1ebtables-translate -A FORWARD -p ip --ip-src ! 192.168.0.0/24 -j ACCEPT
2nft add rule bridge filter FORWARD ip saddr != 192.168.0.0/24 counter accept
3
4ebtables-translate -I FORWARD -p ip --ip-dst 10.0.0.1
5nft insert rule bridge filter FORWARD ip daddr 10.0.0.1 counter
6
7ebtables-translate -I OUTPUT 3 -p ip -o eth0 --ip-tos 0xff
8nft insert rule bridge filter OUTPUT oifname "eth0" ip dscp 0x3f counter
9
10ebtables-translate -A FORWARD -p ip --ip-proto tcp --ip-dport 22
11nft add rule bridge filter FORWARD tcp dport 22 counter
12
13ebtables-translate -A FORWARD -p ip --ip-proto udp --ip-sport 1024:65535
14nft add rule bridge filter FORWARD udp sport 1024-65535 counter
15
16ebtables-translate -A FORWARD -p ip --ip-proto 253
17nft add rule bridge filter FORWARD ip protocol 253 counter
18
19ebtables-translate -A FORWARD -p ip --ip-protocol icmp --ip-icmp-type "echo-request"
20nft add rule bridge filter FORWARD icmp type 8 counter
21
22ebtables-translate -A FORWARD -p ip --ip-proto icmp --ip-icmp-type 1/1
23nft add rule bridge filter FORWARD icmp type 1 icmp code 1 counter
24
25ebtables-translate -A FORWARD -p ip --ip-protocol icmp --ip-icmp-type ! 1:10
26nft add rule bridge filter FORWARD icmp type != 1-10 counter
27