Working for you since 2009.

Informational Website publish (Blog)

News about our company, tutorials about IT and much more you will find in this page.

Useful CSF SSH Command Line Commands

February 1st, 2018

Config Server Firewall (CSF) is a free and advanced firewall supported by most Linux distributions. In addition to the basic functionality of a firewall (filtering packets) CSF includes other security features, such as login/intrusion/flood detections.
The full list of supported operating systems and features can be found on ConfigServer’s website.

This article covers some useful CSF SSH Command Line Commands, that might be useful, in a “cheat sheet” format.


Command Description Example
csf -s Start the firewall rules [email protected][~]# csf -s
csf -f Flush/Stop firewall rules (note: lfd may restart csf)
[email protected][~]# csf -f
csf -r Restart the firewall rules [email protected][~]# csf -r
csf -a [] [comment] Allow an IP and add to /etc/csf/csf.allow
[email protected][~]# csf -a Home IP Address
csf -tr [] Remove an IP from the temporary IP ban or allow list.
[email protected][~]# csf -tr
csf -tf Flush all IPs from the temporary IP entries
[email protected][~]# csf -tf
csf -d [] [comment] Deny an IP and add to /etc/csf/csf.deny [email protected][~]# csf -d Blocked This Guy
csf -dr [] Unblock an IP and remove from /etc/csf/csf.deny [email protected][~]# csf -dr
csf -df Remove and unblock all entries in /etc/csf/csf.deny [email protected][~]# csf -df
csf -g [] Search the iptables and ip6tables rules for a match (e.g. IP, CIDR, Port Number) [email protected][~]# csf -g
csf -t  Displays the current list of temporary allow and deny IP entries with their TTL and comment  [email protected][~]# csf -t


Whitelisting an IP Address


In order to prevent a specific IP from being blocked, even for a temporary deny, you need to list their IP address in the files csf.ignore and csf.allow. The first step is to enable IGNORE_ALLOW in /etc/csf/csf.conf. The value for IGNORE_ALLOW will appear as “0”, you will need to adjust it to “1” and restart csf and lfd.

This will allow lfd to reference csf.ignore. If you add an IP address to csf.ignore, the IP address will no longer be checked by lfd and failed login attempts will not trigger temporary denies.

CSF is a very powerful tool, worth exploring, to take advantage of all the security measures it has to offer. These are only a few of the most used commands, but it is recommended that you delve deep into all the settings inside csf.conf in order to extract the most out of this piece of software.

Need help? email our team 24/7 to [email protected]