HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon FAQs on Cyberoam and Sophos Firewall
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Firewall
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Cyberoam Transparent Authentication Suite (CTAS)
DrillDown Icon Install and Configure Cyberoam iAccess for iOS
DrillDown Icon Install and Configure Cyberoam General Authentication Client for Mac OS
DrillDown Icon Install and Configure Cyberoam iAccess authentication client for Android OS
DrillDown Icon Install and Configure Cyberoam General Authentication Client for Windows OS
DrillDown Icon Install and Configure Cyberoam General Authentication Client for Linux OS
DrillDown Icon Can we bind MAC Addresses to users using Captive Portal Authentication?
DrillDown Icon Whom should I contact to get the Subscription Key for IPSec VPN client?
DrillDown Icon Errors
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils for Cyberoam security appliances
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
 
Install and Configure Cyberoam General Authentication Client for Windows OS

Applicable Version: 10.00 onwards

Overview

Cyberoam General Authentication Client (CGAC) for Windows OS enables users using Windows Operating System to log-on to Cyberoam Server.

Prerequisites

JDK or JRE version 1.6 or greater should be installed in client machine.

Scenario

Install and configure General Authentication Client in client machine running Windows OS.

Configuration

You can install and configure client by following the steps given below.

Step 1: Download General Authentication Client

Browse to http://www.cyberoam.com/cyberoamclients.html  and download the Windows installer of the general authentication client.
 

 
 
The installer Cyberoam General Authentication Client 2.1.2.7.exe is downloaded. Save it on the Windows client machine. 

Step 2: Install Client on client machine

Run the Setup and follow on screen instructions to install the client on Client machine. 

Step 3: Configure Server Details

Once client is installed on the machine, click the desktop icon   to configure Cyberoam Server details. Set LAN IP Address of your Cyberoam as Cyberoam Server Address and click Check to check connectivity with server. 
 

Note:

 

For Administrators: You can view the Cyberoam IP Addresses on the Cyberoam Web Admin Console from Network > Interface > Interface.
 
For Network Users: If you do not know the Cyberoam LAN IP Address, contact Administrator. 
 
 
 

Here, as an example, we have set Cyberoam Server Address as 172.16.16.16. Specify the IP Address you have set on the LAN Interface of your Cyberoam in this field.

 

Additionally you can enable:


-   Show Notification Messages to view pop-ups at each login and logout.
-   Ask on Exit to display warning message before logging out.
-   Display Floating Digital Clock to display a floating digital clock on the desktop when user is logged in.
-   Auto Login to login user to Cyberoam directly at machine startup.

 

Click OK to save the configuration.

Step 4: Login to Cyberoam
Login to Cyberoam using General Authentication Client by double-clicking the client  icon on the desktop. Enter user credentials and click Login.
 

 

 
 

Note:

 

From version 2.1.2.7 onwards, CGAC supports Multiple Server Mode in which it can authenticate to multiple Cyberoam Appliances simultaneously. This is especially useful in a network with multiple Cyberoam Appliances placed at more than one gateway. The routing on the network switch is configured such that different type of traffic is routed through a different gateway.

 

In Multiple Server Mode, the CGAC can be configured to authenticate with a maximum of Four (4) Cyberoam Appliances.

 

To enable Multiple Server Mode, right-click the CGAC icon on the task bar, then click Advanced and select Multiple Server Mode.

 

When Multiple Server Mode is selected:


-      CGAC allows you to specify multiple Cyberoam Server Addresses from Preferences window.
-      On login, IP Address wise success or failure messages are displayed.
-      You can access My Account of each Cyberoam Server from the Login Page.
-      You can check the connection status of each Cyberoam from the Login Status Page. You can also sign out from
       one or more Cyberoam Servers while continuing your session with others.

 

 

 

 

 

 

                                                                                                                                                            Document Version: 2.5 – 27 April, 2015

Attachments
Article ID: 1871