table inet firewalld {
	chain raw_PREROUTING {
		type filter hook prerouting priority raw + 10; policy accept;
		icmpv6 type { nd-router-advert, nd-neighbor-solicit } accept
		meta nfproto ipv6 fib saddr . iif oif missing drop
	}

	chain mangle_PREROUTING {
		type filter hook prerouting priority mangle + 10; policy accept;
		jump mangle_PREROUTING_POLICIES_pre
		jump mangle_PREROUTING_ZONES
		jump mangle_PREROUTING_POLICIES_post
	}

	chain mangle_PREROUTING_POLICIES_pre {
		jump mangle_PRE_policy_allow-host-ipv6
	}

	chain mangle_PREROUTING_ZONES {
		iifname "enp1s0" goto mangle_PRE_FedoraServer
		goto mangle_PRE_FedoraServer
	}

	chain mangle_PREROUTING_POLICIES_post {
	}

	chain filter_INPUT {
		type filter hook input priority filter + 10; policy accept;
		ct state { established, related } accept
		ct status dnat accept
		iifname "lo" accept
		jump filter_INPUT_POLICIES_pre
		jump filter_INPUT_ZONES
		jump filter_INPUT_POLICIES_post
		ct state { invalid } drop
		reject with icmpx type admin-prohibited
	}

	chain filter_FORWARD {
		type filter hook forward priority filter + 10; policy accept;
		ct state { established, related } accept
		ct status dnat accept
		iifname "lo" accept
		ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 type addr-unreachable
		jump filter_FORWARD_POLICIES_pre
		jump filter_FORWARD_IN_ZONES
		jump filter_FORWARD_OUT_ZONES
		jump filter_FORWARD_POLICIES_post
		ct state { invalid } drop
		reject with icmpx type admin-prohibited
	}

	chain filter_OUTPUT {
		type filter hook output priority filter + 10; policy accept;
		oifname "lo" accept
		ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 type addr-unreachable
		jump filter_OUTPUT_POLICIES_pre
		jump filter_OUTPUT_POLICIES_post
	}

	chain filter_INPUT_POLICIES_pre {
		jump filter_IN_policy_allow-host-ipv6
	}

	chain filter_INPUT_ZONES {
		iifname "enp1s0" goto filter_IN_FedoraServer
		goto filter_IN_FedoraServer
	}

	chain filter_INPUT_POLICIES_post {
	}

	chain filter_FORWARD_POLICIES_pre {
	}

	chain filter_FORWARD_IN_ZONES {
		iifname "enp1s0" goto filter_FWDI_FedoraServer
		goto filter_FWDI_FedoraServer
	}

	chain filter_FORWARD_OUT_ZONES {
		oifname "enp1s0" goto filter_FWDO_FedoraServer
		goto filter_FWDO_FedoraServer
	}

	chain filter_FORWARD_POLICIES_post {
	}

	chain filter_OUTPUT_POLICIES_pre {
	}

	chain filter_OUTPUT_POLICIES_post {
	}

	chain filter_IN_FedoraServer {
		jump filter_IN_FedoraServer_pre
		jump filter_IN_FedoraServer_log
		jump filter_IN_FedoraServer_deny
		jump filter_IN_FedoraServer_allow
		jump filter_IN_FedoraServer_post
		meta l4proto { icmp, ipv6-icmp } accept
	}

	chain filter_IN_FedoraServer_pre {
	}

	chain filter_IN_FedoraServer_log {
	}

	chain filter_IN_FedoraServer_deny {
	}

	chain filter_IN_FedoraServer_allow {
		tcp dport 22 ct state { new, untracked } accept
		ip6 daddr fe80::/64 udp dport 546 ct state { new, untracked } accept
		tcp dport 9090 ct state { new, untracked } accept
	}

	chain filter_IN_FedoraServer_post {
	}

	chain filter_FWDO_FedoraServer {
		jump filter_FWDO_FedoraServer_pre
		jump filter_FWDO_FedoraServer_log
		jump filter_FWDO_FedoraServer_deny
		jump filter_FWDO_FedoraServer_allow
		jump filter_FWDO_FedoraServer_post
	}

	chain filter_FWDO_FedoraServer_pre {
	}

	chain filter_FWDO_FedoraServer_log {
	}

	chain filter_FWDO_FedoraServer_deny {
	}

	chain filter_FWDO_FedoraServer_allow {
	}

	chain filter_FWDO_FedoraServer_post {
	}

	chain filter_FWDI_FedoraServer {
		jump filter_FWDI_FedoraServer_pre
		jump filter_FWDI_FedoraServer_log
		jump filter_FWDI_FedoraServer_deny
		jump filter_FWDI_FedoraServer_allow
		jump filter_FWDI_FedoraServer_post
		meta l4proto { icmp, ipv6-icmp } accept
	}

	chain filter_FWDI_FedoraServer_pre {
	}

	chain filter_FWDI_FedoraServer_log {
	}

	chain filter_FWDI_FedoraServer_deny {
	}

	chain filter_FWDI_FedoraServer_allow {
	}

	chain filter_FWDI_FedoraServer_post {
	}

	chain mangle_PRE_FedoraServer {
		jump mangle_PRE_FedoraServer_pre
		jump mangle_PRE_FedoraServer_log
		jump mangle_PRE_FedoraServer_deny
		jump mangle_PRE_FedoraServer_allow
		jump mangle_PRE_FedoraServer_post
	}

	chain mangle_PRE_FedoraServer_pre {
	}

	chain mangle_PRE_FedoraServer_log {
	}

	chain mangle_PRE_FedoraServer_deny {
	}

	chain mangle_PRE_FedoraServer_allow {
	}

	chain mangle_PRE_FedoraServer_post {
	}

	chain filter_IN_policy_allow-host-ipv6 {
		jump filter_IN_policy_allow-host-ipv6_pre
		jump filter_IN_policy_allow-host-ipv6_log
		jump filter_IN_policy_allow-host-ipv6_deny
		jump filter_IN_policy_allow-host-ipv6_allow
		jump filter_IN_policy_allow-host-ipv6_post
	}

	chain filter_IN_policy_allow-host-ipv6_pre {
	}

	chain filter_IN_policy_allow-host-ipv6_log {
	}

	chain filter_IN_policy_allow-host-ipv6_deny {
	}

	chain filter_IN_policy_allow-host-ipv6_allow {
		icmpv6 type nd-neighbor-advert accept
		icmpv6 type nd-neighbor-solicit accept
		icmpv6 type nd-router-advert accept
		icmpv6 type nd-redirect accept
	}

	chain filter_IN_policy_allow-host-ipv6_post {
	}

	chain mangle_PRE_policy_allow-host-ipv6 {
		jump mangle_PRE_policy_allow-host-ipv6_pre
		jump mangle_PRE_policy_allow-host-ipv6_log
		jump mangle_PRE_policy_allow-host-ipv6_deny
		jump mangle_PRE_policy_allow-host-ipv6_allow
		jump mangle_PRE_policy_allow-host-ipv6_post
	}

	chain mangle_PRE_policy_allow-host-ipv6_pre {
	}

	chain mangle_PRE_policy_allow-host-ipv6_log {
	}

	chain mangle_PRE_policy_allow-host-ipv6_deny {
	}

	chain mangle_PRE_policy_allow-host-ipv6_allow {
	}

	chain mangle_PRE_policy_allow-host-ipv6_post {
	}
}
table ip firewalld {
	chain nat_PREROUTING {
		type nat hook prerouting priority dstnat + 10; policy accept;
		jump nat_PREROUTING_POLICIES_pre
		jump nat_PREROUTING_ZONES
		jump nat_PREROUTING_POLICIES_post
	}

	chain nat_PREROUTING_POLICIES_pre {
		jump nat_PRE_policy_allow-host-ipv6
	}

	chain nat_PREROUTING_ZONES {
		iifname "enp1s0" goto nat_PRE_FedoraServer
		goto nat_PRE_FedoraServer
	}

	chain nat_PREROUTING_POLICIES_post {
	}

	chain nat_POSTROUTING {
		type nat hook postrouting priority srcnat + 10; policy accept;
		jump nat_POSTROUTING_POLICIES_pre
		jump nat_POSTROUTING_ZONES
		jump nat_POSTROUTING_POLICIES_post
	}

	chain nat_POSTROUTING_POLICIES_pre {
	}

	chain nat_POSTROUTING_ZONES {
		oifname "enp1s0" goto nat_POST_FedoraServer
		goto nat_POST_FedoraServer
	}

	chain nat_POSTROUTING_POLICIES_post {
	}

	chain nat_POST_FedoraServer {
		jump nat_POST_FedoraServer_pre
		jump nat_POST_FedoraServer_log
		jump nat_POST_FedoraServer_deny
		jump nat_POST_FedoraServer_allow
		jump nat_POST_FedoraServer_post
	}

	chain nat_POST_FedoraServer_pre {
	}

	chain nat_POST_FedoraServer_log {
	}

	chain nat_POST_FedoraServer_deny {
	}

	chain nat_POST_FedoraServer_allow {
	}

	chain nat_POST_FedoraServer_post {
	}

	chain nat_PRE_FedoraServer {
		jump nat_PRE_FedoraServer_pre
		jump nat_PRE_FedoraServer_log
		jump nat_PRE_FedoraServer_deny
		jump nat_PRE_FedoraServer_allow
		jump nat_PRE_FedoraServer_post
	}

	chain nat_PRE_FedoraServer_pre {
	}

	chain nat_PRE_FedoraServer_log {
	}

	chain nat_PRE_FedoraServer_deny {
	}

	chain nat_PRE_FedoraServer_allow {
	}

	chain nat_PRE_FedoraServer_post {
	}

	chain nat_PRE_policy_allow-host-ipv6 {
		jump nat_PRE_policy_allow-host-ipv6_pre
		jump nat_PRE_policy_allow-host-ipv6_log
		jump nat_PRE_policy_allow-host-ipv6_deny
		jump nat_PRE_policy_allow-host-ipv6_allow
		jump nat_PRE_policy_allow-host-ipv6_post
	}

	chain nat_PRE_policy_allow-host-ipv6_pre {
	}

	chain nat_PRE_policy_allow-host-ipv6_log {
	}

	chain nat_PRE_policy_allow-host-ipv6_deny {
	}

	chain nat_PRE_policy_allow-host-ipv6_allow {
	}

	chain nat_PRE_policy_allow-host-ipv6_post {
	}
}
table ip6 firewalld {
	chain nat_PREROUTING {
		type nat hook prerouting priority dstnat + 10; policy accept;
		jump nat_PREROUTING_POLICIES_pre
		jump nat_PREROUTING_ZONES
		jump nat_PREROUTING_POLICIES_post
	}

	chain nat_PREROUTING_POLICIES_pre {
		jump nat_PRE_policy_allow-host-ipv6
	}

	chain nat_PREROUTING_ZONES {
		iifname "enp1s0" goto nat_PRE_FedoraServer
		goto nat_PRE_FedoraServer
	}

	chain nat_PREROUTING_POLICIES_post {
	}

	chain nat_POSTROUTING {
		type nat hook postrouting priority srcnat + 10; policy accept;
		jump nat_POSTROUTING_POLICIES_pre
		jump nat_POSTROUTING_ZONES
		jump nat_POSTROUTING_POLICIES_post
	}

	chain nat_POSTROUTING_POLICIES_pre {
	}

	chain nat_POSTROUTING_ZONES {
		oifname "enp1s0" goto nat_POST_FedoraServer
		goto nat_POST_FedoraServer
	}

	chain nat_POSTROUTING_POLICIES_post {
	}

	chain nat_POST_FedoraServer {
		jump nat_POST_FedoraServer_pre
		jump nat_POST_FedoraServer_log
		jump nat_POST_FedoraServer_deny
		jump nat_POST_FedoraServer_allow
		jump nat_POST_FedoraServer_post
	}

	chain nat_POST_FedoraServer_pre {
	}

	chain nat_POST_FedoraServer_log {
	}

	chain nat_POST_FedoraServer_deny {
	}

	chain nat_POST_FedoraServer_allow {
	}

	chain nat_POST_FedoraServer_post {
	}

	chain nat_PRE_FedoraServer {
		jump nat_PRE_FedoraServer_pre
		jump nat_PRE_FedoraServer_log
		jump nat_PRE_FedoraServer_deny
		jump nat_PRE_FedoraServer_allow
		jump nat_PRE_FedoraServer_post
	}

	chain nat_PRE_FedoraServer_pre {
	}

	chain nat_PRE_FedoraServer_log {
	}

	chain nat_PRE_FedoraServer_deny {
	}

	chain nat_PRE_FedoraServer_allow {
	}

	chain nat_PRE_FedoraServer_post {
	}

	chain nat_PRE_policy_allow-host-ipv6 {
		jump nat_PRE_policy_allow-host-ipv6_pre
		jump nat_PRE_policy_allow-host-ipv6_log
		jump nat_PRE_policy_allow-host-ipv6_deny
		jump nat_PRE_policy_allow-host-ipv6_allow
		jump nat_PRE_policy_allow-host-ipv6_post
	}

	chain nat_PRE_policy_allow-host-ipv6_pre {
	}

	chain nat_PRE_policy_allow-host-ipv6_log {
	}

	chain nat_PRE_policy_allow-host-ipv6_deny {
	}

	chain nat_PRE_policy_allow-host-ipv6_allow {
	}

	chain nat_PRE_policy_allow-host-ipv6_post {
	}
}
