table inet filter { # handle 8
	chain INPUT { # handle 1
		type filter hook input priority filter; policy drop;
		jump EDPM_INPUT # handle 51
		jump EDPM_INPUT # handle 32
	}

	chain FORWARD { # handle 2
		type filter hook forward priority filter; policy accept;
	}

	chain OUTPUT { # handle 3
		type filter hook output priority filter; policy accept;
	}

	chain EDPM_INPUT { # handle 25
		ct state established,related counter packets 20318 bytes 32529664 accept comment "000 accept related established rules" # handle 43
		meta l4proto icmp ct state new counter packets 7 bytes 242 accept comment "001 accept all icmp" # handle 44
		meta l4proto ipv6-icmp counter packets 0 bytes 0 accept comment "001 accept all ipv6-icmp" # handle 45
		iifname "lo" counter packets 0 bytes 0 accept comment "002 accept all to lo interface" # handle 46
		ip saddr 0.0.0.0/0 tcp dport 22 ct state new counter packets 10 bytes 564 accept comment "003 Allow ssh from 0.0.0.0/0" # handle 47
		ip6 daddr fe80::/64 udp dport 546 ct state new counter packets 0 bytes 0 accept comment "004 accept ipv6 dhcpv6" # handle 48
		udp dport 4789 ct state new counter packets 0 bytes 0 accept comment "118 neutron vxlan networks" # handle 49
		udp dport 6081 ct state untracked counter packets 0 bytes 0 accept comment "119 neutron geneve networks" # handle 50
	}
}
table inet raw { # handle 9
	chain PREROUTING { # handle 1
		type filter hook prerouting priority raw; policy accept;
		jump EDPM_PREROUTING # handle 16
	}

	chain OUTPUT { # handle 2
		type filter hook output priority raw; policy accept;
		jump EDPM_OUTPUT # handle 15
	}

	chain EDPM_OUTPUT { # handle 11
		udp dport 6081 counter packets 0 bytes 0 notrack comment "120 neutron geneve networks no conntrack" # handle 13
	}

	chain EDPM_PREROUTING { # handle 12
		udp dport 6081 counter packets 0 bytes 0 notrack comment "121 neutron geneve networks no conntrack" # handle 14
	}
}
table inet nat { # handle 10
	chain PREROUTING { # handle 1
		type nat hook prerouting priority dstnat; policy accept;
	}

	chain INPUT { # handle 2
		type nat hook input priority srcnat; policy accept;
	}

	chain OUTPUT { # handle 3
		type nat hook output priority dstnat; policy accept;
	}

	chain POSTROUTING { # handle 4
		type nat hook postrouting priority srcnat; policy accept;
	}
}
table ip filter { # handle 11
	chain INPUT { # handle 1
		type filter hook input priority filter; policy accept;
	}

	chain FORWARD { # handle 2
		type filter hook forward priority filter; policy accept;
	}

	chain OUTPUT { # handle 3
		type filter hook output priority filter; policy accept;
	}
}
table ip raw { # handle 12
	chain PREROUTING { # handle 1
		type filter hook prerouting priority raw; policy accept;
	}

	chain OUTPUT { # handle 2
		type filter hook output priority raw; policy accept;
	}
}
table ip nat { # handle 13
	chain PREROUTING { # handle 1
		type nat hook prerouting priority dstnat; policy accept;
	}

	chain INPUT { # handle 2
		type nat hook input priority srcnat; policy accept;
	}

	chain OUTPUT { # handle 3
		type nat hook output priority dstnat; policy accept;
	}

	chain POSTROUTING { # handle 4
		type nat hook postrouting priority srcnat; policy accept;
	}
}
table ip6 raw { # handle 14
	chain PREROUTING { # handle 1
		type filter hook prerouting priority raw; policy accept;
	}

	chain OUTPUT { # handle 2
		type filter hook output priority raw; policy accept;
	}
}
table ip6 filter { # handle 15
	chain INPUT { # handle 1
		type filter hook input priority filter; policy accept;
	}

	chain FORWARD { # handle 2
		type filter hook forward priority filter; policy accept;
	}

	chain OUTPUT { # handle 3
		type filter hook output priority filter; policy accept;
	}
}
