Какое правило IPTABLES мешает работе виртуалки?

Пробую настроить виртуализацию на сервере SoyouStart (OVH) — вроде всё настроил правильно, но не работает резолв адресов внутри виртуалки. В ней же невозможно что либо установить и нет возможности связаться с ней по SSH. Как оказалось, в предустановленном образе ОС от ovh ipitables настроен необычным образом.

Я сбросил все правила ipitables на хосте и в виртуалке всё заработало
iptables-restore # Таблица filter и её цепочки *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] # Разрешаем связанные и установленые соединения -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT # Разрешаем служебный icmp-трафик -A INPUT -p icmp -j ACCEPT # Разрешаем доверенный трафик на интерфейс loopback -A INPUT -i lo -j ACCEPT COMMIT

Помогите пожалуйста понять, какое именно правило мешает нормальной работе виртуалки.
Дамп правил до полного сброса

# Generated by iptables-save v1.6.0 on Fri Feb 9 17:02:38 2018 *raw :PREROUTING ACCEPT [45528:3229067] :OUTPUT ACCEPT [28390:6649125] COMMIT # Completed on Fri Feb 9 17:02:38 2018 # Generated by iptables-save v1.6.0 on Fri Feb 9 17:02:38 2018 *nat :PREROUTING ACCEPT [18482:1078668] :INPUT ACCEPT [5690:338420] :OUTPUT ACCEPT [2108:902153] :POSTROUTING ACCEPT [5977:1025961] -A POSTROUTING -s 192.168.122.0/24 -d 224.0.0.0/24 -j RETURN -A POSTROUTING -s 192.168.122.0/24 -d 255.255.255.255/32 -j RETURN -A POSTROUTING -s 192.168.122.0/24! -d 192.168.122.0/24 -p tcp -j MASQUERADE --to-ports 1024-65535 -A POSTROUTING -s 192.168.122.0/24! -d 192.168.122.0/24 -p udp -j MASQUERADE --to-ports 1024-65535 -A POSTROUTING -s 192.168.122.0/24! -d 192.168.122.0/24 -j MASQUERADE COMMIT # Completed on Fri Feb 9 17:02:38 2018 # Generated by iptables-save v1.6.0 on Fri Feb 9 17:02:38 2018 *mangle :PREROUTING ACCEPT [45375:3210124] :INPUT ACCEPT [29888:2424251] :FORWARD ACCEPT [16592:937537] :OUTPUT ACCEPT [28254:6638049] :POSTROUTING ACCEPT [35993:6885863] -A POSTROUTING -o virbr0 -p udp -m udp --dport 68 -j CHECKSUM --checksum-fill COMMIT # Completed on Fri Feb 9 17:02:38 2018 # Generated by iptables-save v1.6.0 on Fri Feb 9 17:02:38 2018 *filter :INPUT DROP [20:2120] :FORWARD DROP [972:79998] :OUTPUT ACCEPT [0:0] :f2b-ssh — [0:0] :f2b-ssh-ddos — [0:0] :ufw-after-forward — [0:0] :ufw-after-input — [0:0] :ufw-after-logging-forward — [0:0] :ufw-after-logging-input — [0:0] :ufw-after-logging-output — [0:0] :ufw-after-output — [0:0] :ufw-before-forward — [0:0] :ufw-before-input — [0:0] :ufw-before-logging-forward — [0:0] :ufw-before-logging-input — [0:0] :ufw-before-logging-output — [0:0] :ufw-before-output — [0:0] :ufw-logging-allow — [0:0] :ufw-logging-deny — [0:0] :ufw-not-local — [0:0] :ufw-reject-forward — [0:0] :ufw-reject-input — [0:0] :ufw-reject-output — [0:0] :ufw-skip-to-policy-forward — [0:0] :ufw-skip-to-policy-input — [0:0] :ufw-skip-to-policy-output — [0:0] :ufw-track-forward — [0:0] :ufw-track-input — [0:0] :ufw-track-output — [0:0] :ufw-user-forward — [0:0] :ufw-user-input — [0:0] :ufw-user-limit — [0:0] :ufw-user-limit-accept — [0:0] :ufw-user-logging-forward — [0:0] :ufw-user-logging-input — [0:0] :ufw-user-logging-output — [0:0] :ufw-user-output — [0:0] -A INPUT -i virbr0 -p udp -m udp --dport 53 -j ACCEPT -A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT -A INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT -A INPUT -i virbr0 -p tcp -m tcp --dport 67 -j ACCEPT -A INPUT -p tcp -m multiport --dports 22 -j f2b-ssh-ddos -A INPUT -p tcp -m multiport --dports 22 -j f2b-ssh -A INPUT -j ufw-before-logging-input -A INPUT -j ufw-before-input -A INPUT -j ufw-after-input -A INPUT -j ufw-after-logging-input -A INPUT -j ufw-reject-input -A INPUT -j ufw-track-input -A FORWARD -d 192.168.122.0/24 -o virbr0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A FORWARD -s 192.168.122.0/24 -i virbr0 -j ACCEPT -A FORWARD -i virbr0 -o virbr0 -j ACCEPT -A FORWARD -o virbr0 -j REJECT --reject-with icmp-port-unreachable -A FORWARD -i virbr0 -j REJECT --reject-with icmp-port-unreachable -A FORWARD -j ufw-before-logging-forward -A FORWARD -j ufw-before-forward -A FORWARD -j ufw-after-forward -A FORWARD -j ufw-after-logging-forward -A FORWARD -j ufw-reject-forward -A FORWARD -j ufw-track-forward -A OUTPUT -o virbr0 -p udp -m udp --dport 68 -j ACCEPT -A OUTPUT -j ufw-before-logging-output -A OUTPUT -j ufw-before-output -A OUTPUT -j ufw-after-output -A OUTPUT -j ufw-after-logging-output -A OUTPUT -j ufw-reject-output -A OUTPUT -j ufw-track-output -A f2b-ssh -s 1.234.20.110/32 -j REJECT --reject-with icmp-port-unreachable -A f2b-ssh -s 122.226.181.167/32 -j REJECT --reject-with icmp-port-unreachable -A f2b-ssh -j RETURN -A f2b-ssh-ddos -s 159.89.7.14/32 -j REJECT --reject-with icmp-port-unreachable -A f2b-ssh-ddos -j RETURN -A ufw-after-input -p udp -m udp --dport 137 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp --dport 138 -j ufw-skip-to-policy-input -A ufw-after-input -p tcp -m tcp --dport 139 -j ufw-skip-to-policy-input -A ufw-after-input -p tcp -m tcp --dport 445 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp --dport 67 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp --dport 68 -j ufw-skip-to-policy-input -A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input -A ufw-after-logging-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " -A ufw-after-logging-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " -A ufw-before-forward -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A ufw-before-forward -p icmp -m icmp --icmp-type 3 -j ACCEPT -A ufw-before-forward -p icmp -m icmp --icmp-type 4 -j ACCEPT -A ufw-before-forward -p icmp -m icmp --icmp-type 11 -j ACCEPT -A ufw-before-forward -p icmp -m icmp --icmp-type 12 -j ACCEPT -A ufw-before-forward -p icmp -m icmp --icmp-type 8 -j ACCEPT -A ufw-before-forward -j ufw-user-forward -A ufw-before-input -i lo -j ACCEPT -A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny -A ufw-before-input -m conntrack --ctstate INVALID -j DROP -A ufw-before-input -p icmp -m icmp --icmp-type 3 -j ACCEPT -A ufw-before-input -p icmp -m icmp --icmp-type 4 -j ACCEPT -A ufw-before-input -p icmp -m icmp --icmp-type 11 -j ACCEPT -A ufw-before-input -p icmp -m icmp --icmp-type 12 -j ACCEPT -A ufw-before-input -p icmp -m icmp --icmp-type 8 -j ACCEPT -A ufw-before-input -p udp -m udp --sport 67 --dport 68 -j ACCEPT -A ufw-before-input -j ufw-not-local -A ufw-before-input -d 224.0.0.251/32 -p udp -m udp --dport 5353 -j ACCEPT -A ufw-before-input -d 239.255.255.250/32 -p udp -m udp --dport 1900 -j ACCEPT -A ufw-before-input -j ufw-user-input -A ufw-before-output -o lo -j ACCEPT -A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A ufw-before-output -j ufw-user-output -A ufw-logging-allow -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW ALLOW] " -A ufw-logging-deny -m conntrack --ctstate INVALID -m limit --limit 3/min --limit-burst 10 -j RETURN -A ufw-logging-deny -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " -A ufw-not-local -m addrtype --dst-type LOCAL -j RETURN -A ufw-not-local -m addrtype --dst-type MULTICAST -j RETURN -A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN -A ufw-not-local -m limit --limit 3/min --limit-burst 10 -j ufw-logging-deny -A ufw-not-local -j DROP -A ufw-skip-to-policy-forward -j DROP -A ufw-skip-to-policy-input -j DROP -A ufw-skip-to-policy-output -j ACCEPT -A ufw-track-output -p tcp -m conntrack --ctstate NEW -j ACCEPT -A ufw-track-output -p udp -m conntrack --ctstate NEW -j ACCEPT -A ufw-user-input -p tcp -m tcp --dport 22 -j ACCEPT -A ufw-user-input -p tcp -m tcp --dport 4949 -j ACCEPT -A ufw-user-input -p tcp -m tcp --dport 53 -j ACCEPT -A ufw-user-input -p udp -m udp --dport 53 -j ACCEPT -A ufw-user-limit -m limit --limit 3/min -j LOG --log-prefix "[UFW LIMIT BLOCK] " -A ufw-user-limit -j REJECT --reject-with icmp-port-unreachable -A ufw-user-limit-accept -j ACCEPT COMMIT # Completed on Fri Feb 9 17:02:38 2018