docker-iptables-bypasses-ufw-requires-docker-user-chain

Docker writes iptables rules directly and bypasses UFW entirely — a container bound to 0.0.0.0:6380 is exposed at the iptables level even if UFW denies that port. The fix is populating the DOCKER-USER iptables chain with explicit ACCEPT/DROP rules (ACCEPT established+docker0+172.x/lo/80/443, DROP all else from eth0). Must also install iptables-persistent and save rules; reinstalling iptables-persistent auto-loads the old saved file and wipes newly added rules — re-apply and iptables-save explicitly after.