Security
Authentication method |
RADIUS, RSA SecureID, LDAP |
Logging and monitoring |
UTM, antivirus, antispam, Web filtering |
Firewall security |
Y |
Power
Heat dissipation |
157 BTU/h |
Power supply |
150 W |
Power over Ethernet (PoE) |
Y |
Technical details
Interface |
Gigabit Ethernet |
Security features |
512 policies (max) |
Compliance industry standards |
802.3af |
Wi-Fi |
N |
Memory
Flash memory |
1024 MB |
Internal memory |
1024 MB |
Protocols
Supported network protocols |
POP3, HTTP, SMTP, IMAP, FTP |
Networking
Networking features |
10/100/1000BASE-T |
Ports & interfaces
Expansion slots |
1 x SRX Series Mini- PIM\n1 x ExpressCard |
Additionally
Ethernet LAN (RJ-45) ports quantity |
8 |
Wireless connections |
Y |
2 GbE + 6 Fast Ethernet ports, 1 x Mini-PIM slot, 1 x ExpressCard slot, 1 GB RAM, 1 GB Flash, 4 ports PoE (50 W), 2 x USB
The SRX210 Services Gateway is a secure router that supports up to 750 Mbps firewall, 75 Mbps IPSec VPN, and 80 Mbps IPS. Additional security features include Unified Threat Management (UTM), which consists of: IPS, antispam, antivirus, and Web filtering. With wired and 3G wireless connectivity options, the SRX210 Services Gateway is ideally suited for securing small distributed enterprise locations and took top honors in the SMB Infrastructure category at Interop Tokyo in 2009.
Firewall
- Network attack detection: Yes
- DoS and DDoS protection: Yes
- TCP reassembly for fragmented packet protection: Yes
- Brute force attack mitigation: Yes
- SYN cookie protection: Yes
- Zone-based IP spoofing: Yes
- Malformed packet protection: Yes
Intrusion Prevention System
- Stateful protocol signatures: Yes
- Attack detection mechanisms: Stateful signatures, protocol anomaly detection (zero-day coverage), application identification
- Attack response mechanisms: Drop connection, close connection, session packet log, session summary, email, custom session
- Attack notification mechanisms: Structured syslog
- Worm protection: Yes
- Simplified installation through recommended policies: Yes
- Trojan protection: Yes
- Spyware/adware/keylogger protection: Yes
- Other malware protection: Yes
- Protection against attack proliferation from infected systems: Yes
- Reconnaissance protection: Yes
- Request and response side attack protection: Yes
- Compound attacks — combines stateful signatures and protocol anomalies: Yes
- Create custom attack signatures: Yes
- Access contexts for customization: 500+
- Attack editing (port range, other): Yes
- Stream signatures: Yes
- Protocol thresholds: Yes
- Stateful protocol signatures: Yes
- Approximate number of attacks covered: 5,500+
- Detailed threat descriptions and remediation/patch info: Yes
- Create and enforce appropriate application-usage policies: Yes
- Attacker and target audit trail and reporting: Yes
- Deployment modes: Inline