Administration: Diagnostics
Viewing CPU Utilization and Secure Core Technology
89 Cisco Small Business 300 Series Managed Switch Administration Guide
7
Destination Port—Select the analyzer port to where packets are copied. A
network analyzer, such as a PC running Wireshark, is connected to this port.
If a port is identified as an analyzer destination port, it remains the analyzer
destination port until all entries are removed.
Source Interface—Select the source port or source VLAN from where
traffic is to be mirrored.
Type—Select whether incoming, outgoing, or both types of traffic are
mirrored to the analyzer port. If Port is selected, the options are:
-Rx Only—Port mirroring on incoming packets.
-Tx On ly—Port mirroring on outgoing packets.
-Tx an d Rx—Port mirroring on both incoming and outgoing packets.
STEP 4 Click Apply. Port mirroring is added to the Running Configuration.
Viewing CPU Utilization and Secure Core Technology
This section describes the Secure Core Technology (SCT) and how to view CPU
usage.
The device handles the following types of traffic, in addition to end-user traffic:
Management traffic
Protocol traffic
Snooping traffic
Excessive traffic burdens the CPU, and might prevent normal device operation.
The device uses the Secure Core Technology (SCT) feature to ensure that the
device receives and processes management and protocol traffic, no matter how
much total traffic is received. SCT is enabled by default on the device and cannot
be disabled.
There are no interactions with other features.
To display CPU utilization: