Through extensive hands-on labs, participants work through a real-world configuration example that employs the most common features applicable to enterprises of all sizes.
Participants gain a solid knowledge and understanding of how to install & configure Cyberoam UTM appliance into their existing environment, and the operational maintenance involved to ensure optimal performance and protection of their corporate assets.
Use the GUI or CLI to complete administration and maintenance tasks for Cyberoam appliances including: system settings and network configuration, creation of administrative accounts, system back-ups, the monitoring of system alerts, device performance, operation status and firmware management to ensure availability and reliability
Implement logging and monitoring features of the Cyberoam Appliance for intrusion detection and reporting purposes
Configure firewall policies with WAN link connection, scheduling, source and service type restrictions, and log unauthorized traffic
Understand the differences between NAT/Route and Proxy ARP (transparent) deployment modes of the Cyberoam UTM Appliance