Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion pages/ipam/concepts.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ content:
paragraph: Learn about IP Address Management (IPAM) concepts with Scaleway. Understand how to organize, allocate, and manage IP resources efficiently in your cloud infrastructure.
tags: ipam ip-address-management internet-protocol private-ip public-ip flexible-ip list-ips book-ip
dates:
validation: 2024-12-03
validation: 2025-06-11
categories:
- networks
---
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ content:
paragraph: Learn how to manage frontends and backends with Scaleway Load Balancer. Configure endpoints, optimize traffic flow, and ensure seamless application performance.
tags: load-balancer frontend backend
dates:
validation: 2024-12-03
validation: 2025-06-11
posted: 2021-05-26
categories:
- network
Expand Down
2 changes: 1 addition & 1 deletion pages/load-balancer/quickstart.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ content:
paragraph: TGet started with Scaleway Load Balancer in minutes. Follow this quickstart guide to set up, configure, and optimize traffic distribution for your applications.
tags: load-balancer load balancer frontend backend
dates:
validation: 2024-12-03
validation: 2025-06-11
posted: 2021-05-26
categories:
- network
Expand Down
4 changes: 2 additions & 2 deletions pages/vpc/how-to/manage-routing.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ content:
paragraph: Learn how to manage routing in Scaleway Virtual Private Cloud (VPC). Configure custom routes to control traffic flow and optimize network performance.
tags: private-network vpc routing route-table routes default-route local-route subnet
dates:
validation: 2024-12-03
validation: 2025-06-11
posted: 2024-04-09
categories:
- network
Expand Down Expand Up @@ -74,7 +74,7 @@ Your VPC's **route table** can be found in its **Routing** tab. The route table

For help with understanding the route table and how to read it, [refer to our documentation about route tables](/vpc/reference-content/understanding-routing/#route-table).

### How to view VPC routes in IPV6
### How to view VPC routes in IPv6

Scaleway VPC routing supports both IPv4 and IPv6 protocols. Managed routes to Private Networks are simultaneously generated for both IPV4 and IPV6, and both are added to the route table. Use the toggle above the route table to switch from the default view of **IPV4** routes to a view of **IPV6** routes.

Expand Down
10 changes: 5 additions & 5 deletions pages/vpc/reference-content/understanding-nacls.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ content:
paragraph: Learn how to Network Access Control Lists (NACL) to filter inbound and outbound traffic between the different Private Networks of your VPC. Understand concepts, best practices, and key use cases.
tags: vpc nacl network-access-control-list default-rule stateless inbound outbound port
dates:
validation: 2025-03-26
validation: 2025-06-09
posted: 2025-03-26
categories:
- network
Expand All @@ -29,13 +29,13 @@ When you start adding rules to your NACL, traffic flow is restricted between cer

<Lightbox src="scaleway-nacl-diag-simple.webp" alt="A schema shows how the NACL sits at the intersection of two Private Networks in a Scaleway VPC" />

NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic.

NACLs only control traffic as it enters or exits the Private Network(s) of a VPC. They do not:
- Filter traffic between resources attached to the same Private Network
- Filter traffic from/to the public internet (for this, use [security groups](/instances/how-to/use-security-groups/) for Instances, or equivalent features for [other resource types](/ipam/reference-content/)).

The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network.
The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network B.

However, an Instance on Private Network B is blocked from sending a packet to an Instance on Private Network A, because no specific rules allow it to do so, and the default rule is set to `Deny`.

Expand All @@ -51,15 +51,15 @@ When defining a NACL rule, you must enter the following settings:

- **Source** and **destination**: The rule will apply to traffic originating from this source and being sent to this destination. For both, enter an IP range in [CIDR format](/vpc/concepts/#cidr-block), and a port or port range. Alternatively, you can opt for the rule to apply to all IPs and/or all ports.

- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule, to proceed to its destination.
- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule.

## Rule priority and application

The Network Access Control List should be read from top to bottom. Rules closer to the top of the list are applied first. If traffic matches a rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.

## Statelessness

**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic.

Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction.

Expand Down
2 changes: 1 addition & 1 deletion pages/vpc/reference-content/understanding-routing.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ content:
paragraph: Explore the fundamentals of VPC routing with Scaleway. Understand how to manage traffic flow and optimize network routes within your Virtual Private Cloud
tags: vpc routing route-table private-network managed-route automatic-route local-subnet-route default-route
dates:
validation: 2024-12-03
validation: 2025-06-11
posted: 2024-05-28
categories:
- network
Expand Down