π ~1 min read
Table of contents
Symptom & Impact
Network behavior is inconsistent because direct nft rules and firewalld both modify tables.
Environment & Reproduction
Run `firewall-cmd –state` and `nft list ruleset` to confirm overlapping rule ownership.
Root Cause Analysis
Verify `firewalld`, `nftables`, and related scripts are intentionally deployed.
Quick Triage
Inspect `systemctl status firewalld nftables` and startup order interactions.
Step-by-Step Diagnosis
Review `journalctl -u firewalld -u nftables` for reload failures and table conflicts.

Solution – Primary Fix
Export firewalld zones and save nftables config before consolidating policy.
Still having issues? Our IT Solutions & Services team can diagnose and resolve this for you. Get in touch for a free consultation.

Solution – Alternative Approaches
Choose a single source of truth, usually firewalld on RHEL 9, and remove conflicting direct rules.
Verification & Acceptance Criteria
Confirm custom script contexts if startup units apply rules from nonstandard paths.
Rollback Plan
Disable redundant service, migrate required rules, reload chosen firewall manager.
Prevention & Hardening
Test expected connectivity matrix and verify rules persist across reboot.
Related Errors & Cross-Refs
Enforce firewall ownership policy in IaC and compliance audits.
Related tutorial: View the step-by-step tutorial for rhel-9.
View all rhel-9 tutorials on the Tutorials Hub β
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
Provide full ruleset dumps and service logs before and after consolidation.
Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β we respond within one business day.