Forge Home


ConfigServer Firewall and Login Failure Daemon installation and configuration module


10,062 latest version

2.5 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 0.9.4 (latest)
  • 0.9.3
  • 0.9.2
  • 0.9.1
  • 0.9.0
released Jun 24th 2014

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'devopera-docsf', '0.9.4'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add devopera-docsf
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install devopera-docsf --version 0.9.4

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.



devopera/docsf — version 0.9.4 Jun 24th 2014


ConfigServer Firewall (csf) and Login Failure Daemon (lfd) are designed to protect online servers by providing an adaptive firewall and access/process monitoring service. CSF in turn uses IPtables to actually implement the firewall rules. This module also includes Linux Malware Detect (maldet) for detecting malware.

Original Gist came from and



  • Added variables with sensible defaults for CONNLIMIT and PORTFLOOD directives to manage DOS attacks


  • Fixed minor order issue on configuration files csf_ignore and csf_pignore.conf


  • Making available as a module on Puppet Forge


  • Added vars to allow additions to csf.ignore and csf.pignore


  • Added 21 to default outgoing ports for yum updates


  • Added basic maldet configuration


Setup CSF firewall with defaults

class { 'docsf': }

Setup CSF firewall to allow in certain ports, alert to specific email and ignore scripted executables

class { 'docsf':
  # allow web, ssh (on 15022), puppet, nrpe (on 5666)
  tcp_in => "80,15022,8139,8140,5666",
  lf_alert_to => '',
  csf_pignore => ['exe:/usr/bin/rsync', 'exe:/usr/bin/svn', 'exe:/usr/sbin/nrpe'],

Operating System support

Tested with CentOS 6

Copyright and License

Copyright (C) 2012 Lightenna Ltd

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.