{"id":13610,"date":"2026-02-28T10:46:14","date_gmt":"2026-02-28T05:16:14","guid":{"rendered":"https:\/\/www.youstable.com\/blog\/?p=13610"},"modified":"2026-02-28T10:46:16","modified_gmt":"2026-02-28T05:16:16","slug":"fix-csf-firewall-on-linux","status":"publish","type":"post","link":"https:\/\/www.youstable.com\/blog\/fix-csf-firewall-on-linux","title":{"rendered":"How to Fix CSF Firewall on Linux Server in 2026? &#8211; Easy Guide"},"content":{"rendered":"\n<p><strong>To fix CSF Firewall on a Linux server<\/strong>, start by confirming access (whitelist your IP), stop conflicting firewalls (firewalld\/ufw), switch to the correct iptables backend, enable required kernel modules, open correct ports, disable testing mode, restart CSF\/LFD, review logs for errors, and apply permanent configuration changes in csf.conf.<\/p>\n\n\n\n<p>If you\u2019re troubleshooting <strong>how to fix CSF Firewall on a Linux server<\/strong>, this guide gives you a proven, step by step workflow that resolves most CSF and LFD issues fast. I\u2019ll cover common errors, safe recovery steps to avoid lockouts, essential commands, and real world fixes drawn from years of managing production servers.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"what-is-csf-and-why-it-breaks\">What is CSF and Why it Breaks?<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 42%\"><div class=\"wp-block-media-text__content\">\n<p>CSF <strong>(ConfigServer Security &amp; Firewall)<\/strong> is a popular iptables based firewall with a login failure daemon (LFD). It integrates well with cPanel\/WHM and general Linux servers. <\/p>\n\n\n\n<p>Most \u201cCSF not working\u201d cases trace to conflicting firewalls, missing kernel modules, wrong iptables backend <strong>(nftables vs legacy)<\/strong>, incorrect ports, or testing mode left enabled.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"975\" src=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/hfebvjfvfv-1.jpeg\" alt=\"Fix CSF Firewall on Linux\" class=\"wp-image-14088 size-full\" srcset=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/hfebvjfvfv-1.jpeg 800w, https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/hfebvjfvfv-1-150x183.jpeg 150w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"quick-diagnosis-checklist-before-you-change-anything\">Quick Diagnosis Checklist (Before You Change Anything)<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ensure you won\u2019t lock yourself out:<\/strong> confirm the SSH port and whitelist your IP.<\/li>\n\n\n\n<li>Stop\/disable conflicting firewalls (firewalld or ufw).<\/li>\n\n\n\n<li>Check whether your distro uses nftables; switch to iptables legacy if required.<\/li>\n\n\n\n<li>Restart CSF and LFD; read the logs for exact errors.<\/li>\n\n\n\n<li>Confirm TESTING is disabled and required ports are open.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-1-secure-your-access-avoid-lockouts\">Step 1: Secure Your Access (Avoid Lockouts)<\/h3>\n\n\n\n<p>Always start by allowing your current IP and confirming the SSH port in CSF. If you can, use a recovery\/KVM console from your provider as a safety net.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Whitelist your public IP (replace 203.0.113.10)\ncsf -a 203.0.113.10\n\n# Check current rules and status\ncsf -l\n\n# Verify SSH port is allowed in CSF config\ngrep -E \"^TCP_IN|^TCP6_IN|^PORTS_sshd\" \/etc\/csf\/csf.conf\n<\/code><\/pre>\n\n\n\n<p><strong>If you\u2019re unsure of the SSH port, check sshd_config:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>grep -i ^port \/etc\/ssh\/sshd_config\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-2-stop-firewall-conflicts-firewalld-and-ufw\">Step 2: Stop Firewall Conflicts (firewalld and ufw)<\/h3>\n\n\n\n<p>CSF manages iptables directly. Running it alongside firewalld or ufw causes conflicts and unpredictable rules. Disable and mask the other firewall.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># RHEL\/CentOS\/AlmaLinux\/Rocky\nsystemctl stop firewalld\nsystemctl disable firewalld\nsystemctl mask firewalld\n\n# Ubuntu\/Debian with ufw\nufw disable\nsystemctl stop ufw\nsystemctl disable ufw\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-3-fix-iptables-vs-nftables-backend\">Step 3: Fix iptables vs nftables Backend<\/h3>\n\n\n\n<p>On newer Debian\/Ubuntu and some RHEL based systems, iptables may be an nftables wrapper. CSF prefers legacy iptables. If CSF logs mention unknown tables\/targets or rules failing to apply, switch to legacy.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Ubuntu\/Debian: install legacy tools and switch\napt-get update\napt-get <a href=\"https:\/\/www.youstable.com\/blog\/install-iptables-on-linux\">install -y iptables<\/a> iptables-legacy\nupdate-alternatives --set iptables \/usr\/sbin\/iptables-legacy\nupdate-alternatives --set ip6tables \/usr\/sbin\/ip6tables-legacy\n\n# RHEL family: ensure iptables-services present (if needed)\n<a href=\"https:\/\/www.youstable.com\/blog\/install-yum-on-linux\">yum install<\/a> -y iptables iptables-services\n<\/code><\/pre>\n\n\n\n<p>After switching, restart CSF\/LFD and test again.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-4-load-required-kernel-modules-and-vps-caveats\">Step 4: Load Required Kernel Modules (and VPS Caveats)<\/h3>\n\n\n\n<p>CSF needs iptables related modules. On bare metal and KVM\/Xen, load them directly. On OpenVZ\/LXC, the host must provide these modules.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Common modules\nmodprobe ip_tables\nmodprobe iptable_filter\nmodprobe ip_conntrack 2&gt;\/dev\/null || modprobe nf_conntrack\nmodprobe ip6_tables\n\n# Verify they exist\nlsmod | egrep \"ip_tables|iptable_filter|nf_conntrack|ip6_tables\"\n<\/code><\/pre>\n\n\n\n<p>If modules are missing on container based VPS, contact your provider to enable them. Without proper modules, CSF cannot function.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-5-open-required-ports-and-match-ssh\">Step 5: Open Required Ports and Match SSH<\/h3>\n\n\n\n<p>Misconfigured port lists are a top reason for lockouts. Edit csf.conf to include your services, especially your actual SSH port.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>vi \/etc\/csf\/csf.conf\n# Ensure the following contain the correct ports (examples):\nTCP_IN = \"22,80,443,25,110,143,465,587,993,995\"\nTCP_OUT = \"20,21,22,25,53,80,443,587,993,995\"\nUDP_IN = \"53,123\"\nUDP_OUT = \"53,123,443\"\n# If you changed SSH to 2222, include 2222 in TCP_IN and set:\nPORTS_sshd = \"2222\"\n<\/code><\/pre>\n\n\n\n<p>For cPanel\/WHM servers, also include the panel ports (2083, 2087, 2086, 2096) if applicable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-6-disable-testing-mode-and-restart\">Step 6: Disable Testing Mode and Restart<\/h3>\n\n\n\n<p>CSF\u2019s TESTING mode auto flushes rules every 5 minutes. If security rules keep disappearing, you probably left TESTING enabled from installation.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>vi \/etc\/csf\/csf.conf\nTESTING = \"0\"\n\n# Restart CSF and LFD\ncsf -r\nsystemctl restart lfd\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-7-review-logs-bans-and-ignore-lists\">Step 7: Review Logs, Bans, and Ignore Lists<\/h3>\n\n\n\n<p>Logs reveal why CSF\/LFD is failing or blocking you. Clear temporary bans and add safe ignores for legitimate services.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Key logs\ntail -n 200 \/var\/log\/lfd.log\ntail -n 200 \/var\/log\/messages 2&gt;\/dev\/null || tail -n 200 \/var\/log\/syslog\n\n# List\/clear temporary bans\ncsf -t\ncsf -tf\n\n# Allow\/deny\/ignore\ncsf -a 203.0.113.10     # allow\ncsf -d 198.51.100.20    # deny\necho \"127.0.0.1\" &gt;&gt; \/etc\/csf\/csf.ignore\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-8-run-csf-diagnostics-and-update-repair\">Step 8: Run CSF Diagnostics and Update\/Repair<\/h3>\n\n\n\n<p>CSF includes a diagnostic mode. Also ensure required Perl modules are installed for LFD to run smoothly.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Diagnostics\ncsf --diag\ncsf -v\n\n# Install common prerequisites\n# RHEL family\nyum install -y perl-libwww-perl perl-Time-HiRes\n\n# Debian\/Ubuntu\napt-get install -y libwww-perl libio-socket-ssl-perl\n\n# Update or reinstall CSF (safe)\ncd \/usr\/src\nrm -f csf.tgz\nwget https:\/\/download.configserver.com\/csf.tgz\ntar -xzf csf.tgz\ncd csf\nsh install.sh\ncsf -r &amp;&amp; systemctl restart lfd\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-9-reset-rules-if-things-are-messy\">Step 9: Reset Rules if Things Are Messy<\/h3>\n\n\n\n<p>If rules are corrupted or you need a clean slate:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Temporarily disable to avoid conflict while resetting\ncsf -x\n\n# Flush iptables and ip6tables\niptables -F\niptables -X\nip6tables -F\nip6tables -X\n\n# Re-enable and reload CSF\ncsf -e\ncsf -r\nsystemctl restart lfd\n<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"whm-cpanel-specific-fixes\">WHM\/cPanel Specific Fixes<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use WHM &gt; Plugins &gt; ConfigServer Security &amp; Firewall to toggle \u201cEnable Firewall,\u201d open ports, and view deny\/allow lists.<\/li>\n\n\n\n<li><strong>Open panel ports:<\/strong> 2083, 2087, 2086, 2096, and FTP\/Exim\/Dovecot ports as required.<\/li>\n\n\n\n<li>If LFD shows \u201cfailed to start,\u201d check Perl modules and \/var\/log\/lfd.log for exact missing dependencies.<\/li>\n\n\n\n<li>After cPanel updates, re-check testing mode and iptables backend; some updates switch dependencies.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"common-error-messages-and-how-to-fix-them\">Common Error Messages and How to Fix Them<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\u201cERROR: Unable to load iptables module\u201d:<\/strong> Load kernel modules or ask your VPS provider (OpenVZ\/LXC) to enable them.<\/li>\n\n\n\n<li><strong>\u201cProblem with iptables: iptables:<\/strong> No chain\/target\/match by that name\u201d: Switch to iptables legacy; ensure modules are loaded.<\/li>\n\n\n\n<li><strong>\u201clfd is not running\u201d:<\/strong> Install Perl deps, check lfd.log, then systemctl restart lfd.<\/li>\n\n\n\n<li><strong>Rules keep flushing every 5 minutes:<\/strong> Set TESTING = \u201c0\u201d and csf -r.<\/li>\n\n\n\n<li><strong>No inbound traffic on ports you opened:<\/strong> Confirm they\u2019re in TCP_IN\/UDP_IN, app service is listening, and no upstream firewall or security group blocks them.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"security-hardening-after-you-fix-csf\">Security Hardening After You Fix CSF<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Change SSH to a non default port and use key based auth.<\/li>\n\n\n\n<li>Enable LF_TRIGGER\/LFD login failure thresholds that fit your traffic.<\/li>\n\n\n\n<li>Whitelist your office\/VPN IPs and use Country\/ASN blocks only if needed to avoid false positives.<\/li>\n\n\n\n<li>Enable connection tracking limits for brute force mitigation.<\/li>\n\n\n\n<li>Regularly review \/var\/log\/lfd.log and automate alerts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"youstable-tip-managed-csf-and-proactive-monitoring\">YouStable Tip: Managed CSF and Proactive Monitoring<\/h2>\n\n\n\n<p>If you\u2019d rather not wrestle with kernel modules, nftables quirks, or emergency lockouts, <a href=\"https:\/\/www.youstable.com\/blog\/benefits-of-fully-managed-dedicated-server\/\">managed servers from YouStable<\/a> include CSF pre-hardened, 24\/7 monitoring, and prompt remediation. That keeps your stack secure and performant while you focus on your applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"command-quick-reference\">Command Quick Reference<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># Core CSF commands\ncsf -e             # Enable\ncsf -x             # Disable\ncsf -r             # Restart (reload rules)\ncsf -s             # Start firewall rules\ncsf -l             # List rules\ncsf -t             # List temporary bans\ncsf -tf            # Flush temporary bans\ncsf -a IP          # Allow IP\ncsf -d IP          # Deny IP\ncsf --diag         # Diagnostics\n\n# Services\nsystemctl restart lfd\nsystemctl status lfd\n\n# Logs\ntail -n 200 \/var\/log\/lfd.log\ntail -n 200 \/var\/log\/messages 2&gt;\/dev\/null || tail -n 200 \/var\/log\/syslog\n<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"faqs\">FAQs<\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1765874069124\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"why-is-csf-not-starting-after-reboot\">Why is CSF not starting after reboot?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Conflicting firewalls, missing iptables modules, or TESTING mode commonly cause this. Disable firewalld\/ufw, switch to iptables legacy if needed, set TESTING=\u201c0\u201d, then run csf -r and systemctl restart lfd. Check \/var\/log\/lfd.log for precise errors.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765874076293\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-do-i-stop-csf-from-blocking-my-own-ip\">How do I stop CSF from blocking my own IP?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Whitelist your IP with csf -a YOUR.IP. Review \/etc\/csf\/csf.ignore and add your trusted IPs. Reduce aggressive triggers or exclude legitimate services from login tracking if they generate false positives.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765874089446\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"does-csf-work-with-nftables\">Does CSF work with nftables?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>CSF is built around iptables. While iptables-nft wrappers exist, they often break advanced rules. For reliability, switch to iptables legacy on Debian\/Ubuntu, or install iptables services on RHEL based systems and ensure required modules are present.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765874098232\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"where-are-the-csf-and-lfd-logs\">Where are the CSF and LFD logs?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>LFD logs to \/var\/log\/lfd.log. System level messages appear in \/var\/log\/messages (RHEL family) or \/var\/log\/syslog (Debian\/Ubuntu). Reviewing both usually pinpoints the root cause quickly.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765874105727\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"can-i-reinstall-csf-without-losing-connectivity\">Can I reinstall CSF without losing connectivity?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes. Whitelist your IP first, ensure your SSH port is open in csf.conf, then reinstall from the official package. After sh install.sh, run csf -r and systemctl restart lfd. Keep a console session open in case of mistakes.<\/p>\n<p>Follow the steps above systematically and you\u2019ll resolve most CSF firewall issues on Linux servers, safely and permanently. If you want worry free firewall management, YouStable\u2019s managed hosting includes proactive CSF\/LFD tuning, monitoring, and rapid incident response.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>To fix CSF Firewall on a Linux server, start by confirming access (whitelist your IP), stop conflicting firewalls (firewalld\/ufw), switch [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":19136,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[350],"tags":[],"class_list":["post-13610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"acf":[],"featured_image_src":"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/How-to-Fix-CSF-Firewall-on-Linux-Server.jpg","author_info":{"display_name":"Sanjeet Chauhan","author_link":"https:\/\/www.youstable.com\/blog\/author\/sanjeet"},"_links":{"self":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/comments?post=13610"}],"version-history":[{"count":9,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13610\/revisions"}],"predecessor-version":[{"id":19138,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/13610\/revisions\/19138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media\/19136"}],"wp:attachment":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media?parent=13610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/categories?post=13610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/tags?post=13610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}