{"id":14229,"date":"2025-12-27T12:00:07","date_gmt":"2025-12-27T06:30:07","guid":{"rendered":"https:\/\/www.youstable.com\/blog\/?p=14229"},"modified":"2025-12-27T12:00:09","modified_gmt":"2025-12-27T06:30:09","slug":"create-csf-firewall-on-linux-server","status":"publish","type":"post","link":"https:\/\/www.youstable.com\/blog\/create-csf-firewall-on-linux-server","title":{"rendered":"How to Create CSF Firewall on Linux Server in 2026? &#8211; (Step by Step Guide)"},"content":{"rendered":"\n<p><strong>To create a CSF firewall on a Linux server<\/strong>, install dependencies, download CSF, run the installer, edit \/etc\/csf\/csf.conf to add your SSH port and set TESTING = \u201c0\u201d, then enable CSF and LFD. <\/p>\n\n\n\n<p>Finally, open only the required TCP\/UDP ports and verify with csf -s and csftest.pl for kernel\/module support. In this guide, you\u2019ll learn how to create CSF firewall on a Linux server from scratch, configure it safely, and apply best-practice rules used on real production systems. <\/p>\n\n\n\n<p>We\u2019ll cover installation, must-have settings, essential commands, LFD protection, and troubleshooting\u2014written for beginners but accurate enough for seasoned admins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"what-is-csf-firewall-and-why-use-it\"><strong>What is CSF Firewall and Why Use It?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>ConfigServer Security &amp; Firewall (CSF) is a robust Linux server firewall and security suite that manages iptables (or iptables-nft on modern distros) and adds LFD (Login Failure Daemon) to block brute-force attacks. Compared to basic tools like UFW or raw iptables, CSF offers granular rules, rate limiting, alerts, and panel integrations (cPanel, DirectAdmin, Webmin).<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1168\" height=\"784\" src=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/What-Is-CSF-Firewall-and-Why-Use-It.png\" alt=\"What Is CSF Firewall and Why Use It?\" class=\"wp-image-14632 size-full\" srcset=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/What-Is-CSF-Firewall-and-Why-Use-It.png 1168w, https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/What-Is-CSF-Firewall-and-Why-Use-It-150x101.png 150w\" sizes=\"auto, (max-width: 1168px) 100vw, 1168px\" \/><\/figure><\/div>\n\n\n\n<p>Primary keyword focus: <a href=\"https:\/\/www.youstable.com\/blog\/optimize-csf-firewall-on-linux\/\">CSF firewall on Linux server<\/a>. Secondary keywords used naturally: <a href=\"https:\/\/www.youstable.com\/blog\/install-csf-firewall-on-linux\/\">install CSF<\/a>, ConfigServer Security &amp; Firewall, Linux server firewall, LFD.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"prerequisites-and-supported-platforms\"><strong>Prerequisites and Supported Platforms<\/strong><\/h2>\n\n\n\n<p>CSF runs on most mainstream Linux distributions and VPS\/dedicated servers. You need root (or sudo) SSH access, a static IP (recommended), and iptables kernel support (the iptables-nft compatibility layer is fine on newer systems). Always keep a secondary console (VNC\/ILO\/Out-of-Band) to avoid lockouts.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tested OS families:<\/strong> AlmaLinux, Rocky Linux, CentOS (EOL), RHEL, Ubuntu, Debian<\/li>\n\n\n\n<li><strong>Disable other firewalls to prevent conflicts: <\/strong>firewalld or UFW (you will replace them with CSF)<\/li>\n\n\n\n<li>Know your SSH port (default 22 or custom)<\/li>\n\n\n\n<li>Have your application ports ready (HTTP\/HTTPS, mail, DB, panel, etc.)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-by-step-install-and-create-csf-firewall-on-linux-server\"><strong>Step-by-Step: Install and Create CSF Firewall on Linux Server<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"1-update-system-and-install-dependencies\"><strong>1) Update System and Install Dependencies<\/strong><\/h3>\n\n\n\n<p>Ensure your server is up to date and has the required Perl modules and tools.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># RHEL\/AlmaLinux\/Rocky\nsudo dnf -y update\nsudo dnf -y install perl perl-libwww-perl.noarch perl-LWP-Protocol-https tar wget curl unzip\n\n# Ubuntu\/Debian\nsudo apt update &amp;&amp; sudo apt -y upgrade\nsudo apt -y install perl libwww-perl liblwp-protocol-https-perl tar wget curl unzip<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"2-stop-and-disable-firewalld-or-ufw\"><strong>2) Stop and Disable firewalld or UFW<\/strong><\/h3>\n\n\n\n<p>CSF manages iptables directly. Disable native firewalls to avoid rule conflicts.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># RHEL\/AlmaLinux\/Rocky (firewalld)\nsudo systemctl stop firewalld\nsudo systemctl <a href=\"https:\/\/www.youstable.com\/blog\/how-to-stop-and-disable-firewalld\/\">disable firewalld<\/a>\nsudo systemctl mask firewalld\n\n# Ubuntu\/Debian (UFW)\nsudo ufw disable\nsudo systemctl stop ufw\nsudo systemctl disable ufw<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"3-download-and-install-csf\"><strong>3) Download and Install CSF<\/strong><\/h3>\n\n\n\n<p>Fetch the official tarball, extract, and run the installer.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd \/usr\/src\nsudo wget https:\/\/download.configserver.com\/csf.tgz\nsudo tar -xzf csf.tgz\ncd csf\nsudo sh install.sh<\/code><\/pre>\n\n\n\n<p><strong>Validate your environment:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo perl \/usr\/local\/csf\/bin\/csftest.pl<\/code><\/pre>\n\n\n\n<p>If iptables modules are missing, fix kernel dependencies or ensure iptables-nft is present.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"4-prepare-safe-access-allow-ssh-and-required-ports\"><strong>4) Prepare Safe Access: Allow SSH and Required Ports<\/strong><\/h3>\n\n\n\n<p>Before taking CSF out of testing mode, ensure your SSH port and essential services are allowed in \/etc\/csf\/csf.conf. Replace 22 with your custom SSH port if changed.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/csf\/csf.conf\n\n# Adjust these lines (examples):\nTCP_IN = \"22,80,443\"\nTCP_OUT = \"80,443,53\"\nUDP_IN = \"53\"\nUDP_OUT = \"53,123\"\nIPV6 = \"0\"    # Set to \"1\" if you actively use IPv6\n# For email servers add: 25,465,587,110,143,993,995\n# For MySQL remote access add: 3306 (use carefully, prefer local only)<\/code><\/pre>\n\n\n\n<p>Optionally whitelist your management IP to prevent accidental lockout:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo csf -a YOUR.IP.ADDR.ESS \"Admin workstation\"<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"5-turn-off-testing-mode-and-enable-csf-lfd\"><strong>5) Turn Off Testing Mode and Enable CSF\/LFD<\/strong><\/h3>\n\n\n\n<p>CSF installs with TESTING = \u201c1\u201d. Switch it off only after SSH and required ports are set.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo sed -i 's\/^TESTING = .*\/TESTING = \"0\"\/' \/etc\/csf\/csf.conf\nsudo systemctl enable csf lfd\nsudo systemctl start csf lfd\n\n# or explicitly:\nsudo <a href=\"https:\/\/www.youstable.com\/blog\/how-to-setup-csf-firewall-on-linux-server\/\">csf -e     # enable firewall<\/a>\nsudo csf -r     # reload rules<\/code><\/pre>\n\n\n\n<p><strong>Confirm status and rule load:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo csf -s    # show status\nsudo csf -l    # list current rules<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"essential-csf-and-lfd-commands\"><strong>Essential CSF and LFD Commands<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reload rules after edits: <\/strong>csf -r<\/li>\n\n\n\n<li><strong>Disable\/Enable firewall quickly:<\/strong> csf -x \/ csf -e<\/li>\n\n\n\n<li><strong>Allowlist IP (permanent): <\/strong>csf -a IP<\/li>\n\n\n\n<li><strong>Temp allowlist with expiry: <\/strong>csf -ta IP 3600<\/li>\n\n\n\n<li><strong>Deny\/Unblock IP: <\/strong>csf -d IP \/ csf -dr IP<\/li>\n\n\n\n<li><strong>Check logs:<\/strong> tail -f \/var\/log\/lfd.log and \/var\/log\/messages<\/li>\n\n\n\n<li><strong>Uninstall (from csf folder):<\/strong> sh uninstall.sh<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"configure-lfd-active-brute-force-protection\"><strong>Configure LFD: Active Brute-Force Protection<\/strong><\/h2>\n\n\n\n<p>LFD monitors auth logs and triggers blocks via CSF when it detects repeated failures. Key options live in \/etc\/csf\/csf.conf; tune based on your risk tolerance and workload.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/csf\/csf.conf\n\n# Popular hardening options (examples):\nLF_SSHD = \"5\"           # SSH failures before block\nLF_SSHD_PERM = \"1\"      # Enable permanent blocks for SSH\nCT_LIMIT = \"100\"        # Connection tracking limit\nCT_INTERVAL = \"30\"      # Check interval in seconds\nSYNFLOOD = \"1\"\nSYNFLOOD_RATE = \"100\/s\"\nSYNFLOOD_BURST = \"150\"\nPORTFLOOD = \"80;tcp;20;10,443;tcp;20;10\"  # rate limit HTTP\/HTTPS\nCC_DENY = \"\"            # Block countries (use sparingly)\nCC_ALLOW = \"\"           # Allow-only list (restrictive)<\/code><\/pre>\n\n\n\n<p><strong>After tuning, reload CSF:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo csf -r<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"open-ports-for-common-stacks-examples\"><strong>Open Ports for Common Stacks (Examples)<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Web servers:<\/strong> 80 (HTTP), 443 (HTTPS)<\/li>\n\n\n\n<li><strong>SSH:<\/strong> 22 or your custom port<\/li>\n\n\n\n<li><strong>DNS: <\/strong>53 (TCP\/UDP)<\/li>\n\n\n\n<li><strong>Mail: <\/strong>25, 465, 587, 110, 143, 993, 995<\/li>\n\n\n\n<li><strong>Databases: <\/strong>3306 (MySQL\/MariaDB), 5432 (PostgreSQL) \u2014 prefer local-only<\/li>\n\n\n\n<li><strong>cPanel\/WHM: <\/strong>2082, 2083, 2086, 2087, 2095, 2096<\/li>\n\n\n\n<li><strong>Plesk: <\/strong>8443; DirectAdmin: 2222; Webmin: 10000<\/li>\n<\/ul>\n\n\n\n<p>Edit TCP_IN, TCP_OUT, UDP_IN, and UDP_OUT accordingly, then sudo csf -r to apply. Only open ports you truly need.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"best-practice-rules-and-hardening-tips\"><strong>Best-Practice Rules and Hardening Tips<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lock in your SSH port and allowlist your admin IPs first to avoid lockouts.<\/li>\n\n\n\n<li>Keep TESTING = \u201c1\u201d until ports are confirmed, then switch to \u201c0\u201d.<\/li>\n\n\n\n<li>Use PORTFLOOD and CT_LIMIT to rate-limit abusive traffic.<\/li>\n\n\n\n<li>Enable SYNFLOOD for basic SYN flood mitigation.<\/li>\n\n\n\n<li>Don\u2019t overuse CC_DENY\/CC_ALLOW; it can create maintenance headaches.<\/li>\n\n\n\n<li>Monitor \/var\/log\/lfd.log for patterns and tune thresholds gradually.<\/li>\n\n\n\n<li>Back up csf.conf and related files before major edits.<\/li>\n\n\n\n<li>In cPanel\/DirectAdmin environments, use CSF\u2019s GUI for safer changes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"troubleshooting-and-safe-recovery\"><strong>Troubleshooting and Safe Recovery<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Locked out after enabling CSF? Use your provider\u2019s console (VNC\/ILO) to revert TESTING = \u201c1\u201d or remove conflicting rules.<\/li>\n\n\n\n<li>Flushed rules for diagnosis: <a href=\"https:\/\/www.youstable.com\/blog\/fix-csf-firewall-on-linux\/\">csf -x (disable), then csf -e when fixed<\/a>.<\/li>\n\n\n\n<li>Check module support with csftest.pl and ensure iptables-nft is installed on modern distros.<\/li>\n\n\n\n<li>Conflicting firewalls: ensure firewalld\/UFW are fully disabled.<\/li>\n\n\n\n<li>Service-specific issues: verify ports with ss -tulpn and that they\u2019re present in TCP_IN\/UDP_IN.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"real-world-example-minimal-web-server-policy\"><strong>Real-World Example: Minimal Web Server Policy<\/strong><\/h2>\n\n\n\n<p>This example allows SSH, HTTP\/HTTPS, and DNS resolution out, suitable for a basic web server without mail. Adjust to your setup.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># \/etc\/csf\/csf.conf (excerpt)\nTESTING = \"0\"\nTCP_IN = \"22,80,443\"\nTCP_OUT = \"80,443,53\"\nUDP_IN = \"\"\nUDP_OUT = \"53,123\"\nLF_SSHD = \"5\"\nCT_LIMIT = \"100\"\nSYNFLOOD = \"1\"\nPORTFLOOD = \"80;tcp;20;10,443;tcp;20;10\"<\/code><\/pre>\n\n\n\n<p><strong>Apply and verify:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo csf -r\nsudo csf -s\ncurl -I https:\/\/yourdomain.tld\nsudo tail -f \/var\/log\/lfd.log<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"csf-vs-ufw-firewalld-quick-perspective\"><strong>CSF vs UFW\/Firewalld (Quick Perspective)<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>UFW\/Firewalld:<\/strong> Simpler interface for iptables\/nftables; fine for basic rules.<\/li>\n\n\n\n<li><strong>CSF:<\/strong> Adds security layers (LFD, rate limiting, login tracking), richer automation, and hosting-panel integration; ideal for production hosting servers.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"need-a-managed-setup\"><strong>Need a Managed Setup?<\/strong><\/h2>\n\n\n\n<p>If you prefer a hardened, production-ready CSF configuration with 24\/7 monitoring, YouStable\u2019s managed VPS and dedicated servers ship with security best practices, proactive patching, and CSF\/LFD tuning tailored to your stack\u2014so you can focus on applications, not firewall minutiae.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"faqs\"><strong>FAQs<\/strong><\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1765960538450\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"what-is-csf-and-how-is-it-different-from-a-basic-firewall\"><strong>What is CSF and how is it different from a basic firewall?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>CSF (ConfigServer Security &amp; Firewall) manages iptables rules and adds LFD for active intrusion prevention. Unlike UFW\/firewalld, CSF provides login failure detection, rate limiting, alerting, and cPanel\/DirectAdmin\/Webmin integration\u2014ideal for hosting workloads.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765960564125\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"does-csf-work-with-nftables\"><strong>Does CSF work with nftables?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes, On modern distros, CSF works through the iptables-nft compatibility layer. Ensure iptables-nft is available and that csftest.pl reports the necessary modules. You don\u2019t need legacy iptables if the nft backend is present.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765960585341\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-do-i-open-or-close-ports-in-csf\"><strong>How do I open or close ports in CSF?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Edit \/etc\/csf\/csf.conf and adjust TCP_IN, TCP_OUT, UDP_IN, and UDP_OUT. Example: add 8080 to TCP_IN to allow inbound web apps. Save, then run sudo csf -r to reload rules.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765960598588\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-do-i-whitelist-or-block-an-ip\"><strong>How do I whitelist or block an IP?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Use csf -a IP to allowlist permanently, csf -ta IP 3600 to allowlist temporarily, csf -d IP to block, and csf -dr IP to remove a block. You can also edit \/etc\/csf\/csf.allow and \/etc\/csf\/csf.deny directly.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765960615376\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"how-do-i-prevent-locking-myself-out\"><strong>How do I prevent locking myself out?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Before disabling testing mode, add your SSH port to TCP_IN and allowlist your admin IP with csf -a. Keep a console (VNC\/ILO) ready. If needed, set TESTING = \u201c1\u201d to auto-flush rules during initial setup.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>To create a CSF firewall on a Linux server, install dependencies, download CSF, run the installer, edit \/etc\/csf\/csf.conf to add [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":16338,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[350],"tags":[],"class_list":["post-14229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"acf":[],"featured_image_src":"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/How-to-Create-CSF-Firewall-on-Linux-Server.jpg","author_info":{"display_name":"Sanjeet Chauhan","author_link":"https:\/\/www.youstable.com\/blog\/author\/sanjeet"},"_links":{"self":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/comments?post=14229"}],"version-history":[{"count":5,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14229\/revisions"}],"predecessor-version":[{"id":16340,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14229\/revisions\/16340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media\/16338"}],"wp:attachment":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media?parent=14229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/categories?post=14229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/tags?post=14229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}