the qemu agent running.
`nft list ruleset` lists only rules that look managed by libvirt itself(*). At any
rate the host machine has no specific hand-configured firewall that I know of.
It's empty.
(*) # nft list ruleset
table ip libvirt_network {
chain forward {
type filter hook forward priority filter; policy accept;
counter packets 85854914 bytes 398726525237 jump guest_cross
counter packets 85854914 bytes 398726525237 jump guest_input
counter packets 34777368 bytes 3386943972 jump guest_output
}
chain guest_output {
ip saddr
192.168.12.0/24 iif "openshift-412" counter packets 0 bytes 0 accept
iif "openshift-412" counter packets 0 bytes 0 reject
ip saddr
192.168.19.0/24 iif "openshift-419" counter packets 0 bytes 0 accept
iif "openshift-419" counter packets 0 bytes 0 reject
ip saddr
192.168.16.0/24 iif "openshift-416" counter packets 0 bytes 0 accept
iif "openshift-416" counter packets 0 bytes 0 reject
ip saddr
192.168.15.0/24 iif "openshift-415" counter packets 0 bytes 0 accept
iif "openshift-415" counter packets 0 bytes 0 reject
ip saddr
192.168.13.0/24 iif "openshift-413" counter packets 0 bytes 0 accept
iif "openshift-413" counter packets 0 bytes 0 reject
ip saddr
192.168.122.0/24 iif "virbr0" counter packets 0 bytes 0 accept
iif "virbr0" counter packets 0 bytes 0 reject
ip saddr
192.168.17.0/24 iif "openshift-417" counter packets 0 bytes 0 accept
iif "openshift-417" counter packets 0 bytes 0 reject
ip saddr
192.168.14.0/24 iif "openshift-414" counter packets 0 bytes 0 accept
iif "openshift-414" counter packets 0 bytes 0 reject
ip saddr
192.168.11.0/24 iif "openshift-411" counter packets 0 bytes 0 accept
iif "openshift-411" counter packets 0 bytes 0 reject
ip saddr
192.168.18.0/24 iif "openshift-418" counter packets 34777368 bytes 3386943972 accept
iif "openshift-418" counter packets 0 bytes 0 reject
}
chain guest_input {
oif "openshift-412" ip daddr
192.168.12.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-412" counter packets 0 bytes 0 reject
oif "openshift-419" ip daddr
192.168.19.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-419" counter packets 0 bytes 0 reject
oif "openshift-416" ip daddr
192.168.16.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-416" counter packets 0 bytes 0 reject
oif "openshift-415" ip daddr
192.168.15.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-415" counter packets 0 bytes 0 reject
oif "openshift-413" ip daddr
192.168.13.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-413" counter packets 0 bytes 0 reject
oif "virbr0" ip daddr
192.168.122.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "virbr0" counter packets 0 bytes 0 reject
oif "openshift-417" ip daddr
192.168.17.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-417" counter packets 0 bytes 0 reject
oif "openshift-414" ip daddr
192.168.14.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-414" counter packets 0 bytes 0 reject
oif "openshift-411" ip daddr
192.168.11.0/24 ct state established,related counter packets 0 bytes 0 accept
oif "openshift-411" counter packets 0 bytes 0 reject
oif "openshift-418" ip daddr
192.168.18.0/24 ct state established,related counter packets 51077546 bytes 395339581265 accept
oif "openshift-418" counter packets 0 bytes 0 reject
}
chain guest_cross {
iif "openshift-412" oif "openshift-412" counter packets 0 bytes 0 accept
iif "openshift-419" oif "openshift-419" counter packets 0 bytes 0 accept
iif "openshift-416" oif "openshift-416" counter packets 0 bytes 0 accept
iif "openshift-415" oif "openshift-415" counter packets 0 bytes 0 accept
iif "openshift-413" oif "openshift-413" counter packets 0 bytes 0 accept
iif "virbr0" oif "virbr0" counter packets 0 bytes 0 accept
iif "openshift-417" oif "openshift-417" counter packets 0 bytes 0 accept
iif "openshift-414" oif "openshift-414" counter packets 0 bytes 0 accept
iif "openshift-411" oif "openshift-411" counter packets 0 bytes 0 accept
iif "openshift-418" oif "openshift-418" counter packets 0 bytes 0 accept
}
chain guest_nat {
type nat hook postrouting priority srcnat; policy accept;
ip saddr
192.168.12.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.12.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.12.0/24 ip daddr !=
192.168.12.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.12.0/24 ip daddr !=
192.168.12.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.12.0/24 ip daddr !=
192.168.12.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.19.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.19.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.19.0/24 ip daddr !=
192.168.19.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.19.0/24 ip daddr !=
192.168.19.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.19.0/24 ip daddr !=
192.168.19.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.16.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.16.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.16.0/24 ip daddr !=
192.168.16.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.16.0/24 ip daddr !=
192.168.16.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.16.0/24 ip daddr !=
192.168.16.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.15.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.15.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.15.0/24 ip daddr !=
192.168.15.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.15.0/24 ip daddr !=
192.168.15.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.15.0/24 ip daddr !=
192.168.15.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.13.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.13.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.13.0/24 ip daddr !=
192.168.13.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.13.0/24 ip daddr !=
192.168.13.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.13.0/24 ip daddr !=
192.168.13.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.122.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3676 return
ip saddr
192.168.122.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.122.0/24 ip daddr !=
192.168.122.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.122.0/24 ip daddr !=
192.168.122.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.122.0/24 ip daddr !=
192.168.122.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.17.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.17.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.17.0/24 ip daddr !=
192.168.17.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.17.0/24 ip daddr !=
192.168.17.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.17.0/24 ip daddr !=
192.168.17.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.14.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.14.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.14.0/24 ip daddr !=
192.168.14.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.14.0/24 ip daddr !=
192.168.14.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.14.0/24 ip daddr !=
192.168.14.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.11.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.11.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.11.0/24 ip daddr !=
192.168.11.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.11.0/24 ip daddr !=
192.168.11.0/24 counter packets 0 bytes 0 masquerade to :1024-65535
ip saddr
192.168.11.0/24 ip daddr !=
192.168.11.0/24 counter packets 0 bytes 0 masquerade
ip saddr
192.168.18.0/24 ip daddr
224.0.0.0/24 counter packets 50 bytes 3675 return
ip saddr
192.168.18.0/24 ip daddr 255.255.255.255 counter packets 0 bytes 0 return
meta l4proto tcp ip saddr
192.168.18.0/24 ip daddr !=
192.168.18.0/24 counter packets 826568 bytes 49594080 masquerade to :1024-65535
meta l4proto udp ip saddr
192.168.18.0/24 ip daddr !=
192.168.18.0/24 counter packets 160312 bytes 12186128 masquerade to :1024-65535
ip saddr
192.168.18.0/24 ip daddr !=
192.168.18.0/24 counter packets 0 bytes 0 masquerade
}
}
table ip6 libvirt_network {
chain forward {
type filter hook forward priority filter; policy accept;
counter packets 0 bytes 0 jump guest_cross
counter packets 0 bytes 0 jump guest_input
counter packets 0 bytes 0 jump guest_output
}
chain guest_output {
}
chain guest_input {
}
chain guest_cross {
}
chain guest_nat {
type nat hook postrouting priority srcnat; policy accept;
}
}