Skip to content

Commit ff6648b

Browse files
committed
fix(vpc): finished first draft
1 parent 582be6a commit ff6648b

11 files changed

+57
-17
lines changed
10.9 KB
Loading
36.2 KB
Loading
12 Bytes
Loading

pages/vpc/how-to/manage-nacl.mdx

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,20 +35,22 @@ You cannot use NACLs to restrict traffic flow over resources' public network int
3535

3636
- If you have already added rules to the list, then traffic flow is controlled according to the rules' restrictions:
3737

38-
<Lightbox src="scaleway-nacl-list.webp" alt="A screenshot of the NACL tab in the Scaleway console shows three rules: two with a DENY action, and then the final default rule for ALLOW." />
38+
<Lightbox src="scaleway-nacl-screen.webp" alt="A screenshot of the NACL tab in the Scaleway console shows a list of rules." />
3939

4040
## How to read and interpret a NACL
4141

42-
The following guidance applies when reading a VPC's NACL.
42+
The following guidance applies when reading a VPC's NACL. For more detailed information and examples, see our [in-depth guide to understanding NACLs](/vpc/reference-content/understanding-nacls/).
4343

4444
### IPv4 and IPv6
4545

46+
TODO REDO FOR LIST ABOVE ONCE CONSOLE AVAILABLE
4647
<Lightbox src="scaleway-nacl-list-ip.webp" alt="A screenshot of the NACL tab in the Scaleway console highlights the IPv4-IPv6 toggle" />
4748

4849
IPv4 and IPv6 traffic is filtered separately. Each VPC has two distinct NACLs: one for IPv4 and one for IPv6. Use the toggle to switch between these lists. You must manage and create rules for each list separately.
4950

5051
### Rule priority and application
5152

53+
TODO REDO FOR LIST ABOVE ONCE CONSOLE AVAILABLE
5254
<Lightbox src="scaleway-nacl-list-prio.webp" alt="A screenshot of the NACL tab in the Scaleway console indicates that the topmost rule in the list has the highest priority" />
5355

5456
**Read the list from from top to bottom**. Rules closer to the top of the list are applied first. If traffic matches an NACL rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.
@@ -59,16 +61,23 @@ IPv4 and IPv6 traffic is filtered separately. Each VPC has two distinct NACLs: o
5961

6062
This means that if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction. There is a functionality to auto-generate matching inverse rules for this purpose when creating a new rule.
6163

64+
TODO IMAGE WITH INVERSE RULE FOR POSTGRESQL (USE EXAMPLE ABOVE AND CREATE INVERSE)
65+
6266
### NACL default rule
6367

6468
<Lightbox src="scaleway-nacl-list-default.webp" alt="A screenshot of the NACL tab in the Scaleway console highlights the default rule at the bottom of the list" />
69+
TODO REDO FOR LIST ABOVE ONCE CONSOLE AVAILABLE
6570

6671
**A default rule is auto-generated at the end of the list** This rule is generated at the moment you first start to edit your NACL. It carries out its action on all traffic that did not match any other rule in the list.
6772

68-
If you wish, you can modify the default rule to change its action from `DENY` to `ALLOW` (as in the screenshot above). In this case, it allows all traffic that did not match any other rule in the list, to pass.
73+
If you wish, you can modify the default rule to change its action from `DENY` to `ALLOW`, to allow all traffic that did not match any other rule in the list, to pass. However, this is not considered best practice. It is recommended to leave the default rule of `DENY` and use specific `ALLOW` rules higher up the list.cd
6974

7075
## How to add rules to a NACL
7176

77+
<Message type="tip">
78+
The steps below explain the mechanics of creating an NACL rule in the console. For help with constructing a meaningful and effective NACL, see our [in-depth guide to understanding NACLs](/vpc/reference-content/understanding-nacls/) for best practices and examples.
79+
</Message>
80+
7281
1. Click **VPC** in the **Network** section of the [Scaleway console](https://console.scaleway.com/) side menu. The list of your VPCs displays.
7382

7483
2. Click the VPC whose NACL you want to view, then click the **Network ACL** tab.

pages/vpc/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ meta:
66

77
<Alert
88
sentiment="info"
9-
title="VPC Basic Use Case"
9+
title="Secure your VPC with Network ACL rules"
1010
>
11-
Read our [Basic VPC use case](/vpc/reference-content/use-case-basic/) documentation for full details of how to create a simple infrastructure that leverages the advantages of Private Networks, including accompanying Terraform templates.
11+
You can now filter and control traffic flow across the Private Networks of your VPC with our new [Network ACL](/vpc/reference-content/understanding-nacls/) feature.
1212

1313
</Alert>
1414

-22.4 KB
Loading
-16.7 KB
Loading
29.8 KB
Loading
25.5 KB
Loading
-10.5 KB
Binary file not shown.

0 commit comments

Comments
 (0)