{"id":277,"date":"2025-11-30T21:49:37","date_gmt":"2025-11-30T21:49:37","guid":{"rendered":"https:\/\/edk-tech.net\/?p=277"},"modified":"2025-11-30T21:49:37","modified_gmt":"2025-11-30T21:49:37","slug":"where-are-iptables-persistent-iptables-services-rules-files-located-in-cpanel-whm","status":"publish","type":"post","link":"https:\/\/edk-tech.net\/?p=277","title":{"rendered":"Where Are iptables-persistent\/iptables-services Rules Files Located in cPanel\/WHM?"},"content":{"rendered":"\n<p>Location of <a href=\"https:\/\/edk-tech.net\/?glossary=internet-protocol-version-4\"\r\n                    class=\"yaw-glossary yaw-glossary-alt-link\"\r\n                    title=\"Internet Protocol version 4 (IPv4)\"\r\n                    data-bs-toggle=\"popover\"\r\n                    data-bs-html=\"true\"\r\n                    data-bs-trigger=\"hover focus\"\r\n                    data-bs-content=\"&lt;p&gt;IPv4 address classes Predefined ranges of IP addresses (Classes A, B, C, D, and E) designed to allocate addresses based on network size, with Class A for large networks, Class B for medium-sized networks, Class C for small networks, Class&hellip;&lt;\/p&gt;\n\">IPv4<\/a> file: \/etc\/sysconfig\/iptables<\/p>\n\n\n\n<p>Location of IPv6 file: \/etc\/sysconfig\/ip6tables<\/p>\n\n\n\n<p>Linux Command to Access Them Directly<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In the terminal,<\/li>\n\n\n\n<li>Type (or paste) vi \/etc\/sysconfig\/ip6tables for IPv6 file, or<\/li>\n\n\n\n<li>vi \/etc\/sysconfig\/iptables for IPv4 file<\/li>\n<\/ol>\n\n\n\n<p>Linux Command to Get to Directory<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In the terminal,<\/li>\n\n\n\n<li>Type (or paste) cd \/etc\/sysconfig to navigate to the sysconfig directory, or<\/li>\n\n\n\n<li>ls \/etc\/sysconfig to list items in the sysconfig directory.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Location of IPv4 file: \/etc\/sysconfig\/iptables Location of IPv6 file: \/etc\/sysconfig\/ip6tables Linux Command to Access Them Directly Linux Command to Get to Directory<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28,23,30],"tags":[],"class_list":{"0":"post-277","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cybersecurity","7":"category-knowledgebase","8":"category-system-administration"},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/peQefU-4t","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/posts\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edk-tech.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=277"}],"version-history":[{"count":0,"href":"https:\/\/edk-tech.net\/index.php?rest_route=\/wp\/v2\/posts\/277\/revisions"}],"wp:attachment":[{"href":"https:\/\/edk-tech.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edk-tech.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edk-tech.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}