Skip to content

Commit

Permalink
doc/network_acl: documented reject ACL rule behavior for bridge networks
Browse files Browse the repository at this point in the history
Signed-off-by: Mike Robski <[email protected]>
  • Loading branch information
mikerobski committed Jan 17, 2025
1 parent f265910 commit f650eed
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion doc/howto/network_acls.md
Original file line number Diff line number Diff line change
Expand Up @@ -212,7 +212,7 @@ When using network ACLs with a bridge network, be aware of the following limitat
- Unlike OVN ACLs, bridge ACLs are applied only on the boundary between the bridge and the Incus host.
This means they can only be used to apply network policies for traffic going to or from external networks (see exception for `nftables` firewall driver below).
They cannot be used for to create {spellexception}`intra-bridge` firewalls, thus firewalls that control traffic between instances connected to the same bridge.
- When using the `nftables` firewall driver you can apply ACLs to the NIC device and control traffic between the instances. In this case the `reject` ACL rules are not permitted and when the default action is set to `reject` it is interpreted as `drop`.
- When using the `nftables` firewall driver you can apply ACLs to the NIC device and control traffic between the instances. In this case the `reject` ACL rules applied to the ingress traffic are converted to `drop` to address nftables limitation.
- {ref}`ACL groups and network selectors <network-acls-selectors>` are not supported.
- When using the `iptables` firewall driver, you cannot use IP range subjects (for example, `192.0.2.1-192.0.2.10`).
- Baseline network service rules are added before ACL rules (in their respective INPUT/OUTPUT chains), because we cannot differentiate between INPUT/OUTPUT and FORWARD traffic once we have jumped into the ACL chain.
Expand Down

0 comments on commit f650eed

Please sign in to comment.