If rates of traffic sent from users are not limited, continuous burst data from many users congests the network. Inbound interface-based rate limiting controls the rate of traffic entering an interface within a specified range.
The system view is displayed.
The system is configured not to count the inter-frame gap and preamble of packets when calculating inbound interface-based rate limiting.
By default, the system counts the inter-frame gap and preamble of packets when calculating the traffic rate for inbound interface-based rate limiting.
The interface view is displayed.
Inbound interface-based rate limiting is configured.
By default, traffic policing is not configured in the inbound direction on an interface.
When interface-based 802.1X authentication is configured and the RADIUS server delivers the rate limit, the interface does not support the rate limit.
When inbound interface-based rate limiting, broadcast traffic suppression in a VLAN (for details on how to configure broadcast traffic suppression in a VLAN, see Configuring Traffic Suppression in a VLAN in "Traffic Suppression and Storm Control Configuration" in the S2720, S5700, and S6700 V200R019C10 Configuration Guide - Security), and inbound MQC-based traffic policing are configured simultaneously on the S2720-EI, S5720-LI, S5720S-LI, S5720-SI, S5720S-SI, S5720I-SI, S5730-SI, S5730S-EI, S6720-LI, S6720S-LI, S6720-SI, and S6720S-SI, these rules take effect in descending order of priority: inbound interface-based rate limiting > broadcast traffic suppression in a VLAN > inbound MQC-based traffic policing. For example, if both inbound interface-based rate limiting and broadcast traffic suppression in a VLAN are configured, inbound interface-based rate limiting takes effect.
If both the IPSG function and inbound interface-based rate limiting are configured on an interface of the S2720-EI, S5720I-SI, S5720-LI, S5720S-LI, S5720S-SI, S5720-SI, S5730S-EI, S5730-SI, S6720-LI, S6720S-LI, S6720S-SI, and S6720-SI, both IPSG and interface-based rate-limiting configurations take effect as long as the configurations do not conflict. Otherwise, only the IPSG configuration takes effect.
Protocol packets are added to the whitelist for inbound interface-based rate limiting and are not rate-limited in the inbound direction of all interfaces.
By default, no protocol packet is added to the whitelist for inbound interface-based rate limiting.
Only the S5735-L, S5735S-L, S5735S-L-M, S5735-S, S5735-S-I, and S5735S-S support this command.
Deleting the Configuration of Inbound Interface-based Rate Limiting
Run the undo qos lr inbound command in the interface view to delete the configuration of inbound interface-based rate limiting configuration.
Verifying the Configuration of Inbound Interface-based Rate Limiting
Run the display qos statistics command to check the rate limiting result and determine whether inbound interface-based rate limiting takes effect.
Statistics about incoming packets on an interface (queried using the display interface or display this interface command) are collected before inbound interface-based rate limiting is performed on the interface. Therefore, you cannot determine whether the rate limit takes effect by comparing the number of incoming packets on an interface with the rate limit.