Code: Select all
ssh: connect to host 10.x.x.x: port 22: Connection refusedCode: Select all
$ rc-service nftables list
nftables |table bridge grumpy_troll {
nftables | chain in_V6 {
nftables | icmpv6 type { 1, 2, 3, 129, 130, 131, 132, 134, 135, 136, 137, 138, 141, 142, 143 } accept
nftables | icmpv6 type 128 limit rate 64/second burst 5 packets log prefix "[br0:ipv6] Received ping: " accept
nftables | icmpv6 type 133 accept
nftables | }
nftables |
nftables | chain in_V4 {
nftables | icmp type 8 log prefix "[br0:ipv4] Received ping: "
nftables | ip protocol 1 limit rate 64/second burst 5 packets accept
nftables | }
nftables |
nftables | chain input {
nftables | type filter hook input priority -200; policy drop;
nftables | ct state { 0x2, 0x4 } accept
nftables | udp dport { 1714-1764, 1900, 5353, 6881, 7881, 8881, 34197 } accept
nftables | tcp dport { 22, 445, 1714-1764, 1900, 6881, 8096, 25565 } accept
nftables | meta protocol vmap { 0x0800 : jump in_V4, 0x86dd : jump in_V6 }
nftables | iif "lo" accept
nftables | ether type 0x0806 accept
nftables | }
nftables |}
nftables |table inet master {
nftables | chain in_V6 {
nftables | icmpv6 type { 1, 2, 3, 129, 130, 131, 132, 134, 135, 136, 137, 138, 141, 142, 143 } accept
nftables | icmpv6 type 128 limit rate 16/second burst 5 packets accept
nftables | }
nftables |
nftables | chain in_V4 {
nftables | ip protocol 1 limit rate 16/second burst 5 packets accept
nftables | }
nftables |
nftables | chain input {
nftables | type filter hook input priority 0; policy drop;
nftables | ct state { 0x2, 0x4 } accept
nftables | udp dport { 1714-1764, 1900, 5353, 6881, 7881, 8881, 34197 } accept
nftables | tcp dport { 22, 445, 1714-1764, 1900, 6881, 8096, 25565 } accept
nftables | meta protocol vmap { 0x0800 : jump in_V4, 0x86dd : jump in_V6 }
nftables | iif "lo" accept
nftables | ether type 0x0806 accept
nftables | }
nftables |}
nftables |table inet incus {
nftables | chain pstrt.incusbr0 {
nftables | type nat hook postrouting priority 100; policy accept;
nftables | ip saddr 10.181.53.0/24 ip daddr != 10.181.53.0/24 masquerade
nftables | ip6 saddr fd42:bd8f:f3c1:977a::/64 ip6 daddr != fd42:bd8f:f3c1:977a::/64 masquerade
nftables | }
nftables |
nftables | chain fwd.incusbr0 {
nftables | type filter hook forward priority 0; policy accept;
nftables | ip version 4 oifname "incusbr0" accept
nftables | ip version 4 iifname "incusbr0" accept
nftables | ip6 version 6 oifname "incusbr0" accept
nftables | ip6 version 6 iifname "incusbr0" accept
nftables | }
nftables |
nftables | chain in.incusbr0 {
nftables | type filter hook input priority 0; policy accept;
nftables | iifname "incusbr0" tcp dport 53 accept
nftables | iifname "incusbr0" udp dport 53 accept
nftables | iifname "incusbr0" icmp type { 3, 11, 12 } accept
nftables | iifname "incusbr0" udp dport 67 accept
nftables | iifname "incusbr0" ip protocol 17 udp checksum set 0
nftables | iifname "incusbr0" icmpv6 type { 1, 2, 3, 4, 133, 135, 136, 143 } accept
nftables | iifname "incusbr0" udp dport 547 accept
nftables | }
nftables |
nftables | chain out.incusbr0 {
nftables | type filter hook output priority 0; policy accept;
nftables | oifname "incusbr0" tcp sport 53 accept
nftables | oifname "incusbr0" udp sport 53 accept
nftables | oifname "incusbr0" icmp type { 3, 11, 12 } accept
nftables | oifname "incusbr0" udp sport 67 accept
nftables | oifname "incusbr0" ip protocol 17 udp checksum set 0
nftables | oifname "incusbr0" icmpv6 type { 1, 2, 3, 4, 128, 134, 135, 136, 143 } accept
nftables | oifname "incusbr0" udp sport 547 accept
nftables | }
nftables |}

