/etc/firewalld/zones/internal.xml: <interface name="nm-bridge"/>
/etc/NetworkManager/system-connections/enp2s0f0.nmconnection:zone=internal
/etc/NetworkManager/system-connections/enp1s0f1.nmconnection:zone=internal
/etc/NetworkManager/system-connections/enp2s0f1.nmconnection:zone=internal
/etc/NetworkManager/system-connections/enp1s0f0.nmconnection:zone=internal
/etc/NetworkManager/system-connections/eno1.nmconnection:zone=external
/etc/NetworkManager/system-connections/bridge.nmconnection:zone=home
/etc/NetworkManager/system-connections/br-slave-3-4faa3c37-b9dd-48c6-bc6e-658357c6f945.nmconnection:zone=internal
/etc/NetworkManager/system-connections/br-slave-2-d0ea0f74-e014-46e5-987f-0e8b60f35517.nmconnection:zone=internal
/etc/NetworkManager/system-connections/teksavvy.nmconnection:zone=public
connection.id: enp1s0f1
connection.zone: internal
connection.id: bridge
connection.zone: home
connection.id: teksavvy
connection.zone: public
connection.id: br-slave-1
connection.zone: --
connection.id: br-slave-2
connection.zone: --
connection.id: br-slave-2
connection.zone: internal
connection.id: br-slave-3
connection.zone: --
connection.id: br-slave-3
connection.zone: internal
connection.id: br-slave-2
connection.zone: --
connection.id: br-slave-2
connection.zone: internal
connection.id: br-slave-3
connection.zone: --
connection.id: br-slave-3
connection.zone: internal
connection.id: eno1
connection.zone: external
connection.id: enp1s0f0
connection.zone: internal
connection.id: enp2s0f0
connection.zone: internal
connection.id: enp2s0f1
connection.zone: internal
home (active)
target: ACCEPT
icmp-block-inversion: no
interfaces: nm-bridge
sources:
services: dhcpv6-client mdns samba-client ssh
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule protocol value="icmp" accept
rule protocol value="ipv6-icmp" accept
rule priority="32767" reject
internal (active)
target: default
icmp-block-inversion: no
interfaces: enp1s0f0 enp1s0f1 enp2s0f0 enp2s0f1
sources:
services: http ssh
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule family="ipv4" source address="10.0.0.0/24" masquerade
public (active)
target: ACCEPT
icmp-block-inversion: no
interfaces: eno1
sources:
services: http
ports:
protocols:
masquerade: yes
forward-ports:
port=514:proto=udp:toport=:toaddr=10.0.0.5
source-ports:
icmp-blocks: echo-reply
rich rules:
rule protocol value="icmp" accept
rule protocol value="ipv6-icmp" accept
rule priority="32767" reject
Nothing returned.
ipv4 filter FORWARD 0 -i lo -j ACCEPT
ipv4 filter FORWARD 0 -i nm-bridge -j ACCEPT
ipv4 filter FORWARD 0 -i eno1 -m conntrack --ctstate RELATED,ESTABLISHED,DNAT -j ACCEPT
ipv4 filter FORWARD 0 -i eno1 -p icmp -m conntrack --ctstate NEW -j ACCEPT
ipv4 filter FORWARD 0 -i eno1 -m conntrack --ctstate INVALID -j DROP
ipv4 filter FORWARD 0 -j REJECT --reject-with icmp-admin-prohibited
ipv6 filter FORWARD 0 -i lo -j ACCEPT
ipv6 filter FORWARD 0 -i nm-bridge -j ACCEPT
ipv6 filter FORWARD 0 -i eno1 -m conntrack --ctstate RELATED,ESTABLISHED,DNAT -j ACCEPT
ipv6 filter FORWARD 0 -i eno1 -p ipv6-icmp -m conntrack --ctstate NEW -j ACCEPT
ipv6 filter FORWARD 0 -i eno1 -p tcp -m tcp --dport 51413 -m conntrack --ctstate NEW -j ACCEPT
ipv6 filter FORWARD 0 -i eno1 -p udp -m udp --dport 51413 -m conntrack --ctstate NEW -j ACCEPT
ipv6 filter FORWARD 0 -i eno1 -m conntrack --ctstate INVALID -j DROP
ipv6 filter FORWARD 0 -j REJECT --reject-with icmp6-adm-prohibited
ipv4 -I FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
Thanks for your help!