CoS IRL Port-Resource (Inbound Rate Limiter)

Unlike rate shaping, inbound rate limiting or rate policing simply drops or clips traffic inbound if a configured rate is exceeded. See Rate Limiting for a general discussion of rate limiting. CoS inbound rate limiting allows you to configure rate limits based on a unit rate (kilobits/second, megabits/second, gigabits/second), or percentage of the port‘s line speed. On the S- and K-Series, the IRL port-resource configuration allows you to enable sending syslog messages or traps once a rate limit is exceeded, as well as to disable the port.

The show cos port-resource irl command displays resources for each port group created along with the index, as described above. By default, no resources are configured for IRL port-resources. Rates displayed as none indicate no resources exist. The default Rate Limiting algorithm is tail-drop. On the S- and K-Series, the Action field in the display indicates user-desired action for each syslog, trap, and port disable behavior when configured.

The following example displays default values for the show cos port-resource irl command output:

System(rw)->show cos port-resource irl
'?' after the rate value indicates an invalid rate value
Group Index Resource Type Unit    Rate      Rate Limit Type Action
----------- -------- ---- ---- ----------   --------------- ------
0.0         0        irl  perc none         drop            none
0.0         1        irl  perc none         drop            none
0.0         2        irl  perc none         drop            none
0.0         3        irl  perc none         drop            none
0.0         4        irl  perc none         drop            none
0.0         5        irl  perc none         drop            none
0.0         6        irl  perc none         drop            none
0.0         7        irl  perc none         drop            none
0.0         8        irl  perc none         drop            none
.
.
.
No violators exist for this/these irl(s)

The set cos port-resource irl command is used for creating inbound rate limiters. You need to: