Professional Documents
Culture Documents
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/284508491
CITATIONS
READS
73
5 authors, including:
Steve Adedayo
Capella University
4 PUBLICATIONS 0 CITATIONS
SEE PROFILE
Abstract
Online attacks continue to grow in their complexity and they impact different industries in different ways. A need to check
and track the activity of cyber terrors and attackers through threat management is therefore required. The concept of unified
threat management (UTM) is very appealing with multiple critical security technologies, integrated on a single platform,
provided by a single vendor. However, the process of evaluating UTM options is not simple. This paper discusses the issues
and challenges of cyber network management using Unified threat management (UTM) systems. The authors examine
Cyberoam UTM product which is among the most widely trusted tools in the information security arsenal. Answers to critical
questions in selecting the most suitable UTM like: Is a UTM solution right for my organization? What security features are
most important? Ease of management and support for remote users?, were provided in this paper with supporting practical
features. The paper concludes with the merits and demerits of UTM were presented and a suitable Unified threat
Management (UTM) systems like Cyberoam is recommended for organizations of all sizes.
Keywords: Network Security, Threat, Network Management, Remote
controlling,
monitoring
and
managing
network
Page 1
administrators
to
impending
problems
so
that
network
managed.
management elements.
problems
to
keep
the
network
running
Configuration
management
subsystems
this
Page 2
Management
2.1 SNMP
codes.
The
Security
management
subsystems
perform
several
acronm
SNMP
stands
for
Small
Network
Page 3
2.2.2 Switch
In networks, a switch is a device that filters and forwards
packets between LAN segments. Switches operate at the
LANs that use switches to join segments are called
switched LANs or, in the case of Ethernet networks,
switched Ethernet LANs [3].
the best path for forwarding the packets, and they use
protocols such as ICMP (Internet Control Message
Protocol) to communicate with each other and configure
the best route between any two hosts. Very little filtering
of data is done through routers.
Page 4
Unified
Threat
Management
hardware
CR100iNG,
CR200i, CR500ia,
CR200iNG-XP,
CR300iNG,
Unified
Threat
Management
appliances,
Cyberoam assures good security, connectivity and
Page 5
operational costs.
Consumption
137W
Generation Firewall
Page 6
Feature Description
URL
Keyword
File type
Database
Web Security
HTTPS Controls
Best-of-breed
Replacement
Benefit
Page 7
Feature Description
Web Category-based
Allocation
Time-based Allocation
Gateway
Anti-Virus
Benefit
and
Anti-Spyware
Page 8
Feature Description
Zero-Hour Protection
Benefit
Layer 8 Identity-based
Security
Self-Service Virus
Quarantine
network
and
organizations
application-level
against
intrusion
attacks,
securing
attempts,
malware,
Page 9
Feature Description
Multiple Protocol
Support
Centralized Security
Benefit
3.5 Anti-Spam
Recurrent Pattern
Detection
Identity-based Security
Feature Description
Benefit
Email Management
Self-Service Quarantine
Area
Data archiving
Extensive Layer 8 Identity-based reporting Top spam
receivers, senders, applications of spam
Real-time logs and reports
Options of on-appliance reporting, centralized reporting from
Cyberoam iView
Page 10
3.6 Firewall
Feature
Feature Description
Benefit
FUSION Technology
category.
Page 11
Page 12
its easy to use GUI. However, the key features that are
Appliance
Authentication;
Cyberoam
Gateway
I-View
Reporting;
Anti-Spam
and
User
Intrusion
subscription on its network security appliances (NextGeneration Firewalls/UTMs) to secure websites and Webbased applications in organizations against attacks such as
SQL injection, cross-site scripting (XSS), URL parameter
tampering, session hijacking, buffer overflows, and more,
including the Open Web Application Security Project
(OWASP) Top 10 Web application vulnerabilities.
Page 13
to Firewall Rule.
4.2 Configuration
Page 14
Page 15
Page 16
Page 17
Page 18
2.
3.
4.
SMTP -
POP3 -
IMAP -
ISP -
WAN -
QoS
Quality of Service
IM
Instant Messaging
VPN
HTTP
FTP
P2P
Pair To Pair
URL
address)
REFERENCES
[1] Ralf Bendrath: Global Technology Trends and
National Regulation: Explaining Variation in the
Governance of Deep Packet Inspection(15-18 February
2009); Paper prepared for the International Studies
Annual Convention New York City
[2] Sophos Acquires Cyberoam Technologies - Cyberoam
Press Release, 10 Feb 2014;
[3] Text mode programs (CUI: Console User Interface).
http://www.winehq.org/docs/wineusr-guide/cui-programs;
Wine User Guide. Retrieved Sep 22, 2013
[4] Security Mastery With Cyberoam CR1000iNG-XP
(Aug 2015):
http://nigeriancommunicationsweek.com.ng/ebusiness/cyberoam-shows-security-mastery-withcr1000ing-xp(Nigerian Communications Week
Newsletter)
Page 19
[6] http://www.cyberoam.com/productoverview.html.
[10]
http://docwiki.cisco.com/wiki/Network_Management_Ba
sics
[7]
https://training.cyberoam.com/training/webpages/academ
yStudent/curriculum.jsp
[11] http://www.webopedia.com
[8] http://help.cyberoam.com/cyberoam
Page 20