Please note: The Hestia Control Panel needs to be installed on a brand-new operating system to ensure normal operation.

Supported platforms and operating systems:

  • Debian: 12, 11 or 10
  • Ubuntu: 22.04 LTS, 20.04 LTS
    Note: Hestia Control Panel does not support 32-bit operating systems!

Installation Steps:

Step 1: Download the Installation Script

Download the latest version of the installation script:

wget https://raw.githubusercontent.com/hestiacp/hestiacp/release/install/hst-install.sh

If the download fails due to SSL verification errors, make sure the system has the ca-certificate package installed. This can be done with the following command:

apt-get update && apt-get install ca-certificates

Step 2: Run the Installation Script

Run the following command:

bash hst-install.sh

After the installation is complete, you will receive a login address, username, and password to access and log in to the Hestia panel.

For a custom installation:

During the installation process, you can specify many different flags to only install the features you need. Run the following command to see a list of available options:

bash hst-install.sh -h

Or use https://hestiacp.com/install.html to easily generate installation commands with the GUI.

How to Upgrade an Existing Installation
By default, newly installed Hestia panels have automatic updates enabled, which can be managed in Server Settings > Updates.

To manually check for and install available updates, use the apt package manager:

apt-get update
apt-get upgrade

Step 3: Configure with the Hestia Panel:

  1. Create a new user:

    Hestia's official recommendation is to create websites with non-admin users, so you need to create a new regular user, and then log in with the newly created user to create.

  2. Select the Mail directory and create a new mailbox, entering the domain you wish to use.

    • Spam Filter: Spam filter, used to detect and block spam emails.
    • Reject Spam: Reject spam, when enabled the system will automatically reject emails identified as spam.
    • Anti-Virus: Anti-virus, used to detect and block malicious software in emails, such as viruses, worms, and Trojans.
    • DKIM Support: Prevents email fraud and spam. When DKIM is enabled, the mail server will add a digital signature to the email, which the receiving server can use to verify whether the email comes from the declared domain and whether it has been modified during transmission.
    • SMTP Relay: The mail server receives emails and transmits them to another mail server or the final user. It is recommended to enable this when your device or application cannot send emails directly.
  3. Configure DNS records

    Configure according to the following image:

  4. After configuration, log in to the entered domain to check if the configuration was successful.

    The following image indicates successful configuration:

  5. Add the account of the login email.

    The username is the email address (for example, if you enter "admin", the email address is admin@adonis142857.ir)

  6. Log in to the email, and you can use the mailbox to send and receive emails.

Tag:Configure, Fail2Ban, Block Malicious Logins, SSH terminal, Firewall

Original link:http://enblog.fuyiran.link/Technology/6.html

Copyright: All posts on this blog, unless otherwise stated, are published using theCC BY-NC-SA 4.0 license agreement. Please indicate the source for reprinting Fu Speaking (enblog.fuyiran.link)

Add a new comment.