<br>
<b>Warning</b>:  Undefined array key "HTTP_REFERER" in <b>/home/webhostingchenna/domains/webhostingchennai.co.in/public_html/blog/wp-content/plugins/wp-linkbuilder/plugin/plugin_class.inc.php</b> on line <b>637</b><br>
{"id":1521,"date":"2019-04-30T16:11:14","date_gmt":"2019-04-30T10:41:14","guid":{"rendered":"http:\/\/www.webhostingchennai.co.in\/blog\/?p=1521"},"modified":"2019-04-30T16:11:14","modified_gmt":"2019-04-30T10:41:14","slug":"useful-csf-commands-in-linux","status":"publish","type":"post","link":"https:\/\/www.webhostingchennai.co.in\/blog\/useful-csf-commands-in-linux\/","title":{"rendered":"Useful CSF commands in Linux"},"content":{"rendered":"<h4><\/h4>\n<h4><span style="">Useful CSF commands in Linux<\/span><\/h4>\n<p><strong><a href="">CSF<\/a>,\u00a0<\/strong>a\u00a0firewall application suite for Linux servers. CSF is also a Login\/Intrusion Detection for applications like SSH, SMTP, IMAP, Pop3, the \u201csu\u201d command etc,.<\/p>\n<p>It also checks for login authentication failures on mail servers (Exim, IMAP, Dovecot, uw-imap, Kerio), OpenSSH servers, Ftp servers (Pure-ftpd, vsftpd, Proftpd), cPanel server.\u00a0CSF is a good security solution for hosting servers and can be integrated into the user interface (UI) of WHM\/cPanel, DirectAdmin, and Webmin control panels.<\/p>\n</p><div id=""><img data-recalc-dims=""><p id="">Useful CSF commands in Linux<\/p><\/div>\n</p><p>For <a href="">installing CSF (Config Server Firewall) on Centos<\/a><\/p>\n<p>Here, we can see some useful csf commands with definitions<\/p>\n[table id=1 \/]\n</p><p>Hope this article helps your need, Please share your valuable comments to improve us.<\/p>\n</p><p>To know about\u00a0 cron jobs : <a href="">Click here<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"</p><p>&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":1530,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[190,12],"tags":[240,242,241],"class_list":["post-1521","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-centos-redhat","category-linux","tag-csf-commands","tag-csf-commands-in-linux","tag-linux-csf-commands"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2019\/04\/csf-commands-1.jpg?fit=640%2C260&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9NOHH-ox","jetpack-related-posts":[{"id":439,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/install-and-configure-csf-centos7\/","url_meta":{"origin":1521,"position":0},"title":"Install and Configure CSF (Config Server Firewall) on CentOS 7","author":"Cavin","date":"July 6, 2017","format":false,"excerpt":"Install and configure CSF (Config Server Firewall) on CentOS 7. Before going further, lets see what is\u00a0\u00a0CSF(Config Server Firewall) ? CSF,\u00a0a\u00a0firewall application suite for Linux servers. CSF is also a Login\/Intrusion Detection for applications like SSH, SMTP, IMAP, Pop3, the \"su\" command etc,. It also checks for login authentication failures\u2026","rel":"","context":"In &quot;CentOS \/ REDHAT&quot;","block_context":{"text":"CentOS \/ REDHAT","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/linux\/centos-redhat\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2017\/07\/firewall-install.jpg?fit=640%2C260&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2017\/07\/firewall-install.jpg?fit=640%2C260&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2017\/07\/firewall-install.jpg?fit=640%2C260&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":857,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/how-to-verify-ddos-attack\/","url_meta":{"origin":1521,"position":1},"title":"How to verify DDOS attack with &#8216;netstat&#8217; command on Linux","author":"Cavin","date":"June 14, 2018","format":false,"excerpt":"How to verify DDOS attack with netstat command on Linux Your server appearing pretty slow could be many things from wrong configs, scripts and dodgy hardware, but sometimes it could be a cause someone is flooding your server with traffic known as DoS ( Denial of Service ) or DDoS\u2026","rel":"","context":"In &quot;LINUX&quot;","block_context":{"text":"LINUX","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/06\/netstat.jpg?fit=678%2C340&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/06\/netstat.jpg?fit=678%2C340&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/06\/netstat.jpg?fit=678%2C340&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":558,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/tips-securing-cpanel-server\/","url_meta":{"origin":1521,"position":2},"title":"Tips for securing your cPanel server","author":"Cavin","date":"July 21, 2017","format":false,"excerpt":"In this tutorial we are going to see, how to secure our cPanel\/WHM installed server. Use Secure Passwords Insecure passwords are one common security vulnerability. If an account password is insecure and compromised client sites can be defaced, hacked and valuable data can be stolen. Always change your password as\u2026","rel":"","context":"In &quot;LINUX&quot;","block_context":{"text":"LINUX","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2017\/07\/tips-cpanel.jpg?fit=640%2C260&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2017\/07\/tips-cpanel.jpg?fit=640%2C260&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2017\/07\/tips-cpanel.jpg?fit=640%2C260&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2073,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/managing-ip-whitelisting-and-blacklisting-in-cpanel\/","url_meta":{"origin":1521,"position":3},"title":"Best Practices for Managing IP Whitelisting and Blacklisting in cPanel","author":"Cavin","date":"October 25, 2024","format":false,"excerpt":"Managing IP - In today\u2019s digital landscape, where servers face constant threats from malicious actors, managing IP whitelisting and blacklisting has become a vital part of server security. cPanel, a popular control panel for web hosting, provides powerful tools for server administrators to control which IP addresses can access their\u2026","rel":"","context":"In &quot;VPS&quot;","block_context":{"text":"VPS","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/vps\/"},"img":{"alt_text":"Managing IP","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2070,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/protect-cpanel-server-from-ddos-attacks\/","url_meta":{"origin":1521,"position":4},"title":"How Firewalls Protect Your cPanel Server from DDoS Attacks","author":"Cavin","date":"October 24, 2024","format":false,"excerpt":"DDoS Attack - Distributed Denial of Service (DDoS) attacks are one of the most common and disruptive forms of cyberattacks that can target any server connected to the internet. They involve overwhelming a server with an enormous amount of traffic, effectively making it unavailable to legitimate users. In a cPanel\u2026","rel":"","context":"In &quot;VPS&quot;","block_context":{"text":"VPS","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/vps\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":756,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/configuring-ftp-passive-ports-range\/","url_meta":{"origin":1521,"position":5},"title":"Configuring FTP Passive ports range in cPanel server","author":"Cavin","date":"March 6, 2018","format":false,"excerpt":"Configuring FTP Passive ports range in cPanel server FTP uses two ports, a data port and a command port, to transfer information between a client and a server. During a typical active mode session, the command port uses port 21 and the data port uses port 20. When you use\u2026","rel":"","context":"In &quot;cPanel&quot;","block_context":{"text":"cPanel","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/cpanel\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/03\/FTP.jpg?fit=660%2C260&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/03\/FTP.jpg?fit=660%2C260&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/03\/FTP.jpg?fit=660%2C260&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts\/1521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/comments?post=1521"}],"version-history":[{"count":2,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts\/1521\/revisions"}],"predecessor-version":[{"id":1531,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts\/1521\/revisions\/1531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/media\/1530"}],"wp:attachment":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/media?parent=1521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/categories?post=1521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/tags?post=1521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}</p></a></p></a></p></div></a></strong></p></span></h4></h4>