-
Notifications
You must be signed in to change notification settings - Fork 118
Additional information and restructurizing #247
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Updated and restructurized text with some more inforamtion regarding ACL
- ACL rules can also beeen seen on the virtual router of the VPC. Ingress | ||
rules are listed in the table iptables table "filter" while egress rules | ||
are placed in the "mangle" table | ||
- ACL rules for ingress and egress are not correlating. For exampel a |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
typo: example
allowed from the tiers. Default network ACL cannot be removed or | ||
modified. Contents of the default Network ACL is: | ||
In CloudStack terminology, a Network ACL is a group of Network ACL rules. | ||
Network ACL rules are processed by theire order, starting with the lowest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
typo: their
modified. Contents of the default Network ACL is: | ||
In CloudStack terminology, a Network ACL is a group of Network ACL rules. | ||
Network ACL rules are processed by theire order, starting with the lowest | ||
numbered rule. Each rule defines at least a affected protocol, traffic type, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
a -> an
Network ACL. Only one ACL can be associated with a tier at a time. If no | ||
custome network ACL is availeable at the time of tier creation, adefault | ||
Network ACL has to be used instead. Curretly two default ACL are | ||
availeable. The "default_allow" ACL allows in- and egress traffic while |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
availeable -> available
availeable. The "default_allow" ACL allows in- and egress traffic while | ||
the "default_deny" blocks all in- and egress traffic. Default network | ||
ACL cannot be removed or modified. Newly created ACLs, while showing | ||
empty, deny all incoming traffic to the associated tier and allow all |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sounds good.
squash typos
@weizhouapache |
closed this one and opend a new one with updated remarks |
HI, here my take on the ACL implementation in a VPC context. I added some more information which might be interesting for planning of VPC / tier design as well as security conciderations.