π ~1 min read
Table of contents
Symptom & Impact
Traffic is intermittently blocked because manual nftables rules override expected firewalld behavior.
Environment & Reproduction
Occurs on systems where both direct nft scripts and firewalld are used.
systemctl status firewalld
nft list ruleset
Root Cause Analysis
Competing firewall management layers introduce conflicting chains and priorities.
Quick Triage
Map active chains and identify duplicate policy logic.
firewall-cmd --list-all
nft list ruleset | less
Step-by-Step Diagnosis
Trace packet path with rule counters and logs.
nft -a list ruleset
journalctl -u firewalld -n 100

Solution – Primary Fix
Consolidate policy under firewalld and remove unmanaged nft rules.
Still having issues? Our IT Solutions & Services team can diagnose and resolve this for you. Get in touch for a free consultation.
sudo systemctl stop nftables
sudo systemctl disable nftables
sudo firewall-cmd --reload

Solution – Alternative Approaches
If raw nftables is required, disable firewalld and manage complete ruleset declaratively.
Verification & Acceptance Criteria
Policy behavior is consistent and expected ports are reachable.
firewall-cmd --state
firewall-cmd --list-all
Rollback Plan
Restore saved nftables ruleset if service migration fails.
Prevention & Hardening
Use one firewall authority per host and enforce with baseline checks.
Related Errors & Cross-Refs
Can appear alongside container network policy conflicts and duplicated MASQUERADE rules.
Related tutorial: View the step-by-step tutorial for oracle-linux-10.
View all oracle-linux-10 tutorials on the Tutorials Hub β
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
RHEL networking security stack documentation for firewalld and nftables.
Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β we respond within one business day.