Get The Most Affordable Hosting in the World!

Starting at just $1.87/month, Vercaa offers unbeatable pricing for world-class web hosting services.

Fast, reliable, and secure hosting to power your website without breaking the bank. Plus, enjoy a free CDN for faster loading times worldwide!

Get Started Now!

SSH (Secure Shell) is a fundamental tool for server administrators, allowing secure remote access to your WHM (WebHost Manager) server. However, ensuring that SSH access is properly managed and secure is critical to protect your server from unauthorized access and potential security breaches. In this tutorial, we will explore the best practices for managing SSH access in WHM, providing you with the knowledge and tools to maintain a secure and controlled server environment.

Prerequisites

Before you begin, make sure you have the following prerequisites in place:

  1. Access to WHM: You should have administrative access to your WHM control panel.
  2. Basic Understanding of SSH: Familiarize yourself with SSH concepts, including key authentication and secure communication.

Step 1: Log in to WHM

  1. Open your web browser and navigate to your WHM login URL (typically https://your-server-ip:2087).

  2. Enter your WHM username and password to log in.

Step 2: Access SSH Configuration

  1. In the WHM dashboard, locate and click on "SSH Password Authorization Tweak" or use the search bar to find it.

  2. This interface allows you to configure SSH access settings.

Step 3: Secure SSH Password Authentication

  1. In the "SSH Password Authorization Tweak" interface, disable password authentication if not already disabled. Enabling key-based authentication enhances security significantly.

  2. Click the "Save" button to save your configuration.

Step 4: Configure SSH Keys

  1. Generate SSH keys on your local machine if you haven't already. You can use tools like ssh-keygen on Linux or macOS.

  2. In WHM, navigate to "Manage SSH Keys" to import your public SSH key. Ensure that your private key remains secure on your local machine.

  3. Verify that key-based authentication works correctly by attempting to log in via SSH using your key.

Step 5: Limit SSH Access

  1. In the "SSH Password Authorization Tweak" interface, you can specify which users or groups are allowed SSH access.

  2. Limit SSH access to authorized personnel only by specifying user accounts or IP addresses.

Step 6: Change SSH Port (Optional)

  1. For added security, consider changing the default SSH port (22) to a non-standard port. This can help reduce the visibility of your server to automated attacks.

  2. Ensure that you update your SSH client configuration to use the new port.

Step 7: Implement Brute Force Protection

  1. WHM offers tools to protect against SSH brute force attacks. In the "SSH Password Authorization Tweak" interface, you can enable "cPHulk Brute Force Protection."

  2. Configure the settings to lock out IP addresses with repeated failed login attempts.

Step 8: Monitor SSH Access

  1. Regularly review SSH logs and server security reports to identify any suspicious login attempts or unusual activity.

  2. Set up alerts or notifications for critical security events related to SSH access.

Conclusion

Effectively managing SSH access in WHM is crucial for maintaining the security of your server. By following this comprehensive guide and implementing best practices, you can secure your server against unauthorized access and potential threats. Remember that security is an ongoing process; regularly review and update your SSH access controls to adapt to evolving security challenges and protect your server environment effectively. With proper SSH management, you can ensure that your server remains secure and under your control.

 
The End! should you have any inquiries, we encourage you to reach out to the Vercaa Support Center without hesitation.
Was this answer helpful? 1 Users Found This Useful (1 Votes)