Control Panels

How to install zPanel on CentOS 6

It is important that you are installing zPanel on a FRESH install of CentOS 6.x. If you have already installed software, please reinstall the OS before running the zPanel installation program.

 

At the time of writing, zPanel would not install on CentOS 7

 

If you are running the installation in a Cloud environment, it is recommended to create a snapshot of the fresh OS before beginning the installation.

Create a Snapshot

Stop The Instance

Locate the instance you wish to install zPanel on and click “Stop”. Confirm you are on the correct instance when prompted.

Create the Snapshot

Click the Snapshot button.
When prompted enter a title for the snapshot. In this example we used “Fresh Install”
Click [Create Snapshot] After a few moments, the dialog window will disappear and the words “Backing Up” will appear under the Snapshot Status column. Depending on the size of your instance, this process may take a minute to much longer to complete.
Once the snapshot has been created, the words “Backed Up” will appear in the Snapshot Status column.
[createsnapshot4]

Restart the Instance

Click the [Start] button. The word “Starting” will be displayed in the “Status” column.
Once the reboot has completed, “Running” will appear under the Status column.

Install zPanel

Console the instance

Click the [>_Console] button. After a few moments, the Console screen will appear.

Log Into the server

At the login prompt, type “root” and [Enter] Next enter the root password you were provided when the instance was created, followed by [Enter].
**For security, no characters will be displayed on the screen while you enter your password**
Once you have successfully logged in, you will be at the Linux root prompt, which is designated by the ‘#’ symbol.

Update your system

Run the following command:

yum -y update

This process updates all of the software included with your Operating System and may take several minutes to complete.
Once it has finished, it will display the word “Complete!” followed by the root command prompt.

Complete!
[root@cloud01 ~]# _

Download the installation program

Enter the following command.

wget https://raw.github.com/zpanel/installers/master/install/CentOS-6_4/10_1_1.sh

Make the script executable

Before you can run the installation program, you have to allow the program to be executed. To do this, run the following command:

chmod +x 10_1_1.sh

Run the Installation

Start the installation by entering the following command

./10_1_1.sh

Welcome Screen

After the display screen, you will be prompted to continue. Press y [Enter]

Would you like to continue (y/n)? y Enter

Select Timezone Continent

Select the continent or geographical location you would like to use for the server’s timezone by entering the corresponding number, then press Enter.

#? 2 Enter

Select Country

Select the country by entering the corresponding number, then press [Enter]

#? 49 Enter

Select Timezone

Enter the desired timezone, then press Enter.

#? 11 Enter

Confirm Timezone

The program will display the options you have chosen. If these are correct, type 1 Enter. If you need to make changes, type 2 Enter to re-enter the values.

You can make this change permanent for yourself by appending the line
TZ=’America/Chicago’; export TZ

Press Enter

zPanel Domain

If you have not purchased a dedicated domain for your zPanel installtion, you can use a subdomain of your website domain. We recommend zpanel.domain.com, replacing “domain.com” with your actual domain.

FQDN  for zpanel: zpanel.domain.com

Public IP

Verify the software is displaying the public IP for your server. If not, manually enter it here and press [Enter]

Enter the public (external) server IP: 123.456.78.9  Enter

Install required packages

Now that the configuration has been completed, continue the installation by pressing y [Enter] Zpanel is now ready to perform the installation. Are you ready (y/n) y Enter

The installation program will install all of the software required for basic hosting and email (Apache, MySQL, PHP, Postfix, etc.)

Note Password and usernames

After the installation program has installed all of the required software, it will display important passwords and usernames it randomly chose during the installation process.
** if you lose these values, you can always get them from your server by running the following command:

cat /root/passwords.txt

Once it has completed, a restart is required.

Restart your server now to complete the install (y/n)? y Enter

By admin on June 30, 2015 | Control Panels | A comment?

How to setup WHM using custom nameservers

This article will walk you through the steps of setting up WHM for the very first time using custom nameservers (ns1.yourdomain.com and ns2.yourdomain.com) for your DNS Management.
 

Read This First

Before setting up WHM to use custom nameserver (nameservers assigned to your domain), you will first need to create them with your registrar. If you are unfamiliar with this process, or unfamiliar with hosting your own DNS server, it is strongly suggested to use Codero’s nameservers (ns1.codero.com and ns2.codero.com) and follow the steps outlined in these articles instead:

How to setup WHM with Codero nameservers
How to edit DNS in ServerPortal.com

 

Log In

Log into WHM. You will need to use https://IP.ADD.RE.SS:2087 to access the login screen.

Username: root
Password: The root password provided with your server. This is also the ssh root password.

whm-1

 

Step 1: End User Agreement

Read the End User License Agreement then click I Agree/Go to Step 2

whm-2

 

Step 2: Setup Networking

Contact Information

Enter your administrator’s email address. This is the address email sent from your server will be delivered to. It is important that is a working and monitored email address.

whm-2a

 

Hostname

Select a Fully Qualified Domain Name (FQDN) for your server. This is usually a subdomain of your primary business domain name that defines the server. Some good examples would be server.mydomain.com, mail.mydomain.com, or webserver.mydomain.com.

It is not recommended to use an actual working domain name for your hostname, such as www.mydomain.com or simply domain.com
Make a note of the hostname you select and use this for the reverse DNS on your server’s primary IP address.
http://www.howtowebhost.com/how-to-set-reverse-dns-rdns/

whm-2b

 

Resolvers

Resolver IPs are used to convert domain names to IP addresses. Using the wrong Resolver IPs can drastically reduce the performance of your server.

Primary Resolver: 69.64.66.11
Secondary Resolver: 69.64.66.10

whm-2c

 

Main Network/Ethernet Device

To best determine the device to use, log into your server with ssh, then run the ifconfig command. Locate the line with your primary IP address. The line directly above it will show the correct device.

whm-2da

Example:

# ifconfig
eth1      Link encap:Ethernet  HWaddr 00:12:34:56:78:9A  
          inet addr:64.150.180.1  Bcast:64.255.255.255  Mask:255.0.0.0

In this example the correct device is eth1. To change the default, you will need to select Other from the dropdown, then manually type in the correct device name.

whm-2db

After you have completed all of these steps, click the Save & Go to Step 3 button.

 

Step 3: Setup IP Addresses

Adding additional IPs is beyond the scope of this article. Click Skip This Step and Use Default Settings.

 

Step 4: Nameservers

Since we will be using custom nameservers, you’ll need to setup the DNS service. If you have not already setup custom nameservers using your server’s IP address, you should do so before proceeding. Otherwise we recommend using Codero’s nameservers and following the steps outline here instead: How to setup WHM with Codero nameservers

You can find additional information about creating custom nameservers here: cPanel – How to Register Private Nameservers

 

Nameserver Configuration

Select BIND
Bind should be automatically selected by default.

whmns01

 

Add A Entries for Nameservers & Hostname

Check [X] Add “A Entries” for all Nameservers. These provide the “glue” that bind your nameservers to your IP and allow them to work. Without these, your DNS will not function correctly.

You will need to enter the actual IP addresses you used when setting up the nameservers with your registrar.

Note that is it perfectly acceptable to use the same IP for both nameservers.

Check [X] Add “A Entries” for Hostname. (Optional)

whmns3

 
After you have completed all of these steps, click the Save & Go to Step 5 button.

 

Step 5: Services

FTP

Select Pure-FTPD

(*) Pure-FTPD

Mail Configuration
Select Dovecot and check “Convert Mailbox Format

(*) Dovecot
[X] Convert mailbox settings file format to new mai server's format during migration

 

Configure cPHulk

cPHulk is great for protecting your server against brute force attacks, however it can also block legitimate users from accessing their accounts, including the root user.

Use the values shown in the image below to prevent “accidental” lock outs from blocking these users for extended periods of time.

whm-2fc

 

Install common set of Perl Modules

It is generally not necessary to install the Perl Modules. Leave this unchecked.

[ ] Provide modules to /usr/bin/perl formerly provided by checkpermodules

 
After you have completed all of these steps, click the Save and Go to Step 6 button.

 

Step 6: Quotas

Select (*) Use files system quotas then click Finish Setup Wizard

 

Feature Showcase

Use all the defaults on this page. Scroll to the bottom of the page and click By admin on November 20, 2014 | Control Panels, WHM / cPanel | A comment?

Evault Backup Setup with Plesk

This article is designed to help you setup an unmanaged eVault backup for your Codero Server. While this artice is intended for dedicated server users with a Plesk control panel, the principles can be applied to users of other control panels no control panel.

 

Requirements:

Dedicated Server with root ssh access
eVault Backup account
Basic understanding of the Linux “nano” editor. See http://www.howtowebhost.com/how-to-use-the-nano-command-line-editor-in-linux/

The setup is divided into 3 sections. Plesk Setup, Server Setup, and Evault Setup. It is strongly recommended to perform these in the order they are written.

 

Plesk Setup

Backup Manager

Log into your Plesk control panel as administrator, then click Tools & Settings, then Backup Manager

16:15:16

 

Scheduled Backup Settings

From the Backup Manager screen, click the Scheduled Backup Settings icon.

16:18:53

 

Configure Backup Criteria

On the Scheduled Backup Settings page, complete the following:

Schedule

Check the “Activate this backup task” checkbox.
Set the Backup Period to “Daily”
Set a starting time for the backup.

The start time must be entered in 24 hour time.
Example: Enter “00” for the hour if you want 12:00 am
Enter “13” for the hour if you want 1:00 pm.

Backup Settings

Leave “Add prefix to the backup name” blank
Leave “Create multivolume backup” unchecked.
At “Store backup in”, select “Server repository”
For “Maximum number of backups in repository” enter “7”
Enter your email address at “If any errors were encountered during the execution of this scheduled backup task, send notification e-mail to”

Backup content

At “Back up” select “Server Configuration”

You only need to select “Server Configuration” because eVault will be backing up your content. Failure to select “Server configuration” may quickly result in excessive eVault usages and unwanted overage fees.

Leave “Suspend domains until backup task is completed” unchecked.

Finally, click OK to save your settings and return to the Backup Manager screen.

16:41:24

Create Intial Backup

To create the inital backup, click the “Back Up” icon on the Backup Manager screen.

During our test, it took less than 2 minutes to create the intial backup.

backup manager-backup icon

 

Server Setup

This section shows you how to setup your server to create unique backup files for each MySQL database. This will allow you to restore any database without requiring you to restore all databases at the same time.

Login using SSH

Log into your server as user “root” with your root password.

 

Create required folders

mkdir -pv /usr/local/codero/dumps

 

Create Database Backup Script

This script uses the “mysqldump” command to create unique backup files of each MySQL database on the server.

nano /usr/local/bin/dbdump
#!/bin/bash
for db in $(mysql -uadmin -p`cat /etc/psa/.psa.shadow` -e 'show databases' -s --skip-column-names); do
  echo -n "dumping $db..."
  mysqldump -uadmin -p`cat /etc/psa/.psa.shadow` $db > "/usr/local/codero/dumps/$db.sql"
  echo "[done]"
done

 

Create Cron to run backup script

The cron script below is set to run daily at 12:05 AM.

nano /etc/cron.d/dbdump
#Cronjob to dump databases nightly for evault
05     0      *       *       *       /usr/local/bin/dbdump 2&>1 /dev/null

 

Set the above created scripts as executable

chmod +x /usr/local/bin/dbdump
chmod +x /etc/cron.d/dbdump

 

Run the script to create the database backups

/usr/local/bin/dbdump

 

Setup eVault

Log In

Log into the eVault control panel http://webcc.codero.com/Login/login.aspx with the username and password you were provided.

2010-03-27_1238

 

Configure Agent

Find the unconfigured Agen, then click Configure This Agent

2010-03-27_1433

 

Name the Agent

Give the Agent a unique name. Typically we recommend naming the agent with the DS# of the server being backed up, then click Next >

2010-03-27_1436

 

Set Backup Source

Select “Local System” from the drop down box and click Next >

2010-03-27_1439

Recommended Folders

For Plesk control panels, we recommend the following folders:
/etc (Server configuration files)
/root (Critical logs, ssh keys, etc.)
/usr/local/psa/var/certificates (SSL Certificate Files)
/usr/local/codero/dumps (Database Files)
/var/qmail (Email)
/var/lib/psa/dumps (Plesk configuration backups)
/var/www/vhosts (Website files)

** EXCLUDE THE FOLLOWING FOLDERS **
/root/.autoinstaller
/root/parallels

 
 

By admin on October 27, 2014 | Backup, Plesk | A comment?

How to apply an SSL Certificate in Plesk

This article applies to Plesk users that used the same server to create a CSR (Certficate Signing Request) and have purchased an SSL Certificate from a Trusted Provider. You should have a series of text files from your certificate provider.

If you have not yet created a CSR, you should read this article first:
http://www.howtowebhost.com/how-to-create-a-csr-in-plesk/

 

Open Advanced Domain Options

Open the Advanced Options for the domain you’re going to add SSL to.

How to view Advanced Domain Options

Advanced Domain Options are used to set the following settings:

Website Scripting and Security, PHP Settings, Web Server Settings, Applications, File Manager, Web Statistics, DNS Settings, Secure Your Sites (SSL), Password protecting directories, Website copying, Viewing Logs and creating web users along with information about how to move a site from development to productions and how to close a site from production to a development environment.

To access a Domain’s Advanced Settings:

From the Home screen, click “Domains” then click the link for the Domain name.

plesk-domains-domainname

 

Click the “Websites & Domains” tab, then scroll down the page until you locate the correct Domain.  (Unless you have added additional domains or subdomains to the subscription, this will be the only domain listed.)

At the bottom of the containing box, click the small arrow at the bottom center to display the advanced domain options.

advanced-settings-1

 

advanced-settings-2

 

Click “Secure Your Sites”

By admin on July 3, 2014 | Plesk | A comment?

How to create a CSR (Certificate Signing Request) in Plesk

Adding an SSL certificate in Plesk is a multi-step process. Understanding what SSL is and how it works will make this process much easier.

Understanding SSL

What is SSL

Secure Socket Layer (SSL) Certificates are used to encrypt all data sent from your server to the client, and from the client back to the server. The use of SSL is strongly recommended when allowing a user to enter sensitive information such as passwords or credit card data into a form. Without the use of SSL, the data is transmitted over the Internet in a plain text format that a malicious users could read without issue. By using SSL, the data is encrypted, rendering the data virtually impossible to read.

Once applied to a website, the encryption is used when accessing the website using https://domain.com instead of the standard, unencrypted http://domain.com. You might notice the ‘s’ in ‘https’ stands for “secure”.

 

How SSL Works

SSL works by encrypting the information from the server to the user by utilizing encryption keys. A private key on the server is used to encrypt the data and a public key that is provided in the SSL certificate is used to un-encrypt the data. Conversely, information sent by the user is encrypted using the certificate and that information can only be un-encrypted by the private key on the server.

Because only the public key can un-encrypt the information encrypted by the private key and only the private key can un-encrypt data sent by the public key, it is extremely important that they remain in pairs. You cannot mix public an private keys from different certificates.

 

SSL Certificate Descriptions

There are a maximum of 4 certificates, depending on your situation.

CSR: Certificate Signing Request

This certificate is used to request an SSL certificate from a trusted provider such as Comodo, Verisign, Godaddy, etc. When ordering an SSL Certificate from a Trusted Provider, you must copy and paste the entire certificate, including “—–BEGIN CERTIFICATE REQUEST—–” and “—–END CERTIFICATE REQUEST—–”

Example CSR
—–BEGIN CERTIFICATE REQUEST—–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—–END CERTIFICATE REQUEST—–

 

Private Key

The Private Key is the glue successfully installing an SSL Certificate on your website. This certificate is used to create the CSR, which in turn, is used to create the Public Key. The Public and Private keys then work together to create a secure connection between the server and the user’s browser. The Private Key and Public Key must match in order for the connection to work correctly.

 

SSL or Public Key

This key might also be referred to as the SSL Certificate. This is the certificate you receive back from a Trusted Provider after submitting the CSR. The Public keys works with the Private Key to encode the information transmitted between the server and the user’s browser.

 

CA (Certificate Authrority)

The CA Certificate is provided by a Trusted Provider when purchasing an SSL Certificate. This certificate lets the browser know the SSL certificate was issued by a trusted provider and prevents the browser from displaying warning messages.

CA Certificate files are often provided in pairs, so do not be surprised if you get 2 files. Both of these must be pasted into the CA Certificate file in order to work correctly

 

Overview

The basic steps to installing an SSL certificate include:
1. Create a CSR (Certificate Signing Request)
2. Submit the CSR to a Trusted Provider (also known as a Certificate Authority) and purchase the SSL.
3. Upload the SSL files to the server.
4. Apply the new certificate to your domain.

 

Create the CSR

Open Advanced Domain Options

Open the Advanced Options for the domain you’re going to add SSL to.

How to view Advanced Domain Options

Advanced Domain Options are used to set the following settings:

Website Scripting and Security, PHP Settings, Web Server Settings, Applications, File Manager, Web Statistics, DNS Settings, Secure Your Sites (SSL), Password protecting directories, Website copying, Viewing Logs and creating web users along with information about how to move a site from development to productions and how to close a site from production to a development environment.

To access a Domain’s Advanced Settings:

From the Home screen, click “Domains” then click the link for the Domain name.

plesk-domains-domainname

 

Click the “Websites & Domains” tab, then scroll down the page until you locate the correct Domain.  (Unless you have added additional domains or subdomains to the subscription, this will be the only domain listed.)

At the bottom of the containing box, click the small arrow at the bottom center to display the advanced domain options.

advanced-settings-1

 

advanced-settings-2

 

Click “Secure Your Sites”

Inside the Advanced Options, click the “Secure Your Sites”

secure-your-site

 

SSL Certificates

On the SSL Certificates page, under the Tools heading, click “Add SSL Certificate”

ssl-certificates-pg

 

Add SSL Certificate

Under Add SSL Certificate, you’ll need to fill out the CSR Request form.

Certificate Name: Enter a unique name for the certificate.  You can use any name you wish as long as it is unique.  I recommend using the domain name and the current year.

Country: Select the country the business is based in from the dropdown box.

State or province: Enter the state or province of the business

Location (city): Enter the city the business is located in.

Organization name (company): Enter your business name.

Organization department or division name: This setting is optional.  If you wish, you may enter a department.  Examples might include IT, Marketing or Sales

Domain name: Enter the domain name.  If you are applying the certificate to a specific subdomain (sales.domain.com or blog.domain.com), make sure you enter the exact subdomain.

Email: Enter your contact email address.

Once you have filled in the form, click Request.

csr-form

Access Your CSR

After your CSR is generated you will be returned to the SSL Certificates page with a notice saying the new SSL certificate was added.

To view the CSR, scroll down the page under Certificates and click on the certificate name you created in the previous step.

You’ll notice to the right of the certficate, there are some small icons under the letters R, K, C and A. These represent the certificate files that have been created. R=Certificate Signing Request, K=Private Key, C=Public Key and A=Signing Authority. The icons that are displayed in full color represent the files that have been created and the icons that appear greyed out represent the missing certificates.

csr-complete

 

“Change Properties of SSL Certificate” Page

On the “Change Properties of SSL Certificate” page, scroll down the page until you see “CSR” .  The text displayed starting with “- – – – – BEGIN CERTIFICATE REQUEST- – – – -” through “- – – – -END CERTIFICATE REQUEST- – – – -” is the text you will provide to a 3rd party certificate provider.  Copy the entire text, including the Begin Certificate and End Certificate lines.

-----BEGIN CERTIFICATE REQUEST-----
 MIIC1DCCAbwCAQAwgY4xCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJUWDEPMA0GA1UE
 ThIsIsAfAkeCeRtIfIcAte+dOnOtUsEtHiStExT/ThIsIsAfAkeCeRtIfIcAte+d
 LmNvZGVyb3RyYWluaW5nLmluZm8xJjAkBgkqhkiG9w0BCQEWF2NvZHlAY29kZXJv
 ThIsIsAfAkeCeRtIfIcAte+dOnOtUsEtHiStExT/ThIsIsAfAkeCeRtIfIcAte+d
 Ij1egAZp380U8gcUU99DQqTjrXOtc7PBEOg4jdIrpoII/K5SoaaJ7oyQH5TH4rDM
 ThIsIsAfAkeCeRtIfIcAte+dOnOtUsEtHiStExT/ThIsIsAfAkeCeRtIfIcAte+d
 bNSkZVi7zlv1Hmn3Gxo73ik64WwmWlNeylAFlmX15F5pT7sjXLWfynukBCh4fscF
 ThIsIsAfAkeCeRtIfIcAte+dOnOtUsEtHiStExT/ThIsIsAfAkeCeRtIfIcAte+d
 Aktmq2mSKWzlh1f0OVLYgjbf2SdqcQgDIf81D7U34q7tmL72bUdBbrjJiE2+9pa4
 ThIsIsAfAkeCeRtIfIcAte+dOnOtUsEtHiStExT/ThIsIsAfAkeCeRtIfIcAte+d
 fmLhurzt+e4m0fgl4gh8z/YjcmZaX9THQkHJxp0gd0A1xkm0SkvJ38QHwkuNpDBp
 Yx/CVhzfIzSi3yJuCwIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAKxFgaWdqiws
 ThIsIsAfAkeCeRtIfIcAte+dOnOtUsEtHiStExT/ThIsIsAfAkeCeRtIfIcAte+d
 Gf4iV0WKen2Z9Ssu3nhESf/pt9WSZWsB6b0R8ZGROkDu1WZ60wgN1OvhQaSARqVX
 ThIsIsAfAkeCeRtIfIcAte+dOnOtUsEtHiStExT/ThIsIsAfAkeCeRtIfIcAte+d
 lUpupKEK5Q4=
 -----END CERTIFICATE REQUEST-----

 

 

By admin on June 26, 2014 | Plesk | A comment?

How to View Advanced Domain Options in Plesk

Advanced Domain Options are used to set the following settings:

Website Scripting and Security, PHP Settings, Web Server Settings, Applications, File Manager, Web Statistics, DNS Settings, Secure Your Sites (SSL), Password protecting directories, Website copying, Viewing Logs and creating web users along with information about how to move a site from development to productions and how to close a site from production to a development environment.

To access a Domain’s Advanced Settings:

From the Home screen, click “Domains” then click the link for the Domain name.

plesk-domains-domainname

 

Click the “Websites & Domains” tab, then scroll down the page until you locate the correct Domain.  (Unless you have added additional domains or subdomains to the subscription, this will be the only domain listed.)

At the bottom of the containing box, click the small arrow at the bottom center to display the advanced domain options.

advanced-settings-1

 

advanced-settings-2

By admin on June 7, 2014 | Plesk | A comment?

How to setup WHM with Codero Nameservers

This article will walk you through the steps of setting up WHM for the very first time using Codero’s nameservers (ns1.codero.com and ns2.codero.com) for your DNS Management.

 

Log In

Log into WHM.  You will need to use https://IP.ADD.RE.SS:2087 to access the login screen.

Username: root
Password: The root password provided with your server.  This is also the ssh root password.

whm-1

 

Step 1: End User Agreement

Read the End User License Agreement then click I Agree/Go to Step 2

whm-2

 

Step 2: Setup Networking

Contact Information

Enter your administrator’s email address. This is the address email sent from your server will be delivered to. It is important that is a working and monitored email address.

whm-2a

 

Hostname

Select a Fully Qualified Domain Name (FQDN) for your server. This is usually a subdomain of your primary business domain name that defines the server. Some good examples would be server.mydomain.com, mail.mydomain.com, or webserver.mydomain.com.

It is not recommended to use an actual working domain name for your hostname, such as www.mydomain.com or simply domain.com
Make a note of the hostname you select and use this for the reverse DNS on your server’s primary IP address.
http://www.howtowebhost.com/how-to-set-reverse-dns-rdns/

whm-2b

 

Resolvers

Resolver IPs are used to convert domain names to IP addresses. Using the wrong Resolver IPs can drastically reduce the performance of your server.

Primary Resolver: 69.64.66.11
Secondary Resolver: 69.64.66.10

whm-2c

 

Main Network/Ethernet Device

To best determine the device to use, log into your server with ssh, then run the ifconfig command. Locate the line with your primary IP address. The line directly above it will show the correct device.

whm-2da

Example:

# ifconfig
eth1      Link encap:Ethernet  HWaddr 00:12:34:56:78:9A  
          inet addr:64.150.180.1  Bcast:64.255.255.255  Mask:255.0.0.0

In this example the correct device is eth1. To change the default, you will need to select Other from the dropdown, then manually type in the correct device name.

whm-2db

After you have completed all of these steps, click the Save & Go to Step 3 button.

 

Step 3: Setup IP Addresses

Adding additional IPs is beyond the scope of this article. Click Skip This Step and Use Default Settings.

 

Step 4: Nameservers

Since we will be using the Codero nameservers, ns1.codero.com and ns2.codero.com, int the Nameserver Configuration window, select (*) Disabled, then scroll to the bottom of the page and click .

whm-2e

 

Step 5: Services

FTP
Select Pure-FTPD

(*) Pure-FTPD

Mail Configuration
Select Dovecot and check “Convert Mailbox Format

(*) Dovecot
[X] Convert mailbox settings file format to new mai server's format during migration

 
Configure cPHulk

cPHulk is great for protecting your server against brute force attacks, however it can also block legitimate users from accessing their accounts, including the root user.

Use the values shown in the image below to prevent “accidental” lock outs from blocking these users for extended periods of time.

whm-2fc

 
Install common set of Perl Modules
It is generally not necessary to install the Perl Modules. Leave this unchecked.

[ ] Provide modules to /usr/bin/perl formerly provided by checkpermodules

 
After you have completed all of these steps, click the Save and Go to Step 6 button.

 

Step 6: Quotas

Select (*) Use files system quotas then click Finish Setup Wizard

whm-2fc

 

Feature Showcase

Use all the defaults on this page. Scroll to the bottom of the page and click By admin on June 6, 2014 | Control Panels, WHM / cPanel | A comment?