Zde jsou pravidla:
nft list ruleset
table inet firewalld {
	ct helper helper-netbios-ns-udp {
		type "netbios-ns" protocol udp
		l3proto ip
	}
	chain raw_PREROUTING {
		type filter hook prerouting priority raw + 10; policy accept;
		icmpv6 type { destination-unreachable, packet-too-big, time-exceeded, parameter-problem, echo-request, mld-listener-query, nd-router-solicit, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert } accept
		meta nfproto ipv6 fib saddr . iif oif missing drop
	}
	chain mangle_PREROUTING {
		type filter hook prerouting priority mangle + 10; policy accept;
		jump mangle_PREROUTING_POLICIES_pre
		jump mangle_PREROUTING_ZONES
		jump mangle_PREROUTING_POLICIES_post
	}
	chain mangle_PREROUTING_POLICIES_pre {
		jump mangle_PRE_policy_allow-host-ipv6
	}
	chain mangle_PREROUTING_ZONES {
		iifname "enp1s0" goto mangle_PRE_internal
		iifname "eno1" goto mangle_PRE_external
		iifname "docker0" goto mangle_PRE_docker
		goto mangle_PRE_public
	}
	chain mangle_PREROUTING_POLICIES_post {
	}
	chain filter_INPUT {
		type filter hook input priority filter + 10; policy accept;
		ct state { established, related } accept
		ct status dnat accept
		iifname "lo" accept
		jump filter_INPUT_POLICIES_pre
		jump filter_INPUT_ZONES
		jump filter_INPUT_POLICIES_post
		ct state invalid drop
		reject with icmpx admin-prohibited
	}
	chain filter_FORWARD {
		type filter hook forward priority filter + 10; policy accept;
		ct state { established, related } accept
		ct status dnat accept
		iifname "lo" accept
		jump filter_FORWARD_POLICIES_pre
		jump filter_FORWARD_IN_ZONES
		jump filter_FORWARD_OUT_ZONES
		jump filter_FORWARD_POLICIES_post
		ct state invalid drop
	}
	chain filter_OUTPUT {
		type filter hook output priority filter + 10; policy accept;
		oifname "lo" accept
		jump filter_OUTPUT_POLICIES_pre
		jump filter_OUTPUT_POLICIES_post
	}
	chain filter_INPUT_POLICIES_pre {
		jump filter_IN_policy_allow-host-ipv6
	}
	chain filter_INPUT_ZONES {
		iifname "enp1s0" goto filter_IN_internal
		iifname "eno1" goto filter_IN_external
		iifname "docker0" goto filter_IN_docker
		goto filter_IN_public
	}
	chain filter_INPUT_POLICIES_post {
	}
	chain filter_FORWARD_POLICIES_pre {
	}
	chain filter_FORWARD_IN_ZONES {
		iifname "enp1s0" goto filter_FWDI_internal
		iifname "eno1" goto filter_FWDI_external
		iifname "docker0" goto filter_FWDI_docker
		goto filter_FWDI_public
	}
	chain filter_FORWARD_OUT_ZONES {
		oifname "enp1s0" goto filter_FWDO_internal
		oifname "eno1" goto filter_FWDO_external
		oifname "docker0" goto filter_FWDO_docker
		goto filter_FWDO_public
	}
	chain filter_FORWARD_POLICIES_post {
	}
	chain filter_OUTPUT_POLICIES_pre {
	}
	chain filter_OUTPUT_POLICIES_post {
	}
	chain filter_IN_docker {
		jump filter_IN_docker_pre
		jump filter_IN_docker_log
		jump filter_IN_docker_deny
		jump filter_IN_docker_allow
		jump filter_IN_docker_post
		accept
	}
	chain filter_IN_docker_pre {
	}
	chain filter_IN_docker_log {
	}
	chain filter_IN_docker_deny {
	}
	chain filter_IN_docker_allow {
	}
	chain filter_IN_docker_post {
	}
	chain filter_FWDO_docker {
		jump filter_FWDO_docker_pre
		jump filter_FWDO_docker_log
		jump filter_FWDO_docker_deny
		jump filter_FWDO_docker_allow
		jump filter_FWDO_docker_post
		accept
	}
	chain filter_FWDO_docker_pre {
	}
	chain filter_FWDO_docker_log {
	}
	chain filter_FWDO_docker_deny {
	}
	chain filter_FWDO_docker_allow {
	}
	chain filter_FWDO_docker_post {
	}
	chain filter_FWDI_docker {
		jump filter_FWDI_docker_pre
		jump filter_FWDI_docker_log
		jump filter_FWDI_docker_deny
		jump filter_FWDI_docker_allow
		jump filter_FWDI_docker_post
		accept
	}
	chain filter_FWDI_docker_pre {
	}
	chain filter_FWDI_docker_log {
	}
	chain filter_FWDI_docker_deny {
	}
	chain filter_FWDI_docker_allow {
	}
	chain filter_FWDI_docker_post {
	}
	chain mangle_PRE_docker {
		jump mangle_PRE_docker_pre
		jump mangle_PRE_docker_log
		jump mangle_PRE_docker_deny
		jump mangle_PRE_docker_allow
		jump mangle_PRE_docker_post
	}
	chain mangle_PRE_docker_pre {
	}
	chain mangle_PRE_docker_log {
	}
	chain mangle_PRE_docker_deny {
	}
	chain mangle_PRE_docker_allow {
	}
	chain mangle_PRE_docker_post {
	}
	chain filter_IN_external {
		jump filter_IN_external_pre
		jump filter_IN_external_log
		jump filter_IN_external_deny
		jump filter_IN_external_allow
		jump filter_IN_external_post
		meta l4proto { icmp, ipv6-icmp } accept
	}
	chain filter_IN_external_pre {
	}
	chain filter_IN_external_log {
	}
	chain filter_IN_external_deny {
	}
	chain filter_IN_external_allow {
		tcp dport 22 ct state { new, untracked } accept
	}
	chain filter_IN_external_post {
	}
	chain filter_FWDO_external {
		jump filter_FWDO_external_pre
		jump filter_FWDO_external_log
		jump filter_FWDO_external_deny
		jump filter_FWDO_external_allow
		jump filter_FWDO_external_post
	}
	chain filter_FWDO_external_pre {
	}
	chain filter_FWDO_external_log {
	}
	chain filter_FWDO_external_deny {
	}
	chain filter_FWDO_external_allow {
		ct state { new, untracked } accept
	}
	chain filter_FWDO_external_post {
	}
	chain filter_FWDI_external {
		jump filter_FWDI_external_pre
		jump filter_FWDI_external_log
		jump filter_FWDI_external_deny
		jump filter_FWDI_external_allow
		jump filter_FWDI_external_post
		meta l4proto { icmp, ipv6-icmp } accept
	}
	chain filter_FWDI_external_pre {
	}
	chain filter_FWDI_external_log {
	}
	chain filter_FWDI_external_deny {
	}
	chain filter_FWDI_external_allow {
		oifname "eno1" accept
	}
	chain filter_FWDI_external_post {
	}
	chain mangle_PRE_external {
		jump mangle_PRE_external_pre
		jump mangle_PRE_external_log
		jump mangle_PRE_external_deny
		jump mangle_PRE_external_allow
		jump mangle_PRE_external_post
	}
	chain mangle_PRE_external_pre {
	}
	chain mangle_PRE_external_log {
	}
	chain mangle_PRE_external_deny {
	}
	chain mangle_PRE_external_allow {
	}
	chain mangle_PRE_external_post {
	}
	chain filter_IN_internal {
		jump filter_IN_internal_pre
		jump filter_IN_internal_log
		jump filter_IN_internal_deny
		jump filter_IN_internal_allow
		jump filter_IN_internal_post
		meta l4proto { icmp, ipv6-icmp } accept
	}
	chain filter_IN_internal_pre {
	}
	chain filter_IN_internal_log {
	}
	chain filter_IN_internal_deny {
	}
	chain filter_IN_internal_allow {
		tcp dport 22 ct state { new, untracked } accept
		tcp dport { 80, 443 } accept
		ip daddr 224.0.0.251 udp dport 5353 ct state { new, untracked } accept
		ip6 daddr ff02::fb udp dport 5353 ct state { new, untracked } accept
		udp dport 137 ct helper set "helper-netbios-ns-udp"
		udp dport 137 ct state { new, untracked } accept
		udp dport 138 ct state { new, untracked } accept
		tcp dport 139 ct state { new, untracked } accept
		tcp dport 445 ct state { new, untracked } accept
		ip6 daddr fe80::/64 udp dport 546 ct state { new, untracked } accept
	}
	chain filter_IN_internal_post {
	}
	chain filter_FWDO_internal {
		jump filter_FWDO_internal_pre
		jump filter_FWDO_internal_log
		jump filter_FWDO_internal_deny
		jump filter_FWDO_internal_allow
		jump filter_FWDO_internal_post
	}
	chain filter_FWDO_internal_pre {
	}
	chain filter_FWDO_internal_log {
	}
	chain filter_FWDO_internal_deny {
	}
	chain filter_FWDO_internal_allow {
		ct state { new, untracked } accept
	}
	chain filter_FWDO_internal_post {
	}
	chain filter_FWDI_internal {
		jump filter_FWDI_internal_pre
		jump filter_FWDI_internal_log
		jump filter_FWDI_internal_deny
		jump filter_FWDI_internal_allow
		jump filter_FWDI_internal_post
		meta l4proto { icmp, ipv6-icmp } accept
	}
	chain filter_FWDI_internal_pre {
	}
	chain filter_FWDI_internal_log {
	}
	chain filter_FWDI_internal_deny {
	}
	chain filter_FWDI_internal_allow {
		oifname "enp1s0" accept
	}
	chain filter_FWDI_internal_post {
	}
	chain mangle_PRE_internal {
		jump mangle_PRE_internal_pre
		jump mangle_PRE_internal_log
		jump mangle_PRE_internal_deny
		jump mangle_PRE_internal_allow
		jump mangle_PRE_internal_post
	}
	chain mangle_PRE_internal_pre {
	}
	chain mangle_PRE_internal_log {
	}
	chain mangle_PRE_internal_deny {
	}
	chain mangle_PRE_internal_allow {
	}
	chain mangle_PRE_internal_post {
	}
	chain filter_IN_public {
		jump filter_IN_public_pre
		jump filter_IN_public_log
		jump filter_IN_public_deny
		jump filter_IN_public_allow
		jump filter_IN_public_post
		meta l4proto { icmp, ipv6-icmp } accept
	}
	chain filter_IN_public_pre {
	}
	chain filter_IN_public_log {
	}
	chain filter_IN_public_deny {
	}
	chain filter_IN_public_allow {
		tcp dport 22 ct state { new, untracked } accept
		ip6 daddr fe80::/64 udp dport 546 ct state { new, untracked } accept
		udp dport 67 ct state { new, untracked } accept
		tcp dport 53 ct state { new, untracked } accept
		udp dport 53 ct state { new, untracked } accept
	}
	chain filter_IN_public_post {
	}
	chain filter_FWDO_public {
		jump filter_FWDO_public_pre
		jump filter_FWDO_public_log
		jump filter_FWDO_public_deny
		jump filter_FWDO_public_allow
		jump filter_FWDO_public_post
	}
	chain filter_FWDO_public_pre {
	}
	chain filter_FWDO_public_log {
	}
	chain filter_FWDO_public_deny {
	}
	chain filter_FWDO_public_allow {
	}
	chain filter_FWDO_public_post {
	}
	chain filter_FWDI_public {
		jump filter_FWDI_public_pre
		jump filter_FWDI_public_log
		jump filter_FWDI_public_deny
		jump filter_FWDI_public_allow
		jump filter_FWDI_public_post
		meta l4proto { icmp, ipv6-icmp } accept
	}
	chain filter_FWDI_public_pre {
	}
	chain filter_FWDI_public_log {
	}
	chain filter_FWDI_public_deny {
	}
	chain filter_FWDI_public_allow {
	}
	chain filter_FWDI_public_post {
	}
	chain mangle_PRE_public {
		jump mangle_PRE_public_pre
		jump mangle_PRE_public_log
		jump mangle_PRE_public_deny
		jump mangle_PRE_public_allow
		jump mangle_PRE_public_post
	}
	chain mangle_PRE_public_pre {
	}
	chain mangle_PRE_public_log {
	}
	chain mangle_PRE_public_deny {
	}
	chain mangle_PRE_public_allow {
	}
	chain mangle_PRE_public_post {
	}
	chain filter_IN_policy_allow-host-ipv6 {
		jump filter_IN_policy_allow-host-ipv6_pre
		jump filter_IN_policy_allow-host-ipv6_log
		jump filter_IN_policy_allow-host-ipv6_deny
		jump filter_IN_policy_allow-host-ipv6_allow
		jump filter_IN_policy_allow-host-ipv6_post
	}
	chain filter_IN_policy_allow-host-ipv6_pre {
	}
	chain filter_IN_policy_allow-host-ipv6_log {
	}
	chain filter_IN_policy_allow-host-ipv6_deny {
	}
	chain filter_IN_policy_allow-host-ipv6_allow {
		icmpv6 type echo-request accept
		icmpv6 type nd-router-solicit accept
		icmpv6 type nd-neighbor-advert accept
		icmpv6 type nd-neighbor-solicit accept
		icmpv6 type nd-router-advert accept
		icmpv6 type nd-redirect accept
		icmpv6 type mld-listener-query accept
		icmpv6 type destination-unreachable accept
		icmpv6 type packet-too-big accept
		icmpv6 type time-exceeded accept
		icmpv6 type parameter-problem accept
	}
	chain filter_IN_policy_allow-host-ipv6_post {
	}
	chain mangle_PRE_policy_allow-host-ipv6 {
		jump mangle_PRE_policy_allow-host-ipv6_pre
		jump mangle_PRE_policy_allow-host-ipv6_log
		jump mangle_PRE_policy_allow-host-ipv6_deny
		jump mangle_PRE_policy_allow-host-ipv6_allow
		jump mangle_PRE_policy_allow-host-ipv6_post
	}
	chain mangle_PRE_policy_allow-host-ipv6_pre {
	}
	chain mangle_PRE_policy_allow-host-ipv6_log {
	}
	chain mangle_PRE_policy_allow-host-ipv6_deny {
	}
	chain mangle_PRE_policy_allow-host-ipv6_allow {
	}
	chain mangle_PRE_policy_allow-host-ipv6_post {
	}
}