
64
P
O
E C
ONFIGURATION
PoE Overview
Introduction to PoE
Power over Ethernet (PoE) uses 10BaseT, 100Base-TX, and 1000Base-T twisted
pairs to supply power to the remote powered devices (PD) in the network and
implement power supply and data transmission simultaneously.
Advantages of PoE
■
Reliability: The centralized power supply provides backup convenience, unified
management, and safety.
■
Easy connection: Network terminals only require an Ethernet cable, but no
external power supply.
■
Standard: PoE conforms to the 802.3af standard and uses a globally uniform
power interfaces;
■
Bright application prospect: PoE can be applied to IP phones, wireless access
points (APs), chargers for portable devices, module readers, cameras, and data
collection.
PoE components
■
Power sourcing equipment (PSE): PSE is comprised of the power and the PSE
functional module. It can implement PD detection, PD power information
collection, PoE, power supply monitoring, and power-off for devices.
■
PD: PDs receive power from the PSE. PDs include standard PDs and
nonstandard PDs. Standard PDs conform to the 802.3af standard, including IP
phones, WLAN APs, network cameras and so on.
■
Power interface (PI): PIs are RJ45 interfaces which connect PSE/PDs to network
cables.
PoE Features Supported
by the Switch 7750
The Switch 7750 supports PoE. Equipped with external power supply and
PoE-enabled modules, Switch 7750 can provide -48 VDC power to remote
powered devices (PDs) through twisted pairs.
■
The Switch 7750 support IEEE802.3af standard. While they can also supply
power to PDs noncompliant with the standard.
■
The power supply of the Switch 7750 is administered by the main control
module; each PoE module on the switch can be viewed as a power sourcing
equipment (PSE) and administers the power supply of all the ports on it
independently.
■
The Switch 7750 can deliver data and current simultaneously through data
wires (1, 3, 2, and 6) of category-3/5 twisted pairs.
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...