table inet firewalld { ct helper helper-netbios-ns-udp { type "netbios-ns" protocol udp l3proto ip } chain raw_PREROUTING { type filter hook prerouting priority raw + 10; policy accept; icmpv6 type { nd-router-advert, nd-neighbor-solicit } accept meta nfproto ipv6 fib saddr . iif oif missing drop jump raw_PREROUTING_ZONES } chain raw_PREROUTING_ZONES { iifname "wlp4s0" goto raw_PRE_public iifname "enp2s0" goto raw_PRE_public iifname "virbr0" goto raw_PRE_libvirt goto raw_PRE_public } chain mangle_PREROUTING { type filter hook prerouting priority mangle + 10; policy accept; jump mangle_PREROUTING_ZONES } chain mangle_PREROUTING_ZONES { iifname "wlp4s0" goto mangle_PRE_public iifname "enp2s0" goto mangle_PRE_public iifname "virbr0" goto mangle_PRE_libvirt goto mangle_PRE_public } chain filter_INPUT { type filter hook input priority filter + 10; policy accept; ct state { established, related } accept ct status dnat accept iifname "lo" accept jump filter_INPUT_ZONES ct state { invalid } drop reject with icmpx type admin-prohibited } chain filter_FORWARD { type filter hook forward priority filter + 10; policy accept; ct state { established, related } accept ct status dnat accept iifname "lo" accept ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 type addr-unreachable jump filter_FORWARD_IN_ZONES jump filter_FORWARD_OUT_ZONES ct state { invalid } drop reject with icmpx type admin-prohibited } chain filter_OUTPUT { type filter hook output priority filter + 10; policy accept; oifname "lo" accept ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 type addr-unreachable } chain filter_INPUT_ZONES { iifname "wlp4s0" goto filter_IN_public iifname "enp2s0" goto filter_IN_public iifname "virbr0" goto filter_IN_libvirt goto filter_IN_public } chain filter_FORWARD_IN_ZONES { iifname "wlp4s0" goto filter_FWDI_public iifname "enp2s0" goto filter_FWDI_public iifname "virbr0" goto filter_FWDI_libvirt goto filter_FWDI_public } chain filter_FORWARD_OUT_ZONES { oifname "wlp4s0" goto filter_FWDO_public oifname "enp2s0" goto filter_FWDO_public oifname "virbr0" goto filter_FWDO_libvirt goto filter_FWDO_public } chain raw_PRE_libvirt { jump raw_PRE_libvirt_pre jump raw_PRE_libvirt_log jump raw_PRE_libvirt_deny jump raw_PRE_libvirt_allow jump raw_PRE_libvirt_post } chain raw_PRE_libvirt_pre { } chain raw_PRE_libvirt_log { } chain raw_PRE_libvirt_deny { } chain raw_PRE_libvirt_allow { } chain raw_PRE_libvirt_post { } chain filter_IN_libvirt { jump filter_IN_libvirt_pre jump filter_IN_libvirt_log jump filter_IN_libvirt_deny jump filter_IN_libvirt_allow jump filter_IN_libvirt_post accept } chain filter_IN_libvirt_pre { } chain filter_IN_libvirt_log { } chain filter_IN_libvirt_deny { } chain filter_IN_libvirt_allow { udp dport 67 ct state { new, untracked } accept udp dport 547 ct state { new, untracked } accept tcp dport 53 ct state { new, untracked } accept udp dport 53 ct state { new, untracked } accept tcp dport 22 ct state { new, untracked } accept tcp dport 111 ct state { new, untracked } accept udp dport 111 ct state { new, untracked } accept tcp dport 2049 ct state { new, untracked } accept udp dport 2049 ct state { new, untracked } accept tcp dport 20048 ct state { new, untracked } accept udp dport 20048 ct state { new, untracked } accept meta l4proto icmp ct state { new, untracked } accept meta l4proto ipv6-icmp ct state { new, untracked } accept } chain filter_IN_libvirt_post { reject } chain mangle_PRE_libvirt { jump mangle_PRE_libvirt_pre jump mangle_PRE_libvirt_log jump mangle_PRE_libvirt_deny jump mangle_PRE_libvirt_allow jump mangle_PRE_libvirt_post } chain mangle_PRE_libvirt_pre { } chain mangle_PRE_libvirt_log { } chain mangle_PRE_libvirt_deny { } chain mangle_PRE_libvirt_allow { } chain mangle_PRE_libvirt_post { } chain filter_FWDI_libvirt { jump filter_FWDI_libvirt_pre jump filter_FWDI_libvirt_log jump filter_FWDI_libvirt_deny jump filter_FWDI_libvirt_allow jump filter_FWDI_libvirt_post accept } chain filter_FWDI_libvirt_pre { } chain filter_FWDI_libvirt_log { } chain filter_FWDI_libvirt_deny { } chain filter_FWDI_libvirt_allow { } chain filter_FWDI_libvirt_post { } chain filter_FWDO_libvirt { jump filter_FWDO_libvirt_pre jump filter_FWDO_libvirt_log jump filter_FWDO_libvirt_deny jump filter_FWDO_libvirt_allow jump filter_FWDO_libvirt_post accept } chain filter_FWDO_libvirt_pre { } chain filter_FWDO_libvirt_log { } chain filter_FWDO_libvirt_deny { } chain filter_FWDO_libvirt_allow { } chain filter_FWDO_libvirt_post { } chain raw_PRE_public { jump raw_PRE_public_pre jump raw_PRE_public_log jump raw_PRE_public_deny jump raw_PRE_public_allow jump raw_PRE_public_post } chain raw_PRE_public_pre { } chain raw_PRE_public_log { } chain raw_PRE_public_deny { } chain raw_PRE_public_allow { } chain raw_PRE_public_post { } chain filter_IN_public { jump filter_IN_public_pre jump filter_IN_public_log jump filter_IN_public_deny jump filter_IN_public_allow jump filter_IN_public_post meta l4proto { icmp, ipv6-icmp } accept } chain filter_IN_public_pre { } chain filter_IN_public_log { } chain filter_IN_public_deny { } chain filter_IN_public_allow { tcp dport 22 ct state { new, untracked } accept ip daddr 224.0.0.251 udp dport 5353 ct state { new, untracked } accept ip6 daddr ff02::fb udp dport 5353 ct state { new, untracked } accept ip6 daddr fe80::/64 udp dport 546 ct state { new, untracked } accept tcp dport 53 ct state { new, untracked } accept udp dport 53 ct state { new, untracked } accept tcp dport 111 ct state { new, untracked } accept udp dport 111 ct state { new, untracked } accept tcp dport 2049 ct state { new, untracked } accept udp dport 2049 ct state { new, untracked } accept tcp dport 20048 ct state { new, untracked } accept udp dport 20048 ct state { new, untracked } accept udp dport 137 ct helper set "helper-netbios-ns-udp" udp dport 137 ct state { new, untracked } accept udp dport 138 ct state { new, untracked } accept tcp dport 1714-1764 ct state { new, untracked } accept udp dport 1714-1764 ct state { new, untracked } accept } chain filter_IN_public_post { } chain filter_FWDI_public { jump filter_FWDI_public_pre jump filter_FWDI_public_log jump filter_FWDI_public_deny jump filter_FWDI_public_allow jump filter_FWDI_public_post meta l4proto { icmp, ipv6-icmp } accept } chain filter_FWDI_public_pre { } chain filter_FWDI_public_log { } chain filter_FWDI_public_deny { } chain filter_FWDI_public_allow { } chain filter_FWDI_public_post { } chain mangle_PRE_public { jump mangle_PRE_public_pre jump mangle_PRE_public_log jump mangle_PRE_public_deny jump mangle_PRE_public_allow jump mangle_PRE_public_post } chain mangle_PRE_public_pre { } chain mangle_PRE_public_log { } chain mangle_PRE_public_deny { } chain mangle_PRE_public_allow { } chain mangle_PRE_public_post { } chain filter_FWDO_public { jump filter_FWDO_public_pre jump filter_FWDO_public_log jump filter_FWDO_public_deny jump filter_FWDO_public_allow jump filter_FWDO_public_post } chain filter_FWDO_public_pre { } chain filter_FWDO_public_log { } chain filter_FWDO_public_deny { } chain filter_FWDO_public_allow { } chain filter_FWDO_public_post { } } table ip firewalld { chain nat_PREROUTING { type nat hook prerouting priority dstnat + 10; policy accept; jump nat_PREROUTING_ZONES } chain nat_PREROUTING_ZONES { iifname "wlp4s0" goto nat_PRE_public iifname "enp2s0" goto nat_PRE_public iifname "virbr0" goto nat_PRE_libvirt goto nat_PRE_public } chain nat_POSTROUTING { type nat hook postrouting priority srcnat + 10; policy accept; jump nat_POSTROUTING_ZONES } chain nat_POSTROUTING_ZONES { oifname "wlp4s0" goto nat_POST_public oifname "enp2s0" goto nat_POST_public oifname "virbr0" goto nat_POST_libvirt goto nat_POST_public } chain nat_PRE_libvirt { jump nat_PRE_libvirt_pre jump nat_PRE_libvirt_log jump nat_PRE_libvirt_deny jump nat_PRE_libvirt_allow jump nat_PRE_libvirt_post } chain nat_PRE_libvirt_pre { } chain nat_PRE_libvirt_log { } chain nat_PRE_libvirt_deny { } chain nat_PRE_libvirt_allow { } chain nat_PRE_libvirt_post { } chain nat_POST_libvirt { jump nat_POST_libvirt_pre jump nat_POST_libvirt_log jump nat_POST_libvirt_deny jump nat_POST_libvirt_allow jump nat_POST_libvirt_post } chain nat_POST_libvirt_pre { } chain nat_POST_libvirt_log { } chain nat_POST_libvirt_deny { } chain nat_POST_libvirt_allow { } chain nat_POST_libvirt_post { } chain nat_PRE_public { jump nat_PRE_public_pre jump nat_PRE_public_log jump nat_PRE_public_deny jump nat_PRE_public_allow jump nat_PRE_public_post } chain nat_PRE_public_pre { } chain nat_PRE_public_log { } chain nat_PRE_public_deny { } chain nat_PRE_public_allow { } chain nat_PRE_public_post { } chain nat_POST_public { jump nat_POST_public_pre jump nat_POST_public_log jump nat_POST_public_deny jump nat_POST_public_allow jump nat_POST_public_post } chain nat_POST_public_pre { } chain nat_POST_public_log { } chain nat_POST_public_deny { } chain nat_POST_public_allow { } chain nat_POST_public_post { } } table ip6 firewalld { chain nat_PREROUTING { type nat hook prerouting priority dstnat + 10; policy accept; jump nat_PREROUTING_ZONES } chain nat_PREROUTING_ZONES { iifname "wlp4s0" goto nat_PRE_public iifname "enp2s0" goto nat_PRE_public iifname "virbr0" goto nat_PRE_libvirt goto nat_PRE_public } chain nat_POSTROUTING { type nat hook postrouting priority srcnat + 10; policy accept; jump nat_POSTROUTING_ZONES } chain nat_POSTROUTING_ZONES { oifname "wlp4s0" goto nat_POST_public oifname "enp2s0" goto nat_POST_public oifname "virbr0" goto nat_POST_libvirt goto nat_POST_public } chain nat_PRE_libvirt { jump nat_PRE_libvirt_pre jump nat_PRE_libvirt_log jump nat_PRE_libvirt_deny jump nat_PRE_libvirt_allow jump nat_PRE_libvirt_post } chain nat_PRE_libvirt_pre { } chain nat_PRE_libvirt_log { } chain nat_PRE_libvirt_deny { } chain nat_PRE_libvirt_allow { } chain nat_PRE_libvirt_post { } chain nat_POST_libvirt { jump nat_POST_libvirt_pre jump nat_POST_libvirt_log jump nat_POST_libvirt_deny jump nat_POST_libvirt_allow jump nat_POST_libvirt_post } chain nat_POST_libvirt_pre { } chain nat_POST_libvirt_log { } chain nat_POST_libvirt_deny { } chain nat_POST_libvirt_allow { } chain nat_POST_libvirt_post { } chain nat_PRE_public { jump nat_PRE_public_pre jump nat_PRE_public_log jump nat_PRE_public_deny jump nat_PRE_public_allow jump nat_PRE_public_post } chain nat_PRE_public_pre { } chain nat_PRE_public_log { } chain nat_PRE_public_deny { } chain nat_PRE_public_allow { } chain nat_PRE_public_post { } chain nat_POST_public { jump nat_POST_public_pre jump nat_POST_public_log jump nat_POST_public_deny jump nat_POST_public_allow jump nat_POST_public_post } chain nat_POST_public_pre { } chain nat_POST_public_log { } chain nat_POST_public_deny { } chain nat_POST_public_allow { } chain nat_POST_public_post { } }