HP (Hewlett-Packard) 2520 Switch User Manual


 
Power Over Ethernet (PoE) Operation
Planning and Implementing a PoE Configuration
Planning and Implementing a PoE
Configuration
This section provides an overview of some considerations for planning a PoE
application. For additional information, refer to the HP ProCurve PoE
Planning and Implementation Guide.
Assigning PoE Ports to VLANs
If your network includes VLANs, you may want to assign various PoE-
configured ports to specific VLANs. For example, if you are using PoE
telephones in your network, you may want to assign ports used for telephone
access to a VLAN reserved for telephone traffic.
Applying Security Features to PoE Configurations
You can utilize security features built into the switch to control device or user
access to the network through PoE ports in the same way as non-PoE ports.
MAC Address Security: Using Port Security, you can configure each
switch port with a unique list of up to eight MAC addresses for devices
that are authorized to access the network through that port. For more
information, refer to the chapter titled “Configuring and Monitoring
Port Security” in the Access Security Guide for your switch.
Username/Password Security: If you are connecting a device that
allows you to enter a username and password that is forwarded to a
networked server for authentication, then you can also configure the
following security features:
TACACS+
RADIUS Authentication and Accounting
802.1X Authentication
For more information, refer to the Access Security Guide for your switch.
11-21