A customer would like to create an Ethernet traffic monitoring session on a Cisco UCS server to
troubleshoot network connectivity. The customer has entered the following commands via CLI:
UCS-A# scope eth-traffic-mon
UCS-A /eth-traffic-mon # scope fabric a
UCS-A /eth-traffic-mon/fabric # create eth-mon-session EthMonitor33
UCS-A /eth-traffic-mon/fabric/eth-mon-session* # create dest-interface 2 12
UCS-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface* # set speed 20gbps
UCS-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface* # commit-buffer
UCS-A /eth-traffic-mon/fabric/eth-mon-session/dest-interface #
Which outcome will this command sequence produce?
A.
It will create an Ethernet traffic monitoring session to copy and forward traffic to the destination
port at slot 2, port 12, will set the admin speed to 20 Gb/s, and will commit the transaction.
B.
It will create an Ethernet traffic monitoring session to copy and forward traffic to the destination
port at slot 2, port 33, will set the admin speed to 20 Gb/s, and will commit the transaction.
C.
It will create an Ethernet traffic monitoring session to copy and forward traffic to the destination
port at slot 33, port 12, will set the admin speed to 20 Gb/s, and will commit the transaction.
D.
It will create an Ethernet traffic monitoring session to copy and forward traffic to the destination
port at slot 2, port 12, will set the admin speed to 10 Gb/s, and will commit the transaction.