Skip to content
Bamtus
  • buy vps
    • usa vps
    • Germany VPS
    • France vps
  • Login/registration area
  • blog
  • Submit a support ticket
×
Bamtus
  • vps
  • hosting
  • vsd
  • hosting
Bamtus

Archive

  • Home

Author: هاستینگ100

What is BGP IP?

  • 1 May, 2024
  • Vps Hosting
  • No Comments

In the vast world of networks and internet connections, Border Routing Protocol (BGP) plays a key role. BGP IP, short for Border Gateway Protocol Internet Protocol, is part of how data is routed across the Internet. In this comprehensive guide, we’ll cover every aspect of BGP IP, from the basics to its importance, and even answer common questions about it.

What is BGP IP?

BGP IP, or Internet Border Routing Protocol, is a standard external routing protocol used to exchange routing and access information between automated systems (AS) on the Internet. This protocol ensures efficient and accurate routing decisions that allow data to take the optimal route between networks. BGP IP operates at the application layer of the TCP/IP model and is essential to maintaining a stable and connected Internet.

How does BGP IP work?

BGP IP works by facilitating the exchange of routing information between different automated systems. This protocol works based on a route vector routing algorithm, such that each BGP router maintains a routing table containing a list of reachable IP prefixes and associated routes. BGP routes exchange the traffic that contains these routes, and through a comparison process, the better route for data transmission is determined. This dynamic decision process allows BGP IP to anticipate network changes and ensure efficient data delivery.

Importance of BGP IP

BGP IP plays a vital role in maintaining the strength and stability of the Internet. Its importance extends to various aspects of network communication and global connectivity.

The main stability of the brain network

BGP IP helps maintain the backbone infrastructure of the Internet. By effectively distributing routing information, data disruption is avoided and traffic flow is optimized. This is especially important for handling large volumes of data sent across the Internet.

Multiple samples and reproduction

Organizations often use multiple ISPs for replication and load balancing. BGP IP allows these organizations to have multiple connections to the Internet. In the event of a network failure, BGP IP provides failover to an alternate route without interrupting connections and maintains uninterrupted connections.

Policy-based routing

BGP IP gives administrators finer control over routing policies. This allows organizations to prioritize specific routes or ISPs based on factors such as cost, performance, and security. These policies are important to optimize network performance and ensure data security.

Global Internet access

BGP IP facilitates global Internet access by allowing networks to announce their own IP prefixes and routes, ensuring that data is routed from one point in the world to another, enabling unimaginable communication across networks and Provides areas.

BGP IP in action: real scenarios

Understanding BGP IP is incomplete without examining its applications in real-world scenarios. Let’s look at some examples to show its importance.

Scenario 1: Stopping the file in the data center

Imagine in a scenario, a data center faces a problem in the network due to unexpected factors. BGP IP comes to the rescue by redirecting through an alternate route. This prevents service disruption and maintains access to applications and services.

Scenario 2: Optimizing content delivery

For content delivery networks (CDNs), efficient data delivery is critical. BGP IP allows CDNs to route users to the closest server location, reducing latency and speeding up content loading. This optimization enhances the user experience and ensures smooth streaming of multimedia software and web browsing.

Frequently asked questions about BGP IP

Answers to some frequently asked questions about BGP IP:

  • Question: How is BGP IP different from other routing protocols?
  • Answer: Unlike Internal Routing Protocols (IGP) that operate within an automated system, BGP IP focuses on routing between different domains that are run by different organizations. Its main purpose is to exchange routing information between different networks.
  • Question: Is BGP IP vulnerable to security threats?
  • Answer: BGP IP is vulnerable to various security challenges including route hijacking and prefix spoofing. Continuous efforts are made to strengthen its security through mechanisms such as RPKI (Resource Public Key Infrastructure) to validate the authenticity of routing information.
  • Question: Can BGP IP keep up with the reliability demands of the modern Internet?
  • Answer: BGP IP was designed in an era with a smaller Internet landscape. While it has evolved to accommodate growth, challenges related to reliability remain. Engineers are engaged in activities and improvements to solve these problems.
  • Question: What role does BGP play in IPv6 adoption?
  • Answer: BGP IP is necessary for the adoption of IPv6, the next generation Internet protocol. BGP enables routing of IPv6 prefixes, to ensure coexistence and migration from IPv4 to IPv6.
  • Question: How can organizations optimize their BGP IP configurations?
  • Answer: Organizations can optimize BGP IP configurations by implementing routing filters, using prefix aggregation, and improving routing standards to reduce the complexity of their routing tables.
  • Question: Are there alternatives to cross-domain routing instead of BGP IP?
  • Answer: While BGP IP is the main inter-domain routing protocol, alternatives such as BGP-LS (BGP link-mode) and segment routing are emerging to address some of its limitations.

Conclusion

In the domain of Internet connectivity, BGP IP stands as a fundamental pillar that enables data transmission around the world. Its role in shaping the way of communication and network interaction is undeniable. From maintaining a stable brain infrastructure to facilitating optimal content delivery, BGP IP forms an integral part of the fabric of the Internet.

So, when uploading or receiving data online, remember that BGP IP is working hard behind the scenes to make all of this possible.

Getting to know AlmaLinux capabilities and risks

  • 29 April, 2024
  • Vps Hosting
  • No Comments

Getting to know AlmaLinux capabilities and risks – a complete look at the powerful Linux operating system

Features and capabilities of AlmaLinux:

1. Optimum performance: Alma Linux provides optimal performance and high speed in loading web pages by using advanced technologies. This makes it possible to improve the user experience and get more satisfaction from the site visitors.

2. High security: Alma Linux uses advanced tools and technologies to increase server security. With monitoring facilities and limited user access, the possibility of intrusion and cyber attacks on servers is minimized.

3. Simple management: Elma Linux makes server management simple and easy with an efficient and user-friendly interface. System administrators can easily configure and control servers by using graphical tools and access to various settings.

4. Compatibility with SEO plugins: Alma Linux is fully compatible with reputable SEO plugins such as Yoast SEO. This allows you to optimize things like meta tags, URL structure, keywords, and page descriptions to get better rankings in Google search results.

Risks and dangers:

1. Need for technical knowledge: using Elma Linux requires familiarity with related concepts and technologies. To use Alma Linux effectively and safely, you need technical knowledge and experience in installing, configuring and managing Linux systems. Otherwise, the probability of unwanted problems and errors in the servers will increase.

2. Lack of official support: Alma Linux is not supported by a commercial company, and to use it, you have to rely on the capabilities and facilities of the information community and its database. This may increase the time and cost of support and troubleshooting.

3. Possibility of incompatibility with some programs and services: Sometimes, Alma Linux may not be fully compatible with some programs and services. This issue may require special settings and configurations, and in some cases, you may need to change the program or search for an alternative.

4. Performance problems and incompatibility: In some cases, Alma Linux may be incompatible with some hardware and different combinations and cause performance problems for servers. Some of the possible problems include slow execution, system errors, interference with drivers, and sudden server shutdowns. To prevent these problems, perform valid tests on your system and make sure that the hardware and software used are fully compatible with Alma Linux.

In general, Alma Linux is a powerful and safe operating system, but it requires technical knowledge and full management to use it optimally and safely. Also, keep in mind that Alma Linux is not supported by a commercial company and requires the use of resources from the information community and Linux experts.

With proper management, you can take advantage of the capabilities of Alma Linux and reduce the associated risks:

1. Update regularly: Make sure your Alma Linux operating system receives updates and security patches. It helps you take advantage of the latest security fixes and performance improvements and minimize potential risks.

2. Regular backups: To protect important data and information, make sure you always have a backup of your system available by using a regular backup system. This action is the best way to prevent data loss in case of unexpected errors.

3. Access management: In order to increase the security of servers, it is very important to set access and user permissions. Proper access management, including limiting root access to users and setting detailed permissions for files and directories, can prevent cyber attacks.

4. Monitoring: By installing monitoring tools, you can track the performance of the servers and detect any malfunctions or suspicious attacks. This action allows you to quickly detect some problems and react to them.

Education and acquaintance:

1. Learning Linux concepts: To use Elma Linux effectively, it is necessary to know the basic concepts and principles of the Linux operating system. You can take advantage of online educational resources, books and courses to learn concepts such as the file system, terminal commands, installing and configuring applications and services.

2. Familiarity with related tools and technologies: Alma Linux uses a variety of tools and technologies for system management, security, and performance. For better exploitation, familiarity with monitoring, package management, backup and security tools such as firewalls and anti-virus software is vital.

3. Information community and educational resources: As an open source operating system, Alma Linux is supported by an active and dynamic information community. You can use resources such as forums, websites, video tutorials, and other online resources to learn new information, guides, and common system problems.

4. Trial and testing: Before commercial or critical use, it is recommended that you test Alma Linux in a test environment. It allows you to identify unknown problems, check the performance of servers and optimize configurations. Use performance tests, load tests, and security tests to ensure your system is stable and functioning properly.

5. Direct support: Alma Linux is supported through its community of users and developers. You can use forums, development groups, reputable sites, and related educational resources to ask questions, find solutions, and get guidance.

By following the above, you can take advantage of the features of Alma Linux and minimize the risks and dangers associated with its use. With proper management and proper training, Alma Linux can be a powerful choice for your servers and application systems.

6. Security: As a Linux-based operating system, Alma Linux offers high security features and capabilities. By using security mechanisms such as firewall, encryption, access control and certificate management, you can increase the security level of your system and protect against security threats.

7. Flexibility: Elma Linux is highly flexible and offers users a variety of customization and configuration capabilities. Using the relevant tools and settings, you can adjust your system to your specific needs and preferred settings.

8. Stability and Performance: Alma Linux is designed for stability and high performance. This operating system is able to operate with high load and in profitable working environments, and at the same time, it provides good efficiency of hardware resources.

With these things in mind, you can take advantage of Alma Linux’s capabilities and use Google-approved readability and Yoast SEO plugin to optimize your website. Due to the limitations and risks involved, it is always recommended to perform the necessary trials and tests before using Alma Linux commercially, and to use appropriate support for complex cases.

Complete and comprehensive guide to convert CentOS to AlmaLinux

  • 29 April, 2024
  • Vps Hosting
  • No Comments

Complete and comprehensive guide to convert CentOS to AlmaLinux

Why should we convert CentOS to AlmaLinux?

If you are using CentOS operating system, you have probably heard that CentOS is a popular and stable distribution based on open source and developed by the CentOS community. But with the discontinuation of CentOS by Red Hat, AlmaLinux has been proposed as a suitable alternative to CentOS. AlmaLinux is developed by CloudLinux and its main goal is to maintain compatibility with CentOS and provide a powerful and stable operating system for commercial environments.

If you are concerned about continuing to use CentOS and are looking for a quick and easy solution to convert to AlmaLinux, we have provided you with a comprehensive guide in this article.

Step 1: Preparation for conversion

Before you start converting CentOS to AlmaLinux, you need to make sure that your system is ready. Check out some of the following:

System update

If your CentOS system is not up to date, you must first update it to the latest version. To do this, use the following commands:

“`
sudo yum update
“`

Data backup

First of all, be sure to back up your important data. Converting the operating system may cause some data to be lost, so it is better to get proper support before starting any changes.

Version check

To convert to AlmaLinux, you need CentOS 8. You can check your CentOS version with the following command:

“`
cat /etc/centos-release
“`

If your CentOS version is old, you should update to CentOS 8. To do this, use the CentOS update guide.

Step 2: Install AlmaLinux

Now that your system is ready, you can start installing AlmaLinux. It is better to test the installation first through a virtual machine or a test server. In this way, you will be sure that there will be no problems during the installation process.

Follow the instructions below to install AlmaLinux:

Add AlmaLinux repositories

sudo dnf install -y https://repo.almalinux.org/almalinux/8/base/x86_64/Packages/almalinux-release-8.5-3.el8.x86_64.rpm

System update

sudo dnf -y upgrade

Install AlmaLinux

sudo dnf -y groupinstall “Server with GUI”

Restart the system

sudo systemctl reboot

After installing AlmaLinux, your system should boot automatically and you can log in using your CentOS username and password.

Third step: check and settings after installation

After installing AlmaLinux, you need to do some post-installation settings to c

Your oppression works properly. Next, we’ll look at several important settings:

System update

As with CentOS, you should update your AlmaLinux system regularly to maintain security and better performance. Use the following command to update:

“`
sudo dnf update
“`

Enable EPEL

EPEL (Extra Packages for Enterprise Linux) is a software repository for CentOS and AlmaLinux that provides extra packages and tools. To enable EPEL, use the following command:

“`
sudo dnf install epel-release
“`

Installing some basic packages

Some basic packages like `wget` and `nano` may not be installed on AlmaLinux. To install them, use the following commands:

“`
sudo dnf install wget nano
“`

Conclusion

By following the mentioned steps, you can convert your CentOS to AlmaLinux and use the powerful features of this operating system. Note that before making any changes, back up your data and follow the steps carefully.

With AlmaLinux, you can use a powerful and stable operating system for your business environments. Good luck!

CSF firewall installation and configuration tutorial

  • 28 April, 2024
  • Vps Hosting
  • No Comments

Config Server Firewall (CSF) is a Package Insight Inspection (SPI) firewall, intrusion/intrusion and security application for Linux servers.
It is a security tool that can protect your server from attacks, such as brute force, and improve server security.

It works as a WHM plugin and is free. Refer to these instructions to complete a basic CSF installation:

CSF firewall installation

Install CSF: Login to your server using SSH.

cd / usr / local / src /
wget https://download.configserver.com/csf.tgz
tar -xzf csf.tgz
cd csf
sh install.sh
You will see “install complete”.

cd ..
rm -Rfv csf / csf.tgz

CSF Configuration: Log in to your server via WHM as root and go to the menu on the left. In the Plugins section, go to ConfigServer Security Firewall.

Then, in the section “csf – ConfigServer Firewall” (on the right panel), click on “Configure Firewall”.

# Filter port configuration – IPv4 port settings #

The following ports are opened by default:

TCP_IN = “20،21،22،25،53،80،110،143،443،465،587،993،995،2077،2078،2082،2083،2086،2087،2095،2096،26”

TCP_OUT = “20،21،22،25،37،43،53،80،110،113،443،587،873،2086،2087،2089،2703”

UDP_IN 20،21،53

UDP_OUT 20،21،53،113،123،873،6277

If you have changed your SSH port number, you need to add this new port in “IPv4 Port Settings” and/or “IPv6 Port Settings”.
You can also use this section to add a specific port for a new application installed on the server.

If you are using the R1soft / Idera external backup solution, you must enable incoming traffic in the TCP_IN field of TCP port 1167.

# Enable Syslog Monitoring #

Set “SYSLOG_CHECK” to “1800”

# Suspicious process detection #

Set “PT_DELETED” to “1”

Set “PT_ALL_USERS” to “1”

# Spam protection and extensive activity detection (optional) – SMTP settings #

CSF can help you prevent spam abuse and identify suspicious email activity.

Set “SMTP_BLOCK” to “1” in the “SMTP Settings” section.

Set “LF_SCRIPT_LIMIT” to “250” to detect the script sending 250 email messages in one hour.

Set “LF_SCRIPT_ALERT” to “1” to send an email alert to the system administrator when the limit configured above is reached.

# Save the configuration and confirm the firewall status #

You can save the configuration by clicking the “Change” button at the bottom of the page. Then restart the cfd/lfd service.

After that, go to the main page of ConfigServer Security Firewall.
At the top of this page, you should see “Firewall Status: Enabled but in Test Mode”
If you see “Firewall Status: Disabled and Stopped” please click on “Enable”.

3. Confirm the configuration and remove the “Test” mode.

When you are satisfied with the configuration and have confirmed that it is working well, you should remove the “test mode”.
Return to the “Firewall configuration” section (“csf – Firewall ConfigServer” section)

Set “TESTING” to 0

Save this change by clicking the “Change” button at the bottom of the page and restart the cfd/lfd service.

4. Monitor firewall activity

You can monitor the firewall activity by clicking the “System Watch Systems” button on the ConfigServer Security Firewall main page.

Or read the log file /var/log/lfd.log which is accessible via SSH.

Change the SSH port on the Linux virtual server

  • 28 April, 2024
  • Vps Hosting
  • No Comments

In this article, we want to teach you how to change the SSH port on a Linux virtual server . You might ask yourself why we need to change the SSH port? The reason for this is to increase security!

In order to protect yourself from brute force attacks and being the target of password cracking attacks, you should change your SSH port and increase your security.

Using a port as a connection port is a prerequisite for connecting to SSH. In Linux servers, port 22 is usually used, which is active by default in Linux servers; But the issue is that this port is subjected to many attacks, the type of these attacks is more than the Brute Force type, which is aimed at cracking the root password of the server .

In simple terms, the person we refer to as an attacker, using random IPs that are connected to the Internet, using the username root and port 22, tests different passwords in order to be able to Crack the server.

With the help of a firewall , you can block the connection attempt after 3 failures; But this does not mean that these attacks do not take place, but your network resources are involved for attacks, and this method may even be used for network attacks.

These types of attacks work in such a way that they involve your server with their frequent connections to the network and the server faces a lack of resources, which is also called DDoS attacks.

The solution to all these problems is to change the SSH port, which we decided to fully teach in this article how to change the SSH port on a Linux virtual server. If you haven’t purchased a Linux virtual server yet, you can do so through the link.

Step-by-step change of SSH port in Linux virtual server

The SSH port is defined in the sshd_config file; The path of this file is located in /etc/ ssh /sshd_config.

To change SSH, you must first open the terminal program and then connect to your server using SSH.

Set the port option by editing the sshd file , then save the file.

After you find the path of the file, you need to edit the file and set the port option, which is possible through the following command:

sudo nano /etc/ssh/sshd_config

After doing all this, you should look for one of the following lines in this file:

Port 22
#Port 22

The most common port that is used instead of port 22 is port 2222. To set the port to 2222, you can enter it as follows:

“Port 2222”

Of course, you should keep this in mind since the connection port to Direct Admin is also 2222, it may cause problems in some firewalls, so it is better to choose another port.

After doing this step, you can save the applied changes in the corresponding file and close the file.

 

Note: Ports 0 to 1023 in the system are protected for various services, and you will not be able to use these ports. For example, port 80 is for http, port 443 is for https, etc. and you have to choose between 1024 and 65535.❗

Very important point: when changing the port, you should pay attention to an important point, that is, if you don’t shut down selinux temporarily and then restart the SSH service, your access through SSH will be permanently cut off forever.❗

In order to turn off Selinux, you can use the following command:

nano /etc/selinux/config

 

selinux users read:

To change the port to 2222, type the following command:

# semanage port -a -t ssh_port_t -p tcp 2222

Firewall settings

After going through the above steps, what you need to do is to update the acceptance of requests from SSH port 2222 on your Linux virtual server; If you are using UFW on Ubuntu and Debian Linux virtual server, using the following command can help you:

$ sudo ufw allow 2222/tcp

But when executing the command, keep in mind that if you use access other than root access, use the sudo command, but if you use root access, you do not need to enter the sudo command; The structure related to iptables is as follows:

sudo /sbin/iptables -A INPUT -m state –state NEW -m tcp -p tcp –dport 2222 -j ACCEPT

If you are using FreeBSD / OpenBSD / NetBSD Unix operating systems , the pf firewall structure in pf.conf is as follows:

pass log on $ext_if proto tcp to any port 2222 keep state

In order to open the new port, you can run the following commands with the help of firewall on Fedora/CentOS/RHEL/Oracle Linux distributions:

$ sudo firewall-cmd –permanent –zone=public –add-port=2222/tcp
$ sudo firewall-cmd –reload

Don’t forget to update your firewall settings; Otherwise the executed commands can disable your SSH access.

 

After all this, you need to restart your sshd service, to restart sshd you need to use the following command in different Linux distributions such as CentOS/RHEL/Fedora:

$ sudo service sshd restart

If you are using FreeBSD Unix, you should type the following command:

$ sudo service sshd restart

Be careful that the TCP port 2222 is opened, and for this you must use the netstat command or the ss command.

ss-tulipn | grep 2222
netstat -tulpn | grep 2222

In order to use the newly designated SSH port with the command line, you should note that its structure must be one of the following:

ssh -p {port} user@server
sftp -P {port} openssh-server
scp -P {port} source target
scp -P {port} /path/to/foo user@server:/dest/

last word

In this article, we explained step-by-step how to change the SSH port on the Linux virtual server and explained all the points in this regard; After reading the article, follow the tips and warnings that we have mentioned completely so that no problem occurs; If you need more guidance in this field, you can ask us in the comments section so that we can guide you as soon as possible.

 

How to update and update cPanel WHM/cPanel in ssh

  • 27 April, 2024
  • Vps Hosting
  • No Comments

Updating cPanel and WHM to the latest version is not difficult. The best way is to use upcp script and ssh environment.
First, update the Linux operating system to:

yum update -y

Now run the following command:

/scripts/upcp –force

By executing the above command, WHM-cPanel control panel will start updating. This process may be a little long. You should not reset the server in the middle of the update. This process may take up to 20 minutes.

The second method to update cPanel to the latest version is as follows:

Enter the web host control panel or WHM

Now enter the Upgrade to Latest Version section and click on the Upgrade button. If you want to force the panel to run the upcp script before clicking on the Upgrade button, check the Force a reinstall even if the system is up to date check box and then click on the Upgrade button.

Both methods actually follow the same goal, but the first method through SSH is more recommended, because the update process is less likely to be interrupted.

How to set the time and date in ubuntu

  • 27 April, 2024
  • Vps Hosting
  • No Comments

In this tutorial, we are with you on how to correctly set the time and date on Ubuntu and Linux servers , sometimes it happens to you that the time and date of your server has changed without you having made any changes! And it has caused many problems for you, in some cases, the time and date of the server changes with the changes made in the network, in some cases, this happens with the installation of the script and the changes that are given.

The most complete tutorial on how to set the time and date in ubuntu in two automatic methods in the graphical environment and manually in the terminal environment. We are with you with the two methods below. different) and… you will not have linux operating systems in general.

The first method: learning how to set the time and date in ubuntu (automatically):

First, enter the server through ssh with the putty program (ssh to the server)

Enter the following command to set the clock:

sudo dpkg-reconfigure tzdata

By entering the above command, a pink/gray color page will open for you. On this page, first select the continent of Asia, then on the next page, select the city of Tehran and press enter, as shown in the image below:

Your server time has been adjusted so easily!

Important note: If you set the time and date of the server with the above command, but the problem of setting the time is still not solved, set the date and time of the server with the manual method that we teach below.

The second method: teaching how to set the time and date in ubuntu (manually):

In this method, you can first see the date and time of the server with the following command

date

You can set the date and time automatically with the following command:

ntpdate 0.asia.pool.ntp.org

Our recommended method: You can do this manually using the following command:

date -s "7 OCT 2011 18:00:00"

or

date --set="7 OCT 2011 18:00:00"

Congratulations, the tutorial on setting the time and date in ubuntu is over.

Fix the problem of not connecting to the Internet in Linux

  • 26 April, 2024
  • Vps Hosting
  • No Comments

Fix the problem of not connecting to the Internet in Linux

Maybe for you, who owns a Linux server or a Linux desktop operating system, there will be a problem of not connecting to the Internet, or a severe drop in Internet speed, or your Internet will not work at all in a certain program. In this article, we will examine the methods that solve the problems caused by the lack of Internet connection in Linux .

Before doing anything, we must make sure that our Internet is connected in Linux with the following command. This command is Google’s dns, and if the Internet is connected, the ping must be complete.

ping -c 4 8.8.8.8

The output of the above command should be as follows. Otherwise, there is a possibility that your internet will be interrupted.

PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=58 time=1.68 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=58 time=1.70 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=58 time=1.71 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=58 time=1.69 ms

--- 8.8.8.8 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3005ms
rtt min/avg/max/mdev = 1.686/1.699/1.718/0.051 ms

The things that can fix the lack of Internet connection in Linux are:

  • Checking the DNS server
  • Restart the internet service
  • Network card settings
  • Checking and troubleshooting the network card
  • Firewall settings
  • And …

DNS server check

To check DNS, enter the following command in the terminal environment:

sudo cat /etc/resolv.conf

The output of the command should be as follows:

nameserver 1.1.1.1
nameserver 1.0.0.1

If your output is anything other than this, you can edit it with the nano command and paste the above text into it.

sudo nano /etc/resolv.conf

And then confirm and save the file by holding the combination key CTRL and X and then with Y.

Restart the Internet service

If the mentioned methods did not solve your Internet interruption problem in Linux, restart your operating system’s Internet service with the following commands, because it is possible that some services have a problem, and with this work, it will return to its default state and the Internet interruption problem fix you

Command to restart internet services for Ubuntu, debian and kalilinux operating systems

sudo service networking restart

The command to restart the network manager

sudo service network-manager restart

Command to restart internet services for RedHAT and CentOS operating systems

sudo service network restart

Network card settings

One of the reasons that is very effective is the deactivation of the network card. We can check the correct operation of our Linux network card with the following command.

ip addr

My network card named eth0 is here, and as you can see, it got an IP from the router and there is no problem in the configuration of the network card.

It is also possible that the name of the network card is different in your system. So put the name of your network card in the command below.

Use the following command to activate the inactive network card.

sudo ifup network card name

Use the following command to disable the active network card.

sudo ifdown Network card name

If your network card has an error and is not disabled, you can use this command.

sudo ifdown --force The name of the network card

Use the following command to activate it.

sudo ifup network card name

Network check and troubleshooting

To check the Internet network and ISP, we can use the following command to find the exact location of our Internet.

For debian and ubuntu

traceroute -4 8.8.8.8

For RedHat and CentOS

tracepath 8.8.8.8

If the process is done completely and correctly, the output is like this:

traceroute to 8.8.8.8 (8.8.8.8), 30 hops max, 60 byte packets
1_gateway (192.168.43.1) 3.368 ms 3.367 ms 3.432 ms
2 * * *
3 10.40.72.17 (10.40.72.17) 84.501 ms 96.662 ms 96.555 ms
4 10.40.72.1 (10.40.72.1) 96.114 ms 96.044 ms 96.294 ms
5 10.40.73.33 (10.40.73.33) 99.350 ms 96.353 ms 99.129 ms
6 * * *
7 10.40.69.65 (10.40.69.65) 66.813 ms 66.721 ms 65.910 ms
8 10.40.69.98 (10.40.69.98) 64.090 ms 64.000 ms 63.533 ms
9 10.0.11.169 (10.0.11.169) 63.457 ms 62.483 ms 62.386 ms
10 10.0.77.20 (10.0.77.20) 62.013 ms 79.632 ms 79.657 ms
11 10.0.77.1 (10.0.77.1) 83.412 ms 82.312 ms 82.575 ms
12 10.0.72.34 (10.0.72.34) 84.991 ms 84.919 ms 79.934 ms
13 10.0.77.118 (10.0.77.118) 79.811 ms 79.429 ms 103.539 ms
14 10.0.77.110 (10.0.77.110) 83.904 ms 82.089 ms 80.381 ms
15 10.21.252.246 (10.21.252.246) 80.417 ms 80.624 ms 80.545 ms
16 10.21.71.20 (10.21.71.20) 91.927 ms 89.772 ms 89.220 ms
17 10.21.71.20 (10.21.71.20) 92.004 ms 91.606 ms 91.540 ms
18 ix-et-4-0-5-0.tcore1.fnm-frankfurt.as6453.net (195.219.156.148) 207.375 ms 10.21.0.21 (10.21.0.21) 92.005 ms 90.894 ms
19 10.21.0.21 (10.21.0.21) 80.345 ms if-ae-9-2.tcore2.fr0-frankfurt.as6453.net (5.23.30.17) 196.298 ms 196.007 ms
20 if-ae-45-2.tcore1.fr0-frankfurt.as6453.net (195.219.50.20) 188.921 ms 195.807 ms et-5-0-0-0.ffttr6.-.opentransit.net (193.251.154.103) 168.200 Ms
21 72.14.214.52 (72.14.214.52) 167.552 ms google-13.gw.opentransit.net (193.251.252.246) 167.360 ms *
22 108.170.251.129 (108.170.251.129) 175.274 ms * 135.098 ms
23 * 72.14.232.33 (72.14.232.33) 134.970 ms dns.google (8.8.8.8) 164.028 ms

Firewall settings

After checking the connection and its correctness, we should check the firewall rules. For this purpose, we use the following command.

sudo iptables -L

The iptabels firewall checks all ports and applications connected to the Linux Internet.

Chain INPUT (policy ACCEPT)
target prot opt ​​source destination
ACCEPT all -- anywhere anywhere the RELATED, ESTABLISHED
ACCEPT tcp -- anywhere anywhere The firewall dpt:http
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
DROP all -- anywhere anywhere

Chain Forward (policy ACCEPT)
target prot opt ​​source destination

Chain OUTPUT (policy ACCEPT)
target prot opt ​​source destination

For example, here we have imposed restrictions on http and ssh access to the server, and you can check which option blocks ping on your server or system.

We hope that the mentioned methods are the right solution for your problem.

How to enable SSL for Hostname in cPanel

  • 26 April, 2024
  • Vps Hosting
  • No Comments

cPanel itself is programmed to check SSL every night for the domains defined in it, including Hostname, but it is necessary to check the Allow AutoSSL to replace invalid or expiring non-AutoSSL certificates option located in the SSL/TLS > Manage Auto SSL section. > Options is activated.

If for any reason this option is not activated or if you intend to install SSL for Hostname before night time, just run the following command through SSH with the root user:

/usr/local/cpanel/bin/checkallsslcerts

The above command will automatically install SSL for Hostname. In addition, the cPanel and WHM login section is secured using the same SSL so that cPanel/WHM login can be accessed without warning.

How to change hostname through WHM

  • 22 April, 2024
  • Vps Hosting
  • No Comments
A hostname is a fully qualified domain name (FQDN) used to identify your server. By default, your VPS/Dedicated server has a public hostname assigned to it. For example, vps ####. hosting100.net or assign hosting100.net.### However, you can customize your hostname to improve the ability to send emails from your domain / server. In this article, you can change how the server hostname is used using the Web Host Manager (WHM). Maybe some of you, dear friends, want to change your hosting names, but you don’t know the steps to do this. In this article, we will teach you how to change the host name through whm Follow us to change hostnames.

To change host names through WHM, follow the steps below:

First, log into your WHM.

Then enter the Networking Setup section and click on the Change Hostname option in this section to run a new page.

After entering this page, you can enter your desired host name in the New Hostname field in the Changename Name field.

Then click on the Change option to apply the changes.

Note: Your hostname must be in the form of a subdomain (server.example.com).

Note: Do not select the subdomain where you currently host your cPanel account.

Note: When you change your host name, you need to update the SSL certificate for services (such as cPanel / Webmail, FTP, Dovecot SMTP / IMAP, etc.).

Note: When you change your hostname, update all references to the previous hostname in your connection(s) to the server (such as IMAP/SMTP/POP, FTP and MySQL remote services) with the new hostname.

Important: The new hostname will be assigned as your host until you restart your server. In order for this change to persist across reboots, your host’s system administrator needs to change your hostname.

We hope that this article was useful for you.

Posts navigation

Older posts
Newer posts

Recent Posts

  • View the number of IPs connected to the server
  • Application of Two-Factor Authentication in WHM
  • Updating a Linux Server: A Step-by-Step Guide
  • What is a virtual cloud server?
  • How to check RAM usage in Linux

Recent Comments

    Categories

    • linux
    • Vps Hosting
    support hosting100