hit counter script

Viewing Cpu Utilization And Secure Core Technology - Cisco 300 Series Administration Manual

Managed switch
Hide thumbs Also See for 300 Series:
Table of Contents

Advertisement

7
STEP 2
STEP 3
STEP 4

Viewing CPU Utilization and Secure Core Technology

90
-
Active—Both source and destination interfaces are up and forwarding
traffic.
-
Not Ready—Either source or destination (or both) are down or not
forwarding traffic for some reason.
Click Add to add a port or VLAN to be mirrored.
Enter the parameters:
Destination Port—Select the analyzer port to where packets are copied. A
network analyzer, such as a PC running Wireshark, is connected to this port.
If a port is identified as an analyzer destination port, it remains the analyzer
destination port until all entries are removed.
Source Interface—Select the source port or source VLAN from where
traffic is to be mirrored.
Type—Select whether incoming, outgoing, or both types of traffic are
mirrored to the analyzer port. If Port is selected, the options are:
-
Rx Only—Port mirroring on incoming packets.
-
Tx Only—Port mirroring on outgoing packets.
-
Tx and Rx—Port mirroring on both incoming and outgoing packets.
Click Apply. Port mirroring is added to the Running Configuration.
This section describes the Secure Core Technology (SCT) and how to view CPU
usage.
The device handles the following types of traffic, in addition to end-user traffic:
Management traffic
Protocol traffic
Snooping traffic
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version)
Administration: Diagnostics
Viewing CPU Utilization and Secure Core Technology

Advertisement

Table of Contents
loading

Table of Contents