RSS Feed
Knowledgebase : Cyberoam FAQ > How To
Today organizations require stable, redundant and fast ISP links to run business critical applications. To achieve constant and secure availability to the Internet and to avoid network vulnerability, organizations prefer to have multiple ISP links. ...
In today’s rapid changing Internet scenario, enterprises to ensure security and productivity apply Web filtering to all the users. However, there are instances when these web filter configuration needs to be customized for some users. So that they c...
Allow access to Specific/Trusted USBs and Deny the rest Applicable to Version : 3.20.1130 Cyberoam End Point Data Protection helps to allow/deny specific USBs to be used when the machine is within or outside the Corporate. Requirement All...
Applicable to Version : 3.20.1130 Cyberoam Endpoint Data Protection Application Control offers granular policy-based controls, enabling organizations to prevent and control access to web, instant messengers, P2P, gaming, and more. Organizations c...
Block Files Transferred over Instant Messengers Applicable to Version : 3.20.1130 Follow the below given steps from Web Admin Console for configuration: 1. Logon to Web admin console and go to Advanced Policy à IM File 2. Ent...
Applicable version – 9.6.0 build 16 onwards MAC address filtering is more secure than IP address filtering as MAC address is rarely changed. In DHCP environment, IP address changes dynamically and hence MAC address is more reliable to identi...
User- MAC binding implicates binding a user with a specific device. It prevents unauthorized and abusive access of organization network and resources, as user is allowed to login through a specific device only. MAC address binding is more secure ...
Configure Spam Digest Applicable to Version: 9.6.0. build 16 This article describes the steps to: · Configure Spam Digest which is to be mailed to the users · Release False Positive Email from the quarantine area to users’ inbox ...
Configure SSL VPN in Cyberoam SSL (Secure Socket Layer) VPN provides simple-to-use and implement secure access for the remote users. It allows access to the corporate network from anywhere, anytime and provides the ability to create point-to-point e...
Creating another Admin user Applicable to Version : 3.20.1130 * By default, in Cyberoam End Point Data Protection, there is only one user Admin. * Create another user for Helpdesk Engineer to login with this account. As shown ...
Requirement To block Skype IM using Cyberoam IPS signature. Solution Cyberoam provides solution to block Skype IM with the help of default IPS signature. Prerequisite Intrusion Prevention System module subscribed Configuration The entire co...
Encrypt / Decrypt Files Copied over USB Devices Applicable to Version - 3.20.1130 This article describes how to encrypt / decrypt files copied over USB devices. Requirement Allows encrypting and decrypting files copied over USB devices ...
Export Agent List Applicable to Version : 3.20.1130 Requirement To export the entire list of computer where the agent is installed. Solution Steps 1. Logon to Cyberoam Endpoint Data Protection server through Web Admin console. ...
Applicable version - v 9.5.0 build 21 onwards To configure VLAN in transparent mode, you must add VLAN ID from CLI console. 1. Logon to CLI console with the default password. 2. From the Main Menu, go to option 5 VLAN Management > option ...
How To – Configure PPPoE on Cyberoam Article describes configuration procedure to establish PPPoE connectivity between your upstream device ADSL modem/router (deployed as Bridge) and Cyberoam. For this, you need to configure Cyberoam as ...
Steps how to migrate ver.9 to ver.10 firmware Notes: Your Cyberoam should be version 9.6 Build 78 You should create a backup of your existing configuration ,try to make two backups... 1.) Know the appliance key of your Cyberoam. ...
Install the Cyberoam Endpoint Data Protection Agent using Logon Script Applicable to Version : 3.20.1130 Cyberoam Endpoint Data Protection facilitates to push the Agent under domain environment having Active Directory with Logon Script. Use ...
Preventing Users to change their IP/MAC property Applicable to Version : 3.20.1130 Requirement Prevent Users to change their IP/MAC property. Solution To achieve this requirement, we need to create two policies. Scenario 1 Defi...
Unlock Computer Applicable to Version - 3.20.1130 Requirement Lock computer when a user tries to access the application denied to him. Prerequisite Data Protection & Encryption Module subscribed Solution 1. Logon to Cybe...