13,420
edits
Changes
→Practice Setting Firewall Rules
The remaining tasks will relate to that same '''inbound''' traffic chain:
<ol><li value="3">Issue the command '''iptables -L INPUT''', and note the rules associated for ssh in your lab logbook.</li><li>Issue an ''iptables command'' to delete the default ssh rule, and issue another iptables command to verify.</li><li>Issue an ''iptables command'' to insert the SSH rule (refer to your lab logbook for details) at the beginning of the chain. Verify that did what you thought it did, then delete that rule (by number), and verify that it was deleted.</li><li>Issue an ''iptables command'' to append the SSH rule to the end of the chain, verify, delete that same rule, and verify.</li><li>Issue an ''iptables command'' to delete the related,established rule. Test your network connectivity between your hosts and vms. What happened?</li><li>Issue an ''iptables command'Shut down your VMs''' to and '''restorereboot your host machine''' (i.e. not flush) What happens to the iptables rules you created for your host machine? Note in your firewall OPS335 lab logbook how to its default settingssave and restore your iptables rules, and what the difference is between '''restoring iptables rules''' and '''flushing iptables rules'''.</li></ol>
'''Record steps, commands, and your observations in INVESTIGATION 1 in your OPS335 lab log-book'''
=INVESTIGATION 2: BEST PRACTICES & CUSTOMIZED CHAINS=