Skip to content

Commit 408b7d3

Browse files
committed
feat(vpc): started nacl doc
1 parent 95851cc commit 408b7d3

File tree

2 files changed

+71
-0
lines changed

2 files changed

+71
-0
lines changed

pages/vpc/concepts.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,10 @@ Internet Protocol Version 6 is the most recent version of the IP protocol used f
6262

6363
When an IPv6-compatible resource is attached to a Private Network, it has a private IPv6 address on that network. Scaleway Private Networks' [DHCP](#dhcp) functionality assigns this private IPv6 address when the resource joins the network. Alternatively you can reserve and attach an IP address of your choice with [IPAM](/ipam/how-to/reserve-ip/).
6464

65+
## Network ACL
66+
67+
A VPC's Network **A**ccess **C**ontrol **L**ist is composed of stateless rules to control the flow of traffic between Private Networks. By default, the list contains no rules and therefore traffic is allowed to flow unrestrictedly between the VPC's Private Networks. [Add rules](TODO) to the list to start creating restrictions.
68+
6569
## Private IP address
6670

6771
A [private IP address](/vpc/how-to/attach-resources-to-pn/#how-to-view-the-resources-ip-address) identifies a resource on a Private Network. When you attach a resource (e.g. an Instance) to the network, you can either [use a reserved IP address](/ipam/how-to/reserve-ip/), or let [DHCP](#dhcp) assign one IPv4 and (if the resource is IPv6-compatible) one IPv6 address from the designated [CIDR blocks](#cidr-block) to that resource.

pages/vpc/how-to/manage-nacl.mdx

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
meta:
3+
title: How to manage Network ACLs
4+
description: Learn how to configure and manage Network Access Control Lists (NACLs) for your Scaleway VPC, to control traffic flow between Private Networks with customizable rules.
5+
content:
6+
h1: How to manage Network ACLs
7+
paragraph: Learn how to configure and manage Network Access Control Lists (NACLs) for your Scaleway VPC, to control traffic flow between Private Networks with customizable rules.
8+
tags: private-network vpc routing route-table routes default-route local-route subnet
9+
dates:
10+
validation: 2025-02-05
11+
posted: 2025-02-05
12+
categories:
13+
- network
14+
---
15+
16+
Every VPC has a Network **A**ccess **C**ontrol **L**ist (NACL). This list is composed of stateless rules to control the flow of traffic between the Private Networks fo the VPC. By default, at first the list contains no rules and therefore traffic is allowed to flow unrestrictedly. This documentation explains how to add and manage rules to effectively control traffic flow.
17+
18+
<Message type="tip">
19+
You cannot use NACLs to restrict traffic flow over resources' public network interfaces. NACLs only filter traffic between the Private Networks of a given VPC. To filter public internet traffic, use [security groups](/instances/how-to/use-security-groups/) for Instances, or equivalent features for [other resource types](/ipam/reference-content/public-connectivity-best-practices/#implementing-security-controls).
20+
</Message>
21+
22+
## How to view a VPC's NACL
23+
24+
1. Click **VPC** in the **Network** section of the [Scaleway console](https://console.scaleway.com/) side menu. The list of your VPCs displays.
25+
26+
2. Click the VPC whose NACL you want to view. The VPC's **Overview** page displays.
27+
28+
TODO SCREENSHOT WITH Network ACL tab highlighted.
29+
30+
3. Click on the **Network ACL** tab.
31+
32+
- If the list is empty, then no rules have been set and there is currently no restriction on traffic flow within the VPC:
33+
34+
TODO SCREENSHOT
35+
36+
- If you have already added rules to the list, then traffic flow is controlled according to the restrictions they set:
37+
38+
TODO SCREENSHOT
39+
40+
## How to read and interpet a VPC's NACL
41+
42+
TODO SCREENSHOT
43+
44+
The following guidance applies when reading a VPC's NACL.
45+
46+
- **IPv4 and IPv6 traffic is filtered separately**. In effect, each VPC therefore has two distinct NACLs: one for IPv4 and one for IPv6. Use the toggle to switch between these lists. You must manage and create rules for each list separately.
47+
48+
- **Read the list from from top to bottom**. Rules closer to the top of the list are applied first. If traffic matches an NACL rule for an **Allow** or **Deny** action, the action is applied immediately. The traffic is not subject to any further filtering or any further actions by any rules that follow.
49+
50+
- **NACL rules are stateless**. This means the state of connections is not tracked and inbound and outbound traffic is filtered separately. Explicit rules are therefore required for each direction of traffic.
51+
52+
- **A default DENY rule is auto-generated at the end of the list** This rule is generated at the moment you first start to edit your NACL. It denies all traffic flow that is not explicitly permitted by the rules above. You can modify or delete this rule if you wish, but if you do then any traffic not explicitly denied by your NACL rules will be allowed to pass.
53+
54+
## How to add rules to a NACL
55+
56+
1. Click **VPC** in the **Network** section of the [Scaleway console](https://console.scaleway.com/) side menu. The list of your VPCs displays.
57+
58+
2. Click the VPC whose NACL you want to view, then click the **Network ACL** tab.
59+
60+
3. If you are creating your first NACL rule, click **Add rule**, otherwise to add a rule to an existing list, click **Edit rules**.
61+
62+
The NACL list moves into edit mode.
63+
64+
4. Click **Add rule**
65+
66+
67+

0 commit comments

Comments
 (0)