diff --git a/pages/ipam/concepts.mdx b/pages/ipam/concepts.mdx index aca31c053c..27273eb13b 100644 --- a/pages/ipam/concepts.mdx +++ b/pages/ipam/concepts.mdx @@ -7,7 +7,7 @@ content: paragraph: Learn about IP Address Management (IPAM) concepts with Scaleway. Understand how to organize, allocate, and manage IP resources efficiently in your cloud infrastructure. tags: ipam ip-address-management internet-protocol private-ip public-ip flexible-ip list-ips book-ip dates: - validation: 2024-12-03 + validation: 2025-06-11 categories: - networks --- diff --git a/pages/load-balancer/how-to/manage-frontends-and-backends.mdx b/pages/load-balancer/how-to/manage-frontends-and-backends.mdx index d9b843070b..f9422e161e 100644 --- a/pages/load-balancer/how-to/manage-frontends-and-backends.mdx +++ b/pages/load-balancer/how-to/manage-frontends-and-backends.mdx @@ -7,7 +7,7 @@ content: paragraph: Learn how to manage frontends and backends with Scaleway Load Balancer. Configure endpoints, optimize traffic flow, and ensure seamless application performance. tags: load-balancer frontend backend dates: - validation: 2024-12-03 + validation: 2025-06-11 posted: 2021-05-26 categories: - network diff --git a/pages/load-balancer/quickstart.mdx b/pages/load-balancer/quickstart.mdx index f31bb3197f..8abf1e625c 100644 --- a/pages/load-balancer/quickstart.mdx +++ b/pages/load-balancer/quickstart.mdx @@ -7,7 +7,7 @@ content: paragraph: TGet started with Scaleway Load Balancer in minutes. Follow this quickstart guide to set up, configure, and optimize traffic distribution for your applications. tags: load-balancer load balancer frontend backend dates: - validation: 2024-12-03 + validation: 2025-06-11 posted: 2021-05-26 categories: - network diff --git a/pages/vpc/how-to/manage-routing.mdx b/pages/vpc/how-to/manage-routing.mdx index aea7157397..e1b2adaf84 100644 --- a/pages/vpc/how-to/manage-routing.mdx +++ b/pages/vpc/how-to/manage-routing.mdx @@ -7,7 +7,7 @@ content: paragraph: Learn how to manage routing in Scaleway Virtual Private Cloud (VPC). Configure custom routes to control traffic flow and optimize network performance. tags: private-network vpc routing route-table routes default-route local-route subnet dates: - validation: 2024-12-03 + validation: 2025-06-11 posted: 2024-04-09 categories: - network @@ -74,7 +74,7 @@ Your VPC's **route table** can be found in its **Routing** tab. The route table For help with understanding the route table and how to read it, [refer to our documentation about route tables](/vpc/reference-content/understanding-routing/#route-table). -### How to view VPC routes in IPV6 +### How to view VPC routes in IPv6 Scaleway VPC routing supports both IPv4 and IPv6 protocols. Managed routes to Private Networks are simultaneously generated for both IPV4 and IPV6, and both are added to the route table. Use the toggle above the route table to switch from the default view of **IPV4** routes to a view of **IPV6** routes. diff --git a/pages/vpc/reference-content/understanding-nacls.mdx b/pages/vpc/reference-content/understanding-nacls.mdx index 443d666fd9..416104d5d7 100644 --- a/pages/vpc/reference-content/understanding-nacls.mdx +++ b/pages/vpc/reference-content/understanding-nacls.mdx @@ -7,7 +7,7 @@ content: paragraph: Learn how to Network Access Control Lists (NACL) to filter inbound and outbound traffic between the different Private Networks of your VPC. Understand concepts, best practices, and key use cases. tags: vpc nacl network-access-control-list default-rule stateless inbound outbound port dates: - validation: 2025-03-26 + validation: 2025-06-09 posted: 2025-03-26 categories: - network @@ -29,13 +29,13 @@ When you start adding rules to your NACL, traffic flow is restricted between cer -NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic. +NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic. NACLs only control traffic as it enters or exits the Private Network(s) of a VPC. They do not: - Filter traffic between resources attached to the same Private Network - Filter traffic from/to the public internet (for this, use [security groups](/instances/how-to/use-security-groups/) for Instances, or equivalent features for [other resource types](/ipam/reference-content/)). -The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network. +The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network B. However, an Instance on Private Network B is blocked from sending a packet to an Instance on Private Network A, because no specific rules allow it to do so, and the default rule is set to `Deny`. @@ -51,7 +51,7 @@ When defining a NACL rule, you must enter the following settings: - **Source** and **destination**: The rule will apply to traffic originating from this source and being sent to this destination. For both, enter an IP range in [CIDR format](/vpc/concepts/#cidr-block), and a port or port range. Alternatively, you can opt for the rule to apply to all IPs and/or all ports. -- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule, to proceed to its destination. +- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule. ## Rule priority and application @@ -59,7 +59,7 @@ The Network Access Control List should be read from top to bottom. Rules closer ## Statelessness -**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic. +**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic. Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction. diff --git a/pages/vpc/reference-content/understanding-routing.mdx b/pages/vpc/reference-content/understanding-routing.mdx index 2f7a4bd8b1..7468e20040 100644 --- a/pages/vpc/reference-content/understanding-routing.mdx +++ b/pages/vpc/reference-content/understanding-routing.mdx @@ -7,7 +7,7 @@ content: paragraph: Explore the fundamentals of VPC routing with Scaleway. Understand how to manage traffic flow and optimize network routes within your Virtual Private Cloud tags: vpc routing route-table private-network managed-route automatic-route local-subnet-route default-route dates: - validation: 2024-12-03 + validation: 2025-06-11 posted: 2024-05-28 categories: - network