{"id":14371,"date":"2022-04-01T10:53:32","date_gmt":"2022-04-01T09:53:32","guid":{"rendered":"https:\/\/theemailshop.co.uk\/?p=14371"},"modified":"2022-06-27T12:29:49","modified_gmt":"2022-06-27T11:29:49","slug":"vps-server-uk-6-steps-to-configure-vps-server","status":"publish","type":"post","link":"https:\/\/theemailshop.co.uk\/vps-server-uk-6-steps-to-configure-vps-server\/","title":{"rendered":"VPS Server UK: 6 Easy Steps to Configure VPS Server"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">When businesses grow over time, hosting requirements also increase. Websites attract more traffic, and shared hosting plans fail to pick the load. Despite knowing that the<strong> <a href=\"https:\/\/theemailshop.co.uk\/vps-hosting-uk\/\">VPS Server UK<\/a><\/strong> is the best way out, people hesitate because even the thought of running an entire server on their own scares them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article will be a complete and comprehensive guide for the configuration of your VPS servers.\u00a0\u00a0\u00a0<\/span><\/p>\n<h2><strong>VPS Server: What Can You Expect?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\"><strong><a href=\"https:\/\/theemailshop.co.uk\/why-choose-high-bandwidth-vps-hosting-uk\/\">VPS Hosting<\/a><\/strong> offers your own virtual machine to handle your websites. Dedicated resources and zero sharing results in the best performance. However, server management is something you never do when on the shared hosting plan.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can change your environment and tweak your server settings in VPS plans. However, the most your provider will do is set up the server software.\u00a0<\/span><\/p>\n<h2><strong>6 Easy Steps to Configure VPS Server<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">After pointing out the right resources, your hosting provider may leave the rest to you. That may involve dealing with the command line, but we are here to explain the process in easy steps.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So let us begin the journey. The procedure that works for <a href=\"https:\/\/theemailshop.co.uk\/linux-cloud-hosting-uk\/\">Linux<\/a> may not work on any other operating system. This guide is written for Linux.\u00a0\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><strong>Access The Server: Use Secure Shell<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Secure Shell or SSH is the network protocol. It has two basic functions.\u00a0 Number one is making an encrypted connection with a server. Number two is executing the execute commands on it. The proper configuration of VPS requires SSH. SSH requires you to use a command-line interface for operation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So use the login credentials provided by your host to access the server via SSH. Here is the command you will use for it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ssh [root username]@[server IP]<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A server should show you a welcome message. If it does not, you have not entered the correct login details. If it does, congratulate yourself.\u00a0 You have logged in to your server.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><strong>Now Update Your VPS Server UK<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Not just performance, but security is also your responsibility. That makes updating your major responsibility because updates also install new security features and patches. Only then do you have the secure VPS server?\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The command for CentOS and RHEL will be as follows:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">yum check-update or DNF check-update<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You will type \u2018apt update\u2019 when you will be using Ubuntu and other Debian-based instructions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These commands will instruct the operating system to traverse the software packages and find the ones that are outdated.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The command is \u2018apt upgrade\u2019 if the distro underuse is Debian-based. You will have to type \u2018yum update\u2019 or \u2018DNF update\u2019 if the operating system is RHEL or CentOS. When the update is done, use the reboot command to restart the server.\u00a0<\/span><b><\/b><\/p>\n<h3 style=\"text-align: center;\"><strong>You Might Also Like to Read: <\/strong><a href=\"https:\/\/theemailshop.co.uk\/why-choose-high-bandwidth-vps-hosting-uk\/\">Why Choose High Bandwidth VPS Hosting UK?<\/a><\/h3>\n<ul>\n<li aria-level=\"1\">\n<h3><strong>Create A New User For Better Maintenance<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We worked as the root user who could do almost anything until this point. The root user is the owner. But we know that minor mistakes can lead to severe damages, so a second account with superuser admissions would be a great strategy. Let us explore how it is a good strategy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second will also allow you to change the most critical settings of the server. However,\u00a0 if you cannot execute the command without administrator authority, you must add the sudo prefix.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is not a minor change. Error messages that ask you to add a prefix will provoke you to rethink what you are doing. This way, you can be more cautious.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Execute this command to create a new user:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">adduser [the new user&#8217;s username]<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You will be asked to select the password by the server. Then comes assigning a new user account to the correct user group. The following command will do this:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">usermod -aG sudo [the new user&#8217;s username]<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is good to cross-check everything. If you want to make sure things work correctly, finish this SSH login session, and come back with a new user account.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><strong>The Default SSH Port Is LoopHole: Change It<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you are familiar with SSH, you must know which is the default listening port. It is Port 22.<\/span><span style=\"font-weight: 400;\"> The users of SSH know it but so do the cybercriminals. Strong passwords do reduce the risks but do not eliminate them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what do you have to change? The answer is the SSH default listening port. And what do you have to edit for this? The answer is the SSH configuration file.<\/span><span style=\"font-weight: 400;\"> However, take a backup first for safety and then start editing. Here is how your editing goes. First, you type the following command:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">cp \/etc\/ssh\/sshd_config \/etc\/ssh\/sshd_config_old<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nano is a text editor based on the command line. Nano will help you edit SSH configuration files. The following is the path for it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">nano \/etc\/ssh\/sshd_config<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Find the line that says, &#8216;#Port 22&#8217;. First of all, remove #. Now replace 22 with any number that falls between 1024 and 65535. Make sure you do not forget it. Next time you log in, you will need it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Applying changes is not possible if you do not save the SSH configuration files. So save it immediately. Now use the following command to restart the service:\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">systemctl restart ssh<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some commands may require sudo prefixes if you are not logged in with a root account.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><strong>Generate the SSH Keys for Your VPS Server<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Many automated scripts prowl over the internet and attempt to hack your servers. Changing the default listening port of SSH will make you safe from the scripts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, when it comes to blocking targeted attacks, you should arrange for the best authentication mechanism.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So we need a pair of Public and private keys. It is the SSH tool that helps it authenticate individual users. Although a regular password system is also enough, provided that the password is strong.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, you first come to the step of SSH keys generation. Open the app PuTTYgen, and click the button that says generate. It is a famous SSH client.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The top corner will show you the public key. A passphrase to serve as a password and work along the keypair is also mandatory.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Saving the key on your computer is important. Click on the \u2018Save Private Key\u2019 button. Now, the public key will be our focus.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, become a root user again, and log in again as this status. Then, use the following command to open your account&#8217;s home directory.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">su \u2013 [your username]<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hereafter, you have to create a folder. This folder will do two things. First, it will host your public key. Second, it will set the permissions so you can make a file inside it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Use the following commands for it:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">mkdir ~\/.ssh<\/span><\/p>\n<p><span style=\"font-weight: 400;\">chmod 700 ~\/.ssh<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We already have the public key that PuTTYgen created for us in the previous steps. Now comes the stage of creating a file where you paste this public key: This time again, we will use Nano text editor.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">nano ~\/.ssh\/authorized_keys<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now you should be able to use keypair for connecting your account with PuTTY. Here is the procedure for this. Open SSH client settings, and go to connection using Connection &gt; SSH &gt; Auth.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The next step is the selection of the private key. The private key file from the authentication field will help you do that.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Save changes before proceeding. Now disable the password authentication of your account.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That requires you to edit the SSH configuration file etc\/ssh\/sshd_config. It is just like the value of your PasswordAuthentication is Yes, and switch it to No.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\">\n<h3><strong>Firewall Is Your First Line of Defense<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Being the most critical security setting, the firewall checks both entering and leaving traffic. The firewall also makes sure no unauthorized person accesses the data. Professional VPS hosting in the UK is not possible without a firewall configuration.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The name of the firewall that major Linux distros use is iptables. It filters the traffic from the server. The majority of distros will give you pre pre-installed firewall. For the configuration of firewall rules, many utilities are available.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">UFW\u00a0 is the default firewall of Ubuntu, and CentOS is the one of CentOS. This is because they make the configuration of iptables easy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">None of their syntax and mechanisms is the same. You&#8217;ll need to go through your OS documentation to figure out how they work.<\/span><\/p>\n<h2><strong>The Final Verdict<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">We hope that this guide helps you configure your VPS servers easily. If you are looking for VPS hosting, <\/span><a href=\"https:\/\/theemailshop.co.uk\/\"><span style=\"font-weight: 400;\"><strong>TheEmailShop<\/strong><\/span><\/a><span style=\"font-weight: 400;\"> offers VPS servers at affordable rates. Your best VPS Server UK could be one step away.\u00a0<\/span><\/p>\n<p>For Discount and Offers Visit our Official\u00a0<strong><a href=\"https:\/\/twitter.com\/TheEmailShopUK\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>\u00a0<\/strong>Page<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When businesses grow over time, hosting requirements also increase. Websites attract more traffic, and shared hosting plans fail to pick the load. Despite knowing that the VPS Server UK is the best way out, people hesitate because even the thought of running an entire server on their own scares them.\u00a0 This article will be a [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":14372,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[659],"tags":[2324,1550,660,1860],"class_list":["post-14371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vps-hosting","tag-affordable-vps-hosting","tag-best-vps-hosting","tag-vps-hosting","tag-vps-server"],"_links":{"self":[{"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/posts\/14371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/comments?post=14371"}],"version-history":[{"count":6,"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/posts\/14371\/revisions"}],"predecessor-version":[{"id":15213,"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/posts\/14371\/revisions\/15213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/media\/14372"}],"wp:attachment":[{"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/media?parent=14371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/categories?post=14371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theemailshop.co.uk\/wp-json\/wp\/v2\/tags?post=14371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}