{"id":3719,"date":"2023-11-21T11:35:04","date_gmt":"2023-11-21T03:35:04","guid":{"rendered":"https:\/\/www.servergigabit.com\/guide\/?post_type=kb&#038;p=3719"},"modified":"2026-01-09T15:27:11","modified_gmt":"2026-01-09T07:27:11","slug":"setting-up-a-firewall-configuration-on-linux-and-windows","status":"publish","type":"kb","link":"https:\/\/www.servergigabit.com\/guide\/kb\/setting-up-a-firewall-configuration-on-linux-and-windows","title":{"rendered":"Setting Up a Software Firewall on Linux and Windows"},"content":{"rendered":"<header class=\"entry-header \"><\/header>\n<div class=\"entry-content clear\">\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-3720\" src=\"https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-300x169.jpeg\" alt=\"Firewall Configuration\" width=\"682\" height=\"384\" srcset=\"https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-300x169.jpeg 300w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-1024x576.jpeg 1024w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-768x432.jpeg 768w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-1536x864.jpeg 1536w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-2048x1152.jpeg 2048w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-370x208.jpeg 370w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-1230x692.jpeg 1230w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-800x450.jpeg 800w, https:\/\/www.servergigabit.com\/guide\/wp-content\/uploads\/2023\/11\/c-390x219.jpeg 390w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/><\/figure>\n<div class=\"wp-block-spacer\" aria-hidden=\"true\"><\/div>\n<p>In an age where connectivity is omnipresent, safeguarding our digital boundaries has become paramount. Among the crucial defenses in this realm stands the Firewall configuration\u2014an indispensable guardian fortifying our systems against an array of potential threats.<\/p>\n<h2><strong>What is a Firewall?<\/strong><\/h2>\n<p>A <a href=\"https:\/\/www.cloudflare.com\/learning\/security\/what-is-a-firewall\/\" rel=\"nofollow noopener\" target=\"_blank\">Firewall<\/a> serves as a barrier between your computer\/network and the vast, potentially hazardous expanse of the internet. Much like a security checkpoint, it monitors incoming and outgoing traffic, permitting or blocking data packets based on predefined security rules. This vital piece of software discerns between safe and malicious activity, curbing unauthorized access and protecting sensitive data from cyber threats.<\/p>\n<h2><strong>The Role of Firewalls<\/strong><\/h2>\n<p>Firewalls come in various forms, from software-based solutions integrated into operating systems to dedicated hardware appliances. Regardless of the form, their role remains consistent: shielding devices and networks by filtering traffic, preventing unauthorized access, and minimizing the risk of cyber attacks.<\/p>\n<div class=\"conversation-container ng-tns-c3643062185-2 narrow-container ng-star-inserted\">\n<div class=\"ng-tns-c778119285-552\">\n<div class=\"response-container ng-tns-c3627721678-553 response-container-has-multiple-responses\">\n<div class=\"presented-response-container ng-tns-c3627721678-553\">\n<div class=\"response-container-content ng-tns-c3627721678-553\">\n<div class=\"response-content ng-trigger ng-trigger-responsePopulation ng-tns-c3627721678-553\">\n<div class=\"markdown markdown-main-panel\" dir=\"ltr\">\n<h2 data-sourcepos=\"12:1-12:31\"><strong>Setting Up a Basic Firewall<\/strong><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"conversation-container ng-tns-c3643062185-2 narrow-container ng-star-inserted\">\n<div class=\"ng-tns-c778119285-621\">\n<div class=\"response-container ng-tns-c3627721678-622\">\n<div class=\"presented-response-container ng-tns-c3627721678-622\">\n<div class=\"response-container-content ng-tns-c3627721678-622\">\n<div class=\"response-content ng-trigger ng-trigger-responsePopulation ng-tns-c3627721678-622\">\n<div class=\"markdown markdown-main-panel\" dir=\"ltr\">\n<p data-sourcepos=\"7:1-7:311\">By default, SSH connections are typically established through Port 22 (TCP). The main advantage of using the default SSH-2 protocol (compared to VNC) is the encrypted connection using an AES algorithm with a 128-bit key length. Therefore, it is generally recommended to use SSH instead of VNC whenever possible.<\/p>\n<p data-sourcepos=\"9:1-9:153\">In Linux, you should consider using the built-in software package &#8216;iptables&#8217;, which comes with the initial installation on most distributions by default.<\/p>\n<p data-sourcepos=\"11:1-11:48\">There are two main advantages to using iptables:<\/p>\n<ol data-sourcepos=\"13:1-16:0\">\n<li data-sourcepos=\"13:1-14:0\">\n<p data-sourcepos=\"13:4-13:85\">The required software package is installed by default on most Linux distributions.<\/p>\n<\/li>\n<li data-sourcepos=\"15:1-16:0\">\n<p data-sourcepos=\"15:4-15:100\">It is compatible with any <a href=\"https:\/\/www.servergigabit.com\/linux-vps-hosting\/\">Linux<\/a> distribution (Ubuntu, Debian, CentOS, etc.) without restrictions.<\/p>\n<\/li>\n<\/ol>\n<p data-sourcepos=\"17:1-17:68\">You can also define IPv4 and IPv6 rules according to your own needs.<\/p>\n<h4 data-sourcepos=\"19:1-19:47\"><strong>Checking the Current Firewall Configuration<\/strong><\/h4>\n<p data-sourcepos=\"21:1-21:103\">Before configuring your firewall, there are no rules defined. To check this, use the following command:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">iptables -L<\/code><\/pre>\n<\/div>\n<p data-sourcepos=\"27:1-27:37\">The output will look similar to this:<\/p>\n<p data-sourcepos=\"27:1-27:37\"><img decoding=\"async\" class=\"\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/07\/iptables-L.jpg\" alt=\"IP Tables rules\" width=\"615\" height=\"276\" \/><\/p>\n<p data-sourcepos=\"27:1-27:37\">As you can see, there are currently no rules defined. The Software-Firewall will not block anything.<\/p>\n<h4 data-sourcepos=\"36:1-36:25\"><strong>Adding Firewall Rules<\/strong><\/h4>\n<p data-sourcepos=\"38:1-38:48\">To add firewall rules, use the following syntax:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">iptables &lt;ADD: -A&gt; | &lt;Chain: INPUT \/ Output&gt; | &lt;Source\/Destination: -d \/ -s&gt; | &lt;action: -j&gt; | &lt;Art: ACCEPT&gt;<\/code><\/pre>\n<\/div>\n<p data-sourcepos=\"44:1-44:90\">Here&#8217;s an example of how to use the iptables command to allow incoming traffic at port 80:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">iptables -A INPUT -p tcp --dport 80 -j ACCEPT<\/code><\/pre>\n<\/div>\n<h4 data-sourcepos=\"50:1-50:44\"><strong>Example Firewall Configuration for Linux<\/strong><\/h4>\n<p data-sourcepos=\"52:1-52:91\">Here is an example script that will open the most commonly used ports on your Linux server:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\"><span class=\"hljs-meta\">#!\/bin\/bash<\/span>\r\n\r\n<span class=\"hljs-comment\"># Delete the current firewall setup:<\/span>\r\niptables -F\r\n\r\n<span class=\"hljs-comment\"># Define default rules for all chains:<\/span>\r\niptables -P INPUT DROP\r\niptables -P FORWARD DROP\r\n\r\n<span class=\"hljs-comment\"># Allow incoming\/outgoing localhost frames for tests (e.g.\u00a0Webserver, Mailserver):<\/span>\r\niptables -A INPUT -d 127.0.0.1 -j ACCEPT\r\niptables -A OUTPUT -s 127.0.0.1 -j ACCEPT\r\n\r\n<span class=\"hljs-comment\"># Allow loopback frames for the internal process management:<\/span>\r\niptables -A INPUT -i lo -j ACCEPT\r\n\r\n<span class=\"hljs-comment\"># Allow incoming\/outgoing related-<span class=\"citation-0\">established connections:<\/span><\/span><span class=\"citation-0 citation-end-0\">\r\niptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT\r\niptables -A OUTPUT -m state --state RELATED,ESTABLISHED<\/span> -j ACCEPT\r\n\r\n<span class=\"hljs-comment\"># Allow incoming PING-Requests:<\/span>\r\niptables -A INPUT -p icmp -j ACCEPT\r\n\r\n<span class=\"hljs-comment\"># Allow incoming SSH connections:<\/span>\r\niptables -A INPUT -p tcp --dport 22 -j ACCEPT\r\n\r\n<span class=\"hljs-comment\"># Allow incoming HTTP\/HTTPS requests:<\/span>\r\niptables -A INPUT -p tcp --dport 80 -j ACCEPT\r\niptables -A INPUT -p tcp --dport 443 -j ACCEPT\r\n\r\n<span class=\"hljs-comment\"># Allow incoming DNS requests:<\/span>\r\niptables -A INPUT -p udp --dport 53 -j ACCEPT\r\niptables -A INPUT -p tcp --dport 53 -j ACCEPT<\/code><\/pre>\n<\/div>\n<h4 data-sourcepos=\"90:1-90:23\"><strong>To use this script:<\/strong><\/h4>\n<ol data-sourcepos=\"92:1-95:0\">\n<li data-sourcepos=\"92:1-93:0\">\n<p data-sourcepos=\"92:4-92:38\">Login to your Linux server as root.<\/p>\n<\/li>\n<li data-sourcepos=\"94:1-95:0\">\n<p data-sourcepos=\"94:4-94:42\">Create a shellscript with this command:<\/p>\n<\/li>\n<\/ol>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">nano firewall.sh<\/code><\/pre>\n<\/div>\n<ol start=\"3\" data-sourcepos=\"100:1-105:0\">\n<li data-sourcepos=\"100:1-101:0\">\n<p data-sourcepos=\"100:4-100:36\">Paste in the content shown above.<\/p>\n<\/li>\n<li data-sourcepos=\"102:1-103:0\">\n<p data-sourcepos=\"102:4-102:69\">Save the file with [CTRL] + O and exit the editor with [CTRL] + X.<\/p>\n<\/li>\n<li data-sourcepos=\"104:1-105:0\">\n<p data-sourcepos=\"104:4-104:48\">Make the script executable with this command:<\/p>\n<\/li>\n<\/ol>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">chmod +x firewall.sh<\/code><\/pre>\n<\/div>\n<ol start=\"6\" data-sourcepos=\"110:1-111:0\">\n<li data-sourcepos=\"110:1-111:0\">To run the script and open the ports provided by the script, use the following command:<\/li>\n<\/ol>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">.\/firewall.sh<\/code><\/pre>\n<\/div>\n<h2 data-sourcepos=\"116:1-116:39\"><strong>Making the Firewall Rules Permanent<\/strong><\/h2>\n<p data-sourcepos=\"118:1-118:167\">Please note that if you use the sample script, all firewall rules will not be added permanently. After a server reboot, every rule would have to be set manually again.<\/p>\n<p data-sourcepos=\"120:1-120:108\">To make the firewall rules permanent, you can run the following commands depending on your operating system:<\/p>\n<h4 data-sourcepos=\"122:1-122:55\"><strong>Permanent Firewall Settings for CentOS 7 or higher:<\/strong><\/h4>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\"><span class=\"citation-1\">yum install -y iptables-services\r\nsystemctl stop firewalld\r\nsystemctl mask firewalld\r\nsystemctl <\/span><span class=\"hljs-built_in\"><span class=\"citation-1\">enable<\/span><\/span><span class=\"citation-1 citation-end-1\"> iptables.service\r\nsystemctl<\/span> -t service | grep iptables\r\n\/usr\/libexec\/iptables\/iptables.init save<\/code><\/pre>\n<\/div>\n<h4 data-sourcepos=\"133:1-133:50\"><strong>Permanent Firewall Settings for Debian\/Ubuntu:<\/strong><\/h4>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">apt-get install iptables-persistent netfilter-persistent\r\n<img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/07\/Debian-FW-1024x144.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" \/>\r\n<\/code><\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image\">\n<h4 data-sourcepos=\"1:1-1:45\"><strong>Saving the Current Firewall Configuration<\/strong><\/h4>\n<p data-sourcepos=\"3:1-3:123\">You can also save your currently configured firewall rules if you have not saved them to the above files with this command:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">iptables-save &gt; \/etc\/iptables\/rules.v4 &amp;&amp; ip6tables-save &gt; \/etc\/iptables\/rules.v6\r\n<img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/07\/Netzwerk-Interface.jpg\" alt=\"How to find your IP Address\" \/><\/code><\/pre>\n<\/div>\n<h4 data-sourcepos=\"9:1-9:52\"><strong>Restoring a Backup of the Firewall Configuration<\/strong><\/h4>\n<p data-sourcepos=\"11:1-11:107\">We strongly recommend creating a backup of the current firewall setup to be able to immediately restore the previous configuration (e.g., connection locks).<\/p>\n<p data-sourcepos=\"13:1-13:93\">To save your current IPv4\/IPv6 firewall setup into a backup file, use the following commands:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">iptables-save &gt; \/root\/iptables_rules\r\nip6tables-save &gt; \/root\/ip6tables_rules<\/code><\/pre>\n<\/div>\n<p data-sourcepos=\"20:1-20:33\">To restore the backup files, use:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container\" role=\"text\">iptables-restore &lt; \/root\/iptables_rules\r\niptables-restore &lt; \/root\/ip6tables_rules<\/code><\/pre>\n<\/div>\n<h4 data-sourcepos=\"27:1-27:62\"><strong>Restoring Access to a Server with a Misconfigured Firewall<\/strong><\/h4>\n<p data-sourcepos=\"29:1-29:162\">If you need to reconnect to your server due to a misconfigured firewall setup, you could use your VNC connection for your VPS to restore a previous configuration.<\/p>\n<p data-sourcepos=\"29:1-29:162\"><img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/01\/VNC.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" \/><\/p>\n<p data-sourcepos=\"33:1-33:230\">If you have a Dedicated Server, VNC access is not possible. You will have to reboot your server into the Linux rescue system to regain access.<\/p>\n<h2 data-sourcepos=\"37:1-37:43\"><strong>Setting up a Basic Firewall for Windows<\/strong><\/h2>\n<p data-sourcepos=\"39:1-39:80\">The Windows Firewall can be found within the Server-Manager settings as follows:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container no-decoration-radius\" role=\"text\">Windows-Firewall -&gt; Public: On-&gt; Advanced settings<\/code><\/pre>\n<\/div>\n<p data-sourcepos=\"45:1-45:67\"><img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/Windows-FW-1_EN.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" \/><\/p>\n<p data-sourcepos=\"45:1-45:67\"><img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/Windows-FW-2_EN.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" \/><\/p>\n<p data-sourcepos=\"45:1-45:67\"><img decoding=\"async\" class=\"\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/Windows-FW-3_EN.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" width=\"661\" height=\"572\" \/><\/p>\n<p data-sourcepos=\"45:1-45:67\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/Windows-FW-8_EN.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" width=\"661\" height=\"534\" \/><br \/>\nYou can now modify your firewall rules according to your own needs.<\/p>\n<p data-sourcepos=\"47:1-47:200\">The main difference between Linux and Windows is that Windows provides a basic firewall configuration by default. In most cases, it should be enough to keep the default setup or modify existing rules.<\/p>\n<p data-sourcepos=\"49:1-49:199\">All active firewall rules are marked with a green tag. The rest of the rules (without any tag) need to be activated if required. Feel free to customize the firewall setup according to your own needs.<\/p>\n<p data-sourcepos=\"49:1-49:199\"><img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/Windows-FW-4_EN-1024x804.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" \/><img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/Windows-FW-5_EN-1024x804.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" \/><img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/Windows-FW-6_EN-1024x891.jpg\" alt=\"How to Setup a Software-Firewall in Linux and Windows\" \/><\/p>\n<p data-sourcepos=\"51:1-51:194\">For example, if you would like to change your RDP port to a different one instead of the default &#8220;3389,&#8221; you will have to modify the following two firewall rules within the &#8220;Inbound rule&#8221; chain:<\/p>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container no-decoration-radius\" role=\"text\">Remote Desktop - User Mode (TCP-In)\r\nRemote Desktop -\u00a0User Mode (UDP-In)\r\n<\/code><\/pre>\n<\/div>\n<p data-sourcepos=\"58:1-58:175\">You will then need to modify the affected Windows registry entry to the new value. However, to prevent disasters, make sure to create a full backup of the registry beforehand:<\/p>\n<ol data-sourcepos=\"60:1-69:0\">\n<li data-sourcepos=\"60:1-61:0\">\n<p data-sourcepos=\"60:4-60:51\">Press the WINDOWS button + R (keyboard command).<\/p>\n<\/li>\n<li data-sourcepos=\"62:1-63:0\">\n<p data-sourcepos=\"62:4-62:34\">Type &#8220;regedit&#8221; and press Enter.<\/p>\n<\/li>\n<li data-sourcepos=\"64:1-65:0\">\n<p data-sourcepos=\"64:4-64:27\">Click &#8220;File&#8221; &gt; &#8220;Export.&#8221;<\/p>\n<\/li>\n<li data-sourcepos=\"66:1-67:0\">\n<p data-sourcepos=\"66:4-66:53\"><span class=\"animating\">Enter a name for the backup file and click &#8220;Save.<\/span><span class=\"animating\">&#8220;<\/span><\/p>\n<\/li>\n<li class=\"animating\" data-sourcepos=\"68:1-69:0\">\n<p data-sourcepos=\"68:4-68:77\"><span class=\"animating\">Now you can navigate to the following path to set the new RDP port number:<br \/>\n<img decoding=\"async\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2019\/09\/RDP-Port_EN-1.jpg\" alt=\"Windows Registry\" \/><br \/>\n<\/span><\/p>\n<\/li>\n<\/ol>\n<div class=\"code-block ng-star-inserted\">\n<pre><code class=\"code-container no-decoration-radius\" role=\"text\">HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp\\PortNumber\r\n<\/code><\/pre>\n<\/div>\n<ol start=\"6\" data-sourcepos=\"74:1-81:0\">\n<li class=\"animating\" data-sourcepos=\"74:1-75:0\">\n<p data-sourcepos=\"74:4-74:48\"><span class=\"animating\">Double-click the &#8220;PortNumber&#8221; registry entry.<\/span><\/p>\n<\/li>\n<li class=\"animating\" data-sourcepos=\"76:1-77:0\">\n<p data-sourcepos=\"76:4-76:56\"><span class=\"animating\">In the &#8220;Value data&#8221; field,<\/span><span class=\"animating\"> enter the new port number.<\/span><\/p>\n<\/li>\n<li class=\"animating\" data-sourcepos=\"78:1-79:0\">\n<p data-sourcepos=\"78:4-78:14\"><span class=\"animating\">Click &#8220;OK.<\/span><span class=\"animating\">&#8220;<\/span><\/p>\n<\/li>\n<li class=\"animating\" data-sourcepos=\"80:1-81:0\">\n<p data-sourcepos=\"80:4-80:31\"><span class=\"animating\">Restart your Windows server.<\/span><\/p>\n<\/li>\n<\/ol>\n<p data-sourcepos=\"82:1-82:39\"><span class=\"animating\">Now your new RDP port should be active.<\/span><\/p>\n<h2 data-sourcepos=\"1:1-1:14\"><strong>Conclusion<\/strong><\/h2>\n<p data-sourcepos=\"3:1-3:338\">Setting up a software firewall is an essential security measure for both Linux and Windows systems. The process is relatively straightforward and can be accomplished using built-in tools on both platforms. By following the instructions in this guide, you can effectively protect your server from unauthorized access and malicious attacks.<\/p>\n<\/figure>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In an age where connectivity is omnipresent, safeguarding our digital boundaries has become paramount. Among the crucial defenses in this realm stands the Firewall configuration\u2014an indispensable guardian fortifying our systems against an array of potential threats. What is a Firewall? A Firewall serves as a barrier between your computer\/network and the vast, potentially hazardous expanse of the internet. Much like&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"kbtopic":[1099],"kbtag":[1189],"class_list":["post-3719","kb","type-kb","status-publish","hentry","kbtopic-tutorials","kbtag-firewall"],"_links":{"self":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb\/3719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/comments?post=3719"}],"version-history":[{"count":9,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb\/3719\/revisions"}],"predecessor-version":[{"id":5621,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb\/3719\/revisions\/5621"}],"wp:attachment":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/media?parent=3719"}],"wp:term":[{"taxonomy":"kbtopic","embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kbtopic?post=3719"},{"taxonomy":"kbtag","embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kbtag?post=3719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}