VPSMATE

  • HOME
  • NEWS
  • VPS
  • DEDICATED
  • ARCHIVES
  • GoDaddy
  • SCRIPT
  • TOOLS
    • Traceroute
    • Benchmark
    • Useful Sites
  • Themes
  • GFW
VPSMATE
VPS COUPON & PROMOS | VPS & DEDICATED SERVERS OFFERS | VPS REVIEWS
  1. Main page
  2. Tutorials
  3. Main content

How to install and configure Config Server Firewall (CSF) on CentOS

29/07/2021 726hotness 0likes 0comments

Table of Contents

  • Introduction
  • Installing ConfigServer Firewall
  • Configure CSF
  • CSF usage
  • Conclusion

Introduction

Config Server Firewall (or CSF) is a free and advanced firewall for most Linux distributions and Linux based VPS. In addition to the basic functionality of a firewall – filtering packets – CSF includes other security features, such as login/intrusion/flood detections.

As mentioned CSF includes UI integration for cPanel, DirectAdmin and Webmin, but this tutorial only covers the command line usage. CSF is able to recognize many attacks, such as port scans, SYN floods, and login brute force attacks on many services. It is configured to temporarily block clients who are detected to be attacking the cloud server.

The full list of supported operating systems and features can be found on ConfigServer’s website.

Installing ConfigServer Firewall

  • First we need to make sure that perl is installed

yum install wget vim perl-libwww-perl.noarch perl-Time-HiRes

  • Then we can go ahead and download CSF

cd /usr/src/
wget https://download.configserver.com/csf.tgz

  • The next step is to extract the downloaded tar archive and run the install script:

tar -xzf csf.tgz
cd csf
sh install.sh

Configure CSF

  • CentOS 7 has a default firewall application called “firewalld”. You have to stop firewalld and remove it from the startup.

Stop firewalld:

systemctl stop firewalld

and disable it:

systemctl disable firewalld

  • Now we can enable CSF disabling the default TESTING state:

cd /etc/csf/

next open the csf.conf file using your favourite text editor - vim, vi ,nano and etc

vim csf.conf

On line 11 you will see that the “TESTING ” is set to “1” , make sure this is set to “0”

TESTING = "0"

  • Now we can start and enable both lfd and csf

`systemctl start csf
systemctl start lfd

systemctl enable csf
systemctl enable lfd

  • As mentioned CSF can be configured by editing its configuration file csf.conf in /etc/csf:

The less access there is to your VPS, the more secure your server is. However, not all ports can be closed as the clients must be able to use your services.

The ports opened by default are the following:

TCP_IN = "20,21,22,25,53,80,110,143,443,465,587,993,995"

TCP_OUT = "20,21,22,25,53,80,110,113,443"

UDP_IN = "20,21,53"

UDP_OUT = "20,21,53,113,123"

It is possible that you are not using all of these services, so you can close the ports that are not used. I would recommend closing all ports (removing port number form the list), and then adding the ports you need.

Below are port sets that should be opened if you are running the listed service:

On any server:

TCP_IN: 22,53
TCP_OUT: 22,53,80,113,443
UPD_IN: 53
UPD_OUT: 53,113,123
  • CSF offers a vast number of different options in its configuration files. Some of the most commonly used settings are explained below.

ICMP_IN Setting ICMP_IN to 1 allows ping to your server and 0 refuses are such requests. If you are hosting any public services, it is recommended to allow ICMP requests, as these can be used to determine whether or not your service is available.

ICMPINLIMIT Sets the number of ICMP (ping) requests allowed from one IP address within a specified amount of time. There is usually no need to change the default value (1/s)

DENYIPLIMIT Sets the number of blocked IP addresses CSF keeps track of. It is recommended to limit the number of denied IP addresses as having too many blocks may slow down the server performance.

DENYTEMPIP_LIMIT Same as above, but for temporary IP address blocks.

PACKET_FILTER Filter invalid, unwanted and illegal packets.

SYNFLOOD, SUNFLOODRATE and SYNFLOODBURST This offers protection against SYN flood attacks. This slows down the initialization of every connection, so you should enable this only if you know that your server is under attack.

  • Applying the Changes

Whenever you are altering the settings in csf.conf, you should save the files and restart CSF in order for the changes to take effect.

Once you are ready with the configuration, close and save the file.

After this, you should apply the changes by restarting CSF with command:

csf -r

Additionally CSF can be configured to track processes in order to detect suspicious processes or open network ports, and send an email to the system administrator if any is detected. This may help you to identify and stop a possible exploit on your VPS. In order to set this open the csf.conf file and change the value from 0 to 1 for the following features:

LF_SSH_EMAIL_ALERT = "1"
LF_SU_EMAIL_ALERT = "1"

also change the email address:

LF_ALERT_TO = "[email protected]"

CSF usage

  • In order to start the Firewall:

csf -s

  • In order to flush or stop the Firewall rules:

csf -f

  • In order to reload the current rules:

csf -r

  • In order to allow IP and add it to the /etc/csf/csf.allow

csf -a 1.1.1.1

  • In order to deny an IP and add it to the /etc/csf/csf.deny

csf -d 1.1.1.1

  • In order to deny an IP address temporary for an hour:

csf -td 1.1.1.1

CSF provide an option to allow and deny access by country using the CIDR (Country Code).

In order to list more than one country you just need to separate them using comas:

CC_DENY = "AB,CD,EF"

You may find a list of ISO 3166-1 alpha-2 codes at https://en.wikipedia.org/wiki/ISO_3166-1_alpha-2

Conclusion

CSF is an application firewall for iptables provided for Linux servers which is easy to install and operate and on top of that comes with a lot of handy build-in options which you can use to make sure the security on your droplet is properly configured.

Related

Tag: Nothing
Last updated:29/07/2021

kyaky

This person is a lazy dog and has left nothing

Like
< Last article
Next article >

Comments

Cancel

This site uses Akismet to reduce spam. Learn how your comment data is processed.

COPYRIGHT © 2021 vpsmate.net. ALL RIGHTS RESERVED.

Theme Kratos Made By Seaton Jiang