<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Nftables-cheat-sheet</id>
	<title>Nftables-cheat-sheet - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=Nftables-cheat-sheet"/>
	<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nftables-cheat-sheet&amp;action=history"/>
	<updated>2026-05-15T02:09:10Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Xinux Wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=Nftables-cheat-sheet&amp;diff=61757&amp;oldid=prev</id>
		<title>Thomas.will: Die Seite wurde neu angelegt: „== nftables Cheat Sheet ==  == Allgemeines == *nftables ersetzt iptables, ip6tables, arptables, ebtables *Einheitliches Framework für IPv4/IPv6/ARP/Bridge *Re…“</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=Nftables-cheat-sheet&amp;diff=61757&amp;oldid=prev"/>
		<updated>2025-04-15T05:01:59Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „== nftables Cheat Sheet ==  == Allgemeines == *nftables ersetzt iptables, ip6tables, arptables, ebtables *Einheitliches Framework für IPv4/IPv6/ARP/Bridge *Re…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== nftables Cheat Sheet ==&lt;br /&gt;
&lt;br /&gt;
== Allgemeines ==&lt;br /&gt;
*nftables ersetzt iptables, ip6tables, arptables, ebtables&lt;br /&gt;
*Einheitliches Framework für IPv4/IPv6/ARP/Bridge&lt;br /&gt;
*Regeln werden in Tabellen, Chains und Sets verwaltet&lt;br /&gt;
&lt;br /&gt;
== Dienstverwaltung ==&lt;br /&gt;
*systemctl enable nftables&lt;br /&gt;
*systemctl start nftables&lt;br /&gt;
*systemctl restart nftables&lt;br /&gt;
*systemctl status nftables&lt;br /&gt;
&lt;br /&gt;
== Regeln anzeigen ==&lt;br /&gt;
*nft list ruleset&lt;br /&gt;
*nft list tables&lt;br /&gt;
*nft list chains&lt;br /&gt;
*nft list chain inet filter input&lt;br /&gt;
&lt;br /&gt;
== Tabelle erstellen ==&lt;br /&gt;
*nft add table inet filter&lt;br /&gt;
&lt;br /&gt;
== Chain hinzufügen ==&lt;br /&gt;
*nft add chain inet filter input { type filter hook input priority 0; policy drop; }&lt;br /&gt;
&lt;br /&gt;
== Beispiel-Regeln hinzufügen ==&lt;br /&gt;
*nft add rule inet filter input ct state established,related accept&lt;br /&gt;
*nft add rule inet filter input iif lo accept&lt;br /&gt;
*nft add rule inet filter input ip protocol icmp accept&lt;br /&gt;
*nft add rule inet filter input tcp dport 22 accept&lt;br /&gt;
*nft add rule inet filter input counter drop&lt;br /&gt;
&lt;br /&gt;
== Flush &amp;amp; Entfernen ==&lt;br /&gt;
*nft flush ruleset&lt;br /&gt;
*nft delete table inet filter&lt;br /&gt;
*nft delete chain inet filter input&lt;br /&gt;
&lt;br /&gt;
== NAT Kommandos ==&lt;br /&gt;
*nft add table inet nat&lt;br /&gt;
*nft add chain inet nat prerouting { type nat hook prerouting priority dstnat; policy accept; }&lt;br /&gt;
*nft add chain inet nat postrouting { type nat hook postrouting priority srcnat; policy accept; }&lt;br /&gt;
*nft add rule inet nat prerouting dnat ip prefix to ip daddr map { 10.82.88.0/24 : 192.168.5.0/24 }&lt;br /&gt;
*nft add rule inet nat postrouting snat ip prefix to ip saddr map { 192.168.5.0/24 : 10.82.88.0/24 }&lt;br /&gt;
&lt;br /&gt;
== Masquerade ==&lt;br /&gt;
*nft add rule ip nat postrouting oif &amp;quot;eth0&amp;quot; masquerade&lt;br /&gt;
&lt;br /&gt;
== Counter &amp;amp; Logging ==&lt;br /&gt;
*nft add rule inet filter input counter&lt;br /&gt;
*nft add rule inet filter input log prefix &amp;quot;nftables: &amp;quot; flags all&lt;br /&gt;
&lt;br /&gt;
== Monitor &amp;amp; Debugging ==&lt;br /&gt;
*nft monitor trace&lt;br /&gt;
*nft list ruleset&lt;br /&gt;
*nft list chain inet filter input&lt;br /&gt;
&lt;br /&gt;
== Paketmarkierung (Mangle-ähnlich) ==&lt;br /&gt;
*nft add table inet mangle&lt;br /&gt;
*nft add chain inet mangle prerouting { type filter hook prerouting priority -150; policy accept; }&lt;br /&gt;
*nft add rule inet mangle prerouting ip saddr 192.168.1.0/24 meta mark set 0x10&lt;br /&gt;
&lt;br /&gt;
== Wichtiges zu Prioritäten ==&lt;br /&gt;
*Kleinere Priority-Zahl = frühere Ausführung&lt;br /&gt;
*Beispiele:&lt;br /&gt;
**priority -150 → Mangle (früh)&lt;br /&gt;
**priority 0 → Standard (Filter)&lt;br /&gt;
**priority 100 → SNAT (spät)&lt;/div&gt;</summary>
		<author><name>Thomas.will</name></author>
	</entry>
</feed>