Power Over Ethernet (PoE) Operation

Planning and Implementing a PoE Configuration

Planning and Implementing a PoE Configuration

This section provides an overview of some considerations for planning a PoE application. For additional information, refer to the HP ProCurve PoE Planning and Implementation Guide.

Assigning PoE Ports to VLANs

If your network includes VLANs, you may want to assign various PoE­ configured ports to specific VLANs. For example, if you are using PoE telephones in your network, you may want to assign ports used for telephone access to a VLAN reserved for telephone traffic.

Applying Security Features to PoE Configurations

You can utilize security features built into the switch to control device or user access to the network through PoE ports in the same way as non-PoE ports.

MAC Address Security: Using Port Security, you can configure each switch port with a unique list of up to eight MAC addresses for devices that are authorized to access the network through that port. For more information, refer to the chapter titled “Configuring and Monitoring Port Security” in the Access Security Guide for your switch.

Username/Password Security: If you are connecting a device that allows you to enter a username and password that is forwarded to a networked server for authentication, then you can also configure the following security features:

TACACS+

RADIUS Authentication and Accounting

802.1X Authentication

For more information, refer to the Access Security Guide for your switch.

11-21