SlideShare une entreprise Scribd logo
1  sur  263
 
About myself… Ajay Nawani (Easy name: AJ) Presales Head – Global Operation Cyberoam India Email: ajay.nawani@cyberoam.com
Please Introduce Yourself… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Training Kit ,[object Object],[object Object],[object Object],[object Object],[object Object]
Schedule / Breaks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Training Pre-requisites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Challenges with Current UTM Products Need  for Identity based UTM…
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam: Identity-based Security
Cyberoam is the only  Identity-based Unified Threat Management  appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls.  Cyberoam –  Identity Based Security
PATENT PENDING: IDENTITY-BASED TECHNOLOGY User
Layer 8 Firewall (Patented Technology)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],About Cyberoam
Large Enterprises CR 1500i CR 1000i  CR 750ia CR 500ia Small to Medium Enterprises CR 300i CR 200i   CR 100ia Small Offices CR 50ia CR 35ia  CR 25ia  CR 15i CR 15wi Cyberoam UTM appliance range
Basic Appliance – One time sale Individual Module Wise Subscriptions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bundle Subscription Bundle can be the combination of or all of the following modules: •  Gateway Anti Virus •  Gateway Anti-spam •  Intrusion Prevention System •  Web and Application Filter •  8 X 5 Support
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bundle Subscription (TVS & SVS)
Bundle Subscription   (One time subscription)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Demo vs Sale Appliance
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam Products
Cyberoam is the only  Identity-based Unified Threat Management  appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls.  Cyberoam –  Identity Based Security
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Basic Appliance Subscriptions
Cyberoam SSL VPN
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Benefits
Cyberoam SSL-VPN features
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Models & Licenses
Cyberoam – End Point Data Protection Protect your Data. Protect your Assets.   Cyberoam End Point Data Protection Protect Your Data, Protect Your Assets
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam End Point Data Protection
Cyberoam End Point Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberoam iView The Intelligent Logging & Reporting Solution Its an Open Source, its free!
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is Cyberoam iView?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Features of Cyberoam iView
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Benefits of Cyberoam iView
Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Cyberoam iView’s Logging & Reporting
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam iView appliances
Cyberoam Central Console (CCC Series) Central Console (CCC)
[object Object],[object Object],[object Object],What is CCC?
CCC Cyberoam UTM Appliance Corporate Head Office Branch1 Branch2 Branch3 Branch Offices Branch…N CCC Deployment (Enterprise)
Small-to-Medium Deployments Medium-to-Large Deployments ,[object Object],[object Object],[object Object],[object Object],CCC Online Demo is available at:  http://demo.cyberoam.com   CCC appliance family
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam IPSec VPN Client
[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberoam Package Cyberoam Appliance Documentation CD Blue Straight-through Ethernet Cable Red Crossover Ethernet Cable Quick Start Guide Serial Cable Power Cable
Web Based Administration Console: Username: cyberoam  Password:  cyber Text Based Administration console  (Telnet or Serial Connection): Password: admin SSH: Username: admin Password: admin Cyberoam Factory Defaults Zone Type IP Address Port A B 172.16.16.16/255.255.255.0 192.168.2.1/ 255.255.240.0 LAN WAN
[object Object],Deployment Modes Bridge / Transparent Mode Gateway / Route / NAT  Mode
[object Object],[object Object],[object Object],[object Object],Gateway/Route/NAT mode
Before Cyberoam Scenario - Gateway Default Gateway: 192.168.0.1 Firewall INT IP:192.168.0.1/24 DMZ IP: 172.16.1.1/24 EXT IP: 61.0.5.2/29 Gateway IP: 61.0.5.1 Router IP:61.0.5.1/29 Network: 192.168.0.x/24 Users Mail Server IP:172.16.1.3 Gateway: 172.16.1.1 Database Server IP:172.16.1.4 Gateway: 172.16.1.1 DMZ Zone Switch Web Server IP:172.16.1.2 Gateway: 172.16.1.1 Switch IP Address  ___ ___ ___ ___ Subnet Mask  ___ ___ ___ ___ Zone Type  LAN/WAN/DMZ Port A IP Address  ___ ___ ___ ___ Subnet Mask  ___ ___ ___ ___ Zone Type  LAN/WAN/DMZ Port B IP Address  ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type  LAN/WAN/DMZ IP Address  ___ ___ ___ ___  Subnet Mask  ___ ___ ___ ___ Zone Type  LAN/WAN/DMZ Port C Port D IP address of the  Default Gateway:  ___ ___ ___ ___ DNS IP Address: ___.___.___.___ System Time Zone:  ______________  System Date and Time: ______________ Email ID of the administrator : ______________
Cyberoam in Gateway Mode Default Gateway: 192.168.0.1 Network:192.168.0.x/24 Router IP:61.0.5.1/29 Users Mail Server IP:172.16.1.3 Gateway: 172.16.1.1 Database Server IP:172.16.1.4 Gateway: 172.16.1.1 Switch Web Server IP:172.16.1.2 Gateway: 172.16.1.1 Switch Console INT IP:192.168.0.1/24 DMZ IP: 172.16.1.1/24 EXT IP: 61.0.5.2/29 Gateway IP: 61.0.5.1 DMZ Zone
WAN Zone LAN Zone DMZ Zone Local Zone Cyberoam in Gateway mode have Four default zone LAN Zone : Network connected to LAN interface of Cyberoam WAN Zone : Network connected to WAN interface of Cyberoam  DMZ Zone : Network connected to DMZ interface of Cyberoam Local Zone : IP Addresses assigned on Cyberoam interfaces falls under Local Zone Gateway Mode- Zone information
[object Object],[object Object],[object Object],[object Object],[object Object],Bridge/Transparent Mode
Default Gateway: 192.168.0.1 Before Cyberoam Scenario -  Bridge Bridge IP Address  ___.___.___.___ Subnet Mask   ___.___.___.___ IP address of the Default Gateway  ___.___.___.___ DNS IP Address ___.___.___.___ System Time Zone ______________  System Date and Time ______________ Email ID of the administrator  ______________ Users Router Switch Network: 192.168.0.x/24 Firewall INT IP: 192.168.0.1/24
Default Gateway: 192.168.0.1 Cyberoam in Bridge Mode Users Router Network: 192.168.0.x/24 Firewall INT IP: 192.168.0.1/24 Bridge IP Address  ___.___.___.___ Subnet Mask   ___.___.___.___ 192.168.  0  .  5 255.255.255.  0 IP address of the Default Gateway  ___.___.___.___ DNS IP Address   202 .  54  .  1  .  30 System Time Zone ______________  System Date and Time ______________ Email ID of the administrator  ______________ 192.168.  0  . 1
LOCAL Zone WAN Zone LAN Zone Cyberoam in transparent mode have three default zone LAN Zone : Network connected to LAN interface of Cyberoam WAN Zone : Network connected to WAN interface of Cyberoam Local Zone : IP Address assigned on the Bridge Interface falls under Local Zone Bridge Mode- Zone information
[object Object],[object Object],[object Object],[object Object],Hardware Bypass in Transparent Mode
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bypass LED Hardware Bypass in Transparent Mode
[object Object],[object Object],[object Object],[object Object],Web Proxy Mode
[object Object],[object Object],[object Object],[object Object],Cyberoam’s Web Proxy Features
Cyberoam’s HTTP proxy listens on port 3128 by default Configure to use an upstream parent proxy server Configure Web Proxy System    Web Proxy
The Network Configuration Wizard requires you to configure the Default Internet Access Policy Default Internet Access Policy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Default Internet Access Policy
Cyberoam Registration
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LABS ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Appliance Access System    Administration    Appliance Access
Appliance Access (via Zones) Network    Interface    Zone
View port wise network (physical interface) and zone details. If virtual sub-interfaces are configured for VLAN implementation, they are also nested and displayed beneath the physical interface. Interface - Physical interfaces/ports available on Cyberoam. If virtual sub-interface is configured for the physical interface, it also displayed beneath the physical interface. Virtual sub-interface configuration can be updated or deleted. IP Management Network    Interface
Firewall Management
Zone Types LAN : The Internal and most secure zone. WAN : The external, no-control and non-reliable zone. DMZ : The secured publicly accessible server zone.  Local : All ports of the Cyberoam Appliance fall in this zone. VPN  : It is the only zone that does not have an assigned physical port/interface .   Zone Management
Zone Mangement Network    Interface    Zone
Cyberoam provides several standard services and allows creating: •  Customized service definitions •  Firewall rule for Customized service definitions Service Management Objects    Services    Add
Manage Firewall Rules
[object Object],[object Object],[object Object],Default Firewall Rules
Cyberoam Default Firewall rule #2
Cyberoam Default Firewall rule #1
[object Object],[object Object],[object Object],L2 Firewall Support
Note : MAC based hosts can be added on the fly while creating firewall rules as well. Add MAC based host Objects    Hosts    MAC Host    Add
Firewall rule for MAC host
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NAT (Outbound NAT)
Add NAT Policy Firewall    NAT Policy    Add
Add firewall rule to include NAT policy Firewall    Rule    Add
[object Object],[object Object],[object Object],[object Object],[object Object],Virtual Host (Inbound NAT)
Add Virtual Host Firewall    Virtual Host    Add
Add Firewall rule to include the Virtual Host
Once the virtual host is created successfully, Cyberoam automatically creates a loopback firewall rule for the zone of the mapped IP address. Loopback firewall rule is created for the service specified in virtual host. If port forwarding is not enabled in virtual host then firewall rule with “All Services” is created. Loopback rules allow internal users to access the internal resources using its public IP (external IP) or FQDN. Loopback Firewall rule
Port Forwarding concept Example: We have one public IP  154.146.25.37. In the DMZ, we have connected multiple servers like Web Server (192.168.1.157), FTP Server (192.168.1.158) and RDP Server (192.168.1.159). We want to publish all these servers using only one public IP 154.146.25.37. In this case, we will use Port Forwarding while configuring the Virtual Host. We will have to create 3 Virtual Hosts for above 3 servers with same external IP and different Internal IP addresses, with port forwarding. We have already created a Virtual Host for the Web Server with port 80, now we will create remaining two Virtual Hosts for FTP and RDP.
Creation of Virtual Hosts
Creation of Firewall Rules
[object Object],[object Object],[object Object],Denial of Service
[object Object],[object Object],[object Object],[object Object],Types of DoS attacks
[object Object],[object Object],[object Object],[object Object],DoS protection settings
DoS Configuration Firewall    DoS
Cyberoam Unified Firewall Controls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unified Threat Control’s in firewall rule
LABS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User Authentication process initiates, when the client tries to authenticate. Local Authentication Flow
External Authentication Flow
Note : All users need not authenticate against the same authentication server. VPN & SSL-VPN users can now authenticate against a different server than the one selected for firewall authentication. Authentication Settings Identity    Authentication    Auth Settings
Authentication Servers Identity    Authentication    Authentication Server
Authentication Methods Normal  -  HTTP client -  Corporate client Windows:  http://download.cyberoam.com/solution/optionals/Corporateclientsetup.exe Windows (Vista & Windows 7 – 32 bit):   http://download.cyberoam.com/solution/optionals/Corporateclientsetup_vista_win7.exe Clientless  -  No Authentication Required Single Sign On  -  Authentication is done in sync with user’s    authentication in  domain
Single Sign On Flow (SSO)
Identity Based Policies
Surfing Quota Policy ,[object Object],[object Object],[object Object]
Access Time Policy ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Web & Application Filter
Web Filter    Policy   Add
Application Filter    Policy    Add
QoS Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QoS    Policy    Add
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Transfer Policy
[object Object],[object Object],[object Object],[object Object],Group Management
Group Types: ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],User-MAC binding
User-MAC binding
Identity based firewall rules Normal Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam - Identity Based UTM  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],LABS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basics of Content Filter
[object Object],[object Object],[object Object],[object Object],[object Object],Web & Application Filtering Features
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Web & Application Filtering Features
Web Categories Web Filter    Categories
[object Object],[object Object],[object Object],[object Object],[object Object],Content Filter Policies
Default Application Policies Default Web Filter Policies
[object Object],[object Object],Safe Search Capability Web Filter    Categories
Filtering Adult Content in case Safe Search is enabled
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IM Policy
[object Object],[object Object],IM Contacts IM    IM Contacts    Add
[object Object],[object Object],IM Rules (Conversation) IM    IM Rules   Conversation
[object Object],[object Object],IM Rules (File Transfer) IM    IM Rules    File Transfer
[object Object],[object Object],IM Rules (Webcam) IM    IM Rules    Webcam
[object Object],IM Rules (Login) IM    IM Rules    Login
[object Object],[object Object],IM Content Filter IM    Content Filter
[object Object],IM Scanning on Firewall rules
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Gateway Anti-Virus Features
Anti Virus General Configuration Anti Virus    Mail    Configuration
SMTP Scan Policy ,[object Object],[object Object]
Default SMTP scanning rule Anti Virus    Mail    SMTP Scanning Rules The default rules scans emails from any sender / recipient. Apply scanning in the appropriate firewall rule to scan incoming & outgoing emails.
Custom SMTP rules Anti Virus    Mail    Address Groups    Add Use address group to create custom rules The above custom rule will block all executable attachments for the recipient sales.manager@abc.com
POP3 Scan Policy ,[object Object],[object Object],[object Object]
IMAP Scan Policy ,[object Object],[object Object]
FTP Scan Policy ,[object Object],[object Object]
How does Cyberoam HTTP AV work? Blocks all virus infected files being downloaded Cyberoam Virus Definition includes - Viruses - Worms - Trojans & Spyware - Hacker Utilities - Malware How does it help? - Blocks spyware not only from spyware sites but also      from innocent sites - Malware being stopped at gateway level
HTTP Configuration ,[object Object],[object Object],[object Object]
HTTP Antivirus Configuration Anti Virus    HTTP    Configuration Anti Virus    HTTP    Scanning Rules Note:  Default mode selected is batch mode.
Gateway Anti-Spam
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Gateway Anti Spam Features
[object Object],[object Object],[object Object],[object Object],Cyberoam RPD (Recurrent Pattern Detection) Technology
Spam Detection Process
[object Object],[object Object],IP Reputation
[object Object],[object Object],[object Object],[object Object],Enabling IP Reputation
Enabling IP Reputation  Anti Spam    Configuration
Global Spam Digest Settings Anti Spam    Quarantine    Spam Digest Settings Set the email frequency & from email address.
Enable User based Spam Digest Enable Spam Digest settings on user or group level.
User Quarantine Area
Few On-appliance Mail Reports Mail Usage Report: Top Mail Senders iView the open source reporting software powered by Cyberoam is integrated as the Cyberoam’s on-appliance reporting tool starting with Version X.
Few On appliance Mail Reports Spam Report: Top Applications used for Spam
On appliance Mail Reports Anti Virus Report: Top Viruses
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPS acts as the Second layer of defense, It scans the traffic that has been allowed by the firewall for threats. Introduction to IPS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam IPS Features
IPS    Policy    General Policy Default IPS Policy IPS    Policy Cyberoam offers four pre-defined policies to choose from. General Policy, LANtoWAN strict, LANtoWAN general & DMZ policy. Seen above are the signature categories.
IPS Reports Reports    Attacks (IPS)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Cyberoam VPN Technology Comparison Matrix VPN Technology Security level Deployment Requirement IPSec High This can be deployed in Remote Access and Site-to-Site scenario. In case of Remote Access, Cyberoam VPN Client is required and it’s a licensed product. In case of Site-to-Site, Cyberoam is compatible with all major  VPN Gateways those supports standard IPSec architecture. SSL-VPN High ,[object Object],[object Object],L2TP High This can be deployed in Remote Access scenario only. No third party VPN client required as Windows 2000 onward all OS have inbuilt L2TP VPN Client. PPTP Moderate This can be deployed in Remote Access scenario only. No third party VPN client required as all windows OS have inbuilt PPTP VPN Client.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam VPN Features
[object Object],[object Object],[object Object],[object Object],Basic VPN Deployments Remote Access
[object Object],[object Object],[object Object],[object Object],[object Object],Basic VPN Deployments Site-to-Site (Intranet/Extranet)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TFT- Threat Free Tunneling
Default VPN Zone Being a zone based firewall, Cyberoam creates the VPN zone which is used while creating firewall rules to control VPN traffic.  Network    Interface    Zone
Default VPN Zone Creation of firewall rules using the VPZ zone.
VPN Configuration & TFT
IPSec (Remote Access) VPN    IPSec Configure
IPSec (Site-to-Site) VPN    IPSec Configure
L2TP VPN    L2TP Configure
L2TP VPN    L2TP    Connection
PPTP VPN    PPTP
L2TP & PPTP Host Objects Objects    Hosts    IP Host Cyberoam creates PPTP & L2TP hosts by default which can be used while creating firewall rules to control VPN traffic.
Default VPN firewall rules
Custom VPN firewall rules Creating custom firewall rules using the L2TP/PPTP host objects to control the remote access traffic.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],On-Appliance SSL VPN
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cyberoam SSL-VPN Features
 
Global Setting page allows you to configure certain parameters globally for both the type of Access Select protocol TCP or UDP from the dropdown list. Selected network protocol will be the default protocol for all the SSL VPN clients. Connection over UDP provides better performance. SSL certificate from the dropdown list to be used for authentication. If you do not have certificate  Specify the range of IP addresses reserved for the SSL Clients. SSL clients will be leased IP address from the configured pool.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SSL-VPN Modes Web Access & Full Access Mode
Web Access Mode SSL VPN    Bookmarks ,[object Object],[object Object]
Select tunnel type Select the access mode by clicking the appropriate option Bookmarks are the resources that will be available through Web portal  Accessible Resources allows restricting the access to the certain hosts of the private network   SSL-VPN Policy Creation
SSL-VPN Portal SSL-VPN users authenticate on the portal with their username/password. If Cyberoam is integrated with external authentication server, the user needs to enter the credentials accordingly.
Once logged into the portal the users get access to the bookmarks & the link to download the configuration file required for tunnel mode access. SSL-VPN Portal (Welcome Page)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-Link- An Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multilink Configuration
Multi-Link- How it works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gateway Management What needs to be done if Multiple ISP links are available? ,[object Object],[object Object]
[object Object]
Weight: 3 Weight: 1 Active-Active gateway load balancing
Setup Gateway- Configure Weights Network    Gateway    Click on the gateway name By default Cyberoam assigns the weight as 1 to all the gateways configured using the initial network configuration wizard. One needs to change the weights of the gateway manually as shown above.
Active-Active gateway Failover ,[object Object],[object Object],[object Object]
Setup Gateway- Failover Rules ,[object Object],[object Object],[object Object],[object Object],[object Object]
Gateways configured as Active
Enable load balancing in Firewall Rule
Active-Passive Gateway Failover
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Active-Passive Gateway Failover
[object Object],[object Object],[object Object],[object Object],Active-Passive Gateway Failover
A backup gateway is the one  that can be used in an active/passive setup. The  traffic is routed through Backup gateway only when Active gateway is down  Backup gateway with failover condition Network    Gateway    Click on the gateway name
Automatic Failover Backup gateway will take over and traffic will be routed through backup gateway when any of the active gateway fails Backup gateway will take over and traffic will be routed through backup gateway when all the configured active gateways fail  Backup gateway will take over and traffic will be routed through back up gateway if  ISP1 gateway fails Configure when the Backup gateway should take over the active gateway.
Manual Gateway Failover Administrator has to manually change the gateway if the active gateway fails .  If you want Backup gateway to inherit the parent gateway’s (Active gateway) weight specify weight.
Enable Active-Passive gateway configuration through firewall rule Create a firewall rule for top management  Route the traffic through one gateway Configure the another available gateway as Backup
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basics of Routing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyberoam Routing Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The above example defines a static route where all requests destined for 4.2.2.2 will always be routed via 1.1.1.1 (Port B). This traffic will be dropped in case the interface is down. Static Routing Network    Static Route    Unicast
Static routing method satisfies most of the requirements, but is limited to forwarding based on destination address only. Policy based routing is extended static routes which provide more flexible traffic handling capabilities. It allows for matching based upon source address, service/application, and gateway weight for load balancing. Hence, it offers granular control for forwarding packets based upon a number of user defined variables like:  •  Destination •  Source •  Application •  Combination of all of the above Policy Based Routing
With the above firewall rule all HTTP traffic from LAN-WAN will be load balanced. Policy Based Routing
With the above firewall rule all SMTP traffic from LAN-WAN will always be routed via ISP1. This traffic will be routed via ISP2 (backup) while ISP1 is down. Policy Based Routing
Source Network routing allows Administrators to direct traffic generated from particular Network over designated links according to the business policies. When you define Source based routing for a particular subnet, all the traffic coming from that subnet will be forwarded to the defined Interface. Source Based Routing Network    Static Route    Source Route All the traffic from network 192.168.1.0/24 will always be routed via ISP1 gateway
[object Object],[object Object],[object Object],[object Object],Dynamic Routing - RIP
OSPF (Open Shortest Path First) is one of IGPs (Interior Gateway Protocols). Compared with RIP, OSPF can serve much more networks and period of convergence is very short. OSPF is widely used in large networks such as ISP backbone and enterprise networks. The Cyberoam implementation of OSPF supports OSPF version 2 (as described in RFC 2328) and plain text and Message Digest 5 (MD5) authentication Dynamic Routing - OSPF
BGP (Border Gateway Protocol) is a path vector protocol that is used to carry routing between routers that are in the different administrative domains (Autonomous Systems) e.g. BGP is typically used by ISPs to exchange routing information between different ISP networks.  The Cyberoam implementation of BGP supports Version 4 (RFC 1771), Communities Attribute (RFC 1997), Route Reflection (RFC 2796), Multi-protocol extensions (RFC 2858) and Capabilities Advertisement (RFC 2842) Additionally, a firewall rule is to be configured for the zone for which the BGP traffic is to be allowed i.e. LAN to LOCAL or WAN to LOCAL. Dynamic Routing - BGP
Configuration of RIP, OSPF & BGP is beyond the scope of CCNSP and is a part of CCNSE curriculum. Please refer the document on Cyberoam knowledgebase sites for configuration: RIP:  http://kb.cyberoam.com/default.asp?id=1000&SID=&Lang=1   OSPF:  http://kb.cyberoam.com/default.asp?id=999&SID=&Lang=1 BGP:  http://kb.cyberoam.com/default.asp?id=1001&SID=&Lang=1 Dynamic Routing - Configuration
Cyberoam supports multicast traffic forwarding in both Gateway / Bridge Mode. Multicast forwarding is controlled by specifying static routes for multicast traffic. In Gateway mode, multicast forwarding needs to be enabled and then static routing needs to be configured.  In Bridge mode, only multicast forwarding needs to be enabled. Multicast forwarding can be enabled and the mroutes can be added from both the GUI and console. Multicast routing configuration is beyond the scope of CCNSP and is a part of CCNSE curriculum. Refer knowledge base article for multicast routing configuration: http://kb.cyberoam.com/default.asp?id=1021&SID=&Lang=1 Multicast Routing
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Administration- Web admin console port settings System    Administration    Settings    Port Settings
[object Object],[object Object],[object Object],Role Based Administration System    Administration    Profile
To create a new administration profile. Role Based Administration System    Administration    Profile    Add
As per the above new user configuration, profile option is only activated if we set the user type as Administrator. Here, we have selected the user type as Administrator and we have selected the profile as we created in previous slide. Role Based Administration Attach a profile to a user.
[object Object],[object Object],[object Object],[object Object],Logging Management Logs & Reports    Configuration    Syslog Servers    Add
[object Object],[object Object],[object Object],Logging Management Logs & Reports    Configuration    Log Settings
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Report Management Software / Device UTM Device
The administrator can also configure to receive pre-defined reports via email on a daily or a weekly basis. Logs & Reports    View Reports Report Management
Sample Reports: User Wise Reports
Sample Reports: Blocked Attempts Report
Sample Reports: Application Group Report
Sample Reports: Top Web Users Report
[object Object],[object Object],DNS Management Network    DNS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],DHCP Configurations Network    DHCP
DHCP Configuration for dynamic lease. DHCP Server Configuration Network    DHCP    Server (Dynamic)
DHCP Server Configuration Network    DHCP    Server (Static)
[object Object],[object Object],DHCP Relay Configuration Network    DHCP   Relay
Static ARP Network    ARP ,[object Object],[object Object],[object Object],Specify IP address of the host outside the firewall  Specify MAC address of the host  Click checkbox to add the MAC/IP pair in the trusted list
Manage ARP Network    ARP
NTP configuration for time synchronization System    Time
NTP configuration for time synchronization (Wizard)
[object Object],[object Object],[object Object],[object Object],[object Object],Backup-Restore Management System    Maintenance    Backup & Restore
[object Object],[object Object],[object Object],Diagnostic Tools
Diagnostic Tools: Services Status System    Maintenance    Services
Diagnostic Tools: System health graphs System    System Graphs
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Troubleshooting: Event Viewer Logs & Reports    Event Viewer
Event Viewer Logs & Reports    Event Viewer    Web Filter
Event Viewer Logs & Reports    Event Viewer    IM
Event Viewer Logs & Reports    Event Viewer    Anti Virus
[object Object],[object Object],[object Object],Packet Capture System    Packet Capture
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On Appliance Help
Cyberoam Knowledge Base (http://kb.cyberoam.com)
Cyberoam Knowledge Base (http://docs.cyberoam.com)
Cyberoam Security Center (http://csc.cyberoam.com)
Customer My Account (http://customer.cyberoam.com)
Partner Portal (http://partner.cyberoam.com)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Presales Offerings
Email Support: Chat support:   http://www.cyberoam.com/presalessupport   Presales Contact Details EMEA [email_address]    APAC [email_address]    Latin America [email_address] North America and Canada [email_address] India [email_address]   SAARC Countries [email_address]   Region Toll Free Number  Non Toll Free Number  USA +1-877-777-0368  +1-973-302-8446  Europe +44-808-120-3958  +44-203-355-7917  APAC +1-877-777-0368  +1-973-302-8446  Middle East & Africa  +1-877-777-0368  +1-973-302-8446  India 1-800-301-00013  +91-79-66065777
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Postsales Contact Details Region Toll Free Number  Non Toll Free Number  USA +1-877-777-0368  +1-973-302-8446  Europe +44-808-120-3958  +44-203-355-7917  APAC +1-877-777-0368  +1-973-302-8446  Middle East & Africa  +1-877-777-0368  +1-973-302-8446  India 1-800-301-00013  +91-79-66065777
Thank You [email_address]

Contenu connexe

Tendances

Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
Liberteks
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Maliha Ali
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
Fajar Isnanto
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
Joe Sarno
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
rkoscak
 

Tendances (18)

DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTMDSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
DSS ITSEC Conference 2012 - Cyberoam Layer8 UTM
 
CCNSP
CCNSPCCNSP
CCNSP
 
Cyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management GatewayCyberoam vs. Forefront Threat Management Gateway
Cyberoam vs. Forefront Threat Management Gateway
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
CCNSE
CCNSECCNSE
CCNSE
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Email Security Appliance from IBM
Email Security Appliance from IBMEmail Security Appliance from IBM
Email Security Appliance from IBM
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies Checkpoint Firewall for Dummies
Checkpoint Firewall for Dummies
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 

En vedette

FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
chephz DJ
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 

En vedette (12)

Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)Cyberoam USP (PT-BR)
Cyberoam USP (PT-BR)
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Amazon Network Security
Amazon Network SecurityAmazon Network Security
Amazon Network Security
 
Cyberoam cr300i
Cyberoam cr300iCyberoam cr300i
Cyberoam cr300i
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web services
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 

Similaire à Ccnsp trainer presentation

Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
Ralbary
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
Ralbary
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
Charles McNeil
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 

Similaire à Ccnsp trainer presentation (20)

Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
Bitrix Software Security
Bitrix Software SecurityBitrix Software Security
Bitrix Software Security
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Websense2015ThreatAnalysis
Websense2015ThreatAnalysisWebsense2015ThreatAnalysis
Websense2015ThreatAnalysis
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Choosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionChoosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware Solution
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Dernier (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Ccnsp trainer presentation

  • 1.  
  • 2. About myself… Ajay Nawani (Easy name: AJ) Presales Head – Global Operation Cyberoam India Email: ajay.nawani@cyberoam.com
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls. Cyberoam – Identity Based Security
  • 12. Layer 8 Firewall (Patented Technology)
  • 13.
  • 14. Large Enterprises CR 1500i CR 1000i CR 750ia CR 500ia Small to Medium Enterprises CR 300i CR 200i CR 100ia Small Offices CR 50ia CR 35ia CR 25ia CR 15i CR 15wi Cyberoam UTM appliance range
  • 15.
  • 16.
  • 17. Bundle Subscription (One time subscription)
  • 18.
  • 19.
  • 20. Cyberoam is the only Identity-based Unified Threat Management appliance that provides integrated Internet security to enterprises and educational institutions through its unique granular user-based controls. Cyberoam – Identity Based Security
  • 21.
  • 23.
  • 25.
  • 26. Cyberoam – End Point Data Protection Protect your Data. Protect your Assets. Cyberoam End Point Data Protection Protect Your Data, Protect Your Assets
  • 27.
  • 28.
  • 29. Cyberoam iView The Intelligent Logging & Reporting Solution Its an Open Source, its free!
  • 30.
  • 31.
  • 32.
  • 33. Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics Cyberoam iView’s Logging & Reporting
  • 34.
  • 35. Cyberoam Central Console (CCC Series) Central Console (CCC)
  • 36.
  • 37. CCC Cyberoam UTM Appliance Corporate Head Office Branch1 Branch2 Branch3 Branch Offices Branch…N CCC Deployment (Enterprise)
  • 38.
  • 39.
  • 40.
  • 41. Cyberoam Package Cyberoam Appliance Documentation CD Blue Straight-through Ethernet Cable Red Crossover Ethernet Cable Quick Start Guide Serial Cable Power Cable
  • 42. Web Based Administration Console: Username: cyberoam Password: cyber Text Based Administration console (Telnet or Serial Connection): Password: admin SSH: Username: admin Password: admin Cyberoam Factory Defaults Zone Type IP Address Port A B 172.16.16.16/255.255.255.0 192.168.2.1/ 255.255.240.0 LAN WAN
  • 43.
  • 44.
  • 45. Before Cyberoam Scenario - Gateway Default Gateway: 192.168.0.1 Firewall INT IP:192.168.0.1/24 DMZ IP: 172.16.1.1/24 EXT IP: 61.0.5.2/29 Gateway IP: 61.0.5.1 Router IP:61.0.5.1/29 Network: 192.168.0.x/24 Users Mail Server IP:172.16.1.3 Gateway: 172.16.1.1 Database Server IP:172.16.1.4 Gateway: 172.16.1.1 DMZ Zone Switch Web Server IP:172.16.1.2 Gateway: 172.16.1.1 Switch IP Address ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ Port A IP Address ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ Port B IP Address ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ IP Address ___ ___ ___ ___ Subnet Mask ___ ___ ___ ___ Zone Type LAN/WAN/DMZ Port C Port D IP address of the Default Gateway: ___ ___ ___ ___ DNS IP Address: ___.___.___.___ System Time Zone: ______________ System Date and Time: ______________ Email ID of the administrator : ______________
  • 46. Cyberoam in Gateway Mode Default Gateway: 192.168.0.1 Network:192.168.0.x/24 Router IP:61.0.5.1/29 Users Mail Server IP:172.16.1.3 Gateway: 172.16.1.1 Database Server IP:172.16.1.4 Gateway: 172.16.1.1 Switch Web Server IP:172.16.1.2 Gateway: 172.16.1.1 Switch Console INT IP:192.168.0.1/24 DMZ IP: 172.16.1.1/24 EXT IP: 61.0.5.2/29 Gateway IP: 61.0.5.1 DMZ Zone
  • 47. WAN Zone LAN Zone DMZ Zone Local Zone Cyberoam in Gateway mode have Four default zone LAN Zone : Network connected to LAN interface of Cyberoam WAN Zone : Network connected to WAN interface of Cyberoam DMZ Zone : Network connected to DMZ interface of Cyberoam Local Zone : IP Addresses assigned on Cyberoam interfaces falls under Local Zone Gateway Mode- Zone information
  • 48.
  • 49. Default Gateway: 192.168.0.1 Before Cyberoam Scenario - Bridge Bridge IP Address ___.___.___.___ Subnet Mask ___.___.___.___ IP address of the Default Gateway ___.___.___.___ DNS IP Address ___.___.___.___ System Time Zone ______________ System Date and Time ______________ Email ID of the administrator ______________ Users Router Switch Network: 192.168.0.x/24 Firewall INT IP: 192.168.0.1/24
  • 50. Default Gateway: 192.168.0.1 Cyberoam in Bridge Mode Users Router Network: 192.168.0.x/24 Firewall INT IP: 192.168.0.1/24 Bridge IP Address ___.___.___.___ Subnet Mask ___.___.___.___ 192.168. 0 . 5 255.255.255. 0 IP address of the Default Gateway ___.___.___.___ DNS IP Address 202 . 54 . 1 . 30 System Time Zone ______________ System Date and Time ______________ Email ID of the administrator ______________ 192.168. 0 . 1
  • 51. LOCAL Zone WAN Zone LAN Zone Cyberoam in transparent mode have three default zone LAN Zone : Network connected to LAN interface of Cyberoam WAN Zone : Network connected to WAN interface of Cyberoam Local Zone : IP Address assigned on the Bridge Interface falls under Local Zone Bridge Mode- Zone information
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. Cyberoam’s HTTP proxy listens on port 3128 by default Configure to use an upstream parent proxy server Configure Web Proxy System  Web Proxy
  • 57. The Network Configuration Wizard requires you to configure the Default Internet Access Policy Default Internet Access Policy
  • 58.
  • 60.
  • 61.
  • 62.
  • 63. Appliance Access System  Administration  Appliance Access
  • 64. Appliance Access (via Zones) Network  Interface  Zone
  • 65. View port wise network (physical interface) and zone details. If virtual sub-interfaces are configured for VLAN implementation, they are also nested and displayed beneath the physical interface. Interface - Physical interfaces/ports available on Cyberoam. If virtual sub-interface is configured for the physical interface, it also displayed beneath the physical interface. Virtual sub-interface configuration can be updated or deleted. IP Management Network  Interface
  • 67. Zone Types LAN : The Internal and most secure zone. WAN : The external, no-control and non-reliable zone. DMZ : The secured publicly accessible server zone. Local : All ports of the Cyberoam Appliance fall in this zone. VPN : It is the only zone that does not have an assigned physical port/interface . Zone Management
  • 68. Zone Mangement Network  Interface  Zone
  • 69. Cyberoam provides several standard services and allows creating: • Customized service definitions • Firewall rule for Customized service definitions Service Management Objects  Services  Add
  • 71.
  • 74.
  • 75. Note : MAC based hosts can be added on the fly while creating firewall rules as well. Add MAC based host Objects  Hosts  MAC Host  Add
  • 76. Firewall rule for MAC host
  • 77.
  • 78. Add NAT Policy Firewall  NAT Policy  Add
  • 79. Add firewall rule to include NAT policy Firewall  Rule  Add
  • 80.
  • 81. Add Virtual Host Firewall  Virtual Host  Add
  • 82. Add Firewall rule to include the Virtual Host
  • 83. Once the virtual host is created successfully, Cyberoam automatically creates a loopback firewall rule for the zone of the mapped IP address. Loopback firewall rule is created for the service specified in virtual host. If port forwarding is not enabled in virtual host then firewall rule with “All Services” is created. Loopback rules allow internal users to access the internal resources using its public IP (external IP) or FQDN. Loopback Firewall rule
  • 84. Port Forwarding concept Example: We have one public IP 154.146.25.37. In the DMZ, we have connected multiple servers like Web Server (192.168.1.157), FTP Server (192.168.1.158) and RDP Server (192.168.1.159). We want to publish all these servers using only one public IP 154.146.25.37. In this case, we will use Port Forwarding while configuring the Virtual Host. We will have to create 3 Virtual Hosts for above 3 servers with same external IP and different Internal IP addresses, with port forwarding. We have already created a Virtual Host for the Web Server with port 80, now we will create remaining two Virtual Hosts for FTP and RDP.
  • 87.
  • 88.
  • 89.
  • 91.
  • 92. Unified Threat Control’s in firewall rule
  • 93.
  • 94.
  • 95. User Authentication process initiates, when the client tries to authenticate. Local Authentication Flow
  • 97. Note : All users need not authenticate against the same authentication server. VPN & SSL-VPN users can now authenticate against a different server than the one selected for firewall authentication. Authentication Settings Identity  Authentication  Auth Settings
  • 98. Authentication Servers Identity  Authentication  Authentication Server
  • 99. Authentication Methods Normal - HTTP client - Corporate client Windows: http://download.cyberoam.com/solution/optionals/Corporateclientsetup.exe Windows (Vista & Windows 7 – 32 bit): http://download.cyberoam.com/solution/optionals/Corporateclientsetup_vista_win7.exe Clientless - No Authentication Required Single Sign On - Authentication is done in sync with user’s authentication in domain
  • 100. Single Sign On Flow (SSO)
  • 102.
  • 103.
  • 104.
  • 105. Web Filter  Policy  Add
  • 106. Application Filter  Policy  Add
  • 107.
  • 108. QoS  Policy  Add
  • 109.
  • 110.
  • 111.
  • 112.
  • 114.
  • 115.
  • 116.
  • 117. Basics of Content Filter
  • 118.
  • 119.
  • 120. Web Categories Web Filter  Categories
  • 121.
  • 122. Default Application Policies Default Web Filter Policies
  • 123.
  • 124. Filtering Adult Content in case Safe Search is enabled
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135. Anti Virus General Configuration Anti Virus  Mail  Configuration
  • 136.
  • 137. Default SMTP scanning rule Anti Virus  Mail  SMTP Scanning Rules The default rules scans emails from any sender / recipient. Apply scanning in the appropriate firewall rule to scan incoming & outgoing emails.
  • 138. Custom SMTP rules Anti Virus  Mail  Address Groups  Add Use address group to create custom rules The above custom rule will block all executable attachments for the recipient sales.manager@abc.com
  • 139.
  • 140.
  • 141.
  • 142. How does Cyberoam HTTP AV work? Blocks all virus infected files being downloaded Cyberoam Virus Definition includes - Viruses - Worms - Trojans & Spyware - Hacker Utilities - Malware How does it help? - Blocks spyware not only from spyware sites but also from innocent sites - Malware being stopped at gateway level
  • 143.
  • 144. HTTP Antivirus Configuration Anti Virus  HTTP  Configuration Anti Virus  HTTP  Scanning Rules Note: Default mode selected is batch mode.
  • 146.
  • 147.
  • 149.
  • 150.
  • 151. Enabling IP Reputation Anti Spam  Configuration
  • 152. Global Spam Digest Settings Anti Spam  Quarantine  Spam Digest Settings Set the email frequency & from email address.
  • 153. Enable User based Spam Digest Enable Spam Digest settings on user or group level.
  • 155. Few On-appliance Mail Reports Mail Usage Report: Top Mail Senders iView the open source reporting software powered by Cyberoam is integrated as the Cyberoam’s on-appliance reporting tool starting with Version X.
  • 156. Few On appliance Mail Reports Spam Report: Top Applications used for Spam
  • 157. On appliance Mail Reports Anti Virus Report: Top Viruses
  • 158.
  • 159. IPS acts as the Second layer of defense, It scans the traffic that has been allowed by the firewall for threats. Introduction to IPS
  • 160.
  • 161. IPS  Policy  General Policy Default IPS Policy IPS  Policy Cyberoam offers four pre-defined policies to choose from. General Policy, LANtoWAN strict, LANtoWAN general & DMZ policy. Seen above are the signature categories.
  • 162. IPS Reports Reports  Attacks (IPS)
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169. Default VPN Zone Being a zone based firewall, Cyberoam creates the VPN zone which is used while creating firewall rules to control VPN traffic. Network  Interface  Zone
  • 170. Default VPN Zone Creation of firewall rules using the VPZ zone.
  • 172. IPSec (Remote Access) VPN  IPSec Configure
  • 173. IPSec (Site-to-Site) VPN  IPSec Configure
  • 174. L2TP VPN  L2TP Configure
  • 175. L2TP VPN  L2TP  Connection
  • 176. PPTP VPN  PPTP
  • 177. L2TP & PPTP Host Objects Objects  Hosts  IP Host Cyberoam creates PPTP & L2TP hosts by default which can be used while creating firewall rules to control VPN traffic.
  • 179. Custom VPN firewall rules Creating custom firewall rules using the L2TP/PPTP host objects to control the remote access traffic.
  • 180.
  • 181.
  • 182.  
  • 183. Global Setting page allows you to configure certain parameters globally for both the type of Access Select protocol TCP or UDP from the dropdown list. Selected network protocol will be the default protocol for all the SSL VPN clients. Connection over UDP provides better performance. SSL certificate from the dropdown list to be used for authentication. If you do not have certificate Specify the range of IP addresses reserved for the SSL Clients. SSL clients will be leased IP address from the configured pool.
  • 184.
  • 185.
  • 186. Select tunnel type Select the access mode by clicking the appropriate option Bookmarks are the resources that will be available through Web portal Accessible Resources allows restricting the access to the certain hosts of the private network SSL-VPN Policy Creation
  • 187. SSL-VPN Portal SSL-VPN users authenticate on the portal with their username/password. If Cyberoam is integrated with external authentication server, the user needs to enter the credentials accordingly.
  • 188. Once logged into the portal the users get access to the bookmarks & the link to download the configuration file required for tunnel mode access. SSL-VPN Portal (Welcome Page)
  • 189.
  • 190.
  • 191.
  • 193.
  • 194.
  • 195.
  • 196. Weight: 3 Weight: 1 Active-Active gateway load balancing
  • 197. Setup Gateway- Configure Weights Network  Gateway  Click on the gateway name By default Cyberoam assigns the weight as 1 to all the gateways configured using the initial network configuration wizard. One needs to change the weights of the gateway manually as shown above.
  • 198.
  • 199.
  • 201. Enable load balancing in Firewall Rule
  • 203.
  • 204.
  • 205. A backup gateway is the one that can be used in an active/passive setup. The traffic is routed through Backup gateway only when Active gateway is down Backup gateway with failover condition Network  Gateway  Click on the gateway name
  • 206. Automatic Failover Backup gateway will take over and traffic will be routed through backup gateway when any of the active gateway fails Backup gateway will take over and traffic will be routed through backup gateway when all the configured active gateways fail Backup gateway will take over and traffic will be routed through back up gateway if ISP1 gateway fails Configure when the Backup gateway should take over the active gateway.
  • 207. Manual Gateway Failover Administrator has to manually change the gateway if the active gateway fails . If you want Backup gateway to inherit the parent gateway’s (Active gateway) weight specify weight.
  • 208. Enable Active-Passive gateway configuration through firewall rule Create a firewall rule for top management Route the traffic through one gateway Configure the another available gateway as Backup
  • 209.
  • 210.
  • 211.
  • 212. The above example defines a static route where all requests destined for 4.2.2.2 will always be routed via 1.1.1.1 (Port B). This traffic will be dropped in case the interface is down. Static Routing Network  Static Route  Unicast
  • 213. Static routing method satisfies most of the requirements, but is limited to forwarding based on destination address only. Policy based routing is extended static routes which provide more flexible traffic handling capabilities. It allows for matching based upon source address, service/application, and gateway weight for load balancing. Hence, it offers granular control for forwarding packets based upon a number of user defined variables like: • Destination • Source • Application • Combination of all of the above Policy Based Routing
  • 214. With the above firewall rule all HTTP traffic from LAN-WAN will be load balanced. Policy Based Routing
  • 215. With the above firewall rule all SMTP traffic from LAN-WAN will always be routed via ISP1. This traffic will be routed via ISP2 (backup) while ISP1 is down. Policy Based Routing
  • 216. Source Network routing allows Administrators to direct traffic generated from particular Network over designated links according to the business policies. When you define Source based routing for a particular subnet, all the traffic coming from that subnet will be forwarded to the defined Interface. Source Based Routing Network  Static Route  Source Route All the traffic from network 192.168.1.0/24 will always be routed via ISP1 gateway
  • 217.
  • 218. OSPF (Open Shortest Path First) is one of IGPs (Interior Gateway Protocols). Compared with RIP, OSPF can serve much more networks and period of convergence is very short. OSPF is widely used in large networks such as ISP backbone and enterprise networks. The Cyberoam implementation of OSPF supports OSPF version 2 (as described in RFC 2328) and plain text and Message Digest 5 (MD5) authentication Dynamic Routing - OSPF
  • 219. BGP (Border Gateway Protocol) is a path vector protocol that is used to carry routing between routers that are in the different administrative domains (Autonomous Systems) e.g. BGP is typically used by ISPs to exchange routing information between different ISP networks. The Cyberoam implementation of BGP supports Version 4 (RFC 1771), Communities Attribute (RFC 1997), Route Reflection (RFC 2796), Multi-protocol extensions (RFC 2858) and Capabilities Advertisement (RFC 2842) Additionally, a firewall rule is to be configured for the zone for which the BGP traffic is to be allowed i.e. LAN to LOCAL or WAN to LOCAL. Dynamic Routing - BGP
  • 220. Configuration of RIP, OSPF & BGP is beyond the scope of CCNSP and is a part of CCNSE curriculum. Please refer the document on Cyberoam knowledgebase sites for configuration: RIP: http://kb.cyberoam.com/default.asp?id=1000&SID=&Lang=1 OSPF: http://kb.cyberoam.com/default.asp?id=999&SID=&Lang=1 BGP: http://kb.cyberoam.com/default.asp?id=1001&SID=&Lang=1 Dynamic Routing - Configuration
  • 221. Cyberoam supports multicast traffic forwarding in both Gateway / Bridge Mode. Multicast forwarding is controlled by specifying static routes for multicast traffic. In Gateway mode, multicast forwarding needs to be enabled and then static routing needs to be configured. In Bridge mode, only multicast forwarding needs to be enabled. Multicast forwarding can be enabled and the mroutes can be added from both the GUI and console. Multicast routing configuration is beyond the scope of CCNSP and is a part of CCNSE curriculum. Refer knowledge base article for multicast routing configuration: http://kb.cyberoam.com/default.asp?id=1021&SID=&Lang=1 Multicast Routing
  • 222.
  • 223. General Administration- Web admin console port settings System  Administration  Settings  Port Settings
  • 224.
  • 225. To create a new administration profile. Role Based Administration System  Administration  Profile  Add
  • 226. As per the above new user configuration, profile option is only activated if we set the user type as Administrator. Here, we have selected the user type as Administrator and we have selected the profile as we created in previous slide. Role Based Administration Attach a profile to a user.
  • 227.
  • 228.
  • 229.
  • 230. The administrator can also configure to receive pre-defined reports via email on a daily or a weekly basis. Logs & Reports  View Reports Report Management
  • 231. Sample Reports: User Wise Reports
  • 232. Sample Reports: Blocked Attempts Report
  • 234. Sample Reports: Top Web Users Report
  • 235.
  • 236.
  • 237. DHCP Configuration for dynamic lease. DHCP Server Configuration Network  DHCP  Server (Dynamic)
  • 238. DHCP Server Configuration Network  DHCP  Server (Static)
  • 239.
  • 240.
  • 241. Manage ARP Network  ARP
  • 242. NTP configuration for time synchronization System  Time
  • 243. NTP configuration for time synchronization (Wizard)
  • 244.
  • 245.
  • 246. Diagnostic Tools: Services Status System  Maintenance  Services
  • 247. Diagnostic Tools: System health graphs System  System Graphs
  • 248.
  • 249. Event Viewer Logs & Reports  Event Viewer  Web Filter
  • 250. Event Viewer Logs & Reports  Event Viewer  IM
  • 251. Event Viewer Logs & Reports  Event Viewer  Anti Virus
  • 252.
  • 253.
  • 255. Cyberoam Knowledge Base (http://kb.cyberoam.com)
  • 256. Cyberoam Knowledge Base (http://docs.cyberoam.com)
  • 257. Cyberoam Security Center (http://csc.cyberoam.com)
  • 258. Customer My Account (http://customer.cyberoam.com)
  • 260.
  • 261. Email Support: Chat support: http://www.cyberoam.com/presalessupport Presales Contact Details EMEA [email_address]   APAC [email_address]   Latin America [email_address] North America and Canada [email_address] India [email_address] SAARC Countries [email_address] Region Toll Free Number Non Toll Free Number USA +1-877-777-0368 +1-973-302-8446 Europe +44-808-120-3958 +44-203-355-7917 APAC +1-877-777-0368 +1-973-302-8446 Middle East & Africa +1-877-777-0368 +1-973-302-8446 India 1-800-301-00013 +91-79-66065777
  • 262.

Notes de l'éditeur

  1. 50 % of security problems originate from internal threats – Yankee Group.
  2. Cyberoam firewall is the only UTM firewall that embeds user identity in firewall rule matching criteria, enabling enterprises to configure policies and identify users directly by the username rather than through IP addresses. Cyberoam’s powerful hardware firewall provides stateful and deep packet inspection, access control, user authentication, network and application-level protection.
  3. The way Cyberoam is licensed… scale from 25-1500 users. Appliance model matches number of users
  4. Identifies attacks based on - 1. Excessive log-ins over a given period of time 2. Data accessed outside of a user's job requirements 3. Simply a spike in overall usage
  5. Cyberoam Central Console enables enforcement of global policies for Firewall , Intrusion Detection & Prevention and Anti-virus scanning. This supports the creation and implementation of enterprise-wide security policy to strengthen branch and remote office security while lowering operational complexity.   The Cyberoam Central Console enables administrators to assign security policies based on user’s work profile even in remote locations. This fully leverages Cyberoam's unique user identity-based security approach.  
  6. NOTE: Two AC Power Cables in Case of 1000i & 1500i Appliance
  7. help
  8. help
  9. help
  10. help
  11. The Essential information needed to create a firewall rule in Cyberoam, a source zone and host, destination zone and host , the service (protocol) schedule and action (Accept , reject, drop).Check the help .
  12. The Essential information needed to create a firewall rule in Cyberoam, a source zone and host, destination zone and host , the service (protocol) schedule and action (Accept , reject, drop).Check the help .
  13. Select public IP address type and configure IP address. The configured IP address is mapped to the destination host/network and used as the IP address of the virtual host. Select mapped IP address type and configure IP address. It is the IP address to which the public IP address is mapped. This is the actual private IP address of the host being accessed using the virtual host.
  14. Select public IP address type and configure IP address. The configured IP address is mapped to the destination host/network and used as the IP address of the virtual host. Select mapped IP address type and configure IP address. It is the IP address to which the public IP address is mapped. This is the actual private IP address of the host being accessed using the virtual host.
  15. Select public IP address type and configure IP address. The configured IP address is mapped to the destination host/network and used as the IP address of the virtual host. Select mapped IP address type and configure IP address. It is the IP address to which the public IP address is mapped. This is the actual private IP address of the host being accessed using the virtual host.
  16. Create a Firewall rule from WAN to DMZ as the Web Server is located in DMZ with destination as the Virtual host for the Web Server created.
  17. There is no need for the administrator to create loop back rule explicitly. It will be created automatically whenever a Virtual Host is created. This means c reating a virtual host will create a DMZ-DMZ rule by default. These rules allow internal users to access the resource on same public IP. Whenever a Virtual Host will be selected as Destination of a Firewall Rule, it is annotated as (VH) and by taking the cursor of mouse over it, it displays the mapping of public IP address with mapped IP address.
  18. A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include: flooding a network, thereby preventing legitimate network traffic; disrupting a server by sending more requests than it can possibly handle, thereby preventing access to a service; preventing a particular individual from accessing a service; disrupting service to a specific system or person
  19. A SYN flood attack creates so many half-open connections that the system becomes overwhelmed and cannot handle incoming requests any more. UDP Flood: This attack links two systems. It hooks up one system’s UDP character-generating service, with another system’s UDP echo service.Once the link is made, the two systems are tied up exchanging a flood of meaningless data. Tcp flood : This attack sends huge amount of TCP packets than the host/victim computer can handle. ICMP flood is based on sending the victim an overwhelming number of ping packets. It is very simple to launch, the primary requirement being access to greater bandwidth than the victim.
  20. DoS Protection settings vary for different organizations give example
  21. When the burst rate is crossed, Cyberoam considers it as an attack. Cyberoam provides DoS attack protection by dropping all the excess packets from the particular source/destination. Cyberoam will continue to drop the packets till the attack subsides. Because Cyberoam applies threshold value per IP address, traffic from the particular source/destination will only be dropped while the rest of the network traffic will not be dropped at all i.e. traffic from the remaining IP addresses will not be affected at all.
  22. Explain the relationship between policies Explain how different categories make an IAP and how different policies Can be applied to a User. User Identity-based Policies   Cyberoam’s user identity-based filtering provides the granular controls required to control access by individual users and groups to applications, sites, information upload, as well as entry of virus, worm, spyware and other attacks on the network.    By allowing enterprises to set distinct surfing policies with differing access rights based on individual names rather than IP addresses, Cyberoam enables the creation of surfing policies based on the user’s work profile. Policies can be created based on the user’s department, group, hierarchy or individual requirements, providing great dynamism and flexibility in policy creation and management. Rapid user-IP mapping with instant user identity recognition reduces time lag and processor load. Group is a collection of users having common policies that can be managed as a single unit. Its a mechanism of assigning various policies to a number of users in one operation/step. It simplifies the user configuration. Users that belong to a particular group are referred to as a group user. Users are needed for Auditing and Security can be configured at more finer granule Isolation point can be identified immediately Integration will identify access request based on User names Generate reports based on Usernames
  23. Threats over email like spam, phishing, viruses, worms, are released in the billions within a short span of time. Today’s attackers launch threats for financial gain rather than out of malicious intent. They mask the originator and launch the attack using a network of zombie machines. With Zombie botnets carrying the ability to send up to 1 billion spam messages within a few hours, the spread of the attack is rapid. Gateway level spam protection for Zero-hour spam detection  To effectively match the speed with which attacks spread, zero-hour responsiveness is required to deliver enterprise security. Zero-hour protection swings into action, generating defenses in the first hour of an attack. Further, the content and characteristics of the message within a single attack differ, making it difficult to identify the threat through traditional methods. Solutions that rely on signature databases are likely to leave the enterprise defenses lowered during the critical first hours of attack. Cyberoam in Partnership with CommTouch RPD (Recurrent Pattern Detection) Cyberoam delivers zero-hour spam protection in addition to image spam defense though Recurrent Pattern Detection (RPD) technology. This unique content-agnostic technology detects and blocks image spam which accounts for almost 35 % of worldwide spam mail and 70% of bandwidth taken by spam.   Cyberoam’s anti-spam protection delivers maximum spam detection with low false positives through relevant, continuous and real-time spam detection. The solution reduces spyware, phishing and adware attempts, controls spam involving pornography while enhancing enterprise productivity by preventing mail systems from being submerged by spam
  24. this connection is also called Host-to-Net connection may be with or without static IP