Skip to content

Commit 01d2f73

Browse files
committed
feat(nacl): finish doc
1 parent a810bcd commit 01d2f73

File tree

8 files changed

+22
-6
lines changed

8 files changed

+22
-6
lines changed

menu/navigation.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3078,6 +3078,10 @@
30783078
"label": "Understanding DNS",
30793079
"slug": "dns"
30803080
},
3081+
{
3082+
"label": "Understanding NACLs",
3083+
"slug": "understanding-nacls"
3084+
},
30813085
{
30823086
"label": "Getting the most from Private Networks",
30833087
"slug": "getting-most-private-networks"

pages/vpc/concepts.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ When an IPv6-compatible resource is attached to a Private Network, it has a priv
6565
## Network ACL
6666

6767
<Message type="important">
68-
NACLs are currently in Public Beta, and available only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. They will be coming soon to the Scaleway console.
68+
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
6969
</Message>
7070

7171
A VPC's Network **A**ccess **C**ontrol **L**ist is composed of stateless rules to control the flow of traffic between Private Networks. By default, the list contains no rules and therefore traffic is allowed to flow unrestrictedly between the VPC's Private Networks. Add rules to the list to start creating restrictions. [Take a deeper diver into NACLs](/vpc/reference-content/understanding-nacls/).

pages/vpc/faq.mdx

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,18 @@ This is not currently possible. You may consider using a VPN tunnel to achieve t
4646

4747
Managed Databases do not currently support VPC routing - see our [dedicated documentation](/vpc/reference-content/understanding-routing/#limitations)
4848

49+
## Can I control traffic flow between my VPC's Private Networks?
50+
51+
Yes, use the [Network ACL feature](/vpc/how-to/manage-nacl) to filter packets flowing between the different Private Networks of your VPC. By default all traffic is allowed to pass, until you start to add rules to the VPC's NACL.
52+
53+
<Message type="important">
54+
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
55+
</Message>
56+
57+
## How are NACLs different to security groups?
58+
59+
[Security groups](/instances/how-to/use-security-groups/) filter **public** traffic on your Instances, whereas NACLs filter traffic to/from Private Networks only.
60+
4961
## Private Networks
5062

5163
### What are Private Networks?

pages/vpc/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ meta:
66

77
<Alert
88
sentiment="info"
9-
title="VPC Basic Use Case"
9+
title="Network Access Control List"
1010
>
11-
Read our [Basic VPC use case](/vpc/reference-content/use-case-basic/) documentation for full details of how to create a simple infrastructure that leverages the advantages of Private Networks, including accompanying Terraform/OpenTofu templates.
11+
Network Access Control Lists (NACLs) are now in Public Beta, allowing you to control routing between the Private Networks of your VPC. Currently, NACLs are configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console..
1212

1313
</Alert>
1414

103 KB
Loading
55.2 KB
Loading
29.8 KB
Loading

pages/vpc/reference-content/understanding-nacl.mdx renamed to pages/vpc/reference-content/understanding-nacls.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ categories:
1414
---
1515

1616
<Message type="important">
17-
NACLs are currently in Public Beta, and available only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. They will be coming soon to the Scaleway console.
17+
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
1818
</Message>
1919

20-
Every VPC has a Network **A**ccess **C**ontrol **L**ist (NACL). This list is composed of stateless rules to control the flow of traffic between the Private Networks fo the VPC. By default, at first the list contains no rules and therefore traffic is allowed to flow unrestrictedly. You can add rules to restrict traffic flow according to your requirements.
20+
Every VPC has a Network **A**ccess **C**ontrol **L**ist (NACL). This list is composed of stateless rules to control the flow of traffic between the Private Networks of the VPC. By default, at first the list contains no rules and therefore traffic is allowed to flow unrestrictedly. You can add rules to restrict traffic flow according to your requirements.
2121

2222
This document sets out general information and best practices about Scaleway VPC NACLs.
2323

@@ -67,7 +67,7 @@ Therefore, if you create a rule to allow traffic in one direction, you may also
6767

6868
Each NACL must have a default rule, which applies its action to all traffic that did not match any other rules in the list.
6969

70-
Best practice is to set your default rule to **Deny** (drop), and for all other rules to use the **Allow** (accept) action. In this way, you have fine-grained control over the traffic that is allowed to flow, and all other traffic is blocked by default.
70+
Best practice is to set your default rule to **Deny**, and for all other rules to use the **Allow** action. In this way, you have fine-grained control over the traffic that is allowed to flow, and all other traffic is blocked by default.
7171

7272
Nonetheless, you can choose to set your default rule to **Allow** if you wish. In this case, all other rules in the list should use the **Deny** action, to filter out the specific traffic you want to block. All other traffic will be permitted by the default rule.
7373

0 commit comments

Comments
 (0)