Skip to content

Commit 0bc7830

Browse files
RoRoJjcirinosclwy
andauthored
Apply suggestions from code review
Co-authored-by: Jessica <[email protected]>
1 parent 1cb64bf commit 0bc7830

File tree

4 files changed

+10
-10
lines changed

4 files changed

+10
-10
lines changed

pages/vpc/concepts.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ When an IPv6-compatible resource is attached to a Private Network, it has a priv
6868
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
6969
</Message>
7070

71-
A VPC's Network **A**ccess **C**ontrol **L**ist is composed of stateless rules to control the flow of traffic between Private Networks. By default, the list contains no rules and therefore traffic is allowed to flow unrestrictedly between the VPC's Private Networks. Add rules to the list to start creating restrictions. [Take a deeper diver into NACLs](/vpc/reference-content/understanding-nacls/).
71+
A VPC's Network **A**ccess **C**ontrol **L**ist is composed of stateless rules to control the flow of traffic between Private Networks. By default, the list contains no rules, and therefore traffic is allowed to flow unrestrictedly between the VPC's Private Networks. Add rules to the list to start creating restrictions. [Take a deeper dive into NACLs](/vpc/reference-content/understanding-nacls/).
7272

7373
## Private IP address
7474

pages/vpc/faq.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Managed Databases do not currently support VPC routing - see our [dedicated docu
4848

4949
### Can I control traffic flow between my VPC's Private Networks?
5050

51-
Yes, use the [Network ACL feature](/vpc/how-to/manage-nacl) to filter packets flowing between the different Private Networks of your VPC. By default all traffic is allowed to pass, until you start to add rules to the VPC's NACL.
51+
Yes, use the [Network ACL feature](/vpc/how-to/manage-nacl) to filter packets flowing between the different Private Networks of your VPC. By default, all traffic is allowed to pass, until you start to add rules to the VPC's NACL.
5252

5353
<Message type="important">
5454
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.

pages/vpc/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ meta:
88
sentiment="info"
99
title="Network Access Control List"
1010
>
11-
Network Access Control Lists (NACLs) are now in Public Beta, allowing you to control routing between the Private Networks of your VPC. Currently, NACLs are configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console..
11+
Network Access Control Lists (NACLs) are now in Public Beta, allowing you to control routing between the Private Networks of your VPC. Currently, NACLs are configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
1212

1313
</Alert>
1414

pages/vpc/reference-content/understanding-nacls.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
meta:
33
title: Understanding Network ACLs
4-
description: Learn how to Network Access Control Lists (NACL) filter inbound and outbound traffic bewteen the different Private Networks of your VPC. Understand concepts, best practices, and key use cases.
4+
description: Learn how to Network Access Control Lists (NACL) filter inbound and outbound traffic between the different Private Networks of your VPC. Understand concepts, best practices, and key use cases.
55
content:
66
h1: Understanding Network ACLs
7-
paragraph: Learn how to Network Access Control Lists (NACL) filter inbound and outbound traffic bewteen the different Private Networks of your VPC. Understand concepts, best practices, and key use cases.
7+
paragraph: Learn how to Network Access Control Lists (NACL) filter inbound and outbound traffic between the different Private Networks of your VPC. Understand concepts, best practices, and key use cases.
88
tags: vpc nacl network-access-control-list default-rule stateless inbound outbound port
99
dates:
1010
validation: 2025-03-26
@@ -17,7 +17,7 @@ categories:
1717
NACLs are currently in Public Beta, and configurable only via the [VPC API](https://www.scaleway.com/en/developers/api/vpc/) and developer tools. This feature will be coming soon to the Scaleway console.
1818
</Message>
1919

20-
Every VPC has a Network **A**ccess **C**ontrol **L**ist (NACL). This list is composed of stateless rules to control the flow of traffic between the Private Networks of the VPC. By default, at first the list contains no rules and therefore traffic is allowed to flow unrestrictedly. You can add rules to restrict traffic flow according to your requirements.
20+
Every VPC has a Network **A**ccess **C**ontrol **L**ist (NACL). This list is composed of stateless rules to control the flow of traffic between the Private Networks of the VPC. By default, at first, the list contains no rules, and therefore traffic is allowed to flow unrestrictedly. You can add rules to restrict traffic flow according to your requirements.
2121

2222
This document sets out general information and best practices about Scaleway VPC NACLs.
2323

@@ -35,7 +35,7 @@ NACLs only control traffic as it enters or exits the Private Network(s) of a VPC
3535
- Filter traffic between resources attached to the same Private Network
3636
- Filter traffic from/to the public internet (for this, use [security groups](/instances/how-to/use-security-groups/) for Instances, or equivalent features for [other resource types](/ipam/reference-content/)).
3737

38-
The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network
38+
The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network.
3939

4040
However, an Instance on Private Network B is blocked from sending a packet to an Instance on Private Network A, because no specific rules allow it to do so, and the default rule is set to `Deny`.
4141

@@ -47,7 +47,7 @@ When defining an NACL rule, you must enter the following settings:
4747

4848
- **IP version**: Either IPv4 or IPv6. The rule will apply only to traffic matching this IP version, meaning that in effect, each VPC has two NACLs: one for IPv4 and one for IPv6. If you want to create an equivalent rule for the other IP version, you must do so separately.
4949

50-
- **Protocol**: Either `TCP`, `UDP` or `ICMP`. The rule will apply only to traffic matching this protocol. Alternatively, you can choose to apply it to traffic matching any protocol.
50+
- **Protocol**: Either `TCP`, `UDP`, or `ICMP`. The rule will apply only to traffic matching this protocol. Alternatively, you can choose to apply it to traffic matching any protocol.
5151

5252
- **Source** and **destination**: The rule will apply to traffic originating from this source and being sent to this destination. For both, enter an IP range range in [CIDR format](/vpc/concepts/#cidr-block), and a port or port range. Alternatively, you can opt for the rule to apply to all IPs and/or all ports.
5353

@@ -67,7 +67,7 @@ Therefore, if you create a rule to allow traffic in one direction, you may also
6767

6868
Each NACL must have a default rule, which applies its action to all traffic that did not match any other rules in the list.
6969

70-
Best practice is to set your default rule to **Deny**, and for all other rules to use the **Allow** action. In this way, you have fine-grained control over the traffic that is allowed to flow, and all other traffic is blocked by default.
70+
Best practice is to set your default rule to **Deny**, and use the **Allow** action for all other rules. This way, you have fine-grained control over the traffic allowed to flow, and all other traffic is blocked by default.
7171

7272
Nonetheless, you can choose to set your default rule to **Allow** if you wish. In this case, all other rules in the list should use the **Deny** action, to filter out the specific traffic you want to block. All other traffic will be permitted by the default rule.
7373

@@ -77,7 +77,7 @@ The table below shows an example of an NACL for IPv4 traffic:
7777

7878
<Lightbox src="scaleway-nacl-example.webp" alt="A table shows a number of NACL rules" />
7979

80-
- A number of TCP rules allow connections to the specific ports necessary for SSH, HTTP and HTTPS traffic. These rules allow all IPv4 sources within the VPC to connect to these ports, for all IPv4 destinations.
80+
- A number of TCP rules allow connections to the specific ports necessary for SSH, HTTP, and HTTPS traffic. These rules allow all IPv4 sources within the VPC to connect to these ports, for all IPv4 destinations.
8181

8282
- An ICMP rule allows all ICMP traffic from/to all IPv4 addresses on all ports, effectively permitting all ping requests within the VPC to function.
8383

0 commit comments

Comments
 (0)