Affected versions: Debian 11

πŸ“– ~1 min read

Table of contents
  1. Symptom & Impact
  2. Environment & Reproduction
  3. Root Cause Analysis
  4. Quick Triage
  5. Step-by-Step Diagnosis
  6. Solution – Primary Fix
  7. Solution – Alternative Approaches
  8. Verification & Acceptance Criteria
  9. Rollback Plan
  10. Prevention & Hardening
  11. Related Errors & Cross-Refs
  12. References & Further Reading

Symptom & Impact

Firewall policy reverts after reboot, exposing services or blocking required traffic unexpectedly.

Environment & Reproduction

Often seen when runtime rules are applied manually but not committed to persistent config.

Root Cause Analysis

nftables/iptables runtime state is ephemeral unless restored by boot-time service configuration.

Quick Triage

Check active rule set now, then compare to on-disk rules file and enabled startup units.

Step-by-Step Diagnosis

Run nft list ruleset or iptables-save, inspect /etc/nftables.conf, and verify systemctl is-enabled nftables.

Illustrative mockup for debian-11 β€” terminal_or_shell
nftables/iptables state capture before persistence β€” Illustrative mockup β€” Progressive Robot

Solution – Primary Fix

Save validated rules to persistent file, enable firewall service, and reboot test in maintenance window.

Still having issues? Our IT Consulting team can diagnose and resolve this for you. Get in touch for a free consultation.

Illustrative mockup for debian-11 β€” log_or_config
Persistent firewall configuration and startup hooks β€” Illustrative mockup β€” Progressive Robot

Solution – Alternative Approaches

Use higher-level tooling like ufw where policy simplicity and operational consistency are priorities.

Verification & Acceptance Criteria

Post-reboot rule set matches approved baseline and external connectivity tests meet policy outcomes.

Rollback Plan

Reapply prior rules file and restart firewall service if new baseline blocks business-critical paths.

Prevention & Hardening

Version-control firewall configs and validate changes with pre/post reboot CI checks.

Correlated incidents include unexpected open ports and denied internal service calls after restart.

Related tutorial: View the step-by-step tutorial for debian-11.

View all debian-11 tutorials on the Tutorials Hub β†’

Browse all common problems & solutions on the Tutorials Hub.

References & Further Reading

Review Debian nftables documentation and Linux packet filtering best practices.

Need Expert Help?

If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β€” we respond within one business day.