cyberoam docs

409
١١/٤/٢٠١٢ Cyberoam Docs 1/409 docs.cyberoam.com/print.asp?id=49&Lang=1&SID= 1. Cyberoam UTM 1.1. Version 10 1.1.1. Migrating to V 10 Release Information Release Type: General Availability Compatible versions: 9.6.0.78 for all CRs except CR15i; 9.5.8.68 for CR15i Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license Applicable to: All the Cyberoam Appliance models Upgrade procedure Refer Migrate from v9.6.x.x to v10 document. Compatibility issues Appliance model-specific firmware and hence firmware of one model will not be applicable on another model. Upgrade will not be successful and error message will be given if your Appliance model is CR100i and you are upgrading it with firmware for model CR500i. Introduction With version 10, Cyberoam has moved to firmware-based solution with the configuration and behavioral changes as given in the document. Document also lists various functionalities added in version 10. For details on new features added in Version 10, please refer to Version 10 Release Notes. Changes from V 9 1. Logical flow change The basic building blocks in Cyberoam are Zones, Interfaces and (Network/Address) objects. This structure is used in defining firewall rules to allow or deny the access. Zone is the logical grouping of Interface, which includes: predefined zones - LAN, WAN, DMZ, LOCAL, VPN custom zone Interface includes: actual physical Ethernet interfaces or ports i.e. Port A through Port J depending on the appliance model subinterfaces - VLAN PPPoE interfaces interface aliases and WWAN interface if Wireless WAN functionality is enabled Objects are the logical building blocks of the firewall rule, which includes: host - IP and MAC addresses services which represent specific protocol and port combination e.g. DNS service for TCP protocol on 53 port schedule to control when the rule will be in effect e.g. All Days, Work Hours certificates file types 2. Internet Access control configuration change Now Internet access can be controlled by filtering web and application separately. This provides granular control over Internet access. This is achieved by splitting Internet Access policy in two policies – Web filter policy and Application filter policy. The traffic coming from the web is filtered by various policies and categories through Web filter policy while application filter policy controls user’s application access. It specifies which user has access to which applications. 3. Behavior change 1. Wizard behavior change: (Wizard is now deployment wizard) If wizard is re-run, it will flush following configurations: dhcp server/relay configurations unicast/multicast routing vpn, l2tp, pptp static/proxy arp VH/ Bypass firewall / firewall rules/ gateway pppoe custom zones local acls Interface based hosts/hostgroup 2. Deleting Interface – Alias and Virtual host will also remove all its dependent configurations including: Interface-Zone binding DHCP Server or Relay Alias based Firewall rules ARP - static and proxy Virtual hosts and VH based firewall rules Interface based Hosts and reference from host groups Routes - Unicast, Multicast 3. Updating Interface details will also update all its dependent configurations including: Interface-Zone binding

Upload: mostafa-adel

Post on 24-Oct-2014

2.000 views

Category:

Documents


14 download

TRANSCRIPT

//1. Cyberoam UTM 1.1. Version 10 1.1.1. Migrating to V 10

Cyberoam Docs

Release Information Release Type: General Availability Compatible versions: 9.6.0.78 for all CRs except CR15i; 9.5.8.68 for CR15i Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license Applicable to: All the Cyberoam Appliance models Upgrade procedure Refer Migrate from v9.6.x.x to v10 document. Compatibility issues Appliance model-specific firmware and hence firmware of one model will not be applicable on another model. Upgrade will not be successful and error message will be given if your Appliance model is CR100i and you are upgrading it with firmware for model CR500i.

IntroductionWith version 10, Cyberoam has moved to firmware-based solution with the configuration and behavioral changes as given in the document. Document also lists various functionalities added in version 10. For details on new features added in Version 10, please refer to Version 10 Release Notes.

Changes from V 9

1.

Logical flow change

The basic building blocks in Cyberoam are Zones, Interfaces and (Network/Address) objects. This structure is used in defining firewall rules to allow or deny the access. Zone is the logical grouping of Interface, which includes: predefined zones - LAN, WAN, DMZ, LOCAL, VPN custom zone Interface includes: actual physical Ethernet interfaces or ports i.e. Port A through Port J depending on the appliance model subinterfaces - VLAN PPPoE interfaces interface aliases and WWAN interface if Wireless WAN functionality is enabled Objects are the logical building blocks of the firewall rule, which includes: host - IP and MAC addresses services which represent specific protocol and port combination e.g. DNS service for TCP protocol on 53 port schedule to control when the rule will be in effect e.g. All Days, Work Hours certificates file types

2.

Internet Access control configuration change

Now Internet access can be controlled by filtering web and application separately. This provides granular control over Internet access. This is achieved by splitting Internet Access policy in two policies Web filter policy and Application filter policy. The traffic coming from the web is filtered by various policies and categories through Web filter policy while application filter policy controls users application access. It specifies which user has access to which applications.

3.

Behavior change1. Wizard behavior change: (Wizard is now deployment wizard)

If wizard is re-run, it will flush following configurations: dhcp server/relay configurations unicast/multicast routing vpn, l2tp, pptp static/proxy arp VH/ Bypass firewall / firewall rules/ gateway pppoe custom zones local acls Interface based hosts/hostgroup 2. Deleting Interface Alias and Virtual host will also remove all its dependent configurations including: Interface-Zone binding DHCP Server or Relay Alias based Firewall rules ARP - static and proxy Virtual hosts and VH based firewall rules Interface based Hosts and reference from host groups Routes - Unicast, Multicast 3. Updating Interface details will also update all its dependent configurations including: Interface-Zone binding

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

1/409

//

Cyberoam DocsDNS Stops the DHCP Server and updates the details. You will have to manually restart the server Gateway Interface based Hosts Disconnects all the tunnels and updates all the VPN policies. You will have to manually reconnect the tunnels. VLAN Interfaces Dynamic DNS Client 4. Except for WAN zone, Zone-Interface membership can be changed from Manage Interface page as well as Edit Zone page. In previous versions, it was possible only from Edit Zone page. While for WAN zone, it can be changed only from Manage Interface page.

5.

Appliance Access can be configured from Zone as well as from Administration page.

6. Automatic addition of gateway, no need to add gateway manually. Gateway will be added and removed automatically when any Interface in WAN zone is added or removed. Deleting VLAN interface will delete its firewall rule also. Default Administrator user cyberoam can be deleted as now Cyberoam is shipped with a global Administrator. Cyberoam must be rebooted after modifying time zone. Internet Access policy is divided into two policies Web filter policy Can be configured to filter HTTP traffic only Application filter policy Can be configured to filter application traffic 11. System Health Graphs can be accessed from Web Admin Console using System Graph Page. 12. Any modifications in user login restriction will be applied on next login. 13. Service group - PPTP_Group automatically added.7. 8. 9. 10.

14. L2TP and PPTP access for the user can be configured through User page as well as L2TP and PPTP Configuration page. 15. Live Connections Page to display live IPSec connections and live SSL VPN users

4.

Redesigned UI - Menu and pages regrouping

To reflect the above changes, GUI pages are reorganized and menus are renamed as: System Objects Network Identity Firewall VPN IPS Web filter Application filter QoS Anti Virus Anti Spam Logging & Reporting

5.

Renamed featuresOld name Local ACL Host User Bandwidth policy Surfing quota policy Allotted hours HTTP Proxy Web Client Full Access (SSL VPN Access mode) Road Warrior Net-to-Net (IPSec policy) New name Appliance Access IP host Identity QoS policy Maximum hours Web Proxy Captive Portal Tunnel Access Remote Access Site-to-Site

6.

Functionality moved from CLI to Web Admin ConsolePacket capture Unicast and Multicast (can be configured from both the Consoles) Interface speed, MSS and MTU (can be configured and updated from both the Consoles) Live Graphs of CPU usage, Memory usage, Load average and Interface statistics for last hours. Graphs will be refreshed automatically at the interval of 30 seconds. 5. View Access Logs 6. View Audit logs 7. Rollback to Previous version supported through multiple firmwares1. 2. 3. 4.

Discontinued features of version 9.xFollowing features of V 9.6.x.x will not be supported from V X onwards:1. 2. 3. 4. 5. 6. 7. 8. 9.

Add/Delete Gateway button removed from Manage Gateway page as Gateway will be added/deleted automatically. User Type Manager. Same as the Admin user with Audit Admin Profile i.e. view reports Shared Policy is removed from Surfing Quota and Data Transfer Policy Surfing quota policy Cycle hours can be configured in hours only, minutes option is removed Manage HTTP Proxy page is removed but functionality is included in Web proxy Regenerate button has been removed from Update Certificate page as Certificate will be regenerated automatically whenever updated. Data Transfer Limit alerts as on Customize Client Messages page SNMP service start/stop option is removed as it will always be ON once Agent is configured. RMS (Restart Management Services) as now it is now not required for any changes in Network configuration including Alias and Virtual Interface creation.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

2/409

//10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.

Cyberoam DocsCustom Login messages as it is now included on Captive portal page Antivirus Scan policy (default and custom) for SMTP - now part of Scanning Rule Global and Default Antispam policy Antispam Custom policy - now part of Spam Rule User Migration Utility as Export/Import functionality is added on User page Manual purge of reports. Auto purge will get-in in Stability-1. Service creation ICPM Type Other will not be available. SNMP Version v3 Protocol support User maximum session timeout option is given globally, however, per group is missing. System Modules Configuration on GUI is not available. It is available on CLI only. DHCP server "Enable Auto Start" Button

Features expected in version-10 Stability-1Traffic discovery Only live connections will be provided. AV version information is missing - To be made available for all models on update page. Current availability is on 15i and 25i only. AV & AS Quarantine Area total utilization Web Category - Search URL Corporate Client Download for all the Cyberoam Clients Will be available in the form of links in Stability-1. Pre-requisite will be that the download site will need to be allowed for all. 6. Dashboard doclets 1. 2. 3. 4. 5.

System Resource (CPU, Memory, Disk Usage) Post Stability-I, Usage Summary (HTTP hits, Search Engine Queries) In Stability-1 , User Surfing Pattern Post Stability-1 , HTTP Traffic Analysis (Distribution by Hits, Distribution by Data Transfer) Post Stability-17. 8. 9. 10. 11. 12. 13. 14. 15.

Backup over Mail IPS Signature details link Editable IP address of Clientless user : Editable IP address will be available as part of Stability-1. Show All link on Live Users page In Stability-1, default 50 live users will be shown. L2TP connection report - User information and data transfer details Web Category IPAddress category Tool tip Firewall rule page for:, host, host group and Identity columns Except for IPS, tool tip for all others will be available in Stability-1. User search (rather filter for v10) is not available for IP. Reports a. Web Surfing Reporti. ii. iii. iv.

Category type (by hits)Wise Will be available post Stability-1. Category type data transfer Will be available post Stability-1. Group wise Site wise/HTTP data Transfer /HTTP hits by content / HTTP File upload Will be available post Stability-1. User wise Site wise/HTTP data Transfer /HTTP hits by content type / HTTP File upload

b. Gateway wise b/w usage and composite b/w usage graphs on GUI Will be available post Stability-1. 15. Audit Logs a. GUI Audit logs b. SSL VPN logs Will be available post Stability-1. c. Appliance Audit logs (RESET/Backup/Restore/Upgradeauto-manaul/reboot) . Will be available in Stability-1 and will be part of GUI audit logs. d. Service Restart Logs Will be available in Stability-1 and will be part of GUI audit logs e. Firmware apply/bootup logs Will be available in Stability-1 and will be part of GUI audit logs

Features expected Post version-10 Stability-11. Dashboard doclets a. User Surfing Pattern, b. HTTP Traffic Analysis (Distribution by Hits, Distribution by Data Transfer) c. System Resource (CPU, Memory, Disk Usage) 2. ARP Cache 3. Auto purge 4. Application Filter Logs on the Logging Server 5. Upload Corporate image in Web Filter Category custom messages 6. Bandwidth Usage Graphs 7. Proactive Reports Category wise Trends, Google Search Keywords Category wise trends availability to be confirmed eventually. Google Search Keywords will 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22.

be available post Stability-1. Dashboard alerts Antivirus Engine Information update time Antispam center connectivity status Last upgrade status and timestamp for AV/IPS/Webcat Mail Notification on change of gateway status Language support - Turkish, French Multiple domain support for authentication Zone Description field, Description field will be removed from manage page Firewall rule Bandwidth usage (upload and download) IPS Policy - "Select All" for selecting all the Categories Persistent Logs (including VPN logs) Clientless users--> Active and Inactive list cannot be displayed separately: Will be available post Stability-1 in the form of filter support on Active/Inactive. Static route in bridge and IPSEC and http proxy host entry is not there. Console Audit logs Reports a. Web Surfing Report

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

3/409

//i. ii. iii.

Cyberoam DocsCategory type (by hits)Wise Category type data transfer Group wise Site wise/HTTP data Transfer /HTTP hits by content / HTTP File upload

b. Gateway wise b/w usage and composite b/w usage graphs on GUI c. Internet Usage Reporti. ii.

User/Group wise Internet Usage Reports User/Group wise Surfing Time Report

d. Trendi.

Hourly based Trend Reports

e. Audit logi.

Appliance Audit log

Features availability to be confirmed eventually1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

Customizing Client Preferences - HTTP Client option (Page, Pop-up, None) and default URL & customize Login Message System->Configure->Customize Client Preferences, URL to open a site after client logs on to server. Custom Application Category Destination IP is not available. Otherwise, service group can be used. Availability of destination IP to be confirmed eventually. Client Login Links from Customize Login Messages page Clientless User IP address based Sorting and Searching User MyAccount access from Users page Restart Servers option SMTP, POP3, IMAP, FTP, Cyberoam server from Manage Diagnostic tool Servers page Group wise HTTP keep alive enable/disable User maximum session timeout per group Logon script updation download link in case of SSO. It was available in v9 as part of users | Migrate Users menu: Simultaneous user login option available for user only not for group

CLI features Menu - System Configuration: Trace Route Utility Set Module Info Bandwidth Graph Settings Disable LAN Bypass Menu - Cyberoam Management: Database Utilities DHCP Client Settings Download backup Restore backup View audit logs Check and upgrade cyberoam new version Cyberoam auto upgrade status Webcat auto upgrade status Rollback to previous version HA configuration ReBuild firewall rule Menu Route Configuration Configure Unicast Routing {Configure Static-routes/ACLs} Menu Upgrade version Menu VPN Management View VPN logs View connection wise VPN logs Advance VPN logs PPTP VPN logs Commands (All the parameters except mentioned here are available) ping: record-route | numeric | tos | ttl cyberoam: check_disk | cpu_burn_test | dgd | ips_autoupgrade | repair_disk | service | system_monitor | view | services httpclient devicemap dnslookup: server ip ips route: add | delete set: advanced-configuration: tcp-window-scaling, cr-traffic-nat

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

4/409

//set: cache | usermac set: bandwidth: guarantee | graph

Cyberoam Docs

set: http_proxy: av_sessions | client_sessions | core_dump | debug | deny_unkown_proto | multiple_webcategory | delete | relay_http_invalid_traffic | rw_buffer_size | x_forwarded_for set: usermac set: set: secure-scanning (as included in set service-parameter command) sslvpn: max-clients | max-connections | owa-basic-mode

show: access-log | | antispam | antivirus | firewall-rule-log | ftp | login | mail | monitor | reboot show: system: logs | devices | dma | filesystems| iomem | ioports | partitions | pci | processes | statistics | modules | uptime show: http_proxy show: monitor, ftp, login, access-log show: system packet-capture telnet: tos | source

1.1.2. Release Notes 1.1.2.1. V 10.01.2 Build 158Release Dates Version 10.01.2 Build 158 01st March, 2012 Release Information Release Type: Maintenance Release Applicable to: V 10.01.0472 or V 10.01.0474 or V 10.01.0620 or V 10.01.0665 or V 10.01.0667 or V 10.01.0 Build 674 or V 10.01.0 Build 678 or V 10.01.0 Build 739 or V 10.01.1 Build 023 or V 10.01.1 Build 027 or V 10.01.02 Build 010 or V 10.01.02 Build 059 and V 10.01.02 Build 064 or V 10.01.02 Build 065 or V 10.01.2 Build 124 or V 10.01.2 Build 133 Migrate Procedure To migrate from Version 9 to Version 10, please follow the link Migrate Cyberoam Appliance from Version 9 to Version 10. Upgrade procedure To upgrade the existing Cyberoam Appliance follow the procedure below: Logon to https://customer.cyberoam.com Click Upgrade link under Upgrade URL. Choose option Select for Version 10.00.0xxx to current GA Version 10.00.0xxx Firmware. For Cyberoam versions prior to 10.01.0472 Upgrade the Cyberoam to 10.01.0472 selecting option Below 10.01.0472 and follow on-screen instruction. By doing this, the customer will not be able to roll back. Compatibility issues This version release is compatible with the Cyberoam Central Console Release V 02.00.4 Build 007. Please always check http://docs.cyberoam.com for availability of latest CCC firmware to deal with this compatibility issue. For Cyberoam version 10.01.0472 or higher Upgrade Cyberoam to latest version by selecting option 10.01.0472 or higher and follow on-screen instruction.

IntroductionThis document contains the release notes for Cyberoam Version 10.01.2 Build 158. The following sections describe the release in detail. This release comes with enhancements to improve quality, reliability, and performance.

Enhancements1. Database Optimization Cyberoam database architecture has been fine-tuned for optimal performance and further stability of On-Appliance reports. 2. Access Server logs for SSO From this version onwards, when a client tries authenticated using SSO while already being authenticated by CTAS than a message "CTA collector enabled

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

5/409

//

Cyberoam Docsdiscarding SSO client request" is displayed in Access Server logs. Prior to this version, no message was displayed providing a reason about SSO request being discarded.

Bugs SolvedAnti Virus Bug ID 7672 Description Windows fails to update using Lab tech tool if AV scanning is on. Firewall Bug ID 7595 Description A MAC Address is not configured as trusted, if it is imported from csv file and has a special character like dash (-) as separator. Hardware Sensor Bug ID 7764 Description Minimum chassis fan speed displayed is higher than the set threshold value. Bug ID 6982 Description A warning log is displayed in log viewer even though chassis fan speed is below the desirable level. High Availability Bug ID 8270 Description A customized image in denied message is not displayed as it does not get synchronized with Auxiliary appliance, when a Cyberoam is configured in HA Active Active mode. Proxy Bug ID 8261 Description Website http://files003.voip.ownmail.com/1555031541/ does not open when Cyberoam is configured as direct proxy. User Bug ID 8095 Description Inactive users are allowed to login in to Cyberoam My Account. Bug ID 7604 Description A message Operation Interrupted is displayed while navigating through User page if the user name imported from the external authentication server contains special characters like back slash (/). Bug ID 8404 Description Custom Administrator user cannot reboot/shutdown the Cyberoam Appliance in spite of having read-write permission. VPN Bug ID 8319 Description PPTP connection cannot be established, if static and dynamic WAN interfaces are configured on Cyberoam and PPTP server is configured on the dynamic interface.

1.1.2.2. V 10.01.2 Build 124, 133Release Dates Version 10.01.2 Build 124 24th January, 2012 Version 10.01.2 Build 133 15th February, 2012 Release Information Release Type: Maintenance Release Applicable to: V 10.01.0472 or V 10.01.0474 or V 10.01.0620 or V 10.01.0665 or V 10.01.0667 or V 10.01.0 Build 674 or V 10.01.0 Build 678 or V 10.01.0 Build 739 or V 10.01.1 Build 023 or V 10.01.1 Build 027 or V 10.01.02 Build 010 or V 10.01.02 Build 059 and V 10.01.02 Build 064 or V 10.01.02 Build 065 Migrate Procedure To migrate from Version 9 to Version 10, please follow the link Migrate Cyberoam Appliance from Version 9 to Version 10. Upgrade procedure To upgrade the existing Cyberoam Appliance follow the procedure below: 1. 2. 3. Logon to https://customer.cyberoam.com Click Upgrade link under Upgrade URL. Choose option Select for Version 10.00.0xxx to current GA Version 10.00.0xxx Firmware. For Cyberoam version 10.01.0472 or higher 1. Upgrade Cyberoam to latest version by selecting

For Cyberoam versions prior to 10.01.0472 1. Upgrade the Cyberoam to 10.01.0472 selecting

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

6/409

//

Cyberoam Docsoption Below 10.01.0472 and follow on-screen instruction. By doing this, the customer will not be able to roll back. option 10.01.0472 or higher and follow onscreen instruction.

Compatibility issues This version release is not compatible with the Cyberoam Central Console Release V 02.00.2 Build 018. Please always check http://docs.cyberoam.com for availability of latest CCC firmware to deal with this compatibility issue.

IntroductionThis document contains the release notes for Cyberoam Version 10.01.2 Build 124and Version 10.01.2 Build 133. The following sections describe the release in detail. This release comes with enhancements to improve quality, reliability, and performance.

Enhancements1. Optimization of Access Concentrator String From this version onwards, the administrator is allowed to provide a PPPoE Access Concentrator string of 50 characters long. Prior to this version, maximum character limit of Access Concentrator string was 20 characters This can be accessed from Network Interface by selecting PPPoE for WAN Zone.

Bugs SolvedFor Version 10.01.2.124 Firewall Bug ID 7649 Description The dropdown menu is not displayed properly on clicking Service tab while adding or editing any firewall rule. Bug ID 7922 Description Spoof prevention does not function on migrating from V9 to VX if a same MAC address is available in upper case and lower case within cyberoam internal database.

GUI Bug ID 7934 Description Spam Rule parameter "Message size is" is displayed as "less than" although it is configured as "Greater than" for Anti Spam. However Anti Spam Rule functions appropriately Bug ID 8015 Description Two entries for same date is displayed for gateway wise data transfer is displayed on GUI. Bug ID 8040 Description Dates cannot be configured for quarantine mails in Chinese Traditional GUI.

High Availability Bug ID 7401 Description Thin Client users cannot access Internet when HA is in Active Active Mode with load balancing on.

Logs & Reports Bug ID 8016 Description An alert is not displayed even if disk usage breaches the threshold level.

Hardware Sensor Bug ID 7634 Description A false alarm with respect to fan speed is generated for the Appliance that does not have the chassis fan.

Network Interface Bug ID 6336

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

7/409

//

Cyberoam DocsDescription 3GModem Sierra Aircard 312AU is not supported by Cyberoam Appliance. Bug ID 7218 Description Nokia 3G modem CS 11 is not supported. Bug ID 7566 Description The USB modem of Vodafone ZTE K4505-Z is not supported by Cyberoam Appliance. Bug ID 7575 Description 3G modem Option N.V with model number Globetrotter is not supported by Cyberoam Appliance. Bug ID 7652 Description 3GModem Huawei K4605 is not supported by Cyberoam Appliance. Bug ID 7833 Description 3G Vodafone modem K3806z is not supported by Cyberoam Appliance.

Proxy Bug ID 7077 Description User cannot upload PDF File http://www.mca.gov.in on using direct proxy.

Report Bug ID 7682 Description Report notification mail content is blank when parameter Send email at time set to 00:00 hour. Bug ID 7884 Description Application Allowed reports in On-Appliance iView are available for last 24 hours. Bug ID 7607 Description Logs are not displayed in On-Appliance iView reports, if provided start date and end date is same. Bug ID 8162 Description Mismatch in upload data transfer values displayed on firewall page and Gateway page.

SSLVPN Bug ID 6638 Description User name displayed as "UNDEF" in SSL VPN reports.

For Version 10.01.2.133 Proxy Bug ID 8258 Description HTTPS sites do not open in Google Chrome and Firefox Version 10.0 (Beta) browsers when HTTPS scanning is on. Web Access Bug ID 8097 Description SSL Web Portal cannot be opened in IE (9.0.4), Firefox Beta 10 and Google Chrome.

1.1.2.3. V 10.01.2 Build 059, 065Release Dates Version 10.01.2 Build 059 01st November, 2011 Version 10.01.2 Build 065 26th December, 2011 Release Information Release Type: Maintenance Release Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license Applicable to: V 10.01.0472 or V 10.01.0474 or V 10.01.0620 or V 10.01.0665 or V 10.01.0667 or 10.01.0 Build 674 or 10.01.0 Build 678 or 10.01.0 Build 739, Version 10.01.1 Build 023, Version 10.01.1 Build 027 or Version 10.01.2 Build 010

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

8/409

//Migrate Procedure

Cyberoam Docs

To migrate from Version 9 to Version 10, follow the link Migrate Cyberoam Appliance from Version 9 to Version 10. Upgrade procedure For: V 10.01.0472 or V 10.01.0474 or 10.01.0620 or 10.01.0665 or V 10.01.0667 or 10.01.0 Build 674 or 10.01.0 Build 678 or 10.01.0 Build 739, Version 10.01.1 Build 023, Version 10.01.1 Build 027 or Version 10.01.2 Build 010 1. 2. 3. Logon to https://customer.cyberoam.com Click Upgrade URL link, select the appropriate option and follow the on-screen instruction. High Availability feature included in this upgrade is a GA feature.

For Cyberoam versions prior to 10.01.0472: Upgrade in two steps: Upgrade the Cyberoam to 10.01.0472 using Version 10 to Version 10 available on customers My Account. Upgrade Cyberoam to Version 10.01.2 Build 059. By doing this the customer will not be able to roll back to version prior to 10.01.0472.

Compatibility issues Firmware is Appliance model-specific. Release Version Number Version 10.01.2 Build 059 Version 10.01.2 Build 065 Applicable To Cyberoam Appliance Model All Cyberoam Appliance models Only to CR15i and CR15wi

Version 10.01.2 Build 059 release is not compatible with the Cyberoam Central Console (CCC) Release V 02.00.1 Build 016. Version 10.01.2 Build 065 release is compatible with the Cyberoam Central Console (CCC) Release V 02.00.1 Build 016. CCC does not support Cyberoam UTM deployed in HA (High Availability) mode. Please always check http://docs.cyberoam.com for availability of latest CCC firmware to deal with this compatibility issue.

IntroductionThis document contains the release notes for Cyberoam Version Version 10.01.2 Build 059. The following sections describe the release in detail. This release comes with new features and enhancements to improve quality, reliability, and performance.

Features1. Unicast Routing Support in GRE From this version onwards, the Cyberoam GRE Tunnels will support both unicast and multicast traffic. Previously, only multicast traffic was supported. CLI Commands 1. Command: cyberoam gre route add net tunnelname To add a GRE route, connecting a network via a GRE tunnel. E.g: cyberoam gre route add net 3.3.3.0/255.255.255.0 tunnelname Elitecore 2. Command: cyberoam gre route add host tunnelname To add a GRE route, connecting a host via a GRE tunnel. E.g: cyberoam gre route add host 192.168.10.2 tunnelname Elitecore 3. Command: cyberoam gre route delete net tunnelname To delete a GRE route connected to a network via a GRE tunnel. E.g: cyberoam gre route delete net 3.3.3.0/255.255.255.0 tunnelname Elitecore 4. Command: cyberoam gre route delete host tunnelname To delete a GRE route connected to a host via a GRE tunnel. E.g: cyberoam gre route delete net 192.168.10.2 tunnelname Elitecore 5. Command: cyberoam gre route show To see all the networks and hosts with respective GRE tunnels.

Enhancements1. SSLVPN Client Access From this version onwards, user will not require administrative rights to access SSLVPN client application. However, these rights are needed to install SSL VPN client application. Prior administrative rights were needed for both.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

9/409

//

Cyberoam Docs

2. HTML Support on Captive Portal for Unauthorized Users When an unauthorized user starts web browsing, he will be provided with HTML link (http://) if it is configured in custom message along with Access Denied message. On accessing the link, user will be prompted to provide login credentials to start web browsing. Alternately, the unauthorized user may start web browsing by manually logging in the captive portal by providing the URL (http://). Prior when an unauthorized user attempted to browse, Access Denied message was displayed as there was no configurable HTML link support and needed manual intervention by the administrator.

3. Manual Signature Update From this version onwards, the user can manually update the Cyberoam signature databases for Anti Virus, IPS, Web Category modules. This enhancement facilitates users, especially those who do not have direct Internet access, to manually update the Cyberoam signature modules. Updates on latest signature version for Anti Virus, IPS, Web Category modules will be available on http://csc.cyberoam.com. Updating IPS module shall update both, IPS signatures and Application signatures; however their firmware version number shall differ. To upload and update the signatures, System Maintenance Updates Manual Signature Updates.

4. Gateway wise Data Transfer Graphs Cyberoam now facilitates administrator to view Gateway wise Data Transfer graphs. These graphs shall provide following data transfer information: 1. 2. 3. Upload Data Transfer Download Data Transfer Total Data Transfer

The user can choose the time period for which he wants to see the graphs. The available options for the time period are as following: 1. 2. 3. Last Week Last Month Custom (Minimum 7 Days, Maximum 30 Days)

The data shall be available only for last six (6) months. By clicking Show Button, the user can also view the live data updated every one (1) minute. This can be accessed from Network Gateway Manage.

5. Hit Count in Mail Summary Reports From this version onwards, the Mail Summary Reports provides information regarding number of hits for each application. Prior, Mail Summary reports provided information of data transfer in bytes. This can be accessed from Web Admin Console Report Main Dashboard (Cyberoam - iView) Mail Traffic Summary.

6. SNMP Manager Port From this version onwards, default SNMP Manger Port 161 shall be displayed on Web Admin Console. Prior, SNMP Manager Port field by default appeared blank. This can be accessed from System SNMP Agent Configuration.

Behavior Change1. Customized SMTP Scanning From this version onwards, SMTP scanning by default will be in disable mode for General Internet Policy from Cyberoam Wizard. The user may choose to enable scanning of the SMTP traffic using by customizing the Firewall Rule. Prior, by default SMTP scanning was in enable mode.

Bugs Solveddocs.cyberoam.com/print.asp?id=49&Lang=1&SID= 10/409

//For Version 10.01.2.065 Backup & Restore

Cyberoam Docs

Bug ID 7162 Description Administrator is unable to download the backup file, if 15i Appliance backup is restored to 25i. VPN Bug ID 7420 Description Internet access via IPSec Tunnel from a remote office stops on upgrading Appliance from Version 10.01.1 Build 739 to Version 10.01.1 Build 023. Anti Spam Bug ID 6995 Description In Anti Spam, it is possible to import address groups however, domains cannot be imported. GUI Bug ID 7065 Description The word protocol is misspelled as ptotocol in log viewer for deny unknown protocol.

Bug ID 7470 Description Erroneous CPU usage graph is displayed on GUI. Firewall Bug ID 7142 Description Cyberoam allows selecting a virtual host service while creating a firewall rule even if the virtual host is not selected Bug ID 7016 Description There shall be one way voice on establishing a VoIP call from inside to outside using a Cisco ATA that is registered with public call manager. Bug ID 7471 Description Incorrect Upload & Download data usage displayed in firewall rule page in GUI. Proxy Bug ID 7366 Description Few webpages of websites "Ebay.co.uk" cannot be opened with direct proxy Bug ID 7483 Description Few tabs available on website www.mca.gov.in and http://www.tcs-itontap.com do not function when Appliance is configured as a direct proxy. VPN Bug ID 7544 Description An IPSec route does not get deleted from CLI and an error message is displayed, if the IPSec tunnel name is more than 32 characters.

For Version 10.01.2.065 Wireless LAN Bug ID 7080 Description On rebooting the Cyberoam, access point key is to be re-entered within Wireless LAN configuration, if parameter "Security Mode" is configured as "None" for one of the multiple WLAN's.

1.1.2.4. V 10.01.1 Build 023, 027Release Dates Version 10.01.1 Build 023 06th September, 2011 Version 10.01.1 Build 027 14th September, 2011

Release InformationRelease Type: Maintenance Release Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license Applicable to: V 10.01.0472 or V 10.01.0474 or V 10.01.0620 or V 10.01.0665 or V 10.01.0667 or 10.01.0 Build 674 or 10.01.0 Build 678 or 10.01.0 Build 739 Migrate Procedure To migrate from Version 9 to Version 10, please follow the link Migrate Cyberoam Appliance from Version 9 to Version 10.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

11/409

//Upgrade procedure

Cyberoam Docs

For: V 10.01.0472 or V 10.01.0474 or 10.01.0620 or 10.01.0665 or V 10.01.0667 or 10.01.0 Build 674 or 10.01.0 Build 678 or 10.01.0 Build 739 1. 2. 3. Logon to https://customer.cyberoam.com Click Upgrade URL link, select the appropriate option and follow the on-screen instruction. High Availability feature included in this upgrade is a GA feature.

For Cyberoam versions prior to 10.01.0472: Upgrade in two steps: Upgrade the Cyberoam to 10.01.0472 using Version 10 to Version 10 available on customers My Account. Upgrade Cyberoam to 10.01.1 Build 023. By doing this the customer will not be able to roll back to version prior to 10.01.0472. Compatibility issues Firmware is Appliance model-specific. Release Version Number Version 10.01.1 Build 023 Version 10.01.1 Build 027 Applicable To Cyberoam Appliance Model All except CR15i and CR15wi Only to CR15i and CR15wi

Both these version releases are not compatible with the Cyberoam Central Console Release V 02.00.0 Build 096 CCC does not support Cyberoam UTM deployed in HA (High Availability) mode.

IntroductionThis document contains the release notes for Cyberoam Version 10.01.1 Build 023 and Cyberoam Version 10.01.1 Build 027. The following sections describe the release in detail. This release comes with new features and enhancements to improve quality, reliability, and performance.

Features1. Hardware Monitoring Cyberoam now supports hardware monitoring using threshold level for fan speed, CPU and system temperature. A sensor is deployed to continuously monitor and provide the data of respective hardware. By turning on Hardware Monitoring, at a regular time interval of one minute, temperature and fan speed can be tracked using CLI commands. A notification in form of logs shall be generated when any of the hardware devices breach the threshold level. The system report can be viewed from event viewer and local iView. For CR15i, a log notification shall be coupled with alarm (beep). The default configurations are: 1. 2. 3. 4. Hardware monitoring = ON Maximum System /CPU Temperature Limit = 70C (degree Celsius) Hysteresis Limit = 65C Minimum Fan Speed Limit = 6000 RPM

CLI Commands 1. 2. Turn hardware monitoring on/off Show current sensor settings and data.

console> cyberoam diagnostics hardware-monitoring on/off console> cyberoam diagnostics hardware-monitoring show-sensor-data Known Behavior When any threshold is breached an alert will be generated by turning on an alarm. This alarm will only turn off when the threshold limit falls below hysteresis limit. E.g. Considering the above mentioned default configuration, if the CPU and system temperature rises above 70C, an alarm is generated. This alarm will continue to remain ON until the temperature falls below the hysteresis limit i.e. 65C.

1.

This feature is available only for following Appliance:

15i, 15wi, 25ia, 35ia, 25wi, 35wi 2. Hardware monitoring will not be supported in HA Deployment

2. Watermark Threshold Cyberoam now supports Disk Usage Watermark Threshold for monitoring resources. Earlier only an alert log was displayed when the disk usage went above the threshold. However the Reporting was not disabled and it resulted in 100% disk usage. With Watermark Threshold feature, when a hard disk is utilized beyond the configured threshold an alert log shall be generated in the log viewer. Prior, only a fixed

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

12/409

//

Cyberoam Docshigher threshold level was available for disk usage. Adding Watermark Threshold feature to Disk Usage shall now allow configuring lower threshold level. There shall be a fixed higher threshold level for the resource usage. The default configurations are: 1. 2. Lower Threshold = 80% Higher Threshold = 90%

Conditions for alerts: Action Utilization Below lower threshold Between lower threshold and upper threshold Between lower threshold and upper threshold for continuous12 hours Above upper threshold Above upper threshold for continuous12 hours Drop from upper threshold to below lower threshold

Reporting ON

Alert Log

Reporting OFF

* *

* - Reporting will start only when data is manually purged and disk utilization level falls below lower threshold.CLI Commands for Lower Threshold 1. 2. 3. Command: Set report-disk-usage watermark Command: Set report-disk-usage watermark default Command: Show report-disk-usage watermark

Sets the lower watermark to the given value (must be between 60-85) Sets the lower watermark to the default value (80) Show the current value of lower watermark

3. HTML Support for Captive Portal and Web Filter Messages This version onwards, Cyberoam Appliance now supports HTML tag inputs for Customized Denied Message on Web Filter and Custom Message on the Captive Portal Settings. This HTML enhancement will provide links using anchor tag and images using .img tag. To use this feature, for Custom Denied Massage in Web Filter go to Web Filter Settings Denied Message. To use this feature, for Custom Message in Captive Portal Settings go to Identity Authentication Firewall Custom Message.

4. Applications and Blocked Attempts Report Cyberoam iView now provides two new reports, viz. Applications and Blocked Attempts reports. A snapshot of various applications accessed by users will be provided by the Application reports. It also gives information on the applications bandwidth usage. This identification will help in fine tuning Internet access policies to ensure optimum bandwidth utilization. Blocked attempts reports provide a snapshot of denied application access attempts. These report aids the administrator to observe the users Internet behavior and take remedial measures. These reports can be viewed from 1. 2. Logs & Reports View Reports Reports Applications Logs & Reports View Reports Reports Blocked Attempts

5. Group Level Dashboards Cyberoam iView now provides individual dashboard for all report groups in widget format. You can drill down the widget report to view next level reports. This can be accessed from Logs & Reports View Reports Dash Boards

6. Pie Charts and Graphs Cyberoam iView now provides Mail and Web Usage Pie Charts and Graphs.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

13/409

//

Cyberoam Docs

Enhancements1. New Widgets in Cyberoam iView Main Dashboard Two new widgets are added to the Cyberoam iView main dashboard. 1. 2. Application Allowed: Displays a list of allowed applications along with number of connections and amount of data transferred by that application. Application Denied: Displays a list of denied applications along with number of connections.

This can be accessed from Logs & Reports View Reports Dash Boards

2. Manual Purge The Cyberoam iView manual purge feature has been optimized to aid its performance The administrator can purge all log data or customize the date range to purge the log data manually. Select purging criteria as Custom and then From and To month from the calendar control to purge the selected report logs. This can be accessed from Logs & Reports View Reports System Configuration Manual Purge

3. Data Management From this version onwards, the administrator can set retention period for Applications and Blocked Attempts logs. Retention period can be set from 1 month to 1 year as per the compliance requirements. This can be accessed from Logs & Reports View Reports System Data Management

4. Anti Spam and Anti Virus Search Reports From this version onwards, three more columns will be displayed in antivirus and anti spam search reports: 1. 2. 3. Rule: Spam or Virus rule applicable to the email Ref ID: Reference ID associated with the email Action: Action (accept /deny/ drop) against mail defined by the user.

This additional information aids in troubleshooting.

5. Unauthorized User Traffic Discovery for CTAS From this version onwards, it is possible to configure the time out value for Unauthorized User Traffic Discovery in CTAS deployment. Earlier, this value was fixed to 120 seconds. Once the Unauthorized User Traffic Discovery Time is up, an authentication page will be displayed. The time out value can be configured even if CTAS is disabled. In this case, whenever the CTAS is enabled, the configured value will come in effect. The configurations values are: 1. 2. Default - 120 seconds Range 1 120 seconds

CLI Commands 1. console> cyberoam auth cta unauth-traffic drop-period /default

Behavior Change1. IPS In case 10.01.1.build 023 is rolled back to Version 10.01.0 Build 739 then the IPS services will start either when its signatures are auto upgrade or a manual upgrade is done.

Bugs SolvedAnti Spam Bug ID 6691 Description When there are multiple rules for RBL verification of a mail IP Address, on verification with the first rule, the next rule is skipped. For example, there are two rules of RBL verification: 1. Verify against Premium RBL group 2. Verify against Standard RBL group. In this case, Cyberoam only verifies with the Premium group. On being validated, the Standard group rule will be skipped. CLI

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

14/409

//

Cyberoam DocsBug ID 6771 Description If the packet size of ping6 is greater then 1453, then administrator fails to receive the ping6 response. Firewall Bug ID 6773 Description Web filter policy is not applied for authenticated users when LAN Local firewall rule is configured. Bug ID 6937 Description Firewall rule fails if the configured SNAT policies are greater than 255. GUI Bug ID 7035 Description The word resource is misspelled as reosurce in SSLVPN logs. High Availability Bug ID 6852 Description VPN traffic in HA deployment gets load balanced, due to which it gets disrupted. Bug ID 6722 Description Administrator can enable HA, even though monitoring interface are not connected on auxiliary machine. A message one or more monitored ports are disconnected on Aux appliance is displayed. Log Viewer Bug ID 5778 Description The Signature Update page displays Successfully On, while the Log Viewer page displays AV definition upgrade failed if Cyberoam has the latest antivirus definition and the user tries to update it. Network Interface Bug ID 6941 Description Geographical configuration for WLAN is required to be updated manually once upgrading from Version 472 to Version 739 and beyond. Bug ID 7033 Description Modem Huawei EC 156 HSIA is not supported. Proxy Bug ID 5151 Description When IM scanning is enabled, chatting through Windows Live Messenger 2011 is not supported. Bug ID 6926 Description The website http://www.imi.edu/index.php/placements/studentsearch cannot be opened if Allow All Web Filter Policy is configured. Bug ID 6883 Description Chat messages are not displayed properly in Log Viewer for IM. Bug ID 6810 Description HTTPS sites cannot be accessed if Parent Proxy is configured in Cyberoam and direct proxy is configured in the client browser. Bug ID 7079 Description Report Notification is not allowed for custom report group. Report Bug ID 6551 Description In case of HA, Iview data management configuration does not get synchronized between the primary and the auxiliary appliance. Bug ID 6887 Description Manual purge and Data management option in On-Appliance iView does not get displayed if 4-Eye Authentication is enabled from Logs and Reports. Bug ID 7074 Description On-Appliance iView displays only the current day Top File upload report. User Bug ID 6878 Description Incorrect web surfing policy is applied to a CTAS authenticated user in DHCP enviroment. Bug ID 6946 Description Cyclic data transfer policy does not reset if it is configured as 2GB for CTAS and HTTP Client with "Keep Alive" disable. Bug ID 7066 Description Usernames are case sensitive in case of PPTP users with MSCHAP-V2. VPN Failover Bug ID 6640 Description On VPN tunnel failover/failback, tunnel does get reconnected however data cannot be transferred for TCP based applications.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

15/409

//VPN

Cyberoam Docs

Bug ID 4994 Description Preshared key cannot be changed if there are more than one Road Warrior connections. Bug ID 6661 Description A single host can be added multiple times in VPN local subnet. Bug ID 5389 Description All characters except double quotes () are supported for preshared key. VX - VX Migration Bug ID 6603 Description On migrating from Version 472 to Version 667, if initialization of database service is delayed, then migration scripts flushes the reports.

1.1.2.5. V 10.01.0 Build 739Release Dates Version 10.01.0 Build 739 29th June, 2011

Release InformationRelease Type: Maintenance Release Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license Applicable to: V 10.01.0472 or V 10.01.0474 or V 10.01.0620 or V 10.01.0665 or V 10.01.0667 or 10.01.0 Build 674 or 10.01.0 Build 678 Migrate Procedure To migrate from Version 9 to Version 10, please follow the link Migrate Cyberoam Appliance from Version 9 to Version 10. Upgrade procedure For: V 10.01.0472 or V 10.01.0474 or 10.01.0620 or 10.01.0665 or V 10.01.0667 or 10.01.0 Build 674 or 10.01.0 Build 678 1. Logon to https://customer.cyberoam.com

2. Click Upgrade URL link, select the appropriate option and follow the on-screen instruction. 3. High Availability feature included in this upgrade is a GA feature. For Cyberoam versions prior to 10.01.0472: Upgrade in two steps: Upgrade the Cyberoam to 10.01.0472 using Version 10 to Version 10 available on customers My Account. Upgrade Cyberoam to 10.01.0 Build 739. By doing this the customer will not be able to roll back to version prior to 10.01.0472.

Compatibility issues Firmware is Appliance model-specific firmware. Hence, firmware of one model will not be applicable on another model and upgrade will not be successful. You will receive error if you are trying to upgrade Appliance model CR100i with firmware for model CR500i. This version release is not compatible with the Cyberoam Central Console V 02.00. 0 build 083. CCC does not support Cyberoam UTM deployed in HA (High Availability) mode.

IntroductionThis document contains the release notes for Cyberoam version 10.01.0 Build 739. The following sections describe the release in detail. This release comes with new features, few enhancements and several bug fixes to improve quality, reliability, and performance.

Features & Enhancements1. GRE Tunnel Support From this version Cyberoam supports Generic Routing Encapsulation (GRE) VPN tunneling protocol. It is used to encapsulate multicast traffic like OSPF, BGP, and RIPV2. Multicast applications like video, VoIP, and streaming music applications use GRE Tunneling. From CLI Command the administrator can: Add a GRE tunnel: cyberoam gre tunnel [add {[name tunnel-name] [{localgw remotegw }] localnet remotenet } Show the list all the GRE tunnels: cyberoam gre tunnel show

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

16/409

//Set the TTL for GRE tunnel:

Cyberoam Docs

cyberoam gre tunnel [set {[name tunnel-name] [ttl]}] Set the state of GRE tunnel: cyberoam gre tunnel [set {[name tunnel-name] [state-up/down]}] Delete a GRE tunnel: cyberoam gre tunnel delete [ [name tunnel-name] [ {local-gw remote-gw }]] or cyberoam gre tunnel [delete {[name tunnel-name]}] or cyberoam gre tunnel [delete {[ALL]}] Check the status of a GRE tunnel: cyberoam gre tunnel show [ [name tunnel-name] [ {local-gw remote-gw }]]

2. Search in Cyberoam iView This release includes following enhancements in Search functionality of Cyberoam iView, ensuring complete network visibility. Virus From this version onwards, the user can search Virus logs for following Web and file transfer protocols, along with mail protocols (SMTP, POP3, and IMAP):HTTP

HTTPS FTP Use Search --> Virus to search Virus logs in the reports. FTP From this version onwards, the user can search FTP logs to retrieve a summary of file transfer activities within the organizations network. This helps the administrator to fine-tune Internet access policies thereby preventing leakage of critical business information. The search can be performed on the bases of file transfer type (download/upload), user or file name. Search results will be displayed in tabular format, containing the IP Address of client and server machine, the amount of data transferred and the direction of data transfer. Use Search --> FTP to search summary of file transfer within FTP logs.

3. Backup-Restore in Cyberoam iView From this version onwards, system configuration backup taken from System Maintenance --> Backup & Restore will include backup of Bookmarks, Custom Views and Report Notifications created on Cyberoam iView. Backup of Data Management section of Cyberoam iView is not included in this backup.

Improvements1. Report Optimization With this release, some of the report widgets are removed from Cyberoam iView to optimize report framework and avoid data redundancy since the same reports were available at multiple places. Please refer to Appendix for the list of removed reports. 2. Menu Rearrangement This release of includes following Menu rearrangements in Cyberoam iView GUI to enhance the user experience. Search Search menu is now available after Dashboards menu in navigation pane. Calendar Control Time selection option in calendar control is removed from Report pages. Now only the date range can be set to generate reports. However, this option is available on all Search pages. Dashboard Widgets As per the frequency of usage, sequence of report widgets is changed on main dashboard of Cyberoam iView. Now Mail Traffic Summary widget and User Surfing Pattern widget are available next to Top Web Users widget.

Behavior Change1. iView Archived Logs

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

17/409

//

Cyberoam DocsTo optimize performance and reduce data redundancy, archiving in On-Appliance Cyberoam iView is discontinued. The network traffic information with timestamp can be obtained either using Search option provided in navigation panel or from leaf level reports. 2. Dashboard Alerts During a successful Cyberoam upgrade, if the reporting migration fails the On-Appliance reporting gets turned off with an appropriate notification on the dashboard.

Bugs Solved9X to V10 Data Migration Bug ID 6611 Description On migrating from Version 9 to Version 10, groups are not displayed if login restriction parameter value of Web Admin Console and internal database do not match. Backup & Restore Bug ID 6554 Description Upgrading Cyberoam from version 10.01.0472 to 10.01.667 fails, if user email id starts with _ and ends with .. Anti Spam Bug ID 6667 Description Erroneous entry in RBL domain results in disruption of mail traffic. Certificate Bug ID 6443 Description A certificate in SSL VPN configuration cannot be selected or SSL VPN services become inoperative on migrating from Version 9 to Version 667. Firewall Bug ID 6355 Description Appropriate message does not get displayed when the traffic bypasses the firewall rule because the precedence of appliance access is higher than the system firewall rule. Bug ID 6116 Description Host/host group with a special character hyphen - cannot be added in firewall rule. Bug ID 6137 Description While uploading a large size file FTP connection terminates if no acknowledgement from the FTP server is received in 5 minutes. GUI Bug ID 3070 Description A message Too Many Connections Please Try After Some Seconds. is displayed randomly while navigating through the Web Admin Console. Bug ID 5145 Description On-Screen help for extensions required for certificate and certificate authority are not provided. Bug ID 6433 Description A user from road warrior X-Auth is not displayed in allowed user list in spite of being selected to be allowed. Bug ID 6524 Description Graph is not displayed on Web Admin Console, if VLAN configured on the gateway interface. Bug ID 6446 Description In Log viewer, the filter for message id is not available for IPS component, while it fails to respond in case of Firewall and Antispam. Bug ID 6321 Description Dashboard icon will not be displayed within the Icon Bar while using Internet Explorer 9. Bug ID 6542 Description Administrator cannot add more than 97 hosts in host group. Bug ID 6738 Description In case of V9 V10 migration in 25i appliance, the dashboard alert messages displays vrmodule expired since User License Period does not contain date value. High Availability Bug ID 5556 Description Applications that work on multicast traffic are disrupted in HA deployment. Bug ID 6697 Description In HA deployment, Antivirus service stops if signature db and config db are reset. Import Export Bug ID 5683 Description Administrator cannot import users beyond the recommended limit for the respective appliance. The recommended limit for each appliance is as follows:

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

18/409

//

Cyberoam DocsAppliance CR15i, CR15wi, CR50ia, CR100ia ,CR35ia, CR25ia, CR35wi, CR25wi, CR100i, CR50i, CR25i CR250i, CR300i, CR200i CR1500i, CR1500ia, CR500i, CR1000i, CR500ia, CR750ia, CR1000ia Others, if exists Log Viewer Bug ID 5362 Description Some web surfing details does not appear in the Cyberoam-iView reports. Network Interface Bug ID 6301 Description Novatel Wireless Ovation MC950D USB HSPA Modem fails to connect to Internet. Bug ID 6122 Description VPN tunnel connectivity gets disrupted if MTU/MSS value is updated on the LAN interface. Proxy Bug ID 4103 Description When IM scanning is enabled and more than 5000 login requests are received, the users are not able to logon to Microsoft Windows Live Messenger and IM reports are not generated by Cyberoam iView. Bug ID 5730 Description When HTTPS scanning is enabled, http://fmcdealer.com fails to display all the widgets on the site. Bug ID 6685 Description When scanning is enabled and If HTTP response does not include the Content Length parameter then the appliance becomes unresponsive. Bug ID 6503 Description If HTTPS scanning is enabled, user tries to log in www.costco.com then the browser displays a blank page for Mozilla/Chrome and a message Page cannot be displayed. for Internet Explorer. Bug ID 6615 Description The Honda Web application fails to open when Web Filter policy or HTTP scanning are applied. Bug ID 6631 Description Oracle web based application fails to respond if Web Filter policy is configured or HTTP scanning is enabled. Bug ID 6734 Description Ubuntu upgrade fails, if Web Filter policy or HTTP scanning is enabled. Bug ID 6302 Description CCTV Application cannot be accessed if Web Filter policy is enabled. Bug ID 6263 Description Browsing slows down or stops, if the number of HTTP session crosses the threshold level. QoS Bug ID 6126 Description When a strict bandwidth policy for upload/download is configured, FTP upload stops if HTTP download is started simultaneously. Reports Bug ID 5647 Description Cyberoam-iView Search reports do not provide time stamp. Bug ID 6391 Description Configured bookmark are lost on flushing the Appliance reports. Bug ID 6550 Description Confirmation message is not received on updating Cyberoam-iView Data Management page. Bug ID 3214 Description Service Temporary Unavailable message is displayed randomly while accessing Web Admin Console. Bug ID 6720 Description Cyberoam-iView reports for any day of the previous month are generated for the entire day, irrespective of the configured time. Bug ID 6507 Description Previous months reports cannot be manually purged in Cyberoam-iView. Bug ID 6458 Description Manual purge option deletes entire months reports starting from the upper limit of the month selected in the date range. Bug ID 6534 Description PDF File of web surfing report for a particular user cannot be exported due to non-English characters present in URLs accessed by the user. Bug ID 6295 Description Used time in Date wise summary is displayed incorrectly in Cyberoam-iView. Recommended number of Users 500 1000 1500 500

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

19/409

//Schedule Backup

Cyberoam Docs

Bug ID 6037 Description The alert message for scheduled backup is not displayed on Web Admin Console. SSL VPN Bug ID 4974 Description SSL VPN web application access mode cannot be accessed if SSL VPN certificate at server end and client end are not identical. Bug ID 6184 Description SSL VPN (Full Tunnel Mode) misbehaves when the user tries to re-login.. Time Settings Bug ID 6282 Description The NTP Server custom configuration is lost if the Administrator tries to synchronize with pre-defined configuration. User Bug ID 6655 Description A user is not allowed to login If a login password contains special characters & and +. Bug ID 6296 Description The Corporate Client does not work, if the user password length is more than 21 characters. Bug ID - 6276 Description - Inactivity timeout does not function properly. For E.g. If the idle timeout is set to 30 minutes and the user logs in at 16th minute then, access server checks the idle timeout at 30th minute and user gets logged out in 15 minutes. VPN Bug ID 6043 Description Authentication details are mandatory to create a VPN policy for Manual Keying method. Bug ID 5389 Description If pre-shared key includes special character like single quote (), hash (#), double quotes () IPSec connection cannot be updated. VPN L2TP Bug ID 6472 Description L2TP VPN tunnels does not get established if a firewall rule to accept all services for VPN to Local rule is created. Web Filter Bug ID 6683 Description The top and bottom images of custom denied message are interchanged.

Appendix The report widgets are removed from Cyberoam iView are listed below: 1. 2. 3. 4. 5. Top URLs from Web Usage and Blocked Web Attempt reports Top Applications Detailed Attack report Archives Web Usage a. Top Web Usersi. ii.

Top Applications Top Contents

b. Top Web User Groupsi. ii.

Top Applications Top Contents

c.

Top Categoriesi.

Top Contents

d. Top Domainsi.

Top Contents

e.

Top Contentsi. ii.

Top Domains Top Categories

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

20/409

//

Cyberoam Docs

f.

Top Web Hostsi. ii.

Top Applications Top Contents

g. Top Applications 6. Blocked Web Attempts a. Top Denied Web Usersi.

Top Applications

b. Top Denied Web Hostsi.

Top Applications

7.

Mail Usage Report a. Top Mail Sendersi. ii. iii. iv.

Top Source Hosts Top Destination Top Applications Top Users

b. Top Mail Recipientsi. ii. iii. iv.

Top Source Hosts Top Destination Top Applications Top Users

c.

Top Mail Usersi. ii. iii.

Top Source Hosts Top Destination Top Applications

d. Top Mail Hostsi. ii. iii.

Top Users Top Destination Top Applications

e.

Top Mail Applicationsi. ii. iii.

Top Hosts Top Destination Top Users

8.

Anti Spam a. Top Spam Sendersi. ii. iii. iv.

Top Source Hosts Top Destination Top Applications Top Users

b. Top Spam Recipientsi. ii. iii. iv.

Top Source Hosts Top Destination Top Applications Top Users

c.

Top Applications used for Spami. ii. iii.

Top Source Hosts Top Destination Top Applications

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

21/409

//9. Top Attacks a. Severity wise break-downi. ii.

Cyberoam Docs

Top Dropped Attacks Top Detected Attacks

1.1.2.6. V 10.01.0 Build 674, 678Release Dates Version 10.01.0 Build 678 6th June, 2011 Version 10.01.0 Build 674 21st May, 2011

Release InformationRelease Type: Maintenance Release

Release Details: Till version 10.01.Build 0667, the format of the display version was 10.ab.Build 0xyz. From Version 10.01.0 Build 674 onwards, the displayed version will be in the format 10.ab.c build xyz, for example here it is 10.01.0 Build 674 where: 10: Represents architectural release 01: Represents major feature release 0: Represents minor enhancements release 674:Represents Build number For to How To - Get Cyberoam UTM Product Version Information for further information. Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license

Applicable to: CR15i with V9.5.8.68 and all other Cyberoam models with V9.6.0.78 (Valid for Version 10.01.0 Build 674). V10.01.0472 or V10.01.0474 or V10.01.0620 or V10.01.0665 or V10.01.0667 Upgrade procedure For: 10.01.0472 or 10.01.0474 or 10.01.0620 or 10.01.0665 or 10.01.0667 or 10.01.0 build 0674: Logon to https://customer.cyberoam.com Click Upgrade URL link, select the appropriate option and follow the on-screen instruction.

For Cyberoam versions prior to 10.01.0472: Upgrade in two steps: Upgrade the Cyberoam to 10.01.0472 using version 10 to version 10 available on customer My Account. Upgrade Cyberoam to .01.0 Build 674. By doing this the customer will not be able to roll back to version prior to 10.01.0472. Compatibility issues Firmware is Appliance model-specific firmware. Hence, firmware of one model will not be applicable on another model and upgrade will not be successful. You will receive error if you are trying to upgrade Appliance model CR100i with firmware for model CR500i.

Bugs Solved Build 678 Antivirus Bug ID 6651 During Antivirus signature updates, under specific internal conditions of SMTP configuration, significant increase in system load leads to high memory usage. Build 674 Antivirus Bug ID 5615 Description If Antivirus key expires, it results in high CPU utilization.

VPN Certificate Bug ID 6443 Description SSL VPN service stops on migrating from V9 to V10 due to which certificate in SSLVPN configuration cannot be selected. If the SSL VPN services have stopped on upgrading to Version10, reset the appliance to its factory settings and restore the backup. The services will resume.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

22/409

//

Cyberoam Docs

DDNS Bug ID 6200 Description In case of NATed deployment, when the DDNS server does not respond, the Cyberoam DDNS does not get updated.

GUI Bug ID 6321 Description The dashboard icon was misaligned in IE8 and IE9 in CR15wi. The issue has been solved for default theme.

IPS Bug ID 6312 Description Large number of application configuration in a policy affects the IPS functionality. Bug ID 6360 Description On disconnecting the PPPoE link is required to be enabled manually via Web Admin Console. Bug ID 6559 Description Ultrasurf application is not blocked.

LAN bypass Bug ID 6454 Description LAN bypass does not work with CR50ia and 100ia.

Migration Bug ID 6445 Description Username containing @ without a top level domain (e.g. .com, .net, .edu) results in configuration migration failure.

Proxy Bug ID 6322 Description With Antivirus unsubscribed and is in real scanning mode then under specific server behavior, the web server sites with domain such as .pk, .ch, .be, etc do not display the contents of the sites properly.

SNMP Bug ID 6369 Description A message Client Port having same port number already exists, choose a different port number." is displayed on configuring 161 as Manager Port in SNMP configuration.

User Bug ID 4266 Description When external server is not reachable and authentication servers internal queue is full, user cannot login and a message Server Busy is displayed. Bug ID 6111 Description Upload and download columns in My Account are displayed as download and upload columns respectively in on-appliance iView report. Bug ID 6459 Description When cyclic data transfer policy is configured for day light saving time zone, the daily data transfer policy does not reset.

VX VX Migration Bug ID 6309 Description Configuration migration fails while upgrading to Version 10.01 build 667, if the difference between PPPoEs MTU and MSS value is not 48. The system then boots up with the factory default settings.

1.1.2.7. V 10.01 build 0667Release Dates Version 10.01 Build 0667 16th April, 2011

Release InformationRelease Type: General Availability Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license Applicable to: CR15i with V 9.5.8.68 and all other Cyberoam models with V 9.6.0.78. V 10.01.0472 or V 10.01.0474 or V 10.01.0620 or V 10.01.0665

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

23/409

//

Cyberoam DocsUpgrade procedure For: V 10.01.0472 or V 10.01.0474 or 10.01.0620 or 10.01.0665: Logon to https://customer.cyberoam.com Click Upgrade URL link, select the appropriate option and follow the on-screen instruction.

For Cyberoam versions prior to 10.01.0472: Upgrade in two steps: Upgrade the Cyberoam to 10.01.0472 using version X to version X available on customer My Account. Upgrade Cyberoam to 10.01.0667. By doing this the customer will not be able to roll back to version prior to 10.01.0472.

Compatibility issues Firmware is Appliance model-specific firmware. Hence, firmware of one model will not be applicable on another model and upgrade will not be successful. You will receive error if you are trying to upgrade Appliance model CR100i with firmware for model CR500i.

IntroductionThis document contains the release notes for Cyberoam version 10.01.0667. The following sections describe the release in detail. This release comes with new features, few enhancements and several bug fixes to improve quality, reliability, and performance.

Features & Enhancements1. Network Migration for Version 9x to Version 10x Prior to this release, on upgrading from Version 9.x to Version 10.x, the appliance used to go in factory reset mode and it lead to disruption in network connectivity. The administrator was required connect to the appliance locally to complete the migration process. From this version, the upgrade will restore the network configuration so that the migration process can be done remotely, without any local intervention.From this version Cyberoam provides full network migration (only network migration) from Version 9.x to Version 10.x except VLAN, all/any alias and zone.

Follow the below given steps to upgrade the appliance from version 9.x to version 10.x: 1. 2. 3. 4. Take the Ver. 9.x backup Go to http://v9migration.cyberoam.com Use online tool and migrate the Ver. 9.x backup to Ver. 10.x backup After upgrading from Ver. 9.x to Ver. 10.x, use the converted Ver. 10 backup to restore the network configurations

What will be restored? 1. 2. 3. 4. Interface IP Addresses Bridge and Route mode Interfaces HTTP, HTTPS and SSL VPN Ports PPPoE Interface configuration

What will not be restored? 1. 2. 3. 4. On migrating for Version 9.x to Version 10.01.0667, the DDNS configuration will not be preserved and the dministrator will not be able to access the appliance using the FQDN. Administrator has to manually configure the DDNS. Gateway names as assigned in Ver 9.x will not be restored. Name format will be like PortB_gw or DHCP_PortB_gw or PPPoE_PortB_gw. In case of bridge it will be Default. Gateway Failover Timeout Configuration Gateway weights

Migration Known Behaviour: Installing default config message will be displayed during migration All gateways will be converted to Active mode and default gateway failover rule will be applied. If originally an interface is unbound and an IP address is assigned then the configuration will not be migrated.

2. Restructured Reporting Framework To optimize performance and minimize database corruption, reporting framework is restructured. 3. MAC Cloning support From this version onwards, Cyberoam provides support to override the default MAC Address for the Interface. With this feature an ISP can clone a pre-existing MAC Address on an interface leading to a seamless installation of Cyberoam. On factory reset, it will be set again to the default MAC address.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

24/409

//

Cyberoam DocsThis functionality is not available for alias, VLAN, virtual interfaces, PPPoE, serial modem interface, dedicated HA link, Wireless LAN, Wireless WAN and bridge interface. Configuration Override the default MAC address of the Interface from Network > Interface > Edit Interface 4. Bandwidth Restructuring for Realtime Traffic From this version onwards, by default, highest priority will be given to the real time traffic and priority can be set from 0 (highest) to 7 (lowest) depending on the traffic required to be shaped. 0 Real Time e.g. VOIP 1 Business Critical 2 - Normal 3 - Normal 4 - Normal 5 Normal 6 Bulky e.g. FTP 7 Best Effort e.g. P2P However, if administrator does not want to set this preference, feature can be disabled using CLI command - set bandwidth allocation-behavior normal. If required, it can be enabled by CLI command - set bandwidth allocation-behavior realtime. If the bandwidth behavior is set to normal then priority will be applicable only for excess bandwidth i.e. bandwidth remaining after guaranteed bandwidth allocation. If the bandwidth behavior is set to realtime then Real-time traffic (QoS policy with priority 0) like VOIP will be given precedence over all other traffic. As priority is given to the real time traffic, it is possible that some non-real time traffic will not get their minimum guaranteed bandwidth. Specifically, if sum of burstable (max allowed) of all bandwidth policies (real time and non real time) is greater than total max-limit then guarantee of real time policies will be fulfilled but non-realtime might not get the minimum guaranteed bandwidth. On Factory Reset, all the traffic with QoS policy with priority 0 will be given Real Time priority. On migrating from any previous versions, by default, all the traffic will be given Normal priority. Any post-upgrade changes done from the CLI shall persist across all future reboots and firmware upgrades. 5. Automatic VLAN tagging From this version onwards, to scan the VLAN traffic, Cyberoam will automatically tag the VLAN traffic when Cyberoam is deployed as Bridge. In case of migration from previous versions where VLAN is already configured, vlan-learning will be in manual mode and VLAN IDs will be preserved. In this case, CLI VLAN Management menu will be visible, Administrator can enable auto learning mode through CLI command: console>cyberoam vlan-learning auto However, if the gateway is in VLAN then the Cyberoam originated traffic for the gateway can be tagged using CLI menu option 5 - VLAN Management menu. Administrator can check the vlan-learning mode with CLI command console>cyberoam vlan-learning show If required Administrator can toggle between auto and manual learning mode. To switch to manual learning mode use CLI command: console > cyberoam vlan-learning manual When Cyberoam is configured as a bridge without VLAN support in Version 10.01.0472 and 10.01.0474 which is subsequently upgraded to Version 10.01.0666 the tagging will be in Auto Mode. When Cyberoam is configured as a bridge with VLANs support in Version 10.01.0472 and 10.01.0474 and upgraded to Version 10.01.0666 the tagging will be in Manual Mode. 6. Central Security Control for multiple Cyberoam V 10 deployments (Cyberoam Central Console (CCC) Alpha release) Cyberoam Central Console (CCC) is a centralized integrated management and monitoring appliance that allows Enterprises and MSSPs to manage multiple, dispersed Cyberoam UTM deployments across remote / branch offices and clients respectively. The current version of Cyberoam will be compatible with the CCCs upcoming version 02.00.0062 (beta) which will be released shortly. Completely revamped product provides UI with Web 2.0 benefits and enhanced set of features including role based administration, multiple dashboards and centralized logging for monitoring and signature distribution server. For detailed feature set, please refer CCC datasheet. Configuration To manage Cyberoam through CCC, Administrator has to configure CCC IP address in Cyberoam from System > Administration > Central Console. 7. Enhancing Ease of Deployment On factory reset, now onwards, Cyberoam Network settings will be as follow: Port A (LAN)

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

25/409

//DHCP server running on Port A Lease range -172.16.16.17- 172.16.16.254

Cyberoam Docs

Gateway - Use Interface IP as Gateway. Gateway name changed from Default to DHCP_PortB_GW Conflict Detection enabled Use Appliance's DNS Settings Port B (WAN) IP Assignment - DHCP Client DNS - Obtain DNS from Server On Factory Reset from this version onwards, after a Factory Reset, Cyberoam will boot up in Monitor only mode. 8. Improved Wireless Security (for Wireless Appliances only) Cyberoam Wireless appliances now have capabilities to recognize and take countermeasures against the illicit wireless activities. Rogue Access Points (AP) are one of the most serious threats to wireless security. Any access point which is not authorized for use on a network is considered as rogue. They impose threats in a number of different ways including unintentional connections to the rogue device by the employees, transmission of sensitive data over non-secure channels, and unwanted access to LAN resources. Cyberoam can alleviate this weakness by recognizing rogue access points potentially attempting to gain access to your network. Cyberoam scans for the nearby access points and displays list of all the discovered APs. Administrator can then mark the APs as rogue or authorized. Configuration Go to Network > Wireless LAN > Rogue AP Scan and scan for nearby access points. From the discovered APs, mark AP as Rogue if it is not authorized to use the LAN resources, else mark it as Authorized.

9. Increased Security against Brute-force Attack To provide the increased security against the brute force attack, Cyberoam has implemented password complexity policy. Most organizations still use traditional passwords for authentication even when advance and alternative technologies, such as biometrics, and one-time passwords, are available. Therefore it is very important that organizations define and enforce password policies for their computers that include usage of strong passwords. Brute force attack is nothing but trying every possible combination to crack password which involves running through all the possible permutations of the keys until the correct combination is found. The time required for Brute force attack depends on the password length and used character set. Strong passwords meet a number of requirements for complexity - including length and characters - that make passwords more difficult for attackers to determine. Establishing strong password policies for your organization can help prevent attackers from impersonating users and help prevent the loss of sensitive information. Configuration Go to System > Administration > Settings and enforce Minimum Password length Password complexity: Require upper and lower case alphabets, require alphabetic, numeric, and special characters 10. Administrator Account Login Security For improved security and prevent unauthorized access, Cyberoam has extended its login security and included following features: Lock Administration Session Automatic Logout Lockout Administrator Account after number of failed login attempts Login Disclaimer Configuration Go to System > Administration > Settings and enable Admin Session locking and configure inactivity time. Administrator Session will be automatically locked after configured inactivity time. Administrator has to relogin to continue with the session. Automatic Admin session logout and configure inactivity time. Administrator will be logged out automatically after configured inactivity time. Administrator has to re-login. Specify number of failed login attempts allowed and seconds from the same IP address and lockout period. Administrator has to accept the login disclaimer to logon. Disclaimer can be customized as per the organization requirement from System > Administration > Messages page.

11. Administrator Profile based Access Controls Restrictions added for appliance access based on location (IP), time and day (application of pre-defined schedule) for user with authorized administrators profile. Now the Super Administrator can restrict how and where and when an administrator user can log in to and access Cyberoam. Configuration

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

26/409

//

Cyberoam DocsThis setting can be done from Identity > User > User. Administrator profile has to be selected and the setting are visible at the end of the page under Administrator Advanced Settings section.

12. Web Browser Lock Support Cyberoam has added Web Browser lock support to prevent unauthorized access to the user session. Administrators can directly lock their session from the Web Admin console, while for endusers, administrator can configure auto-logout on browser closure. For ease of use, Lock icon is provided on the icon bar on Web Admin Console. When someone tries access the locked page, warning message is displayed and is re-directed to login page. Configuration To configure the auto-logout for endusers, go to Identity > authentication > Firewall > Captive Portal Settings and enable Log out user on Browser close.

13. Support of DHCP over VPN The ability to tunnel DHCP over VPNs will allow network administrators to manage their entire IP address space from a central DHCP server. In other words, this feature is required in the networks where a centralized DHCP server is required to lease IP address to all the branch office, for their internal network from this DHCP server over VPN. As DHCP is a broadcast protocol, it will not cross network boundaries without additional configuration. This configuration is usually enabling DHCP relay on the devices between the network boundaries. It requires to configure DHCP Relay on the branch offices in which turn relays the DHCP clients request over VPN tunnel to DHCP server located at the headoffice. DHCP over VPN allows hosts behind a Cyberoam obtain an IP address lease from a DHCP server at the other end of a VPN tunnel. Configuration Create IPSec connection between Branch office(s) and Head office Configure DHCP Relay on Branch office(s) Configure DHCP server behind Head office 14. Data transfer threshold SSL VPN Tunnel Access SSL VPN tunnel is dropped automatically once the idle timeout has passed and user has have to reconnect. Connection is dropped even if the data transfer is going on through the connection. To overcome this problem, from this version, data transfer threshold support is provided. With this feature, once the idle timeout is reached, before dropping the connection, Cyberoam will check the data transfer. If data transfer is higher than the configured threshold, connection will not be dropped till the data transfer is complete. Configuration Go to VPN > SSL > Tunnel Access and set threshold value. Default 250 bytes Administrator can check the data transfer for the live connections from the VPN > Live Connections > SSL VPN Users page.

15. User Creation on VPN Login From this version user will be created automatically when he is externally authenticated by ADS / LDAP while using L2TP / PPTP / SSL VPN. The user should either be a part of the default group, or the ADS / LDAP /RADIUS should be tightly integrated with Cyberoam and access to L2TP / PPTP / SSL VPN should be allowed. 16. Special characters support in User name and Domain name From this version onwards, twelve (12) special character which include ~ ` ! @ # $ ^ - _ { } . will be supported in user names. 17. Multi-lingual support in Import Group Wizard Import Group wizard used to import all the Active Directory Groups into Cyberoam, now can be displayed in various languages that are supported by Cyberoam. Cyberoam supports Chinese simplified and traditional, French and hindi language. Wizard can be access from Identity > Authentication > Settings once AD is configured. Cyberoam IPSec Client will now work with Cyberoam only and not any other 3rd Party UTM appliances. 18. SSL VPN Tunnel Reports System Log will now record tunnel connection and termination (Login / Logout) events when established through SSL Tunnel Access mode. Log can be viewed from Log Viewer of Web Admin Console. - SSL VPN Report is added below the VPN Report - For Now, This Report shows Event of SSL VPN Connection for Tunnel Access Only. 19. Logs and Reports Admin log enhanced to include CLI events. Following CLI events will now be logged in Admin Log and can be viewed from Log Viewer of Web Admin Console:

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

27/409

//set set set set set set set set set set set set advance-firewall http_proxy network sslvpn on-appliance-reports proxy-arp ips service-param arp-flux bandwidth vpn port-affinity cyberoam cyberoam cyberoam cyberoam all-logs) cyberoam cyberoam cyberoam cyberoam cyberoam cyberoam cyberoam cyberoam cyberoam

Cyberoam Docsapplication_classification auth dhcp diagnostics (Without purge-old-logs & purgeha ips_autoupgrade ipsec_route ipv6 (Without neighbour) link_failover route_precedence shutdown system_modules wwan

Any event occurring through following CLI menus - Network Configuration - System Configuration - Cyberoam Management (without Flush Appliance Reports) - VPN Management (without Restart VPN Service) Two Top Hosts Reports added in Web Usage Report module Web Usage - Top Categories > Top Hosts Web Usage > Top Categories > Top Users > Top Hosts Signature Upgrade failure logs System Log will now record IPS, Webcat, AV upgrade failure events. Log can be viewed from Logs & Reports > Log Viewer > System

Improvements1. Deny Unknown Protocol Any unauthorized non-HTTPS protocol over port 443 can now be blocked from Web Admin Console. By default all unknown protocols over 443 are denied. 2. Allow Invalid Certificate The administrator can now allow an HTTPS connection even while using an invalid certificate. By default invalid certificate will not be allowed. Logs will also get added for appropriate indication if a site is denied due to both these settings in the log viewer. Configuration Both these options which were previously available in the CLI can now be accessed in the Web Admin Console from Antivirus > HTTP/S > Configuration. 3. Improved RBL Support Cyberoam now supports two (2) RBL (Realtime Blackhole List) domains which include zen.spamhaus.org and dnsbl2.uceprotect.net. This improvement will help enhance the spam delectation and elimination capabilities of the Anti-Spam feature of Cyberoam. Configuration This option can be configured from Anti Spam > Configuration > Address Group > Standard RBL Services. Behavior changes 1. Please refer to Features / Enhancements (3) and (5). 2. While configuring Cyberoam through setup Network Configuration Wizard, by default, HTTPS scanning is now OFF for all selected policies.Version- 9 Catchup Feature 1. Web Traffic Analysis Doclet on Dashboard - displays category-wise total hits and data transfer. Detailed report can be viewed by clicking the report link. 2. All V9 Alert messages on Dashboard for subscription expiry and other admin messages 3. Internet Usage details in MyAccount displays allotted, used and remaining data transfer quota. Month wise usage details display time spent and data transferred from each URL. Month wise usage details can also be filtered on IP address accessed. 4. The administrator can now have a better control over the disk by manual purging of the report data. This option can be accessed in the Web Admin Console from Logs & Reports > View Reports. This will open a new window. Here System > Configuration > Manual Purge. 5. Surfing Quota policy is more granular with minutes being displayed. It can be accessed from Identity > Policy > Surfing Quota. 6. Even when a single site is included in multiple categories, it can be searched now. It can be accessed from Web Filter > Category > Search URL.

Bugs SolvedCertificate Bug ID 4284 Description SSL VPN did not work when using third party certificate.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

28/409

//

Cyberoam DocsBug ID 5018 Description Self signed certificate cannot be applied to captive portal when accessed over HTTPS.

Cyberlite Bug ID 5614 Description Scheduled based policies fail to apply if a schedule is configured for the dates 29th and 30th of any month.

Bug ID 6168 Description The system auto upgrade stops and reports fail to generate, once the time is updated in accordance to Day Light Saving mode.Firewall Bug ID 3820 Description Firewall page does not open when number of users surpasses the recommended count which leads to high memory utilization. Bug ID 3300 Description If you are configuring a schedule period and a part of it has lapsed then firewall rule will be disabled. E.g. A schedule is configured for period 14.30 to 16.30 and current system timing is 15.00 than the firewall rule shall be disabled. GUI Bug ID 5381 Description On updating VLAN with zone as None, IP address is not updated and NA will be displayed on Manage Interface page. Bug ID 5333 Description Preview options is not provided in Web Filter Default denied Message Setting Bug ID 5444 Description Application category Gaming is incorrectly spelled as Gamig. HA Bug ID 5588 Description The administrator cannot flush the report database from the Auxiliary Appliance. Import - Export Bug ID 5916 Description When a file is rejected due to mismatch of password column header and type of password (plain / encrypted), a message HTTP 404 Page doesnt exist appears. IPS Bug ID 5248 Description When the IPS Signature search results into more than 2 signatures, it is not possible to disable multiple signatures simultaneously. Logs & Report Bug ID 4648 Description History of user's login and logout details is not displayed in MyAccount. Network Interface Bug ID 5316 Description .Distance value is not reflecting in static route. Same destination routes with different gateways cannot be added. Bug ID 5509 Description Once WWAN is enabled after creation of an IP Address based Virtual Host and then the WWAN cannot be disabled. PPPoE Client Bug ID 5607 Description User needs to update connection by providing username and password every time to reconnect a non standard PPPoE connection. Proxy Bug ID 5095 Description Windows 2008 server update does not work with HTTPS scan on. Bug ID 4017 Description Incase high number of configuration and multiple combinations in Web Filter policy the categorization does not work. Bug ID 5769 Description Youtube videos are not blocked as MIME type (video/x-flv) not included after denying default Audio and Video File Category. Bug ID 5644 Description With Web Filter policy, users can not access site 'www.vinsolutions.com' due to RFC incompatibility. Bug ID 5566 Description When the antivirus is configured to scan in real mode and the module is unsubscribed and Cyberoam is configured as direct proxy, a different website then the intended one, opens. Bug ID 5910 Description With connection via MPLS, users will not be able to connect tohttps://adpeet2.adp.com/52iu5e/logon and https://hip.chpw.org. Reports Bug ID 4052 Description Reports will not be displayed in iView and the appliance will go to Fail Safe mode in case of low disk space. User is required to flush the reports manually.

docs.cyberoam.com/print.asp?id=49&Lang=1&SID=

29/409

//

Cyberoam DocsBug ID 4940 Description A historical report taken on di