In this tutorial we are going to work on the firewall configuration
of your machine. Some care must be taken when doing this, or you will
suddenly find you can no longer log in!
In all these cases the easiest way to do the experiment is to CREATE
an executable program in /root called "firewall".
You should make the contents of this something like:
#!/bin/bash
#
iptables -F INPUT
iptables -F OUTPUT
iptables -F FORWARD
iptables -P INPUT ACCEPT
iptables -P OUTPUT ACCEPT
iptables -P FORWARD ACCEPT
Execute this file, and then, for the first time only, type:
iptables -F RH-Firewall-1-INPUT
iptables -X RH-Firewall-1-INPUT
This will remove a chain which Redhat creates, but which we will not use.
At this point "iptables -L" should show that you have no rules.