Cyberoam CR25wiNG
Future-ready Security with Wi-Fi Access Point for SOHO/ROBO networks
Cyberoam – a Sophos Company, secures organizations with its wide range of product offerings at the network gateway. For the latest Cyberoam products, please visit our Sophos's store EnterpriseAV.com
Sorry, this product is no longer available, please contact us for a replacement.
Overview:
CR25wiNG is the Next-Generation Unified Threat Management appliance with Wi-Fi access points that offer “the fastest UTMs made for SMBs” to small offices, with high performance security over WLAN. CR25wiNG appliances come with 3x3 MIMO technology that greatly enhances wireless range and performance. It supports 802.11n/b/g wireless standards. Combined with security over wired networks offered by its range of UTM appliances, Cyberoam enables organizations to overcome the physical limitations of securely accessing network resources and offers more user flexibility, user productivity and lower network ownership costs.
The best-in-class hardware along with software to match, enables the NG series to offer unmatched throughput speeds, compared to any other UTM appliance in this market segment. This assures support for future IT trends in organizations like high-speed Internet and rising number of devices in organizations – offering future-ready security for small office networks.
Cyberoam's Layer 8 technology that treats user-identity as the 8th Layer or the HUMAN layer in the protocol stack, works even in WLAN environments, to allow Identity-based security policies in dynamic IP environment.
Cyberoam UTM features assure Security, Connectivity, Productivity | ||
---|---|---|
SecurityNetwork Security
Content Security
Administrative Security
|
ConnectivityBusiness Continuity
Network Availability
Future-ready Connectivity
|
ProductivityEmployee Productivity
IT Resource Optimization
Administrator Productivity
|
Hardware UTM Appliances for Small & Branch Offices:
Cyberoam UTM appliances deliver unified security over a single console, enabling small offices to shift from plain firewalls to comprehensive UTM protection with cost-effective, yet powerful security against malware, spam, Trojans, DoS, DDoS, phishing, pharming and intrusions. At the same time, large organizations can implement uniform security and gain high visibility into remote and branch offices with centralized management and Layer 8 Identity-based security. These offices also gain secure remote access, redundant WAN connectivity and availability, data leakage protection and advanced networking features.
Product Features
CR15wiNG | CR25wiNG | CR35wiNG | CR15iNG | CR25iNG | CR35iNG | |
---|---|---|---|---|---|---|
Hardware Specifications | ||||||
Copper GbE Ports | 3 | 4 | 6 | 3 | 4 | 6 |
Console Ports (RJ45) | 1 | 1 | 1 | 1 | 1 | 1 |
USB Ports | 2 | 2 | 2 | 2 | 2 | 2 |
Hardware Bypass Segments# | - | - | - | - | - | - |
Configurable Internal/DMZ/WAN Ports | Yes | Yes | Yes | Yes | Yes | Yes |
System Performance* | ||||||
Firewall Throughput (UDP) (Mbps) | 1,000 | 1,500 | 2.300 | 1,000 | 1,500 | 2,300 |
Firewall Throughput (TCP) (Mbps) | 750 | 1,000 | 2,000 | 750 | 1,000 | 2,000 |
New sessions/second | 3,500 | 5,000 | 12,000 | 3,500 | 5,000 | 12,000 |
Concurrent sessions | 60,000 | 150,000 | 350,000 | 60,000 | 150,000 | 350,000 |
IPSec VPN Throughput (Mbps) | 110 | 210 | 250 | 110 | 210 | 250 |
No. of IPSec Tunnels | 50 | 100 | 150 | 50 | 100 | 150 |
SSL VPN Throughput (Mbps) | 50 | 75 | 100 | 50 | 75 | 100 |
WAF Protected Throughput (Mbps) | -NA- | 45 | 65 | -NA- | 45 | 65 |
Anti-Virus Throughput (Mbps) | 180 | 300 | 525 | 180 | 300 | 525 |
IPS Throughput (Mbps) | 140 | 200 | 350 | 140 | 200 | 350 |
UTM Throughput (Mbps) | 80 | 110 | 210 | 80 | 110 | 210 |
Authenticated Users/Nodes | Unlimited | Unlimited | Unlimited | Unlimited | Unlimited | Unlimited |
# If Enabled, will bypass traffic only in case of Power failure.
* Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
Key Features | |
---|---|
Layer 8 Identity-based policies | Role-based access at remote locations |
Visibility into who is doing what | |
Comprehensive UTM Security | Stateful Inspection Firewall |
Intrusion Prevention System | |
Anti-Virus & Anti-Spyware | |
Anti-Spam | |
Web Filtering | |
Application Visibility & Control | |
On-appliance Reporting | |
Web Application Firewall | |
Outbound Spam Protection | |
Secure Remote Access | IPSec VPN |
L2TP | |
PPTP | |
SSL VPN | |
WAN Connectivity & Availability | Bandwidth Management |
Multiple Link Management | |
3G / WiMAx Support | |
Advanced Networking | Multi-core Processing |
Extensible Security Architecture | |
Active-Active High Availability | |
IPv6 Ready Gold Certified | |
Wi-Fi Security | Wireless Standards IEEE 802.11 n/b/g (WEP, WPA, WPA2, 802.11i, TKIP, AES, PSK, 802.1x EAP) |
Up to 8 bssid Access Points | |
Centralized Security Management | CCC Appliances |
Cyberoam iView Open Source Solution – Logging & Reporting | |
Cyberoam iView Appliances – Logging & Reporting |
Specifications:
Specification | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Interfaces
Built-in Wireless LAN
System Performance*
Stateful Inspection Firewall - Layer 8 (User - Identity) Firewall GatewayAnti-Virus & Anti-Spyware -Virus,Worm,Trojan Detection &Removal GatewayAnti-Spam - Inbound/Outbound Scanning Intrusion Prevention System - Signatures: Default (4500+), Custom |
Web Filtering - InbuiltWeb Category Database Application Filtering - Inbuilt Application Category Database - P2Papplications e.g. Skype- Layer 7 (Applications) & Layer 8 (User - Identity) Visibility Web Application Firewall - Positive Protection model Virtual Private Network - IPSec, L2TP, PPTP SSL VPN -TCP&UDPTunneling Instant Messaging (IM) Management -Yahoo and Windows Live Messenger WirelessWAN -USBport 3G/4G and Wimax Support Bandwidth Management - Application and User Identity based Bandwidth Management User Identity and Group Based Controls - Access time restriction |
Networking - Failover - Automated Failover/Failback, Multi-WAN failover, 3GModem failover Administration & System Management -Web-based configuration wizard User Authentication - Internal database Logging/Monitoring - Graphical real-time and historical monitoring On-Appliance Cyberoam-iView Reporting - Integrated Web-based Reporting tool IPSecVPNClient** - Inter-operability with major IPSecVPNGateways Certification - ICSAFirewall - Corporate
Compliance -CE
Power
Environmental
|
Concurrent VPN Sessions for Cyberoam UTM Appliances | |||
---|---|---|---|
Cyberoam Model | IPSec VPN Tunnels | IPSec Remote Access Users | SSL VPN Tunnels |
Cyberoam NG Series of Appliances | |||
CR15iNG/CR15wiNG | 50 | 15 | 30 |
CR25iNG/CR25wiNG | 100 | 25 | 50 |
CR35iNG/CR35wiNG | 150 | 35 | 75 |
CR50iNG | 200 | 50 | 100 |
CR100iNG | 250 | 100 | 200 |
CR200iNG | 300 | 200 | 300 |
CR300iNG | 400 | 300 | 400 |
CR2500iNG | 3,000 | 2,500 | 3,000 |
Cyberoam i, ia, wi Series of Appliances | |||
CR15i/CR15wi | 22 | 15 | Not Applicable |
CR25ia/CR25wi | 37 | 25 | 25 |
CR35ia/CR35wi | 52 | 35 | 35 |
CR50ia | 75 | 50 | 50 |
CR100ia | 150 | 100 | 100 |
CR200i | 300 | 200 | 200 |
CR300i | 450 | 300 | 300 |
CR500ia | 800 | 500 | 550 |
CR750ia | 900 | 750 | 750 |
CR1000ia | 1,500 | 1,000 | 1,000 |
CR1500ia | 2,250 | 1,500 | 1,500 |
*Antivirus, IPS and UTM performance is measured based on HTTP traffic as per RFC 3511 guidelines. Actual performance may vary depending on the real network traffic environments.
**Additional Purchase Required. Inbound and Outbound Spam filtering cannot be used simultaneously.
Supports and Subscriptions:
Subscriptions:
- Antivirus and Anti Spam Subscription: Protection against Internet and mail based malware
- Comprehensive Value Subscription: Comprehensive Value Subscription includes Anti Malware, Anti Spam, Web and Application Filter, WAF, Intrusion Prevention System , 24x7 Support, hardware warranty and RMA fulfillment
- Gateway Anti Spam: Zero-hour protection with industry’s highest spam detection capabilities
- Gateway Anti Virus: Gateway level protection from viruses, worms and malicious code
- Intrusion Prevention System: Protects from intrusion attempts, DoS attacks, malicious code transmission, backdoor activity and blended threats
- Outbound Anti Spam: Protects service providers from recurring incidents of outbound spam in the network.
- Security Value Subscription Plus: Cyberoam Security Value Subscription Plus includes Anti Malware, Web and Application Filter, Intrusion Prevention System , 24x7 Support, hardware warranty and RMA fulfillment
- Security Value Subscription: Cyberoam Security Value Subscription includes Anti Malware, Web and Application Filter and Intrusion Prevention System, 8x5 Support, hardware warranty and RMA fulfillment
- Total Value Subscription Plus: Cyberoam Total Value Subscription Plus includes Anti Malware, Anti Spam, Web and Application Filter, Intrusion Prevention System, 24x7 Support, hardware warranty and RMA fulfillment
- Total Value Subscription: Cyberoam Total Value Subscription includes Anti Malware, Anti Spam, Web and Application Filter and Intrusion Prevention System, 8x5 Support, hardware warranty and RMA fulfillment
- Web and Application Filter: Dependable web and application filtering to control and report non-work and malicious web and network traffic activity.
- Web Application Firewall: Prevents exploitation of web applications vulnerabilities.
Supports
Basic 8x5 Support: 8x5 Phone, Email and Web Chat support with firmware upgrades , hardware warranty and RMA fulfillment
Premium Support 24x7: 24x7 Phone, Email and Web Chat support with firmware upgrades, hardware warranty and RMA fulfillment
8x5 Basic Support | 24x7 Premium Support | |
---|---|---|
Technical Support | ||
Timings | 10AM - 6PM (Local Time Zone) | Anytime during the day |
Web Based Support | Yes | Yes |
Phone Based Support | Yes | Yes |
Chat Based Support | Yes | Yes |
Number of support incidents per annual subscription | Unlimited | Unlimited |
First Response Time | 4 Hours | 1 Hour |
Onsite Support Services* | - | Fee Based Service |
Software Support | ||
Software & OS Upgrades and Patches | Yes | Yes |
Hot Fixes and Enhancement upgrades | Yes | Yes |
Signature & database update | Yes | Yes |
Hardware Warranty | ||
Limited Hardware warranty & Replacement | Yes | Yes |
Return and Replacement policy | 10 Days | 4 Days |
Advanced Hardware Replacement | - | Yes |
Customer Portal | ||
Product Documentation and Guides | Yes | Yes |
Technical Trainings - CCNSP & CCNSE Certifications | Fee Based | Fee Based |
Online Demo | Yes | Yes |
Version Release Notes | Yes | Yes |
Support Renewals | ||
One, two and three (1, 2 and 3) Year Renewals | Yes | Yes |
Download the Cyberoam Basic Support Plan Datasheet (PDF).
Download the Cyberoam Premium Support Plan Datasheet (PDF).
Documentation:
Download the Cyberoam CR25wiNG Datasheet (PDF).
Download the Cyberoam CR25wiNG-6P Datasheet (PDF).
Download the Cyberoam UTM Techsheet (PDF).