Unblocking an IP Address or Opening a Port in the Firewall

Posted on by dpepper | Updated:
Reading Time: < 1 minute

Should you discover (or suspect) that a client or customer’s IP address has been blocked by the firewall on your cPanel VPS server, or should you just need to open or close a port, you may be able to quickly resolve the issue yourself with just a little help.

Regardless of the software firewall your cPanel server is running, we have detailed, step-by-step instructions for managing it in our Knowledge Base:

  • How To Unblock Your IP Address in Manage: If you have a Dedicated, Storm, or VPS server, and your server is running the CSF firewall, you can unblock the IP address from your Manage dashboard. Find out how at How To Unblock Your IP Address in Manage.
  • Managing the Firewall in WHM/cPanel: If you have access to WebHost Manager and your server is running the ConfigServer Firewall (CSF), you can use a graphical interface to manage the firewall. Find out how at Managing the CSF Firewall in WHM.
  • Managing IP Address Blocks in CSF: You can manage IP blocks in the CSF firewall from the command line over SSH as well. Find out how at How To Unblock an IP Address in CSF.
  • Managing IP Address Blocks in APF: If your server uses the Advanced Policy Firewall (APF), you can block or unblock IP addresses via SSH with our walkthrough at How To Unblock an IP Address in APF.
  • Managing Open Ports In Your Firewall: If you need to open or close a port on your server, or check whether a specific port is open, visit Opening Ports in Your Firewall for a walkthrough of the process using SSH, or How To Open a Port in CSF With WHM/cPanel to manage ports in WHM/cPanel.
Series Navigation
<< Previous ArticleNext Article >>
Avatar for dpepper

About the Author: dpepper

Latest Articles

Blocking IP or whitelisting IP addresses with UFW

Read Article

CentOS Linux 7 end of life migrations

Read Article

Use ChatGPT to diagnose and resolve server issues

Read Article

What is SDDC VMware?

Read Article

Best authentication practices for email senders

Read Article