Router with integrated switch reduces cyber attack risk
The EDR-810 by Moxa has a built-in managed switch and an industrial-grade secure router that helps protect the network and other devices from a potential cyber attack.
Moxa's EDR-810 is a Gigabit-performance secure router with built-in managed switch with industrial-grade 8+2G secure router and Firewall/NAT/VPN and managed L2 switching functions, which allows it to transmit data efficiently while protecting the network and critical devices from cyber attacks. Firewall policies can control network traffic between different trust zones, and Network Address Translation (NAT) shields the internal LAN from unauthorized activity from outside hosts which is a much more secure architecture than just NAT alone. Additionally, the EDR-810-2GSFP-VPN adds Virtual Private Networking (VPN) which is designed to provide users with secure communication tunnels when accessing a private network from the public Internet.
The EDR-810 is designed for networks that need secure remote access or remote monitoring of field assets, such as pumping/treatment systems in water stations, DCS systems in oil and gas applications, and PLC/SCADA systems in factory automation, the EDR-810 creates an electronic security perimeter to protect critical cyber assets. To secure Ethernet fieldbus networks that use Modbus TCP, the EDR-810 performs deep Modbus TCP protocol packet inspection using PacketGuard technology.
The EDR-810 can hazards such as high EMC interference and extreme temperatures from -40 to 75 C. (-40 to 165 F)
Moxa Americas Inc.
- See more Control Engineering industrial network products.
|Search the online Automation Integrator Guide|
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.