?
Solved

Checking port utilization on 3750

Posted on 2007-10-02
4
Medium Priority
?
633 Views
Last Modified: 2012-05-05
Can anyone give me a quick rundown on any show/debug commands I can use to check port utilization between 3750 trunk links? Are there any commands that will give me a percent value?
0
Comment
Question by:EntityPacket
  • 2
  • 2
4 Comments
 
LVL 4

Expert Comment

by:msguru
ID: 20001483
You can use the usual "show interface" command on the actual port that the trunk runs on - e.g.:-
show interface gi1/0/1
You could look at the 5 minute input rate and 5 minute output rate .
0
 
LVL 3

Author Comment

by:EntityPacket
ID: 20002355
I saw that, I was wondering if there are any other commands I could use. Thanks.
0
 
LVL 4

Accepted Solution

by:
msguru earned 375 total points
ID: 20005404
Another option is to use MRTG - http://oss.oetiker.ch/mrtg/ to query the appropriate ports via SNMP - this will give you some nice graphs ans stats.
0
 
LVL 3

Author Comment

by:EntityPacket
ID: 20016095
Thanks, but I really wanted to know additional show/debug commands I might could use.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (http://en.wikipedia.org/wiki/Vir…
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question