13,420
edits
Changes
no edit summary
=== Simple Rule Changes ===
We'll will run some iptables commands to practice and get a basic understanding of how the to set rules work.
# Disable First, issue an iptables command to set the policy to disable all '''inbound ''' traffic.Issue the iptables command to list rules for verification.The remaining tasks will relate to that same '''inbound''' traffic chain.# Delete Issue an iptables command to delete the default ssh rule, and issue another iptables command to verify.# Insert Issue an iptables command to insert the SSH rule in the beginninginstead of appending to the bottom. Issue a command to verify, then delete that rule (by number), and verify that itwas deleted.# Append Issue an iptables command to append the SSH rule to the endof that chain, verify, delete itthat same rule, and verify.# Delete Issue an iptables command to delete the related,established rule, try to do anything. Test your network connectivity between your hosts and vms. What happened? # Restore defaultsIssue an iptables command to restore your firewall to its default settings.
'''Record steps, commands, and your observations in INVESTIGATION 1 in your OPS335 lab log-book'''