In some ways, firewalld on systemd systems is easier to manage and configure than iptables. There are, for the most part, no long series of chains, jumps, accepts and denies that you need to memorize to get firewalld up and running in a basic configuration. The rules are simple and straightforward, but there is no reason you cannot still have all the power that iptables afforded.Continue reading “An Introduction to Firewalld”
In this article, we will discuss how and why a VPS server or Dedicated server might block an IP address and how to resolve it.
When your company hosts a website or web app online, whether it’s an individual dedicated server or a whole server cluster, you naturally expect to have uninterrupted access at all times. However, it’s possible that in rare circumstances, your server could accidentally block your IP and prevent you from connecting and using the service.
If that has happened to you, this quick summary will provide you with all the essential information needed to verify the status of your IP. Additionally, we will offer some of the most common reasons for being blocked, as well as a few suggestions on how to unblock and whitelist your IP as quickly as possible.Continue reading “Why Did the Server Block My IP?”
(On Managed Servers)
In this article, we will provide an in depth explanation on how to set up and customize the messenger feature in CSF on a managed server.
What Is CSF?
Let’s begin by defining exactly what CSF or ConfigServer Firewall is and what it does. As noted in our earlier article, CSF is:Continue reading “How To Set Up Messenger In CSF — Part 2”
(On Unmanaged/Core Managed Servers)
What Is CSF?
In this article, we will provide an in-depth explanation of how to set up and customize the messenger feature in CSF on an unmanaged or core managed server. Let’s begin by defining exactly what CSF or ConfigServer Firewall is and what it does.Continue reading “How To Set Up Messenger In CSF — Part 1”
Basic Firewall Rules
In a firewall rule, the action component decides if it will permit or block traffic. It has an action on match feature. For example, if the traffic matches the components of a rule, then it will be permitted to connect to the network. It is essential to consider the potential security risks when modifying a firewall rule to avoid future issues. Following best practices for configuring firewalls can help you maximize the effectiveness of your solution.Continue reading “Best Practices for Firewall Rules”
- This tutorial assumes you’ve already logged in to cPanel, and are starting on the home screen.
- Now let’s learn how to setup hotlink protection.
- Click the “Hotlink Protection” icon.
- Hotlink protection prevents other websites from directly linking to certain files (typically images) on your website. You’ll want to prevent this if you have copyrighted images, or to simply save on bandwidth usage. You’ll first want to make sure your own sites are listed here, so you are able to hotlink to your images.
- Enter all the file types you want to protect …
- … and check the “Allow direct requests” box if you want to give the ability to manually enter URLs of a protected file.
- Enter the URL you want to redirect to, for anyone who tries to hotlink to your files or images.
- Then click “Submit”.
- That’s it! You’ve successfully enabled hotlink protection.
- To disable hotlink protection, click the “Disable” button.