Cyberoam Central Console
Cyberoam Security Appliances (UTM and NGFW)
Cyberoam SSL VPN
Cyberoam Virtual Security
Cyberoam's On-Cloud Management Service
Endpoint Data Protection
Knowledge Base Information
Data Control and DLP
Endpoint Security and Control
Sophos UTM 9
Tweets by SophosSupport
Cyberoam: How to block web mail except for a custom Google domain
Created: 1 Jul 2019
This article describes how to block web mail except for a custom Google domain in Cyberoam.
Cyberoam: Push traffic via IPsec VPN
Created: 29 Jun 2019
This article describes the steps to force the traffic via IPsec tunnel in Cyberoam.
Cyberoam: How to perform a memory test
Created: 28 Jun 2019
This article describes the procedure in testing the memory of Cyberoam.
Cyberoam: How to test the hard disk drive
Created: 28 Jun 2019
This article describes the procedure in testing the hard disk drive of Cyberoam.
Cyberoam: Unable to enable HA load balancing in CR500iNG-XP and CR750iNG-XP
Created: 25 Jun 2019
This article describes an issue wherein the HA load balancing cannot be enabled when restoring a backup to CR500iNG-XP and CR750iNG-XP.
Advisory: TCP SACK PANIC kernel vulnerability
Created: 18 Jun 2019
This article describes the details of the TCP SACK PANIC kernel vulnerabilities.
Sophos XG Firewall / Cyberoam: Web category mapping
Created: 29 May 2019
This article describes the equivalent web categories of Cyberoam to the web categories of the Sophos XG Firewall.
Sophos iView: How to fix the incorrect disk size issue displayed on the Licensing page
Created: 10 May 2019
This article describes the steps on how to fix the incorrect disk size issue on the Licensing page under the Sophos iView UI.
Cyberoam: A small subset of CR appliances having known issue with SFOS firmware upgrade
Created: 1 May 2019
This article provides information on the known issue with SFOS firmware upgrade with a small subset of CR appliances.
Cyberoam: How to configure SSL VPN over IPsec site-to-site VPN
Created: 30 Mar 2019
This article describes the steps of creating a point-to-point encrypted tunnel between a remote user and a company's internal network as well as the end-to-end security of peer-to-peer connection using a combination of SSL certificates and a username/password for authentication.