ConfigServer Security & Firewall (csf)
A Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers.
Installation is quite straightforward:
cd /usr/src rm -fv csf.tgz wget https://download.configserver.com/csf.tgz tar -xzf csf.tgz cd csf sh install.sh
Next, test whether you have the required iptables modules:
perl /usr/local/csf/bin/csftest.pl
That’s it. You can then configure csf and lfd by reading the documentation and
configuration files in /etc/csf/csf.conf and /etc/csf/readme.txt directly or
through the csf User Interface.
csf installation for cPanel and DirectAdmin is preconfigured to work on those
servers with all the standard ports open.
csf auto-configures your SSH port on installation where it’s running on a non-
standard port.
csf auto-whitelists your connected IP address where possible on installation.
You should ensure that kernel logging daemon (klogd) is enabled. Typically, VPS
servers running RedHat/CentOS v5 have this disabled and you should check
/etc/init.d/syslog and make sure that any klogd lines are not commented out. If
you change the file, remember to restart syslog.
Perl Modules
While most should be installed on a standard perl installation the following may need to be installed manually:
# On rpm based systems: yum install perl-libwww-perl.noarch perl-LWP-Protocol-https.noarch perl-GDGraph
# On APT based systems: apt-get install libwww-perl liblwp-protocol-https-perl libgd-graph-perl # Via cpan: perl -MCPAN -eshell cpan> install LWP LWP::Protocol::https GD::Graph
Similar Posts:
- basic csf commands
- CSF: disable icmp ping
- debian / ubuntu dig command not found
- quickstart guide to install suricata on debian 11 system
- How to block SASL login attacks in zimbra using csf