Description
The Moxa IEC-G102-BP Series industrial next-generation IPS devices protect mission-critical assets with industrial-grade IPS and whitelisting. Meanwhile, the Security Dashboard Console (SDC) software, when used together with the IEC-G102-BP Series, offers another layer of protection through centralized critical asset visibility, network analysis, and auto pattern updating.
Centrally Manage Network Security and Enhance OT Visibility
The IEC-G102–BP Series sniffers the network traffic and gives users visibility of existing assets and connections, which helps administrators and operators understand the condition of the current OT system. By connecting to the Security Dashboard Console, a security management platform, the administrators or operators can effectively manage and monitor all the intrusion prevention systems in one place. This provides an easier way to monitor the devices and execute policy updates, firmware updates, and pattern updates.
Dynamically Prevent Malicious Cyber Threat Activity Affecting Your System
The IEC-G102–BP Series is designed to protect mission-critical assets at the OT network edge. It silently analyzes your network traffic in the background and offers granular behavior monitoring and control of cyber activities. These IPS devices provide both “Monitor” and “Protect” modes to facilitate different OT scenarios. Monitoring mode gives administrators full visibility of cyber threat activities. In the case of an emergency, administrators can easily switch to “Protect” mode to block and contain any malicious operations.
Industrial Protocol Whitelist Control for Mission-critical Assets
Using advanced Deep Packet Inspection (DPI) technology, the IEC-G102–BP Series is equipped with industrial protocol awareness to offer granular command of control system traffic to critical controllers.
Virtual Patching and Intelligent Threat Protection
Frequently patching significantly reduces a system’s exposure to cyber threats. However, patching continues to be a critical challenge in the OT environment because OT applications cannot afford to interrupt operations by shutting down systems to apply patches. Virtual patching technology can help complement existing patch management processes by shielding known and unknown vulnerabilities. Virtual patching acts as an agentless emergency security tool that OT administrators and operators can use to quickly remedy vulnerabilities in affected OT equipment. The IEC-G102–BP Series provides advanced protection against threats with its up-to-date threat information and offers your systems exclusive protection from undisclosed and zero-day threats.
End of Life Product - Replacement Available
Please note that the IEC-G102-BP Series has been phased out and replaced by the EDF-G1002-BP Series.
Discover industrial automation
solutions appropriate to your needs, and easily
inquire about the MOXA IEC-G102-BP-SA IPS with Hardware Bypass through our user-friendly website via one of our Middle
East branches (UAE (Dubai), KSA (Al Khobar, Riyadh), and Oman).
Specification
INTERFACE | |
---|---|
Ethernet | 2 x 10/100/1000BaseT(X) Ports (RJ45 connector) |
Serial | 1 x RS-232 Console Port (USB Type-C connector) |
Buttons | Reset button |
Digital Input Channels | |
LED Indicators | PWR1, PWR2, MANAGED, IPS/IDS, USB/F, BYPASS, 10/100/1000M |
Alarm Contact Channels | |
DOS AND DDOS PROTECTION | |
Technology | ICMP Flood, IGMP Flood, UDP Flood, UDP port scan, TCP SYN Flood, TCP Port SYN Scan, TCP Port FIN Scan, TCP Port NULL Scan, TCP Port Xmas Scan |
SOFTWARE FEATURES | |
Supported Interfaces | Web GUI and Security Dashboard Console |
Management | - |
Authentication | |
FIREWALL | |
Throughput | - |
Filter | - |
IPS Throughput | > 200 Mbps |
Intrusion Prevention System | Enabled by default. IPS pattern update functionality requires an additional license |
Latency | < 500 microseconds |
Deep Packet Inspection | Modbus TCP, Modbus UDP, EtherNet/IP, Profinet-DCP, CIP, Omron FINS, Mitsubishi SLMP, Siemens S7 Comm., and Siemens S7 Comm. Plus, With more available through a firmware update |
Policy Enforcement Rules | 512 rules |
ICS Protocol Filter Profiles | 32 profiles |
REAL-TIME FIREWALL / VPN EVENT LOG | |
Event Type | Cybersecurity, Policy enforcement, Protocol Filter, Assets detection, System event |
Media | Local storage, Syslog server |
POWER PARAMETERS | |
Connection | Removable terminal block |
Input Voltage | - |
Input Current | 0.605 A @ 12 VDC, 0.297 A @ 24 VDC, 0.143 A @ 48 VDC |
Reverse Polarity Protection | - |
PHYSICAL CHARACTERISTICS | |
Housing | Metal |
Dimensions | 40 x 70 x 83 mm (1.58 x 2.76 x 3.27 in) |
Weight | 322 g (0.71 lb) |
Installation | DIN-rail mounting, Wall mounting (with optional kit) |
Operating Temperature | -10 to 60°C (14 to 140°F) |
Storage Temperature | -40 to 85°C (-40 to 185°F) |
Ambient Relative Humidity | 5 to 95% (non-condensing) |
Standards and Certifications | Safety: UL 60950-1 Ed.2, UL 62368-1; EMC: EN 55032/35; EMI: CISPR 32, FCC Part 15B Class A; EMS: IEC 61000-4-2 ESD: Contact: 4 kV; Air: 8 kV, IEC 61000-4-3 RS: 80 MHz to 1 GHz: 3 V/m, IEC 61000-4-4 EFT: Power: 1 kV; Signal: 0.5 kV, IEC 61000-4-5 Surge: Power: 0.5 kV; Signal: 1 kV, IEC 61000-4-6 CS: 3 V, IEC 61000-4-8 PFMF; Hazardous Locations: UL/cUL Class I Division 2 Groups A/B/C/D; Railway: EN 50121-4; Traffic Control: NEMA TS2; Shock: IEC 60068-2-27; Freefall: IEC 60068-2-32; Vibration: IEC 60068-2-6; Telcordia (Bellcore), GB |
MTBF | 1,340,000 hrs |