{"id":13342,"date":"2025-12-20T10:28:49","date_gmt":"2025-12-20T04:58:49","guid":{"rendered":"https:\/\/www.youstable.com\/blog\/?p=13342"},"modified":"2025-12-20T10:28:51","modified_gmt":"2025-12-20T04:58:51","slug":"how-to-setup-csf-firewall-on-linux-server","status":"publish","type":"post","link":"https:\/\/www.youstable.com\/blog\/how-to-setup-csf-firewall-on-linux-server","title":{"rendered":"How to Setup CSF Firewall on Linux Server &#8211; Easy Guide"},"content":{"rendered":"\n<p>To set up CSF <strong>(ConfigServer Security &amp; Firewall)<\/strong> on a Linux server, remove conflicting firewalls, install dependencies, download and install CSF, configure allowed ports in \/etc\/csf\/csf.conf, disable TESTING mode, then enable and restart CSF\/LFD. Finally, verify rules and log activity to ensure services work and your server is protected.<\/p>\n\n\n\n<p>In this guide, you\u2019ll learn how to setup CSF Firewall on Linux Server the right way\u2014from clean installation to secure configuration and troubleshooting. We\u2019ll cover Ubuntu\/Debian and CentOS\/RHEL\/AlmaLinux\/Rocky Linux steps, practical commands, and best practices I use when hardening production servers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"what-is-csf-firewall-and-why-use-it\"><strong>What is CSF Firewall and Why Use it?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/CSF-Firewall-on-Linux-Server.jpg\" alt=\"What Is CSF Firewall and Why Use It?\" class=\"wp-image-13573\" srcset=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/CSF-Firewall-on-Linux-Server.jpg 1200w, https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/CSF-Firewall-on-Linux-Server-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p>CSF (ConfigServer Security &amp; Firewall) is an advanced Linux firewall and intrusion prevention system that manages iptables rules and includes LFD (Login Failure Daemon) to block brute-force attacks. Compared to basic firewalls, CSF adds rate limiting, login monitoring, email alerts, and per-service protections\u2014all with simple, readable configuration.<\/p>\n\n\n\n<p>It\u2019s popular on <a href=\"https:\/\/www.youstable.com\/blog\/install-apache-web-server-in-linux\/\">web servers<\/a> (with or without cPanel\/DirectAdmin) because it\u2019s easy to audit, stable under load, and production-proven for hosting workloads.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"prerequisites-and-supported-distros\"><strong>Prerequisites and Supported Distros<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Root or sudo access to your <a href=\"https:\/\/www.youstable.com\/blog\/install-mongodb-on-linux\/\">Linux server<\/a><\/li>\n\n\n\n<li>Supported OS: Ubuntu\/Debian, CentOS 7, RHEL 7\/8\/9, AlmaLinux\/Rocky Linux 8\/9<\/li>\n\n\n\n<li>iptables or iptables-nft packages available<\/li>\n\n\n\n<li>Port 22 (or your custom SSH port) allowed while configuring<\/li>\n<\/ul>\n\n\n\n<p>Tip: Keep a console or out-of-band access (VNC\/KVM\/Hypervisor console) open while enabling CSF to prevent accidental lockouts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-by-step-install-csf-firewall-on-linux\"><strong>Step-by-Step: Install CSF Firewall on Linux<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"1-prepare-your-server\"><strong>1) Prepare your server<\/strong><\/h3>\n\n\n\n<p>Update packages and stop any other firewall managers (UFW or firewalld). Running multiple firewalls causes conflicts and dropped connections.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Ubuntu\/Debian\nsudo apt update &amp;&amp; sudo apt -y upgrade\nsudo ufw disable || true\nsudo systemctl stop firewalld 2&gt;\/dev\/null || true\nsudo systemctl <a href=\"https:\/\/www.youstable.com\/blog\/how-to-stop-and-disable-firewalld\/\">disable firewalld<\/a> 2&gt;\/dev\/null || true\n\n# CentOS\/RHEL\/AlmaLinux\/Rocky\nsudo yum -y update || sudo dnf -y upgrade\nsudo systemctl stop firewalld || true\nsudo systemctl disable firewalld || true<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"2-install-required-packages\"><strong>2) Install required packages<\/strong><\/h3>\n\n\n\n<p>CSF is written in Perl and controls iptables. Install the required dependencies.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Ubuntu\/Debian\nsudo apt install -y wget curl perl libwww-perl liblwp-protocol-https-perl iptables\n\n# CentOS\/RHEL\/AlmaLinux\/Rocky\nsudo <a href=\"https:\/\/www.youstable.com\/blog\/install-yum-on-linux\/\">yum install<\/a> -y wget curl perl iptables-services || sudo dnf install -y wget curl perl iptables-services<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"3-download-and-install-csf\"><strong>3) Download and install CSF<\/strong><\/h3>\n\n\n\n<p>Use the official bundle, extract, and run the installer.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd \/usr\/src\nsudo wget https:\/\/download.configserver.com\/csf.tgz\nsudo tar -xzf csf.tgz\ncd csf\nsudo sh install.sh<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"4-verify-kernel-iptables-support\"><strong>4) Verify kernel\/iptables support<\/strong><\/h3>\n\n\n\n<p>Confirm your system supports the required iptables modules.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo perl \/usr\/local\/csf\/bin\/csftest.pl<\/code><\/pre>\n\n\n\n<p>If you see \u201cRESULT: csf should function on this server,\u201d you\u2019re good to proceed. If not, install\/update iptables packages or reboot to load modules.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"basic-csf-configuration-allow-ports-disable-testing-mode\"><strong>Basic CSF Configuration (Allow Ports, Disable Testing Mode)<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"edit-csf-conf-essentials\"><strong>Edit csf.conf essentials<\/strong><\/h3>\n\n\n\n<p>By default CSF runs in TESTING mode and won\u2019t load persistent rules. Open the main config and adjust key options.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/csf\/csf.conf<\/code><\/pre>\n\n\n\n<p>Recommended baseline (adjust to your services and SSH port):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Disable testing when ready\nTESTING = \"0\"\n\n# Common inbound ports (edit to match your stack)\nTCP_IN = \"22,80,443,25,465,587,110,143,993,995\"\nUDP_IN = \"53,123\"\n# Common outbound ports (package repos, DNS, NTP, SMTP as needed)\nTCP_OUT = \"80,443,25,465,587,110,143,993,995,20,21,22,53\"\nUDP_OUT = \"53,123\"\n\n# Security hardening\nRESTRICT_SYSLOG = \"3\"\nSYNFLOOD = \"1\"\nSYNFLOOD_RATE = \"100\/s\"\nSYNFLOOD_BURST = \"150\"\n\n# Connection Tracking (limit abusive connections)\nCT_LIMIT = \"100\"\nCT_INTERVAL = \"30\"\nCT_PERMANENT = \"1\"\nCT_PORTS = \"80,443,21,22\"<\/code><\/pre>\n\n\n\n<p>Mail alerts are useful in production. Set an email for LF_ALERT_TO and ensure your server can send mail (Postfix or an SMTP relay).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"enable-and-start-csf-lfd\"><strong>Enable and start CSF\/LFD<\/strong><\/h3>\n\n\n\n<p>After saving csf.conf, enable CSF and its login failure daemon.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo csf -e            # enable CSF\nsudo systemctl enable lfd\nsudo systemctl start lfd\nsudo csf -l            # list current rules<\/code><\/pre>\n\n\n\n<p>Keep your SSH session open. Test connectivity to your web\/mail\/DB ports from another terminal before closing the session.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"open-close-ports-and-manage-ips\"><strong>Open\/Close Ports and Manage IPs<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"common-port-examples\"><strong>Common port examples<\/strong><\/h3>\n\n\n\n<p>To permanently allow or remove a port, edit \/etc\/csf\/csf.conf and reload CSF.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Example: allow HTTP\/HTTPS and SSH on custom port 2222\nTCP_IN = \"2222,80,443\"\nsudo csf -r   # reload after saving<\/code><\/pre>\n\n\n\n<p>Alternatively, use temporary allows while testing:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Allow a port temporarily for testing (removed on reload)\nsudo csf --tempallow 203.0.113.10 -p 2222 -d 3600<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"allow-deny-and-unblock-ips\"><strong>Allow, Deny, and Unblock IPs<\/strong><\/h3>\n\n\n\n<p>CSF offers simple commands and flat <a href=\"https:\/\/www.youstable.com\/blog\/access-file-manager-in-cpanel\/\">files for IP management<\/a>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Whitelist (allow through firewall): <code>sudo csf -a 203.0.113.10<\/code> or add to <code>\/etc\/csf\/csf.allow<\/code><\/li>\n\n\n\n<li>Blacklist (block completely): <code>sudo csf -d 203.0.113.10 \"Abuse\"<\/code> or add to <code>\/etc\/csf\/csf.deny<\/code><\/li>\n\n\n\n<li>Remove from deny: <code>sudo csf -dr 203.0.113.10<\/code><\/li>\n\n\n\n<li>Ignore from LFD tracking: add to <code>\/etc\/csf\/csf.ignore<\/code><\/li>\n<\/ul>\n\n\n\n<p>Reload rules after changes when using the files approach: <code>sudo csf -r<\/code>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"useful-csf-and-lfd-commands\"><strong>Useful CSF and LFD Commands<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable\/disable CSF: <code>csf -e<\/code> \/ <code>csf -x<\/code><\/li>\n\n\n\n<li>Start\/stop\/reload: <code>csf -s<\/code> \/ <code>csf -f<\/code> \/ <code>csf -r<\/code><\/li>\n\n\n\n<li>List rules: <code>csf -l<\/code><\/li>\n\n\n\n<li>Temporary allow\/deny: <code>csf --tempallow IP<\/code> \/ <code>csf --tempdeny IP<\/code><\/li>\n\n\n\n<li>Watch logs for LFD: <code>tail -f \/var\/log\/lfd.log<\/code><\/li>\n\n\n\n<li>Service status: <code>systemctl status lfd<\/code><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"security-hardening-tips-with-csf\"><strong>Security Hardening Tips with CSF<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lock down SSH: move SSH to a high, random port and reflect it in TCP_IN. Set <code>LF_SSHD = \"5\"<\/code> and <code>LF_SSHD_PERM = \"1\"<\/code> to block repeated failures.<\/li>\n\n\n\n<li>Limit connection floods: enable SYNFLOOD and set appropriate <code>CT_LIMIT<\/code> for web-heavy servers.<\/li>\n\n\n\n<li>Restrict outbound traffic: allow only required <code>TCP_OUT<\/code> and <code>UDP_OUT<\/code>, reducing malware exfiltration risk.<\/li>\n\n\n\n<li>Harden syslog access: <code>RESTRICT_SYSLOG = \"3\"<\/code> to prevent non-root reads.<\/li>\n\n\n\n<li>Use country blocks selectively: GeoIP can be enabled but can add overhead; use for high-risk regions only.<\/li>\n\n\n\n<li>Audit regularly: review <code>\/var\/log\/lfd.log<\/code> and rotate logs. Spot patterns and tune thresholds.<\/li>\n\n\n\n<li>Backups and config versioning: keep a copy of <code>\/etc\/csf\/csf.conf<\/code> and related files in version control or snapshots.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"troubleshooting-common-csf-issues\"><strong>Troubleshooting Common CSF Issues<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Locked yourself out: use console access to run <code>csf -x<\/code> (disable) or set <code>TESTING = \"1\"<\/code>, then <code>csf -r<\/code>. Whitelist your IP in <code>csf.allow<\/code>.<\/li>\n\n\n\n<li>Services unreachable: confirm ports in <code>TCP_IN<\/code>\/<code>UDP_IN<\/code>, reload CSF, and check app bindings and SELinux contexts if applicable.<\/li>\n\n\n\n<li>LFD not starting: check <code>systemctl status lfd<\/code> and <code>\/var\/log\/lfd.log<\/code>. Ensure Perl modules are present.<\/li>\n\n\n\n<li>Conflicts with other firewalls: make sure UFW\/firewalld are disabled. <a href=\"https:\/\/www.youstable.com\/blog\/what-is-csf-firewall-on-linux-server\/\">CSF should be the only firewall<\/a> manager.<\/li>\n\n\n\n<li>nftables vs iptables: On newer distros, iptables is an nft wrapper; ensure <code>iptables<\/code> packages are installed. CSF supports iptables-nft.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"real-world-use-cases-and-when-csf-fits-best\"><strong>Real-World Use Cases and When CSF Fits Best<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Shared <a href=\"https:\/\/www.youstable.com\/blog\/what-is-cpanel-on-linux-server\/\">hosting or cPanel servers:<\/a> CSF has a WHM plugin and tailored LFD rules for common services.<\/li>\n\n\n\n<li>Small to medium web apps: easy rule management with good intrusion prevention without a steep learning curve.<\/li>\n\n\n\n<li>Email servers: fine-grained outbound controls and brute-force protections for SMTP\/IMAP\/POP.<\/li>\n\n\n\n<li>API gateways and reverse proxies: connection tracking and rate limiting reduce abuse.<\/li>\n<\/ul>\n\n\n\n<p>If you need a minimal, native alternative, UFW (Ubuntu) or firewalld (RHEL-family) are lighter. For hosting stacks that benefit from LFD and prebuilt patterns, CSF is a strong choice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"managed-option-let-youstable-handle-it\"><strong>Managed Option: Let YouStable Handle It<\/strong><\/h2>\n\n\n\n<p>Don\u2019t want to babysit firewall rules? With YouStable\u2019s Managed VPS and Dedicated Servers, our engineers preinstall and harden CSF\/LFD, set safe port policies, add proactive monitoring, and maintain updates. That means fewer false positives and faster recoveries when traffic spikes or attacks hit.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"faqs-csf-firewall-on-linux-server\"><strong>FAQs: CSF Firewall on Linux Server<\/strong><\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1765799872696\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"what-is-csf-and-lfd-and-how-do-they-work-together\"><strong>What is CSF and LFD, and how do they work together?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>CSF manages iptables rules (allow, deny, rate limit). LFD (Login Failure Daemon) monitors logs for repeated failures (SSH, mail, FTP) and automatically bans abusive IPs through CSF. Together they provide a firewall plus intrusion prevention and alerting.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765799878328\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-do-i-open-or-close-a-port-in-csf\"><strong>How do I open or close a port in CSF?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Edit \/etc\/csf\/csf.conf, add\/remove the port in TCP_IN or UDP_IN for inbound (or TCP_OUT\/UDP_OUT for outbound), save, then run <code>csf -r<\/code>. Always test from a second terminal before closing your main session.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765799886977\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-can-i-whitelist-blacklist-or-unblock-an-ip\"><strong>How can I whitelist, blacklist, or unblock an IP?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Whitelist: <code>csf -a IP<\/code>. Blacklist: <code>csf -d IP \"Reason\"<\/code>. Remove from deny: <code>csf -dr IP<\/code>. You can also edit <code>\/etc\/csf\/csf.allow<\/code> and <code>\/etc\/csf\/csf.deny<\/code>, then reload with <code>csf -r<\/code>.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765799895577\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"csf-vs-ufw-vs-firewalld-which-should-i-choose\"><strong>CSF vs UFW vs firewalld: which should I choose?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>UFW and firewalld are simple, native managers. CSF adds LFD-based intrusion prevention, rate limiting, alerts, and hosting-friendly defaults. For production web\/email servers, CSF is often more effective; for minimal setups, UFW\/firewalld may suffice.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765799905518\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"does-csf-work-with-nftables-on-newer-linux-versions\"><strong>Does CSF work with nftables on newer Linux versions?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes. Most modern distros ship iptables-nft as a compatibility layer. Ensure iptables packages are installed. CSF interacts via iptables commands that map to nftables in the background.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"conclusion\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Setting up <a href=\"https:\/\/www.youstable.com\/blog\/configure-csf-firewall-on-linux\/\">CSF Firewall on a Linux server<\/a> is straightforward and powerful: install, allow the right ports, disable TESTING, enable CSF\/LFD, and tune for your workload. With connection tracking, brute-force blocking, and clear logs, CSF provides a robust, admin-friendly security layer for modern hosting environments.<\/p>\n\n\n\n<p>If you prefer a hands-off, hardened configuration with ongoing monitoring, YouStable\u2019s managed servers include CSF best practices out of the box\u2014so you can focus on your apps, not your firewall.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To set up CSF (ConfigServer Security &amp; Firewall) on a Linux server, remove conflicting firewalls, install dependencies, download and install [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":15486,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[350],"tags":[],"class_list":["post-13342","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"acf":[],"featured_image_src":"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/How-to-Setup-CSF-Firewall-on-Linux-Server.jpg","author_info":{"display_name":"Prahlad Prajapati","author_link":"https:\/\/www.youstable.com\/blog\/author\/prahladblog"},"_links":{"self":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/comments?post=13342"}],"version-history":[{"count":3,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13342\/revisions"}],"predecessor-version":[{"id":15487,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13342\/revisions\/15487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media\/15486"}],"wp:attachment":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media?parent=13342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/categories?post=13342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/tags?post=13342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}