Documente Academic
Documente Profesional
Documente Cultură
Contents
Preface .......................................................................................................................................... 3 Introduction .................................................................................................................................. 4 Securing Backup ............................................................................................................................ 4 Updating Appliance Firmware........................................................................................................ 4 Configuring Email Alerts ................................................................................................................ 4 Validating Subscriptions................................................................................................................. 5 Checking Status of Services............................................................................................................ 5 Updating User Accounts and User Groups ..................................................................................... 6 Updating Policies ........................................................................................................................... 6 Securing Access to Appliance ......................................................................................................... 6 Updating Firewall Rules ................................................................................................................. 7 Reviewing Denial of Service (DoS) Settings..................................................................................... 7 Monitoring Appliance Health ......................................................................................................... 7 Configuring iView Logs & Reports .................................................................................................. 8
Preface
Welcome to Cyberoam System Maintenance guide. This Guide provides information about the maintenance of Cyberoam Appliance. It, however, does not describe how to use the Appliance. That is covered in Cyberoam User Guide. Scope of the Guide This Guide covers the overall maintenance guidelines of all Cyberoam Appliance CR Models. In case of any queries, contact Cyberoam Technical Support.
Technical Support
You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to Customer care/service department at the following address: Corporate Office Elitecore Technologies Pvt. Ltd. 904, Silicon Tower Off C.G. Road Ahmedabad 380015 Gujarat, India. Phone: +91-79-66065606 Fax: +91-79-26407640 Web site: www.elitecore.com Cyberoam contact: Technical support (Corporate Office): +91-79-66065777 Email: support@cyberoam.com Web site: www.cyberoam.com Visit www.cyberoam.com for the regional and latest contact information.
Introduction
Cyberoam Appliance should undergo regular maintenance for smooth and efficient functioning of the Appliance. The various tasks involved in Maintenance are as follows. Securing Backup Updating Appliance Firmware Configuring Email Alerts Validating Subscriptions Checking Status of Services Updating User Accounts and User Groups Updating Policies Securing Access to Appliance Updating Firewall Rules Reviewing Denial of Service (DoS) Settings Monitoring Appliance Health Configuring iView Logs & Reports
Securing Backup
Taking backup of Cyberoam Appliance Configuration enables us to preserve a copy of all current configurations. It is advisable to take a backup of Cyberoam Appliance Configuration on a regular basis. In case of equipment failure or other anomaly, the backup can be restored on an existing appliance after repairs or can be applied to a new appliance to facilitate recovery. For details on how to take a backup of Cyberoam Appliance configuration, click here.
Validating Subscriptions
Cyberoam Appliance contains 2 types of modules: Basic modules Firewall, VPN, Multi Link Management, Bandwidth Management, Real-time Blackhole List (RBL), Traffic Discovery and On-Appliance Reports Subscription modules - Gateway Anti Virus, Gateway Anti-spam, Intrusion Detection and Prevention, Web and Application Filtering, 8x5 support, 24x7 support
Basic modules are pre-registered with the Appliance for an indefinite time period. Subscription modules are to be subscribed at regular intervals. In case one or more of the Subscription Modules has expired or is on the verge of expiry, renew the same to continue enjoying the benefits. For details on how to renew the subscription of a module, click here.
It is a good practice to regularly check if these services are up and running. To check and manage services, go to System Maintenance Services. The following screen appears.
The status of the services in the Services field can be seen in the Status field. To manage one or more service, use Toggle Buttons provided in the Manage field.
Toggle Button Action table Button Start Stop Restart Usage Starts the Server whose status is Stopped Stops the server whose status is Started Restarts server: Only for Authentication Server and Web Proxy Server
Updating Policies
Cyberoam Appliance enforces many rules and policies upon users to ensure that they have a safe and productive Internet experience. These policies are: Web Filter Policy Application Filter Policy IM Filter Policy QoS Policy Identity Policies o Access Time Policy o Surfing Quota Policy o Data Transfer Policy
. These policies should be regularly updated to reflect changing Network Environment and User Surfing Patterns in the organization to ensure optimal usage of the Appliance .For details on how to manage various Cyberoam Policies, refer to the User Guide.
Configuring too high Threshold Values degrades system performance while too low values blocks regular requests. Again, Cyberoam allows you to bypass DoS rules in case you are sure that the specified source will not be used for flooding or ignore if flooding occurs from the specified source These Rules should be updated from time to time so that they are in accordance with changing Network Environment. Unused Rules should be deleted to reduce system overhead. For details on how to create a Bypass Rule, click here.
Utility wise graphs show the same graphs regrouped based on the time interval. Use these statistics to verify System Utilization. In case of any discrepancy, contact Cyberoam Technical Support at support@cyberoam.com.
Cyberoam-iView emails these reports in PDF format to specified email addresses according to the configured frequency. Hence, ensure that correct email-ids are configured in iView report notifications. Also, ensure that appropriate log retention period is configured to retain the logs. For details on how to manage Log Retention Period in iView, click here.