Why do you believe 100% utilization needs troubleshooting? The common cause is one or more tranmission sources with at least as much bandwidth as the 100% usage link and those source or sources want to move data at their maximum speed.
With regard to using the secondary link when the primary fails, is the secondary link always up or only up by on-demand? If the former, routing metrics can move traffic to a secondary path when the primary path is unavailable. For the latter, link activation is triggered by lost of the primary link. How that's accomplished depends on the nature of the primary and secondary links.
100% of a link utilization means you are consuming the whole bandwidth of link, If you believe you dont have applications that consumes your whole PIPe, then you probably have viruses, malwares running that could impact the Network performance & consumes extra bandwidth.
If you believe its normal traffic , and you have sensitive applications needs special treatment, then you should apply QoS (congestion Managment) to priotrize traffic over another when congestion occurs.
Depending on your routing protocol you can load balance across the two links to ease utilization, or depending on topology load balance using HSRP or GLBP. I would recommend load balancing across the additional link. each link will back up the other should one go down. also, if you are paying ofr a backup link, why not use it.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...