branch: externals/nftables-mode commit 14856f12c1d4cf65928fa6e292025454ef560321 Author: Trent W. Buck <trentb...@gmail.com> Commit: Trent W. Buck <trentb...@gmail.com>
more notes --- nftables-router.nft | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/nftables-router.nft b/nftables-router.nft index 2deb5b368d..de03904583 100644 --- a/nftables-router.nft +++ b/nftables-router.nft @@ -89,6 +89,13 @@ #### #### rule ip a b tcp dport { http, https } dnat to @www #### +#### NOTE: Mixing nft and legacy xtables should MOSTLY Just Work, but +#### is discouraged because of confusion and kernel bugs. +#### In such case, you need to look at "nft list ruleset" **AND** "iptables-legacy-save". +#### +#### NOTE: as at systemd v242, "machinectl start my-container" will +#### create a legacy xtables MASQUERADE rule by default. +#### #### NOTE: Only create a chain if you use it. #### An empty chain is slightly slower than no chain at all. #### e.g. most hosts don't need an output chain. @@ -318,6 +325,8 @@ table inet my_filter { # Allow *some* kinds of IPv4/ICMP and IPv6/ICMPv6. # FIXME: are "ip protocol icmp" and "ip6 nexthdr icmpv6" needed? + # + # NOTE: see also "sysctl net.ipv4.icmp_ratelimit=1000". ip protocol icmp icmp type vmap @ICMP_policy ip6 nexthdr icmpv6 icmpv6 type vmap @ICMPv6_RFC4890_policy