Skip to content
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Fixed warnings for note formatting
  • Loading branch information
sp-techdocs committed Dec 16, 2024
commit fb23645a37db94996f295826850eb87b188062d6
20 changes: 10 additions & 10 deletions source/adminguide/networking/virtual_private_cloud_config.rst
Original file line number Diff line number Diff line change
Expand Up @@ -308,8 +308,8 @@ Configuring Network Access Control List
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.. note::
Network Access Control Lists can only be created if the service
"NetworkACL" is supported by the created VPC.
Network Access Control Lists can only be created if the service
"NetworkACL" is supported by the created VPC.

Define a Network Access Control List (ACL) to control incoming
(ingress) and outgoing (egress) traffic between the associated Network Tier
Expand Down Expand Up @@ -347,14 +347,14 @@ destination" and / or "allow all ingress source" rule to the ACL.
Afterwards traffic can be white- or blacklisted.

.. note::
- ACL Rules in Cloudstack are stateful
- Source / Destination CIDRs are always external Networks
- ACL rules can also been seen on the virtual router of the VPC. Ingress
rules are listed in the table iptables table "filter" while egress rules
are placed in the "mangle" table
- ACL rules for ingress and egress are not correlating. For example a
egress "deny all" won't affect traffic in response to an allowed ingress
connection
- ACL Rules in Cloudstack are stateful
- Source / Destination CIDRs are always external Networks
- ACL rules can also been seen on the virtual router of the VPC. Ingress
rules are listed in the table iptables table "filter" while egress rules
are placed in the "mangle" table
- ACL rules for ingress and egress are not correlating. For example a
egress "deny all" won't affect traffic in response to an allowed ingress
connection


Creating ACL Lists
Expand Down