The Sophos Cyberoam 35iNG is a small office security device that is available as a unified threat manager and next generation firewall with the ability to deliver advance network security with stateful inspections firewall, VPN, and Intrusion Prevention System, Human layer 8 ID-based controls and layer 7 application visibility and control. In this post, we will look at the unboxing and initial configuration of the Sophos Cyberoam CR 35iNG.
The Sophos Cyberoam 35iNG comes with 6 GbE ports, configurable internal/DMZ/WAN ports, stateful inspection firewall, Intrusion prevention system, gateway anti-virus and anti-spyware system, anti-spam, application filtering, web application firewall, VPN capability, bandwidth management, multiple gateways with 60 seconds automatic failover, and more.
The Sophos Cyberoam CR 35iNG comes in a small handy box with the following components included.
Sophos Cyberoam devices come pre-configured with a default LAN IP of 172.16.16.16 with a subnetmask of 255.255.255.0. To access the device you will have to configure your computer with any IP from the network other than the one that has been assigned to the Cyberoam device you are trying to access. Example, assign 172.16.16.1 to your computer with a /24 subnetmask.
To access the box, open a web browser and type in 172.16.16.16 into the url field and hit the enter key. Enter the default username and password of “admin admin”. After logging in, you will need to carry out all or most of the following configurations to have internet access
To assign an IP, simply click on Network >> Interface >> double-click on port B (WAN) interface and assign IP and gateway. Port A is LAN, B is WAN, and C is for DMZ. Port B, by default is dhcp-enabled. To change it to static, click on the interface >> static >> assign IP address and gateway. See image below:
Repeat steps for LAN and DMZ.
To configure a dhcp server for connected LAN users, click on network >> dhcp >> add and follow the steps shown in the image below:
To configure Network Address Translation (NAT), click on firewall >> rule >> add >> select source and destination interfaces, network or host should be set to any IP, services should be set to any and schedule should be all time. Click on accept and check the box beside apply NAT and choose MASQ for masquerade. See image below.
To assign static dns addresses to the router, click on network >> dns >> click on static dns >> type in dns addresses.
Optimizing Metro Ethernet segments with jumbo MTU (Maximum Transmission Unit) can significantly enhance network performance…
MikroTik's SwitchOS is an operating system specifically designed for their line of network switches. It…
A properly configured VRRP setup does not only track device uptime but also tracks connection…
Network Address Translation (NAT) is a technique used in networking to map private IP addresses…
In the ever-evolving landscape of networking technologies, the demand for efficient and scalable solutions has…
Setting up Multi-Area OSPF (Open Shortest Path First) on Mikrotik routers involves a few steps.…
View Comments
Please share site to site VPN details