{"id":2345,"date":"2025-04-24T20:20:50","date_gmt":"2025-04-24T20:20:50","guid":{"rendered":"https:\/\/wiki.xontel.com\/?post_type=manual_documentation&#038;p=2345"},"modified":"2026-01-10T18:50:46","modified_gmt":"2026-01-10T18:50:46","slug":"security","status":"publish","type":"manual_documentation","link":"https:\/\/wiki.xontel.com\/ar\/documentation\/pbx\/pbx-v-1-x-x\/system\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<p>Iptables and Fail2Ban are essential tools for enhancing server security. <strong>Iptables<\/strong> acts as a firewall, allowing you to define rules that control network traffic and protect the system from unauthorized access. <strong>Fail2ban<\/strong> works alongside iptables by scanning log files for signs of suspicious behavior, such as repeated failed login attempts, and temporarily banning IP addresses that exhibit these patterns.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large image-border\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"305\" src=\"https:\/\/wiki.xontel.com\/wp-content\/uploads\/2025\/04\/image-142-1024x305.png\" alt=\"\" class=\"wp-image-8731\" srcset=\"https:\/\/wiki.xontel.com\/wp-content\/uploads\/2025\/04\/image-142-1024x305.png 1024w, https:\/\/wiki.xontel.com\/wp-content\/uploads\/2025\/04\/image-142-300x89.png 300w, https:\/\/wiki.xontel.com\/wp-content\/uploads\/2025\/04\/image-142-768x229.png 768w, https:\/\/wiki.xontel.com\/wp-content\/uploads\/2025\/04\/image-142-1536x458.png 1536w, https:\/\/wiki.xontel.com\/wp-content\/uploads\/2025\/04\/image-142-18x5.png 18w, https:\/\/wiki.xontel.com\/wp-content\/uploads\/2025\/04\/image-142.png 1831w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Together, they help safeguard your system against common threats and unauthorized intrusions.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/wiki.xontel.com\/ar\/documentation\/system\/security\/ip-tables\/\" data-type=\"page\" data-id=\"17\">IP Tables<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/wiki.xontel.com\/ar\/documentation\/system\/security\/fail2ban\/\" data-type=\"page\" data-id=\"17\">Fail2ban<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p><\/p>","protected":false},"author":1,"featured_media":0,"parent":2296,"menu_order":6,"template":"","manualdocumentationcategory":[16],"manual_doc_tag":[],"class_list":["post-2345","manual_documentation","type-manual_documentation","status-publish","hentry","manualdocumentationcategory-doc-demo-articles"],"_links":{"self":[{"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/manual_documentation\/2345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/manual_documentation"}],"about":[{"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/types\/manual_documentation"}],"author":[{"embeddable":true,"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":7,"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/manual_documentation\/2345\/revisions"}],"predecessor-version":[{"id":8732,"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/manual_documentation\/2345\/revisions\/8732"}],"up":[{"embeddable":true,"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/manual_documentation\/2296"}],"wp:attachment":[{"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/media?parent=2345"}],"wp:term":[{"taxonomy":"manualdocumentationcategory","embeddable":true,"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/manualdocumentationcategory?post=2345"},{"taxonomy":"manual_doc_tag","embeddable":true,"href":"https:\/\/wiki.xontel.com\/ar\/wp-json\/wp\/v2\/manual_doc_tag?post=2345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}