{"id":558,"date":"2021-07-23T12:32:51","date_gmt":"2021-07-23T12:32:51","guid":{"rendered":"https:\/\/ssdsunucum.com\/blog\/how-to-enable-ftp-passive-mode\/"},"modified":"2021-07-23T12:32:51","modified_gmt":"2021-07-23T12:32:51","slug":"how-to-enable-ftp-passive-mode","status":"publish","type":"post","link":"https:\/\/ssdsunucum.com\/blog\/how-to-enable-ftp-passive-mode\/","title":{"rendered":"How to Enable FTP Passive Mode"},"content":{"rendered":"<\/p>\n<div class=\"col-md-9\">\n<div class=\"flex-column flex-md-row article-header\"><\/div>\n<hr>\n<h2 id=\"overview\">Overview<\/h2>\n<p>This document explains how to use the active or passive mode to connect to a File Transfer Protocol (FTP) server.<\/p>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<p>In cPanel &#038; WHM version 60 and later, the system enables passive ports <code>49152<\/code> through <code>65534<\/code> for Pure-FTPd servers and ProFTPD servers by default. If you use the CSF firewall plugin, the system <strong>also<\/strong> adds passive port ranges to your server\u2019s firewall by default.<\/p>\n<p>If you use the <code>nftables<\/code>, <code>firewalld<\/code>, or <code>iptables<\/code> applications for your firewall, you <strong>must<\/strong> enable firewall settings for the passive ports manually. For more information about firewalls, read our How to Configure Your Firewall for cPanel &#038; WHM Services documentation.<\/p>\n<\/p><\/div>\n<\/div>\n<h2 id=\"active-and-passive-mode-sessions\">Active and passive mode sessions<\/h2>\n<p>FTP uses a data port and a command port to transfer information between a client and a server. During a typical active mode session, the command port uses port <code>21<\/code> and the data port uses port <code>20<\/code>. When you use a passive mode session, however, the data port does not always use port <code>20<\/code>.<\/p>\n<h3 id=\"active\">Active<\/h3>\n<p>In active mode, the FTP server responds to the connection attempt and returns a connection request from a different port to the FTP client. Network Address Translation (NAT) configurations block this connection request.<\/p>\n<figure>\n    <img src=\"https:\/\/ssdsunucum.com\/blog\/wp-content\/uploads\/2021\/07\/activeftp.png\" alt=\"Active FTP\" title=\"activeftp\"><figcaption>\n<p><em>Active FTP<\/em><\/p>\n<\/figcaption><\/figure>\n<figure>\n    <img src=\"https:\/\/ssdsunucum.com\/blog\/wp-content\/uploads\/2021\/07\/activeftpfirewall.png\" alt=\"Active FTP (with firewall)\" title=\"activeftpfirewall\"><figcaption>\n<p><em>Active FTP (with firewall)<\/em><\/p>\n<\/figcaption><\/figure>\n<p>The firewall blocks the server\u2019s attempt to communicate with the client because the server uses a different port than the first connection.<\/p>\n<h3 id=\"passive\">Passive<\/h3>\n<p>In passive mode, the FTP client initiates <strong>both<\/strong> connection attempts. NAT configurations <strong>do not<\/strong> block this connection request.<\/p>\n<figure>\n    <img src=\"https:\/\/ssdsunucum.com\/blog\/wp-content\/uploads\/2021\/07\/passiveftp.png\" alt=\"Passive FTP (with firewall)\" title=\"passiveftp\"><figcaption>\n<p><em>Passive FTP (with firewall)<\/em><\/p>\n<\/figcaption><\/figure>\n<p>The firewall does <strong>not<\/strong> block the server\u2019s attempt to communicate with the client because the client initiated the communication both times.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n        If FTP users exist on the private network side of a NAT configuration, you <strong>must<\/strong> enable FTP\u2019s passive mode, and open the passive port range in your FTP server\u2019s configuration file. You may also need to open the passive port range on your firewall.\n    <\/div>\n<\/div>\n<h2 id=\"configure-ftp-servers\">Configure FTP servers<\/h2>\n<p>The sections below explain how to edit the default configurations for a Pure-FTPd server and a ProFTPD server.<\/p>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n<ul>\n<li>A local file contains your desired settings which <strong>overwrite<\/strong> any default settings from the main file.<\/li>\n<li>The system enables passive ports <code>49152<\/code> through <code>65534<\/code> for Pure-FTPd servers and ProFTPD servers by default.<\/li>\n<\/ul><\/div>\n<\/div>\n<h3 id=\"pure-ftpd-servers\">Pure-FTPd servers<\/h3>\n<p>To edit the FTP configuration for a PureFTP server, perform the following steps:<\/p>\n<ol>\n<li>Log in to the server as the <code>root<\/code> user via SSH.<\/li>\n<li>Open the <code>\/var\/cpanel\/conf\/pureftpd\/local<\/code> file, if it already exists, with a text editor. If it does not already exist, create the <code>\/var\/cpanel\/conf\/pureftpd\/local<\/code> file.<\/li>\n<li>Add the desired changes to the file. If your FTP server exists behind a NAT configuration, set the <code>ForcePassiveIP<\/code> option to the FTP server\u2019s public IP address, as in the following example:\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">ForcePassiveIP: <span style=\"color:#ae81ff\">203<\/span>.0.113.0<\/code><\/pre>\n<\/div>\n<p>If your server does not exist in a NAT configuration, set the <code>ForcePassiveIP<\/code> option to the following entry:<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">ForcePassiveIP: ~<\/code><\/pre>\n<\/div>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n        Only one <code>ForcePassiveIP<\/code> entry can exist in a configuration file.\n    <\/div>\n<\/div>\n<\/li>\n<li>If you want to change your server\u2019s default passive port range, run the following commands:\n<div class=\"highlight\">\n<div style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\">\n<table style=\"border-spacing:0;padding:0;margin:0;border:0;width:auto;overflow:auto;display:block;\">\n<tr>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\"><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">1\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">2\n<\/span><\/code><\/pre>\n<\/td>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;;width:100%\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\">echo \"PassivePortRange: 49152 65534\" &gt;&gt; \/var\/cpanel\/conf\/pureftpd\/local\n\/usr\/local\/cpanel\/scripts\/setupftpserver pure-ftpd --force <\/code><\/pre>\n<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<\/div>\n<\/li>\n<li>Configure your server to allow the passive port range to pass through the firewall. To do this, follow the directions in the Configure the firewall section below.<\/li>\n<li>Restart the PureFTP service with the following command:\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">\/usr\/local\/cpanel\/scripts\/setupftpserver pure-ftpd --force<\/code><\/pre>\n<\/div>\n<\/li>\n<\/ol>\n<h3 id=\"proftpd-servers\">ProFTPD servers<\/h3>\n<p>To edit the FTP configuration for a ProFTPD server, perform the following steps:<\/p>\n<ol>\n<li>Log in to the server as the <code>root<\/code> user via SSH.<\/li>\n<li>Open the <code>\/var\/cpanel\/conf\/proftpd\/local<\/code> file, if it already exists, with a text editor. If it does not already exist, create the <code>\/var\/cpanel\/conf\/proftpd\/local<\/code> file.<\/li>\n<li>Add the desired changes to the file. If your FTP server exists behind a NAT configuration, set the <code>MasqueradeAddress<\/code> option to the FTP server\u2019s public IP address, as in the following example:\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">MasqueradeAddress: <span style=\"color:#ae81ff\">203<\/span>.0.113.0<\/code><\/pre>\n<\/div>\n<p>If your server <strong>does not<\/strong> exist in a NAT configuration, set the <code>MasqueradeAddress<\/code> option to the following entry:<\/p>\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">MasqueradeAddress: ~<\/code><\/pre>\n<\/div>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n        Only <strong>one<\/strong> <code>MasqueradeAddress<\/code> entry can exist in a configuration file.\n    <\/div>\n<\/div>\n<\/li>\n<li>If you want to change your server\u2019s default passive port range, run the following commands:\n<div class=\"highlight\">\n<div style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\">\n<table style=\"border-spacing:0;padding:0;margin:0;border:0;width:auto;overflow:auto;display:block;\">\n<tr>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\"><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">1\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">2\n<\/span><\/code><\/pre>\n<\/td>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;;width:100%\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\">echo \"PassivePorts: 49152 65534\" &gt;&gt; \/var\/cpanel\/conf\/proftpd\/local\n\/usr\/local\/cpanel\/scripts\/setupftpserver proftpd --force <\/code><\/pre>\n<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<\/div>\n<\/li>\n<li>Configure your server to allow the passive port range to pass through the firewall. To do this, follow the directions in the Configure the firewall section below.<\/li>\n<li>Restart the ProFTP service with the following command:\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">\/usr\/local\/cpanel\/scripts\/setupftpserver proftpd --force<\/code><\/pre>\n<\/div>\n<\/li>\n<\/ol>\n<h3 id=\"configure-the-firewall\">Configure the firewall<\/h3>\n<div class=\"callout callout-info\">\n<div class=\"callout-heading\">Note:<\/div>\n<div class=\"callout-content\">\n        The system enables passive ports <code>49152<\/code> through <code>65534<\/code> for Pure-FTPd servers and ProFTPD servers by default.\n    <\/div>\n<\/div>\n<p>You may need to add your FTP server\u2019s passive port range to the firewall manually.<\/p>\n<h3 id=\"configserver-security-firewall\">ConfigServer Security &#038; Firewall<\/h3>\n<p>If you use the ConfigServer Security &#038; Firewall (CSF) plugin to manage your server\u2019s firewall, open the <code>\/etc\/csf\/csf.conf<\/code> file, and confirm that the passive port range exists at the end of the <code>TCP_IN<\/code> line. The system adds your FTP server\u2019s passive port range to the firewall by default. For more information about how to install and use CSF, visit the CSF website.<\/p>\n<h3 id=\"nftables\">nftables<\/h3>\n<p>If you use the <code>nftables<\/code> framework for your CentOS 8, AlmaLinux 8, or CloudLinux 8 server, run the following commands to add the passive port range to your server\u2019s firewall:\n<\/p>\n<div class=\"highlight\">\n<div style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\">\n<table style=\"border-spacing:0;padding:0;margin:0;border:0;width:auto;overflow:auto;display:block;\">\n<tr>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\"><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">1\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">2\n<\/span><\/code><\/pre>\n<\/td>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;;width:100%\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\">nft add rule filter INPUT tcp dport 49152-65534 accept\nnft -s list ruleset | tee \/etc\/sysconfig\/nftables.conf # to save the ruleset post reboot<\/code><\/pre>\n<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<\/div>\n<p>You will find the <code>nftables<\/code> ruleset for your server in the <code>\/etc\/sysconfig\/nftables.conf<\/code> file.<\/p>\n<div class=\"callout callout-danger\">\n<div class=\"callout-heading\">Warning:<\/div>\n<div class=\"callout-content\">\n<p>cPanel &#038; WHM version 92 for CentOS 8 and CloudLinux 8 is <strong>experimental<\/strong> software and we do <strong>not<\/strong> recommend using it in production environments. For more information, read our cPanel &#038; WHM version 92 for CentOS 8 documentation.<\/p>\n<p>Upgrade to a later version of cPanel &#038; WHM to use CentOS 8 and CloudLinux 8 in production environments.<\/p>\n<\/p><\/div>\n<\/div>\n<h3 id=\"firewalld\">firewalld<\/h3>\n<p>If you use the <code>firewalld<\/code> application for your CentOS 7, CloudLinux\u2122 7, or Red Hat\u00ae Enterprise Linux (RHEL) 7 server, run the following commands to add the passive port range to your server\u2019s firewall:\n<\/p>\n<div class=\"highlight\">\n<div style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\">\n<table style=\"border-spacing:0;padding:0;margin:0;border:0;width:auto;overflow:auto;display:block;\">\n<tr>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\"><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">1\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">2\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">3\n<\/span><\/code><\/pre>\n<\/td>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;;width:100%\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\">firewall-cmd --permanent --zone=public --add-service=ftp\nfirewall-cmd --permanent --add-port=49152-65534\/tcp\nfirewall-cmd --reload<\/code><\/pre>\n<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<\/div>\n<h3 id=\"iptables\">iptables<\/h3>\n<div class=\"callout callout-warning\">\n<div class=\"callout-heading\">Important:<\/div>\n<div class=\"callout-content\">\n<p>Red Hat Enterprise Linux 8 deprecated the <code>iptables<\/code> utility. While cPanel, L.L.C. does not support this version of RHEL, this change affects all cPanel-supported operating systems. We recommend the <code>nftables<\/code> utility for servers that run CentOS 8, AlmaLinux 8, or CloudLinux 8. For servers that run CentOS 7, CloudLinux 7, or RHEL 7, we recommend that you use the <code>firewalld<\/code> utility.<\/p>\n<div class=\"callout callout-danger\">\n<div class=\"callout-heading\">Warning:<\/div>\n<div class=\"callout-content\">\n<p>cPanel &#038; WHM version 92 for CentOS 8 and CloudLinux 8 is <strong>experimental<\/strong> software and we do <strong>not<\/strong> recommend using it in production environments. For more information, read our cPanel &#038; WHM version 92 for CentOS 8 documentation.<\/p>\n<p>Upgrade to a later version of cPanel &#038; WHM to use CentOS 8 and CloudLinux 8 in production environments.<\/p>\n<\/p><\/div>\n<\/div><\/div>\n<\/div>\n<p>If you use the <code>iptables<\/code> application for your FTP server\u2019s firewall, perform the following steps to add the passive port range to your server\u2019s firewall:<\/p>\n<ol>\n<li>Install the <code>iptables-services<\/code> package if it does not already exist on your server. This package provides the <code>iptables<\/code> and <code>ip6tables<\/code> services, which are not included in the <code>iptables<\/code> application. To install this package, run the following command:\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">yum install iptables-services<\/code><\/pre>\n<\/div>\n<\/li>\n<li>Run the following commands to add the rules to the firewall and save the configuration:\n<div class=\"highlight\">\n<div style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\">\n<table style=\"border-spacing:0;padding:0;margin:0;border:0;width:auto;overflow:auto;display:block;\">\n<tr>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\"><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">1\n<\/span><span style=\"margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f\">2\n<\/span><\/code><\/pre>\n<\/td>\n<td style=\"vertical-align:top;padding:0;margin:0;border:0;;width:100%\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-text\" data-lang=\"text\">iptables -I INPUT -p tcp --dport 49152:65534 -j ACCEPT\nservice iptables save<\/code><\/pre>\n<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n<h2 id=\"solusvm-and-xen\">SolusVM and Xen<\/h2>\n<p>If you use SolusVM and Xen\u00ae on a CloudLinux\u2122 server, you may experience problems with Passive FTP. These problems may resemble a firewall or other connection issue, even when no firewall exists.<\/p>\n<p>To resolve these issues, perform the following steps:<\/p>\n<ol>\n<li>Replace the <code>IPTABLES_MODULES= ip_conntrack_netbios_ns<\/code> line in the <code>\/etc\/sysconfig\/iptables-config<\/code> file on the VPS node with the following line:\n<div class=\"highlight\">\n<pre style=\"color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4\"><code class=\"language-bash\" data-lang=\"bash\">IPTABLES_MODULES<span style=\"color:#f92672\">=<\/span>ipt_REJECT ipt_tos ipt_TOS ipt_LOG ip_conntrack ipt_limit ipt_multiport iptable_filter iptable_mangle ipt_TCPMSS ipt_tcpmss ipt_ttl ipt_length ipt_state iptable_nat ip_nat_ftp ipt_owner ipt_REDIRECT<\/code><\/pre>\n<\/div>\n<\/li>\n<li>Run the <code>service iptables restart<\/code> command to restart the <code>iptables<\/code> service.<\/li>\n<\/ol>\n<h2 id=\"troubleshoot-ftp-passive-mode\">Troubleshoot FTP passive mode<\/h2>\n<p>If your NAT-configured server cannot execute Passive FTP connections to other IP addresses on the server, perform either of the following actions:<\/p>\n<ul>\n<li>In cPanel &#038; WHM version 66 and later, set the <code>ForcePassiveIP<\/code> option with a tilde (<code>~<\/code>) character. The system interprets this character as an undefined directive and prevents automatic changes to the <code>\/etc\/pure-ftpd.conf<\/code> or <code>\/etc\/proftpd.conf<\/code> files.<\/li>\n<li>In cPanel &#038; WHM version 64 and earlier, follow the directions in our Passive FTP and NAT Configuration Temporary Workaround documentation.<\/li>\n<\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview This document explains how to use the active or passive mode to connect to a File Transfer Protocol (FTP) server. Important: In cPanel &#038; WHM version 60 and later, the system enables passive ports 49152 through 65534 for Pure-FTPd servers and ProFTPD servers by default. If you use the CSF firewall plugin, the system &hellip;<\/p>\n","protected":false},"author":1,"featured_media":559,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/558"}],"collection":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/comments?post=558"}],"version-history":[{"count":0,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/posts\/558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media\/559"}],"wp:attachment":[{"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/media?parent=558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/categories?post=558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssdsunucum.com\/blog\/wp-json\/wp\/v2\/tags?post=558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}