Moxa Secure Router/Firewall FAQs

Menu
Your Cart

Moxa Secure Routers/Firewalls FAQ

This page provides answers to frequently asked questions about Secure Routers and Firewalls. Whether you’re choosing the right model for your network or looking for guidance on setup, security features, and ongoing maintenance, you’ll find helpful information here to ensure reliable and protected network connectivity.

A Moxa secure router is designed for cybersecure networking in factories, IIoT, and critical infrastructure. It provides firewall protection, VPN, NAT, and secure remote access while supporting industrial protocols and rugged deployments for reliable and high-performance industrial networks.

The Moxa EDR-G9010 Series is an industrial cybersecurity router/firewall designed for critical infrastructure and IIoT networks. It offers advanced firewall, VPN, intrusion detection, and secure remote access, ensuring reliable protection for industrial Ethernet, SCADA, and automation systems for high-performance, secure industrial network deployments.

The Moxa TN‑4900 Series is an industrial-grade Gigabit router designed for railway, rolling-stock, and harsh industrial networks. It provides secure routing, firewall protection, and network segmentation while supporting wide temperature ranges, vibration/shock resistance, and M12 rugged connectors. Certified for EN 50155 and IEC 62443‑4‑2, it ensures reliable and cybersecure OT/IIoT network deployments. Perfect for industrial automation, transport, and critical infrastructure applications.

The Moxa TN‑4900 Series is an industrial-grade Gigabit router for railway, rolling stock, and harsh industrial networks. It provides secure routing, firewall protection, and network segmentation while supporting wide temperature ranges, vibration/shock resistance, and M12 rugged connectors. It is certified for EN 50155 and IEC 62443‑4‑2, ensuring reliable and cybersecure OT/IIoT network deployments. Perfect for industrial automation, transport, and critical infrastructure applications.

Yes. The secure‑router lines from Moxa are indeed certified under IEC 62443‑4-2. Specifically, both the EDR-G9010 Series and TN-4900 Series industrial secure routers have earned IEC 62443‑4-2 Security Level 2 (SL2) certification.

Moxa secure routers feature stateful firewall, NAT, VPN, and intrusion detection/prevention (IDS/IPS) for industrial networks. They support deep packet inspection (DPI) for OT protocols, network segmentation, and secure boot to prevent tampering. Many models are IEC 62443‑4-2 certified, ensuring cybersecurity compliance for IIoT and OT deployments.

Yes, Moxa secure routers support Deep Packet Inspection (DPI) to analyze and control industrial protocol traffic like Modbus, DNP3, IEC 60870‑5‑104, and IEC 61850. This allows granular firewall rules, intrusion detection, and secure network segmentation. DPI, combined with VPN, NAT, and IDS/IPS, ensures robust cybersecurity for IIoT and industrial networks.

Yes, Moxa secure routers support intrusion detection and prevention (IDS/IPS) to monitor and block malicious traffic in industrial networks. Combined with Deep Packet Inspection (DPI), firewall, and VPN, IDS/IPS protects OT devices and IIoT systems from cyber threats. This ensures highly secure, reliable industrial and critical infrastructure networks.

Moxa secure routers integrate into OT networks by providing firewall, VPN, NAT, and IDS/IPS to protect industrial devices. They support network segmentation, VLANs, and Deep Packet Inspection (DPI) for OT protocols like Modbus and DNP3. This enables secure communication between IT and OT networks while maintaining high reliability.

The throughput of Moxa secure routers depends on the model, typically ranging from 100 Mbps to 500+ Mbps for pure routing/firewall performance. When VPN (IPsec, AES encryption) is enabled, real throughput usually drops to around 100–200 Mbps, depending on CPU and encryption strength. High-end models (e.g., EDR series) support high packet-per-second rates for SCADA and industrial traffic. Enabled security features (DPI, firewall rules, logging, NAT, VPN) directly impact final performance. These routers are optimized for stable, real-time OT network traffic, not raw data-center throughput.

Moxa offers MXview, a network-management platform to automatically discover, visualize network topology, monitor device status, traffic, alerts, and manage firmware/configurations across routers, switches, and gateways. There’s also MXconfig, which enables bulk configuration, IP-address assignment, batch firmware updates, configuration backup/restore, and mass-device firmware deployment, useful when managing many routers/gateways at once. 

  • For secure-router-specific protection and management, Moxa provides MX-ROS, their next-gen OS/software for industrial routers/firewalls: it adds features such as VPN, IPS/IDS/threat detection, firewall, NAT, DPI, and security-hardening tailored for OT networks. 
  • For centralized security and asset management, Moxa supports remote logging/syslog forwarding, user-access control, encrypted management (HTTPS, SNMPv3, SSH) and whitelisting / access-control lists (ACLs) using their secure-edge connectivity portfolio. 
  • For integration with higher-level systems, MXview (and related tools) offer RESTful APIs, OPC tag generation, and can expose network/ device data to SCADA, NMS or IT systems — helpful for unified monitoring and automation dashboards.
  • Access the router via secure Web Console (HTTPS) or MXconfig and navigate to VPN / IPsec Settings.
  • Create a new IPsec or OpenVPN tunnel, define local/remote subnets, and select encryption (AES-128/256, SHA).
  • Configure authentication using pre-shared keys (PSK) or X.509 certificates for secure industrial communication.
  • Apply firewall rules + NAT policies to allow only whitelisted SCADA/OT traffic through the VPN tunnel.
  • Test the connection using VPN status, logs, and ping diagnostics, then enable auto-reconnect for high availability.
  • Log in to the Moxa secure router Web Console (HTTPS) and go to Routing / NAT Settings.
  • Enable NAT (SNAT or DNAT/Port Forwarding) depending on whether you need outbound internet access or inbound device access.
  • Define the internal IP/subnet, external interface, and translated public IP or port.
  • Add corresponding firewall rules to allow only authorized SCADA, PLC, or HMI traffic through NAT.
  • Apply settings and verify using ping, traceroute, and real-time traffic monitoring in the router dashboard.
  • Download the latest official Moxa firmware from the product support page to ensure security patches and stability improvements.
  • Log in to the secure router Web Console via HTTPS or use MXconfig for centralized firmware management.
  • Navigate to Maintenance → Firmware Upgrade, upload the firmware file, and start the update process.
  • Wait for the router to automatically reboot and apply the new firmware without interrupting power.
  • After the upgrade, verify the firmware version, VPN/NAT status, and firewall rules to confirm normal operation.
  • Access the Moxa secure router via HTTPS Web Console and open the System Log / Security Log section.
  • Enable logging for firewall events, VPN connections, authentication attempts, and intrusion alerts.
  • Configure remote Syslog Server forwarding to send logs to a centralized SIEM or SCADA monitoring system.
  • Use MXview to visualize real-time security events, network alerts, and abnormal traffic behavior.
  • Regularly review logs to detect unauthorized access, VPN failures, port scans, and policy violations.

Yes, Moxa secure routers can be remotely managed. Here’s how (in 5 lines):

  • They support remote access via HTTPS, SSH, and SNMPv3, allowing secure configuration and monitoring from afar.
  • With remote Syslog or SNMP traps, you can collect logs/alerts centrally on a network-management or SIEM system.
  • Using MXview or MXconfig, you can manage multiple routers’ settings, firmware updates, and status from a central console.
  • VPN support lets you securely connect to routers over the internet or WAN before management operations.
  • Remote management simplifies maintenance of distributed industrial networks without physical site visits.
  • Log in to the Moxa secure router Web Console via HTTPS with admin credentials.
  • Go to Maintenance → Configuration Backup / Restore.
  • Click Export / Backup to download the current configuration file to your PC.
  • Store the backup securely for disaster recovery or router replacement.
  • You can later restore the config to the same or another Moxa router in minutes.

Moxa classifies secure routers under its “Secure Routers” product line, which comes with a 5‑year hardware warranty from the date of shipping. During that period, Moxa guarantees against manufacturing defects — meaning repair or replacement is covered if hardware fails under normal use. After warranty expiration, Moxa may offer post‑warranty repair service, depending on spare parts availability and the chipset/product lifecycle — but this is not guaranteed. Support includes access to newer firmware updates, security patches, and documentation as long as the product is within its supported lifecycle — which helps for continued security and stability. 

For very long-term projects, keep in mind that after warranty/support ends, maintenance relies on spare‑part availability and third‑party support — so plan accordingly if you expect > 5 years in the field.

Most Moxa secure routers include multiple Gigabit Ethernet RJ‑45 ports for LAN/WAN or industrial network connectivity. Many models also have SFP slots for fiber-optic connections, enabling long-distance or redundant links. Some routers feature dual-WAN ports for load balancing or failover, enhancing network reliability. Industrial-grade models may include console/serial ports (RS‑232/RS‑485) for local management or legacy device connections. Port availability and type vary by model, so always check the specific datasheet to confirm LAN/WAN, SFP, and serial interfaces.

Yes, Moxa secure routers support VLANs and network segmentation. Here’s a concise 5‑line explanation:

  • They allow the creation of 802.1Q VLANs to logically separate traffic on the same physical network, improving security and performance.
  • Inter-VLAN routing can be managed on the router to control communication between segments.
  • VLANs can be combined with firewall rules and ACLs to enforce strict segmentation for SCADA, OT, and IT networks.
  • Supports dual LAN / multi-interface setups, enabling physical and logical isolation of critical industrial traffic.

These features are widely used in industrial automation, smart substations, and mission-critical OT networks to enhance reliability and cybersecurity.

Moxa secure routers implement secure-by-design features aligned with industrial cybersecurity standards like IEC 62443, including hardened OS and secure management interfaces.

  • They support VPNs (IPsec/OpenVPN), encrypted management (HTTPS, SSH), and SNMPv3, ensuring secure remote access and data integrity.
  • Firewall, NAT, and VLAN segmentation help isolate OT networks and prevent unauthorized access.
  • Real-time monitoring with MXview, Syslog, and SNMP traps allows operators to detect and respond to security events promptly.

Together, these features enable compliance with industrial cybersecurity best practices and protect SCADA, PLC, and other critical OT systems.

Feature / AttributeMoxa Secure RoutersRegular Moxa Routers / Standard Routers
Cybersecurity / HardeningDesigned with security-first features: integrated firewall, NAT, VPN, deep packet inspection (DPI), intrusion detection/prevention (IDS/IPS) on some models, secure‑boot, support for industrial cybersecurity standards (e.g, certified to IEC 62443‑4‑2 on flagship models).Typically, do not include built-in firewall/VPN/DPI/IDS; focus is on basic routing/switching. Cybersecurity hardening is minimal or absent (may rely on external firewalls).
Functions integratedMulti‑function: combine routing + firewall + VPN + NAT + managed switch features + protocol‑aware DPI / OT firewall in one device.Usually offer only routing (± basic NAT) and switching; lack integrated VPN, DPI, or OT‑protocol firewall.
OT / Industrial‑grade features + certificationsIndustrial‑grade: wide temperature range, rugged housing, sometimes fiber (SFP) + copper ports, designed for harsh environments; often certified for industrial / substation standards (e.g, IEC 61850‑3, NEMA TS2, ATEX, etc.), especially on secure router lines.Some regular routers / unmanaged switches may have industrial‑rugged variants (DIN‑rail, wide temp), but generally fewer security‑oriented certifications or hardening emphasis. Possibly lower resilience to threats/intrusion.
Use‑case / Target environmentFor OT / industrial / critical‑infrastructure environments where cybersecurity, defense-in-depth, remote access, and network segmentation matter (e.g, substations, factories, water/oil/gas, rail).For non‑critical or simpler networks where standard LAN/WAN routing is enough — e.g, small office, simple automation, non‑critical data paths.
Maintenance / Security lifecycleSecurity posture maintained: firmware updates, VPN/firewall/new‑threat protections, support for secure remote access and network segmentation, designed for long-term secure operation. (Moxa Europe)Focus on basic routing/switching, with limited or no built-in security management — more exposure to vulnerabilities if used in OT-critical contexts.

Use Moxa secure routers when your network needs robust cybersecurity, VPN, segmentation, firewalling, resilience, and you operate in industrial/OT or critical‑infrastructure environments. Regular routers or standard routers are used when you simply need basic routing/switching without the extra security overhead, especially in low‑risk or non‑critical networks.

Yes, Moxa secure routers do support threat prevention and IDS/IPS signatures (on models like EDR‑G9010), giving industrial networks a real defense‑in‑depth layer.

Here’s how they implement it:

  • Their Moxa EDR‑G9010 Series routers include a built‑in Industrial Intrusion Detection/Prevention System (IDS/IPS), turning them into next‑generation firewalls. 
  • The routers use pattern‑based detection and Deep Packet Inspection (DPI) that can analyze OT‑protocol traffic (e.g, Modbus TCP, DNP3, IEC‑61850 MMS, IEC 60870‑5‑104) to detect suspicious or malformed packets. 
  • With the optional IPS license, the router can block (prevent) threats, not only detect them, offering protection against known exploits or attacks on OT networks. 
  • These secure‑router models are also certified under industrial cybersecurity standards (e.g, IEC 62443-4-2 Security Level 2), which implies that their security features (firewall, IDS/IPS, secure‑boot, etc.) follow hardened design practices. 

For centralized threat management, Moxa offers a companion tool, MXsecurity, which collects security events and logs, visualizes OT security posture, and helps manage multiple secure routers.

  • Locate the reset button on the router (usually a small pinhole labeled “Reset”).
  • Power on the router, then press and hold the reset button for about 5–10 seconds using a paperclip or similar tool.
  • Release the button when the status LEDs blink, indicating the device is restoring factory settings.
  • After reboot, the router’s IP address, login credentials, and configuration return to default values.
  • Reconfigure the router via Web Console or MXconfig as needed, and restore backup if required.
  • Power (PWR): solid green indicates normal power; off or red indicates power failure or fault.
  • Status / SYS: blinking green shows the system is booting; solid green shows normal operation; red or amber indicates errors or firmware issues.
  • LAN/WAN Ports (Link/Act): solid green shows a valid connection; blinking green indicates active data transmission.
  • VPN / Security LEDs: some models have dedicated LEDs for VPN or firewall status; solid/active indicates the tunnel is up and secure.
  • SFP / Fiber Ports: similar to LAN LEDs; solid for link, blinking for traffic; colors may differ per model (green/amber) to show speed or port state.

Moxa secure routers are built to industrial‑grade standards, with a wide operating temperature range (e.g, –40 °C to +75 °C) and rugged housings, suitable for harsh factory, substation, or outdoor environments. 

They support network redundancy mechanisms (e.g, dual‑LAN, SFP ports, redundant routing protocols like VRRP / ring‑redundancy) to maintain connectivity even if one link fails. 

With industrial certifications, like IEC 62443‑4-2, IEC 61850-3 / IEEE 1613, NEMA TS2, ATEX/Class I Division 2 (for hazardous‑T or specific variants), they meet stringent requirements for reliability and safety in critical infrastructure, power, oil & gas, and transportation systems. 

Built‑in security and intrusion‑prevention features (firewall, NAT, VPN, DPI, IDS/IPS) help avoid network disruptions caused by cyber‑attacks, contributing to stable and continuous operation under threat conditions. According to Moxa, these routers are designed as “all‑in‑one firewall/NAT/VPN/switch/router” with industrial‑grade reliability, which means lower downtime risk and a solid track record for long‑term deployment in demanding industrial scenarios. 

  • Hardware warranty & RMA support: Moxa offers a 5‑year warranty on “Secure Routers” covering defects in materials or workmanship. 
  • Repair & replacement services: If a router fails (either under warranty or via a service request), you can create an RMA request via Moxa’s support portal. Moxa will repair or replace faulty units according to warranty terms. 
  • Firmware and security‑patch updates: Moxa publishes firmware and security advisories for secure‑router product lines, enabling you to update firmware to patch vulnerabilities or add new features (e.g., fixes for known issues like CVE‑2025‑0415). 
  • Documentation & knowledge base: Through the Moxa support portal, you can access user manuals, configuration guides, application notes, software utilities, and FAQs — useful for installation, configuration, diagnostics, and best practices. 
  • Technical support & customer service: If you run into issues not covered by documentation, Moxa provides support contact channels (online support request) where their experts can assist with problems inside the warranty or help advise on configurations and best practices.

Moxa operates a formal Product Security Incident Response Team (PSIRT) that manages security vulnerabilities and incident response for its industrial networking and automation products. When a vulnerability is reported, PSIRT performs initial triage and analysis, investigates the root cause with R&D, develops remediation patches or mitigations, and then discloses security advisories to customers with details and fixes. Moxa follows industry standards such as CVSS, PSIRT Services Framework, and ISO/IEC 29147 for vulnerability disclosure, and publishes advisories on its support portal to keep users informed of risks and patches. Customers can report potential vulnerabilities directly to PSIRT via the official contact process.

Moxa secure router licensing works by linking a router’s features to a licensed software key or activation code provided with the device. Licenses enable advanced functions such as VPN, firewall, and industrial protocol gateways. Users activate the license via Moxa’s web console or management tools, ensuring that only authorized devices access secure industrial networks. Licenses are tied to device serial numbers and may require periodic validation for continued feature access.

Feature / AttributeMoxa Secure RoutersConsumer / Enterprise Routers
Target EnvironmentHarsh industrial environments (factories, substations, transportation, oil & gas).Offices, homes, or enterprise IT networks; not designed for industrial hazards.
Cybersecurity / HardeningBuilt-in firewall, NAT, VPN (IPsec/OpenVPN), IDS/IPS, DPI, secure boot; IEC 62443-4-2 compliant.May have firewall/VPN; usually no industrial-grade IDS/IPS, limited hardening, not IEC 62443 certified.
Industrial CertificationsIEC 61850-3, IEEE 1613, NEMA TS2, ATEX/Class I Div 2; wide operating temp (–40°C to +75°C).Minimal industrial certifications; normal operating range (0–40°C typical).
Connectivity OptionsMultiple Ethernet ports (RJ-45), SFP fiber slots, serial console ports, dual WAN, and VLAN support.Usually RJ-45 ports only; SFP/fiber is rare in consumer; limited VLANs in home devices.
Reliability & RedundancyDesigned for 24/7 operation; supports dual power inputs, VRRP, redundant links; long lifecycle.Designed for office/home uptime; usually no dual power, limited redundancy, shorter lifecycle.
Management & MonitoringMXview, MXconfig, remote Syslog/SNMPv3; firmware/security updates for industrial deployment.Web UI, SNMP; limited central monitoring for small-scale or enterprise IT networks.
Protocol AwarenessOT-specific DPI and protocol handling (Modbus, DNP3, IEC 60870-5-104, IEC 61850 MMS).Typically, IP/TCP/UDP only; no industrial protocol awareness.
Use CaseSecure, reliable, and monitored OT/SCADA network deployment in critical infrastructure.Internet access, standard LAN/WAN routing, general IT traffic; not OT/SCADA critical.

The EDR‑8010 Series is an industrial‑grade secure router/firewall/NAT/VPN and managed switch built for OT/SCADA networks. It offers 8 × 10/100 Mbps Ethernet ports + 2 × Gigabit (SFP) ports, so you get both copper and fiber connectivity in a single box. 

Security features include a stateful firewall, NAT, VPN (IPsec/L2TP/PPTP), Deep Packet Inspection (DPI) of industrial protocols (like Modbus TCP, DNP3, IEC 61850, EtherNet/IP), and support for intrusion‑prevention/detection (IPS/IDS). It’s wide operating temperature (‑40 °C to +75 °C on “‑T” models), redundant power input (12/24/48 V DC), and metal DIN‑rail enclosure suitable for industrial, substation, or outdoor deployments. 

The EDR‑8010 lets you combine routing, switching, security, and remote‑access VPN in one device for modernizing legacy OT/SCADA networks while maintaining cybersecurity. 

The EDR‑G9010 Series is an industrial-grade secure router/firewall/NAT/VPN and managed switch designed specifically for OT/SCADA and critical infrastructure networks. It combines 10‑port Gigabit networking (8 copper GbE + 2 SFP fiber ports) to support both copper and fiber links in harsh industrial environments. It supports stateful firewall, NAT, IPsec/L2TP/PPTP VPN, secure boot, and deep packet inspection (DPI), with support for industrial protocols like Modbus TCP, DNP3, EtherNet/IP, IEC 61850, etc. It includes intrusion detection/prevention (IDS/IPS) capability (optional license) for threat detection and mitigation, turning it into a next‑generation industrial firewall. 

The EDR‑G9010 Series is industrial‑certified (IEC 62443‑4‑2, IEC 61850‑3 / IEEE 1613, NEMA TS2, ATEX/Class I Div 2, etc.), and built for tough environments with a −40 to +75 °C operating temperature (on “‑T” models).

MX-ROS is the proprietary operating system/software platform that runs on Moxa’s industrial secure routers and firewalls. 

It provides full networking and security features: routing, NAT, VPN, firewall, deep‑packet inspection (DPI), intrusion detection/prevention (IDS/IPS) for OT/industrial environments.
MX-ROS is designed “secure‑by‑design” according to industry standards: development lifecycle meets IEC 62443‑4‑1 guidelines, and many devices running it are certified to IEC 62443‑4‑2 SL2 for industrial cybersecurity. 

The OS supports industrial‑protocol awareness (e.g, Modbus TCP, DNP3, IEC‑104, EtherNet/IP, etc.), enabling DPI and virtual patching, useful for protecting OT traffic without disrupting protocol communications. 

It also offers a streamlined web and CLI interface, easy configuration, diagnostics, logging, and OT‑tailored management tools, simplifying secure‑router deployment and operation in critical infrastructure networks.

  • Stateful firewall & NAT, controls and inspects traffic between LAN/WAN, preventing unauthorized access.
  • VPN support, IPsec, L2TP, and PPTP VPNs enable secure remote access and encrypted site-to-site connections.
  • Intrusion detection & prevention (IDS/IPS), an optional module for detecting and blocking cyber-attacks on OT/SCADA protocols.
  • Deep Packet Inspection (DPI), protocol-aware inspection for industrial protocols like Modbus TCP, DNP3, IEC 61850, EtherNet/IP.
  • User authentication & secure management, HTTPS, SSH, SNMPv3, role-based access, and secure boot for hardened, compliant industrial deployments.

Yes, Moxa does support Deep Packet Inspection (DPI) of industrial protocols on certain secure router/firewall models. 

For example, the EDR-G9010 Series industrial secure router includes DPI capabilities that can parse and inspect traffic for industrial/OT protocols such as Modbus TCP/UDP, DNP3, IEC 60870-5-104, and IEC 61850 MMS, allowing protocol‑aware filtering, anomaly detection, and security policy enforcement. The DPI engine is part of a larger Industrial‑grade security stack (firewall/NAT/VPN/IDS/IPS) for OT networks, giving you visibility and control over not just IP packets but actual application‑level protocol payloads. 

Moxa also offers an OT‑security management suite (e.g., via MX-ROS) to manage DPI, intrusion prevention, and logging to support real‑time monitoring and threat detection tailored for industrial environments.

Here’s what Moxa firewalls offer.

CapabilityWhat Moxa Provides
IDS / IPSThe secure‑router lines, such as EDR‑G9010 Series (and similar), ship with a full industrial‑grade IDS/IPS system.
Deep Packet Inspection (DPI)

Moxa inspects not only IP headers but also payloads — including industrial/OT protocols (Modbus‑TCP, DNP3, IEC 60870‑5‑104, IEC 61850 MMS, etc.) — enabling protocol‑aware threat detection.

Virtual patching / legacy‑device protectionEven for legacy OT devices that cannot be updated, Moxa’s firewall + IPS can block exploit attempts via “virtual patching” — protecting without changing field systems.
Firewall + zone-based policy enforcementStandard firewall/NAT policies let you segment the network into zones (trusted, untrusted, DMZ), controlling exactly which traffic is allowed — the IDS/IPS enforces deeper checks on suspicious traffic.
Centralized monitoring & security‑alert logging

With management software (MXsecurity / security dashboard), Moxa provides real-time visibility of security events — intrusion alerts, traffic anomalies, logging, and alert forwarding. 

OT protocols are often legacy and have little to no built‑in security. DPI + IDS/IPS lets you detect malformed packets, unauthorized commands, protocol abuse, or scanning activity, and block them before they reach critical controllers / RTUs / IEDs.

Yes, some of Moxa’s secure‑firewall / router products are officially certified for IEC 62443 compliance.
The EDR‑8010 VPN 2GSFP and EDR‑G9010 Series Secure Router are listed as developed under an IEC 62443‑4-1 certified development process and are compliant with IEC 62443‑4-2 (Security Level 2).
This compliance means the routers implement ICT‑security best practices for industrial/OT (Operational Technology) environments: hardened firmware/OS, secure‑boot, controlled access, auditability, and defense‑in‑depth design.
According to Moxa’s cybersecurity documentation, these devices are intended to serve as “security‑hardened perimeters” for critical networks (power substations, water/wastewater, factory SCADA, etc.) for deployments where IEC 62443 compliance is required.
  • Firewall throughput (basic routing + firewalling), up to 2 Gbps or about 350,000 packets per second (pps) under ideal conditions. 
  • With Intrusion Prevention System (IPS) enabled, still up to 2 Gbps, but the packet rate drops to ~200,000 pps. 
  • IPsec VPN throughput, when using AES‑256 + SHA‑256, up to ~800 Mbps (≈ 100,000 pps) according to RFC‑2544 testing. 
  • Lower‑end models (e.g, from the Moxa EDR‑8010 Series Secure Router) have firewall throughput of around 500 Mbps, suitable for smaller networks or less demanding traffic loads. 
  • Performance depends strongly on features in use (firewall rules, DPI, VPN, IPS, logging). Enabling more security/inspection features will reduce maximum throughput compared to bare routing.

Moxa secure firewalls are capable of multi‑gigabit routing performance in basic firewall mode, and still several hundreds of Mbps to ~1 Gbps even with encryption or security enabled, sufficient for many industrial OT/SCADA, VPN, or site‑to‑site applications.

Yes, Moxa firewalls (secure routers) can be used for remote VPN access.

  • Moxa secure routers support major VPN protocols such as IPsec, L2TP, and PPTP, enabling encrypted remote connections.
  • You can configure site‑to‑site or remote‑client VPN tunnels, allowing secure access to industrial networks or SCADA systems from remote locations.
  • The routers support strong encryption (AES‑128/256, SHA) and secure authentication to protect data integrity and confidentiality.
  • Combined with firewall and NAT, the VPN ensures secure network segmentation, keeping OT traffic isolated and protected.
  • This makes Moxa firewalls ideal for remote maintenance, remote monitoring, and secure access to critical infrastructure or distributed assets.

Yes, many Moxa secure firewalls/routers support redundancy features to improve reliability. Here’s how they enable redundant/fail‑safe network design:

Redundancy FeatureWhat Moxa Provides / Supports
Network path redundancy (links/ports)Models like EDR‑G9010 Series support RSTP / STP / Turbo Ring (v2) for ring‑based link redundancy, so traffic can reroute if one link fails.
Multiple/redundant ports & link aggregationThey offer multiple Gigabit Ethernet RJ‑45 ports + SFP fiber ports — with port trunking/link aggregation to increase bandwidth and provide redundancy (if one port fails, others maintain the link).
Redundant power inputsSome models accept dual power inputs (e.g., 12/24/48 V DC), so if one power source fails, the other keeps the device up — useful in industrial environments.
Redundant routing/failover protocolsThey support VRRP (Virtual Router Redundancy Protocol) for router‑level redundancy — enabling failover if one router fails.
Combined OT‑grade hardware + redundancyRugged housing, wide temperature range, industrial‑certified components + redundancy features make them suitable for continuous 24/7 operation even under harsh conditions.
  • Connect & Access: Physically connect the Moxa device to your network via Ethernet and access the web console (HTTPS) or CLI via console/SSH.
  • Basic Network Settings: Configure IP addresses, subnet masks, and default gateway for each interface; set DNS if needed.
  • Firewall & Security Rules: Define access control lists (ACLs), NAT rules, VLANs, and zone policies to segment and protect your network.
  • VPN / IDS/IPS / DPI: Enable IPsec/L2TP/PPTP VPN, configure industrial protocol Deep Packet Inspection (DPI) and, if licensed, Intrusion Detection / Prevention (IDS/IPS).
  • Monitoring & Save: Enable logging, SNMPv3, Syslog, review status dashboards, test connectivity, and save configuration to device memory for persistence.

For larger deployments, Moxa also supports MXconfig / MXview for centralized configuration and monitoring.

  • Backup Configuration: Log in via web GUI or CLI and export the current configuration to avoid data loss.
  • Download Firmware: Get the latest firmware for your model from Moxa’s official support/download site.
  • Access Update Interface: Log into the firewall’s web console → System → Firmware Upgrade (or CLI upgrade command).
  • Upload & Install: Upload the downloaded firmware file and start the upgrade; wait for the process to complete without powering off.
  • Reboot & Verify: After automatic reboot, verify firmware version and functionality; restore configuration if needed.

Moxa also supports MXview / MXconfig for batch firmware management on multiple devices in industrial deployments.

  • Access the Device: Log in via web GUI (HTTPS) or CLI (SSH/console).
  • Backup Configuration: In the web GUI, go to System → Configuration → Backup and save the file locally; in CLI, use the save config or backup command.
  • Store Safely: Keep the backup file in a secure location for future restores.
  • Restore Configuration: In case of reset or replacement, go to System → Configuration → Restore in the web GUI (or use CLI restore command), and upload the backup file.
  • Verify & Save: After restoring, confirm all network, firewall, VPN, and security settings are correct, then save/apply configuration to device memory.

Moxa also supports MXview / MXconfig for centralized backup/restore across multiple devices in industrial networks.

Tool / PlatformWhat it provides for Moxa Secure Firewalls/Routers
MXview One / MXviewFull industrial‑network management: automatic device discovery, network topology visualization (wired or wireless), traffic & status monitoring, event/alert management, firmware & configuration management, and security‑view dashboards for device compliance.
MXconfigBulk configuration tool: lets you mass‑configure IPs, VLANs, firewall/VPN/NAT settings, and firmware across many Moxa devices, useful in large or distributed networks.
MXsecurity (or Security‑addons in MXview One)Centralized cybersecurity management: monitoring of intrusion/prevention events, deployment of IPS signatures/updates, security‑policy enforcement, and real‑time alerts to maintain OT security posture.
Syslog / SNMP / REST API + Third‑party NMS integrationFor environments using third‑party network‑management or SCADA systems, Moxa devices can forward logs (via Syslog), send SNMP traps, or expose status/data through RESTful API, enabling unified monitoring and alerting.
Topology, redundancy & diagnostics featuresVisualization of link status, redundant‑link (e.g, ring or dual‑LAN) health, VLAN/port status, PoE/power‑supply status (where applicable), and real‑time traffic/error monitoring helps quickly spot network issues or failures. 

Moxa’s management stack gives you a full toolkit, from per‑device configuration to network‑wide monitoring, security event tracking, firmware management, and integration with external NMS/SCADA systems.

Moxa firewalls like the EDR‑G9010 offer multiple Ethernet and SFP ports, supporting VLANs and network segmentation for expanding industrial networks.

  • High throughput (up to 2 Gbps) and hundreds of thousands of concurrent connections, handling large-scale traffic.
  • Redundancy features (RSTP/Turbo Ring, VRRP, dual power) enable fault-tolerant and resilient deployments across distributed sites.
  • Industrial-grade robustness ensures stability in harsh environments, allowing growth without compromising uptime.
  • Protocol-aware DPI/IDS/IPS, VPN, and firewall policies support secure scaling of both IT and OT network segments.
  • Moxa firewalls like the EDR‑G9010 Series provide multiple Gigabit RJ‑45 Ethernet ports for copper connections.
  • They also include SFP (fiber) slots to support fiber-optic uplinks or long-distance links.
  • Some models support 10/100/1000 Mbps auto-sensing on copper ports for flexible deployment.
  • Fiber SFP ports allow redundant or ring topologies, improving industrial network resilience.

These port options enable mixing copper and fiber for scalable, high-performance industrial networks.

  • Moxa provides a 5‑year hardware warranty for secure routers/firewalls, covering defects in materials or workmanship from the date of shipping. 
  • After warranty, Moxa offers post‑warranty repair (RMA) service, depending on spare parts availability and chipset lifecycle. 
  • Firmware and software support (bug fixes, security patches, updates) are provided via Moxa’s software lifecycle policy, meaning routers will receive updates and security advisories as long as they remain within the supported product line. 
  • Moxa publishes security advisories for router/vulnerability management. You can report vulnerabilities and monitor patches/mitigations for critical issues. 
  • For long-term planning, for extended support beyond 5 years, Moxa can provide post‑warranty repair agreements, but availability depends on parts and product lifecycle.

Moxa secure firewalls support VLANs, zone-based segmentation, and ACLs, allowing separation of OT, IT, and DMZ networks. They provide protocol-aware DPI/IDS/IPS, ensuring industrial traffic (Modbus, DNP3, IEC 61850, etc.) is monitored and controlled between segments. Firewall rules and NAT enforce strict traffic flows, preventing unauthorized access between critical OT devices and other networks. Redundant ports and routing protocols (VRRP, RSTP/Turbo Ring) maintain secure and resilient inter-segment connectivity. Centralized management via MXview / MXsecurity allows monitoring of segmented networks, logging, and rapid response to anomalies or security events.

Logs firewall events, blocked connections, VPN sessions, and policy rule matches locally or via Syslog. For remote monitoring, it supports SNMP traps and centralized syslog forwarding to NMS or SCADA.IDS/IPS and DPI monitor industrial protocols (Modbus, DNP3, IEC 61850) and raise alerts on anomalies or attacks. Configurable severity levels (Emergency, Critical, Warning, Info) allow tailored alerting for different network events. Integration with MXview / MXsecurity enables real-time visualization, threat detection, and centralized OT/IT network security monitoring.

Yes, MXsecurity and MXview One are examples of centralized management tools from Moxa that support management of secure firewalls/routers:

  • MXsecurity lets you centrally manage firewall policies, firmware/licences, and signature updates, and aggregate logs from multiple Moxa secure routers. It provides a unified dashboard with real‑time visibility of network security status, threat alerts, and device groups (by location or function). 
  • MXview One (with its Security Add‑on) enables mass deployment of configurations, topology discovery and visualization, remote config/firmware management, and event/traffic monitoring, covering many Moxa networking devices, including firewalls.
    You can monitor network topology, device status, link health, receive alerts (email, SNMP‑trap, etc.), and have centralized log collection across your OT/IT network. 

For large or geographically distributed deployments, these tools help reduce manual configuration drift, simplify patching and policy updates, and improve consistency and security across many firewalls/routers at once.

Yes, Moxa secure firewalls can be reset to factory defaults.

On many models (e.g., Moxa EDR‑G9010 and EDR‑8010), you can press and hold the physical “Reset” button for ~5 seconds; the device then reboots and clears configuration back to factory defaults. 

Alternatively, via the CLI, you can run the command reload factory-default (optionally no cert) to wipe the configuration. 

Resetting will remove all custom settings, IP addresses, access credentials, firewall/VPN/NAT rules, etc., and restore the out‑of‑box defaults (including default login credentials and network settings). 

On routers with certificate or security‑package features, there may be an option to keep certificate data even when restoring factory defaults, or to reset those too if you want a completely clean slate. 

After reset, you’ll need to reconnect using the default IP/login and reconfigure the router as needed (or restore from a config backup). 

  • Power LED (PWR): Indicates device power status — solid green = normal, off = no power, amber = power issue.
  • System/Status LED (SYS/STA): Shows device health and boot status — blinking = booting, solid = running normally, red = fault.
  • LAN/Ethernet port LEDs (Link/Act): Green indicates active link, blinking = traffic activity, off = no connection.
  • SFP / Fiber port LEDs: Similar to LAN LEDs, show link and activity for fiber connections.
  • VPN / Security / Alarm LEDs: On some models, separate LEDs indicate active VPN, firewall operation, or intrusion detection alerts.

These indicators enable the quick identification of operational status, connectivity, and alert conditions in industrial deployments.

  • Change default credentials and enable strong passwords or certificate-based authentication for web GUI/SSH access.
  • Segment OT and IT networks using VLANs, zone-based firewall rules, and ACLs to limit lateral movement.
  • Enable protocol-aware DPI, IDS/IPS, and VPN encryption to monitor industrial traffic and block malicious activity.
  • Keep firmware updated and apply security patches promptly; use Moxa security advisories for guidance.
  • Centralize monitoring and logging with MXview/MXsecurity or syslog/SNMP, and audit logs regularly for anomalies.

This approach provides defense-in-depth for critical OT/industrial networks while maintaining operational stability.

  • OT/IT network segmentation: Separates control systems from corporate networks to protect critical industrial operations.
  • Remote access via secure VPN: Enables engineers to safely monitor and configure PLCs, RTUs, and SCADA systems from offsite locations.
  • Industrial protocol security: Monitors Modbus, DNP3, IEC 61850, and other OT protocols with DPI/IDS/IPS to block malicious traffic.
  • Redundant and resilient connectivity: Maintains uptime in harsh environments using dual power, dual LAN, and fiber uplinks for critical infrastructure.
  • Audit and compliance: Centralized logging and threat alerts help meet cybersecurity standards (IEC 62443) and regulatory requirements.

Moxa uses a dedicated PSIRT team to receive, triage, and investigate reported vulnerabilities. They provide an initial response within two working days and assess risk using standards like CVSS. Firmware patches or mitigations are developed and published via Security Advisories for affected devices. Temporary guidance (e.g., disabling services, network segmentation) may be given until fixes are available. Users are encouraged to apply updates promptly and subscribe to advisories to maintain OT/industrial network security.