Skip to content

Commit b21980b

Browse files
authored
fix(nw): doc review (#5106)
* fix(vpc): fix nacl doc * fix(network): doc review
1 parent d315a23 commit b21980b

File tree

6 files changed

+11
-11
lines changed

6 files changed

+11
-11
lines changed

pages/ipam/concepts.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ content:
77
paragraph: Learn about IP Address Management (IPAM) concepts with Scaleway. Understand how to organize, allocate, and manage IP resources efficiently in your cloud infrastructure.
88
tags: ipam ip-address-management internet-protocol private-ip public-ip flexible-ip list-ips book-ip
99
dates:
10-
validation: 2024-12-03
10+
validation: 2025-06-11
1111
categories:
1212
- networks
1313
---

pages/load-balancer/how-to/manage-frontends-and-backends.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ content:
77
paragraph: Learn how to manage frontends and backends with Scaleway Load Balancer. Configure endpoints, optimize traffic flow, and ensure seamless application performance.
88
tags: load-balancer frontend backend
99
dates:
10-
validation: 2024-12-03
10+
validation: 2025-06-11
1111
posted: 2021-05-26
1212
categories:
1313
- network

pages/load-balancer/quickstart.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ content:
77
paragraph: TGet started with Scaleway Load Balancer in minutes. Follow this quickstart guide to set up, configure, and optimize traffic distribution for your applications.
88
tags: load-balancer load balancer frontend backend
99
dates:
10-
validation: 2024-12-03
10+
validation: 2025-06-11
1111
posted: 2021-05-26
1212
categories:
1313
- network

pages/vpc/how-to/manage-routing.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ content:
77
paragraph: Learn how to manage routing in Scaleway Virtual Private Cloud (VPC). Configure custom routes to control traffic flow and optimize network performance.
88
tags: private-network vpc routing route-table routes default-route local-route subnet
99
dates:
10-
validation: 2024-12-03
10+
validation: 2025-06-11
1111
posted: 2024-04-09
1212
categories:
1313
- network
@@ -74,7 +74,7 @@ Your VPC's **route table** can be found in its **Routing** tab. The route table
7474

7575
For help with understanding the route table and how to read it, [refer to our documentation about route tables](/vpc/reference-content/understanding-routing/#route-table).
7676

77-
### How to view VPC routes in IPV6
77+
### How to view VPC routes in IPv6
7878

7979
Scaleway VPC routing supports both IPv4 and IPv6 protocols. Managed routes to Private Networks are simultaneously generated for both IPV4 and IPV6, and both are added to the route table. Use the toggle above the route table to switch from the default view of **IPV4** routes to a view of **IPV6** routes.
8080

pages/vpc/reference-content/understanding-nacls.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ content:
77
paragraph: Learn how to Network Access Control Lists (NACL) to filter inbound and outbound traffic between the different Private Networks of your VPC. Understand concepts, best practices, and key use cases.
88
tags: vpc nacl network-access-control-list default-rule stateless inbound outbound port
99
dates:
10-
validation: 2025-03-26
10+
validation: 2025-06-09
1111
posted: 2025-03-26
1212
categories:
1313
- network
@@ -29,13 +29,13 @@ When you start adding rules to your NACL, traffic flow is restricted between cer
2929

3030
<Lightbox src="scaleway-nacl-diag-simple.webp" alt="A schema shows how the NACL sits at the intersection of two Private Networks in a Scaleway VPC" />
3131

32-
NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
32+
NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
3333

3434
NACLs only control traffic as it enters or exits the Private Network(s) of a VPC. They do not:
3535
- Filter traffic between resources attached to the same Private Network
3636
- Filter traffic from/to the public internet (for this, use [security groups](/instances/how-to/use-security-groups/) for Instances, or equivalent features for [other resource types](/ipam/reference-content/)).
3737

38-
The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network.
38+
The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network B.
3939

4040
However, an Instance on Private Network B is blocked from sending a packet to an Instance on Private Network A, because no specific rules allow it to do so, and the default rule is set to `Deny`.
4141

@@ -51,15 +51,15 @@ When defining a NACL rule, you must enter the following settings:
5151

5252
- **Source** and **destination**: The rule will apply to traffic originating from this source and being sent to this destination. For both, enter an IP range in [CIDR format](/vpc/concepts/#cidr-block), and a port or port range. Alternatively, you can opt for the rule to apply to all IPs and/or all ports.
5353

54-
- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule, to proceed to its destination.
54+
- **Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule.
5555

5656
## Rule priority and application
5757

5858
The Network Access Control List should be read from top to bottom. Rules closer to the top of the list are applied first. If traffic matches a rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.
5959

6060
## Statelessness
6161

62-
**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
62+
**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
6363

6464
Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction.
6565

pages/vpc/reference-content/understanding-routing.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ content:
77
paragraph: Explore the fundamentals of VPC routing with Scaleway. Understand how to manage traffic flow and optimize network routes within your Virtual Private Cloud
88
tags: vpc routing route-table private-network managed-route automatic-route local-subnet-route default-route
99
dates:
10-
validation: 2024-12-03
10+
validation: 2025-06-11
1111
posted: 2024-05-28
1212
categories:
1313
- network

0 commit comments

Comments
 (0)