Security violations – Rockwell Automation Ethernet Design Considerations Reference Manual User Manual

Page 57

Advertising
background image

Rockwell Automation Publication ENET-RM002C-EN-P - May 2013

57

Ethernet Infrastructure Features

Chapter 3

Security Violations

In the event of a security violation with a Stratix 8000 or Stratix 8300 switch, one
of these situations occurs:

The maximum number of secure MAC addresses that have been
configured for a port have been added to the address table, and a station
whose MAC address is not in the address table attempts to access the
interface.

An address learned or configured on one secure interface is seen on
another secure interface in the same VLAN. When a violation occurs, the
port goes into the Restrict mode. In this mode, packets with unknown
source addresses are dropped and you are notified that a security violation
has occurred. An SNMP trap is sent, a syslog message is logged, and the
violation counter increments.

In the event of a security violation with a Stratix 6000 switch, the switch notifies
the controller of the event (via an input bit) and the controller program decides
how to proceed (such as shut that switch port down, send an alarm to the HMI,
or shut the machine down). The switch does not make a decision on how to
handle the security violation.

Advertising