7
STEP 2
STEP 3
STEP 4
Viewing CPU Utilization and Secure Core Technology
90
-
Active—Both source and destination interfaces are up and forwarding
traffic.
-
Not Ready—Either source or destination (or both) are down or not
forwarding traffic for some reason.
Click Add to add a port or VLAN to be mirrored.
Enter the parameters:
•
Destination Port—Select the analyzer port to where packets are copied. A
network analyzer, such as a PC running Wireshark, is connected to this port.
If a port is identified as an analyzer destination port, it remains the analyzer
destination port until all entries are removed.
•
Source Interface—Select the source port or source VLAN from where
traffic is to be mirrored.
•
Type—Select whether incoming, outgoing, or both types of traffic are
mirrored to the analyzer port. If Port is selected, the options are:
-
Rx Only—Port mirroring on incoming packets.
-
Tx Only—Port mirroring on outgoing packets.
-
Tx and Rx—Port mirroring on both incoming and outgoing packets.
Click Apply. Port mirroring is added to the Running Configuration.
This section describes the Secure Core Technology (SCT) and how to view CPU
usage.
The device handles the following types of traffic, in addition to end-user traffic:
•
Management traffic
•
Protocol traffic
•
Snooping traffic
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
Administration: Diagnostics
Viewing CPU Utilization and Secure Core Technology