安全
认证方法 |
RADIUS, RSA SecureID, LDAP |
记录和监测 |
UTM, antivirus, antispam, Web filtering |
防火墙 |
Y |
能量控制
散热 |
157 BTU/h |
电源 |
150 W |
支持以太网(PoE) |
Y |
技术细节
接口 |
Gigabit Ethernet |
安全特性 |
512 policies (max) |
遵守工业标准 |
802.3af |
无线局域网连接 |
N |
协议
支持网络协议 |
POP3, HTTP, SMTP, IMAP, FTP |
端口 & 界面
扩展插槽 |
1 x SRX Series Mini- PIM\n1 x ExpressCard |
另外
以太网路(RJ-45)连接接口数量 |
8 |
无线连接 |
Y |
2 GbE + 6 Fast Ethernet ports, 1 x Mini-PIM slot, 1 x ExpressCard slot, 1 GB RAM, 1 GB Flash, 4 ports PoE (50 W), 2 x USB
The SRX210 Services Gateway is a secure router that supports up to 750 Mbps firewall, 75 Mbps IPSec VPN, and 80 Mbps IPS. Additional security features include Unified Threat Management (UTM), which consists of: IPS, antispam, antivirus, and Web filtering. With wired and 3G wireless connectivity options, the SRX210 Services Gateway is ideally suited for securing small distributed enterprise locations and took top honors in the SMB Infrastructure category at Interop Tokyo in 2009.
Firewall
- Network attack detection: Yes
- DoS and DDoS protection: Yes
- TCP reassembly for fragmented packet protection: Yes
- Brute force attack mitigation: Yes
- SYN cookie protection: Yes
- Zone-based IP spoofing: Yes
- Malformed packet protection: Yes
Intrusion Prevention System
- Stateful protocol signatures: Yes
- Attack detection mechanisms: Stateful signatures, protocol anomaly detection (zero-day coverage), application identification
- Attack response mechanisms: Drop connection, close connection, session packet log, session summary, email, custom session
- Attack notification mechanisms: Structured syslog
- Worm protection: Yes
- Simplified installation through recommended policies: Yes
- Trojan protection: Yes
- Spyware/adware/keylogger protection: Yes
- Other malware protection: Yes
- Protection against attack proliferation from infected systems: Yes
- Reconnaissance protection: Yes
- Request and response side attack protection: Yes
- Compound attacks — combines stateful signatures and protocol anomalies: Yes
- Create custom attack signatures: Yes
- Access contexts for customization: 500+
- Attack editing (port range, other): Yes
- Stream signatures: Yes
- Protocol thresholds: Yes
- Stateful protocol signatures: Yes
- Approximate number of attacks covered: 5,500+
- Detailed threat descriptions and remediation/patch info: Yes
- Create and enforce appropriate application-usage policies: Yes
- Attacker and target audit trail and reporting: Yes
- Deployment modes: Inline