Use "rate limit" in a sentence

1. Then it focuses on attack response, including egress filtering, packets filtering and rate limit, and the pushback method.