beautypg.com

Planning and implementing a poe configuration, Assigning poe ports to vlans, Applying security features to poe configurations – HP 2600 User Manual

Page 221: Planning and implementing a poe configuration -15, Assigning poe ports to vlans -15

background image

Power Over Ethernet (PoE) Operation for the Series 2600-PWR Switches

Planning and Implementing a PoE Configuration

Planning and Implementing a PoE
Configuration

This section provides an overview of some considerations for planning a PoE
application. For additional information on this topic, refer to the HP ProCurve
PoE Planning and Implementation Guide

.

Assigning PoE Ports to VLANs

If your network includes VLANs, you may want to assign various PoE-config­
ured ports to specific VLANs. For example, if you are using PoE telephones
in your network, you may want to assign ports used for telephone access to a
VLAN reserved for telephone traffic.

Applying Security Features to PoE Configurations

You can utilize security features built into the switch to control device or user
access to the network through PoE ports in the same way as non-PoE ports.

MAC Address Security:

Using Port Security, you can configure each

switch port with a unique list of up to eight MAC addresses for devices
that are authorized to access the network through that port. For more
information, refer to the chapter titled “Configuring and Monitoring
Port Security” in the Access Security Guide for your switch.

Username/Password Security:

If you are connecting a device that

allows you to enter a username and password that is forwarded to a
networked server for authentication, then you can also configure the
following security features:

TACACS+

RADIUS Authentication and Accounting

802.1X Authentication

For more information, refer to the Access Security Guide for your switch.

11-15

This manual is related to the following products: