You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/ipam/concepts.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ content:
7
7
paragraph: Learn about IP Address Management (IPAM) concepts with Scaleway. Understand how to organize, allocate, and manage IP resources efficiently in your cloud infrastructure.
Copy file name to clipboardExpand all lines: pages/load-balancer/how-to/manage-frontends-and-backends.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ content:
7
7
paragraph: Learn how to manage frontends and backends with Scaleway Load Balancer. Configure endpoints, optimize traffic flow, and ensure seamless application performance.
Copy file name to clipboardExpand all lines: pages/load-balancer/quickstart.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ content:
7
7
paragraph: TGet started with Scaleway Load Balancer in minutes. Follow this quickstart guide to set up, configure, and optimize traffic distribution for your applications.
Copy file name to clipboardExpand all lines: pages/vpc/how-to/manage-routing.mdx
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ content:
7
7
paragraph: Learn how to manage routing in Scaleway Virtual Private Cloud (VPC). Configure custom routes to control traffic flow and optimize network performance.
@@ -74,7 +74,7 @@ Your VPC's **route table** can be found in its **Routing** tab. The route table
74
74
75
75
For help with understanding the route table and how to read it, [refer to our documentation about route tables](/vpc/reference-content/understanding-routing/#route-table).
76
76
77
-
### How to view VPC routes in IPV6
77
+
### How to view VPC routes in IPv6
78
78
79
79
Scaleway VPC routing supports both IPv4 and IPv6 protocols. Managed routes to Private Networks are simultaneously generated for both IPV4 and IPV6, and both are added to the route table. Use the toggle above the route table to switch from the default view of **IPV4** routes to a view of **IPV6** routes.
Copy file name to clipboardExpand all lines: pages/vpc/reference-content/understanding-nacls.mdx
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ content:
7
7
paragraph: Learn how to Network Access Control Lists (NACL) to filter inbound and outbound traffic between the different Private Networks of your VPC. Understand concepts, best practices, and key use cases.
8
8
tags: vpc nacl network-access-control-list default-rule stateless inbound outbound port
9
9
dates:
10
-
validation: 2025-03-26
10
+
validation: 2025-06-09
11
11
posted: 2025-03-26
12
12
categories:
13
13
- network
@@ -29,13 +29,13 @@ When you start adding rules to your NACL, traffic flow is restricted between cer
29
29
30
30
<Lightboxsrc="scaleway-nacl-diag-simple.webp"alt="A schema shows how the NACL sits at the intersection of two Private Networks in a Scaleway VPC" />
31
31
32
-
NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
32
+
NACL rules are stateless, meaning that the state of connections is not tracked, and return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
33
33
34
34
NACLs only control traffic as it enters or exits the Private Network(s) of a VPC. They do not:
35
35
- Filter traffic between resources attached to the same Private Network
36
36
- Filter traffic from/to the public internet (for this, use [security groups](/instances/how-to/use-security-groups/) for Instances, or equivalent features for [other resource types](/ipam/reference-content/)).
37
37
38
-
The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network.
38
+
The diagram below shows how a NACL allows an Instance on Private Network A to send a packet to an Instance on Private Network B.
39
39
40
40
However, an Instance on Private Network B is blocked from sending a packet to an Instance on Private Network A, because no specific rules allow it to do so, and the default rule is set to `Deny`.
41
41
@@ -51,15 +51,15 @@ When defining a NACL rule, you must enter the following settings:
51
51
52
52
-**Source** and **destination**: The rule will apply to traffic originating from this source and being sent to this destination. For both, enter an IP range in [CIDR format](/vpc/concepts/#cidr-block), and a port or port range. Alternatively, you can opt for the rule to apply to all IPs and/or all ports.
53
53
54
-
-**Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule, to proceed to its destination.
54
+
-**Action**: The NACL will either **Allow** (accept) or **Deny** (drop) traffic that matches the rule.
55
55
56
56
## Rule priority and application
57
57
58
58
The Network Access Control List should be read from top to bottom. Rules closer to the top of the list are applied first. If traffic matches a rule for an **Allow** or **Deny** action, the action is applied immediately. That traffic is not then subject to any further filtering or any further actions by any rules that follow.
59
59
60
60
## Statelessness
61
61
62
-
**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed, just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
62
+
**NACL rules are stateless**. This means the state of connections is not tracked, and inbound and outbound traffic is filtered separately. Return traffic is not automatically allowed just because the outbound request was allowed. Explicit rules are required for each direction of traffic.
63
63
64
64
Therefore, if you create a rule to allow traffic in one direction, you may also need a separate rule to allow the response in the opposite direction.
Copy file name to clipboardExpand all lines: pages/vpc/reference-content/understanding-routing.mdx
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ content:
7
7
paragraph: Explore the fundamentals of VPC routing with Scaleway. Understand how to manage traffic flow and optimize network routes within your Virtual Private Cloud
0 commit comments