HP (Hewlett-Packard) 2626 Switch User Manual


 
Power Over Ethernet (PoE) Operation for the Series 2600-PWR Switches
Planning and Implementing a PoE Configuration
Planning and Implementing a PoE
Configuration
This section provides an overview of some considerations for planning a PoE
application. For additional information on this topic, refer to the HP ProCurve
PoE Planning and Implementation Guide.
Assigning PoE Ports to VLANs
If your network includes VLANs, you may want to assign various PoE-config-
ured ports to specific VLANs. For example, if you are using PoE telephones
in your network, you may want to assign ports used for telephone access to a
VLAN reserved for telephone traffic.
Applying Security Features to PoE Configurations
You can utilize security features built into the switch to control device or user
access to the network through PoE ports in the same way as non-PoE ports.
MAC Address Security: Using Port Security, you can configure each
switch port with a unique list of up to eight MAC addresses for devices
that are authorized to access the network through that port. For more
information, refer to the chapter titled “Configuring and Monitoring
Port Security” in the Access Security Guide for your switch.
Username/Password Security: If you are connecting a device that
allows you to enter a username and password that is forwarded to a
networked server for authentication, then you can also configure the
following security features:
TACACS+
RADIUS Authentication and Accounting
802.1X Authentication
For more information, refer to the Access Security Guide for your switch.
11-15