This is an automated email from the ASF dual-hosted git repository.
weizhou pushed a commit to branch 4.20
in repository https://gitbox.apache.org/repos/asf/cloudstack-documentation.git
The following commit(s) were added to refs/heads/4.20 by this push:
new 5f003697 Clarification of Network ACL rules and Security group rules
(#568)
5f003697 is described below
commit 5f003697d30bd7fec1d27aa0c563356781ce37f6
Author: Wei Zhou <[email protected]>
AuthorDate: Wed Oct 22 11:48:49 2025 +0200
Clarification of Network ACL rules and Security group rules (#568)
---
source/adminguide/networking/security_groups.rst | 5 +++++
source/adminguide/networking/virtual_private_cloud_config.rst | 2 ++
2 files changed, 7 insertions(+)
diff --git a/source/adminguide/networking/security_groups.rst
b/source/adminguide/networking/security_groups.rst
index 241ef1c1..e17a878f 100644
--- a/source/adminguide/networking/security_groups.rst
+++ b/source/adminguide/networking/security_groups.rst
@@ -216,6 +216,11 @@ Adding Ingress and Egress Rules to a Security Group
#. Click Add.
+.. note::
+- If there is no Egress rule in a Security Group, all the outgoing traffic
will be allowed
+- If there are Egress rules in a Security Group, only the outgoing traffic
which match a Egress rule will be allowed
+- Only the incoming traffic which match a Ingress rule will be allowed
+
.. |httpaccess.png| image:: /_static/images/http-access.png
:alt: allows inbound HTTP access from anywhere.
diff --git a/source/adminguide/networking/virtual_private_cloud_config.rst
b/source/adminguide/networking/virtual_private_cloud_config.rst
index 9edcc5c5..c656128b 100644
--- a/source/adminguide/networking/virtual_private_cloud_config.rst
+++ b/source/adminguide/networking/virtual_private_cloud_config.rst
@@ -355,6 +355,8 @@ Afterwards traffic can be white- or blacklisted.
- ACL rules for ingress and egress are not correlating. For example a
egress "deny all" won't affect traffic in response to an allowed ingress
connection
+- The incoming traffic which does not match any ACL rules will be denied
+- The outgoing traffic which does not match any ACL rules will be allowed
Creating ACLs