by September 6, 2008 0 comments

This UTM is meant for large enterprises where performance is the key concern.
Apart from the usual features, it provides you HA which helps you to keep the
device up and running 24×7, and by providing a failsafe option. Also, along with
usual bandwidth management, it provides you with multiple link management, which
helps in managing multiple ISPs. Compared to the model we received for the
shootout last year, it now supports multicast routing. It also provides a packet
capturing tool which helps network administrators with easy troubleshooting.
Earlier models only provided user migration from the active directory, but now
you can migrate groups, which saves a lot of time. Also it now supports five
syslog servers as compared to one supported earlier. Each port of the device can
easily be configured for LAN, WAN and DMZ, which make it flexible enough to
deploy it in any kind of environment. For management, it provides a browser
interface which is easy to understand. Its reporting service is one of the best
compared to other UTMs which are in the same price range.

Cyberoam CR 1500i
Rs 16 Lacs (1 yr warranty)
Contact: Elitecore Technologies,
Tel: 9810618871
SMS Buy 130944 to 56677

It performed very well in our tests. For checking its anti-virus capabilities
we downloaded a list of 1000 viruses over HTTP and FTP. It blocked 90% of
viruses, which is good. However, in detecting macro viruses it performed poorly,
detecting only 60% of the lot. Then for checking anti-spam capabilities we
downloaded 1000 spam; it proved itself as a good performer by blocking 86% of
spam. Then we tried to jam its port. For this we ran a port jamming tool from
six different machines to its external port. The port could not be jammed and
also there was no difference in performance. The CPU utilization during this
process was 15% only, which is quite impressive. We also tested for
denial-of-service (DoS) attack and the attack was not successful. Then for
checking its IDP capabilities we ran Arpspoof attack for a machine attached to
its internal network. This device neither detected the attack nor blocked it.

Bottomline: If you want absolute fool-proof protection, then go for
this with your eyes shut.

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.