Cisco Systems SRW248G4PK9NA User Manual

Page of 483
Administration: Diagnostics
Viewing CPU Utilization and Secure Core Technology
89
Cisco Small Business 300 Series Managed Switch Administration Guide 
7
Destination Port—Select the analyzer port to where packets are copied. A 
network analyzer, such as a PC running Wireshark, is connected to this port. 
If a port is identified as an analyzer destination port, it remains the analyzer 
destination port until all entries are removed.
Source Interface—Select the source port or source VLAN from where 
traffic is to be mirrored. 
Type—Select whether incoming, outgoing, or both types of traffic are 
mirrored to the analyzer port. If Port is selected, the options are: 
-
Rx Only—Port mirroring on incoming packets. 
-
Tx Only—Port mirroring on outgoing packets.
-
Tx and Rx—Port mirroring on both incoming and outgoing packets.
STEP  4
Click Apply. Port mirroring is added to the Running Configuration.
Viewing CPU Utilization and Secure Core Technology
This section describes the Secure Core Technology (SCT) and how to view CPU 
usage.
The device handles the following types of traffic, in addition to end-user traffic:
Management traffic
Protocol traffic
Snooping traffic
Excessive traffic burdens the CPU, and might prevent normal device operation. 
The device uses the Secure Core Technology (SCT) feature to ensure that the 
device receives and processes management and protocol traffic, no matter how 
much total traffic is received
SCT is enabled by default on the device and cannot 
be disabled. 
There are no interactions with other features.
To display CPU utilization: