virsh net-update
, еще не пробовал.2022-12-01 14:05:09.624021 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XXX.26.XXX:50594
2022-12-01 14:05:09.624273 Socket Buffers: R=[786896->786896] S=[9216->9216]
2022-12-01 14:05:09.624306 UDP link local: (not bound)
2022-12-01 14:05:09.624324 UDP link remote: [AF_INET]XXX.XXX.26.XXX:50594
2022-12-01 14:05:09.624348 MANAGEMENT: >STATE:1669903509,WAIT,,,,,,
2022-12-01 14:05:09.624699 MANAGEMENT: CMD 'hold release'
2022-12-01 14:05:09.679032 MANAGEMENT: >STATE:1669903509,AUTH,,,,,,
2022-12-01 14:05:09.679087 TLS: Initial packet from [AF_INET]XXX.XXX.26.XXX:50594, sid=46209908 ec886ae1
2022-12-01 14:05:09.736590 VERIFY OK: depth=1, CN=Name
2022-12-01 14:05:09.736779 VERIFY KU OK
2022-12-01 14:05:09.736793 Validating certificate extended key usage
2022-12-01 14:05:09.736803 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-12-01 14:05:09.736812 VERIFY EKU OK
2022-12-01 14:05:09.736819 VERIFY OK: depth=0, CN=name
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * tun+ 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT 26 packets, 2727 bytes)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * enp1s0 192.158.250.0/24 0.0.0.0/0