Security violations – Rockwell Automation Ethernet Design Considerations Reference Manual User Manual
Page 57
 
Rockwell Automation Publication ENET-RM002C-EN-P - May 2013
57
Ethernet Infrastructure Features
Chapter 3
Security Violations
In the event of a security violation with a Stratix 8000 or Stratix 8300 switch, one 
of these situations occurs:
•
The maximum number of secure MAC addresses that have been 
configured for a port have been added to the address table, and a station 
whose MAC address is not in the address table attempts to access the 
interface.
•
An address learned or configured on one secure interface is seen on 
another secure interface in the same VLAN. When a violation occurs, the 
port goes into the Restrict mode. In this mode, packets with unknown 
source addresses are dropped and you are notified that a security violation 
has occurred. An SNMP trap is sent, a syslog message is logged, and the 
violation counter increments.
In the event of a security violation with a Stratix 6000 switch, the switch notifies 
the controller of the event (via an input bit) and the controller program decides 
how to proceed (such as shut that switch port down, send an alarm to the HMI, 
or shut the machine down). The switch does not make a decision on how to 
handle the security violation.