
Network  DHCP  Server (Dynamic)




DHCP Configuration for dynamic lease.
                            © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




DHCP Server Configuration
Network  DHCP  Server (Static)




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




DHCP Relay Configuration
Network  DHCP Relay

   • The DHCP Relay Agent allows to place DHCP clients and DHCP servers
   on different networks.
   • The DHCP Relay Agent enables DHCP clients to obtain IP addresses
   from a DHCP server on a remote subnet, or which is not located on the
   local subnet.




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Static ARP
Network  ARP


 •   ARP traffic is enabled on Cyberoam interfaces by default

 •   Static ARP entry allows to bind the MAC address to the designated IP address.

 •   It will also remove any dynamically cached references to that MAC address that might
     be present, and will not allow additional static mappings of that MAC address.

                                            Specify IP address of the host outside the
                                                            firewall

                                                          Specify MAC address of the host




                                     Click checkbox to add the MAC/IP pair in the trusted list

                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam        Cyberoam- Certified Network & Security Professional (CCNSP)
                 Cyberoam Unified Threat Management




Manage ARP
Network  ARP




                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




NTP configuration for time synchronization
System  Configuration Time




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




NTP configuration for time synchronization (Wizard)




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                    Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




Backup-Restore Management
System  Maintenance  Backup & Restore

  •   Once the backup is taken, you need to upload the file for restoring the backup.
  •   Restoring data older than the current data will lead to the loss of current data.
  •   The restore facility is version dependent, it will work only if the backup and restore
      versions are the same. Also, if HA is configured, you need to disable HA before
      restoring the backup.
  •   Upload the backup file: System  Maintenance  Backup & Restore




  •   After upload, log on to Console based Administration (using TELNET) Go to
      Option 5 – Cyberoam Management > Option 6 – Restore Backup and follow
      screen steps to restore data.

                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Diagnostic Tools


•   Analytical Tool checks the health of the System in a single shot. It is used for
    troubleshooting and diagnosing problems found in the System.


•   Analytical Tool is like a periodic health check up that helps to identify the
    impending System related problems. After identifying the problem, appropriate
    actions can be taken to solve the problems and keep the System running
    smoothly and efficiently.


•   Analytical Tool shows the status of System. Based on the status, Administrator
    can judge whether the respective System component is working fine (OK Status),
    is facing a minor problem (Warning Status) or is having a major problem (Critical
    Status).




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Diagnostic Tools: Services Status
System  Maintenance  Services




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam             Cyberoam- Certified Network & Security Professional (CCNSP)
                      Cyberoam Unified Threat Management




Diagnostic Tools: System health graphs
System  System Graphs




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                  Cyberoam- Certified Network & Security Professional (CCNSP)
                           Cyberoam Unified Threat Management




Troubleshooting: Log Viewer
Logs & Reports  Log Viewer
Event Viewer page allows to view the live logs for event modules like:
•IPS
•Web Filter
•Anti Spam
•Anti Virus
•Firewall
•IM

This page gives concentrated information about all the events that occurred under
respective modules.




                              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Log Viewer
Logs & Reports  Log Viewer  Web Filter




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Log Viewer
Logs & Reports  Log Viewer  IM




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Log Viewer
Logs & Reports  Log Viewer  Anti Virus




                          © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                   Cyberoam- Certified Network & Security Professional (CCNSP)
                            Cyberoam Unified Threat Management




Packet Capture
System  Packet Capture
 •Packet capture displays dropped packets details on the specified interface.
 It will provide connection details and details on which module is dropping packets e.g.
 firewall, IPS along with information like firewall rule number, user, Web and Application
 Filter policy number etc.
 • This will help Cyberoam administrators to troubleshoot errant firewall rule.




                               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam    Cyberoam- Certified Network & Security Professional (CCNSP)
             Cyberoam Unified Threat Management



           Support Resources




           Agenda:
               • On Appliance Help
               • Online Resources
               • Customer My Account
               • Partner Portal
               • Support Contact

               © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




On Appliance Help




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Cyberoam Knowledge Base (http://kb.cyberoam.com)




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam          Cyberoam- Certified Network & Security Professional (CCNSP)
                   Cyberoam Unified Threat Management




Cyberoam Knowledge Base (http://docs.cyberoam.com)




                     © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam           Cyberoam- Certified Network & Security Professional (CCNSP)
                    Cyberoam Unified Threat Management




Cyberoam Security Center (http://csc.cyberoam.com)




                      © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam        Cyberoam- Certified Network & Security Professional (CCNSP)
                 Cyberoam Unified Threat Management




 Customer My Account (http://customer.cyberoam.com)




                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam        Cyberoam- Certified Network & Security Professional (CCNSP)
                 Cyberoam Unified Threat Management




 Customer My Account (http://customer.cyberoam.com)




                   © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam            Cyberoam- Certified Network & Security Professional (CCNSP)
                     Cyberoam Unified Threat Management




Partner Portal (http://partner.cyberoam.com)




                       © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam               Cyberoam- Certified Network & Security Professional (CCNSP)
                        Cyberoam Unified Threat Management




Presales Offerings


Presales Program includes:

•   Product Awareness Programs
    •     Technical Trainings
    •     Product Updates (New Releases)
    •     Comparison Discussions
    •     Presales Case Discussions


•   Exclusive assistance in Tendering & Compliances

•   Exclusive assistance during critical / important deployments




                           © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam              Cyberoam- Certified Network & Security Professional (CCNSP)
                       Cyberoam Unified Threat Management




Presales Contact Details
     Email Support:




     Chat support: http://www.cyberoam.com/presalessupport




                         © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam                Cyberoam- Certified Network & Security Professional (CCNSP)
                             Cyberoam Unified Threat Management




    Postsales Contact Details
For any technical assistance, contact us through:

•    Web Support:
      • Customers: http://customer.cyberoam.com
      • Partners: http://partner.cyberoam.com

•    Chat Support: http://www.cyberoam.com/contactsupport.html

•    Email Support: support@cyberoam.com

•    Telephonic Support




                                © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
Cyberoam   Cyberoam- Certified Network & Security Professional (CCNSP)
            Cyberoam Unified Threat Management




                            Thank You




             training@cyberoam.com




              © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

More Related Content

PPT
Ccnsptrainerpresentation 111019052032-phpapp01
PDF
PPT
Ccnsp trainer presentation
PPT
Cyberoam layer8
PDF
PPTX
Cyberoam Unified Threat Management
PPT
Wifi Security for SOHOs: Cyberoam UTM CR15wi
PPT
Cyberoam SSL VPN
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsp trainer presentation
Cyberoam layer8
Cyberoam Unified Threat Management
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Cyberoam SSL VPN

What's hot (20)

PDF
Cyberoam ssl vpn_management_guide
PDF
Cr vs fortinet
PDF
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
PDF
Ccnsp course outline
PDF
Preparing Your School for BYOD with Sophos UTM Wireless Protection
ODP
Email Security Appliance from IBM
PPTX
8 Threats Your Anti-Virus Won't Stop
PPT
Astaro asia product-presentation-updated 21-feb11
PPTX
2013 Security Threat Report Presentation
PPTX
Endpoint Security Evasion
PPTX
Mining attackers mind
PDF
Security+
PPTX
Unified Threat Management Solutions
PDF
Achieving Cyber Essentials
PPTX
What's New with Ivanti’s Enterprise Licensing Agreement?
PPTX
What is the UK Cyber Essentials scheme?
PDF
Tamper Resistant Application Fortifies your Defense Against Hacking
PPTX
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
PDF
What’s the State of Your Endpoint Security?
PDF
OSB180: Learn More About Ivanti Endpoint Security
Cyberoam ssl vpn_management_guide
Cr vs fortinet
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
Ccnsp course outline
Preparing Your School for BYOD with Sophos UTM Wireless Protection
Email Security Appliance from IBM
8 Threats Your Anti-Virus Won't Stop
Astaro asia product-presentation-updated 21-feb11
2013 Security Threat Report Presentation
Endpoint Security Evasion
Mining attackers mind
Security+
Unified Threat Management Solutions
Achieving Cyber Essentials
What's New with Ivanti’s Enterprise Licensing Agreement?
What is the UK Cyber Essentials scheme?
Tamper Resistant Application Fortifies your Defense Against Hacking
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
What’s the State of Your Endpoint Security?
OSB180: Learn More About Ivanti Endpoint Security
Ad

Similar to Ccnsp (20)

PPTX
Cyberoam Firewall Presentation
PDF
Ccnsp course outline
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
PDF
XTM moving security forward
PPT
Ccna+sec+ch01+ +overview+security
PPTX
Defending Your IBM i Against Malware
PDF
Cloud Security @ TIM - Current Practises and Future Challanges
PDF
Presentation cisco iron port e-mail security solution
PPTX
Dipu cyberroam presenttion
PPTX
Two for Attack: Web and Email Content Protection
PPS
Outpost networksecurity
PPTX
Segurdad de red para la generacion de la nube symantec
PPTX
Securing Beyond the Cloud Generation
PDF
Cisco Security Presentation
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
PDF
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
PDF
Presentation cloud security the grand challenge
PPTX
IBM Security Portfolio - 2015
PDF
BreakingPoint Storm CTM Cost-Effective Testing Solution
PPT
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Cyberoam Firewall Presentation
Ccnsp course outline
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
XTM moving security forward
Ccna+sec+ch01+ +overview+security
Defending Your IBM i Against Malware
Cloud Security @ TIM - Current Practises and Future Challanges
Presentation cisco iron port e-mail security solution
Dipu cyberroam presenttion
Two for Attack: Web and Email Content Protection
Outpost networksecurity
Segurdad de red para la generacion de la nube symantec
Securing Beyond the Cloud Generation
Cisco Security Presentation
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Presentation cloud security the grand challenge
IBM Security Portfolio - 2015
BreakingPoint Storm CTM Cost-Effective Testing Solution
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Ad

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation

Ccnsp

  • 1. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 2. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Please Introduce Yourself… • Your name • Your company, position, and responsibilities • Your network experience • Specific UTM appliance or Cyberoam product experience • Your expectations from this workshop © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 3. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Training Kit Verify your take away: • CCNSP Guide • Cyberoam Brochure • Quick Start Guide • Writing Aids © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 4. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Schedule / Breaks • Sessions starts at 09:00 hours • Breaks - Refreshments (around 10:30 hours) - Lunch (around 12 – 13 hours) - Refreshments (around 15:30 hours) • Sessions ends at 17 hours © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 5. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Training Pre-requisites The training programme assumes participants to have operational familiarity with following concepts: • Operational OS understanding • Networking Basics • Protocols like HTTP, IMAP, POP3, SMTP • TCP/IP Protocol Suite • Network Security Fundamentals © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 6. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Identity Based UTM Agenda: • Challenges with Current UTM Products • Cyberoam’s Security Approach • Layer 8 Firewall • Identity Based Technology © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 7. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Challenges with Current UTM Products Lack of user Identity recognition and control  Inadequate in handling threats that target the user – Phishing, Pharming Unable to Identify source of Internal Threats  Employee with malicious intent posed a serious internal threat  Indiscriminate surfing exposes network to external threats  50 % of security problems originate from internal threats – Yankee Group  Source of potentially dangerous internal threats remain anonymous Unable to Handle Dynamic Environments  Wi-Fi  DHCP Unable to Handle Blended Threats  Threats arising out of internet activity done by internal members of organization  External threats that use multiple methods to attack - Slammer Lack of In-depth Features  Sacrificed flexibility as UTM tried to fit in many features in single appliance.  Inadequate Logging, reporting, lack of granular features in individual solutions Need for Identity based UTM… © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 8. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam: Identity-based Security Overview of Cyberoam’s Security Approach:  Who do you give access to: An IP Address or a User?  Whom do you wish to assign security policies: Username or IP Addresses?  In case of an insider attempted breach, whom do you wish to see: User Name or IP Address?  How do you create network address based policies in a DHCP and a Wi-Fi network?  How do you create network address based policies for shared desktops? © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 9. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam – Identity Based Security Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 10. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management PATENT PENDING: IDENTITY-BASED TECHNOLOGY User © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 11. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Layer 8 Firewall (Patented Technology) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 12. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management About Cyberoam Cyberoam is the identity-based UTM solution that offers Integrated Internet Security with fine granularity through its unique identity-based policies. It offers comprehensive threat protection with: • Identity-based Firewall • VPN- Threat free tunneling • SSL VPN • Gateway Anti-Virus • Gateway Anti-Spam • Intrusion Prevention System (IPS) • Web & Application Content Filtering • Bandwidth Management (QoS) • Multi-Link Manager (Load balancing) • On-Appliance Reporting • 1000+ drilldown reports © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 13. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Appliances (Các số tương ứng với số người dùng internet) SOHO (Small Office-Home Office) & ROBO (Remote Office-Branch Office) CR 15i – CR 15iw CR 25ia – CR35ia Small to Medium Business CR 50ia – CR100ia Medium Enterprises CR 200i CR 300i CR 500ia CR 750i Large Enterprises CR 1000i CR 1500i © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 14. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Basic Appliance – One time sale • Identity-based Firewall • 8 x 5 Support for the first year. • VPN- Threat Free Tunneling • SSL VPN (Promotional offer) • Bandwidth Management • Multiple Link Management Bundle Subscription Subscriptions Individual Module Wise •Gateway be the combination of (Anti-malware, phishing, spyware protection included) Bundle canAnti-Virus Subscription or all of the following modules: ••Gateway Anti-spam Subscription Gateway Anti Virus •Web & Application Filtering Subscription • Gateway Anti-spam •Intrusion Prevention System (IPS) ••24 x 7 Premium Support Intrusion Prevention System ••IPSec and Application Filter Web VPN Clients (Per Device-Life Time) • 8 X 5 Support (Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 15. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Bundle Subscription (TVS & SVS) Bundle Subscriptions are available as: • Total Value Subscription (TVS) includes: • Anti Virus • Anti Spam • Web & Application filter • IPS • 8*5 Support (if bought for more than 1 year as first year support is included for free) • Security Value Subscription (SVS) includes: • Anti Virus • Web & Application filter • IPS • 8*5 Support (if bought for more than 1 year as first year support is included for free) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 16. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Bundle Subscription (One time subscription) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 17. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Demo vs Sale Appliance Sale Appliance: The Cyberoam appliance sold to Partner / Reseller for direct customer sale. .Sale appliance can be registered once and can get 3, 15 days trials for all subscription based modules. Demo Appliance: The Cyberoam appliance sold to Partner / Reseller for conducting end customer demo. Demo appliance can be registered unlimited number of times under different credentials after factory reset and can get 3, 15 days trial for all subscription based modules after each registration. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 18. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Products Agenda: • Cyberoam UTM Appliances • Appliance Family • Cyberoam SSL VPN • Cyberoam End Point Data ProtectionProtection • Cyberoam iView • Cyberoam Central Console (CCC) • Cyberoam VPN Client © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 19. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam – Identity Based Security Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 20. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam SSL VPN © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 21. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Benefits • Secure SSL VPN – Access from anywhere. • Trusted Remote Access – extend access to partners, telecommuters, wireless users. • Easy to use – Fast installation, less ongoing management, less downtime. • Continuous Access – provides reliable, available and scalable access. • Endpoint Security. • Hardened Secure OS. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 22. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam SSL-VPN features © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 23. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Models & Licenses • Base License – Default 5 User License valid for 30 days. – No EPS. • Software Based • Appliance Based – CR-SSL-0800 (Supports upto 50 Concurrent Users). – CR-SSL-1200 (Supports upto 250 Concurrent Users). – CR-SSL-2400 (Supports upto 1000 Concurrent Users). © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 24. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam – End Point Data Protection Protect your Data. Protect your Assets. Cyberoam End Point Data Protection Protect Your Data, Protect Your Assets © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 25. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam End Point Data Protection Licenses (Per-user one time licenses) 1. Data Protection & Encryption 2. Device Management 3. Application Control 4. Asset Management Note: All the modules include 1 year maintenance support. A single key would be issued for the modules purchased. Need to buy the same number of licenses for all the modules. i.e. Not possible to buy 10 licenses for Device management & 50 for Asset management. Renewal (year on year) Maintenance support to be renewed for all the modules purchased each year. It includes version upgrades & technical support. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 26. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam iView The Intelligent Logging & Reporting Solution Its an Open Source, its free! © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 27. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management What is Cyberoam iView?  Open Source Logging and Reporting solution  Ability to log and report activities from - • UTM / Firewalls • HTTP Proxy • More to follow  Unique ability – Shows “Who is doing What”  Free to Download © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 28. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam iView’s Logging & Reporting Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 29. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam iView appliances • CR-iVU 25 • CR-iVU 100 • CR-iVU 200 Products supported • Network Devices: Linux IPtables / Netfilter Firewall,Cyberoam, Fortigate, Sonicwall. • HTTP Proxy: Squid • Syslog Compatible Devices: Any product with Syslog support © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 30. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Central Console (CCC) Cyberoam Central Console (CCC Series) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 31. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management CCC Deployment (Enterprise) Branch Offices Corporate Head Office Branch1 Cyberoam UTM Branch2 Appliance Branch3 Branch…N CCC © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 32. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management CCC appliance family Small-to-Medium Deployments • CCC 15 (Capacity to manage 15 Cyberoam Appliances) • CCC 50 (Capacity to manage 50 Cyberoam Appliances) Medium-to-Large Deployments • CCC 100 (Capacity to manage 100 Cyberoam Appliances) • CCC 200 (Capacity to manage 200 Cyberoam Appliances) CCC Online Demo is available at: http://demo.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 33. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Deployment Agenda: • Package Contents • Factory Default Settings • Deployment Modes © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 34. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Package Cyberoam Appliance Blue Straight-through Power Cable Ethernet Cable Red Crossover Ethernet Quick Start Guide Cable Serial Cable Documentation CD © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 35. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Factory Defaults Web Based Administration Console: Username: cyberoam Port IP Address Zone Type Password: cyber 172.16.16.16/ A LAN 255.255.255.0 Text Based Administration console 192.168.2.1/ (Telnet or Serial Connection): B WAN 255.255.240.0 Password: admin SSH: Username: admin Password: admin © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 36. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Deployment Modes Cyberoam can be deployed in two modes: Bridge / Transparent Mode Gateway / Route / NAT Mode © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 37. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateway/Route/NAT mode • You want to replace your existing firewall or router acting as a gateway for your network with Cyberoam • You want your gateway to act as a VPN server • You want redundancy in your network with by utilizing the multilink and HA (High-Availability) features of Cyberoam • You want to configure separate DMZ zone to protect servers from LAN & WAN zone. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 38. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Before Cyberoam Scenario - Gateway Port A IP Address ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ DMZ Zone Port B IP Address ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ Port C IP Address ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ Router Web Server IP:61.0.5.1/29 IP:172.16.1.2 Port D IP Address ___ ___ ___ ___ Gateway: 172.16.1.1 Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ Firewall INT IP:192.168.0.1/24 IP address of the DMZ IP: Switch Default Gateway: ___ ___ ___ ___ 172.16.1.1/24 DNS IP Address: ___.___.___.___ EXT IP: 61.0.5.2/29 System Time Zone: ______________ System Date and Time: ______________ Gateway IP: 61.0.5.1 Email ID of the administrator : ______________ Mail Server Network:192.168.0.x/24 Switch IP:172.16.1.3 Gateway: 172.16.1.1 Database Server Users IP:172.16.1.4 Gateway: 172.16.1.1 Default Gateway: 192.168.0.1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 39. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam in Gateway Mode Router IP:61.0.5.1/29 INT IP:192.168.0.1/24 DMZ IP: 172.16.1.1/24 EXT IP: 61.0.5.2/29 Gateway IP: 61.0.5.1 DMZ Zone Console Switch Switch Network:192.168.0.x/24 Web Server Mail Server Database Server IP:172.16.1.2 IP:172.16.1.3 IP:172.16.1.4 Gateway: 172.16.1.1 Gateway: 172.16.1.1 Gateway: 172.16.1.1 Users Default Gateway: 192.168.0.1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 40. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateway Mode- Zone information Cyberoam in Gateway mode have Four default zone LAN Zone: Network connected to LAN interface of Cyberoam WAN Zone: Network connected to WAN interface of Cyberoam DMZ Zone: Network connected to DMZ interface of Cyberoam Local Zone: IP Addresses assigned on Cyberoam interfaces falls under Local Zone WAN Zone Local Zone DMZ Zone LAN Zone © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 41. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Bridge/Transparent Mode When to choose bridge mode? • You already have a firewall or a router acting a gateway for your network and you don’t want to change the existing setup • Want to use Cyberoam for reporting. • Want Cyberoam as a drop-in solution for Viruses, Spam, Content-Filtering and IDP and Bandwidth Management. • Want to try-out Cyberoam without changing your existing setup. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 42. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Before Cyberoam Scenario - Bridge Bridge IP Address ___.___.___.___ Subnet Mask ___.___.___.___ IP address of the Default Gateway ___.___.___.___ DNS IP Address ___.___.___.___ System Time Zone ______________ System Date and Time ______________ Email ID of the administrator ______________ Router Firewall INT IP: 192.168.0.1/24 Switch Network:192.168.0.x/24 Users Default Gateway: 192.168.0.1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 43. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam in Bridge Mode Bridge IP Address ___.___.___.___ 192.168. 0 . 5 Subnet Mask ___.___.___.___ 255.255.255. 0 IP address of the Default Gateway ___.___.___.___ 192.168. 0 . 1 DNS IP Address 202. 54 . 1 . 30 System Time Zone ______________ Router System Date and Time ______________ Email ID of the administrator ______________ Firewall INT IP: 192.168.0.1/24 Network:192.168.0.x/24 Users Default Gateway: 192.168.0.1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 44. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Bridge Mode- Zone information Cyberoam in transparent mode have three default zone LAN Zone: Network connected to LAN interface of Cyberoam WAN Zone WAN Zone: Network connected to WAN interface of Cyberoam LOCAL Zone LAN Zone Local Zone: IP Address assigned on the Bridge Interface falls under Local Zone v © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 45. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Hardware Bypass in Transparent Mode • When the appliance is deployed in Transparent mode and if there is a power failure, hardware problem or a software malfunction the appliance goes into ‘Bypass’ mode. • In Bypass mode the bypass interfaces of the appliance get bridged and start acting like a hub. • The traffic flow is not interrupted thus resulting in high network uptime. • Hardware Bypass functionality is only available in Transparent Mode not in Gateway Mode. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 46. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Hardware Bypass in Transparent Mode Bypass LED • CR 50ia,CR 100ia,CR200i, CR 300i, CR500ia, CR1000i and CR1500i come with hardware bypass feature • In CR 50ia, CR 100ia, ports A and B have the bypass functionality available only on power failure. • In CR 200ia and CR 300i ports C and D have the bypass functionality available. • In CR500ia ports “A and B” and “C and D” have the bypass functionality available. • In CR 1000i and CR1500i ports “A and B” “C and D” have the hardware bypass function available. • A Blue LED on the front panel of the appliance blinks when hardware bypass is active. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 47. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Web Proxy Mode • You would like to replace existing software / appliance based proxy solution • You would like to use Cyberoam Identity based features along with Content Filtering / Bandwidth Management / Anti-virus / User based Reporting. • You want to use Cyberoam as a drop in solution in proxy mode. • You don’t want to make any major changes with you existing proxy setup © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 48. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam’s Web Proxy Features • Cyberoam’s Web proxy listens on port 3128 by default • Cyberoam can be configured to use an upstream parent proxy server by configuring the parent proxy’s IP address and the proxy port number • Proxy mode is drop-in solution and this can be deployed by using single interface of Cyberoam and users can specify Cyberoam IP as a proxy in their browser. • In general scenario, one can replace existing proxy solution with Cyberoam and specify existing proxy IP in Cyberoam so without making any major changes in the network Cyberoam can be placed. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 49. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Configure Web Proxy System  Configuration  Web Proxy Cyberoam’s HTTP Proxy listens on port 3128 by default © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 50. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Configure Parent Proxy System  Configuration  Parent Proxy Configure to use an upstream parent proxy server © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 51. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default Internet Access Policy The Network Configuration Wizard requires you to configure the Default Internet Access Policy © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 52. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default Internet Access Policy • ‘Monitor Only’ Policy: – Allows LAN to WAN traffic. – Allow all outbound traffic without any authentication. – No scanning. – No content filtering. • ‘General Internet’ Policy: – Allow all outbound traffic without any authentication. – Web traffic will be scanned for virus / malware / spyware. – Content filtering will be “ON” by using default content filtering policy “General Corporate Policy” which blocks below web URL categories: • Porn, Nudity, Adult Content, URL Translation Sites, Drugs, Crime and Suicide, Gambling, Militancy and Extremist, Phishing and Fraud, Violence, Weapons – It is the default selected policy. • ‘Strict Internet’ Policy: – Block all outbound unauthenticated traffic. – Web traffic will be scanned for virus / malware / spyware. – All traffic will be scanned by IDP engine. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 53. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Registration © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 54. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management What is registration? Registration is process which will create customer account in Cyberoam central registration database. Why to register? Registration is mandatory task as without this subscription modules cannot be subscribed. Registration gives following benefits: • 8 x 5 Support as per country time zone for next one year. • Free trial of following Cyberoam Subscription Modules: • Gateway Anti-Virus & Gateway Anti-Spam • Web & Application Filter • Intrusion Prevention System (IPS) • Access of customer my account for • Support ticket management • Subscription management Customer my account can be accessed from: http://customer.cyberoam.com Multiple Cyberoam appliances can be registered using same customer account so that customer can manage all support tickets under one customer account. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 55. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management LABS • Lab #1 Factory Reset • Lab #2 Deployment in Bridge Mode (Optional) • Lab #3 Deployment in Gateway Mode • Lab #4 Registration, Upgradation & Subscription © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 56. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Firewall Agenda: • Access Control (Appliance Access) • IP Management • Firewall Management • Default Firewall Rules • L2 Firewall support • Outbound NAT (Source NAT) • Inbound NAT (Virtual Host) • Denial of Service (DoS) • Cyberoam Unified Threat Control under Firewall © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 57. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Appliance Access System  Administration  Appliance Access © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 58. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Appliance Access (via Zones) Network  Interface  Zone © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 59. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IP Management Network  Interface View port wise network (physical interface) and zone details. If virtual sub-interfaces are configured for VLAN implementation, they are also nested and displayed beneath the physical interface. Interface - Physical interfaces/ports available on Cyberoam. If virtual sub-interface is configured for the physical interface, it also displayed beneath the physical interface. Virtual sub-interface configuration can be updated or deleted. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 60. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Firewall Management © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 61. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Zone Management Zone Types LAN : The Internal and most secure zone. WAN : The external, no-control and non-reliable zone. DMZ : The secured publicly accessible server zone. Local : All ports of the Cyberoam Appliance fall in this zone. VPN : It is the only zone that does not have an assigned physical port/interface. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 62. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Zone Mangement Network  Interface  Zone © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 63. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Service Management Objects  Services  Add Cyberoam provides several standard services and allows creating: • Customized service definitions • Firewall rule for Customized service definitions © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 64. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Manage Firewall Rules © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 65. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default Firewall Rules • Cyberoam creates two ‘Default Firewall Rules’ when it is first deployed in any of the two operational modes • These rules depend on the operational mode and the ‘Default Internet Access Policy’ selected while running the network configuration wizard. • The default rules can be edited by the administrator but cannot be deleted. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 66. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Default Firewall rule #2 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 67. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Default Firewall rule #1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 68. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management L2 Firewall Support • In Cyberoam MAC address (Machine Address) is a decision parameter along with identity and ip address for the firewall policies. • All normal firewall policies like Web filter, Application filter, AV, IPS, QoS policy etc can be applied on the MAC firewall rule. • Eg: For any server running on dynamic IP Address, we can create a firewall rule to allow that server through firewall using MAC © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 69. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Add MAC based host Objects  Hosts  MAC Host  Add Note: MAC based hosts can be added on the fly while creating firewall rules as well. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 70. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Firewall rule for MAC host © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 71. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management NAT (Outbound NAT) • What is NAT – Cyberoam has a predefined NAT policy called MASQ that NATs the outgoing traffic with the outgoing port’s IP Address – Use NAT when you want to do map a specific outbound traffic with a specific IP/IP Range – Cyberoam allows to create a NAT policy, which can be bound to a firewall rule. • Example – Mail server is configured in DMZ zone with private IP address & traffic generated from Mail server should be NATed with specific Public IP i.e. 121.22.141.250 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 72. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Add NAT Policy Firewall  NAT Policy  Add © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 73. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Add firewall rule to include NAT policy Firewall  Rule  Add © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 74. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Virtual Host (Inbound NAT) • Virtual Host is required to make internal resources available on the internet like web servers or mail servers configured in LAN or DMZ. • Virtual Host maps services of a public IP address to services of a host in a private network. In other words it is a mapping of public IP address to an internal IP address. • This virtual host is used as the Destination address to access LAN or DMZ servers. • Virtual Host is an object where we map few or all services of a public IP address to few or all services on an internal host. • Example: Webserver configured in LAN zone with 192.168.1.157. From internet users are accessing www.abc.com which is resolving on 154.146.25.37. Let’s see how to make webserver available on Internet. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 75. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Add Virtual Host Firewall  Virtual Host  Add © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 76. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Add Firewall rule to include the Virtual Host © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 77. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Loopback Firewall rule Once the virtual host is created successfully, Cyberoam automatically creates a loopback firewall rule for the zone of the mapped IP address. Loopback firewall rule is created for the service specified in virtual host. If port forwarding is not enabled in virtual host then firewall rule with “All Services” is created. Loopback rules allow internal users to access the internal resources using its public IP (external IP) or FQDN. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 78. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Port Forwarding concept Example: We have one public IP 154.146.25.37. In the DMZ, we have connected multiple servers like Web Server (192.168.1.157), FTP Server (192.168.1.158) and RDP Server (192.168.1.159). We want to publish all these servers using only one public IP 154.146.25.37. In this case, we will use Port Forwarding while configuring the Virtual Host. We will have to create 3 Virtual Hosts for above 3 servers with same external IP and different Internal IP addresses, with port forwarding. We have already created a Virtual Host for the Web Server with port 80, now we will create remaining two Virtual Hosts for FTP and RDP. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 79. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Creation of Virtual Hosts © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 80. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Creation of Firewall Rules © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 81. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Denial of Service • What is Denial of Service • How does Denial of Service Happen • Effects of Denial of Service © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 82. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Types of DoS attacks • SYN Flood • UDP Flood • TCP Flood • ICMP Flood © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 83. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management DoS protection settings • How many connections is each LAN host generating (take an average)? • Multiply that by the number of hosts in your network. • Destination based checking of DOS attacks should be disabled unless you suspect that there is a host inside your network generating a DOS attack. • Turn off checking for TCP flood unless specifically instructed by the Cyberoam Support Staff © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 84. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management DoS Configuration Firewall  DoS © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 85. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Unified Firewall Controls Cyberoam’s unified firewall controls include: • Web Filter • Application Filter • IPS Policy • QoS Policy • IM Scanning • Anti Virus & Anti Spam Scanning • Route through Gateway © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 86. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Unified Threat Control’s in firewall rule © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 87. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management LABS • Lab #5 Securing the Appliance • Lab #6 Create a DROP firewall rule for your machine’s IP address • Lab #7 Create a ACCEPT firewall rule for your machine’s IP address. • Lab #8 Create Schedule & Apply in Firewall Rule • Lab #9 Enable / Disable Anti-Virus & Anti-Spam Scanning • Lab #10 Test Anti-Virus Scanning • Lab #11 Create Firewall Rule to Allow DNS Traffic • Lab #12 Create Virtual Host to Publish a RDP Server residing in the LAN • Lab 13# Create MAC based host for Dynamic web server and create MAC based firewall rule © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 88. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management User Authentication Agenda: • Local & External Authentication • Authentication Settings • Type of Authentication • Single Sign On Concept • Identity Based Policy • Group Management • User Management • Identity Based Firewall • Traffic Discovery • Lab © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 89. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Local Authentication Flow User Authentication process initiates, when the client tries to authenticate. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 90. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management External Authentication Flow © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 91. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Authentication Servers Identity  Authentication  Authentication Server © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 92. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Authentication Settings Identity  Authentication  Firewall © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 93. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Authentication Settings Identity  Authentication  VPN © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 94. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Authentication Settings Identity  Authentication  Admin © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 95. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Authentication Methods Normal - Captive Portal - Corporate client Windows: http://download.cyberoam.com/solution/optionals/Corporateclientsetup.exe Windows (Vista & Windows 7 – 32 bit): http://download.cyberoam.com/solution/optionals/Corporateclientsetup_vista_win7. Clientless - No Authentication Required Single Sign On - Authentication is done in sync with user’s authentication in domain © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 96. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Single Sign On Flow (SSO) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 97. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Identity Based Policies © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 98. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Surfing Quota Policy • Surfing Quota Policy defines the duration of Internet surfing time. • It is the allowed time in hours for a group or an individual user to access Internet. • Cyberoam lets you define customized policies to define different levels of access for different users to meet your organization’s requirements. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 99. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Access Time Policy • Access Time Policy defines the time period during which users can be allowed/denied the Internet access. Viz. Only office hours access. • It enables to set time interval – days and time for internet access with the help of a Schedule. • Two strategies can be define: - Allow Strategy - allows access during the schedule - Deny Strategy - disallows access during the schedule © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 100. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Web & Application Filter • Web Filter Policy controls user’s web access. It specifies which user has access to which sites and allows defining powerful security policies based on almost limitless policy parameters like Individual users, Groups of users, Time of day, Location/Port/Protocol type, Content type, Bandwidth usage (for audio, video and streaming content). • Application Filter Policy controls user’s application access. It allows administrator to control access to applications based on almost limitless policy parameters like Individual users, Groups of users, Time of day. •Default web & application filtering policy is based on LAN➞WAN policy selected while running “Network Configuration Wizard”. •Applying default policy allows all the users to surf without login depending on the default policy applied and web surfing reports are generated on IP address as user has actually not logged on to Cyberoam. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 101. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Web Filter  Policy Add © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 102. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Application Filter  Policy  Add © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 103. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management QoS Policy •The primary objective of QoS Policy is to manage and distribute total bandwidth on certain parameters and user attributes. •It allocates and limits the maximum bandwidth usage of the user and controls web and network traffic. Policy can be defined/created for: •User - To restrict bandwidth of a particular user. Can be applied to a user’s profile. •Firewall Rule – This policy can be applied in the firewall rule only. Bandwidth restriction will be enforced on the traffic matching the firewall rule. •Web Category – To apply bandwidth restrictions on custom or default web categories. Policy can only be assigned to custom or default web categories. •Application – To restrict bandwidth for particular application. You need to go to application category, and apply bandwidth restriction. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 104. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management QoS  Policy  Add © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 105. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Data Transfer Policy • The primary objective of this policy is to restrict the users to upload and download anything from the internet. • Limits data transfer on a cyclic or non-cyclic basis. • Single policy can be applied to number of Groups or Users. • Data transfer restriction can be based on: Total Data transfer (Upload + Download) Individual Upload and/or Download © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 106. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Group Management • Group is a collection of users having common policies that can be managed as a single unit. • Its a mechanism of assigning various policies to a number of users in one operation/step. • It simplifies the user configuration. • Users that belong to a particular group are referred to as a group user. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 107. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Group Types: • Normal A user of this group need to logon to Cyberoam using the Cyberoam Client to access the Internet • Clientless A user of this group need not logon to Cyberoam using the Cyberoam Client to access the Internet. Access control is placed on the IP address, which is represented as Group name (C) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 108. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management User-MAC binding The Feature: Binds a user to a physical machine. Benefit: Will prevent anyone from ‘impersonating’ someone else even if they have changed their IP address. Details: User can login to Cyberoam and use the internet only from his/her own computer. User will not be able to login from any other computer and no one else will be able to login from his/her computer. NOTE: User MAC binding feature is available only when user authenticates on Cyberoam using the corporate client (Windows/Linux). © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 109. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management User-MAC binding © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 110. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Identity based firewall rules Normal Firewall Cyberoam - Identity Based UTM • Rule matching criteria - Source address - Destination address - Service (port) - Schedule - Identity • Action - Accept - NAT - Drop - Reject • Unified Threatin DHCP, Wi-Fi Rule Matching Criteria) However, fails Controls (per environment - IPS Policy - Web Filter Policy - Application Filter Policy - QoS Policy - Anti Virus & Anti Spam - Routing decision © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 111. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management LABS • Lab #14 Enforce Authentication • Lab #15 How to authenticate users through Captive Portal/Cyberoam Corporate Client • Lab #16 Create Custom Policies • Lab #17 Create Group, User and apply Custom Policies • Lab #18 Monitor User Activities • Lab #19 Single Sign On Implementation with Active Directory (Optional) • Lab #20 Customise HTTP Login Page © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 112. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Content Filter Agenda: • Basics of Content Filter • Cyberoam Content Filter Features • Content Filter Categories • Content Filter Policies • Custom Category • Custom Denied Message • Upgrade • Safe Search capability to filter Adult Content © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 113. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Basics of Content Filter © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 114. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Web & Application Filtering Features Database of millions of sites in 82+ default categories. Blocks phishing, pharming, spyware URLs. Data Leakage Prevention (HTTP upload control & reporting).  Block & Control Applications such as P2P, Streaming, Videos/Flash  Local Content Filter Database to reduces latency and dependence on network connectivity. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 115. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Web & Application Filtering Features  Google content categorization based on user policy:  Cache Pages  Translated Pages (http://translate.google.com)  Enforcement of Google Safe Search Based on User Policy.  Customized blocked message to educate users about organizational policies and reduce support calls © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 116. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Web Categories Web Filter  Categories © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 117. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Content Filter Policies • Web Filter Policy controls user’s web access. It specifies which user has access to which sites and allows defining powerful security policies based on almost limitless policy parameters like: Individual users, Groups of users, Time of day, Location/Port/Protocol type, Content type, Bandwidth usage (for audio, video and streaming content) • Application Filter Policy controls user’s application access. It specifies which user has access to which applications and allows defining powerful security policies based on almost limitless policy parameters like: Individual users, Groups of users, Time of day • IM (Instant Messaging) allows to configure and manage restrictions on instant messaging services provided by the Yahoo and MSN messengers. The traffic coming from the web in form of files and chat is filtered by various rules and content filtering strategies. You can add an IM contact or IM contact group for configuring rules. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 118. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default Web Filter Policies Default Application Policies © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 119. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Safe Search Capability • Benefit: Complete control on what turns up in Google and Yahoo search result. Capability to filter Adult Content related search. • Details: If enabled, web sites containing pornography and explicit sexual content are blocked from the Google and Yahoo search results. This will be applicable only when access to Porn, Adult Content and Nudity categories is denied in Internet Access policy. Web Filter  Settings © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 120. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Filtering Adult Content in case Safe Search is enabled © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 121. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Policy • This policy allows administrator to enforce restrictions on instant messaging services provided by Yahoo and MSN messengers. • Possible to log & filter IM chat messages & files transferred. • This policy can be applied to a user, group of users, IM contacts, IM group contacts in any combinations. • Three configuration options available: 1. IM contacts 2. IM rules 3. Content Filter © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 122. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Contacts IM  IM Contacts  Add • IM Contact is used to register various Yahoo and MSN messaging application users. • A Contact can be created for a user having access any of the two IM applications. Along with the contacts, IM Contact Groups can also be created. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 123. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Rules (Login) IM  IM Rules  Login • Login page allows you to configure and manage login rules for IM Contact, IM Contact Group, User and User Group. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 124. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Rules (Conversation) IM  IM Rules Conversation • Conversation page allows to configure and manage conversation rules between any of the two identities: IM Contact, IM Contact Group, User and User Group. The IM conversation between these two contacts can be monitored and logged. • Cyberoam provides a default conversation rule that can be applied. This rule allows all the conversations but logs the content of the conversation. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 125. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Rules (File Transfer) IM  IM Rules  File Transfer • File Transfer page allows to configure and manage file transfer rules between any of the two identities. The files transfers between these two identities is monitored and logged. • If file transfer access between contacts is restricted and contact tries to transfer a file, an access restriction message is displayed in the conversation window. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 126. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Rules (Webcam) IM  IM Rules  Webcam • Webcam page allows to configure and manage webcam rules between any of the two identities. • If video conversation access between contacts is restricted and the contact tries to use the webcam, an access restriction message is displayed in the conversation window. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 127. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Content Filter IM  Content Filter • Content Filtering feature in Cyberoam is applied to Instant Messaging applications wherein content can be removed from the conversation if encountered. • Content Filter page allows you specify list of keywords and regular expressions to be blocked, if encountered in any of the chat conversation. These configured keywords are removed and an error message is displayed for the same. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 128. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IM Scanning on Firewall rules • After the IM Contacts, Rules and Content Filter are configured, one needs to enable IM Scanning on the Firewall rule, so that all the messaging applications’ traffic is scanned. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 129. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateway Anti-Virus / Anti-Spam Agenda: • Gateway Anti-Virus Features • Basics of Virus / Spyware / Malware / Phishing • Mail Anti-Virus Configuration • FTP Anti-Virus Configuration • Web Anti-Virus Configuration • Gateway Anti-Spam Features • Basics of Spam • Basics of Anti-Spam Technologies • Cyberoam RPD Technology • Anti-Spam Policies • Anti-Spam Rules • Upgrade • Reports © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 130. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateway Anti-Virus Features  Scans WEB, FTP, Pop3, SMTP, IMAP & HTTPS traffic(Bidirectional:Upload & Download)  Self-service quarantine area  Signature update ever 30 Mins  Identity-based HTTP virus reports  Disclaimer Addition to outbound emails  Spyware and other malware protection including “Phishing” emails  Block attachment based on Extensions (exe, .bat, .wav etc) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 131. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Anti Virus General Configuration Anti Virus  Mail  Configuration © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 132. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management SMTP Scan Policy •Default SMTP policy is applicable for all SMTP traffic defined in the Scan Rules. •Cyberoam allows you to define multiple policies instead of single blanket policy. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 133. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default SMTP scanning rule Anti Virus  Mail  SMTP Scanning Rules The default rules scans emails from any sender / recipient. Apply scanning in the appropriate firewall rule to scan incoming & outgoing emails. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 134. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Custom SMTP rules Anti Virus  Mail  Address Groups  Add Use address group to create custom rules The above custom rule will block all executable attachments for the recipient sales.manager@abc.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 135. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management POP3 Scan Policy • Strips the virus infected attachment from the message • The message body is replaced with a notification message • Provides an option to delete the mail from the server © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 136. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IMAP Scan Policy • Strips the virus infected attachment from the message • The message body is replaced with a notification message © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 137. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management FTP Scan Policy File Size Threshold • Files that exceed configured threshold will not be scanned © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 138. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management How does Cyberoam HTTP AV work? Blocks all virus infected files being downloaded Cyberoam Virus Definition includes - Viruses - Worms - Trojans & Spyware - Hacker Utilities - Malware How does it help? - Blocks spyware not only from spyware sites but also from innocent sites - Malware being stopped at gateway level © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 139. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management HTTP Antivirus Configuration Anti Virus  HTTP  Configuration Anti Virus  HTTP/S  HTTP Scanning Rules Anti Virus  HTTP/S  HTTPS Scanning Rules © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 140. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management HTTP Antivirus Configuration Anti Virus  Quarantine © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 141. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateway Anti-Spam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 142. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateway Anti Spam Features  IP Reputation Filtering to block 85% of incoming messages at entry-point even before these messages enter the network.  Spam filtering with (RPD) Recurrent Pattern Detection technology  Virus Outbreak Detection (VOD) for zero hour protection  Self-Service quarantine area  User based Spam Digest  Change recipients of emails  Scans SMTP, POP3, IMAP traffic  Content-agnostic  5GB of disk space is reserved for both Antispam and Anti virus Quarantine. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 143. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam RPD (Recurrent Pattern Detection) Technology  Protects against Image-based Spam and spam in different languages  The spam catch rate of over 98%  1 in Million false positives in spam  Local cache is effective for >70% of all spam resolution cases © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 144. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Spam Detection Process © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 145. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IP Reputation • It dynamically classifies and reclassifies the reputation of each source IP and maintains a database of addresses used spammers and legitimate mailers. • It fights the unwanted mail at the perimeter, reducing the incoming spam messages at the entry-point, before these messages enter the network resulting into reduced system resources and bandwidth usage. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 146. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Enabling IP Reputation • Feature available as “Verify Sender’s IP reputation” (Anti Spam  Configuration) in the Web Admin Console. • If enabled, Cyberoam dynamically checks the sender IP address and rejects the SMTP connection if IP address is found to be responsible for sending spam mails. • As it is a global option, if spam scanning is enabled, all the mails will be first subjected to IP reputation filtering followed by filtering based on actions configured in spam policy. • If above mentioned option is not visible in the Web Admin console , one is required to purchase a new license of Gateway Anti Spam module and re-subscribe the module with the key. The new key enables both RPD & IP Reputation filtering. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 147. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Enabling IP Reputation Anti Spam  Configuration © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 148. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Global Spam Digest Settings Anti Spam  Quarantine  Spam Digest Settings Set the email frequency & from email address. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 149. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Enable User based Spam Digest Enable Spam Digest settings on user or group level. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 150. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management User Quarantine Area © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 151. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management User My Account Quarantine Mails Virus © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 152. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management User My Account Quarantine Mails Spam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 153. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Spam Digest Settings © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 154. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Few On-appliance Mail Reports Mail Usage Report: Top Mail Senders iView the open source reporting software powered by Cyberoam is integrated as the Cyberoam’s on-appliance reporting tool starting with Version X. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 155. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Few On appliance Mail Reports Spam Report: Top Applications used for Spam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 156. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management On appliance Mail Reports Anti Virus Report: Top Viruses © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 157. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Intrusion Prevention System (IPS) Agenda: • IPS Basics • Cyberoam IPS Features • IPS Signatures • IPS Policies •Reports © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 158. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Introduction to IPS IPS acts as the Second layer of defense, It scans the traffic that has been allowed by the firewall for threats. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 159. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam IPS Features • Cyberoam has more than 4500 signatures in its database. • One can create custom IPS signatures • Possible to create multiple IPS policies. • Signatures in the database are organized in categories such as DNS, Finger, SMTP, DDOS, etc. • One can customize the IPS policy by enabling/disabling individual signatures or categories. Hence reducing the load on Cyberoam. • Possible modes (action) for each IPS Signature: Drop OR Detect. With Drop mode the IPS engine can be configured to act as a IDS (Intrusion detection system). © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 160. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default IPS Policy IPS  Policy IPS  Policy  General Policy Cyberoam offers four pre-defined policies to choose from. General Policy, LANtoWAN strict, LANtoWAN general & DMZ policy. Seen above are the signature categories. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 161. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IPS Reports Reports  Attacks (IPS) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 162. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Virtual Private Network (VPN) Agenda: • Cyberoam VPN Features • Cyberoam VPN Technology Comparison • Cyberoam SSL VPN • Labs © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 163. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam VPN Technology Comparison Matrix • The following table compares all VPN Technologies supported by Cyberoam and will help to make decision which VPN Technology to be used VPN Security level Deployment Requirement Technology IPSec High This can be deployed in Remote Access and Site-to-Site scenario. In case of Remote Access, Cyberoam VPN Client is required and it’s a licensed product. In case of Site-to-Site, Cyberoam is compatible with all major VPN Gateways those supports standard IPSec architecture. SSL-VPN High This can be deployed in Remote Access or can be used as a web based portal without installing any SSL-VPN client SSL-VPN client is free of cost. L2TP High This can be deployed in Remote Access scenario only. No third party VPN client required as Windows 2000 onward all OS have inbuilt L2TP VPN Client. PPTP Moderate This can be deployed in Remote Access scenario only. No third party VPN client required as all windows OS have inbuilt PPTP VPN Client. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 164. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam VPN Features  Cyberoam supports SSL-VPN, IPSec, L2TP & PPTP  Threat Free Tunneling (TFT)  VPN Firewall Management  VPN Bandwidth Management  VPN Protection – Antivirus / Antispam / IPS / Web & Application Filtering / DoS  VPN Topologies:  Remote Access, Site to Site  Hub & Spoke  Branch Office Internet Traffic Tunneling over VPN  Inter Branch Office Communication  VPN Failover  Main Mode / Aggressive Mode  Identity based VPN control using xAuth  Local digital certification authority (CA) and support external CA Cyberoam supports MS-CHAPV2/Encryption over both L2TP as well as PPTP connection. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 165. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Basic VPN Deployments Remote Access • It is a user-to-internal network connection via a public or shared network. • Connection is made by field agents using remote computers and laptops without static IP address. • All (IPSec, L2TP and PPTP) VPN technologies support this deployment. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 166. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Basic VPN Deployments Site-to-Site (Intranet/Extranet) • Used to extend a company’s existing network to other buildings & sites so that these remote employees can utilize the same network services. • Used to establish secure network connection between two or more companies in order to share a computing environment. • Only IPSec VPN technology supports this deployment. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 167. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management TFT- Threat Free Tunneling • IPSec / L2TP / PPTP VPN traffic can be controlled through firewall • Virus and spam scanning • Intrusion check i.e. apply IPS policy • VPN access can be configured and restricted to Networks, IP address ,Services and Users. • Content Filtering • Bandwidth Management © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 168. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default VPN Zone Network  Interface  Zone Being a zone based firewall, Cyberoam creates the VPN zone which is used while creating firewall rules to control VPN traffic. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 169. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default VPN Zone Creation of firewall rules using the VPN zone. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 170. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management VPN Configuration & TFT © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 171. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IPSec (Remote Access) VPN  IPSec Connection © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 172. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management IPSec (Site-to-Site) VPN  IPSec  Connection © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 173. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management L2TP VPN  L2TP Configuration © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 174. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management L2TP VPN  L2TP  Connection © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 175. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management PPTP VPN  PPTP © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 176. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Default VPN firewall rules © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 177. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management On-Appliance SSL VPN • Cyberoam VPN includes SSL VPN functionality within the appliance to provide secure access for the remote users. • Easier to use and control to allow access to the Corporate network from anywhere, anytime. • Any device that has browser can access SSL VPN. • It provides the ability to create point-to-point encrypted tunnels between remote employees and your company’s internal network. • It requires a combination of SSL certificates and a username/password for authentication to enable access to the internal resources. • To restrict the access to the Corporate network, it operates in two modes: Full Access and Web Access mode. • User’s access to private network is controlled through his SSL VPN policy while Internet access is controlled through his Internet Access policy. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 178. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam SSL-VPN Features  Client and Location independent access  Authentication - AD, LDAP, RADIUS, Cyberoam  Multi-layered Client Authentication - Certificate, Username/Password  User & Group policy enforcement  Network access - Split and Full tunneling  End user Web Portal - Clientless access  SSL VPN Tunneling Client - Granular access control to all the Enterprise Network resources  Administrative controls: Session timeout, Dead Peer Detection,  Portal customization • The SSL VPN feature would not be a chargeable module and would be enabled by default in all appliances 25i, 50i,100i, 200i, 300i, 500i, 1000i and 1500i. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 179. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 180. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Global Setting page allows you to configure certain parameters globally for both the type of Access Select protocol TCP or UDP from the dropdown list. Selected network protocol will be the default protocol for all the SSL VPN clients. Connection over UDP provides better performance. Specify the range of IP addresses reserved for the SSL certificate from the dropdown list to be SSL Clients. SSL used for authentication. If you do not have clients will be certificate leased IP address from the configured pool. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 181. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management SSL-VPN Modes Web Access, Application Access & Full Access Mode – Web Access mode & Application Access mode ( Web based or clientless ) • Does not require any client to be installed • Can be accessed using browser • Limited to use on web resources only – Full Access mode ( Client mode ) • Require client to be installed • Works in two modes – Split Tunnel » Allows access to only defined network resources in the policy – Full Tunnel » Routes all traffic to Cyberoam, internet through HO » Allows access to only defined internal network resources » Full access to WAN © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 182. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Web Access Mode SSL VPN  Bookmarks • Any Bookmark, which is of type http or https, is used to publish web resources (http & https) and can be made available using the end-user portal. • These resources will be available in “Web Access” mode only and is to be configured in SSLVPN Policy. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 183. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Bookmarks for Application Access Mode SSL VPN  Bookmarks © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 184. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Select the access mode by clicking SSL-VPN Policy Creation on appropriate mode Select Tunnel type Accessible Resources Web based Bookmarks Application based Bookmarks © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 185. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management SSL-VPN Portal SSL-VPN users authenticate on the portal with their username/password. If Cyberoam is integrated with external authentication server, the user needs to enter the credentials accordingly. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 186. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management SSL-VPN Portal (Welcome Page) Once logged into the portal the users get access to the bookmarks & the link to download the configuration file required for tunnel mode access. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 187. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management • Lab #22 IPSec Remote Access Configuration using Pre-Shared Key • Lab #23 IPSec Net to Net Configuration using Pre-Shared Key • Lab24# Create L2TP Tunnel allowing the tunnel users to access only web services of Intranet in LAN enabling the DMZ IPS policy. • Lab#25 Create PPTP Tunnel allowing the tunnel users to access only web services of Internal network in LAN enabling the DMZ IPS policy. • Lab 26# Create Global policy for SSL VPN using self signed certificates for client and sever. • Lab 27#Create an SSL VPN tunnel with Web access applying it to user with access only to Intranet. • Lab 28# Create an SSL VPN tunnel with Full access in split tunnel mode applying it to Manager User giving access to the internal network. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 188. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Multilink Manager Agenda: • Cyberoam Multilink – An Introduction • Gateway Management • Active-Active load balancing and Gateway failover • Active-Passive Gateway Failover failover © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 189. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Multi-Link- An Introduction Introduction: • In a typical organization scenario, multiple WAN links may be required to be deployed. • Organizations may want to take advantage of multiple links to increase performance by maintaining high uptime. Benefits: • Active-Active load balancing and gateway failover It balances traffic between various links, optimizes utilization and thereby assist in cutting operating cost. • Active-Passive Gateway Failover Provides the link failure protection • Automatic ISP Failover Detection It detects link failure and passes the traffic to operating link. • High Uptime Improves performance because of high uptime. • Bandwidth Scalability Facilitates increased bandwidth scalability © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 190. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Multilink Configuration © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 191. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Multi-Link- How it works Cyberoam does load balance using Weighted Round Robin (WRR) Load balancing is determined by the load metric i.e. Weight Cyberoam does load balance only on new connection Weight can be selected based on: • Weight can be decided on Link Capacity • Weight can be decided on Link Cost By Default all the Gateways are having weight as “1”, so Cyberoam will do the Load balancing in 1:1 across all Gateways’. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 192. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateway Management What needs to be done if Multiple ISP links are available? •Active-Active load balancing and gateway failover •Active-Passive gateway failover © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 193. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Active-Active load balancing and gateway failover © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 194. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Active-Active gateway load balancing Weight: 3 Weight: 1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 195. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Setup Gateway- Configure Weights Network  Gateway  Click on the gateway name By default Cyberoam assigns the weight as 1 to all the gateways configured using the initial network configuration wizard. One needs to change the weights of the gateway manually as shown above. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 196. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Active-Active gateway Failover •Depending on the weight, Cyberoam will select gateway for load balancing. •Cyberoam distributes traffic across links in proportion to the ratio of weights assigned to individual link. •This weight determines how much traffic will pass through a particular link relative to the other link. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 197. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Setup Gateway- Failover Rules Network➞ Gateway • Select Gateway and edit failover rule • Specify Communication protocol i.e. TCP, UDP, ICMP(Ping) • Specify Port number for communication • Specify Host © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 198. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Gateways configured as Active © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 199. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Enable load balancing in Firewall Rule © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 200. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Active-Passive Gateway Failover © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 201. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Active-Passive Gateway Failover The Feature: 3.Configure a redundant link on Cyberoam. 4.Configure multiple backup links. 5.Backup links for specific routes. Benefit: Provides the link failure protection © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 202. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Active-Passive Gateway Failover • Gateways with zero weight is the passive gateway • Administrator will have to define the failover condition for the passive gateway • Cyberoam periodically checks the health of the active gateway • If the gateway does not respond, based on the failover condition, traffic will be routed automatically through the passive gateway. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 203. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Backup gateway with failover condition Network  Gateway  Click on the gateway name A backup gateway is the one that can be used in an active/passive setup. The traffic is routed through Backup gateway only when Active gateway is down © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 204. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Automatic Failover Backup gateway will take over and traffic will be routed through backup gateway when any of the active gateway fails Backup gateway will take over and traffic will be routed through backup gateway when all the configured active gateways fail Backup gateway will take over and traffic Configure when the Backup gateway should will be routed through back up gateway if take over the active gateway. ISP1 gateway fails © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 205. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Manual Gateway Failover If you want Backup gateway to inherit the Administrator has to manually change parent gateway’s (Active gateway) weight the gateway if the active gateway fails. specify weight. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 206. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Enable Active-Passive gateway configuration through firewall rule Create a firewall rule for top management Route the traffic through one gateway Configure the another available gateway as Backup © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 207. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Routing Agenda: • Basics of Routing • Cyberoam Routing Features • Static Routing • Policy Based Routing • Source Based Routing • Dynamic Routing • Multicast Routing © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 208. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Basics of Routing • What is routing? • Routing Algorithm • Static versus dynamic • Single-path versus multi-path • Link state versus distance vector © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 209. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Routing Features Cisco Compliance CLI Interface: Cyberoam provide Cisco compliance CLI interface for routing configuration. Routing Support: • Static Routing • Policy Based Routing • Dynamic Routing: • RIPv1, RIPv2 • OSPF • BGP • Multicast Routing © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 210. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Static Routing Network  Static Route  Unicast The above example defines a static route where all requests destined for 4.2.2.2 will always be routed via 1.1.1.1 (Port B). This traffic will be dropped in case the interface is down. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 211. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Policy Based Routing Static routing method satisfies most of the requirements, but is limited to forwarding based on destination address only. Policy based routing is extended static routes which provide more flexible traffic handling capabilities. It allows for matching based upon source address, service/application, and gateway weight for load balancing. Hence, it offers granular control for forwarding packets based upon a number of user defined variables like: • Destination • Source • Application • Combination of all of the above © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 212. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Policy Based Routing With the above firewall rule all HTTP traffic from LAN-WAN will be load balanced. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 213. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Policy Based Routing With the above firewall rule all SMTP traffic from LAN-WAN will always be routed via ISP1. This traffic will be routed via ISP2 (backup) while ISP1 is down. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 214. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Source Based Routing Network  Static Route  Source Route Source Network routing allows Administrators to direct traffic generated from particular Network over designated links according to the business policies. When you define Source based routing for a particular subnet, all the traffic coming from that subnet will be forwarded to the defined Interface. All the traffic from network 192.168.1.0/24 will always be routed via ISP1 gateway © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 215. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Dynamic Routing - RIP Routing Information Protocol (RIP) is a distance-vector routing protocol documented in RFC 1058. RIP uses broadcast User Datagram Protocol (UDP) data packets to exchange routing information. The Cyberoam implementation of RIP supports: • RIP version 1 (as described in RFC 1058) • RIP version 2 (as described in RFC 2453) and Plain text and Message Digest 5 (MD5) authentication for RIP Version 2 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 216. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Dynamic Routing - OSPF OSPF (Open Shortest Path First) is one of IGPs (Interior Gateway Protocols). Compared with RIP, OSPF can serve much more networks and period of convergence is very short. OSPF is widely used in large networks such as ISP backbone and enterprise networks. The Cyberoam implementation of OSPF supports OSPF version 2 (as described in RFC 2328) and plain text and Message Digest 5 (MD5) authentication © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 217. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Dynamic Routing - BGP BGP (Border Gateway Protocol) is a path vector protocol that is used to carry routing between routers that are in the different administrative domains (Autonomous Systems) e.g. BGP is typically used by ISPs to exchange routing information between different ISP networks. The Cyberoam implementation of BGP supports Version 4 (RFC 1771), Communities Attribute (RFC 1997), Route Reflection (RFC 2796), Multi-protocol extensions (RFC 2858) and Capabilities Advertisement (RFC 2842) Additionally, a firewall rule is to be configured for the zone for which the BGP traffic is to be allowed i.e. LAN to LOCAL or WAN to LOCAL. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 218. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Dynamic Routing - Configuration Configuration of RIP, OSPF & BGP is beyond the scope of CCNSP and is a part of CCNSE curriculum. Please refer the document on Cyberoam knowledgebase sites for configuration: RIP: http://kb.cyberoam.com/default.asp?id=1000&SID=&Lang=1 OSPF: http://kb.cyberoam.com/default.asp?id=999&SID=&Lang=1 BGP: http://kb.cyberoam.com/default.asp?id=1001&SID=&Lang=1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 219. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Multicast Routing Cyberoam supports multicast traffic forwarding in both Gateway / Bridge Mode. Multicast forwarding is controlled by specifying static routes for multicast traffic. In Gateway mode, multicast forwarding needs to be enabled and then static routing needs to be configured. In Bridge mode, only multicast forwarding needs to be enabled. Multicast forwarding can be enabled and the mroutes can be added from both the GUI and console. Multicast routing configuration is beyond the scope of CCNSP and is a part of CCNSE curriculum. Refer knowledge base article for multicast routing configuration: http://kb.cyberoam.com/default.asp?id=1021&SID=&Lang=1 © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 220. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management General Administration Agenda: • Logging Management • Report Management • DNS Management • DHCP Configurations • Cyberoam Upgrade • Backup – Restore • Diagnostic Tools • Troubleshooting Tools • Debugging Tools © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 221. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management General Administration- Web admin console port settings System  Administration  Settings © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 222. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Role Based Administration System  Administration  Profile • Use Profile tab to create profiles for various administrator users. An administrator can have various levels of privileges and thus Cyberoam provides the facility of creating profiles. • All the profiles have a different level of access to Cyberoam Web Admin Console and CLI. • Default Admin Profiles: © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 223. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Role Based Administration System  Administration  Profile  Add To create a new administration profile. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 224. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Role Based Administration Attach a profile to a user. As per the above new user configuration, profile option is only activated if we set the user type as Administrator. Here, we have selected the user type as Administrator and we have selected the profile as we created in previous slide. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 225. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Logging Management Logs & Reports  Configuration  Syslog Servers  Add • Cyberoam provides extensive logging capabilities for traffic, system and network protection functions by sending the logs to a remote Syslog Server. • Detailed log information and reports provide historical as well as current analysis of network activity to help identify security issues and reduce network misuse and abuse. • The Cyberoam Syslog support requires an external server running a Syslog daemon on any of the UDP Port. • Cyberoam supports upto 5 Syslog servers. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 226. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Logging Management Logs & Reports  Configuration  Log Settings • Once you add the Syslog server, configure logs to be send to the Syslog sever. • If multiple servers are configured various logs can be send on different servers. • To record logs you must enable the respective log and specify logging location. Administrator can choose between on-appliance (local) logging, Syslog logging or disabling logging temporarily. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 227. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Report Management • One of the best features of Cyberoam is the on-appliance User-based reporting. Cyberoam reports are generated and stored on local hard drive of the appliance. • The Cyberoam comes pre loaded with iView – Intelligent Logging & Reporting • The reports are available in various formats like: • Tabular, Graphical, Printer Friendly and CSV. • Comprehensive on-appliance user-based reporting for all the UTM features including: • Web surfing reports, Anti-virus & Anti-spam report, Intrusion Detection and Prevention reports along with VPN reports, Data Transfer reports, Web Trend reports for analysis and Compliance reports and Appliance Audit reports for Organization Auditing. UTM Device Software / Device © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 228. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Report Management Logs & Reports  View Reports The administrator can also configure to receive pre-defined reports via email on a daily or a weekly basis. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 229. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Sample Reports: User Wise Reports © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 230. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Sample Reports: Blocked Attempts Report © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 231. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Sample Reports: Application Group Report © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 232. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Sample Reports: Top Web Users Report © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 233. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management DNS Management Network  DNS • The Domain Name System (DNS) is a system that provides a method for identifying hosts on the Internet using alphanumeric names called fully qualified domain names (FQDNs) instead of using difficult to remember numeric IP addresses. In other words, it translates domain names to IP addresses and vice versa. • DNS server is configured at the time of installation. You can also add additional IP addresses of the DNS servers to which Cyberoam can connect for name resolution from GUI. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 234. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management DHCP Configurations Network  DHCP • DHCP can only be configured in Gateway mode. • Cyberoam acts as a DHCP server and assigns a unique IP address to a host, releases the address as host leaves and re-joins the network. • • Host can have different IP address every time it connects to the network. • Cyberoam can act as a Relay Agent also. • It allows to configure Cyberoam’s Internal Interface as a DHCP relay agent, view the list of interfaces configured to serve as a DHCP relay agent, and delete agent. • Cyberoam can act as a DHCP server with IP Reservation feature. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 235. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management DHCP Server Configuration Network  DHCP  Server (Dynamic) DHCP Configuration for dynamic lease. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 236. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management DHCP Server Configuration Network  DHCP  Server (Static) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 237. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management DHCP Relay Configuration Network  DHCP Relay • The DHCP Relay Agent allows to place DHCP clients and DHCP servers on different networks. • The DHCP Relay Agent enables DHCP clients to obtain IP addresses from a DHCP server on a remote subnet, or which is not located on the local subnet. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 238. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Static ARP Network  ARP • ARP traffic is enabled on Cyberoam interfaces by default • Static ARP entry allows to bind the MAC address to the designated IP address. • It will also remove any dynamically cached references to that MAC address that might be present, and will not allow additional static mappings of that MAC address. Specify IP address of the host outside the firewall Specify MAC address of the host Click checkbox to add the MAC/IP pair in the trusted list © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 239. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Manage ARP Network  ARP © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 240. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management NTP configuration for time synchronization System  Configuration Time © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 241. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management NTP configuration for time synchronization (Wizard) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 242. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Backup-Restore Management System  Maintenance  Backup & Restore • Once the backup is taken, you need to upload the file for restoring the backup. • Restoring data older than the current data will lead to the loss of current data. • The restore facility is version dependent, it will work only if the backup and restore versions are the same. Also, if HA is configured, you need to disable HA before restoring the backup. • Upload the backup file: System  Maintenance  Backup & Restore • After upload, log on to Console based Administration (using TELNET) Go to Option 5 – Cyberoam Management > Option 6 – Restore Backup and follow screen steps to restore data. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 243. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Diagnostic Tools • Analytical Tool checks the health of the System in a single shot. It is used for troubleshooting and diagnosing problems found in the System. • Analytical Tool is like a periodic health check up that helps to identify the impending System related problems. After identifying the problem, appropriate actions can be taken to solve the problems and keep the System running smoothly and efficiently. • Analytical Tool shows the status of System. Based on the status, Administrator can judge whether the respective System component is working fine (OK Status), is facing a minor problem (Warning Status) or is having a major problem (Critical Status). © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 244. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Diagnostic Tools: Services Status System  Maintenance  Services © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 245. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Diagnostic Tools: System health graphs System  System Graphs © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 246. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Troubleshooting: Log Viewer Logs & Reports  Log Viewer Event Viewer page allows to view the live logs for event modules like: •IPS •Web Filter •Anti Spam •Anti Virus •Firewall •IM This page gives concentrated information about all the events that occurred under respective modules. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 247. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Log Viewer Logs & Reports  Log Viewer  Web Filter © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 248. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Log Viewer Logs & Reports  Log Viewer  IM © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 249. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Log Viewer Logs & Reports  Log Viewer  Anti Virus © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 250. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Packet Capture System  Packet Capture •Packet capture displays dropped packets details on the specified interface. It will provide connection details and details on which module is dropping packets e.g. firewall, IPS along with information like firewall rule number, user, Web and Application Filter policy number etc. • This will help Cyberoam administrators to troubleshoot errant firewall rule. © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 251. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Support Resources Agenda: • On Appliance Help • Online Resources • Customer My Account • Partner Portal • Support Contact © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 252. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management On Appliance Help © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 253. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Knowledge Base (http://kb.cyberoam.com) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 254. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Knowledge Base (http://docs.cyberoam.com) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 255. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Cyberoam Security Center (http://csc.cyberoam.com) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 256. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Customer My Account (http://customer.cyberoam.com) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 257. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Customer My Account (http://customer.cyberoam.com) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 258. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Partner Portal (http://partner.cyberoam.com) © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 259. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Presales Offerings Presales Program includes: • Product Awareness Programs • Technical Trainings • Product Updates (New Releases) • Comparison Discussions • Presales Case Discussions • Exclusive assistance in Tendering & Compliances • Exclusive assistance during critical / important deployments © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 260. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Presales Contact Details Email Support: Chat support: http://www.cyberoam.com/presalessupport © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 261. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Postsales Contact Details For any technical assistance, contact us through: • Web Support: • Customers: http://customer.cyberoam.com • Partners: http://partner.cyberoam.com • Chat Support: http://www.cyberoam.com/contactsupport.html • Email Support: support@cyberoam.com • Telephonic Support © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.
  • 262. Cyberoam Cyberoam- Certified Network & Security Professional (CCNSP) Cyberoam Unified Threat Management Thank You training@cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Editor's Notes

  • #8: 50 % of security problems originate from internal threats – Yankee Group.
  • #12: Cyberoam firewall is the only UTM firewall that embeds user identity in firewall rule matching criteria, enabling enterprises to configure policies and identify users directly by the username rather than through IP addresses. Cyberoam’s powerful hardware firewall provides stateful and deep packet inspection, access control, user authentication, network and application-level protection.
  • #35: NOTE: Two AC Power Cables in Case of 1000i & 1500i Appliance
  • #58: help
  • #60: help
  • #61: help
  • #64: help
  • #67: The Essential information needed to create a firewall rule in Cyberoam, a source zone and host, destination zone and host , the service (protocol) schedule and action (Accept , reject, drop).Check the help .
  • #68: The Essential information needed to create a firewall rule in Cyberoam, a source zone and host, destination zone and host , the service (protocol) schedule and action (Accept , reject, drop).Check the help .
  • #73: Select public IP address type and configure IP address. The configured IP address is mapped to the destination host/network and used as the IP address of the virtual host. Select mapped IP address type and configure IP address. It is the IP address to which the public IP address is mapped. This is the actual private IP address of the host being accessed using the virtual host.
  • #74: Select public IP address type and configure IP address. The configured IP address is mapped to the destination host/network and used as the IP address of the virtual host. Select mapped IP address type and configure IP address. It is the IP address to which the public IP address is mapped. This is the actual private IP address of the host being accessed using the virtual host.
  • #76: Select public IP address type and configure IP address. The configured IP address is mapped to the destination host/network and used as the IP address of the virtual host. Select mapped IP address type and configure IP address. It is the IP address to which the public IP address is mapped. This is the actual private IP address of the host being accessed using the virtual host.
  • #77: Create a Firewall rule from WAN to DMZ as the Web Server is located in DMZ with destination as the Virtual host for the Web Server created.
  • #78: There is no need for the administrator to create loop back rule explicitly. It will be created automatically whenever a Virtual Host is created. This means c reating a virtual host will create a DMZ-DMZ rule by default. These rules allow internal users to access the resource on same public IP. Whenever a Virtual Host will be selected as Destination of a Firewall Rule, it is annotated as (VH) and by taking the cursor of mouse over it, it displays the mapping of public IP address with mapped IP address.
  • #82: A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include: flooding a network, thereby preventing legitimate network traffic; disrupting a server by sending more requests than it can possibly handle, thereby preventing access to a service; preventing a particular individual from accessing a service; disrupting service to a specific system or person
  • #83: A SYN flood attack creates so many half-open connections that the system becomes overwhelmed and cannot handle incoming requests any more. UDP Flood: This attack links two systems. It hooks up one system’s UDP character-generating service, with another system’s UDP echo service.Once the link is made, the two systems are tied up exchanging a flood of meaningless data. Tcp flood : This attack sends huge amount of TCP packets than the host/victim computer can handle. ICMP flood is based on sending the victim an overwhelming number of ping packets. It is very simple to launch, the primary requirement being access to greater bandwidth than the victim.
  • #84: DoS Protection settings vary for different organizations give example
  • #85: When the burst rate is crossed, Cyberoam considers it as an attack. Cyberoam provides DoS attack protection by dropping all the excess packets from the particular source/destination. Cyberoam will continue to drop the packets till the attack subsides. Because Cyberoam applies threshold value per IP address, traffic from the particular source/destination will only be dropped while the rest of the network traffic will not be dropped at all i.e. traffic from the remaining IP addresses will not be affected at all.
  • #98: Explain the relationship between policies Explain how different categories make an IAP and how different policies Can be applied to a User. User Identity-based Policies   Cyberoam’s user identity-based filtering provides the granular controls required to control access by individual users and groups to applications, sites, information upload, as well as entry of virus, worm, spyware and other attacks on the network.    By allowing enterprises to set distinct surfing policies with differing access rights based on individual names rather than IP addresses, Cyberoam enables the creation of surfing policies based on the user’s work profile. Policies can be created based on the user’s department, group, hierarchy or individual requirements, providing great dynamism and flexibility in policy creation and management. Rapid user-IP mapping with instant user identity recognition reduces time lag and processor load. Group is a collection of users having common policies that can be managed as a single unit. Its a mechanism of assigning various policies to a number of users in one operation/step. It simplifies the user configuration. Users that belong to a particular group are referred to as a group user. Users are needed for Auditing and Security can be configured at more finer granule Isolation point can be identified immediately Integration will identify access request based on User names Generate reports based on Usernames
  • #144: Threats over email like spam, phishing, viruses, worms, are released in the billions within a short span of time. Today’s attackers launch threats for financial gain rather than out of malicious intent. They mask the originator and launch the attack using a network of zombie machines. With Zombie botnets carrying the ability to send up to 1 billion spam messages within a few hours, the spread of the attack is rapid. Gateway level spam protection for Zero-hour spam detection  To effectively match the speed with which attacks spread, zero-hour responsiveness is required to deliver enterprise security. Zero-hour protection swings into action, generating defenses in the first hour of an attack. Further, the content and characteristics of the message within a single attack differ, making it difficult to identify the threat through traditional methods. Solutions that rely on signature databases are likely to leave the enterprise defenses lowered during the critical first hours of attack. Cyberoam in Partnership with CommTouch RPD (Recurrent Pattern Detection) Cyberoam delivers zero-hour spam protection in addition to image spam defense though Recurrent Pattern Detection (RPD) technology. This unique content-agnostic technology detects and blocks image spam which accounts for almost 35 % of worldwide spam mail and 70% of bandwidth taken by spam.   Cyberoam’s anti-spam protection delivers maximum spam detection with low false positives through relevant, continuous and real-time spam detection. The solution reduces spyware, phishing and adware attempts, controls spam involving pornography while enhancing enterprise productivity by preventing mail systems from being submerged by spam
  • #166: this connection is also called Host-to-Net connection may be with or without static IP