How Do I Secure Services Using Host Access Control in Web Host Manager?
WHM ( Web host Manager ) is web-based control panel administrating the Linux server, it is more easy way to using the linux server rather than using the more complex commands in the server, with all the options to create, manage cPanel accounts and set certain global setting that apply to all accounts
This interface also having the option as ” Host Access Control ” in order secure the services by allowing the connections that you wish to proceed.You can control your clients access based on the IP address, by using host access control
Host Access Control allows you to set up specific rules to allow or deny access to your server and services on it based on the IP address that is attempting to connect. It is general practice that denying all connections and only allowing connections that you wish to proceed is the most secure way to use Host Access Control.
To set up a rule, you will need to add the service you wish to create the rule for, the IP address(es) you wish to allow or deny, and then the action to be taken (allow or deny).
You can secure the following services by using host access control,
- cPanel (cpaneld)
- WHM (whostmgrd)
- Webmail (webmaild)
- Web Disk (cpdavd)
- FTP (ftpd)
- SSH (sshd)
- SMTP (smtp)
- POP3 (pop3)
- IMAP (imap)
Procedure to set allow/deny services in Host Access Control :
1. Login to WHM as root
2. Click on to ” Host access control ” under ” Security center ” ( Home>>Security center>>Host Access Control )
3. Then the page turn into next page where you can set the three parts, You need to specify the service which you want to set under ” Daemon ” option and you can set the ip address which you want to set that rule under , Then you can set the rule under “Action” option. Here you can also add your comment under ” comments ”
4. After adding all those details you need to save it. You should click “Save Host Access List” button to save changes.
5.You can also use “ALL EXCEPT x.x.x.x” as an Access List which will allow all IP addresses except x.x.x.x (replace with a specific IP address).
Note that the rules have an order of precedence. You need to place your allow rules before your deny rules if you are choosing to use the allow from a few, then deny from all technique.