HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon FAQs on Cyberoam and Sophos Firewall
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Firewall
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Cyberoam Transparent Authentication Suite (CTAS)
DrillDown Icon Install and Configure Cyberoam iAccess for iOS
DrillDown Icon Install and Configure Cyberoam General Authentication Client for Mac OS
DrillDown Icon Install and Configure Cyberoam iAccess authentication client for Android OS
DrillDown Icon Install and Configure Cyberoam General Authentication Client for Windows OS
DrillDown Icon Install and Configure Cyberoam General Authentication Client for Linux OS
DrillDown Icon Can we bind MAC Addresses to users using Captive Portal Authentication?
DrillDown Icon Whom should I contact to get the Subscription Key for IPSec VPN client?
DrillDown Icon Errors
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Install and Configure Cyberoam iAccess for iOS

Applicable iOS Version: 6.0 onwards. Compatible with iPhone, iPad, and iPod touch.



Cyberoam's iAccess for iOS is an application for iPhone, iPod touch, and iPad that authenticates users with Cyberoam, integrated with local or external authentication servers.Cyberoam “iAccess” features are enlisted below:

-      Client Authentication. (Supported by all CyberoamOS)
-      Access to the “My Account” portal which allows users to view personal details, manage user credentials. (Supported by all CyberoamOS)
-      Displays information on user’s Internet usage policies and data usage. (Supported by all CyberoamOS)
-      Gives access to quarantined Emails facilitating self-management. (Not supported in 15i, 15iNG and 15wiNG)
-      Periodic “Push Notifications” to be sent to the iOS device. For example the user will be promted to re-login prior to session expiry. (Supported versions 10.6.1 GA onwards)


Install and configure Cyberoam iAccess on iPhone.


To configure Client in iPhone, follow the steps given below.

Step 1: Download and Install Client

Download Client and install it in your mobile device. You can download the Client from: 

-    Apple iTunes
-    From the App Store on the mobile device.

Step 2: Configure Client

   Start Client application. You will be briefed about the app, as shown below.


The login screen appears. Before logging in, you need to define settings for the Client. Click
Settings to configure the client, as shown below.

   Click against Gateway IP and specify the Cyberoam IP Address as your authentication gateway. You can obtain your Cyberoam IP Address from your Network Administrator.

    You can also set the following parameters.




Auto Login

Disabled (Default)

When enabled, user automatically logs in on application start. Disable if you do not want to login automatically.

Save Password

Enabled (Default)

When enabled client saves your password. This option is automatically enabled if Auto Login is enabled. Disable if you do not want client to save your password. 

Show Notification

Enabled (Default)

When enabled user receives periodic “Push Notifications” to. For example, the user will be promted to re-login prior to session expiry.


      Tap Done to return to Login Screen. 


      The auto-discovery of Cyberoam Gateway IP will trigger once the installation is complete. For all future instances, manual intervention is required. 

Step 3: Log into Client 

     In the Login Screen, specify your credentials and tap Login to log into the client.

Step 4: Use Client

iAccess is primarily used to authenticate network users to their gateway Cyberoam for seamless Internet access. Additionally, the client provides the following functionalities. 

     Personal: Displays user’s Cyberoam account information. It also lets a user update his/her details like Email ID, account password etc.
     Account Status: Displays current account status including Policy and Data usage information.
     Quarantine Mails: Displays Virus and Spam Quarantine Emails received by the user. 
     Settings: View and edit configured settings of the Authentication Client.
     FAQs:This section contains Frequently Asked Questions which gives user more information about the client.
     About us: Displays information about the client and the developer: Cyberoam Technologies Pvt. Ltd.


Step 5: Logout

Click Logout on the upper right corner of each screen to logout from the client.




                                                                                                                  Document Version: 1.2 – 4 December, 2014
Article ID: 2944