This article explains how to use IPMIView to access IPMI for dedicated
servers equipped with this feature. IPMI allows you to control the
power status of your server and to view and control the screen,
keyboard and mouse of the server. IPMIView is a suita...
Please note that these directions assume your server is either already
configured with a Main IPv6 Address or that you have visited
http://steadfast.net/ipv6-me/  to obtain the correct information.
Activating IPv6 addresses varies by operating syste...
Please note: We recommend against adding IP addresses using your
hosting control panel due to a number of possible issues this may
cause. Instead, please try to use the methods indicated below.
Activating IPv4 addresses varies by operating system. Pleas...
This document outlines how to utilize RPMs to grant access to the
Steadfast Staff access to your server.
ADDING THE CENTOS-STEADFAST REPOSITORY
You can install an RPM to your system to automatically add the
repository data to the yum configuration.
Starting with CentOS 6.8, a newly introduced update to NSS causes
certain applications to be unable to connect via TLS using GCM ciphers
on virtual machines. This article describes the technical problem and
how to apply the solution.
SYMPTOMS AND DETECT...
This article explains noteworthy differences and improvements between
CentOS 6 and CentOS 7 to help in deciding which version to use.
WHAT IS CENTOS 7?
CentOS 7 is the most recent major release of the CentOS Linux
distribution. It is based on Red Hat E...
This article explains some considerations when choosing an operating
system for your dedicated server or cloud VM. If you have any
questions or need advice, feel free to contact our sales or support
NARROWING YOUR LIST
The first thing to conside...
DATA CENTER ACCESS
All colocation customers are allowed to enter our data center space to
work on their own systems at any time. All we ask is that you contact
us at least 10 minutes in advance so we can be prepared for your
arrival. If that is not pos...
Certain CPU-intensive applications (trading applications in particular) will cause "clock drift" on Windows systems. Severe enough clock drift will cause Windows to re-sync with the system's hardware clock (also know as RTC, or Real Time Clock). Thi...
DNS resolvers are used to look up IP addresses, mail servers, and
other information related to a domain name. Resolvers are required to
use the Internet effectively. This article describes the resolver
configuration for servers hosted with Steadfast. A ...
On February 11th, 2011, we deployed a new filtering solution based on SpamExperts, which provides additional redundancy and IPv6 support, as well as much more granular control over filtering and user access. This documentation explains some of the core f...
The common philosophy with respect to system memory is that unused memory is wasted. Most operating systems, including both Windows and Linux maintain what's called a memory "cache." Technically this memory space is in use, however it is designed to be ...
This article explains how to install FFMPEG and FFMPEG-PHP on your server. It assumes you are running CentOS or Fedora.
Installing FFMPEG and related packages
DAG provides good RPM packages for CentOS and Fedora releases which can be used for thi...
This document describes how to connect to the Steadfast Networks VPN
server for accessing the Internal Network and IPMI remote server
Access to the VPN is freely available to all customers with a service
that is provides...
Colocation and dedicated server accounts come with 1 IPv4 address by
default. Additional IPs may be requested by emailing email@example.com
at no charge under the following conditions:
Initial Free Allocations
This article provides details about IPv6 and the reasons it is important to deploy it, as well as various considerations and caveats when using IPv6 on production server environments.
What is IPv6?
IPv6 (Internet Protocol version 6) is a replacement...
Due to recent changes in Daylight Savings Time laws in the United States, your server may require an update in order properly handle changing over to Daylight Savings Time. Please see the following tips for proper time zone updates for various server ope...
This article is written to explain our current Network Time Protocol
(NTP) offering. Having a consistent time setting across servers help
when correlating logged event across servers and is used by security
protocols such as SSL, TLS and Kerberos to avo...
Precision Time Protocol (PTP)
There are a number of computer applications that benefit from having
highly accurate time. There are three protocols in popular use to
address this need: Precision Time Protocol (PTP) version 1, PTP
version 2, and Networ...
In March 2013, the Open DNS Resolver Project  identified many IP
addresses on our network that were of moderate to severe risk of
participating in a DNS amplification attack. This attack queries name
servers for large results using a fake source addr...
In 2018 we have seen a significant increase in reports of
amplification attacks that take advantage of the LDAP protocol over
UDP (CLDAP). This attack queries LDAP servers for large results
using a fake source address. This request causes the response to...
In 2018 we have seen a large number of DDoS attacks making use of
unsecured memcached services running on the internet. On some
Linux distributions memcached servers default to listening on all
network interfaces, including those facing the internet. Ex...
In Febuary 2014, the Open NTP Project  identified many addresses on
our network that were of moderate to severe risk of participating in a
NTP amplification attack. This attack queries NTP servers for large
results using a fake source address. This ...
Recently, a large number of DDoS attacks have begun to make use of
unsecured SNMP services running on the Internet. SNMP services have a
default community (authentication name) called "public" which can be
used to return some read-only monitoring statis...
Configuring BIOS for booting PXE menu
To use the PXE option, you will first need to make sure it is enabled in the BIOS.
Tap the “DEL” key until the BIOS screen comes up.
Once the BIOS screen comes up, press the right arrow so the “Advanced”...
Spamhaus provides a set of managed block lists to assist with
identifying and blocking IP addresses and domain names that are likely
to send out spam or cause malware infections. These lists are
available via the spamhaus.org [https://www.spamhaus.org] w...
If your server or VM is frequently running out of memory this article
should be of great assistance to you and will guide you through
diagnosing what the issue is as well as listing some possible fixes.
First of all, to see how much memory you are cur...
There are a few common ways to restrict SSH access to your server but
still allow our technicians to access your server.
CHANGED SSH PORT OR REQUIREMENT TO USE SUDO OR SU
In this case, please do the following:
* Log into the management interface [h...
This document describes how to set up a new iSCSI mount point on a Linux system. These directions will assume you are running CentOS 5 or 6.
Note: Replace any text in angle brackets (including the brackets) with the value provided or determined earlie...
Below is the shipping information for Steadfast's three datacenters.
Customers shipping hardware to Steadfast should always include their
Customer ID# on the shipping label, if at all possible.
350 E CERMAK DATACENTER
350 E Cermak Rd
Most slow transfer speeds and performance problems are caused by Internet routing problems. Some of these problems may occur at or near our network, but many occur along the way and are sometimes out of our control. If you are seeing slow performance or...
Installing/Using the CloudFlare cPanel Module
1. Sign-up for a CloudFlare Account: https://www.cloudflare.com/sign-up.html
2. Follow the up-to-date install instructions here: https://www.cloudflare.com/wiki/Cpanel
3. Once it is installed, you can s...
Default settings for connecting to a remote server are typically fine
for most users, but those who require multiple monitors for their
sessions, such as traders or system administrators, may need to
configure RDP to use multiple monitors in their remot...
Newly set up Windows servers can be connected using Remote Desktop
Connection. This transmits your desktop across the Internet, allowing
connection from a remote location.
CONNECTING FROM WINDOWS XP
If you are not running the most recent version (7....
This article explains how and why we use VRRP or HSRP on VLANs we assign to our customers, as well as the implications and limits this may impose on services.
What are VRRP and HSRP?
HSRP is the "Hot Standby Router Protocol" and VRRP is the "Virtual...
This article is a reproduction of a standard Steadfast Networks
welcome email sent to new dedicated server customers. If you have lost
your welcome email, you can use this information as a reference for
service features and addon services you are eligible...
CentOS is a community-supported Linux distribution built off the open-source, free packages prepared for Red Hat Enterprise Linux. CentOS is a free edition of the very same software that makes Red Hat an enterprise Linux solution, without the unnecessary...