Power Over Ethernet (PoE) Operation
Planning and Implementing a PoE Configuration
Planning and Implementing a PoE
Configuration
This section provides an overview of some considerations for planning a PoE
application. For additional information, refer to the HP ProCurve
PoE
Planning and Implementation Guide
.
Assigning PoE Ports to VLANs
If your network includes VLANs, you may want to assign various PoE
configured ports to specific VLANs. For example, if you are using PoE
telephones in your network, you may want to assign ports used for telephone
access to a VLAN reserved for telephone traffic.
Applying Security Features to PoE Configurations
You can utilize security features built into the switch to control device or user
access to the network through PoE ports in the same way as non-PoE ports.
■
MAC Address Security:
Using Port Security, you can configure each
switch port with a unique list of up to eight MAC addresses for devices
that are authorized to access the network through that port. For more
information, refer to the chapter titled “Configuring and Monitoring
Port Security” in the
Access Security Guide
for your switch.
■
Username/Password Security:
If you are connecting a device that
allows you to enter a username and password that is forwarded to a
networked server for authentication, then you can also configure the
following security features:
–
–
RADIUS Authentication and Accounting
–
802.1X Authentication
For more information, refer to the
Access Security Guide
for your switch.
11-21
Summary of Contents for PROCURVE 2520
Page 2: ......
Page 3: ...HP ProCurve 2520 Switches November 2009 S 14 03 Management and Configuration Guide ...
Page 60: ...Using the Menu Interface Where To Go From Here 3 16 ...
Page 82: ...Using the Command Line Interface CLI CLI Editing Shortcuts 4 22 ...
Page 146: ...Switch Memory and Configuration Automatic Configuration Update with DHCP Option 66 6 40 ...
Page 164: ...Interface Access and System Information System Information 7 18 ...
Page 292: ...Port Trunking Outbound Traffic Distribution Across Trunked Links 12 30 ...
Page 374: ...Configuring for Network Management Applications LLDP Link Layer Discovery Protocol 13 82 ...
Page 434: ...Monitoring and Analyzing Switch Operation Locating a Device B 30 ...
Page 514: ...Troubleshooting DNS Resolver C 80 ...
Page 524: ...Daylight Savings Time on ProCurve Switches E 4 ...
Page 542: ...16 Index ...
Page 543: ......