Protect Your Website Fast
  • Home
  • WAF Platform
  • AI Platform
  • SSL Certificates
    • DigiCert SSL
    • GeoTrust SSL
    • RapidSSL SSL
    • Sectigo SSL
    • Comodo SSL
    • Thawte SSL
  • Resources
    • Blog
    • Docs
  • Contact
  • My Account
Select Page

Getting Started & Account Management

4
  • Updating Contact and Billing Information
  • Requesting Your Free Website Migration
  • Step-by-Step CyberWAF Installation Guide
  • How to Access Your CyberWAF Control Panel

WAF & Core Security Features

4
  • Submitting a Malware Removal Request (SLA)
  • How to Handle False Positives (Whitelisting)
  • Managing Your Zero-Day Exploit Prevention Settings
  • Understanding WAF Rules and Filtering Modes

Performance & Hosting Management

4
  • How to Configure Email Accounts (Unlimited Email)
  • Setting Up Your Free SSL/TLS Certificate
  • Understanding NVMe SSD Storage & Performance Boost
  • Monitoring Your Resource Usage (CPU & RAM)

Billing, Plans & Licensing

4
  • Understanding the Service Level Agreement (SLA)
  • Invoice and Payment Management
  • How to Upgrade or Downgrade Your Service Plan
  • Comparing Basic, Business, and E-commerce WAF Plans

Troubleshooting & Advanced Configuration

4
  • Compliance and Security Best Practices
  • Using SSH Access and FTP for Advanced Users
  • How to Clear Your Website and Browser Cache
  • How to Fix 500 Internal Server Errors

Contact & Custom Solutions

4
  • How to Submit a Feature Request or Feedback
  • Requesting a Custom Infrastructure Quote
  • Understanding Our Support Response Times (SLAs)
  • How to Contact CyberWAF Support (24/7/365)

CMS & Application Integrations

4
  • Optimizing Database Connections
  • Customizing WAF for Custom PHP/Legacy Applications
  • Securing WooCommerce and E-commerce Platforms
  • Integrating WAF with WordPress and Other CMS

Backup, Restore & Data Management

4
  • Data Retention and Compliance
  • How to Perform a Granular (File or DB) Restore
  • How to Perform a Full Site Restore
  • Understanding the Daily Backup Service

Cyber Security Education & Glossary

4
  • Malware vs. Virus vs. Ransomware: Understanding the Differences
  • The OWASP Top 10 Explained (and how WAF blocks them)
  • What is a Zero-Day Exploit and How Does Virtual Patching Work?
  • Cyber Security Glossary: Key WAF & DDoS Terms
View Categories
  • Home
  • CyberWAF Knowledge Base
  • Troubleshooting & Advanced Configuration
  • Using SSH Access and FTP for Advanced Users

Using SSH Access and FTP for Advanced Users

< 1 min read

Secure Shell (SSH) Access #

SSH allows advanced users to interact with the server via command line, essential for running maintenance scripts, debugging, and managing large files.

  1. Enable SSH: SSH access is available upon request for security reasons. Submit a support ticket to have SSH enabled for your account.

  2. Required Credentials: Use your primary cPanel username and password.

  3. Connection Details: Connect using an SSH client (e.g., PuTTY, Terminal) with the following details:

    • Host/IP: Your server’s IP address.

    • Port: 22 (standard) or a custom port provided by support.

File Transfer Protocol (FTP) Access #

FTP is used for uploading, downloading, and managing site files.

  1. Create FTP Accounts: In cPanel, navigate to “FTP Accounts.” Create a new, dedicated FTP user (recommended over using the main cPanel login).

  2. Connection Details:

    • Server/Host: ftp.yourdomain.com or your server’s IP.

    • Username: The full FTP account name (e.g., user@yourdomain.com).

    • Port: 21 (standard).

Best Practices for Advanced Access #

  • Security: Always use SFTP (Secure File Transfer Protocol) or SSH over standard FTP for encrypted data transfer.

  • Permissions: Use the chmod command via SSH or the File Manager to ensure correct file permissions (755/644).

Updated on December 7, 2025

What are your Feelings

  • Happy
  • Normal
  • Sad

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
How to Clear Your Website and Browser CacheCompliance and Security Best Practices

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Table of Contents
  • Secure Shell (SSH) Access
  • File Transfer Protocol (FTP) Access
  • Best Practices for Advanced Access
Copyright © GIGAS HOST SRL. All rights reserved.