→Practice Setting Firewall Rules
The remaining tasks will relate to that same '''inbound''' traffic chain:
<ol><li value="3">Issue the command '''iptables -L INPUT''', and note the rules associated for ssh in your lab logbook.</li><li>Issue an ''iptables command'' to delete the default ssh rule, and issue another iptables command to verify.</li><li>Issue an ''iptables command'' to insert the SSH rule (refer to your lab logbook for details) at the beginning of the chain. Verify that did what you thought it did, then delete that rule (by number), and verify that it was deleted.</li><li>Issue an ''iptables command'' to append the SSH rule to the end of the chain, verify, delete that same rule, and verify.</li><li>Issue an ''iptables command'' to delete the related,established rule. Test your network connectivity between your hosts and vms. What happened?</li><li>
Issue an '' iptables command'' to ''' restore''' (i. e. not flush) your firewall to its default settings.</li></ol>
'''Record steps, commands, and your observations in INVESTIGATION 1 in your OPS335 lab log-book'''
=INVESTIGATION 2: BEST PRACTICES & CUSTOMIZED CHAINS=