I recently acquired a used ASA 5505 and have encountered issues with getting the PoE output on Ports 6 & 7 working. Theese two PoE ports are behaving like all the other ports (100mbit, Vlan 1). Per the best I could Google, I made sure the all relevant ports are set to "auto" for duplex and link speed. Again, the ports do work for data - just not PoE. The LEDs light up ok.
I've tested four different working devices that can be powered off PoE with it, and all failed to power up using a straight-thru Ethernet cable connected to ports 6 & 7.
Ubiquiti PicoStation M2
What should I do to get PoE working? Is it a defective unit?
: Written by enable_15 at 18:56:43.926 CDT Sun Jun 3 2012
ASA Version 8.4(4)
enable password <redacted> encrypted
passwd <redacted> encrypted
switchport access vlan 2
switchport access vlan 5
ip address 10.0.1.1 255.255.255.0
ip address dhcp setroute
ftp mode passive
clock timezone CST -6
clock summer-time CDT recurring
dns domain-lookup inside
dns server-group DefaultDNS
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network wan
description wan ip on 06.03.2012
object network xbox
description Xbox TCP 3074
object network xbox_udp88
description Xbox UDP 88
object network xbox_tcp3074
description Xbox TCP 3074
object network xbox_tcp1863
description Xbox Video Kinect TCP 1863
object network xbox_udp1863
description Xbox Video Kinect UDP 1863
object network airave_udp500
description Airave UDP 500
object network airave_udp4500
description Airave UDP 4500
access-list outside_in_airave extended permit udp any object airave_udp500
access-list outside_in_airave extended permit udp any object airave_udp4500
I did more research and found MikroTik and Ubiquiti products generally use "passive PoE". This is not compatible with 802.3af, which the ASA 5505 (and everyone else) uses. As a result I'm going to have to get an inline adapter of some kind the converts 802.3af to passive PoE.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :