
Power Over Ethernet (PoE) Operation for the Series 5300xl Switches
Planning and Implementing a PoE Configuration
Applying Security Features to PoE Configurations
You can utilize security features built into the switch to control device or user
access to the network through PoE ports in the same way as non-PoE ports.
■ MAC Address Security: Using Port Security, you can configure each
switch port with a unique list of MAC addresses for devices that are
authorized to access the network through that port. For more infor-
mation, refer to the chapter titled "Configuring and Monitoring Port
Security" in the Access Security Guide for your switch.
■ Username/Password Security: If you are connecting a device that
allows you to enter a username and password that is forwarded to a
networked server for authentication, then you can also configure the
following security features:
– Local username and password
– TACACS+
– RADIUS Authentication and Accounting
– 802.1X Authentication
For more information on security options, refer to the latest edition of the
Access Security Guide for your switch. (The ProCurve Networking web site
offers the latest version of all ProCurve product publications. Refer to “Getting
Documentation from the Web” in chapter 1, “Getting Started”.)
Assigning Priority Policies to PoE Traffic
You can use the configurable QoS (Quality of Service) features in the switch
to create prioritization policies for traffic moving through PoE ports. Table 11-
3 lists the available classifiers and their order of precedence.
Table 11-3. Classifiers for Prioritizing Outbound Packets
Priority QoS Classifier
1
UDP/TCP Application Type (port)
2
Device Priority (destination or source IP address)
3
IP Type of Service (ToS) field (IP packets only)
4
Protocol Priority (IP, IPX, ARP, DEC LAT, AppleTalk, SNA, and NetBeui)
5
VLAN Priority
6
Incoming source-port on the switch
7
Incoming 802.1p priority (present in tagged VLAN environments)
11-20
Comentários a estes Manuais