Skip to content

Additional information and restructurizing #247

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 5 commits into from
Closed

Additional information and restructurizing #247

wants to merge 5 commits into from

Conversation

Hudratronium
Copy link
Contributor

HI, here my take on the ACL implementation in a VPC context. I added some more information which might be interesting for planning of VPC / tier design as well as security conciderations.

- ACL rules can also beeen seen on the virtual router of the VPC. Ingress
rules are listed in the table iptables table "filter" while egress rules
are placed in the "mangle" table
- ACL rules for ingress and egress are not correlating. For exampel a
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo: example

allowed from the tiers. Default network ACL cannot be removed or
modified. Contents of the default Network ACL is:
In CloudStack terminology, a Network ACL is a group of Network ACL rules.
Network ACL rules are processed by theire order, starting with the lowest
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

typo: their

modified. Contents of the default Network ACL is:
In CloudStack terminology, a Network ACL is a group of Network ACL rules.
Network ACL rules are processed by theire order, starting with the lowest
numbered rule. Each rule defines at least a affected protocol, traffic type,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

a -> an

Network ACL. Only one ACL can be associated with a tier at a time. If no
custome network ACL is availeable at the time of tier creation, adefault
Network ACL has to be used instead. Curretly two default ACL are
availeable. The "default_allow" ACL allows in- and egress traffic while
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

availeable -> available

availeable. The "default_allow" ACL allows in- and egress traffic while
the "default_deny" blocks all in- and egress traffic. Default network
ACL cannot be removed or modified. Newly created ACLs, while showing
empty, deny all incoming traffic to the associated tier and allow all
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sounds good.

@Hudratronium
Copy link
Contributor Author

@weizhouapache
Thanks, will fix the typos and subit another pullrequest - just waiting for the others to potenially review

@Hudratronium
Copy link
Contributor Author

closed this one and opend a new one with updated remarks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants