Cyberoam User Guide
Cyberoam User Guide
Version 10
Document version 1.0 10.6.2.378 - 12/01/2015
Important Notice
Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it to be accurate and reliable at the time of printing, but
is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any
products. Cyberoam Technologies Pvt. Ltd. assumes no responsibility for any errors that may appear in this document.
Cyberoam Technologies Pvt. Ltd. reserves the right, without notice to make changes in product design or specifications.
Information is subject to change without notice.
USERS LICENSE
Use of this product and document is subject to acceptance of the terms and conditions of Cyberoam End User License
Agreement (EULA) and Warranty Policy for Cyberoam UTM Appliances.
You will find the copy of the EULA at http://www.cyberoam.com/documents/EULA.html and the Warranty Policy for Cyberoam
UTM Appliances at http://kb.cyberoam.com.
RESTRICTED RIGHTS
Copyright 1999 - 2015 Cyberoam Technologies Pvt. Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of
Cyberoam Technologies Pvt. Ltd.
Corporate Headquarters
Cyberoam House,
Saigulshan Complex, Opp. Sanskruti,
Beside White House, Panchwati Cross Road,
Ahmedabad - 380006, GUJARAT, INDIA.
Tel: +91-79-66216666
Fax: +91-79-26407640 Website: www.cyberoam.com
Page 1 of 490
Content
Preface ................................................................................................................................. 6
About this Guide ................................................................................................................. 7
Guide Organization .............................................................................................................................. 7
Technical Support ................................................................................................................................ 9
Introduction ....................................................................................................................... 10
Administrative Interfaces ................................................................................................................... 11
Web Admin Console ...................................................................................................................... 11
Command Line Interface (CLI) Console ........................................................................................ 11
Cyberoam Central Console (CCC) ................................................................................................ 12
Web Admin Console .......................................................................................................................... 13
Web Admin Language ................................................................................................................... 13
Supported Browsers ...................................................................................................................... 14
Login procedure ............................................................................................................................. 15
Log out procedure .......................................................................................................................... 16
Menus and Pages .......................................................................................................................... 17
Page ............................................................................................................................................... 19
Icon bar .......................................................................................................................................... 20
List Navigation Controls ................................................................................................................. 21
Tool Tips ........................................................................................................................................ 21
Status Bar ...................................................................................................................................... 21
Common Operations ...................................................................................................................... 22
System ............................................................................................................................... 35
Administration .................................................................................................................................... 35
Settings .......................................................................................................................................... 36
Appliance Access........................................................................................................................... 40
Administrator Profiles ..................................................................................................................... 42
Profile Parameters ......................................................................................................................... 43
Access Denied Page...................................................................................................................... 44
Password ....................................................................................................................................... 45
Central Management ..................................................................................................................... 46
API ................................................................................................................................................. 49
Configuration .................................................................................................................................. 51
Time ............................................................................................................................................... 51
Notification ..................................................................................................................................... 53
Messages ....................................................................................................................................... 57
Configuring Web Proxy Settings .................................................................................................... 66
Enabling and Configuring Parent Proxy......................................................................................... 67
Configuring Captive portal ............................................................................................................. 68
Theme ............................................................................................................................................ 70
Maintenance ...................................................................................................................................... 71
Page 2 of 490
Objects............................................................................................................................. 125
Hosts................................................................................................................................................ 126
IP Host ......................................................................................................................................... 126
IP Host Group .............................................................................................................................. 130
MAC Host ..................................................................................................................................... 132
FQDN Host .................................................................................................................................. 134
FQDN Host Group ....................................................................................................................... 136
Country Host ................................................................................................................................ 138
Country Host Group ..................................................................................................................... 141
Services ........................................................................................................................................... 143
Services ....................................................................................................................................... 143
Service Group .............................................................................................................................. 146
Schedule .......................................................................................................................................... 148
Schedule ...................................................................................................................................... 148
File Type .......................................................................................................................................... 150
Network............................................................................................................................ 152
Interface ........................................................................................................................................... 152
Interface ....................................................................................................................................... 153
VLAN ............................................................................................................................................ 164
Link Aggregation Group ............................................................................................................... 169
IP Tunnel ...................................................................................................................................... 173
Zone ............................................................................................................................................. 176
Wireless WAN ................................................................................................................................. 180
Status ........................................................................................................................................... 181
Settings ........................................................................................................................................ 182
Gateway........................................................................................................................................... 187
Gateway ....................................................................................................................................... 188
Static Route ..................................................................................................................................... 198
Unicast ......................................................................................................................................... 198
Multicast ....................................................................................................................................... 200
Source Route ............................................................................................................................... 203
Dynamic Route ................................................................................................................................ 205
RIP ............................................................................................................................................... 206
OSPF ........................................................................................................................................... 211
BGP.............................................................................................................................................. 218
PIM-SM ........................................................................................................................................ 220
Routing Information...................................................................................................................... 221
DNS ................................................................................................................................................. 234
Page 3 of 490
IM...................................................................................................................................... 444
IM Contact ....................................................................................................................................... 444
IM Contact Group ......................................................................................................................... 446
IM Rules........................................................................................................................................... 448
Login ............................................................................................................................................ 449
Conversation ................................................................................................................................ 451
File Transfer ................................................................................................................................. 454
Webcam ....................................................................................................................................... 456
Content Filter ................................................................................................................................... 457
Page 5 of 490
Preface
Welcome to Cyberoams - User Guide.
Cyberoam integrates features like stateful inspection firewall, VPN, Gateway Anti-Virus and AntiSpyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, Data
Leakage Prevention, IM Management and Control, Layer 7 visibility, Bandwidth Management, Multiple
Link Management, Comprehensive Reporting over a single platform.
Cyberoam has enhanced security by adding an 8th layer (User Identity) to the protocol stack. Advanced
inspection provides L8 user-identity and L7 application detail in classifying traffic, enabling
Administrators to apply access and bandwidth policies far beyond the controls that traditional UTMs
support. It thus offers security to organizations across layer 2 - layer 8, without compromising
productivity and connectivity.
Cyberoam UTM Appliances accelerate unified security by enabling single-point control of all its security
features through a Web 2.0-based GUI. An extensible architecture and an IPv6 Ready Gold logo
provide Cyberoam the readiness to deliver on future security requirements.
Cyberoam provides increased LAN security by providing separate port for connecting to the publicly
accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are visible the
external world and still have firewall protection.
Note
Default Web Admin Console username is admin and password is admin
Cyberoam recommends that you change the default password immediately after installation to
avoid unauthorized access.
Page 6 of 490
Guide Organization
The Cyberoam User Guide organization is structured into the thirteen parts that follow the Cyberoam
Web Admin Console structure. Within these parts, individual topics correspond to security Appliance
management interface layout.
This part covers various features of Web 2.0 based graphical interface.
Part IV System
This part covers a various security Appliance controls for managing system status information,
registering and managing the Cyberoam security Appliance and its subscription licenses through
registration portal, managing firmware versions, defining profiles for role based access, scheduling
backups and restoring, various and using included diagnostics tools for troubleshooting.
Part V Objects
This part covers various Objects which are the logical building blocks for configuring various policies
and rules, which include:
host IP, network and MAC Addresses. They are used in defining firewall rules, virtual host, NAT
policy, IPSec, L2TP and VPN policies
services which represent specific protocol and port combination for example, DNS service for
TCP protocol on 53 port. Access to services are allowed or denied through firewall rules.
schedule to control when the firewall rule, Access time policy, Web filter policy, Application filter
policy, or QoS policy will be in effect for example, All Days, Work Hours
file types defining web filter policy, SMTP scanning rules
certificates VPN policies
Page 7 of 490
Part VI Network
This part covers configuring the Cyberoam Appliance for your network. It includes configuring
Cyberoam interfaces and DNS settings, adding VLAN sub interfaces and custom zones, configuring
DHCP. It also covers configuration of the 3G wireless WAN interface on the Cyberoam Appliances that
support the feature.
This part covers how to configure user level authentication and manage users and user groups.
This part covers tools for managing how the Cyberoam Appliance handles traffic through the firewall.
This part covers how to configure and manage Web filtering in Cyberoam through categories and
policies.
This part covers how to configure and manage application filtering in Cyberoam through categories and
policies.
Part XI IM
This part covers how to configure and manage restrictions on instant messaging services provided by
the Yahoo and MSN messengers.
This part covers how to configure and manage bandwidth through QoS policy that allocates and limits
the maximum bandwidth usage of the user and controls web and network traffic.
This part covers managing logging and reporting feature. Cyberoam provides extensive logging
capabilities for traffic, system and network protection functions. Detailed log information and reports
provide historical as well as current analysis of network activity to help identify security issues and
reduce network abuse.
Page 8 of 490
Technical Support
You may direct all questions, comments, or requests concerning the software you purchased, your registration
status, or similar issues to Customer care/service department at the following address:
Corporate Office
Cyberoam House,
Saigulshan Complex, Opp. Sanskruti,
Beside White House, Panchwati Cross Road,
Ahmedabad - 380006, GUJARAT, INDIA.
Tel: +91-79-66216666
Fax: +91-79-26407640: www.cyberoam.com
Cyberoam contact:
Technical support (Corporate Office): +91-79-66065777
Email: [email protected]
Web site: www.cyberoam.com
Page 9 of 490
Introduction
The Appliances use Layer 8 technology to help organizations maintain a state of readiness against today's
blended threats and offer real-time protection.
Unified Threat Management Appliances offer identity-based comprehensive security to organizations against
blended threats - worms, viruses, malware, data loss, identity theft; threats over applications viz. Instant
Messengers; threats over secure protocols viz. HTTPS; and more. They also offer wireless security (WLAN)
and 3G wireless broadband. Analog modem support can be used as either Active or Backup WAN connection
for business continuity.
The Appliance integrates features like stateful inspection firewall, VPN, Gateway Anti-Virus and AntiSpyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, Data Leakage
Prevention, IM Management and Control, Layer 7 visibility, Web Application Firewall, Bandwidth
Management, Multiple Link Management and Comprehensive Reporting over a single platform.
The Appliance has enhanced security by adding an 8th layer (User Identity) to the protocol stack. Advanced
inspection provides L8 user-identity and L7 application detail in classifying traffic, enabling Administrators to
apply access and bandwidth policies far beyond the controls that traditional UTMs support. It thus offers
security to organizations across layer 2 - layer 8, without compromising productivity and connectivity.
The Appliance accelerates unified security by enabling single-point control of all its security features through
a Web 2.0-based GUI. An extensible architecture and an IPv6 Ready Gold logo provide Appliance the
readiness to deliver on future security requirements.
The Appliances provides increased LAN security by providing separate port for connecting to the publicly
accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are visible the external
world and still have firewall protection.
Layer 8 Security:
The Appliances features are built around its patent pending Layer 8 technology. The Layer 8 technology
implements the human layer of networking by allowing organizations control traffic based on users instead of
mere IP Addresses. Layer 8 technology keeps organizations a step ahead of conventional security solutions
by providing full business flexibility and security in any environment including WI-FI and DHCP.
Note
All the screen shots in the Cyberoam User Guides are taken from NG series of Appliances. The feature
and functionalities however remains unchanged across all Cyberoam Appliances.
Page 10 of 490
Administrative Interfaces
Appliance can be accessed and administered through:
Web Admin Console
Command Line Interface Console
Cyberoam Central Console
Administrative Access An administrator can connect and access the Appliance through HTTP, HTTPS, telnet,
or SSH services. Depending on the Administrator login account profile used for access, an administrator can
access number of Administrative Interfaces and Web Admin Console configuration pages.
Appliance is shipped with two administrator accounts and four administrator profiles.
Administrator
Type
Login Credentials
Console Access
Privileges
Super
Administrator
admin/admin
Web Admin
Console
CLI console
Default
cyberoam/cyber
Web Admin
console only
Note
We recommend that you change the password of both the users immediately on deployment.
You can connect to and access Web Admin Console of the Appliance using HTTP or a HTTPS connection
from any management computer using web browser:
HTTP login: http://<LAN IP Address of the Appliance>
HTTPS login: https://<LAN IP Address of the Appliance>
For more details, refer section Web Admin Console.
Page 12 of 490
You can access the Appliance for HTTP and HTTPS web browser-based administration from any of the
interfaces. Appliance when connected and powered up for the first time, it will have a following default Web
Admin Console Access configuration for HTTP and HTTPS services.
Services
Interface/Zones
Default Port
HTTP
LAN, WAN
TCP Port 80
HTTPS
WAN
The administrator can update the default ports for HTTP and HTTPS services from System >
Administration > Settings.
Page 13 of 490
Supported Browsers
You can connect to the Web Admin Console of the Appliance using HTTP or a secure HTTPS connection
from any management computer using one of the following web browsers:
Browser
Supported Version
Version 8+
Mozilla Firefox
Version 3+
Google Chrome
All versions
Safari
5.1.2(7534.52.7)+
Opera
15.0.1147.141+
The minimum screen resolution for the management computer is 1024 X 768 and 32-bit true xx-color.
The Administrator can also specify the description for firewall rule, various policies, services and various
custom categories in any of the supported languages.
All the configuration done using Web Admin Console takes effect immediately. To assist you in configuring
the Appliance, the Appliance includes a detailed context-sensitive online help.
Page 14 of 490
Login procedure
The log on procedure authenticates the user and creates a session with the Appliance until the user logs-off.
To get to the login window, open the browser and type the LAN IP Address of Cyberoam in the browsers
URL box. A dialog box appears prompting you to enter username and password.
Screen Element
Description
Enter user login name.
Username
If you are logging on for the first time after installation, use the
default username.
Specify user account password.
Password
If you are logging on for the first time after installation with the
default username, use the default password.
Select the language. The available options are ChineseSimplified, Chinese-Traditional, English, French, and Hindi.
Language
Default English
To administer Cyberoam, select Web Admin Console
Log on to
Login button
Page 15 of 490
Page 16 of 490
The left navigation bar expands and contracts dynamically when clicked on without navigating to a submenu.
When you click on a top-level heading in the left navigation bar, it automatically expands that heading and
contracts the heading for the page you are currently on, but it does not navigate away from the current page.
To navigate to a new page, first click on the heading, and then click on the submenu you want navigate to.
On hovering the cursor upon the up-scroll icon
navigation bar up or down respectively.
Each section in this guide shows the menu path to the configuration page. For example, to reach the Zone
page, choose the Network menu, then choose Interface sub-menu from the navigation bar, and then choose
Zone tab. Guide mentions this path as Network > Interface > Zone.
Page 18 of 490
Page
A typical page looks as shown in the below given image:
Screen Page
Page 19 of 490
Icon bar
The Icon bar on the upper rightmost corner of every page provides access to several commonly used functions
like:
Dashboard Click to view the Dashboard
Wizard Opens a Network Configuration Wizard for a step-by-step configuration of the network
parameters like IP Address, subnet mask and default gateway for your Appliance.
Report Opens a Reports page for viewing various usage reports. Integrated Logging and Reporting
solution - iView, to offer wide spectrum of 1000+ unique user identity-based reporting across applications
and protocols and provide in-depth network visibility to help organizations take corrective and preventive
measures.
This feature is not available for CR15xxxx series of Appliances.
Console Provides immediate access to CLI by initiating a telnet connection with CLI without closing Web
Admin console.
Logout Click to log off from the Web Admin Console.
More Options
Provides options for further assistance. The available options are as follows:
Support Opens the customer login page for creating a Technical Support Ticket. It is fast, easy
and puts your case right into the Technical Support queue.
Lock Locks the Web Admin Console. Web Admin Console is automatically locked if the
Appliance is in inactive state for more than 3 minutes. To unlock the Web Admin Console you
need to re-login. By default, Lock functionality is disabled. Enable Admin Session Lock from
System > Administration > Settings.
Page 20 of 490
Tool Tips
To view the additional configuration information use tool tip. Tool tip is provided for many configurable fields.
Move the pointer over the icon
Status Bar
The Status bar at the bottom of the page displays the action status.
Page 21 of 490
Common Operations
Adding an Entity
You can add a new entity like policy, group, user, rule, ir host by clicking the Add button available on most of
the configuration pages. Clicking this button either opens a new page or a pop-up window.
Editing an Entity
All the editable entities are hyperlinked. You can edit any entity by clicking either the hyperlink or the Edit icon
under the Manage column.
Deleting an Entity
You can delete an entity by selecting the checkbox and clicking the Delete button or Delete icon.
Page 22 of 490
Sorting Lists
To organize a list spread over multiple pages, sort the list in ascending or descending order of a column
attribute. You can sort a list by clicking a column heading.
Ascending Order icon
the column attribute.
Descending Order icon
the column attribute.
Filtering Lists
To search specific information within the long list spread over multiple pages, filter the lists. Filtering criteria
vary depending on a column data and can be a number or an IP address or part of an address, or any text
string combination.
To create filter, click the Filter
icon changes to
To configure column settings, click Select Column Settings and select the checkbox against the columns you
want to display and clear the checkbox against the columns which you do not want to display. All the default
columns are greyed and not selectable.
Page 23 of 490
Getting Started
Once you have deployed and configured Cyberoam in your network and registered the copy of your
Cyberoam, you can start using the Cyberoam.
1. Start monitoring
Once you have deployed the Appliance successfully you can start monitoring user activities in your Network.
Depending on the Web and Application Filter Policy configured at the time of installation, certain categories
will be blocked or allowed for LAN to WAN traffic with or without authentication.
2. View Reports
Monitor your Network activities using Reports.
To view Reports, log on to iView by clicking Reports on the topmost button bar from the Web Admin Console
and log on with the default username admin and password admin.
View user surfing trends from Web Usage > Top Web User report
View your organizations Category wise surfing trends from Web Usage > Top Categories
report
View mail usage from Mail Usage > Top Mail Senders and Mail Receivers report
3. Configure for Username based monitoring
As user activity is monitored and logged based on IP address, all the reports generated are also IP address
based. To monitor and log user activities based on User names, you have to configure Appliance for
integrating user information and authentication process.
Integration will identify access request based on Usernames and generate reports based on them.
If your Network uses Active Directory Services and users are already created in ADS, configure your
Appliance to communicate your ADS.
If your Network uses RADIUS, configure for your Appliance to communicate with RADIUS.
If your Network uses LDAP, configure for your Appliance to communicate with LDAP.
If your Network uses NTLM, configure your Appliance to communicate with NTLM.
4. Customize
You can create additional policies to meet your organizations requirement.
You can:
Control user based per zone traffic by creating firewall rule. Refer to Firewall for more details.
Control individual user surfing time by defining Surfing quota policy. Refer to Surfing Quota policy for more
details.
Page 24 of 490
Schedule Internet access for individual users by defining Access time policy. Refer to Access time policy
for more details.
Control web access by defining Web and Application Filter Policies. Refer to Web and Application Filter
Policy for more details.
Allocate and restrict the bandwidth usage by defining QoS policy. Refer to QoS policy for more details.
Limit total as well as individual upload and/or download data transfer by defining data transfer policy. (Refer
Data transfer policy for more details.)
Page 25 of 490
Dashboard
The Appliance dashboard appears as soon as you log on to the Web Admin Console.
The Dashboard provides a quick and birds eye view of all the important parameters of your Appliance that
require special attention such as password, access to critical security services, system resources usage, IPS
alerts, notifications of subscription expirations and many more. Dashboard uses Doclets to display this
information.
Dashboard page is completely customizable and the administrator can reposition doclets by dragging and
dropping or close the doclet by clicking
icon that are pertinent to the user and requires special attention for
managing your Appliance on the top and the information used less often moved to the bottom. Administrator
can even reset doclets position to default by selecting Reset Dashboard option
dropdown button
icon.
Page 26 of 490
Page 27 of 490
You can change the system time from CLI Console from System Settings menu though we do not recommend
changing time as this affects all the logs and reports. Refer Cyberoam Console Guide for more information.
or Deactive
Page 29 of 490
User can select the period from the available options for the Report of Data Transfer through the Gateway.
Available Options:
Last Week
Last Month
Custom
Graph displays the upload, download and total data transfer through Gateway.
X-axis Date (depending on the period selected)
Y-axis KB /MB/GB used.
Legends
Orange Color Upload Data Transfer (MB)
Purple Color Download Data Transfer (MB)
Green Color Total Data Transfer (MB)
Note
When the selected period is Custom, then the user can select to view data of maximum last six (06)
months. At a time maximum of thirty (30) days data will be displayed.
Page 30 of 490
Meaning
Subscription expiry date
Module is not subscribed
Subscription has expired
Page 31 of 490
Page 32 of 490
The web traffic is by default classified into four categories: Productive, Non-Working, Neutral, and Unhealthy.
Traffic is classified under category - N/A, if it does not fall in any of the default categories. Different colors
represent different categories. Doclet provides:
Distribution by Hits Graph displays total traffic hits per category. Clicking the hyperlink will open the
detailed report.
Distribution by Data Transfer Graph displays total data transferred per category.
HA Details Doclet
The HA Details doclet not available in models CR15i, CR25ia, CR15wi, CR25wi, CR35wi, CR15iNG.
The Doclet provides HA configuration mode, Primary and Auxiliary Appliance key, Dedicated link port,
Monitored Interface list and current connections.
Screen Element
Description
HA Configuration
Mode
Appliance Key
Page 33 of 490
Monitored Interface
List
Connection
Both the Appliances will monitor their own ports and if any of
the monitored port goes down, Appliance will leave the cluster
and failover will occur.
Displays connections served by Primary and Auxiliary
Appliance.
Page 34 of 490
System
System allows configuration and administration of Cyberoam Appliance for secure and remote management
as well as administrative privilege that you can assign to admin users. It also provides the basic system
settings and language settings for the Web Admin Console. Configuration of several non-network features,
such as SNMP, custom messages, portal setting and themes can be done through System.
Administration
Administration page provides an option to configure general settings for your Appliance. Various ports and
login security can be configured using this submenu. The Administrator can also restrict administrative access
to various local services available from the zone. Administrator can create profile(s) to be assigned to the
admin users for configuring and managing the Appliance. You can administer port numbers, remote login
security, local login security and local ACL services from Administration submenu.
Page 35 of 490
Settings
Use the Settings page to make modifications in the general port settings and Web Admin Login parameters.
Make changes to the login parameters for restricting the local and remote users based on the time.
Parameters
Screen Element
Description
Page 36 of 490
Default 80
HTTPS Port
Certificate
Certificate
Selecting this option will allow the user to have user specific
certificate encryption.
Receive Passphrase
via
Available Options:
Client Bundle
On-screen Link
Email
Default By default, the passphrase is received is Client
Bundle.
Default Language for
SSL VPN Web Portal
Available Options:
English
Hindi
Chinese Traditional
Chinese Simplified
French
Japanese
Login Security (Remote Admins)
To prevent the unauthorized access to the Web Admin Console and CLI, configure Admin
Session Lock, Admin Session Logout time and Block Admin Login to block the access after
number of failed login attempts.
Configure inactive time in minutes after which the Appliance will be locked automatically. This
configuration will be applicable to following Cyberoam components:
Page 37 of 490
Configure inactive time in minutes after which the administrator will be logged out automatically.
By default, admin session logout time is 30 minutes.
Note
Admin Session Logout time value must be greater than the Lock Admin Session time.
Block Admin Login Enable to block login to the Web Admin Console and CLI if allowed failed
login attempts exceeds.
Configure number of allowed failed login attempts from the same IP Address within the time limit.
Specify number of minutes for which the administrator will not be allowed to login i.e. if allowed
failed login attempts exceeds, the administrator account will locked for the configured minutes.
Administrator Password Complexity Settings
Password Complexity can be configured to ensure that administrators are using secure
passwords.
Default disclaimer can be customized as per the requirement from the Messages page (System
> Configuration > Messages). One can also review the customized message before
setting.
Language Settings
Default Configuration
Language
Available Options:
Page 38 of 490
English
Hindi
Chinese Traditional
Chinese Simplified
French
Japanese
Please make sure to take the backup as the entire custom
configuration will be lost. Appliance restores the backup in the
same language in which it is taken.
Table Administration Settings screen elements
Page 39 of 490
Appliance Access
Appliance Access allows limiting the Administrative access of the following Appliance services from various
default as well as custom zones LAN, WAN, DMZ, and VPN:
Admin Services HTTP, HTTPS, Telnet, SSH
Authentication Services Windows/Linux Client, Captive portal, NTLM, Radius SSO
Network Services DNS, Ping/Ping6
Other Services Web Proxy, SSL VPN
To manage the access to devices, go to System > Administration > Appliance Access.
Page 40 of 490
Page 41 of 490
Administrator Profiles
Role-based administration capabilities are provided to offer greater granular access control and flexibility.
It allows an organization to separate super administrator's capabilities and assign through Profiles. Profiles
are a function of an organization's security needs and can be set up for special-purpose administrators in
areas such as firewall administration, network administration, and logs administration. Profiles allow granting
permissions to individual administrators depending on their role or job need in organization.
The profile separates Appliance features into access control categories for which you can enable none, read
only, or read-write access.
Manage Profiles
To manage default and custom profiles, go to System > Administration > Profile.
The Profiles list shows the default and custom profiles you have created and enables you to add, edit, and
delete profiles.
Page 42 of 490
Profile Parameters
To add or edit profiles, go to System > Administration > Profile. Click Add Button to add a new
profile. To update the details, click on the Profile or Edit icon
be modified.
Description
Add Profile
Profile Name
Configuration
Available Options:
None No access to any page
Read-Only View the pages
Read-Write Modify the details
Access levels can be set for individual menus as well. You can
either set a common access level for all the menus or
individually select the access level for each of the menu. Click
icon against a menu to view the items under that menu.
Page 43 of 490
Access denied page is displayed when the Administrator tries to access a page or perform the operation,
which is not allowed to them.
Page 44 of 490
Password
The Appliance is shipped with one global super admin with the credentials username & password as
admin. Both the consoles Web Admin Console and CLI, can be accessed with the same credentials. This
administrator is always authenticated locally that means by the Appliance itself.
Note
It is strongly recommended to change the password for this username immediately after deployment.
Parameters
Screen Element
Description
Current Password
New Password
Page 45 of 490
Central Management
Apart from managing and monitoring the Appliance directly, it can also be done through Cyberoam Central
Management if deployed within your organization.
To enable Appliance management through CCC, go to System > Administration > Central
Management.
Parameters
Screen Element
Description
IP Address / Domain
Port
Specify the value to the Port over which the information will be
sent.
Appliance
Management
Communication Details
Heartbeat Protocol
Available Options:
Syslog
HTTP
Page 46 of 490
Heartbeat Port
Available Options:
Central Management will push configuration changes
to the Appliance Select if the Appliance is directly
connected to the Internet. In this case the Central
Management keeps on passing updates to the Appliance if
any configurations are updates. Communication will be
done on port 80.
Appliance will fetch configuration changes from Central
Management Select if the Appliance is behind NAT
device. In this case the Appliance keeps on asking for
updates to the Central Management.
Page 47 of 490
Connection Protocol
Select the protocol through which the updates are sent from the
available options:
Available Options:
HTTP
HTTPS
Port
Signature
Distribution
Signature
Distribution Port
Default - 80
Table Central Management screen elements
Page 48 of 490
API
Application Programming Interface (API) is an interface which allows third party applications to communicate
with Cyberoam. This page allows the Administrator to log on and log off users.
Parameters
Screen Element
Description
API Configuration
API Configuration
IP Address
Add the IP Addresses allowed to place the XML log on and log
off requests.
For all the requests, XML response will be displayed in a pop-up window.
Sample XML Request Code:
<Request><LiveUserLogin><UserName>cyberoam</UserName><Password>cyber</Password><IPAddres
s>10.21.18.15</IPAddress><MacAddress>00:0C:29:2D:D3:AC</MacAddress></LiveUserLogin></Request
>
<Request><LiveUserLogout><Admin><UserName>admin</UserName><Password>admin</Password></A
dmin><UserName>cyberoam</UserName><IPAddress>10.21.18.15</IPAddress></LiveUserLogout></Req
uest>
For example:
https://<Cyberoam
IP>/corporate/APIController?reqxml=<Request><LiveUserLogin><UserName>cyberoam</UserName><Pas
sword>cyber</Password><IPAddress>10.21.18.15</IPAddress><MacAddress>00:0C:29:2D:D3:AC</MacA
ddress></LiveUserLogin></Request>
Note
When the user logs on using API, the client type of all users will display API Client on the Live Users
page.
Page 50 of 490
Configuration
The Configuration page allows basic configuration of the Appliance including GUI localization, mail server,
customized messages, web & parent proxy settings, themes and outlook for the Captive portal.
Time
Appliance current date and time can be set according to the Appliances internal clock or synchronized with
an NTP server. Appliance clock can be tuned to show the right time using global Time servers so that logs
show the precise time and Appliance internal activities can also happen at a precise time.
To configure time settings, go to System > Configuration > Time.
Page 51 of 490
Parameters
Screen Element
Description
Current Time
Time Zone
Date
Time
icon.
Use Custom
Page 52 of 490
Notification
Configure a Mail Server IP Address, Port and Email Address for the Appliance to send and receive alert
Emails.
To configure mail server settings, go to System > Configuration > Notification.
Parameters
Screen Element
Description
Authentication
Required
Specify the User Name, which uniquely identifies user and will
be used for login.
Password
Connection Security
Available Options:
None Select if your SMTP Server does not support TLS
(Transport Layer Security) or a secured connection
between SMTP Client and the SMTP Server is not
required. If selected, a normal TCP connection is
established, without any security.
STARTTLS SMTP Client establishes a TCP
connection with the SMTP Server to learn about the TLS
capabilities of the server. If the SMTP Server supports
STARTTLS, the connection is upgraded to TLS. If the
SMTP Server does not support STARTTLS, the SMTP
Client continues to use the normal TCP connection.
SSL/TLS SMTP Client establishes a TLS connection
with the SMTP Server. In case the SMTP Server does
not support TLS, no connection is made between the
SMTP Client and the SMTP Server.
Default None
Certificate
Email Settings
From Email Address
Send Notifications to
Email Address
Email Notification
Page 54 of 490
IPSec Tunnel
UP/Down
An Email is sent only for Host to Host and Site to Site tunnel
connections; if it flaps due to one of the following reasons:
A peer is found dead (DPD)
Failed to re-establish connection after Dead Peer
Detection (DPD)
IPSec Security Association (SA) is expired and is
required to be re-established.
IPSec Tunnel comes up without
intervention after losing the connectivity
administrator
Test Mail
Page 55 of 490
Mail Server configuration changes automatically when changed from the Network Configuration Wizard
and vice versa.
Page 56 of 490
Messages
The Messages page allows the Administrator to send messages to the various users. Messages help
Administrator to notify users about problems as well as Administrative alerts in areas such as access, user
sessions, incorrect password, and successful log on and log off etc.
Messages, up to 256 characters can be sent to a single user or multiple users simultaneously, whenever an
event occurs.
To customize the default messages, go to System > Configuration > Messages. You can:
Edit Click Edit icon
to the user.
Save Click Save icon
Reset Click Reset icon
Page 57 of 490
Page 58 of 490
Messages
Description/Reason
Authentication
User account
blocked (AD Policy)
User account
disabled (AD Policy)
Data Transfer
Exhausted
Deactive User
Delete User
Disconnect User
Invalid Machine
Someone else is
logged in from same
IP Address
Message is sent if someone else has already logged with the same
IP Address.
Logged Off
Successful Message
Logged On
Successful Message
Not Authenticate
Not Currently
Allowed
Page 59 of 490
Message is sent when session has timed out and user is logged
of automatically.
Surfing Time
Exhausted
The surfing time duration is the time in hours the User is allowed
Internet access that is defined in Surfing time policy. If hours are
exhausted, User is not allowed to access.
Surfing Time Expired
Logout Notification
Page 60 of 490
Description/Reason
SMTP
CTIPD Rejection
CTIPD Temporary
Rejection
Page 61 of 490
Probable Spam
Rejection
Probable Virus
Outbreak Rejection
Spam Rejection
Virus Outbreak
Rejection
Email Domain
Rejection
Mail Header
Rejection
Mail/Virus Rejection
IP Address Rejection
Oversized Mail
Rejection
Undersized Mail
Rejection
Delivery Notification
(to Sender)
Attachment Infection
RBL Rejection
Message will be sent when the IP Address from which mail is send
is blacklisted.
Suspected Infection
Page 62 of 490
Predefined IM Messages
Messages
Description/Reason
IM
File Transfer Block
Notification (to
sender)
Message Block
Notification (to
sender)
Privacy Notification
to Non-Suspect (on
the first message
sent from either side)
Message will be sent once the IM session starts to inform user that
their conversation is being monitored with this contact.
Privacy Notification
to Suspect (After
user has logged in)
Virus Scan
Notification (to
sender)
Webcam Block
Notification (to
Inviter)
Page 63 of 490
Administration Messages
Messages
Description/Reason
Administration
Disclaimer Message
ACCESSWARNING
This is a private computer system. Unauthorized access or use is
prohibited and only authorized users are permitted.
Use of this system constitutes consent to monitoring at all times
and user should have no expectation of privacy.
Unauthorized access or violations of security regulations is
unlawful and hence if monitoring reveals either of it, appropriate
disciplinary action will be taken against the employees violating
security regulations or making unauthorized use of this system.
Description/Reason
SMS Customization
Default SMS Text
Page 64 of 490
against the message to be customized, update the message and click the Save icon
Page 65 of 490
The Appliance can also act as a Web Proxy Server. To use your Appliance as a Web Proxy Server, configure
the Appliances LAN IP Address as a proxy server IP Address in the browser setting and enable access to
Web Proxy services from the Appliance Access section.
Note
Web Proxy enforces Web and Application Filter policy and Anti Virus policy as configured in User and
Firewall Rule.
IPS policy is applicable on the traffic between proxy and WAN, but not between user and proxy.
QoS policy is not applicable on the direct proxy traffic.
To configure Web Proxy settings, go to System > Configuration > Web Proxy.
Parameters
Screen Element
Description
Trusted Ports
Default 3128
Click Add button to add the HTTP trusted ports and Cancel icon
to delete the trusted ports.
Table Web Proxy Settings screen elements
Page 66 of 490
Parameters
Screen Element
Description
Click to enable the Parent Proxy if the web traffic is blocked by
the upstream Gateway.
Parent Proxy
Port
Username &
Password
Page 67 of 490
Appliance provides flexibility to customize the Captive portal Login page. This page can include your
organization name and logo.
To customize the Captive portal page, go to System > Configuration > Captive portal.
Parameters
Screen Element
Description
General Settings
Logo
Page 68 of 490
Default - http://www.cyberoam.com.
Provide a page title.
Page Title
Default - Password
Login Button Caption
Logout Button
Caption
Default - Logout
My Account Link
Caption
Reset to Default
Button
Page 69 of 490
Theme
Theme page provides a quick way to switch between predefined themes for Web Admin Console. Each theme
comes with its own custom skin, which provides the color scheme and font style for entire Web Admin Console
i.e. navigation frame, tabs and buttons.
To change the theme, go to System > Configuration > Theme.
Page 70 of 490
Maintenance
Maintenance facilitates handling the backup and restore, firmware versions, licensing, services and update.
The Administrator can take manual backup and alternately, automatic backup can be scheduled on regular
intervals.
Backup stored on the system can be restored anytime from Backup & Restore page.
The Administrator can upload a new firmware image, boot from firmware or reset to the configuration to factory
defaults. Firmware image can be downloaded from the relevant sites. Maximum of two firmware images are
available simultaneously.
Backup & Restore
Firmware
Licensing
Services
Update Definitions
Backups are necessary in order to recover data from the loss due to the disk failure, accidental deletion or file
corruption. There are many ways of taking backup and just as many types of media to use as well.
Backup consists of all the policies and all other user related information.
Appliance facilitates to take back-up only of the system data, either though scheduled automatic backup or
using a manual backup.
Once the backup is taken, the file for restoring the backup must be uploaded.
Note
Restoring data older than the current data results to the loss of current data.
To backup and restore data, go to System > Maintenance > Backup & Restore, You can:
Backup & Restore
Schedule Backup
Page 71 of 490
Screen Element
Description
Backup
Backup Mode
Available Options:
Local Backup is taken and stored on the Appliance
itself.
FTP configure FTP server IP Address (IPv4/IPv6) and
login credentials.
Email configure Email ID on which backup is to be
mailed.
Backup Prefix
Specify backup file name (prefix). The backup file name format
is as follows:
With Prefix: <Prefix>_Backup_<Appliance
Key>_<timestamp>
For example:
Dallas_Backup_ABCDEY190_26Nov2014_12.09.24
NY_Backup_ABCDEY190_26Nov2014_12.09.24
Without Prefix(Default): Backup_<Appliance
Key>_<timestamp>
For example:
Backup_ABCDEY190_26Nov2014_12.09.24
If prefix is not provided, the default format is used for backup
file.
Backup Frequency
Page 72 of 490
Available Options:
Never Backup will not be taken at all.
Daily Backup will be taken every day.
Weekly Backup will be taken every week.
Monthly Backup will be taken every month.
Schedule
Specify the day/date and time for Daily, Weekly and Monthly
backup.
Backup Now
Download Now
Backup Restore
Restore
Configuration
Page 73 of 490
Firmware
System > Maintenance > Firmware page displays the list of available firmware versions downloaded.
A Maximum of two firmware versions are available simultaneously and one of the two firmware versions is
active i.e. the firmware is deployed.
Upload firmware
The Administrator can upload a new firmware. Click to specify the location of the
firmware image or browse to locate the file. You can simply upload the image or upload and boot from the
image. The uploaded firmware can only be active after the next reboot. The existing firmware then will be
removed and the new firmware will be available.
In case of Upload & Boot, firmware image is uploaded and upgraded to the new version, closes all sessions,
restarts, and displays the login page. This process may take few minutes since the entire configuration is also
migrated in this process.
Boot from firmware
Option to boot from the downloaded image and activate the respective firmware.
Note
Active
Page 74 of 490
downloaded firmware. Compare computed checksum with the checksum published on the
http://download.cyberoam.com/checksum. In case of mismatch, download the file again.
Page 75 of 490
Licensing
Appliance consists of two (2) types of modules:
Basic module Firewall, VPN, SSL VPN, Bandwidth Management, Multi Link Manager and Reports.
Subscription modules Web and Application Filter, IPS, Gateway Anti Virus, Gateway Anti Spam, 8
x 5 Support, 24 x 7 Support, WAF and Outbound Spam Protection. All the appliance models may not
support subscription modules. Please refer to Subscription Matrix for details.
Basic Module is pre-registered with the Appliance for the indefinite time period usage while Subscription
Modules are to be subscribed before use.
Page 76 of 490
Screen Licensing
Description
Company Name
Contact Person
Registered Email
Address
To register the Appliance, you need to create a Customer Account. You can a create customer account and
register the Appliance in a single step. Once the Appliance is registered, subscribe other modules for the trial
or with license keys.
Page 77 of 490
Description
Status
Expiration Date
Page 78 of 490
Services
You can view the current status and manage all the configured services:
Anti Spam
Anti Spam Center Connectivity
Anti Virus
Authentication
DNS Server
IPS
Web Proxy
WAF Available in all the models except CR15iNG and CR15wiNG
DHCP Server
DHCPv6 Server
Router Advertisement Service
To manage various services, go to System > Maintenance > Services.
Usage
Start
Stop
Restart
Page 79 of 490
Status table
Status
Description
No Web Server
configured
Connected
Running
Disconnect
Stopped
Page 80 of 490
Updates
The Updates page allows the administrator to configure automatic updates for Anti Virus definitions, IPS
Signatures and Web category database. Definitions can be updated from Central Server or CCC. Alternately,
these definitions can also be updated manually from this page itself.
To enable automatic updates, go to System > Maintenance > Updates and click against the required
checkbox followed by Apply.
Description
Updates Status
Module
Version
Auto Update
Default - Enable
Page 81 of 490
Participate in the
Product
Improvement
Program
Default - Enable
Table Manage Updates screen elements
Page 82 of 490
SNMP
Simple Network Management Protocol (SNMP) is used as the transport protocol for network management.
Network management consists of a station or manager communicating with network elements such as hosts,
routers, servers, or printers. The agent is the software on the network element (host, router, printer) that runs
the network management software. In other words, the agent is a network element. The agent will store
information in a Management Information Base (MIB). Management software will poll the various network
elements/agents and get the information stored in them. The manager uses UDP port 161 to send requests
to the agent and the agent uses UDP port 162 to send replies or messages to the manager. The manager
can ask for data from the agent or set variable values in the agent. Agents can reply and report events.
SNMP collects information two ways, if SNMP agent is installed on the devices:
The SNMP Management Station/Manager will poll the network devices/agents
Network devices/agents will send trap/alert to SNMP management station/Manager.
SNMP terms
Trap An alert that is sent to a management station by agents.
Agent A program at devices that can be set to watch for some event and send a trap message to a
management station if that event occurs
SNMP community An SNMP community is the group that devices and management stations running
SNMP belong to. It helps define where information is sent. The community name is used to identify the
group. A SNMP device or agent may belong to more than one SNMP community. It will not respond to
requests from management stations that do not belong to one of its communities.
Use SNMP to configure agent, community and the SNMPv3 users. Appliance supports SNMPv1 & SNMPv2c
protocols. Agent configuration page is used to configure agent name, agent port and the contact person for
the program. The community page is used for adding, managing and deleting the communities for protocols
SNMPv1 and SNMPv2c. Use SNMPv3 user page to add, manage and delete v3 users. Apart from IPv4
Addresses, SNMP now supports IPv6 Addresses also.
Page 83 of 490
Agent Configuration
Use Agent configuration page to configure SNMP agents. The configuration details include name, description,
location, contact person, agent port and manager port.
To configure agents, go to System > SNMP > Agent Configuration.
Parameters
Screen Element
Description
Name
Description
Agent Description
Location
Contact Person
Agent Port
Specify the port which the Appliance should use to send traps.
the Appliance is
Default - 161
Manager Port
Default - 161
Table Agent Configuration screen elements
Page 84 of 490
Community
Community is a group of SNMP Managers and an SNMP Agent may belong to one or more than one
community. An Agent does not respond to requests from a management station(s) that does not belong its
communities.
Each Community can support SNMPv1, SNMPv2c or both. The Appliance sends traps to all the communities.
You must specify a trap version for each community.
This page provides a list of all the communities added and you can sort the list based on community name.
The page also provides the option to add a new community, update the parameters of the existing community,
or delete the community.
Manage Communities
To configure communities, go to System > SNMP > Community.
Description
Name
Source
Protocol Version
Trap
Page 85 of 490
Parameters
Screen Element
Description
Name
Description
IP Address
Protocol Version
Page 86 of 490
V3 User
SNMP version 3 has the capability of using authentication. Only the authenticated user can request the
information.
This page displays the list of all the v3 users. The page provides the option to add a new v3 user, update the
password of the user, or delete the user.
Manage v3 Users
To manage v3 users, go to System > SNMP > v3 User.
Description
User name of the v3 user.
Table Manage v3 Users screen elements
Parameters
Screen Element
Description
Name
Password
Certificate
A digital certificate is a document that guarantees the identity of a person or entity and is issued by the
Certificate Authority (CA). Certificates are generated by the third party trusted CA. They create certificates by
signing public keys and identify the information of the communicating parties with their own private keys. This
way it is possible to verify that a public key really belongs to the communicating party only and not been forged
by someone with malicious intentions.
A certificate signed by a Certificate Authority (CA) identifies the owner of a public key. Each communicating
party may be required to present its own certificate signed by a CA verifying the ownership of the
corresponding private key. Additionally, the communicating parties need to have a copy of the CAs public
key. In case private key is lost or stolen or the information is changed, CA is responsible for revoking the
certificate. CA also maintains the list of valid and revoked certificates.
To use Certificates for authentication, you must have valid CA and a certificate. You need to upload CA if you
are using external CA. You also require to upload the certificate. You can generate a self signed certificate if
you want to use it as CA.
You can also use Appliance to act as a certificate authority and sign its own certificates. This eliminates the
need of having your own certificate authority. If you are using Appliance as CA, you have to generate a selfsigned certificate, which can be used in various VPN policies.
Certificate
Certificate Authority
CRL
Page 88 of 490
Certificate
Certificate page allows you to generate self-signed certificate, upload certificate or generate certificate signing
request (CSR). This page also facilitates you to manage certificates, which involve updating and regenerating,
revoking, downloading and deleting certificates.
You can use Appliance to act as a certificate authority and sign its own certificates. This eliminates the need
of having your own certificate authority.
If Appliance is used as CA, you have to generate a self-signed certificate, which can be used in various VPN
policies.
If you are using a third party CA, you have to submit a request to CA for issuing a certificate. Once CA issues
a certificate, you have to upload to use it in VPN policy.
Manage Certificates
To manage certificates, go to System > Certificate > Certificate.
Revoke Click to revoke self-signed certificate if lost, stolen or updated.
Download Click to download the self-signed certificate or CSR.
Description
Name
Valid From
Valid Up To
Authority
Type
Download Icon
Page 89 of 490
Revoke Icon
Page 90 of 490
Parameters
Screen Element
Action
Description
Select an action from the available options:
Available Options:
Upload Certificate
Generate Self Signed Certificate
Generate Certificate Signing Request
Upload Certificate
Name
Certificate File
Format
Available Options:
PEM (.pem): Privacy Enhanced Mail (PEM) is a Base64
encoded DER certificate. It is used for encoding the
certificate in ASCII code. The certificate and private key are
stored in separate files.
DER (.der): Distinguished Encoding Rules (DER) is a binary
form of ASCII PEM format certificate used on Java platform.
The certificate and private key are stored in separate files.
CER (.cer): Canonical Encoding Rules (CER) is a binary
format for encoding certificates. It contains information about
the owner of certificate, its public and private keys.
PKCS7 (.p7b): Public Key Cryptography Standards (PKCS)
is a format for encoding the certificate in ASCII code. It
contains only certificates and not the private key.
PKCS12 (.pfx or .p12): Public Key Cryptography Standards
(PKCS12) is a binary format for encoding certificates. It
Page 91 of 490
Private Key
Specify private key for the certificate. Use Browse to select the
complete path.
Passphrase
Generate Self Signed Certificate (Option available only after configuring Error!
eference source not found.)
Name
Key Length
Available Options:
512
1024
1536
2048
4096
Generally the larger the key, lesser is the chance that it will be
compromised but requires more time to encrypt and decrypt
data than smaller keys.
Default 512
Key Encryption
Passphrase
Confirm Passphrase
Certificate ID
Specify certificate ID. You can specify any one of the following:
Available Options:
DNSIP Address (IPv4/IPv6 Address)
Email Address
DER ASN1 DN(X.509) (Applicable when Authentication
Type is Digital Certificate)
Page 92 of 490
State
Locality Name
Organization Name
Valid Up To
Key Length
Generally the larger the key, the less chance that it will be
compromised but requires more time to encrypt and decrypt
data than smaller keys.
Encryption
Passphrase
Confirm Passphrase
Certificate ID
Specify certificate ID. You can specify any one of the following:
Available Options:
DNSIP Address (IPv4/IPv6 Address)
Page 93 of 490
Email Address
DER ASN1 DN(X.509) (Applicable when Authentication
Type is Digital Certificate)
Identification Attributes
Select the Country for which the Certificate will be used.
Country Name
State
Locality Name
Organization Name
Organization Unit
Name
Email Address
Page 94 of 490
Certificate Authority
The Appliance provides a facility to generate a local certificate authority as well as import certificates, signed
by commercial providers, such as VeriSign.
A certificate signed by a Certificate Authority (CA) identifies the owner of a public key. Each communicating
party may be required to present its own certificate signed by a CA verifying the ownership of the
corresponding private key. Additionally, the communicating parties need to have a copy of the CAs public
key. In case private key is lost or stolen or the information is changed, CA is responsible for revoking the
certificate. CA also maintains the list of valid and revoked certificates.
After your CA has issued a certificate or have local certificate, you can upload it for use in VPN.
You can use default CA and can modify and re-generate it as per your requirement if you are not using any
external CA. Using this CA, you can generate self-signed certificate and use it in VPN policy.
The page displays list of all the certificate authority and you can filter list based on certificate authority name.
The page also provides option to download, regenerate CA, update the parameters of the existing CA, or
delete the CA.
To manage Certificate Authorities, go to System > Certificate > Certificate Authority.
Download Click the Edit icon
in the Manage column against the Default Certificate Authority to
modify the certificate authority. Once modified, click Download button to download the certificate
Authority.
Page 95 of 490
Description
Name
Subject
Certificate Subject
Local
Regenerate
Certificate Authority
Icon
Note
Page 96 of 490
CA Parameters
Screen Element
Description
Certificate Authority
Name
Certificate File
Format
Available Options:
PEM (Privacy Enhanced Mail): A format encoding the
certificate in ASCII code. The certificate, request, and
private key are stored in separate files.
DER: A binary format for encoding certificates. The
certificate, request, and private key are stored in
separate files.
Page 97 of 490
Certificate
Private Key
CA Passphrase
Default CA Parameters
To edit default certificate authority, go to System > Certificate > Certificate Authority. Click on the
Default certificate to update and regenerate the default certificate.
Screen Element
Description
Certificate Authority
Name
Country Name
State
Locality Name
Organization Name
Page 98 of 490
Organization Unit
Name
CA Passphrase
Page 99 of 490
Certificate Revocation List (CRL) page is a way to check the validity of an existing certificate. Certificates
which are stolen, lost or updated are revoked by CA and CA publishes such revoked certificates in Revocation
list. VPN connection cannot be established using revoked certificates, hence it is necessary to update the
CRL at regular intervals.
The page displays the list of available CRLs. It also provides option to add a new CRL, download the CRL,
edit, and delete the existing CRL.
Download Click Download to download CRL.
Description
Name
Local
Parameters
Screen Element
Description
CRL File
Download CRL
Once CA is generated, default CRL is generated with name Default.tar.gz. Once you revoke the certificate,
the details of the revoked certificate are added to the default file and regenerated. You can download and
distribute if required.
Select System > Certificate > CRL and to view the list of CRLs.
Click Download link against the CRL name to be downloaded. It downloads the zip file, unzip the file to
check the details.
Diagnostics
Diagnostic page allows checking of the health of your Appliance in a single shot. Information can be used for
troubleshooting and diagnosing problems found in your Appliance.
It is like a periodic health check up that helps to identify the impending Appliance related problems. After
identifying the problem, appropriate actions can be taken to solve the problems and keep the Appliance
running smoothly and efficiently.
Tools
System Graphs
Packet Capture
Connection List
Consolidated Troubleshoot Report (CTR)
Tools
Using Tools, one can view the statistics to diagnose the connectivity problem, network problem and test
network communication. It assists in troubleshooting issues such as hangs, packet loss, connectivity,
discrepancies in the network.
Go to System > Diagnostics > Tools to view the various statistics.
Ping
Trace Route
Name lookup
Route lookup
Ping
Ping is a most common network administration utility used to test the reachability of a host on an Internet
Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a
destination computer.
Ping sends ICMP echo request/replies to test connectivity to other hosts. Use standard ICMP ping to confirm
that the server is responding. Ping confirms that the server can respond to an ICMP ping request.
Screen Element
IP Address/Host
Name
Description
Specify the IP Address (IPv4/IP6) or fully qualified domain
name to be pinged.
Select the Interface through which the ICMP echo requests are
to be sent.
Available Options:
IPv4
IPv6
Interface
Select the Interface through which the ICMP echo requests are
to be sent.
Size
Trace Route
Trace Route is a useful tool to determine if a packet or communications stream is being stopped at the
Appliance, or is lost on the Internet by tracing the path taken by a packet from the source system to the
destination system, over the Internet.
Screen Element
IP Address/Host
Name
Description
Specify the IP Address (IPv4/IPv6) or fully qualified domain
name.
Available Options:
IPv4
IPv6
Interface
Size
Name lookup
Name lookup is used to query the Domain Name Service for information about domain names and IP
Addresses. It sends a domain name query packet to a configured domain name system (DNS) server. If a
domain name is entered, one gets back an IP Address to which it corresponds, and if an IP Address is entered,
then one gets back the domain name to which it corresponds. In other words, it reaches out over the Internet
to do a DNS lookup from an authorized name server, and displays the information in the user understandable
format. Also one can view all the available DNS Servers configured in Appliance by selecting option Name
Lookup. Selecting this option will also provide information about the time taken to connect to each of the DNS
server. Based on the least time, one can prioritize the DNS server.
Screen Element
Description
IP Address/Host
Name
DNS Server IP
Route lookup
If you have routable networks and wish to search through which Interface, the Appliance routes the traffic
then lookup the route for the IP Address (IPv4/IPv6).
System Graph
Use System Graph to view Graphs pertaining to System related activities for different time intervals.
Period wise graph will display following graphs for the selected period: Live Graph, CPU usage Info, Memory
usage Info, Load Average and Interface usage Info. These graphs are same as displayed in Utility wise
graphs. They are regrouped based on the time interval.
To view graphs, go to System > Diagnostics > System Graphs. You can view Period wise Utilities
graphs.
Utility wise graph will display following graphs for the selected time period i.e. Live Graph (last two hours),
Last 24 hours, Last 48 hours, Last Week, Last Month, Last Year:
CPU usage Info
Memory usage Info
Load Average
Disk usage
Number of Live Users
Data transfer through WAN Zone
Interface usage Info
Live Graphs
Live graphs allow Administrator to monitor the usage of resources of the last two hours. Graph displays the
percentage wise CPU and Memory usage. It also displays load average and traffic statistics on each interface.
Last two hour CPU Usage Below graph shows past two hours CPU usage in percentage.
Legends
Orange Color CPU used by User
Purple Color CPU used by System
Green Color CPU Idle time
Legends
Orange Color Total KBits/Second
Last two hours Gateway wise Total Data Transfer through WAN Zone Gateway wise total data transfer for
last two hours through WAN Zone - Graph displays total data transferred through all the configured gateways
during last two hours. In addition, shows minimum, maximum and average data transfer.
Legends
Orange Color Default Gateway
Purple Color Second Gateway (if configured)
Legends
Orange Color Bits Received (Kbits/Sec)
Purple Color Bits Transmitted (Kbits/Sec)
Light Green Color Received Errors
Blue Color Bits Transmitted but Dropped
Pink Color Collisions
Red Color Transmitted Errors
Dark Green Bits Received but Dropped
Note
Today and yesterday graphs are plotted at an average of five (5) minutes.
Weekly Graph is plotted at an average of fifteen (15) minutes.
Monthly Graph is plotted at an average of six (6) hours.
Yearly Graph is plotted at an average of one (1) day.
Page 113 of 490
Packet Capture
Packet capture displays packets details on the specified interface. It will provide connection details and details
of the packets processed by each module packets e.g. firewall, IPS along with information like firewall rule
number, user, Web and Application Filter policy number etc. This will help administrators to troubleshoot
errant Firewall Rules.
To capture information about packets, go to System > Diagnostics > Packet Capture. You can:
Configure Capture Filter Click the Configure Button to configure filter settings for capturing the
packets.
View Click on the packet to view the packet information.
Display Filter Click the Display Filter Button to specify the filter conditions for the packets.
Clear Click the Clear Button to clear the details of the packets captured.
Screen Element
Description
Packet Capture
Packet Capture
Trace On
- packet capturing is on
Trace Off
Refresh Button
Clear Button
Time
In Interface
Out Interface
Ether Type
Destination IP
Packet Type
Rule ID
Firewall Rule ID
Status
Reason
Connection Status
Served By
Web Filter ID
Connection Flags
System Flags
Application ID
Application Category
ID
Connection ID
Gateway ID
Bandwidth Policy ID
User Group
IPS Policy ID
Application Filter ID
Web Category ID
Master Connection ID
User Name
Packet Information
Packet Information
Screen Element
Description
Number of Bytes to
Capture (per packet)
Example
specific host
host 10.10.10.1
specific network
net 10.10.10.0
specific port
Port 20 or port 21
src port 21
dst port 21
specific protocol
Display Filter
Display Filter page restricts the packet capturing to specific type of packets only. There are other filtering
conditions such as the type of interface, ether type, source IP address & destination IP address.
Screen Element
Description
Interface Name
Select the physical interface from the list for filtering packets
log.
Ether Type
Select the packet type used from the list for filtering packets.
Source IP
Source Port
Destination IP
Destination Port
Reason
Available Options:
Firewall
Local_ACL
DOS_ATTACK
INVALID_TRAFFIC
INVALID_FRAGMENTED_TRAFFIC
ICMP_REDIRECT
SOURCE_ROUTED_PACKET
FRAGMENTED_TRAFFIC
APPLICATION FILTER
USER_IDENTITY
IPS
FOREIGN_HOST
IPMAC_FILTER
IP_SPOOF
ARP_POISONING
SSL_VPN_ACL_VIOLATION
Virtual_Host
Status
Available Options:
Allowed
Violation
Consumed
Generated
Incoming
Forwarded
Rule ID
User
Connection ID
Clear
Connection List
Connection list provides current or live connection snapshot of your Appliance in the list form. Apart from the
connection details, it also provides information like Firewall Rule ID, User ID, Connection ID per connection.
It is also possible to filter the connections list as per the requirement and delete the connection.
The Administrator can set the Refresh Interval to automatically refresh the list at the configured time interval
or manually refresh the list by clicking the Refresh button. To filter the connection list click the Display Filter
button and specify the parameters.
To view connection list, go to System > Diagnostics > Connection List. You can:
Set refresh interval
Display Filter Click the Display Filter Button to specify the filter connection based on the various
parameters.
Description
Connection List
Refresh Interval
Select the time interval after which the connection list will be
refreshed.
Time
Connection time
In Interface
Out Interface
Source IP
Destination IP
Protocol
Source Port
Destination Port
Rule ID
User Name
Flags
System flag
Connection ID
Unique ID of a connection
Master Connection ID
User Group
Web Filter ID
Application Filter ID
IPS Policy ID
QoS Policy ID
SSLVPN Policy ID
Gateway ID
Web Category ID
Application ID
Application Category
ID
Connection served
by
Translated Source
Translation
Destination
Rx Bytes
Tx Bytes
Rx Packets
Tx Packets
Connection Status
Connection State
Expiry (second)
Delete Button
Description
In Interface
Out Interface
User
Network Protocol
Available Options:
IPv4
IPv6
Source IP
Destination IP
Protocol
Source Port
Destination Port
Rule ID
Clear
The Administrator has to generate and mail the saved file at [email protected] for diagnosing and
troubleshooting the issue. File will be generated with the name: CTR_<APPKEY>__<MM_DD_YY >
_<HH_MM_SS>
where
APPKEY is the Appliance key of the Appliance for which the report is generated
MM_DD_YY is the date (month date year) on which the report is generated
HH_MM_SS is the time (hour minute second) at which the report is generated
By default, debug mode is off for all the subsystems. Before generating Log file, enable debug mode by
executing following command at CLI command prompt:
console > diagnostics subsystems <subsystem name> debug on
Note
Debug mode cannot be enabled, if you want to generate only the system snapshot.
Screen Element
Description
Available Options:
System Snapshot Generates snapshots to display the
issues in the system.
Log Files Generates log files.
Reason
Objects
Objects are the logical building blocks of various policies and rules, which include:
Host IP, network and MAC Addresses. They are used in defining the Firewall Rules, Virtual Host,
NAT policy, IPSec, L2TP and VPN policies.
Services Represents specific protocol and port combination for example, DNS service for TCP on
port 53. Access to services are allowed or denied through Firewall Rules.
Schedule Controls when the Firewall Rule, Access Time policy, Web Filter policy, Application Filter
policy, or QoS policy is applicable for example, All Days, Work Hours.
File Types Defining Web Filter policy, SMTP Scanning Rules
Appliance supports four types of hosts:
IP Host
MAC Host
FQDN Host
Country Host
Hosts
Services
Schedule
File Type
Hosts
An IP host is a logical building block used in defining Firewall Rules, Virtual Host and NAT policy. By default,
the numbers of hosts equal to the number of ports in the Appliance, are already created.
Object IP/MAC Host represents various types of addresses, including IP Addresses, networks and Ethernet
MAC Addresses.
IP Host
Hosts allow the entities to be defined once and be re-used in multiple referential instances throughout the
configuration. For example, an Internal Mail Server with an IP Address as 192.168.1.15. Rather than repeated
use of the IP Address while constructing Firewall Rules or NAT Policies, it allows to create a single entity
called Internal Mail Server as a Host name with an IP Address as 192.168.1.15. This host, Internal Mail Server
can then be easily selected in any configuration screen that uses Hosts as a defining criterion.
By using hosts instead of numerical addresses, you only need to make changes at a single location, rather
than in each configuration where the IP Address appears.
Using Hosts, reduces the error of entering incorrect IP Addresses, makes it easier to change addresses and
increases readability.
To configure IP Host, go to Objects > Hosts > IP Host.
The IP Host page displays the list of all the dynamic hosts which are automatically added on creation of VPN
Remote access connections (IPSec and SSL) and the default hosts that are automatically created for remote
access connection - ##ALL_RW, ##WWAN1, ##ALL_IPSEC_RW and ##ALL_SSLVPN_RW along the
manually added hosts. The page also provides option to add a new host, update the existing host, or delete
a host.
Note
Description
Name
IP Family
Type
Address Detail
List also displays dynamic hosts which are automatically added on creation of VPN Remote access
connections (IPSec and SSL) and the default hosts that are automatically created for remote access
connection - ##ALL_RW, ##WWAN1, ##ALL_IPSEC_RW and ##ALL_SSLVPN_RW.
Add an IP Host
To add or edit an IP host, go to Objects > Hosts > IP Host. Click the Add button to add a new host. To
update the details, click on the host or Edit icon
Description
Name
IP Family
Available Options:
IPv4
Type
IPv6
Select the type of host.
Available options:
Single IP Address
Network IP Address with subnet
IP Range
IP list to add assorted IP Addresses. Use comma to
specify assorted multiple IP Addresses. Create IP list to
configure single Firewall Rule for multiple IP Address
which are not in a range.
Note
IP Address
IP Host Group
Select host group i.e. host group membership. Single host can
be member of multiple host groups.
You can also add a host group from Add Host page itself.
Note
IP Host Group
Host group is a grouping of hosts. Firewall Rule can be created for the individual host or host groups.
The IP Host Group page displays the list of all the host groups. The page also provides an option to add a
new host group, update the parameters of the existing host group, add members to the existing host group,
or delete a host group.
Note
Dynamic host groups that are automatically added on creation of VPN Remote Access Connections
cannot be updated or deleted.
Description
Name
IP Family
Description
Screen Element
Description
Name
IP Family
Available Options:
IPv4
Description
IPv6
Describe the IP Host Group.
Select Host
Click the checkbox to select the hosts. All the selected hosts are
moved to 'Selected host' list.
MAC Host
Appliance allows creating a host based on MAC Address. One can create a MAC Host of either a single MAC
Address or multiple MAC Addresses.
MAC Hosts allow entities to be defined once and be re-used in multiple referential instances throughout the
configuration. For example, test has a MAC Address as 00:16:76:49:33:CE or 00-16-76-49-33-CE. Rather
than remembering the MAC Address of the intended machine while applying policies, you can simply provide
its MAC Host name.
By using MAC hosts, you only need to make changes in a single location, rather than in each configuration
where the MAC Address appears.
Using MAC Hosts reduces the error of entering incorrect MAC Addresses, makes it easier to change
addresses, and increases readability.
The MAC Host page displays the list of all the available MAC host. The page also provides option to add a
new MAC host, update the existing host, or delete a host.
Description
Name
Type
Address Detail
Description
Name
Type
Available Options:
MAC Address Single MAC Address
MAC list Multiple MAC Addresses
MAC Address
FQDN Host
Hosts allow entities to be defined once and be re-used in multiple referential instances throughout the
configuration. For example, www.example.com has an IP Address as 192.168.1.15. Rather than remembering
the IP Address of the intended website while accessing it, you can simply provide www.example.com in the
browser. The FQDN www.example.com will now be mapped to its respective IP Address, and the intended
webpage opens.
The FQDN Host page displays the list of all the available FQDN host. The page also provides option to add
a new FQDN host, update the existing host, or delete a host.
To configure FQDN Host, go to Objects > Hosts > FQDN Host.
Note
Screen Element
Description
Name
FQDN
Screen Element
Description
Name
FQDN
Select host group i.e. host group membership. Single host can
be a member of multiple host groups.
You can also add a host group from Add Host page itself or from
Objects > Hosts > FQDN Host Group page..
Table Add FQDN Host screen elements
The FQDN Host page displays the list of all the available FQDN host. The page also provides an option to
add a new FQDN host group, update the parameters of the existing host group, add members to the existing
host group, or delete a group.
To configure host groups, go to Objects > Hosts > FQDN Host Group.
Note
Dynamic host groups which are automatically added on creation of VPN Remote Access connections
cannot be updated or deleted.
Screen Element
Description
Name
Description
Description
Name
Description
Select Host
Click the checkbox to select the hosts. All the selected hosts are
moved to Selected host list.
Country Host
Country Based Host is required to allow/block the traffic from/to a particular country. Hosts allow entities to
be defined once and be re-used in multiple referential instances throughout the configuration. For example,
you want to deny incoming traffic from country X. You can select the country X and select the option to
block the traffic coming from X.
To configure Country Host, go to Objects > Hosts > Country Host.
Note
Description
Name
Country
List also displays dynamic hosts which are automatically added on creation of VPN Remote access
connections (IPSec and SSL) and the default hosts that are automatically created for remote access
connection - ##ALL_RW, ##WWAN1, ##ALL_IPSEC_RW and ##ALL_SSLVPN_RW.
Screen Element
Description
Name
Country
Select host group i.e. host group membership. Single host can
be member of multiple host groups.
You can also add a host group from Add Host page itself or from
Objects > Hosts > Country Host Group page.
Table Add Country Host screen elements
The Country Host Group page displays the list of all the available Country host groups. The page also provides
option to add a new host group, update the parameters of the existing host group, add members to the existing
host group, or delete a group.
Note
Dynamic host groups which are automatically added on creation of VPN Remote Access connections
cannot be updated or deleted.
Screen Element
Description
Name
Description
Description
Name
Description
Select Host
The Host List displays all the hosts including default hosts.
Click the checkbox to select the hosts. All the selected hosts are
moved to the 'Selected host' list.
Services
Services represent types of Internet data transmitted via particular protocols or applications. Itallows
identifying the traffic based on the attributes of a given protocol.
Protect your network by configuring Firewall Rules to
block services for specific zone
limit some or all users from accessing certain services
allow only specific user to communicate using specific service
Appliance is shipped with several default services and allows creating:
Custom service definitions
Firewall Rule for custom service definitions
Services
Service Group
Services
Services are definitions of certain types of network traffic and combine information about a protocol such as
TCP, ICMP or UDP as well as protocol-related options such as port numbers. You can use services to
determine the types of traffic allowed or denied by the firewall.
Certain well-known traffic types have been predefined in services. These predefined services are defaults,
and cannot be updated or deleted. If you require service definitions that are different from the predefined
services, you can add them as custom services.
The Services page displays the list of all the default and custom services. The page also provides an option
to add a new service, update the parameters of the existing service, or delete a service.
Note
Description
Name
Protocol
Details
Service Parameters
To add or edit a service, go to Objects > Services > Services. Click the Add button to add a new
service. To update the details, click on the service or Edit icon
you want to modify.
Description
Name
Type
Available options:
TCP/UPD Enter Source and Destination port. You can
enter multiple ports for the same service.
IP Select Protocol Number for the service. You can
select multiple ports for the same service.
ICMP Select ICMP Type and Code. You can enter
multiple types and codes for the same service.
ICMPv6 Select ICMPv6 Type and Code. You can enter
multiple types and codes for the same service.
Use Add icon
and Remove icon
parameters respectively.
Service Group
Service Group is a grouping of services. Custom and default services can be grouped in a single group.
The Service Group page displays the list of all default and custom groups. The page also provides options to
add a new group, update the parameters of the existing group, add members to the existing group, or delete
a group.
Note
Screen Element
Description
Name
Description
in the Manage
Description
Name
Description
Select Service
You can also search for a particular service from the list.
Table Add Services Group screen elements
Schedule
Schedule defines a time schedule for applying Firewall Rule or Web & Application Filter policy i.e. used to
control when Firewall Rules or Internet Access policies are active or inactive.
Schedule also defines the system triggered scan for Rogue AP Scan.
Types of Schedules:
Recurring use to create policies that are effective only at specified times of the day or on specified
days of the week.
One time - use to create Firewall Rules that are effective once for the period of time specified in the
schedule. One time schedule can be implemented through firewall only.
Schedule
Schedule
TheAppliance is shipped with following pre-defined schedules which can be applied to Firewall Rules and
various policies: Work hours (5 Day week), Work hours (6 Day week), All Time on Weekdays, All Time on
Weekends, All Time on Sunday, All Days 10:00 to 19:00. You can also create new schedule and modify the
existing schedules.
The Schedule page displays the list of all the predefined and custom schedules. The page also provides
options to add a new schedule, update the parameters of the existing schedule, or delete a schedule.
To manage Schedules, go to Objects > Schedule > Schedule.
Note
Manage Schedules
To manage schedules, go to Objects > Schedule > Schedule.
Screen Element
Description
Name
Type
Description
Schedule Parameters
Description
Name
Description
Type
Available Options:
Recurring Use to create access time policies that are
effective only at specified times of the day or on specified
days of the week.
One Time Use to create Firewall Rules that are
effective once for the period of time specified in the
schedule. It cannot be applied to any of the policies but
can be implemented through Firewall Rule only.
Start & End Date - Specify Start and Stop date. This is
applicable for the one time schedule only.
Also, select the days of the week and specify time for the
schedule to be active. Stop time cannot be greater than start
time.
Table Add Schedule screen elements
File Type
File Type is a grouping of file extensions or MIME headers. The Appliance allows filtering Internet content
based on file extension and MIME headers. For example, you can restrict access to particular types of files
from sites within an otherwise-permitted category.
When both Extension & MIME header are configured, both will be matched separately. If a file does not match
any extension or header, it is passed. Access decision is based on the action configured for the extension.
Depending on the organization requirement, allow or deny access to the file types with the help of policies by
groups, individual user, time of day, and many other criteria.
For convenience, the Appliance is shipped with several default File Types categories. You can use these or
even create a new File Type category to suit your needs.
Custom file type is given priority over default category while allowing/restricting the access and is implemented
through Web Filter policy.
The File Type Category page displays the list of all the predefined and custom file type categories. The page
also provides options to add a new category, update the parameters of the existing category, or delete a
category.
Note
Screen Element
Description
Name
File Extensions
MIME Headers
Description
Screen Element
Description
Name
Template
File
Extension(s)/MIME
Header(s)
Network
Network establishes how your Appliance connects, interacts with your network, and allows configuring of
network specific settings.
This menu covers how to configure the Appliance to operate in your network. Basic network settings include
configuring your Appliance interface and DNS settings. More advanced configuration includes adding Virtual
LAN sub-interfaces and custom zones to the network configuration. It also describes how to use DHCP to
provide convenient automatic network configuration for your clients. It provides steps on how to backup and
restore your system configuration.
Interface
Wireless LAN
Wireless WAN
Gateway
Static Route
DNS
DHCP
ARP
Dynamic DNS
Interface
The Appliance is shipped with a number of physical interfaces/ports and the number of interfaces depends
on the Appliance model. The physical interfaces can be configured as:
Alias Alias allows binding multiple IP Addresses onto a single physical interface. It is another name
for the interface that will easily distinguish this interface from another interface.
Bridge Pair Bridge pair enables to configure transparent subnet gatewaying.
LAG Link Aggregation Group (LAG) is a method by which multiple network connections can be
combined into a single connection. It is also known as trunking, NIC teaming, NIC bonding and Ether
Channel. LAG is mostly used for handling LAN traffic.
VLAN Virtual LAN is a broadcast domain configured on switch on a port-by-port basis.
WLAN Wireless Local Area Network (WLAN) is used to associate devices through wireless
distribution method and connection to the Internet is provided through an access point.
WWAN Wireless WAN is wide area network (WAN) for data that is typically provided by the cellular
carriers to transmit a wireless signal over a range of several miles to a mobile device.
TAP - Test Access Point (TAP) interface enables to deploy Cyberoam in Discover Mode. This mode
enables Cyberoam to monitor all network traffic without making any changes in the existing network
schema. Discover Mode could be configured through Command Line Interface (CLI).
Pre-requisites for Discover Mode:
1. All relevant modules (IPS, Web & Application Filter, Anti Virus and Anti Spam) should be
subscribed.
2. Cyberoam must be connected to the Internet for Web classification, IPS updates and SAR
generation on cloud.
3. Cyberoam must be integrated with External Authentication servers like Active Directory, RADIUS,
LDAP etc. to get users specific data in the Security Assessment Report (SAR). SAR provides
visibility into potential risks prevailing within the corporate network like application and web risks,
risky users and intrusion risks.
A Zone is a logical grouping of ports/interfaces and each port is a member of a zone.
Note
Interface
IP Tunnel
Zone
Interface
The Interface page displays a list of physical interfaces, aliases, virtual sub-interfaces, bridge-pair interfaces,
interfaces configured as LAG, interfaces configured for wireless LAN, interfaces configured for wireless WAN
and interfaces configured as TAP.
If the virtual sub-interface is configured for the physical interface, it is also displayed beneath the physical
interface. Virtual sub-interface configuration can be updated or deleted. Click the Toggle Drill Down
to view the alias and virtual sub-interfaces defined for the said physical interface.
icon
Update Wireless WAN Connection Wireless WAN is the default interface along with other physical
interfaces, if the device is supported by your Appliance.
Note
icon to view the alias and virtual sub-interfaces defined for the
Note
A virtual sub-interface cannot be deleted, if virtual sub-interface is member of any zone or a firewall rule is
defined for the virtual sub-interface.
Deleting Interface also removes all its dependent configurations including: Interface Zone Binding, DHCP
Server or Relay, Interface Based Firewall Rule, ARP Static and Proxy, Virtual Hosts, Virtual Host based
Firewall Rules, Interface based Hosts and References from Host Groups, Unicast and Multicast Routes.
When deployed in Discover Mode, Cyberoam functions ONLY in a listening mode and, hence, none of
the security policies will be applied.
Screen Element
Interface Name
Description
Displays the Interface name in case of Physical Interface, Port
name and for Wireless WAN connection, WWAN name.
Status
(Only when
Appliance is
deployed in Gateway
mode)
IP Address - IP
IP Address Type
(Only when
Appliance is
deployed in Gateway
mode)
IP Address type
Static
PPPoE
DHCP
Wireless Modem
Zone Name
(Only when the
Appliance is
deployed in Gateway
mode)
MAC Address
MSS
MTU
Interface Speed
(Only when the
Appliance is
deployed in Gateway
mode)
Not all the operations are supported when Cyberoam is deployed in Bridge mode.
Interface Manage page will display Zone Name as Discover for interfaces configured in Discover Mode.
TAP interface cannot be updated or deleted.
Only unbound Physical Interfaces can be configured in Discover mode.
Screen Element
Description
General Settings
Physical Interface
Network Zone
(Only when
Appliance is
deployed in Gateway
mode)
Available Options:
None
LAN
WAN
DMZ
Page 156 of 490
Available Options:
Static Static IP Addresses are available for all the zones.
PPPoE PPPoE is available only for WAN Zone. If PPPoE
is configured, WAN port is displayed as the PPPoE
Interface.
DHCP DHCP is available only for WAN Zone.
IPv4 / Netmask
Gateway Detail
(Only when Network
Zone is WAN)
LCP failure
Appliance will wait for the LCP echo request response for the
LCP Echo interval defined after every attempt. It declare
PPPoE link as closed if it does not receive response after
defined number of attempts.
Default Attempts Allowed 3
Schedule Time For Reconnect
The assigned IP Address, dynamic or static (preferred), for a
PPPoE connection may have a stipulated validity. Once the
validity is over the PPPoE connection is terminated and
reconnected.
In order to avoid the reconnection during the working hours, the
Administrator can enable the PPPoE reconnection schedule. An
Administrator can choose to schedule the PPPoE reconnection
on daily or weekly basis on the configured time (HH:MM).
Default - Disable
Default schedule when enabled All days of week at 00:00
hours.
For DHCP IP assignment Specify the Gateway Name and
IP Address through which the traffic is to be routed.
IPv6 Configuration
IPv6 / Prefix
Advanced Settings
Interface Speed
For PPPoE
Default 1452
Acceptable Range 528 to 1452
Use Default MAC
Address
(Not available for
alias, VLAN, virtual
interfaces, PPPoE,
serial modem
interface, dedicated
HA link, Wireless
LAN, Wireless WAN
and bridge interface)
Override Default
MAC Address
Address
(Not available for
alias, VLAN, virtual
interfaces, PPPoE,
serial modem
interface, dedicated
Click to override the default MAC Address for the Interface and
enter the new MAC Address.
HA link, Wireless
LAN, Wireless WAN
and bridge interface)
Table Edit Physical Interface screen elements
Note
PPPoE Interface is assigned a new dynamic IP Address for each new PPP session
IP Address in Firewall Rules automatically changes when the new IP Address is leased
If multiple gateways are defined then IP Address in the failover condition automatically changes when the
new IP Address is leased.
As IP Address to PPPoE interface is assigned dynamically, it cannot be viewed or changed from Network
Configuration option of CLI Console.
Screen Element
Description
General Settings
Name
Description
Enable routing on
this bridge-pair
Member Interfaces
Interface
Zone
IPv4 Configuration
IPv4/Netmask
Gateway Detail
Gateway Name
Gateway IP
IPv6 Configuration
Specify IPv6 Address and the prefix.
IPv6 / Prefix
Gateway Detail
Gateway Name
IP Address
Advanced Settings
MTU
Multiport bridge can be configured. All interfaces of Cyberoam can be configured as member interfaces
for a bridge-pair.
A single WAN interface is supported in a multiport bridge-pair.
Single interface cannot be part of multiple bridge.
Alias Parameters
Alias allows binding multiple IP Addresses onto a single physical interface. It is another name for the interface
that easily distinguishes this interface from other interfaces.
To add or edit an alias, go to Network > Interface > Interface. Click the Add button to add a new
alias. To update the details, click on the alias name or Edit icon
you want to modify.
Screen Element
Description
Add Alias
Physical Interface
Note
IP Family
Available options:
IPv4
IPv6
IPv4/Netmask (For
IPv4 Family)
IPv6/Prefix
VLAN
A LAN is a local area network and is defined as all devices in the same broadcast domain. Routers stop
broadcasts while switches just forward them.
VLAN is a virtual LAN. In technical terms, VLAN is a broadcast domain configured on switch on a port-by-port
basis. Normally, it is a router that creates the broadcasts domain but with VLANs, a switch can create the
broadcast domain.
VLAN allow you to segment your switched network so that broadcast domains are smaller, leaving more
bandwidth for your end nodes. Devices that are in one VLAN can communicate with each other but cannot
communicate with the devices in another VLAN. The communication among devices on a VLAN is
independent of the physical network.
For devices on different VLANs to communicate, a layer 3 device (usually a router) must be used.
A VLAN segregates devices by adding 802.1Q VLAN tags to all of the packets sent and received by the
devices in the VLAN. VLAN ID/tags are 4-byte frame extensions that contain a VLAN identifier as well as
other information.
Advantages
Increased Port density
Logical segmentation of Network irrespective of physical placement
Granular security on heterogeneous LANs
Improved Network throughput as VLAN confines broadcast domain
In a typical VLAN configuration, 802.1Q-compliant VLAN layer-2 switches or layer-3 routers add VLAN IDs to
packets. Layer-2 switches can handle packets passing between devices in the same VLAN. A layer-3 device
such as router or layer-3 switch must handle packets passing between devices in different VLANs.
Appliance functions as a layer-3 device to control the flow of packets between VLANs. Appliance can also
remove VLAN IDs/tags from incoming VLAN packets and forward untagged packets to other networks, such
as the Internet.
VLAN support on the Appliance is achieved by means of virtual interface, which are logical interfaces nested
beneath a physical interface/port. Every unique VLAN ID requires its own virtual interface. You add virtual
interfaces to the Appliances internal interface that have VLAN IDs that match the VLAN IDs of packets in the
VLAN trunk. Appliance then directs packets with VLAN IDs to interfaces with matching VLAN IDs. You can
define virtual interfaces on all the interfaces except the external interface i.e. interface for the WAN zone.
Appliance adds VLAN IDs to packets leaving a VLAN interface or removes VLAN IDs from incoming packets
and adds a different VLAN IDs to outgoing packets.
Virtual interface has most of the capabilities and characteristics of a physical interface, including zone
membership, security services, routing, access rule controls, virus, and spam scanning.
Using VLANs, a single Appliance can provide security services and control connections between multiple
domains. Traffic from each domain is given a different VLAN ID. Appliance can recognize VLAN IDs and apply
security policies to secure network between domains. Appliance can also apply authentication, various
policies, and firewall rule features on the network traffic.
Parameters
Screen Element
Description
ADD VLAN
Physical Interface
Select parent Interface for the virtual sub-interface. Virtual subinterface will be the member of the selected physical
Interface/Port.
Zone
Select a Zone to assign to the virtual sub-interface. Virtual subinterface will be the member of the selected zone. It can be the
member of LAN, DMZ, WAN or custom zone.
Note
VLAN ID
Specify the VLAN ID. The interface VLAN ID can be any number
between 2 and 4094. The VLAN ID of each Virtual sub-interface
must match the VLAN ID of the packet. If the IDs do not match,
the virtual sub-interface will not receive the VLAN tagged traffic.
Note
IPv4 Configuration
IP Assignment
Available Options:
Static Static IP Addresses are available for all the zones.
PPPOE PPPOE is available only for WAN Zone. If
PPPoE is configured, the WAN port will be displayed as the
PPPoE Interface.
DHCP DHCP is available only for WAN Zone.
IPv4/Netmask
Gateway Detail
(Only when Network
Zone is WAN)
Specify the IPv4 Address for the interface and select the Network
subnet mask.
For Static IP assignment Specify the Gateway Name
and IP Address through which the traffic is to be routed.
For PPPoE IP assignment Specify the Gateway Name,
IP Address, PPPoE account Username and Password,
Service Name, LCP Echo Interval, LCP failure attempts.
Preferred IP
Many Internet Service Providers assign a fixed IP Address for
the PPPoE connection. The Administrator is allowed to bind a
static IP Address for a PPPoE.
LCP failure
The Appliance will wait for the LCP echo request response for
the LCP Echo interval defined after every attempt. It declare
PPPoE link as closed if it does not receive response after
defined number of attempts.
Default Attempts Allowed 3.
Default - Disable
IPv6 Configuration
IPv6/Prefix
Gateway Detail
(Only when Network
Zone is WAN)
Provide the gateway name and IPv6 Address through which the traffic
is to be routed.
Table Add VLAN Interface screen elements
If custom zone is created for Virtual sub-interface, two default firewall rules for the zone are automatically
created depending on zone type of the custom zone. For example, if the zone type for the virtual sub-interface
is LAN, 2 default firewall rules under Virtual sub-interface to WAN zone are automatically created based on
the default LAN to WAN zone firewall rules.
LACP
Link Aggregation Control Protocol (LACP) is a part of IEEE specification that groups two or more physical
links into a single logical link. LACP must be enabled at both ends of the link to be functional.
Appliance supports LAG to combine multiple physical links into a single logical link so that bandwidth can be
increased and automatic failover is available.
Advantages
Unbound physical interfaces are supported.
Only static physical interfaces are supported.
PPPoE, 3G, 4G, WWAN, WLAN and Transport mode are not supported in LAG.
Parameters
Screen Element
Description
Global Settings
Interface Name
Member Interface
Click the checkbox to select the port. All the selected ports are
moved to Selected Port list.
Mode
Available Options:
Active-Backup Select Active-Backup mode to provide
fault tolerance only.
802.3ad (LACP) Select 802.3ad (LACP) mode to load
balance the traffic and provide fault tolerance.
Network Zone
Available Options:
LAN
DMZ
WAN
IPv4 Configuration
IP Assignment
Available Options:
Static
DHCP
Default Static
IPv4 Address
Netmask
Gateway Detail
Gateway Name (Only
for WAN Zone)
IPv6 Configuration
IPv6 / Prefix
Gateway Detail
Gateway Name
(Only for WAN Zone)
Advanced Settings
Interface Speed
Speed mismatch between the Appliance and 3rd party routers and
switches can result into errors or collisions on interface, no
connections or traffic latency, slow performance.
Default - 1500
Acceptable Range - 576 to 1500
Override MSS
Default - 1460
Acceptable Range - 536 to 1460
Xmit Hash
Policy(Available only if
LACP (802.3ad) mode
is selected)
Select the Xmit hash Policy to be used for member interfaces from
the options available:
Available Options:
Layer2 Select to generate the hash value using hardware
MAC Addresses.
Layer2+3 Select to generate the hash value using a
combination of Layer 2 (MAC Address) and Layer 3 (IP
Address) protocol information.
Layer3+4 Select to generate the hash value using
Transport layer protocol information.
Primary Interface
(Available only if
Active-Backup mode
is selected)
Click to override the default MAC Address for the Interface and
enter the new MAC Address.
IP Tunnel
An IP Tunnel is an Internet Protocol network communications path between two networks. It is used to
encapsulate one network protocol as carrier for another network protocol. It is often used by two separate
networks having a router with different network address for communication. The Appliance supports IPv6
Tunnelling. Hence, IPv6 packets can be encapsulated in IPv4 headers using IP Tunnel.
This page provides a list of all the configured IP tunnels and the administrator can manage IP tunnels from
this page.
To manage zones, go to Network > Interface > IP Tunnel
Screen Element
Description
Tunnel Name
Tunnel Type
Zone
Other configurations
Adding an IP Tunnel
Screen IP Tunnel
Screen Element
Description
Tunnel Name
Tunnel Type
Available Options:
6in4 Select to allow communication between two IPv6
endpoints across IPv4 network.
6to4 Select to allow communication between two IPv6
endpoints across IPv4 network.
6rd Select to allow communication between two IPv6
endpoints across IPv4 network.
4in6 Select to allow communication between two IPv4
endpoints across IPv6 network.
Zone
Select the zone to create the tunnel for, from the options available.
Available Options:
LAN
DMZ
WAN
Local End Point
Default - 0
Acceptable Range - 0 to 255
TOS
Default - 0
Acceptable Range - 0 to 99
Table IP Tunnel screen elements
Zone
A Zone is a logical grouping of ports/physical interfaces and/or virtual sub-interfaces if defined.
Zones provide a flexible layer of security for the firewall. With the zone-based security, the administrator can
group similar ports and apply the same policies to them, instead of having to write the same policy for each
interface.
By default the traffic to and from this zone is blocked and hence the highest secured zone. However, traffic
between ports belonging to the same zone will be allowed.
DMZ (DeMilitarized Zone) This zone is normally used for publicly accessible servers. Depending on the
Appliance in use and network design, one can group multiple physical ports in this zone.
WAN This zone is used for Internet services. It can also be referred to as Internet zone.
VPN This zone is used for simplifying secure, remote connectivity. It is the only zone that does not have an
assigned physical port/interface. Whenever the VPN connection is established, port/interface used by the
connection is automatically added to this zone and on disconnection; port is automatically removed from the
zone. Like all other default zones, scanning and access policies can be applied on the traffic for this zone.
Local Entire set of physical ports available on your Appliance including their configured aliases are grouped
in LOCAL zone. In other words, IP Addresses assigned to all the ports fall under the LOCAL zone.
Screen Element
Description
Name
Members
Type
Device Access
Description
Zone Parameters
To add or edit zones, go to Network > Interface > Zone. Click Add Button to add a new zone. To
update the details, click on the zone or Edit icon
modify.
Screen Element
Description
Name
Type
Available Options:
LAN Depending on the Appliance in use and network
design, one can group one to six physical ports in this zone.
Group multiple interfaces with different network subnets to
manage them as a single entity. Group all the LAN networks
under this zone.
By default the traffic to and from this zone is blocked and hence
the highest secured zone. However, traffic between ports
belonging to the same zone will be allowed.
DMZ (DeMilitarized Zone) - This zone is normally used for
publicly accessible servers. Depending on the Appliance in
use and network design, one can group one to five physical
ports in this zone.
Note
Member Ports
'Member Ports' List displays all the ports that have been assigned
to the selected Zone
Click the checkbox to select the ports. All the selected ports are
moved to 'Selected port' list.
Description
Appliance Access
Note
If DMZ uses Private IP Address, use NATing to make them publicly accessible.
One cannot add zone if the Appliance is deployed as Bridge.
Page 179 of 490
Wireless WAN
This feature is not supported in Cyberoam Virtual Security Appliances.
Wireless WAN is wide area network (WAN) for data that is typically provided by the cellular carriers to transmit
a wireless signal over a range of several miles to a mobile device. WWAN connectivity allows a user with a
laptop and a WWAN support to use the web, or connect to a VPN from anywhere within the regional
boundaries of the cellular service.
To configure WWAN:
4. Enable WWAN from CLI with command: cyberoam wwan enable
5. Re-login to Web Admin console
6. Configure WWAN Initialization string and gateway from Network > Wireless WAN >
Settings page
Once WWAN is enabled from CLI, an interface named WWAN1 is created and it is the member of the
WAN zone.
As WWAN interface is a member of WAN zone:
1. All the services enabled for the WAN zone from the Appliance Access page are automatically
applicable on WWAN1 connection too.
2. All the firewall rules applied on WAN zone will be applied on WWAN interface
A default host named ##WWAN1 is created and firewall rule and VPN policies can be created for the
default host.
WWAN1 gateway is added as Backup gateway
When the Wireless WAN is disabled from CLI, Wireless WAN menu, default host ##WWAN1and
WWAN gateway options will be removed from Web Admin Console.
Note
Status
Settings
Status
The page displays the status of the Wireless WAN connection. Along with details of the WWAN connection,
the page also provides the facility to connect and disconnect the WWAN connection.
Screen Element
Description
Connect/Disconnect
Button
Status
Possible Status:
Modem not supported
No Modem plugged-in
Connecting
Reconnecting
Connected
Disconnected
Modem Name
IP Address
Gateway IP
Bytes Uploaded
Bytes Downloaded
Time Duration
Format: HH:MM::SS
Table WWAN Status screen elements
Page 181 of 490
Settings
The page allows configuration of Wireless WAN connection.
Screen Element
Description
General Settings
Interface Name
IP Assignment
Available Options:
Dialup (PPP)
Network Adapter (DHCP)
Click to view the modem details and the recommended
configuration.
Show
Recommended
Configuration Button
Possible Values
Dialup (PPP)
Network Adapter (DHCP)
Dialup (PPP) &
Adapter (DHCP)
Modem Port
Network
Not Available
Serial n (n= 0, 1, 9)
Secondary Modem
Ports
Not Available
Serial n (n = 0, 1, 9)
It displays next promising
modem port. This port must be
utilized as Modem Port, if the
recommended modem port
fails to function.
Not Available
APN
<name>
DHCP Connect
Command
Not Required
Required but not available
<AT command>
DHCP Disconnect
Command
Not Required
Required but not available
<AT command>
Note
Connect
Available Options:
Auto Dial & Active Gateway When auto-dial is configured
and gateway is added as Active. Appliance automatically
connects to the ISP and this gateway takes part in Load
balancing as per the weight configurations.
Manual Dial & Active Gateway When manual dial is
configured and gateway is added as Active, Appliance does
not automatically connect to ISP. Administrator needs to
initiate dial action.
Auto Dial & Backup Gateway When auto-dial is
configured and gateway is added as backup, on the event of
failover, Appliance auto-dials to the ISP and all the traffic
passes through that Wireless WAN link.
Manual Dial & Backup Gateway When Manual Dial is
configured and gateway is added as backup, on event of
failover, Appliance does not automatically connect the ISP.
The Admin needs to go to the Web Console and perform the
"Connect" action. Only then, traffic passes through Wireless
WAN interface.
Reconnect Tries
Available options:
Always
1
2
3
Default Always
Note
Available Options:
Serial 0 to 9
In case incorrect serial interface is configured, one needs plug-out
the modem or reboot the Appliance.
Phone Number (Only
for Dialup (PPP))
User Name
Password
Specify a Password.
Many operators lock their SIM card to prevent the use of other
operator's SIM cards. These kinds of modems can be unlocked
with the PIN code for connecting.
APN
DHCP Disconnect
Command (Only for
Network Adapter
(DHCP))
Initialization String
Gateway Settings
Gateway Name
Gateway IP Address
Gateway Type
Weight
When more than two gateways are configured and one gateway
goes down, the traffic is switched over to the available gateways
according to the ratio of the weights assigned to the available
gateways.
Activate This
Gateway (Only if
option Backup
Gateway Type is
selected)
Available Options:
If <Gateway Name> Gateway Fails Backup gateway will
take over and traffic will be routed through the backup
gateway only when the <Gateway Name> gateway fails.
Other Settings
MTU
Available Options:
Use Default MAC Address
Override Default MAC Address On selection of this option,
provide the MAC Address.
Table WWAN Settings screen elements
Gateway
A Gateway is used to route traffic between networks. In case of failure of the gateway, the entire network
traffic is dropped and communication with the outside network(s) is not possible.
By default, Appliance supports only one gateway. However, to cope with gateway failure problems, the
Appliance provides an option to configure multiple gateways. But simply adding one more gateway is not an
end to the problem. Optimal utilization of all the gateways is also necessary. The Appliance Multi Link Manger
provides link failure protection by detecting the dead gateway and switching over to the active link and also
provides a mechanism to balance traffic between various links.
At the time of deployment, you configured the IP Address for a default gateway through Network Configuration
Wizard. You can change this configuration any time and configure additional gateways. You can use Multi
Link Manger to configure multiple gateways for load balancing and failover.
By default, all the gateways defined through Network Configuration Wizard will be defined as Active gateway.
Gateway Name
Name of the Gateway assigned at the time of installation.
Gateway IP Address
IP Address of the Gateway assigned at the time of installation.
Ethernet Port
Gateway/WAN port
Gateway Type
Active By default, traffic is routed through Active gateway.
Backup Routes the traffic only when active gateway fails.
Weight
Weight assigned to the Gateway and used for load balancing. Weight determines how much traffic will pass
through a particular link relative to the other link. Administrators can set weight and define how the traffic
should be directed to providers to best utilize their bandwidth investments.
Gateway
The Appliance provides a powerful solution for routing and managing traffic across multiple Internet
connections. Designed to provide business continuity to an organization of any size, Multilink Manager
optimizes the use of multiple Internet links, such as T1s, T3s, DSL and cable connections from one or multiple
Internet service providers. Capable of automatic failover in the event of link failure, it helps to assure that your
network is always connected to the Internet.
It also gives you an option to configure multiple WAN interfaces to allow connecting your Appliance to more
than one Internet Service Provider (ISP).
When you configure multiple external interfaces, you have even have an option to control which interface an
outgoing packet uses.
Load Balancing
Load balancing is a mechanism that enables balancing traffic between various links. It distributes traffic among
various links, optimizing utilization of all the links to accelerate performance and cut operating costs. The
Appliance employs weighted round robin algorithm for load balancing to enable maximum utilization of
capacities across the various links.
How it works
Load balancing is determined by the load metric also known as weight. Each link is assigned a relative weight
and the Appliance distributes traffic across links in proportion to the ratio of weights assigned to individual
link. This weight determines how much traffic will pass through a particular link relative to the other link.
Administrator can set weight and define how the traffic should be directed to providers to best utilize their
bandwidth investments. Weight can be selected based on:
Link capacity (for links with different bandwidth)
Link/Bandwidth cost (for links with varying cost)
Weighted load balancing feature enables Network Managers to optimize network traffic and balance the load
between multiple links/interfaces.
Gateway failover
Page 188 of 490
Gateway failover provides link failure protection so that when one link goes down; the traffic is switched over
to the active link. This safeguard helps provide uninterrupted, continuous Internet connectivity to users. The
transition is seamless and transparent to the end user with no disruption in service without any downtime.
Gateway Failback
During a link failure, the Appliance regularly checks the health of a given connection, assuring fast
reconnection when Internet service is restored. When the connection is restored and gateway is up again,
without the Administrators intervention, traffic is again routed through the Active gateway. In other words,
backup gateway fails back on Active gateway. The page also displays status as Active
or Deactive
of the each gateway and failover rule in case multiple gateways are configured. You can change the gateway
parameters, change gateway status, add or remove the failover rule, and view the data transfer done through
the gateway.
For Backup gateway, weight is NA while for Active gateway, the configured weight is displayed.
Screen Element
Description
IPv4 Gateway
Name
IP Address
Interface
Type
Activate on Failure of
Weight
NAT Policy
Edit Icon
Click
Data Transfer
Click
or Deactive
IPv6 Gateway
Name
IP Address
Interface
Type
Activate on Failure of
Weight
Status
Edit Icon
Click
Data Transfer
Click
or Deactive
This is the time period for which Appliance waits before the
Gateway Failover occurs.
Default 60 seconds
Gateway Failover Timeout Input Range: 1 - 3600 seconds.
Table Manage Gateway screen elements
Screen Element
Description
Gateway Detail
Name
IP Address
Interface
Type
Available Options:
Active Default gateway(s). Traffic will route through
active gateway(s). If there exists more than one active
gateway then the traffic will be load balanced between
these gateways depending upon their weight.
Backup A gateway that can be used in an
active/passive setup, where traffic is routed through
Backup gateway only when Active gateway is down.
Note
Weight
Note
Automatic failover
From the dropdown list specify when the backup gateway
should take over from active Gateway. This takeover process
will not require administrators intervention.
Available Options:
Specific Gateway Dropdown will list all the configured
gateways. Backup gateway will take over and traffic will
be routed through the backup gateway only when the
selected gateway fails.
ANY Backup gateway will take over and traffic will be
routed through backup gateway when any of the active
gateway fails
ALL Backup gateway will take over and traffic will be
routed through backup gateway when all the configured
active gateways fail
Manual failover
If you select Manually, Administrator will have to manually
change the gateway if the active gateway fails.
Action on Activation
IF
Condition 1
AND/OR
Condition 2
then
Action
Depending on the outcome of the condition, traffic is shifted to any other available/backup gateway.
Ping rule gets automatically created for every gateway. The Appliance periodically sends the ping request to
check the health of the link and if it does not respond within the specified time, traffic is automatically sent
through another available link. Selection of the gateway and how much traffic is to be routed through each
gateway depends on number of configured active and backup gateways.
To configure Failover Rules, go to Network > Gateway > Gateway. Click the Edit Icon
Manage column against the Gateway.
in the
Screen Element
IF Then Condition
Description
Specify communication Protocol as TCP or PING (ICMP).
Select the protocol depending on the service to be tested on the
host.
IP Address
IP Address must be represented by the computer or Network
device which is permanently running or most reliable.
Condition
AND - all the conditions must be satisfied
OR - at least one condition must be satisfied
A request is sent to an IP Address. If IP Address does not
respond to the request, Appliance considers the IP Address as
unreachable.
Table Configure Gateway Failover screen elements
Screen Element
Description
Select the period from the available options for the Report of
Data Transfer through the Gateway.
Available Options:
Last Week
Last Month
Custom
Graph displays the upload, download and total data transfer
through Gateway.
X-axis Date (depending on the period selected)
Y-axis KB /MB/GB used.
Legends
Orange Color Upload Data Transfer (MB)
Purple Download Data Transfer (MB)
Static Route
A route provides the Appliance with the information it needs to forward a packet to a particular destination. A
static route causes packets to be forwarded to a destination other than the configured default gateway.
By specifying through which interface the packet will leave and to which device the packet should be routed,
static routes control the traffic exiting the Appliance.
Unicast
Multicast
Source Route
Unicast
The Unicast page displays list of all the configured IPv4 and IPv6 unicast routes. You can filter the list based
on IP address, gateway, interface, or distance. The page also provides option to update the route
configuration, and delete the route.
To manage unicast routes, go to Network > Static Route > Unicast.
Description
Gateway
Interface
Interface selected.
Distance
Screen Element
Description
Destination IP
Netmask (IPv4)
Prefix (IPv6)
Specify Prefix.
Gateway
Interface
Distance
Multicast
Configure and manage multicast routes from this page.
IP Multicast
Internet Protocol (IP) multicast is a bandwidth-conserving technology that reduces traffic by simultaneously
delivering a single stream of information to thousands of recipients and homes. IP Multicast delivers source
traffic to multiple receivers without adding any additional burden on the source or the receivers.
If IP multicast is not used, the source is required to send more than one copy of a packet or individual copy
to each receiver. In such case, high-bandwidth applications like Video or Stock, in which data is to be sent
more frequently and simultaneously, use a large portion of the available bandwidth. In these applications, the
only efficient way of sending information to more than one receiver simultaneously is by using IP Multicast.
Multicast Group
Multicast is based on the concept of a group. An arbitrary group of receivers expresses an interest in receiving
a particular data stream. This group does not have any physical or geographical boundariesthe hosts can
be located anywhere on the Internet. Hosts that are interested in receiving data flowing to a particular group
must join the group. Hosts must be a member of the group to receive the data stream.
IP Multicast Addresses
Multicast addresses specify an arbitrary group of IP hosts that have joined the group and want to receive
traffic sent to this group.
IP Class D Addresses
The Internet Assigned Numbers Authority (IANA) controls the assignment of IP multicast addresses. Multicast
addresses fall in Class D address space ranging from 224.0.0.0 to 239.255.255.255.
This address range is only for the group address or destination address of IP multicast traffic. The source
address for multicast datagrams is always the unicast source address.
Multicast forwarding
With multicast forwarding, a router forwards multicast traffic to networks where other multicast devices are
listening. Multicast forwarding prevents the forwarding of multicast traffic to networks where there are no
nodes listening.
For multicast forwarding to work across inter-networks, nodes and routers must be multicast-capable.
A multicast-capable node must be able to:
Send and receive multicast packets.
Register the multicast addresses being listened to by the node with local routers, so that multicast
packets can be forwarded to the network of the node.
IP multicasting applications that send multicast traffic must construct IP packets with the appropriate IP
multicast address as the destination IP Address. IP multicasting applications that receive multicast traffic must
inform the TCP/IP protocol that they are listening for all traffic to a specified IP multicast address.
Screen Element
Description
Enable Multicast
Forwarding
Source IP Address.
Multicast IP
Source Interface
Destination Interface
in the Manage
Screen Element
Description
Source Interface
Multicast IPv4
Address
Destination Interface
Select Destination Interface from the list. You can select more than
one destination interface.
IPv4
Address.
For
example,
Source Route
A route provides the Appliance with the information it needs to forward a packet to a particular destination.
Source Routing is the technique by which the sender can explicitly mention the route through which the packet
travels.
The page displays list of all the IPv4 and IPv6 source routes. The page provides an option to add, update and
delete the existing routes.
To manage source routes, go to Network > Static Route > Source Route.
Screen Element
Description
Network
Gateway
Gateway IP Address.
Table Manage Source Routes screen elements
Parameters
To add or edit an explicit source route for packets, go to Network > Static Route > Source Route.
Click the Add button to add a new source route. To update the details, click on the source route or Edit icon
in the Manage column against the source route you want to modify.
Screen Element
Description
Gateway
Network ID/Prefix
Netmask
Dynamic Route
A route provides the Appliance with the information it needs to forward a packet to a particular destination. A
dynamic route causes the Appliance to get the packet information at run time using dynamic routing protocols
like RIP, OSPF, and BGP.
RIP
OSPF
BGP
PIM-SM
Routing Information
RIP
To configure RIP routes, go to Network > Dynamic Route > RIP.
Routing Information Protocol (RIP) is a widely used routing protocol that uses hop count to determine the best
route to a destination.
RIP avoids routing loops from continuing indefinitely by limiting the number of hops permitted between the
source and destination. The maximum number of hops supported is 15. Hence, if the hop count becomes 16,
it is known as an infinite distance and is considered as unreachable.
With the help of RIP protocol, the Appliance sends the routing update messages at regular intervals to the
next router. When the next router receives the changes, it updates them in the routing table and also increases
the metric value for the path by 1. The sender of the message is considered as the next hop. The Appliance
maintains only the route with the least metric value to a destination.
Screen Element
Description
Global Configuration
Default Metric
Default - 1
Acceptable Range - 1 - 16
Administrative
Distance
Default - 120
Acceptable Range - 1 255
RIP Version
Select the RIP version to be used for sending and receiving the
updates.
Available Options:
Timers
Update
Default - 30 seconds
Acceptable Range (seconds) - 5 to 2147483647
Timeout
Default - Disabled
Redistribute
Connected
Acceptable Range - 0 to 16
Click to enable the redistribution of static routes into RIP routing
table.
Redistribute Static
Acceptable Range - 0 to 16
Click to enable the redistribution of OSPF routes into RIP
routing table.
Redistribute OSPF
Acceptable Range - 0 to 16
Click to enable the redistribution of BGP routes into RIP routing
table.
Redistribute BGP
Acceptable Range - 0 to 16
Network
Add
Network
Netmask
Edit
Delete
Interface
Screen Element
Interface
Description
Select the interface for which you want to override the default
configuration.
RIP Version
Send
Default - V2
Receive
Default - Disable
Poisoned Reverse
Note
Default Disable
Authentication
Enable to prevent
advertisements.
the
interface
from
sending
RIP
Default - Disable
Table Override Interface Configuration screen elements
OSPF
To configure OSPF routes, go to Network > Dynamic Route > OSPF.
Open Shortest Path First (OSPF) is an interior gateway protocol that multicasts the routing information to all
the hosts within a single network. It sends routing information to all the routers in the network by calculating
the shortest path to each router on the basis of the structure built up by each router.
OSPF allows sets of networks to be grouped together into what is known as areas. Area is a logical division
of a network. Each area maintains a separate database whose information may be summarized by the
connecting router. Hence, the topology of an area is not known to outside world. There are three types of
areas:
Backbone Area
Backbone area also known as area 0, distributes information between non-backbone areas. All other areas
in the network are connected to it and the routing between areas takes place using routers which are
connected to the backbone area as well as to their respective areas.
Stub Area
A stub area is an area that do not receive route advertisements external to the Autonomous System (AS),
which is a collection of networks under a common network operator that share same routing policy.
NSSA
A Not-so-stubby-area (NSSA) is a type of stub area that can import AS external routes in a limited amount.
Screen Element
Description
Global Configuration
Router ID
Advanced Settings
Default Metric
Default - 1
Available Options:
Standard:
CISCO
IBM
Shortcut
Specify cost reference to calculate the OSPF interface cost
based on bandwidth.
Default - 100Mbits/s
Acceptable Range - 1 to 4294967
Default Information
Originate
Available Options:
Never
Regular On selecting regular provide the metric
and select the metric type.
Always On selecting regular provide the metric
and select the metric type.
Default - Never
Redistribute
Connected
Area
Type
Displays the type of OSPF Area Normal or Stub or Stub NoSummary or NSSA or NSSA No-Summary.
Authentication
Area Cost
Virtual Links
Edit
Delete
Network
Add
Network
Netmask
Area
Edit Icon
Delete
Interface
Edit Icon
Delete Icon
Screen Element
Description
Area
Type
Available Options:
Virtual Link
(Available only if
Normal area type is
selected)
Normal
Stub
Stub No-Summary
NSSA
NSSA No-Summary
Specify a virtual link for an area that does not have a physical
connection to connect to the backbone area.
Available Options:
Area Cost
Text
MD5
Specify the area cost.
Screen Element
Description
Interface
Hello Interval
Specify the time interval after which the interface sends hello
packet to the neighbor router.
Default - 10 seconds
Acceptable Range (seconds) - 1 to 65535
Dead Interval
Default - 40 seconds
Acceptable Range (seconds) - 1 to 65535
Retransmit Interval
Default - 5 seconds
Acceptable Range (seconds) - 3 to 65535
Transmit Delay
Default - 1 second
Acceptable Range (seconds) - 1 to 65535
Interface Cost
Available Options:
Router Priority
Default - 1
Acceptable Range - 0 to 255
Table Overriding Global Interface Configuration screen elements
BGP
To configure BGP routes, go to Network > Dynamic Route > BGP.
Border Gateway Protocol (BGP) is a path vector protocol that contains path information, enabling the routers
to share routing information so that loop-free routes can be created. This protocol is generally used by ISPs.
BGP selects a single path from the multiple advertisements received from multiple sources for the same route.
When the path is selected, BGP puts it in the IP routing table and passes the path to its neighbor.
Screen Element
Description
Global Configuration
Router ID
Local As
Neighbor
Remote AS
Networks
Add
Network
Netmask
Neighbors
Neighbors are the routers between which a TCP connection is established.
Click Add button under Neighbors to specify IPv4 Address of the neighbor router and AS number remoteas. You can also add, update, or delete the neighbors from this page.
Description
IPv4 Address
Remote AS
Networks
Click Add button under Networks to specify IPv4 Address network and subnet mask. You can also add,
update, or delete the networks from this page.
PIM-SM
To configure PIM, go to Network > Dynamic Route > PIM-SM.
Protocol Independent Multicast (PIM) is a protocol for routing IP packets efficiently to multicast groups that
may span throughout the internet. PIM provides dynamic multicast support on the appliance. With dynamic
multicast support, a host can join/leave a multicast group dynamically and there is no need to manually
add/delete multicast routing entries on the appliance.
Screen Element
Description
PIM-SM Configuration
Enable PIM
Note:
Only IPv4 bound interfaces can be selected.
RP Settings
Available Options:
Static RP
Candidate RP
Static RP
Specify a unicast IP Address for Static RP. RPs can be added
or deleted.
RP IP
Timer
Default 60 seconds
Acceptable Range (seconds) 30 to 180
Table Dynamic Routing PIM screen elements
Note
Cyberoam supports PIM version2 and PIM-SM mode with Rendezvous Point (RP) selection method as
BSR (Bootstrap Router)
Routing Information
The Administrator can view various information and status of any dynamic routes configured using RIP, OSPF,
and BGP protocols. This overview of the dynamic route information will be useful for further configurations
and/or debugging.
Page 221 of 490
RIP
Routes
Displays the entire routing configuration information and the routing table for an interface configured using
RIP protocol.
Codes and Sub-codes: Shows how the destination routing information is obtained.
Sub-codes: (n) normal, (s) static, (d) default, (r) redistribute, (i) interface
Metric: It is the number of routing devices (hop count) a packet must pass through to reach the
final destination.
From: Indicates the router (router IP Address) from which the metric is calculated to reach the
destination. If it is directly connected it will show self.
Tag: Indicates the method used for distinguishing between internal routes (learned by RIP) and
external routes learned from External Gateway Protocol (ERP) protocols.
Time: Indicates the elapsed time after which the routing entry will be flushed from RIP table.
Status
Displays the RIP routing protocol process parameters and statistics.
Timeout after: Indicates the timeout interval for RIP route after which it is declared invalid and
removed from the routing table until the garbage-collect time expires.
Garbage collect: Indicates the time period during which the route metric is set to 16. If no updates
are received for the route before the expiry of garbage-collect timer, a route with metric 16 is
deleted from the routing table.
Outgoing update: Indicates whether the outgoing filtering list has been set.
Incoming update: Indicates whether the incoming filtering list has been set.
Default redistribution metric: Metric of routes that are redistributed from other routes
Default version control: Indicates the version of RIP packet that are sent and received.
send: Displays the version of RIP packets sent out to routing interface. The version is one of the
following: RIP1 or RIP2
recv: Displays the version of RIP packets accepted on routing interface. The version is one of the
following: RIP1, RIP2, Both
key-chain: Displayed the authentication key-chain name for the interface, if it is configured.
Routing for Network: Indicates the networks for which the routing process is currently injecting
routes.
Routing Information Sources: Indicates the routing sources used to build the routing table. For
each source, the following information is displayed.
Bad Routes: Indicates the number of invalid routes from the router.
Distance Last Update: Indicates the time when the administrative distance was last updated.
Distance: Indicates the administrative distance. The distance displayed by default is 120.
OSPF
Border Routers
Displays the information about the internal OSPF routing table entries to an Area Border Router (ABR) and
Autonomous System Boundary Router (ASBR).
R: Indicates that the information is provided for route to a particular border router.
Next Hop: It is the management IP Address of the next hop routing device.
Outgoing Interface: Indicates the name and IP Address of the outgoing interface to reach the
destination.
Routes
Displays the information about the internal OSPF routing table entries
Next Hop: It is the management IP Address of the next hop routing device.
Outgoing Interface: Indicates the name and IP Address of the outgoing interface to reach the
destination.
Database
Database shows the list of information related to the OSPF database summary for a specific router. Each
link-state database includes link-state an advertisement from throughout the areas to which router is attached.
Link ID: Indicates the ID of the link-state advertisement using which a router learns the route. In
other words, while a link-state advertisement describes a router, the link-state ID routers OSPF
router ID. It can be Networks IP Address or An address generated using the link-state ID
Age: Indicates the time, in seconds, since the LSA was generated.
Seq#: Link state sequence number (detects old or duplicate link-state advertisements)
Page 225 of 490
Net Link States: It gives information about network LSA originated by DR (Designated Router)
Router Link States: It gives information about router LSA originated by every router
Summary Net Link States: Indicates the information about Summary LSA originated by ABRs
Neighbors
It provides neighbor information based on peer-interface relation.
State: Displays the conversation between router and neighbor, since the neighbor was created. It
can have one of the following values:
Down: Indicates the initial state of a neighbor conversation, that is, there has been no recent
information received from the neighbor.
Attempt: It is valid only for neighbors attached to non-broadcast networks. It indicates that there
has been no recent information received from the neighbor.
Init: Indicates a hello packet though has been received recently from a neighbor, the adjacency is
not two-way that is, a bi-directional communication has not yet been established with neighbor.
2-Way: Indicates that a bi-directional communication is established between the routers and the
neighbor has included the router ID in its hello message. The DR and BDR are elected from the
set of neighbors in 2-Way state or higher.
ExStart: Indicates that the two routers are going to synchronize and determine which router will
be Master and which the slave.
Exchange: Indicates that the two routers are describing their respective link-state database by
sending database description packets.
Loading: Indicates that a link-state request packets are sent to the neighbor, requesting for more
advertisement that have been discovered but are not yet received in Exchange state.
Full: Indicates both the routers have accomplished the exchange of all the relevant advertisements
and can now appear in router-link and neighbor-link advertisements.
Dead time: The wait time in seconds to receive a Hello message from OSPF neighbor before
assuming the neighbor is dead.
Interface
Displays OSPF interface information.
Interface Value: Indicates the status of the physical interface, that is, whether the interface is up
or down.
IfIndex: Indicates the value of interface index (IfIndex). IfIndex is an identification unique number
associated with an interface.
MTU: Indicates the Maximum Transmission Unit (MTU) value of the interface. MTU is the largest
physical packet size, in bytes, that a network can transmit. This parameter becomes an issue
when networks are interconnected and the networks have different MTU sizes. Any packets larger
than the MTU value are divided (fragmented) into smaller packets before being sent
Network Type/IP Address: Indicates the type of the network along with the IP Address.
MTU mismatch detection: Indicates whether the MTU Mismatch detection is enabled or disabled.
If it is enabled, it would match the MTU of both the interfaces participating in Neighbor-ship
establishment.
Router ID: Indicates the identification number of the OSPF Router selected at the start of OSPF
process. The Router ID is unique within the OSPF Domain and does not change unless OSPF
restarts or is manually modified.
Network Type: Indicates the type of Network to which the OSPF interface is connected. A network
can be one of the following types:
Broadcast: Indicates a network that supports broadcast. In broadcast network a single packet sent
(broadcasted) by a router is received by all the routers within the network.
Non Broadcast Multiple Access (NBMA) - Indicates that the network does not have capability to
broadcast or multicast. It is used to accurate model X.25 and frame-relay environment in multipleaccess network.
Transmit delay: Indicates time the time in seconds for which the OSPF router waits before flooding
a link-state advertisement (LSA) over the link. The link state age is incremented by this value,
before transmitting an LSA. Default - 1 second.
State: Indicates current state of the specified interface. The state can be one of the following:
DROTHER: The router is neither a DR nor a BDR on the network and it establishes adjacencies
only with the DR and the BDR.
Waiting: The interface router is in waiting to announce the state of the link as DR. The wait time
is determined by the wait time. This state is normal in case of non broadcast multi access network.
Point-to-Point: The interface in point-to-point state is fully functional and it starts exchanging hello
packets with all its neighbors.
Priority: Indicates the priority of the interface router. It assists in electing the DR and BDR on the
network to which the interface is connected. A router with priority value 0 can never be a DR/BDR.
Default - 1.
Designated Router ID: Indicates the DR router ID for the respective network.
Backup Designated Router ID: Indicates the BDR router ID for the respective network.
Saved Network-LSA sequence number: Indicates the networks link-state sequence number. It is
used to calculate shortest path first (SPF).
Multicast group membership: Indicates the multicast group for which the router is a member.
Dead: Indicates the wait time in seconds before declaring a neighbor dead.
Wait: Displays the time interval that results the interface to exit out of the wait period and elect the
DR on the network.
Retransmit: Displays the wait time before re-transmitting a Database Description (DBD) packet if
it has not been acknowledged earlier.
Hello Due In - Specifies when the next Hello packet is due to be sent.
Neighbor Count: Indicates the total number of discovered neighbors on the interface.
Adjacent neighbor count: Indicates the total number of adjacent neighbors that are fully adjacent
to the interface.
BGP
Neighbors
Displays the information about the TCP and BGP peers connections and number of routes
advertised/neighbor to/from that peer.
Local AS: Indicates the value of the configured Local Autonomous Systems (AS).
Internal/External Link: Displays internal links for internal BGP (iBGP) neighbors and external
link for external BGP (eBGP).
BGP Version: Indicates BGP version used for communication with remote router.
Remote Router ID: Indicates router ID (IP Address) of the neighbor router.
BGP State: Indicates the Finite State Machine (FSM) stage. It describes what action should be
taken by the BGP routing engine and when for session negotiation.
Last Read: Displays the time, since BGP router the last received a message from neighbor. The
time is displayed in HH:MM:SS format.
Hold Time: Displays the time in seconds, until which the BGP will maintain the session with the
neighbor without receiving any message from it.
Keepalive Interval: Displays the time interval in seconds specifying how often BGP router sends
the keep-alive message to the neighbor.
InQ: Indicates the number of messages that are in queue, pending to be processed from the
neighbor.
OutQ: Indicates the number of messages that are in queue, pending to be sent to the neighbor
Opens: Indicates the total number of open messages sent and received.
Notifications: Indicates the total number of error notification messages sent and received.
Updates: Indicates the total number of update messages sent and received.
Keepalives: Indicates the total number of keep-alive messages sent and received.
Route Refresh: Indicates the total number of route refresh messages sent and received.
Capability: Indicates the total number of BJP capabilities advertised and received from the
neighbor.
Minimum Time between advertisement runs: Displays the time in seconds between the sent
advertisements.
Community attribute sent to this neighbor: Indicates the numerical value of BGP community. This
numerical value is assigned to a specific prefix and advertised to neighbor, based on which it decides
the whether to filter or modify attributes.
Accepted Prefix: Indicates the number of accepted prefixes that can participate in a BGP peer
session.
Connections established: Indicates the number of times a TCP and a BGP connection has been
established successfully.
Dropped: Indicates the number of times valid session failed or been taken down.
Last reset: Displays the time since the previously established session with neighbor ended.
Local host and Local port: Displays the IP Address and port number of local BGP router.
Foreign host and Foreign port: Displays the IP Address of Neighbor and BGP destination port
number.
Next connect timer due in: Specifies when the next hello packet is due to be sent to the BGP
neighbor.
Routes
Displays the entire routing configuration information and the routing table for an interface configured using
BGP protocol.
BGP Table Version: Indicates the table version number. The version number is updated with any
change in the BGP table.
Status codes and Origin codes: Shows how the destination routing information is obtained.
Status codes: A Status code indicates the status of the table entry and is displayed at the
beginning of each line in the table. Status code value can be one of the following: s suppressed,
d damped, h history, * valid, > best, i internal, r Routing Information Base (RIB)-failure, S
Stale, R Removed
Origin codes: An Origin code indicates the origin of the entry and is displayed at the end of each
line in the table. Origin code value can be one of the following: i Interior Gateway Protocol (IGP),
e Exterior Gateway Protocol (EGP), ? incomplete/path not clear.
Next Hop: It is the management IP Address of the next hop routing device. 0.0.0.0 indicates the
router has noon-BGP routes to the network.
Local Preference is one of the methods to change the path taken by one Autonomous System (AS) to
reach to another AS.
Local Preference value indicates to AS about the path that has local preference, and one with the highest
preference being preferred.
Weight: Indicates the route weight as set via autonomous system filters. If there exist more than
one path to a particular IP Address, then a path with highest weight is selected.
Summary
Displays the status of all the BGP connections details like, path, prefixes and attributes information about all
the connections to BGP neighbors.
Local AS Number: Indicates the local Autonomous System number to which this router belongs.
Peer: Indicates the number of neighbor with which the connection is established.
Local Preference is one of the methods to change the path taken by one Autonomous System (AS) to
reach to another AS.
Local Preference value indicates to AS about the path that has local preference, and one with the highest
preference being preferred.
TblVer: Indicates the last version of the BGP database that was sent to the neighbor.
InQ: Indicates the number of messages that are in queue, pending to be processed from the
neighbor.
OutQ: Indicates the number of messages that are in queue, pending to be sent to the neighbor.
Up/Down: Indicates the total time of a BGP session to remain in Established state, or the current
status of BGP session, if it is not in established state.
State/PfxRcd: Indicates the state of the neighbor and the number of prefixes received.
PIM
Interface Table
Displays all the PIM enabled interfaces and the neighbor information of each interface.
RP SET
Displays RP set information which is a collection of group-to-RP mappings. This information is used to
determine the RP for a multicast group and is maintained by a PIM router.
DNS
The Domain Name System (DNS) is a system that provides a method for identifying hosts on the Internet
using alphanumeric names called fully qualified domain names (FQDNs) instead of using difficult to remember
numeric IP Addresses. In other words, it translates domain names to IP Addresses and vice versa.
The DNS server is configured at the time of installation. You can add additional IP addresses of the DNS
servers to which the Appliance can connect for name resolution. If multiple DNS are defined, they are queried
in the order as they are entered.
To configure DNS, go to Network > DNS > DNS.
Parameters
Screen Element
Description
DNS List
IPv4
Obtain DNS from
DHCP
Click Obtain DNS from DHCP to override the Appliance DNS with
the DNS address received from DHCP server.
Select to first choose IPv6 DNS server for resolving the DNS and
then IPv4 DNS Server.
If both IPv6 and IPv4 DNS servers are configured, then it first
selects IPv6 DNS server for all requests followed by IPv4 DNS
server.
Select to first choose IPv4 DNS server for resolving the DNS and
then IPv6 DNS Server.
If both IPv6 and IPv4 DNS servers are configured, then it first
selects IPv4 DNS server for all requests followed by IPv6 DNS
server.
Choose IPv6 if
request originator
address is IPv6, else
IPv4
Apply
Description
Name of the Host/Domain.
Host/Domain
Name
IP Address
Reverse DNS
Lookup
Screen Element
Host/Domain
Name
Description
Enter a Fully Qualified Domain Name (FQDN) for Host/Domain.
Address
Entry Type
IP Address
Time To Live
(Seconds)
Default - 60 Seconds
Weight
Default - 1
Publish on WAN
Default - Disabled
Reverse DNS
Lookup
Only A and PTR type of DNS records are supported i.e. host/domain's IP Address and reverse lookup.
Address (A) record - points a hostname to an IP Address and returns a 32-bit IPv4 address.
AAAA record - points a hostname to an IP Address and returns a 128-bit IPv6 address.
Pointer records (PTR) - are just the reverse of A records and are used for reverse lookups. It maps IP
Address to a hostname.
Maximum number of DNS entries allowed is 1024.
If the Appliance interface is used as a DNS in client system then, a query is sent to configured DNS servers
prior to querying the ROOT severs.
Router Advertisement
The Appliance acting as a router has the ability to participate in Stateless Auto Configuration (SLAAC) and
by default provides IPv6 Address and a default gateway to the client.
When the Appliance interface is connected to a network and enabled, the host may send out an ICMPv6 (type
135) Router Solicitation (RS) message that requests Cyberoam to immediately generate Router
Advertisement (RA) instead of their next scheduled time. On receiving the RS message, the Appliance
immediately sends an ICMPv6 (type 134) Router Advertisement (RA) message announcing about its
availability. Router Advertisements includes the information about which method to be used for address
assignment, prefixes that are utilized for on-link determination and/or address configuration, hop limit value,
several flag status, etc. The critical parameters can be administered centrally and could be automatically
propagated to all hosts on the network. The Appliance advertises information about various interfaces and
the Internet parameters either periodically or in response to RS message, informing all the nodes on the
network about any modification in addressing information. Thus Router Advertisement (along with prefix flags)
allows simple stateless auto configuration and guides a host about generating an address using autoconfiguration.
Description
Select an interface for router advertisement.
Min Advertisement
Interval
Select to set the Manage Flag. When this flag is set, IPv6
addresses are obtained from DHCPv6 server.
Select to set the Other Flag. When this flag is set, DHCPv6
client obtains other network parameters like DNS server,
Domain Name, NIS, NISP, SIP, SNTP, BCMS servers from
DHCPv6 server.
Note
Use
and
Advanced Settings
Using Network Discovery Protocol (NDP) the devices on the same interface
discovers the presence of each other and the respective link-layer addresses
finds gateway routers and maintains the reachability information about the active
paths to the peers.
Link MTU
Default - 0
Acceptable Range - 1280 to 1500 bytes
Specify the reachable time in seconds that the client will use to
assume a neighbor is reachable after having received a
reachability confirmation message.
Default 0
Acceptable Range (Seconds) - 0 to 3600
Retransmit Time
DHCP
Dynamic Host Configuration Protocol (DHCP) automatically assigns IP Address for the hosts on a network
reducing the Administrators configuration task. Instead of requiring administrators to assign, track and change
(when necessary) for every host on a network, DHCP does it all automatically. Furthermore, DHCP ensures
that duplicate addresses are not used.
The Appliance acts as a DHCP server and assigns a unique IP Address to a host, releases the address as
host leaves and re-joins the network. Host can have different IP Address every time it connects to the network.
In other words, it provides a mechanism for allocating IP Address dynamically so that addresses can be reused.
Deploying DHCP in a single segment network is easy. All DHCP messages are IP broadcast messages, and
therefore all the computers on the segment can listen and respond to these broadcasts. But things get
complicated when there is more than one subnet on the network. This is because the DHCP broadcast
messages do not, by default, cross the router interfaces.
The DHCP Relay Agent allows to place DHCP clients and DHCP servers on different networks. Relay Agent
makes it possible for DHCP broadcast messages to be sent over routers that do not support forwarding of
these types of messages. The DHCP Relay Agent enables DHCP clients to obtain IP Addresses from a DHCP
server on a remote subnet, or which is not located on the local subnet. If DHCP Relay Agent is not configured,
clients would only be able to obtain IP Addresses from the DHCP server which is on the same subnet.
Server
Lease
Relay
DHCP Server
Each internal Interface can act as a DHCP server. You can disable or change this DHCP Server configuration.
The Appliance cannot act as DHCP server and DHCP Relay Agent simultaneously. Hence, if the Appliance
is configured as DHCP server, you will not be able to configure it as a Relay agent and vice-versa.
Screen Element
Description
Name
Interface
Lease Detail
IP Family
Screen Element
Description
General Settings
Name
Interface
Dynamic IP Lease
Static IP MAC
Mapping
and icon
Use icon
and icon
Subnet Mask
Domain Name
Specify domain name that the DHCP server will assign to the
DHCP Clients.
Gateway
DNS Server
Use Appliances DNS
Settings
Click to use Appliance DNS Server. In this case the first two
configured DNS will be utilized.
If not enabled, then provide Primary and Secondary DNS to be
used.
Primary DNS
Secondary DNS
WINS Server
Primary WINS Server
Secondary WINS
Server
Screen Element
Description
General Settings
Name
Interface
Dynamic IP Lease
and icon
and icon
Preferred Time
Valid Time
Click to use Appliance DNS Server. In this case the first two
configured DNS will be utilized.
Secondary DNS
DHCP Lease
The Appliance acting as a DHCP server assigns or leases an IP Address from an address pool to a host
DHCP client. The IP Address is leased for a determined period of time or until the client relinquishes the
address. The page displays a list of all the IP Addresses leased dynamically and you can filter list based on
Leased IP, or Client Physical Address.
IPv4 Address
The following information is displayed for the leased IPv4 addresses:
Leased IP Address
Lease start and end time
Client Physical Address
Client Host Name
Leased Type
IPv6 Addresses
The following information is displayed for the leased IPv6 addresses:
Leased IP Address
Lease start and end time
Client Physical Address
DUID
List will display IP Addresses leased dynamically only
DHCP Relay
The DHCP Relay Agent allows place DHCP clients and DHCP servers on different networks. Deploying DHCP
in a single segment network is easy. All DHCP messages are IP broadcast messages, and therefore all the
computers on the segment can listen and respond to these broadcasts. But things get complicated when there
is more than one subnet on the network. This is because the DHCP broadcast messages do not, by default,
cross the router interfaces.
The DHCP Relay Agent makes it possible for DHCP broadcast messages to be sent over routers that do not
support forwarding of these type of messages. The DHCP Relay Agent enables DHCP clients to obtain IP
Addresses from a DHCP server on a remote subnet, or which is not located on the local subnet. If DHCP
Relay Agent is not configured, clients would only be able to obtain IP Addresses from the DHCP server which
is on the same subnet.
Note
The DHCP Relay page displays list of all the interfaces configured as a relay agent and you can filter the list
based on relay agent name and IP Family. The page also provides option to add a new relay agent, update
parameters, or delete an agent.
Screen Element
Description
Interface
DHCP Server IP
IP Family
Description
Name
IP Family
Available Options:
IPv4
IPv6
Interface
ARP-NDP
TCP/IP uses ARP (Address Resolution Protocol) protocol to translate IPv4 Address into MAC Address
(physical network address). In other words, it maps layer 3 (IPv4 Addresses) to layer 2 (physical or MAC
Addresses) to enable communications between hosts residing on the same subnet. Similarly to translate IPv6
Addresses, NDP (Neighbor Discovery Protocol) is used.
ARP is used by hosts that are directly connected on a local network and uses either or both unicast and
broadcast transmissions directly to each other. Host finds the physical address of another host on its network
by sending an ARP query packet that includes the IP Address of the receiver. As a broadcast protocol, it can
create excessive amounts of network traffic on your network. To minimize the broadcast traffic, an ARP cache
is maintained to store and reuse previously learned ARP information.
NDP in IPv6 is similar to ARP in IPv4. The main purpose of both the protocols is to enable a host (node) to
determine the link layer address (MAC Address) of the node it wants to communicate with, in the local network
and to find out the link layer address of the router through which it can access a node in an external network.
Thus, the actual exchange of messages can take place between the two nodes. Apart from neighbor
discovery, NDP functionality includes router discovery, neighbor presence, redirects, network options (as in
DHCP options) and stateless auto-configuration. Similar to ARP, NDP is also susceptible to flooding and
poisoning attacks.
NDP has Neighbor solicitations analogous to ARP request and Neighbor Advertisements analogous to ARP
replies. Unsolicited neighbor advertisements in IPv6 correspond to gratuitous ARP replies in IPv4. Static
Neighbor configuration protects the Neighbor cache for trusted or vulnerable nodes in the network. Static
Neighbor Discovery helps in not making solicit request for configured entries and ignores any incoming solicit
or advertised ND for configured entries.
Neighbors
ARP and NDP traffic is vital communication on a network and is enabled on Appliance interfaces by default.
Static Neighbor entry allows binding of the MAC Address to the designated IP Address and port. Once the
MAC Address is bound to a port and IP Address, the Appliance will not update its Neighbor table dynamically
and will not respond to that IP-MAC pair on any other port. It will also remove any dynamically cached
references to that IP Address that might be present, and will not allow additional static mappings of that IP
Address.
These entries will be stored in Static Neighbor as well as IPv4 and IPv6 Neighbor Cache table. The Appliance
performs the neighbor lookup in the static neighbor table when it receives the request on a particular port. If
there is any mismatch in IP Address or MAC Address, the Appliance considers it as a neighbor poisoning
attempt and does not update its Neighbor Cache. If entry is not available in the table, the Appliance will look
it up in the IPv4 or IPv6 Neighbor Cache and add the MAC Address to Neighbor Cache if required.
Consider an example when IP1 is mapped with MAC1 and IP1-MAC1 pair is bounded to Port A. Similarly IP2
is mapped with MAC1 and IP2-MAC1 pair is bounded to Port A.
IP Address
MAC
Address
Port
Neighbor poisoning
attempt
IP1
MAC1
No
IP1
MAC1
Any other
than Port A
IP1
MAC2
Yes
IP1
MAC2
Yes
IP3
MAC1
No static ARP
No
IP2
MAC1
No
IP2
MAC1
Any other
than Port A
Port
Port
Yes
Yes
Table Showing an example of having IPs having bounded MAC and Port addresses.
Neighbor Configuration
The Appliance maintains 3 (three)types of tables for ARP entries: Static Neighbor table, IPv4 Neighbor Cache
and IPv6 Neighbor Cache.
all the three tables. Select the table type from the dropdown list to view the Neighbor entries in the respective
table. It lists IP Address, MAC Address, interface and type of the entry. Entry type can be static or dynamic.
If everything is working properly with Neighbor, dynamic Neighbor entry will be displayed as Complete,
Dynamic. Complete, Dynamic means both MAC and IP values are there in the table while Incomplete,
Dynamic means that the Neighbor request was sent but no reply has yet been received.
Screen Element
Description
Neighbor Configuration
Specify time interval after which the entries in the cache should
be flushed.
Neighbor Cache
Entry Time Out
Default - 2 minutes
Input range - 1 to 500 minutes
Static Neighbor
Manage Static ARP list
Manage Static ARP in Appliance; go to Network > ARP-NDP > Neighbor.
Screen Element
Description
IP Family
IP Address
MAC Address
Interface
Screen Element
IP Family
Description
Select the IP Family for DHCP Relay Agent.
Available Options:
IPv4
IPv6
IPv4/IPv6 Address
MAC Address
Interface
By default, it is enabled.
ARP-NDP Cache
Manage ARP Cache list
To Manage ARP Cache in Appliance, go to Network > ARP-NDP > Neighbor.
Screen Element
Description
IP Address
MAC Address
Interface
Type
Edit Icon
Delete Button
Dynamic DNS
Dynamic DNS (Domain Name Service) is a method of keeping a static domain/host name linked to a
dynamically assigned IP Address allowing your server to be more easily accessible from various locations on
the Internet.
Powered by Dynamic Domain Name System (DDNS), you can now access your Appliance by the domain
name and not the dynamic IP Address. DDNS will tie a domain name (for example, myAppliance.com, or
mycompany.myAppliance.com) to your dynamic IP Address.
Description
Name
Interface
Service Provider
Last Updated IP
Failure Reason
Description
Host Details
Host Name
Specify a name to identify the host that you want to use on the
DDNS server. It is the domain name that you registered with
your DDNS service provider for example cyber.com
IP Address
IP Edit Checking
Interval
Default - 20 minutes
Acceptable Range - 4 to 60 minutes
Identity
Once you have deployed the Appliance, default access policy is automatically applied which will allow
complete network traffic to pass through the Appliance. This will allow you to monitor user activity in your
Network based on default policy.
As the Appliance monitors and logs user activity based on IP Address, all the reports are also generated
based on the IP Address. To monitor and log user activities based on User names or log on names, you have
to configure the Appliance for integrating user information and authentication process. Integration will identify
access request based on User names and generate reports based on Usernames.
When the user attempts to access, the Appliance requests a user name and password and authenticates the
users credentials before giving access. User level authentication can be performed using the local user
database on the External ADS server, LDAP or RADIUS server.
Authentication
The Appliance provides policy-based filtering that allows defining individual filtering plans for various users of
your organization. You can assign individual policies to users (identified by IP Address), or a single policy to
a number of users (Group).
The Appliance detects users as they log on to Windows domain in your network via client machines. Users
are allowed or denied access based on username and password. In order to authenticate user(s), you must
select at least one database against which the Appliance should authenticate users.
To filter Internet requests based on policies assigned, the Appliance must be able to identify a user making a
request.
Administrator can configure authentication based on the type of Administrator, Firewall, VPN and SSL VPN
with multiple servers.
Authentication Server
Firewall
VPN
Admin
Authentication Server
The Appliance supports user authentication against:
an Active Directory
an LDAP server
an RADIUS server
an internal database defined in the Appliance
User authentication can be performed using local user database, RADIUS, LDAP, Active Directory or any
combination of these.
Local Authentication
The Appliance provides a local database for storing user and group information. You can configure the
Appliance to use this local database to authenticate users and control their access to the network. Choose
local database authentication over ADS, LDAP or RADIUS when the number of users accessing the network
is relatively small. Registering dozens of users and groups takes time, although once the entries are in place
they are not difficult to maintain. For networks with larger number of users, user authentication using ADS,
LDAP or RADIUS servers can be more efficient.
A combination of external and local authentication is useful in large networks where it is required to provide
guest user accounts for temporary access while a different authentication mechanism like RADIUS for VPN
and SSL VPN users provides better security as password is not exchanged over the wire.
Administrator can configure up to twenty authentication servers. In case of multiple servers, authentication
request will be forwarded as per the server order configured in the Server Priority list.
External Authentication Servers can be integrated with the Appliance for providing secure access to the users
of those servers. The external authentication servers support IPv4 and IPv6 Addresses. You can configure
following external servers:
Active Directory
LDAP Server
RADIUS Server
The page displays list of all the configured external servers. The page provides option to add a server, update,
or delete the server settings. Page also provides option to import AD user groups in case Active Directory is
configured.
Description
Name
IP
Port
Type
Domain/Admin
Import Icon
Whenever the existing user(s) in ADS logs on for the first time after configuration, user is automatically created
in the Appliance and assigned to the default group. If the Groups are already created in the Appliance, User(s)
will be created in the respective Groups i.e. the ADS User Groups will be mapped to the Appliance User
Groups. In case user is already created and there is a change in expiry date or group name, user will be
logged in with the changes.
This authentication mechanism allows users to access using their Windows authentication tokens (login/user
name and password) in the Windows-based directory services.
User sends the log on request/user authentication request to ADS and ADS authenticates user against the
directory objects created in ADS. Once the user is authenticated, Appliance communicates with ADS to get
these additional authorization data such as user name, password, user groups, and expiry date as per the
configuration, which is used to control the access.
Note
If ADS is down, the authentication request always returns with Wrong username/password message.
To configure and manage ADS, go to Identity > Authentication > Authentication Server. You
can:
Configure Configure ADS Server to communicate with the Appliance
Import AD Group Click Import icon
in the Manage column against the ADS Server for which you
want to import the Active Directory Group.
NetBIOS Name, FQDN and Search DN The details of NetBIOS Name, FQDN and Search DN is
available from the ADS server.
To configure ADS, go to Identity > Authentication > Authentication Server. Click Add Button
and select the server type as Active Directory to add a server. To update the details, click on the Server or
Edit icon
Screen Element
Description
Server Type
Server Name
Server IP
Port
NetBIOS Domain
ADS Username
Password
Connection Security
Available Options:
Simple Select to send the user credentials in un-encrypted
or clear text format. The default port number is TCP 389.
SSL Select to login to external server. This is the most
common method used for secured connection. The default
port number is TCP 636.
STARTTLS Select to use same port for simple connection
as well as secured connection. In case of the latter, the
connection is switched to TLS for security. The default port
is 389.
Default Simple
Validate Server
Certificate (For
Secured Connection
SSL, STARTTLS)
Integration Type
Available Options:
Loose integration With loose integration,
Administrators require to manage the User Groups
themselves. Administrator can modify the group
membership. The Appliance does not synchronize
groups with the AD Server automatically when user logs
into the Appliance.
By default, users are the members of the Appliance default
group irrespective of the AD Server group. Appliance uses
authentication attribute for authenticating users with AD
Server.
Tight integration With tight integration, Appliance
synchronizes groups with AD Server every time the user
logs in. The group membership of each user is as defined
in the AD Server. Hence, even if the group of a user is
changed in the Appliance, on subsequent log on attempt,
user logs on as the member of the same group as
configured in AD Server.
If the user is a member of multiple AD groups, the
Appliance decides the user group based on the order of
the groups defined in the Appliance. The Appliance
searches group list from top to bottom to determine the
membership. The first group that matches is considered
as the group of the user and that group policies are
applied to the user.
Search Queries
Click the Add button to enter the search query. Use the Move
Up and Move Down buttons to move the search queries in the
list.
Whenever the existing user(s) in ADS logs on, user is automatically created in Appliance and assigned to
the default group.
If the Groups are already created in the Appliance, Users are created in the respective Groups and the ADS
User Groups will be mapped to the Appliance User Groups.
In case user is already created and there is a change in expiry date or group name, user will be logged in with
the changes.
Note
Connection to ADS is enabled automatically during Active Directory setup, but as ADS server is used for
authenticating users it is necessary to check whether the Appliance is able to connect to ADS or not.
>
Authentication
>
Step 1. Specify Base DN. Appliance fetches AD Groups or OU Groups from the specified Base DN.
Step 2. Select the AD Groups or OU Groups to be imported in the Appliance. Use <Ctrl> + Click to select
multiple groups.
If you import OU then OU will also be imported as a Group in the appliance. Once the OU is imported, OU is
listed on the Manage Groups page in the format for example, OU=Marketing,DC=Cyberoam,DC=com where
OU=<ou name as defined in AD>,DC=<DC as defined in AD>.
The Appliance will not allow importing those groups which are already in the Appliance.
Step 3. Select various policies (Surfing Quota, QoS, Web Filter, Application Filter, Data transfer and SSL
VPN) and user authentication time out to be applied on the group members. All the security policies can be
applied on OU group also.
Same policy is attached to all the imported groups. If you want to specify different policies for different groups,
do not enable the policy.
For example, if you want to specify different Internet policy to different groups, do not enable Attach to all the
Groups.
Step 4. If common policies are not to be applied, specify policies to be applied to each group.
Step 5. View the summary of the groups and policies to be imported. You can also go back and change the
configuration.
Step 6. View Results page displays successful message if groups are imported and policies are successfully
attached else appropriate error message will be displayed. Once you close the Wizard, it remains on the
Authentication Server page only. All the imported groups are appended at the end of the list.
If the user is a member of multiple AD groups, the Appliance will decide the user group based on the order of
the groups defined in the appliance. Appliance searches the Group ordered list from top to bottom to
determine the user group membership. The first group that matches is considered as the group of the user
and that group policies are applied to the user.
User belonging to OU will be a member of OU group in Cyberoam. Group priority will depend on the group
sequence implemented in Cyberoam.
Importing OU is supported only when Active Directory is tightly integrated with CyberoamOS.
User has to be authenticated by Appliance before granting access to the Internet. Appliance sends the user
authentication request to LDAP and LDAP server authenticates user as per supplied tokens. User can log on
using their Windows authentication tokens (login/user name and password).
Description
Server Type
Server Name
Server IP / Domain
Port
Version
Anonymous Login
Available Options:
Simple Select to send the user credentials in unencrypted format i.e. clear text. The default port number
is TCP 389.
SSL Select to login to external server. This is the most
common method used for secured connection. The
default port number is TCP 636.
STARTTLS Select to use the same port for simple
connection as well as secured connection. In case of the
latter, the connection is switched to TLS for security. The
default port is 389.
Default Simple
Validate Server
Certificate (For
Secured Connection
SSL, STARTTLS)
The top level of the LDAP directory tree is the base, referred to
as the "Base DN". A base DN usually takes one of the three
forms: Organization name, Companys Internet Domain name
or DNS domain name. For example dc=google, dc=com
Authentication
Attribute
Available Options:
Loose integration With loose integration, Administrators
require to manage the User Groups themselves.
Administrator can modify the group membership. The
Appliance does not synchronize groups with LDAP Server
automatically when user logs into the Appliance.
By default, users are the member of Appliance default group
irrespective of LDAP Server group. Appliance uses
authentication attribute for authenticating users with LDAP
Server.
Tight integration With tight integration, Appliance
synchronizes groups with LDAP Server every time the user
logs in. The group membership of each user is as defined in
the LDAP Server. Hence, even if the group of a user is
changed in Appliance, on subsequent log on attempt, user
logs on as the member of the same group as configured in
LDAP Server.
If the user is a member of multiple LDAP groups, the
Appliance decides the user group based on the order of the
groups defined in the Appliance. searches group list from
top to bottom to determine the membership. The first group
that matches is considered as the group of the user and that
group policies are applied to the user.
Note
Whenever the existing user(s) in LDAP logs on, user is automatically created in the Appliance and
assigned to the default group.
If the Groups are already created in the Appliance, Users are added in the respective Groups and the LDAP
User Groups are mapped to Appliance User Groups.
RADIUS servers provide authentication, authorization, and accounting functions but the Appliance uses only
the authentication function of the RADIUS server.
Before you can use RADIUS authentication, you must have a functioning RADIUS server on the network.
Screen Element
Description
Server Type
Server Name
Server IP
Authentication Port
Shared Secret
Integration Type
Available Options:
Loose integration With loose integration, Administrators
require to manage the User Groups themselves.
Administrator can modify the group membership. The
Appliance does not synchronize groups with RADIUS
Server automatically when user logs into the Appliance.
By default, users are the member of Appliance default group
irrespective of RADIUS Server group. Appliance uses
authentication attribute for authenticating users with
RADIUS Server.
Tight integration With tight integration, Appliance
synchronizes groups with RADIUS Server every time the
user logs in. The group membership of each user is as
defined in the RADIUS Server. Hence, even if the group of
a user is changed in Appliance, on subsequent log on
attempt, user logs on as the member of the same group as
configured in RADIUS Server.
Note
Whenever the existing user(s) in RADIUS logs on, user is automatically created in Appliance and assigned
to the default group.
If the Groups are already created in the Appliance, Users are created in the respective Groups and the
RADIUS User Groups will be mapped to the Appliance User Groups.
Firewall
To configure and manage authentication settings for Firewall, go to Identity > Authentication >
Firewall.
Parameters
Screen Element
Description
Authentication Methods
Authentication Server
List
Global Settings
Maximum Session
Timeout
OR
Enable Unlimited to allow unlimited concurrent logins to the
user.
Default - 3 minutes
Data Transfer
Threshold
Default - Enable
Web Client Settings (iOS and Android)
Inactivity Time
Data Transfer
Threshold
Shared Secret
Denied"
message to
Parameters
Screen Element
Description
Available Options:
IPSec Users
L2TP Users
PPTP Users
SSL VPN Users
If enabled, the user will not need to re-authenticate in Cyberoam
after VPN connection is established. Also, the user will be
automatically logged out from Cyberoam when VPN tunnel is
disconnected.
Table VPN Authentication screen elements
To configure and manage authentication settings for all the Administrator user except for the global Super
Administrator admin , go to Identity > Authentication > Admin.
Description
User Groups
Group is a collection of users having common policies that can be managed as a single unit and a mechanism
of assigning various policies to a number of users in one operation/step. Users that belong to a particular
group are referred to as a group user.
Instead of attaching individual policies to the user, create group of policies and simply assign the appropriate
Group to the user and user will automatically inherit all the policies added to the group which simplifies the
user configuration.
Screen Element
Description
Page 295 of 490
Group Name
Web Filter
Displays the Web Filter Policy applied to all the group users.
QoS
Disable User MAC Binding disabled for all the group users.
Access Time
(Not applicable to
Clientless Group)
Displays the Access Time Policy applied to all the group users.
Surfing Quota
(Not applicable to
Clientless Group)
Displays the Surfing Quota Policy applied to all the group users.
PPTP
(Not applicable to
Clientless Group)
L2TP
(Not applicable to
Clientless Group)
Login Restriction
(Not applicable to
Clientless Group)
Data Transfer
(Not applicable to
Clientless Group)
Displays the Data Transfer Policy applied to all the group users.
Enable User MAC Binding enabled for all the group users.
Parameters
Screen Element
Description
Group Name
Description
Group Type
Available Options:
Normal User of this group needs to log on using the
Appliance Client to access the Internet.
Clientless User of this group need to log on using the
Appliance Client to access the Internet and is symbolically
represented as Group name(C). Access control is placed on
the IP Address.
Policies
Web Filter
Note
Access Time
(Not applicable to
Clientless Group)
Note
Data Transfer
(Not applicable to
Clientless Group)
Available Options:
Enable User will receive the Quarantine Digest daily
and overrides Group setting.
Disable User will not receive Quarantine Digest and
overrides Group setting.
MAC Binding
(Not applicable to
Clientless Group)
L2TP
(Not applicable to
Clientless Group)
PPTP
(Not applicable to
Clientless Group)
Login Restriction
(Not applicable to
Clientless Group)
Available Options:
Any Node Select to allow user to login from any of the
nodes in the network.
Selected Nodes Select to allow user to login from the
specified nodes only. Specify IP Address and click Add
button to add more nodes and remove icon
to delete
nodes.
Node Range Select to allow range of IP Address.
Specify IP Address range.
Table Add Group screen elements
Note
User configuration MAC binding and policies is given precedence over Group configuration.
Users
Users are identified by an IP Address or a user name and are assigned to a user group. All the users in a
group inherit the policies defined for that group.
Media Access Control (MAC) Address is a unique identifier (hardware address) assigned to a host by the
manufacturer for identification and is intended to be immutable. MAC Addresses are 48 bit values that are
expressed in 6 byte hex-notation separated by colon for example 01:23:45:67:89:AB.
To improve the security of your network and provide spoofing protection, you can enable User-MAC Address
binding. By binding User to MAC Address, you are mapping the user with a group of MAC Addresses. It
means a user would be able to login through a group of pre-specified machines only making it more difficult
for a hacker using random MAC Addresses or spoofing a MAC Address to gain access to your network.
User types
The Appliance supports five types of Users:
Normal
Clientless
Single Sign on
Thin Client User
WWAN User
Normal User has to log on to the Appliance. Requires client (client.exe) on the User machine or user can use
HTTP Client component and all the policy-based restriction are applied.
Clientless does not require client component (client.exe) on the User machines. Symbolically represented as
User name (C)
If User is configured for Single sign on, whenever User logs on to Windows, he/she is automatically logged to
the Appliance. Symbolically represented as User name (S)
Use the given decision matrix below to choose which type of the user should be created.
Normal
User
Clientless
User
Single Sign
On User
Yes
No
No
Normal
Yes
No
Yes
Clientless
No
Yes
No
Yes
Yes
Yes
Yes
No
No
Type of Group
Yes
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
Users
Clientless Users
Users
To manage users, go to Identity > Users > Users. You can:
Import
Export Click the Export button to download the user details in a csv file. csv file is generated with
the following headers: Name, Username, Enc_password, Email Address, and Group.
Screen Element
Import Button
Description
Browse and select a .csv file to import all the user details.
Change Status
Purge AD Users
User ID
Name
User Name
Type
Profile
Group
Web Filter
PPTP
MAC Address
Data Transfer
Access Time
Created Date
Simultaneous Logins
Parameters
Screen Element
Description
Username
Name
Password
User Type
Available Options:
User
Administrator
Profile (Only when
the User Type
Administrator is
selected)
Create a new profile directly from this page or from the Profile
page.
Email
Policies
Group
Select Group in which the user is to be added. User will inherit all
the policies assigned to the group.
Web Filter
By default, user will inherit its group policy. To override the group
policy, select the policy from the list.
You can create also a new policy directly from this page itself or
from Web Filter > Policy page.
Application Filter
By default, the user will inherit its group policy. To override the
group policy, select the policy from the list.
You can create also a new policy directly from this page itself or
from Application Filter > Policy page.
Surfing Quota
By default, user will inherit its group policy. To override the group
policy, select the policy from the list.
You can create also a new policy directly from this page itself or
from Identity > Policy > Surfing Quota page.
Access Time
By default, user will inherit its group policy. To override the group
policy, select the policy from the list
You can create also a new policy directly from this page itself or
from Identity > Policy > Access Time page.
Data Transfer
By default, user will inherit its group policy. To override the group
policy, select the policy from the list.
You can create also a new policy directly from this page itself or
from Identity > Policy > Data Transfer page.
QoS
By default, user will inherit its group policy. To override the group
policy, select the policy from the list.
You can create also a new policy directly from this page itself or
from QoS > Policy page.
SSL VPN
By default, user will inherit its group policy. To override the group
policy, select the policy from the list.
You can create also a new policy directly from this page itself
or from SSL VPN > SSL > Policy page.
If user is not to be provided the SSL VPN access then select
No Policy Applied.
L2TP
Quarantine Digest
Default - 1
Acceptable Range - 1 to 99
MAC Binding
If
enabled,
specify
01:23:45:67:89:AB.
MAC
Addresses
for
example
Once you enable MAC binding, user will be able to login through
pre-specified machines only.
Select the appropriate option to specify the login restriction for the
user.
Available Options:
Any Node User will be able to login from any of the nodes
in the network.
User Group Node(s) User will be able to login only from
the nodes assigned to her group.
Selected Nodes User will be able to login from the
specified nodes only.
Node Range User will be able to login from any of the IP
Address from the configured range.
Administrator Advanced Settings (Only if User Type is selected as Administrator)
Schedule for
Appliance Access
Select the appropriate option to specify the login restriction for the
user.
Available Options:
Any Node Administrator will be able to login from any of
the nodes in the network.
Selected Nodes Administrator will be able to login from the
specified nodes only.
Node Range Administrator will be able to login from any of
the IP Address from the configured range
Reset User
Accounting
(Displayed only after
user is added)
Click to reset the usage accounting i.e. internet usage time and
data transfer of the user.
View Usage
(Displayed only after
user is added)
Note
Note
Purge operation will not interrupt user login/logout and accounting events.
If HA is configured, user details are deleted from both, the Primary Appliance as well as Auxiliary Appliance
at the same time.
To successfully initialize Purging of AD Users, the Appliance should be connected/authenticated to/by at
least one (or more) one or more AD servers.
Exporting Users
Click the Export button to export the user details in a csv file. csv file is generated with the following headers:
Name, Username, Enc_password, Email Address, and Group.
Clientless Users
Clientless Users are the users who can bypass Client login to access the Internet and are managed by the
Appliance itself. As clientless users can bypass Appliance login, create clientless users when your network
has few Non-windows machines, VOIP boxes, or servers.
Screen Element
Description
Add Range
Change Status
ID
Name
User Name
IP Address
Group
Status
Web filter
QoS
Parameters
Screen Element
Description
Username
IP Address
Group
Quarantine Digest
Available Options:
Add Icon
Remove Icon
You can change the policies applied to the user by updating the user details. If you change the policies for
the user, user specific policies will take precedence over user group policies. Refer to Change Policies
Parameters to change the policies.
Screen Element
Description
Username
Name
IP Address
Group
Group in which the user is added. User will inherit all the policies
assigned to the group.
Policies
Web Filter
Policy applied here will take the precedence over the group
policy.
Application filter
Policy applied here will take the precedence over the group
policy.
QoS
Policy applied here will take the precedence over the group
policy.
Quarantine Digest
Available Options:
Enable User will receive the spam digest daily and overrides
Group setting.
Disable User will not receive spam digest and overrides
Group setting.
Reset User
Accounting
(Displayed only after
user is added)
Click to reset the usage accounting i.e. internet usage time and
data transfer of the user.
View Usage
(Displayed only after
user is added)
Screen Element
Description
From
To
Group
Select Group for users. Users will inherit all the policies
assigned to the group.
You can change the policies applied to the user by editing the
user details. If you change the policies for the user, user specific
policies will take precedence over user group policies. Refer to
Change Policies Parameters to change the policies.
Table Add Multiple Clientless User screen elements
Guest Users
Users without a pre-existing user account wanting to access internet using a hotspot, or via a network
available at airport, hotels, hostels, etc. are called Guest Users. These users, that are otherwise considered
unauthenticated and/or denied access, are allowed to make request to connect to the Internet for a limited
period by authenticating themselves. On being authenticated, these users are authorized to access internet
using as a Guest Users. At such locations, Internet access is secured by configuring access policies to restrict
any malicious use of the network.
Cyberoam allows the Administrator to pre-configure single or multiple Guest Users using Web Admin Console.
The credentials of Guest Users configured via Web Admin Console can be printed and handed over to Guest
User. Alternately, Guest Users can register themselves using Guest User Portal. The credentials and Internet
access details of Guest Users registered via Guest User Portal can either be sent via SMS or can be printed.
In case of successful authentication Guest User is granted access according to applicable group, else is be
redirected captive portal page.
General Settings
Guest Users
SMS Gateway
General Settings
The page allows configuring general parameters to provide secured internet access for guest user
To configure General Settings, go to Identity > Guest Users > General Settings.
Parameters
Screen Element
Description
Group
Available Options:
Disclaimer
Note
Note
SMS Gateway
Rest of the options in this field can only be configured after you
have selected this option.
User Validity
(Duration in Days)
Default - Enable
Table Manage Guest User General Setting screen elements
Description
Print Button
Name
User Name
Create Date
Valid From
Validity
Expiry Date
Web Filter
Quarantine Digest
SSL VPN
Email Address
Application Filter
MAC Binding
Login Restriction
Surfing Quota
Status
Group
Screen Element
Description
Username
Auto-Generated password.
Password
Auto-Generated password.
Name
User Validity
(Duration in Days)
Validity Start
Available Options:
Immediately Validity is counted from the time a Guest
User is created.
After First Login Validity is counted from the time after
a Guest User logs into the network for the first time.
Add
Screen Element
Description
Number of Users
User Validity
(Duration in Days)
Validity Start
Available Options:
Immediately Validity is counted from the time a Guest
User is created.
After First Login Validity is counted from the time after
a Guest User logs into the network for the first time.
Add
to modify the
Parameters
Screen Element
Description
Username
Name
Password
Cell Number
Policies
Group
Group in which user belongs. User will inherit all the policies
assigned to the group.
Web Filter
You can also create a new policy directly from this page itself and
attach to the user.
Application Filter
You can also create a new policy directly from this page itself and
attach to the user.
Surfing Quota
You can also create a new policy directly from this page itself and
attach to the user.
Access Time
You can also create a new policy directly from this page itself and
attach to the user.
Data Transfer
You can also create a new policy directly from this page itself and
attach to the user.
QoS
You can also create a new policy directly from this page itself and
attach to the user.
SSL VPN
L2TP
PPTP
Quarantine Digest
Available Options:
Enable User will receive the Quarantine Digest daily and
overrides Group setting.
Disable User will not receive Quarantine Digest and
overrides Group setting.
Simultaneous Logins
Once you enable MAC binding, user will be able to login through
pre-specified machines only.
Select the appropriate option to specify the login restriction for the
user.
Available Options:
View Usage
(Displayed only after
Guest User is added)
User configuration is given precedence over Group configuration that is, User MAC binding and policies
configuration is given priority over Group configuration.
If the guest user is registered from the Web Admin Console, the login credentials and the Internet access
details can be printed and distributed. Option is provided to print the credentials at the time of registering or
can be printed later also.
If the guest user is registered from the Guest User Portal, the login credentials and the Internet access details
are SMSed on the registered cell phone number or printed and distributed. The administrator can resend the
credentials to guest users through SMS by clicking Resend icon
Manage column or can also print them.
SMS Gateway
An SMS Gateway allows sending and receiving Short Service Message (SMS) to/from a home network for
Guest User registration. The Appliance supports HTTP and HTTPS protocol based SMS service.
The page displays list of all the configured SMS Gateways and provides option to delete and edit the SMS
gateway configuration.
To manage users, go to Identity > Guest Users > SMS Gateway.
Screen Element
Description
Name
URL
Response Format
Screen Element
Description
Name
URL
Http Method
Available Options:
Get
Post
Cell Number Format
Number Prefix
Specify the prefix value to be used with the cell number. Number
Prefix can include alpha-numeric and ASCII special characters.
It can be up to 4 characters long.
Request Parameters
Response Format
For Example
Response Format
Page 335 of 490
Response Received
success | mbno | msgid/transactionid
Response Format
<status>500</status><transactionid>{0}</transactionid><reason>
{1}</reason>
Response Received
<status>500</status><transactionid>2323</transactionid><reaso
n>Limit Exceeded</reason>
Example 1
0 Status
1 Recipient
2 SMSID
Example 2
0 SMSID 2323
1 SMS Status Message Length Exceeded
Table Add SMS Gateway screen elements
Once you configure the SMS Gateway, check whether you are able to connect with the gateway or not. Click
the Test Connection button and provide cell phone number. You will receive SMS through the gateway
configured if you are able to connect to the gateway.
1. Edit the User account of the user whose data accounting you want to reset by clicking Manage
icon
in the Manage column.
2. Click Reset User Accounting button and click OK button to confirm.
Note
1. Edit the User account of the user whose data usage you want to view by clicking Manage icon
under the Manage column.
2. Click View Usage button.
3. A pop-up displays information of policies applied on the user account, upload and download data
transferred by the user.
Policy
The Appliance allows controlling access to various resources with the help of Policy.
Access time policy enables to set time interval - days and time - for the Internet access with the help of
schedules. See Schedules for more details.
A time interval defines days of the week and times of each day of the week when the user will be
allowed/denied the Internet access.
Screen Element
Description
Name
Strategy
Schedule
Description
Policy Description.
Table Manage Access Time Policies screen elements
Screen Element
Description
Name
Strategy
Available Options:
Allow Allows the Internet access during the scheduled
time interval.
Deny Does not allow the Internet access during the
scheduled time interval.
Schedule
Available Options:
All The Time
Work hours (5 Day Week)
Work hours (6 Day week)
All Time on Weekdays
All Time on Weekends
All Time on Sunday
All Days 10:00 to 19:00
Note
Description
Name
Validity
Specify the time period in day(s) for which the policy remains
active.
Cycle Type
Cycle Time
Description
Policy Description.
Table Manage Surfing Quota Policies screen elements
Screen Element
Description
Name
Cycle Type
Available Options:
Cyclic Restricts surfing hours up to cycle hours defined
on predefined time duration.
Non-Cyclic Surfing hour restriction is defined by total
allotted days and time.
Cycle Hours
At the end of each Cycle, cycle hours are reset to zero i.e. for
Weekly Cycle type, cycle hours will to reset to zero every week
even if cycle hours are unused.
Validity
Maximum Hours
OR
Click Unlimited Hours, if you do not want to restrict the total
surfing hours.
Description
Screen Element
Description
Name
Cycle Type
Screen Element
Description
Name
Restriction Based On
Cycle Type
Available Options:
Cyclic Restricts surfing hours up to cycle hours defined
on predefined time duration.
Non Cyclic Surfing hour restriction is defined by total
allotted days and time duration
Based on the options selected for the Restriction and Cycle Type, specify the following details.
Restriction based on Total Data Transfer and Cyclic Policy
Cycle Period
Maximum Data
Transfer
Maximum Upload
Data Transfer
Maximum Download
Data Transfer
OR
If you do not want to restrict maximum upload data transfer,
click Unlimited Upload Data Transfer.
Maximum Download
Data Transfer
Description
Note
Cycle Data Transfer limit cannot be greater than Maximum Data Transfer limit.
Live Users
Live users in the Appliance can be managed from a single page. All the active normal users, Clientless Users
and Single Sign On users are visible from the Live Users. The Administrator can disconnect these users from
this page directly.
User types
Appliance supports five types of Users:
Normal
Clientless
Single Sign on
Thin Client User
WWAN User
Normal User has to log on to the Appliance. Requires client (client.exe) on the User machine or user can use
HTTP Client component and all the policy-based restriction are applied.
Clientless does not require client component (client.exe) on the User machines.
If User is configured for Single sign on, whenever User logs on to Windows, he/she is automatically logged to
the Appliance.
If the User is a thin client user, whenever user logs on, he/she is visible on Live Users page.
If a wireless user is configured and connected, he/she is visible on Live User page.
Live Users
Identity > Live Users > Live Users page displays list of currently logged on users and their important
parameters. You can:
Disconnect Click the Disconnect icon
in the Manage column against a live user to be disconnected.
A dialog box is displayed asking you to specify a customized message for the user that is to be
disconnected. Click OK to disconnect the User. To disconnect multiple live users, select them
and
click the Disconnect button.
To disconnect a user:
1. Click the Disconnect icon
under the Manage column against a user.
2. Specify the message in a dialog box.
3. Click the OK button to disconnect the User. To disconnect multiple live users, select them
click the Disconnect button.
and
Note
To view and disconnect live users in Cyberoam, go to Identity > Live Users > Live User.
Description
User ID
User Name
Displays the name of the user with which she has logged in.
Client Type
Host IP
IP Family
MAC
MAC Address of the machine from which user had logged in.
Start Time
Upload / Download
Disconnect Icon
Description
Username
Name
IP Address
Group
Policies
Web Filter
You can also add and edit the details of web filter policy from the
Clientless User Page itself. But, policy details can only be
modified once the User is created.
By default, Allow All Web filter Policy is applied to the user.
Application Filter
You can also add and edit the details of application filter policy
from the Clientless User Page itself. But, policy details can only
be modified once the User is created.
By default, Allow All Application filter Policy is applied to the
user.
Surfing Quota
(Not applicable to
Clientless user)
You can also create a new policy directly from this page itself
and attach to the user.
Access Time
(Not applicable to
Clientless user)
Data Transfer
(Not applicable to
Clientless user)
You can also create a new policy directly from this page itself
and attach to the user.
You can also create a new policy directly from this page itself
and attach to the user.
QoS
You can also add and edit the details of QoS policy from the
Clientless User Page itself. But, policy details can only be
modified once the User is created.
SSL VPN
L2TP
(Not applicable to
Clientless user)
PPTP
(Not applicable to
Clientless user)
Quarantine Digest
Simultaneous Logins
(Not applicable to
Clientless user)
Note
MAC Binding
(Not applicable to
Clientless user)
Once you enable MAC binding, user will be able to login through
pre-specified machines only.
Available Options:
Any Node Select to allow user to login from any of the
nodes in the network.
User Group Node(s) Select to allow user to login only
from the nodes assigned to her group.
Selected Nodes Select to allow user to login from the
specified nodes only.
Node Range Select to allow range of IP Address and
specify IP Address range.
Administrator Advanced Settings
Schedule for
Appliance Access
Available Options:
Click to reset the usage accounting i.e. internet usage time and
data transfer of the user.
View Usage
(Displayed only after
user is added)
Firewall
A Firewall protects the network from unauthorized access and typically guards the LAN and DMZ networks
against malicious access; however, Firewalls may also be configured to limit the access to harmful sites for
LAN users.
The responsibility of Firewall is to grant access from Internet to DMZ or Service Network according to the
Rules and Policies configured. It also keeps a watch on the state of connection and denies any traffic that is
out of the connection state.
Firewall Rule provides centralized management of security policies. From a single Firewall Rule, you can
define and manage an entire set of Appliance security policies.
IPv6
Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP). It is a routable protocol,
that provides identification and location system for devices on networks and routes traffic across the Internet.
The Internet Engineering Task Force (IETF), an open standards organization that develops and promotes
Internet standards, has developed IPv6 to deal with the long-anticipated problem of IPv4 address exhaustion.
IPv6 replaces IPv4, the existing Internet Protocol.
Benefits of IPv6:
Large address space
New and simplified header format
Efficient and hierarchical addressing and routing
Stateless and stateful address configuration
Built-in security and interoperability
In-built mobility
Mandatory Multicast support
Better support for QoS
ICMPv6 based new protocol for neighboring node interaction
Extensibility in packet headers
Anti Virus & Anti Spam policy Allows SMTP, SMTP over SSL, POP3, IMAP, HTTP and HTTPS
traffic without scanning
Masquerade and allow entire LAN to WAN traffic for all the users without scanning SMTP, SMTP over
SSL, POP3, IMAP, HTTP and HTTPS traffic
Default Firewall Rules for General Internet policy policy
Masquerade and allow entire LAN to WAN traffic for all the authenticated users after applying following
policies:
Anti Virus & Anti Spam policy Scan SMTP, SMTP over SSL, POP3, IMAP, HTTP and HTTPS
traffic
Masquerade and allow entire LAN to WAN traffic for all the users after applying following policies:
Web Filter & Application Filter policy Applies General Corporate Policy to block Porn, Nudity,
Adult Content, URL Translation Sites, Drugs, Crime and Suicide, Gambling, Militancy and
Extremist, Phishing and Fraud, Violence, Weapons categories
Anti Virus & Anti Spam policy Scan SMTP, SMTP over SSL, POP3, IMAP, HTTP and HTTPS
traffic
Anti Virus & Anti Spam policy Scan SMTP, SMTP over SSL, POP3, IMAP, HTTP and HTTPS
traffic
Drop entire LAN to WAN traffic for all the users
Note
Page 360 of 490
Default Firewall Rules can be modified as per the requirement but cannot be deleted.
IPS policy will not be effective until Intrusion Prevention System (IPS) module is subscribed.
Virus and Spam policy will not be effective until Gateway Anti Virus and Gateway Anti Spam modules are
subscribed respectively.
If access Policy is not set through Network Configuration Wizard at the time of deployment, the entire
traffic is dropped.
Additional Firewall Rules for any of the zones can be defined to extend or override the default rules. For
example, rules can be created that block certain types of traffic such as FTP from the LAN to the WAN, or
allow certain types of traffic from specific WAN hosts to specific LAN hosts, or restrict use of certain protocols
such as Telnet to authorized users on the LAN.
Custom rules evaluate network traffics source IP Addresses, destination IP Addresses, User, IP protocol
types, and compare the information to access rules created on the Appliance. Custom rules take precedence,
and override the default Appliance Firewall Rules.
Rule
Virtual Host
NAT Policy
Spoof Prevention
DoS
Rule
IPv4 Firewall Rule
The Appliances Identity based Firewall allows creation of Firewall Rules embedding user identity into the
Firewall Rule matching criteria. It also allows to bind identity and device by embedding device MAC Address
through MAC Host in Firewall Rule.
Processing of firewall rules is top downwards and the first suitable rule found is applied.
Hence, while adding multiple rules, it is necessary to put specific rules before general rules. Otherwise, a
general rule might allow a packet that you specifically have a rule written to deny later in the list. When a
packet matches the rule, the packet is immediately dropped or forwarded without being tested by the rest of
the rules in the list.
As the firewall rules are grouped source and destination zone wise, rule can be added at the bottom of the
list or can be inserted in the group.
Inserting a Firewall Rule To insert a rule for a particular source and destination zone click the Insert
icon
under the Manage column against a firewall rule for the required source and destination zone.
For example, if you have already added a firewall rule for LAN to DMZ zone and want to add another
rule for the same zones then click Insert icon against the firewall rule for LAN to DMZ zone. It will add
a new firewall rule for the same zones.
Reordering Firewall Rules Rules are ordered by their priority. When the rules are applied, they are
processed from the top down and the first suitable rule found is applied. Hence, while adding multiple
rules, it is necessary to put specific rules before the general rules. Otherwise, a general rule might allow
a packet that you specifically have a rule to deny later in the list. When a packet matches the rule, the
packet is immediately dropped or forwarded without being tested by the rest of the rules in the list. To
change order of the rule, click the Move icon
against the rule whose order is to be changed. Move
the rule by dragging and dropping to a required position.
Clear All Filters To clear all the search filters applied on the source, destination or identity columns,
click the Clear All Filters button. This helps in removing filters on multiple columns at a time.
View Firewall Rules between two Zones To view Firewall Rules for the selected zones, select zones
For example, if you select LAN and WAN, all the Firewall Rules created for LAN zone to WAN zone will
be displayed.
Icon
Meaning
Appearing under
Column
Enable
Enable
Enable
Enabled
Disabled
SMTP Scanning enabled.
SMTP Scanning disabled.
SMTP over SSL Scanning enabled
IM
Scanning,
WAF,
Logging, Bypass User
Accounting
AV & AS Scanning
AV & AS Scanning
AV & AS Scanning
AV & AS Scanning
AV & AS Scanning
AV & AS Scanning
AV & AS Scanning
Manage
Manage
Rules are created for a pair of source and destination zone which determines the traffic direction.
Screen Element
Description
ID
Rule Name
Enable
Source
Destination
Service
Action
Identity
QoS Policy
IM Scanning
AV & AS Scanning
Schedule
Logging
Description
Routing through
Gateway
Backup Gateway
Upload Data
Download Data
DSCP Marking
WAF
Bypass User
Accounting
Hence, while adding multiple rules, it is necessary to put specific rules before general rules. Otherwise, a
general rule might allow a packet that you specifically have a rule written to deny later in the list. When a
packet matches the rule, the packet is immediately dropped or forwarded without being tested by the rest of
the rules in the list.
Go to Firewall > Rule > IPv4 Rule. Click the move rule
changed.
Click on the rule to be moved and then drag & drop the rule in the desired order.
Click close to save the order.
Parameters
Screen Element
Description
General Settings
Rule Name
Name
Description
Basic Settings
Zone
Attach Identity
(Only if source zone
is LAN/DMZ/VPN)
This traffic will not be included in the user accounting reports Internet Usage report and My Account reports, but will be
included in the firewall activity reports.
Example:
A User is added from Identity > Users > Users
User Activity
Network/Host
You can also define a new IP host, IP host group, MAC host,
virtual host, FQDN host, FQDN host group, country host,
country host group and Web Server directly from this page.
Services
You can also add a custom service or service group from this
page itself.
Schedule
Action
Available Options:
Accept Allow access
Drop Silently discards
Reject Denies access and ICMP port unreachable
message will be sent to the source.
For Example,
If the request is received on the LAN port using a spoofed IP
Address (public IP Address or the IP Address not in the LAN
zone network) and specific route is not defined, Appliance will
send a response to these hosts using default route. Hence,
response will be sent through the WAN port.
Apply NAT (Only if
Action is ACCEPT)
Select NAT Policy for the Firewall Rule. Traffic from this rule will
pass as per the NAT Policy selected for all gateways.
Default - MASQ
You can also use NAT policy configured for the gateway from
Network > Gateway > Gateway. All traffic passing from
this rule is NATed as per the gateways default NAT policy.
You can also override this gateway specific NAT policy by
selecting a NAT policy. Multiple Gateways and NAT Policy can
be added. If enabled the overridden policy is applied instead of
gateways default NAT policy.
Note
Appliance is deployed as
Advanced Settings
Toggle Drill Down icon Click to apply different protection settings to the traffic controlled by
Firewall. You can:
Enable load balancing and failover when multiple links are configured. Applicable only if
Destination Zone is WAN
Configure antivirus protection and spam filtering for SMTP, IMAP, POP3, and HTTP
policies. To apply antivirus protection and spam filtering, you need to subscribe for
Gateway Anti Virus and Gateway Anti Spam modules individually. Refer to Licensing
section for details.
Implement Intrusion Prevention System. To apply IPS policy you need to subscribe for
Intrusion Prevention System module. Refer to Licensing section for details.
Configure content filtering policies. To apply content filtering you need to subscribe for
Web and Application Filter module. Refer to Licensing section for details.
Apply QoS policy
Security Policies
Application Filter
Select Application Filter Policy for the rule. One can apply policy
on following traffic:
You can also create a new policy directly from this page and
attach to the user.
Apply Application
Based QoS Policy
Select the Web Filter Policy for the rule. One can apply the
policy on following traffic:
You can also create a new policy directly from this page and
attach to the user.
You can also create a new policy directly from this page and
attach to the user.
ICAP
You can also create a new policy directly from this page.
IM Scanning
WAF
Click the protocol for which the virus and spam scanning is to
be enabled
Default Disable
You can also create a new policy directly from this page and
attach to the user.
DSCP Marking
Backup Gateway
Note
Log Traffic
Log Firewall Traffic
Click to enable traffic logging for the rule i.e. traffic permitted
and denied by the Firewall Rule.
DSCP Values
DiffServ Code Point (DSCP) uses the 6 bits, thereby giving 26 = 64 different values (0 to 63). Table Standard
DSCP Marking describes the standard DSCP values. Remaining DSCP values can be customized as per
the QoS requirement.
Decimal
DSCP
Description
Default
Best Effort
CS1
Class 1 (CS1)
10
AF11
12
AF12
14
AF13
16
CS2
Class 2 (CS2
18
AF21
20
AF22
22
AF23
24
CS3
Class 3 (CS3)
26
AF31
28
AF32
30
AF33
32
CS4
Class 4 (CS4)
34
AF41
36
AF42
38
AF43
40
CS5
Class 5 (CS5)
46
EF
48
CS6
Control (CS6)
56
CS7
Control (CS7)
Processing of firewall rules is top downwards and the first suitable rule found is applied.
Hence, while adding multiple rules, it is necessary to put specific rules before general rules. Otherwise, a
general rule might allow a packet that you specifically have a rule written to deny later in the list. When a
packet matches the rule, the packet is immediately dropped or forwarded without being tested by the rest of
the rules in the list.
As the firewall rules are grouped source and destination zone wise, rule can be added at the bottom of the
list or can be inserted in the group.
Rules are created for a pair of source and destination zone which determines the traffic direction.
Icon
Appearing
under
Column
Meaning
Firewall rule is enabled and is currently applied
to the traffic.
Enable
Enable
Enable
Manage
Manage
Screen Element
Description
ID
Rule Name
Enable
Source
Destination
Service
Action
Identity
NAT
QoS Policy
Schedule
Logging
Description
Routing through
Gateway
Backup Gateway
Upload Data
Download Data
DSCP Marking
Bypass User
Accounting
Hence, while adding multiple rules, it is necessary to put specific rules before general rules. Otherwise, a
general rule might allow a packet that you specifically have a rule written to deny later in the list. When a
packet matches the rule, the packet is immediately dropped or forwarded without being tested by the rest of
the rules in the list.
Go to Firewall > Rule > IPv6 Rule. Click the move rule
changed.
Click on the rule to be moved and then drag & drop the rule in the desired order.
Parameters
Screen Element
Description
General Settings
Rule Name
Name
Description
Basic Settings
Zone
Note
Attach Identity
(Only if source zone
is LAN/DMZ/VPN)
This traffic will not be included in the user accounting reports Internet Usage report and My Account reports, but will be
included in the firewall activity reports.
Example:
A User is added from Identity > Users > Users
User Activity
You can also define a new IP host, IP host group, MAC host,
virtual host, FQDN host, FQDN host group, country host,
country host group and Web Server directly from this page.
Services
You can also add a custom service or service group from this
page itself.
Schedule
Action
Available Options:
Accept Allow access
Drop Silently discards
Reject Denies access and ICMP port unreachable
message will be sent to the source.
For Example,
If the request is received on the LAN port using a spoofed IP
Address (public IP Address or the IP Address not in the LAN
zone network) and specific route is not defined, the Appliance
will send a response to these hosts using default route. Hence,
response will be sent through the WAN port.
Apply NAT (Only if
Action is ACCEPT)
Select the NAT Policy for the Firewall Rule. Traffic from this rule
will pass as per the NAT Policy selected for all gateways.
You can also use the NAT policy configured for the gateway
from Network > Gateway > Gateway. All traffic passing
from this rule is NATed as per the gateways default NAT policy.
You can also override this gateway specific NAT policy by
selecting a NAT policy. Multiple Gateways and NAT Policy can
be added. If enabled the overridden policy is applied instead of
gateways default NAT policy.
Note
Advanced Setting
QoS and Routing Policy
QoS
You can also create a new policy directly from this page and
attach to the user.
DSCP Marking
Backup Gateway
Note
Log Traffic
Log Firewall Traffic
Click to enable traffic logging for the rule i.e. traffic permitted
and denied by the Firewall Rule.
Virtual Host
Virtual Host maps services of a public IP Address to services of a host in a private network.
A Virtual Host can be a single IP Address or an IP Address range or the Appliance interface itself.
The Appliance will automatically respond to the ARP request received on the WAN zone for the external IP
Address of Virtual Host. Default LAN to WAN (Any Host to Any Host) Firewall Rule will allow traffic to flow
between the Virtual Host and the network.
The Virtual Host page displays list of all the available virtual hosts. You can filter the list based on IP Family
or sort the list based on virtual host name. The page also provides option to add a new virtual host, update
the parameters of the existing virtual hosts, or delete a host.
To manage virtual hosts, go to Firewall > Virtual Host > Virtual Host.
Screen Element
Description
Name
Public Address
Mapped Address
Public Port
Mapped Port
IP Family
Screen Element
Description
General Settings
Basic Settings
Name
Description
IP Family
Available Options:
IPv4 A virtual host configured for this option must have IPv4 IP
Address for both, external IP Address(s) and mapped IP
Address(s).
IPv6 A virtual host configured for this option must have IPv6 IP
Address for both, external IP Address(s) and mapped IP
Address(s).
Note
External IP
Available Options:
IP Address Specified IP Address is mapped to a
corresponding mapped single or range of IP Address. If single
IP Address is mapped to a range of IP Address, Appliance
uses round robin algorithm to load balance the requests.
IP Range Specified IP Address range is mapped to a
corresponding range of mapped IP Address. The IP range
defines the start and end of an address range. The start of
the range must be lower than the end of the range.
Interface IP Select when any of the Appliance Port, Alias or
Virtual LAN (VLAN) sub-interface is required to be mapped to
the destination host or network.
This option is only available for IPv4 family.
If IP Address or IP Range option is selected, Appliance
automatically responds to the ARP request received on the WAN
zone for the external IP Address.
Note
Mapped IP
Available Options:
IP Address External IP Address is mapped to the specified
IP Address.
IP Range External IP Address Range is mapped to the
specified IP Address Range.
IP List External IP Address is mapped to the specified IP
list.
FQDN External IP Address is mapped to the specified
FQDN. Internal mapped server can be accessed by FQDN.
This option is only available for IPv4 Virtual Host.
Note
Physical Zone
Note
Port Forwarding
Enable Port Forwarding
Available Options:
Port
Port Range
Port List
External Port Select the public port number for which you want to
configure port forwarding.
Mapped Port Type Select the type of mapped port from the
available options:
Available Options:
Port
Port Range
Port List
Mapped Port Specify mapped port number on the destination
network to which the public port number is mapped..
Advanced Settings
Enable Load Balancing
Click to enable load balancing.
This option is available if incoming traffic is to be distributed to more than one internal server (Mapping
of single External Port to multiple Mapped Ports.)
Method
Select the method for load balancing from the available options.
Available Options:
Round Robin - In this method, requests are served in a
sequential manner where the first request is forwarded to the
first server, second request to the second server and so on.
When a request is received, Cyberoam checks to see which
the last server that was assigned a request was. It then
assigns this new request to the next available server. This
method is can be used when equal distribution of traffic is
required and there is no need for session-persistence.
First Alive - In this method, all incoming requests are served
by the first server (the first IP Address that is configured in the
IP Range). This server is considered as the primary server
and all others are considered as backup. Only when the first
server fails, the requests are forwarded to the next server in
line. This method is used for failover scenarios.
Random - In this method, the requests are forwarded to the
servers randomly. Although, Cyberoam makes sure that all
configured servers receive equally distributed load. Hence,
this method is also called uniform random distribution. This
method can be used when equal distribution of traffic is
required and there is no need for session-persistence or order
of distribution.
Page 395 of 490
Select the method to check the health of the server from the
available options.
Available Options:
TCP Probe
ICMP Probe
Port
Specify the time interval in seconds after which the health will be
monitored.
Acceptable Range (Seconds): 5 65535
Default - 60 seconds.
Timeout
Specify the time interval in seconds within which the server must
respond.
Timeout (Seconds): 1 10
Default - 2 Seconds
Retries
Specify the number of tries to probe the health of the server, after
which the server will be declared unreachable
Retries Range: 1 10
Default 3
Table Add Virtual host screen elements
Note
Deleting Virtual host will remove all its dependent configurations including:
Interface-Zone binding
DHCP Server or Relay
Alias based Firewall Rules
ARP Static & Proxy
Virtual Hosts and Virtual Host based Firewall Rules
Interface based Hosts and reference from Host Groups
Routes Unicast, Multicast
Once the virtual host is added, you can add a firewall rule for it at the same time or later from the firewall page
Once the Virtual Host is created successfully, Appliance automatically creates a loopback Firewall Rule for
the zone of the mapped IP Address. For example, if Virtual Host is created for the LAN mapped IP zone then
LAN to LAN Firewall Rule is created for the Virtual Host. Firewall Rule is created for the service specified in
Virtual Host. If port forwarding is not enabled in Virtual Host then Firewall Rule with All Services is created.
Verify the creation of loopback rule from Firewall page.
For Appliance to reply to the ARP requests received on any other zones than WAN zone for External IP
Address, create proxy ARP from Appliance Console option of CLI Console.
Screen Element
Description
Source Zone
Apply NAT
AV & AS Scanning
Log Traffic
Create Reflexive
Rule
Source Zone
NAT Policy
Network Address Translation (NAT) is the process of rewriting the source addresses of IP packets as they
pass through a router or Firewall. Mostly NAT is used to enable multiple hosts on a private network to access
the Internet using a single public IP Address. When a client sends an IP packet to the router, NAT translates
the sending address to a different, public IP Address before forwarding the packet to the Internet. When a
response packet is received, NAT translates the public address into the original address and forwards it to
the client.
NAT policy tells Firewall Rule to allow access but only after changing source IP Address i.e. source IP Address
is substituted by the IP Address specified in the NAT policy.
Use NAT to change or remap source or destination address of the packet.
Using NAT eliminates the need for public IP Addresses for all computers on your LAN. It is a way to conserve
IP Addresses available from the pool of Public IP Addresses for the Internet. NAT also allows you to conceal
the addressing scheme of your network.
The NAT Policy page displays the list of all the NAT policies and you can sort the list based on policy name.
The page also provides options to add a new policy, update the parameters of the existing policy, or delete a
policy.
Description
Name
IP Family
IP Mapped To
Screen Element
Description
Name
IP Address
Available Options:
IP Address It replaces source IP Address with the
specified IP Address
IP Range It replaces source IP Address with any of the
IP Address from the specified range
You can search and select a particular IP Address based on the
Host name. If IP Host or range is not already added, it can be
added from here itself or can be added from Objects >
Hosts > IP Hosts.
Spoof Prevention
You can configure MAC and/or IP Address pair entry in the IP-MAC trusted list to improve the security of your
network. Using MAC Address filtering makes it more difficult for a hacker to guess and use a random MAC
Address or spoof a MAC Address to gain access to your network as the traffic does not even reach your
Firewall.
Similarly, it is also possible to filter packets based on IP-MAC pair. It prevents hosts which try to violate trusted
IP-MAC. To make the restriction more granular, one can enable over zones.
General Settings
Trusted MAC
If enabled, the Appliance provides 3 ways to prevent spoofing using IP-MAC trusted list:
IP Spoofing Packets will be dropped if matching route entry is not available.
MAC Filter Packets will be dropped if the MAC Addresses are not configured in the Trusted MAC
list.
IP-MAC Pair Filter Packets will be dropped if IP and MAC do not match with any entry in the IP-MAC
trusted list.
Enable Restrict Unknown IP on Trusted MAC if you want to drop traffic from any IP Address not in the trusted
list for the trusted MAC Address.
By default, it is disabled. When disabled, traffic from any IP Address not in the trusted list will be allowed even
if it is coming from the trusted MAC Address. It is enabled automatically when Spoof Prevention is enabled.
Zone
LAN
WAN
DMZ
IP Spoofing
If enabled:
Yes
No
Yes
Yes
Yes
Yes
Yes
No
Yes
Trusted MAC
You can enable MAC Address and/or IP Address pair filtering to improve security. By enabling filtering, you
define the devices that can access your network. It is also possible to import the trusted MAC list through
CSV (Comma Separated Value) file. When a user attempts to access the network, the Appliance checks the
MAC Address and/or IP Address from the list. User gets access to the network only if the MAC Address and/or
IP Address is on the trusted MAC list else the request is rejected.
Description
Import Button
MAC Address
IPv4 Association
IPv4 Address
IPv6 Association
IPv6 Address
Screen Element
Description
MAC Address
IPv4 Address
Available Options:
Static IP Address to bind to the MAC Address. Packets
will be rejected if either MAC or IP Address does not
match. Multiple IP Addresses separated by comma can
be provided.
DHCP MAC Address will be bind to the IP Address
leased by the Appliance DHCP server as and when the
IP is leased. Entry will be updated automatically when the
leased IP Address is updated.
Available Options:
Static IP Address to be bound to the MAC Address.
Packets will be rejected if either MAC or IP Address does
First row of the CSV file has to be the header row: MAC Address, IP Association, IP Address
The rest of the rows are values corresponding to the header fields
Blank rows will be ignored
Error Message is displayed only for invalid rows
Format of values:
Compulsory fields: MAC Address and IP Association
Optional fields: IP Address
IP Association must be Static or DHCP or None
For Static IP Association, IP Address must be available
For None/DHCP type of IP Association, IP-Address is not required
For Invalid MAC/IP Address or IP Association entry will be discarded
Use comma to insert multiple static IP Addresses
DoS
The Appliance provides several security options that cannot be defined by the Firewall Rules. This includes
protection from several kinds of Denial of Service attacks. These attacks disable computers and circumvent
security.
Denial of Service (DoS) attack is a method that hackers use to prevent or deny legitimate users access to a
service.
DoS attacks are typically executed by sending many request packets to a targeted server (usually Web, FTP,
or Mail server), which floods the server's resources, making the system unusable. Their goal is not to steal
the information but disable or deprive a device or network so that users no longer have access to the network
services/resources.
All servers can handle traffic volume up to a limit, beyond which they become disabled. Hence, attackers send
a very high volume of redundant traffic to a system so it cannot examine and allow permitted network traffic.
Best way to protect against the DoS attack is to identify and block such redundant traffic.
Packet rate per Source
Total number of connections or packets allowed to a particular user.
How it works
When the brust rate is crossed, the Appliance considers it as an attack. The Appliance provides DoS attack
protection by dropping all the excess packets from the particular source/destination. It will continue to drop
the packets till the attack subsides. Because the Appliance applies threshold value per IP Address, traffic
from the particular source/destination will only be dropped while the rest of the network traffic will not be
dropped at all i.e. traffic from the remaining IP Addresses will not be affected at all.
Time taken to re-allow traffic from the blocked source/destination = time taken to subside the attack + 30
seconds
For example,
Packet rate per Source 100 packets per second
Burst rate per Source 200 packets per second
.Intially, the user will be able to send 200 packets per second. However once these 200 packets are received,
the user the user will only be allowd to send 100 packets per second. So in the next phase, if the user sends
150 packets per second, the Appliance will consider it as an attack and drop the last 50 (101-150) packets
and will only accept traffic from that user 30 seconds after the time that it dropped the first packet.
Threshold values
The Appliance uses packet rate and brust rate values as a threshold value to detect DoS attack. These values
depend on various factors like:
Network bandwidth
Nature of traffic
Capacity of servers in the network
These values are applicable to the individual source or destination i.e. requests per user/IP Address and not
globally to the entire network traffic. For example, if source rate is 2500 packets/minute and the network
consists of 100 users then each user is allowed packet rate of 2500 packets per minute.
Configuring high values will degrade the performance and too low values will block the regular requests.
Hence it is very important to configure appropriate values for both source and destination IP Address.
Settings
Bypass Rules
Settings
Define the attack definition from Firewall > DoS > Settings
(Attack definition can be defined both for source and destination)
Parameters
Screen Element
SYN Flood
Description
Configure Packet Rate (packets/minute) and Burst Rate
(packets/second) for source and destination.
Click Apply Flag checkbox to apply the SYN flood definition
and control allowed number of packets.
Dropped Source
Routed Packets
Disable ICMP
Redirect Packet
Disable ARP
Flooding
Bypass Rules
The Appliance allows you to bypass the DoS rule in case you are sure that the specified source will not be
used for flooding or ignore if flooding occurs from the specified source. By default, VPN zone traffic is also
subjected to DoS inspection. You can also bypass DoS inspection of the traffic coming from certain hosts of
VPN zone.
The DoS Bypass Rule page displays the list of all the bypass rule(s). You can filter the list based on IP Family.
The page provides option to add a new rule, update the existing rule, or delete a rule.
Screen Element
Description
Source IP
Source Port
Destination IP
Destination Port
Protocol
Protocols to be bypassed.
IP Family
Description
IP Family
Source IP/Netmask
(only IPv4)
Destination
IP/Netmask (Only
IPv4)
Source IP/Netmask
(only IPv6)
Destination
IP/Netmask (Only
IPv6)
Protocol
Available Options:
TCP
UDP
ICMP
All Protocols
For example, if you select TCP protocol then DoS rules will not
be applied on the TCP traffic from the specified source to
destination.
Source Port
Destination Port
Web Filter
Web Filter menu allows to configure and manage Web Filtering through the Appliance. The traffic coming
from the web is filtered by various policies and categories.
Settings
Category
Policy
Settings
Use this page to enable Safe Search feature and Pharming protection useful in filtering Web traffic.
Safe Search This feature allows you to enforce safe searching into your search engines, thus helping you
against malicious sites.
Pharming Protection This feature allows you to stop Pharming by various attacker sites by Domain Name
resolution.
Description
Enable safe search so that web sites containing pornography
and explicit sexual content are blocked from the Google,
Yahoo, AltaVista and Bing search results.
Top Image
Web Category
Web Category is the grouping of Domains and Keywords used for Internet site filtering. Domains and any
URL containing the keywords defined in the Web Category will be blocked.
Each category is classified according to the type of sites in the category. Categories are grouped into four
types specifying whether surfing those categories is considered as productive or not:
Neutral
Productive
Non-working
Un-healthy
For your convenience, database of default web categories is provided. You can use these or even create new
web categories to suit your needs. To use the default web categories, the add-on module Web and Application
Filter should be registered.
Depending on the organizations requirement, allow or deny access to the categories with the help of policies
by groups, individual user, time of day, and many other criteria. It is also possible to restrict the bandwidth
based on the web category. For example, to reserve 512 kbps for SAP applications, define a QoS Policy of
512 kbps and assign this policy to the SAP Web Category and Firewall Rule. Users accessing any URLs
falling under the SAP Web Category will get 512 kbps. 512 kbps bandwidth will be shared among all the users
when more than one user is accessing.
The Appliance provides pre-defined categories which can be used to block the malicious and objectionable
content. The page displays the list of pre-defined as well as custom categories.
The page allows you to manage default web categories and create custom web categories. You can also add
or remove specific domains or keywords in the category. Appliance also provides pre-defined categories
which can be used to block the malicious and objectionable contents.
Custom web category is given priority over default category while allowing/restricting the access.
Screen Element
Description
Name
Type
Classification
QoS Policy
Screen Element
Description
Name
Classification
Available Options:
Neutral
Page 419 of 490
Productive
Non-working
Healthy
QoS Policy
Configure Category
(Applicable only
while adding a
Category)
Available Options:
Local Select to create a Web Category with URL stored in
the local Appliance.
External URL Database Select to create a Web Category
with external webcat URL located anywhere on the Internet.
Import Domain/
Keyword (Only if
Local Configure
Category is selected)
Advanced Settings
Action (Only
applicable while
adding a Category)
Search URL
Use Search URL to search whether the URL is categorized or not. It searches the specified URL and displays
Category name under which the URL is categorized along with the category description.
When a custom category is created with a Domain/URL which is already categorized in default category then
the custom category overrides the default category and the search result displays custom category name and
not the default category name.
To search a URL
Select Web Filter > Category > Search URL
URL Group
When you want to configure same rule for multiple URLs, create a URL Group and instead of adding web
filter rule for individual URLs, and create a single the rule for the group.
The page allows you to group URLs and manage URL Groups. When you want to configure same rule for
multiple URLs, create URL Group and instead of adding Web Filter Rule for individual URL, you add rule for
the Group.
Description
URL
Description
Parameters
To add or edit a web category, go to Web Filter > Category > URL Group. Click the Add button to
add a new web category. To update the details, click on the web category or Edit icon
column against the web category you want to modify.
in the Manage
Screen Element
Description
URL(s)
Two strategies based on which Web Filter Policy can be defined are:
Allow: By default, allows access to all the categories except the specified categories. Access to the
specified categories depends on the strategy defined for each category.
Deny: By default, denies access to all the categories except the specified categories. Access to the
specified categories depends on the strategy defined for each category.
Appliance is shipped with the following predefined policies: Allow All, CIPA, Deny all and General Corporate
Policy. These predefined policies are immediately available for use until configured otherwise. You can also
define custom policies to define different levels of access for different users to meet your organizations
requirements.
The Web Filter policy page displays list predefined and custom policies. You can filter or sort the list based
on policy name. The page provides option to add new policy, update, or delete a policy.
To manage Web Filter Policies, go to Web Filter > Policy > Policy.
Screen Element
Description
Name
Default Action
Reporting
Description
Description
Template
Enable Reporting
Specify the file size (in MB) in the textbox against Download
File Size Restriction to configure the maximum allowed file
download size.
E.g. X-YouTube-Edu-Filter:HMtp1sI9lxt0KAVpcg88kQ
Note
Field Name: X-YouTube-Edu-Filter
Field Value Format: Alphanumeric [a-z][A-Z][0-9]
Field Value Length: up to 44 characters
Description
Screen Element
Category Name
Description
Displays a name of the Web Filter Category.
Type
Schedule
Web Action
Exception
Description
Select category Type for which the rule is to be added. You can
configure rule for 4 types of categories:
Available Options:
Web Category
File Type
URL Group
Dynamic Category.
URL Group is a custom group of URLs
Dynamic Category includes Cookies, Applets, ActiveX and
HTTP Upload category.
Category
You can also search the category name from the search text
box provided.
HTTP Action
HTTPS Action
Exception link
Click to add the file type category exception rule for a selected
category type and select file type category.
Note
Schedule
Screen Element
Description
Category
HTTP Action
HTTPS Action
Exception link
Click to add the file type category exception rule for a selected
category type and select file type category.
Note
Schedule
ICAP
Internet Content Adaption Protocol (ICAP) is a lightweight protocol that encapsulates underlying
HTTP/HTTPS request and response to/from ICAP Server. It allows ICAP Clients to pass HTTP messages to
ICAP Servers for transformation/adaption and thereby offloading the primary server. These ICAP Servers are
focused on specific functions like ad insertion, content filtering, virus scanning etc.
Appliance can be deployed in heterogeneous enterprise environments and can hand over HTTP traffic to
ICAP Server for malware scanning, content filtering and DLP scanning or other processing. Cyberoam after
applying its Web Filter Policy will forward the Web traffic to ICAP server which in turn can apply data usage
policies, antivirus scanning policies and content filtering policies. Depending on the services configured in the
ICAP server, user either receives access denied message or virus detection message from Cyberoam or
ICAP server.
Cyberoam can be seamlessly integrated using ICAP-compliant DLP/AV Scanning/Web Filtering applications:
Symantec DLP
Symantec Protection Engine 7.0
Trend Micro Interscan Web Security Virtual Appliance
Sophos Anti Virus
Commtouch Anti Virus
Single ICAP profile with Request and Response mode are supported. Administrator can view all the events
logs from the Log Viewer.
Note
Server
The ICAP Server page displays list of configured ICAP Servers. You can filter or sort the list based on Server
Name. The page provides option to add, update, or delete Server.
Description
Displays name of the ICAP Server.
IP
Port
Service
Screen Element
Description
Server Name
Server IP
Port
Service
Policy
The ICAP Policy page displays list of configured ICAP Policies. You can filter or sort the list based on Policy
Name. The page provides option to add, update, or delete a policy.
Description
Policy Name
Request Server
Response Server
Max Connections
Content Limit
Description
Policy Name
Request
Modifications
Request Server
Response
Modifications
Response Server
Max connections
DLP Mode
Bypass Error
Application Filter
Application Filter menu allows configuring and managing filtering on various applications. The traffic coming
from the web is filtered by various policies and categories.
Application List
Category
Policy
Application List
The Appliance can identify and control applications which use standard Port 80, 443, non-standard ports, port
hopping or tunnel through encrypted SSL traffic. The feature enables prioritization of applications based on
user identity, time, applications, and bandwidth, allowing great flexibility, visibility, and control. The Appliance
also provides implementation of application-based bandwidth management, accelerating critical applications
while blocking malware-laden sites through Web Filtering. Organizations can group applications as per their
requirements into business-critical, entertainment, communication, collaboration and control access through
Firewall policies.
Note
Web and Application Filter module is a subscription module that needs to be subscribed before use. Check
the features of the module by subscribing free trial subscription of the module. (See System >
Maintenance > Licensing)
The Appliance is shipped with a set of predefined applications. This applications are classified based on their
risk level, characteristics and technology, offering more granular controls.
Note
Web and Application Filter module is a subscription module that needs to be subscribed before use. Check
the features of the module by subscribing free trial subscription of the module. (See System >
Maintenance > Licensing)
The total number of application signatures included depends on the Application Signatures Database used
by the Appliance. Appliance Information doclet in the Dashboard provides the version of Application
Signatures Database used by your Appliance.
The Application List page displays total number of applications available for use and list of all the
applications including information describing category it belongs to, risk factors, its characteristics and
technology.
The application list can be filtered based on name of the application, category of the application, risk,
characteristics, and technology.
Screen Element
Description
Name
Category
Risk
Characteristics
Technology
The Category page displays list of all the categories. The categories list can be filtered based on name of
the category. Use plus or minus toggle besides the category name to expand and collapse list of
applications grouped in the respective category.
Screen Element
Description
Category Name
QoS Policy
Edit Category
Screen Element
Description
Name
QoS Policy
You can also create a new policy directly from this page and
attach to the category.
Table Edit Category screen elements
Screen Element
Description
Name
Default Action
Description
Policy Description.
Parameters
Description
Name
Description
Template
Screen Element
Description
Name
Description
Application
Application Filter
Criteria
Schedule
Action
Note
Screen Element
Description
Risk
Available Options:
Select All
1 - Very Low
2 Low
3 Medium
4 High
5 Very High
Characteristics
Available Options:
Select All
Can bypass firewall policy
Excessive Bandwidth
Loss of productivity
Prone to misuse
Transfer files
Tunnels other apps
Vulnerabilities
Widely Used
Technology
Available Options:
Select All
Browser Based
Client Server
Network Protocol
P2P
List of Matching Applications
Select All
Select the option Select All to choose all the Applications listed
for the selected criteria.
Name
Description
Category
Risk
Characteristics
Technology
Action
Action
Available Options:
Allow
Deny
Schedule
IM
IM (Instant Messaging) allows configuring and managing restrictions on Instant Messaging services provided
by the Yahoo and MSN messengers. The traffic coming from web in the form of files and chat is filtered by
various rules and content filtering strategies. You can add an IM Contact or IM Contact Group for configuring
the rules.
IM Contact
IM Rules
Content Filter
IM Contact
IM Contact is used to register various Yahoo and MSN messaging application users. A Contact can be created
for a user having access to any of the two IM applications. Along with the contacts, IM Contact Groups can
also be created. Once the users are registered, various IM rules can be created for monitoring them. The
rules can be set on groups as well as on users individually.
IM Contact
IM Contact Group
The IM Contact page is used to create and manage contacts. These contacts can either be Yahoo or MSN
Email IDs. Any of the Email ID created through Yahoo or MSN are valid for creating IM Contacts.
Note
Screen Element
Protocol
Description
Displays the protocol that suggests
application in use. Yahoo or MSN.
the
messenger
Username
Note
Adding an IM Contacts
To add or edit an IM contact, go to IM > IM Contact > IM Contact. Click the Add button to add IM
contact. To update the details, click on the contact or Edit icon
you want to modify.
Screen Element
Protocol
Description
Select the application used for Instant Messaging.
Available Options:
Yahoo
IM User Name
IM Contact Group
MSN
Specify the username to identify the IM Contact. The username
can either be an Email Address or name of the user.
Select the IM Contact Group to which an IM Contact will be
assigned.
IM Contact Group
A Group is a collection of users that are managed as a single unit. By creating a group, filtering rules can be
applied to a number of contacts simultaneously. Contacts that belong to a particular group are referred to as
group contacts.
IM Contact Group page is used to create and manage contact groups. These contact groups have IM
Contacts. A single IM Contact can be added to multiple contact groups. Rules to the user get applied in the
order in which they are created.
Screen Element
Description
Name
Description
in the Manage
Description
Group Name
Select IM Contact
IM Rules
IM Rule controls the users Instant Messaging access. It specifies which users have access to what IM
applications. Processing of IM Rules is top downwards and the first suitable rule found is applied. Individual
rules for Login, Conversation (chats), File Transfer and Webcam access can be defined based on parameters
like:
One-to-One Conversation One-to-One conversations can be allowed/denied between individual
contacts or contacts within groups.
Group Conversation Group conversations between multiple users can be allowed/denied.
Content Filtering
Virus Scanning
Archiving
Maintaining Logs
Allow/Deny access can be set for an IM Contact or entire IM Contact Group, or even normal users or User
Groups. For example, you can define a rule that blocks access to all one-to-one conversations between an
IM Contact Group and a User Group.
For ease of configuration, Appliance provides default rules for Login, Conversation, File Transfer and
Webcam. A custom rule can also be created to meet an organizations requirements.
If IM access between contacts is restricted, an access denied message is displayed in the conversation
window.
Login
Conversation
File Transfer
Webcam
Login
Login page allows you to configure and manage Login Rules for IM Contact, IM Contact Group, User and
User Group.
To manage login rules for contacts, go to IM > IM Rules > Login.
Note
Screen Element
Description
Name
Participants
Action
Logging
Logging Level
Screen Element
Description
Name
User / IM Contact
Available Options:
IM Contact
IM Contact Group
User
User Group
You can also add above contacts from the Add Login Rule Page
itself.
Action
Available Options:
Allow
Privacy Disclaimer
Deny
If the Login is allowed, you can enable the Privacy Disclaimer
checkbox to inform the IM Contacts about the privacy policy.
Logging Level
Conversation
The Conversation page allows configuring and managing Conversation Rules between any of the two
identities: IM Contact, IM Contact Group, User and User Group. The IM conversation between these two
contacts can be monitored and logged.
Appliance provides a default Conversation Rule that can be applied. This rule allows all the conversations but
logs the content of the conversation.
Note
Screen Element
Description
Name
Participant
Participant
One-to-One
Conversation
Group Conversation
Logging
Logging Level
Screen Element
Description
Name
Between User / IM
Contact
Available Options:
IM Contact
IM Contact Group
User
User Group
You can also add above contacts from the Add Conversation
Rule Page itself.
One-to-One
Conversation
Group Conversation
Content Filter
Logging
Logging Level
Available Options:
Full Data Full Data contains the entire information
about conversation including the content of the chat, the
Login time, logout time. Name of User or Groups between
whom the conversation happened and duration of the
conversation.
Meta Data Meta Data contains the information about
the Login time, logout time. Name of User or Groups
between whom the conversation happened and duration
of the conversation.
Table Add Conversation Rule screen elements
File Transfer
File Transfer page allows the user to configure and manage File Transfer Rules between any of the two
identities: IM Contact, IM Contact Group, User and User Group. The file transfers between these two identities
is monitored and logged.
If the file transfer access between contacts is restricted and contact tries to transfer a file, an access denied
message is displayed in the conversation window.
To manage file transfer rules between contacts, go to IM > IM Rules > File Transfer.
Screen Element
Description
Name
Participant
Participant
Action
Virus Scanning
Logging
Logging Level
Screen Element
Description
Name
Between User / IM
Contact
Available Options:
IM Contact
IM Contact Group
User
User Group
You can also add above contacts from the Add File Transfer
Rule Page itself.
Action
Available Options:
Allow
Deny
Virus Scanning
Logging
Logging Level
Webcam
The Webcam page allows configuring and managing Webcam Rules between any of the two identities: IM
Contact, IM Contact Group, User and User Group. The video conversations via Webcam between these two
contacts are monitored and logged.
If video conversation access between contacts is restricted and the contact tries to use the Webcam, an
access denied message is displayed in the conversation window.
To manage webcam rules between contacts, go to IM > IM Rules > Webcam.
Description
Name
Participant
Participant
Action
Available Options:
Allow
Deny
Displays whether logging of Video Conversation is On or Off.
Logging
Logging Level
Description
Name
Between User / IM
Contact
Available Options:
IM Contact
IM Contact Group
User
User Group
You can also add above contacts from the Add Webcam Rule
Page itself.
Action
Select an Action for the webcam viewing or video chat from the
available options:
Available Options:
Allow
Deny
Logging
Logging Level
Content Filter
Content Filtering functionality is applied to Instant Messaging applications wherein content can be removed
from the conversation if appears in the conversation.
The Content Filter page allows you to specify a list of keywords and regular expressions to be blocked, if
encountered in any of the chat conversation. If content filtering is enabled from IM Conversation Rule, the
configured keywords are removed and an error message is displayed for the same.
Configure Settings
To configure content filtering expressions, go to IM > Content Filter > Content Filter.
Screen Element
Description
RegEx Settings
Specify Regular Expressions to be removed from the IM applications. For example, if the string
AB* is specified in the RegEx list, all the strings starting with AB would be dropped from the
conversation and an error message would be displayed.
Keyword Settings
Specify Keywords to be removed from the IM applications. For example, if the strings like
ammunition and terrorism are specified in the keywords list, all such strings would be dropped
from the conversation and an error message would be displayed.
QoS
Bandwidth is the amount of data passing through a media over a period of time and is measured in terms of
kilobytes per second (kbps) or kilobits per second (kbits) (1 Byte = 8 bits).
The primary objective of QoS (Quality of Service) policy is to manage and distribute the total bandwidth on
certain parameters and user attributes. QoS policy allocates & limits the maximum bandwidth usage of the
user and controls the web and network traffic.
Settings
Use Settings page to configure default QoS settings. Administrator can also configure it from Command Line
Interface (CLI). All the bandwidth related data are displayed only with unit KB (Kilo bytes per second).
Screen Element
Bandwidth maximum
limit
Description
Specify maximum bandwidth limit in KB. It is generally a sum of
all WAN links maximum limits.
Default 100000 KB
Acceptable Range (KB) - 1 to 2560000
Allocation Behavior
Available Options:
Normal
Real Time
If the bandwidth behavior is normal then priority will be
applicable only for excess bandwidth i.e. bandwidth remaining
after guaranteed bandwidth allocation.
Available Options:
Lenient
Enforced
Select Enforced to enforce bandwidth restriction on the traffic
on which the bandwidth policy is not applied.
Select Lenient if you do not want to enforce bandwidth
restriction on the traffic on which the bandwidth policy is
not applied. It will only handle traffic on which QoS Policy
is applied.
Default Policy will be applicable on the traffic which does not
have any bandwidth policy applied.
Default Policy
(Available only if Enforced
is selected)
QoS Policy
Policy can be defined/created for:
User It restricts the bandwidth of a particular user.
Firewall Rule It restricts the bandwidth for any entity to which the Firewall Rule is applied.
Web Category It restricts the bandwidth for the URL categorized under the Web Category. To
implement restriction, policy is to be assigned through Firewall Rule.
Application It restricts the bandwidth for the application. To implement restriction, policy is to be
assigned through Firewall Rule.
Types of Policy
Two types of bandwidth restriction can be placed:
Strict In this type of bandwidth restriction, user cannot exceed the defined bandwidth limit.
Committed In this type of bandwidth restriction, user is allocated the guaranteed amount of bandwidth
and can draw bandwidth up to the defined burst-able limit, if available.
It enables to assign fixed minimum and maximum amounts of bandwidth to the users. By borrowing
the excess bandwidth when available, users are able to burst above guaranteed minimum limits, up
to the burst-able rate. Guaranteed rates also assure minimum bandwidth to critical users for receiving
constant levels of bandwidth during peak and non-peak traffic periods.
Guaranteed represents the minimum guaranteed bandwidth and burst-able represents the maximum
bandwidth that the user can use, if available.
Implementation strategy
The Policy can be implemented in two ways depending on the policy Type:
Total (Upload + Download)
Individual Upload and Individual Download
Strict policy
In this type of bandwidth restriction, the user cannot exceed the defined bandwidth limit. There are two ways
to implement strict policy:
Total (Upload + Download)
Individual Upload and Individual Download
Implementation on
Bandwidth specified
Example
Total
(Upload + Download)
Total bandwidth
Individual (Upload /
Download)
Committed policy
Implementation on
Bandwidth specified
Example
Total
(Upload + Download)
Guaranteed bandwidth
Burst-able bandwidth
Individual (Upload /
Download)
Individual Guaranteed
and Burstable bandwidth
i.e. separate for both
Bandwidth Usage
Policy can be configured for two types of bandwidth usage:
Individual Allocated bandwidth is for the particular user only.
Shared Allocated bandwidth is shared amongst all the users who have been assigned this policy.
The Appliance is shipped with predefined QoS policies. These predefined policies are immediately available
for use until configured otherwise. You can also define custom policies to meet your organizations
requirements.
Screen Element
Description
Name
Restriction Type
Description
Policy Based On
Available Options:
User Restricts the bandwidth of a particular user.
Firewall Rule Restricts the bandwidth of any entity to
which Firewall Rule is applied.
Web Category Restricts the bandwidth for the URL
categorized under the Web category.
Application Restricts the bandwidth for the applications
categorized under the Application category.
Policy Type
Available Options:
Strict In this type of policy, user cannot exceed the
defined bandwidth limit.
Committed In this type of policy, user is allocated the
guaranteed amount of bandwidth and can draw
bandwidth up to the defined burst-able limit, if available.
It enables to assign fixed minimum and maximum amounts of
bandwidth to the users. By borrowing excess bandwidth when
available, users are able to burst above guaranteed minimum
limits, up to the burst-able rate. Guaranteed rates also assure
minimum bandwidth to critical users to receive constant levels
of bandwidth during peak and non-peak traffic periods.
Implementation On
Priority
Bandwidth Usage
Type
Available Options:
Individual Allocated bandwidth is for the particular user
only.
Shared Allocated bandwidth is shared among all the
users who have been assigned this policy.
Description
Screen Element
Description
Add Schedule wise QoS Policy Details to override the default QoS Policy Details
Schedule
Policy Type
Bandwidth (Min/Max)
Upload Bandwidth
(Min/Max)
Download Bandwidth
(Min/Max)
Screen Element
Description
Name
Policy Type
Implementation On
Schedule
If you are not sure about the Schedule details, select Schedule
to view the Schedule details.
Table Add a QoS Policy Schedule screen elements
The Appliance can either store logs locally or send logs to external syslog servers for storage and archival
purposes.
The Appliance can log many different network activities and traffic including:
Firewall log
Anti Virus infection and blocking
Web filtering, URL and HTTP content blocking
Signature and anomaly attack and prevention
Spam filtering
IM logs
Administrator logs
User Authentication logs
VPN IPSec, L2TP, PPTP
WAF logs
ICAP logs
The Appliance can either store logs locally or send to the syslog servers. Traffic Discovery logs can be stored
locally only.
Configuration
Log Viewer
4-Eye Authentication
Configuration
Syslog is an industry standard protocol/method for collecting and forwarding messages from devices to a
server running a Syslog daemon usually via UDP Port 514. Syslog is a remote computer running a Syslog
Server. Logging to a central Syslog Server helps in aggregation of logs and alerts.
The Appliance sends a detailed log to an external Syslog server in addition to the standard event log. Syslog
support requires an external server running a Syslog daemon on any of the UDP Port. When configuring
logging to a Syslog server, one needs to configure the facility, severity and log file format. One can also
specify logging location if multiple Syslog servers are defined.
The Appliance captures all log activity and includes every connection source and destination IP Address
(IPv4/IPv6), IP service, and number of bytes transferred.
A SYSLOG service simply accepts messages, and stores them in files or prints. This form of logging is the
best as it provides a central logging facility and a protected long-term storage for logs. This is useful both in
routine troubleshooting and in incident handling.
Syslog Servers
Log Settings
Netflow
Syslog Servers
The Syslog Servers page displays a list of configured syslog servers. You can sort this list based on server
name. The page also provides option to add, update, or delete the server.
Screen Element
Description
Name
Server IP
Port
Facility
Severity
Format
Screen Element
Description
Name
IP Address / Domain
Port
Facility
Available Options:
DAEMON Daemon logs (Information of Services running
in Appliance as daemon).
KERNEL Kernel log
LOCAL0 LOCAL7 Log level information.
USER Logging based on users who are connected to the
Server.
Severity Level
Once you add the server, go to Logs & Reports > Configuration > Log Settings page and enable
all those logs, which are to be sent to the Syslog Server.
Log Settings
After configuring Syslog server, configure logs to be sent to the Syslog server. If multiple Syslog servers are
configured, you can send various logs on different servers.
To record logs you must enable the respective log and specify logging location. The Administrator can choose
between On-Appliance (local) logging and Syslog logging. The Administrator can also disable logging
temporarily.
Screen Element
Description
Log Type(System)
Local
Syslog
Central_Management
Cyberoam
The Appliance logs many different network activities and traffic including:
Firewall Log
Firewall Log records invalid traffic, local ACL traffic, DoS attack, ICMP redirected packets, source routed and
fragmented traffic. Firewall logs can be disabled or send to the remote syslog server only but cannot be stored
locally.
Firewall Rules
Log records the entire traffic for Firewall.
Invalid Traffic Log
Log records the dropped traffic that does not follow the protocol standards, invalid fragmented traffic
and the traffic whose packets or Appliance is not able to relate to any connection.
Local ACLs Log
Log records the entire (allowed and dropped) incoming traffic.
DoS Attack Log
The DoS Attack Log records attacks detected and prevented by the Appliance i.e. dropped TCP, UDP
and ICMP packets.
To generate logs, go to Firewall > DoS > Settings and click Apply Flag against SYN Flood,
UDP Flood, TCP Flood, and ICMP Flood individually.
Dropped ICMP Redirected Packet Log
Log records all the dropped ICMP redirect packets.
To generate log, go to Firewall > DoS > Settings and click Apply Flag against Disable ICMP
redirect Packets.
Dropped Source Routed Packet Log
Log records all the dropped source routed packets.
To generate log, go to Firewall > DoS > Settings and click Apply Flag against Drop Source
Routed Packets.
Dropped Fragmented Traffic
Log records the dropped fragmented traffic.
MAC Filtering
Log records the dropped packets when filtering is enabled from Spoof prevention.
IP-MAC Pair Filtering
Log records the dropped packets when filtering is enabled from Spoof prevention.
IP Spoof Prevention
Log records the dropped packets when filtering is enabled from Spoof prevention.
SSL VPN
Log records of SSL VPN traffic.
Virtual Host
Log records of Virtual Host traffic.
IPS Logs
Records detect and drop attacks based on unknown or suspicious patterns (anomaly) and signatures.
Anti Virus Logs
Viruses detected in HTTP, SMTP, FTP, POP3, IMAP4, HTTPS and IM traffic. HTTP and FTP logs can be
disabled or sent to the remote log server only.
Anti Spam Logs
SMTP, POP3, IMAP4 spam and probable spam mails.
Content Filtering Logs
Web Filtering, Application Filtering and IM logs.
Event Logs
Admin Events, Authentication Events and System Events.
WAF Logs
Alert Events and Allowed Events.
Note
WAF logs are not available in CR10iNG, CR15i, CR15wi, CR15iNG, CR15wiNG, CR25ia, CR25wi,
CR35ia and CR35wi Cyberoam Appliances.
Netflow
To configure Netflow, go to Logs & Reports > Configuration > Netflow.
Netflow is a flow technology used for network bandwidth monitoring. Details of the traffic passing through the
firewall rule can be exported as NetFlow records to the Netflow Server. Based on the records received by the
Netflow Server, data analyzing tools like Open Source Data Analyzer and PRTG software can generate
reports.
The Netflow page displays list of configured netflow servers. The page also provides option to add, update,
or delete the server. Use
to add and
Note
Only traffic of Firewall rules where "Log Firewall Traffic" is enabled will be sent to the NetFlow Server.
You can configure maximum five Netflow Servers.
Cyberoam supports NetFlow v5 and all the parameters of v5 can be exported.
Screen Element
Description
Netflow Configuration
Server Name
Netflow Server
IP/Domain
Default - 2055
Table Add Netflow Server screen elements
Log Viewer
View the logs for modules like IPS, Web Filter, Anti Spam, Anti Virus and Firewall from Log Viewer page. This
page gives consolidated information about all the events that have occurred.
To view and manage logs, go to Logs & Reports > Log Viewer > Log Viewer.
View Log Modules
Set Refresh Interval Select the refresh interval for refreshing the logs automatically. Choose the time
or click Refresh button to refresh the logs.
De-Anonymize
Description
Time
Log Comp
Status
Successful or failed.
User Name
Message
Message ID
Description
Time
Action
Allowed or Denied.
User Name
Source IP
Destination IP
Category
URL
URL accessed.
Bytes Transfer
Message ID
Description
Time
Action
Denied
User Name
Source IP
Destination IP
Application Category
Application
Firewall Rule
Message ID
Description
Time
IM Action
Protocol
User Name
IP Address
Protected Contact
Peer Contact
Message ID
Description
Time
Protocol
Source IP
Destination IP
Virus
Message
Message ID
Description
Time
Log Comp
Source IP
Destination IP
Email Sender
Email Receiver
Email Subject
Message
Message ID
Description
Time
Log Comp
Allowed or Denied.
User Name
Firewall Rule
In Interface
Out Interface
Source IP
Destination IP
Message ID
Description
Time
Log Comp
Detect or Drop.
User Name
Source IP
Destination IP
Signature ID
Signature Name
Firewall Rule
Message ID
Description
Date and Time when the event occurred.
Log Comp
Successful or failed.
User Name
IP Address
Auth. Client
Auth. Mechanism
Message
Message ID
Description
Time
Log Comp
Successful or failed.
User Name
IP Address
Message
Message ID
Description
Time
Action
Source IP/Name
Message
URL
URL accessed.
Reason
Status Code
Bytes Transferred
Message ID
Description
Time
Action
Mode
User Name
Source IP
Destination IP
URL
URL accessed.
Bytes Transferred
Server Tag
X-Info
Message ID
De-Anonymize
The Appliance anonymizes all the user identities - Username, IP Address, MAC Address, Email Address and
IM Contact ID in all logs / reports. It means user identities in all the reports are displayed in encrypted form.
To view the actual details, IT Administrator has to de-anonymize. To de-anonymize, approval from one of the
authorizers configured on the Settings page is required.
To de-anonymize:
1. Click Copy icon
against the Username, IP Address, MAC Address, Email Address or IM
Contact ID to be de-anonymized.
2. Click De-anonymize icon . It will open a pop-up.
3. Select the authorizer and enter the authorizers password.
4. Select for how long the de-anonymized data is to be kept. Available options: For this search,
Session and Permanent.
5. Select the type of string to be de-anonymized - Username, IP Address (IPv4/IPv6), MAC
Address, Email Address or IM Contact ID
4-Eye Authentication
Appliance logs and reports provide organizations with visibility into their networks for high levels of security,
data confidentiality while meeting the requirements of regulatory compliance.
Cyberoam collects current log data and provides near real-time reports in graphical and tabular format. It
offers user identity-based reporting across applications, protocols and multiple Appliances allowing
organizations to see Who is doing What anywhere in the network. It offers wide spectrum of 1000+ unique
reports to get in-depth network visibility help organizations to take corrective and preventive measures.
For legal compliant logging, reporting and archiving, it is important that an organization follows all the
obligations for keeping relevant information archived and accessible all the time. To maintain the security, it
also required to monitor the logs related to user-specific activities. On the other hand, the organization must
also not invade its employees privacy.
Monitoring user-specific activities without the consent or the presence of the employee or their delegate is
illegal. Internal protection is necessary when a person can access activity logs of other employees.
In an organization, usually the IT Administrator has access permissions to view the user activity logs to ensure
security. However, administrator can violate the organizations privacy regulations and have insight to
confidential documents and can misuse to track user activities.
To prevent a single administrator from having complete control over the logs, Appliance has implemented a
Four-Eye authentication. It enhances the already existing logging and security mechanisms by adding an
additional administrator, without whose permission access cannot be granted.
In this system, Administrator can view user (employee) specific activities / logs /reports only if an Independent
Authorized person approves it.
Once it is enabled, Four-Eye authentication can be used to prevent unauthorized access to private data. To
view user specific logs, two authorized administrators must log on. Additionally, data can also be anonymized
to enhance privacy protection.
Settings
De-Anonymize
Settings
Enable Four-Eye Authentication for IT Administrator to view or download user-specific activities, logs or
reports. Apart from the IT Administrator, at least one independent authorizer with the administrative privileges
is required.
Once enabled:
1. All the user identities - Username, IP Address (IPv4 / IPv6), MAC Address, Email Address and IM
Contact ID in all logs /activities / reports are anonymized.
2. If the IT administrator wants to de-anonymize the above mentioned user details, an approval is
required from all the authorizers.
3. To disable Four-Eye Authentication, approval from both the authorized people is required.
Screen Element
Description
Enable 4-Eye
Authentication
Select Authorizer
De-Anonymize
To comply with the Data Privacy Law, it is necessary to protect individual data. The Appliance anonymizes
data to achieve this by encrypting the log data in a random manner.
The Appliance anonymizes all the user identities - Username, IP Address (IPv4/IPv6), MAC Address, Email
Address and IM Contact ID in all logs /activities / reports. It means user identities in all the reports are
displayed in encrypted form.
To view the actual details, the IT Administrator has to de-anonymize. To de-anonymize, approval from one of
the authorizers configured on the Settings page is required.
Screen Element
Description
Users
IP
IM Contact
Screen De-Anonymize
Once approved, all the logs and reports are displayed with the actual user details and not in the encrypted
form. Click the Apply button. An Authorization Window will pop-up.
Screen Authorization
Screen Elements
Description
User Name
Password