Cyberoam Version 10 04 0 Build 214
Cyberoam Version 10 04 0 Build 214
Cyberoam Version 10 04 0 Build 214
Release Notes
Release Dates
Version 10.04.0 Build 214 24th September, 2012
Release Information
Release Type: General Availability
Upgrade prerequisite: 24 x 7 OR 8 x 5 valid Support license
Applicable to Cyberoam Version:
V 10.01.0XXX or 10.01.X Build XXX
Upgrade procedure
To upgrade the existing Cyberoam Appliance follow the procedure below:
Logon to https://customer.cyberoam.com
Click Upgrade link under Upgrade URL.
Choose option Select for Version 10.00.0xxx to current GA Version 10.00.0xxx Firmware.
For Cyberoam versions prior to 10.01.0472
Compatibility Annotations
Firmware is Appliance model-specific firmware. Hence, firmware of one model will not be applicable
on another model and upgrade will not be successful. You will receive an error if you are trying to
upgrade Appliance model CR100i with firmware for model CR500i.
This Cyberoam version release is not compatible with the Cyberoam Central Console.
Please always check http://docs.cyberoam.com for availability of latest CCC firmware to deal with this
compatibility issue.
Document Version 1.06-24/09/2012
Revision History
Sr. No.
Old Revision
Number
New Revision
Number
Reference
Section
Revision Details
Contents
Release Information ......................................................................................................................... 1
Introduction ...................................................................................................................................... 5
Features ............................................................................................................................................ 5
1.
Compatibility with CISCO VPN Client ........................................................................... 5
2.
L2TP Over IPSec VPN L2TP/IPSec support for Android Devices ..................................... 6
3.
Outbound Spam .............................................................................................................. 6
4.
YouTube Education Filter ................................................................................................ 7
5.
4G LTE Modem ............................................................................................................... 7
6.
DHCP Server optimization ............................................................................................... 8
Enhancements .................................................................................................................................. 9
1.
Multicast over IPSec VPN tunnel ..................................................................................... 9
2.
E-mail alert for IPSec Tunnel connection flapping .......................................................... 11
3.
Enhancement in AD Integration ..................................................................................... 12
4.
Support of SSL-VPN for MAC-OS Tunnelblick ............................................................... 12
5.
Version 9 Catchup Feature ............................................................................................ 12
6.
URL Import List ............................................................................................................. 12
7.
Optimization in Virtual Host Configuration ...................................................................... 13
8.
Optimized IPSec Failover Configuration......................................................................... 14
9.
DNS Status Check support in Diagnostic Tool ............................................................... 14
10. Dashboard .................................................................................................................... 14
11. Report View Enhancements .......................................................................................... 15
12. Top Users Widget.......................................................................................................... 16
13. Report Filter .................................................................................................................. 16
14. Country Map ................................................................................................................. 16
Bugs Solved.................................................................................................................................... 18
Anti Spam............................................................................................................................... 18
Anti Virus................................................................................................................................ 18
Certificate ............................................................................................................................... 18
CLI ..................................................................................................................................... 18
DHCP Server.......................................................................................................................... 19
Firewall................................................................................................................................... 19
GUI ..................................................................................................................................... 19
HA ..................................................................................................................................... 19
Identity ................................................................................................................................... 19
IM
..................................................................................................................................... 20
Intrusion Prevention System (IPS) .......................................................................................... 20
Log Viewer ............................................................................................................................. 20
Network Interface ................................................................................................................... 20
Proxy ..................................................................................................................................... 20
Reports .................................................................................................................................. 21
System ................................................................................................................................... 21
SSL VPN ................................................................................................................................ 21
User ..................................................................................................................................... 21
VPN ..................................................................................................................................... 21
Web Filter............................................................................................................................... 22
Wireless WAN ........................................................................................................................ 22
Document Version 1.06-24/09/2012
General Information........................................................................................................................ 23
Technical Assistance .............................................................................................................. 23
Technical Support Documents ................................................................................................ 23
Introduction
This document contains the release notes for Cyberoam Version 10.04.0 Build 214. The following
sections describe the release in detail.
This release comes with new features, few enhancements and several bug fixes to improve
quality, reliability and performance.
Features
1. Compatibility with CISCO VPN Client
From this version onwards, Cyberoam is compatible with Cisco IPSEC VPN client.
This feature enables Cisco IPSec VPN clients to establish an IPSec connection with Cyberoam.
To support this feature, a new page CISCO VPN Client is added on Web Admin Console. An
IPSec connection that would serve Cisco IPSec VPN Clients must be created using this page.
Compatibility
1. At present only the native Cisco IPSEC client, present in Apple iOS (iPhone and iPad)
Windows are supported. The details of the versions supported are as provided below:
Windows
Apple iOS
4.3
Windows OS
5.0.1
Win 7
5.1.1
Windows Vista
Known Behavior
1. Apple iOS versions 5.0 onwards do not send any notification to Cyberoam when IPSec
connection serving Cisco IPSec VPN Clients gets disconnected. The connection and route
will be cleared from Cyberoam using Dead Peer Detection (DPD) after approximately 20
seconds and then same client will be able to reconnect.
2. When there is no data transfer, Apple iPhone disconnects the IPSec connection serving
Cisco IPSec VPN Clients.
3. When any clients are already connected and the CISCO VPN Client page is submitted,
they will be disconnected and IP address pool will be reinitialized
IPSec connection serving Cisco IPSec VPN Clients can be configured from VPN Cisco VPN
Client CISCO VPN Client for Apple iOS.
User will be able to connect and access Cyberoam L2TP/IPSec via an Android device using PreShared Key authentication.
Android Compatible Version: 2.1 clair, 2.2.x Froyo, 2.3.x Gingerbread, 3.x Honeycomb, 4.0.x
Ice Cream Sandwich, 4.1.x Jelly Bean (Below 4.1.4)
Enable Add L2TP/IPSec PSK VPN option of Android device to configure VPN tunnel.
3. Outbound Spam
From this version onwards, Cyberoam will provide Outbound Spam to identify internal spam. This
feature will serve ISPs to identify and block any user trying to send spam mails by utilizing their
network.
Outbound Spam filtering is a subscription module.
Inbound Spam filtering and Outbound Spam filtering are mutually exclusive. On
subscribing to Outbound Spam, Inbound Spam filtering will stop. Inbound Spam filtering
will resume when the subscription of Outbound Spam expires.
This feature is not available in Cyberoam Models CR15i, CR15wi, CR25i, CR25wi, CR35wi,
CR50i, CR100i, CR250i, CR500i, CR500i-8P, CR1000, CR1500i.
To view logs, go to Logs & Reports Logs Viewer and select option Anti Spam for
parameter View logs for.
To allow educational videos via Cyberoam, school authority is required to get the school registered
for YouTube for School. On registration, a custom HTTP Header with a unique ID will be displayed
on browser page.
E.g. X-YouTube-Edu-Filter:HMtp1sI9lxt0KAVpcg88kQ
1. Field Name: X-YouTube-Edu-Filter
2. Field Value Format: Alphanumeric [a-z][A-Z][0-9]
3. Field Value Length: up to 44 characters
To allow YouTube EDU via Cyberoam, go to Web Filter Policy Policy and specify the
unique ID in the textbox against parameter YouTube Education Filter
As per recommendations of YouTube, it is mandatory to ensure the videos and following
top-level domains are not blocked
1. youtube.com
2. ytimg.com
5. 4G LTE Modem
Cyberoam will now support DHCP enabled 4G LTE services on Wi-Fi modems. With this feature,
Cyberoam provides support for the following:
1.
2.
3.
4.
Further, Cyberoam provides recommended values (auto detected) for modem configuration.
To configure a 4G modem, go to Network Wireless WAN Settings.
CLI Commands
Document Version 1.06-24/09/2012
Prior to this version, Cyberoam support DHCP configuration only for a single subnet
Further, Cyberoam now allows leasing static IP Address over DHCP, granting a specific device to
receive same IP Address each time it logs into Cyberoam.
Enhancements
1. Multicast over IPSec VPN tunnel
From this version onwards, Cyberoam will support secure transport of multicast traffic over untrusted network using IPSec/VPN connection.
With this enhancement, now it is possible to send/receive both unicast and multicast traffic
between two or more VPN sites connected through public Internet. This removes the dependency
of multicast aware routers between the sites connecting via IPSec/VPN.
Prior to this version, this was possible using GRE tunneling however packets could not be
encrypted.
Any unicast host wanting to access a multicast host shall require to be configured as a explicit host
(with netmask /32) in VPN configuration.
Known Behavior
CLI shows only static interfaces as input and output interface whereas Web Admin Console shows
both, static as well as dynamic interfaces (PPPoE, DHCP).
To configure Multicast over IPSec/VPN connection go to Network Static-routes Multicast.
CLI Commands
1. Command: mroute add input-interface Port<port number> source-ip <ipaddress> dest-ip
<ipaddress> output-interface Port<port number>
To forward multicast traffic coming from a given interface to another interface
E.G. mroute add input-interface PortA source-ip 192.168.1.2 dest-ip 239.0.0.55 outputinterface PortB
2. Command: mroute add input-interface Port<port number> source-ip <ipaddress> dest-ip
<ipaddress> output-tunnel gre name <gre tunnel name>
To forward multicast traffic coming from a given interface to GRE tunnel.
E.G. mroute add input-interface PortA source-ip 192.168.1.2 dest-ip 239.0.0.55 output-tunnel
gre name Elitecore
3. Command: mroute add input-interface Port<port number> source-ip <ipaddress> dest-ip
<ipaddress> output-tunnel ipsec
To forward multicast traffic coming from a given interface to IPSec tunnels. Cyberoam
automatically selects the appropriate tunnel to be used depending upon the Local Network
and Remote Network configuration.
E.G. mroute add input-interface PortA source-ip 192.168.1.2 dest-ip 239.0.0.55 output-tunnel
ipsec
4. Command: mroute add input-tunnel ipsec name <ipsec connection name> source-ip
<ipaddress> dest-ip <ipaddress> output-interface Port<port number>
To forward multicast traffic coming from IPSec tunnel to an interface.
E.G. mroute add input-tunnel ipsec name Net2Net source-ip 192.168.1.2 dest-ip 239.0.0.55
output-interface PortB
5. Command: mroute add input-tunnel ipsec name <ipsec connection name> source-ip
<ipaddress> dest-ip <ipaddress> output-tunnel ipsec
To forward multicast traffic coming from a given IPSec tunnel to other IPSec tunnels.
Cyberoam automatically selects the appropriate tunnel to be used depending upon the Local
Network and Remote Network configuration
E.G. mroute add input-tunnel ipsec name Net2Net source-ip 192.168.1.2 dest-ip 239.0.0.55
output-tunnel ipsec
6. Command: mroute add input-tunnel ipsec name <ipsec connection name> source-ip
<ipaddress> dest-ip <ipaddress> output-tunnel gre name <gre tunnel name>
To forward multicast traffic coming from a given IPSec tunnel to GRE tunnel.
E.G. mroute add input-tunnel ipsec name Net2Net source-ip 192.168.1.2 dest-ip 239.0.0.55
output-tunnel gre name Elitecore
7. Command: mroute add input-tunnel gre name <gre tunnel name> source-ip <ipaddress>
dest-ip <ipaddress> output-interface Port<port number>
To forward multicast traffic coming from a GRE tunnel to an interface.
E.G. mroute add input-tunnel gre name Elitecore source-ip 192.168.1.2 dest-ip 239.0.0.55
output-interface PortB
8. Command: mroute add input-tunnel gre name <gre tunnel name> source-ip <ipaddress>
dest-ip <ipaddress> output-tunnel gre name <gre tunnel name>
To forward multicast traffic coming from a GRE tunnel to another GRE tunnel.
E.G. mroute add input-tunnel gre name Elitecore source-ip 192.168.1.2 dest-ip 239.0.0.55
output-tunnel gre name Terminal1
9. Command: mroute add input-tunnel gre name <gre tunnel name> source-ip <ipaddress>
dest-ip <ipaddress> output-tunnel ipsec
To forward multicast traffic coming from a given GRE tunnel to IPSec tunnels. Cyberoam
automatically selects the appropriate tunnel to be used depending upon the Local Network
and Remote Network configuration.
E.G. mroute add input-tunnel gre name Elitecore source-ip 192.168.1.2 dest-ip 239.0.0.55
output-tunnel ipsec
10. Command: mroute del source-ip <ipaddress> dest-ip <ipaddress>
To delete multicast route
E.G. mroute del source-ip 192.168.1.2 dest-ip 239.0.0.
10
Upon configuring E-mail alerts via the available single central configurable option, it will
automatically be applicable on all the IPSec tunnels.
An E-mail will be sent only for Host to Host and Site to Site tunnel connections; if it flaps due to
one of the following reasons:
1.
2.
3.
4.
An E-mail will be sent for each subnet pair in case of Site to Site connections, having
multiple local/remote networks.
An E-mail sent with respect to IPSec Tunnel coming up shall not have any reason
mentioned within.
Description of IPSec Tunnel connection shall be included in the E-mail, only if information
for same is provided by the administrator.
11
3. Enhancement in AD Integration
From this version onwards, Administrator can sync with Active Directory users with external Active
Directory server. To do so, after checking the connectivity and authenticating all configured
external servers, all the active directory users in Cyberoam are searched in all external Active
Directory servers. If a user is not found within any of the external server(s), it is deleted from
Cyberoam with manual intervention.
Purge operation will not interrupt user login/logout and accounting events.
While the purge activity is in progress and if server connectivity is lost, the activity will be
aborted.
If a user is purged it will be deleted from both, Primary and Auxiliary Cyberoam Appliance.
To purge users go to Identity Users and click Purge Users button.
Further, when the User logs in to the Cyberoam, and if the E-mail Address of that User is
configured on the external Active Directory server/LDAP server then the Users E-mail Address
within the Cyberoam gets sync with the E-mail Address on the external Active Directory
server/LDAP server. Every time the user logs in the user Email ID will be updated. If the Email ID
is null on the External Active Directory Server/LDAP, there will be no updation.
The user can download the SSL VPN Client Configuration - MAC Tunnelblick from Cyberoam SSL
VPN User Portal.
12
To add white listed URL file, go to Web Filter Category add domain.
Example:
Port Forwarding Type
(External Port Type to Mapped Port Type)
External Ports
Mapped Ports
20
21 - 26
28
In case of Port List to Port List mapping, number of ports must be same for both, External Ports
and Mapped Ports. Request received on first external port will be redirected to first mapped port;
second request on external port will be redirected to second mapped port and so on. From the
example above, for Port List to Port List type of configuration, any request received for external
ports 22, 24, 26, 28, 30 will be forwarded respectively to mapped ports 42, 44, 46, 48, 50.
For a single virtual host, a maximum of 16 ports can be configured in a Port List.
All the ports within a Port List support single protocol viz., either a TCP or a UDP protocol
as per the configuration. A combination of both of these protocols within a Port List is not
allowed.
Prior to this version, only Single Port to Single Port and Port Range to Port Range Type for port
forwarding were allowed.
Also, from this version onwards, for Firewall, when any virtual host is created without port
forwarding, one can select multiple services instead of a single service.
Prior to this version, selecting multiple services was not allowed within a Firewall Rule configured
with a virtual host having port forwarding disabled.
To configure multiple ports separated by comma, go to Firewall Virtual Host.
13
10. Dashboard
From this version onwards, Cyberoam iView main dashboard has been bifurgated into two.
1. Traffic Dashboard
Traffic dashboard is a collection of widgets displaying information regarding total network traffic.
This dashboard gives complete visibility of network traffic in terms of applications, web
categories, users, hosts, source and destination countries, mail traffic and FTP activities.
Top Applications List of top applications along with percentage wise data transfer
Top Categories List of top accessed web categories with number of hits and amount of data
transfer
Top Users List of top users along with percentage wise data transfer
Top Hosts List of top hosts along with percentage wise data transfer
Top Source Countries List of top source countries along with percentage wise data transfer
Top Destination Countries List of top destination countries along with percentage wise data
transfer
Top Rule ID List of top firewall rules along with percentage wise data transfer
14
Top Domains List of top domains along with percentage wise data transfer
Top File Upload List of top uploaded files along with date, user, source IP, domain name ,
file name and file size
Top Files Uploaded via FTP List of top uploaded files via FTP along with percentage wise
amount of data transfer
Top Files Downloaded via FTP List of top downloaded files via FTP along with percentage
wise amount of data transfer
Mail Traffic Summary Email traffic with type of traffic and amount of data transfer
Top Mail Senders List of top email senders along with percentage wise data transfer
Top Mail Recipients List of top email recipients along with percentage wise data transfer
2. Security Dashboard
Security dashboard is a collection of widgets displaying information regarding denied network
activities and traffic. It also gives an overview of malwares and spam along with source and
destination countries.
Security dashboard consists of following widgets:
Top Denied Hosts List of top denied hosts along with number of hits
Top Denied Users List of top denied users along with number of hits
Top Denied Applications List of top denied applications along with number of hits
Top Denied Destination Countries List of top denied destination countries along with number
of hits
Top Denied Source Countries List of top denied source countries along with number of hits
Top Denied Rule ID List of top denied firewall rules along with number of hits
Top Denied Categories List of top denied web categories along with number of hits
Top Denied Domains List of top denied domains along with number of hits
All these widgets can be drilled down for next level reports.
15
To choose the chart type and palette go to System Configuration Chart Preferences.
2. Records per Page Control
Now the user has option to set number of records to be displayed for report groups also.
Previously this control was available for individual reports only.
3. Inline Charts
If the number of records to be displayed is more than 10, then Cyberoam iView shows them in
the form of inline charts i.e. a bar diagram for number of bytes and percentage respectively will
be displayed in the same column.
4. Animated Charts
With this version, Cyberoam iView has introduced animated bar charts and pie charts to improve
user experience and data presentation.
5. Report Group Dashboard
With this version, all the report group dashboards show collection of reports available under the
selected report group.
All the filters are displayed on the top of the resultant report in the form of rowed text box(es) with
the option to remove filter.
16
17
Bugs Solved
Anti Spam
Bug ID 9597
Description Mail of size greater than 3Mb do not get released from Anti Spam Quarantine Area if the
send mail client do not release them within the configured time.
Bug ID 9599
Description An error message Data Error is displayed for a log on Anti Spam Quarantine Area, if
the subject of the mail contains special characters like double quotes ( ) or a backslash (\).
Bug ID 9989
Description Quarantine mails having a space in subject line do not get released.
Anti Virus
Bug ID 8029
Description Adobe flash player exe cannot be downloaded from http://get.adobe.com/flashplayer
with HTTP scanning enabled.
Certificate
Bug ID 8054
Description Certificate Sending Request (CSR) generated from version 10 Cyberoam Appliance
cannot be uploaded at third party Certificate Authority (CA) end.
Bug ID 8191
Description Certificate having encrypted private key cannot be upload from Web Admin Console.
Bug ID 10001
Description Value of parameter Valid From do not change on regenerating a new
Cyberoam_SSL_CA certificate from Certificate page of the System.
Bug ID 10045
Description A certificate error message secure connection failed is displayed on the Mozilla
browser page if Cyberoam is accessed via HTTPS and a default Cyberoam Appliance Certificate is
stored in the browser.
CLI
Bug ID 10122
Description Default routing precedence do not get displayed on Cyberoam console when command
cyberoam route_precedence show is executed.
Document Version 1.06-24/09/2012
18
DHCP Server
Bug ID 10245
Description An error message is displayed when a host name of parameter IP MAC Mapping List
contains a space while configuring a static DHCP.
Firewall
Bug ID 9658
Description A false error message user.err kernel: outdev_target: ERRORRRRR skb> rtable is already initialized <192.168.141.255>... is displayed in System - Log Viewer.
GUI
Bug ID 9810
Description A Web Filter policy do not function in a non-english version of Cyberoam on configuring
an URL Group within the Web Filter Policy.
Bug ID 9985
Description In captive portal settings and CTAS settings, the parameter User Inactivity Timeout do
not accept number beyond 99 on Web Admin Console from Authentication page of Identity.
Bug ID 10109
Description Heart Beat port in System configured to sync with CCC, do not change if the Heart Beat
Protocol is HTTP for Central Management.
Bug ID 10165
Description Dashboard and System Graph continues to remain in processing due to internal error for
Cyberoam Version 10.02.0 Build 227.
Bug ID 10307
Description VPN IPSec connection list tales a long time while loading, if the number of IPSec
connections is more than 2000.
HA
Bug ID 10573
Description IPS service stops functioning in the HA deployment, when two Appliances are
configured with different versions of IPS are enabled in HA.
Identity
Bug ID 9756
Description Special characters _ and . are not allowed to be used consecutively while adding an
Email Address on the User page for Identity.
19
IM
Bug ID 9866
Description IM Policy do not displayed in Log Viewer with Yahoo ! Messenger (Version 11.5.0.228in).
Log Viewer
Bug ID 9880
Description No records are displayed when the language selected for Web Admin Console is French
in Cyberoam and multiple filters are used while viewing logs of Application Filter in Log Viewer.
Network Interface
Bug ID 8002
Description STC 3G modem is not compatible with Cyberoam Appliance.
Bug ID 8457
Description ZTE MF688a 3G modem is not compatible with Cyberoam Appliance.
Proxy
Bug ID 9115
Description Proxy services do not function, if a HTTP Upload Web Category is added in HTTPS
scanning exceptions.
Bug ID 9848
Description An error is received while accessing hotmail.com, http://google.com.au when HTTPS
scanning is enabled in Firewall Rule.
Bug ID 10046
Description Web Proxy service do not restart when Administrator restarts it from Maintenance page
of System.
Bug ID 10135
Description Some of the components with the YouTube website do not get displayed with HTTPS
scanning applied.
Bug ID 10244
Description Browsing becomes slow when external proxy is implemented in the network while
Document Version 1.06-24/09/2012
20
Reports
Bug ID 7818
Description The data transfer reports of top web host and traffic discovery displayed in On-Appliance
iView are not identical.
Bug ID 9993
Description All the logs of the selected period are displayed in Web Surfing reports for IP Address
based filtering, if Search Type is IP Address and Report Type as Detail.
Bug ID 10427
Description Only current days report details are displayed in the Application Reports of OnAppliance iView on migrating to Cyberoam Version 10.02.0 Build 473.
System
Bug ID 9927
Description Error messages are displayed on executing command tcpdump port80filedump on
Cyberoam Console.
SSL VPN
Bug ID 6523
Description Once the User certificates are updated manually, they do not get updated automatically.
Bug ID 10171
Description SSL VPN RDP Bookmark cannot be accessed in Version 10.02.0 Build 473 if RDP
bookmark has a / at the end (e.g. rdp://10.102.1.152).
User
Bug ID - 6141
Description - When special characters are included in the login message, the user receives a
continuous process icon on the Captive Portal page in spite of logging in successfully.
Bug ID 9920
Description Cyberoam supports only SMS Gateways that uses Post method.
VPN
Bug ID 9477
Description IPSec VPN tunnels takes time of 1 hour to get activated, if the number of IPSec VPN
tunnels configured is more than 4000.
Document Version 1.06-24/09/2012
21
The same holds true in case of HA failure. (As per Ajay this bug must not be a part of this release).
Bug ID 9812
Description An error message We cannot identify ourselves with either end of this connection is
received when VPN connection with VLAN over WAN is configured with PPPoE link and VLAN ID is
more than 2 digits.
Bug ID 10191
Description VPN service do not restart when head office and branch office are using default head
office and default branch office policy respectively and an if an intermediate device between them is
switched off.
Web Filter
Bug ID 9840
Description Denied Message is updated to default message, if an existing Web Filter Category
having configured for customized message is edited without opening Advance Settings of it.
Bug ID 10092
Description Webcat do not get upgraded to latest version while performing manual sync after auto
Webcat upgrade has failed.
Wireless WAN
Bug ID 5315
Description 3G Modem LW272 is not compatible with Cyberoam Appliance.
22
General Information
Technical Assistance
If you have problems with your system, contact customer support using one of the following methods:
E-mail ID: [email protected]
Telephonic support (Toll free)
Europe: +44-808-120-3958
India: 1-800-301-00013
Please have the following information available prior to contacting support. This helps to ensure that
our support staff can best assist you in resolving problems:
Description of the problem, including the situation where the problem occurs and its impact on
your operation
Product version, including any patches and other software that might be affecting the problem
Detailed steps on the methods you have used to reproduce the problem
Any error logs or dumps
23
Important Notice
Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented wi thout
warranty of any kind, expressed or implied. Users must take full responsibili ty for their application of any products. Elitecore
assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to ma ke
changes in product design or specifications. Information is subject to change without notice.
USERS LICENSE
Use of this Version 10.04.0 Build 214 is subject to acceptance of the terms and condition of Cyberoam End User License
Agreement (EULA). You will find the copy of the EULA at http://kb.cyberoam.com.
RESTRICTED RIGHTS
Copyright 1999 - 2012 Elitecore Technologies Private Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of Elitecore
Technologies Ltd.
Corporate Headquarters
Elitecore Technologies Private Ltd.
904, Silicon Tower, Off. C.G. Road,
Ahmedabad 380015, INDIA
Phone: +91-79-66065606
Fax: +91-79-26407640
Web site: www.elitecore.com , www.cyberoam.com
24