www.cyberoam.com © copyright 2012 cyberoam technologies pvt. ltd. all rights reserved. securing you...
TRANSCRIPT
![Page 1: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/1.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM
Our Products
Unified Threat Management
![Page 2: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/2.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Different Stages Virtualization ImplementationDifferent Stages Virtualization Implementation
Already Implemented In Process In Planning
![Page 3: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/3.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization Strategy: Data CenterVirtualization Strategy: Data Center
Simplify server management
Reduce infrastructure costs
Reduce physical server sprawl
Reduce power consumption
Implement scalable system to cater for future growth
Benefits
![Page 4: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/4.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Workstation virtualization- Transform single host server into workgroup of multiple users
Reduce infrastructure costs
Centralized control
Works in a BYOD scenario
Benefits
Virtualization Strategy: Office in a BoxVirtualization Strategy: Office in a Box
![Page 5: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/5.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Getting office into a box : Enterprise scenarioGetting office into a box : Enterprise scenario
Corporate office
Branch office 1
Branch office 2
![Page 6: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/6.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization – You Gain Some, You Lose SomeVirtualization – You Gain Some, You Lose Some
![Page 7: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/7.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scanning InterVM traffic- Cannot scan Inter-VM traffic with externally based security hardware- A single compromised virtual machine can infect the entire data center
Risk of attacks on Hypervisor management console Hypervisor & GuestOS
Exploitation of virtualized web-facing application vulnerabilities by hackers Protecting virtualized servers from intrusion attacks User-based access control
- Tying service access and network usage to user Identity Security hardware cannot offer inline protection
- Traffic flows are invisible; creating blindspots in network- Cannot conduct forensic analysis and display compliance
Security challenges in VirtualizationSecurity challenges in Virtualization
Need of virtual security solution for virtual environment
![Page 8: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/8.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Solving Virtual ProblemsCyberoam Virtual UTM – Solving Virtual Problems
![Page 9: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/9.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Resides on the Virtual layer Scans all traffic inside virtual environment
Cyberoam Virtual applianceCyberoam Virtual appliance
VM2
Apps
Linux OS
VM1
Windows OS
Apps
VM3
Other OS
Apps
Cyberoam Virtual UTM appliance
Hardware
Hypervisor
Best-of-breed security• Stateful inspection firewall• Intrusion Prevention System• Gateway Antivirus• Anti-spyware and Anti-spam• Web filtering• Application Visibility & Control• Web Application Firewall (WAF)• Virtual Private Network• Logging & Reporting• Layer 8 Identity-based security
![Page 10: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/10.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Apply granular firewall and Security policies to traffic in virtual network
Scan Inter-VM traffic Protect virtual networks from attacks on
hypervisor management console, hypervisor & Guest OS
Secure zero trust networks with Layer 8 identity-based security
Block attacks that exploit vulnerabilities in virtualized web applications
Protect virtual servers from attacks with IPS Helps display compliance with logs & reports
Security in a Virtual Data CenterSecurity in a Virtual Data Center
![Page 11: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/11.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Security in a Virtual Data CenterScenario: Security in a Virtual Data Center
Internet
administrator
Cyberoam vUTMvSwitch
vSwitch
vSwitch
![Page 12: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/12.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Enterprise/ MSSP Security in a BoxScenario: Enterprise/ MSSP Security in a Box
BO/Customer 1
BO/Customer 3
BO/Customer 2
BO/Customer n
Complete Virtual Security solution
![Page 13: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/13.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario1: MSSP + Hosting Services ProviderMSSP Scenario1: MSSP + Hosting Services Provider
administrator
Cyberoam vUTM
vSwitch
Customer 2
InternetCyberoam vUTM
vSwitch
Customer 1
Cyberoam vUTM
vSwitch
Customer 3
vSwitch
vSwitch
vSwitch
Cyberoam vUTM
vSwitch
vSwitch
Central Console & Logging /Reporting
![Page 14: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/14.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario2: On-premise deploymentMSSP Scenario2: On-premise deployment
On-premise deployment
Internet
administrator
Cyberoam vUTM
vSwitch
vSwitch
MSSP
At Customer premise
![Page 15: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/15.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
MSSP Scenario3: ISP as an MSSPMSSP Scenario3: ISP as an MSSP
vUTM - Customer 1
vUTM – Customer 2
vUTM – Customer 3
Customer 1
ISP
Customer 2
SwitchR3
R1
R2
R4
Internet
![Page 16: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/16.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Protects network and assets with features like Firewall, IPS, Gateway AV, AS, WAF, VPN and more
Access control for users- Tying service access and network
usage to user Identity Provides multiple security features on
single appliance
Cyberoam protects Virtual Office or ‘Office in a box’Cyberoam protects Virtual Office or ‘Office in a box’
![Page 17: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/17.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Scenario: Office-in-a-box setupScenario: Office-in-a-box setup
administrator
Cyberoam vUTM
vSwitch
vSwitch
LAN
LaptopRepurposed PC
Thin Client
Switch
Internet
Switch
![Page 18: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/18.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam offersCyberoam offers
Protection for virtualized networks - Protects hypervisor management console, hypervisor & Guest OS- Scan Inter-VM traffic- Secure zero trust networks
Comprehensive Security- Consolidate multiple security features on single virtual appliance- Secures virtual networks to the extent of physical networks
Ease to deployment- Offers flexibility to allot number of vCPUs- Easy to upgrade with simple activation key
![Page 19: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/19.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam offersCyberoam offers
Compliance Management- Segregates and secures traffic and data between and around virtual entities to
help stay regulatory compliant- Display compliance with indepth on-appliance reports
Centralized Management for Virtual & Physical appliances- Centrally manage physical and virtual infrastructure using single interface with
CCC (Cyberoam Central Console) Available as Virtual CCC and Hardware CCC
- Ensure centralized, consistent and quick security actions across your network
![Page 20: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/20.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtualization platforms SupportedVirtualization platforms Supported
VMware ESX/ESXi 3.5/4.0/4.1/5.0 VMware Workstation 7.0 or 8.0 VMware Player 3.0 or 4.0
![Page 21: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/21.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM appliance modelsCyberoam Virtual UTM appliance models
Offering Licensing
CRiV-1C Supports upto 1vCPU
CRiV-2C Supports upto 2vCPU
CRiV-4C Supports upto 4vCPU
CRiV-8C Supports upto 8vCPU
CRiV-12C Supports upto 12vCPU
Get a 30 day FREE Evaluation of Cyberoam Virtual appliance.
![Page 22: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/22.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam’s Security PortfolioCyberoam’s Security Portfolio
Software
![Page 23: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/23.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Take Control of Your Security Infrastructure with CyberoamTake Control of Your Security Infrastructure with Cyberoam
Take Control of - WHAT you want?- HOW MUCH you want?- HOW you want?
![Page 24: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/24.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Virtual UTM - WorkflowVirtual UTM - Workflow
![Page 25: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/25.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ContentContent
Introduction – Cyberoam Virtual UTM Cyberoam Virtual UTM – Trial
- Order- Registration
Cyberoam Virtual UTM – Upgrade- Order- Apply Upgrade
Resources
![Page 26: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/26.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
IntroductionCyberoam Virtual UTM
![Page 27: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/27.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – CRiV SeriesCyberoam Virtual UTM – CRiV Series
Platform support:
- VMware ESX/ESXi 4.0/4.1/5.0
- VMware Workstation 8.0/9.0
Base Configuration Required:
- One vCPU
- 1GB vRAM
- 3 vNIC
- Primary Disk with 4GB size
- Report Disk with 80GB size
- 1 Serial Port
- 1 USB Port
![Page 28: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/28.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
SubscriptionsCyberoam Virtual UTM appliance range
CRiV-TR(30days Trial)
CRiV-1C CRiV-2C CRiV-4C CRiV-8C CRiV-12C CRiV-UNL
Supported vCPU 32 1 2 4 8 12 32
IPS ● ○ ○ ○ ○ ○ ○
Gateway Anti-Spam ● ○ ○ ○ ○ ○ ○
Gateway Anti Virus ● ○ ○ ○ ○ ○ ○
Outbound Spam Protection ● ○ ○ ○ ○ ○ ○
Web and Application Filter ● ○ ○ ○ ○ ○ ○
Web Application Firewall ● ○ ○ ○ ○ ○ ○
Support ●(8x5)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
○(8x5/24x7)
● Available ○ Optional
Cyberoam Virtual UTM SubscriptionCyberoam Virtual UTM Subscription
![Page 29: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/29.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – TrialCyberoam Virtual UTM – Trial
![Page 30: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/30.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Order
![Page 31: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/31.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
![Page 32: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/32.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Visit www.cyberoam.com & Click on “Try & Buy”
STEP01
Customer
![Page 33: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/33.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam sales team forwards customer lead to respective partner
STEP02
Customer
![Page 34: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/34.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Partner contacts customer and confirms customer request for Cyberoam Virtual UTM Trial
Steps For Partner
![Page 35: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/35.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Visit https://partner.cyberoam.com
STEP01
Partner
![Page 36: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/36.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP02
Partner
![Page 37: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/37.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP03
Partner
![Page 38: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/38.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Partner shares Cyberoam Virtual UTM Trial Appliance Key with the customer
Cyberoam Team sends Virtual UTM Trial Appliance Key to Partner
![Page 39: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/39.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Trial Registration
![Page 40: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/40.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
Continued
![Page 41: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/41.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Visit https://customer.cyberoam.com
Existing Customers Login to Customer Portal
New Customers create account and Login with credentials
STEP03
Customer
![Page 42: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/42.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP04
Customer
![Page 43: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/43.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Enter Trial Appliance Key and other details
STEP05
Customer
![Page 44: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/44.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Email to customer confirming registration of virtual appliance
STEP06
Customer
![Page 45: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/45.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Email to customer with steps to download Virtual UTM appliance
STEP07
Customer
![Page 46: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/46.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Download Virtual UTM OVF
Install Cyberoam Virtual UTM(Refer Installation Guide for reference)
STEP08
Customer
![Page 47: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/47.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Click on Registered appliance key to see appliance information
STEP09
Customer
![Page 48: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/48.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You STEP10
Customer
![Page 49: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/49.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – UpgradeCyberoam Virtual UTM – Upgrade
Upgrade from Trial to Full Version
Upgrade to Higher model
![Page 50: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/50.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Upgrade Order
![Page 51: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/51.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Customer places an order with partner to Buy Full Version or
Upgrade Model
Customer provides Previous Appliance Key to Partner (Trial
appliance key or old appliance key) along with the order
![Page 52: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/52.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Partner
![Page 53: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/53.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
STEP01
STEP02
STEP03
Visit https://partner.cyberoam.com
![Page 54: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/54.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Partner shares Cyberoam Virtual UTM Upgrade Key with the customer
Cyberoam Team sends Virtual UTM Upgrade Key to Partner
![Page 55: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/55.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Cyberoam Virtual UTM – Apply Upgrade
![Page 56: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/56.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Steps For Customer
![Page 57: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/57.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
From the Menu select “License upgrade”
Login to Virtual UTM’s CLI Console
STEP01
Customer
![Page 58: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/58.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
From the Menu select Purchased Model No.
STEP02
Customer
![Page 59: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/59.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
On successful activation previous appliance expires and new registered appliance is shown in customer portal
Enter Upgrade Key to activate the purchased appliance
STEP03
Customer
![Page 60: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/60.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ResourcesResources
![Page 61: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/61.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
ResourcesResources
Cyberoam Virtual UTM – CRiV Series Installation Guide
Cyberoam Virtual UTM – CRiV Series Upgrade Guide
![Page 62: Www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management](https://reader035.vdocument.in/reader035/viewer/2022062515/56649c995503460f94955879/html5/thumbnails/62.jpg)
www.cyberoam.com © Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Securing You
Thank you