4.Creating a Security Rule for SSH Access