Difference between revisions of "XMission Control Panel/Server Tab/Recommended Installs"
From XMission Wiki
(Created page with "=Recommended Installs for your Unmanaged Cloud Server= ==Fail2Ban== Fail2Ban is a phython written access prevention tool designed to stop connections to your server after a s...") |
|||
(13 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
=Recommended Installs for your Unmanaged Cloud Server= | =Recommended Installs for your Unmanaged Cloud Server= | ||
− | ==Fail2Ban== | + | =='''FTP (vsftpd)'''== |
− | Fail2Ban is a | + | |
+ | A very important tool for your server will be FTP (File Transfer Protocol). FTP will allow you and your users to upload and download files to and from your server using FTP programs such as Filezilla (see [https://wiki.xmission.com/XMission_Control_Panel/How_to_FTP_to_your_server How to FTP to your server] | ||
+ | |||
+ | ===Install=== | ||
+ | '''Ubuntu:''' | ||
+ | sudo apt-get update | ||
+ | sudo apt-get install vsftpd | ||
+ | |||
+ | '''CentOS''' | ||
+ | sudo yum update | ||
+ | sudo yum install vsftpd | ||
+ | |||
+ | ===Configure=== | ||
+ | vim /etc/vsftpd.conf | ||
+ | |||
+ | =='''Fail2Ban'''== | ||
+ | Fail2Ban is a python written access prevention tool designed to stop connections to your server after a specified amount of connection attempts. Using iptables, it stops unauthorized SSH, FTP, etc.. attempts from brute-forcing your server. | ||
===Installation=== | ===Installation=== | ||
+ | '''Ubuntu:''' | ||
sudo apt-get update | sudo apt-get update | ||
sudo apt-get install fail2ban | sudo apt-get install fail2ban | ||
− | + | ||
+ | '''CentOS''' | ||
sudo yum update | sudo yum update | ||
sudo yum install fail2ban | sudo yum install fail2ban | ||
Line 16: | Line 34: | ||
* [https://help.ubuntu.com/community/Fail2ban help.ubuntu.com is a great resource on how to configure your fail2ban conf file. | * [https://help.ubuntu.com/community/Fail2ban help.ubuntu.com is a great resource on how to configure your fail2ban conf file. | ||
+ | |||
+ | =='''Plesk'''== | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | Download the autoinstaller from their website: | ||
+ | wget http://autoinstall.plesk.com/plesk-installer | ||
+ | |||
+ | Add execute permissions to the autoinstaller: | ||
+ | |||
+ | chmod +x plesk-installer | ||
+ | |||
+ | Launch the autoinstaller: | ||
+ | |||
+ | ./plesk-installer | ||
+ | |||
+ | |||
+ | For more information, please refer to [http://download1.parallels.com/Plesk/PP12/12.0/Doc/en-US/online/plesk-installation-upgrade-migration-guide/ Plesk Installation guide]. | ||
+ | |||
+ | [[Category: Control Panel]] |
Latest revision as of 15:35, 25 September 2018
Contents
Recommended Installs for your Unmanaged Cloud Server
FTP (vsftpd)
A very important tool for your server will be FTP (File Transfer Protocol). FTP will allow you and your users to upload and download files to and from your server using FTP programs such as Filezilla (see How to FTP to your server
Install
Ubuntu:
sudo apt-get update sudo apt-get install vsftpd
CentOS
sudo yum update sudo yum install vsftpd
Configure
vim /etc/vsftpd.conf
Fail2Ban
Fail2Ban is a python written access prevention tool designed to stop connections to your server after a specified amount of connection attempts. Using iptables, it stops unauthorized SSH, FTP, etc.. attempts from brute-forcing your server.
Installation
Ubuntu:
sudo apt-get update sudo apt-get install fail2ban
CentOS
sudo yum update sudo yum install fail2ban
Configuration
cd /etc/fail2ban sudo vim jail.conf
- [https://help.ubuntu.com/community/Fail2ban help.ubuntu.com is a great resource on how to configure your fail2ban conf file.
Plesk
Download the autoinstaller from their website:
wget http://autoinstall.plesk.com/plesk-installer
Add execute permissions to the autoinstaller:
chmod +x plesk-installer
Launch the autoinstaller:
./plesk-installer
For more information, please refer to Plesk Installation guide.