HomeHome ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles Request New ArticleRequest New Article
RSS Feeds
DrillDown Icon Table of Contents
DrillDown Icon Knowledge Base Information
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon FAQs on Cyberoam and Sophos Firewall
DrillDown Icon Vulnerability Security Advisories
DrillDown Icon Best Practices & Policies
DrillDown Icon Protect Your Cyberoam Appliances from Power Fluctuations
DrillDown Icon Technical Library
DrillDown Icon Deployment
DrillDown Icon Registration & Licensing
DrillDown Icon System
DrillDown Icon Objects
DrillDown Icon Network
DrillDown Icon Identity
DrillDown Icon Firewall
DrillDown Icon How to disable Email notification for virtual host failover?
DrillDown Icon Open a Specific Port in Cyberoam
DrillDown Icon Configure Virtual Host using FQDN
DrillDown Icon Configure HTTPS inspection using third-party Certificate
DrillDown Icon Exclude Users’ Data Accounting for Specific Traffic
DrillDown Icon Block Internet access for IPv6-based traffic
DrillDown Icon Import Trusted MAC Address from CSV File
DrillDown Icon Allow Remote Desktop Connection of Internal Network Resources over Internet
DrillDown Icon Allow Only Email Traffic While Blocking All Internet Access
DrillDown Icon Does Cyberoam protect the network against IP Spoofing?
DrillDown Icon Configure Location-aware Identity-based Access Control Policy
DrillDown Icon Configure Virtual Host with Load Balancing and Health Checking
DrillDown Icon Allow Access to Internal Server Behind Cyberoam Using Non-Standard Port
DrillDown Icon Create a Schedule Based Firewall Rule
DrillDown Icon How to create a Country-based Firewall Rule
DrillDown Icon Create Source NAT Policy in Cyberoam
DrillDown Icon Create DoS Bypass Rule
DrillDown Icon Configure Port Forwarding using Virtual Host to access devices on Internal network
DrillDown Icon Publish Internal Server over Internet
DrillDown Icon Block Internet Access Based on MAC Address
DrillDown Icon Configure Policy-based Routing
DrillDown Icon How can I protect my network’s internal resources from becoming zombies and being illegitimately used for Spamming?
DrillDown Icon How to find out the country to which an IP Address belongs?
DrillDown Icon How to NAT Cyberoam generated traffic?
DrillDown Icon Why client computers are not able to get DHCP lease IP after deployment of Cyberoam in bridge mode between DHCP Server and Clien
DrillDown Icon How can we enable Strict Authentication for unauthenticated users?
DrillDown Icon Create Reflexive Firewall Rules to publish Internal Server
DrillDown Icon How to prevent TCP Split Handshake spoof attack?
DrillDown Icon VPN
DrillDown Icon IPS
DrillDown Icon Web Filter
DrillDown Icon Application Filter
DrillDown Icon Web Application Firewall (WAF)
DrillDown Icon IM
DrillDown Icon Quality of Service (QoS)
DrillDown Icon Anti Virus
DrillDown Icon Anti Spam
DrillDown Icon Logs & Reports
DrillDown Icon Clients
DrillDown Icon Cyberoam Maintenance
DrillDown Icon Compatibility
DrillDown Icon Archives
DrillDown Icon Visio Stencils for Cyberoam security appliances
DrillDown Icon Product Technical Support
DrillDown Icon Cyberoam Virtual Security
DrillDown Icon Cyberoam iView
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
  Subscribe Print PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
 
Open a Specific Port in Cyberoam

Applicable Version: 10.00 onwards

Overview

In order to allow certain services to traverse through Cyberoam, administrator has to open the necessary port(s). This can be done by allowing traffic through those services, or ports, using Firewall Rule. 

This article describes how we can open a port in Cyberoam.

Scenario

Open SMTP Port 25 to allow Email communication through Cyberoam.

Configuration

You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s).

Step 1: Create an IP Host

Go to Object > Host > IP Host and click Add to create a new host.  

Parameters

Value

Description

Name

MailServer

Specify a name to identify the IP Host.

IP Family

IPv4

Select the type of IP Family.

 

Available Options:

 

IPv4 

IPv6 

Type

IP

Select the type of host.

 

Available Options:

 

Single IP Address

Network IP Address with subnet

IP Range

IP List

 

Note:

 

Only Class B IP Addresses can be added in IP list. IP Addresses can be added or removed from IP list.

 

IP Address

172.16.16.0

Specify IPv4 Address or IPv6 Address based on the Host Type selected.

 

Click OK to save the IP Host. 

Step 2: Add a Firewall Rule        

Go to Firewall > Rule > Rule and click Add to create a new Firewall Rule.  

Parameters

Value

Description

Name

Allow SMTP

Specify a name to identify the Firewall Rule.

Zone (Source-Destination)

LAN-WAN

Select source and destination zone to which the rule applies.

Network/Host(Source-Destination)

MailServer — Any IP Address

Specify source and destination host or network address to which the rule applies.

Services

SMTP

Select Services/Service Group to which the Firewall rule applies.

Schedule

All The Time

Select schedule for the rule.

 

Note:

A new schedule can also be added directly from here.

 

Action

Accept

Select rule action.

 

Available Options:

 

AcceptAllow access

DropSilently Discard

RejectDeny access

 

 

Click OK to save the Firewall Rule. 

The above configuration allows Cyberoam to open an SMTP port.

 

 

 

 

 

 

 

                                                                                                                                                 Document Version: 1.0 – 08 May, 2015

Attachments
Article ID: 3121