Cyberoam VPN (SSL VPN and IPSec)
Cyberoam – a Sophos Company, secures organizations with its wide range of product offerings at the network gateway. For the latest Cyberoam products, please visit our Sophos's store EnterpriseAV.com

Sorry, this product is no longer available, please contact us for a replacement.
Cyberoam offers the option of IPSec VPN, LT2P, PPTP and SSL VPN over its VPN Firewall UTM appliances, providing secure remote access to organizations.
The VPNC-certified Cyberoam communicates with most third party VPNs, making it compatible with existing network infrastructures and providing secure access with remote workers, partners, suppliers and customers.
Feature |
Feature Description |
Benefit |
IPSec VPN |
- Supports IPSec, L2TP, PPTP VPN
- Establishes road warrior, Net-to-Net, Host-to-Net VPN connections
- Full Support to IPSec and IKE
- Network authentication and encryption through DES, 3DES and AES
- Automatic failover of VPN connectivity for IPSec and L2TP connections across multiple ISP gateways
|
- Flexibility with range of VPN options compared to dedicated VPN appliance
- Strong security
- Assured VPN connectivity, hence higher security levels
|
SSL VPN |
- On-appliance SSL VPN
- Web, application and client-based access modes
|
- Anywhere, Any Time, Any Device VPN connectivity
- Flexible options
- Eliminates the need to install VPN clients over individual devices
|
Layer 8 Identity-based VPN Access |
- Identity and work profile-based access policies to employees, partners, customers
- Control over ‘Who Accesses What’
|
- Data Leakage Prevention
- Prevents unauthorized access
- Control over access to individuals
- Meets regulatory compliance requirements
|
Threat-Free Tunneling Technology |
- Scans IPSec, L2TP, PPTP, SSL VPN traffic for malware, spam, inappropriate content and intrusions
|
- Ensures secure endpoints and network
- Comprehensive protection from threats entering from devices
|
Layer 8 Identity-based Reporting |
- Reporting with username
- Options of on-appliance reporting, centralized reporting through CCC and Cyberoam iView
|
- Provides instant user identification and prompt corrective action
- Meets regulatory and security compliance
|