[Last Call] Learn how to a build a cloud-first strategyRegister Now


Internet Access in Linux using cyberoam client

Posted on 2006-04-24
Medium Priority
Last Modified: 2008-02-07


I have recently installed Fedora Core 4 and as I am relatively new to the operating system I am facing a problem installing my Internet Client.

I downloaded my internet client for Linux (This client is used by me in windows to login with my Internet provider inorder to be able to access the internet. Generally in windows systems it is just a software that I install and then it has name and password fields along with server address) which was a file named "CyberoamLinuxClient.tar.gz". I extracted it to a directory called crclient. There I found that two files had been extracted.

1)An exectutable file by the name of crclient. (This had an icon of a gear)

2)A read me. (I did read this file for installation instruction but was clueless as to what they're trying to say.) I am attaching a copy of the read me text below:
"Read Me.txt:


crclient 1.1 for Unix/Linux

* Introduction
* Make
* Options
* Example of Configuration File


Cyberoam Client is a part of the Cyberoam product which is a complete solution to
Employee Internet Management. This tool provides an interface for the client to
communicate with the Cyberoam server. There are various options provided which help the
client to effectively communicate with the server.

crclient supports two modes at the time of compilation.
1) Single Login
2) Multiple Login
In case of single login only one user is allowed to login at a time. For
enabling single mode the macro CFLAGS in the Makefile has to be disabled.

In case of multiple login option the more then one user can login at a given
time. The macro CFLAGS has to be enabled before making the files.

Other make options include the clean option. Before making the file after the macro is
enabled/disabled the clean option should be used.
$make clean.


-u : The option is responsible for sending a login request to the server. It requires
username as a parameter.

-s : The option is for setting preferences for the client. Preferences such as AskonExit,
AutoLogin, ShowNotification and Server Address can be set using this option. The
preference values are then reflected in the Configuration file.

-l: This option is used to send a logout request to the server. In case of Multiple
Login mode this option requires argument i.e Username.

-h: provides help for the client.

-d: Specify the location for log file.

-v: Sets the verbose mode on. This option is for debugging purpose.

-V: Provides Current Version information.

-f: Specify the location for the configuration file.

Example of Configuration File

AskonExit 0
AutoLogin 0
FirstTime 1
Port 6060
SavePassword 0
User ankit
ShowNotification 1
LiveRequestTime 180
AlreadyLoggedIn 0
VersionId 1
Version crclient1.1

The configuration file includes the above showm parameters. First Configuration file is searched
at /etc, if not found it is searched in the user's home directory. If the configuration file is
not found at both the places a file is created in the user's home directory by accepting the
essential parameters from the User.


i) User has to manually disable the SavePassword option in the configuration file by setting the
value of SavePassword field to zero , once the option is enabled.

ii) Also, if the savepassword option is enabled and Password field is found to be null in the
configuration file the user have to disable the savepassword option i.e by setting the
SavePassword field to 0, inoder to login.

iii) If -f option is specified the full path along with the filename should be specified.
Ex. /home/ankit/CyberClient.conf.

iv) In case of Sun Solaris the multiple process issue is vulnerable.No gaurantee is taken to
control multiple client process invocation.

v) In case of '-d' option if log file cannot be opened at the specified location client exits.
In absence of '-d' option preference for log location is
1) '/var/log'
2) Users home directory
3) '/tmp'
If all the three preferences fail logging will be done on standard output.


I could not find any make files around this executable file and am confused as to how this application should be installed inorder to give me access to the internet on my linux distribution.

My ISP provider has no clue about Linux installation of their client!.

I would be highly obliged if you could help me solve this problem at hand and any information that you may require in order to answer my query specifically shall be furnished to you immediately.

I would be obliged to receive your assistance and comments on the matter.

Question by:Enigmatic_7

Accepted Solution

evangineerX earned 1500 total points
ID: 16524359
Make sure you have the latest version of the client from the Cyberom site and follow these instructions (taken from http://www.cyberoam.com/downloads/guides/V7000/Cyberoam%20Linux%20Client%20guide.pdf ):

Step 3: Extract the file with the following command: tar xvfz CyberoamLinuxClient.tar.gz This will
a) Create a directory named "crclient" in the Current directory
b) Place “crclient” file i.e. Cyberoam Client in the “crclient” directory
c) Place “README” file (help) in the “crclient” directory

Step 4: Run the “crclient” file using the following command to login:

./crclient -u username

Type Server address and password This will create the following default files:
1. .Conf file: <user's Home Directory>/crclient.conf
2. Log file: /var/log/crclient.log
3. Pid file: /tmp/crclient.pid

Note When the system crashes by power off or user is not able to login, check for the file “crclient.pid” ls /tmp/crclient.pid If this file is present then Cyberoam Client will not come up. Remove the file for successful login

Step 5: Logout using following command

./crclient -l

Author Comment

ID: 16573512
This worked..

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses

826 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question