→Practice Setting Firewall Rules
The remaining tasks will relate to that same '''inbound''' traffic chain:
<ol><li value="3">Issue the command '''iptables -L INPUT''', and note the rules associated for ssh in your lab logbook.</li><li>Issue an ''iptables command'' to delete the default ssh rule, and issue another iptables command to verify.</li><li>Issue an ''iptables command'' to insert the SSH rule (refer to your lab logbook for details) at the beginning of the chain. Verify that did what you thought it did, then delete that rule (by number), and verify that it was deleted.</li><li>Issue an ''iptables command'' to append the SSH rule to the end of the chain, verify, delete that same rule, and verify.</li><li>Issue an ''iptables command'' to delete the related,established rule. Test your network connectivity between your hosts and vms. What happened?</li><li>'''Shut down your VMs''' and '''reboot your host machine'''. What happens to the iptables rules you created for your host machine? Note in your OPS335 lab logbook how to save and restore your iptables rules, and what the difference
is between '''restoring iptables rules''' and '''flushing iptables rules'''.</li></ol>
'''Record steps, commands, and your observations in INVESTIGATION 1 in your OPS335 lab log-book'''